To display the masks used for network addresses and the number of subnets using each mask, use the showipmasks command in EXEC mode.
showipmasksaddress
Syntax Description
address
Network address for which a mask is required.
Command Modes
EXEC
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The showipmasks command is useful for debugging when a variable-length subnet mask (VLSM) is used. It shows the number of masks associated with the network and the number of routes for each mask.
Examples
The following is sample output from the showipmasks command:
Router# show ip masks 172.16.0.0
Mask Reference count
255.255.255.255 2
255.255.255.0 3
255.255.0.0 1
show ip nat limits all-host
To display the current Network Address Translation (NAT) limit entries of all configured hosts, use the
show ip nat limits all-host
command in user EXEC or privileged EXEC mode.
show ip nat limits all-host
[ host-address
host-address
[ end-host-address ] | number-of-sessions
{ greater-than
| less-than }
number ]
[ total ]
Syntax Description
host-address
(Optional) Displays statistics for a given address or range of addresses.
host-address
Address of the host or the starting address in a range.
end-host-address
(Optional) Ending address in a range.
number-of-sessions
(Optional) Displays statistics for limit entries with the given number of sessions.
greater-than
(Optional) Displays statistics for limit entries with more than the given number of sessions.
less-than
(Optional) Displays statistics for limit entries with less than the given number of sessions.
number
(Optional) Number of sessions for comparison. The range is from 0 to 2147483647.
total
(Optional) Displays only the total number of entries for a given query.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
You can use the
ip nat translation max-entries all-host command to limit the all-host NAT entries.
When you specify the
total keyword with the
show ip nat limits all-host
command, the output displays only the total entries for a given query.
Examples
The following is sample output from the
show ip nat limits all-host command:
Router# show ip nat limits all-host
Host Max Entries Use Count Miss Count
-------------------------------------------------
10.1.1.2 100000 1 0
Total number of limit entries: 1
The table below describes the significant fields shown in the display.
Table 1 show ip nat limits all-host Field Descriptions
Field
Description
Host
The inside local or the outside global IP address of the host. The host is the inside local IP address for inside source translations and the outside global IP address for outside source translations.
Max Entries
The configured maximum number of limit entries.
Use Count
The current number of translations for the limit entry.
Miss Count
Number of times a translation entry was not created because of the use count exceeding the configured maximum for the limit entry.
Related Commands
Command
Description
ip nat translation max-entries
Limits the number of NAT translations to a specified maximum.
show ip nat statistics
Displays NAT statistics
show ip nat limits all-vrf
To display the current Network Address Translation (NAT) limit entries for all configured VPN routing and forwarding (VRF) instances, use the
show ip nat limits all-vrf command in user EXEC or privileged EXEC mode.
show ip nat limits all-vrf
[ vrf-namename
| number-of-sessions
{ greater-than
| less-than } number ]
[ total ]
Syntax Description
vrf-name
(Optional) Displays statistics for a specified VRF.
name
VRF name.
number-of-sessions
(Optional) Displays statistics for limit entries with the given number of sessions.
greater-than
(Optional) Displays statistics for limit entries with more than the given number of sessions.
less-than
(Optional) Displays statistics for limit entries with less than the given number of sessions.
number
(Optional) Number of sessions for comparison. The range is from 0 to 2147483647.
total
(Optional) Displays only the total number of entries for a given query.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
You can use the
ip nat translation all-vrf
command to limit the all-VRF NAT entries.
When you specify the
total keyword with the
show ip nat limits all-vrf command, the output displays only the total entries for a given query.
Examples
The following is sample output from the
show ip nat limits all-vrf command:
Router# show ip nat limits all-vrf
VRF Name Max Entries Use Count Miss Count
-------------------------------------------------
VRF1 100000 1 0
Total number of limit entries: 1
The table below describes the significant fields shown in the display.
Table 2 show ip nat limits all-vrf Field Descriptions
Field
Description
VRF Name
Name of the VRF instance.
Max Entries
The configured maximum number of limit entries.
Use Count
The current number of translations for the limit entry.
Miss Count
Number of times a translation entry was not created because of the use count exceeding the configured maximum for the limit entry.
Related Commands
Command
Description
ip nat translation max-entries
Limits the number of NAT translations to a specified maximum.
show ip nat statistics
Displays NAT statistics
show ip nat nvi statistics
To display NAT virtual interface (NVI) statistics, use the
showipnatnvistatisticscommand in user EXEC or privileged EXEC mode.
showipnatnvistatistics
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>) Privileged EXEC (#)
Command History
Release
Modification
12.3(14)T
This command was introduced.
Examples
The following is sample output from the
showipnatnvistatistics command:
Router# show ip nat nvi statistics
Total active translations: 0 (0 static, 0 dynamic; 0 extended) NAT Enabled interfaces:
Hits: 0 Misses: 0
CEF Translated packets: 0, CEF Punted packets: 0 Expired translations: 0 Dynamic mappings:
-- Inside Source
[Id: 1] access-list 1 pool pool1 refcount 1213 pool pool1: netmask 255.255.255.0
start 192.168.1.10 end 192.168.1.253
start 192.168.2.10 end 192.168.2.253
start 192.168.3.10 end 192.168.3.253
start 192.168.4.10 end 192.168.4.253
type generic, total addresses 976, allocated 222 (22%), misses 0
[Id: 2] access-list 5 pool pool2 refcount 0 pool pool2: netmask 255.255.255.0
start 192.168.5.2 end 192.168.5.254
type generic, total addresses 253, allocated 0 (0%), misses 0
[Id: 3] access-list 6 pool pool3 refcount 3 pool pool3: netmask 255.255.255.0
start 192.168.6.2 end 192.168.6.254
type generic, total addresses 253, allocated 2 (0%), misses 0
[Id: 4] access-list 7 pool pool4 refcount 0 pool pool4 netmask 255.255.255.0
start 192.168.7.30 end 192.168.7.200
type generic, total addresses 171, allocated 0 (0%), misses 0
[Id: 5] access-list 8 pool pool5 refcount 109195 pool pool5: netmask 255.255.255.0
start 192.168.10.1 end 192.168.10.253
start 192.168.11.1 end 192.168.11.253
start 192.168.12.1 end 192.168.12.253
start 192.168.13.1 end 192.168.13.253
start 192.168.14.1 end 192.168.14.253
start 192.168.15.1 end 192.168.15.253
start 192.168.16.1 end 192.168.16.253
start 192.168.17.1 end 192.168.17.253
start 192.168.18.1 end 192.168.18.253
start 192.168.19.1 end 192.168.19.253
start 192.168.20.1 end 192.168.20.253
start 192.168.21.1 end 192.168.21.253
start 192.168.22.1 end 192.168.22.253
start 192.168.23.1 end 192.168.23.253
start 192.168.24.1 end 192.168.24.253
start 192.168.25.1 end 192.168.25.253
start 192.168.26.1 end 192.168.26.253
type generic, total addresses 4301, allocated 3707 (86%),misses 0 Queued Packets:0
The table below describes the fields shown in the display.
Table 3 show ip nat nvi statistics Field Descriptions
Field
Description
Total active translations
Number of translations active in the system. This number is incremented each time a translation is created and is decremented each time a translation is cleared or timed out.
NAT enabled interfaces
List of interfaces marked as NAT enabled with the
ipnatenable command.
Hits
Number of times the software does a translations table lookup and finds an entry.
Misses
Number of times the software does a translations table lookup, fails to find an entry, and must try to create one.
CEF Translated packets
Number of packets switched via Cisco Express Forwarding (CEF).
CEF Punted packets
Number of packets punted to the process switched level.
Expired translations
Cumulative count of translations that have expired since the router was booted.
Dynamic mappings
Indicates that the information that follows is about dynamic mappings.
Inside Source
The information that follows is about an inside source translation.
access-list
Access list number being used for the translation.
pool
Name of the pool.
refcount
Number of translations using this pool.
netmask
IP network mask being used in the pool.
start
Starting IP address in the pool range.
end
Ending IP address in the pool range.
type
Type of pool. Possible types are generic or rotary.
total addresses
Number of addresses in the pool available for translation.
allocated
Number of addresses being used.
misses
Number of failed allocations from the pool.
Queued Packets
Number of packets in the queue.
Related Commands
Command
Description
showipnatnvitranslations
Displays active NAT virtual interface translations.
show ip nat nvi translations
To display active NAT virtual interface (NVI) translations, use the
showipnatnvitranslations command in user EXEC or privileged EXEC mode.
showipnatnvitranslations
[ protocol
[ global | vrfvrf-name ] | vrfvrf-name | global ]
[verbose]
Syntax Description
protocol
(Optional) Displays protocol entries. The protocol argument must be replaced with one of the following keywords:
(Optional) Displays entries in the global destination table.
vrfvrf-name
(Optional) Displays VPN routing and forwarding (VRF) traffic-related information.
verbose
(Optional) Displays additional information for each translation table entry, including how long ago the entry was created and used.
Command Modes
User EXEC (>) Privileged EXEC (#)
Command History
Release
Modification
12.3(14)T
This command was introduced.
Examples
The following is sample output from the
showipnatnvitranslations command:
Router# show ip nat nvi translations
Pro Source global Source local Destin local Destin global
icmp 172.20.0.254:25 172.20.0.130:25 172.20.1.1:25 10.199.199.100:25
icmp 172.20.0.254:26 172.20.0.130:26 172.20.1.1:26 10.199.199.100:26
icmp 172.20.0.254:27 172.20.0.130:27 172.20.1.1:27 10.199.199.100:27
icmp 172.20.0.254:28 172.20.0.130:28 172.20.1.1:28 10.199.199.100:28
The table below describes the fields shown in the display.
Table 4 show ip nat nvi translations Field Descriptions
Field
Description
Pro
Protocol of the port identifying the address.
Source global
Source global address.
Source local
Source local address.
Destin local
Destination local address.
Destin global
Destination global address.
Related Commands
Command
Description
showipnatnvistatistics
Displays NAT virtual interface statistics.
show ip nat redundancy
To display the Network Address Translation (NAT) high-availability information, use the show ip nat redundancy command in privileged EXEC mode.
showipnatredundancy rg-id
Syntax Description
rg-id
Redundancy group (rg) ID. Valid values are 1 and 2.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.3(2)T
This command was introduced.
Usage Guidelines
Use the show ip nat redundancy command to display information about the NAT high-availability Finite State Machine (FSM) and RG statistics.
Examples
The following is sample output from the show ip nat redundancy command. The output fields are self-explanatory.
To display Network Address Translation (NAT) statistics, use the
showipnatstatistics command in user EXEC or privileged EXEC mode.
showipnatstatistics
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
11.2
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Cisco IOS XE Release 3.4S
This command was modified. The NAT limit statistics for all hosts and for all VPN routing and forwarding (VRF) instances were removed from the output of this command.
Examples
The following is sample output from the
showipnatstatistics
command:
Router# show ip nat statistics
Total translations: 2 (0 static, 2 dynamic; 0 extended)
Outside interfaces: Serial0
Inside interfaces: Ethernet1
Hits: 135 Misses: 5
Expired translations: 2
Dynamic mappings:
-- Inside Source
access-list 1 pool net-208 refcount 2
pool net-208: netmask 255.255.255.240
start 172.16.233.208 end 172.16.233.221
type generic, total addresses 14, allocated 2 (14%), misses 0
The table below describes the significant fields shown in the display.
Table 5 show ip nat statistics Field Descriptions
Field
Description
Total translations
Number of translations active in the system. This number is incremented each time a translation is created and is decremented each time a translation is cleared or times out.
Outside interfaces
List of interfaces marked as outside with the
ipnatoutside command.
Inside interfaces
List of interfaces marked as inside with the
ipnatinside command.
Hits
Number of times the software does a translations table lookup and finds an entry.
Misses
Number of times the software does a translations table lookup, fails to find an entry, and must try to create one.
Expired translations
Cumulative count of translations that have expired since the router was booted.
Dynamic mappings
Indicates that the information that follows is about dynamic mappings.
Inside Source
Indicates that the information that follows is about an inside source translation.
access-list
Access list number being used for the translation.
pool
Name of the pool (in this case, net-208).
refcount
Number of translations using this pool.
netmask
IP network mask being used in the pool.
start
Starting IP address in the pool range.
end
Ending IP address in the pool range.
type
Type of pool. Possible types are generic or rotary.
total addresses
Number of addresses in the pool available for translation.
allocated
Number of addresses being used.
misses
Number of failed allocations from the pool.
Related Commands
Command
Description
clearipnattranslation
Clears dynamic NAT translations from the translation table.
ipnat
Designates that traffic originating from or destined for the interface is subject to NAT.
ipnatinsidedestination
Enables NAT of the inside destination address.
ipnatinsidesource
Enables NAT of the inside source address.
ipnatoutsidesource
Enables NAT of the outside source address.
ipnatpool
Defines a pool of IP addresses for NAT.
ipnatservice
Changes the amount of time after which NAT translations time out.
showipnattranslations
Displays active NAT translations.
show ip nat translations
To display active Network Address Translation ( NAT) translations, use the
showipnattranslationscommand inEXEC mode.
(Optional) Displays User Datagram Protocol (UDP) entries.
verbose
(Optional) Displays additional information for each translation table entry, including how long ago the entry was created and used.
vrfvrf-name
(Optional) Displays VPN routing and forwarding (VRF) traffic-related information.
Command Modes
EXEC
Command History
Release
Modification
11.2
This command was introduced.
12.2(13)T
The
vrfvrf-namekeyword and argument combination was added.
12.2(15)T
The
esp keyword was added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
XE 2.4.2
The
insideandoutsidekeywords were added.
Examples
The following is sample output from the
showipnattranslationscommand. Without overloading, two inside hosts are exchanging packets with some number of outside hosts.
Router# show ip nat translations
Pro Inside global Inside local Outside local Outside global
--- 10.69.233.209 192.168.1.95 --- ---
--- 10.69.233.210 192.168.1.89 --- --
With overloading, a translation for a Domain Name Server (DNS) transaction is still active, and translations for two Telnet sessions (from two different hosts) are also active. Note that two different inside hosts appear on the outside with a single IP address.
Router# show ip nat translations
Pro Inside global Inside local Outside local Outside global
udp 10.69.233.209:1220 192.168.1.95:1220 172.16.2.132:53 172.16.2.132:53
tcp 10.69.233.209:11012 192.168.1.89:11012 172.16.1.220:23 172.16.1.220:23
tcp 10.69.233.209:1067 192.168.1.95:1067 172.16.1.161:23 172.16.1.161:23
The following is sample output that includes the
verbose keyword:
Router# show ip nat translations verbose
Pro Inside global Inside local Outside local Outside global
udp 172.16.233.209:1220 192.168.1.95:1220 172.16.2.132:53 172.16.2.132:53
create 00:00:02, use 00:00:00, flags: extended
tcp 172.16.233.209:11012 192.168.1.89:11012 172.16.1.220:23 172.16.1.220:23
create 00:01:13, use 00:00:50, flags: extended
tcp 172.16.233.209:1067 192.168.1.95:1067 172.16.1.161:23 172.16.1.161:23
create 00:00:02, use 00:00:00, flags: extended
The following is sample output that includes the
vrf keyword:
Router# show ip nat translations vrf abc
Pro Inside global Inside local Outside local Outside global
--- 10.2.2.1 192.168.121.113 --- ---
--- 10.2.2.2 192.168.122.49 --- ---
--- 10.2.2.11 192.168.11.1 --- ---
--- 10.2.2.12 192.168.11.3 --- ---
--- 10.2.2.13 172.16.5.20 --- ---
Pro Inside global Inside local Outside local Outside global
--- 10.2.2.3 192.168.121.113 --- ---
--- 10.2.2.4 192.168.22.49 --- ---
The following is sample output that includes the
esp keyword:
Router# show ip nat translations esp
Pro Inside global Inside local Outside local Outside global
esp 192.168.22.40:0 192.168.122.20:0 192.168.22.20:0 192.168.22.20:28726CD9
esp 192.168.22.40:0 192.168.122.20:2E59EEF5 192.168.22.20:0 192.168.22.20:0
The following is sample output that includes the
esp and
verbose keywords:
Router# show ip nat translation esp verbose
Pro Inside global Inside local Outside local Outside global
esp 192.168.22.40:0 192.168.122.20:0 192.168.22.20:0 192.168.22.20:28726CD9
create 00:00:00, use 00:00:00,
flags:
extended, 0x100000, use_count:1, entry-id:192, lc_entries:0
esp 192.168.22.40:0 192.168.122.20:2E59EEF5 192.168.22.20:0 192.168.22.20:0
create 00:00:00, use 00:00:00, left 00:04:59, Map-Id(In):20,
flags:
extended, use_count:0, entry-id:191, lc_entries:0
The following is sample output that includes the
insidekeyword:
Router# show ip nat translations inside 10.69.233.209
Pro Inside global Inside local Outside local Outside global
udp 10.69.233.209:1220 192.168.1.95:1220 172.16.2.132:53 172.16.2.132:53
The table below describes the significant fields shown in the display.
Table 6 show ip nat translations Field Descriptions
Field
Description
Pro
Protocol of the port identifying the address.
Inside global
The legitimate IP address that represents one or more inside local IP addresses to the outside world.
Inside local
The IP address assigned to a host on the inside network; probably not a legitimate address assigned by the Network Interface Card (NIC) or service provider.
Outside local
IP address of an outside host as it appears to the inside network; probably not a legitimate address assigned by the NIC or service provider.
Outside global
The IP address assigned to a host on the outside network by its owner.
create
How long ago the entry was created (in hours:minutes:seconds).
use
How long ago the entry was last used (in hours:minutes:seconds).
flags
Indication of the type of translation. Possible flags are:
extended--Extended translation
static--Static translation
destination--Rotary translation
outside--Outside translation
timing out--Translation will no longer be used, due to a TCP finish (FIN) or reset (RST) flag.
Related Commands
Command
Description
clearipnattranslation
Clears dynamic NAT translations from the translation table.
ipnat
Designates that traffic originating from or destined for the interface is subject to NAT.
ipnatinsidedestination
Enables NAT of the inside destination address.
ipnatinsidesource
Enables NAT of the inside source address.
ipnatoutsidesource
Enables NAT of the outside source address.
ipnatpool
Defines a pool of IP addresses for NAT.
ipnatservice
Enables a port other than the default port.
showipnatstatistics
Displays NAT statistics.
show ip nat translations redundancy
To display active Network Address Translations (NAT) redundancy information, use the showipnattranslationsredundancy command in privileged EXEC mode.
show ipnattranslations redundancyrg-id
[ verbose ]
Syntax Description
rg-id
Redundancy group (RG) ID. Valid values are 1 and 2.
verbose
(Optional) Displays additional information for each translation table entry, including the time period when the entry was created and the duration for which it was used.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.3(2)T
This command was introduced.
Usage Guidelines
Use the showipnattranslationsredundancy command to display information about the NAT translations that belong to a specified RG.
Examples
The following is sample output from the show ip nat translations redundancy command for RG ID 1. The output fields are self-explanatory.
(Optional) Displays dynamic (learned) IP-to-nonbroadcast multiaccess address (NBMA) mapping entries. Dynamic NHRP mapping entries are obtained from NHRP resolution/registration exchanges. See the table below for types, number ranges, and descriptions.
incomplete
(Optional) Displays information about NHRP mapping entries for which the IP-to-NBMA is not resolved. See the table below for types, number ranges, and descriptions.
static
(Optional) Displays static IP-to-NBMA address mapping entries. Static NHRP mapping entries are configured using the
ipnhrpmap command. See the table below for types, number ranges, and descriptions.
address
(Optional) Displays NHRP mapping entries for specified protocol addresses.
interface
(Optional) Displays NHRP mapping entries for the specified interface. See the table below for types, number ranges, and descriptions.
brief
(Optional) Displays a short output of the NHRP mapping.
detail
(Optional) Displays detailed information about NHRP mapping.
purge
(Optional) Displays NHRP purge information.
shortcut
(Optional) Displays NHRP shortcut information.
Command Modes
User EXEC (>) Privileged EXEC (#)
Command Default
Information is displayed for all NHRP mappings.
Command History
Release
Modification
10.3
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.4(22)T
The output of this command was extended to display the NHRP group received from the spoke.
Cisco IOS XE Release 2.5
This command was modified. Support was added for the
shortcut keyword.
Usage Guidelines
The table below lists the valid types, number ranges, and descriptions for the optional
interface argument.
Note
The valid types can vary according to the platform and interfaces on the platform.
Table 7 Valid Types, Number Ranges, and Interface Description
Valid Types
Number Ranges
Interface Descriptions
async
1
Async
atm
0 to 6
ATM
bvi
1 to 255
Bridge-Group Virtual Interface
cdma-ix
1
CDMA Ix
ctunnel
0 to 2147483647
C-Tunnel
dialer
0 to 20049
Dialer
ethernet
0 to 4294967295
Ethernet
fastethernet
0 to 6
FastEthernet IEEE 802.3
lex
0 to 2147483647
Lex
loopback
0 to 2147483647
Loopback
mfr
0 to 2147483647
Multilink Frame Relay bundle
multilink
0 to 2147483647
Multilink-group
null
0
Null
port-channel
1 to 64
Port channel
tunnel
0 to 2147483647
Tunnel
vif
1
PGM multicast host
virtual-ppp
0 to 2147483647
Virtual PPP
virtual-template
1 to 1000
Virtual template
virtual-tokenring
0 to 2147483647
Virtual Token Ring
xtagatm
0 to 2147483647
Extended tag ATM
Examples
The following is sample output from the
showipnhrpcommand. This output shows the NHRP group received from the spoke:
Router# show ip nhrp
10.0.0.2/32 via 10.0.0.2, Tunnel0 created 00:17:49, expire 00:01:30
Type: dynamic, Flags: unique registered used
NBMA address: 172.17.0.2
Group: test-group-0
10.0.0.3/32 via 10.0.0.3, Tunnel0 created 00:00:11, expire 01:59:48
Type: dynamic, Flags: unique registered used
NBMA address: 172.17.0.3
Group: test-group-0
11.0.0.2/32 via 11.0.0.2, Tunnel1 created 00:17:49, expire 00:02:10
Type: dynamic, Flags: unique registered used
NBMA address: 172.17.0.2
Group: test-group-1
The following is sample output from the show ip nhrp shortcut command:
Router#show ip nhrp shortcut
10.1.1.1/24 via 1.1.1.22 Tunnel0 created 00:00:05, expire 00:02:24
Type: dynamic, Flags: router rib
NBMA address: 10.12.1.1
10.1.1.2/24 via 1.1.1.22 Tunnel0 created 00:00:05, expire 00:02:24
Type: dynamic, Flags: router rib nho
NBMA address: 10.12.1.2
The following is sample output from the
showipnhrpdetailcommand:
Router# show ip nhrp detail
10.1.1.1/8 via 10.2.1.1, Tunnel1 created 00:46:29, never expire
Type: static, Flags: used
NBMA address: 10.12.1.1
10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47
Type: dynamic, Flags: authoritative unique nat registered used
NBMA address: 10.12.1.2
10.1.1.4, Tunnel1 created 00:00:07, expire 00:02:57
Type: incomplete, Flags: negative
Cache hits: 4
The table below describes the significant fields shown in the displays.
Table 8 show ip nhrp Field Descriptions
Field
Description
10.1.1.1/8
Target network.
via 10.2.1.1
Next Hop to reach the target network.
Tunnel1
Interface through which the target network is reached.
created 00:00:12
Length of time since the entry was created (hours:minutes:seconds).
expire 01:59:47
Time remaining until the entry expires (hours:minutes:seconds).
never expire
Indicates that static entries never expire.
Type
dynamic--NHRP mapping is obtained dynamically. The mapping entry is created using information from the NHRP resolution and registrations.
static--NHRP mapping is configured statically. Entries configured by the
ipnhrpmap command are marked static.
incomplete--The NBMA address is not known for the target network.
NBMA address
Nonbroadcast multiaccess address of the next hop. The address format is appropriate for the type of network being used: ATM, Ethernet, Switched Multimegabit Data Service (SMDS), or multipoint tunnel.
Flags
authoritative--Indicates that the NHRP information was obtained directly from the Next Hop Server or router that maintains and is authoritative for the NBMA-to-IP address mapping for a particular destination.
implicit--Indicates that the local node learned about the NHRP mapping entries from the source mapping information of an NHRP resolution request received by the local router, or from an NHRP resolution packet being forwarded through the local router.
local--Indicates NHRP mapping entries that are for networks local to this router (that is, serviced by this router). These flag entries are created when this router answers an NHRP resolution request that has this information and is used to store the transport (tunnel) IP address of all the other NHRP nodes to which it has sent this information. If for some reason this router loses access to this local network (that is, it can no longer service this network), it sends an NHRP purge message to all remote NHRP nodes that are listed in the “local” entry (in
showipnhrpdetail command output) to tell the remote nodes to clear this information from their NHRP mapping tables. This local mapping entry times out of the local NHRP mapping database at the same time that this information (from the NHRP resolution reply) would time out of the NHRP mapping database on the remote NHRP nodes.
nat--Indicates that the remote node (NHS client) supports the new NHRP NAT extension type for dynamic spoke-spoke tunnels to/from spokes behind a NAT router. This marking does not indicate that the spoke (NHS client) is behind a NAT router.
Flags (continued)
negative--For negative caching, indicates that the requested NBMA mapping has not yet been or could not be obtained. When NHRP sends an NHRP resolution request, an incomplete (negative) NHRP mapping entry for the address is inserted in the resolution request. This insertion suppresses any more triggering of NHRP resolution requests while the resolution request is being resolved. If configured, any encryption parameters (IKE/IPsec) for the tunnel are negotiated.
(no socket)--Indicates that the NHRP mapping entries will not trigger IPsec to set up encryption because data traffic does not need to use this tunnel. Later, if data traffic needs to use this tunnel, the flag will change from a “(no socket)” to a “(socket)” entry and IPsec will be triggered to set up the encryption for this tunnel. Local and implicit NHRP mapping entries are always initially marked as “(no socket).”By default, NHRP caches source information from NHRP resolution request or replies as they go through the system. To allow this caching to continue, but not have the entry create an IPsec socket, they are marked as (no socket). If this was not done there would be extra IPsec sockets from the hubs to the various spokes that either were not used or were used for only one or two packets while a direct spoke-to-spoke tunnel was being built. Data packets and NHRP packets that arrive on the tunnel interface and are forwarded back out the tunnel interface are not allowed to use the (no socket) NHRP mappings for forwarding. Because, in this case, the router is an intermediate node in the path between the two endpoints and we only want to create short-cut tunnels between the initial entrance and final exit point of the DMVPN (NBMA) network and not between any intermediate nodes. If at some point the router receives a data packet that has a source interface that is not the tunnel interface and it would use the (no socket) mapping entry, the router converts the (no socket) entry to a (socket) entry. In this case, this router is the entrance (or exit) point of the NBMA (for this traffic stream).
Flags (continued)
(no socket) (continued)--These (no socket) mapping entries are marked (non-authoritative); only mappings from NHRP registrations are marked (authoritative). The NHRP resolution requests are also marked (authoritative), which means that the NHRP resolution request can be answered only from an (authoritative) NHRP mapping entry. A (no socket) mapping entry will not be used to answer an NHRP resolution request and the NHRP resolution request will be forwarded to the NHS of the nodes .
registered--Indicates that the mapping entry was created in response to an NHRP registration request. Although registered mapping entries are dynamic entries, they may not be refreshed through the “used” mechanism. Instead, these entries are refreshed by another NHRP registration request with the same transport (tunnel) IP to NBMA address mapping. The Next Hop Client (NHC) periodically sends NHRP registration requests to keep these mappings from expiring.
router--Indicates that NHRP mapping entries for a remote router (that is accessing a network or host behind the remote router) are marked with the router flag.
unique--NHRP registration requests have the unique flag set on by default. This flag indicates that an NHRP mapping entry cannot be overwritten by a mapping entry that has the same IP address and a different NBMA address. When a spoke has a statically configured outside IP (NBMA) address, this is used to keep another spoke that is mis-configured with the same transport (tunnel) IP address from overwriting this entry. If a spoke has a dynamic outside IP (NBMA) address, you can configure the
ipnhrpregistrationno-unique command on the spoke to clear this flag. This configuration allows the registered NHRP mapping entry for that spoke on the hub to be overwritten with a new NBMA address. This is necessary in this case because the spoke's outside IP (NBMA) address can change at any time. If the “unique” flag was set, the spoke would have to wait for the mapping entry on the hub to time out before it could register its new (NBMA) mapping.
Flags (continued)
used--When data packets are process-switched and this mapping entry was used, the mapping entry is marked as used. The mapping database is checked every 60 seconds. If the used flag is set and more than 120 seconds remain until expire time, the used flag is cleared. If fewer than 120 seconds are left, this mapping entry is “refreshed” by the transmission of another NHRP resolution request.
Note
When using DMVPN Phase 3 in 12.4(6)T, CEF switched packets will also set the “used” flag, and these entries will be timed out and refreshed as described in the “used” flag description above.
Related Commands
Command
Description
ipnhrpgroup
Configures a NHRP group on a spoke.
ipnhrpmap
Statically configures the IP-to-NBMA address mapping of IP destinations connected to an NBMA network.
ipnhrpmapgroup
Adds NHRP groups to QoS policy mappings on a hub.
ipnhrpshortcut
Enables shortcut switching on the tunnel interface.
showdmvpn
Displays DMVPN-specific session information.
showipnhrpgroup-map
Displays the details of NHRP group mappings on a hub and the list of tunnels using each of the NHRP groups defined in the mappings.
showipnhrpmulticast
Displays NHRP multicast mapping information.
showipnhrpnhs
Displays NHRP Next Hop Server information.
showipnhrpsummary
Displays NHRP mapping summary information.
showipnhrptraffic
Displays NHRP traffic statistics.
showpolicy-mapmgre
Displays statistics about a specific QoS policy as it is applied to a tunnel endpoint.
show ip nhrp group-map
To display the details of NHRP group mappings, use the
showipnhrpgroup-mapcommand in user EXEC or privileged EXEC mode.
showipnhrpgroup-map [group-name]
Syntax Description
group-name
(Optional) Name of an NHRP group mapping for which information will be displayed.
Command Default
Information is displayed for all NHRP group mappings.
Command Modes
User EXEC (>) Privileged EXEC (#)
Command History
Release
Modification
12.4(22)T
This command was introduced.
Usage Guidelines
This command displays the details on NHRP group mappings on the hub along with the list of tunnels using each of the NHRP groups defined in the mappings. In combination with the
showipnhrp command, this command lets you easily determine which QoS policy map is applied to a specific tunnel endpoint.
This command displays the details of the specified NHRP group mapping. The details include the associated QoS policy name and the list of tunnel endpoints using the QoS policy. If no option is specified, it displays the details of all NHRP group mappings.
Examples
The following is sample output from the
showipnhrpgroup-mapcommand:
Router# show ip nhrp group-map
Interface: Tunnel0
NHRP group: test-group-0
QoS policy: queueing
Tunnels using the QoS policy:
Tunnel destination overlay/transport address
10.0.0.2/172.17.0.2
10.0.0.3/172.17.0.3
Interface: Tunnel1
NHRP group: test-group-1
QoS policy: queueing
Tunnels using the QoS policy:
Tunnel destination overlay/transport address
11.0.0.2/172.17.0.2
NHRP group: test-group-2
QoS policy: p1
Tunnels using the QoS policy: None
The following is sample output from the
showipnhrpgroup-mapcommand for an NHRP group named test-group-0:
Router# show ip nhrp group-map test-group-0
Interface: Tunnel0
NHRP group: test-group-0
QoS policy: queueing
Tunnels using the QoS policy:
Tunnel destination overlay/transport address
10.0.0.2/172.17.0.2
10.0.0.3/172.17.0.3
The table below describes the significant fields shown in the displays.
Table 9 show ip nhrp group-map Field Descriptions
Field
Description
Interface
Interface on which the policy is configured.
NHRP group
NHRP group associated with the QoS policy on the interface.
QoS policy
QoS policy configured on the interface.
Tunnels using the QoS Policy
List of tunnel endpoints using the QoS policy.
Tunnel destination overlay/transport address
Tunnel destination overlay address (such as the tunnel endpoint address).
Related Commands
Command
Description
ipnhrpgroup
Configures a NHRP group on a spoke.
ipnhrpmap
Statically configures the IP-to-NBMA address mapping of IP destinations connected to an NBMA network.
ipnhrpmapgroup
Adds NHRP groups to QoS policy mappings on a hub.
showdmvpn
Displays DMVPN-specific session information.
showipnhrp
Displays NHRP mapping information.
showpolicy-mapmgre
Displays statistics about a specific QoS policy as it is applied to a tunnel endpoint.
show ip nhrp multicast
To display Next Hop Resolution Protocol (NHRP) multicast mapping information, use the
show ip nhrp multicast command in user EXEC or privileged EXEC mode.
showipnhrpmulticast
[ nbma-address | interface ]
Syntax Description
nbma-address
(Optional) Displays multicast mapping information for the specified NBMA address.
interface
(Optional) Displays all multicast mapping entries of the NHRP network for the interface. See the table below for types, number ranges, and descriptions.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
12.4(7)
This command was introduced.
Usage Guidelines
The table below lists the valid types, number ranges, and descriptions for the optional
interface argument.
Note
The valid types can vary according to the platform and interfaces on the platform.
Table 10 Interface Types, Valid Numbers, and Interface Descriptions
Interface Types
Valid Numbers
Interface Descriptions
async
1
Async
atm
0 to 6
ATM
bvi
1 to 255
Bridge-Group Virtual Interface
cdma-ix
1
CDMA Ix
ctunnel
0 to 2147483647
C-Tunnel
dialer
0 to 20049
Dialer
ethernet
0 to 4294967295
Ethernet
fastethernet
0 to 6
FastEthernet IEEE 802.3
lex
0 to 2147483647
Lex
loopback
0 to 2147483647
Loopback
mfr
0 to 2147483647
Multilink Frame Relay bundle
multilink
0 to 2147483647
Multilink-group
null
0
Null
port-channel
1 to 64
Port channel
tunnel
0 to 2147483647
Tunnel
vif
1
PGM multicast host
virtual-ppp
0 to 2147483647
Virtual PPP
virtual-template
1 to 1000
Virtual template
virtual-tokenring
0 to 2147483647
Virtual Token Ring
xtagatm
0 to 2147483647
Extended tag ATM
Examples
The following is sample output from the
show ip nhrp multicast command:
Router# show ip nhrp multicast
I/F NBMA address
Tunnel1 1.1.1.1 Flags: static
The table below describes the fields shown in the display.
Table 11 show ip nhrp Field Descriptions
Field
Description
I/F
Interface associated with the multicast mapping entry.
NBMA address
Nonbroadcast Multiaccess Address to which multicast packets will be sent. The address format is appropriate for the type of network used: ATM, Ethernet, SMDS, or multipoint tunnel.
Flags
static—Indicates that the multicast mapping entry is configured statically by the
ip nhrp map multicast command.
dynamic—Indicates that the multicast mapping entry is obtained dynamically. A multicast mapping entry is created for each registered Next Hop Client (NHC) when the
ip nhrp map multicast dynamic command is configured.
Related Commands
Command
Description
ip nhrp map
Statically configures the IP-to-NBMA address mapping of IP destinations connected to an NBMA network.
show ip nhrp
Displays NHRP mapping information.
show ip nhrp nhs
Displays NHRP next-hop server information.
show ip nhrp summary
Displays NHRP mapping summary information.
show ip nhrp traffic
Displays NHRP traffic statistics.
show ip nhrp nhs
To display Next Hop Resolution Protocol (NHRP) next hop server (NHS) information, use the
showipnhrpnhscommand in user EXEC or privileged EXEC mode.
showipnhrpnhs [interface] [detail]
Syntax Description
interface
(Optional) Displays NHS information currently configured on the interface. See the table below for types, number ranges, and descriptions.
detail
(Optional) Displays detailed NHS information.
Command Modes
User EXEC Privileged EXEC
Command History
Release
Modification
10.3
This command was introduced.
12.2(33)SRB
This command was integrated into Cisco IOS release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The table below lists the valid types, number ranges, and descriptions for the optional
interfaceargument.
Note
The valid types can vary according to the platform and interfaces on the platform.
Table 12 Valid Types, Number Ranges, and Interface Descriptions
Valid Types
Number Ranges
Interface Descriptions
async
1
Async
atm
0 to 6
ATM
bvi
1 to 255
Bridge-Group Virtual Interface
cdma-ix
1
CDMA Ix
ctunnel
0 to 2147483647
C-Tunnel
dialer
0 to 20049
Dialer
ethernet
0 to 4294967295
Ethernet
fastethernet
0 to 6
FastEthernet IEEE 802.3
lex
0 to 2147483647
Lex
loopback
0 to 2147483647
Loopback
mfr
0 to 2147483647
Multilink Frame Relay bundle
multilink
0 to 2147483647
Multilink-group
null
0
Null
port-channel
1 to 64
Port channel
tunnel
0 to 2147483647
Tunnel
vif
1
PGM multicast host
virtual-ppp
0 to 2147483647
Virtual PPP
virtual-template
1 to 1000
Virtual template
virtual-tokenring
0 to 2147483647
Virtual Token Ring
xtagatm
0 to 2147483647
Extended tag ATM
Examples
The following is sample output from the
showipnhrpnhsdetail command:
Router# show ip nhrp nhs detail
Legend:
E=Expecting replies
R=Responding
Tunnel1:
5.1.1.1 E req-sent 128 req-failed 1 repl-recv 0
Pending Registration Requests:
Registration Request: Reqid 1, Ret 64 NHS 5.1.1.1
The table below describes the significant field shown in the display.
Table 13 show ip nhrp nhs Field Descriptions
Field
Description
Tunnel1
Interface through which the target network is reached.
Related Commands
Command
Description
ipnhrpmap
Statically configures the IP-to-NBMA address mapping of IP destinations connected to an NBMA network.
showipnhrp
Displays NHRP mapping information.
showipnhrpmulticast
Displays NHRP multicast mapping information.
showipnhrpsummary
Displays NHRP mapping summary information.
showipnhrptraffic
Displays NHRP traffic statistics.
show ip nhrp summary
To display Next Hop Resolution Protocol (NHRP) mapping summary information, use the
showipnhrpsummarycommand in user EXEC or privileged EXEC mode.
showipnhrpsummary
Command Modes
User EXEC Privileged EXEC
Command History
Release
Modification
10.3
This command was introduced.
12.2(33)SRB
This command was integrated into Cisco IOS release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following is sample output from the
showipnhrpsummary command:
Router# show ip nhrp summary
IP NHRP cache 1 entry, 256 bytes
1 static 0 dynamic 0 incomplete
The table below describes the significant field shown in the display.
Table 14 show ip nhrp summary Field Descriptions
Field Output
Description
dynamic
NHRP mapping is obtained dynamically. The mapping entry is created using information from the NHRP resolution and registrations
static
NHRP mapping is configured statically. Entries configured by the
ipnhrpmap command are marked static.
incomplete
NBMA address is not known for the target network.
Related Commands
Command
Description
ipnhrpmap
Statically configures the IP-to-NBMA address mapping of IP destinations connected to an NBMA network.
showipnhrp
Displays NHRP mapping information.
showipnhrpmulticast
Displays NHRP multicast mapping information.
showipnhrpnhs
Displays NHRP Next Hop Server information.
showipnhrptraffic
Displays NHRP traffic statistics.
show ip nhrp traffic
To display Next Hop Resolution Protocol (NHRP) traffic statistics, use the
show ip nhrp traffic command in privileged EXEC mode.
(Optional) Displays NHRP traffic information for a given interface.
tunnelnumber
Specifies the tunnel interface number.
Virtual-Accessnumber
Specifies the virtual access interface number.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
10.3
This command was introduced.
12.4(6)T
This command was modified. The show output was enhanced to display information about traffic indication (redirects).
12.4(9)T
This command was modified. The
interface and
tunnel keywords and the
number argument were added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.5
This command was integrated into Cisco IOS XE Release 2.5.
15.3(2)T
This command was modified. The Virtual-Accessnumber keyword-argument pair was added.
Usage Guidelines
Replacing
ip in the command name with ipv6 clears IPv6-specific traffic.
Examples
The following example shows sample output for NHRP traffic statistics for tunnel interface 0:
The table below describes the significant fields shown in the display.
Table 15 show ip nhrp traffic Field Descriptions
Field
Description
Tunnel0
Interface type and number.
Max-send limit
Maximum number of NHRP messages that can be sent by this station in the given interval.
Resolution Request
Number of NHRP resolution request packets originated from or received by this station.
Resolution Reply
Number of NHRP resolution reply packets originated from or received by this station.
Registration Request
Number of NHRP registration request packets originated from or received by this station.
Registration Reply
Number of NHRP registration reply packets originated from or received by this station.
Purge Request
Number of NHRP purge request packets originated from or received by this station.
Purge Reply
Number of NHRP purge reply packets originated from or received by this station.
Error Indication
Number of NHRP error packets originated from or received by this station.
Traffic Indication
Number of NHRP traffic indication packets (redirects) originated from or received by this station.
Related Commands
Command
Description
debug nhrp condition
Enables NHRP conditional debugging.
debug nhrp error
Enables NHRP error level debugging.
show ip route dhcp
To display the routes added to the routing table by the Dynamic Host Configuration Protocol (DHCP) server and relay agent, use the showiproutedhcp command in privileged EXEC configuration mode.
showiproute
[ vrfvrf-name ]
dhcp [ip-address]
Syntax Description
vrf
(Optional) Specifies VPN routing and forwarding (VRF) instance.
vrf-name
(Optional) Name of the VRF.
ip-address
(Optional) Address about which routing information should be displayed.
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release
Modification
12.2
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To display information about global routes, use the showiproutedhcp command. To display routes in the VRF routing table, use the showiproutevrfvrf-namedhcp command.
Examples
The following is sample output from the showiproutedhcpcommand when entered without an address. This command lists all routes added by the DHCP server and relay agent.
Router# show ip route dhcp
10.5.5.56/32 is directly connected, ATM0.2
10.5.5.217/32 is directly connected, ATM0.2
The following is sample output from the showiproutedhcp command when an address is specified. The output shows the details of the address with the server address (who assigned it) and the lease expiration time.
Router# show ip route dhcp 10.5.5.217
10.5.5.217 is directly connected, ATM0.2
DHCP Server: 10.9.9.10 Lease expires at Nov 08 2001 01:19 PM
The following is sample output from the showiproutevrfvrf-namedhcpcommand when entered without an address:
Router# show ip route vrf abc dhcp
10.5.5.218/32 is directly connected, ATM0.2
The following is sample output from the showiproutevrfvrf-namedhcpcommand when an address is specified. The output shows the details of the address with the server address (who assigned it) and the lease expiration time.
Router# show ip route vrf red dhcp 10.5.5.218
10.5.5.218/32 is directly connected, ATM0.2
DHCP Server: 10.9.9.10 Lease expires at Nov 08 2001 03:15PM
Related Commands
Command
Description
cleariproutedhcp
Removes routes from the routing table added by the DHCP server and relay agent for the DHCP clients on unnumbered interfaces.
show ip snat
To display active Stateful Network Address Translation (SNAT) translations, use the showipsnat command in EXEC mode.
(Optional) Specifies the interface type; possible valid values are fastethernet, gigabitethernet, tengigabitethernet, port-channelnum, and vlanvlan-id.
mod/port
Module and port number.
efp_id
(Optional) Specifies the Ethernet flow point (EFP) (service instance) ID.
efp_id
EFP number; range is 1 to 8000.
Command Default
This command has no default settings.
Command Modes
EXEC (#)
Command History
Release
Modification
12.2(33)SXH
This command was introduced.
12.2(33)SRD
The efp_idefp_idkeyword and argument were added.
Usage Guidelines
Enable port security first because the DHCP security MAC filter cannot apply to the port or VLAN.
Examples
This example shows the display when DHCP snooping is enabled on VLANs 10 to 20, the interface has IP source filter mode that is configured as IP, and there is an existing IP address binding 10.0.0.1 on VLAN 10:
Router# show ip verify source interface gigabitethernet6/1
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
gi6/1 ip active 10.0.0.1 10
gi6/1 ip active deny-all 11-20
This example shows how to display the IP source guard configuration and filters on a specific interface:
Router# show ip verify source interface gigabitethernet6/1
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
gi6/1 ip inactive-trust-port
This example shows the display when the interface does not have a VLAN enabled for DHCP snooping:
Router# show ip verify source interface gigabitethernet6/3
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
gi6/3 ip inactive-no-snooping-vlan
This example shows the display when the interface has an IP source filter mode that is configured as IP MAC and an existing IP MAC binds 10.0.0.2/aaaa.bbbb.cccc on VLAN 10 and 10.0.0.1/aaaa.bbbb.cccd on VLAN 11:
Router# show ip verify source interface gigabitethernet6/4
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
gi6/4 ip-mac active 10.0.0.2 aaaa.bbbb.cccc 10
gi6/4 ip-mac active 10.0.0.1 aaaa.bbbb.cccd 11
gi6/4 ip-mac active deny-all deny-all 12-20
This example shows the display when the interface has an IP source filter mode that is configured as IP MAC and an existing IP MAC binding 10.0.0.3/aaaa.bbbb.ccce on VLAN 10, but port security is not enabled on the interface:
Router# show ip verify source interface gigabitethernet6/5
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
gi6/5 ip-mac active 10.0.0.3 permit-all 10
gi6/5 ip-mac active deny-all permit-all 11-20
This example shows the display when the interface does not have IP source filter mode configured:
Router# show ip verify source interface gigabitethernet6/6
DHCP security is not configured on the interface gi6/6.
This example shows how to display all the interfaces on the switch that have DHCP snooping security enabled:
Router# show ip verify source
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
gi6/1 ip active 10.0.0.1 10
gi6/1 ip active deny-all 11-20
gi6/2 ip inactive-trust-port
gi6/3 ip inactive-no-snooping-vlan
gi6/4 ip-mac active 10.0.0.2 aaaa.bbbb.cccc 10
gi6/4 ip-mac active 11.0.0.1 aaaa.bbbb.cccd 11
gi6/4 ip-mac active deny-all deny-all 12-20
gi6/5 ip-mac active 10.0.0.3 permit-all 10
gi6/5 ip-mac active deny-all permit-all 11-20
Router#
This example shows how to display all the interfaces on the switch that have DHCP snooping security enabled:
Router# show ip verify source interface gi5/0/0 efp_id 10
Interface Filter-type Filter-mode IP-address Mac-address Vlan EFP ID
--------- ----------- ----------- --------------- ----------------- ---------- ----------
Gi5/0/0 ip-mac active 123.1.1.1 00:0A:00:0A:00:0A 100 10
Gi5/0/0 ip-mac active 123.1.1.2 00:0A:00:0A:00:0B 100 20
Gi5/0/0 ip-mac active 123.1.1.3 00:0A:00:0A:00:0C 100 30
Related Commands
Command
Description
ipsourcebinding
Adds or deletes a static IP source binding entry.
ipverifysourcevlandhcp-snooping
Enables or disables the per l2-port IP source guard.
showipsourcebinding
Displays the IP-source bindings configured on the system.
show ipv6 dhcp
To display the Dynamic Host Configuration Protocol (DHCP) unique identifier (DUID) on a specified device, use the showipv6dhcp command in user EXEC or privileged EXEC mode.
showipv6dhcp
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
12.2(33)SRE
This command was modified. It was integrated into Cisco IOS Release 12.2(33)SRE.
Usage Guidelines
The showipv6dhcp command uses the DUID based on the link-layer address for both client and server identifiers. The device uses the MAC address from the lowest-numbered interface to form the DUID. The network interface is assumed to be permanently attached to the device. Use theshowipv6dhcp command to display the DUID of a device.
Examples
The following is sample output from the showipv6dhcpcommand. The output is self-explanatory:
Router# show ipv6 dhcp
This device's DHCPv6 unique identifier(DUID): 000300010002FCA5DC1C
show ipv6 dhcp binding
To display automatic client bindings from the Dynamic Host Configuration Protocol (DHCP) for IPv6 server binding table, use the
showipv6dhcpbinding command in user EXEC or privileged EXEC mode.
(Optional) Specifies a virtual routing and forwarding (VRF) configuration.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
12.3(4)T
This command was introduced.
12.4
This command was modified. Command output was updated to display a PPP username associated with a binding.
12.4(24)T
This command was modified. Command output was updated to display address bindings.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
15.1(2)S
This command was modified. The
vrfvrf-name keyword and argument were added.
Cisco IOS XE Release 3.3S
This command was modified. The
vrfvrf-name keyword and argument were added.
Usage Guidelines
The
showipv6dhcpbinding command displays all automatic client bindings from the DHCP for IPv6 server binding table if the
ipv6-address argument is not specified. When the
ipv6-address argument is specified, only the binding for the specified client is displayed.
If the
vrfvrf-namekeyword and argument combination is specified, all bindings that belong to the specified VRF are displayed.
Examples
The following sample output displays all automatic client bindings from the DHCP for IPv6 server binding table:
Router# show ipv6 dhcp binding
Client: FE80::A8BB:CCFF:FE00:300
DUID: 00030001AABBCC000300
Username : client_1
Interface: Virtual-Access2.1
IA PD: IA ID 0x000C0001, T1 75, T2 135
Prefix: 2001:380:E00::/64
preferred lifetime 150, valid lifetime 300
expires at Dec 06 2007 12:57 PM (262 seconds)
Client: FE80::A8BB:CCFF:FE00:300 (Virtual-Access2.2)
DUID: 00030001AABBCC000300
IA PD: IA ID 0x000D0001, T1 75, T2 135
Prefix: 2001:0DB8:E00:1::/64
preferred lifetime 150, valid lifetime 300
expires at Dec 06 2007 12:58 PM (288 seconds)
The table below describes the significant fields shown in the display.
Table 17 show ipv6 dhcp binding Field Descriptions
Field
Description
Client
Address of a specified client.
DUID
DHCP unique identifier (DUID).
Virtual-Access2.1
First virtual client. When an IPv6 DHCP client requests two prefixes with the same DUID but a different identity association for prefix delegation (IAPD ) on two different interfaces, these prefixes are considered to be for two different clients, and interface information is maintained for both.
Username : client_1
The username associated with the binding.
IA PD
Collection of prefixes assigned to a client.
IA ID
Identifier for this IAPD.
Prefix
Prefixes delegated to the indicated IAPD on the specified client.
preferred lifetime, valid lifetime
The preferred lifetime and valid lifetime settings, in seconds, for the specified client.
Expires at
Date and time at which the valid lifetime expires.
Virtual-Access2.2
Second virtual client. When an IPv6 DHCP client requests two prefixes with the same DUID but different IAIDs on two different interfaces, these prefixes are considered to be for two different clients, and interface information is maintained for both.
When the DHCPv6 pool on the Cisco IOS DHCPv6 server is configured to obtain prefixes for delegation from an authentication, authorization, and accounting (AAA) server, it sends the PPP username from the incoming PPP session to the AAA server for obtaining the prefixes. The PPP username is associated with the binding is displayed in output from the
showipv6dhcpbinding command. If there is no PPP username associated with the binding, this field value is displayed as "unassigned."
The following example shows that the PPP username associated with the binding is "client_1":
Router# show ipv6 dhcp binding
Client: FE80::2AA:FF:FEBB:CC
DUID: 0003000100AA00BB00CC
Username : client_1
Interface : Virtual-Access2
IA PD: IA ID 0x00130001, T1 75, T2 135
Prefix: 2001:0DB8:1:3::/80
preferred lifetime 150, valid lifetime 300
expires at Aug 07 2008 05:19 AM (225 seconds)
The following example shows that the PPP username associated with the binding is unassigned:
Router# show ipv6 dhcp binding
Client: FE80::2AA:FF:FEBB:CC
DUID: 0003000100AA00BB00CC
Username : unassigned
Interface : Virtual-Access2
IA PD: IA ID 0x00130001, T1 150, T2 240
Prefix: 2001:0DB8:1:1::/80
preferred lifetime 300, valid lifetime 300
expires at Aug 11 2008 06:23 AM (233 seconds)
Related Commands
Command
Description
clearipv6dhcpbinding
Deletes automatic client bindings from the DHCP for IPv6 binding table.
show ipv6 dhcp conflict
To display address conflicts found by a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server when addresses are offered to the client, use the showipv6dhcpconflict command in privileged EXEC mode.
(Optional) Specifies a virtual routing and forwarding (VRF) configuration.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.4(24)T
This command was introduced.
Cisco IOS XE Release 2.5
This command was integrated into Cisco IOS XE Release 2.5.
15.1(2)S
This command was modified. The vrfvrf-name keyword and argument were added.
Cisco IOS XE Release 3.3S
This command was modified. The vrfvrf-name keyword and argument were added.
Cisco IOS XE Release 3.2SE
This command was integrated into Cisco IOS XE Release 3.2SE.
Usage Guidelines
When you configure the DHCPv6 server to detect conflicts, it uses ping. The client uses neighbor discovery to detect clients and reports to the server through a DECLINE message. If an address conflict is detected, the address is removed from the pool, and the address is not assigned until the administrator removes the address from the conflict list.
Examples
The following is a sample output from the showipv6dhcpconflict command. This command shows the pool and prefix values for DHCP conflicts.:
Router# show ipv6 dhcp conflict
Pool 350, prefix 2001:0DB8:1005::/48
2001:0DB8:1005::10
Related Commands
Command
Description
clear ipv6 dhcp conflict
Clears an address conflict from the DHCPv6 server database.
show ipv6 dhcp database
To display the Dynamic Host Configuration Protocol (DHCP) for IPv6 binding database agent information, use the
showipv6dhcpdatabase command in user EXEC or privileged EXEC mode.
showipv6dhcpdatabase [agent-URL]
Syntax Description
agent-URL
(Optional) A flash, NVRAM, FTP, TFTP, or remote copy protocol (RCP) uniform resource locator.
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
Each permanent storage to which the binding database is saved is called the database agent. An agent can be configured using the
ipv6dhcpdatabase command. Supported database agents include FTP and TFTP servers, RCP, Flash file system, and NVRAM.
The
showipv6dhcpdatabasecommand displays DHCP for IPv6 binding database agent information. If the
agent-URL argument is specified, only the specified agent is displayed. If the
agent-URL argument is not specified, all database agents are shown.
Examples
The following is sample output from the
showipv6dhcpdatabasecommand:
Router# show ipv6 dhcp database
Database agent tftp://172.19.216.133/db.tftp:
write delay: 69 seconds, transfer timeout: 300 seconds
last written at Jan 09 2003 01:54 PM,
write timer expires in 56 seconds
last read at Jan 06 2003 05:41 PM
successful read times 1
failed read times 0
successful write times 3172
failed write times 2
Database agent nvram:/dhcpv6-binding:
write delay: 60 seconds, transfer timeout: 300 seconds
last written at Jan 09 2003 01:54 PM,
write timer expires in 37 seconds
last read at never
successful read times 0
failed read times 0
successful write times 3325
failed write times 0
Database agent flash:/dhcpv6-db:
write delay: 82 seconds, transfer timeout: 3 seconds
last written at Jan 09 2003 01:54 PM,
write timer expires in 50 seconds
last read at never
successful read times 0
failed read times 0
successful write times 2220
failed write times 614
The table below describes the significant fields shown in the display.
Table 18 show ipv6 dhcp database Field Descriptions
Field
Description
Database agent
Specifies the database agent.
Write delay
The amount of time (in seconds) to wait before updating the database.
transfer timeout
Specifies how long (in seconds) the DHCP server should wait before aborting a database transfer. Transfers that exceed the timeout period are aborted.
Last written
The last date and time bindings were written to the file server.
Write timer expires...
The length of time, in seconds, before the write timer expires.
Last read
The last date and time bindings were read from the file server.
Successful/failed read times
The number of successful or failed read times.
Successful/failed write times
The number of successful or failed write times.
Related Commands
Command
Description
ipv6dhcpdatabase
Specifies DHCP for IPv6 binding database agent parameters.
show ipv6 dhcp guard policy
To display Dynamic Host Configuration Protocol for IPv6 (DHCPv6) guard information, use the
showipv6dhcpguardpolicy command in privileged EXEC mode.
showipv6dhcpguardpolicy [policy-name]
Syntax Description
policy-name
(Optional) DHCPv6 guard policy name.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.2(4)S
This command was introduced.
Usage Guidelines
If the
policy-name argument is specified, only the specified policy information is displayed. If the
policy-name argument is not specified, information is displayed for all policies.
Examples
The following is sample output from the
showipv6dhcpguardguard command:
The table below describes the significant fields shown in the display.
Table 19 show ipv6 dhcp guard Field Descriptions
Field
Description
Device Role
The role of the device. The role is either client, server or relay.
Target
The name of the target. The target is either an interface or a VLAN.
Related Commands
Command
Description
ipv6dhcpguardpolicy
Defines the DHCPv6 guard policy name.
show ipv6 dhcp-ldra
To display configuration details and statistics for a Lightweight DHCPv6 Relay Agent (LDRA), use the show ipv6 dhcp-ldra command in user EXEC or privileged EXEC mode.
show ipv6 dhcp-ldra[statistics]
Syntax Description
statistics
(Optional) Displays LDRA-related statistics.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
15.1(2)SG
This command was introduced.
Cisco IOS XE Release 3.4SG
This command was integrated into Cisco IOS XE Release 3.4SG.
Usage Guidelines
Use this command to view the number and type of DHCPv6 packets received or processed, the number and type of DHCPv6 messages dropped, error counters, and the interface state (client-facing trusted interface, server-facing interface, and so on).
You can also view LDRA configuration details, such as the type of LDRA configuration and the interface or VLAN where the LDRA is configured.
Examples
The following sample output displays LDRA configuration details before initiating a DHCP session. The fields in the example below are self-explanatory.
Device> enable
Device # show ipv6 dhcp-ldra statisticsDHCPv6 LDRA client facing statistics.
Messages received 0
Messages sent 0
Messages discarded 0
DHCPv6 LDRA server facing statistics.
Messages received 0
Messages sent 0
Messages discarded 0
The following sample output displays LDRA configuration details after initiating a DHCP session. The fields in the example below are self-explanatory.
Device> enable
Device # show ipv6 dhcp-ldra statisticsDHCPv6 LDRA client facing statistics.
Messages received 2
Messages sent 2
Messages discarded 0
Messages Received
SOLICIT 1
REQUEST 1
Messages Sent
RELAY-FORWARD 2
DHCPv6 LDRA server facing statistics.
Messages received 2
Messages sent 2
Messages discarded 0
Messages Received
RELAY-REPLY 2
Messages Sent
ADVERTISE 1
REPLY 1
The following sample output displays LDRA configuration details. The fields in the example below are self-explanatory.
To display Dynamic Host Configuration Protocol (DHCP) for IPv6 configuration pool information, use the
showipv6dhcppool command in user EXEC or privileged EXEC mode.
showipv6dhcppool [poolname]
Syntax Description
poolname
(Optional) User-defined name for the local prefix pool. The pool name can be a symbolic string (such as "Engineering") or an integer (such as 0).
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
12.4(24)T
Command output was updated to display address pools and prefix pools.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
12.2(33)SRE
This command was modified. It was integrated into Cisco IOS Release 12.2(33)SRE.
12.2(33)XNE
This command was modified. It was integrated into Cisco IOS Release 12.2(33)XNE.
Usage Guidelines
Use the
ipv6dhcppool command to create a configuration pool, and use the
ipv6dhcpserver command to associate the configuration pool with a server on an interface.
The
showipv6dhcppool command displays DHCP for IPv6 configuration pool information. If the
poolname argument is specified, only information on the specified pool is displayed. If the
poolname argument is not specified, information about all pools is shown.
Examples
The following sample output displays DHCP for IPv6 configuration pool information:
Router# show ipv6 dhcp pool
DHCPv6 pool: svr-p1
Static bindings:
Binding for client 000300010002FCA5C01C
IA PD: IA ID 00040002,
Prefix: 3FFE:C00:C18:3::/72
preferred lifetime 604800, valid lifetime 2592000
IA PD: IA ID not specified; being used by 00040001
Prefix: 3FFE:C00:C18:1::/72
preferred lifetime 240, valid lifetime 54321
Prefix: 3FFE:C00:C18:2::/72
preferred lifetime 300, valid lifetime 54333
Prefix: 3FFE:C00:C18:3::/72
preferred lifetime 280, valid lifetime 51111
Prefix from pool: local-p1, Valid lifetime 12345, Preferred lifetime 180
DNS server: 1001::1
DNS server: 1001::2
Domain name: example1.net
Domain name: example2.net
Domain name: example3.net
Active clients: 2
The table below describes the significant fields shown in the display.
Table 20 show ipv6 dhcp pool Field Descriptions
Field
Description
DHCPv6 pool: svr-p1
The name of the pool.
IA PD
Identity association for prefix delegation (IAPD), which is a collection of prefixes assigned to a client.
IA ID
Identifier for this IAPD.
Prefix
Prefixes to be delegated to the indicated IAPD on the specified client.
preferred lifetime, valid lifetime
Lifetimes, in seconds, associated with the prefix statically assigned to the specified client.
DNS server
IPv6 addresses of the DNS servers.
Domain name
Displays the DNS domain search list.
Active clients
Total number of active clients.
Related Commands
Command
Description
ipv6dhcppool
Configures a DHCP for IPv6 configuration information pool and enters DHCP for IPv6 pool configuration mode.
ipv6dhcpserver
Enables DHCP for IPv6 service on an interface.
show ipv6 dhcp interface
To display Dynamic Host Configuration Protocol (DHCP) for IPv6 interface information, use the
showipv6dhcpinterface command in user EXEC or privileged EXEC mode.
showipv6dhcpinterface
[ typenumber ]
Syntax Description
typenumber
(Optional) Interface type and number. For more information, use the question mark (?) online help function.
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
12.3(11)T
Command output was modified to allow relay agent information to be displayed on a specified interface if the relay agent feature is configured on that interface.
12.4(24)T
Command output was updated to display interface address assignments and T1 and T2 renew/rebind times.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
12.2(33)SRE
This command was modified. It was integrated into Cisco IOS Release 12.2(33)SRE.
12.2(33)XNE
This command was modified. It was integrated into Cisco IOS Release 12.2(33)XNE.
Usage Guidelines
If no interfaces are specified, all interfaces on which DHCP for IPv6 (client or server) is enabled are shown. If an interface is specified, only information about the specified interface is displayed.
Examples
The following is sample output from the
showipv6dhcpinterfacecommand. In the first example, the command is used on a router that has an interface acting as a DHCP for IPv6 server. In the second example, the command is used on a router that has an interface acting as a DHCP for IPv6 client:
Router1# show ipv6 dhcp interface
Ethernet2/1 is in server mode
Using pool: svr-p1
Preference value: 20
Rapid-Commit is disabled
Router2# show ipv6 dhcp interface
Ethernet2/1 is in client mode
State is OPEN (1)
List of known servers:
Address: FE80::202:FCFF:FEA1:7439, DUID 000300010002FCA17400
Preference: 20
IA PD: IA ID 0x00040001, T1 120, T2 192
Prefix: 3FFE:C00:C18:1::/72
preferred lifetime 240, valid lifetime 54321
expires at Nov 08 2002 09:10 AM (54319 seconds)
Prefix: 3FFE:C00:C18:2::/72
preferred lifetime 300, valid lifetime 54333
expires at Nov 08 2002 09:11 AM (54331 seconds)
Prefix: 3FFE:C00:C18:3::/72
preferred lifetime 280, valid lifetime 51111
expires at Nov 08 2002 08:17 AM (51109 seconds)
DNS server: 1001::1
DNS server: 1001::2
Domain name: domain1.net
Domain name: domain2.net
Domain name: domain3.net
Prefix name is cli-p1
Rapid-Commit is enabled
The table below describes the significant fields shown in the display.
Table 21 show ipv6 dhcp interface Field Descriptions
Field
Description
Ethernet2/1 is in server/client mode
Displays whether the specified interface is in server or client mode.
Preference value:
The advertised (or default of 0) preference value for the indicated server.
Prefix name is cli-p1
Displays the IPv6 general prefix pool name, in which prefixes successfully acquired on this interface are stored.
Using pool: svr-p1
The name of the pool that is being used by the interface.
State is OPEN
State of the DHCP for IPv6 client on this interface. "Open" indicates that configuration information has been received.
List of known servers
Lists the servers on the interface.
Address, DUID
Address and DHCP unique identifier (DUID) of a server heard on the specified interface.
Rapid commit is disabled
Displays whether the
rapid-commit keyword has been enabled on the interface.
The following example shows the DHCP for IPv6 relay agent configuration on FastEthernet interface 0/0, and use of the
showipv6dhcpinterface command displays relay agent information on FastEthernet interface 0/0:
Router(config-if)# ipv6 dhcp relay destination FE80::250:A2FF:FEBF:A056 FastEthernet0/1
Router# show ipv6 dhcp interface FastEthernet 0/0
FastEthernet0/0 is in relay mode
Relay destinations:
FE80::250:A2FF:FEBF:A056 via FastEthernet0/1
Related Commands
Command
Description
ipv6dhcpclientpd
Enables the DHCP for IPv6 client process and enables requests for prefix delegation through a specified interface.
ipv6dhcprelaydestination
Specifies a destination address to which client messages are forwarded and enables DHCP for IPv6 relay service on the interface.
ipv6dhcpserver
Enables DHCP for IPv6 service on an interface.
show ipv6 dhcp relay binding
To display DHCPv6 Internet Assigned Numbers Authority (IANA) and DHCPv6 Identity Association for Prefix Delegation (IAPD) bindings on a relay agent, use the
showipv6dhcprelaybinding command in user EXEC or privileged EXEC mode.
showipv6dhcprelaybinding
[ vrfvrf-name ]
Syntax Description
vrfvrf-name
(Optional) Specifies a virtual routing and forwarding (VRF) configuration.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
15.1(2)S
This command was introduced.
Cisco IOS XE Release 3.3S
This command was integrated into Cisco IOS XE Release 3.3S.
15.2(1)S
This command was modified. In addition to DHCPv6 IAPD bindings, DHCPv6 IANA bindings on a relay agent can be displayed.
Cisco IOS XE Release 3.5S
This command was modified. In addition to DHCPv6 IAPD bindings, DHCPv6 IANA bindings on a relay agent can be displayed.
12.2(33)SCF4
This command was implemented on Cisco uBR10012 and Cisco uBR7200 series universal broadband devices.
15.3(3)M
This command was integrated into Cisco IOS Release 15.3(3)M.
Usage Guidelines
If the
vrfvrf-name keyword-argument pair is specified, all bindings belonging to the specified VRF are displayed.
Note
Only the DHCPv6 IAPD bindings on a relay agent are displayed on the Cisco uBR10012 and Cisco uBR7200 series universal broadband devices.
Examples
The following is sample output from the
showipv6dhcprelaybinding command:
Device# show ipv6 dhcp relay binding
The following example shows output from the
show ipv6 dhcp relay binding command with a specified VRF name on a Cisco uBR10012 universal broadband device:
The table below describes the significant fields shown in the display.
Table 22 show ipv6 dhcp relay binding Field Descriptions
Field
Description
Prefix
IPv6 prefix for DHCP.
DUID
DHCP Unique Identifier (DUID) for the IPv6 relay binding.
IAID
Identity Association Identification (IAID) for DHCP.
lifetime
Lifetime of the prefix, in seconds.
Related Commands
Command
Description
clear
ipv6
dhcp
relaybinding
Clears a specific IPv6 address or IPv6 prefix of a DHCP for IPv6 relay binding.
show ipv6 dhcp route
To display routes added by Dynamic Host Configuration Protocol for IPv6 (DHCPv6) on the DHCPv6 server for Internet Assigned Numbers Authority (IANA) and Identity Association for Prefix Delegation (IAPD), use the
show
ipv6
dhcp
route command in privileged EXEC mode.
Specifies a virtual routing and forwarding (VRF) configuration.
*
Displays all the DHCPv6 relay bindings.
ipv6-address
DHCPv6 address.
ipv6-prefix
IPv6 prefix.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.2(1)S
This command was introduced.
Cisco IOS XE Release 3.5S
This command was integrated into Cisco IOS XE Release 3.5S.
Examples
The following is sample output from the
show
ipv6
dhcp
route command:
Router# show ipv6 dhcp route vrf vrfname 2001:0DB8:3333:4::5/126
Related Commands
Command
Description
ipv6
dhcp
iana-route-add
Adds routes for individually assigned IPv6 addresses on a relay or server.
ipv6
dhcp
iapd-route-add
Enables route addition by the DHCPv6 relay and server for the delegated prefix.
show ipv6 nat statistics
To display Network Address Translation--Protocol Translation (NAT-PT) statistics, use the
showiv6natstatisticscommand in user EXEC or privileged EXEC mode.
showipv6natstatistics
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
12.2(13)T
This command was introduced.
Examples
The following is sample output from the
showipv6natstatisticscommand:
Router# show ipv6 nat statistics
Total active translations: 4 (2 static, 2 dynamic; 2 extended)
NAT-PT interfaces:
Ethernet3/1, Ethernet3/3
Hits: 1 Misses: 1
Expired translations: 0
The table below describes the significant fields shown in the display.
Table 23 show ipv6 nat statistics Field Descriptions
Field
Description
Total active translations
Number of translations active in the system. This number increments by one each time a translation is created and is decremented each time a translation is cleared or times out. Displays the numbers for each type of translation.
NAT-PT interfaces
The interfaces, by type and number, that are configured to run NAT-PT translations.
Hits
Number of times the software does a translations table lookup and finds an entry.
Misses
Number of times the software does a translations table lookup, fails to find an entry, and must try to create one.
Expired translations
Cumulative count of translations that have expired since the router was booted.
Related Commands
Command
Description
showipv6nattranslations
Displays active NAT-PT translations.
show ipv6 nat translations
To display active Network Address Translation--Protocol Translation (NAT-PT) translations, use the
showipnattranslations command in user EXEC or privileged EXEC mode.
(Optional) Displays detailed information about NAT-PT ICMP translation events.
tcp
(Optional) Displays detailed information about NAT-PT TCP translation events.
udp
(Optional) Displays detailed information about NAT-PT User Datagram Protocol (UDP) translation events.
verbose
(Optional) Displays additional information for each translation table entry, including how long ago the entry was created and used.
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
12.2(13)T
This command was introduced.
Examples
The following is sample output from the
showipnattranslationscommand. Two static translations have been configured between an IPv4 source address and an IPv6 destination, and vice versa.
This example shows how to display information about the logging IP access-list configuration:
Router# show logging ip access-list config
Logging ip access-list configuration
Maximum number of cached entries: 8192
Logging rate limiter: 0
Log-update interval: 300
Log-update threshold: 0
Configured on input direction:
Vlan2
Vlan1
Configured on output direction:
Vlan2
Related Commands
Command
Description
clearloggingipaccess-listcache
Clears all the entries from the OAL cache and sends them to the syslog.
loggingipaccess-listcache(globalconfiguration)
Configures the OAL parameters.
loggingipaccess-listcache(interfaceconfiguration)
Enables an OAL-logging cache on an interface that is based on direction.
show mdns cache
To display multicast Domain Name System (mDNS) cache information, use the showmdns cache command in privileged EXEC mode.
(Optional) Displays mDNS cache information for the specified interface.
namerecord-name
(Optional) Displays mDNS cache information for the specified record.
typerecord-type
(Optional) Displays mDNS cache information for the specific record type.
Note
You can view mDNS cache information for a specific record type and record name by using the keyword-argument pair combination namerecord-nametyperecord-type.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.2(1)E
This command was introduced.
Examples
The following sample output displays mDNS cache information :
Device> enable
Device# show mdns cache
mDNS CACHE
=================================
[<NAME>] [<TYPE>][<CLASS>] [<TTL>/Remaining] [Accessed] [If-index] [<RR Record Data>]
_services._dns-sd._udp.local PTR IN 4500/4496 0 3 _ipp._tcp.local
_ipp._tcp.local PTR IN 4500/4496 1 3 printer1._ipp._tcp.local
printer1._ipp._tcp.local TXT IN 4500/4496 1 3 (1)''
Related Commands
Command
Description
service-listmdns-sd
Creates a service-list and applies a filter on the service-list or associates a query for the service-list.
showmdnsrequests
Displays mDNS request information.
showmdnsstatistics
Displays mDNS statistics for the specified service-list.
show mdns requests
To display multicast Domain Name System (mDNS) request information, use the showmdns requests command in privileged EXEC mode.
(Optional) Displays detailed mDNS request information, including record name, record type, and record class.
namerecord-name
(Optional) Displays mDNS request information for the specified record.
typerecord-type
(Optional) Displays mDNS request information for a specific record type.
You can view mDNS messages for a specific record type, such as PTR, SRV, A, and AAAA.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.2(1)E
This command was introduced.
Examples
The following sample output displays detailed mDNS request information :
Device> enable
Device# show mdns requests detail
MDNS Outstanding Requests
=================================
Request name : _ipp._tcp.local
Request type : PTR
Request class : IN
Related Commands
Command
Description
service-listmdns-sd
Creates a service-list and applies a filter on the service-list or associates a query for the service-list.
showmdnscache
Displays mDNS cache information.
showmdnsstatistics
Displays mDNS statistics for the specified service-list.
show mdns statistics
To display multicast Domain Name System (mDNS) statistics, use the showmdns statistics command in privileged EXEC mode.
showmdns statistics
{
all |
service-listlist-name |
service-policy {
all |
interfacetype number}}
Syntax Description
all
Displays mDNS statistics for the device or service-policy.
service-listlist-name
Displays mDNS statistics for the specified service- list.
service-policy
Displays mDNS service-policy statistics.
interfacetype number
Displays mDNS service-policy statistics for the specified interface.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.2(1)E
This command was introduced.
Usage Guidelines
The all keyword can be used in two forms of the showmdns statistics command. You can view mDNS statistics for the device using the showmdns statistics all command form. To view service-policy statistics, use the showmdns statistics service-policy all command form
Examples
The following sample output displays detailed mDNS statistics:
Device> enable
Device# show mdns statistics all
mDNS Statistics
=================================
mDNS packets sent : 0
mDNS packets received : 31
mDNS packets dropped : 8
mDNS cache memory in use: 64264(bytes)
Related Commands
Command
Description
service-listmdns-sd
Creates a service-list and applies a filter on the service-list or associates a query for the service-list.
showmdnscache
Displays mDNS cache information.
showmdnsrequests
Displays mDNS request information.
show nat64
To display Network
Address Translation 64 (NAT64) information, use the
show nat64
command in user EXEC or privileged EXEC mode.
Displays
statistics for a NAT64 translation session timeout.
reconciliation
Displays
NAT64 reconciliation information.
replications
Displays
NAT64 replication information.
Command Modes
User EXEC (>)
Privileged EXEC(#)
Command History
Release
Modification
Cisco IOS
XE Release 3.4S
This
command was introduced.
Cisco IOS
XE Release 3.7S
This
command was modified. The
reconciliation and
replications keywords were added.
15.4(1)T
This command was integrated into Cisco IOS Release 15.4(1)T
Usage Guidelines
NAT64 supports
logging of information about all NAT sessions that are created and deleted. All
event entries that are logged have a time stamp. Use the output of this command
verify your NAT64 configuration.
The output of the
show nat64 reconciliation
command displays information about Forwarding Processor
(FP) switchovers. Whenever an FP does a switchover, the Route Processor (RP)
and the newly active FP audit their own configuration and alias data to ensure
that the RP and the newly active FP are synchronized.
Replication
indicates whether the traffic to a port is replicated or not. The
show nat64 replications
command displays the state of any port that needs to
be treated specially for replication. By default, HTTP (port 80) sessions are
not synchronized.
Examples
The following is
sample output from the
show nat64
logging command:
Device# show nat64 logging
NAT64 Logging Type
Method Protocol Dst. Address Dst. Port Src. Port
translation
flow export UDP 10.1.1.1 5000 60087
The table below
describes the significant fields shown in the display.
Table 25 show nat64 logging Field
Descriptions
Field
Description
Method
Method used
for logging records. Depending on your release, only flow export is supported.
Protocol
Protocol
used for translation.
Dst. Address
Destination IPv4 address of the external collector that is
configured for logging records.
Dst. Port
Destination port of the external collector that is configured
for logging records.
Src. Port
Source
port from where logging records are sent out on the network.
The following is
sample output from the
show nat64
services command:
Device# show nat64 services
NAT64 Services
ftp
UDP Enabled: TRUE
TCP Enabled: TRUE
Service Definition
Protocol: 6 Port: 21
The table below
describes the significant fields shown in the display.
Table 26 show nat64 services Field
Descriptions
Field
Description
UDP
Enabled
Indicates
whether the service translation is enabled by default for UDP packets if the
protocol is supported by the service definition.
TCP
Enabled
Indicates
whether the service translation is enabled by default for TCP packets if the
protocol is supported by the service definition.
Service
Definition
Definition
of the service (the Protocol and Port fields for which packets are considered a
match to the given service).
The following is
sample output from the
show nat64
timeouts command:
The table below
describes the significant fields shown in the display.
Table 27 show nat64 timeouts Field
Descriptions
Field
Description
Seconds
NAT64
timeout, in seconds.
CLI Cfg
Indicates
whether the timeout is explicitly configured through the CLI. The timeout
values configured through the CLI change the default timeout values.
The following is
sample output from the
show nat64 reconciliation
command:
Device# show nat64 reconciliation
Reconciliation Info
Start updates received: 0
End updates received: 0
Last update received: --- (2)
The table below
describes the significant fields shown in the display.
Table 28 show nat64 reconciliation
Field Descriptions
Field
Description
Start
updates received
Indicates
the number of synchronization events that are started.
End
updates received
Indicates
the number of synchronization events that are completed.
Last
updated received
Indicates
which event was received last—the start or end event.
The following is
sample output from the
show nat64 replications
command:
Device# show nat64 replications
Replications configured for http: 1
NAT64 Replications (ports not shown have replication enabled)
Traffic Type Port Replication User-Configured
http 80 disable FALSE
The table below
describes the significant fields shown in the display.
Table 29 show nat64 reconciliation
Field Descriptions
Field
Description
Traffic
type
Type of
traffic.
Port
Layer 4
port of the traffic.
Replication
Indicates
whether the traffic will be replicated or not. Valid values are enable
(replicated) or disable (not replicated).
User-Configured
Indicates
whether the replication is because of the default behavior (FALSE) of the
traffic or user configuration (TRUE).
Related Commands
Command
Description
nat64 logging
Enables
NAT64 logging.
nat64 service
ftp
Enables
NAT64 FTP service.
nat64
translation
Enables
NAT64 translation.
show nat64 adjacency
To display
information about the stateless Network Address Translation 64 (NAT64) managed
adjacencies, use the
shownat64adjacency command in user EXEC or privileged EXEC
mode.
shownat64adjacency
{ all | count | ipv4 | ipv6 }
Syntax Description
all
Displays
all adjacencies.
count
Displays
the adjacency count.
ipv4
Displays
IPv4 adjacencies.
ipv6
Displays
IPv6 adjacencies.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS
XE Release 3.2S
This
command was introduced.
15.4(1)T
This command was integrated into Cisco IOS Release 15.4(1)T.
Usage Guidelines
An adjacency is a
node that can be reached by one Layer 2 hop. The stateless NAT64 adjacencies
include adjacency addresses and the total number of adjacencies.
Examples
The following is
sample output from the
shownat64adjacencyall command:
The table below
describes the significant fields shown in the display.
Table 30 show nat64 adjacency all
Field Descriptions
Field
Description
Adjacency
Counts
Count of
all adjacencies.
Adjacencies
Types of
adjacencies.
Related Commands
Command
Description
nat64enable
Enables
stateless NAT64 on an interface.
show nat64 aliases
To display the IP aliases created by Network Address Translation 64 (NAT64), use the
show nat64 aliases command in user EXEC or privileged EXEC mode.
show nat64 aliases
[ rangelower-address-range upper-address-range ]
Syntax Description
range
(Optional) Displays information about the IP aliases in a given range.
lower-address-range
(Optional) IPv4 lower address range.
upper-address-range
(Optional) IPv4 upper address range.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
An alias is an address (examples of an address are pool addresses and static mapping addresses) for which the router sends an Address Resolution Protocol (ARP) request even though the address is not configured on an interface. NAT64 maintains a database of all the addresses for which an ARP request is sent. These addresses are inserted in the database as IP aliases when they exist on the subnet of an interface address.
Examples
The following is sample output from the
show nat64 aliases
command:
Router# show nat64 aliases
Aliases configured: 1
Address Table ID Inserted Flags Send ARP Reconcilable Stale Ref-Count
10.1.1.1 0 FALSE 0x0030 FALSE TRUE FALSE 1
The table below describes the significant fields shown in the display.
Table 31 show nat64 aliases Field Descriptions
Field
Description
Aliases configured
The number of NAT64 addresses for which an IP alias is configured.
Address
IPv4 address of the alias.
Table ID
VPN routing and forwarding (VRF) table ID that is associated with the alias.
Inserted
Indicates whether the alias is currently inserted as an IP alias.
Send ARP
Indicates whether an ARP request is sent. Valid values are TRUE or FALSE.
Related Commands
Command
Description
nat64 enable
Enables NAT64 on an interface.
show nat64 ha status
To display information about the stateless Network Address Translation 64 (NAT64) high availability (HA) status, use the
shownat64hastatuscommand in user EXEC or privileged EXEC mode.
shownat64hastatus
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>) Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.2S
This command was introduced.
Examples
The following is sample output from the
shownat64hastatus command:
Router# show nat64 ha status
NAT64 HA Status
Role: active
Peer is ready: TRUE
Peer is compatible: TRUE
Synchronization enabled: TRUE
Is hot (standby): FALSE
Bulk sync PID: NO_PROCESS
ISSU negotiation status: IPC, CF
ISSU context IDs: IPC(198), CF(197)
Synchronization capabilities: 0x00000001
Adjacency mappings: TRUE
CF info: handle(0x0000011B), peer ready(TRUE),
flow control(TRUE)(FALSE)(0x0)
Initialized: HA(TRUE) ISSU(TRUE)
Message stats:
Adjacency mapping: rx(0) tx(5001) tx err(0)
Bulk sync done: rx(0) tx(1) tx err(0)
Errors:
Bulk sync: 0
CF tx: 0
The table below describes the significant fields shown in the display.
Table 32 show nat64 ha status Field Descriptions
Field
Description
NAT64 HA Status
Status of stateless NAT64 HA.
Message stats
Status of the messages.
Errors
Types of errors.
Related Commands
Command
Description
clearnat64hastatistics
Clears stateless NAT64 HA statistics.
nat64enable
Enables stateless NAT64 on an interface.
show nat64 limits
To display Network Address Translation 64 (NAT64) limits, use the
show nat64 limits command in user EXEC or privileged EXEC mode.
show nat64 limits
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
The
show nat64 limits command displays the configured maximum limit for the number of entries that NAT64 translates.
Examples
The following is sample output from the
show nat64 limits command:
Router# show nat64 limits
NAT64 Limit Max Entries Is Configured
global 200 TRUE
The table below describes the fields shown in the display.
Table 33 show nat64 limits Field Descriptions
Field
Description
NAT64 Limit
Indicates whether the NAT64 translation limit is configured globally or on an interface.
Max Entries
The maximum number of entries that NAT64 translates.
Is Configured
Indicates whether the maximum limit is configured. Valid values are True or False.
Related Commands
Command
Description
nat64 enable
Enables NAT64 on an interface.
nat64 translation
Enables NAT64 translation.
show nat64 map-t
To display Network Address Translation 64 (NAT64) mapping of addresses and ports (MAP-T) information, use the
show nat64 map-t
command in privileged EXEC mode.
show nat64 map-t
[ domainnumber ]
Syntax Description
domain
number
Displays MAP-T information for a specific domain. Valid values for the
number
argument are from 1 to 128.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.8S
This command was introduced.
Usage Guidelines
MAP-T or Mapping of address and port (MAP) double stateless translation-based solution (MAP-T) provides IPv4 hosts connectivity to and across an IPv6 domain. MAP-T builds on existing stateless IPv4/IPv6 address translation techniques that are specified in RFC 6052, RFC 6144, and RFC 6145.
Examples
The following is sample output from the
show nat64 map-t domaincommand:
To display the Network Address Translation 64 (NAT64) dynamic mappings, use the
show nat64 mappings dynamic command in user EXEC or privileged EXEC mode.
show nat64 mappings dynamic
[ list
acl-name
| pool
pool-name ]
Syntax Description
listacl-name
(Optional) Displays the mappings of a specified access list.
poolpool-name
(Optional) Displays the mappings of a specified pool.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
Dynamic one-to-one mapping is used to map IPv6 hosts from a pool of available IPv4 addresses on a first-come first-served basis. The dynamic one-to-one configuration is deployed when the number of IPv6 hosts is few and an equal or greater number of public IPv4 addresses are available. For dynamic binds, the mapping is always between an IPv4 address and an IPv6 address.
Examples
The following is sample output from the
show nat64 mappings dynamic command:
Router# show nat64 mappings dynamic
Dynamic mappings configured: 1
Direction ACL Pool Flags
v6v4 mylist mypool 0x00000000 (none)
The table below describes the significant fields shown in the display.
Table 34 show nat64 mappings dynamic Field Descriptions
Field
Description
Dynamic mappings configured
The number of dynamic mappings configured.
Direction
The direction in which the dynamic mapping is configured.
ACL
Access list name.
Pool
Name of the pool.
Related Commands
Command
Description
nat64 v4v6
Translates an IPv4 source address to an IPv6 source address and an IPv6 destination address to an IPv4 destination address for NAT64.
nat64 v6v4
Translates an IPv6 source address to an IPv4 source address and an IPv4 destination address to an IPv6 destination address for NAT64.
show nat64 pools
To display the IPv4 address pools for dynamic Network Address Translation 64 (NAT64) mapping, use the
show nat64 pools command in user EXEC or privileged EXEC mode.
show nat64 pools
[ name
pool-name | range
lower-address-range upper-address-range ]
[ routes ]
Syntax Description
namepool-name
(Optional) Displays information about the configured address pools listed by the pool name.
range
(Optional) Displays information about address pools within a provided address range.
lower-address-range
(Optional) IPv4 lower address range.
upper-address-range
(Optional) IPv4 upper address range.
routes
(Optional) Displays static routes for a given pool.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
Pools allow you to specify an IPv4 address range that is used for dynamic mapping of objects. Only IPv4 address pools and one contiguous address range per pool object is supported in Cisco IOS XE Release 3.4S. When a pool is created, a static route is installed for all addresses in the pool range.
Examples
The following is sample output from the
show nat64 pools command:
Router# show nat64 pools
Pools configured: 1
Protocol Name Is Single Range Ranges
IPv4 mypool TRUE (10.1.1.1 - 10.1.1.10) 10.1.1.1 - 10.1.1.10
The table below describes the fields shown in the display.
Table 35 show nat64 pools Field Descriptions
Field
Description
Protocol
Name of the protocol.
Name
Name of the configured pool.
Is Single
Indicates whether the pool contains a single address range or multiple address ranges. The value of the range is displayed.
In Cisco IOS XE Release 3.4S only a single address range is supported.
Range
IPv4 address range.
Ranges
All address ranges for the pool.
In Cisco IOS XE Release 3.4S only a single address range is supported.
Related Commands
Command
Description
nat64 enable
Enables NAT64 on an interface.
nat64 v4
Enables NAT64 IPv4 configuration.
show nat64 prefix stateful
To display information about Network Address Translation 64 N(AT64) stateful prefixes, use the
show nat64 prefix stateful command in user EXEC or privileged EXEC mode.
show nat64 prefix stateful
{ global | { interfaces | static-routes }
[ prefixipv6-address/prefix-length ] }
Syntax Description
global
Displays information about global prefixes.
interfaces
Displays information about the configured interfaces.
prefix
(Optional) Displays information about interfaces that use a prefix.
ipv6-address
(Optional) IPv6 network number to include in router advertisements. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
/prefix-length
(Optional) Length of the IPv6 prefix. Prefix length is a decimal value that indicates how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark must precede the decimal value. Valid values are from 0 to 128.
static-routes
Displays information about prefix static routes.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
A maximum of one global stateful prefix and one stateful prefix per interface is supported. NAT64 uses the configured stateful prefix to algorithmically translate the IPv4 addresses of the IPv4 hosts to and from IPv6 addresses. If a global stateful prefix or an interface stateful prefix is not configured, the Well Known Prefix (WKP) of 64:ff9b::/96 is used to translate the IPv4 address of the IPv4 host.
Examples
The following is sample output from the
show nat64 prefix stateful globalcommand:
Router# show nat64 prefix stateful global
Global Stateful Prefix: is valid, 2001:DB8::/96
IFs Using Global Prefix Gi0/1/0
The following is sample output from the
show nat64 prefix stateful interfaces command:
The table below describes the significant fields shown in the display.
Table 36 show nat6 prefix stateful Field Descriptions
Field
Description
IFs Using Global Prefix
Lists the interfaces that are using the specified global prefix.
Enabled
Information on whether NAT64 is enabled on a route. TRUE if enabled and FALSE if not enabled.
Static Route
IPv6 static route that is configured to route packets.
Related Commands
Command
Description
nat64 prefix stateful
Configures a prefix and prefix length for stateful NAT64.
show nat64 prefix
stateless
To display
information about the configured Network Address Translation 64 (NAT64)
stateless prefixes, use the
shownat64prefixstatelesscommand in user EXEC or privileged EXEC
mode.
Displays
the interfaces and the stateless prefixes used by the interfaces.
prefix
(Optional) Displays the interfaces that are using a specific stateless prefix.
static-routes
Displays
the static routes that are using the stateless prefix.
ipv6-prefix
(Optional) IPv6 network number to include in router advertisements. This
argument must be in the form documented in RFC 2373 where the address is
specified in hexadecimal using 16-bit values between colons.
/prefix-length
(Optional) Length of the IPv6 prefix. Prefix length is a decimal value that
indicates how many of the high-order contiguous bits of the address comprise
the prefix (the network portion of the address). A slash mark must precede the
decimal value. Valid values are from 0 to 128.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS
XE Release 3.2S
This
command was introduced.
15.4(1)T
This command was integrated into Cisco IOS Release
15.4(1)T.
Usage Guidelines
The output of
theshownat64prefixstateless command displays the interfaces that use
a specific prefix and the number of prefixes that use a static route.
Examples
The following is
sample output from the
shownat64prefixstatelessglobalcommand:
Device# show nat64 prefix stateless global
Global Prefix: is valid, 2001::/96
IFs Using Global Prefix
Fa0/3/4
Fa0/3/5
The table below
describes the significant fields shown in the display.
Table 37 show nat64 prefix stateless
global Field Descriptions
Field
Description
Global
Prefix
IPv6
stateless prefix configured at the global level.
IFs Using
Global Prefix
Lists the
interfaces that are using the specified global prefix.
The following is
sample output from the
shownat64prefixstatelessinterfacescommand.
Device# show nat64 prefix stateless interfaces
Interface NAT64 Enabled Global Stateless Prefix
FastEthernet0/3/4 TRUE FALSE 2001::/96
The table below
describes the significant fields shown in the display.
Table 38 show nat64 prefix stateless
interfaces Field Descriptions
Field
Description
Interface
Interface
name and number.
NAT64
Enabled
Information on whether NAT64 is enabled on a route. TRUE if enabled and FALSE
if not enabled.
Global
Information on whether a global prefix is used. TRUE if the global prefix is
used and FALSE if the interface prefix is used.
Stateless
Prefix
Stateless
prefix used for NAT64 translation.
The following is
sample output from the
shownat64prefixstatelessstatic-routescommand. The output fields are
self-explanatory.
(Optional) Displays the route for an adjacency address.
address
(Optional) Adjacency address for lookup.
interface
(Optional) Displays routes pointing to an interface.
type
(Optional) Interface type. For more information, use the question mark (?)
online help function.
number
(Optional) Interface or subinterface number. For more information about the
numbering syntax for your networking device, use the question mark (?) online
help function.
prefix
(Optional) Displays the route of an IPv4 prefix.
prefix-length
(Optional) Length of the IPv4 prefix. A decimal value that indicates how many
of the high-order contiguous bits of the address comprise the prefix (the
network portion of the address).
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS
XE Release 3.2S
This
command was introduced.
15.4(1)T
This command was integrated into Cisco IOS Release 154(1)T.
Usage Guidelines
The output of the
shownat64routes command displays the stateless prefix and
adjacency used by the routes and information on whether the routes are enabled.
Examples
The following is
sample output from the
shownat64routes command:
Device# show nat64 routes
IPv4 Prefix Adj. Address Enabled Output IF Global IPv6 Prefix
192.0.2.1/24 0.0.19.137 FALSE Fa0/3/4
198.51.100.253/24 0.0.19.140 TRUE Fa0/3/0 FALSE 3001::/96
The table below
describes the significant fields shown in the display.
Table 39 show nat64 routes Field
Descriptions
Field
Description
IPv4
Prefix
Prefix
used by the IPv4 address.
Adj.
Address
Adjacency
address.
Enabled
Information about whether NAT64 is enabled on a route. TRUE if enabled and
FALSE if not enabled.
Output IF
Output
interfaces.
Global
Information about whether a global prefix is used. TRUE if the global prefix is
used and FALSE if the interface prefix is used.
Related Commands
Command
Description
nat64route
Specifies the NAT64 stateless prefix to which an IPv4 prefix should be
translated.
show nat64 services
To display the Network Address Translation (NAT64) services, use the
show nat64 services command in user EXEC or privileged EXEC mode.
show nat64 services
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
Cisco IOS XE Release 3.4S supports only FTP service.
Examples
The following is sample output from the
show nat64 services command:
Router# show nat64 services
NAT64 Services
ftp
UDP Enabled: TRUE
TCP Enabled: TRUE
Service Definition
Protocol: 6 Port: 21
The table below describes the significant fields shown in the display.
Table 40 show nat64 services Field Descriptions
Field
Description
UDP Enabled
Indicates whether service translation is enabled by default for UDP packets, if the protocol is supported by the service definition.
TCP Enabled
Indicates whether the service translation is enabled by default for TCP packets, if the protocol is supported by the service definition.
Service Definition
The definition of the service (the protocol and port fields for which packets are considered a match to the given service).
Related Commands
Command
Description
nat64 service ftp
Enables NAT64 FTP service.
show nat64 statistics
To display Network
Address Translation 64 (NAT64) packet count statistics, use the
shownat64statisticscommand in user EXEC or privileged EXEC
mode.
(Optional) Interface type. For more information, use the question mark (?)
online help function.
number
(Optional) Interface or subinterface number. For more information about the
numbering syntax for your networking device, use the question mark (?) online
help function.
limit
(Optional)
Clears the statistics for a specific limit. <what is the limit?>
prefix
(Optional) Displays statistics for a specified prefix.
ipv6-prefix
(Optional) IPv6 network number to include in router advertisements. This
argument must be in the form documented in RFC 2373 where the address is
specified in hexadecimal using 16-bit values between colons.
/prefix-length
(Optional) Length of the IPv6 prefix. A decimal value that indicates how many
of the high-order contiguous bits of the address comprise the prefix (the
network portion of the address). A slash mark must precede the decimal value.
The valid values are from 0 to 128.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco
IOS XE Release 3.2S
This
command was introduced.
15.4(1)T
This command was
integrated into Cisco IOS Release 15.4(1)T.
Usage Guidelines
The output of
theshownat64statistics command displays the interfaces
configured for stateless NAT64 and the packets that were translated or dropped.
Examples
The following is
sample output from the
shownat64statistics command:
The table below
describes the significant fields shown in the display.
Table 41 show nat64 statistics Field
Descriptions
Field
Description
Global
Stats
Statistics of all the NAT64 interfaces.
Packets
translated
Number of
packets translated from IPv4 to IPv6 and vice versa.
Packets
dropped
Number of
packets dropped. The packets that are not translated are dropped.
Related Commands
Command
Description
nat64enable
Enables
stateless NAT64 on an interface.
show nat64 timeouts
To display the Network Address Translation 64 (NAT64) translation session timeout, use the
show nat64 timeouts command in user EXEC or privileged EXEC mode.
show nat64 timeouts
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Examples
The following is sample output from the
show nat64 timeouts command:
The table below describes the significant fields shown in the display.
Table 42 show nat64 timeouts Field Descriptions
Field
Description
Seconds
NAT64 timeout, in seconds.
CLI Cfg
Indicates whether the timeout is explicitly configured through the CLI. The timeout values configured through the CLI changes the default timeout values.
Related Commands
Command
Description
nat64 translation
Enables NAT64 translation.
show nat64 translations
To display information about Network Address Translation 64 (NAT64) translations, use the
show nat64 translations port command in user EXEC or privileged EXEC mode.
Displays information about NAT64 translations filtered by port numbers.
number
Port number. Valid values are from 1 to 65535.
protocol
Displays information about NAT64 translations, filtered by the protocols configured.
icmp
Displays Internet Control Message Protocol (ICMP) entries.
tcp
Displays TCP entries.
udp
Displays UDP entries.
v4
Displays information about NAT64 translations based on an IPv4 address.
original
Displays translations for the original address.
ipv4-address
IPv4 address.
translated
Displays information about translations for the translated IPv4 or IPv6 address.
ipv6-address
IPv6 network number to include in router advertisements. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
v6
Displays information about NAT64 translations based on an IPv6 address.
total
(Optional) Displays the total NAT64 translation count.
The following is sample output from theshow nat64 translations port command:
Router# show nat64 translations port 23
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
tcp 192.0.2.1:23 [3001::c000:201]:23
56.1.1.1:20822 [2001:db8::1]:20822
Total number of translations: 1
The following is sample output from theshow nat64 translations v4 original command:
Router# show nat64 translations v4 original 192.0.2.1
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
tcp 192.0.2.1:23 [3001::c000:201]:23
56.1.1.1:20822 [2001:db8::1]:20822
icmp 192.0.2.1:2816 [3001::c000:201]:2816
56.1.1.1:2816 [2001:db8::1]:2816
Total number of translations: 2
The table below describes the significant fields shown in the display.
Table 43 show nat64 translations Field Descriptions
Field
Description
Proto
Protocol type.
Original IPv4 Translated IPv6
IPv4 address that was translated as an IPv6 address.
Note
This field displays the IPv4 addresses that were translated into IPv6 addresses and the IPv4 addresses that were translated from IPv6 addresses.
Translated IPv4 Original IPv6
IPv6 address that was translated as an IPv4 address.
Note
This field displays the IPv6 addresses that were translated into IPv4 addresses and the IPv6 addresses that were translated from IPv4 addresses.
Related Commands
Command
Description
show nat64 translations entry-type
Displays information about NAT64 translations filtered by entry type.
show nat64 translations time
Displays information about NAT64 translations filtered by time.
show nat64 translations total
Displays information about the total NAT64 translation count.
show nat64 translations verbose
Displays detailed NAT64 translation information.
show nat64 translations entry-type
To display information about Network Address Translation 64 (NAT64) translations filtered by entry type, use the
show nat64 translations entry-type command in user EXEC or privileged EXEC mode.
show nat64 translations entry-type
{ bind
{ all | dynamic | static } | session }
[ total | verbose ]
Syntax Description
bind
Displays information about NAT64 translation mapping entries.
all
Displays information about all NAT64 translation mapping entries.
dynamic
Displays information about dynamic mapping entries.
static
Displays information about static mapping entries.
session
Displays information about NAT64 translation session entries.
total
(Optional) Displays information about the total NAT64 translation entry count.
The following is sample output from the
show nat64 translations entry-type session command:
Router# show nat64 translations entry-type session
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
--- --- ---
56.1.1.1 2001:db8::1
Total number of translations: 1
The table below describes the significant fields shown in the display.
Table 44 show nat64 translations entry-type session Field Descriptions
Field
Description
Proto
Protocol type.
Original IPv4 Translated IPv6
IPv4 address that was translated as an IPv6 address.
Note
This field displays the IPv4 addresses that were translated into IPv6 addresses and the IPv4 addresses that were translated from IPv6 addresses.
Translated IPv4 Original IPv6
IPv6 address that was translated as an IPv4 address.
Note
This field displays the IPv6 addresses that were translated into IPv4 addresses and the IPv6 addresses that were translated from IPv4 addresses.
Related Commands
Command
Description
show nat64 translations
Displays information about NAT64 translations.
show nat64 translations time
Displays information about NAT64 translations filtered by time.
show nat64 translations total
Displays information about the total NAT64 translation count.
show nat64 translations verbose
Displays detailed NAT64 translation information.
show nat64 translations redundancy
To display the Network Address Translation 64 (NAT64) translations filtered by redundancy groups (RGs), use the
show nat64 translations redundancy
command in user EXEC or privileged EXEC mode.
show nat64 translations redundancy
group-id
[ total
| verbose ]
Syntax Description
group-id
Redundancy group ID. Valid values are from 1 and 2.
total
(Optional) Displays information about the total NAT64 redundancy translations.
Use the output of the verify the redundancy groups that you have configured.
Examples
The following is sample output from the
show nat64 translations redundancy
command:
Device# show nat64 translations redundancy 1
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
209.165.201.2:21 [2001:DB8:1::103]:32847
tcp 10.2.1.11:32863 [2001::3201:10b]:32863
10.1.1.1:80 [2001::11]:80
tcp 209.165.201.2:21 [2001:DB8:1::104]:32848
10.1.1.1:80 [2001::11]:80
Total number of translations: 3
The table below describes the significant fields shown in the display.
Table 45 show nat64 translations redundancy Field Descriptions
Field
Description
Proto
Protocol type.
Original IPv4 Translated IPv6
IPv4 address that was translated as an IPv6 address.
Note
This field displays IPv4 addresses that were translated into IPv6 addresses and IPv4 addresses that were translated from IPv6 addresses.
Translated IPv4 Original IPv6
IPv6 address that was translated as an IPv4 address.
Note
This field displays IPv6 addresses that were translated into IPv4 addresses and IPv6 addresses that were translated from IPv4 addresses.
Related Commands
Command
Description
show nat64 translations
Displays information about NAT64 translations.
show nat64 translations time
To display information about Network Address Translation 64 (NAT64) translations filtered by time, use the
show nat64 translations time command in user EXEC or privileged EXEC mode.
show nat64 translations time
{ created
| last-used }
{ newer-than
| older-than }
day month year hh:mm:ss
[ total | verbose ]
Syntax Description
created
Displays translation entries that were created at the specified time.
last-used
Displays the translation entries that were last used at the specified time.
newer-than
Displays translation entries that are newer than the time stamp.
older-than
Displays translation entries that are older than the time stamp.
day
Day of the month. Valid values are from 1 to 31.
month
Month of the year. Valid values are from January to December.
year
Year. Valid values are from 1993 to 2035.
hh:mm:ss
Time in hh:mm:ss format.
total
(Optional) Displays the total NAT64 translation count.
The following is sample output from theshow nat64 translations time created newer-than
command:
Router# show nat64 translations time created newer-than 20 June 2011 20:00:00
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
56.1.1.1 2001:db8::1
tcp 192.0.2.1:23 [3001::c000:201]:23
56.1.1.1:20822 [2001:db8::1]:20822
icmp 192.0.2.1:2816 [3001::c000:201]:2816
56.1.1.1:2816 [2001:db8::1]:2816
Total number of translations: 3
The table below describes the significant fields shown in the display.
Table 46 show nat64 translations time created newer-than Field Descriptions
Field
Description
Proto
Protocol type.
Original IPv4 Translated IPv6
IPv4 address that was translated as an IPv6 address.
Note
This field displays the IPv4 addresses that were translated into IPv6 addresses and the IPv4 addresses that were translated from IPv6 addresses.
Translated IPv4 Original IPv6
IPv6 address that was translated as an IPv4 address.
Note
This field displays the IPv6 addresses that were translated into IPv4 addresses and the IPv6 addresses that were translated from IPv4 addresses.
Related Commands
Command
Description
show nat64 translations
Displays information about NAT64 translations.
show nat64 translations entry-type
Displays information about NAT64 translations filtered by entry type.
show nat64 translations total
Displays information about the total NAT64 translation count.
show nat64 translations verbose
Displays the detailed NAT64 translation information.
show nat64 translations total
To display the total Network Address Translation 64 (NAT64) translation count, use the
show nat64 translations total command in user EXEC or privileged EXEC mode.
show nat64 translations total
[ entry-type
{ bind
{ all | dynamic | static } | session } | portnumber | protocol
{ icmp | tcp | udp } | time
{ created | last-used }
{ newer-than | older-than }
day month year hh:mm:ss | v4
{ original
ipv4-address | translated
ipv6-address } | v6
{ original
ipv6-address | translated
ipv4-address } ]
Syntax Description
entry-type
(Optional) Displays information about NAT64 translations filtered by entry type.
bind
(Optional) Displays information about NAT64 translation mapping entries.
all
(Optional) Displays information about all NAT64 translation mapping entries.
dynamic
(Optional) Displays information about dynamic mapping entries.
static
(Optional) Displays information about static mapping entries.
session
(Optional) Displays information about NAT64 translation session entries.
portnumber
(Optional) Displays information about NAT64 translations filtered by port number. Valid values are from 1 to 65535.
protocol
(Optional) Displays information about NAT64 translations filtered by protocol.
icmp
(Optional) Displays information about Internet Control Message Protocol (ICMP) entries.
tcp
(Optional) Displays information about TCP entries.
udp
(Optional) Displays information about UDP entries.
time
(Optional) Displays information about NAT64 translations filtered by time.
created
(Optional) Displays translation entries created at the specified time.
last-used
(Optional) Displays the translation entries that were last used at the specified time.
newer-than
(Optional) Displays translation entries that are newer than the time stamp.
older-than
(Optional) Displays translation entries that are older than the time stamp.
day
(Optional) Day of the month. Valid values are from 1 to 31.
month
(Optional) Month of the year. Valid values are from January to December.
year
(Optional) Year. Valid values are from 1993 to 2035.
hh:mm:ss
(Optional) Time in hh:mm:ss format.
v4
(Optional) Displays information about NAT64 translations based on an IPv4 address.
original
(Optional) Displays information about translations for the original IPv4 or IPv6 address.
ipv4-address
(Optional) IPv4 address.
translated
(Optional) Displays information about translations for the translated IPv4 or IPv6 address.
ipv6-address
(Optional) IPv6 network number to include in router advertisements. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
v6
(Optional) Displays information about NAT64 translations based on an IPv6 address.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Examples
The following is sample output from theshow nat64 translations total
command:
Router# show nat64 translations total
Total number of translations: 3
The output fields are self-explanatory.
Related Commands
Command
Description
show nat64 translations
Displays information about NAT64 translations.
show nat64 translations entry-type
Displays information about NAT64 translations filtered by entry type.
show nat64 translations time
Displays information about NAT64 translations filtered by time.
show nat64 translations verbose
Displays detailed NAT64 translation information.
show nat64 translations v4
To display Network Address Translation 64 (NAT64) translations based on an IPv4 address, use the
show nat64 translations v4
command in user EXEC or privileged EXEC mode.
show nat64 translation v4
{ original ipv4-address | translated ipv6-address } total | verbose
Syntax Description
original
Displays translations for the original IPv4 address.
ipv4-address
IPv4-address.
translated
Displays translations for the translated address.
ipv6-address
IPv6 network number to include in router advertisements. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
total
(Optional) Displays the total NAT64 translation count.
The following is sample output from theshow nat64 translation v4 original command:
Router# show nat64 translation v4 original 112.1.1.10
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
tcp 112.1.1.10:23 [3001::7001:10a]:23
56.1.1.2:12656 [2001::2]:12656
Total number of translations: 1
The following is sample output from the
show nat64 translations v4 translatedcommand:
Router# show nat64 translations v4 translated 3001::7001:10a
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
icmp 112.1.1.10:677 [3001::7001:10a]:677
56.1.1.2:677 [2001::1b01:10a]:677
Total number of translations: 1
The table below describes the significant fields shown in the display.
Table 47 show nat64 translations v4 Field Descriptions
Field
Description
Proto
Protocol type.
Original IPv4 Translated IPv6
IPv4 address that was translated as an IPv6 address.
Translated IPv4 Original IPv6
IPv6 address that was translated as an IPv4 address.
Related Commands
Command
Description
show nat64 translations entry-type
Displays NAT64 translations filtered by entry type.
show nat64 translations port
Displays NAT64 translations filtered by port numbers.
show nat64 translations protocol
Displays NAT64 translations filtered by protocols.
show nat64 translations time
Displays NAT64 translations filtered by time.
show nat64 translations total
Displays the total NAT64 translation count.
show nat64 translations v6
Displays NAT64 translations based on an IPv6 address.
show nat64 translations verbose
Displays detailed NAT64 translation information.
show nat64 translations v6
To display Network Address Translation 64 (NAT64) translations based on an IPv6 address, use the
show nat64 translations v4
command in user EXEC or privileged EXEC mode.
show nat64 translations v6
{ original
ipv6-address | translated
ipv4-address } [ total | verbose ]
Syntax Description
original
Displays translations for the original IPv6 address.
ipv6-address
IPv6 network number to include in router advertisements. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
translated
Displays translations for the translated address.
ipv4-address
IPv4-address.
total
Displays the total NAT64 translation count.
verbose
Displays detailed NAT64 translation information.
Command Default
This command has no default settings.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Examples
The following is sample output from the
show nat64 translation v6 original command:
Router# show nat64 translations v6 original 2001::2
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
--- --- ---
56.1.1.1 2001::2
tcp 112.1.1.10:23 [3001::7001:10a]:23
56.1.1.1:38924 [2001::2]:38924
Total number of translations: 2
The following is sample output from the
show nat64 translations v6 translated command:
Router# show nat64 translations v6 translated 56.1.1.2
Proto Original IPv4 Translated IPv4
Translated IPv6 Original IPv6
----------------------------------------------------------------------------
--- --- ---
56.1.1.2 2001::1b01:10a
icmp 112.1.1.10:2370 [3001::7001:10a]:2370
56.1.1.2:2370 [2001::1b01:10a]:2370
Total number of translations: 2
The table below describes the significant fields shown in the display.
Table 48 show nat64 translations v6 Field Descriptions
Field
Description
Proto
Protocol type.
Original IPv4 Translated IPv6
IPv4 address that was translated as an IPv6 address.
Translated IPv4 Original IPv6
IPv6 address that was translated as an IPv4 address.
Related Commands
Command
Description
nat64 translation
Enables NAT64 translation.
show nat64 translations entry-type
Displays NAT64 translations filtered by entry type.
show nat64 translations port
Displays NAT64 translations filtered by port numbers.
show nat64 translations protocol
Displays NAT64 translations filtered by protocols.
show nat64 translations time
Displays NAT64 translations filtered by time.
show nat64 translation total
Displays the total NAT64 translation count.
show nat64 translations v4
Displays NAT64 translations based on an IPv4 address.
show nat64 translations verbose
Displays detailed NAT64 translation information.
show nat64 translations verbose
To display the detailed Network Address Translation 64 (NAT64) translation information, use the
show nat64 translations verbose command in user EXEC or privileged EXEC mode.
show nat64 translations verbose
[ entry-type
{ bind
{ all | dynamic | static } | session } | port
number | protocol
{ icmp | tcp | udp } | time
{ created | last-used }
{ newer-than | older-than }
day month year hh:mm:ss | v4
{ original
ipv4-address | translated
ipv6-address } | v6
{ original
ipv6-address | translated
ipv4-address } ]
Syntax Description
entry-type
(Optional) Displays information about NAT64 translations filtered by entry type.
bind
(Optional) Displays information about NAT64 translation mapping entries.
all
(Optional) Displays information about all NAT64 translation mapping entries.
dynamic
(Optional) Displays information about dynamic mapping entries.
static
(Optional) Displays information about static mapping entries.
session
(Optional) Displays information about NAT64 translation session entries.
portnumber
(Optional) Displays information about NAT64 translations filtered by port number. Valid values are from 1 to 65535.
protocol
(Optional) Displays information about NAT64 translations filtered by protocol.
icmp
(Optional) Displays information about Internet Control Message Protocol (ICMP) entries.
tcp
(Optional) Displays information about TCP entries.
udp
(Optional) Displays information about UDP entries.
time
(Optional) Displays information about NAT64 translations filtered by time.
created
(Optional) Displays translation entries created at the specified time.
last-used
(Optional) Displays the translation entries that were last used at the specified time.
newer-than
(Optional) Displays translation entries that are newer than the time stamp.
older-than
(Optional) Displays translation entries that are older than the time stamp.
day
(Optional) Day of the month. Valid values are from 1 to 31.
month
(Optional) Month of the year. Valid values are from January to December.
year
(Optional) Year. Valid values are from 1993 to 2035.
hh:mm:ss
(Optional) Time in hh:mm:ss format.
v4
(Optional) Displays information about NAT64 translations based on an IPv4 address.
original
(Optional) Displays information about translations for the original IPv4 or IPv6 address.
ipv4-address
(Optional) IPv4 address.
translated
(Optional) Displays information about translations for the translated IPv4 or IPv6 address.
ipv6-address
(Optional) IPv6 network number to include in router advertisements. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
v6
(Optional) Displays information about NAT64 translations based on an IPv6 address.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Examples
The following is sample output from the
show nat64 translations verbose command:
The table below describes the significant fields shown in the display.
Table 49 show nat64 translations verbose Field Descriptions
Field
Description
Proto
Protocol type.
Original IPv4 Translated IPv6
IPv4 address that was translated as an IPv6 address.
Note
This field displays the IPv4 addresses that were translated into IPv6 addresses and the IPv4 addresses that were translated from IPv6 addresses.
Translated IPv4 Original IPv6
IPv6 address that was translated as an IPv4 address.
Note
This field displays the IPv6 addresses that were translated into IPv4 addresses and the IPv6 addresses that were translated from IPv4 addresses.
created
The date and time when the entry was created.
last-used
The date and time when the entry was last used.
Related Commands
Command
Description
show nat64 translations
Displays information about NAT64 translations.
show nat64 translations entry-type
Displays NAT64 translations filtered by entry type.
show nat64 translations time
Displays NAT64 translations filtered by time.
show nat64 translations total
Displays the total NAT64 translation count.
show nhrp debug-condition
To display the Next Hop Resolution Protocol (NHRP) conditional debugging information, use the shownhrpdebug-conditioncommand in privileged EXEC mode.
shownhrpdebug-condition
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.4(15)T
This command was introduced.
Examples
The following is sample output from the shownhrpdebug-condition command:
Router# show nhrp debug-condition
Peer NBMA addresses under debug are:
1.1.1.1,
Interfaces under debug are:
Tunnel1, Peer Tunnel addresses under debug are:
2.2.2.2,
The output if self-explanatory. It displays the conditional debugging information for NHRP.
Related Commands
Command
Description
debugnhrpcondition
Enables the NHRP conditional debugging.
show nhrp group-map
To display the
details of NHRP group mappings, use the
show nhrp
group-map command in user EXEC or privileged EXEC mode.
shownhrpgroup-map
[ group-name ]
Syntax Description
group-name
(Optional) Name of an NHRP group mapping for which information will be
displayed.
Command Default
Information is
displayed for all NHRP group mappings.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
15.4(1)T
This
command was introduced.
Cisco IOS XE Release 3.11S
This command was integrated into Cisco IOS XE Release 3.11S.
Usage Guidelines
This command
displays the details on NHRP group mappings on the hub along with the list of
tunnels using each of the NHRP groups defined in the mappings. In combination
with the
show ip nhrp
command, this command lets you easily determine which QoS policy map is applied
to a specific tunnel endpoint.
This command
displays the details of the specified NHRP group mapping. The details include
the associated QoS policy name and the list of tunnel endpoints using the QoS
policy. If no option is specified, it displays the details of all NHRP group
mappings.
Note
This command will replace the
show ip nhrp group-map command in a future
release.
Examples
The following is
sample output from the
show nhrp
group-map command:
Device# show nhrp group-map
Interface: Tunnel0
NHRP group: spoke_group1
QoS policy: group1_parent
Transport endpoints using the qos policy: None
NHRP group: spoke_group2
QoS policy: group2_parent
Transport endpoints using the qos policy: None
NHRP group: spoke_group3
QoS policy: group3_parent
Transport endpoints using the qos policy: None
The following is
sample output from the
show nhrp
group-map command for an NHRP group named test-group-0:
Device# show nhrp group-map test-group-0
Interface: Tunnel0
NHRP group: tes-group-0
QoS policy: group3_parent
Transport endpoints using the qos policy:
6001::1000:1
The table below
describes the significant fields shown in the displays.
Table 50 show nhrp group-map Field
Descriptions
Field
Description
Interface
Interface
on which the policy is configured.
NHRP
group
NHRP
group associated with the QoS policy on the interface.
QoS
policy
QoS
policy configured on the interface.
Transport endpoints using the qos policy
List of
transport endpoints using the QoS policy.
Related Commands
Command
Description
ip nhrp map
Statically configures the IP-to-NBMA address mapping of IP
destinations connected to an NBMA network.
nhrp group
Configures an NHRP group on a spoke.
nhrp map group
Adds
NHRP groups to QoS policy mappings on a hub.
show dmvpn
Displays DMVPN-specific session information.
show ip nhrp
Displays NHRP mapping information.
show policy-map mgre
Displays statistics about a specific QoS policy as it is applied to a tunnel
endpoint.
show platform hardware qfp feature
To display feature-specific information in the Cisco Quantum Flow Processor (QFP), use the
showplatformhardwareqfpfeaturecommand in privileged EXEC mode.
Displays the Application Level Gateway (ALG) information of the processor.
memory
Displays ALG memory usage information of the processor.
statistics
Displays ALG common statistics information of the processor.
protocol
Protocol name. It can be one of the following values:
dns--Displays Domain Name System (DNS) ALG information in the QFP datapath.
exec--Displays exec ALG information in the QFP datapath.
ftp--Displays FTP ALG information in the QFP datapath.
h323--Displays H.323 ALG information in the QFP datapath.
http--Displays HTTP ALG information in the QFP datapath.
imap--Displays Internet Message Access Protocol (IMAP) ALG information in the QFP datapath.
ldap--Displays Lightweight Directory Access Protocol (LDAP) ALG information in the QFP datapath.
login--Displays login ALG information in the QFP datapath.
netbios--Displays Network Basic Input Output System (NetBIOS) ALG information in the QFP datapath.
pop3--Displays pop3 ALG information in the QFP datapath.
rtsp--Displays Rapid Spanning Tree Protocol (RSTP) ALG information in the QFP datapath.
shell--Displays shell ALG information in the QFP datapath.
sip--Displays Session Initiation Protocol (SIP) ALG information in the QFP datapath.
skinny--Displays skinny ALG information in the QFP datapath.
smtp--Displays Simple Mail Transfer Protocol (SMTP) ALG information in the QFP datapath.
sunrpc--Displays Sun RPC ALG information in the QFP datapath.
tftp--Displays TFTP ALG information in the QFP datapath.
clear
(Optional) Clears ALG common counters after display.
clear
(Optional) Clears the ALG counters.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 2.2
This command was introduced.
Cisco IOS XE Release 3.1S
This command was modified. Support for the NetBIOS protocol was added.
Cisco IOS XE Release 3.2S
This command was modified. The show output was modified to display SIP statistics information.
Usage Guidelines
The
showplatformhardwareqfpfeature command when used withthenetbioskeyworddisplays the NetBIOS ALG memory usage and statistics information of the processor.
Examples
The following example displays the NetBIOS ALG statistics information of the processor:
Router# show platform hardware qfp active feature alg statistics netbios
NetBIOS ALG Statistics:
No. of allocated chunk elements in L7 data pool:0
No. of times L7 data is allocated:0 No. of times L7 data is freed:0
Datagram Service statistics
Total packets :0
Direct unique packets :0
Direct group packets :0
Broadcast packets :0
DGM Error packets :0
Query request packets :0
Positive Qry response packets :0
Netgative Qry response packets:0
Unknown packets :0
Total error packets :0
Name Service statistics
Total packets :0
Query request packets :0
Query response packets :0
Registration req packets :0
Registration resp packets:0
Release request packets :0
Release response packets :0
WACK packets :0
Refresh packets :0
Unknown packets :0
Total error packets :0
Session Service statistics
Total packets :0
Message packets :0
Request packets :0
Positive response packets:0
Negative response packets:0
Retarget response packets:0
Keepalive packets :0
Unknown packets :0
Total error packets :0
The table below describes the significant fields shown in the display.
Table 51 show platform hardware qfp feature Field Descriptions
Field
Description
No. of allocated chunk elements in L7 data pool
Number of memory chunks allocated for processing NetBIOS packets.
No. of times L7 data is allocated:0 No. of times L7 data is freed
Number of times memory is allocated and freed for processing NetBIOS packets.
Direct unique packets
Number of direct unique NetBIOS packets processed.
Direct group packets
Number of direct group NetBIOS packets processed.
Broadcast packets
Number of broadcast NetBIOS packets processed.
DGM Error packets
Number of Datagram Error NetBIOS packets processed.
Query request packets
Number of query request NetBIOS packets processed.
Positive Qry response packets
Number of positive query response NetBIOS packets processed.
Negative Qry response packets
Number of negative query response NetBIOS packets processed.
Unknown packets
Number of unknown packets.
Total error packets
Counter tracking number of error packets.
The following example displays SIP statistics information of the processor. The field descriptions are self-explanatory.
Router# show platform hardware qfp active feature alg statistics sip
SIP info pool used chunk entries number: 0
RECEIVE
Register: 0 -> 200-OK: 0
Invite: 0 -> 200-OK: 0 Re-invite 0
Update: 0 -> 200-OK: 0
Bye: 0 -> 200-OK: 0
Trying: 0 Ringing: 0 Ack: 0
Info: 0 Cancel: 0 Sess Prog: 0
Message: 0 Notify: 0 Prack: 0
OtherReq: 0 OtherOk: 0
Events
Null dport: 0 Media Port Zero: 0
Malform Media: 0 No Content Length: 0
Cr Trunk Chnls: 0 Del Trunk Chnls: 0
Cr Normal Chnls: 0 Del Normal Chnls: 0
Media Addr Zero: 0 Need More Data: 0
Errors
Create Token Err: 0 Add portlist Err: 0
Invalid Offset: 0 Invalid Pktlen: 0
Free Magic: 0 Double Free: 0
Retmem Failed: 0 Malloc Failed: 0
Bad Format: 0 Invalid Proto: 0
Add ALG state Fail: 0 No Call-id: 0
Parse SIP Hdr Fail: 0 Parse SDP Fail: 0
Error New Chnl: 0 Huge Size: 0
Create Failed: 0
Writeback Errors
Offset Err: 0 PA Err: 0
No Info: 0
Related Commands
Command
Description
debugplatformhardwareqfpfeature
Debugs feature-specific information in the QFP.
show platform
hardware qfp feature alg statistics sip
To display
Session Initiation Protocol (SIP) application layer gateway (ALG)-specific statistics
information in the Cisco Quantum Flow Processor (QFP), use the
showplatformhardwareqfpfeaturealgstatisticssipcommand in privileged EXEC mode.
Tthe hardware module where the process whose trace level is being set is running. The following keywords are available:
carrier-card--The process is on an SPA Interface Processor (SIP).
forwarding-processor--The process is on an embedded services processor (ESP).
route-processor--The process is on an route processor (RP).
slot
The slot of the hardware module. Options are as follows:
number--The number of the SIP slot of the hardware module where the trace level is being set. For instance, if you want to specify the SIP in SIP slot 2 of the router, enter 2.
SIP-slot/SPA-bay--The number of the SIP router slot and the number of the shared port adapter (SPA) bay of that SIP. For instance, if you want to specify the SPA in bay 2 of the SIP in router slot 3, enter 3/2.
cppactive--The CPP in the active ESP.
cppstandby--The CPP in the standby ESP.
f0--The ESP in ESP slot 0.
f1--The ESP in ESP slot 1
fpactive--The active ESP.
fpstandby--The standby ESP.
r0--The RP in RP slot 0.
r1--The RP in RP slot 1.
rpactive--The active RP.
rpstandby--The standby RP.
qfpactive--The active Quantum Flow Processor (QFP)
Command Modes
Privileged EXEC (#)
Diagnostic (diag)
Command History
Release
Modification
Cisco IOS XE
Release 2.1
This command was introduced.
12.2(33)XND
This command was modified. The command output displays the truncated traceback message also.
Cisco IOS XE Release XE 3.1S
The qfpactive keywords were added.
Usage Guidelines
The showplatformsoftwaretracemessage command is used to display trace messages from an in-memory message ring of a module’s process that keeps a condensed historical record of all messages. Although all messages are saved in a trace log file unmodified, only the first 128 bytes of a message are saved in the message ring. The size limitation does not apply to the traceback portion of a message.
Examples
The following example shows how to display the trace messages for the Host Manager process in RP slot 0 using the showplatformsoftwaretracemessage command:
Router# show platform software trace message host-manager R0
08/23 12:09:14.408 [uipeer]: (info): Looking for a ui_req msg
08/23 12:09:14.408 [uipeer]: (info): Start of request handling for con 0x100a61c8
08/23 12:09:14.399 [uipeer]: (info): Accepted connection for 14 as 0x100a61c8
08/23 12:09:14.399 [uipeer]: (info): Received new connection 0x100a61c8 on descriptor 14
08/23 12:09:14.398 [uipeer]: (info): Accepting command connection on listen fd 7
08/23 11:53:57.440 [uipeer]: (info): Going to send a status update to the shell manager in slot 0
08/23 11:53:47.417 [uipeer]: (info): Going to send a status update to the shell manager in slot 0
The following example shows a truncated message that has a traceback. The truncated portion of the message is indicated by an ellipsis (...):
show redundancy application control-interface group
To display control interface information for a redundancy group, use the showredundancyapplicationcontrol-interfacegroup command in privileged EXEC mode.
(Optional) Redundancy group ID. Valid values are 1 and 2.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
Usage Guidelines
The showredundancyapplicationcontrol-interfacecommand shows information for the redundancy group control interfaces.
Examples
The following is sample output from the showredundancyapplicationcontrol-interface command:
Router# show redundancy application control-interface group 2
The control interface for rg[2] is GigabitEthernet0/1/0
Interface is Control interface associated with the following protocols: 2 1
BFD Enabled
Interface Neighbors:
Related Commands
Command
Description
showredundancyapplicationfaults
Displays fault-specific information for a redundancy group.
showredundancyapplicationgroup
Displays redundancy group information.
showredundancyapplicationif-mgr
Displays if-mgr information for a redundancy group.
showredundancyapplicationprotocol
Displays protocol-specific information for a redundancy group.
show redundancy application data-interface
To display data interface-specific information, use the showredundancyapplicationdata-interfacecommand in privileged EXEC mode.
(Optional) Redundancy group ID. Valid values are 1 and 2.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
Usage Guidelines
The showredundancyapplicationdata-interface command displays information about the redundancy group data interfaces.
Examples
The following is sample output from the showredundancyapplicationdata-interface command:
Router# show redundancy application data-interface group 1
The data interface for rg[1] is GigabitEthernet0/1/1
Related Commands
Command
Description
showredundancyapplicationcontrol-interface
Displays control interface information for a redundancy group.
showredundancyapplicationfaults
Displays fault-specific information for a redundancy group.
showredundancyapplicationgroup
Displays redundancy group information.
showredundancyapplicationif-mgr
Displays if-mgr information for a redundancy group.
showredundancyapplicationprotocol
Displays protocol-specific information for a redundancy group.
show redundancy application faults group
To display fault-specific information for a redundancy group, use the
showredundancyapplicationfaultsgroupcommand in privileged EXEC mode.
showredundancyapplicationfaultsgroup [group-id]
Syntax Description
group-id
(Optional) Redundancy group ID. Valid values are 1 and 2.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
Usage Guidelines
The
showredundancyapplicationfaultscommand shows information returned by redundancy group faults.
Examples
The following is sample output from the
showredundancyapplicationfaults command:
Router# show redundancy application faults group 2
Faults states Group 2 info:
Runtime priority: [150]
RG Faults RG State: Up.
Total # of switchovers due to faults: 2
Total # of down/up state changes due to faults: 2
Related Commands
Command
Description
showredundancyapplicationcontrol-interface
Displays control interface information for a redundancy group.
showredundancyapplicationgroup
Displays redundancy group information.
showredundancyapplicationif-mgr
Displays if-mgr information for a redundancy group.
showredundancyapplicationprotocol
Displays protocol-specific information for a redundancy group.
show redundancy application group
To display the redundancy group information, use the
showredundancyapplicationgroup command in privileged EXEC mode.
showredundancyapplicationgroup
[ group-id | all ]
Syntax Description
group-id
(Optional) Redundancy group ID. Valid values are 1 and 2.
all
(Optional) Display information about all redundancy groups.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
15.3(2)T
This command was integrated into Cisco IOS Release 15.3(2)T.
Usage Guidelines
Use the
showredundancyapplicationgroup command to display the current state of each interbox redundancy group on the device and the peer device.
Examples
The following is sample output from the
showredundancyapplicationgroupall command:
Device# show redundancy application group all
Faults states Group 1 info:
Runtime priority: [200]
RG Faults RG State: Up.
Total # of switchovers due to faults: 3
Total # of down/up state changes due to faults: 2
Group ID:1
Group Name:grp2
Administrative State: No Shutdown
Aggregate operational state : Up
My Role: ACTIVE
Peer Role: UNKNOWN
Peer Presence: No
Peer Comm: No
Peer Progression Started: No
RF Domain: btob-one
RF state: ACTIVE
Peer RF state: DISABLED
RG Protocol RG 1
------------------
Role: Active
Negotiation: Enabled
Priority: 200
Protocol state: Active
Ctrl Intf(s) state: Down
Active Peer: Local
Standby Peer: Not exist
Log counters:
role change to active: 2
role change to standby: 0
disable events: rg down state 1, rg shut 0
ctrl intf events: up 0, down 2, admin_down 1
reload events: local request 3, peer request 0
RG Media Context for RG 1
--------------------------
Ctx State: Active
Protocol ID: 1
Media type: Default
Control Interface: GigabitEthernet0/1/0
Hello timer: 5000
Effective Hello timer: 5000, Effective Hold timer: 15000
LAPT values: 0, 0
Stats:
Pkts 0, Bytes 0, HA Seq 0, Seq Number 0, Pkt Loss 0
Authentication not configured
Authentication Failure: 0
Reload Peer: TX 0, RX 0
Resign: TX 1, RX 0
Standby Peer: Not Present.
Faults states Group 2 info:
Runtime priority: [150]
RG Faults RG State: Up.
Total # of switchovers due to faults: 2
Total # of down/up state changes due to faults: 2
Group ID:2
Group Name:name1
Administrative State: No Shutdown
Aggregate operational state : Up
My Role: ACTIVE
Peer Role: UNKNOWN
Peer Presence: No
Peer Comm: No
Peer Progression Started: No
RF Domain: btob-two
RF state: ACTIVE
Peer RF state: DISABLED
RG Protocol RG 2
------------------
Role: Active
Negotiation: Enabled
Priority: 150
Protocol state: Active
Ctrl Intf(s) state: Down
Active Peer: Local
Standby Peer: Not exist
Log counters:
role change to active: 1
role change to standby: 0
disable events: rg down state 1, rg shut 0
ctrl intf events: up 0, down 2, admin_down 1
reload events: local request 2, peer request 0
RG Media Context for RG 2
--------------------------
Ctx State: Active
Protocol ID: 2
Media type: Default
Control Interface: GigabitEthernet0/1/0
Hello timer: 5000
Effective Hello timer: 5000, Effective Hold timer: 15000
LAPT values: 0, 0
Stats:
Pkts 0, Bytes 0, HA Seq 0, Seq Number 0, Pkt Loss 0
Authentication not configured
Authentication Failure: 0
Reload Peer: TX 0, RX 0
Resign: TX 0, RX 0
Standby Peer: Not Present.
The table below describes the significant fields shown in the display.
Table 54 show redundancy application group all Field Descriptions
Field
Description
Faults states Group 1 info
Redundancy group faults information for Group 1.
Runtime priority
Current priority of the redundancy group.
RG Faults RG State
Redundancy group state returned by redundancy group faults.
Total # of switchovers due to faults
Number of switchovers triggered by redundancy group fault events.
Total # of down/up state changes due to faults
Number of down and up state changes triggered by redundancy group fault events.
Group ID
Redundancy group ID.
Group Name
Redundancy group name.
Administrative State
Redundancy group state configured by users.
Aggregate operational state
Current redundancy group state.
My Role
Current role of the device.
Peer Role
Current role of the peer device.
Peer Presence
Indicates if the peer device is detected or not.
Peer Comm
Indicates the communication state with the peer device.
Peer Progression Started
Indicates if the peer device has started Redundancy Framework (RF) progression.
RF Domain
Name of the RF domain for the redundancy group.
Related Commands
Command
Description
showredundancyapplicationcontrol-interface
Displays control interface information for a redundancy group.
showredundancyapplicationfaults
Displays fault-specific information for a redundancy group.
showredundancyapplicationif-mgr
Displays if-mgr information for a redundancy group.
showredundancyapplicationprotocol
Displays protocol-specific information for a redundancy group.
show redundancy application if-mgr
To display interface manager information for a redundancy group, use the
showredundancyapplicationif-mgr command in privileged EXEC mode.
showredundancyapplicationif-mgrgroup [group-id]
Syntax Description
group
Specifies the redundancy group.
group-id
(Optional) Redundancy group ID. Valid values are 1 to 2.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
Usage Guidelines
The
showredundancyapplicationif-mgr command shows information of traffic interfaces protected by redundancy groups. When a traffic interface is functioning with the redundancy group, the state is no shut on the active device, and shut on the standby device. On the other hand, it is always shut on the standby device.
Examples
The following is sample output from the
showredundancyapplicationif-mgr command:
Router# show redundancy application if-mgr group 2
RG ID: 2
Interface VIP VMAC Shut Decrement
==========================================================
GigabitEthernet0/1/7 10.1.1.3 0007.b422.0016 no shut 50
GigabitEthernet0/3/1 11.1.1.3 0007.b422.0017 no shut 50
The table below describes the significant fields shown in the display.
Table 55 show redundancy application if-mgr Field Descriptions
Field
Description
RG ID
Redundancy group ID.
Interface
Interface name.
VIP
Virtual IP address for this traffic interface.
VMAC
Virtual MAC address for this traffic interface.
Shut
The state of this interface.
Note
It is always “shut” on the standby box.
Decrement
The decrement value for this interface. When this interface goes down, the runtime priority of its redundancy group decreases.
Related Commands
Command
Description
showredundancyapplicationcontrol-interface
Displays control interface information for a redundancy group.
showredundancyapplicationfaults
Displays fault-specific information for a redundancy group.
showredundancyapplicationgroup
Displays redundancy group information.
showredundancyapplicationprotocol
Displays protocol-specific information for a redundancy group
show redundancy application protocol
To display protocol-specific information for a redundancy group, use the
showredundancyapplicationprotocolcommand in privileged EXEC mode.
(explicit id )
show redundancy application protocol
{ protocol-id | group [group-id]
}
Syntax Description
protocol-id
Protocol ID. The range is from 1 to 8.
group
Specifies the redundancy group.
group-id
(Optional) Redundancy group ID. Valid values are 1 and 2.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
Usage Guidelines
The
showredundancyapplicationprotocolcommand shows information returned by redundancy group protocol.
Examples
The following is sample output from the
showredundancyapplicationprotocol command:
Router# show redundancy application protocol 3
Protocol id: 3, name:
BFD: ENABLE
Hello timer in msecs: 0
Hold timer in msecs: 0
The table below describes the significant fields shown in the display.
Table 56 show redundancy application protocol Field Descriptions
Field
Description
Protocol id
Redundancy group protocol ID.
BFD
Indicates whether the BFD protocol is enabled for the redundancy group protocol.
Hello timer in msecs
Redundancy group hello timer, in milliseconds, for the redundancy group protocol. The default is 3000 msecs.
Hold timer in msecs
Redundancy group hold timer, in milliseconds, for the redundancy group protocol. The default is 10000 msecs.
Related Commands
Command
Description
showredundancyapplicationgroup
Displays redundancy group information.
showredundancyapplicationcontrol-interface
Displays control interface information for a redundancy group.
showredundancyapplicationfaults
Displays fault-specific information for a redundancy group.
showredundancyapplicationif-mgr
Displays if-mgr information for a redundancy group.
show redundancy application transport
To display transport-specific information for a redundancy group, use the showredundancyapplicationtransportcommand in privileged EXEC mode.
showredundancyapplicationtransport
{ client | group [group-id] }
Syntax Description
client
Displays transport client-specific information.
group
Displays the redundancy group name.
group-id
(Optional) Redundancy group ID. Valid values are 1 and 2.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
Usage Guidelines
The showredundancyapplicationtransport command shows information for redundancy group transport.
Examples
The following is sample output from the showredundancyapplicationtransportgroup command:
Router# show redundancy application transport group 1
Transport Information for RG (1)
Related Commands
Command
Description
showredundancyapplicationcontrol-interface
Displays control interface information for a redundancy group.
showredundancyapplicationfaults
Displays fault-specific information for a redundancy group.
showredundancyapplicationgroup
Displays redundancy group information.
showredundancyapplicationif-mgr
Displays if-mgr information for a redundancy group.
showredundancyapplicationprotocol
Displays protocol-specific information for a redundancy group.
show running-config vrf
To display the subset of the running configuration of a router that is linked to a specific VPN routing and forwarding (VRF) instance or linked to all VRFs configured on the router, use the
showrunning-configvrf command in privileged EXEC mode.
showrunning-configvrf [vrf-name]
Syntax Description
vrf-name
(Optional) Name of the VRF configuration that you want to display.
Command Default
If you do not specify the name of a VRF configuration, the running configurations of all VRFs on the router are displayed.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.2(28)SB
This command was introduced.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2(33)SXH
This command was integrated into Cisco IOS Release 12.2(33)SXH.
12.4(20)T
This command was integrated into Cisco IOS Release 12.4(20)T.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Cisco IOS XE Release 3.5S
This command was modified. The output of the command was modified to display the Network Address Translation (NAT) configuration.
Usage Guidelines
Use the
showrunning-configvrf command to display a specific VRF configuration or to display all VRF configurations on the router. To display the configuration of a specific VRF, specify the name of the VRF.
This command displays the following elements of the VRF configuration:
The VRF submode configuration.
The routing protocol and static routing configurations associated with the VRF.
The configuration of interfaces in the VRF, which includes the configuration of any owning controller and physical interface for a subinterface.
Examples
The following is sample output from the
showrunning-configvrf command. It includes a base VRF configuration for VRF vpn3 and Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF) configurations associated with VRF vpn3.
Router# show running-config vrf vpn3
Building configuration...
Current configuration : 720 bytes
ip vrf vpn3
rd 100:1
route-target export 100:1
route-target import 100:1
!
!
interface GigabitEthernet0/0/1
description connected to nat44-1ru-ce1 g0/0/0
ip vrf forwarding vpn3
ip address 172.17.0.1 255.0.0.0
ip nat inside
shutdown
negotiation auto
!
interface GigabitEthernet0/0/3
no ip address
negotiation auto
!
interface GigabitEthernet0/0/3.2
encapsulation dot1Q 2
ip vrf forwarding vpn3
ip address 10.0.0.1 255.255.255.0
ip nat inside
!
router bgp 100
!
address-family ipv4 vrf vpn3
redistribute connected
redistribute static
exit-address-family
ip nat inside source route-map rm-vpn3 pool shared-pool vrf vpn3 match-in-vrf overload
ip nat pool shared-pool 10.0.0.2 10.0.0.254 prefix-length 24
!
router ospf 101 vrf vpn3
log-adjacency-changes
area 1 sham-link 10.43.43.43 10.23.23.23 cost 10
network 172.17.0.0 0.255.255.255 area 1
.
.
.
end
The table below describes the significant fields shown in the display.
Table 57 show running-config vrf Field Descriptions
Field
Description
Current configuration: 720 bytes
Indicates the number of bytes (720) in the VRF vpn3 configuration.
ip vrf vpn3
Indicates the name of the VRF (vpn3) for which the configuration is displayed.
rd 100:1
Identifies the route distinguisher (100:1) for VRF vpn3.
route-target export 100:1
route-target import 100:1
Specifies the route-target extended community for VRF vpn3.
Routes tagged with route-target export 100:1 are exported from VRF vpn3.
Routes tagged with the route-target import 100:1 are imported into VRF vpn3.
interface GigabitEthernet0/0/1
Specifies the interface associated with VRF vpn3.
ip vrf forwarding vpn3
Associates VRF vpn3 with the named interface.
ip address 172.17.0.1 255.0.0.0
Configures the IP address of the Gigabit Ethernet interface.
ip nat inside
Enables NAT of inside addresses.
router bgp 100
Sets up a BGP routing process for the router with the autonomous system number as 100.
address-family ipv4 vrf vpn3
Sets up a routing session for VRF vpn3 using the standard IPv4 address prefixes.
redistribute connected
Redistributes routes that are automatically established by the IP on an interface into the BGP routing domain.
ip nat pool
Defines a pool of IP addresses for NAT.
router ospf 101 vrf vpn3
Sets up an OSPF routing process and associates VRF vpn3 with OSPF VRF processes.
area 1 sham-link 10.43.43.43 10.23.23.23 cost 10
Configures a sham-link interface on a provider edge (PE) router in a Multiprotocol Label Switching (MPLS) VPN backbone.
1 is the ID number of the OSPF area assigned to the sham-link.
10.43.43.43 is the IP address of the source PE router.
10.23.23.23 is the IP address of the destination PE router.
10 is the OSPF cost to send IP packets over the sham-link interface.
network 172.17.0.0 0.255.255.255 area 1
Defines the interfaces on which OSPF runs and defines the area ID for those interfaces.
Related Commands
Command
Description
ipvrf
Configures a VRF routing table.
showipinterface
Displays the usability status of interfaces configured for IP.
showipvrf
Displays the set of defined VRFs and associated interfaces.
showrunning-configinterface
Displays the configuration for a specific interface.
sip address
To configure a Session Initiation Protocol (SIP) server IPv6 address to be returned in the SIP server’s IPv6 address list option to clients, use the sipaddresscommand in DHCP for IPv6 pool configuration mode. To disable this feature, use the no form of this command.
sipaddressipv6-address
nosipaddressipv6-address
Syntax Description
ipv6-address
An IPv6 address. The ipv6-address
argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
Command Default
No default behavior or values
Command Modes
DHCP for IPv6 pool configuration
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Cisco IOS XE Release 2.5
This command was updated. It was integrated into Cisco IOS XE Release 2.5.
Usage Guidelines
For the Dynamic Host Configuration Protocol (DHCP) for IPv6 server to obtain prefixes from RADIUS servers, the user must also configure the authorization, authentication, and accounting (AAA) client and PPP on the router. For information on how to configure the AAA client and PPP, see the "Implementing ADSL and Deploying Dial Access for IPv6" module.
The sipaddress command configures a SIP server IPv6 address to be returned in the SIP server’s IPv6 address list option to clients. To configure multiple SIP server addresses, issue this command multiple times. The new addresses will not overwrite old ones.
Examples
In the following example, the SIP server IPv6 address 2001:0db8::2 is configured to be returned in the SIP server’s IPv6 address list option to clients:
sip address 2001:0DB8::2
Related Commands
Command
Description
prefix-delegationaaa
Specifies that prefixes are to be acquired from AAA servers.
sipdomain-name
Configures an SIP server domain name to be returned in the SIP server’s domain name list option to clients.
sip domain-name
To configure a Session Initiation Protocol (SIP) server domain name to be returned in the SIP server’s domain name list option to clients, use the sipdomain-namecommand in DHCP for IPv6 pool configuration mode. To disable this feature, use the no form of this command.
sipdomain-namedomain-name
nosipdomain-namedomain-name
Syntax Description
domain-name
A domain name for a DHCP for IPv6 client.
Command Default
No default behavior or values.
Command Modes
DHCP for IPv6 pool configuration
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Cisco IOS XE Release 2.5
This command was updated. It was integrated into Cisco IOS XE Release 2.5.
Usage Guidelines
In order for the Dynamic Host Configuration Protocol (DHCP) for IPv6 server to obtain prefixes from RADIUS servers, the user must also configure the authorization, authentication, and accounting (AAA) client and PPP on the router. For information on how to configure the AAA client and PPP, see the "Implementing ADSL and Deploying Dial Access for IPv6" module.
The sipdomain-name command configures a SIP server domain name to be returned in the SIP server’s domain name list option to clients. To configure multiple SIP server domain names, issue this command multiple times. The new domain names will not overwrite old ones.
Examples
The following example configures the SIP server domain name sip1.cisco.com to be returned in the SIP server’s domain name list option to clients:
sip domain-name sip1.cisco.com
Related Commands
Command
Description
prefix-delegationaaa
Specifies that prefixes are to be acquired from AAA servers.
sipaddress
Configures a SIP server IPv6 address to be returned in the SIP server’s IPv6 address list option to clients.
snmp-server enable traps dhcp
To enable DHCP Simple Network Management Protocol (SNMP) trap notifications, use the snmp-serverenabletrapsdhcp command in global configuration mode. To disable DHCP trap notifications, use the no form of this command.
(Optional) Sends notification about duplicate IP addresses.
interface
(Optional) Sends notification that a per interface lease limit is exceeded.
pool
(Optional) Sends notification when address utilization for an address pool has risen above or fallen below a configurable threshold.
subnet
(Optional) Sends notification when address utilization for a subnet has risen above or fallen below a configurable threshold.
time
(Optional) Sends notification that the DHCP server has started or stopped.
Command Default
DHCP trap notifications are not sent.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SRC
This command was introduced.
Usage Guidelines
If you do not specify any of the optional keywords, all DHCP trap notifications are enabled.
Examples
The following example shows how to send SNMP trap notifications to the SNMP manager when the secondary subnet utilization falls below or exceeds the configured threshold:
Router(config)# ip dhcp pool pool2
Router(dhcp-config)# utilization mark high 80 log
Router(dhcp-config)# utilization mark low 70 log
Router(dhcp-config)# network 192.0.2.0 255.255.255.0
Router(dhcp-config)# network 192.0.4.0 255.255.255.252 secondary
Router(config-dhcp-subnet-secondary)# override utilization high 40
Router(config-dhcp-subnet-secondary)# override utilization low 30
!
Router(config)# snmp-server enable traps dhcp subnet
In the following example, all DHCP trap notifications will be sent to the SNMP manager in response to DHCP server events:
Router(config)# snmp-server enable traps dhcp
subnet prefix-length
To configure a subnet allocation pool and determine the size of subnets that are allocated from the pool, use the subnetprefix-length command in DHCP pool configuration mode. To unconfigure subnet pool allocation, use the no form of this command.
subnetprefix-lengthprefix-length
nosubnetprefix-lengthprefix-length
Syntax Description
prefix-length
Configures the IP subnet prefix length in classless interdomain routing (CIDR) bit count notation. The range is from 1 to 31.
Command Default
No default behavior or values.
Command Modes
DHCP pool configuration
Command History
Release
Modification
12.2(15)T
This command was introduced.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
Usage Guidelines
This command is used to configure a Cisco IOS router as a subnet allocation server for a centralized or remote Virtual Private Network (VPN) on-demand address pool (ODAP) manager. This command is configured under a DHCP pool. The prefix-length argument is used to determine the size of the subnets that are allocated from the subnet allocation pool. The values that can be configured for the prefix-length argument follow CIDR bit count notation format.
Configuring Global Subnet Pools
Global subnet pools are created in a centralized network. The ODAP server allocates subnets from the subnet allocation server based on subnet availability. When the ODAP manager allocates a subnet, the subnet allocation server creates a subnet binding. This binding is stored in the DHCP database for as long as the ODAP server requires the address space. The binding is destroyed and the subnet is returned to the subnet pool only when the ODAP server releases the subnet as address space utilization decreases.
Configuring VPN Subnet Pools
A subnet allocation server can be configured to assign subnets from VPN subnet allocation pools for Multiprotocol Label Switching (MPLS) VPN clients. VPN routes between the ODAP manager and the subnet allocation server are configured based on VRF name or VPN ID configuration. The VRF and VPN ID are configured to maintain routing information that defines customer VPN sites. This customer site is attached to a provider edge (PE) router. A VRF consists of an IP routing table, a derived Cisco Express Forwarding (CEF) table, a set of interfaces that use the forwarding table, and a set of rules and routing protocol parameters that control the information that is included in the routing table.
Configuring VPN Subnet Pools for VPN clients with VPN IDs
A subnet allocation server can also be configured to assign subnets from VPN subnet allocation pools based on the VPN ID of a client. The VPN ID (or Organizational Unique Identifier [OUI]) is a unique identifier assigned by the IEEE. VPN routes between the ODAP manager and the subnet allocation server are enabled by configuring the DHCP pool with a VPN ID that matches the VPN ID that is configured for the VPN client.
Examples
Examples
The following example configures a router to be a subnet allocation server and creates a global subnet allocation pool named GLOBAL-POOL from the 10.0.0.0 network. The configuration of the subnetprefix-length command in this example configures each subnet that is allocated from the subnet pool to support 254 host IP addresses.
ip dhcp pool GLOBAL-POOL
network 10.0.0.0 255.255.255.0
subnet prefix-length 24
Examples
The following example configures a router to be a subnet allocation server and creates a VPN routing and forwarding (VRF) subnet allocation pool named VRF-POOL from the 172.16.0.0 network and configures the VPN to match the VRF named pool1. The configuration of the subnetprefix-length command in this example configures each subnet that is allocated from the subnet pool to support 62 host IP addresses.
ip dhcp pool VRF-POOL
vrf pool1
network 172.16.0.0 /16
subnet prefix-length 26
Examples
The following example configures a router to be a subnet allocation server and creates a VRF subnet allocation pool named VPN-POOL from the 192.168.0.0 network and configures the VRF named abc. The VPN ID must match the unique identifier that is assigned to the client site. The route target and route distinguisher are configured in the as-number:network number format. The route target and route distinguisher must match. The configuration of the subnetprefix-length command in this example configures each subnet that is allocated from the subnet pool to support 30 host IP addresses.
ip vrf abc
rd 100:1
route-target both 100:1
vpn id 1234:123456
!
ip dhcp pool VPN-POOL
vrf abc
network 192.168.0.0 /24
subnet prefix-length /27
Related Commands
Command
Description
ipdhcpdatabase
Configures a Cisco IOS DHCP server to save automatic bindings on a remote host called a database agent.
ipdhcppool
Enables the IP address of an interface to be automatically configured when a DHCP pool is populated with a subnet from IPCP negotiation.
network(DHCP)
Configures the subnet number and mask for a DHCP address pool on a Cisco IOS DHCP server.
showipdhcppool
Displays information about the DHCP pools.
term ip netmask-format
To specify the format in which netmasks are displayed in show command output, use the termipnetmask-formatcommand inEXEC configuration mode. To restore the default display format, use the no form of this command.
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
IP uses a 32-bit
mask that indicates which address bits belong to the network and subnetwork fields, and which bits belong to the host field. This range of IP addresses is called a netmask. By default, show commands display an IP address and then its
netmask in dotted decimal notation. For example, a subnet would be displayed as 131.108.11.55 255.255.255.0.
However, you can specify that the display of the network mask appear in hexadecimal format or bit count format instead. The hexadecimal format is commonly used on UNIX systems. The previous example would be displayed as 131.108.11.55 0XFFFFFF00.
The bitcount format for displaying network masks is to append a slash (/) and the total number of bits in the netmask to the address itself. The previous example would be displayed as 131.108.11.55/24.
Examples
The following example specifies that network masks for the session be displayed in bitcount notation in the output of show commands:
term ip netmask-format bitcount
timers hellotime
To configure timers for hellotime and holdtime messages for a redundancy group, use the
timershellotimecommand in redundancy application protocol configuration mode. To disable the timers in the redundancy group, use the
no form of this command.
The hello time is an interval in which hello messages are sent. The holdtime is the time before the active or the standby device is declared to be in down state. Use the
msec keyword to configure the timers in milliseconds.
Note
If you allocate a large amount of memory to the log buffer (e.g. 1 GB), then the CPU and memory utilization of the router increases. This issue is compounded if small intervals are set for the hellotime and the holdtime. If you want to allocate a large amount of memory to the log buffer, we recommend that you accept the default values for the hellotime and holdtime. For the same reason, we also recommend that you do not use the preempt command.
Examples
The following example shows how to configure the hellotime and holdtime messages:
Configures clear text authentication and MD5 authentication for a redundancy group.
group(firewall)
Enters redundancy application group configuration mode.
name
Configures the redundancy group with a name.
preempt
Enables preemption on the redundancy group.
protocol
Defines a protocol instance in a redundancy group.
trusted-port (DHCPv6 Guard)
To configure a port to become a trusted port, use the
trusted-port command in Dynamic Host Configuration Protocol version 6 (DHCPv6) guard configuration mode. To disable this function, use the
no form of this command.
trusted-port
notrusted-port
Syntax Description
This command has no arguments or keywords.
Command Default
No ports are trusted.
Command Modes
DHCPv6 guard configuration (config-dhcp-guard)
Command History
Release
Modification
15.2(4)S
This command was introduced.
Usage Guidelines
When the
trusted-port command is enabled, messages received on ports that have this policy are not verified.
Examples
The following example defines a DHCPv6 guard policy name as policy1, places the router in DHCPv6 guard configuration mode, and sets the port to trusted:
To secure dynamic Address Resolution Protocol (ARP) entries in the ARP table to their corresponding DHCP bindings, use the updatearpcommand in DHCP pool configuration mode. To disable this command and change secure ARP entries to dynamic ARP entries, use the no form of this command.
updatearp
noupdatearp
Syntax Description
This command has no keywords or arguments.
Command Default
No default behavior or values.
Command Modes
DHCP pool configuration
Command History
Release
Modification
12.2(15)T
This command was introduced.
Usage Guidelines
The updatearp DHCP pool configuration command is used to secure ARP table entries and their corresponding DHCP leases. However, existing active leases are not secured. These leases will remain insecure until they are renewed. When the lease is renewed, it is treated as a new lease and will be secured automatically. If this feature is disabled on the DHCP server, all existing secured ARP table entries will automatically change to dynamic ARP entries.
This command can be configured only under the following conditions:
DHCP network pools in which bindings are created automatically and destroyed upon lease termination or when the client sends a DHCPRELEASE message.
Directly connected clients on LAN interfaces and wireless LAN interfaces.
The configuration of this command is not visible to the client. When this command is configured, secured ARP table entries that are created by a DHCP server cannot be removed from the ARP table by the cleararp-cache command. This is designed behavior. If a secure ARP entry created by the DHCP server must be removed, the clearipdhcpbinding command can be used. This command will clear the DHCP binding and secured ARP table entry.
Note
This command does not secure ARP table entries for BOOTP clients.
Examples
The following example configures the Cisco IOS DHCP server to secure ARP table entries to their corresponding DHCP leases within the DHCP pool named WIRELESS-POOL:
ip dhcp pool WIRELESS-POOL
update arp
Related Commands
Command
Description
cleararp-cache
Deletes all dynamic entries from the ARP cache.
clearipdhcpbinding
Deletes an automatic address binding from the Cisco IOS DHCP Server database.
update dns
To
dynamically update the Domain Name System (DNS) with address (A) and pointer (PTR) Resource Records (RRs) for some address pools, use the updatedns command in global configuration mode. To disable dynamic updates, use the no form of this command.
updatedns
[ both | never ]
[override] [before]
noupdatedns
[ both | never ]
[override] [before]
Syntax Description
both
(Optional) Dynamic Host Configuration Protocol (DHCP) server will perform Dynamic DNS (DDNS) updates for both PTR (reverse) and A (forward) RRs associated with addresses assigned from an address pool.
never
(Optional) DHCP server will not perform DDNS updates for any addresses assigned from an address pool.
override
(Optional) DHCP server will perform DDNS updates for PTR RRs associated with addresses assigned from an address pool, even if the DHCP client has specified in the fully qualified domain name (FQDN) option that the server should not perform updates.
before
(Optional) DHCP server will perform DDNS updates before sending the DHCP ACK back to the client. The default is to perform updates after sending the DHCP ACK.
Command Default
No updates are performed.
Command Modes
DHCP pool configuration
Command History
Release
Modification
12.3(8)YA
This command was introduced.
12.3(14)T
This command was integrated into Cisco IOS Release 12.3(14)T.
Usage Guidelines
If you configure the updatednsbothoverride command, the DHCP server will perform DDNS updates for both PTR and A RRs associated with addresses assigned from an address pool, even if the DHCP client specified in the FQDN that the server should not.
If the server is configured using this command with or without any of the other keywords, and if the server does not see an FQDN option in the DHCP interaction, then it will assume that the client does not understand DDNS and act as though it were configured to update both A and PTR records on behalf of the client.
Examples
The following example shows how to configure the DHCP to never update the A and PTR RRs:
update dns never
Related Commands
Command
Description
ipddnsupdatemethod
Specifies a method of DDNS updates of A and PTR RRs and the maximum interval between the updates.
utilization mark high
To configure the high utilization mark of the current address pool size, use the utilizationmarkhigh command in DHCP pool configuration mode. To remove the high utilization mark, use the no form of this command.
utilizationmarkhighpercentage-number [log]
noutilizationmarkhighpercentage-number [log]
Syntax Description
percentage-number
Percentage of the current pool size.
log
(Optional) Enables the logging of a system message.
Command Default
The default high utilization mark is 100 percent of the current pool size.
Command Modes
DHCP pool configuration
Command History
Release
Modification
12.2(8)T
This command was introduced.
12.4(4)T
The log keyword was added.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
Usage Guidelines
The current pool size is the sum of all addresses in all the subnets in the pool. If the utilization level exceeds the configured high utilization mark, the pool will schedule a subnet request.
This command can be used with both network and on-demand pools. However, in the case of a network pool, only the log option of this command can be used. In the case of an on-demand pool, the autogrowsizeoption of the origin command must be configured.
In certain network deployments, it is important for the network administrator to receive asynchronous notification when the DHCP pools are nearly exhausted so that preventive action can be taken. One common method for such notification is the generation of a system message.
If you use the log option, a system message can be generated for a DHCP pool when the pool utilization exceeds the configured high utilization threshold. A system message can also be generated when the pool's utilization is detected to be below the configured low utilization threshold.
Examples
The following example sets the high utilization mark to 80 percent of the current pool size:
utilization mark high 80
The following pool configuration using thelog keyword option generates a system message:
! ip dhcp pool abc
utilization mark high 30 log
utilization mark low 25 log
network 10.1.1.0 255.255.255.248
!
The following system message is generated when the second IP address is allocated from the pool:
00:02:01: %DHCPD-6-HIGH_UTIL: Pool "abc" is in high utilization state (2 addresses used out of 6). Threshold set at 30%.
The following system message is generated when one of the two allocated IP addresses is returned to the pool:
00:02:58: %DHCPD-6-LOW_UTIL: Pool "abc" is in low utilization state (1 addresses used out of 6). Threshold set at 25%.
Related Commands
Command
Description
origin
Configures an address pool as an on-demand address pool.
utilizationmarklow
Configures the low utilization mark of the current address pool size.
utilization mark low
To configure the low utilization mark of the current address pool size, use the utilizationmarklow command in DHCP pool configuration mode. To remove the low utilization mark, use the no form of this command.
utilizationmarklowpercentage-number
noutilizationmarklowpercentage-number
Syntax Description
percentage-number
Percentage of the current pool size.
Command Default
The default low utilization mark is 0 percent of the current pool size.
Command Modes
DHCP pool configuration
Command History
Release
Modification
12.2(8)T
This command was introduced.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
Usage Guidelines
The current pool size is the sum of all addresses in all the subnets in the pool. If the utilization level drops below the configured low utilization mark, a subnet release is scheduled from the address pool.
This command can be used with both network and on-demand pools. However, in the case of a network pool, only the log option of this command can be used. In the case of an on-demand pool, the autogrowsizeoption of the origin command must be configured.
In certain network deployments, it is important for the network administrator to receive asynchronous notification when the DHCP pools are nearly exhausted so that preventive action can be taken. One common method for such notification is the generation of a system message.
If you use the log option, a system message can be generated for a DHCP pool when the pool utilization exceeds the configured high utilization threshold. A system message can also be generated when the pool's utilization is detected to be below the configured low utilization threshold.
Examples
The following example sets the low utilization mark to 20 percent of the current pool size:
utilization mark low 20
Related Commands
Command
Description
origin
Configures an address pool as an on-demand address pool.
utilizationmarkhigh
Configures the high utilization mark of the current address pool size.
view (DNS)
To access or create the specified Domain Name System (DNS) view list member in the DNS view list and then enter DNS view list member configuration mode, use the view command in DNS view list configuration mode. To remove the specified DNS view list member from the DNS view list, use the no form of this command.
(Optional) The vrf-name argument specifies the name of the Virtual Private Network (VPN) routing and forwarding (VRF) instance associated with the DNS view. Default is the global VRF (that is, the VRF whose name is a NULL string).
Note
If the named VRF does not exist, a warning is displayed but the view is added to the view list anyway. The specified VRF can be defined after the view is added as a member of the view list (and after the view itself is defined).
Note
More than one DNS view can be associated with a VRF. To uniquely identify a DNS view, specify both the view name (or the default keyword) and the VRF with which it is associated.
default
Specifies that the DNS view is unnamed.
Note
More than one DNS view can be associated with a VRF. To uniquely identify a DNS view, specify both the view name (or the default keyword) and the VRF with which it is associated.
view-name
String (not to exceed 64 characters) that identifies the name of an existing DNS view.
Note
If the specified view does not exist, a warning is displayed but the default view list member is added anyway. The specified view can be defined after it is added as a member of DNS view list.
Note
More than one DNS view can be associated with a VRF. To uniquely identify a DNS view, specify both the view name (or the default keyword) and the VRF with which it is associated.
order-number
Integer from 1 to 2147483647 that specifies the order in which the DNS view is checked, with respect to other DNS views in the same DNS view list.
Tip
If the order-number values for the DNS views within a DNS view list are configured with large intervals between them (for example, by specifying order-number values such as 10, 20, and 30), additional DNS views can be inserted into the view list quickly without affecting the existing ordering or views in the view list. That is, adding a new view to the view list--or changing the ordering of existing views within the view list--does not require that existing views in the view list be removed from the view list and then added back to the list with new order-number values.
Command Default
No DNS view is accessed or created.
Command Modes
DNS view list configuration
Command History
Release
Modification
12.4(9)T
This command was introduced.
Usage Guidelines
This command enters DNS view list member configuration mode--for the specified view list member--so that usage restrictions can be configured for that view list member. If the DNS view list member does not exist yet, the specified DNS view is added to the DNS view list along with the value that indicates the order in which the view list member is to be checked (relative to the other DNS views in the view list) whenever the router needs to determine which DNS view list member to use to address a DNS query.
Note
The maximum number of DNS views and view lists supported is not specifically limited but is dependent on the amount of memory on the Cisco router. Configuring a larger number of DNS views and view lists uses more router memory, and configuring a larger number of views in the view lists uses more router processor time. For optimum performance, configure no more views and view list members than needed to support your Split DNS query forwarding or query resolution needs.
Note
The parameters {default | view-name} and [vrfvrf-name] identify an existing DNS view, as defined by using the ipdnsview command. More than one DNS view can be associated with a VRF. To uniquely identify a DNS view, specify both the view name and the VRF with which it is associated.
The view command can be entered multiple times to specify more than one DNS view in the DNS view list.
To display information about a DNS view list, use the showipdnsview-list command.
Subsequent Operations on a DNS View List Member
After you use the view command to define a DNS view list member and enter DNS view list member configuration mode, you can use any of the following commands to configure usage restrictions for the DNS view list member:
restrictauthenticated
restrictname-group
restrictsourceaccess-group
These optional, additional restrictions are based on query source authentication, the query hostname, and the query source host IP address, respectively. If none of these optional restrictions are configured for the view list member, the only usage restriction on the view list member is the usage restriction based on its association with a VRF.
Reordering of DNS View List Members
To provide for efficient management of the order of the members in a view list, each view list member definition includes the specification of the position of that member within the list. That is, the order of the members within a view list is defined by explicit specification of position values rather than by the order in which the individual members are added to the list. This enables you to add members to an existing view list or reorder the members within an existing view list without having to remove all the view list members and then redefine the view list membership in the desired order:
Examples
The following example shows how to add the view user3 to the DNS view list userlist5 and assign this view member the order number 40 within the view list. Next, the view user2, associated with the VRF vpn102 and assigned the order number 20 within the view list, is removed from the view list.
Router(config)# ip dns view-list userlist5
Router(cfg-dns-view-list)# view user3 40
Router(cfg-dns-view-list-member)# exit
Router(cfg-dns-view-list)# no view vrf vpn102 user2 20
Related Commands
Command
Description
ipdnsview-list
Enters DNS view list configuration mode so that DNS views can be added to or removed from the ordered list of DNS views.
restrictauthenticated
Restricts the use of the DNS view list member to DNS queries for which the DNS query host can be authenticated.
restrictname-group
Restricts the use of the DNS view list member to DNS queries for which the query hostname matches a particular DNS name list.
restrictsourceaccess-group
Restricts the use of the DNS view list member to DNS queries for which the query source IP address matches a particular standard ACL.
showipdnsview-list
Displays information about a particular DNS view list or about all configured DNS view lists.
vrf (DHCP pool)
To associate the on-demand address pool with a VPN routing and forwarding instance (VRF) name, use the vrf command in DHCP pool configuration mode. To remove the VRF name, use the no form of this command.
vrfname
novrfname
Syntax Description
name
Name of the VRF to which the address pool is associated.
Command Default
No default behavior or values
Command Modes
DHCP pool configuration
Command History
Release
Modification
12.2(8)T
This command was introduced.
Usage Guidelines
Associating a pool with a VRF allows overlapping addresses with other pools that are not on the same VRF. Only one pool can be associated with each VRF. If the pool is configured with theorigindhcp command or originaaa command, the VRF information is sent in the subnet request. If the VRF is configured with an RFC 2685 VPN ID, the VPN ID will be sent instead of the VRF name.
Examples
The following example associates the on-demand address pool with a VRF named pool1:
ip dhcp pool pool1
origin dhcp subnet size initial 24 autogrow 24
utilization mark high 85
utilization mark low 15
vrf pool1
Related Commands
Command
Description
origin
Configures an address pool as an on-demand address pool.
vrf (DHCPv6 pool)
To associate a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) address pool with a virtual private network (VPN) routing and forwarding (VRF) instance, use the vrf command in DHCPv6 pool configuration mode. To remove the VRF name, use the no form of this command.
vrfname
novrfname
Syntax Description
name
Name of the VRF with which the address pool is associated.
Command Default
No VRF is associated with the DHCPv6 address pool.
Command Modes
DHCPv6 pool configuration (config-dhcp)
Command History
Release
Modification
15.1(2)S
This command was introduced.
Cisco IOS XE Release 3.3S
This command was integrated into Cisco IOS XE Release 3.3S.
15.3(3)M
This command was integrated into Cisco IOS Release 15.3(3)M.
Examples
The following example shows how to configure an IPv6 pool named pool1, and associate pool1 with a VRF instance named vrf1:
Router(config)# ipv6 dhcp pool pool1
# vrf vrf1
Related Commands
Command
Description
ipv6dhcppool
Configures a DHCPv6 configuration information pool and enters DHCPv6 pool configuration mode.