![]() |
Cisco IOS IP Addressing Services Command Reference
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
lease through renew dhcp
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Contents
lease through renew dhcp leaseTo configure the duration of the lease for an IP address that is assigned from a Cisco IOS Dynamic Host Configuration Protocol (DHCP) server to a DHCP client, use the lease command in DHCP pool configuration mode. To restore the default value, use the no form of this command. Syntax Description
Command History
local-ip (IPC transport-SCTP local)To define at least one local IP address that is used to communicate with the local peer, use the local-ipcommand in IPC transport-SCTP local configuration mode. To remove one or all IP addresses from your configuration, use the no form of this command.
local-ip
device-real-ip-address
[device-real-ip-address2]
no
local-ip
device-real-ip-address
[device-real-ip-address2]
Syntax Description
Usage GuidelinesUse the local-ip command to help associate Stream Control Transmission Protocol (SCTP) as the transport protocol between the local and remote peer. This command is part of a suite of commands used to configure the Stateful Switchover (SSO) protocol. SSO is necessary for IP Security (IPSec) and Internet Key Exchange (IKE) to learn about the redundancy state of the network and to synchronize their internal application state with their redundant peers. local-portTo define the local Stream Control Transmission Protocol (SCTP) port that is used to communicate with the redundant peer, use the local-portcommand in SCTP protocol configuration mode. Usage GuidelinesThe local-port command enters IPC transport-SCTP local configuration mode, which allows you to specify at least one local IP address (via the local-ip command) that is used to communicate with the redundant peer. logging (cfg-dns-view)To enable logging of a system message logging (syslog) message each time the Domain Name System (DNS) view is used, use the logging command in DNS view configuration mode. To disable logging of a syslog message each time the DNS view is used, use the no form of this command. Usage GuidelinesThis command enables the logging of syslog messages for the DNS view. To display the logging setting for a DNS view, use the show ip dns view command. ExamplesThe following example shows how to enable logging of a syslog message each time the DNS view named user3 that is associated with the VRF vpn32 is used: Router(config)# ip dns view vrf vpn32 user3 Router(cfg-dns-view)# logging Related Commands
logging (DNS)To enable logging of a system message logging (syslog) message each time the Domain Name System (DNS) view is used, use the logging command in DNS view configuration mode. To disable logging of a syslog message each time the DNS view is used, use the no form of this command. Usage GuidelinesThis command enables the logging of syslog messages for the DNS view. To display the logging setting for a DNS view, use the show ip dns view command. ExamplesThe following example shows how to enable logging of a syslog message each time the DNS view named user3 that is associated with the VRF vpn32 is used: Router(config)# ip dns view vrf vpn32 user3 Router(cfg-dns-view)# logging Related Commands
logging server-arpTo enable the sending of Address Resolution Protocol (ARP) requests for syslog server address during system initialization bootup, use the logging server-arp command in global configuration mode. To disable the sending of ARP requests for syslog server addresses, use the no form of this command. Usage GuidelinesThe logging server-arp global configuration command allows the sending of ARP requests for syslog server addresses during system initialization bootup. When this CLI command is configured and saved to the startup configuration file, the system will send an ARP request for remote syslog server address before sending out the first syslog message. The command should only be used when the remote syslog server is in the same subnet as the system router sending the ARP request.
ExamplesThe following example shows how to enable an ARP request for syslog server addresses: Router# configure terminal Router(config)# logging server-arp Router(config)# exit The following example shows how to disable an ARP request for syslog server addresses: Router# configure terminal Router(config)# no logging server-arp Router(config)# exit mac packet-classifyTo classify Layer 3 packets as Layer 2 packets, use the mac packet-classify command in interface configuration mode. To return to the default settings, use the no form of this command. Usage GuidelinesThis command is not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 2. You can configure these interface types for multilayer MAC access control list (ACL) quality of service (QoS) filtering:
The ingress traffic that is permitted or denied by a MAC ACL on an interface configured for multilayer MAC ACL QoS filtering is processed by egress interfaces as MAC-layer traffic. You cannot apply egress IP ACLs to traffic that was permitted or denied by a MAC ACL on an interface configured for multilayer MAC ACL QoS filtering. Microflow policing does not work on interfaces that have the mac packet-classify command enabled. The mac packet-classify command causes the Layer 3 packets to be classified as Layer 2 packets and disables IP classification. Traffic is classified based on 802.1Q class of service (CoS), trunk VLAN, EtherType, and MAC addresses. ExamplesThis example shows how to classify incoming and outgoing Layer 3 packets as Layer 2 packets:
Router(config-if)# mac packet-classify
Router(config-if)#
This example shows how to disable the classification of incoming and outgoing Layer 3 packets as Layer 2 packets:
Router(config-if)# no mac packet-classify
Router(config-if)#
This example shows how to enforce Layer 2 policies on BPDU packets:
Router(config-if)# mac packet-classify bpdu
Router(config-if)#
This example shows how to disable Layer 2 policies on BPDU packets:
Router(config-if)# no mac packet-classify bpdu
Router(config-if)#
mac packet-classify use vlanTo enable VLAN-based quality of service (QoS) filtering in the MAC access control lists (ACLs), use the mac packet-classify use vlan command in global configuration mode. To return to the default settings, use the no form of this command. Usage GuidelinesThis command is supported in PFC3BXL or PFC3B mode only. This command is not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 2. You must use the no mac packet-classify use vlan command to disable the VLAN field in the Layer 2 key if you want to apply QoS to the Layer 2 Service Advertising Protocol (SAP)-encoded packets (for example, Intermediate System-to-Intermediate System [IS-IS] and Internet Packet Exchange [IPX]). QoS does not allow policing of non-Advanced Research Protocol Agency (ARPA) Layer 2 packets (for example, IS-IS and IPX) if the VLAN field is enabled. nameTo configure the redundancy group with a name, use the namecommand in redundancy application group configuration mode. To remove the name of a redundancy group, use the no form of this command. nat64 enableTo enable stateless Network Address Translation 64 (NAT64) on an interface, use the nat64 enable command in interface configuration mode. To disable the NAT64 configuration on an interface, use the no form of this command. nat64 prefixTo assign a global or interface-specific Network Address Translation 64 (NAT64) stateless prefix, use the nat64 prefix command in global configuration or interface configuration mode. To disable the configuration, use the no form of this command. Syntax Description
Usage GuidelinesThe nat64 prefix stateless command uses a prefix and prefix length for IPv4-translatable IPv6 addresses. Use the nat64 prefix stateless command in global configuration mode to assign a global NAT64 stateless prefix or in interface configuration mode to assign an unique NAT64 stateless prefix for each interface. In interface configuration mode, a stateless prefix should be configured on an IPv6-facing interface. All packets coming to an IPv6 interface are matched against the configured prefix, and the matched packets are translated to IPv4. Similarly, the packets that the IPv6 interface sends use the stateless prefix to construct the source and destination IPv6 address.
If NAT64 is enabled on an interface that does not have a stateless prefix configured, then the global stateless prefix is used. However, if a global prefix and an interface prefix are configured, then the interface prefix is used for stateless NAT64 translation. The use of a stateless prefix on an interface has priority over the configured global stateless prefix. ExamplesThe following example shows how to configure a global NAT64 stateless prefix: Router# configure terminal Router(config)# nat64 prefix stateless 2001::7001:10A/96 Router(config)# end The following example shows how to assign a NAT64 stateless prefix for a Gigabit Ethernet interface: Router# configure terminal Router(config)# interface gigabitethernet0/0/0 Router(config-if)# nat64 prefix stateless 2001:0DB8:0:1::/96 Router(config-if# end nat64 routeTo specify the Network Address Translation 64 (NAT64) stateless prefix to which an IPv4 prefix should be translated, use the nat64 route command in global configuration mode. To disable the configuration, use the no form of this command. Syntax Description
Usage GuidelinesA prefix that is configured on an interface is used as the stateless prefix on that interface. If no interface-specific prefix is configured, the configured global prefix is used for NAT64 translation. netbios-name-serverTo configure NetBIOS Windows Internet Naming Service (WINS) name servers that are available to Microsoft Dynamic Host Configuration Protocol (DHCP) clients, use the netbios-name-server command in DHCP pool configuration. To remove the NetBIOS name server list, use the no form of this command. Command History
Usage GuidelinesOne IP address is required, although you can specify up to eight addresses in one command line. Servers are listed in order of preference (address1 is the most preferred server, address2 is the next most preferred server, and so on). ExamplesThe following example specifies the IP address of a NetBIOS name server available to the client: netbios-name-server 10.12.1.90 Related Commands
netbios-node-typeTo configure the NetBIOS node type for Microsoft Dynamic Host Configuration Protocol (DHCP) clients, use the netbios-node-type command in DHCP pool configuration mode. To remove the NetBIOS node type, use the no form of this command. Command History
network (DHCP)To configure the network number and mask for a Dynamic Host Configuration Protocol (DHCP) address pool primary or secondary subnet on a Cisco IOS DHCP server, use the network command in DHCP pool configuration mode. To remove the subnet number and mask, use the no form of this command. Syntax DescriptionCommand History
Usage GuidelinesThis command is valid for DHCP subnetwork address pools only. The DHCP server assumes that all host addresses are available. The system administrator can exclude subsets of the address space by using the ip dhcp excluded-address global configuration command. However, the ip dhcp excluded-address command cannot be used to exclude addresses from virtual routing and forwarding (VRF)-associated pools. You cannot configure manual bindings within the same pool that is configured with the network command. If a default router list is configured for the pool or subnet from which the address was allocated, the DHCP server selects an IP address from that default router list and provides it to the client. The DHCP client uses that router as the first hop for forwarding messages. Removing a secondary subnet also removes the default router list for that subnet. Removing the primary subnet removes only the primary subnet definition but not the network-wide default router list. To display the DHCP address pool information configured by the network command, use the show ip dhcp pool command. ExamplesThe following example shows how to configure 172.16.0.0/12 as the subnetwork number and mask of the DHCP pool named pool1. The IP addresses in pool1 range from 172.16.0.0 to 172.31.255.255. Router(config)# ip dhcp pool pool1 Router(dhcp-config)# network 172.16.0.0 255.240.0.0 The following example shows how to configure 192.0.2.0/24 as the subnetwork number and mask of the DHCP pool named pool2 and then add the DHCP pool secondary subnet specified by the subnet number and mask 192.0.4.0/30. The IP addresses in pool2 consist of two unconnected subnets: the addresses from 192.0.2.1 to 192.0.2.254 and the addresses from 192.0.4.1 to 192.0.4.2. Router(config)# ip dhcp pool pool2 Router(dhcp-config)# network 192.0.2.0 255.255.255.0 Router(dhcp-config)# network 192.0.4.0 255.255.255.252 secondary Related Commands
next-serverTo configure the next server in the boot process of a Dynamic Host Configuration Protocol (DHCP) client, use the next-server command in DHCP pool configuration. To remove the boot server list, use the no form of this command. Syntax Description
Command DefaultIf the next-server command is not used to configure a boot server list, the DHCP Server uses inbound interface helper addresses as boot servers. Command History
Usage GuidelinesYou can specify up to eight servers in the list. Servers are listed in order of preference (address1 is the most preferred server, address2 is the next most preferred server, and so on). ExamplesThe following example specifies 10.12.1.99 as the IP address of the next server in the boot process: next-server 10.12.1.99 Related Commands
optionTo configure Dynamic Host Configuration Protocol (DHCP) server options, use the option command in DHCP pool configuration mode. To remove the options, use the no form of this command.
option
code
[instance number]
{ascii string | hex {string | none} | ip address}
no
option
code
[instance number]
Syntax Description
Command History
Usage GuidelinesDHCP provides a framework for passing configuration information to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that are stored in the options field of the DHCP message. The data items themselves are also called options. The current set of DHCP options are documented in RFC 2131, Dynamic Host Configuration Protocol. ExamplesThe following example configures DHCP option 19, which specifies whether the client should configure its IP layer for packet forwarding. A value of 0 means disable IP forwarding; a value of 1 means enable IP forwarding. IP forwarding is enabled in the following example: Router(config)# ip dhcp pool red Router(dhcp-config)# option 19 hex 01 The following example configures DHCP option 72, which specifies the World Wide Web servers for DHCP clients. World Wide Web servers 172.16.3.252 and 172.16.3.253 are configured in the following example: Router(config)# ip dhcp pool red Router(dhcp-config)# option 72 ip 172.16.3.252 172.16.3.253 option hexTo enable the Cisco IOS relay agent to make forwarding decisions based on DHCP options inserted in the client-generated DHCP message, use the option hexcommand in DHCP class configuration mode. To disable this functionality, use the no form of this command.
option
code
hex
hex-pattern
[*]
[bit bit-mask-pattern]
no
option
code
hex
hex-pattern
[*]
[mask bit-mask-pattern]
Syntax Description
Usage GuidelinesThe option hex command enhances DHCP class support to allow the relay agent to relay client-generated messages to different DHCP servers based on the content of the following four options:
Each option identifies the type of client sending the DHCP message. The table below describes the CLI variations possible for the hex hex-pattern keyword and argument combination.
You must know the hexadecimal value of each byte location in the options to be able to configure the option hex command. The format may vary from product to product. Contact the relay agent vendor for this information. ExamplesIn the following example, client-generated DHCP messages containing option 60 and belonging to class VOIP will be forwarded to the DHCP server located at 10.30.5.1: ! ip dhcp class VOIP option 60 hex 010203 ! ! The following is the relay pool ip dhcp pool red relay source 10.2.2.0 255.255.255.0 class VOIP relay target 10.30.5.1 originTo configure an address pool as an on-demand address pool (ODAP) or static mapping pool, use the origin command in DHCP pool configuration mode. To disable the ODAP, use the no form of this command.
origin
{dhcp | aaa | ipcp | file url}
[subnet size initial size [autogrow size] ]
no
origin
{dhcp | aaa | ipcp | file url}
[subnet size initial size [autogrow size] ]
Syntax Description
Usage GuidelinesIf you do not configure the pool as an autogrow pool, the pool will not request additional subnets if one subnet is already in the pool. Use the dhcp keyword to obtain subnets from DHCP, the aaa keyword to obtain subnets from the AAA server, and the ipcp keyword to obtain subnets from IPCP negotiation. If you expect that the utilization of the pool may grow over time, use the autogrow size option. If a pool has been configured with the autogrow size option, ensure that the source server is capable of providing more than one subnet to the same pool. Even though the Cisco IOS software specifies the requested subnet size, it can accept any offered subnet size from the source server. ExamplesThe following example shows how to configure an address pool named green to use DHCP as the subnet allocation protocol with an initial subnet size of 24 and an autogrow subnet size of 24: ip dhcp pool pool1 vrf pool1 origin dhcp subnet size initial /24 autogrow /24 utilization mark high 80 utilization mark low 20 The following example shows how to configure the location of the external text file: ip dhcp pool abcpool origin file tftp://10.1.0.1/staticbindingfile override default-routerTo define a default router list for the DHCP pool secondary subnet, use the override default-router command in DHCP pool secondary subnet configuration mode. To remove the default router list for this secondary subnet, use the no form of this command. Syntax Description
Usage GuidelinesWhen an IP address is assigned to the DHCP client from a secondary subnet for which no subnet-specific default router list is defined, the default router list (configured by using the default-router command in DHCP pool configuration mode) will be used. The IP address of every router in the list should be on the same subnet as the client subnet. You can specify up to eight routers in the list. Routers are listed in order of preference (address is the most preferred router, address2 is the next most preferred router, and so on). To display the default router lists, use the show running-config command. If default router lists are configured for a DHCP pool, the commands used to configure those lists are displayed following the ip dhcp pool command that configures the DHCP pool. ExamplesThe following example configures 10.1.1.1/29 as the subnetwork number and mask of the DHCP pool named pool1, adds the DHCP pool secondary subnet specified by the subnet number and mask 10.1.1.17/29, then configures a subnet-specific default router list for that subnet: Router(config)# dhcp pool pool1 Router(config-dhcp)# network 10.1.1.1 255.255.255.248 Router(config-dhcp)# network 10.1.1.17 255.255.255.248 secondary Router(config-dhcp-secondary-subnet)# override default-router 10.1.1.100 10.1.1.200 override utilization highTo configure the high utilization mark of the current secondary subnet size, use the override utilization high command in DHCP pool secondary subnet configuration mode. To remove the high utilization mark, use the no form of this command. Usage GuidelinesIf you use the utilization mark {high | low} log command, a system message can be generated for a DHCP secondary subnet when the subnet utilization exceeds the configured high utilization threshold. A system message can also be generated when the subnetâs utilization is detected to be below the configured low utilization threshold. The override utilization high command overrides the value specified by the utilization mark high global configuration command. ExamplesThe following example shows how to set the high utilization mark of the secondary subnet to 40 percent of the current subnet size: Router(config)# ip dhcp pool pool2 Router(dhcp-config)# utilization mark high 80 log Router(dhcp-config)# utilization mark low 70 log Router(dhcp-config)# network 192.0.2.0 255.255.255.0 Router(dhcp-config)# network 192.0.4.0 255.255.255.252 secondary Router(config-dhcp-subnet-secondary)# override utilization high 40 Router(config-dhcp-subnet-secondary)# override utilization low 30 override utilization lowTo configure the low utilization mark of the current secondary subnet size, use the override utilization low command in DHCP pool secondary subnet configuration mode. To remove the low utilization mark, use the no form of this command. Usage GuidelinesIf you use the utilization mark{high| low} log command, a system message can be generated for a DHCP secondary subnet when the subnet utilization falls below the configured low utilization threshold. A system message can also be generated when the subnetâs utilization exceeds the configured high utilization threshold. The override utilization low command overrides the value specified by the utilization mark low global configuration command. ExamplesThe following example shows how to set the low utilization mark of the secondary subnet to 30 percent of the current subnet size: Router(config)# ip dhcp pool pool2 Router(dhcp-config)# utilization mark high 80 log Router(dhcp-config)# utilization mark low 70 log Router(dhcp-config)# network 192.0.2.0 255.255.255.0 Router(dhcp-config)# network 192.0.4.0 255.255.255.252 secondary Router(config-dhcp-subnet-secondary)# override utilization high 40 Router(config-dhcp-subnet-secondary)# override utilization low 30 priority (firewall)To specify a group priority and failover threshold value in a redundancy group, use the priority command in redundancy application group configuration mode. To disable the priority value of a group, use the no form of this command. Usage GuidelinesThe priority of the redundancy group is used to determine a redundancy groupâs active or standby role on the configured node. The failover threshold is used to determine when a switchover must occur. After the priority is set under threshold, the active redundancy group gives up its role. ExamplesThe following example shows how to configure the priority value and threshold value for the redundancy group named group1: Router# configure terminal Router(config)# redundancy Router(config-red)# application redundancy Router(config-red-app)# group 1 Router(config-red-app-grp) priority 100 failover-threshold 90 protocolTo define a protocol instance in a redundancy group, use the protocolcommand in redundancy application configuration mode. To remove the protocol instance from the redundancy group, use the no form of this command. Usage GuidelinesProtocol configuration is used to configure timers and authentication method for a control interface. Thus, a protocol instance is attached to the control interface. ExamplesThe following example shows how to configure a protocol named protocol 1 to a redundancy group: Router# configure terminal Router(config)# redundancy Router(config-red)# application redundancy Router(config-red-app)# protocol 1 Router(config-red-app-prtcl)# Related Commands
rbe nasipTo specify the IP address of an interface on the DHCP relay agent that will be sent to the DHCP server via the agent remote ID option, use the rbe nasip command in global configuration mode. To remove the specification, use the no form of this command. Usage GuidelinesThe rbe nasip command is used to configure support for the DHCP relay agent information option (option 82) for an ATM routed bridge encapsulation (RBE). Support for the DHCP relay agent information option must be configured on the DHCP relay agent using the ip dhcp relay information option command for the rbe nasip command to be effective. ExamplesThe following example shows how to enable support for DHCP option 82 on the DHCP relay agent by using the ip dhcp relay information option command. The rbe nasip command configures the router to forward the IP address for Loopback0 to the DHCP server. ATM RBE is configured on ATM subinterface 4/0.1. ip dhcp-server 10.1.1.1 ! ip dhcp relay information option ! interface Loopback0 ip address 10.5.1.1 255.255.255.0 ! interface ATM 4/0 no ip address ! interface ATM 4/0.1 point-to-point ip unnumbered Loopback0 ip helper-address 10.1.1.1 atm route-bridged ip pvc 88/800 encapsulation aal5snap ! router eigrp 100 network 10.0.0.0 ! rbe nasip loopback 0 redundancyTo enter redundancy configuration mode, use the redundancycommand in global configuration mode. This command does not have a no form. Command History
Usage GuidelinesUse the redundancy command to enter redundancy configuration mode, where you can define aspects of redundancy such as shelf redundancy for the Cisco AS5800 universal access server. Cisco 10000 Series Router Before configuring line card redundancy, install the Y-cables. Before deconfiguring redundancy, remove the Y-cables. The following restrictions apply to line card redundancy on the Cisco 10000 series router:
Cisco 7600 Series Router From redundancy configuration mode, you can enter the main CPU submode to manually synchronize the configurations that are used by the two supervisor engines. From the main CPU submode, you can use the auto-sync command to use all the redundancy commands that are applicable to the main CPU. To select the type of redundancy mode, use the mode command. Nonstop forwarding (NSF) with stateful switchover (SSO) redundancy mode supports IPv4. NSF with SSO redundancy mode does not support IPv6, Internetwork Packet Exchange (IPX), and Multiprotocol Label Switching (MPLS). After you enter redundancy configuration mode, you can use the interchassis command to specify the redundancy group number and enter interchassis redundancy mode. In the interchassis redundancy configuration mode, you can do the following:
Cisco uBR10012 Universal Broadband Router After you enter redundancy configuration mode, you can use the main-cpu command to enter main-CPU redundancy configuration mode, which allows you to specify which files are synchronized between the active and standby Performance Routing Engine (PRE) modules. Cisco RF Gateway 10 At the redundancy configuration mode, you can do the following:
ExamplesThe following example shows how to enable redundancy mode:
Router(config)# redundancy
Router(config-red)#
The following example shows how to assign the configured router shelf to the redundancy pair designated as 25. This command must be issued on both router shelves in the redundant router-shelf pair: Router(config)# redundancy Router(config-red)# failover group-number 25 ExamplesThe following example shows how to configure two 4-port channelized T3 half eight line cards that are installed in line card slot 2 for one-to-one redundancy: Router(config)# redundancy Router(config-r)# linecard-group 1 y-cable Router(config-r-lc)# member subslot 2/1 primary Router(config-r-lc)# member subslot 2/0 secondary ExamplesThe following example shows how to enter the main CPU submode: Router(config)# redundancy Router(config-r)# main-cpu Router(config-r-mc)# ExamplesThe following example shows how to enter redundancy configuration mode and display the commands that are available in that mode on the Cisco uBR10012 router: Router# configure terminal Router(config)# redundancy Router(config-r)# ? Redundancy configuration commands: associate Associate redundant slots exit Exit from redundancy configuration mode main-cpu Enter main-cpu mode no Negate a command or set its defaults The following example shows how to enter redundancy configuration mode and displays its associated commands on the Cisco RFGW-10 chassis: Router# configure terminal Router(config)# redundancy Router(config-r)#? Redundancy configuration commands: default Set a command to its defaults exit Exit from redundancy configuration mode linecard-group Enter linecard redundancy submode main-cpu Enter main-cpu mode mode redundancy mode for this chassis no Negate a command or set its defaults policy redundancy policy enforcement The following example shows how to enter redundancy configuration mode and its associated commands in the interchassis mode: Router# configure terminal Router(config)# redundancy Router(config-r)#? Redundancy configuration commands: exit Exit from redundancy configuration mode interchassis Enter interchassis mode no Negate a command or set its defaults Router(config-r)# interchassis group 100 R1(config-r-ic)# ? Interchassis redundancy configuration commands: backbone specify a backbone interface for the redundancy group exit Exit from interchassis configuration mode member specify a redundancy group member mlacp mLACP interchassis redundancy group subcommands monitor define the peer monitoring method no Negate a command or set its defaults Related Commands
redundancy groupTo configure fault tolerance for the mobile router, use the redundancy group command in mobile router configuration mode. To disable this functionality, use the no form of this command. Usage GuidelinesThe redundancy group command provides f ault tolerance by selecting one mobile router in the redundancy group name argument to provide connectivity for the mobile networks. This mobile router is in the active state. The other mobile routers are passive and wait until the active mobile router fails before a new active mobile router is selected. Only the active mobile router registers and sets up proper routing for the mobile networks. The redundancy state is either active or passive. relay agent informationTo enter relay agent information option configuration mode, use the relay agent informationcommand in DHCP class configuration mode. To disable this functionality, use the no form of this command. Usage GuidelinesIf this command is omitted for Dynamic Host Configuration Protocol (DHCP) class-based address allocation, then the DHCP class matches to any relay agent information option, whether it is present or not. Using the no relay agent information command removes all patterns in the DHCP class configured by the relay-information hex command. ExamplesThe following example shows the relay information patterns configured for DHCP class 1. ip dhcp class CLASS1 relay agent information relay-information hex 01030a0b0c02050000000123 relay-information hex 01030a0b0c02* relay-information hex 01030a0b0c02050000000000 bitmask 0000000000000000000000FF ip dhcp class CLASS2 relay agent information relay destinationTo configure an IP address for a relay destination to which packets are forwarded by a Dynamic Host Configuration Protocol (DHCP) relay agent functioning as a DHCP server, use the relay destination command in DHCP pool configuration mode. To disable the IP address, use the no form of this command.
relay
destination
[vrf vrf-name | global]
ip-address
no
relay
destination
[vrf vrf-name | global]
ip-address
Syntax Description
Usage GuidelinesThe relay destination command serves the same function as the relay targetcommand, except that the relay target command specifies the DHCP server to which packets should be forwarded only for the class under which it is configured, and the relay destination command specifies the DHCP server to which packets should be forwarded for the pool itself. The relay target command overrides the relay destination command in cases in which the configured class name has been specified by the service gateway (SG). When using the relay destination command, the ip-address argument is assumed to be in the same VRF as the address pool under which the command was configured. If the relay destination IP address is in a different VRF, or in the global address space, then the vrf vrf-name or global keywords need to be specified. relay sourceTo configure an IP address for a relay source from which packets are forwarded by a Dynamic Host Configuration Protocol (DHCP) server, use the relay source command in DHCP-pool configuration mode. To disable the IP address, use the no form of this command. relay targetTo configure an IP address for a relay target to which packets are forwarded by a Dynamic Host Configuration Protocol (DHCP) server, use the relay targetcommand in DHCP pool class configuration mode. To disable the IP address, use the no form of this command. Syntax Description
Usage GuidelinesThe relay target command serves the same function as the relay destination command, except that the relay target command specifies the DHCP server to which packets should be forwarded only for the class under which it is configured, and the relay destination command specifies the DHCP server to which packets should be forwarded for the pool itself. The relay target command overrides the relay destination command in cases in which the configured class name has been specified by the SG. ExamplesThe following example shows how to configure a relay target if a service gateway (SG)-supplied class name is used to select a DHCP server to which packets are relayed: ip dhcp pool abc1 relay source 10.0.0. 255.255.0.0. relay destination 10.5.1.1 class classname1 relay target 10.1.1.1 class classname2 relay target 10.2.2.2 class classname3 In the above example, classname1 relays the DHCP DISCOVER packet to the server at 10.1.1.1, while classname2 relays the DHCP DISCOVER packet to the server at 10.2.2.2. If the SG returned classname3, then the default pool at 10.5.1.1 is used. If the SG returns any other class name other than classname1, classname2, or classname3, then no relay action is taken. The relay target configuration with respect to any configured DHCP pool works in the exact same way as a relay destination configuration works. relay-information hexTo specify a hexadecimal string for the full relay agent information option, use the relay-information hex command in relay agent information option configuration mode. To remove the configuration, use the no form of this command.
relay-information
hex
pattern
[*]
[bitmask mask]
no
relay-information
hex
pattern
[*]
[bitmask mask]
Usage GuidelinesThe relay-information hex command sets a pattern that is used to match against defined DHCP classes. You can configure multiple relay-information hex commands for a DHCP class. This is useful to specify a set of relay information options that can not be summarized with a wildcard or a bitmask. The pattern itself, excluding the wildcard, must contain a whole number of bytes (a byte is two hexadecimal numbers). For example, 010203 is 3 bytes (accepted) and 01020 is 2.5 bytes (not accepted). If you omit this command, no pattern is configured and it is considered a match to any relay agent information value, but the relay information option must be present in the DHCP packet. You must know the hexadecimal value of each byte location in option 82 to be able to configure the relay- information hex command. The option 82 format may vary from product to product. Contact the relay agent vendor for this information. ExamplesThe following example shows the configured relay agent information patterns. Note that CLASS 2 has no pattern configured and will âmatch to anyâ class. ip dhcp class CLASS1 relay agent information relay-information hex 01030a0b0c02050000000123 relay-information hex 01030a0b0c02* relay-information hex 01030a0b0c02050000000000 bitmask 0000000000000000000000FF ip dhcp class CLASS2 relay agent information release dhcpTo perform an immediate release of a Dynamic Host Configuration Protocol (DHCP) lease for an interface, use the release dhcp command in user EXEC or privileged EXEC mode. Usage GuidelinesThe release dhcp command immediately releases the DHCP lease on the interface specified by the interface-typeand interface-numberarguments. If the router interface was not assigned a DHCP IP address by the DHCP server, the release dhcp command fails and displays the following error message: Interface does not have a DHCP originated address This command does not have a no form. ExamplesThe following example shows how to release a DHCP lease for an interface. release dhcp ethernet 3/1 Related Commands
remote commandTo execute a Cisco 7600 series router command directly on the switch console or a specified module without having to log into the Cisco 7600 series router first, use the remote command command in privileged EXEC mode. Command History
Usage GuidelinesThe module num keyword and argument designate the module number. Valid values depend on the chassis that is used. For example, if you have a 13-slot chassis, valid values are from 1 to 13. The module num keyword and argument are supported on DFC-equipped modules and the standby supervisor engine only. When you execute the remote command switch command, the prompt changes to Switch-sp#. This command is supported on DFC-equipped modules and the supervisor engine only. This command does not support command completion, but you can use shortened forms of the command (for example, entering sh for show). remote loginTo access the Cisco 7600 router console or a specific module, use the remote login command in privileged EXEC mode. Command History
Usage Guidelines
The module num keyword and argument designate the module number. Valid values depend on the chassis that is used. For example, if you have a 13-slot chassis, valid values are from 1 to 13. The module num keyword and argument are supported on DFC-equipped modules and the standby supervisor engine only. When you execute the remote login module num command, the prompt changes to Router-dfcx# or Switch-sp#, depending on the type of module to which you are connecting. When you execute the remote login standby-rp command, the prompt changes to Router-sdby#. When you execute the remote login switch command, the prompt changes to Switch-sp#. The remote login module num command is identical to the attach command. There are two ways to end the session:
Switch-sp# exit
[Connection to Switch closed by foreign host]
Router#
Switch-sp# ^C Switch-sp# ^C Switch-sp# ^C Terminate remote login session? [confirm] y [Connection to Switch closed by local host] Router# ExamplesThis example shows how to perform a remote login to a specific module:
Router# remote login module 1
Trying Switch ...
Entering CONSOLE for Switch
Type "^C^C^C" to end this session
Switch-sp#
This example shows how to perform a remote login to the Cisco 7600 series router processor:
Router# remote login switch
Trying Switch ...
Entering CONSOLE for Switch
Type "^C^C^C" to end this session
Switch-sp#
This example shows how to perform a remote login to the standby route processor:
Router# remote login standby-rp
Trying Switch ...
Entering CONSOLE for Switch
Type "^C^C^C" to end this session
Router-sdby#
remote-ip (IPC transport-SCTP remote)To define at least one IP address of the redundant peer that is used to communicate with the local device, use the remote-ipcommand in IPC transport-SCTP remote configuration mode. To remove one or all IP addresses from your configuration, use the no form of this command.
remote-ip
peer-real-ip-address
[peer-real-ip-address2]
no
remote-ip
peer-real-ip-address
[peer-real-ip-address2]
Syntax Description
Usage GuidelinesUse the remote-ip command to help associate Stream Control Transmission Protocol (SCTP) as the transport protocol between the local and remote peer. This command is part of a suite of commands used to configure the Stateful Switch Over (SSO) protocol. SSO is necessary for IP Security (IPSec) and Internet Key Exchange (IKE) to learn about the redundancy state of the network and to synchronize their internal application state with their redundant peers. remote-portTo define the remote Stream Control Transmission Protocol (SCTP) port that is used to communicate with the redundant peer, use the remote-portcommand in SCTP protocol configuration mode. Usage GuidelinesThe remote-port command enters IPC transport-SCTP remote configuration mode, which allows you to specify at least one remote IP address (via the remote-ip command) that is used to communicate with the redundant peer. remote-spanTo configure a virtual local area network (VLAN) as a remote switched port analyzer (RSPAN) VLAN, use the remote-span command in config-VLAN mode. To remove the RSPAN designation, use the no form of this command. Usage GuidelinesThis command is not supported in the VLAN database mode. You can enter the show vlan remote-span command to display the RSPAN VLANs in the Cisco 7600 series router. renew deny unknownTo configure the renewal policy for unknown DHCP clients, use the renew deny unknowncommand in DHCP pool configuration mode. To disable the renewal policy, use the no form of this command. Command DefaultThe DHCP server ignores a client request for an IP address that is not leased to the client. Usage GuidelinesIn some usage scenarios, such as a wireless hotspot, where both DHCP and secure ARP are configured, a connected client device might go to sleep or suspend for a period of time. If the suspended time period is greater than the secure ARP timeout (default of 91 seconds), but less than the DHCP lease time, the client can awake with a valid lease, but the secure ARP timeout has caused the lease binding to be removed because the client has been inactive. When the client awakes, the client still has a lease on the client side but is blocked from sending traffic. The client will try to renew its IP address but the DHCP server will ignore the request because the DHCP server has no lease for the client. The client must wait for the lease to expire before being able to recover and send traffic again. To remedy this situation, use the renew deny unknown command in DHCP pool configuration mode. This command forces the DHCP server to reject renewal requests from clients if the requested address is present at the server but is not leased. The DHCP server sends a DHCPNAK denial message to the client, which forces the client back to its initial state. The client can then negotiate for a new lease immediately, instead of waiting for its old lease to expire. ExamplesThe following example shows how to secure ARP table entries to DHCP leases. The renew deny unknown command allows the DHCP server to renew the lease of a DHCP client whose lease has been cleared because of a secure ARP timeout. Router# configure terminal Router(config)# ip dhcp pool red Router(dhcp-config)# update arp Router(dhcp-config)# renew deny unknown renew dhcpTo perform an immediate renewal of a Dynamic Host Configuration Protocol (DHCP) lease for an interface, use the renew dhcp command in user EXEC or privileged EXEC mode. Usage GuidelinesThe renew dhcp command immediately renews the DHCP lease for the interface specified by the interface-type and interface-number arguments. If the router interface was not assigned an IP address by the DHCP server, the renew dhcp command fails and displays the following error message: Interface does not have a DHCP originated address This command does not have a no form. ExamplesThe following example shows how to renew a DHCP lease for an interface: renew dhcp Ethernet 3/1 Related Commands
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||