![]() |
Cisco IOS IP Addressing Services Command Reference
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
reserved-only through show ip irdp
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Contents
reserved-only through show ip irdp reserved-onlyTo restrict address assignments from the Dynamic Host Configuration Protocol (DHCP) address pool only to the preconfigured reservations, use the reserved-only command in DHCP pool configuration mode. To disable the configuration, use the no form of this command. Command DefaultAddress assignments from the DHCP address pool are not restricted only to the preconfigured reservations. Usage GuidelinesWhen the DHCP port-based assignment feature is configured on multiple switches, devices connected to one switch may receive an IP address assignment from the neighboring switches rather than from the local DHCP address pool switch. If you want the switch to serve only the client directly connected to the switch, you can configure a group of switches with pools that share a common IP subnet but ignore the requests from other clients (not connected to this switch). restrict authenticatedTo specify that a Domain Name System (DNS) view list member cannot be used to respond to an incoming DNS query if the DNS view and the DNS client have not been authenticated, use the restrict authenticated command in DNS view list member configuration mode. To remove this restriction from a DNS view list member, use the no form of this command. Command DefaultWhen determining whether the DNS view list member can be used to respond to an incoming DNS query, the Cisco IOS software does not check that the DNS view and the DNS client have been authenticated. Usage GuidelinesThis command restricts the DNS view list member from responding to an incoming DNS query unless the Cisco IOS software has verified the authentication status of the client. The view list member is rejected, and the view-selection process proceeds to the next view in the view list, if the client is not authenticated. The router that is running Split DNS determines the query client authentication status by calling any DNS client authentication functions that have been registered with Split DNS. A client can be authenticated within a Cisco IOS environment by various methods, such as Firewall Authentication Proxy, 802.1x, and wireless authentication. Some DNS authentication functions might inspect only the source IP address or MAC address and the VRF information, while other functions might inspect the source IP address or MAC address, the VRF information, and the DNS view name. A DNS view list member can also be restricted from responding to an incoming DNS query based on the query source IP address (configured by using the restrict source access-group command) or the query hostname (configured by using the restrict name-group command). To display the usage restrictions for a DNS view list member, use the show ip dns view-list command. ExamplesThe following example shows how to create the DNS view list userlist5 so that it contains the two DNS views: Router(config)# ip dns view-list userlist5 Router(cfg-dns-view-list)# view vrf vpn101 user1 20 Router(cfg-dns-view-list-member)# exit Router(cfg-dns-view-list)# view vrf vpn201 user2 35 Router(cfg-dns-view-list-member)# restrict authenticated Both view list members are restricted from responding to an incoming DNS query unless the query is from the same VRF as the VRF with which the view is associated. The first view list member (the view named user1 and associated with the VRF vpn101) has no further restrictions placed on its use. The second view list member (the view named user2 and associated with the VRF vpn201) is further restricted from responding to an incoming DNS query unless the Cisco IOS software can verify the authentication status of the client. Related Commands
restrict name-groupTo specify that a Domain Name System (DNS) view list member cannot be used to respond to a DNS query unless the query hostname matches a permit clause in a particular DNS name list and none of the deny clauses, use the restrict name-group command in DNS view list member configuration mode. To remove this restriction from a DNS view list member, use the no form of this command. Command DefaultWhen determining whether the DNS view list member can be used to respond to an incoming DNS query, the Cisco IOS software does not check that the query hostname matches a permit clause in a particular DNS name list. Usage GuidelinesThis command restricts the DNS view list member from responding to an incoming DNS query if a permit clause in the specified DNS name list specifies a regular expression that matches the query hostname. The view list member is rejected, and the view-selection process proceeds to the next view in the view list, if an explicit deny clause in the name list (or the implicit deny clause at the end of the name list) matches the query hostname. To configure a DNS name list, use the ip dns name-list command. A DNS view list member can also be restricted from responding to an incoming DNS query based on the source IP address of the incoming DNS query. To configure this type of restriction, use the restrict source access-group command. To display the usage restrictions for a DNS view list member, use the show ip dns view-list command. ExamplesThe following example shows how to specify that DNS view user3 associated with the global VRF, when used as a member of the DNS view list userlist5, cannot be used to respond to an incoming DNS query unless the query hostname matches the DNS name list identified by the number 1: Router(config)# ip dns view-list userlist5 Router(cfg-dns-view-list)# view user3 40 Router(cfg-dns-view-list-member)# restrict name-group 1 Related Commands
restrict source access-groupTo specify that a Domain Name System (DNS) view list member cannot be used to respond to a DNS query unless the source IP address of the DNS query matches a standard access control list (ACL), use the restrict source access-group command in DNS view list member configuration mode. To remove this restriction from a DNS view list member, use the no form of this command.
restrict
source
access-group
{acl-name | acl-number}
no
restrict
source
access-group
{acl-name | acl-number}
Command DefaultWhen determining whether the DNS view list member can be used to respond to an incoming DNS query, the Cisco IOS software does not check that the source IP address of the DNS query belongs to a particular standard ACL. Usage GuidelinesThis command restricts the DNS view list member from responding to an incoming DNS query if the query source IP address matches the specified standard ACL. To configure a standard ACL, use the access-list (IP standard) command. A DNS view list member can also be restricted from responding to an incoming DNS query based on the the query hostname. To configure this type of restriction, use the restrict name-group command. To display the usage restrictions for a DNS view list member, use the show ip dns view-list command. ExamplesThe following example shows how to specify that DNS view user4 associated with the global VRF, when used as a member of the DNS view list userlist7, cannot be used to respond to an incoming DNS query unless the query source IP address matches the standard ACL number 6: Router(config)# ip dns view-list userlist7 Router(cfg-dns-view-list)# view user4 40 Router(cfg-dns-view-list-member)# restrict source access-group 6 Related Commands
service dhcpTo enable the Dynamic Host Configuration Protocol (DHCP) server and relay agent features on your router, use the service dhcp command in global configuration mode. To disable the DHCP server and relay agent features, use the no form of this command. Command History
Usage GuidelinesThe BOOTP and DHCP servers in Cisco IOS software both use the Internet Control Message Protocol (ICMP) port (port 67) by default. ICMP âport unreachable messagesâ will only be returned to the sender if both the BOOTP server and DHCP server are disabled. Disabling only one of the servers will not result in ICMP port unreachable messages. Port 67 is closed in the Cisco IOS DHCP/BOOTP default configuration. There are two logical parts to the service dhcp command: service enabled and service running. The DHCP service is enabled by default, but port 67 is not opened until the DHCP service is running. A DHCP address pool must be configured for the DHCP service to be running. If the service is running, the show ip sockets detail or show sockets detailcommands displays port 67 as open. set ip next-hop dynamic dhcpTo set the next hop to the gateway that was most recently learned by the Dynamic Host Configuration Protocol (DHCP) client, use the set ip next-hop dynamic dhcpcommand in route-map configuration mode. To restore the default setting, use the no form of this command. Command History
Usage GuidelinesThe set ip next-hop dynamic dhcpcommand supports only a single DHCP interface. If multiple interfaces have DHCP configured, the gateway that was most recently learned among all interfaces running DHCP will be used by the route map. ExamplesThe following example shows how to configure a local routing policy that sets the next hop to the gateway that was most recently learned by the DHCP client: access list 101 permit icmp any host 172.16.23.7 echo route map MY-LOCAL-POLICY permit 10 match ip address 101 set ip next-hop dynamic dhcp ! ip local policy route-map MY-LOCAL-POLICY show arpTo display the entries in the Address Resolution Protocol (ARP) table, use the show arp command in user EXEC or privileged EXEC mode.
show
arp
[ [vrf vrf-name] [ [arp-mode] [ [ip-address [mask] ] [interface-type interface-number] ] ] ]
[detail]
Syntax DescriptionCommand History
Usage GuidelinesTo display all entries in the ARP cache, use this command without any arguments or keywords. Entry Selection Options You can to limit the scope of the command output by applying various combinations of the following ARP entry selection criteria:
Detailed Output Format To include additional details about each ARP entry displayed, use this command with the detail keyword. When this display option is used, the following additional information is included: ARP Adjacency Notification If Cisco Express Forwarding (CEF) is enabled on the router, the router maintains forwarding information (outbound interface and MAC header rewrite) for adjacent nodes. A node is said to be adjacent to another node if the node can be reached with a single hop across a link layer (Layer 2). CEF stores the forwarding information in an adjacency database so that Layer 2 addressing information can be inserted into link-layer headers attached to the ARP packets.
The ARP table information is one of the sources for CEF adjacency. Whenever the ARP subsystem attaches an ARP table entry to an outbound interface with a valid hardware address, the subsystem issues an internal âARP adjacencyâ notification. The notification causes an ARP background process to synchronize that ARP entry with CEF adjacency via the adjacency database. If the synchronization succeeds, IP ARP adjacency is said to be âinstalledâ; if the synchronization fails, IP ARP adjacency is said to have been âwithdrawn.â
To display detailed information about any ARP adjacency notification that may have occurred, use the show arp command with the detail keyword. You can use this information to supplement the information available through ARP/CEF adjacency debug trace. To enable debug trace for ARP/CEF adjacency interactions, use the debug arp command with the adjacency keyword. ARP Cache Administration To refresh all entries for the specified interface (or all interfaces) or to refresh all entries of the specified address (or all addresses) in the specified VRF table (or in the global VRF table), use the clear arp-cache command. To enable debugging output for ARP transactions, use the debug arp command. ExamplesThe following is sample output from the show arp command with no optional keywords or arguments specified:
Router# show arp
Protocol Address Age (min) Hardware Addr Type Interface
Internet 192.0.2.112 120 0000.a710.4baf ARPA Ethernet3
AppleTalk 4028.5 29 0000.0c01.0e56 SNAP Ethernet2
Internet 192.0.2.114 105 0000.a710.859b ARPA Ethernet3
AppleTalk 4028.9 - 0000.0c02.a03c SNAP Ethernet2
Internet 192.0.2.121 42 0000.a710.68cd ARPA Ethernet3
Internet 192.0.2.9 - 0000.3080.6fd4 SNAP TokenRing0
AppleTalk 4036.9 - 0000.3080.6fd4 SNAP TokenRing0
Internet 192.0.2.9 - 0000.0c01.7bbd SNAP Fddi0
The table below describes the fields shown in the display.
When this command is used to display dynamic ARP entries, the display information includes the time of the last update and the amount of time before the next scheduled refresh is to occur. The following is sample output from the show arp command for the dynamic ARP entry at network address 192.0.2.1:
Router# show arp 192.0.2.1 detail
ARP entry for 192.0.2.1, link type IP.
Alias, last updated 13323 minutes ago.
Encap type is ARPA, hardware address is 1234.1234.1234, 6 bytes long.
ARP subblocks:
* Static ARP Subblock
Floating entry.
Entry is complete, attached to GigabitEthernet1/1.
* IP ARP Adjacency
Adjacency (for 192.0.2.1 on GigabitEthernet1/1) was installed.
When this command is used to display floating static ARP entries, the display information includes the associated interface, if any.The following is sample output from the show arp command for the floating static ARP entry at network address 192.0.2.2 whose intended interface is down:
Router# show arp 192.0.2.2 detail
ARP entry for 192.0.2.2, link type IP.
Alias, last updated 13327 minutes ago.
Encap type is ARPA, hardware address is 1234.1234.1234, 6 bytes long.
ARP subblocks:
* Static ARP Subblock
Floating entry.
Entry is incomplete.
* IP ARP Adjacency
Adjacency (for 192.0.2.2 on GigabitEthernet1/1) was withdrawn.
The following is sample detailed output from the show arp command for the Application Alias ARP entry at network address 192.0.2.3:
Router# show arp 192.0.2.3 detail
ARP entry for 192.0.2.3, link type IP.
Application Alias, via Ethernet2/2, last updated 0 minute ago.
Created by "HSRP".
Encap type is ARPA, hardware address is 0000.0c07.ac02, 6 bytes long.
ARP subblocks:
* Application Alias ARP Subblock
* HSRP
ARP Application entry for application HSRP.
The following is sample detailed output from the show arp command for all dynamic ARP entries:
Router# show arp dynamic detail
ARP entry for 192.0.2.4, link type IP.
Dynamic, via Ethernet2/1, last updated 0 minute ago.
Encap type is ARPA, hardware address is 0000.0000.0014, 6 bytes long.
ARP subblocks:
* Dynamic ARP Subblock
Entry will be refreshed in 0 minute and 1 second.
It has 1 chance to be refreshed before it is purged.
Entry is complete.
* IP ARP Adjacency
Adjacency (for 192.0.2.4 on Ethernet2/1) was installed.
Related Commands
show arp applicationTo display Address Resolution Protocol (ARP) table information for a specific ARP application or for all applications supported by ARP and running on registered clients, use the show arp applicationcommand in user EXEC or privileged EXEC mode. Syntax Description
Usage GuidelinesTo display ARP table information about all supported ARP applications running on registered clients, use this command without any arguments or keywords. Entry Selection Options To display ARP table information about a single ARP application running on a registered client, use this command with the application-IDargument. Detailed Output Format To display the specified ARP table information along with detailed information about any subblocks, use this command with the detail keyword. The additional details consist of the following information: ExamplesThe following is sample output from the show arp application command:
Router# show arp application
Number of clients registered: 7
Application ID Num of Subblocks
ARP Backup 200 1
IP SIP 201 0
LEC 202 0
DHCPD 203 0
IP Mobility 204 0
HSRP 209 1
IP ARP Adjacency 212 2
The following is sample detailed output from the show arp application detail command:
Router# show arp application detail
Number of clients registered: 7
Application ID Num of Subblocks
ARP Backup 200 1
ARP entry for 192.0.2.10, link type IP.
Application Alias, via Ethernet2/2.
Subblock data:
Backup for Interface on Ethernet2/2
Application ID Num of Subblocks
IP SIP 201 0
Application ID Num of Subblocks
LEC 202 0
Application ID Num of Subblocks
DHCPD 203 0
Application ID Num of Subblocks
IP Mobility 204 0
Application ID Num of Subblocks
HSRP 209 1
ARP entry for 192.0.2.10, link type IP.
Application Alias, via Ethernet2/2.
Subblock data:
ARP Application entry for application HSRP.
Application ID Num of Subblocks
IP ARP Adjacency 212 2
ARP entry for 192.0.2.4, link type IP.
Dynamic, via Ethernet2/1.
Subblock data:
Adjacency (for 192.0.2.4 on Ethernet2/1) was installed.
ARP entry for 192.0.2.2, link type IP.
Dynamic, via Ethernet2/1.
Subblock data:
Adjacency (for 192.0.2.2 on Ethernet2/1) was installed.
The table below describes the significant fields shown in the display. show arp haTo display the status and statistics of Address Resolution Protocol (ARP) high availability (HA), use the show arp ha command in user EXEC or privileged EXEC mode. Usage GuidelinesUse this command to display the ARP HA status and statistics. HA-Capable Platforms This command is available only on HA-capable platforms (that is, Cisco networking devices that support dual Route Processors [RPs]). ARP HA Statistics The ARP HA process collects one set of statistics for the active RP (described in the show arp ha Field Descriptions for Statistics Collected for an Active RP table below) and a different set of statistics for the standby RP (described in the show arp ha Field Descriptions for Statistics Collected for a Standby RP table below). These statistics can be used to track the RP state transitions when a user is debugging ARP HA issues. The output from this command depends on the current and most recent states of the RP:
ExamplesThe following is sample output from the show arp ha command on the active RP that has been the active RP since the last time the router was rebooted. ARP HA statistics are displayed for the active state only.
Router# show arp ha
ARP HA in active state (ARP_HA_ST_A_UP_SYNC).
2 ARP entries in the synchronization queue.
No ARP entry waiting to be synchronized.
806 synchronization packets sent.
No error in allocating synchronization packets.
No error in sending synchronization packets.
No error in encoding interface names.
The following is sample output from the show arp ha command on the active RP that had been a standby RP and became the active RP after the most recent SSO occurred. ARP HA statistics are displayed for the active state and also for the previous standby state.
Router# show arp ha
ARP HA in active state (ARP_HA_ST_A_UP).
1 ARP entry in the synchronization queue.
1 ARP entry waiting to be synchronized.
No synchronization packet sent.
No error in allocating synchronization packets.
No error in sending synchronization packets.
No error in encoding interface names.
Statistics collected when ARP HA in standby state:
No ARP entry in the backup table.
808 synchronization packets processed.
No synchronization packet dropped in invalid state.
No error in decoding interface names.
2 ARP entries restored before timer.
No ARP entry restored on timer.
No ARP entry purged since interface is down.
No ARP entry purged on timer.
The following is sample output from the show arp ha command on the standby RP. ARP HA statistics are displayed for the standby state only.
Router# show arp ha
ARP HA in standby state (ARP_HA_ST_S_UP).
2 ARP entries in the backup table.
806 synchronization packets processed.
No synchronization packet dropped in invalid state.
No error in decoding interface names.
The table below describes the significant fields shown in the display collected for an active RP.
The table below describes the significant fields shown in the display collected for a standby RP or for an active RP that was previously in the active state.
Related Commands
show arp summaryTo display the total number of Address Resolution Protocol (ARP) table entries, the number of ARP table entries for each ARP entry mode, and the number of ARP table entries for each interface on the router, use the show arp summary command in user EXEC or privileged EXEC mode. Usage GuidelinesUse this command to display high-level statistics about the ARP table entries:
A maximum limit for learned ARP entries can be configured on the Cisco 7600 platform in Cisco IOS Release 12.2(33)SRD3. This is subject to memory constraints. The 7600 can support a maximum limit of 256,000 learned ARP entries, and if a memory card is installed on the router the maximum limit is extended to 512,000. ExamplesThe following is sample output from the show arp summary command:
Router# show arp summary
Total number of entries in the ARP table: 10.
Total number of Dynamic ARP entries: 4.
Total number of Incomplete ARP entries: 0.
Total number of Interface ARP entries: 4.
Total number of Static ARP entries: 2.
Total number of Alias ARP entries: 0.
Total number of Simple Application ARP entries: 0.
Total number of Application Alias ARP entries: 0.
Total number of Application Timer ARP entries: 0.
Interface Entry Count
Ethernet3/2 1
The following is sample output from the show arp summarycommand on a Cisco 7600 router for Cisco IOS Release 12.2(33)SRD3, after a maximum limit is set for the number of learned ARP entries: Router> enable Router# configure terminal Router(config)# ip arp entry learn 512000 Router(config)# exit Router# show arp summary Total number of entries in the ARP table: 4. Total number of Dynamic ARP entries: 0. Total number of Incomplete ARP entries: 0. Total number of Interface ARP entries: 3. Total number of Static ARP entries: 1. Total number of Alias ARP entries: 0. Total number of Simple Application ARP entries: 0. Total number of Application Alias ARP entries: 0. Total number of Application Timer ARP entries: 0. Maximum limit of Learn ARP entry : 512000. Maximum configured Learn ARP entry limit : 512000. Learn ARP Entry Threshold is 409600 and Permit Threshold is 486400. Total number of Learn ARP entries: 0. Interface Entry Count GigabitEthernet4/7 1 GigabitEthernet4/1.1 1 GigabitEthernet4/1 1 EOBC0/0 The table below describes the fields shown in the display.
Related Commands
show hostsTo display the default domain name, the style of name lookup service, a list of name server hosts, and the cached list of hostnames and addresses specific to a particular Domain Name System (DNS) view or for all configured DNS views, use the show hosts command in privileged EXEC mode. Syntax Description
Command History
Usage GuidelinesThis command displays the default domain name, the style of name lookup service, a list of name server hosts, and the cached list of hostnames and addresses specific to a particular DNS view or for all configured DNS views. If you specify the show hosts command without any optional keywords or arguments, only the entries in the global hostname cache will be displayed. If the output from this command extends beyond the bottom of the screen, press the Space bar to continue or press the Q key to terminate command output. ExamplesThe following is sample output from the show hosts command with no parameters specified:
Router# show hosts
Default domain is CISCO.COM
Name/address lookup uses domain service
Name servers are 192.0.2.220
Host Flag Age Type Address(es)
EXAMPLE1.CISCO.COM (temp, OK) 1 IP 192.0.2.10
EXAMPLE2.CISCO.COM (temp, OK) 8 IP 192.0.2.50
EXAMPLE3.CISCO.COM (temp, OK) 8 IP 192.0.2.115
EXAMPLE4.CISCO.COM (temp, EX) 8 IP 192.0.2.111
EXAMPLE5.CISCO.COM (temp, EX) 0 IP 192.0.2.27
EXAMPLE6.CISCO.COM (temp, EX) 24 IP 192.0.2.30
The following is sample output from the show hosts command that specifies the VRF vpn101:
Router# show hosts vrf vpn101
Default domain is example.com
Domain list: example1.com, example2.com, example3.com
Name/address lookup uses domain service
Name servers are 192.0.2.204, 192.0.2.205, 192.0.2.206
Codes: UN - unknown, EX - expired, OK - OK, ?? - revalidate
temp - temporary, perm - permanent
NA - Not Applicable None - Not defined
Host Port Flags Age Type Address(es)
user None (perm, OK) 0 IP 192.0.2.001
www.example.com None (perm, OK) 0 IP 192.0.2.111
192.0.2.112
The table below describes the significant fields shown in the display.
show ip aliasesTo display the IP addresses mapped to TCP ports (aliases) and Serial Line Internet Protocol (SLIP) addresses, which are treated similar to aliases, use the show ip aliases command in user EXEC or privileged EXEC mode. Command History
Usage GuidelinesTo distinguish a SLIP address from a normal alias address, the command output uses the form SLIP TTY1 for the port number, where 1 is the auxiliary port. The display lists the address type, the IP address, and the corresponding port number. The output field descriptions are self-explanatory. ExamplesThe following is sample output from the show ip aliases command:
Router# show ip aliases
Address Type IP Address Port
Interface 10.1.1.1 SLIP TTY1
Dynamic 198.51.100.1
Dynamic 198.51.100.22
Dynamic 10.0.0.0
Dynamic 10.2.2.2
Interface 10.114.11.39 SLIP TTY1
Interface 172.31.232.182 SLIP TTY1
Interface 192.0.2.11 SLIP TTY1
Dynamic 209.165.200.225
Interface 209.165.200.225
show ip arpTo display the Address Resolution Protocol (ARP) cache, where Serial Line Internet Protocol (SLIP) addresses appear as permanent ARP table entries, use the show ip arp EXEC command. Usage GuidelinesARP establishes correspondences between network addresses (an IP address, for example) and LAN hardware addresses (Ethernet addresses). A record of each correspondence is kept in a cache for a predetermined amount of time and then discarded. ExamplesThe following is sample output from the show ip arp command:
Router# show ip arp
Protocol Address Age(min) Hardware Addr Type Interface
Internet 172.16.233.229 - 0000.0c59.f892 ARPA Ethernet0/0
Internet 172.16.233.218 - 0000.0c07.ac00 ARPA Ethernet0/0
Internet 172.16.233.19 - 0000.0c63.1300 ARPA Ethernet0/0
Internet 172.16.233.309 - 0000.0c36.6965 ARPA Ethernet0/0
Internet 172.16.168.11 - 0000.0c63.1300 ARPA Ethernet0/0
Internet 172.16.168.254 9 0000.0c36.6965 ARPA Ethernet0/0
The table below describes the significant fields shown in the display.
show ip arp inspectionTo display the status of DAI for a specific range of VLANs, use the show ip arp inspectioncommand in privileged EXEC mode. Syntax Description
Usage GuidelinesIf you do not enter the statistics keyword, the configuration and operating state of DAI for the selected range of VLANs is displayed. If you do not specify the interface name, the trust state and rate limit for all applicable interfaces in the system are displayed. ExamplesThis example shows how to display the statistics of packets that have been processed by DAI for VLAN 3:
Router# show ip arp inspection statistics vlan 3
Vlan Forwarded Dropped DHCP Drops ACL Drops
---- --------- ------- ---------- ----------
3 31753 102407 102407 0
Vlan DHCP Permits ACL Permits Source MAC Failures
---- ------------ ----------- -------------------
3 31753 0 0
Vlan Dest MAC Failures IP Validation Failures
---- ----------------- ----------------------
3 0 0
This example shows how to display the statistics of packets that have been processed by DAI for all active VLANs:
Router# show ip arp inspection statistics
Vlan Forwarded Dropped DHCP Drops ACL Drops
---- --------- ------- ---------- ----------
1 0 0 0 0
2 0 0 0 0
3 68322 220356 220356 0
4 0 0 0 0
100 0 0 0 0
101 0 0 0 0
1006 0 0 0 0
1007 0 0 0 0
Vlan DHCP Permits ACL Permits Source MAC Failures
---- ------------ ----------- -------------------
1 0 0 0
2 0 0 0
3 68322 0 0
4 0 0 0
100 0 0 0
101 0 0 0
1006 0 0 0
1007 0 0 0
Vlan Dest MAC Failures IP Validation Failures
---- ----------------- ----------------------
1 0 0
2 0 0
3 0 0
4 0 0
100 0 0
101 0 0
1006 0 0
1007 0 0
This example shows how to display the configuration and operating state of DAI for VLAN 1:
Router# show ip arp inspection vlan 1
Source Mac Validation : Disabled
Destination Mac Validation : Disabled
IP Address Validation : Disabled
Vlan Configuration Operation ACL Match Static ACL
---- ------------- --------- --------- ----------
1 Enabled Active
Vlan ACL Logging DHCP Logging
---- ----------- ------------
1 Deny Deny
This example shows how to display the trust state of Fast Ethernet interface 6/3:
Router# show ip arp inspection interfaces fastEthernet 6/3
Interface Trust State Rate (pps) Burst Interval
--------------- ----------- ---------- --------------
Fa6/1 Untrusted 20 5
This example shows how to display the trust state of the interfaces on the switch:
Router# show ip arp inspection interfaces
Interface Trust State Rate (pps)
--------------- ----------- ----------
Gi1/1 Untrusted 15
Gi1/2 Untrusted 15
Gi3/1 Untrusted 15
Gi3/2 Untrusted 15
Fa3/3 Trusted None
Fa3/4 Untrusted 15
Fa3/5 Untrusted 15
Fa3/6 Untrusted 15
Fa3/7 Untrusted 15
show ip arp inspection logTo show the status of the log buffer, use the show ip arp inspection logcommand in privileged EXEC mode. ExamplesThis example shows how to display the current contents of the log buffer before and after the buffers are cleared:
Router# show ip arp inspection log
Total Log Buffer Size : 10
Syslog rate : 0 entries per 10 seconds.
Interface Vlan Sender MAC Sender IP Num of Pkts
--------------- ----- ----------------- --------------- -----------
Fa6/3 1 0002.0002.0002 10.1.1.2 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.3 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.4 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.5 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.6 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.7 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.8 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.9 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.10 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.11 1(12:02:52 UTC Fri Apr 25 2003)
-- -- -- -- 5(12:02:52 UTC Fri Apr 25 2003)
This example shows how to clear the buffer with the clear ip arp inspection log command: Router# clear ip arp inspection log Router# show ip arp inspection log Total Log Buffer Size : 10 Syslog rate : 0 entries per 10 seconds. No entries in log buffer. show ip ddns updateTo display information about the Dynamic Domain Name System (DDNS) updates, use the show ip ddns updatecommand in privileged EXEC mode. show ip ddns update methodTo display information about the Dynamic Domain Name System (DDNS) update method, use the show ip ddns update methodcommand in privileged EXEC mode. ExamplesThe following is sample output from the show ip ddns update method command:
Router# show ip ddns update method
Dynamic DNS Update Method: test
Dynamic DNS update in IOS internal name cache
Related Commands
show ip dhcp bindingTo display address bindings on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server, use the show ip dhcp binding command in user EXEC or privileged EXEC mode. Cisco IOS Release 12.0(1)T, 12.2(28)SB, and Later Releases
show
ip
dhcp
binding
[ip-address]
Cisco IOS Release 12.2(33)SRC and Later 12.2SR Releases
show
ip
dhcp
binding
[vrf vrf-name]
[ip-address]
Syntax Description
Command History
Usage GuidelinesThis command is used to display DHCP binding information for IP address assignment and subnet allocation. If a specific IP address is not specified, all address bindings are shown. Otherwise, only the binding for the specified client is displayed. The output that is generated for DHCP IP address assignment and subnet allocation is almost identical, except that subnet leases display an IP address followed by the subnet mask (which shows the size of the allocated subnet). Bindings for individual IP address display only an IP address and are not followed by a subnet mask. ExamplesThe following examples show the DHCP binding address parameters, including an IP address, an associated MAC address, a lease expiration date, the type of address assignment that has occurred, and the option 82 suboptions of the remote ID and circuit ID. The table below describes the significant fields shown in the displays.
Router# show ip dhcp binding 192.0.2.2
IP address Client-ID/ Lease expiration Type
Hardware address/
User name
192.0.2.2 aabb.cc00.0a00 Apr 28 2010 05:00 AM Automatic
Remote id : 020a00001400006400000000
ExamplesThe following example shows the subnet lease to MAC address mapping, the lease expiration, and the lease type (subnet lease bindings are configured to be automatically created and released by default):
Router# show ip dhcp binding
Bindings from all pools not associated with VRF:
IP address Client-ID/ Lease expiration Type
Hardware address/
User name
192.0.2.2/24 0063.6973.636f.2d64. Mar 29 2003 04:36 AM Automatic
656d.6574.6572.2d47.
4c4f.4241.4c
The table below describes the significant fields shown in the display.
show ip dhcp conflictTo display address conflicts found by a Dynamic Host Configuration Protocol (DHCP) server when addresses are offered to the client, use the show ip dhcp conflictcommandinuser EXEC or privileged EXEC mode. Command DefaultIf you do not enter the IP address or VRF then all dhcp conflict related information is displayed. Command History
Usage GuidelinesThe server uses a ping operation to detect conflicts. The client uses gratuitous Address Resolution Protocol (ARP) to detect clients. If an address conflict is detected, the address is removed from the pool and the address is not assigned until an administrator resolves the conflict. ExamplesThe following is sample output from the show ip dhcp conflict command, which shows the detection method and detection time for all IP addresses the DHCP server has offered that have conflicts with other devices:
Router#
show ip dhcp conflict
IP address Detection method Detection time VRF
172.16.1.32 Ping Feb 16 1998 12:28 PM vrf1
172.16.1.64 Gratuitous ARP Feb 23 1998 08:12 AM vrf2
The table below describes the fields shown in the display.
The following is sample output from the show ip dhcp conflict vrf command:
Router#
show ip dhcp conflict vrf vrf1
IP address Detection method Detection time VRF
172.16.1.32 Ping Feb 15 2009 05:39 AM vrf1
See the table below for the field description. Related Commands
show ip dhcp databaseTo display Dynamic Host Configuration Protocol (DHCP) server database agent information, use the show ip dhcp database command in privileged EXEC mode. Command DefaultIf a URL is not specified, all database agent records are shown. Otherwise, only information about the specified agent is displayed. Command History
ExamplesThe following example shows all DHCP server database agent information. The table below describes the significant fields shown in the display.
Router# show ip dhcp database
URL : ftp://user:password@172.16.4.253/router-dhcp
Read : Dec 01 1997 12:01 AM
Written : Never
Status : Last read succeeded. Bindings have been loaded in RAM.
Delay : 300 seconds
Timeout : 300 seconds
Failures : 0
Successes : 1
show ip dhcp importTo display the option parameters that were imported into the Dynamic Host Configuration Protocol (DHCP) server database, use the show ip dhcp import command in privileged EXEC command. Command History
Usage GuidelinesImported option parameters are not part of the router configuration and are not saved in NVRAM. Thus, the show ip dhcp import command is necessary to display the imported option parameters. ExamplesThe following is sample output from the show ip dhcp import command:
Router# show ip dhcp import
Address Pool Name:2
Domain Name Server(s): 10.1.1.1
NetBIOS Name Server(s): 10.3.3.3
The following example indicates the address pool name: Address Pool Name:2 The following example indicates the imported values, which are domain name and NetBIOS name information: Domain Name Server(s): 10.1.1.1 NetBIOS Name Server(s): 10.3.3.3 show ip dhcp limit leaseTo display the number of times the lease limit threshold has been violated, use the show ip dhcp limit lease command in user EXEC or privileged EXEC mode. Usage GuidelinesYou can control the number of subscribers at the global level by using the ip dhcp limit lease per interface command and at the interface level by using the ip dhcp limit leasecommand. The show ip dhcp limit lease command displays the number of lease limit violations per interface or at the global level. ExamplesIn the following example, the number of lease violations is displayed. If the ip dhcp limit lease log command is enabled, the show output will indicate that lease limit logging is enabled:
Router# show ip dhcp limit lease
DHCP limit lease logging is enabled
Interface Count
Serial0/0.1 5
Serial1 3
Related Commands
show ip dhcp poolTo display information about the Dynamic Host Configuration Protocol (DHCP) address pools, use the show ip dhcp pool command in user EXEC or privileged EXEC mode. Command History
Usage GuidelinesUse this command to determine the subnets allocated and to examine the current utilization level for the pool or all the pools if the name argument is not used. ExamplesThe following example shows DHCP address pool information for an on-demand address pool (ODAP), pool 1. The table below describes the significant fields shown in the display.
Router# show ip dhcp pool 1
Pool 1:
Utilization mark (high/low) : 85 / 15
Subnet size (first/next) : 24 / 24 (autogrow)
VRF name : abc
Total addresses : 28
Leased addresses : 11
Pending event : none
2 subnets are currently in the pool :
Current index IP address range Leased addresses
10.1.1.12 10.1.1.1 - 10.1.1.14 11
10.1.1.17 10.1.1.17 - 10.1.1.30 0
Interface Ethernet0/0 address assignment
10.1.1.1 255.255.255.248
10.1.1.17 255.255.255.248 secondary
The following example shows DHCP address pool information for a network pool, pool 2. The table below describes the significant fields shown in the display.
Router# show ip dhcp pool 2
Pool pool2 :
Utilization mark (high/low) : 80 / 70
Subnet size (first/next) : 0 / 0
Total addresses : 256
Leased addresses : 0
Excluded addresses : 2
Pending event : none
2 subnets are currently in the pool:
Current index IP address range Leased/Excluded/Total
10.0.2.1 10.0.2.1 - 10.0.2.254 0 / 1 / 254
10.0.4.1 10.0.4.1 - 10.0.4.2 0 / 1 / 2
Related Commands
show ip dhcp relay information trusted-sourcesTo display all interfaces configured to be a trusted source for the Dynamic Host Configuration Protocol (DHCP) relay information option, use the show ip dhcp relay information trusted-sources command in user EXEC or privileged EXEC mode. Usage GuidelinesThis command is not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 2. ExamplesThe following is sample output when the ip dhcp relay information trusted-sources command is configured. Note that the display output lists the interfaces that are configured to be trusted sources.
Router# show ip dhcp relay information trusted-sources
List of trusted sources of relay agent information option:
Ethernet1/1 Ethernet1/2 Ethernet1/3 Serial4/1.1
Serial4/1.2 Serial4/1.3
The following is sample output when the ip dhcp relay information trust-allglobalconfiguration command is configured. Note that the display output does not list the individual interfaces.
Router# show ip dhcp relay information trusted-sources
All interfaces are trusted source of relay agent information option Serial4/1.1
show ip dhcp server statisticsTo display Dynamic Host Configuration Protocol (DHCP) server statistics, use the show ip dhcp server statistics command in privileged EXEC mode.
show
ip
dhcp
server
statistics
Syntax in Cisco IOS Release 12.2(33)SRC and Subsequent 12.2SR Releases
show
ip
dhcp
server
statistics
[type number]
Command History
ExamplesThe following example displays DHCP server statistics. The table below describes the significant fields in the display.
Router# show ip dhcp server statistics
Memory usage 40392
Address pools 3
Database agents 1
Automatic bindings 190
Manual bindings 1
Expired bindings 3
Malformed messages 0
Secure arp entries 1
Renew messages 0
Message Received
BOOTREQUEST 12
DHCPDISCOVER 200
DHCPREQUEST 178
DHCPDECLINE 0
DHCPRELEASE 0
DHCPINFORM 0
Message Sent
BOOTREPLY 12
DHCPOFFER 190
DHCPACK 172
DHCPNAK 6
show ip dhcp snoopingTo display the DHCP snooping configuration, use the show ip dhcp snoopingcommand in privileged EXEC mode. ExamplesThis example shows how to display the DHCP snooping configuration:
Router# show ip dhcp snooping
Switch DHCP snooping is enabled
DHCP snooping is configured on following VLANs:
5 10
Insertion of option 82 is enabled
Interface Trusted Rate limit (pps)
-------------------- ------- ----------------
FastEthernet6/11 no 10
FastEthernet6/36 yes 50
Related Commands
show ip dhcp snooping bindingTo display the DHCP snooping binding entries, use the show ip dhcp snooping bindingcommand in privileged EXEC mode. Syntax Description
Command DefaultIf no argument is specified, the switch displays the entire DHCP snooping binding table. Usage GuidelinesDHCP snooping is enabled on a VLAN only if both the global snooping and the VLAN snooping are enabled. ExamplesThis example shows how to display the DHCP snooping binding entries for a switch:
Router# show ip dhcp snooping binding
MacAddress IP Address Lease(seconds) Type VLAN Interface
----------- ----------- -------------- ------------- ----- --------------
0000.0100.0201 10.0.0.1 600 dhcp-snooping 100 FastEthernet3/1
This example shows how to display an IP address for DHCP snooping binding entries:
Router# show ip dhcp snooping binding 172.16.101.102
MacAddress IP Address Lease (seconds) Type VLAN Interface
----------- ----------- --------------- ------------- ----- ------------
0000.0100.0201 172.16.101.102 1600 dhcp-snooping 100 FastEthernet3/1
This example shows how to display the MAC address for the DHCP snooping binding entries:
Router# show ip dhcp snooping binding 10.5.5.2 0002.b33f.3d5f
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------- ---------- ------------- ---- ----------------
00:02:B3:3F:3D:5F 10.5.5.2 492 dhcp-snooping 99 FastEthernet6/36 Router#
This example shows how to display the DHCP snooping binding entriesâ MAC address for a specific VLAN:
Router# show ip dhcp snooping binding 10.5.5.2 0002.b33f.3d5f vlan 99
MacAddress IpAddress Lease(sec) Type VLAN Interface
----------------- --------- ---------- ------------- ---- ----------------
00:02:B3:3F:3D:5F 10.5.5.2 479 dhcp-snooping 99 FastEthernet6/36
This example shows how to display the DHCP snooping binding entries on VLAN 100:
Router# show ip dhcp snooping binding vlan 100
MacAddress IP Address Lease(seconds) Type VLAN Interface
-------------- ---------- -------------- ------------- ---- --------------
0000.0100.0201 10.0.0.1 1600 dhcp-snooping 100 FastEthernet3/1
This example shows how to display the DHCP snooping binding entries on Fast Ethernet interface 3/1:
Router# show ip dhcp snooping binding interface fastethernet3/1
MacAddress IP Address Lease(seconds) Type VLAN Interface
-------------- ---------- -------------- ------------- ---- --------------
0000.0100.0201 10.0.0.1 1600 dhcp-snooping 100 FastEthernet3/1
The table below describes the fields in the show ip dhcp snooping command output.
Related Commands
show ip dhcp snooping databaseTo display the status of the DHCP snooping database agent, use the show ip dhcp snooping databasecommand in privileged EXEC mode. ExamplesThis example shows how to display the DHCP snooping database:
Router# show ip dhcp snooping database
Agent URL :
Write delay Timer : 300 seconds
Abort Timer : 300 seconds
Agent Running : No
Delay Timer Expiry : Not Running
Abort Timer Expiry : Not Running
Last Succeded Time : None
Last Failed Time : None
Last Failed Reason : No failure recorded.
Total Attempts : 0 Startup Failures : 0
Successful Transfers : 0 Failed Transfers : 0
Successful Reads : 0 Failed Reads : 0
Successful Writes : 0 Failed Writes : 0
Media Failures : 0
This example shows how to view additional operating statistics:
Router# show ip dhcp snooping database detail
Agent URL : tftp://10.1.1.1/directory/file
Write delay Timer : 300 seconds
Abort Timer : 300 seconds
Agent Running : No
Delay Timer Expiry : 7 (00:00:07)
Abort Timer Expiry : Not Running
Last Succeded Time : None
Last Failed Time : 17:14:25 UTC Sat Jul 7 2001
Last Failed Reason : Unable to access URL.
Total Attempts : 21 Startup Failures : 0
Successful Transfers : 0 Failed Transfers : 21
Successful Reads : 0 Failed Reads : 0
Successful Writes : 0 Failed Writes : 21
Media Failures : 0
First successful access: Read
Last ignored bindings counters :
Binding Collisions : 0 Expired leases : 0
Invalid interfaces : 0 Unsupported vlans : 0
Parse failures : 0
Last Ignored Time : None
Total ignored bindings counters:
Binding Collisions : 0 Expired leases : 0
Invalid interfaces : 0 Unsupported vlans : 0
Parse failures : 0
Related Commands
show ip dhcp vrfTo display the VPN routing and forwarding (VRF) instance information on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server, use the show ip dhcp vrf command in user EXEC or privileged EXEC mode. Usage GuidelinesThis command is used to display VRF information on the Cisco IOS DHCP server. If an IP address is specified, VRF information for the specific client is displayed. If an asterisk (*) is specified, then VRF information for all the clients is displayed. ExamplesThe following example shows the bindings associated with the VRF instance named red: Router# show ip dhcp vrf red binding * Bindings from VRF pool red: IP address Client-ID/ Lease expiration Type Hardware address/ User name 192.0.2.0 0063.6973.636f.2d30. Mar 11 2007 04:36 AM Automatic 3030.312e.3030.3131. 2e30.3032.342d.4574. 302f.30 192.0.2.1 0063.6973.636f.2d30. Mar 11 2007 04:37 AM Automatic 3032.322e.3030.3333. 2e30.3034.342d.4574. 302f.30 The following example shows the bindings associated with a specific IP address in the VRF instance named red:
Router# show ip dhcp vrf red binding 192.0.2.2
IP address Client-ID/ Lease expiration Type
Hardware address/
User name
192.0.2.2 0063.6973.636f.2d30. Mar 11 2007 04:37 AM Automatic
3032.322e.3030.3333.
2e30.3034.342d.4574.
302f.30
The table below describes the significant fields shown in the displays.
show ip dns name-listTo display a particular Domain Name System (DNS) name list or all configured DNS name lists, use the show ip dns name-list command in privileged EXEC mode. Usage GuidelinesDisplay a DNS name list to view the ordered list of pattern-matching rules it defines. Each rule in the name list specifies a regular expression and the type of action to be taken if the query hostname matches that expression. If the output from this command extends beyond the bottom of the screen, press the Space bar to continue or press the Q-key to terminate command output. ExamplesThe following is sample output from the show ip dns name-list command:
Router# show ip dns name-list
ip dns name-list 1
deny WWW.EXAMPLE1.COM
permit WWW.EXAMPLE.com
ip dns name-list 2
deny WWW.EXAMPLE2.COM
permit WWW.EXAMPLE3.COM
The table below describes the significant fields shown for each DNS name list in the display.
Related Commands
show ip dns primaryTo display the authority record parameters configured for the Domain Name System (DNS) server, use the show ip dns primary command in user EXEC or privileged EXEC mode. ExamplesThe following example shows how to configure the router as a DNS server and then display the authority record parameters for the DNS server: Router(conf)# ip dns server Router(conf)# ip dns primary example.com soa ns1.example.com mb1.example.com Router(conf)# ip host example.com ns ns1.example.com Router(conf)# ip host ns1.example.com 209.165.201.1 Router(conf)# exit Router# show ip dns primary Primary for zone example.com: SOA information: Zone primary (MNAME): ns1.example.com Zone contact (RNAME): mb1.example.com Refresh (seconds): 21600 Retry (seconds): 900 Expire (seconds): 7776000 Minimum (seconds): 86400 The table below describes the significant fields shown in the display.
Related Commands
show ip dns statisticsTo display packet statistics for the Domain Name System (DNS) server, use the show ip dns statistics command in user EXEC or privileged EXEC mode. Usage GuidelinesUse this command to display the number of DNS requests received and dropped by the DNS server and the number of DNS responses sent by the DNS server. ExamplesThe following is sample output from the show ip dns statistics command: Router# show ip dns statistics DNS requests received = 818725 ( 818725 + 0 ) DNS requests dropped = 0 ( 0 + 0 ) DNS responses replied = 0 ( 0 + 0 ) Forwarder queue statistics: Current size = 0 Maximum size = 400 Drops = 804613 Director queue statistics: Current size = 0 Maximum size = 0 Drops = 0 The table below describes the significant fields shown in the display.
show ip dns viewTo display configuration information about a Domain Name System (DNS) view or about all configured DNS views, including the number of times the DNS view was used, the DNS resolver settings, the DNS forwarder settings, and whether logging is enabled, use the show ip dns view command in privileged EXEC mode. Syntax Description
Usage GuidelinesDisplay DNS view information to view its DNS resolver settings, DNS forwarder settings, and whether logging is enabled. If the output from this command extends beyond the bottom of the screen, press the Space bar to continue or press the Q-key to terminate command output. Because different DNS views can be associated with the same VRF, omitting both the default keyword and the view-name argument causes this command to display information about all the views associated with the global or named VRF. ExamplesThe following is sample output from the show ip dns view command:
Router# show ip dns view
DNS View default parameters:
Logging is on (view used 102 times)
DNS Resolver settings:
Domain lookup is enabled
Default domain name: example.com
Domain search list: example1.com example2.com example3.com
Domain name for multicast lookups: 192.0.2.10
Lookup timeout: 7 seconds
Lookup retries: 5
Domain name-servers:
192.168.2.204
192.168.2.205
192.168.2.206
Round-robin'ing of IP addresses is enabled
DNS Server settings:
Forwarding of queries is enabled
Forwarder addresses:
192.168.2.11
192.168.2.12
192.168.2.13
Forwarder source interface: FastEthernet0/1
DNS View user5 parameters:
Logging is on (view used 10 times)
DNS Resolver settings:
Domain lookup is enabled
Default domain name: example5.net
Domain search list:
Lookup timeout: 3 seconds
Lookup retries: 2
Domain name-servers:
192.168.2.104
192.168.2.105
DNS Server settings:
Forwarding of queries is enabled
Forwarder addresses:
192.168.2.204
DNS View user1 vrf vpn101 parameters:
Logging is on (view used 7 times)
DNS Resolver settings:
Domain lookup is enabled
Default domain name: example1.com
Domain search list:
Lookup timeout: 3 seconds
Lookup retries: 2
Domain name-servers:
192.168.2.100
DNS Server settings:
Forwarding of queries is enabled
Forwarder addresses:
192.168.2.200 (vrf vpn201)
The table below describes the significant fields shown for each DNS view in the display.
show ip dns view-listTo display information about a Domain Name System (DNS) view list or about all configured DNS view lists, use the show ip dns view-list command in privileged EXEC mode. Usage GuidelinesIf the output from this command extends beyond the bottom of the screen, press the Space bar to continue or press the Q-key to terminate command output. IP DNS view lists are defined by using the ip dns view-list command. To display information about how DNS view lists are applied, use the show running-config command:
ExamplesThe following is sample output from the show ip dns view-list command:
Router# show ip dns view-list
View-list userlist1:
View user1 vrf vpn101:
Evaluation order: 10
Restrict to source ACL: 71
Restrict to ip dns name-list: 151
View user2 vrf vpn102:
Evaluation order: 20
Restrict to source ACL: 71
Restrict to ip dns name-list: 151
View user3 vrf vpn103:
Evaluation order: 30
Restrict to source ACL: 71
Restrict to ip dns name-list: 151
View-list userlist2:
View user1 vrf vpn101:
Evaluation order: 10
Restrict to ip dns name-list: 151
View user2 vrf vpn102:
Evaluation order: 20
Restrict to ip dns name-list: 151
View user3 vrf vpn103:
Evaluation order: 30
Restrict to ip dns name-list: 151
The table below describes the significant fields shown for each DNS view list in the display.
Related Commands
show ip host-listExamplesThe following is sample output from the show ip host-list command example for the abctest group:
Router# show ip host-list abctest
Host list: abctest
ddns.abc.test
10.2.3.4
ddns2.unit.test
10.3.4.5
ddns3.com
10.3.3.3
e.org
1.org.2.org
3.com
10.5.5.5 (VRF: def)
Related Commands
show ip interfaceTo display the usability status of interfaces configured for IP, use the show ip interface command in privileged EXEC mode. Command History
Usage GuidelinesThe Cisco IOS software automatically enters a directly connected route in the routing table if the interface is usable (which means that it can send and receive packets). If an interface is not usable, the directly connected routing entry is removed from the routing table. Removing the entry lets the software use dynamic routing protocols to determine backup routes to the network, if any. If the interface can provide two-way communication, the line protocol is marked âup.â If the interface hardware is usable, the interface is marked âup.â If you specify an optional interface type, information for that specific interface is displayed. If you specify no optional arguments, information on all the interfaces is displayed. When an asynchronous interface is encapsulated with PPP or Serial Line Internet Protocol (SLIP), IP fast switching is enabled. A show ip interface command on an asynchronous interface encapsulated with PPP or SLIP displays a message indicating that IP fast switching is enabled. You can use the show ip interface brief command to display a summary of the router interfaces. This command displays the IP address, the interface status, and other information. The show ip interface brief command does not display any information related to Unicast RPF. ExamplesThe following example shows configuration information for interface Gigabit Ethernet 0/3. In this example, the IP flow egress feature is configured on the output side (where packets go out of the interface), and the policy route map named PBRNAME is configured on the input side (where packets come into the interface).
Router# show running-config interface gigabitethernet 0/3
interface GigabitEthernet0/3
ip address 10.1.1.1 255.255.0.0
ip flow egress
ip policy route-map PBRNAME
duplex auto
speed auto
media-type gbic
negotiation auto
end
The following example shows interface information on Gigabit Ethernet interface 0/3. In this example, MPF is enabled, and both Policy Based Routing (PBR) and NetFlow features are not supported by MPF and are ignored.
Router# show ip interface gigabitethernet 0/3
GigabitEthernet0/3 is up, line protocol is up
Internet address is 10.1.1.1/16
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is disabled
IP Flow switching is disabled
IP CEF switching is enabled
IP Feature Fast switching turbo vector
IP VPN Flow CEF switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Policy routing is enabled, using route map PBR
Network address translation is disabled
BGP Policy Mapping is disabled
IP Multi-Processor Forwarding is enabled
IP Input features, "PBR",
are not supported by MPF and are IGNORED
IP Output features, "NetFlow",
are not supported by MPF and are IGNORED
The following example identifies a downstream VRF instance. In the example, âDownstream VPN Routing/Forwarding âDââ identifies the downstream VRF instance.
Router# show ip interface virtual-access 3
Virtual-Access3 is up, line protocol is up
Interface is unnumbered. Using address of Loopback2 (10.0.0.8)
Broadcast address is 255.255.255.255
Peer address is 10.8.1.1
MTU is 1492 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is enabled
IP Flow switching is disabled
IP CEF switching is enabled
IP Feature Fast switching turbo vector
IP VPN CEF switching turbo vector
VPN Routing/Forwarding "U"
Downstream VPN Routing/Forwarding "D"
IP multicast fast switching is disabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Policy routing is disabled
Network address translation is disabled
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
BGP Policy Mapping is disabled
The following example shows the information displayed when Unicast RPF drop-rate notification is configured:
Router# show ip interface ethernet 2/3
Ethernet2/3 is up, line protocol is up
Internet address is 10.0.0.4/16
Broadcast address is 255.255.255.255
Address determined by non-volatile memory
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is disabled
IP Flow switching is disabled
IP CEF switching is disabled
IP Null turbo vector
IP Null turbo vector
IP multicast fast switching is disabled
IP multicast distributed fast switching is disabled
IP route-cache flags are No CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Probe proxy name replies are disabled
Policy routing is disabled
Network address translation is disabled
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
BGP Policy Mapping is disabled
ExamplesInput features: uRPF IP verify source reachable-via RX, allow default 0 verification drops 0 suppressed verification drops 0 verification drop-rate Router# The following example shows how to display the usability status for a specific VLAN:
Router# show ip interface vlan 1
Vlan1 is up, line protocol is up
Internet address is 10.0.0.4/24
Broadcast address is 255.255.255.255
Address determined by non-volatile memory
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is disabled
IP Flow switching is disabled
IP CEF switching is enabled
IP Fast switching turbo vector
IP Normal CEF switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Probe proxy name replies are disabled
Policy routing is disabled
Network address translation is disabled
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
BGP Policy Mapping is disabled
Sampled Netflow is disabled
IP multicast multilayer switching is disabled
Netflow Data Export (hardware) is enabled
The table below describes the significant fields shown in the display.
The following example shows how to display a summary of the usability status information for each interface:
Router# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Ethernet0 10.108.00.5 YES NVRAM up up
Ethernet1 unassigned YES unset administratively down down
Loopback0 10.108.200.5 YES NVRAM up up
Serial0 10.108.100.5 YES NVRAM up up
Serial1 10.108.40.5 YES NVRAM up up
Serial2 10.108.100.5 YES manual up up
Serial3 unassigned YES unset administratively down down
The table below describes the significant fields shown in the display.
Related Commands
show ip irdpCommand History
ExamplesThe following is sample output from the show ip irdp command:
Router# show ip irdp
Ethernet 0 has router discovery enabled
Advertisements will occur between every 450 and 600 seconds.
Advertisements are valid for 1800 seconds.
Default preference will be 100.
--More--
Serial 0 has router discovery disabled
--More--
Ethernet 1 has router discovery disabled
As the display shows, show ip irdpoutput indicates whether router discovery has been configured for each router interface, and it lists the values of router discovery configurables for those interfaces on which router discovery has been enabled. Explanations for the less obvious lines of output in the display are as follows: Advertisements will occur between every 450 and 600 seconds. This indicates the configured minimum and maximum advertising interval for the interface. Advertisements are valid for 1800 seconds. This indicates the configured holdtime values for the interface. Default preference will be 100. This indicates the configured (or in this case default) preference value for the interface. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||