Table Of Contents
show running-config through show running-config isakmp Commands
show running-config
show running-config aaa
show running-config aaa-server
show running-config aaa-server host
show running-config access-group
show running-config access-list
show running-config alias
show running-config arp
show running-config arp timeout
show running-config arp-inspection
show running-config asdm
show running-config auth-prompt
show running-config banner
show running-config class
show running-config class-map
show running-config client-update
show running-config clock
show running-config command-alias
show running-config compression
show running-config console timeout
show running-config context
show running-config crypto
show running-config crypto dynamic-map
show running-config crypto ipsec
show running-config crypto isakmp
show running-config crypto map
show running-config ctl-file
show running-config ctl-provider
show running-config ddns
show running-config dhcp-client
show running-config dhcpd
show running-config dhcprelay
show running-config dns
show running-config dns server-group
show running-config domain-name
show running-config dynamic-access-policy-record
show running-config enable
show running-config established
show running-config failover
show running-config filter
show running-config fips
show running-config fragment
show running-config ftp mode
show running-config global
show running-config group-delimiter
show running-config group-policy
show running-config http
show running-config icmp
show running-config imap4s
show running-config interface
show running-config ip address
show running-config ip audit attack
show running-config ip audit info
show running-config ip audit interface
show running-config ip audit name
show running-config ip audit signature
show running-config ip local pool
show running-config ip verify reverse-path
show running-config ipv6
show running-config isakmp
show running-config through show running-config isakmp Commands
show running-config
To display the configuration that is currently running on the security appliance, use the show running-config command in privileged EXEC mode.
show running-config [all] [command]
Syntax Description
all
|
Displays the entire operating configuration, including defaults.
|
command
|
Displays the configuration associated with a specific command.
|
Defaults
If no arguments or keywords are specified, the entire non-default security appliance configuration displays.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
Pre-existing
|
This command was modified.
|
Usage Guidelines
The show running-config command displays the active configuration in memory (including saved configuration changes) on the security appliance.
You can use the running-config keyword only in the show running-config command. You cannot use this keyword with no or clear, or as a standalone command, because the CLI treats it as a nonsupported command. When you enter the ?, no ?, or clear ? keywords, a running-config keyword is not listed in the command list.
To display the saved configuration in flash memory on the security appliance, use the show configuration command.
Note
ASDM commands appear in the configuration after you use it to connect to or configure the security appliance.
Examples
This example show how to display the active configuration that is running on the security appliance:
hostname# show running-config
ip address 10.10.88.50 255.255.255.254
ip address 10.86.194.176 255.255.254.0
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
boot system flash:/cdisk.bin
route inside 0.0.0.0 0.0.0.0 10.86.194.1 1
timeout conn 2:00:00 half-closed 1:00:00 udp 0:02:00 icmp 1:00:00 rpc 1:00:00 h3
23 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02
timeout uauth 0:00:00 absolute
http 0.0.0.0 0.0.0.0 inside
snmp-server enable traps snmp
fragment timeout 5 inside
telnet 0.0.0.0 0.0.0.0 inside
group-policy todd internal
class-map inspection_default
match default-inspection-traffic
policy-map xxx_global_fw_policy
service-policy xxx_global_fw_policy global
Cryptochecksum:bfecf4b9d1b98b7e8d97434851f57e14
Related Commands
Command
|
Description
|
configure
|
Configures the security appliance from the terminal.
|
show running-config aaa
To show the AAA configuration in the running configuration, use the show running-config aaa command in privileged EXEC mode.
show running-config aaa [ accounting | authentication | authorization | mac-exempt |
proxy-limit ]
Syntax Description
accounting
|
(Optional) Show accounting-related AAA configuration.
|
authentication
|
(Optional) Show authentication-related AAA configuration.
|
authorization
|
(Optional) Show authorization-related AAA configuration.
|
mac-exempt
|
(Optional) Show MAC address exemption AAA configuration.
|
proxy-limit
|
(Optional) Show the number of concurrent proxy connections allowed per user.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config aaa command:
hostname# show running-config aaa
aaa authentication match infrastructure_authentication_radiusvrs infrastructure radiusvrs
aaa accounting match infrastructure_authentication_radiusvrs infrastructure radiusvrs
aaa authentication secure-http-client
aaa local authentication attempts max-fail 16
Related Commands
Command
|
Description
|
aaa authentication match
|
Enables authentication for traffic that is identified by an access list.
|
aaa authorization match
|
Enables authorization for traffic that is identified by an access list.
|
aaa accounting match
|
Enables accounting for traffic that is identified by an access list.
|
aaa max-exempt
|
Specifies the use of a predefined list of MAC addresses to exempt from authentication and authorization.
|
aaa proxy-limit
|
Configure the uauth session limit by setting the maximum number of concurrent proxy connections allowed per user.
|
show running-config aaa-server
To display AAA server configuration, use the show running-config aaa-server command in privileged EXEC mode.
show running-config [all] aaa-server [server-tag] [(interface-name)] [host hostname]
Syntax Description
all
|
(Optional) Shows the running configuration, including default configuration values.
|
host hostname
|
(Optional) The symbolic name or IP address of the particular host for which you want to display AAA server statistics.
|
(interface-name)
|
(Optional) The network interface where the AAA server resides.
|
server-tag
|
(Optional) The symbolic name of the server group.
|
Defaults
Omitting the server-tag value displays the configurations for all AAA servers.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
—
|
—
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was modified to adhere to CLI guidelines
|
Usage Guidelines
Use this command to display the settings for a particular server group. Use the all parameter to display the default as well as the explicitly configured values.
Examples
To display the running configuration for the default AAA server group, use the following command:
hostname(config)# show running-config default aaa-server
aaa-server group1 protocol tacacs+ accounting-mode simultaneous
reactivation-mode depletion deadtime 10
max-failed-attempts 4
hostname(config)#
Related Commands
Command
|
Description
|
show aaa-server
|
Displays AAA server statistics.
|
clear configure aaa-server
|
Clears the AAA server configuration.
|
show running-config aaa-server host
To display AAA server statistics for a particular server, use the show running-config aaa-server command in global configuration or privileged EXEC mode.
show/clear aaa-server
show running-config [all] aaa-server server-tag [(interface-name)] host hostname
Syntax Description
all
|
(Optional) Shows the running configuration, including default configuration values.
|
server-tag
|
The symbolic name of the server group.
|
Defaults
Omitting the default keyword displays only the explicitly configured configuration values, not the default values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
—
|
—
|
•
|
Global configuration
|
•
|
•
|
—
|
—
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was modified to adhere to CLI guidelines.
|
Usage Guidelines
Use this command to display the statistics for a particular server group. Use the default parameter to display the default as well as the explicitly configured values.
Examples
To display the running configuration for the server group svrgrp1, use the following command:
hostname(config)# show running-config default aaa-server svrgrp1
Related Commands
Command
|
Description
|
show running-config aaa-server
|
Displays AAA server settings for the indicated server, group, or protocol.
|
clear configure aaa
|
Removes the settings for all AAA servers across all groups.
|
show running-config access-group
To display the access group information, use the show running-config access-group command in privileged EXEC mode.
show running-config access-group
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
Preexisting
|
This command was preexisting.
|
Examples
The following is sample output from the show running-config access-group command:
hostname# show running-config access-group
access-group 100 in interface outside
Related Commands
Command
|
Description
|
access-group
|
Binds an access list to an interface.
|
clear configure access-group
|
Removes access groups from all the interfaces.
|
show running-config access-list
To display the access-list configuration that is running on the security appliance, use the show running-config access-list command in privileged EXEC mode.
show running-config [default] access-list [alert-interval | deny-flow-max]
show running-config [default] access-list id [saddr_ip]
Syntax Description
alert-interval
|
Shows the alert interval for generating syslog message 106001, which alerts that the system has reached a deny flow maximum.
|
deny-flow-max
|
Shows the maximum number of concurrent deny flows that can be created.
|
id
|
Identifies the access list that is displayed.
|
saddr_ip
|
Shows the access list elements that contain the specified source IP address.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
Added keyword running-config.
|
Usage Guidelines
The show running-config access-list command allows you to display the current running access list configuration on the security appliance.
Examples
The following is sample output from the show running-config access-list command:
hostname# show running-config access-list
access-list allow-all extended permit ip any any
Related Commands
Command
|
Description
|
access-list ethertype
|
Configures an access list that controls traffic based on its EtherType.
|
access-list extended
|
Adds an access list to the configuration and configures policy for IP traffic through the firewall.
|
access-list ethertype
|
Configures an access list that controls traffic based on its EtherType.
|
clear access-list
|
Clears an access list counter.
|
clear configure access-list
|
Clears an access list from the running configuration.
|
show running-config alias
To display the overlapping addresses with dual NAT commands in the configuration, use the show running-config alias command in privileged EXEC mode.
show running-config alias {interface_name}
Syntax Description
interface_name
|
Internal network interface name that the destination_ip overwrites.
|
Defaults
This command has no default settings.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
—
|
•
|
•
|
Command History
Release
|
Modification
|
Preexisting
|
This command was preexisting.
|
Examples
This example shows how to display alias information:
hostname# show running-config alias
Related Commands
Command
|
Description
|
alias
|
Creates an alias.
|
clear configure alias
|
Deletes an alias.
|
show running-config arp
To show static ARP entries created by the arp command in the running configuration, use the show running-config arp command in privileged EXEC mode.
show running-config arp
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config arp command:
hostname# show running-config arp
arp inside 10.86.195.11 0008.023b.9893
Related Commands
Command
|
Description
|
arp
|
Adds a static ARP entry.
|
arp-inspection
|
For transparent firewall mode, inspects ARP packets to prevent ARP spoofing.
|
show arp
|
Shows the ARP table.
|
show arp statistics
|
Shows ARP statistics.
|
show running-config arp timeout
To view the ARP timeout configuration in the running configuration, use the show running-config arp timeout command in privileged EXEC mode.
show running-config arp timeout
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show arp timeout.
|
Examples
The following is sample output from the show running-config arp timeout command:
hostname# show running-config arp timeout
arp timeout 20000 seconds
Related Commands
Command
|
Description
|
arp
|
Adds a static ARP entry.
|
arp timeout
|
Sets the time before the security appliance rebuilds the ARP table.
|
arp-inspection
|
For transparent firewall mode, inspects ARP packets to prevent ARP spoofing.
|
show arp statistics
|
Shows ARP statistics.
|
show running-config arp-inspection
To view the ARP inspection configuration in the running configuration, use the show running-config arp-inspection command in privileged EXEC mode.
show running-config arp-inspection
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
—
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show arp timeout.
|
Examples
The following is sample output from the show running-config arp-inspection command:
hostname# show running-config arp-inspection
arp-inspection inside1 enable no-flood
Related Commands
Command
|
Description
|
arp
|
Adds a static ARP entry.
|
arp-inspection
|
For transparent firewall mode, inspects ARP packets to prevent ARP spoofing.
|
clear configure arp-inspection
|
Clears the ARP inspection configuration.
|
firewall transparent
|
Sets the firewall mode to transparent.
|
show arp statistics
|
Shows ARP statistics.
|
show running-config asdm
To display the asdm commands in the running configuration, use the show running-config asdm command in privileged EXEC mode.
show running-config asdm [group | location]
Syntax Description
group
|
(Optional) Limits the display to the asdm group commands in the running configuration.
|
location
|
(Optional) Limits the display to the asdm location commands in the running configuration.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from the show running-config pdm command to the show running-config asdm command.
|
Usage Guidelines
To remove the asdm commands from the configuration, use the clear configure asdm command.
Note
On security appliances running in multiple context mode, the show running-config asdm group and show running-config asdm location commands are only available in the system execution space.
Examples
The following is sample output from the show running-configuration asdm command:
hostname# show running-config asdm
Related Commands
Command
|
Description
|
show asdm image
|
Displays the current ASDM image file.
|
show running-config auth-prompt
To displays the current authentication prompt challenge text, use the show running-config auth-prompt command in global configuration mode.
show running-config [default] auth-prompt
Syntax Description
default
|
(Optional) Display the default authentication prompt challenge text.
|
Defaults
Display the configured authentication prompt challenge text.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
—
|
—
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was modified for this release to conform to CLI guidelines.
|
Usage Guidelines
After you configure the authentication prompt with the auth-prompt command, use the show running-config auth-prompt command to view the current prompt text.
Examples
The following example shows the output of the show running-config auth-prompt command:
hostname(config)# show running-config auth-prompt
auth-prompt prompt Please login:
auth-prompt accept You're in!
auth-prompt reject Try again.
Related Commands
auth-prompt
|
Set the user authorization prompts.
|
clear configure auth-prompt
|
Reset the user authorization prompts to the default value.
|
show running-config banner
To display the specified banner and all the lines that are configured for it, use the show running-config banner command in privileged EXEC mode.
show running-config banner [exec | login | motd]
Syntax Description
exec
|
(Optional) Displays the banner before the enable prompt.
|
login
|
(Optional) Displays the banner before the password login prompt when accessing the security appliance using Telnet.
|
motd
|
(Optional) Displays the message-of-the-day banner.
|
Defaults
This command has no default settings.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
The running-config keyword was added.
|
Usage Guidelines
The show running-config banner command displays the specified banner keyword and all the lines configured for it. If a keyword is not specified, then all banners display.
Examples
This example shows how to display the message-of-the-day (motd) banner:
hostname# show running-config banner motd
Related Commands
Command
|
Description
|
banner
|
Creates a banner.
|
clear configure banner
|
Deletes a banner.
|
show running-config class
To show the resource class configuration, use the show running-config class command in privileged EXEC mode.
show running-config class
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
—
|
—
|
•
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config class command:
hostname# show running-config class
limit-resource Mac-addresses 65535
Related Commands
Command
|
Description
|
class
|
Configures a resource class.
|
clear configure class
|
Clears the class configuration.
|
context
|
Configures a security context.
|
limit-resource
|
Sets the resource limit for a class.
|
member
|
Assigns a context to a resource class.
|
show running-config class-map
To display the information about the class map configuration, use the show running-config class-map command in privileged EXEC mode.
show running-config [all] class-map [class_map_name | type {management | regex |
inspect [protocol]}]
Syntax Description
all
|
(Optional) Shows all commands, including the commands you have not changed from the default.
|
class_map_name
|
(Optional) Shows the running configuration for a class map name.
|
inspect
|
(Optional) Shows inspection class maps.
|
management
|
(Optional) Shows management class maps.
|
protocol
|
(Optional) Specifies the type of application map you want to show. Available types include:
• dns
• ftp
• h323
• http
• im
• p2p-donkey
• sip
|
regex
|
(Optional) Shows regular expression class maps.
|
type
|
(Optional) Specifies the type of class map you want to show. To show Layer 3/4 class maps, to not specify the type.
|
Defaults
The class-map class-default command, which contains a single match any command is the default class map.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
Added keyword running-config.
|
Examples
The following is sample output from the show running-config class-map command:
hostname# show running-config class-map
Related Commands
Command
|
Description
|
class-map
|
Applies a traffic class to an interface.
|
clear configure class-map
|
Removes all of the traffic map definitions.
|
show running-config client-update
To display global client-update configuration information, use the show running-config client-update command in global configuration mode or in tunnel-group ipsec-attributes configuration mode.
show running-config client-update
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
—
|
—
|
•
|
Tunnel-group ipsec-attributes configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
7.1(1)
|
Added tunnel-group ipsec-attributes configuration mode.
|
Usage Guidelines
Use this command to display global client-update configuration information.
Examples
This example shows a show running-config client-update command in global configuration mode and its output for a configuration with client-update enabled:
hostname(config)# show running-config client-update
hostname(config)# client-update enable
Related Commands
Command
|
Description
|
clear configure client-update
|
Clears the entire client-update configuration.
|
client-update
|
Configures client-update.
|
show running-config clock
To show the clock configuration in the running configuration, use the show running-config clock command in privileged EXEC mode.
show running-config [all] clock
Syntax Description
all
|
(Optional) Shows all clock commands, including the commands you have not changed from the default.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
—
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The all keyword also displays the exact day and time for the clock summer-time command, as well as the default setting for the offset, if you did not originally set it.
Examples
The following is sample output from the show running-config clock command. Only the clock summer-time command was set.
hostname# show running-config clock
clock summer-time EDT recurring
The following is sample output from the show running-config all clock command. The default setting for the unconfigured clock timezone command displays, and the detailed information for the clock summer-time command displays.
hostname# show running-config all clock
clock summer-time EDT recurring 1 Sun Apr 2:00 last Sun Oct 2:00 60
Related Commands
Command
|
Description
|
clock set
|
Manually sets the clock on the security appliance.
|
clock summer-time
|
Sets the date range to show daylight saving time.
|
clock timezone
|
Sets the time zone.
|
show running-config command-alias
To display the command aliases that are configured, use the show running-config command-alias command in privileged EXEC mode.
show running-config [all] command-alias
Syntax Description
all
|
(Optional) Displays all command aliases configured, including defaults.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
If you do not enter the all keyword, only non-default command aliases display.
Examples
The following example displays all command aliases that are configured on the security appliance, including defaults:
hostname# show running-config all command-alias
command-alias exec h help
command-alias exec lo logout
command-alias exec p ping
command-alias exec s show
command-alias exec save copy running-config startup-config
The following example displays all command aliases that are configured on the security appliance, excluding defaults:
hostname# show running-config command-alias
command-alias exec save copy running-config startup-config
Related Commands
Command
|
Description
|
command-alias
|
Creates a command alias.
|
clear configure command-alias
|
Deletes all non-default command aliases.
|
show running-config compression
To display the compression configuration in the running configuration, use the show running-config compression command from privileged EXEC mode:
show running-config compression
Defaults
There is no default behavior for this command.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.1(1)
|
This command was introduced.
|
Examples
The following example shows the compression configuration within the running configuration:
hostname# show running-config compression
compression svc http-comp
Related Commands
Command
|
Description
|
compression
|
Enables compression for all SVC, WebVPN, and Port Forwarding connections.
|
show running-config console timeout
To display the console connection timeout value, use the show running-config console timeout command in privileged EXEC mode.
show running-config console timeout
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following example shows how to display the console connection timeout setting:
hostname# show running-config console timeout
Related Commands
Command
|
Description
|
console timeout
|
Sets the idle timeout for a console connection to the security appliance.
|
clear configure console
|
Resets the console connection settings to defaults.
|
show running-config context
To show the context configuration in the system execution space, use the show running-config context command in privileged EXEC mode.
show running-config [all] context
Syntax Description
all
|
(Optional) Shows all commands, including the commands you have not changed from the default. If you use the mac-address auto command, then you can view the assigned MAC addresses using the all keyword.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
—
|
—
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
8.0(5)
|
When using the all keyword, you can view assigned MAC addresses to shared interfaces when you configure the mac-address auto command.
|
Usage Guidelines
If you use the mac-address auto command to generate unique MAC addresses for shared interfaces, the all option is required to view the assigned MAC addresses. Although the mac-address auto command is user-configurable in global configuration mode only, the mac-address auto command appears as a read-only entry in the configuration for each context along with the assigned MAC address. Only shared interfaces that are configured with a nameif command within the context have a MAC address assigned.
Note
If you manually assign a MAC address to an interface, but also have auto-generation enabled, the auto-generated address continues to show in the configuration even though the manual MAC address is the one that is in use. If you later remove the manual MAC address, the auto-generated one shown will be used.
Examples
The following output from the show running-config all context admin command shows the primary and standby MAC address assigned to the Management0/0 interface:
hostname# show running-config all context admin
allocate-interface Management0/0
mac-address auto Management0/0 a24d.0000.1440 a24d.0000.1441
config-url disk0:/admin.cfg
The following output from the show running-config all context command shows all the MAC addresses (primary and standby) for all context interfaces. Note that because the GigabitEthernet0/0 and GigabitEthernet0/1 main interfaces are not configured with a nameif command inside the contexts, no MAC addresses have been generated for them.
hostname# show running-config all context
allocate-interface Management0/0
mac-address auto Management0/0 a2d2.0400.125a a2d2.0400.125b
config-url disk0:/admin.cfg
allocate-interface GigabitEthernet0/0
allocate-interface GigabitEthernet0/0.1-GigabitEthernet0/0.5
mac-address auto GigabitEthernet0/0.1 a2d2.0400.11bc a2d2.0400.11bd
mac-address auto GigabitEthernet0/0.2 a2d2.0400.11c0 a2d2.0400.11c1
mac-address auto GigabitEthernet0/0.3 a2d2.0400.11c4 a2d2.0400.11c5
mac-address auto GigabitEthernet0/0.4 a2d2.0400.11c8 a2d2.0400.11c9
mac-address auto GigabitEthernet0/0.5 a2d2.0400.11cc a2d2.0400.11cd
allocate-interface GigabitEthernet0/1
allocate-interface GigabitEthernet0/1.1-GigabitEthernet0/1.3
mac-address auto GigabitEthernet0/1.1 a2d2.0400.120c a2d2.0400.120d
mac-address auto GigabitEthernet0/1.2 a2d2.0400.1210 a2d2.0400.1211
mac-address auto GigabitEthernet0/1.3 a2d2.0400.1214 a2d2.0400.1215
config-url disk0:/CTX1.cfg
allocate-interface GigabitEthernet0/0
allocate-interface GigabitEthernet0/0.1-GigabitEthernet0/0.5
mac-address auto GigabitEthernet0/0.1 a2d2.0400.11ba a2d2.0400.11bb
mac-address auto GigabitEthernet0/0.2 a2d2.0400.11be a2d2.0400.11bf
mac-address auto GigabitEthernet0/0.3 a2d2.0400.11c2 a2d2.0400.11c3
mac-address auto GigabitEthernet0/0.4 a2d2.0400.11c6 a2d2.0400.11c7
mac-address auto GigabitEthernet0/0.5 a2d2.0400.11ca a2d2.0400.11cb
allocate-interface GigabitEthernet0/1
allocate-interface GigabitEthernet0/1.1-GigabitEthernet0/1.3
mac-address auto GigabitEthernet0/1.1 a2d2.0400.120a a2d2.0400.120b
mac-address auto GigabitEthernet0/1.2 a2d2.0400.120e a2d2.0400.120f
mac-address auto GigabitEthernet0/1.3 a2d2.0400.1212 a2d2.0400.1213
config-url disk0:/CTX2.cfg
Related Commands
Command
|
Description
|
admin-context
|
Sets the admin context.
|
allocate-interface
|
Assigns interfaces to a context.
|
changeto
|
Changes between contexts or the system execution space.
|
config-url
|
Specifies the location of the context configuration.
|
context
|
Creates a security context in the system configuration and enters context configuration mode.
|
mac-address auto
|
Automatically generates unique MAC addresses for shared interfaces.
|
show running-config crypto
To display the entire crypto configuration including IPSec, crypto maps, dynamic crypto maps, and ISAKMP, use the show running-config crypto command in global configuration or privileged EXEC mode.
show running-config crypto
Syntax Description
This command has no keywords or arguments.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0
|
This command was introduced.
|
Examples
The following example entered in privileged EXEC mode, displays all crypto configuration information:
hostname# show running-config crypto map
crypto map abc 1 match address xyz
crypto map abc 1 set peer 209.165.200.225
crypto map abc 1 set transform-set ttt
crypto map abc interface test
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 lifetime 86400
Related Commands
Command
|
Description
|
clear configure isakmp
|
Clears all the ISAKMP configuration.
|
clear configure isakmp policy
|
Clears all ISAKMP policy configuration.
|
clear isakmp sa
|
Clears the IKE runtime SA database.
|
isakmp enable
|
Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the security appliance.
|
show isakmp sa
|
Displays IKE runtime SA database with additional information.
|
show running-config crypto dynamic-map
To view a dynamic crypto map, use the show running-config crypto dynamic-map command in global configuration or privileged EXEC mode.
show running-config crypto dynamic-map
Syntax Description
This command has no keywords or arguments.
Defaults
No default behaviors or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
•
|
—
|
—
|
Privileged EXEC
|
•
|
•
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following example entered in global configuration mode, displays all configuration information about crypto dynamic maps:
hostname(config)# show running-config crypto dynamic-map
Crypto Map Template "dyn1" 10
access-list 152 permit ip host 172.21.114.67 any
Security association lifetime: 4608000 kilobytes/120 seconds
Transform sets={ tauth, t1, }
Related Commands
Command
|
Description
|
clear configure isakmp
|
Clears all the ISAKMP configuration.
|
clear configure isakmp policy
|
Clears all ISAKMP policy configuration.
|
clear isakmp sa
|
Clears the IKE runtime SA database.
|
isakmp enable
|
Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the security appliance.
|
show isakmp sa
|
Displays IKE runtime SA database with additional information.
|
show running-config crypto ipsec
To display the complete IPSec configuration, use the show running-config crypto ipsec command in global configuration or privileged EXEC mode.
show running-config crypto ipsec
Syntax Description
This command has no default behavior or values.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following example issued in global configuration mode, displays information about the IPSec configuration:
hostname(config)# show running-config crypto ipsec
crypto ipsec transform-set ttt esp-3des esp-md5-hmac
Related Commands
Command
|
Description
|
clear configure isakmp
|
Clears all the ISAKMP configuration.
|
clear configure isakmp policy
|
Clears all ISAKMP policy configuration.
|
clear isakmp sa
|
Clears the IKE runtime SA database.
|
isakmp enable
|
Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the security appliance.
|
show isakmp sa
|
Displays IKE runtime SA database with additional information.
|
show running-config crypto isakmp
To display the complete ISAKMP configuration, use the show running-config crypto isakmp command in global configuration or privileged EXEC mode.
show running-config crypto isakmp
Syntax Description
This command has no default behavior or values.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
The show running-config isakmp command was introduced.
|
7.2(1)
|
This command was deprecated. The show running-config crypto isakmp command replaces it.
|
Examples
The following example issued in global configuration mode, displays information about the ISKAKMP configuration:
hostname(config)# show running-config crypto isakmp
crypto isakmp enable inside
crypto isakmp policy 1 authentication pre-share
crypto isakmp policy 1 encryption 3des
crypto isakmp policy 1 hash md5
crypto isakmp policy 1 group 2
crypto isakmp policy 1 lifetime 86400
Related Commands
Command
|
Description
|
clear configure crypto isakmp
|
Clears all the ISAKMP configuration.
|
clear configure crypto isakmp policy
|
Clears all ISAKMP policy configuration.
|
clear crypto isakmp sa
|
Clears the IKE runtime SA database.
|
crypto isakmp enable
|
Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the security appliance.
|
show crypto isakmp sa
|
Displays IKE runtime SA database with additional information.
|
show running-config crypto map
To display all configuration for all crypto maps, use the show running-config crypto map command in global configuration or privileged EXEC mode.
show running-config crypto map
Syntax Description
This command has no keywords or arguments.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
•
|
—
|
—
|
Privileged EXEC
|
•
|
•
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0
|
This command was introduced.
|
Examples
The following example entered in privileged EXEC mode, displays all configuration information for all crypto maps:
hostname# show running-config crypto map
crypto map abc 1 match address xyz
crypto map abc 1 set peer 209.165.200.225
crypto map abc 1 set transform-set ttt
crypto map abc interface test
Related Commands
Command
|
Description
|
clear configure isakmp
|
Clears all the ISAKMP configuration.
|
clear configure isakmp policy
|
Clears all ISAKMP policy configuration.
|
clear isakmp sa
|
Clears the IKE runtime SA database.
|
isakmp enable
|
Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the security appliance.
|
show isakmp sa
|
Displays IKE runtime SA database with additional information.
|
show running-config ctl-file
To show configured CTL file instances, use the show running-config ctl-file command in privileged EXEC mode.
show running-config [all] ctl-file [ ctl_name ]
Syntax Description
ctl_name
|
(Optional) Specifies the name of the CTL file instance.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
8.0(4)
|
The command was introduced.
|
Examples
The following example shows the use of the show running-config ctl-file command to show configured CTL file instances:
hostname# show running-config all ctl-file asa_ctl
Related Commands
Command
|
Description
|
ctl-file (global)
|
Specifies the CTL file to create for Phone Proxy configuration or the CTL file to parse from Flash memory.
|
ctl-file (phone-proxy)
|
Specifies the CTL file to use for Phone Proxy configuration.
|
phone-proxy
|
Configures the Phone Proxy instance.
|
show running-config ctl-provider
To display all currently running Certificate Trust List provider configurations, use the show running-config ctl-provider command in privileged EXEC mode.
show running-config [all] ctl-provider [provider_name]
Syntax Description
all
|
Shows all TLS proxy commands, including the commands you have not changed from the default.
|
provider_name
|
Specifies the name of the CTL provider to show.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
8.0(2)
|
This command was introduced.
|
Examples
The following is sample output of the show running-config ctl-provider command:
hostname# show running-config ctl-provider
client interface inside address 195.168.2.103
client username CCMAdministrator password xxxxxxxxxxxx encrypted
export certificate local_ccm
Related Commands
Command
|
Description
|
ctl
|
Parses the CTL file from the CTL client and install trustpoints.
|
ctl-provider
|
Configures a CTL provider instance in CTL provider mode.
|
export
|
Specifies the certificate to be exported to the client
|
service
|
Specifies the port to which the CTL provider listens.
|
show running-config ddns
To display the DDNS update methods of the running configuration, use the show running-config ddns command in privileged EXEC mode.
show running-config [all] ddns [update]
Syntax Description
all
|
(Optional) Shows the running configuration, including default configuration values.
|
update
|
(Optional) Specifies that DDNS update method information be displayed.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Examples
The following example displays the DDNS methods in the running configuration with test in the name:
hostname# show running-config all ddns | grep test
Related Commands
Command
|
Description
|
ddns (DDNS-update-
method mode)
|
Specifies a DDNS update method type for a created DDNS method.
|
ddns update (interface config mode)
|
Associates a security appliance interface with a DDNS update method or a DDNS update hostname.
|
ddns update method (global config mode)
|
Creates a method for dynamically updating DNS resource records.
|
show ddns update interface
|
Displays the interfaces associated with each configured DDNS method.
|
show ddns update method
|
Displays the type and interval for each configured DDNS method. a DHCP server to perform DDNS updates.
|
show running-config dhcp-client
To display the DHCP client update parameters in the running configuration, use the show running-config dhcp-client command in privileged EXEC mode.
show running-config [all] dhcp-client
Syntax Description
all
|
(Optional) Shows the running configuration including default configuration values.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Examples
The following example displays DHCP client update parameters in the running configuration that specify updates for both A and PTR records:
hostname# show running-config all dhcp-client | grep both
dhcp-client update dns server both
Related Commands
Command
|
Description
|
dhcp-client update dns
|
Configures the update parameters that the DHCP client passes to the DHCP server.
|
dhcpd update dns
|
Enables a DHCP server to perform DDNS updates.
|
clear configure dhcp-client
|
Clears the DHCP client configuration.
|
show running-config dhcpd
To show the DHCP configuration, use the show running-config dhcpd command in privileged EXEC or global configuration mode.
show running-config dhcpd
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from the show dhcpd command to the show running-config dhcpd command.
|
Usage Guidelines
The show running-config dhcpd command displays the DHCP commands entered in the running configuration. To see DHCP binding, state, and statistical information, use the show dhcpd command.
Examples
The following is sample output from the show running-config dhcpd command:
hostname# show running-config dhcpd
dhcpd address 10.0.1.100-10.0.1.108 inside
dhcpd dns 209.165.201.2 209.165.202.129
Related Commands
Command
|
Description
|
clear configure dhcpd
|
Removes all DHCP server settings.
|
debug dhcpd
|
Displays debug information for the DHCP server.
|
show dhcpd
|
Displays DHCP binding, statistic, or state information.
|
show running-config dhcprelay
To view the current DHCP relay agent configuration, use the show running-config dhcprelay command in privileged EXEC mode.
show running-config dhcprelay
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
Preexisting
|
This command was preexisting.
|
Usage Guidelines
The show running-config dhcprelay command displays the current DHCP relay agent configuration. To show DHCP relay agent packet statistics, use the show dhcprelay statistics command.
Examples
The following example shows output from the show running-config dhcprelay command:
hostname(config)# show running-config dhcprelay
dhcprelay server 10.1.1.1
Related Commands
Command
|
Description
|
clear configure dhcprelay
|
Removes all DHCP relay agent settings.
|
clear dhcprelay statistics
|
Clears the DHCP relay agent statistic counters.
|
debug dhcprelay
|
Displays debug information for the DHCP relay agent.
|
show dhcprelay statistics
|
Displays DHCP relay agent statistic information.
|
show running-config dns
To show the DNS configuration in the running configuration, use the show running-config dns command in privileged EXEC mode.
show running-config dns
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0
|
This command was introduced.
|
Examples
The following is sample output from the show running-config dns command:
hostname# show running-config dns
Related Commands
Command
|
Description
|
dns domain-lookup
|
Enables the security appliance to perform a name lookup.
|
dns name-server
|
Configures a DNS server address.
|
dns retries
|
Specifies the number of times to retry the list of DNS servers when the security appliance does not receive a response.
|
dns timeout
|
Specifies the amount of time to wait before trying the next DNS server.
|
show dns-hosts
|
Shows the DNS cache.
|
show running-config dns server-group
To show the DNS configuration in the running configuration, use the show running-config dns command in privileged EXEC mode.
show [all] running-config dns server-group [name]
Syntax Description
all
|
Displays the default and explicitly configured configuration information for one or all dns-server-groups.
|
name
|
Specifies the name of the dns server group for which you want to show the configuration information.
|
Defaults
If you omit the dns-server-group name, this command displays all the existing dns-server-group configurations.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.1 (1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config dns server-group command:
hostname# show running-config dns server-group
dns server-group DefaultDNS
domain-name frqa.cisco.com
dns server-group writers1
Related Commands
Command
|
Description
|
clear configure dns
|
Removes all DNS commands.
|
dns server-group
|
Enters DNS server group mode, in which you can configure a DNS server group.
|
show running-config domain-name
To show the domain name configuration in the running configuration, use the show running-config domain-name command in privileged EXEC mode.
show running-config domain-name
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show domain-name.
|
Examples
The following is sample output from the show running-config domain-name command:
hostname# show running-config domain-name
Related Commands
Command
|
Description
|
domain-name
|
Sets the default domain name.
|
hostname
|
Sets the security appliance hostname.
|
show running-config dynamic-access-policy-record
To display the running configuration for all DAP records, or for the named DAP record, use the show running-config dynamic-access-policy-record command in privileged EXEC mode.
show running-config dynamic-access-policy-record [name]
Syntax Description
name
|
Specifies the name of the DAP record. The name can be up to 64 characters long and cannot contain spaces.
|
E
Defaults
All attributes display.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC mode
|
•
|
•
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
8.0(2)
|
This command was introduced.
|
Examples
This example shows the use of the show running-config dynamic-access-policy-record command to display statistics for the DAP record named Finance:
ASA(config)#show running-config dynamic-access-policy-record Finance
dynamic-access-policy-record Finance
description value "Finance users from trusted device"
network-acl FinanceFirewallAcl
user-message "Limit access to the Finance network"
appl-acl FinanceWebvpnAcl
url-list value FinanceLinks,StockLinks
port-forward enable FinanceApps
file-entry enablehostname#
Related Commands
Command
|
Description
|
clear config dynamic-access-policy-record [name]
|
Removes all DAP records or the named DAP record.
|
dynamic-access-policy-record
|
Creates a DAP record.
|
show running-config enable
To show the encrypted enable passwords, use the show running-config enable command in privileged EXEC mode.
show running-config enable
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from the show enable command.
|
Usage Guidelines
The password is saved to the configuration in encrypted form, so you cannot view the original password after you enter it. The password displays with the encrypted keyword to indicate that the password is encrypted.
Examples
The following is sample output from the show running-config enable command:
hostname# show running-config enable
enable password 2AfK9Kjr3BE2/J2r level 10 encrypted
enable password 8Ry2YjIyt7RRXU24 encrypted
Related Commands
Command
|
Description
|
disable
|
Exits privileged EXEC mode.
|
enable
|
Enters privileged EXEC mode.
|
enable password
|
Sets the enable password.
|
show running-config established
To display the allowed inbound connections that are based on established connections, use the show running-config established command in privileged EXEC mode.
show running-config established
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
The keyword running-config was added.
|
Usage Guidelines
This command has no usage guidelines.
Examples
This example shows how to display inbound connections that are based on established connections:
hostname# show running-config established
Related Commands
Command
|
Description
|
established
|
Permits return connections on ports that are based on an established connection.
|
clear configure established
|
Removes all established commands.
|
show running-config failover
To display the failover commands in the configuration, use the show running-config failover command in privileged EXEC mode.
show running-config [ all ] failover
Syntax Description
all
|
(Optional) Shows all failover commands, including the commands you have not changed from the default.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
—
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The show running-config failover command displays the failover commands in the running configuration. It does not display the monitor-interface or join-failover-group commands.
Examples
The following example shows the default failover configuration before failover has been configured:
hostname# show running-config all failover
failover lan unit secondary
failover polltime unit 15 holdtime 45
failover polltime interface 15
failover interface policy 1
Related Commands
Command
|
Description
|
show failover
|
Displays failover state and statistics.
|
show running-config filter
To show the filtering configuration, use the show running-config filter command in privileged EXEC mode.
show running-config filter
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
Preexisting
|
This command was preexisting.
|
Usage Guidelines
The show running-config filter command displays the filtering configuration for the security appliance.
Examples
The following is sample output from the show running-config filter command, and shows the filtering configuration for the security appliance:
hostname# show running-config filter
filter activex 80 10.86.194.170 255.255.255.255 10.1.1.0 255.255.255.224
This example shows ActiveX filtering is enabled on port80 for the address 10.86.194.170.
Related Commands
Commands
|
Description
|
filter activex
|
Removes ActiveX objects from HTTP traffic passing through the security appliance.
|
filter ftp
|
Identifies the FTP traffic to be filtered by a URL filtering server.
|
filter https
|
Identifies the HTTPS traffic to be filtered by a Websense server.
|
filter java
|
Removes Java applets from HTTP traffic passing through the security appliance.
|
filter url
|
Directs traffic to a URL filtering server.
|
show running-config fips
To display the FIPS configuration that is running on the security appliance, use the show running-config fips command.
show running-config fips
Syntax Description
fips
|
FIPS-2 compliance information
|
Defaults
This command has no default settings.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(4)
|
This command was introduced.
|
Usage Guidelines
The show running-config fips command allows you to display the current running fips configuration. You use the running-config keyword only in the show running-config fips command. You cannot use this keyword with no or clear, or as a standalone command as it is not supported. When you enter the ?, no ?, or clear ? keywords, a running-config keyword is not listed in the command list.
Examples
hostname(config)# show running-config fips
Related Commands
Command
|
Description
|
clear configure fips
|
Clears the system or module FIPS configuration information stored in NVRAM.
|
crashinfo console disable
|
Disables the reading, writing and configuration of crash write info to flash.
|
fips enable
|
Enables or disablea policy-checking to enforce FIPS compliance on the system or module.
|
fips self-test poweron
|
Executes power-on self-tests.
|
show crashinfo console
|
Reads, writes, and configures crash write to flash.
|
show running-config fragment
To display the current configuration of the fragment databases, use the show running-config fragment command in privileged EXEC mode.
show running-config fragment [interface]
Syntax Description
interface
|
(Optional) Specifies the security appliance interface.
|
Defaults
If an interface is not specified, the command applies to all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The show running-config fragment command displays the current configuration of the fragment databases. If you specify an interface name, only information for the database residing at the specified interface displays. If you do not specify an interface name, the command applies to all interfaces.
Use the show running-config fragment command to display this information:
•
Size—Maximum number of packets set by the size keyword. This value is the maximum number of fragments that are allowed on the interface.
•
Chain—Maximum number of fragments for a single packet set by the chain keyword.
•
Timeout—Maximum number of seconds set by the timeout keyword. This is the maximum number of seconds to wait for an entire fragmented packet to arrive. The timer starts after the first fragment of a packet arrives. If all fragments of the packet do not arrive by the number of seconds specified, all fragments of the packet that were already received will be discarded.
Examples
The following example shows how to display the states of the fragment databases on all interfaces:
hostname# show running-config fragment
fragment timeout 5 inside
fragment size 200 outside1
fragment chain 24 outside1
fragment timeout 5 outside1
fragment size 200 outside2
fragment chain 24 outside2
fragment timeout 5 outside2
fragment size 200 outside3
fragment chain 24 outside3
fragment timeout 5 outside3
The following example shows how to display the states of the fragment databases on interfaces that start with the name "outside":
Note
In this example, the interfaces named "outside1", "outside2", and "outside3" display.
hostname# show running-config fragment outside
fragment size 200 outside1
fragment chain 24 outside1
fragment timeout 5 outside1
fragment size 200 outside2
fragment chain 24 outside2
fragment timeout 5 outside2
fragment size 200 outside3
fragment chain 24 outside3
fragment timeout 5 outside3
The following example shows how to display the states of the fragment databases on the interfaces named "outside1" only:
hostname# show running-config fragment outside1
fragment size 200 outside1
fragment chain 24 outside1
fragment timeout 5 outside1
Related Commands
Command
|
Description
|
clear configure fragment
|
Resets all the IP fragment reassembly configurations to defaults.
|
clear fragment
|
Clears the operational data of the IP fragment reassembly module.
|
fragment
|
Provides additional management of packet fragmentation and improves compatibility with NFS.
|
show fragment
|
Displays the operational data of the IP fragment reassembly module.
|
show running-config ftp mode
To show the client mode configured for FTP, use the show running-config ftp mode command in privileged EXEC mode.
show running-config ftp mode
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
Preexisting
|
This command was preexisting.
|
Usage Guidelines
The show running-config ftp mode command displays the client mode that is used by the security appliance when accessing an FTP server.
Examples
The following is sample output from the show running-config ftp-mode command:
hostname# show running-config ftp-mode
Related Commands
Commands
|
Description
|
copy
|
Uploads or downloads image files or configuration files to or from an FTP server.
|
debug ftp client
|
Displays detailed information about FTP client activity.
|
ftp mode passive
|
Sets the FTP client mode used by the security appliance when accessing an FTP server.
|
show running-config global
To display the global commands in the configuration, use the show running-config global command in privileged EXEC mode.
show running-config global
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
Added keyword running-config.
|
Examples
The following is sample output from the show running-config global command:
hostname# show running-config global
global (outside1) 10 interface
Related Commands
Command
|
Description
|
clear configure global
|
Removes global commands from the configuration.
|
global
|
Creates entries from a pool of global addresses.
|
show running-config group-delimiter
To display the current delimiter to be used when parsing group names from the user names that are received when tunnels are being negotiated, use the show running-config group-delimiter command in global configuration mode or in tunnel-group ipsec-attributes configuration mode.
show running-config group-delimiter
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
—
|
—
|
•
|
Tunnel-group ipsec-attributes configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
7.1(1)
|
Added tunnel-group ipsec-attributes configuration mode.
|
Usage Guidelines
Use this command to display the currently configured group-delimiter.
Examples
This example shows a show running-config group-delimiter command and its output:
hostname(config)# show running-config group-delimiter
Related Commands
Command
|
Description
|
group-delimiter
|
Enables group-name parsing and specifies the delimiter to be used when parsing group names from the user names that are received when tunnels are being negotiated.
|
show running-config group-policy
To display the running configuration for a particular group policy, use the show running-config group-policy command in privileged EXEC mode and append the name of the group policy. To display the running configuration for all group policies, use this command without naming a specific group policy. To have either display include the default configuration, use the all keyword.
show running-config [all] group-policy [name]
Syntax Description
all
|
(Optional) Displays the running configuration including default values.
|
name
|
(Optional) Specifies the name of the group policy.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0
|
This command was introduced.
|
Examples
The following example shows how to display the running configuration, including default values, for the group policy named FirstGroup:
hostname# show running-config all group-policy FirstGroup
Related Commands
Command
|
Description
|
group-policy
|
Creates, edits, or removes a group policy.
|
group-policy attributes
|
Enters group-policy attributes mode, which lets you configure AVPs for a specified group policy.
|
clear config group-policy
|
Removes the configuration for a particular group policy or for all group policies.
|
show running-config http
To display the current set of configured http commands, use the show running-config http command in privileged EXEC mode.
show running-config http
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following sample output shows how to use the show running-config http command:
hostname# show running-config http
Related Commands
Command
|
Description
|
clear http
|
Remove the HTTP configuration: disable the HTTP server and remove hosts that can access the HTTP server.
|
http
|
Specifies hosts that can access the HTTP server by IP address and subnet mask. Specifies the security appliance interface through which the host accesses the HTTP server.
|
http authentication-certificate
|
Requires authentication via certificate from users who are establishing HTTPS connections to the security appliance.
|
http redirect
|
Specifies that the security appliance redirect HTTP connections to HTTPS.
|
http server enable
|
Enables the HTTP server.
|
show running-config icmp
To show the access rules configured for ICMP traffic, use the show running-config icmp command in privileged EXEC mode.
show running-config icmp map_name
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
Preexisting
|
This command was preexisting.
|
Usage Guidelines
The show running-config icmp command displays the access rules configured for ICMP traffic.
Examples
The following is sample output from the show running-config icmp command:
hostname# show running-config icmp
icmp permit host 172.16.2.15 echo-reply outside
icmp permit 172.22.1.0 255.255.0.0 echo-reply outside
icmp permit any unreachable outside
Related Commands
Commands
|
Description
|
clear configure icmp
|
Clears the ICMP configuration.
|
debug icmp
|
Enables the display of debug information for ICMP.
|
show icmp
|
Displays ICMP configuration.
|
timeout icmp
|
Configures the idle timeout for ICMP.
|
show running-config imap4s
To display the running configuration for IMAP4S, use the show running-config imap4s command in privileged EXEC mode.
show running-config [ all ] imap4s
Syntax Description
all
|
(Optional) Displays the running configuration including default values.
|
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Webvpn
|
•
|
—
|
•
|
—
|
—
|
Examples
The following is sample output from the show running-config imap4s command:
hostname# show running-config imap4s
authentication-server-group KerbSvr
hostname# show running-config all imap4s
authentication-server-group KerbSvr
no authorization-server-group
no accounting-server-group
Related Commands
Command
|
Description
|
clear configure imap4s
|
Removes the IMAP4S configuration.
|
imap4s
|
Creates or edits an IMAP4S e-mail proxy configuration.
|
show running-config interface
To show the interface configuration in the running configuration, use the show running-config interface command in privileged EXEC mode.
show running-config [all] interface [physical_interface[.subinterface] | mapped_name |
interface_name]
Syntax Description
all
|
(Optional) Shows all interface commands, including the commands you have not changed from the default.
|
interface_name
|
(Optional) Identifies the interface name set with the nameif command.
|
mapped_name
|
(Optional) In multiple context mode, identifies the mapped name if it was assigned using the allocate-interface command.
|
physical_interface
|
(Optional) Identifies the interface ID, such as gigabitethernet0/1. See the interface command for accepted values.
|
subinterface
|
(Optional) Identifies an integer between 1 and 4294967293 designating a logical subinterface.
|
Defaults
If you do not specify an interface, this command shows the configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
You cannot use the interface name in the system execution space, because the nameif command is only available within a context. Similarly, if you mapped the interface ID to a mapped name using the allocate-interface command, you can only use the mapped name in a context.
Examples
The following is sample output from the show running-config interface command. The following example shows the running configuration for all interfaces. The GigabitEthernet0/2 and 0/3 interfaces have not been configured yet, and show the default configuration. The Management0/0 interface also shows the default settings.
hostname# show running-config interface
interface GigabitEthernet0/0
ip address 10.86.194.60 255.255.254.0
interface GigabitEthernet0/1
ip address 10.10.4.200 255.255.0.0
interface GigabitEthernet0/1.1
ip address 10.50.1.1 255.255.255.0
mac-address 000C.F142.4CDE standby 020C.F142.4CDE
interface GigabitEthernet0/2
interface GigabitEthernet0/3
Related Commands
Command
|
Description
|
allocate-interface
|
Assigns interfaces and subinterfaces to a security context.
|
clear configure interface
|
Clears the interface configuration.
|
interface
|
Configures an interface and enters interface configuration mode.
|
nameif
|
Sets the interface name.
|
show interface
|
Displays the runtime status and statistics of interfaces.
|
show running-config ip address
To show the IP address configuration in the running configuration, use the show running-config ip address command in privileged EXEC mode.
show running-config ip address [physical_interface[.subinterface] | mapped_name |
interface_name]
Syntax Description
interface_name
|
(Optional) Identifies the interface name set with the nameif command.
|
mapped_name
|
(Optional) In multiple context mode, identifies the mapped name if it was assigned using the allocate-interface command.
|
physical_interface
|
(Optional) Identifies the interface ID, such as gigabitethernet0/1. See the interface command for accepted values.
|
subinterface
|
(Optional) Identifies an integer between 1 and 4294967293 designating a logical subinterface.
|
Defaults
If you do not specify an interface, this command shows the IP address configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
In multiple context mode, if you mapped the interface ID in the allocate-interface command, you can only specify the mapped name or the interface name in a context.
In transparent firewall mode, do not specify an interface because this command shows only the management IP address; the transparent firewall does not have IP addresses associated with interfaces.
This display also shows the nameif command and security-level command configuration.
Examples
The following is sample output from the show running-config ip address command:
hostname# show running-config ip address
interface GigabitEthernet0/0
ip address 10.86.194.60 255.255.254.0
interface GigabitEthernet0/1
ip address 10.10.4.200 255.255.0.0
Related Commands
Command
|
Description
|
clear configure interface
|
Clears the interface configuration.
|
interface
|
Configures an interface and enters interface configuration mode.
|
ip address
|
Sets the IP address for the interface or sets the management IP address for a transparent firewall.
|
nameif
|
Sets the interface name.
|
security-level
|
Sets the security level for the interface.
|
show running-config ip audit attack
To show the ip audit attack configuration in the running configuration, use the show running-config ip audit attack command in privileged EXEC mode.
show running-config ip audit attack
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit attack.
|
Examples
The following is sample output from the show running-config ip audit attack command:
hostname# show running-config ip audit attack
ip audit attack action drop
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit info
To show the ip audit info configuration in the running configuration, use the show running-config ip audit info command in privileged EXEC mode.
show running-config ip audit info
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit info.
|
Examples
The following is sample output from the show running-config ip audit info command:
hostname# show running-config ip audit info
ip audit info action drop
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit interface
To show the ip audit interface configuration in the running configuration, use the show running-config ip audit interface command in privileged EXEC mode.
show running-config ip audit interface [interface_name]
Syntax Description
interface_name
|
(Optional) Specifies the interface name.
|
Defaults
If you do not specify an interface name, this command shows the configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit interface.
|
Examples
The following is sample output from the show running-config ip audit interface command:
hostname# show running-config ip audit interface
ip audit interface inside insidepolicy
ip audit interface outside outsidepolicy
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit name
To show the ip audit name configuration in the running configuration, use the show running-config ip audit name command in privileged EXEC mode.
show running-config ip audit name [ name [ info | attack ]]
Syntax Description
attack
|
(Optional) Shows the named audit policy configuration for attack signatures.
|
info
|
(Optional) Shows the named audit policy configuration for informational signatures.
|
name
|
(Optional) Shows the configuration for the audit policy name created using the ip audit name command.
|
Defaults
If you do not specify a name, this command shows the configuration for all audit policies.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit name.
|
Examples
The following is sample output from the show running-config ip audit name command:
hostname# show running-config ip audit name
ip audit name insidepolicy1 attack action alarm
ip audit name insidepolicy2 info action alarm
ip audit name outsidepolicy1 attack action reset
ip audit name outsidepolicy2 info action alarm
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit signature
To show the ip audit signature configuration in the running configuration, use the show running-config ip audit signature command in privileged EXEC mode.
show running-config ip audit signature [signature_number]
Syntax Description
signature_number
|
(Optional) Shows the configuration for the signature number, if present. See the ip audit signature command for a list of supported signatures.
|
Defaults
If you do not specify a number, this command shows the configuration for all signatures.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit signature.
|
Examples
The following is sample output from the show running-config ip audit signature command:
hostname# show running-config ip audit signature
ip audit signature 1000 disable
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip local pool
To display IP address pools, use the show running-config ip local pool command in privileged EXEC mode.
show running-config ip local pool [poolname]
Syntax Description
poolname
|
(Optional) Specifies the name of the IP address pool.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config ip local pool command:
hostname(config)# show running-config ip local pool firstpool
Pool Begin End Mask Free In use
firstpool 10.20.30.40 10.20.30.50 255.255.255.0 11
Related Commands
Command
|
Description
|
clear configure ip local pool
|
Removes all ip local pools
|
ip local pool
|
Configures an IP address pool.
|
show running-config ip verify reverse-path
To show the ip verify reverse-path configuration in the running configuration, use the show running-config ip verify reverse-path command in privileged EXEC mode.
show running-config ip verify reverse-path [interface interface_name]
Syntax Description
interface interface_name
|
(Optional) Shows the configuration for the specified interface.
|
Defaults
This command shows the configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
·
|
—
|
·
|
·
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip verify reverse-path.
|
Examples
The following is sample output from the show ip verify statistics command:
hostname# show running-config ip verify reverse-path
ip verify reverse-path interface inside
ip verify reverse-path interface outside
ip verify reverse-path interface dmz
Related Commands
Command
|
Description
|
clear configure ip verify reverse-path
|
Clears the ip verify reverse-path configuration.
|
clear ip verify statistics
|
Clears the Unicast RPF statistics.
|
ip verify reverse-path
|
Enables the Unicast Reverse Path Forwarding feature to prevent IP spoofing.
|
show ip verify statistics
|
Shows the Unicast RPF statistics.
|
show running-config ipv6
To display the IPv6 commands in the running configuration, use the show running-config ipv6 command in privileged EXEC mode.
show running-config [all] ipv6
Syntax Description
all
|
(Optional) Shows all ipv6 commands, including the commands you have not changed from the default, in the running configuration.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config ipv6 command:
hostname# show running-config ipv6
ipv6 route vlan101 ::/0 fec0::65:0:0:a0a:6575
ipv6 access-list outside_inbound_ipv6 permit ip any any
ipv6 access-list vlan101_inbound_ipv6 permit ip any any
Related Commands
Command
|
Description
|
debug ipv6
|
Displays IPv6 debug messages.
|
show ipv6 access-list
|
Displays the IPv6 access list.
|
show ipv6 interface
|
Displays the status of the IPv6 interfaces.
|
show ipv6 route
|
Displays the contents of the IPv6 routing table.
|
show ipv6 traffic
|
Displays IPv6 traffic statistics.
|
show running-config isakmp
To display the complete ISAKMP configuration, use the show running-config isakmp command in global configuration or privileged EXEC mode.
show running-config isakmp
Syntax Description
This command has no default behavior or values.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
The show running-config isakmp command was introduced.
|
7.2(1)
|
This command was deprecated. The show running-config crypto isakmp command replaces it.
|
Examples
The following example issued in global configuration mode, displays information about the ISKAKMP configuration:
hostname(config)# show running-config isakmp
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 lifetime 86400
Related Commands
Command
|
Description
|
clear configure isakmp
|
Clears all the ISAKMP configuration.
|
clear configure isakmp policy
|
Clears all ISAKMP policy configuration.
|
clear isakmp sa
|
Clears the IKE runtime SA database.
|
isakmp enable
|
Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the security appliance.
|
show isakmp sa
|
Displays IKE runtime SA database with additional information.
|