Table Of Contents
show running-config ddns through show running-config isakmp Commands
show running-config ddns
show running-config dhcp-client
show running-config dhcpd
show running-config dhcprelay
show running-config dns
show running-config dns server-group
show running-config domain-name
show running-config dynamic-access-policy-record
show running-config dynamic-filter
show running-config enable
show running-config established
show running-config failover
show running-config filter
show running-config fips
show running-config flow-export
show running-config fragment
show running-config ftp mode
show running-config global
show running-config group-delimiter
show running-config group-policy
show running-config hpm
show running-config http
show running-config icmp
show running-config imap4s
show running-config interface
show running-config interface bvi
show running-config ip address
show running-config ip audit attack
show running-config ip audit info
show running-config ip audit interface
show running-config ip audit name
show running-config ip audit signature
show running-config ip local pool
show running-config ip verify reverse-path
show running-config ipv6
show running-config ipv6 router
show running-config isakmp
show running-config ddns through show running-config isakmp Commands
show running-config ddns
To display the DDNS update methods of the running configuration, use the show running-config ddns command in privileged EXEC mode.
show running-config [all] ddns [update]
Syntax Description
all
|
(Optional) Shows the running configuration, including default configuration values.
|
update
|
(Optional) Specifies that DDNS update method information be displayed.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Examples
The following example displays the DDNS methods in the running configuration with test in the name:
hostname# show running-config all ddns | grep test
Related Commands
Command
|
Description
|
ddns (DDNS-update-
method mode)
|
Specifies a DDNS update method type for a created DDNS method.
|
ddns update (interface config mode)
|
Associates an ASA interface with a DDNS update method or a DDNS update hostname.
|
ddns update method (global config mode)
|
Creates a method for dynamically updating DNS resource records.
|
show ddns update interface
|
Displays the interfaces associated with each configured DDNS method.
|
show ddns update method
|
Displays the type and interval for each configured DDNS method. a DHCP server to perform DDNS updates.
|
show running-config dhcp-client
To display the DHCP client update parameters in the running configuration, use the show running-config dhcp-client command in privileged EXEC mode.
show running-config [all] dhcp-client
Syntax Description
all
|
(Optional) Shows the running configuration including default configuration values.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Examples
The following example displays DHCP client update parameters in the running configuration that specify updates for both A and PTR records:
hostname# show running-config all dhcp-client | grep both
dhcp-client update dns server both
Related Commands
Command
|
Description
|
dhcp-client update dns
|
Configures the update parameters that the DHCP client passes to the DHCP server.
|
dhcpd update dns
|
Enables a DHCP server to perform DDNS updates.
|
clear configure dhcp-client
|
Clears the DHCP client configuration.
|
show running-config dhcpd
To show the DHCP configuration, use the show running-config dhcpd command in privileged EXEC or global configuration mode.
show running-config dhcpd
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from the show dhcpd command to the show running-config dhcpd command.
|
Usage Guidelines
The show running-config dhcpd command displays the DHCP commands entered in the running configuration. To see DHCP binding, state, and statistical information, use the show dhcpd command.
Examples
The following is sample output from the show running-config dhcpd command:
hostname# show running-config dhcpd
dhcpd address 10.0.1.100-10.0.1.108 inside
dhcpd dns 209.165.201.2 209.165.202.129
Related Commands
Command
|
Description
|
clear configure dhcpd
|
Removes all DHCP server settings.
|
debug dhcpd
|
Displays debug information for the DHCP server.
|
show dhcpd
|
Displays DHCP binding, statistic, or state information.
|
show running-config dhcprelay
To view the current DHCP relay agent configuration, use the show running-config dhcprelay command in privileged EXEC mode.
show running-config dhcprelay [global | interface [ifc]]
Syntax Description
global
|
Shows the global DHCP relay agent configuration.
|
ifc
|
Shows the DHCP relay agent configuration on a specified interface.
|
interface
|
Shows all of the DHCP relay agent configurations on all interfaces.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
9.1.(2)
|
The global, interface, and ifc options were added.
|
Usage Guidelines
The show running-config dhcprelay command displays the current DHCP relay agent configuration. To show DHCP relay agent packet statistics, use the show dhcprelay statistics command.
The vlan option for Catalyst 6500 VLANs is available when you show the DHCP relay configuration on a per-interface basis. You can show the DHCP relay configuration on a per-interface basis by including the interface name (ifc option).
Examples
The following is sample output from the show running-config dhcprelay command:
hostname(config)# show running-config dhcprelay
dhcprelay server 10.1.1.1
The following is sample output from the show running-config dhcprelay global command:
hostname(config)# show running-config dhcprelay global
dhcprelay information trust-all
The following is sample output from the show running-config dhcprelay interface command:
hostname(config)# show running-config dhcprelay interface
dhcprelay server 198.16.48.1
dhcprelay information trusted
dhcprelay serv er 198.16.52.3
The following is sample output from the show running-config dhcprelay interface ifc command:
hostname(config)# show running-config dhcprelay interface vlan392
dhcprelay information trusted
Related Commands
Command
|
Description
|
clear configure dhcprelay
|
Removes all DHCP relay agent settings.
|
clear dhcprelay statistics
|
Clears the DHCP relay agent statistic counters.
|
debug dhcprelay
|
Displays debugging information for the DHCP relay agent.
|
show dhcprelay statistics
|
Displays DHCP relay agent statistics.
|
show running-config dns
To show the DNS configuration in the running configuration, use the show running-config dns command in privileged EXEC mode.
show running-config dns
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config dns command:
hostname# show running-config dns
Related Commands
Command
|
Description
|
dns domain-lookup
|
Enables the ASA to perform a name lookup.
|
dns name-server
|
Configures a DNS server address.
|
dns retries
|
Specifies the number of times to retry the list of DNS servers when the ASA does not receive a response.
|
dns timeout
|
Specifies the amount of time to wait before trying the next DNS server.
|
show dns-hosts
|
Shows the DNS cache.
|
show running-config dns server-group
To show the DNS configuration in the running configuration, use the show running-config dns command in privileged EXEC mode.
show [all] running-config dns server-group [name]
Syntax Description
all
|
Displays the default and explicitly configured configuration information for one or all dns-server-groups.
|
name
|
Specifies the name of the dns server group for which you want to show the configuration information.
|
Defaults
If you omit the DNS server group name, this command displays all the existing DNS server group configurations.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.1 (1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config dns server-group command:
hostname# show running-config dns server-group
dns server-group DefaultDNS
domain-name frqa.cisco.com
dns server-group writers1
Related Commands
Command
|
Description
|
clear configure dns
|
Removes all DNS commands.
|
dns server-group
|
Enters DNS server group mode, in which you can configure a DNS server group.
|
show running-config domain-name
To show the domain name configuration in the running configuration, use the show running-config domain-name command in privileged EXEC mode.
show running-config domain-name
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show domain-name.
|
Examples
The following is sample output from the show running-config domain-name command:
hostname# show running-config domain-name
Related Commands
Command
|
Description
|
domain-name
|
Sets the default domain name.
|
hostname
|
Sets the ASA hostname.
|
show running-config dynamic-access-policy-record
To display the running configuration for all DAP records, or for the named DAP record, use the show running-config dynamic-access-policy-record command in privileged EXEC mode.
show running-config dynamic-access-policy-record [name]
Syntax Description
name
|
Specifies the name of the DAP record. The name can be up to 64 characters long and cannot contain spaces.
|
E
Defaults
All attributes display.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC mode
|
•
|
•
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
8.0(2)
|
This command was introduced.
|
Examples
This example shows the use of the show running-config dynamic-access-policy-record command to display statistics for the DAP record named Finance:
hostname(config)#
show running-config dynamic-access-policy-record Finance
dynamic-access-policy-record Finance
description value "Finance users from trusted device"
network-acl FinanceFirewallAcl
user-message "Limit access to the Finance network"
appl-acl FinanceWebvpnAcl
url-list value FinanceLinks,StockLinks
port-forward enable FinanceApps
file-entry enablehostname#
Related Commands
Command
|
Description
|
clear config dynamic-access-policy-record [name]
|
Removes all DAP records or the named DAP record.
|
dynamic-access-policy-record
|
Creates a DAP record.
|
show running-config dynamic-filter
To show the Botnet Traffic Filter configuration, use the show running-config dynamic-filter command in privileged EXEC mode.
show running-config [all] dynamic-filter
Syntax Description
all
|
(Optional) Shows the running configuration, including default configuration values.
|
Command Default
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
8.2(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config dynamic-filter command:
hostname# show running-config dynamic-filter
dynamic-filter updater-client enable
dynamic-filter use-database
dynamic-filter enable interface outside
dynamic-filter enable interface inside classify-list test_l4tm
dynamic-filter enable interface publicl4tm
dynamic-filter enable interface publictftp
dynamic-filter enable interface mgmt
Related Commands
Command
|
Description
|
address
|
Adds an IP address to the blacklist or whitelist.
|
clear configure dynamic-filter
|
Clears the running Botnet Traffic Filter configuration.
|
clear dynamic-filter dns-snoop
|
Clears Botnet Traffic Filter DNS snooping data.
|
clear dynamic-filter reports
|
Clears Botnet Traffic filter report data.
|
clear dynamic-filter statistics
|
Clears Botnet Traffic filter statistics.
|
dns domain-lookup
|
Enables the ASA to send DNS requests to a DNS server to perform a name lookup for supported commands.
|
dns server-group
|
Identifies a DNS server for the ASA.
|
dynamic-filter ambiguous-is-black
|
Treats greylisted traffic as blacklisted traffic for action purposes.
|
dynamic-filter blacklist
|
Edits the Botnet Traffic Filter blacklist.
|
dynamic-filter database fetch
|
Manually retrieves the Botnet Traffic Filter dynamic database.
|
dynamic-filter database find
|
Searches the dynamic database for a domain name or IP address.
|
dynamic-filter database purge
|
Manually deletes the Botnet Traffic Filter dynamic database.
|
dynamic-filter drop blacklist
|
Automatically drops blacklisted traffic.
|
dynamic-filter enable
|
Enables the Botnet Traffic Filter for a class of traffic or for all traffic if you do not specify an access list.
|
dynamic-filter updater-client enable
|
Enables downloading of the dynamic database.
|
dynamic-filter use-database
|
Enables use of the dynamic database.
|
dynamic-filter whitelist
|
Edits the Botnet Traffic Filter whitelist.
|
inspect dns dynamic-filter-snoop
|
Enables DNS inspection with Botnet Traffic Filter snooping.
|
name
|
Adds a name to the blacklist or whitelist.
|
show asp table dynamic-filter
|
Shows the Botnet Traffic Filter rules that are installed in the accelerated security path.
|
show dynamic-filter data
|
Shows information about the dynamic database, including when the dynamic database was last downloaded, the version of the database, how many entries the database contains, and 10 sample entries.
|
show dynamic-filter dns-snoop
|
Shows the Botnet Traffic Filter DNS snooping summary, or with the detail keyword, the actual IP addresses and names.
|
show dynamic-filter reports
|
Generates reports of the top 10 botnet sites, ports, and infected hosts.
|
show dynamic-filter statistics
|
Shows how many connections were monitored with the Botnet Traffic Filter, and how many of those connections match the whitelist, blacklist, and greylist.
|
show dynamic-filter updater-client
|
Shows information about the updater server, including the server IP address, the next time the ASA will connect with the server, and the database version last installed.
|
show running-config enable
To show the encrypted enable passwords, use the show running-config enable command in privileged EXEC mode.
show running-config enable
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from the show enable command.
|
Usage Guidelines
The password is saved to the configuration in encrypted form, so you cannot view the original password after you enter it. The password displays with the encrypted keyword to indicate that the password is encrypted.
Examples
The following is sample output from the show running-config enable command:
hostname# show running-config enable
enable password 2AfK9Kjr3BE2/J2r level 10 encrypted
enable password 8Ry2YjIyt7RRXU24 encrypted
Related Commands
Command
|
Description
|
disable
|
Exits privileged EXEC mode.
|
enable
|
Enters privileged EXEC mode.
|
enable password
|
Sets the enable password.
|
show running-config established
To display the allowed inbound connections that are based on established connections, use the show running-config established command in privileged EXEC mode.
show running-config established
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
The keyword running-config was added.
|
Usage Guidelines
This command has no usage guidelines.
Examples
This example shows how to display inbound connections that are based on established connections:
hostname# show running-config established
Related Commands
Command
|
Description
|
established
|
Permits return connections on ports that are based on an established connection.
|
clear configure established
|
Removes all established commands.
|
show running-config failover
To display the failover commands in the configuration, use the show running-config failover command in privileged EXEC mode.
show running-config [ all ] failover
Syntax Description
all
|
(Optional) Shows all failover commands, including the commands you have not changed from the default.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
—
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The show running-config failover command displays the failover commands in the running configuration. It does not display the monitor-interface or join-failover-group commands.
Examples
The following example shows the default failover configuration before failover has been configured:
hostname# show running-config all failover
failover lan unit secondary
failover polltime unit 15 holdtime 45
failover polltime interface 15
failover interface policy 1
Related Commands
Command
|
Description
|
show failover
|
Displays failover state and statistics.
|
show running-config filter
To show the filtering configuration, use the show running-config filter command in privileged EXEC mode.
show running-config filter
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The show running-config filter command displays the filtering configuration for the ASA.
Examples
The following is sample output from the show running-config filter command, and shows the filtering configuration for the ASA:
hostname# show running-config filter
filter activex 80 10.86.194.170 255.255.255.255 10.1.1.0 255.255.255.224
This example shows ActiveX filtering is enabled on port80 for the address 10.86.194.170.
Related Commands
Commands
|
Description
|
filter activex
|
Removes ActiveX objects from HTTP traffic passing through the ASA.
|
filter ftp
|
Identifies the FTP traffic to be filtered by a URL filtering server.
|
filter https
|
Identifies the HTTPS traffic to be filtered by a Websense server.
|
filter java
|
Removes Java applets from HTTP traffic passing through the ASA.
|
filter url
|
Directs traffic to a URL filtering server.
|
show running-config fips
To display the FIPS configuration that is running on the security appliance, use the show running-config fips command.
show running-config fips
Syntax Description
fips
|
Shows FIPS-2 compliance information
|
Defaults
This command has no default settings.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(4)
|
This command was introduced.
|
Usage Guidelines
The show running-config fips command allows you to display the current running fips configuration. You use the running-config keyword only in the show running-config fips command. You cannot use this keyword with no or clear, or as a standalone command as it is not supported. When you enter the ?, no ?, or clear ? keywords, a running-config keyword is not listed in the command list.
Examples
hostname(config)# show running-config fips
Related Commands
Command
|
Description
|
clear configure fips
|
Clears the system or module FIPS configuration information stored in NVRAM.
|
crashinfo console disable
|
Disables the reading, writing and configuration of crash write info to flash.
|
fips enable
|
Enables or disablea policy-checking to enforce FIPS compliance on the system or module.
|
show crashinfo console
|
Reads, writes, and configures crash write to flash.
|
show running-config flow-export
To display the configured NetFlow commands, use the show running-config flow-export command in privileged EXEC mode.
show running-config flow-export [active | delay | destination | template]
Syntax Description
active
|
Shows the flow-export active configuration.
|
delay
|
Shows the flow-export delay configuration.
|
destination
|
Shows the flow-export destination configuration.
|
template
|
Shows the flow-export template configuration.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
8.1(2)
|
This command was introduced.
|
8.4(5)
|
The active keyword was added.
|
Usage Guidelines
The additional keywords are provided to filter the commands that are to be displayed.
Examples
The following is sample output from the show running-config flow-export active command:
hostname# show running-config flow-export active
flow-export active refresh-interval 2
The following is sample output from the show running-config flow-export delay command:
hostname(config)# show running-config flow-export delay
flow-export delay flow-create 30
The following is sample output from the show running-config flow-export destination command:
hostname(config)# show running-config flow-export destination
flow-export destination inside 192.68.10.70 9996
The following is sample output from the show running-config flow-export template command:
hostname(config)# show running-config flow-export template
flow-export template timeout-rate 1
Related Commands
Command
|
Description
|
clear configure flow-export
|
Removes all the NetFlow flow-export configurations.
|
flow-export active refresh-interval
|
Changes the time interval at which periodic flow-update events are sent to the NetFlow collector.
|
flow-export delay flow-create
|
Delays export of the flow-create event.
|
flow-export destination
|
Configures a collector to which NetFlow packets are sent.
|
flow-export template timeout-rate
|
Controls the interval at which the template information is sent to NetFlow collectors.
|
show running-config fragment
To display the current configuration of the fragment databases, use the show running-config fragment command in privileged EXEC mode.
show running-config fragment [interface]
Syntax Description
interface
|
(Optional) Specifies the ASA interface.
|
Defaults
If an interface is not specified, the command applies to all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The show running-config fragment command displays the current configuration of the fragment databases. If you specify an interface name, only information for the database residing at the specified interface displays. If you do not specify an interface name, the command applies to all interfaces.
Use the show running-config fragment command to display this information:
•
Size—Maximum number of packets set by the size keyword. This value is the maximum number of fragments that are allowed on the interface.
•
Chain—Maximum number of fragments for a single packet set by the chain keyword.
•
Timeout—Maximum number of seconds set by the timeout keyword. This is the maximum number of seconds to wait for an entire fragmented packet to arrive. The timer starts after the first fragment of a packet arrives. If all fragments of the packet do not arrive by the number of seconds specified, all fragments of the packet that were already received will be discarded.
Examples
The following example shows how to display the states of the fragment databases on all interfaces:
hostname# show running-config fragment
fragment timeout 5 inside
fragment size 200 outside1
fragment chain 24 outside1
fragment timeout 5 outside1
fragment size 200 outside2
fragment chain 24 outside2
fragment timeout 5 outside2
fragment size 200 outside3
fragment chain 24 outside3
fragment timeout 5 outside3
The following example shows how to display the states of the fragment databases on interfaces that start with the name "outside":
Note
In this example, the interfaces named "outside1", "outside2", and "outside3" display.
hostname# show running-config fragment outside
fragment size 200 outside1
fragment chain 24 outside1
fragment timeout 5 outside1
fragment size 200 outside2
fragment chain 24 outside2
fragment timeout 5 outside2
fragment size 200 outside3
fragment chain 24 outside3
fragment timeout 5 outside3
The following example shows how to display the states of the fragment databases on the interfaces named "outside1" only:
hostname# show running-config fragment outside1
fragment size 200 outside1
fragment chain 24 outside1
fragment timeout 5 outside1
Related Commands
Command
|
Description
|
clear configure fragment
|
Resets all the IP fragment reassembly configurations to defaults.
|
clear fragment
|
Clears the operational data of the IP fragment reassembly module.
|
fragment
|
Provides additional management of packet fragmentation and improves compatibility with NFS.
|
show fragment
|
Displays the operational data of the IP fragment reassembly module.
|
show running-config ftp mode
To show the client mode configured for FTP, use the show running-config ftp mode command in privileged EXEC mode.
show running-config ftp mode
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The show running-config ftp mode command displays the client mode that is used by the ASA when accessing an FTP server.
Examples
The following is sample output from the show running-config ftp-mode command:
hostname# show running-config ftp-mode
Related Commands
Commands
|
Description
|
copy
|
Uploads or downloads image files or configuration files to or from an FTP server.
|
debug ftp client
|
Displays detailed information about FTP client activity.
|
ftp mode passive
|
Sets the FTP client mode used by the ASA when accessing an FTP server.
|
show running-config global
To display the global commands in the configuration, use the show running-config global command in privileged EXEC mode.
show running-config global
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
Added keyword running-config.
|
Examples
The following is sample output from the show running-config global command:
hostname# show running-config global
global (outside1) 10 interface
Related Commands
Command
|
Description
|
clear configure global
|
Removes global commands from the configuration.
|
global
|
Creates entries from a pool of global addresses.
|
show running-config group-delimiter
To display the current delimiter to be used when parsing group names from the user names that are received when tunnels are being negotiated, use the show running-config group-delimiter command in global configuration mode or in tunnel-group ipsec-attributes configuration mode.
show running-config group-delimiter
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
—
|
—
|
•
|
Tunnel-group ipsec-attributes configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
7.1(1)
|
Added tunnel-group ipsec-attributes configuration mode.
|
Usage Guidelines
Use this command to display the currently configured group-delimiter.
Examples
This example shows a show running-config group-delimiter command and its output:
hostname(config)# show running-config group-delimiter
Related Commands
Command
|
Description
|
group-delimiter
|
Enables group-name parsing and specifies the delimiter to be used when parsing group names from the user names that are received when tunnels are being negotiated.
|
show running-config group-policy
To display the running configuration for a particular group policy, use the show running-config group-policy command in privileged EXEC mode and append the name of the group policy. To display the running configuration for all group policies, use this command without naming a specific group policy. To have either display include the default configuration, use the all keyword.
show running-config [all] group-policy [name]
Syntax Description
all
|
(Optional) Displays the running configuration including default values.
|
name
|
(Optional) Specifies the name of the group policy.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following example shows how to display the running configuration, including default values, for the group policy named FirstGroup:
hostname# show running-config all group-policy FirstGroup
Related Commands
Command
|
Description
|
group-policy
|
Creates, edits, or removes a group policy.
|
group-policy attributes
|
Enters group-policy attributes mode, which lets you configure AVPs for a specified group policy.
|
clear config group-policy
|
Removes the configuration for a particular group policy or for all group policies.
|
show running-config hpm
To display the hpm configuration, use the show running-config hpm command in privileged EXEC mode.
show running-config [all] hpm
Syntax Description
all
|
(Optional) Shows all commands, including the commands you have not changed from the default.
|
Command Default
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
8.3(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config hpm command:
hostname# show running-config hpm
Related Commands
Command
|
Description
|
clear configure hpm
|
Clears the hpm configuration.
|
hpm topn enable
|
Enables top hosts reporting in ASDM.
|
show running-config http
To display the current set of configured http commands, use the show running-config http command in privileged EXEC mode.
show running-config http
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following sample output shows how to use the show running-config http command:
hostname# show running-config http
Related Commands
Command
|
Description
|
clear http
|
Remove the HTTP configuration: disable the HTTP server and remove hosts that can access the HTTP server.
|
http
|
Specifies hosts that can access the HTTP server by IP address and subnet mask. Specifies the ASA interface through which the host accesses the HTTP server.
|
http authentication-certificate
|
Requires authentication via certificate from users who are establishing HTTPS connections to the ASA.
|
http redirect
|
Specifies that the ASA redirect HTTP connections to HTTPS.
|
http server enable
|
Enables the HTTP server.
|
show running-config icmp
To show the access rules configured for ICMP traffic, use the show running-config icmp command in privileged EXEC mode.
show running-config icmp map_name
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The show running-config icmp command displays the access rules configured for ICMP traffic.
Examples
The following is sample output from the show running-config icmp command:
hostname# show running-config icmp
icmp permit host 172.16.2.15 echo-reply outside
icmp permit 172.22.1.0 255.255.0.0 echo-reply outside
icmp permit any unreachable outside
Related Commands
Commands
|
Description
|
clear configure icmp
|
Clears the ICMP configuration.
|
debug icmp
|
Enables the display of debug information for ICMP.
|
show icmp
|
Displays ICMP configuration.
|
timeout icmp
|
Configures the idle timeout for ICMP.
|
show running-config imap4s
To display the running configuration for IMAP4S, use the show running-config imap4s command in privileged EXEC mode.
show running-config [ all ] imap4s
Syntax Description
all
|
(Optional) Displays the running configuration including default values.
|
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Webvpn
|
•
|
—
|
•
|
—
|
—
|
Examples
The following is sample output from the show running-config imap4s command:
hostname#
show running-config imap4s
authentication-server-group KerbSvr
hostname#
show running-config all imap4s
authentication-server-group KerbSvr
no authorization-server-group
no accounting-server-group
Related Commands
Command
|
Description
|
clear configure imap4s
|
Removes the IMAP4S configuration.
|
imap4s
|
Creates or edits an IMAP4S e-mail proxy configuration.
|
show running-config interface
To show the interface configuration in the running configuration, use the show running-config interface command in privileged EXEC mode.
show running-config [all] interface [physical_interface[.subinterface] | mapped_name |
interface_name]
Syntax Description
all
|
(Optional) Shows all interface commands, including the commands you have not changed from the default.
|
interface_name
|
(Optional) Identifies the interface name set with the nameif command.
|
mapped_name
|
(Optional) In multiple context mode, identifies the mapped name if it was assigned using the allocate-interface command.
|
physical_interface
|
(Optional) Identifies the interface ID, such as gigabitethernet0/1. See the interface command for accepted values.
|
subinterface
|
(Optional) Identifies an integer between 1 and 4294967293 designating a logical subinterface.
|
Defaults
If you do not specify an interface, this command shows the configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
You cannot use the interface name in the system execution space, because the nameif command is only available within a context. Similarly, if you mapped the interface ID to a mapped name using the allocate-interface command, you can only use the mapped name in a context.
Examples
The following is sample output from the show running-config interface command. The following example shows the running configuration for all interfaces. The GigabitEthernet0/2 and 0/3 interfaces have not been configured yet, and show the default configuration. The Management0/0 interface also shows the default settings.
hostname# show running-config interface
interface GigabitEthernet0/0
ip address 10.86.194.60 255.255.254.0
interface GigabitEthernet0/1
ip address 10.10.4.200 255.255.0.0
interface GigabitEthernet0/1.1
ip address 10.50.1.1 255.255.255.0
mac-address 000C.F142.4CDE standby 020C.F142.4CDE
interface GigabitEthernet0/2
interface GigabitEthernet0/3
Related CommandsInterface Security-profile1 "profile1-ifc", is up, line protocol is up
Related Commands Security-profile profile1, ID 142
Related Commands Service-interface is inside
Related Commands Traffic Statistics for "profile1-ifc":
Related Commands 6 packets input, 168 bytes
Related Commands 0 packets output, 0 bytes
Related Commands 2 packets dropped
Related Commands 1 minute input rate 0 pkts/sec, 0 bytes/sec
Related Commands 1 minute output rate 0 pkts/sec, 0 bytes/sec
Related Commands 1 minute drop rate, 0 pkts/sec
Related Commands 5 minute input rate 0 pkts/sec, 0 bytes/sec
Related Commands 5 minute output rate 0 pkts/sec, 0 bytes/sec
Related Commands 5 minute drop rate, 0 pkts/sec
Related CommandsInterface Security-profile1 "profile1-ifc", is up, line protocol is up
Related Commands Security-profile profile1, ID 142
Related Commands Service-interface is inside
Related Commands Traffic Statistics for "profile1-ifc":
Related Commands 6 packets input, 168 bytes
Related Commands 0 packets output, 0 bytes
Related Commands 2 packets dropped
Related Commands 1 minute input rate 0 pkts/sec, 0 bytes/sec
Related Commands 1 minute output rate 0 pkts/sec, 0 bytes/sec
Related Commands 1 minute drop rate, 0 pkts/sec
Related Commands 5 minute input rate 0 pkts/sec, 0 bytes/sec
Related Commands 5 minute output rate 0 pkts/sec, 0 bytes/sec
Related Commands 5 minute drop rate, 0 pkts/sec
Related Commands
Command
|
Description
|
allocate-interface
|
Assigns interfaces and subinterfaces to a security context.
|
clear configure interface
|
Clears the interface configuration.
|
interface
|
Configures an interface and enters interface configuration mode.
|
nameif
|
Sets the interface name.
|
show interface
|
Displays the runtime status and statistics of interfaces.
|
show running-config interface bvi
To view the bridge virtual interface configuration in the running configuration, use the show running-config interface bvi command in privileged EXEC mode.
show running-config [all] interface bvi bridge_group_number
Syntax Description
all
|
(Optional) Shows all commands, including the commands you have not changed from the default.
|
bridge_group_number
|
Specifies the bridge group number as an integer between 1 and 100.
|
Command Default
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
—
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
8.4(1)
|
We introduced this command.
|
Examples
The following is sample output from the show running-config interface bvi command:
hostname# show running-config interface bvi 1
Related Commands
Command
|
Description
|
bridge-group
|
Groups transparent firewall interfaces into a bridge group.
|
clear configure interface bvi
|
Clears the bridge group interface configuration.
|
interface
|
Configures an interface.
|
interface bvi
|
Creates a bridge virtual interface.
|
ip address
|
Sets the management IP address for a bridge group.
|
show bridge-group
|
Shows bridge group information, including member interfaces and IP addresses.
|
show running-config ip address
To show the IP address configuration in the running configuration, use the show running-config ip address command in privileged EXEC mode.
show running-config ip address [physical_interface[.subinterface] | mapped_name |
interface_name]
Syntax Description
interface_name
|
(Optional) Identifies the interface name set with the nameif command.
|
mapped_name
|
(Optional) In multiple context mode, identifies the mapped name if it was assigned using the allocate-interface command.
|
physical_interface
|
(Optional) Identifies the interface ID, such as gigabitethernet0/1. See the interface command for accepted values.
|
subinterface
|
(Optional) Identifies an integer between 1 and 4294967293 designating a logical subinterface.
|
Defaults
If you do not specify an interface, this command shows the IP address configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
In multiple context mode, if you mapped the interface ID in the allocate-interface command, you can only specify the mapped name or the interface name in a context.
In transparent firewall mode, do not specify an interface because this command shows only the management IP address; the transparent firewall does not have IP addresses associated with interfaces.
This display also shows the nameif command and security-level command configuration.
Examples
The following is sample output from the show running-config ip address command:
hostname# show running-config ip address
interface GigabitEthernet0/0
ip address 10.86.194.60 255.255.254.0
interface GigabitEthernet0/1
ip address 10.10.4.200 255.255.0.0
Related Commands
Command
|
Description
|
clear configure interface
|
Clears the interface configuration.
|
interface
|
Configures an interface and enters interface configuration mode.
|
ip address
|
Sets the IP address for the interface or sets the management IP address for a transparent firewall.
|
nameif
|
Sets the interface name.
|
security-level
|
Sets the security level for the interface.
|
show running-config ip audit attack
To show the ip audit attack configuration in the running configuration, use the show running-config ip audit attack command in privileged EXEC mode.
show running-config ip audit attack
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit attack.
|
Examples
The following is sample output from the show running-config ip audit attack command:
hostname# show running-config ip audit attack
ip audit attack action drop
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit info
To show the ip audit info configuration in the running configuration, use the show running-config ip audit info command in privileged EXEC mode.
show running-config ip audit info
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit info.
|
Examples
The following is sample output from the show running-config ip audit info command:
hostname# show running-config ip audit info
ip audit info action drop
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit interface
To show the ip audit interface configuration in the running configuration, use the show running-config ip audit interface command in privileged EXEC mode.
show running-config ip audit interface [interface_name]
Syntax Description
interface_name
|
(Optional) Specifies the interface name.
|
Defaults
If you do not specify an interface name, this command shows the configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit interface.
|
Examples
The following is sample output from the show running-config ip audit interface command:
hostname# show running-config ip audit interface
ip audit interface inside insidepolicy
ip audit interface outside outsidepolicy
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit name
To show the ip audit name configuration in the running configuration, use the show running-config ip audit name command in privileged EXEC mode.
show running-config ip audit name [ name [ info | attack ]]
Syntax Description
attack
|
(Optional) Shows the named audit policy configuration for attack signatures.
|
info
|
(Optional) Shows the named audit policy configuration for informational signatures.
|
name
|
(Optional) Shows the configuration for the audit policy name created using the ip audit name command.
|
Defaults
If you do not specify a name, this command shows the configuration for all audit policies.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit name.
|
Examples
The following is sample output from the show running-config ip audit name command:
hostname# show running-config ip audit name
ip audit name insidepolicy1 attack action alarm
ip audit name insidepolicy2 info action alarm
ip audit name outsidepolicy1 attack action reset
ip audit name outsidepolicy2 info action alarm
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip audit signature
To show the ip audit signature configuration in the running configuration, use the show running-config ip audit signature command in privileged EXEC mode.
show running-config ip audit signature [signature_number]
Syntax Description
signature_number
|
(Optional) Shows the configuration for the signature number, if present. See the ip audit signature command for a list of supported signatures.
|
Defaults
If you do not specify a number, this command shows the configuration for all signatures.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip audit signature.
|
Examples
The following is sample output from the show running-config ip audit signature command:
hostname# show running-config ip audit signature
ip audit signature 1000 disable
Related Commands
Command
|
Description
|
ip audit attack
|
Sets the default actions for packets that match an attack signature.
|
ip audit info
|
Sets the default actions for packets that match an informational signature.
|
ip audit interface
|
Assigns an audit policy to an interface.
|
ip audit name
|
Creates a named audit policy that identifies the actions to take when a packet matches an attack signature or an informational signature.
|
ip audit signature
|
Disables a signature.
|
show running-config ip local pool
To display IP address pools, use the show running-config ip local pool command in privileged EXEC mode.
show running-config ip local pool [poolname]
Syntax Description
poolname
|
(Optional) Specifies the name of the IP address pool.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config ip local pool command:
hostname(config)# show running-config ip local pool firstpool
Pool Begin End Mask Free In use
firstpool 10.20.30.40 10.20.30.50 255.255.255.0 11
Related Commands
Command
|
Description
|
clear configure ip local pool
|
Removes all ip local pools
|
ip local pool
|
Configures an IP address pool.
|
show running-config ip verify reverse-path
To show the ip verify reverse-path configuration in the running configuration, use the show running-config ip verify reverse-path command in privileged EXEC mode.
show running-config ip verify reverse-path [interface interface_name]
Syntax Description
interface interface_name
|
(Optional) Shows the configuration for the specified interface.
|
Defaults
This command shows the configuration for all interfaces.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was changed from show ip verify reverse-path.
|
Examples
The following is sample output from the show ip verify statistics command:
hostname# show running-config ip verify reverse-path
ip verify reverse-path interface inside
ip verify reverse-path interface outside
ip verify reverse-path interface dmz
Related Commands
Command
|
Description
|
clear configure ip verify reverse-path
|
Clears the ip verify reverse-path configuration.
|
clear ip verify statistics
|
Clears the Unicast RPF statistics.
|
ip verify reverse-path
|
Enables the Unicast Reverse Path Forwarding feature to prevent IP spoofing.
|
show ip verify statistics
|
Shows the Unicast RPF statistics.
|
show running-config ipv6
To display the IPv6 commands in the running configuration, use the show running-config ipv6 command in privileged EXEC mode.
show running-config [all] ipv6
Syntax Description
all
|
(Optional) Shows all ipv6 commands, including the commands you have not changed from the default, in the running configuration.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config ipv6 command:
hostname# show running-config ipv6
ipv6 route vlan101 ::/0 fec0::65:0:0:a0a:6575
ipv6 access-list outside_inbound_ipv6 permit ip any any
ipv6 access-list vlan101_inbound_ipv6 permit ip any any
Related Commands
Command
|
Description
|
debug ipv6
|
Displays IPv6 debugging messages.
|
show ipv6 access-list
|
Displays the IPv6 access list.
|
show ipv6 interface
|
Displays the status of the IPv6 interfaces.
|
show ipv6 route
|
Displays the contents of the IPv6 routing table.
|
show ipv6 traffic
|
Displays IPv6 traffic statistics.
|
show running-config ipv6 router
To display the running configuration of OSPFv3 for IPv6, use the show running-config ipv6 router command in user EXEC or privileged EXEC mode.
show running-config ipv6 router {ospf}
Syntax Description
ospf
|
Shows the running configuration for OSPFv3 processes.
|
Command Default
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Privileged EXEC
|
•
|
—
|
•
|
•
|
—
|
User EXEC
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
9.0(1)
|
This command was introduced.
|
Examples
The following is sample output from the show running-config ipv6 router command:
hostname# show running-config ipv6 router
ipv6 route vlan101 ::/0 fec0::65:0:0:a0a:6575
Related Commands
Command
|
Description
|
clear ipv6 ospf
|
Deletes all IPv6 settings in the OSPFv3 routing process.
|
debug ospfv3
|
Provides debugging information for troubleshooting OSPFv3 routing processes.
|
show running-config isakmp
To display the complete ISAKMP configuration, use the show running-config isakmp command in global configuration or privileged EXEC mode.
show running-config isakmp
Syntax Description
This command has no default behavior or values.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Privileged EXEC
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
The show running-config isakmp command was introduced.
|
7.2(1)
|
This command was deprecated. The show running-config crypto isakmp command replaces it.
|
Examples
The following example issued in global configuration mode, displays information about the ISKAKMP configuration:
hostname(config)# show running-config isakmp
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 lifetime 86400
Related Commands
Command
|
Description
|
clear configure isakmp
|
Clears all the ISAKMP configuration.
|
clear configure isakmp policy
|
Clears all ISAKMP policy configuration.
|
clear isakmp sa
|
Clears the IKE runtime SA database.
|
isakmp enable
|
Enables ISAKMP negotiation on the interface on which the IPsec peer communicates with the ASA.
|
show isakmp sa
|
Displays IKE runtime SA database with additional information.
|