Scribd 3
Scribd 3
Scribd 3
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
app-route-policy 89
app-visibility 91
applications 93
apply-policy 95
archive 99
area 101
arp 103
arp-timeout 105
auth-fail-vlan 106
auth-fallback 108
auth-order 110
auth-order 111
auth-reject-vlan 114
auth-req-attr 116
authentication 118
authentication-type 120
authentication-type 122
auto-cost reference-bandwidth 125
auto-rp 127
autonegotiate 128
bandwidth-downstream 130
bandwidth-upstream 132
banner login 134
banner motd 136
best-path 138
bfd app-route 140
bfd color 142
bgp 145
bind 147
block-icmp-error 149
block-non-source-ip 151
bridge 152
capability-negotiate 154
carrier 155
cellular 157
cflowd-template 159
channel 161
channel-bandwidth 163
cipher-suite 165
class-map 167
clear-dont-fragment 169
clock 170
cloud-qos 171
cloud-qos-service-side 174
cloudexpress 177
collector 178
color 180
community 183
compatible rfc1583 185
connections-limit 187
console-baud-rate 189
contact 190
container 191
control 194
control-connections 195
control-direction 197
control-policy 199
control-session-pps 200
controller-group-id 201
controller-group-list 202
controller-mode 204
cost 205
country 206
das 208
data-policy 211
data-security 214
dead-interval 216
dead-peer-detection 218
default-action 220
default-information originate 223
default-vlan 225
description 227
device-groups 228
dhcp-helper 229
dhcp-server 231
direction 233
discard-rejected 235
distance 236
distance 238
dns 240
domain-id 241
dot1x 242
duplex 247
ebgp-multihop 249
ecmp-hash-key 251
ecmp-limit 252
eco-friendly-mode 253
eigrp 254
encapsulation 256
exclude 259
exclude-controller-group-list 261
flow-active-timeout 263
flow-control 265
flow-inactive-timeout 266
flow-sampling-interval 268
flow-visibility 270
gps-location 271
graceful-restart 272
group 273
group 275
group 276
guard-interval 277
guest-vlan 279
hello-interval 281
hello-interval 283
hello-interval 285
hello-tolerance 287
hold-time 289
host 291
host-mode 293
host-name 295
host-policer-pps 296
icmp-error-pps 297
icmp-redirect-disable 298
idle-timeout 299
igmp 300
ike 302
implicit-acl-logging 304
interface 306
interface 311
interface 314
interface 316
interface 318
interface 320
interface gre 322
interface ipsec 324
interface irb 326
interface ppp 328
ip address 330
ip address-list 332
ip dhcp-client 334
ip gre-route 336
ip ipsec-route 338
ip route 340
ip secondary-address 342
ipsec 344
ipsec 345
iptables-enable 346
ipv6 address 347
ipv6 dhcp-client 349
ipv6 route 351
join-group 353
join-prune-interval 355
keepalive 357
last-resort-circuit 359
lease-time 361
lists 363
local-interface-list 372
location 373
location 375
log-frequency 376
log-translations 378
logging disk 380
logging host 386
logging tls-profile 388
logging server 389
logs 392
low-bandwidth-link 394
mac-accounting 396
mac-address 397
mac-authentication-bypass 398
match 400
match 403
max-clients 413
max-control-connections 415
max-controllers 417
max-leases 418
max-macs 419
max-metric 420
max-omp-sessions 422
mgmt-security 424
mirror 426
mode 428
mtu 429
multicast-buffer-percent 431
multicast-replicator 432
name 434
name 435
nas-identifier 436
nas-ip-address 438
nat 440
nat-refresh-interval 442
natpool 444
neighbor 445
network 447
next-hop-self 449
node-type 450
nssa 452
ntp 454
offer-time 457
omp 459
options 461
organization-name 463
orgid 464
ospf 465
overlay-as 467
overload 468
parameter-map type umbrella global 470
passive-interface 471
password 472
perfect-forward-secrecy 474
pim 476
pmtu 477
policer 478
policy 482
policy ipv6 489
port-forward 491
port-hop 493
port-offset 495
ppp 497
pppoe-client 499
priority 501
probe 503
probe-path branch 505
probe-path gateway 506
profile 507
profile 510
propagate-aspath 512
qos-map 513
qos-scheduler 515
radius 518
radius-servers 522
range 526
reauthentication 527
redistribute 529
refresh 531
rekey 533
rekey 535
remote-as 537
replay-window 538
replay-window 540
replicator-selection 541
respond-to-ping 542
retransmit-interval 544
rewrite-rule 546
route-consistency-check 548
route-policy 549
router 551
router-id 553
router-id 554
secret 555
security 556
send-community 557
send-ext-community 558
send-path-limit 559
service 560
shaping-rate 562
shutdown 564
site-id 566
sla-class 567
snmp 569
sp-organization-name 570
speed 571
spt-threshold 573
ssid 574
static 576
static-ingress-qos 579
static-lease 580
stub 582
system 583
system-ip 586
system-tunnel-mtu 588
tacacs 589
tcp-mss-adjust 592
tcp-optimization 594
tcp-optimization-enabled 595
tcp-syn-flood-limit 596
tcp-timeout 598
technology 600
template-refresh 602
timeout inactivity 604
timer 606
timers 608
timers 610
timers 612
tloc-extension 615
tloc-extension-gre-from 617
tloc-extension-gre-to 619
track-default-gateway 621
track-interface-tag 622
track-transport 624
tracker 625
trap group 628
trap target 631
tunnel-destination 633
tunnel-destination 635
tunnel-interface 637
tunnel-source 639
tunnel-source 640
tunnel-source-interface 642
tunnel-source-interface 643
udp-timeout 644
update-source 646
upgrade-confirm 648
usb-controller 650
user 651
user 653
usergroup 656
vbond 658
vbond-as-stun-server 661
view 663
vlan 665
vmanage-connection-preference 666
vpn 668
vpn-membership 672
vrrp 674
wake-on-lan 677
wlan 678
wpa-personal-key 680
zone 682
zone-based-policy 684
zone-pair 686
zone-to-nozone-internet 688
end 1301
exit 1302
help 1303
load 1304
no 1306
pwd 1307
revert 1308
rollback 1309
save 1311
show configuration 1313
show configuration commit 1314
show configuration diff 1316
show configuration merge 1317
show configuration rollback 1318
show configuration running 1319
show full-configuration 1320
show history 1321
show parser dump 1322
top 1323
validate 1324
nomore 1346
notab 1347
repeat 1348
save 1349
select 1350
sort-by 1352
tab 1353
until 1354
CLI Overview
The CLI on the Cisco vEdge devices is one of the ways you can configure and monitor these devices. The
CLI provides various commands for configuring and monitoring the software, hardware, and network
connectivity of the vSmart controllers and the vEdge routers. The CLI provides the following features:
• Displaying help about CLI commands
• Completing partial commands
• Editing the command line with keyboard sequences
• Configuring CLI session settings
• Filtering command output
• Adding comments to device configurations
• Activating and deactivating parts of a configuration
• Displaying CLI messages
The Cisco SD-WAN CLI design is based on the YANG data modeling language, defined in RFC 6020.
CLI Modes
The CLI has two modes:
• Operational mode, for monitoring the state of the Cisco vEdge device. When you log in to the CLI, you
are in operational mode. In this mode, you view device status, monitor and troubleshoot the device and
network connectivity, enter into configuration mode, and control the CLI session parameters.
• Configuration mode, for changing the operational parameters of the Cisco vEdge device. You enter
configuration mode by issuing the configure command in operational mode. This mode has a number of
submodes for manipulating different parts of the configuration. For example, the mode interface-eth1
allows you to configure parameters for Ethernet interface 1. All changes to the device's configuration
are done to a copy of the active configuration, called a candidate configuration. Configuration changes
take effect only when you enter a commit or commit confirmed command and that command is successful.
CLI Prompts
The prompt indicates the mode the CLI is in:
• host-name#: The host name followed by a hash mark indicates that the CLI is in operational mode. An
operational mode prompt is similar to vsmart#.
• host-name(config)#: When the CLI is in configuration mode, the string config is added to the prompt.
For example, a configuration mode prompt is similar to vsmart(config)#. If you are configuring a lower
hierarchy in the commands, the prompt also indicates that level. For example, if you are configuring
Ethernet interface 1 for a VPN, in the hierarchy vpn > interface, the configuration mode prompt is
vsmart(config-interface-eth1)#. The CLI prompt shows only the parent hierarchy, not the full path to the
command, so that the CLI prompt never gets too long.
To change the operational mode prompt, use the prompt1 operational command:
vsmart# prompt1 eve@vsmart#
eve@vsmart#
To change the configuration mode prompt, use the prompt2 operational command:
vsmart# prompt2 eve@vsmart(config)#
eve@vsmart(config)#
To change the session values, use the command names listed in the output above. For more information on
the commands, see Operational Commands .
Command Hierarchies
CLI commands are organized in a hierarchy that groups commands that perform related or similar functions.
For example, in operational mode, commands that display information about OMP are collected under the
show omp command hierarchy. In configuration mode, commands that configure OMP properties are collected
under the omp command hierarchy.
vsmart# ?
Possible completions:
autowizard Automatically query for mandatory elements
clear Clear parameter
clock System clock
commit Confirm a pending commit
complete-on-space Enable/disable completion on space
config Manipulate software configuration information
debug Debug commands
exit Exit the management session
file Perform file operations
help Provide help information
history Configure history size
idle-timeout Configure idle timeout
logout Logout a user
no Negate a command or set its defaults
nslookup DNS Lookup of a DNS Name
paginate Paginate output from CLI commands
ping Ping a host
poweroff Shutdown the system
prompt1 Set operational mode prompt
prompt2 Set configure mode prompt
quit Exit the management session
reboot Reboot the system
request Perform an action
screen-length Configure screen length
screen-width Set CLI screen width
show Show information about the system
tcpdump tcpdump on a network
timestamp Enable/disable the display of timestamp
traceroute Traceroute to a host
vshell System shell
If you type ? at the prompt after entering configuration mode, you see:
vsmart(config)# ?
Possible completions:
apply-policy Apply network policy
banner Set banners
omp OMP information
policy Configure policy
security Configure security
snmp Configure SNMP
system Configure System
vpn VPN Instance
---
abort Abort configuration session
clear Remove all configuration changes
commit Commit current set of changes
describe Display transparent command information
do Run an operational-mode command
end Terminate configuration session
exit Exit from current mode
help Provide help information
load Load configuration from an ASCII file
no Negate a command or set its defaults
pwd Display current mode path
revert Copy configuration from running
rollback Roll back database to last committed version
save Save configuration to an ASCII file
show Show a parameter
top Exit to top level and optionally run command
validate Validate current configuration
If you type ? after a command name, the CLI shows all possible completions for that command. For example:
If you type help before a command name, it will you give you more information about the command. For
example:
vsmart# help show cli
Help for command: show cli
Display cli settings
The show parser dump command also displays information about available commands and their syntax.
In this command, the strings "aaa" and "user" are Cisco SD-WAN software keywords, and the string "eve"
is a user-defined string.
User-defined strings can include all uppercase and lowercase letters, all digits, spaces, and all special characters
except for angle brackets (< and >).
To include a space or an exclamation point (!) in a user-defined string, either type a backslash (\) before the
space or enclose the entire string in quotation marks (" "). For example:
vEdge(config)# banner login "Remember to log out when you are done!"
vEdge(config-banner)# show full-configuration
banner
login "Remember to log out when you are done!"
!
vEdge(config-banner)#
To complete a command or option that you have partially typed, press the tab key after you have typed a
partially completed command name. If the partially typed letters begin a string that uniquely identifies a
command, the complete command name is displayed. Otherwise, a list of possible completions is displayed.
Command completion also works with other strings, such as filenames, directory names, interface names, and
usernames.
To enable command completion when you press the space bar, enable it for the duration of the terminal session:
vEdge# complete-on-space true
When this is enabled, you can press the tab key or the space bar to complete a partially typed command name
or variable string.
Command completion is disabled within quoted strings. So if an argument contains spaces and you quote
them with a backslash (for example, prefix-list my\ list) or with quotation marks (for example, prefix-list
"my list"), you cannot use command completion. Space completion does not work with filenames.
Table 1:
Move the cursor Move the cursor back one character. Ctrl-B or Left Arrow
Move the cursor to the beginning of the command line. Ctrl-A or Home
Move the cursor to the end of the command line. Ctrl-E or End
Delete characters Delete the character before the cursor. Ctrl-H, Delete, or Backspace
Delete all characters from the cursor to the end of the Ctrl-K
line.
Insert recently Insert the most recently deleted text at the cursor. Ctrl-Y
deleted text
Display previous Scroll backward through the list of recently executed Ctrl-P or Up Arrow
command lines commands.
Scroll forward through the list of recently executed Ctrl-N or Down Arrow
commands.
Show list.
Capitalization Capitalize the word at the cursor; that is, make the first Esc-C
character uppercase and the rest of the word lowercase.
Quote insert character; that is, do not treat the next Ctrl-V/Esc-Q
keystroke as an edit command.
Table 2:
Filter Description
begin regular-expression Begin with the line that matches a regular expression.
best-effort Display data even if the data provider is unavailable, or continue loading from
a file even if failures are occurring.
Filter Description
repeat seconds Execute the command repeatedly, every specified number of seconds.
until regular-expression End the display with the line that matches a regular expression.
Table 3:
Operator Action
[abc...] Character class, which matches any of the characters abc... Character ranges are specified by a pair
of characters separated by a -.
[^abc...] Negated character class, which matches any character except abc.
When you type an invalid command or value, a CLI message indicates the nature of the error:
vsmart# show c
Possible completions:
certificate Display installed certificate properties
cli Display cli settings
clock System clock
configuration Display configuration history
control Display Control Information
When you commit a configuration, the CLI first validates the configuration. If there is a problem, the CLI
indicates the nature of the problem:
Entering configuration mode terminal
vsmart(config)# no vpn 0
vsmart(config)# commit
Aborted: 'vpn' : Cannot delete vpn 0
vsmart(config>)#
To have the command output include only the lines not containing a regular expression, use the exclude
filtering command. For example:
vsmart# show cli | exclude e
history 100
prompt1 \h\M#
prompt2 \h\(m)#
To display the output starting at the first match of a regular expression, use the begin command filter. For
example:
vsmart# show cli | begin show
show-defaults false
terminal linux
timestamp disable
To end the command output when a line matches a regular expression, use the until command filter. For
example:
vsmart# show cli | until history
autowizard false
complete-on-space true
history 100
To save the configuration except for any passwords, add the exclude password command filter:
vsmart# show running-config system | exclude password | save filename
Then type either the full configuration command or type one command at a time to move down through the
command hierarchy. Here is an example of typing a full configuration command:
vsmart(config)# vpn 1 interface ge0/1 ip address 1.1.1.1/16
Here is an example of moving down the command hierarchy by typing one command at a time:
vsmart(config)# vpn1
vsmart(config-vpn-1)# interface eth1
vsmart(config-interface-eth1)# ip address 1.1.1.1/16
vsmart(config-interface-eth1)#
To move to another portion of the hierarchy, simply type the name of the top-level command. For example:
vsmart(config-interface-eth1)# policy
vsmart(config-policy)#
Configuration Commands
Overview of Configuration
Commands
action policy ipv6 access-list sequence action—Configure the actions to take when
the match portion of an IPv6 policy is met.
admin-auth-order system aaa admin-auth-order—Have the "admin" user use the authentication
order configured in the auth-order command.
area vpn router ospf area—Configure an OSPF area within a VPN on a vEdge
router.
arp vpn interface arp—Configure an ARP table entry for an interface in a VPN.
auth-order system aaa auth-order—Configure the order is which the Cisco SD-WAN
software tries different authentication methods when verifying user access
to a Cisco vEdge device.vpn interface dot1x auth-order—Configure the
order in which the Cisco SD-WAN software tries different authentication
methods when authenticating devices that are attempting to connect to a
WAN.
auth-order vpn interface dot1x auth-order—Configure the order in which the Cisco
SD-WAN software tries different authentication methods when
authenticating devices that are attempting to connect to a WAN.
auto-rp vpn router pim auto-rp— Enable and disable auto-RP for PIM.
banner login banner login—Configure banner text to be displayed before the login prompt.
banner motd banner motd—Configure banner text to be displayed after a user logs in to
a Cisco vEdge device.
best-path vpn router bgp best-path—Configure how the active BGP path is selected.
bfd color bfd color—Configure the Bidirectional Forwarding Protocol timers used
on transport tunnels.
bgp vpn router bgp— Configure BGP within a VPN on a vEdge router.
block-icmp-error vpn interface nat block-icmp-error— Prevent a vEdge router that is acting
as a NAT device from receiving inbound ICMP error messages.
capability-negotiate vpn router bgp capability-negotiate—Allow the BGP session to learn about
the BGP extensions that are supported by the neighbor.
cipher-suite vpn interface ipsec ike cipher-suite, vpn interface ipsec ipsec
cipher-suite—Configure the type of authentication and integrity to use during
IKE key exchange and on the IPsec tunnel being used for IKE key exchange.
cloud-qos policy cloud-qos—Enable QoS scheduling and shaping for traffic on WAN
interfaces (applicable to Cisco vEdge Cloud, Cisco vEdge 5000, and Cisco
ISR1100 routers).
compatible rfc1583 vpn router ospf compatible rfc1583—Calculate the cost of summary routes
based on RFC 1583 rather than RFC 2328.
control-direction vpn interface dot1x control direction—Configure how the 802.1x interface
sends packets to and receive packets from unauthorized hosts.
cost vpn router ospf area interface cost—Configure the cost of an OSPF interface.
das vpn interface dot1x das—Configure DAS parameters so the router can accept
CoA request from a RADIUS server.
dead-interval vpn router ospf area interface dead-interval—Set the interval during which
at least one OSPF hello packet must be received from a neighbor before
declaring that neighbor to be down.
direction vpn interface nat direction— Configure the direction in which a NAT
interface performs address translation.
discard-rejected omp discard-rejected—Have OMP discard routes that have been rejected
on the basis of policy.
distance Define the BGP route administrative distance based on route type.vpn router
ospf distance—Define the OSPF route administration distance based on
route type.
distance vpn router ospf distance—Define the OSPF route administration distance
based on route type.
domain-id system domain-id — Configure the identifier for the Cisco SD-WAN overlay
network domain.
ecmp-limit omp ecmp-limit—Configure the maximum number of OMP paths that can
be installed in the vEdge router's route table.
eco-friendly-mode system eco-friendly — Configure a vEdge router not to use its CPU
minimally or not at all when the router is not processing any packets.
gps-location system gps-location—Set the latitude and longitude of the Cisco vEdge
device.
group vpn interface ike group—Configure the group number for an IKEv1
session.snmp group—Configure an SNMPv3 group.
hello-interval vpn router ospf area interface hello-interval—Set the interval at which the
router sends OSPF hello packets.vpn router pim interface hello-interval—
Modify the PIM hello message interval for an interface.vpn 0 interface
tunnel-interface hello-interval—Configure the interval between Hello packets
sent on a DTLS or TLS WAN transport connection.
hello-interval vpn router pim interface hello-interval— Modify the PIM hello message
interval for an interface.vpn 0 interface tunnel-interface
hello-interval—Configure the interval between Hello packets sent on a
DTLS or TLS WAN transport connection.
host-mode vpn interface dot1x host-mode—Set whether the 802.1X interface grants
access to a single client or to multiple clients.
idle-timeout Set how long the CLI is inactive before the user is logged out.
ike vpn interface ipsec ike—Configure the Internet Key protocol for use on an
IPsec tunnel.
implicit-acl-logging policy implicit-acl-logging—Log all flows that are not explicitly configured
with an allow-services command.
interface vpn router igmp interface—Configure the interfaces that participate in the
IGMP domain, and configure the groups for the interface to join.vpn router
pim interface— Configure the interfaces that participate in the PIM domain,
and configure PIM timers for the interfaces.vpn interface— Configure an
interface within a VPN.wlan interface—Configure virtual access points
(VAPs) for an IEEE 802.11i wireless LAN.vpn router ospf area
interface—Configure the properties of an interface in an OSPF area.
interface vpn router pim interface— Configure the interfaces that participate in the
PIM domain, and configure PIM timers for the interfaces.vpn interface—
Configure an interface within a VPN.wlan interface—Configure virtual
access points (VAPs) for an IEEE 802.11i wireless LAN.vpn router ospf
area interface—Configure the properties of an interface in an OSPF area.
interface wlan interface—Configure virtual access points (VAPs) for an IEEE 802.11i
wireless LAN.vpn router ospf area interface—Configure the properties of
an interface in an OSPF area.
interface gre vpn interface gre—Configure a GRE tunnel interface interface in the
transport VPN.
interface ipsec vpn interface ipsec—Configure IKE parameters for IPsec tunnels.
interface irb vpn interface irb—Configure an interface to use for integrated routing and
bridging (IRB).
interface ppp vpn interface ppp—Configure the Point-to-Point Protocol over Ethernet
(PPPoE).
ipsec vpn interface ipsec ipsec—Configure the IPsec tunnel to use for IKE key
exchange.security ipsec—Configure parameters for IPsec tunnel connections.
ipv6 address vpn 0 interface ipv6—Configure a static IPv6 address IPv6 on an interface.
keepalive vpn interface gre keepalive—Configure how often a GRE interface sends
keepalive packets.
lease-time vpn interface dhcp-server lease-time—Configure the time period for which
a DHCP-assigned IP address is valid.
location system location—Configure a text string the describes the location of the
device.snmp location—Configure the location of the device.
log-translations vpn interface nat log-translations— Log the creation and deletion of NAT
flows.
logging disk system logging disk—Log event notification system log (syslog) messages
to a file on the local device's hard disk.
logging server system logging server — Log event notification system logging (syslog)
messages to a remote host.
logs system aaa logs—Configure the logging of AAA and Netconf system logging
(syslog) messages.
match policy match—Define the properties that must be matched so that an IPv4
policy action can take effect.policy ipv6 access-list sequence match—Define
the properties that must be matched so that an IPv6 policy action can take
effect.
match policy ipv6 access-list sequence match—Define the properties that must be
matched so that an IPv6 policy action can take effect.
mode vpn interface ike mode—Configure the mode to use in IKEv1 Diffie-Hellman
key exchanges.
mtu vpn interface mtu—Set the maximum MTU size of packets on an interface.
name snmp name—Provide a text name for the Cisco vEdge device.vpn
name—Provide a text description for the VPN.
nat vpn interface nat— Configure a vEdge router to act as a NAT device.
network vpn router ospf area interface network—Set the OSPF network type.
next-hop-self vpn router bgp neighbor next-hop-self—Configure the router to be the next
hop to the BGP neighbor.
ntp system ntp—Configure Network Time Protocol (NTP) servers and MD5
authentication keys for the servers.
overload vpn interface nat overload— Control the mapping of addresses on a vEdge
router that is acting as a NAT device.
passive-interface vpn router ospf area interface passive-interface—Set the OSPF interface to
be passive.
pmtu vpn interface pmtu—Enable path MTU discovery on the interface, to allow
the router to determine the largest MTU size supported without requiring
packet fragmentation.
port-offset system port-offset—Offset the base port numbers to use for the TLOC when
multiple Cisco vEdge devices are present behind a single NAT device.
priority vpn router ospf area interface priority—Set the priority of the router to be
elected as the designated router.
propagate-aspath vpn router bgp propagate-aspath—Carry the BGP AS path into OMP.
radius-servers system aaa radius-servers, vpn interface dot1x radius-servers, wlan interface
radius-servers—Configure which RADIUS servers to use for AAA, IEEE
802.1X, and IEEE 802.11i authentication.
range vpn router ospf area range—Summarize OSPF areas at an area boundary
so that only a single summary router is advertised to other areas by an ABR.
redistribute vpn router ospf redistribute—Redistribute routes learned from other protocols
into OSPF.
refresh vpn interface nat refresh— Configure how NAT mappings are refreshed.
rekey vpn interface ipsec ike rekey, vpn interface ipsec ipsec rekey—Modify the
IPsec rekeying timer to use during IKE key exchanges or on the IPsec tunnel
being used for IKE key exchange.security ipsec rekey—Modify the IPsec
rekeying timer.
replay-window vpn interface ipsec ipsec replay-window—Modify the size of the IPsec
replay window on an IPsec tunnel that is being used for IKE key
exchange.security ipsec replay-window—Modify the size of the IPsec replay
window.
replay-window security ipsec replay-window—Modify the size of the IPsec replay window.
replicator-selection vpn router pim replicator-selection— Allow vEdge routers to use different
replicators for the same multicast group.
retransmit-interval vpn router ospf area interface retransmit-interval—Set the interval at which
the router retransmits OSPF link-state advertisements to its adjacencies.
router vpn router— Configure the BGP, OSPF, and PIM routing protocol to run
in a VPN.
router-id vpn router bgp router-id—Configure the BGP router ID, which is the IP
address associated with the router for BGP sessions.vpn router ospf
router-id—Configure the OSPF router ID, which is the IP address associated
with the router for OSPF adjacencies.
router-id vpn router ospf router-id—Configure the OSPF router ID, which is the IP
address associated with the router for OSPF adjacencies.
send-community vpn router bgp neighbor send-community—Send the local router's BGP
community attribute to the BGP neighbor.
send-ext-community vpn router bgp neighbor send-ext-community—Send the local router's BGP
extended community attribute to the BGP neighbor.
site-id system site-id—Configure the identifier of the site in the Cisco SD-WAN
overlay network, such as a branch, campus, or data center, in which the
device resides.
spt-threshold vpn router pim spt-threshold— Configure when a PIM router should join
the shortest-path source tree.
ssid wlan interface ssid—Configure the service set identifier (SSID) for a WLAN.
static vpn interface nat static— Configure 1:1 static NAT on a vEdge router that
is acting as a NAT device.
tcp-timeout vpn interface nat tcp-timeout— Configure when NAT translations over a
TCP session time out.
timeout inactivity vpn interface dot1x timeout inactivity—Set how long to wait before revoking
the authentication of an client that is using 802.1X to access a network.
timers vpn router bgp timers, vpn router bgp neighbor timers—Configure global
and per-neighbor BGP timers.omp timers—Configure OMP timers on vEdge
routers and vSmart controllers.vpn router ospf timers—Configure
OSPF timers.
track-default-gateway For a static route, determine whether the next hop is reachable before adding
that route to the device's route table.
trap target snmp trap target—Configure the target SNMP server to receive the SNMP
traps generated by this device.
udp-timeout vpn interface nat udp-timeout— Configure when NAT translations over a
UDP session time out.
user system aaa user—Configure a login account for each user who can access
the local Cisco vEdge device.snmp group—Configure an SNMPv3 user.
vlan bridge vlan—Set the tag to use as the VLAN ID for the bridging domain.
zone policy zone—Create a group of one or more VPNs in the overlay network
that form a zone.
aaa
Configure role-based access to a Cisco vEdge device using authentication, authorization, and accounting.
Command Hierarchy
system
aaa
admin-auth-order
auth-fallback
auth-order (local | radius | tacacs)
logs
[no] audit-disable
[no] netconf-disable
radius-servers tag
user username
group group-name
password password
usergroup group-name
task (interface | policy | routing | security | system) (read | write)
Syntax Description
The command has no keywords or arguments.
Command History
Release Modification
Example
vEdge# config
Entering configuration mode terminal
vEdge(config)# system aaa
vEdge(config-aaa)# user eve
vEdge(config-user-eve)# password 123456
vEdge(config-user-eve)# group operator
vEdge(config-user-eve)# exit
vEdge(config-aaa)# show configuration
system
aaa
user eve
password $1$aLEJ6jve$aBpPQpkl3h.SvA2dt4/6E/
group operator
!
!
!
vEdge(config-aaa)# commit and-quit
Commit complete.
Operational Commands
show aaa usergroup
show users
Related Topics
dot1x, on page 242
radius, on page 518
tacacs, on page 589
access-list
Configure or apply an IPv6 access list (on vEdge routers only).
Command Hierarchy
Create an Access List
policy ipv6
access-list acl-name
default-action action
sequence number
match
class class-name
destination-port number
next-header protocol
packet-length number
plp (high | low)
source-port number
tcp flag
traffic-class value
action
drop
count counter-name
log
accept
class class-name
mirror mirror-name
policer policer-name
set traffic-class value
Syntax Description
Command History
Release Modification
Example
Apply an IPv6 access list to data traffic being recieved on an interface in VPN 1:
vpn 1
interface ge0/4
ip address fd00:1234:/16
no shutdown
access-list acl-filter in
Operational Commands
show policy access-list-associations
show policy access-list-counters
show policy access-list-names
Related Topics
access-list, on page 47
access-list
Configure or apply an IPv4 access list (on vEdge routers only).
Command Hierarchy
Create an Access List
policy
access-list acl-name
default-action action
sequence number
match
class class-name
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
dscp number
packet-length number
plp (high | low)
protocol number
source-data-prefix-list list-name
source-ip prefix-length
source-port number
tcp flag
action
drop
count counter-name
log
accept
class class-name
count counter-name
log
mirror mirror-name
policer policer-name
set dscp value
set next-hop ipv4-address
Syntax Description
Command History
Release Modification
Example
Operational Commands
show policy access-list-associations
show policy access-list-counters
show policy access-list-names
Related Topics
access-list, on page 45
accounting-interval
How often an 802.1X interfaces sends interim accounting updates to the RADIUS accounting server during
an 802.1X session (on vEdge routers only). By default, no interim accounting updates are sent; they are sent
only when the 802.1X session ends.
Command Hierarchy
vpn 0
interface interface-name
dot1x
accounting-interval seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
acct-req-attr
Configure RADIUS accounting attribute–value (AV) pairs to send to the RADIUS accounting server during
an 802.1X session (on vEdge routers only). These AV pairs are defined in RFC 2865, RADIUS, and RFC
2866, RADIUS Accounting, and they are placed in the Attributes field of the RADIUS Accounting Request
packet.
Command Hierarchy
vpn 0
interface interface-name
dot1x
acct-req-attr attribute-number (integer integer | octet octet | string string)
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear dot1x client
action
Configure the actions to take when the match portion of an IPv4 policy is met (on vEdge routers, Cisco IOS
XE SD-WAN devices, and vSmart controllers).
Command Hierarchy
For Application-Aware Routing
policy
app-route-policy policy-name
vpn-list list-name
default-action sla-class sla-class-name
sequence number
action
backup-sla-preferred-color colors
count counter-name
log
sla-class sla-class-name [strict] [preferred-color colors]
tcp-optimization
accept
nat [pool number] [use-vpn 0] (in Releases 16.2 and earlier, not available for
deep packet inspection)
redirect-dns (host | ip-address)
set
dscp number
forwarding-class class
local-tloc color color [encap encapsulation]
local-tloc-list color color [encap encapsulation] [restrict]
next-hop ip-address
policer policer-name
service service-name local [restrict] [vpn vpn-id]
service service-name (tloc ip-address | tloc-list list-name) [vpn vpn-id]
tloc ip-address color color [encap encapsulation]
tloc-list list-name
vpn vpn-id
vpn-membership policy-name
default-action (accept | reject)
sequence number
action (accept | reject)
default-action action
sequence number
action
drop
count counter-name
log
accept
class class-name
count counter-name
log
mirror mirror-name
policer policer-name
set dscp value
set next-hop ipv4-address
policy control-policy policy-name Default Action for Control Policy and Data Policy:
default-action (accept|reject) policy
Default action to take if an item being evaluated by a policy matches
route-policy policy-name
none of the match conditions. If you configure no policy (specifically,
default-action (accept|reject) policy
if you configure no match–action sequences within a policy), the
data-policy policy-name
default action, by default, is to accept all items. If you configure a
default-action (accept|drop) policy
policy with one or more match–action sequences, the default action,
vpn-membership policy-name
by default, is to either reject or drop the item, depending on the policy
default-action (accept|drop) policy type.
access-list acl-name default-action
(accept|drop)
default-action (drop|inspect|pass) Default Action for Zone-Base Firewall Policy:
Default action to take if a data traffic flow matches none of the match
conditions. drop discards the data traffic. inspect inspects the packet's
header to determine its source address and port. The address and port
are used by the NAT device to allow traffic to be returned from the
destination to the sender. pass allows the packet to pass to the
destination zone without inspecting the packet's header at all. With
this action, the NAT device blocks return traffic that is addressed to
the sender.
Syntax Description
For Application-Aware Routing
Syntax Description
For Centralized Control Policy
TLOC Action:
Direct matching routes or TLOCs using the mechanism specified by
action, and enable end-to-end tracking of whether the ultimate
destination is reachable. Setting a TLOC action is useful when traffic
is first directed, via policy, to an intermediate destination, which then
forwards the traffic to its ultimate destination. For example, for traffic
from vEdge-A destined for vEdge-D, a policy might direct traffic
from vEdge-A first to vEdge-B (the intermediate destination), and
vEdge-B then sends it to the final destination, vEdge-D.action can
be one of the following:
• ecmp—Equally direct matching control traffic between the
intermediate destination and the ultimate destination. In our example,
traffic would be sent to vEdge-B (which would then send it to
vEdge-D) and directly to vEdge-D. With this action, if the
intermediate destination is down, all traffic reaches the ultimate
destination.
• primary—First direct matching traffic to the intermediate
destination. If that router is not reachable, then direct it to the final
destination. In our example, traffic would first be sent to vEdge-B.
If this router is down, it is sent directly to vEdge-D. With this action,
if the intermediate destination is down, all traffic reaches the final
destination.
• backup—First direct matching traffic to the final destination. If
that router is not reachable, then direct it to the intermediate
destination. In our example, traffic would first be sent directly to
vEdge-D. If the vEdge-A is not able to reach vEdge-D, traffic is sent
to vEdge-B, which might have an operational path to reach vEdge-D.
With this action, if the source is unable to reach the final destination
directly, it is possible for all traffic to reach the final destination via
the intermediate destination.
• strict—Direct matching traffic only to the intermediate destination.
In our example, traffic is sent only to vEdge-B, regardless of whether
it is reachable. With this action, if the intermediate destination is
down, no traffic reaches the final destination. If you do not configure
a set tloc-action action in a centralized control policy, strict is the
default behavior.
Note • set tloc-action is only supported end-to-end if the
transport color is the same from a site to the
intermediate hop and from the intermediate hop to
the final destination. If the transport that is used to
get from a site to the intermediate hop is a different
color than the transport that is used to get from the
intermediate hop to the final destination, then set
tloc-action will fail.
• If the action is accept set tloc-action, configure the
service TE on the intermediate destination.
Syntax Description
For Centralized Data Policy
Syntax Description
For Cflowd Traffic Flow Monitoring
Syntax Description
For Localized Control Policy
Syntax Description
For Localized Data Policy
Syntax Description
For Zone-Based Firewall Policy
drop Drop:
Discard the data traffic.
inspect Inspect:
Inspect the packet's header to determine its source address and port. The address and port are used
by the NAT device to allow traffic to be returned from the destination to the sender.
Command History
Release Modification
15.2 Added setting GRE encapsulation and preferred color for an SLA class.
Cisco IOS XE Added support to Cisco IOS XE SD-WAN devices for selecting one or more local
Release Amsterdam TLOCs for an action.
17.2.1r
Example
Create a centralized control policy that changes the TLOC for accepted packets:
policy
control-policy change-tloc
sequence 10
action accept
set tloc 1.1.1.2
Operational Commands
show app log flows
show log
show logging
show running-config policy
Related Topics
apply-policy, on page 95
lists, on page 363
match, on page 403
policy, on page 482
policy ipv6, on page 489
action
Configure the actions to take when the match portion of an IPv6 policy is met (on vEdge routers only).
Command Hierarchy
Localized Data Policy for IPv6
Configure on vEdge routers only.
policy ipv6
access-list acl-name
default-action action
sequence number
action
drop
count counter-name
log
accept
class class-name
count counter-name
log
mirror mirror-name
policer policer-name
set
traffic-class value
Syntax Description
classclass-name Class:
Assign the packets to the specified QoS class name.
mirrormirror-name Mirroring:
Mirror the packets to the specified mirror.
policerpolicer-name Policing:
Police the packets using the specified policer.
Command History
Release Modification
Example
Configure an IPv6 ACL that changes the traffic class on TCP port 80 data traffic, and apply the ACL
to an interface in VPN 0:
vEdge# show running-config policy ipv6 access-list
policy
ipv6 access-list traffic-class-48-to-46
sequence 10
match
destination-port 80
traffic-class 48
!
action accept
count port_80
log
set
traffic-class 46
!
!
!
default-action accept
!
!
vEdge# show running-config vpn 0 interface ge0/7 ipv6
vpn 0
interface ge0/7
ipv6 access-list traffic-class-48-to-46 in
!
!
Operational Commands
show running-config
Related Topics
policy, on page 482
address-family
Configure global and per-neighbor BGP address family information (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
address-family ipv4_unicast
aggregate-address prefix/length [as-set] [summary-only]
maximum-paths paths number
network prefix/length
redistribute (connected | nat | natpool-outside | omp | ospf | static) [route-policy
policy-name]
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
address-family ipv4_unicast
maximum-prefixes number [threshold] [restart minutes | warning-only]
route-policy policy-name (in | out)
Syntax Description
Command History
Release Modification
Example
LOCAL AS PATH
VPN PREFIX NEXTHOP METRIC PREF WEIGHT ORIGIN PATH STATUS
-------------------------------------------------------------------------------
1 10.20.25.0/24 0.0.0.0 0 - 32768 igp Local valid,best
1 61.0.1.0/24 0.0.0.0 0 - 32768 igp Local valid,best
Operational Commands
clear bgp neighbor
show bgp neighbor
show bgp routes
address-pool
Configure the pool of addresses in the service-site network for which the vEdge router interface acts as DHCP
server (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface geslot/port
dhcp-server
address-pool prefix/length
Syntax Description
Command History
Release Modification
Example
Configure the interface to be the DHCP server for the addresses covered by the IP prefix 10.0.100.0/24:
vEdge# config
Entering configuration mode terminal
vEdge(config)# vpn 1 interface ge0/4
vEdge(config-interface-ge0/4)# dhcp-server address-pool 10.0.100.0/24
vEdge(config-dhcp-server)# show full-configuration
vpn 1
interface ge0/4
dhcp-server
address-pool 10.0.100.0/24
!
!
!
Operational Commands
show dhcp interface
show dhcp server
admin-auth-order
Have the "admin" user use the authentication order configured in the auth-order command, when verifying
access to an overlay network device through an SSH session or a console connection.
If you do not configure the admin-auth-order command, the "admin" user is always authenticated locally.
In Releases 17.1 and earlier, when you log in as "admin" from a console port, you are authenticated locally.
No other authentication methods can be used.
Command Hierarchy
system
aaa
admin-auth-order
Command History
Release Modification
Operational Commands
show aaa usergroup
show users
Example
Command History Command introduced in Viptela Software Release 16.2.In Release 17.2, support authentication order process
for console connections.
Related Topics
auth-fallback, on page 108
auth-order, on page 111
radius, on page 518
tacacs, on page 589
usergroup, on page 656
admin-state
Enable or disable the DHCP server functionality on the interface (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface geslot/port
dhcp-server
admin-state (down | up)
Syntax Description
Command History
Release Modification
Example
Operational Commands
show dhcp interface
show dhcp server
admin-tech-on-failure
When a Cisco vEdge device reboots, collect system status information in a compressed tar file, to aid in
troubleshooting and diagnostics. This tar file, which is saved in the user's home directory, contains the output
of various commands and the contents of various files on the local device, including syslog files, files for
each process (daemon) running on the device, core files, and configuration rollback files. For aid in
troubleshooting, send the tar file to Cisco customer support.
Command Hierarchy
system
admin-tech-on-failure
Command History
Release Modification
Example
Configure the device to collect system status information in an admin-tech file when the device
reboots:
vEdge# show running-config system
system
admin-tech-on-failure
!
Operational Commands
request admin-tech
Related Topics
request admin-tech, on page 833
show crash, on page 1000
advertise
Advertise routes learned locally by the vEdge router to OMP (on vEdge routers only). OMP carries the routes
learned to the vSmart controller. By default, a vEdge router advertises connected, static, OSPF inter-area, and
OSPF intra-area routes to OMP.
Route advertisements that you configure with the omp advertise command apply to all VPNs configured on
the router. With the vpn omp advertise command, you can configure how routes are advertised in any
individual VPN except for VPN 0 and VPN 512, and this configuration applies only to the specific VPN. If
you configure route advertisements with both commands, they are both applied. advertise isis command is
added to support IS-IS route redistribution in OMP. OMP is update to advertise both Level 1 and Level 2
IS-IS routes for Software Defined Access (SDA). This is supported for both the IPv4 and IPv6 address families.
Command Hierarchy
omp
advertise (bgp | connected | ospf type | static)
vpn vpn-id
omp
advertise (aggregate prefix [aggregate-only] | bgp | connected | network prefix | ospf
type | static)
Syntax Description
Command History
Release Modification
Example
The following example shows the ISIS route distribution in OMP:
For a vEdge router in a branch network that is running BGP, advertise to the vSmart controller the
routes that the vEdge router has learned from the local network:
omp
advertise bgp
Operational Commands
show ip routes
show omp routes
age-time
Configure when MAC table entries age out (on vEdge routers only).
Command Hierarchy
bridge bridge-id
age-time seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
show bridge interface
show bridge mac
show bridge table
allow-local-exit
Configure Cloud OnRamp for SaaS (formerly called CloudExpress service) to use an interface with Direct
Internet Access (DIA) as an exit to the Internet (on vEdge routers only). To ensure that Cloud OnRamp for
SaaS is set up properly, configure it in vManage NMS, not using the CLI.
Command Hierarchy
vpn vpn-id
cloudexpress
allow-local-exit
Command History
Release Modification
Example
Allow local exit for Cloud OnRamp for SaaS in VPN 100:
vEdge# show running-config vpn 100 cloudexpress
vpn 100
cloudexpress
allow-local-exit
!
!
Operational Commands
clear cloudexpress computations
show cloudexpress applications
show cloudexpress gateway-exits
show cloudexpress local-exits
show omp cloudexpress
show running-config vpn cloudexpress
allow-same-site-tunnels
Allow tunnels to be formed between vEdge routers in the same site (on Cisco vEdge routers only).
Note No BFD sessions are established between two collocated Cisco vEdge routers. However, with the command
"allow-same-site-tunnels", we can form tunnels between Cisco vEdge Routers at the same site.
Command Hierarchy
system
allow-same-site-tunnels
Command History
Release Modification
Example
In this example, vEdge2 has two circuits, one to the Internet and the second to an MPLS network.
vEdge1 is also located at the same site, but has no circuits. This configuration binds two subinterfaces
from vEdge1 to the two circuit interfaces on vEdge2 so that vEdge1 can establish TLOCs on the
overlay network.
vEdge1# show running-config system
allow-same-site-tunnels
...
vEdge1# show running-config vpn 0
interface ge0/2.101
ip address 101.1.19.15/24
mtu 1496
tunnel-interface
color lte
!
no shutdown
!
interface ge0/2.102
ip address 102.1.19.15/24
mtu 1496
tunnel-interface
color mpls
!
no shutdown
!
vEdge2# show running-config system
allow-same-site-tunnels
...
vEdge2# show running-config vpn 0
interface ge0/0
ip address 172.16.255.2
tunnel-interface
color lte
!
no shutdown
!
interface ge0/3
ip address 172.16.255.16
tunnel-interface
color mpls
!
no shutdown
!
interface ge0/2.101
ip address 101.1.19.16/24
mtu 1496
tloc-extension ge0/0
no shutdown
!
interface ge0/2.102
ip address 102.1.19.16/24
mtu 1496
tloc-extension ge0/3
no shutdown
!
Related Topics
tloc-extension, on page 615
allow-service
Configure the services that are allowed to run over the WAN connection in VPN 0, which is the VPN that is
reserved for control plane traffic. For other VPNs, use of these services is not restricted.
On a vEdge router, services that you configure on a tunnel interface act as implicit access lists (ACLs). If you
explicitly configure ACLs on a tunnel interface, with the policy access-list command, the handling of packets
matching both implicit and explict ACLs depends on the exact configuration. For more information, see the
Configuring Localized Data Policy article for your software release.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
[no] allow-service service-name
Command History
Release Modification
Example
Display the services that are enabled by default on the WAN connection:
vEdge# show running-config vpn 0 interface ge0/2 tunnel-interface | details
vpn 0
interface ge0/2
tunnel-interface
encapsulation ipsec weight 1
color lte
max-controllers 2
control-connections
carrier default
hello-interval 1000
hello-tolerance 12
no allow-service all
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service https
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service ospf
no allow-service stun
!
!
!
Operational Commands
show ntp associations
show ntp peer
show running-config vpn 0
Related Topics
connections-limit, on page 187
icmp-redirect-disable, on page 298
implicit-acl-logging, on page 304
ntp, on page 454
service, on page 560
vbond-as-stun-server, on page 661
api-key
To configure the API key for Umbrella registration, on Cisco IOS XE SD-WAN devices, use the api-key
command in config-profile mode.
api-key api-key
Syntax Description
Command Mode
config-profile
Command History
Release Modification
Examples
Use parameter-map type umbrella global to enter config-profile mode, then use orgid, api-key, and secret
to configure Umbrella registration.
In config-profile mode, you can use show full-configuration to display Umbrella registration details.
Example
This example configures Umbrella registration details.
Device(config)# parameter-map type umbrella global
Device(config-profile)# orgid 1234567
Device(config-profile)# api-key aaa12345aaa12345aaa12345aaa12345
Device(config-profile)# secret 0 bbb12345bbb12345bbb12345bbb12345
app-route-policy
Configure or apply a policy for application-aware routing (on vSmart controllers only).
Command Hierarchy
Create a Policy for Application-Aware Routing
policy
app-route-policy policy-name
vpn-list list-name
default-action sla-class sla-class-name
sequence number
match
app-list list-name
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
dns (request | response)
dns-app-list list-name
dscp number
plp (high | low)
protocol number
source-data-prefix-list list-name
source-ip prefix/length
source-port address
action
backup-sla-preferred-color colors
count counter-name
log
sla-class sla-class-name [strict] [preferred-color colors]
Syntax Description
Command History
Release Modification
Example
Operational Commands
show app-route stats
Related Topics
sla-class, on page 567
app-visibility
Enable application visibility so that a vEdge router can monitor and track the applications running on
the LAN (on vEdge routers only).
Command Hierarchy
policy
app-visibility
Command History
Release Modification
Example
Source Dest
2015-05-03T08:22:51+00:00
1 192.168.20.83 1.1.42.1 51586 22 tcp ssh Encrypted
2015-05-04T13:28:03+00:00
Operational Commands
clear app dpi all
clear app dpi apps
clear app dpi flows
show app dpi applications
show app dpi flows
show app dpi supported-applications
applications
Configure applications for which to enable Cloud OnRamp for SaaS (formerly called CloudExpress service)
(on vEdge routers only). To ensure that Cloud OnRamp for SaaS is set up properly, configure it in vManage
NMS, not using the CLI.
Command Hierarchy
vpn vpn-id
cloudexpress
applications applications
Syntax Decription
Command History
Release Modification
Example
Configure a list of applications for which to enable Cloud OnRamp for SaaS:
vEdge# show running-config vpn 100 cloudexpress
vpn 100
cloudexpress
applications salesforce office365 amazon_aws oracle box_net dropbox intuit concur zendesk
gotomeeting google_apps
!
!
Operational Commands
clear cloudexpress computations
show cloudexpress applications
show cloudexpress gateway-exits
show cloudexpress local-exits
apply-policy
Have a policy take effect by applying it to sites within the overlay network (on vSmart controllers only).
Command Hierarchy
For Application-Aware Routing Policy
apply-policy
site-list list-name
app-route-policy policy-name
Syntax Description
Policy Name:
app-route-policy policy-name control-policy policy-name (in| out)data-policy
policy-name (all | from-service | from-tunnel)vpn-membership policy-name Name of
the policy to apply to the specified sites. policy-name must match that which you specified
in the control-policy, data-policy, or vpn-membership configuration command. For
centralized control policy, specify the direction in which to apply the policy. The in option
applies the policy to packets before they are placed in the vSmart controller's RIB, so the
specified actions affect the OMP routes stored in the RIB. The out option applies the policy
to packets after they are exported from the RIB. For centralized data policy, specify the
direction in which to apply the policy. The all option (which is the default) applies to all
data traffic passing through the vEdge router: the policy evaluates all data traffic going
from the local site (that is, from the service side of the router) into the tunnel interface, and
it evaluates all traffic entering to the local site through the tunnel interface. To apply the
data policy only to policy exiting from the local site, use the from-service option. To apply
the policy only to incoming traffic, use the from-tunnel option. You can apply different
data policies in each of the two traffic directions.
Command History
Release Modification
Operational Commands
show running-config apply-policy
Example 1
Apply a centralized control policy to the sites defined in the list west:
apply-policy
site-list west control-policy change-tloc out
On a vSmart controller, configure site lists to use for control and data policies that contain overlapping
site identifiers, and apply the policies to these site lists:
policy
lists
# site lists for control-policy
site-list us-control-list
site-id 1-200
site-list emea-control-site-list
site-id 201-300
site-list apac-control-site-list
site-id 301-400
# site lists for data-policy
site-list platinum-site-list
site-id 50-70
site-list titanium-site-list
site-id 70-130
site-list rhodium-site-list
site-id 131-301
control-policy us-control-policy
...
control-policy emea-control-policy
...
control-policy apac-control-policy
...
data-policy platinum-data-policy
...
data-policy titanium-data-policy
...
data-policy rhodium-data-policy
...
apply-policy
# Apply control policies. Among the control policies, there is no overlap of site IDs.
site-list us-control-site-list
control-policy us-control-policy in # policy is applied to sites 1-200
# sites overlap with data-policy
platinum-data-policy
site-list emea-control-site-list
control-policy emea-control-policy in # policy is applied to sites 201-300
# sites overlap with data-policy
rhodium-data-policy
site-list apac-control-site-list
control-policy apac-control-site-list in # policy is applied to sites 301-400
# sites overlap with data-policy
rhodium-data-policy
# Apply data policies. Among the data policies, there is no overlay of site IDs.
site-list platinum-site-list
data-policy platinum-data-policy all # policy is applied to sites 50-70
# sites overlap with control-policy
us-control-policy
site-list titanium-site-list
data-policy titanium-data-policy all # policy is applied to sites 70-130
# sites overlap with control-policy
us-control-policy
site-list rhodium-site-list
data-policy rhodium-data-policy all # policy is applied to sites 131-301
# sites overlap with control-policy
us-control-policy,
# emea-control-policy, and apac-control-policy
Command History Command introduced in Cisco SD-WAN Software Release 14.1.app-route-policy option added in Release
14.2.cflowd-template option added in Release 14.3.all, from-service, and from-tunnel options for centralized
data policy added in Release 15.2.In Release 15.4, added restrictions so that you cannot apply the same type
of policy (for example, data-policy or control-policy) to site lists that contain overlapping site IDs.In Release
16.3, add support for overlapping sites in different site lists.
Related Topics
show policy from-vsmart, on page 1191
action, on page 67
cflowd-template, on page 159
control-policy, on page 199
data-policy, on page 211
lists, on page 363
match, on page 400
policy, on page 482
archive
Periodically archive a copy of the full running configuration to an archival file. What is archived is the
configuration that is viewable by the user "admin".
Command Hierarchy
system
archive
interval minutes
path file-path
ssh-id-file filename
vpn vpn-id
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config system
Related Topics
load, on page 1304
save, on page 1311
area
Configure an OSPF area within a VPN on a vEdge router.
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
authentication
authentication-key key
message-digest key
type (message-digest | simple)
cost number
dead-interval seconds
hello-interval seconds
network (broadcast | point-to-point)
passive-interface
priority number
retransmit-interval seconds
! end area interface
nssa
no-summary
translate (always | candidate | never)
range prefix/length
cost number
no-advertise
stub
no-summary
Syntax Description
Command History
Release Modification
Example
In VPN 1 on a vEdge router, configure OSPF area 0. The interface ge0/0 participates in the local
OSPF network.
vEdge# show running-config vpn 1 router ospf
vpn 1
router
ospf
redistribute static
redistribute omp
area 0
interface ge0/0
exit
exit
!
!
!
Operational Commands
show ospf interface
show ospf neighbor detail
arp
Configure an ARP table entry for an interface in a VPN (on vEdge routers only).
Address Resolution Protocol (ARP) resolves network layer IP address to a link layer physical address, such
as an Ethernet MAC address. By default, ARP is enabled on vEdge routers, and they maintain an ARP cache
that maps IP addresses to MAC addresses for devices in their local network. To learn a device's MAC address,
vEdge routers broadcast ARP messages to that device's IP address, requesting the MAC address.
Command Hierarchy
vpn vpn-id
interface interface-name
arp
ip ip-address mac mac-address
Command History
Release Modification
Example
Operational Commands
clear arp
show arp
arp-timeout
Configure how long it takes for a dynamically learned ARP entry to time out (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
arp-timeout seconds
Command History
Release Modification
Example
Operational Commands
clear arp
show arp
auth-fail-vlan
Configure an authentication-fail VLAN on an interface running IEEE 802.1X, to provide network access
when RADIUS authentication or the RADIUS server fails (on vEdge routers only).
Command Hierarchy
vpn 0
interface interface-name
dot1x
auth-fail-vlan vlan-id
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
auth-reject-vlan, on page 114
bridge, on page 152
default-vlan, on page 225
guest-vlan, on page 279
radius, on page 518
auth-fallback
Configure authentication to fall back to a secondary or tertiary authentication mechanism when the
higher-priority authentication method fails to authenticate a user, either because the user has entered invalid
credentials or because the authentication server is unreachable (or all authentication servers are unreachable).
By default, authentication fallback is disabled.
The fallback process applies to both SSH sessions and console connections to an overlay network device.
Enable authentication fallback if you want the next authentication method to attempt to authenticate the user
even when the user is rejected by the first or second method.
Command Hierarchy
system
aaa
auth-fallback
Command History
Release Modification
Example
Display the AAA configuration. If authentication fallback is enabled, the auth-fallback command is shown
in the configuration:
The following examples illustrate the default authentication behavior and the behavior when authentication
fallback is enabled:
• If the authentication order is configured as radius local:
• With the default authentication, local authentication is used only when all RADIUS servers are
unreachable. If an authentication attempt via a RADIUS server fails, the user is not allowed to log
in even if they have provided the correct credentials for local authentication.
• With authentication fallback enabled, local authentication is used when all RADIUS servers are
unreachable or when a RADIUS server denies access to a user.
• With authentication fallback enabled, RADIUS authentication is tried when a username and matching
password are not present in the running configuration on the local device. In this case, the behavior
of two authentication methods is identical.
Operational Commands
show running config
Related Topics
admin-auth-order, on page 73
auth-order, on page 111
radius, on page 518
tacacs, on page 589
usergroup, on page 656
auth-order
Configure the order in which the Cisco SD-WAN software tries different authentication methods when
authenticating devices that are attempting to connect to an 802.1X WAN (on vEdge routers only).
The default authentication order is radius, then mab.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
auth-order (mab | radius)
Example
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
mac-authentication-bypass, on page 398
radius, on page 518
radius-servers, on page 522
auth-order
Configure the order is which the software tries different authentication methods when verifying user access
to an overlay network device through an SSH session or a console port. When verifying a user's login
credentials, the software starts with the method listed first. Then, if the login credentials do not match, it tries
the next authentication method.
To configure the authentication for the "admin" user, use the admin-auth-order command.
The default authentication order is local, then radius, and then tacacs. With the default authentication order,
the authentication process occurs in the following sequence:
• The authentication process first checks whether a username and matching password are present in the
running configuration on the local device.
• If local authentication fails, and if you have not configured authentication fallback (with the auth-fallback
command), the authentication process stops. However, if you have configured authentication fallback,
the authentication process next checks the RADIUS server. For this method to work, you must configure
one or more RADIUS servers with the system radius servercommand. If a RADIUS server is reachable,
the user is authenticated or denied access based on that server's RADIUS database. If a RADIUS server
is unreachable and if you have configured multiple RADIUS servers, the authentication process checks
each server sequentially, stopping when it is able to reach one of them. The user is then authenticated or
denied access based on that server's RADIUS database.
• If the RADIUS server is unreachable (or all the servers are unreachable), the authentication process
checks the TACACS+ server. For this method to work, you must configure one or more TACACS+
servers with the system tacacs server command. If a TACACS+ server is reachable, the user is
authenticated or denied access based on that server's TACACS+ database. If a TACACS+ server is
unreachable and if you have configured multiple TACACS+ servers, the authentication process checks
each server sequentially, stopping when it is able to reach one of them. The user is then authenticated or
denied access based on that server's TACACS+ database.
• If the TACACS+ server is unreachable (or all TACACS+ servers are unreachable), user access to the
local Cisco vEdge device is denied.
You can configure one, two, or three authentication methods in the preferred order, starting with the one to
be tried first. If you configure only one authentication method, it must be local.
In Releases 17.1 and earlier, when you log in as "admin" from a console port, you are authenticated locally.
No other authentication methods can be used.
Command Hierarchy
system
aaa
auth-order (local | radius | tacacs)
Syntax Description
Command History
Release Modification
Example
Operational Commands
show aaa usergroup
show users
Related Topics
admin-auth-order, on page 73
auth-fallback, on page 108
auth-reject-vlan
Configure an authentication-reject VLAN to place IEEE 802.1X-enabled clients into if authentication is
rejected by the RADIUS server (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
auth-reject-vlan vlan-id
Syntax Description
Command History
Release Modification
Example
Configure a restricted VLAN:
bridge 40
name Restricted_VLAN
vlan 40
interface ge0/5
no native-vlan
no shutdown
!
!
vpn 0
interface ge0/5
dot1x
auth-reject-vlan 40
!
no shutdown
!
!
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
auth-fail-vlan, on page 106
bridge, on page 152
default-vlan, on page 225
guest-vlan, on page 279
auth-req-attr
Configure RADIUS authentication attribute–value (AV) pairs to send to the RADIUS server during an
802.1X session (on vEdge routers only). These AV pairs are defined in RFC 2865 , RADIUS, and they are
placed in the Attributes field of the RADIUS Accounting Request packet.
Command Hierarchy
vpn 0
interface interface-name
dot1x
auth-req-attr attribute-number (integer integer | octet octet | string string)
Syntax Description
Command History
Release Modification
Example
Set the Service-Type authentication attribute to service type 2, which is a Framed service:
vEdge# show running-config vpn 0 dot1x
vpn 0
name "Transport VPN"
interface ge0/5
dot1x
auth-req-attr 6 integer 2
...
!
!
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
acct-req-attr, on page 51
nas-identifier, on page 436
nas-ip-address, on page 438
radius, on page 518
radius-servers, on page 522
authentication
vpn router ospf area interface authentication—Configure authentication for OSPF protocol exchanges (on
vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
authentication
authentication-key key
message-digest message-digest-key key-id md5 encrypted-key
type (message-digest | simple)
Command History
Release Modification
Example
Operational Commands
show ospf interface
authentication-type
vpn interface ike authentication-type—Configure the type of authentication to use during IKE key exchange
(on vEdge routers only). IKE supports preshared key (PSK) authentication only.
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ike
authentication-type pre-shared-key
local-id id
pre-shared-secret password
remote-id id
Command History
Release Modification
Example
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
show running-config
Related Topics
mode, on page 428
authentication-type
security ipsec authentication-type—Configure the type of authentication to use on IPsec tunnel connections
between vEdge routers (on vEdge routers only).
Command Hierarchy
security
ipsec
authentication-type type
Syntax Description
Command History
Release Modification
Example
Have the vEdge router negotiate the IPsec tunnel authentication type among AH-SHA1, ESP
SHA1-HMAC, and none:
vEdge# config
Entering configuration mode terminal
vm6(config)# security ipsec authentication-type sha1-hmac
vm6(config-ipsec)# authentication-type ah-sha1-hmac
vm6(config-ipsec)# authentication-type none
Operational Commands
show security-info
auto-cost reference-bandwidth
vpn router ospf auto-cost reference-bandwidth—Control how OSPF calculates the default metric for an
interface (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
auto-cost reference-bandwidth mbps
Syntax Description
Command History
Release Modification
Example
Set the reference bandwidth to 10 Mbps:
Operational Commands
show ospf process
auto-rp
vpn router pim auto-rp— Enable and disable auto-RP for PIM (on vEdge routers only). By default, auto-RP
is disabled.
Command Hierarchy
vpn vpn-id
router
pim
auto-rp
Command History
Release Modification
Operational Commands
show multicast replicator
show multicast rpf
show multicast topology
show multicast tunnel
show pim interface
show pim neighbor
autonegotiate
vpn interface autonegotiate—Configure whether an interface runs in autonegotiation mode (on vEdge routers
only).
On all vEdge router models, all interfaces support 1-Gigabit Ethernet SFPs. These SFPs can either be copper
or fiber. For fiber SFPs, the supported speeds are 1 Gbps full duplex and 100 Mbps full duplex. For copper
SFPs, the supported speeds are 10/100/1000 Mbps and half/full duplex. To use a fixed speed and duplex
configuration for interfaces that do not support autonegotiation, you must disable autonegotiation and then
use the speed and duplex commands to set the appropriate interface link characteristics.
Integrated routing and bridging (IRB) interfaces do not support autonegotiation. In Releases 17.1 and later,
the autonegotiate command is not available for these interfaces.
Command Hierarchy
vpn vpn-id
interface geport/slot
[no] autonegotiate
Command History
Release Modification
Example
Operational Commands
show interface
Related Topics
duplex, on page 247
speed, on page 571
bandwidth-downstream
vpn interface bandwidth-downstream—Generate notifications when the bandwidth of traffic received on
a physical interface in the WAN transport VPN (VPN 0) exceeds a specific limit (on vEdge routers and
vManage NMSs only). Specifically, notifications are generated when traffic exceeds 85 percent of the bandwidth
you configure with this command. Notifications generated include Netconf notifications, which are sent to
the vManage NMS, SNMP traps, and syslog messages. Notifications are sent when either the transmitted or
received bandwidth exceeds 85 percent of the bandwidth configured for that type of traffic.
By default, no bandwidth notifications of any kind are generated, so if you are interested in monitoring
bandwidth usage, you must do so manually.
You can configure this command on all interface types except for GRE and loopback interfaces.
Command Hierarchy
vpn 0
interface interface-name
bandwidth-downstream kbps
Example
Have the vEdge router generate a notification when the received or transmitted traffic on an interface
exceeds 85 percent of a 50-Mbps circuit:
vEdge# show running-config vpn 0 interface ge0/2
vpn 0
interface ge0/2
ip address 10.0.5.11/24
tunnel-interface
encapsulation ipsec
color lte
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
no shutdown
bandwidth-upstream 50000
bandwidth-downstream 50000
!
!
vEdge# show interface detail ge0/2
interface vpn 0 interface ge0/2
if-admin-status Up
if-oper-status Up
if-addr
ip-address 10.0.5.11/24
broadcast-addr 10.0.5.255
secondary false
...
rx-packets 122120
rx-octets 25293100
rx-errors 0
rx-drops 1403
tx-packets 117618
tx-octets 24737443
tx-errors 0
tx-drops 0
rx-pps 13
rx-kbps 36
tx-pps 13
tx-kbps 37
rx-arp-requests 325
tx-arp-replies 333
tx-arp-requests 704
rx-arp-replies 683
...
bandwidth-upstream 50000
bandwidth-downstream 50000
Operational Commands
show interface detail (see the rx-kbps and bandwidth-downstream fields)
Related Topics
bandwidth-upstream, on page 132
bandwidth-upstream
vpn interface bandwidth-upstream—Generate notifications when the bandwidth of traffic transmitted on
a physical interface in the WAN transport VPN (VPN 0) exceeds a specific limit (on vEdge routers and
vManage NMSs only). Specifically, notifications are generated when traffic exceeds 85 percent of the bandwidth
that you configure with this command. Notifications generated include Netconf notifications, which are sent
to the vManage NMS, SNMP traps, and syslog messages. Notifications are sent when either the transmitted
or received bandwidth exceeds 85 percent of the bandwidth configured for that type of traffic.
By default, no bandwidth notifications of any kind are generated, so if you are interested in monitoring
bandwidth usage, you must do so manually.
You can configure this command on all interface types except for GRE and loopback interfaces.
Command Hierarchy
vpn 0
interface interface-name
bandwidth-upstream kbps
Syntax Description
Command History
Release Modification
Example
Have the vEdge router generate a notification when the received or transmitted traffic on an interface
exceeds 85 percent of a 50-Mbps circuit:
vEdge# show running-config vpn 0 interface ge0/2
vpn 0
interface ge0/2
ip address 10.0.5.11/24
tunnel-interface
encapsulation ipsec
color lte
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
no shutdown
bandwidth-upstream 50000
bandwidth-downstream 50000
!
!
vEdge# show interface detail ge0/2
interface vpn 0 interface ge0/2
if-admin-status Up
if-oper-status Up
if-addr
ip-address 10.0.5.11/24
broadcast-addr 10.0.5.255
secondary false
...
rx-packets 122120
rx-octets 25293100
rx-errors 0
rx-drops 1403
tx-packets 117618
tx-octets 24737443
tx-errors 0
tx-drops 0
rx-pps 13
rx-kbps 36
tx-pps 13
tx-kbps 37
rx-arp-requests 325
tx-arp-replies 333
tx-arp-requests 704
rx-arp-replies 683
...
bandwidth-upstream 50000
bandwidth-downstream 50000
Operational Commands
show interface detail (see the tx-kbps and bandwidth-upstream fields)
Related Topics
bandwidth-downstream, on page 130
banner login
banner login—Configure banner text to be displayed before the login prompt on a Cisco vEdge device.
Command Hierarchy
banner
login "text"
Syntax Description
Command History
Release Modification
Cisco IOS XE Changed the value for inserting a line break for the banner string.
SD-WAN 16.12.1r
For Cisco IOS XE SD-WAN Release 16.12.1r, to insert a line break, type \x0a.
Example
Set a login banner:
vSmart(config)# banner login "vSmart Controller in Data Center 1\n AUTHORIZED USERS ONLY"
vSmart(config-banner)# commit and-quit
Commit complete.
vSmart# exit
MacBook-Pro:~ me$ ssh 10.0.5.19
vSmart Controller in Data Center 1
AUTHORIZED USERS ONLY
login:
Operational Commands
show running-config
Related Topics
banner motd, on page 136
banner motd
banner motd—Configure banner text to be displayed after a user logs in to a Cisco vEdge device.
Command Hierarchy
banner
motd "text"
Syntax Description
Command History
Release Modification
Cisco IOS XE Changed the value for inserting a line break for the banner string.
SD-WAN 16.12.1r
Example
Operational Commands
show running-config
Related Topics
banner login, on page 134
best-path
vpn router bgp best-path—Configure how the active BGP path is selected (on vEdge routers only).
Command Hierarchy
vpn id
router
bgp local-as-number
best-path
as-path multipath-relax
compare-router-id
med (always-compare | deterministic | missing-as-worst)
Syntax Description
med (always-compare| Use the MED to Select the Active BGP Path:
deterministic|missing-as-worst)
Compare the specified multi-exit discriminator (MED) parameter to
determine the active path. The MED parameter can be one of:
always-compare: Always compare MEDs regardless of whether the peer
ASs of the compared routes are the same.
deterministic: Compare MEDs from all routes received from the same
AS regardless of when the route was received.
missing-as-worst: If a path is missing a MED attribute, consider it to be
the worst path.
Command History
Release Modification
Example
Compare the router IDs among different BGP paths to determine which path will be the active one:
vEdge(config-best-path)# show config
vpn 1
router
bgp 666
best-path
compare-router-id
!
!
!
!
Operational Commands
show bgp routes
bfd app-route
bfd app-route—Configure Bidirectional Forwarding Protocol timers used by application-aware routing (on
vEdge routers only).
Command Hierarchy
bfd app-route
multiplier number
poll-interval milliseconds
Syntax Description
Command History
Release Modification
Example
Change the polling interval and multiplier to use for application-aware routing:
vEdge(config)# bfd app-route poll-interval 900000
vEdge(config)# bfd app-route multiplier 4
Operational Commands
show app-route stats
show bfd summary
Related Topics
bfd color, on page 142
bfd color
bfd color—Configure the Bidirectional Forwarding Protocol timers used on transport tunnels (on vEdge
routers only).
Note BFD is always enabled on vEdge routers. There is no shutdown configuration command to disable it.
Command Hierarchy
bfd color color
hello-interval milliseconds
multiplier number
pmtu-discovery
Syntax Description
Default: Enabled
Command History
Release Modification
Example
Change the BFD Hello packet interval for the lte tunnel connection to 2 minutes:
vEdge# show running-config bfd
bfd color lte
hello-interval 2000
!
Operational Commands
show bfd sessions
show control connections
Note Note that the default BFD configuration is not displayed when you issue the show running-config command.
This is because BFD is always enabled on vEdge routers, and there is no shutdown configuration command
to disable it. However, if you configure additional BFD properties, they are displayed by the show
running-config command.
Related Topics
bfd app-route, on page 140
encapsulation, on page 256
last-resort-circuit, on page 359
mtu, on page 429
pmtu, on page 477
hello-interval, on page 281
hello-tolerance, on page 287
bgp
vpn router bgp— Configure BGP within a VPN on a vEdge router.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
address-family ipv4-unicast
aggregate-address prefix/length [as-set] [summary-only]
maximum-paths paths number
network prefix/length
redistribute (connected | nat | natpool-outside | omp | ospf | static) [route-policy
policy-name]
best-path
as-path multipath-relax
compare-router-id
med (always-compare | deterministic | missing-as-worst)
distance
external number
internal number
local number
neighbor ip-address
address-family ipv4-unicast
maximum-prefixes number [threshold] [restart minutes | warning-only]
route-policy policy-name (in | out)
capability-negotiate
description text
ebgp-multihop ttl
next-hop-self
password md5-digest-string
remote-as remote-as-number
send-community
send-ext-community
[no] shutdown
timers
advertisement-interval number
connect-retry seconds
holdtime seconds
keepalive seconds
update-source ip-address
! end neighbor configuration
propagate-aspath
router-id ip-address
[no] shutdown
timers
holdtime seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear bgp neighbor
show bgp neighbor
show bgp routes
show bgp summary
show omp routes detail
bind
vpn 0 interface tunnel-interface bind—Bind a physical WAN interface to a loopback interface.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
bind interface-name
Syntax Description
Command History
Release Modification
Examples
Example 1
(for Cisco vEdge routers)
Bind the physical interface ge0/0 to the interface loopback2:
vpn 0
interface ge0/0
ip address 10.1.15.15/24
no shutdown
!
interface loopback2
ip address 172.16.15.15/24
tunnel-interface
color metro-ethernet
carrier carrier1
bind ge0/0
!
no shutdown
!
Example 2
(for Cisco IOS XE SD-WAN devices)
Device#show sdwan running-config
sdwan
interface Loopback1
tunnel-interface
encapsulation ipsec
color red
bind GigabitEthernet1
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
no allow-service snmp
exit
exit
Operational Commands
show control connections
block-icmp-error
vpn interface nat block-icmp-error—Prevent a vEdge router that is acting as a NAT device from receiving
inbound ICMP error messages (on vEdge routers only). By default, such a vEdge router blocks these error
messages. Blocking error messages is useful in the face of a DDoS attack.
NAT uses ICMP to relay error messages across a NAT, so if you want to receive these messages, disable the
blocking of ICMP error messages.
Command Hierarchy
vpn vpn-id
interface interface-name
nat
block-icmp-error
Command History
Release Modification
Example
Configure a vEdge router acting as a NAT so that it does not block inbound ICMP error messages, to allow
the router to receive NAT ICMP relay error messages:
vEdge# config
vEdge(config)# vpn 1 interface ge0/4 nat
vEdge(config-nat)# no block-icmp-error
vEdge(config-nat)# show full-configuration
vpn 1
interface ge0/4
nat
no block-icmp-error
!
!
!
Operational Commands
show ip nat filter
block-non-source-ip
vpn interface block-non-source-ip—Do not allow an interface to forward traffic if the source IP address of
the traffic does not match the inteface's IP prefix range (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
block-non-source-ip
Command History
Release Modification
Example
Have the router block traffic being sent out the transport interface (in VPN 0) and out one service-side
interface (in VPN 1) when the traffic's source IP address does not match the IP address configured
on the interface:
vpn 0
interface ge0/0
block-non-source-ip
...
vpn 1
interface ge1/0
block-non-source-ip
...
Operational Commands
show interface
show ip routes
bridge
bridge—Create a bridging domain (on vEdge routers only).
Command Hierarchy
bridge bridge-id
age-time seconds
interface interface-name
description "text description"
native-vlan
[no] shutdown
static-mac-address mac-address
max-macs number
name text
vlan vlan-id
Syntax Description
Example
vlan 2
interface ge0/2
no native-vlan
no shutdown
!
interface ge0/5
no native-vlan
no shutdown
!
interface ge0/6
no native-vlan
no shutdown
!
!
bridge 50
interface ge0/2
native-vlan
no shutdown
!
interface ge0/5
native-vlan
no shutdown
!
interface ge0/6
native-vlan
no shutdown
!
!
vEdge# show bridge interface
BRIDGE INTERFACE VLAN STATUS STATUS TYPE IFINDEX MTU PKTS OCTETS PKTS OCTETS
-------------------------------------------------------------------------------------------
1 ge0/2 1 Up Up vlan 34 1500 0 0 2 168
Operational Commands
show bridge interface
show bridge mac
show bridge table
Related Topics
interface irb, on page 326
capability-negotiate
vpn router bgp capability-negotiate—Allow the BGP session to learn about the BGP extensions that are
supported by the neighbor (on vEdge routers only).
This feature is disabled by default. If you have enabled it, use the no capability-negotiate configuration
command to disable it.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
capability-negotiate
Command History
Release Modification
Example
Enable BGP capability negotiation:
Operational Commands
show bgp neighbor
carrier
vpn 0 interface tunnel-interface carrier—Associate a carrier name or private network identifier with a
tunnel interface (on vEdge routers, vManage NMSs, and vSmart controllers only).
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
carrier carrier-name
Command History
Release Modification
Example
Associate a carrier name with a tunnel connection:
vpn 0
interface ge0/0
ip address 10.1.15.15/24
no shutdown
!
interface loopback2
ip address 172.16.15.15/24
tunnel-interface
color metro-ethernet
carrier carrier1
bind ge0/0
!
no shutdown
!
Operational Commands
show control connections
cellular
cellular—Configure a cellular module on a vEdge router (on vEdge routers only).
The firmware installed in the router's cellular modules is specific to each service provider and determines
which profile properties you can configure. You can modify the attributes for a profile only if allowed by the
service provider.
To associate a cellular profile with a cellular interface, use the interface cellular profile configuration command.
Command Hierarchy
cellular cellularnumber
profile number
apn name
auth auth-method
ip-addr ip-address
name profile-name
pdn-type type
primary-dns ip-address
secondary-dns ip-address
user-name user-name
user-pass password
Syntax Description
Command History
Release Modification
Example
Configure a cellular interface with a profile, and the profile with an APN.
vEdge# show running-config cellular
cellular cellular0
profile 1
apn reg_ims
!
Operational Commands
clear cellular errors
clear cellular session statistics
show cellular modem
show cellular network
show cellular profiles
show cellular radio
show cellular sessions
show cellular status
show interface
Related Topics
profile, on page 510
cflowd-template
policy cflowd-template—Create a template that defines the location of cflowd collectors, how often sets of
sampled flows should be sent to the collectors, and how often the cflowd template should be sent to the
collectors (on vSmart controllers only). You can configure a maximum of four cflowd collectors per vEdge
router. To have a template take effect, apply it with the appropriate data policy.
You must configure at least one cflowd-template, but it need not contain any parameters. With no parameters,
the data flow cache on vEdge nodes is managed using default settings, and no flow export occurs.
Command Hierarchy
policy
cflowd-template template-name
collector vpn vpn-id address ip-address port port-number transport transport-type
source-interface interface-name
flow-active-timeout seconds
flow-inactive-timeout seconds
flow-sampling-interval number
template-refresh seconds
apply-policy
site-list list-name
data-policy policy-name
cflowd-template template-name
Syntax Description
Command History
Release Modification
Example
Configure a cflowd flow collection template, and apply it to a group of sites in the overlay network:
vSmart# show running-config policy
cflowd-template test-cflowd-template
collector vpn 1 address 172.16.255.14 port 11233
flow-active-timeout 60
flow-inactive-timeout 90
flow-sampling-interval 64
template-refresh 120
!
vSmart# show running-config apply-policy
apply-policy
site-list site-list-for-cflowd
data-policy policy-for-cflowd
cflowd-template test-cflowd-template
!
!
Operational Commands
clear app cflowd flow-all (on vEdge routers only)
clear app cflowd flows (on vEdge routers only)
clear app cflowd statistics (on vEdge routers only)
show running-config policy (on vSmart controllers only)
show app cflowd collector (on vEdge routers only)
show app cflowd flow-count (on vEdge routers only)
show app cflowd flows (on vEdge outers only)
show app cflowd statistics (on vEdge routers only)
show app cflowd template (on vEdge routers only)
show policy from-vsmart (on vEdge routers only)
channel
wlan channel—Specify the radio channel (on vEdge cellular wireless routers only).
Command Hierarchy
wlan radio-band
channel (auto | auto-no-dfs) (channel)
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear wlan radius-stats
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
Related Topics
channel-bandwidth, on page 163
channel-bandwidth
wlan channel-bandwidth—Specify the IEEE 802.11n and 802.11ac channel bandwidth (on vEdge cellular
wireless routers only).
Command Hierarchy
wlan radio-band
channel-bandwidth megahertz
Syntax Description
Example
Explicitly configure the default channel bandwidth for a 5-GHz radio band:
vEdge# show running-config wlan
wlan 5GHz
channel 36
channel-bandwidth 80
interface vap0
ssid tb31_pm6_5ghz_vap0
no shutdown
!
Operational Commands
clear wlan radius-stats
show interface
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
Related Topics
channel, on page 161
cipher-suite
vpn interface ipsec ike cipher-suite—Configure the type of authentication and encryption to use during IKE
key exchange (on vEdge routers only).
vpn interface ipsec ipsec cipher-suite—Configure the authentication and encryption to use on an IPsec
tunnel that is being used for IKE key exchange (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ike
cipher-suite suite
ipsec
cipher-suite suite
Syntax Description
Command History
Release Modification
Example
Change the IKE key exchange to use AES-128 encryption and HMAC-SHA1:
vEdge(config)# vpn 1 interface ipsec1 ike
vEdge(config-ike)# cipher-suite aes128-sha1
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
class-map
policy class-map—Map forwarding classes to output queues (on vEdge routers only). When you are configuring
QoS policy, you refer to the forwarding class mappings when you configure a QoS scheduler.
Class mappings can apply to unicast and multicast traffic.
Command Hierarchy
policy
class-map
class class-name queue number
Syntax Description
Command History
Release Modification
Example
class be queue 2
class af1 queue 3
class af2 queue 4
class af3 queue 5
!
!
Operational Commands
show policy qos-map-info
Related Topics
access-list, on page 47
cloud-qos, on page 171
qos-map, on page 513
qos-scheduler, on page 515
rewrite-rule, on page 546
clear-dont-fragment
vpn interface clear-dont-fragment—Clear the Don't Fragment (DF) bit in the IPv4 packet header for packets
being transmitted out the interface (on vEdge routers only). When the DF bit is cleared, packets larger than
that interface's MTU are fragmented before being sent.
Command Hierarchy
vpn vpn-id
interface interface-name
clear-dont-fragment
Example
Operational Commands
show interface detail
Related Topics
mtu, on page 429
pmtu, on page 477
clock
Set the timezone to use on the local device.
Command Hierarchy
system
clock
timezone timezone
Syntax Description
timezone Set the timezone on the device. timezone is one of the timezones in the tz database (also
timezone called tzdata, the zoneinfo database, or the IANA timezone database). timezone has the
format area/location. area is the name of a continent (Africa, America, Antarctica, Asia,
Australia, or Europe), an ocean (Arctic, Atlantic, Indian, or Pacific), or Etc (such as Etc/UTC
and Etc/GMT). location is the name of a specific location within the area, usually a city
or small island. For more information, see the IANA Time Zone Database.
Default: UTC
Examples
Command History
Release Modification
cloud-qos
policy cloud-qos—Enable QoS scheduling and shaping for traffic on WAN interfaces (applicable to Cisco
vEdge Cloud, Cisco vEdge 5000, and Cisco ISR1100 routers).
Command Hierarchy
policy
cloud-qos
Command History
Release Modification
Example
Enable QoS scheduling and shaping to the transport-side tunnel interface in VPN 0 and to a
service-side interface in VPN 1, configure ACLs for QoS, and apply the policy to the two router
interfaces:
vEdgeCloud# show running-config policy
policy
cloud-qos
cloud-qos-service-side
class-map
class class0 queue 0
class class16 queue 0
class class1 queue 1
class class17 queue 1
class class2 queue 2
class class22 queue 2
class class3 queue 3
class class31 queue 3
rewrite-rule rewrite rewrite-all-dscps
class class0 low dscp 63
class class1 low dscp 62
class class16 low dscp 47
class class2 low dscp 61
class class22 low dscp 41
class class3 low dscp 60
class class31 low dscp 32
rewrite-rule rewrite-to-0
class class16 low dscp 0
class class22 low dscp 0
class class31 low dscp 0
access-list acl-match-class
sequence 16
match
class16
action accept
class class31
sequence 22
match
class22
action accept
class class31
sequence 31
match
class31
action accept
class class31
default-action accept
access-list acl-match-class-action-drop
sequence 16
match
class16
action drop
sequence 22
match
class22
action drop
sequence 31
match
class31
action drop
default-action accept
access-list acl-match-dscp
sequence 0
match
dscp 0
action accept
count counter-dscp-0
class class0
sequence 1
match
dscp 1
action accept
count counter-dscp-1
class class1
default-action accept
qos-scheduler qos-sched0
class class0
bandwidth-percent 1
buffer-percent 1
qos-scheduler qos-sched1
class class1
bandwidth-percent 1
buffer-percent 1
qos-map qos-map1
qos-scheduler qos-sched0
qos-scheduler qos-sched1
allow-service dns
allow-service icmp
no-allow-service sshd
no-allow-service ntp
no allow-service stun
no shutdown
access-list acl-match-dscp in
qos-map qos-map1
rewrite-rule rewrite-all-dscps
Operational Commands
show policy qos-map-info
show policy qos-scheduler-info
Related Topics
access-list, on page 47
class-map, on page 167
cloud-qos-service-side, on page 174
qos-map, on page 513
qos-scheduler, on page 515
rewrite-rule, on page 546
cloud-qos-service-side
policy cloud-qos-service-side—Use this command along with the policy cloud-qos command to enable
QoS scheduling and shaping for traffic on LAN interfaces (applicable to Cisco vEdge Cloud, Cisco vEdge
5000, and Cisco ISR1100 routers).
Command Hierarchy
policy
cloud-qos-service-side
Command History
Release Modification
Example
Enable QoS scheduling and shaping to the transport-side tunnel interface in VPN 0 and to a
service-side interface in VPN 1, configure ACLs for QoS, and apply the policy to the two router
interfaces:
vEdgeCloud# show running-config policy
policy
cloud-qos
cloud-qos-service-side
class-map
class class0 queue 0
class class16 queue 0
class class1 queue 1
class class17 queue 1
class class2 queue 2
class class22 queue 2
class class3 queue 3
class class31 queue 3
rewrite-rule rewrite rewrite-all-dscps
class class0 low dscp 63
class class1 low dscp 62
class class16 low dscp 47
class class2 low dscp 61
class class22 low dscp 41
class class3 low dscp 60
class class31 low dscp 32
rewrite-rule rewrite-to-0
class class16 low dscp 0
class class22 low dscp 0
class class31 low dscp 0
access-list acl-match-class
sequence 16
match
class16
action accept
class class31
sequence 22
match
class22
action accept
class class31
sequence 31
match
class31
action accept
class class31
default-action accept
access-list acl-match-class-action-drop
sequence 16
match
class16
action drop
sequence 22
match
class22
action drop
sequence 31
match
class31
action drop
default-action accept
access-list acl-match-dscp
sequence 0
match
dscp 0
action accept
count counter-dscp-0
class class0
sequence 1
match
dscp 1
action accept
count counter-dscp-1
class class1
default-action accept
qos-scheduler qos-sched0
class class0
bandwidth-percent 1
buffer-percent 1
qos-scheduler qos-sched1
class class1
bandwidth-percent 1
buffer-percent 1
qos-map qos-map1
qos-scheduler qos-sched0
qos-scheduler qos-sched1
allow-service dhcp
allow-service dns
allow-service icmp
no-allow-service sshd
no-allow-service ntp
no allow-service stun
no shutdown
access-list acl-match-dscp in
qos-map qos-map1
rewrite-rule rewrite-all-dscps
Operational Commands
show policy qos-map-info
show policy qos-scheduler-info
Related Topics
access-list, on page 47
class-map, on page 167
cloud-qos, on page 171
qos-map, on page 513
qos-scheduler, on page 515
rewrite-rule, on page 546
cloudexpress
vpn cloudexpress—Configure Cloud OnRamp for SaaS (formerly called CloudExpress service) in a VPN
(on vEdge routers only).
Note To ensure that CloudExpress service is set up properly, configure it in vManage NMS, not using the CLI.
Command Hierarchy
vpn vpn-id
cloudexpress
allow-local-exit
applications application-names
local-interface-list interface-names
node-type type
Command History
Release Modification
Example
Configure Cloud OnRamp for SaaS in VPN 100:
Operational Commands
clear cloudexpress computations
show cloudexpress applications
show cloudexpress gateway-exits
show cloudexpress local-exits
show omp cloudexpress
show running-config vpn cloudexpress
collector
policy cflowd-template collector—Configure the address of a cflowd collector (on vSmart controllers only).
The Cisco SD-WAN software can export flows to a maximum of four collectors. Note that if one or more
vManage NMSs are present in the overlay network, the collected flows are also sent to the NMSs. (The NMSs
are not counted in the maximum number of collectors.) Configuring a cflowd collector is optional.
Command Hierarchy
policy
cflowd-template template-name
collector vpn vpn-id address ip-address port port-number transport transport-type
source-interface interface-name
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config policy (on vSmart controllers only)
show app cflowd collector (on vEdge routers only)
show app cflowd template (on vEdge routers only)
color
vpn 0 interface tunnel-interface color—Identify an individual WAN transport tunnel (on vEdge routers
only). In the Cisco SD-WAN software, the tunnel is identified by a color. The color is one of the TLOC
parameters associated with the tunnel.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
color color [restrict]
Syntax Description
Command History
Release Modification
Example
On a vEdge router, configure two tunnel interfaces (two TLOCs). The tunnel on ge0/1 connects to
a public WAN, and the tunnel on ge0/2 connects to a private MPLS network. BFD sessions on the
tunnel on interface ge0/2 are established only to other TLOCs on other vEdge routers whose color
is also mpls. The no control-connections command disables attempts to establish control connections
over the MPLS network.
vpn 0
interface ge0/1
ip address 172.16.31.3/24
tunnel-interface
encapsulation ipsec
color biz-internet
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
!
interface ge0/2
ip address 10.10.23.3/24
tunnel-interface
encapsulation ipsec
color mpls restrict
no control-connections
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
!
!
!
Operational Commands
show control connections
show omp tlocs
Related Topics
encapsulation, on page 256
community
snmp community—Define an SNMP community (on vEdge routers and vSmart controllers only).
Command Hierarchy
snmp
community name
authorization read-only
view string
Syntax Description
view string Specify the MIB Objects an SNMP Manager Can Access:
Configure the view, or MIB objects, that the SNMP manager can access for this
community. You define the view name with the snmp view configuration command.
The view name can be a maximum of 255 characters. If it includes spaces, enclose the
name in quotation marks (" ").
Command History
Release Modification
Example
Configure the public community to be read-only:
vEdge# config
Entering configuration mode terminal
vEdge(config)# snmp community public
Operational Commands
show running-config snmp
compatible rfc1583
vpn router ospf compatible rfc1583—Calculate the cost of summary routes based on RFC 1583 rather than
RFC 2328 (on vEdge routers only). By default, calculation is done per RFC 1583.
Command Hierarchy
vpn vpn-id
router
ospf
compatible rfc1583
Syntax Description
Command History
Release Modification
Example
Operational Commands
show ospf process
connections-limit
vpn 0 interface tunnel-interface connections-limit—Configure the maximum number of HTTPS connections
that can be established to a vManage application server (on vManage NMSs only).
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
connections-limit number
Syntax Descriptions
Command History
Release Modification
Example
Configure the maximum number of HTTPS connections that a vManage NMS server accepts to 25:
vManage# show running-config vpn 0
vpn 0
host my ip 10.0.1.1
interface eth0
ip dhcp-client
no shutdown
!
interface eth1
tunnel-interface
connections-limit 25
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service stun
allow-service https
!
shutdown
!
!
Operational Commands
show control connections
show omp tlocs and show omp tlocs detail (see display the configured preference and weight values)
Related Topics
allow-service, on page 85
console-baud-rate
system console-baud-rate—Change the baud rate of the console connection on a vEdge router (on vEdge
routers only).
Command Hierarchy
system
console-baud-rate rate
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config system
contact
snmp contact—Configure the name of a network management contact person for this vEdge device.
Command Hierarchy
snmp
contact string
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config snmp
container
container—Configure a vSmart controller as a container within a vContainer host (on vContainer hosts only).
Command Hierarchy
container
instance instance-name
allow-address prefix/length 0 [port] protocol
description "text"
image filename
interface interface-name
host-ip-address prefix/length
memory megabytes
[no] shutdown
Syntax Description
Command History
Release Modification
Example
Configure IP address lists, and configure containers for three vSmart controllers on a container host:
vContainer# show running-config container
container
instance first_vsmart
image 16.2.0
no shutdown
memory 512
allow-address 35.197.204.176/32 0 all
allow-address 35.232.118.121/32 0 all
interface eth0
host-ip-address 10.0.1.25
!
!
instance second_vsmart
image 16.2.0
no shutdown
memory 512
allow-address 35.197.204.176/32 0 all
allow-address 35.232.118.121/32 0 all
interface eth0
host-ip-address 10.0.1.26
!
!
instance vm10
image 16.2.0
no shutdown
memory 512
allow-address 35.197.204.176/32 0 all
allow-address 35.232.118.121/32 0 all
interface eth0
host-ip-address 10.0.1.30
!
interface eth1
host-ip-address 10.0.12.20
!
interface eth2
host-ip-address 10.2.2.20
!
!
!
vpn 0
interface eth1
ip address-list 10.0.1.25/24
ip address-list 10.0.1.26/24
ip address-list 10.0.1.27/24
ip address-list 10.0.1.30/24
ip static-route 0.0.0.0/0 10.0.1.1
no shutdown
!
interface eth2
ip address-list 10.2.2.20/24
ip address-list 10.2.2.25/24
ip address-list 10.2.2.26/24
ip address-list 10.2.2.27/24
ip static-route 0.0.0.0/0 10.2.2.1
no shutdown
!
interface eth3
ip address-list 10.0.12.20/24
ip static-route 0.0.0.0/0 10.0.12.13
no shutdown
!
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
!
Operational Commands
request container image install
request container image remove
show container images
show container instances
Related Topics
ip address-list, on page 332
control
security control—Configure the protocol to use on control plane connections to a vSmart controller (on
vEdge routers, vManage NMSs, and vSmart controllers only).
Command Hierarchy
t
Synax Description
Command History
Release Modification
Example
Operational Commands
show control connections
control-connections
vpn 0 interface tunnel-interface control-connections—Attempt to establish a DTLS or TLS control
connection for a TLOC (on vEdge routers only). This is the default behavior.
When a vEdge router has multiple tunnel interfaces and hence multiple TLOCs, the router establishes only a
single control connection to the vManage NMS. The router chooses a TLOC at random for this control
connection, selecting one that is operational (that is, one whose administrative status is up). If the chosen
TLOC becomes non-operational, the router chooses another one.
Starting in Release 15.4, this command is deprecated. Use the max-control-connections command instead.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
[no] control-connections
Command History
Release Modification
Example
On a vEdge router, configure two tunnel interfaces (two TLOCs). The tunnel on ge0/1 connects to
a public WAN, and the tunnel on ge0/2 connects to a private MPLS network. The router establishes
a control connection over ge0/1. The no control-connections command on ge0/2 disables attempts
to establish control connections over the MPLS network.
vpn 0
interface ge0/1
ip address 172.16.31.3/24
tunnel-interface
encapsulation ipsec
color biz-internet
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
!
interface ge0/2
ip address 10.10.23.3/24
tunnel-interface
encapsulation ipsec
color mpls restrict
no control-connections
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
!
!
!
Operational Commands
show control connections
control-direction
vpn interface dot1x control-direction—Configure how the 802.1x interface sends packets to and receive
packets from unauthorized clients (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
control-direction (in-and-out | in-only)
Syntax Description
Command History
Release Modification
Example
Configure an 802.1x interface to send packets to but not receive packets from unauthorized clients:
vEdge# show running-config vpn 0 interface ge0/7
vpn 0
interface ge0/7
dot1x
control-direction in-only
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
control-policy
policy control-policy—Configure or apply a centralized control policy (on vSmart controllers only).
Command Hierarchy
Command History
Release Modification
Example
On a vSmart controller, configure a control policy that changes the TLOC address of matching
prefixes:
Operational Commands
show policy commands
control-session-pps
system control-session-pps—Police the flow of DTLS control session traffic.
Command Hierarchy
system
control-session-pps rate
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config system
Related Topics
host-policer-pps, on page 296
icmp-error-pps, on page 297
policer, on page 478
controller-group-id
Configure the identifier of the controller group to which the vSmart controller belongs (on vSmart controllers
only).
Command Hierarchy
system
controller-group-id number
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show control connections
show running-config system
Related Topics
controller-group-list, on page 202
exclude-controller-group-list, on page 261
max-control-connections, on page 415
max-omp-sessions, on page 422
controller-group-list
List of controller groups to which the vEdge router belongs (on vEdge routers only). A vEdge router can form
control connections only with the vSmart controllers that are in the same controller group.
Command Hierarchy
system
controller-group-list number
Syntax Description
Example
Allow a vEdge router to establish control connections to the vSmart controllers in groups 1 and 2:
vEdge(config)# system controller-group-list 1 2
vEdge(config)# commit and-quit
vEdge# show control connections
PEER PEER
CONTROLLER
PEER PEER PEER SITE DOMAIN PEER PRIVATE PEER PUBLIC
GROUP
TYPE PROTOCOL SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT LOCAL COLOR
STATE UPTIME ID
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
vsmart dtls 172.16.255.19 100 1 10.0.5.19 12446 10.0.5.19 12446 lte
up 0:00:01:56 1
vsmart dtls 172.16.255.20 200 1 10.0.12.20 12446 10.0.12.20 12446 lte
up 0:00:17:34 2
Command History
Release Modification
Operational Commands
show control affinity config
show control affinity status
show control connections
show control local-properties
Related Topics
controller-group-id, on page 201
exclude-controller-group-list, on page 261
controller-mode
To switch from autonomous mode to controller and from controller mode to autonomous mode use the
controller-mode command in Privileged EXEC mode.
Usage Guidelines When you switch the device mode from autonomous to controller, the startup configuration and the information
in NVRAM (certificates), are erased. This action is same as the write erase. If you switch back to autonomous
mode, the IOS XE configuration is not restored because the startup configuration is empty. You have to
manually restore configuration from the backup..
When you switch the device mode from controller to autonomous, all Yang-based configuration is preserved
and can be reused if you switch back to controller mode. If you switch back to controller mode, the original
configuration in controller mode is preserved.
If the mode change CLI is invoked from a Telnet terminal, the mode change operation is not permitted unless
auto-boot variables are set in ROMmon.
Example
Use the controller-modedisable command the device to autonomous mode.
Device# controller-mode disable
cost
Configure the cost of an OSPF interface (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
cost number
Syntax Description
Command History
Release Modification
Example
Operational Commands
show ospf interface
country
Configure the country in which the vEdge WLAN router is installed (on vEdge cellular wireless routers only).
Setting the country is mandatory. This configuration ensures that the router complies to local regulatory
requirements, enforcing country-specific allowable channels, allowed users, and maximum power levels for
the various frequency levels.
Command Hierarchy
wlan radio-band
country country
Syntax Description
Example
!
interface vap3
ssid tb31_pm6_5ghz_vap3
data-security wpa2-enterprise
mgmt-security optional
radius-servers tag1
no shutdown
!
!
Command History
Release Modification
Operational Commands
clear wlan radius-stats
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
Related Topics
channel, on page 161
channel-bandwidth, on page 163
radius, on page 518
das
Configure dynamic authorization service (DAS) parameters for use with IEEE 802.1X authentication so that
the router can accept change of authentication (CoA) requests from a RADIUS server (on vEdge routers only).
When discussing DAS, the vEdge router (the NAS) is the server and the RADIUS server (or other authentication
server) is the client.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
das
client ip-address
port port-number
require-timestamp
secret-key password
time-window seconds
vpn vpn-id
Syntax Description
require-timestamp Timestamps:
Require the DAS client (which is the RADIUS or other authentication server) to
include an event timestamp in all CoA messages.
When timestamps are required both the vEdge router and the RADIUS server check
that the timestamp in the CoA request is current and within a specific time window
(the default time window is 5 minutes). If it is not, the CoA request is discarded.
Also, when timestamps are required, a CoA received without a timestamp is discarded
immediately.
By default, timestamps are not required.
Command History
Release Modification
Example
Configure DAS with a network RADIUS servers to allow the vEdge router to accept CoA requests
from that server. This configuration requires timestamps in the CoA requests and extends the valid
CoA window to 10 minutes.
vEdge(config-das)# show full-configuration
vpn 0
interface ge0/2
dot1x
das
time-window 600
require-timestamp
client 10.1.15.150
secret-key $4$L3rwZmsIic8zj4BgLEFXKw==
!
!
!
!
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
radius, on page 518
data-policy
Configure or apply a centralized data policy based on data packet header fields (on vSmart controllers only).
Command Hierarchy
Create a Centralized Data Policy:
policy
data-policy policy-name
vpn-list list-name
default-action action
sequence number
match
app-list list-name
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
dns (request | response)
dns-app-list list-name
dscp number
packet-length bytes
plp (high | low)
protocol number
source-data-prefix-list list-name
source-ip prefix/length
source-port number
tcp flag
action
cflowd (not available for deep packet inspection)
count counter-name
drop
log
tcp-optimization
accept
nat [pool number] [use-vpn 0] (in Releases 16.2 and earlier, not available for
deep packet inspection)
redirect-dns (host | ip-address)
set
dscp number
forwarding-class class
local-tloc color color [encap encapsulation]
local-tloc-list color color [encap encapsulation] [restrict]
next-hop ip-address
policer policer-name
service service-name local [restrict] [vpn vpn-id]
service service-name [tloc ip-address | tloc-list list-name] [vpn vpn-id]
tloc ip-address color color [encap encapsulation]
tloc-list list-name
vpn vpn-id
Syntax Description
Command History
Release Modification
Example
data-policy test-data-policy
vpn-list test-vpn-list
sequence 10
match
destination-ip 172.16.0.0/24
!
action drop
count test-counter
!
!
default-action drop
!
!
lists
vpn-list test-vpn-list
vpn 1
!
!
!
Operational Commands
show policy data-policy-filter
show policy from-vsmart
show running-config policy
Related Topics
vpn-membership, on page 672
data-security
Configure the Wi-Fi protected access (WPA) and WPA2 data protection and network access control to use
for an IEEE 802.11i wireless LAN (on vEdge cellular wireless routers only).
WPA authenticates individual users on the WLAN using a username and password. WPA uses the Temporal
Key Integrity Protocol (TKIP), which is based on the RC4 cipher.
WPA2 implements the NIST FIPS 140-2–compliant AES encryption algorithm along with IEEE 802.1X-based
authentication, to enhance user access security over WPA. WPA2 uses the Counter Mode Cipher Block
Chaining Message Authentication Code Protocol (CCMP), which is based on the AES cipher.
Authentication is done either using preshared keys and through RADIUS authentication.
Command Hierarchy
wlan radio-band
interface vap number
data-security security
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear wlan radius-stats
show interface
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
Related Topics
mgmt-security, on page 424
radius, on page 518
radius-servers, on page 522
wpa-personal-key, on page 680
dead-interval
Set the interval during which at least one OSPF hello packet must be received from a neighbor before declaring
that neighbor to be down (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
dead-interval seconds
Command History
Release Modification
Example
Operational Commands
show ospf interface
Related Topics
hello-interval, on page 285
dead-peer-detection
Configure the parameters for detecting unreachable IKE peers through an IPsec tunnel (on vEdge routers
only).
Command Hierarchy
vpn vpn-id
interface ipsecnumber
dead-peer-detection interval seconds [retries number]
Syntax Description
Command History
Release Modification
Example
Change the liveness detection interval to 30 seconds and the number of retries to 10:
vEdge(config)# vpn 1 interface ipsec1
vEdge(config-interface-ipsec1)# dead-peer-detection 30 retries 10
Operational Commands
clear ipsec ike sessions
default-action
Configure the default action to take when the match portion of a policy is not met (on vEdge routers and
vSmart controllers only).
Command Hierarchy
For Application-Aware Routing
policy
app-route-policy policy-name
default-action
sla-class sla-class-name
Syntax Description
policy control-policy policy-name Default Action for Control Policy and Data Policy:
default-action (accept|reject)
Default action to take if an item being evaluated by a policy
policy route-policy policy-name matches none of the match conditions. If you configure no
default-action (accept | reject) policy (specifically, if you configure no match–action sequences
within a policy), the default action, by default, is to accept all
policy data-policy policy-name
items. If you configure a policy with one or more match–action
default-action (accept | drop)
sequences, the default action, by default, is to either reject or
policy vpn-membership policy-name drop the item, depending on the policy type.
default-action (accept | drop)
policy access-list acl-name default-action
(accept | drop)
default-action (drop | inspect | pass) Default Action for Zone-Base Firewall Policy
Default action to take if a data traffic flow matches none of the
match conditions.
drop discards the data traffic.
inspect inspects the packet's header to determine its source
address and port. The address and port are used by the NAT
device to allow traffic to be returned from the destination to
the sender.
pass allows the packet to pass to the destination zone without
inspecting the packet's header at all. With this action, the NAT
device blocks return traffic that is addressed to the sender.
Command History
Release Modification
Example
Create a centralized control policy that changes the TLOC for accepted packets:
policy
control-policy change-tloc
default-action accept
sequence 10
action accept
tloc 1.1.1.2
Operational Commands
show running-config policy
default-information originate
Generate a default external route into an OSPF routing domain (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
default-information
originate (always | metric metric | metric-type type)
Syntax Description
Command History
Release Modification
Example
Operational Commands
show ospf routes
default-vlan
Configure the VLAN for 802.1X–compliant clients that are successfully authenticated by the RADIUS server
(on vEdge routers only).
If you do not configure a default VLAN on the vEdge router, successfully authenticated clients are placed
into VLAN 0, which is the VLAN associated with an untagged bridge.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
default-vlan vlan-id
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
auth-fail-vlan, on page 106
auth-reject-vlan, on page 114
bridge, on page 152
guest-vlan, on page 279
radius, on page 518
description
Configure a text description for a parameter or property.
Command Hierarchy
Instances of the description command appear throughout the configuration command hierarchy on Cisco
vEdge devices.
Command History
Release Modification
Example
Operational Commands
show interface description
show running-config vpn
Related Topics
name, on page 434
device-groups
Configure one or more groups to which the vEdge device belongs.
Command Hierarchy
system
device-groups [group-name]
Syntax Description
Command History
Release Modification
Example
Add a vEdge router to two groups: London and the United Kingdom:
vEdge(config)# system
vEdge(config-system)# device-groups London
vEdge(config-system)# device-groups [ "United Kingdom" ]
dhcp-helper
Allow an interface to act as a DHCP helper (on vEdge routers only). A DHCP helper interface forwards
BOOTP (Broadcast) DHCP requests that it receives from the DHCP server specified by the configured IP
helper address.
You can configure a DHCP helper only on service-side interfaces. These are interfaces in any VPN except
VPN 0 (the WAN-side transport VPN) and VPN 512 (the out-of-band management VPN).
Command Hierarchy
vpn id
interface interface-name
dhcp-helper ip-addresses
Syntax Description
Command History
Release Modification
14.3 Add support for four IP addresses on a single DHCP helper interface.
17.2.2 Add support for eight IP addresses on a single DHCP helper interface.
Example
interface ge0/4
description "VPN 1 interface"
ip address 10.20.25.16/24
dhcp-helper 10.22.11.1
no shutdown
!
!
Operational Commands
show running-config vpn interface
Related Topics
dhcp-server, on page 231
dhcp-server
Enable DHCP server functionality on a vEdge router so it can assign IP addresses to hosts in the service-side
network (on vEdge routers only).
You can configure a DHCP helper only on service-side interfaces. These are interfaces in any VPN except
VPN 0 (the WAN-side transport VPN) and VPN 512 (the out-of-band management VPN).
Command Hierarchy
vpn vpn-id
interface geslot/port
dhcp-server
address-pool prefix/length
admin-state (down | up)
exclude ip-address
lease-time seconds
max-leases number
offer-time seconds
options
default-gateway ip-address
dns-servers ip-address
domain-name domain-name
interface-mtu mtu
tftp-servers ip-address
static-lease mac-address ip ip-address host-name hostname
Command History
Release Modification
Example
Configure the interface to be the DHCP server for the addresses covered by the IP prefix 10.0.100.0/24:
vEdge# config
Entering configuration mode terminal
vEdge(config)# vpn 1 interface ge0/4
vEdge(config-interface-ge0/4)# dhcp-server address-pool 10.0.100.0/24
vEdge(config-dhcp-server)# show full-configuration
vpn 1
interface ge0/4
dhcp-server
address-pool 10.0.100.0/24
!
!
!
Operational Commands
clear dhcp server-bindings
show dhcp interface
show dhcp server
Related Topics
allow-service, on page 85
dhcp-helper, on page 229
direction
Configure the direction in which a NAT interface performs address translation (on vEdge routers only). For
each NAT pool interface, you can configure only one direction.
Command Hierarchy
vpn vpn-id
interface natpoolnumber
nat
direction (inside | outside)
Syntax Description
Command History
Release Modification
Example
no overload
!
direction inside
no shutdown
!
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
Related Topics
encapsulation, on page 256
discard-rejected
Have OMP discard routes that have been rejected on the basis of policy (on vSmart controllers only). By
default, rejected routes are not discarded.
Command Hierarchy
omp
discard-rejected
Syntax Description
None
Command History
Release Modification
Example
Configure a vSmart controller to discard routes that have been rejected by a policy:
vSmart# show running-config omp
omp
no shutdown
discard-rejected
graceful-restart
timers
holdtime 15
exit
!
Operational Commands
show omp peers
show omp routes
show omp services
show omp summary
show omp tlocs
distance
Define the BGP route administrative distance based on route type (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
bgp
distance
external number
internal number
local number
Syntax Description
Command History
Release Modification
Example
Operational Commands
show bgp routes
distance
Define the OSPF route administration distance based on route type (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
distance
external number
inter-area number
intra-area number
Syntax Description
Command History
Release Modification
Example
Change the OSPF distance for routes learned from other domains:
vEdge# config
Entering configuration mode terminal
vEdge(config)# vpn 1 router ospf
vEdge(config-ospf)# distance external 50
vEdge(config-ospf)# show config
vpn 1
router
ospf
distance external 50
!
!
!
Operational Commands
show ospf routes
dns
Configure the address of a DNS server within a VPN.
Command Hierarchy
vpn vpn-id
dns ip-address (primary | secondary)
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config vpn
domain-id
Configure the identifier for the vEdge device overlay network domain (available on vSmart controllers and
vEdge routers).
Command Hierarchy
system
domain-id domain-id
Syntax Description
Command History
Release Modification
Example
Operational Commands
show control local-properties
dot1x
Configure port-level 802.1X parameters on a router interface in VPN 0 (on vEdge routers only).
Command Hierarchy
vpn 0
interface interface-name
dot1x
accounting-interval minutes
acct-req-attr attribute-number (integer integer | octet octet | string string)
auth-fail-vlan vlan-id
auth-order (mab | radius)
auth-reject-vlan vlan-id
auth-req-attr attribute-number (integer integer | octet octet | string string)
control-direction direction
das
client ip-address
port port-number
require-timestamp
secret-key password
time-window seconds
vpn vpn-id
default-vlan vlan-id
guest-vlan vlan-id
host-mode (multi-auth | multi-host | single-host)
mac-authentication-bypass
allow mac-addresses
server
nas-identifier string
nas-ip-address ip-address
radius-servers tag
reauthentication minutes
timeout
inactivity minutes
wake-on-lan
Syntax Description
None
Command History
Release Modification
Example
Configure IEEE 802.1X on one router interface. In this example, the bridging domain numbers match
the VLAN numbers, which is a recommended best practice. Also, the bridging domain name identifies
the type of 802.1X VLAN.
system
...
radius
server 10.1.15.150
tag freerad1
source-interface ge0/0
secret-key $4$L3rwZmsIic8zj4BgLEFXKw==
priority 1
exit
server 10.20.24.150
auth-port 2000
acct-port 2001
tag freerad2
source-interface ge0/4
secret-key $4$L3rwZmsIic8zj4BgLEFXKw==
priority 2
exit
!
!
bridge 1
name Untagged_bridge
interface ge0/5
no native-vlan
no shutdown
!
!
bridge 10
name Authorize_VLAN
vlan 10
interface ge0/5
no native-vlan
no shutdown
!
!
bridge 20
name Guest_VLAN
vlan 20
interface ge0/5
no native-vlan
no shutdown
!
!
bridge 30
name Critical_VLAN
vlan 30
interface ge0/5
no native-vlan
no shutdown
!
!
bridge 40
name Restricted_VLAN
vlan 40
interface ge0/5
no native-vlan
no shutdown
!
!
vpn 0
interface ge0/0
ip address 10.1.15.15/24
tunnel-interface
encapsulation ipsec
...
!
no shutdown
!
interface ge0/1
ip address 60.0.1.16/24
no shutdown
!
interface ge0/2
ip address 10.1.19.15/24
no shutdown
!
interface ge0/4
ip address 10.20.24.15/24
no shutdown
!
interface ge0/5
dot1x
auth-reject-vlan 40
auth-fail-vlan 30
guest-vlan 20
default-vlan 10
radius-servers freerad1
!
no shutdown
!
interface ge0/7
ip address 10.0.100.15/24
no shutdown
!
!
vpn 1
interface ge0/2.1
ip address 10.2.19.15/24
mtu 1496
no shutdown
!
interface irb1
ip address 56.0.1.15/24
mac-address 00:00:00:00:aa:01
no shutdown
dhcp-server
address-pool 56.0.1.0/25
offer-time 600
lease-time 86400
admin-state up
options
default-gateway 56.0.1.15
!
!
!
!
vpn 10
interface ge0/2.10
ip address 10.10.19.15/24
mtu 1496
no shutdown
!
interface irb10
ip address 56.0.10.15/24
mac-address 00:00:00:00:aa:10
no shutdown
dhcp-server
address-pool 56.0.10.0/25
offer-time 600
lease-time 86400
admin-state up
options
default-gateway 56.0.10.15
!
!
!
!
vpn 20
interface ge0/2.20
ip address 10.20.19.15/24
mtu 1496
no shutdown
!
interface irb20
ip address 56.0.20.15/24
mac-address 00:00:00:00:aa:20
no shutdown
!
!
vpn 30
interface ge0/2.30
ip address 10.30.19.15/24
mtu 1496
no shutdown
!
interface irb30
ip address 56.0.30.15/24
mac-address 00:00:00:00:aa:30
no shutdown
!
!
vpn 40
interface ge0/2.40
ip address 10.40.19.15/24
mtu 1496
no shutdown
!
interface irb40
ip address 56.0.40.15/24
mac-address 00:00:00:00:aa:40
no shutdown
!
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
!
Operational Commands
clear dot1x client
show dot1x clients
duplex
Configure whether the interface runs in full-duplex or half-duplex mode.
On all vEdge router models, all interfaces support 1-Gigabit Ethernet SFPs. These SFPs can either be copper
or fiber. For fiber SFPs, the supported speeds are 1 Gbps full duplex and 100 Mbps full duplex. For copper
SFPs, the supported speeds are 10/100/1000 Mbps and half/full duplex. By default, the router autonegotiates
the speed and duplex values for the interfaces.
To use a fixed speed and duplex configuration for interfaces that do not support autonegotiation, you must
disable autonegotiation and then use the speed and duplex commands to set the appropriate interface link
characteristics.
Command Hierarchy
vpn vpn-id
interface geport/slot
duplex (full | half)
Syntax Description
Command History
Release Modification
Example
Operational Commands
show interface
Related Topics
autonegotiate, on page 128
speed, on page 571
ebgp-multihop
Attempt BGP connections to and accept BGP connections from external peers on networks that are not directly
connected to this network (on vEdge routers only).
This feature is disabled by default. If you configure it, use the no ebgp-multihop command to return to the
default.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
ebgp-multihop [ttl]
Syntax Description
Command History
Release Modification
Example
Operation Commands
show bgp neighbor
ecmp-hash-key
Determine how equal-cost paths are chosen (on vEdge routers only). By default, a combination of the source
IP address, destination IP address, protocol, and DSCP field is used as the ECMP hash key to determine which
of the equal cost paths to choose.
Command Hierarchy
vpn vpn-id
ecmp-hash-key layer4
Syntax Description
layer4 Use the Layer 4 Source and Destination Ports in the ECMP Hash Key:
Use a combination of the Layer 4 source port and Layer 4 destination port, in addition to the
combination of the source IP address, destination IP address, protocol, and DSCP field, as the ECMP
hash key. Note that this flag should be enabled only in networks where it can be guaranteed that there
will never be IP fragmentation. Otherwise, enabling this could lead to out-of-order packets.
Command History
Release Modification
Example
Use the Layer 4 source and destination ports in the EMCP hash key:
vEdge(config-vpn-1)# ecmp-hash-key layer4
vEdge(config-vpn-1)# show config
vpn 1
ecmp-hash-key layer4
!
Operational Commands
show running-config vpn
ecmp-limit
Configure the maximum number of OMP paths that can be installed in the vEdge router's route table (on
vEdge routers only). When a vEdge router has two or more WAN interfaces and hence two or more TLOCs,
it has one static route for each of the WAN next hops. All routes are installed as ECMP routes only if the next
hop for the route can be resolved.
Command Hierarchy
omp
ecmp-limit number
Command History
Release Modification
15.3.3 Installing ECMP routes only if the next hop can be resolved added.
Operational Commands
show omp routes
eco-friendly-mode
Configure a vEdge Cloud router not to use its CPU minimally or not at all when the router is not processing
any packets (available on vEdge Cloud routers). By default, eco-friendly mode is disabled.
Enabling eco-friendly mode is useful when you are upgrading multiple vEdge Cloud routers simultaneously,
especially routers that have only one virtual CPU (vCPU). Enabling this mode allows the routers to download
the software image files without timing out. (A software image download times out after 60 minutes).
Command Hierarchy
system
[no] eco-friendly-mode
Syntax Description
None
Command History
Release Modification
Example
Operational Commands
show running-config system
eigrp
This topic describes the commands used to configure and monitor Enhanced Interior Gateway Routing Protocol
(EIGRP) routing capabilities and features within a VPN on a Cisco IOS XE router. For full EIGRP configuration
information and examples, refer to the Cisco IOS IP Routing: EIGRP Configuration Guide.
Command Hierarchy
vpn vpn-id
router
eigrp name
address-family ipv4 vrf vrf-name
autonomous-system autonomous-system-number
af-interface intf-name
authentication key-chain keychain-name
authentication mode {hmac-sha-256 | md5}
hello-interval seconds
hold-time seconds
passive-interface
split-horizon
summary-address [prefix | prefix-length]
exit-af-interface
eigrp router-id ipv4-address
network [prefix | mask]
shutdown
topology {base | topology-name tid number}
auto-summary
default-metric {k1 k2 k3 k4 k5}
distribute-list {acl-num | acl-name | gateway address | prefix prefix-name
| route-map routemap-name}
redistribute {bgp | connected | nat-route | omp | ospf | static} [route-map
route-map-name] [metric k1 k2 k3 k4 k5]
table-map route-map-name [filter]
Operational Commands
show eigrp address-family ipv4 vrf vrf-num neighbors [interface-name | peer-v4-address]
show eigrp address-family ipv4 vrf vrf-num accounting
show eigrp address-family ipv4 vrf vrf-num events [reverse] [starting-number] [errmsg]
show eigrp address-family ipv4 vrf vrf-num interfaces [interface-name | detail]
show eigrp address-family ipv4 vrf vrf-num timers
show eigrp address-family ipv4 vrf vrf-num topology [v4-prefix/prefixlength | active |
detail-links | route-type {connected | external | internal | local | redistributed | summary}]
show eigrp address-family ipv4 vrf vrf-num traffic
show eigrp protocols {vrf vrf-num}
show ip route vrf vrf-num eigrp
Example
Show configuration information for an IPv4 EIGRP route on an IOS XE router
ios_xe_router#show ip route vrf 1
m 22.22.22.22 [251/0] via 11.11.11.12, 00:28:00
55.0.0.0/32 is subnetted, 1 subnets
Related Topics
router eigrp
address-family (EIGRP)
af-interface
authentication key-chain (EIGRP)
authentication mode (EIGRP)
hello-interval
hold-time
passive-interface (EIGRP)
split-horizon (EIGRP)
summary-address (EIGRP)
exit-af-interface
eigrp router-id
network (EIGRP)
shutdown (address-family)
auto-summary (EIGRP)
default-metric (EIGRP)
distribute-list prefix-list (IPv6 EIGRP)
redistribute eigrp
table-map
show eigrp address-family accounting
show eigrp address-family interfaces
show eigrp address-family neighbors
show eigrp address-family timers
show eigrp address-family topology
show eigrp address-family traffic
show eigrp protocols
encapsulation
Set the encapsulation for a tunnel interface (on vEdge routers only).
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
encapsulation (gre | ipsec)
preference number
weight number
Syntax Description
preference Preference:
number
Preference for directing traffic to the tunnel. A higher value is preferred. When a vEdge router
has multiple tunnels (that is, multiple TLOCs), only the TLOC or TLOCs with the highest
preference are chosen using inbound path selection. However, traffic is influenced in both
the directions; inbound as well as outbound. If all TLOCs have the same preference and no
policy is applied that affects traffic flow, traffic flows are evenly distributed among the tunnels,
using ECMP. For example, when a preference of 100 on one TLOC and a preference of 50
on the other TLOC is set, the preference chosen is the TLOC with a preference of 100.
Range: 0 through 4294967295 (232 – 1)
Default: 0
weight Weight:
number
Weight to use to balance traffic across multiple tunnels (that is, across multiple TLOCs). A
higher value sends more traffic to the tunnel. You typically set the weight based on the
bandwidth of the TLOC. When a vEdge router has multiple TLOCs, all with the highest
preference, traffic distribution is weighted according to the configured weight value. For
example, if TLOC A has weight 10, and TLOC B has weight 1, and both TLOCs have the
same preference value, then roughly 10 flows are sent out TLOC A for every 1 flow sent out
TLOC B.
Range: 1 through 255
Default: 1
Command History
Release Modification
15.1 preference and weight commands moved from under tunnel-interface to under
encapsulation.
Example
!
!
default-action drop
!
!
lists
vpn-list voice-vpn-list
vpn 1-10
!
site-list voice-site-list
site-id 100-102
!
!
!
apply-policy site-list voice-site-list data-policy direct-voice-to-gre all
Operational Commands
show control connections
show omp tlocs
show omp tlocs detail (see display the configured preference and weight values)
Related Topics
bfd color, on page 142
color, on page 180
exclude
Exclude specific addresses from the pool of addresses for which the interface acts as DHCP server (on vEdge
routers only).
Command Hierarchy
vpn vpn-id
interface genumber/subinterface
dhcp-server
exclude ip-address
Syntax Description
Command History
Release Modification
Example
Operational Commands
show dhcp interface
show dhcp server
exclude-controller-group-list
Configure the vSmart controllers that the tunnel interface is not allowed to connect to (on vEdge routers only).
On a system-wide basis, you configure all the vSmart controllers that the router can connect to using the
system controller-group-list command. Use the exclude-controller-group-list command to restrict the vSmart
controllers that a particular tunnel interface can establish connections with.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
exclude-controller-group-list number
Syntax Description
Command History
Release Modification
Example
Operational Commands
show control affinity config
show control affinity status
show control connections
show control local-properties
Related Topics
controller-group-id, on page 201
controller-group-list, on page 202
max-control-connections, on page 415
max-omp-sessions, on page 422
flow-active-timeout
For a cflowd template, how long to collect a set of flows for a flow on which traffic is actively flowing (on
vSmart controllers only). At the end of this time period, the data set is exported to the collector.
Command Hierarchy
policy
cflowd-template template-name
flow-active-timeout seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear app cflowd flows (on vEdge routers only)
clear app cflowd statistics (on vEdge routers only)
show policy from-vsmart (on vEdge routers only)
show running-config policy (on vSmart controllers only)
show app cflowd flows (on vEdge routers only)
show app cflowd template (on vEdge routers only)
Related Topics
flow-inactive-timeout, on page 266
flow-control
Configure flow control, which is a mechanism for temporarily stopping the transmission of data on the interface
(on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface geslot/port
flow-control control
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config vpn interface
flow-inactive-timeout
For a cflowd template, how long to wait to send a set of sampled flows to a collector for a flow on which no
traffic is flowing (on vSmart controllers only).
Command Hierarchy
policy
cflowd-template template-name
flow-inactive-timeout seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear app cflowd flows (on vEdge routers only)
clear app cflowd statistics (on vEdge routers only)
show policy from-vsmart (on vEdge routers only)
show running-config policy (on vSmart controllers only)
show app cflowd flows (on vEdge routers only)
show app cflowd template (on vEdge routers only)
Related Topics
flow-active-timeout, on page 263
flow-sampling-interval
For a cflowd template, how many packets to wait before creating a new flow (on vSmart controllers only).
Command Hierarchy
policy
cflowd-template template-name
flow-sampling-interval number
Syntax Description
Command History
Release Modification
Example
Start a new flow after 63 packets, when the 64th packet is received:
vSmart# show running-config policy
cflowd-template test-cflowd-template
collector vpn 1 address 172.16.255.14 port 11233
flow-active-timeout 60
flow-inactive-timeout 90
flow-sampling-interval 64
template-refresh 120
!
Operational Commands
clear app cflowd flows (on vEdge routers only)
clear app cflowd statistics (on vEdge routers only)
show policy from-vsmart (on vEdge routers only)
show running-config policy (on vSmart controllers only)
flow-visibility
Enable cflowd visibility so that a vEdge router can perform traffic flow monitoring on traffic coming to the
router from the LAN (on vEdge routers only).
Command Hierarchy
policy
flow-visibility
Syntax Descriptionm
None
Command History
Release Modification
Operational Commands
clear app cflowd flows
clear app cflowd statistics
show app cflowd collector
show app cflowd flow-count
show app cflowd flows
show app cflowd statistics
show app cflowd template
show policy from-vsmart
gps-location
Set the latitude and longitude of a vEdge device.
Command Hierarchy
system
gps-location latitude decimal-degrees
gps-location longitude decimal-degrees
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config system
Related Topics
location, on page 375
location, on page 373
graceful-restart
Control graceful restart for OMP (on vEdge routers and vSmart controllers only). By default, graceful restart
for OMP is enabled on all vEdge routers and vSmart controllers.
Command Hierarchy
omp
graceful-restart
Syntax Description
Command History
Release Modification
Operational Commands
show omp peers detail
Related Topics
timers, on page 612
group
vpn 0 interface tunnel-interface group—Assign an identifier to an individual WAN transport tunnel.
The tunnel group is identified by a number in the range 1 to 4294967295 (default is 0). This identifier prevents
the local router from forming tunnels to any other tunnel group. After a tunnel group is assigned, the local
router can form tunnels to:
• Transports with matching group IDs, and
• Transports with no group ID assigned
The group ID can be used with the color restrict option if needed. If using both options, tunnels can be formed
only with transports that meet both criteria: color and group ID.
Simple Example
Scenario: A network contains three routers (A, B, and C).
Intention: Enable router A to form tunnels only with router B.
Method: To apply this restriction, assign routers A and B the same group ID (example: 100). Assign router
C a different group ID (example: 200).
Result: Router A will form tunnels with router B, but not with router C.
Use Case
Group ID can be used as an alternative to restricting tunnel creation by color. It offers a good solution for
sites with redundant connections to the same MPLS provider, where the head end uses two private colors
(example: private1 and private2) to the same provider, but the remote sites only have one connection, and
therefore only one color.
Instead of using the color restrict option, assign both private1 and private2 the same group ID at all sites. Now
the remote site will form tunnels to both head end routers, but only with the matching group IDs.
Tunnels can be formed to all transports with matching group IDs, and transports with no group ID. Therefore,
if using group IDs, assign a group ID to all transports. For example, use ID=100 for all public transports and
ID=500 for all private transports on the same carrier. Regardless of color, tunnels are only attempted to
matching transport IDs.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
group group-id
Command History
Release Modification
Operational Commands
show control connections
show bfd sessions
show omp tlocs detail
Example
group
Configure SNMPv3 groups.
Command Hierarchy
snmp
group group-name authentication
view string
Syntax Description
Command History
Release Modification
Operational Commands
show running-config snmp
Related Topics
user, on page 651
group
Configure the Diffie-Hellman group number to be used in the IKE key exchange (on vEdge routers only).
IKE key exchange is done in a Diffie-Hellman exchange.
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ike
group number
Syntax Description
Default: 16
Command History
Release Modification
Example
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
Related Topics
mode, on page 428
guard-interval
Specify the guard interval (on vEdge cellular wireless routers only). The guard interval allows reflections
from the previous data transmission to settle before transmitting a new symbol.
Command Hierarchy
wlan radio-band
guard-interval nanoseconds
Syntax Description
Command History
Release Modification
Example
Explicitly configure the short guard interval for a 5-GHz radio band:
vEdge# show running-config wlan
wlan 5GHz
channel 36
guard-interval 400
interface vap0
ssid tb31_pm6_5ghz_vap0
no shutdown
!
!
Operational Commands
clear wlan radius-stats
show interface
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
guest-vlan
Configure a guest VLAN to provide network access to limited services for non-802.1X-enabled clients (on
vEdge routers only). These clients are placed in the guest VLAN only if MAC authentication bypass is not
enabled.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
guest-vlan vlan-id
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
auth-fail-vlan, on page 106
auth-reject-vlan, on page 114
bridge, on page 152
default-vlan, on page 225
mac-authentication-bypass, on page 398
radius, on page 518
hello-interval
Configure the keepalive interval between Hello packets sent on a DTLS or TLS WAN transport connection.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
hello-interval milliseconds
Syntax Description
milliseconds Interval between Hello packets sent on a DTLS or TLS WAN tunnel connection. The combination
of the hello interval and hello tolerance determines how long to wait before declaring a DTLS
or TLS tunnel to be down.
The hello tolerance interval must be at least two times the tunnel hello interval. The default
hello interval is 1000 milliseconds (1 second). (Note that the hello interval is configured in
milliseconds, and the hello tolerance is configured in seconds.)
With the default hello interval of 1 second and the default tolerance of 12 seconds, if no Hello
packet is received within 11 seconds, the tunnel is declared down at 12 seconds. If the hello
interval or the hello tolerance, or both, are different at the two ends of a DTLS or TLS tunnel,
the tunnel chooses the interval and tolerance as follows:
• For a tunnel connection between two controller devices, the tunnel uses the lower hello
interval and the higher tolerance interval for the connection between the two devices.
(Controller devices are vBond controllers, vManage NMSs, and vSmart controllers.) This
choice is made in case one of the controllers has a slower WAN connection. The hello
interval and tolerance times are chosen separately for each pair of controller devices.
• For a tunnel connection between a router and any controller device, the tunnel uses the
hello interval and tolerance times configured on the router. This choice is made to minimize
the amount traffic sent over the tunnel, to allow for situations where the cost of a link is a
function of the amount of traffic traversing the link. The hello interval and tolerance times
are chosen separately for each tunnel between a router and a controller device.
Command History
Release Modification
16.2.1 Add requirement that hello tolerance must be at least 2 times the hello interval.
Example
Decrease the amount of keepalive traffic sent between a router and Cisco SD-WAN controller devices:
vpn 0
interface ge0/0
tunnel-interface
color lte
encapsulation ipsec
hello-interval 600000
hello-tolerance 600
Operational Commands
To display the negotiated hello interval and hello tolerance values:
show control connections detail
show orchestrator connections detail
Related Topics
bfd color, on page 142
hello-tolerance, on page 287
hello-interval
Modify the PIM hello message interval for an interface (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
pim
interface interface-name
hello-interval seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
show multicast replicator
show multicast rpf
show multicast topology
hello-interval
Set the interval at which the router sends OSPF hello packets (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
hello-interval seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
show ospf interface
Related Topics
dead-interval, on page 216
hello-tolerance
Configure how long to wait for a Hello packet on a DTLS or TLS WAN transport connection before declaring
that transport tunnel to be down.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
hello-tolerance seconds
Syntax Description
Command History
Release Modification
16.2.1 Add requirement that hello tolerance must be at least 2 times the hello interval.
Example
Decrease the amount of keepalive traffic sent between a vEdge router and Cisco SD-WAN controller
devices:
vEdge(config)# vpn 0 interface ge0/0 tunnel-interface color lte
vEdge(config-tunnel-interface)# encapsulation ipsec
vEdge(config-tunnel-interface)# hello-interval 600000
vEdge(config-tunnel-interface)# hello-tolerance 600
Operational Commands
show control connections detail
show orchestrator connections detail
Related Topics
bfd color, on page 142
hello-interval, on page 281
hold-time
vpn 0 interface tunnel-interface hold-time—Set the delay before switching back to the primary tunnel
interface from a circuit of last resort (only on vEdge routers with cellular modules). This delay is to ensure
that the primary interface is once again fully operational and is not still flapping.
Command Hierarchy
vpn 0
interface cellularnumber
tunnel-interface
hold-time milliseconds
Syntax Description
Delay Time Delay before switching over from using the last-resort circuit back to using the
milliseconds primary tunnel interface. This delay is to ensure that the primary interface is once
again fully operational and is not still flapping.
Range: 100 through 300000 milliseconds (0.1 through 300 seconds)
Default: 7000 milliseconds (7 seconds)
Command History
Release Modification
Example
Change the hold time for the circuit of last resort to 10 seconds:
vEdge# show running-config vpn 0 interface cellular0
vpn 0
interface cellular0
ip dhcp-client
tunnel-interface
hold-time 10000
encapsulation ipsec
color lte
last-resort-circuit
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
clear-dont-fragment
mtu 1428
profile 1
no shutdown
!
!
Operational Commands
show running-config vpn 0
host
Configure a static mapping between a hostname and an IPv4 or IPv6 address in the hostname cache.
Command Hierarchy
vpn vpn-id
host string ip ip-address
Syntax Description
string Hostname:
Name of the vEdge router within the VPN. The name can be a maximum of 128 characters.
ip-address IP Address:
IPv4 or IPv6 address to associate with the router. You can associate up to 8 total IP addresses
with a hostname.
Command History
Release Modification
Example
Operational Commands
show running-config vpn
host-mode
Set whether an 802.1X interface grants access to a single client or to multiple clients (on vEdge routers only).
By default, only one authenticated client is allowed on an 802.1X port.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
host-mode (multi-auth | multi-host | single-host)
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear dot1x client
host-name
Configure a name for the vEdge device. This name is prepended to the device's prompt in the shell.
Command Hierarchy
system
host-name string
Syntax Description
string Hostname:
Specify the name of the host. The text can be a maximum of 32 characters. If it includes spaces, enclose
the entire string in quotation marks (" ").
Command History
Release Modification
Example
Operational Commands
show running-config system
host-policer-pps
For a policer, configure the rate to deliver packets to the control plane (on vEdge routers only).
Command Hierarchy
system
host-policer-pps rate
Syntax Description
Command History
Release Modification
16.3 Increase range from 20000 pps to 25000 pps, and change default from 5000 pps to
20000 pps.
Example
Operational Commands
show running-config system
Related Topics
control-session-pps, on page 200
icmp-error-pps, on page 297
policer, on page 478
icmp-error-pps
For a policer, configure how many ICMP error messages can be generated or received per second (on vEdge
routers only).
Command Hierarchy
system
icmp-error-pps rate
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config system
Related Topics
control-session-pps, on page 200
host-policer-pps, on page 296
policer, on page 478
icmp-redirect-disable
Disable ICMP redirect messages on an interface (on vEdge routers only). By default, an interface allows
ICMP redirect traffic.
Command Hierarchy
vpn vpn-id interface interface-name
icmp-redirect-disable
Syntax Description
None
Example
Disable ICMP redirect traffic, and drop all ICMP redirect packets:
vEdge(config-vpn-0)# interface ge0/0
vEdge(config-interface-ge0/0)# icmp-redirect-disable
Operational Commands
show interface
Related Topics
allow-service, on page 85
idle-timeout
Set how long the CLI is inactive on a device before the user is logged out. If a user is connected to the device
via an SSH connection, the SSH connection is closed after this time expires.
This command sets the CLI idle timeout on a systemwide basis, and it overrides the idle timeout you set from
the CLI with the idle-timeout CLI operational command.
Command Syntax
system
idle-timeout minutes
Syntax Description
Command History
Release Modification
Example
Operational Commands
show running-config system
Related Topics
idle-timeout, on page 811
igmp
Configure IGMP (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
igmp
interface interface-name
join-group group-address
[no] shutdown
Syntax Description
None
Command History
Release Modification
Example
Operational Commands
clear igmp interface
clear igmp protocol
clear igmp statistics
show igmp groups
ike
Configure the Internet Key (IKE) protocol parameters for an IPsec tunnel (on vEdge routers only). Cisco
SD-WAN supports IKE version 1, as defined in RFC 2409 , The Internet Key Exchange (IKE) and IKE version
2, as defined in RFC 7296, Internet Key Exchange Protocol, Version 2 (IKE v2).
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ike
authentication-type type
local-id id
pre-shared-secret password
remote-id id
cipher-suite suite
group number
mode mode
rekey seconds
version number
Syntax Description
Command History
Release Modification
Example
ciphersuite aes256-sha1
group 16
authentication-type
pre-shared-key
pre-shared-secret viptela
!
!
!
!
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
implicit-acl-logging
Log the headers of all packets that are dropped because they do not match a service configured with an
allow-service command (on vEdge routers only). You can use these logs for security purposes, for example,
to monitor the flows that are being directed to a WAN interface and to determine, in the case of a DDoS attack,
which IP addresses to block.
When you enable implict ACL logging, by default, all dropped packets are logged. It is recommended that
you limit the number of packets logged, by including the log-frequency command in the configuration. The
default is to log every 512th packet.
Command Hierarchy
policy
implicit-acl-logging
Syntax Description
None
Command History
Release Modification
Example
Operational Commands
clear app log flow-all
clear app log flows
show app log flow-count
show app log flows
Related Topics
allow-service, on page 85
log-frequency, on page 376
interface
Configure an interface within a VPN.
Command Hierarchy
vpn vpn-id
interface interface-name
access-list acl-list (on vEdge routers only)
arp (on vEdge routers only)
ip ip-address mac mac-address
arp-timeout seconds (on vEdge routers only)
autonegotiate (on vEdge routers only)
bandwidth-downstream kbps (on vEdge routers and vManage NMSs only)
bandwidth-upstream kpbs (on vEdge routers and vManage NMSs only)
block-non-source-ip (on vEdge routers only)
clear-dont-fragment
dead-peer-detection interval seconds retries number
description text
dhcp-helper ip-address (on vEdge routers only)
dhcp-server (on vEdge routers only)
address-pool prefix/length
exclude ip-address
lease-time seconds
max-leases number
offer-time minutes
options
default-gateway ip-address
dns-servers ip-address
domain-name domain-name
interface-mtu mtu
tftp-servers ip-address
static-lease mac-address ip ip-address host-name hostname
dot1x
accounting-interval seconds
acct-req-attr attribute-number (integer integer | octet octet | string string)
auth-fail-vlan vlan-id
auth-order (mab | radius)
auth-reject-vlan vlan-id
auth-req-attr attribute-number (integer integer | octet octet | string string)
control-direction direction
das
client ip-address
port port-number
require-timestamp
secret-key password
time-window seconds
vpn vpn-id
default-vlan vlan-id
guest-vlan vlan-id
host-mode (multi-auth | multi-host | single-host)
mac-authentication-bypass
allow mac-addresses
server
nas-identifier string
nas-ip-address ip-address
radius-servers tag
reauthentication minutes
timeout
inactivity minutes
wake-on-lan
duplex (full | half)
flow-control (bidirectional | egress | ingress)
icmp-redirect-disable
ike
authentication-type type
local-id id
pre-shared-secret password
remote-id id
cipher-suite suite
group number
mode mode
rekey-interval seconds
version number
(ip address prefix/length | ip dhcp-client [dhcp-distance number])
(ipv6 address prefix/length | ipv6 dhcp-client [dhcp-distance number] [dhcp-rapid-commit])
Syntax Description
Command History
Release Modification
Example
interface ge0/0
ip address 10.1.15.15/24
tunnel-interface
color lte
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
speed 100
no shutdown
shaping-rate 100000
!
!
Operational Commands
show interface
show interface arp-stats
show interface errors
show interface packet-sizes
show interface port-stats
show interface queue
show interface statistics
show tunnel gre-keepalives
show tunnel statistics gre
interface
Associate an interface with a bridging domain (on vEdge routers only).
Command Hierarchy
bridge bridge-id
interface interface-name
description text
native-vlan
[no] shutdown
static-mac-address mac-address
Syntax Description
Command History
Release Modification
Example
BRIDGE INTERFACE VLAN STATUS STATUS TYPE IFINDEX MTU PKTS OCTETS PKTS OCTETS
-------------------------------------------------------------------------------------------
1 ge0/2 1 Up Up vlan 34 1500 0 0 2 168
Operational Commands
show bridge interface
show bridge mac
show bridge table
interface
Configure the interfaces that participate in the IGMP domain, and configure the groups for the interface to
join (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
igmp
interface interface-name
join-group group-address
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear igmp interface
clear igmp protocol
interface
Configure virtual access points (VAPs) for SSIDs in a WLAN (on vEdge cellular wireless routers only).
On a vEdge100wm router, you can configure up to four service set identifiers (SSIDs) on the WLAN radio.
Each SSID is referred to by a virtual access point (VAP) interface. To a client, each VAP interface appears
as a different access point (AP) with its own SSID.
To reduce RF congestion, it is recommended that you do not configure more than two VAP interfaces on the
router.
Command Hierarchy
wlan radio-band
interface vapnumber
data-security security
description text
max-clients number
mgmt-security security
radius-servers tag
[no] shutdown
ssid ssid
wpa-personal-key password
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear wlan radius-stats
show interface
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
interface
Configure the properties of an interface in an OSPF area (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
authentication
authentication-key key
message-digest key
type (message-digest | simple)
cost number
dead-interval seconds
hello-interval seconds
network (broadcast | point-to-point)
passive-interface
priority number
retransmit-interval seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
show ospf interface
interface
Configure the interfaces that participate in the PIM domain, and configure PIM timers for the interfaces (on
vEdge routers only).
Command Hierarchy
vpn vpn-id
router
pim
interface interface-name
hello-interval seconds
join-prune-interval seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
show multicast replicator
show multicast rpf
show multicast topology
show multicast tunnel
interface gre
Configure a GRE tunnel interface interface in the transport VPN (on vEdge routers only).
GRE interfaces are logical interfaces, and you configure them just like any other physical interface. GRE
interfaces come up as soon as they are configured, and they stay up as long as the physical tunnel interface is
up.
Command Hierarchy
vpn 0
interface grenumber
access-list acl-name
block-non-source-ip
clear-dont-fragment
description text
ip address prefix/length
keepalive seconds retries
mtu bytes
policer policer-name
rewrite-rule rule-name
tcp-mss-adjust bytes
tunnel-destination ip-address
(tunnel-source ip-address | tunnel-source-interface interface-name)
Syntax Description
Command History
Release Modification
Example
tunnel-destination 10.1.2.27
no shutdown
!
!
Operational Commands
show interface
show tunnel statistics gre
interface ipsec
Configure an IKE-enabled IPsec tunnel that provides authentication and encryption to ensure secure packet
transport (on vEdge routers only). You can create the IPsec tunnel in the transport VPN (VPN 0) and in any
service VPN (VPN 1 through 65530, except for 512).
Command Hierarchy
vpn vpn-id
interface ipsecnumber
dead-peer-detection interval seconds retries number
description text
ike
authentication-type type
local-id id
pre-shared-secret password
remote-id id
cipher-suite suite
group number
mode mode
rekey seconds
version number
ip address ipv4-prefix/length
ipsec
cipher-suite suite
perfect-forward-secrecy pfs-setting
rekey seconds
replay-window number
mtu bytes
[no] shutdown
tcp-mss-adjust bytes
tunnel-destination (dns-name | ipv4-address)
(tunnel-source ip-address | tunnel-source-interface interface-name)
Syntax Descrption
Command History
Release Modification
Example
Operational Commands
clear ipsec ike sessions
request ipsec ike-rekey
request ipsec ipsec-rekey
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
interface irb
Configure an interface to use for integrated routing and bridging (IRB) (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface irbnumber
access-list acl-list
arp
ip ip-address mac mac-address
arp-timeout seconds
block-non-source-ip
clear-dont-fragment
description text
dhcp-helper ip-address
dhcp-server
address-pool prefix/length
exclude ip-address
lease-time seconds
max-leases number
offer-time minutes
options
default-gateway ip-address
dns-servers ip-address
domain-name domain-name
interface-mtu mtu
tftp-servers ip-address
static-lease mac-address ip ip-address host-name hostname
(ip address prefix/length | ip dhcp-client [dhcp-distance number])
ip address-list prefix/length (on vSmart containers only)
mac-address mac-address
mtu bytes
[no] shutdown
static-ingress-qos number
tcp-mss-adjust bytes
vrrp group-name
priority number
timer seconds
track-omp
Syntax Description
Command History
Release Modification
Example
Operational Commands
show interface
Related Topics
bridge, on page 152
interface ppp
Configure the Point-to-Point Protocol over Ethernet (PPPoE) (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
access-list acl-list
arp
ip ip-address mac mac-address
arp-timeout seconds
autonegotiate
clear-dont-fragment
description text
duplex (full | half)
flow-control (bidirectional | egress | ingress)
(ip address prefix/length | ip dhcp-client [dhcp-distance number])
(ipv6 address ipv6-prefix/length | ipv6 dhcp-client [dhcp-distance number] [
dhcp-rapid-commit]
keepalive seconds retries
mac-address mac-address
mtu bytes
policer policer-name
pppoe-client
ppp-interface name
qos-map name
rewrite-rule name
shaping-rate name
shutdown
speed speed
static-ingress-qos number
tcp-mss-adjust bytes
tloc-extension interface-name
Syntax Description
Command History
Release Modification
Example
Configure PPPoE:
vEdge# show running-config vpn 0
vpn 0
interface ge0/1
pppoe-client ppp-interface ppp10
no shutdown
!
interface ppp10
ppp authentication chap
hostname branch100@corp.bank.myisp.net
password $4$OHHjdmsC6M8zj4BgLEFXKw==
!
tunnel-interface
encapsulation ipsec
color gold
no allow-service all
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service ospf
no allow-service sshd
no allow-service ntp
no allow-service stun
!
mtu 1492
no shutdown
!
!
Operational Commands
show interface
show ppp interface
show pppoe session
ip address
Configure an interface's IPv4 address as a static address (on vEdge routers and vSmart controllers only). To
configure the interface to receive its IP address from a DHCP server, use the ip dhcp-client command.
Command Hierarchy
vpn vpn-id
interface interface-name
(ip address ipv4-prefix/length | ip dhcp-client [dhcp-distance number])
Syntax Description
ipv4-prefix/length IP Address:
IPv4 address of the interface. Specify the prefix in decimal four-part dotted notation. For
loopback and NAT pool interfaces, the length must be /32. The address cannot be the same
as the system IP address that is configured in VPN 0.
Command History
Release Modification
Example
!
!
Operational Commands
show interface
show ipv6 interface
Related Topics
ip dhcp-client, on page 334
ipv6 address, on page 347
ipv6 dhcp-client, on page 349
system-ip, on page 586
ip secondary-address, on page 342
ip address-list
Configure the IP addresses reachable by the interfaces on a container (on vContainer hosts only). You configure
IP addresses in the WAN transport VPN (VPN 0) and in the management interface VPN (VPN 512) only.
Command Hierarchy
vpn vpn-id
interface eth number
ip address-list prefix/length
Syntax Description
Command History
Release Modification
Example
Configure IP address lists, and configure containers for three vSmart controllers on a container host:
vContainer# show running-config container
container
instance first_vsmart
image 16.2.0
no shutdown
memory 512
allow-address 35.197.204.176/32 0 all
allow-address 35.232.118.121/32 0 all
interface eth0
host-ip-address 10.0.1.25
!
!
instance second_vsmart
image 16.2.0
no shutdown
memory 512
allow-address 35.197.204.176/32 0 all
allow-address 35.232.118.121/32 0 all
interface eth0
host-ip-address 10.0.1.26
!
!
instance vm10
image 16.2.0
no shutdown
memory 512
allow-address 35.197.204.176/32 0 all
allow-address 35.232.118.121/32 0 all
interface eth0
host-ip-address 10.0.1.30
!
interface eth1
host-ip-address 10.0.12.20
!
interface eth2
host-ip-address 10.2.2.20
!
!
!
vpn 0
interface eth1
ip address-list 10.0.1.25/24
ip address-list 10.0.1.26/24
ip address-list 10.0.1.27/24
ip address-list 10.0.1.30/24
ip static-route 0.0.0.0/0 10.0.1.1
no shutdown
!
interface eth2
ip address-list 10.2.2.20/24
ip address-list 10.2.2.25/24
ip address-list 10.2.2.26/24
ip address-list 10.2.2.27/24
ip static-route 0.0.0.0/0 10.2.2.1
no shutdown
!
interface eth3
ip address-list 10.0.12.20/24
ip static-route 0.0.0.0/0 10.0.12.13
no shutdown
!
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
!
Operational Commands
request container image install
request container image remove
show container images
show container instances
Related Topics
container, on page 191
ip dhcp-client
Configure an interface in the WAN transport VPN (VPN 0) to receive its IPv4 address from a DHCPv4 server.
To configure the interface's IPv4 address as a static address, use the ip address command.
Command Hierarchy
vpn vpn-id
interface interface-name
(ip address ip-address/length | ip dhcp-client [dhcp-distance number])
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear dhcp server-bindings
clear dhcp state
ip gre-route
Configure a GRE-specific static route in a service VPN (a VPN other than VPN 0 or VPN 512) to direct traffic
from the service VPN to a GRE tunnel (on vEdge routers only).
Command Hierarchy
vpn vpn-id
ip gre-route prefix/length vpn 0 interface gre number [gre number2]
Syntax Description
Command History
Release Modification
Example
Configure a GRE-specific static route so that traffic from the 58.0.1.0/24 network can reach the GRE
interfaces in VPN 0:
vEdge# show running-config
vpn 0
interface gre1
ip address 10.0.111.11/24
keepalive 60 10
tunnel-source 10.0.5.11
tunnel-destination 172.168.1.1
no shutdown
!
interface gre2
ip address 10.0.122.11/24
tunnel-source 10.0.5.11
tunnel-destination 172.168.122.11
no shutdown
!
!
vpn 1
ip gre-route 58.0.1.0/24 vpn 0 interface gre1 gre2
Operational Commands
show interface
show tunnel gre-keepalives
show tunnel statistics
Related Topics
ip route, on page 340
keepalive, on page 357
nat, on page 440
ip ipsec-route
Configure an IPsec-specific static route in a service VPN (a VPN other than VPN 0 or VPN 512) to direct
traffic from the service VPN to an IPsec tunnel (on vEdge routers only).
Command Hierarchy
vpn vpn-id
ip ipsec-route prefix/length vpn 0 interface ipsecnumber [ipsecnumber2]
Syntax Description
Command History
Release Modification
Example
Configure an IPsec-specific static route in VPN 100 to direct traffic from that VPN to an IPsec tunnel
in VPN 0. In VPN 0, the primary IPsec tunnel is the interface ipsec1 and the secondary IPsec tunnel
is ipsec2.
vEdge# show running-config vpn 0
vpn 0
interface ipsec1
ip address 10.0.111.1/30
tunnel-source-interface ge0/0
tunnel-destination 172.168.1.1
ike
version 2
rekey 14400
cipher-suite aes256-cbc-sha1
group 14
authentication-type
pre-shared-key
pre-shared-secret R9VuFaRK7yxTUDtTrcK+
local-id admin@my-company.com
!
!
!
ipsec
rekey 3600
replay-window 512
cipher-suite null-sha1
perfect-forward-secrecy group-16
!
mtu 1400
tcp-mss-adjust 1300
no shutdown
!
interface ipsec2
ip address 10.0.111.5/30
tunnel-source-interface ge0/0
tunnel-destination 192.168.1.1
ike
version 2
rekey 14400
cipher-suite aes256-cbc-sha1
group 14
authentication-type
pre-shared-key
pre-shared-secret R9VuFaRK7yxTUDtTrcK+
local-id admin@my-company.com
!
!
!
ipsec
rekey 3600
replay-window 512
cipher-suite null-sha1
perfect-forward-secrecy group-16
!
mtu 1400
tcp-mss-adjust 1300
no shutdown
!
!
vEdge# show running-config vpn 100
vpn 100
ip ipsec-route 0.0.0.0/0 vpn 0 interface ipsec1 ipsec2
!
Operational Commands
show interface
show tunnel statistics
Related Topics
ip gre-route, on page 336
ip route, on page 340
keepalive, on page 357
nat, on page 440
ip route
Configure an IPv4 static route in a VPN.
Command Hierarchy
vpn vpn-id
ip route prefix/length next-hop [administrative-distance]
Syntax Description
Command History
Release Modification
Example
Configure a static route to the prefix 10.0.0.1/24 via the next hop at 10.10.0.1:
vpn 0
ip route 10.0.0.1/24 10.10.0.1
Operational Commands
show ip routes (for IPv4 routes)
show ipv6 routes
Related Topics
ip gre-route, on page 336
ipv6 route, on page 351
nat, on page 440
ip secondary-address
Configure secondary IPv4 addresses for a service-side interface (on vEdge routers only).
You can configure secondary addresses only on interfaces whose primary address is configured with the ip
address command. You cannot configure secondary addresses on interfaces that learn their primary address
from DHCP (configured with the ip dhcp-client command).
Command Hierarchy
vpn vpn-id
interface interface-name
ip secondary-address ipv4-address
Syntax Description
ipv4-address IP Address:
IPv4 address of the interface, in decimal four-part dotted notation. You can configure secondary
IPv4 addresses for ge and irb interfaces in all VPNs except for VPN 0 and VPN 512. The
address cannot be the same as the system IP address that is configured in VPN 0. You can
configure up to four secondary IPv4 addresses per interface.
Command History
Release Modification
Example
Operational Commands
ping
show interface
show ipv6 interface
Related Topics
ip address, on page 330
ip dhcp-client, on page 334
ipv6 address, on page 347
ipv6 dhcp-client, on page 349
system-ip, on page 586
ipsec
Configure the IPsec tunnel to use for IKE key exchange (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface ipsec number
ipsec
cipher-suite suite
perfect-forward-secrecy pfs-setting
rekey seconds
replay-window number
Syntax Desription
None
Command History
Release Modification
Example
View the default configuration for the IPsec tunnel used for IKE key exchange:
vEdge# show running-config vpn 1 interface ipsec1 ipsec
vpn 1
interface ipsec1
ipsec
rekey 14400
replay-window 512
cipher-suite aes256-cbc-sha1
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
Related Topics
ike, on page 302
ipsec
Configure parameters for IPsec tunnel connections (on vEdge routers only).
Command Hierarchy
security
ipsec
authentication-type type
rekey seconds
replay-window number
Syntax Description
None
Command History
Release Modification
Example
Operational Commands
show security-info
Related Topics
request security ipsec-rekey, on page 881
iptables-enable
Enable the collection of iptable packet-filtering chains for all DTLS peers (on vSmart controllers and vManage
NMSs only).
In Release 15.4, it is recommended that you do not enable iptables.
Command Hierarchy
system
iptables-enable
Syntax Description
None
Command History
Release Modification
Example
Enable the use of iptables:
Operational Commands
show system netfilter
ipv6 address
Configure a static IPv6 address on an interface. To configure the interface to receive its IP address from a
DHCP server, use the ipv6 dhcp-client command.
You can configure IPv6 only on WAN transport interfaces, that is, only on interfaces in VPN 0.
Command Hierarchy
vpn vpn-id
interface interface-name
(ipv6 address ipv6-prefix/length | ipv6 dhcp-client [dhcp-distance number]
[dhcp-rapid-commit])
Syntax Description
None
Command History
Release Modification
Example
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
no shutdown
!
!
Operational Commands
show interface
show ipv6 interface
Related Topics
ip address, on page 330
ipv6 address, on page 347
ipv6 dhcp-client, on page 349
system-ip, on page 586
ipv6 dhcp-client
Configure an interface in the WAN transport VPN (VPN 0) to receive its IPv6 address from a DHCPv6 server.
To configure the interface's IPv6 address as a static address, use the ipv6 address command.
You can configure IPv6 only on WAN transport interfaces, that is, only on interfaces in VPN 0.
Command Hierarchy
vpn vpn-id
interface interface-name
(ipv6 address ipv6-prefix/length | ipv6 dhcp-client [dhcp-distance number]
[dhcp-rapid-commit])
Syntax Description
Command History
Release Modification
Example
Configure an IPv6 WAN transport interface to use a dynamic IPv6 address, and enable the rapid
commit option for DHCPv6:
vEdge(config)# vpn 0 interface ge0/3
vEdge(config-interface)# ip6 dhcp-client
vEdge(config-interface)# no shutdown
vEdge(config-interface)# tunnel-interface
Operational Commands
clear dhcp state
show ipv6 dhcp interface
show ipv6 interface
Related Topics
ip address, on page 330
ipv6 address, on page 347
ipv6 route
Configure an IPv6 static route in a VPN (on vEdge routers only).
In Release 16.3, you can configure IPv6 only in VPN 0.
Command Hierarchy
vpn 0
ipv6 route prefix/length next-hop [administrative-distance]
Syntax Description
Command History
Release Modification
Example
Configure a static route to the prefix with a next hop of the null interface:
vpn 0
ipv6 route 2001:1111:2222:3333::/64 null0
Operational Commands
show ip routes (for IPv4 routes)
show ipv6 routes
Related Topics
ip route, on page 340
join-group
Configure an interface on the vEdge router to initiate a request to join a multicast group (on vEdge routers
only). Configuring this command does not cause the vEdge router to behave like a host.
Command Hierarchy
vpn vpn-id
router
igmp
interface interface-name
join-group group-address
Syntax Description
Command History
Release Modification
Example
Operational Commands
clear igmp interface
clear igmp protocol
join-prune-interval
Modify the PIM join/prune message interval for an interface (on vEdge routers only). The join/prune interval
sets when PIM multicast traffic can join or be removed from a rendezvous point tree (RPT) or shortest-path
tree (SPT).
Command Hierarchy
vpn vpn-id
router
pim
interface interface-name
join-prune-interval seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
show multicast replicator
keepalive
Configure how often a GRE interface sends keepalive packets (on vEdge routers only). The sending of
keepalive packets is enabled by default.
Because GRE tunnels are stateless, the sending of keepalive packets is the only way to determine whether the
remote end of the tunnel is up. The keepalive packets are looped back to the sender. Receipt of these packets
by the sender indicates that the remote end of the GRE tunnel is up.
In Releases 17.1 and later, GRE interfaces behind a NAT device send keepalive messages. If you configure
an IP address for the GRE interface, it is that address that sends the keepalive messages.
If the vEdge router sits behind a NAT and you have configured GRE encapsulation, you must disable keepalives.
To do this, include a keepalive 0 0 command in the configuration. You cannot disable keepalives by issuing
a no keepalive command. This command returns the keepalive to its default settings.
Command Hierarchy
vpn vpn-id
interface grenumber
keepalive seconds retries
Syntax Description
Command History
Release Modification
Release Modification
Example
Operational Commands
show interface
show tunnel gre-keepalive
show tunnel statistics
Related Topics
tunnel-destination, on page 633
tunnel-source, on page 640
last-resort-circuit
Use the tunnel interface as the circuit of last resort (on vEdge routers). By default, this feature is disabled,
and the tunnel interface is not considered to be the circuit of last resort.
There is a delay of 7 seconds before switching back to the primary tunnel interface from a circuit of last resort.
This delay is to ensure that the primary interface is once again fully operational and is not still flapping.
When you configure a tunnel interface to be a last-resort circuit, the cellular modem becomes dormant and
no traffic is sent over the circuit. However, the cellular modem is kept in online mode so that the modem radio
can be monitored at all times and to allow for faster switchover in the case the tunnel interface needs to be
used as the last resort.
To minimize the amount of extraneous data plane traffic on a cellular interface that is a circuit of last resort,
increase the BFD Hello packet interval and disable PMTU discover.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
[no] last-resort-circuit
Syntax Description
None
Command History
Release Modification
Example
Configure the cellular0 interface to be the circuit of last resort for the vEdge router:
vEdge# show running-config vpn 0 interface cellular0
vpn 0
interface cellular0
ip dhcp-client
tunnel-interface
encapsulation ipsec
color lte
last-resort-circuit
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
clear-dont-fragment
mtu 1428
profile 1
no shutdown
!
!
vEdge# show running-config bfd
bfd color lte
hello-interval 300000
no pmtu-discovery
!
Operational Commands
show control affinity config
show control local-properties
show interface
Related Topics
bfd color, on page 142
lease-time
Configure the time period for which a DHCP-assigned IP address is valid (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface geslot/port
dhcp-server
lease-time seconds
Syntax Description
Command History
Release Modification
Example
Operational Commands
show dhcp interfaces
lists
Create groupings of similar objects, such as IP prefixes, sites, TLOC addresses, and AS paths, for use when
configuring policy match conditions or action operations and for when applying a policy (on vSmart controllers
and vEdge routers only).
In the configuration, you can create multiple iterations of each type of list. For example, it is common to create
multiple site lists and multiple VPN lists so that you can apply data policy to different sites and different
customer VPNs across the network.
When you create multiple iterations of a type of list (for example, when you create multiple VPN lists), you
can include the same values or overlapping values in more than one of these list. You can do this either on
purpose, to meet the design needs of your network, or you can do this accidentally, which might occur when
you use ranges to specify values. Here are two examples of lists that are configured with ranges and that
contain overlapping values:
• vpn-list list-1 vpn 1-10
vpn-list list-2 vpn 6-8
• site-list list-1 site 1-10
site-list list-2 site 5-15
For all lists except for site lists, when you configure policies that contain lists with overlapping values, or
when you apply the policies, you must ensure that the lists do not contain overlapping values. To do this, you
must manually audit your configurations. Cisco SD-WAN performs no validation on the contents of lists, on
the policies themselves, or on how the policies are applied to ensure that there are no overlapping values. If
you configure or apply policies that contain lists with overlapping values to the same site, one policy is applied
and the others are ignored. Which policy is applied is a function of the internal behavior of Cisco SD-WAN
when it processes the configuration. This decision is not under user control, and so the outcome is not
predictable.
For site lists, for each type of policy that is applied to site lists—app-route-policy, cflowd, control-policy,
data-policy—you must ensure for that policy type that the lists do not contain any overlapping sites. Each
site must be unique and used only once. However, across these four different policy types, the sites in the site
lists can overlap. For example, if you apply a data-policy to sites 100-200, you can apply a control-policy
to sites 120-130 or to sites 190-210, and you can apply an app-route-policy to sites 100-125. However, you
cannot apply a second data-policy to sites 120-130. For a configuration example that illustrates this behavior,
see apply-policy .
Command Hierarchy
For Application-Aware Routing Policy:
policy
lists
app-list list-name
(app application-name | app-family application-family)
data-prefix-list list-name
ip-prefix prefix/length
site-list list-name
site-id site-id
vpn-list list-name
vpn vpn-id
data-prefix-list IP Prefix:
list-name
List of one or more IP prefixes. You can specify both unicast and multicast prefixes.
ip-prefix prefix/length To configure multiple prefixes in a single list, include multiple ip-prefix options,
specifying one prefix in each option.
Command History
Release Modification
16.3 Add support for overlapping sites in different site lists, and add support for IP multicast
addresses.
Example
vpn 42
vpn 45
Operational Commands
show running-config policy lists
Related Topics
action, on page 53
apply-policy, on page 95
match, on page 403
policy, on page 482
sla-class, on page 567
local-interface-list
Configure Direct Internet Access (DIA) interfaces for Cloud OnRamp for SaaS (formerly called CloudExpress
service) (on vEdge routers only).
Note To ensure that Cloud OnRamp for SaaS is set up properly, configure it in vManage NMS, not using the CLI.
Command Hierarchy
vpn 0
cloudexpress
local-interface-list interfaces-names
Syntax Description
interfaces Interfaces:
List of interfaces names.
Default: If no local interface is configured, Cloud OnRamp for SaaS uses interfaces configured
with NAT.
Command History
Release Modification
Example
Configure Cloud OnRamp for SaaS to run on interfaces ge0/0 and ge0/2:
vEdge# show running-config vpn 100 cloudexpress
vpn 100
cloudexpress
local-interface-list ge0/0 ge0/2
!
!
Operational Commands
clear cloudexpress computations
show cloudexpress applications
show cloudexpress gateway-exits
show cloudexpress local-exits
show omp cloudexpress
show running-config vpn cloudexpress
location
system location—Configure a text string that describes the location of a Cisco vEdge device.
Command Hierarchy
system
location "string"
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show running-config system
Related Topics
gps-location, on page 271
location, on page 375
location
Configure the location of a Cisco vEdge device.
Command Hierarchy
snmp
location string
Syntax Description
Command History
Release Modification
Examples
Example
vEdge(config)# snmp location "Machine room 1, Aisle 3, Rack 7"
Operational Commands
show running-config snmp
Related Topics
gps-location, on page 271
location, on page 373
log-frequency
Configure how often packet flows are logged (on vEdge routers only). Packet flows are those that match an
access list (ACL), a cflowd flow, or an application-aware routing (DPI) flow.
Command Hierarchy
policy
log-frequency number
Syntax Description
Syntax Description
Command History
Release Modification
Examples
Configure packet flow logging to log every 16 packets. Note that the configured logging frequency
value of 20 is rounded down to 16, which is the nearest power of 2. With this configuration, every
sixteenth packet is logged.
vEdge# show running-config policy log-frequency
policy
log-frequency 20
!
Operational Commands
clear app log flow-all
clear app log flows
show app log flow-count
show app log flows
Related Topics
implicit-acl-logging, on page 304
log-translations
Log the creation and deletion of NAT flows (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface natpoolnumber
nat
log-translations
Command History
Release Modification
Examples
Example 1
Configure a vEdge router to perform dynamic NAT:
vEdge# show running-config vpn 1
interface natpool1
ip address 10.15.1.4/30
nat
no shutdown
!
Example 2
Configure a vEdge router to perform static NAT, translating a service-side and a remote IP address:
vEdge# show running-config vpn 1
interface natpool1
ip address 10.15.1.4/30
nat
static source-ip 10.1.17.3 translate-ip 10.15.1.4 inside
static source-ip 10.20.25.18 translate-ip 10.25.1.1 outside
direction inside
no overload
log-translations
!
no shutdown
!
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
Related Topics
encapsulation, on page 256
static, on page 576
logging disk
Log event notification system log (syslog) messages to a file on the local device's hard disk. Logging to the
disk, at a priority level of "information," is enabled by default. Log files are placed in the directory /var/log
on the local device. They are readable by the "admin" user.
Command Hierarchy
system
logging
disk
enable
file
rotate number
size megabytes
priority priority
Syntax Description
enable
For Releases 15.3 and earlier, syslog messages are stored in the following files:
• auth.log—Login, logout, and superuser access events, and usage of authorization
systems.
• confd/audit.log—Captured by the audit daemon. These messages generally pertain
to systemwide operations, users, files, and directories.
• confd/confd.log—Configuration messages.
• confd/devel.log—Development message.
• confd/netconf.log—Netconf messages.
• confd/snmp.log—SNMP messages.
• daemon.log—System and application process messages.
• devel.log—Developer messages.
• kern.log—Kernel messages.
SD-WAN software does not use the following standard LINUX files, which are present
in /var/log, for logging: cron.log, debug, lpr.log, mail.log, and syslog. The files in the
directory xml/ are not used for message logging.
Command History
Release Modification
16.3 Debug output is placed in the /var/log/tmplog/vdebug file, not the /var/log/vdebug file.
Usage Guidelines show logging—Display the system logging parameters that are in effect on the vEdge router:
file list /var/log—List the files in the /var/log directory.
file show /var/log/vsyslog—Display the contents of the vsyslog syslog file. Here is sample output for Releases
15.3 and earlier:
vSmart# file show /var/log/vsyslog
Aug 5 17:00:04 vsmart vdaemon[937]: viptela_system_personality created/modified
Aug 5 17:00:04 vsmart vdaemon[937]: viptela_config_security:549 Rekey generation interval
3600 (Seconds)
Aug 5 17:00:04 vsmart SYSMGR[948]: %viptela-SYSMGR-6-200007: Confd Phase 2 UP
Aug 5 17:00:04 vsmart vdaemon[937]: Message Connection UP
For Releases 15.3 and earlier, each syslog message generated by SD-WAN has this format:
% date - source - module - level - MessageID: text-of-syslog-message
In the third line of the /var/log/vsyslog output shown above, the message source is a vSmart controller, the
module is SYSMGR (the system manager), the level is 6 (informational), the message ID is 200007, and the
message itself is "Confd Phase 2 UP".
In Releases 15.4 and later, each syslog message has the following format:
facility.source& date - source - module - MessageID: text-of-syslog-message
Here is an example of a syslog message (in the file, this message would be on a single line):
local7.info: Dec 29 16:50:56 vedge DHCP_CLIENT[324]:
%Viptela-vedge-DHCP_CLIENT-6-INFO-1300010:
Renewed address 10.0.99.14/24 for interface mgmt0
Examples
Change the syslog file size to 3 MB, save only three syslog files, and set the syslog priority to log
only alert, and emergency conditions:
Related Topics
logging server, on page 389
show crash, on page 1000
show logging, on page 1107
logging host
To log system messages to a remote host, use the logging host command in global configuration mode. To
remove a specified logging host from the configuration, use the no form of this command.
logging host {hostname ipv4-address | ipv4-address | ipv6 ipv6-address} [vrf vrf-name] [transport [ tcp
[port port-no] | tls [port port-no | profile profile-name ] | udp [port port-no] ]}
no logging host {hostname ipv4-address | ipv4-address | ipv6 ipv6-address}
hostname Name of the IPv4 or IPv6 host that receives the syslog
messages.
ipv6 Indicates that you use an IPv6 address for a host that
receives the syslog messages.
Command Default You cannot send system logging messages to any remote host.
Command History
Release Modification
Cisco IOS XE Release 17.2 This command was introduced on the Cisco IOS XE
SD-WAN device.
Usage Guidelines Standard system logging is enabled by default. If logging is disabled on your system (using the no logging
on command), ensure that you enter the logging on command to reenable logging before you can use the
logging host command.
The logging host command identifies a remote host (usually a device serving as a syslog server) to receive
logging messages. By issuing this command more than once, you can build a list of hosts that receive logging
messages.
To specify the severity level for logging to all hosts or enforce the logging format as per RFC5424, use the
logging trap command.
When the no logging host command is issued with or without the optional keywords, all logging to the
specified host is disabled.
Examples
In the following example, logging trap command with logging format based on RFC5424 is logged to a host
at 10.104.52.44:
Router(config)# logging trap syslog-format rfc5424
Router(config)# logging host 10.104.52.44 transport tls
In the following example, you can log messages to a host with an IP address of 172.16.150.63 connected
through a vpn1 VRF:
Router(config)# logging host 172.16.150.63 vrf vpn1
show crypto pki trustpoints status Displays the truspoint that is configured in the Cisco
IOS XE SD-WAN device.
logging tls-profile profile-name [ciphersuite Logs system messages to syslog server through TLS
ciphersuite] profile.
logging tls-profile
To configure the TLS profile of a Cisco IOS XE SD-WAN device, use the logging tls-profile command in
global configuration mode. To remove a specified logging tls profile from the configuration, use the no form
of this command.
logging tls-profile profile-name [ciphersuite ciphersuite]
no logging tls-profile
tls-profile profile-name Indicates that you use TLS profile for Cisco IOS XE
SD-WAN device. String. Maximum: 32 characters.
ciphersuite ciphersuite (Optional) Specifies the cipher suites that you can use
for a connection with syslog server.
Command History
Release Modification
Cisco IOS XE Release 17.2 This command was introduced on the Cisco IOS XE
SD-WAN device.
Example
In the following example, you can configure the TLS profile for profile1:
through a vpn1 VRF
Router(config)# logging tls-profileprofile1
logging server
Log event notification syslog messages to a remote host. By default, syslog messages are also always logged
to the local hard disk. To disable local logging, use the no system logging disk enable command.
Command Hierarchy
system
logging
server (dns-name | hostname | ip-address)
priority priority
source-interface interface-name
vpn vpn-id
Syntax Description
Command History
Release Modification
Usage Guidelines show logging —Display the system logging parameters that are in effect.
In Releases 15.3 and earlier, each syslog message generated by Cisco SD-WAN has this format:
%Viptela - module - level - MessageID: text-of-syslog-message
In Releases 15.4 and later, each syslog message has the following format:
Examples
Configure two syslog servers, one that receives all emergency (severity 0) messages and a second
that receives all messages at severity 4 (warn) and lower:
vEdge(config-logging)# show full-configuration
system
logging
disk
enable
!
server log.cisco.com
vpn 1
priority emergency
exit
server log2.cisco.com
vpn 1
priority warn
exit
!
!
Related Topics
logging disk, on page 380
logs
Configure the logging of AAA and Netconf system logging (syslog) messages. By default, these messages
are logged and placed in the auth.info and messages log files.
Each time a vManage NMS logs in to a vEdge router to retrieve statistics and status information and to push
files to the router, the router generates AAA and Netconf log messages. These message can fill the log files.
You might want to disable the logging of these messages to reduce the number of messages in these two log
files.
Command Hierarchy
system
aaa
logs
[no] audit-disable
[no] netconf-disable
Syntax Description
Command History
Release Modification
Example
Disable the logging of AAA and Netconf events:
vEdge# show running-config system aaa
system
aaa
auth-order local radius
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
Operational Commands
show users
low-bandwidth-link
Characterize the tunnel interface as a low-bandwidth link. This configuration command is relevant only for
a spoke router in a hub-and-spoke deployment scenario, where the spoke has a low-bandwidth link, such as
an LTE link. You include this configuration command only on the spoke router, to minimize traffic sent
between the hub and the spoke.
Setting a tunnel as a low-bandwidth link minimizes how often control traffic is sent over the link while ensuring
that critical information, such as routing updates, are propagated in a timely fashion among routers. Also, on
such links, application-aware routing data is collected only when user data is transmitted from the LAN to
the WAN, to reduce BFD traffic on the link.
For routers with LTE modems, low-bandwidth-link is enabled by default. For other routers, this option is
disabled by default.
Note To prevent control-connection flapping when an interface is configured as a low-bandwidth link, use a
hello-interval of greater than 100 milliseconds. For more information on low-bandwidth links, refer to the
low-bandwidth-link command.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
[no] low-bandwidth-link
Command History
Release Modification
Examples
low-bandwidth-interface
!
no shutdown
!
Operational Commands
show control local-properties | display xml | include low
mac-accounting
Generate accounting information for IP traffic (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface genumber/subinterface
mac-accounting (egress | ingress)
Syntax Description
Command History
Release Modification
Examples
Generate accounting information about the IP traffic on this interface based on the source MAC
addresses of the packets:
vpn 0
interface ge0/0
mac-accounting ingress
Operational Commands
show running-config vpn interface
mac-address
Configure a MAC address to associate with the interface in the VPN.
Command Hierarchy
vpn vpn-id
interface interface-name
mac-address mac-address
Syntax Description
mac-address MAC address. Separate the bytes in the address with colons. Note that you cannot change
the default MAC address (00:00:00:00:00:00) of a loopback interface.
Command History
Release Modification
Example
Configure a MAC address on an interface:
vEdge(config-interface-ge0/4)# mac-address b8:e8:56:38:5e:89
Operational Commands
show interface vpn
mac-authentication-bypass
Enable authentication for non-802.1X–compliant clients (on vEdge routers only). These clients are authenticated
based on their MAC address.
A non-802.1X–compliant client is one that does not respond to EAP identity requests from the vEdge router.
After the 802.1X interface detects a client, it waits to receive an Ethernet packet from the client. Then the
router sends a RADIUS access/request frame to the authentication server that includes a username and password
based on the MAC address. If authorization succeeds, the router grants the client access to the WAN or WLAN.
If authorization fails, the router assigns the interface to the guest VLAN if one is configured.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
mac-authentication-bypass
allow mac-addresses
server
Syntax Description
Command History
Release Modification
Examples
vpn 0
interface ge0/0
dot1x
mac-authentication-bypass
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
radius, on page 518
match
Define the properties that must be matched so that an IPv6 policy action can take effect (on vEdge routers
only).
Command Hierarchy
For Localized Data Policy for IPv6
Configure on vEdge routers only.
policy ipv6
access-list acl-name
sequence number
match
class class-name
destination-port number
next-header protocol
packet-length number
plp (high | low)
source-port number
tcp flag
traffic-class value
Syntax Description
For Localized Data Policy for IPv6
Command History
Release Modification
Examples
Configure an IPv6 ACL that changes the traffic class on TCP port 80 data traffic, and apply the ACL
to an interface in VPN 0:
vEdge# show running-config policy ipv6 access-list
policy
ipv6 access-list traffic-class-48-to-46
sequence 10
match
destination-port 80
traffic-class 48
!
action accept
count port_80
log
set
traffic-class 46
!
!
!
default-action accept
!
!
vEdge# show running-config vpn 0 interface ge0/7 ipv6
vpn 0
interface ge0/7
ipv6 access-list traffic-class-48-to-46 in
!
!
Operational Commands
show running-config policy
Related Topics
match, on page 403
match
Define the properties that must be matched so that an IPv4 policy action can take effect (on vEdge routers
and vSmart controllers only).
policy app-route-policy vpn-list sequence match
policy access-list sequence match
policy control-policy sequence match
policy data-policy vpn-list sequence match
policy route-policy sequence match
policy zone-based-policy sequence match
Command Hierarchy
For Application-Aware Routing Policy
Configure on vSmart controllers only.
policy
app-route-policy policy-name
vpn-list list-name
sequence number
match
app-list list-name
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
dns-app-list list-name
dns (request | response)
dscp number
plp (high | low)
protocol number
source-data-prefix-list list-name
source-ip prefix/length
source-port number
originator ip-address
preference number
prefix-list list-name
site-id site-id
site-list list-name
tloc address color color [encap encapsulation]
tloc-list list-name
vpn vpn-id
vpn-list list-name
tloc
carrier carrier-name
color color
color-list list-name
domain-id domain-id
group-id group-id
omp-tag number
originator ip-address
preference number
site-id site-id
site-list list-name
tloc address color color [encap encapsulation]
tloc-list list-name
next-hop list-name
omp-tag number
origin (egp | igp | incomplete)
ospf-tag number
peer address
Syntax Description
For Application-Aware Routing Policy
tloc address color color [encap TLOC Identified by IP Address and Color:
encpasulation]
Match an individual TLOC identified by its IP address and color, and
tloc-list list-name optionally, by its encapsulation.
color can be 3g, biz-internet, blue, bronze, custom1, custom2, custom3,
default, gold, green lte, metro-ethernet, mpls, private1 through private6,
public-internet, red, and silver.
Default: Encapsulation is ipsec. It can also be gre.
Command History
Release Modification
15.4 Added omp-tag match condition for localized control policy, and rename tag to omp-tag.
16.1 Added packet-length match condition for centralization and localized data policy.
Release Modification
16.3 Added plp match condition for application-aware routing policy, centralized data
policy, and localized data policy.
17.2 Added dns and dns-app-list match conditions for application-aware routing policy and
centralized data policy.
Examples
Create an access list match condition that matches a destination IP address in a data packet:
vEdge(config-match)# show config
policy
access-list test-access-list
sequence 10
match
destination-ip 172.16.0.0/16
!
!
!
!
!
!
lists
vpn-list my-vpn-list
vpn 1
!
!
!
Create a route policy match condition that matches the prefix from which a route was learned:
vEdge(config-match)# show config
policy
lists
prefix-list my-prefix-list
ip-prefix 10.0.100.0/24
ip-prefix 55.0.1.0/24
ip-prefix 57.0.1.0/24
!
!
route-policy my-route-policy
sequence 10
match
address my-prefix-list
!
!
!
!
Operational Commands
show running-config policy
Related Topics
action, on page 53
apply-policy, on page 95
lists, on page 363
match, on page 400
policy, on page 482
max-clients
Configure the maximum number of clients allowed to connect to the WLAN (on vEdge routers only).
Command Hierarchy
wlan radio-band
interface vapnumber
max-clients number
Syntax Description
Command History
Release Modification
Examples
Allow 30 clients to connect to the corporate network and 10 to the guest network :
vEdge# show running-config wlan
wlan 5GHz
country "United States"
interface vap0
ssid CorporateNetwork
data-security wpa/wpa2-enterprise
radius-server radius_server1
max-clients 30
no shutdown
!
interface vap1
ssid GuestNetwork
data-security wpa/wpa2-personal
wpa-personal-key GuestPassword
max-clients 10
no shutdown
!
!
Operational Commands
clear wlan radius-stats
show interface
max-control-connections
Configure the maximum number of vSmart controllers that the vEdge router is allowed to connect to (on
vEdge routers only). When max-control-connections is configured (without affinity), vEdge routers establish
control connection with vSmarts controllers having higher System-IP.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
max-control-connections number
Syntax Description
Command History
Release Modification
16.1 Maximum number of controllers changed from 8 to 100, and default value changed
from 2 to maximum number of configured OMP sessions.
Examples
Operational Commands
show control affinity config
max-controllers
Configure the maximum number of vSmart controllers that the vEdge router is allowed to connect to (on
vEdge routers only).
Starting in Release 15.4, this command is deprecated. Use the max-control-connections command instead.
Command Hierarchy
system
max-controllers number
Syntax Description
Examples
Operational Commands
show control connections
max-leases
Configure the maximum number of dynamic IP addresses that the DHCP server can offer (on vEdge routers
only).
Command Hierarchy
vpn vpn-id
interface geslot/port
dhcp-server
max-leases number
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show dhcp interfaces
show dhcp server
max-macs
Set the maximum number of MAC addresses that a bridging domain can learn (on vEdge routers only).
Command Hierarchy
bridge bridge-id
max-macs number
Syntax Description
Command History
Release Modification
Examples
Set the maximum number of MAC addresses that the bridging domain can learn to 512:
vEdge(config)# bridge 1
vEdge(config-bridge-1)# max-macs 512
Operational Commands
show bridge interface
show bridge mac
show bridge table
max-metric
Configure OSPF to advertise a maximum metric so that other routers do not prefer this vEdge router as an
intermediate hop in their Shortest Path First (SPF) calculation (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
max-metric
router-lsa (administrative | on-startup seconds)
Syntax Description
router-lsa on-startup Advertise the Maximum metric When the Router Starts Up:
seconds
Advertise the maximum metric for the specified number of seconds after the
router starts up.
Range: 0, 5 through 86400 seconds
Default: 0 seconds (the maximum metric is advertised immediately when the
router starts up)
Command History
Release Modification
Examples
Operational Commands
show ospf routes
max-omp-sessions
Configure the maximum number of OMP sessions that a vEdge router can establish to vSmart controllers (on
vEdge routers only). A vEdge router establishes a single OMP session to each vSmart controller. Even when
a vEdge router has multiple tunnel connections to the same vSmart controller, because all the tunnels have
the same IP address, this group of tunnels is effectively a single OMP session. When max-omp-sessions is
configured (without affinity), vEdge routers establish OMP peering with vSmarts controllers having higher
System-IP.
In an overlay network with redundant vSmart controllers, configure the maximum number of OMP sessions
to manage the scale of the overly network, by limiting the number of vSmart controllers that an individual
vEdge router can establish control connections with.
This command provides system-wide control over the maximum number of control connections that a vEdge
router can establish to vSmart controllers. To configure the number of control connections allowed on an
individual tunnel interface, include the max-control-connections command when configuring the tunnel
interface in VPN 0. The maximum number of OMP sessions configured on the router becomes the default
value for the maximum number of control connections allowed on the router's tunnel interfaces.
Command Hierarchy
system
max-omp-sessions number
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show control affinity config
show control affinity status
show control connections
show control local-properties
Related Topics
controller-group-id, on page 201
controller-group-list, on page 202
exclude-controller-group-list, on page 261
max-control-connections, on page 415
mgmt-security
Configure the encryption of management frames sent on the wireless LAN (on vEdge cellular wireless routers
only). Management frame encryption is defined in the IEEE 802.11w standard, which defines protected
management frames (PMFs).
You can configure the encryption of management frames only if you have configured a data security method
value other than none.
Command Hierarchy
wlan radio-band
interface vapnumber
mgmt-security security
Syntax Description
Command History
Release Modification
Examples
!
!
Operational Commands
clear wlan radius-stats
show interface
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
Related Topics
data-security, on page 214
mirror
Configure or apply a mirror to copy data packets to a specified destination for analysis (on vEdge routers
only).
You can mirror only unicast traffic. You cannot mirror multicast traffic.
Command Hierarchy
Create a Localized Control Policy
policy
mirror mirror-name
remote-dest ip-address source ip-address
Syntax Description
ip-address Source:
Source of the packets to mirror.
Command History
Release Modification
Examples
mirror m1
remote-dest 10.2.2.11 source 10.20.23.16
!
access-list acl2
sequence 1
match
source-ip 10.20.24.17/32
destination-ip 10.20.25.18/32
!
action accept
mirror m1
!
!
default-action drop
!
!
Operational Commands
show running-config
mode
Configure the mode to use in IKEv1 Diffie-Hellman key exchanges (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ike
mode mode
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
Related Topics
group, on page 276
mtu
Set the maximum MTU size of packets on the interface.
Command Hierarchy
vpn vpn-id
interface interface-name
mtu bytes
Syntax Description
Command History
Release Modification
Example
Reduce the MTU size to support subinterfaces:
vpn 0
interface ge0/0
mtu 1496
Operational Commands
show interface
Related Topics
bfd color, on page 142
pmtu, on page 477
tcp-mss-adjust, on page 592
multicast-buffer-percent
Configure the amount of interface bandwidth that multicast traffic can use (on vEdge routers only).
Command Hierarchy
system
multicast-buffer-percent percentage
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show running-config system
multicast-replicator
Configure a vEdge router to be a multicast replicator (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
multicast-replicator local [threshold number]
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show multicast replicator
show multicast rfp
show multicast topology
show multicast tunnel
name
Provide a text description for the VPN (on vEdge routers only).
Command Hierarchy
vpn vpn-id
name string
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show running-config vpn
name
Provide a text name for the Cisco vEdge device.
Command Hierarchy
snmp
name string
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show running-config snmp
nas-identifier
Configure the NAS identifier of the local router, to send to the RADIUS server during an 802.1X session (on
vEdge routers only).
Command Hierarchy
vpn 0
interface interface-name
dot1x
nas-identifier string
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
nas-ip-address
Configure the NAS IP address of the local router, to send to the RADIUS server during an 802.1X session
(on vEdge routers only).
Command Hierarchy
vpn 0
interface interface-name
dot1x
nas-ip-address ip-address
Syntax Description
ip-address IP Address:
NAS IP address to send to the RADIUS server.
Examples
Release Information
Release Modification
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
acct-req-attr, on page 51
auth-req-attr, on page 116
nas-identifier, on page 436
radius, on page 518
radius-servers, on page 522
nat
Configure a vEdge router to act as a NAT device (on vEdge routers only).
In the transport VPN (VPN 0), you can configure multiple NAT interfaces. In this configuration traffic is
load-balanced, via ECMP, among the interfaces.
You can configure a NAT on a physical interface or on a natpool interface. You cannot configure NAT on a
loopback interface. Note that for a natpool interface, you can configure only the interface's IP address,
shutdown and no shutdown command, and the nat command and its subcommands. You cannot configure
another other interface commands.
Command Hierarchy
vpn vpn-id
interface [genumber/slot | natpoolnumber]
nat
block-icmp-error
direction (inside | outside)
log-translations
natpool range-start ip-address1 range-end ip-address2
[no] overload
port-forward port-start port-number1 port-end port-number2 proto (tcp | udp)
private-ip-address ip-address private-vpn vpn-id
refresh (bi-directional | outbound)
respond-to-ping
static source-ip ip-address1 translate-ip ip-address2 (inside | outside)
static source-ip ip-address1 translate-ip ip-address2 source-vpn vpn-id protocol (tcp
| udp) source-port number translate-port number
tcp-timeout minutes
udp-timeout minutes
Syntax Description
None
Examples
Command History
Release Modification
16.3 Added support for 1:1 static NAT and dynamic NAT.
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
Related Topics
encapsulation, on page 256
action, on page 67
ip gre-route, on page 336
ip route, on page 340
nat-refresh-interval
Configure the interval between NAT refresh packets sent on a DTLS or TLS WAN transport connection. This
interval is how often a tunnel interface sends a refresh packet to maintain the UDP packet streams that traverse
a NAT.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
nat-refresh-interval seconds
Syntax Description
Command History
Release Modification
Examples
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
!
!
Operational Commands
show running-config
natpool
Configure a pool of addresses to use in NAT translation (on vEdge routers only).
You configure NAT port forwarding on interfaces in the WAN transport VPN (VPN 0).
Command Hierarchy
vpn 0
interface interface-name
nat
natpool range-start ip-address1 range-end ip-address2
Syntax Description
Command History
Release Modification
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
neighbor
Configure a BGP neighbor (on vEdge routers only). For each neighbor, you must configure the remote AS
number and enable the session by including the no shutdown command. All other configuration parameters
are optional.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
address-family ipv4-unicast
maximum-prefixes number [threshold] [restart minutes | warning-only]
route-policy policy-name (in | out)
capability-negotiate
description string
ebgp-multihop ttl
next-hop-self
password md5-digest-string
remote-as remote-as-number
send-community
send-ext-community
[no] shutdown
timers
advertisement-interval number
connect-retry seconds
holdtime seconds
keepalive seconds
update-source ip-address
Syntax Description
Command History
Release Modification
Examples
router
bgp 123
neighbor 1.10.10.10
no shutdown
remote-as 456
!
!
!
!
!
Operational Commands
show bgp neighbor
network
Set the OSPF network type (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
network (broadcast | point-to-point)
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ospf interface
next-hop-self
Configure the router to be the next hop for routes advertised to the BGP neighbor (on vEdge routers only).
This feature is disabled by default. If you configure it, use the no next-hop-self command to return to the
default.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
next-hop-self
Syntax Description
None
Examples
Configure the local vEdge router to be the next hop to its BGP neighbor:
vm1# show running-config vpn 1 router bgp neighbor 1.10.10.10
vpn 1
router
bgp 123
neighbor 1.10.10.10
no shutdown
remote-as 456
next-hop-self
!
!
!
!
!
Command History
Release Modification
Operational Commands
show bgp routes
node-type
Configure a node type for Cloud OnRamp for SaaS (formerly called CloudExpress service) (on vEdge routers
only).
Note To ensure that Cloud OnRamp for SaaS is set up properly, configure it in vManage NMS, not using the CLI.
Command Hierarchy
vpn vpn-id
cloudexpress
node-type type
Syntax Description
Examples
Command History
Release Modification
Operational Commands
clear cloudexpress computations
show cloudexpress applications
show cloudexpress gateway-exits
show cloudexpress local-exits
show omp cloudexpress
nssa
Configure an OSPF area to be an NSSA (a not-so-stubby area) (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
nssa
no-summary
translate (always | candidate | never)
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ospf process
ntp
Configure Network Time Protocol (NTP) servers and MD5 authentication keys for the NTP servers.
Configuring NTP on a Cisco vEdge device allows that device to contact NTP servers to synchronize time.
Other devices are allowed to ask a Cisco vEdge device for the time, but no devices are allowed to use the
Cisco vEdge device as an NTP server.
Command Hierarchy
system
ntp
keys
authentication key-id md5 md5-key
trusted key-id
server (dns-server-address | ipv4-address)
key key-id
prefer
source-interface interface-name
version number
vpn vpn-id
Syntax Description
Command History
Release Modification
15.4 Added support for up to four NTP servers, MD5 authentication, and configuring the
source interface.
Examples
Configure three NTP servers, including one that uses an NTP server provided by the NTP Pool
Project at the Network Time Foundation. The local NTP servers use MD5 authentication.
vEdge# show running-config system ntp
system
ntp
keys
authentication 1001 md5 $4$KXLzYT9k6M8zj4BgLEFXKw==
authentication 1002 md5 $4$KXLzYTxk6M8zj4BgLEFXKw==
authentication 1003 md5 $4$KXLzYT1k6M8zj4BgLEFXKw==
trusted 1001 1002
!
server 192.168.15.243
key 1001
vpn 512
version 4
exit
server 192.168.15.242
key 1002
vpn 512
version 4
exit
server us.pool.ntp.org
vpn 512
version 4
exit
!
!
Operational Commands
clock set date
clock set time
show ntp associations
show ntp peer
Related Topics
allow-service, on page 85
offer-time
Configure how long the IP address offered to a DHCP client is reserved for that client (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface geslot/port
dhcp-server
offer-time seconds
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show dhcp interfaces
show dhcp server
omp
omp—Modify the OMP configuration (on vEdge routers and vSmart controllers only). By default, OMP is
enabled on all vEdge routers and vSmart controllers.
vpn omp—Modify the OMP configuration in a particular VPN (on vEdge routers only). You can configure
this command for any service-side VPN, that is, for any VPN except for VPN 0 and VPN 512.
Command Hierarchy
omp
advertise (bgp | connected | ospf type | eigrp | static) (on vEdge routers only)
discard-rejected (on vSmart controllers only)
ecmp-limit number (on vEdge routers only)
graceful-restart
overlay-as as-number (on vEdge routers only)
send-backup-paths (on vSmart controllers only)
send-path-limit number
[no] shutdown
timers
advertisement-interval seconds
eor-timer seconds
graceful-restart-timer seconds
holdtime seconds
Syntax Description
Command History
Release Modification
Operational Commands
show omp peers
show omp routes
show omp services
show omp summary
show omp tlocs
options
vpn interface dhcp-server options—Configure the DHCP options to send to the client when the DHCP
client request them (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface geslot/port
dhcp-server
options
default-gateway ip-address
dns-servers ip-address
domain-name domain-name
interface-mtu mtu
tftp-servers ip-address
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show dhcp interface
show dhcp server
organization-name
system organization-name—Configure the name of your organization.
vManage Configuration
Administration ► Settings
Command Hierarchy
system
organization-name name
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show control local-properties
show orchestrator local-properties
Related Topics
request csr upload, on page 844
orgid
To configure the organization ID for Umbrella registration, on Cisco IOS XE SD-WAN devices, use the orgid
command in config-profile mode.
orgid organization-id
Syntax Description
Command Mode
config-profile
Command History
Release Modification
Examples
Use parameter-map type umbrella global to enter config-profile mode, then use orgid, api-key, and secret
to configure Umbrella registration.
In config-profile mode, use show full-configuration to display Umbrella registration details.
Example
This example configures Umbrella registration details.
Device(config)# parameter-map type umbrella global
Device(config-profile)# orgid 1234567
Device(config-profile)# api-key aaa12345aaa12345aaa12345aaa12345
Device(config-profile)# secret 0 bbb12345bbb12345bbb12345bbb12345
ospf
vpn router ospf—Configure OSPF within a VPN on a vEdge router.
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
authentication
authentication-key key
message-digest key
type (message-digest | simple)
cost number
dead-interval seconds
hello-interval seconds
network (broadcast | point-to-point)
passive-interface
priority number
retransmit-interval seconds
! end area interface
nssa
no-summary
translate (always | candidate | never)
range prefix/length
cost number
no-advertise
stub
no-summary
! end area
auto-cost reference-bandwidth mbps
compatible rfc1583
default-information
originate (always | metric metric | metric-type type)
distance
external number
inter-area number
intra-area number
max-metric
router-lsa (administrative | on-startup seconds)
redistribute (bgp | connected | nat | natpool-outside | omp | static)
route-policy policy-name in
router-id ipv4-address
timers
spf delay initial-hold-time maximum-hold-time
Syntax Description
None
Command History
Release Modification
Examples
In VPN 1 on a vEdge router, configure OSPF area 0. The interface ge0/0 participates in the local
OSPF network.
vEdge# show running-config vpn 1 router ospf
vpn 1
router
ospf
redistribute static
redistribute omp
area 0
interface ge0/0
exit
exit
!
!
!
Monitoring Commands
show ospf database
show ospf database-summary
show ospf interface
show ospf neighbor
show ospf process
show ospf routes
overlay-as
omp overlay-as—Configure a BGP AS number that OMP advertises to the router's BGP neighbors (on vEdge
routers only).
Command Hierarchy
omp
overlay-as as-number
Syntax Description
as-number AS Number:
Local AS number to advertise to the router's BGP neighbors. You can specify the AS number in
2-byte ASDOT notation (1 through 65535) or in 4-byte ASDOT notation (1.0 through
65535.65535).
Command History
Release Modification
Operational Commands
show bgp routes
show omp routes
Related Topics
propagate-aspath, on page 512
overload
vpn interface nat overload— Control the mapping of addresses on a vEdge router that is acting as a NAT
device (on vEdge routers only). By default, the overload function is enabled, which enables dynamic NAT.
Addresses are mapped one to one until the address pool is depleted. Then, in Release 16.3.0, the last address
is used multiple times, and the port number is changed to a random value between 1024 and 65535. For
Releases 16.3.2 and later, when the address pool is depleted, the first address in the pool is used multiple
times. This reuse of the last address is called overloading. Overloading effectively implements dynamic NAT.
To enable static NAT, which maps a single source IP address to a single translated IP address, include the no
overload command in the configuration. With this configuration, when the maximum number of available
IP addresses is reached, you cannot configure any more mappings between source and translated addresses.
Command Hierarchy
vpn vpn-id
interface natpoolnumber
nat
[no] overload
Syntax Description
None
Command History
Release Modification
Examples
Dynamic NAT
Configure a vEdge router to perform dynamic NAT:
vEdge# show running-config vpn 1
interface natpool1
ip address 10.15.1.4/30
nat
no shutdown
!
Static NAT
Configure a vEdge router to perform static NAT, translating a service-side and a remote IP address:
vEdge# show running-config vpn 1
interface natpool1
ip address 10.15.1.4/30
nat
static source-ip 10.1.17.3 translate-ip 10.15.1.4 inside
static source-ip 10.20.25.18 translate-ip 10.25.1.1 outside
direction inside
no overload
!
no shutdown
!
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
Related Topics
encapsulation, on page 256
static, on page 576
Syntax Description
This command has no arguments or keywords.
Command Mode
Global configuration (config)
Examples
Use the parameter-map type umbrella global command to enter config-profile mode, then use one of the
following to display the current Umbrella registration details, or to configure Umbrella registration.
Example
This example displays the Umbrella registration details for a device.
Device(config)# parameter-map type umbrella global
Device(config-profile)# show full-configuration
parameter-map type umbrella global
local-domain umbrella_bypass
dnscrypt
orgid 1234567
api-key aaa12345aaa12345aaa12345aaa12345
secret 0 bbb12345bbb12345bbb12345bbb12345
Example
This example configures the Umbrella registration details.
Device(config)# parameter-map type umbrella global
Device(config-profile)# orgid 1234567
Device(config-profile)# api-key aaa12345aaa12345aaa12345aaa12345
Device(config-profile)# secret 0 bbb12345bbb12345bbb12345bbb12345
passive-interface
vpn router ospf area interface passive-interface—Set the OSPF interface to be passive (on vEdge routers
only). A passive interface advertises its address, but it does not actively run the OSPF protocol.
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
passive-interface
Syntax Description
None
Command History
Release Modification
Examples
Operational Commands
show ospf interface
password
vpn router bgp neighbor password—Configure message digest5 (MD5) authentication and an MD5 password
on the TCP connection with the BGP peer (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
password md5-digest-string
Syntax Description
md5-digest-string Password:
Password to use to generate an MD5 message digest. It is case-sensitive and can be up to
25 characters long. It can contain any alphanumeric characters, including spaces. The first
character cannot be a number.
Command History
Release Modification
Examples
Operational Commands
show bgp neighbor
perfect-forward-secrecy
vpn interface ipsec ipsec perfect-forward-secrecy—Configure the perfect forward secrecy (PFS) settings
to use on an IPsec tunnel that is being used for IKE key exchange (on vEdge routers only). PFS ensures that
past sessions are not affected if future keys are compromised
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ipsec
perfect-forward-secrecy pfs-setting
Syntax Description
Default: group-16
Command History
Release Modification
Examples
Example 1
Have the IPsec tunnel use the 2048-bit modulus group:
vEdge(config)# vpn 1 interface ipsec1 ipsec
vEdge(config-ike)# perfect-forward-secrecy group-14
Example 2
For a Microsoft Azure end point that does not support PFS, disable PFS on an IPsec tunnel:
vEdge(config)# vpn 1 interface ipsec1 ipsec
vEdge(config-ipsec)# perfect-forward-secrecy none
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
pim
vpn router pim— Configure PIM (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
pim
auto-rp
interface interface-name
hello-interval seconds
join-prune-interval seconds
replicator-selection
[no] shutdown
spt-threshold kbps
Syntax Description
None
Command History
Release Modification
Operational Commands
show multicast replicator
show multicast rpf
show multicast topology
show multicast tunnel
show omp multicast-auto-discover
show omp multicast-routes
show pim interface show pim neighbor
pmtu
vpn interface pmtu—Enable path MTU (PMTU) discovery on the interface, using ICMP. When PMTU is
enabled, the device automatically negotiates the largest MTU size that the interface supports in an attempt to
minimize or eliminate packet fragmentation.
By default, PMTU discovery using ICMP is disabled.
On vEdge routers, the Cisco SD-WAN BFD software automatically performs PMTU discovery on each
transport connection (that is, for each TLOC, or color). BFD PMTU discovery is enabled by default, and it
is recommended that you use it and that you not configure ICMP PMTU discovery on router interfaces.
Command Hierarchy
vpn vpn-id
interface interface-name
pmtu
Syntax Description
None
Command History
Release Modification
Examples
Operational Commands
show interface detail
Related Topics
bfd color, on page 142
clear-dont-fragment, on page 169
mtu, on page 429
policer
policy policer—Configure or apply a policer to be used for data traffic. For centralized data policy, you can
police unicast traffic. For localized data policy (ACLs), you can police unicast and multicast traffic.
Command Hierarchy
Configure a Policer
policy
policer policer-name
burst bytes
exceed action
rate bps
Syntax Description
Command History
Release Modification
Examples
Example 1
Create a policer, and apply it conditionally to outbound traffic on an interface in VPN 1:
policy
policer p1
rate 1000000
burst 15000
exceed drop
!
access-list acl1
sequence 1
match
source-ip 2.2.0.0/16
destination-ip 10.1.1.0/24 100.1.1.0/24
destination-port 20 30
protocol 6 17 23
!
action accept
policer p1
!
!
default-action drop
!
!
vpn 1
interface ge0/4
ip address 10.20.24.15/24
no shutdown
access-list acl1 out
!
!
Example 2
Apply the same policer unconditionally to outbound traffic on the same interface:
policy
policer p1
rate 1000000
burst 15000
exceed drop
!
vpn 1
interface ge0/4
ip address 10.20.24.15/24
no shutdown
policer p1
!
!
Operational Commands
clear policer statistics
show interface detail
show policer
show running-config
Related Topics
control-session-pps, on page 200
host-policer-pps, on page 296
icmp-error-pps, on page 297
match, on page 403
policy
policy—Configure IPv4 policy (on vSmart controllers and vEdge routers only).
Command Hierarchy
For Application-Aware Routing Policy
Configure on vSmart controllers only.
policy
lists
app-list list-name
(app application-name | app-family family-name)
data-prefix-list list-name
ip-prefix prefix/length
site-list list-name
site-id site-id
vpn-list list-name
vpn vpn-id
sla-class sla-class-name
jitter milliseconds
latency milliseconds
loss percentage
policy
app-route-policy policy-name
vpn-list list-name
default-action sla-class sla-class-name
sequence number
match
app-list list-name
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
dns (request | response)
dns-app-list list-name
dscp number
protocol number
source-data-prefix-list list-name
source-ip prefix/length
source-port address
action
backup-sla-preferred-color color
count counter-name
log
sla-class sla-class-name [strict] [preferred-color colors]
color-list list-name
color color
prefix-list list-name
ip-prefix prefix/length
site-list list-name
site-id site-id
tloc-list list-name
tloc address color color encap encapsulation [preference value]
vpn-list list-name
vpn vpn-id
policy
control-policy policy-name
default-action action
sequence number
match
route
color color
color-list list-name
omp-tag number
origin protocol
originator ip-address
preference number
prefix-list list-name
site-id site-id
site-list list-name
tloc ip-address color color [encap encapsulation]
tloc-list list-name
vpn vpn-id
vpn-list list-name
tloc
carrier carrier-name
color color
color-list list-name
domain-id domain-id
group-id group-id
omp-tag number
originator ip-address
preference number
site-id site-id
site-list list-name
tloc address color color [encap encapsulation]
tloc-list list-name
action
reject
accept
set
omp-tag number
preference value
service service-name [tloc ip-address | tloc-list list-name] [vpn vpn-id]
tloc-action action
tloc-list list-name
lists
app-list list-name
(app applications | app-family application-families)
data-prefix-list list-name
ip-prefix prefix
site-list list-name
site-id site-id
tloc-list list-name
tloc ip-address color color encap encapsulation [preference value]
vpn-list list-name
vpn-id vpn-id
policy
data-policy policy-name
vpn-list list-name
default-action action
sequence number
match
app-list list-name
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
dns (request | response)
dns-app-list list-name
dscp number
protocol number
source-data-prefix-list list-name
source-ip prefix/length
source-port number
tcp flag
action
cflowd (not available for deep packet inspection)
count counter-name
drop
log
tcp-optimization
accept
nat [pool number] [use-vpn 0] (in Releases 16.2 and earlier, not available for
deep packet inspection)
redirect-dns (host | ip-address)
set
dscp number
forwarding-class class
local-tloc color color [encap encapsulation]
local-tloc-list color color [encap encapsulation] [restrict]
next-hop ip-address
policer policer-name
service service-name local [restrict] [vpn vpn-id]
service service-name (tloc ip-address | tloc-list list-name) [vpn vpn-id]
tloc ip-address color color [encap encapsulation]
tloc-list list-name
vpn vpn-id
policy
data-policy policy-name
default-action action
sequence number
match
app-list list-name
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
dscp number
packet-length number
protocol number
source-data-prefix-list list-name
source-ip prefix/length
source-port address
tcp flag
action
count counter-name
drop
accept
set local-tloc color
set next-hop ip-address
set policer policer-name
set service service-name [tloc ip-address | tloc-list list-name] [vpn vpn-id]
set tloc ip-address
set vpn vpn-id
vpn-membership policy-name
default-action action
sequence number
match
vpn vpn-id
vpn-list list-name
action
(accept | reject)
next-hop ip-address
omp-tag number
origin (egp | igp | incomplete)
originator ip-address
ospf-tag number
weight number
policy
lists
prefix-list list-name
ip-prefix prefix/length
tcp-syn-flood-limit number
zone (destination-zone-name | source-zone-name)
vpn vpn-id
zone-to-no-zone-internet (allow | deny)
zone-pair pair-name
source-zone source-zone-name
destination-zone destination-zone-name
zone-policy policy-name
zone-based-policy policy-name
default-action action
sequence number
match
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
protocol number
source-data-prefix-list list-name
source-ip prefix-length
source-port number
action
drop
inspect
log
pass
Syntax Description
None
Command History
Release Modification
Examples
Operational Commands
show running-config
Related Topics
access-list, on page 47
apply-policy, on page 95
policy ipv6, on page 489
policy ipv6
policy ipv6—Configure IPv6 policy (on vEdge routers only).
Command Hierarchy
Localized Data Policy for IPv6
Configure on vEdge routers only.
policy
mirror mirror-name
remote-dest ip-address source ip-address
policer policer-name
burst types
exceed action
rate bps
policy ipv6
access-list acl-name
default-action action
sequence number
match
class class-name
destination-port number
next-header protocol
packet-length number
plp (high | low)
source-port number
tcp flag
traffic-class value
action
drop
count counter-name
log
accept
class class-name
count counter-name
log
mirror mirror-name
policer policer-name
set
traffic-class value
Syntax Description
None
Command History
Release Modification
Examples
Configure an IPv6 ACL that changes the traffic class on TCP port 80 data traffic, and apply the ACL
to an interface in VPN 0:
vEdge# show running-config policy ipv6 access-list
policy
ipv6 access-list traffic-class-48-to-46
sequence 10
match
destination-port 80
traffic-class 48
!
action accept
count port_80
log
set
traffic-class 46
!
!
!
default-action accept
!
!
vEdge# show running-config vpn 0 interface ge0/7 ipv6
vpn 0
interface ge0/7
ipv6 access-list traffic-class-48-to-46 in
!
!
Operational Commands
show running-config
Related Topics
policy, on page 482
port-forward
vpn interface nat port-forward—On a vEdge router operating as a NAT gateway, create port-forwarding
rules to allow requests from an external network to reach devices on the internal network (on vEdge routers
only). You can create up to 128 rules.
You configure NAT port forwarding on interfaces in the WAN transport VPN (VPN 0).
Command Hierarchy
vpn 0
interface interface-name
nat
port-forward port-start port-number1 port-end port-number2
proto (tcp | udp) private-ip-address ip-address private-vpn vpn-id
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
port-hop
system port-hop, vpn 0 interface tunnel-interface—For a Cisco vEdge device that is behind a NAT device
or for an individual tunnel interface (TLOC) on that Cisco vEdge device, rotate through a pool of preselected
OMP port numbers, known as base ports, to establish DTLS connections with other Cisco vEdge devices
when a connection attempt is unsuccessful (on vEdge routers, vManage NMSs, and vSmart controllers only).
By default, port hopping is enabled on vEdge routers and on all tunnel interfaces on vEdge routers, and it is
disabled on vManage NMSs and vSmart controllers.
There are five base ports: 12346, 12366, 12386, 12406, and 12426. These port numbers determine the ports
used for connection attempts. The first connection attempt is made on port 12346. If the first connection does
not succeed after about 1 minute, port 12366 is tried. After about 2 minutes, port 12386 is tried; after about
5 minutes, port 12406; after about 6 minutes, port 12426 is tried. Then the cycle returns to port 12346.
If you have configured a port offset with the port-offset command, the five base ports are a function of the
configured offset. For example, with a port offset of 2, the five base ports are 12348, 12368, 12388, 12408,
and 12428. Cycling through these base ports happens in the same way as if you had not configured an offset.
Command Hierarchy
system
port-hop
vpn 0
interface interface-name
tunnel-interface
port-hop
Syntax Description
Examples
system
port-hop
Command History
Release Modification
16.2 Port hopping is disabled by default on vManage NMSs and vSmart controllers.
Operational Commands
request port-hop
show control local-properties
Related Topics
graceful-restart, on page 272
port-offset, on page 495
request port-hop, on page 874
port-offset
system port-offset—Offset the base port numbers to use for the TLOC when multiple Cisco vEdge devices
are present behind a single NAT device. Each device must have a unique port number so that overlay network
traffic can be correctly delivered.
Command Hierarchy
system
port-offset number
Syntax Description
Command History
Release Modification
Examples
dns-name 10.1.14.14
site-id 100
domain-id 1
protocol dtls
tls-port 0
system-ip 172.16.255.11
chassis-num/unique-id 7e7a6da3-ec1c-4d3a-bf74-d14a6afca6eb
serial-num NOT-A-HARDWARE
keygen-interval 1:00:00:00
retry-interval 0:00:00:16
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:30:00
port-hopped TRUE
time-since-last-port-hop 0:00:06:38
number-vbond-peers 1
INDEX IP PORT
-------------------------------
0 10.1.14.14 12346
vEdge# config
vEdge(config)# system port-offset 1
vEdge(config-system)# command and-quit
Commit complete.
vEdge# show control local-properties
organization-name Cisco
certificate-status Installed
root-ca-chain-status Installed
dns-name 10.1.14.14
site-id 100
protocol dtls
tls-port 0
system-ip 172.16.255.11
chassis-num/unique-id 7e7a6da3-ec1c-4d3a-bf74-d14a6afca6eb
serial-num NOT-A-HARDWARE
keygen-interval 1:00:00:00
retry-interval 0:00:00:16
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:30:00
port-hopped TRUE
time-since-last-port-hop 0:00:06:38
number-vbond-peers 1
INDEX IP PORT
-------------------------------
0 10.1.14.14 12346
Operational Commands
show control local-properties
show orchestrator local-properties
Related Topics
port-hop, on page 493
request port-hop, on page 874
ppp
vpn 0 interface ppp—Configure the properties for a PPP virtual interface (on vEdge routers only).
Command Hierarchy
vpn 0
interface pppnumber
ppp
ac-name name
authentication
chap hostname hostname password password
pap sent-username username password password
Syntax Description
Examples
Command History
Release Modification
17.1 Added ability to configure both CHAP and PAP authentication on a PPP interface.
Operational Commands
clear pppoe statistics
show pppoe session
show pppoe statistics
show ppp interface
Related Topics
pppoe-client, on page 499
pppoe-client
vpn 0 interface pppoe-client—Enable the PPPoE client on the interface (on vEdge routers only).
Command Hierarchy
vpn 0
interface geslot/port
pppoe-client
ppp-interface pppnumber
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear pppoe statistics
show interface detail
show ppp interface
show pppoe session
show pppoe statistics
Related Topics
ppp, on page 497
priority
vpn router ospf area interface priority—Set the priority of the router to be elected as the designated router
(on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
priority number
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ospf interface
Related Topics
router-id, on page 553
probe
To configure specific SaaS applications for Cloud onRamp for SaaS, and the frequency for probing the paths
to the cloud application servers, in Cisco IOS XE SD-WAN devices, use the probe command in global
configuration mode.
The no form of this command cancels probing for specific applications.
probe [latency frequency] [saas application-name]
no probe [saas application-name]
Syntax Description
latency frequency Frequency at which Cloud onRamp for SaaS probes the paths to application servers
for specified SaaS applications.
Range: 0 to 65535 (seconds)
Default: 30
Note We recommend that you use the default value.
Command Mode
Global configuration (config)
Command History
Release Modification
Cisco IOS XE Release 17.2 The command was introduced.
Examples
Example
Device(config)# probe latency 40
Device(config-probe)# top
Device(config)# probe saas office365_apps
Device(config-probe)# top
Device(config)# probe saas amazon_aws_apps
Device(config-probe)# top
Device(config)# show full probe
probe
latency 40
saas office365_apps
saas amazon_aws_apps
!
Example
This example cancels probling for office365_apps.
Device(config)# no probe saas office365_apps
probe-path branch
To enable Cloud onRamp for SaaS functionality in branch mode, for Cisco IOS XE SD-WAN devices, use
the probe-path branch command in global configuration mode.
The no form of this command disables Cloud onRamp for SaaS functionality in branch mode.
probe-path branch [color-all-dia | color-list list-of-tloc-colors]
no probe-path branch
Syntax Description
color-all-dia Enables Cloud onRamp for SaaS probing in branch mode on all transport
locator (TLOC) interfaces that have been assigned a valid color.
Use this option when all TLOC interfaces have direct internet access (DIA).
color-list list-of-tloc-colors Enables Cloud onRamp for SaaS probing in branch mode on the interfaces
that match the list of colors.
Command Mode
Global configuration (config)
Command History
Release Modification
Cisco IOS XE Release Amsterdam This command was introduced.
17.2.1r
Examples
Example
After enabling Cloud onRamp for SaaS for a branch, confirm that it is enabled with a show command.
Device(config)# show full probe-path
probe-path branch
Enable Cloud onRamp for SaaS for a branch, for a list of colors.
Device(config)# probe-path branch color-list public-internet private1
Device(config)# show full probe-path
probe-path branch color-list public-internet private1
probe-path gateway
To enable Cloud onRamp for SaaS functionality in gateway mode, for Cisco IOS XE SD-WAN devices ,use
the probe-path gateway command in global configuration mode.
The no form of this command disables Cloud onRamp for SaaS functionality in gateway mode.
probe-path gateway local-interface-list list-of-tloc-interface-names
no probe-path gateway [local-interface-list list-of-tloc-interface-names]
Syntax Description
Command Mode
Global configuration (config)
Command History
Release Modification
Cisco IOS XE Release 17.2 This command was introduced.
Usage Guidelines When using the no form of this command, you can include local-interface-list to specify interfaces, or omit
this option to remove the gateway functionality.
Examples
Example
After enabling Cloud onRamp for SaaS for a gateway, with a list of interfaces, display the
configuration.
Device(config)# show full probe-path
probe-path gateway local-interface-list GigabitEthernet5 GigabitEthernet1
profile
cellular profile—Configure a cellular profile (on vEdge routers only).
The firmware installed in the router's cellular module is specific to each service provider and determines which
profile properties you can configure. You can modify the attributes for a profile only if allowed by the service
provider.
Command Hierarchy
cellular cellularnumber
profile profile-id
apn name
auth auth-method
ip-addr ip-address
name profile-name
pdn-type type
primary-dns ip-address
secondary-dns ip-address
user-name username
user-pass password
Syntax Description
Command History
Release Modification
16.3 Added support for profile 0; changed profile 16 to reserved, so you cannot modify it.
Examples
Configure a cellular interface with a profile, and the profile with an APN.
vEdge# show running-config cellular
cellular cellular0
profile 1
apn reg_ims
!
Operational Commands
clear cellular errors
clear cellular session statistics
show cellular modem
show cellular network
show cellular profiles
show cellular radio
show cellular sessions
show cellular status
show interface
profile
vpn 0 interface cellular profile—Assign a cellular profile to a cellular interface (on vEdge routers only).
Command Hierarchy
vpn 0
interface cellularnumber
profile profile-id
Syntax Description
profile Profile:
profile-id
Number that identifies the profile to use for the cellular interface. This profile is one you
configure with the cellular profile command.
profile-id can be a value from 1 through 15.
Command History
Release Modification
Examples
Operational Commands
clear cellular errors
clear cellular session statistics
show cellular modem
show cellular network
show cellular profiles
show cellular radio
show cellular sessions
show cellular status
show interface
Related Topics
profile, on page 507
propagate-aspath
vpn router bgp propagate-aspath—Carry the BGP AS path into OMP (on vEdge routers only). Configuring
this option can help to avoid network loops.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
propagate-aspath
Syntax Description
None
Command History
Release Modification
Examples
Carry local BGP AS path information into OMP, and receive AS path information from OMP:
vpn 1
router
bgp 1
propagate-aspath
Operational Commands
show bgp summary
show omp routes detail
Related Topics
overlay-as, on page 467
qos-map
qos-map—Configure a QoS map, or apply a QoS map on an interface (on vEdge routers only). QoS is applied
to unicast or multicast packets being transmitted out the interface.
Command Hierarchy
Create a QoS Map
policy
qos-map map-name
qos-scheduler class-name
Syntax Description
Examples
Create a QoS scheduler and QoS map, and apply it to an interface in VPN 1:
vEdge(config)# show config
policy
qos-scheduler af1
class af1
bandwidth-percent 20
buffer-percent 20
drops red-drop
!
qos-map test-qos-map
qos-scheduler af1
!
!
vpn 1
interface ge0/0
qos-map test-qos-map
!
!
Command History
Release Modification
Operational Commands
show policy qos-map-info
show policy qos-scheduler-info
Related Topics
class-map, on page 167
qos-map, on page 513
qos-scheduler, on page 515
rewrite-rule, on page 546
qos-scheduler
policy qos-scheduler—Configure a QoS scheduler for a forwarding class (on vEdge routers only).
A scheduler can apply to unicast and multicast traffic.
Command Hierarchy
policy
qos-scheduler scheduler-name
bandwidth-percent percentage
buffer-percent percentage
burst burst-rate
class class-name
drops (red-drop | tail-drop)
scheduling (llq | wrr)
Syntax Description
Command History
Release Modification
16.2.3 Beginning with this release, if you attempt to configure LLQ and red drops, an error
message is displayed when you try to validate the configuration, and the commit
operation does not continue.
Examples
Create a QoS scheduler and QoS map, and apply it to an interface in VPN 1:
vEdge(config)# show config policy
policy
qos-scheduler af1
class af1
bandwidth-percent 20
buffer-percent 20
drops red-drop
!
qos-map test-qos-map
qos-scheduler af1
!
!
Operational Commands
show policy qos-map-info
show policy qos-scheduler-info
Related Topics
access-list, on page 47
class-map, on page 167
cloud-qos, on page 171
qos-map, on page 513
rewrite-rule, on page 546
radius
system radius—Configure the properties of a RADIUS server to use for AAA authorization and authentication,
and IEEE 802.1X LAN and IEEE 802.11i WLAN authentication.
Command Hierarchy
system
radius
retransmit number
server ip-address
acct-port port-number
auth-port port-number
priority number
secret-key password
source-interface interface-name
tag tag
vpn vpn-id
timeout seconds
Command History
Syntax Description
Release Modification
16.3 Added acct-port and tag commands, and added support for IEEE 802.1X LAN and
IEEE 802.11i WLAN authentication.
Examples
Operational Commands
clear dot1x client
dot1x
show dot1x clients
show dot1x interfaces
show dot1x radius
show running-config system radius
show system statistics
Related Topics
aaa, on page 43
admin-auth-order, on page 73
auth-fallback, on page 108
auth-order, on page 111
dot1x, on page 242
tacacs, on page 589
wlan, on page 678
radius-servers
system aaa radius-servers, vpn interface dot1x radius-servers, wlan interface radius-servers—Configure
which RADIUS servers to use for AAA, IEEE 802.1X, and IEEE 802.11i authentication (for IEEE 802.1X and
IEEE 802.11i on vEdge routers only).
Command Hierarchy
system
aaa
radius-servers tag
vpn 0
interface interface-name
dot1x
radius-servers tag
wlan radio-band
interface vapnumber
radius-servers tag
Syntax Description
Command History
Release Modification
Examples
Example 1
Configure two RADIUS servers to use for AAA authentication:
vEdge# show running-config system
system
...
aaa
auth-order local radius tacacs
radius-servers radius-1 radius-2
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$6fmWvCA6jHuEq/AK$y3gixVkyhtvXLWNTiv3Wy21i9/.6h56IQNWvI3YdjxH9qQmGVWVGQW391dlaqjRRDtUkuxeIy3/m9BqL/0IZG.
!
!
...
radius
server 1.2.3.4
tag radius-1
exit
server 2.3.4.5
tag radius-2
exit
!
Example 2
Configure the RADIUS servers to use for 802.1X authentication:
system
radius
server 10.1.15.150
tag freerad1
source-interface ge0/0
secret-key $4$L3rwZmsIic8zj4BgLEFXKw==
priority 1
exit
server 10.20.24.150
auth-port 2000
acct-port 2001
tag freerad2
source-interface ge0/4
secret-key $4$L3rwZmsIic8zj4BgLEFXKw==
priority 2
exit
!
!
vpn 0
interface ge0/5
dot1x
auth-reject-vlan 40
auth-fail-vlan 30
guest-vlan 20
default-vlan 10
radius-servers freerad1
!
no shutdown
!
!
Example 3
Configure the RADIUS servers to use for 802.11i authentication:
vEdge# show running-config wlan
wlan 5GHz
channel 36
interface vap0
ssid tb31_pm6_5ghz_vap0
no shutdown
!
interface vap1
ssid tb31_pm6_5ghz_vap1
data-security wpa/wpa2-enterprise
radius-servers tag1
no shutdown
!
interface vap2
ssid tb31_pm6_5ghz_vap2
data-security wpa/wpa2-personal
mgmt-security optional
wpa-personal-key $4$BES+IEZB2vcQpeEoSR4ia9JqgDsPNoHukAb8fvxAg5I=
no shutdown
!
interface vap3
ssid tb31_pm6_5ghz_vap3
data-security wpa2-enterprise
mgmt-security optional
radius-servers tag1
no shutdown
!
!
Operational Commands
clear wlan radius-stats
show interface
show running-config
show wlan clients
show wlan interfaces
show wlan radios
range
vpn router ospf area range—Summarize OSPF routes at an area boundary so that only a single summary
route is advertised to other areas by an ABR (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
range prefix/length
cost number
no-advertise
Syntax Description
Command History
Release Modification
Operational Commands
show ospf process
reauthentication
vpn interface dot1x reauthentication—Enable periodic reauthentication of 802.1X clients (on vEdge routers
only). By default, clients are authenticated only once, when they first request access to the LAN.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
reauthentication minutes
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
radius, on page 518
redistribute
vpn router ospf redistribute—Redistribute routes learned from other protocols into OSPF (on vEdge routers
only). By default, no routes from other protocols are redistributed into OSPF.
Command Hierarchy
vpn vpn-id
router
ospf
redistribute (bgp | connected | nat | natpool-outside | omp | static) route-policy
policy-name
Syntax Description
(bgp | connected | nat | Protocol from which to Redistribute Routes into OSPF:
natpool-outside | omp | static)
(bgp | connected | nat | natpool-outside | omp | static) Protocol from
which to redistribute routes into OSPF. Note that in VPN 0 you cannot
redistribute OMP routes into OSPF, to prevent these routes from being
leaked to external network.
Release Information
Release Modification
Examples
exit
exit
!
!
Operational Commands
show ospf routes
Related Topics
route-policy, on page 549
refresh
vpn interface nat refresh— Configure how NAT mappings are refreshed (on vEdge routers only).
Command Hierarchy
vpn
interface interface-name
nat
refresh (bi-directional | outbound)
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ip nat interface
show ip nat interface-statistics
rekey
security ipsec rekey—Modify the IPsec rekeying timer (on vEdge routers only).
Command Hierarchy
security
ipsec
rekey seconds
Syntax Description
Command History
Release Modification
15.3.5 Rekeying time default changed from 7200 seconds (2 hours) and maximum time
increased from 2 days to 7 days.
Examples
Operational Commands
show ipsec local-sa
show security-info
Related Topics
graceful-restart, on page 272
rekey
vpn interface ipsec ike rekey—Modify the IPsec rekeying timer to use during IKE key exchanges (on vEdge
routers only).
vpn interface ipsec ipsec rekey—Modify the IPsec rekeying timer to use on an IPsec tunnel that is being
used for IKE key exchange (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ike
rekey seconds
ipsec
rekey seconds
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear ipsec ike sessions
request ipsec ike-rekey request ipsec ipsec-rekey
show ipsec ike inbound-connections
show ipsec ike outbound-connections
remote-as
vpn router bgp neighbor remote-as—Configure AS number of the remote BGP peer (on vEdge routers
only).
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
remote-as remote-as-number
Syntax Description
Release Information
Release Modification
Examples
Operational Commands
show bgp neighbor
replay-window
vpn interface ipsec ipsec replay-window—Modify the size of the IPsec replay window on an IPsec tunnel
that is being used for IKE key exchange (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface ipsecnumber
ipsec
replay-window number
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ipsec local-sa
show security-info
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
Related Topics
ike, on page 302
replay-window
security ipsec replay-window—Modify the size of the IPsec replay window (on vEdge routers only).
Command Hierarchy
security
ipsec
replay-window number
Syntax Description
Release Information
Release Modification
Examples
Operational Commands
show ipsec local-sa
show security-info
replicator-selection
vpn router pim replicator-selection— Allow vEdge routers to use different replicators for the same multicast
group (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
pim
replicator-selection (random | sticky)
Syntax Description
Command History
Release Modification
Operational Commands
show multicast replicator
show multicast rpf
show multicast topology
show multicast tunnel
show pim interface
show pim neighbor
respond-to-ping
vpn interface nat respond-to-ping—Have a vEdge router that is acting as a NAT device respond to ping
requests to the NAT interface's IP address that are received from the public side of the connection (on vEdge
routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
nat
respond-to-ping
Syntax Description
None
Command History
Release Modification
Examples
Configure a vEdge router acting as a NAT so that it responds to ping requests from the WAN:
vEdge# config
vEdge(config)# vpn 1 interface ge0/4 nat respond-to-ping
vEdge(config-nat)# show full-configuration
vpn 1
interface ge0/4
nat
respond-to-ping
!
!
!
Operational Commands
show ip nat filter
show ip nat interface
retransmit-interval
vpn router ospf area interface retransmit-interval—Set the interval at which the router retransmits OSPF
link-state advertisements (LSAs) to its adjacencies (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
area number
interface interface-name
retransmit-interval seconds
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ospf interface
rewrite-rule
rewrite-rule—Configure a rewrite rule to overwrite the DSCP field of a packet's outer IP header, mark transit
traffic with an 802.1p CoS value, and apply a rewrite rule on an interface (on vEdge routers only). A rewrite
rule is applied to packets being transmitted out the interface.
You can apply rewrite rules to both unicast and multicast traffic.
Command Hierarchy
Create a Rewrite Rule
policy
rewrite-rule rule-name
class class-name loss-priority dscp dscp-value layer-2-cos number
Syntax Description
Note Cisco IOS XE SD-WAN supports maximum of 64 entries only per rewrite rule.
Command History
Release Modification
Examples
Operational Commands
show running-config policy
show running-config vpn
route-consistency-check
system route-consistency-check—Check whether the IPv4 routes in the router's route and forwarding tables
are consistent (on vEdge routers only). Performing route consistency checks is useful when you are
troubleshooting routing and forwarding problems. However, the checking requires a large amount of device
CPU, so it is recommended that you enable it only when you trouble shooting an issue and that you disable
it at other times.
By default, route consistency checking is disabled.
Command Hierarchy
system
route-consistency-check
Syntax Description
None
Command History
Release Modification
Examples
Operational Commands
show ip fib
show ip routes
Related Topics
ip route, on page 340
ipv6 route, on page 351
route-policy
policy route-policy—Configure or apply a localized control policy (on vEdge routers only). For BGP, you
apply the policy to an address family running on a specific BGP neighbor. For OSPF, you can apply the policy
either to specific types of routes being redistributed into OSPF or to all inbound traffic.
Command Hierarchy
Create a Localized Control Policy
policy
route-policy policy-name
default-action action
sequence number
match
address list-name
as-path list-name
community list-name
ext-community list-name
local-preference number
metric number
next-hop list-name
omp-tag number
origin (egp | igp | incomplete)
ospf-tag number
peer address
action
reject
accept
set
aggregator number
as-path (exclude | prepend) as-number
atomic-aggregate
community value
local-preference number
metric number
metric-type (type1 | type2)
next-hop ip-address
omp-tag number
origin (egp | igp | incomplete)
originator ip-address
ospf-tag number
weight number
Syntax Description
Command History
Release Modification
15.4 Added support for configuring route policy on all OSPF inbound routes (route-policy
in).
Operational Commands
show ip routes detail
show running-config
Related Topics
policy, on page 482
redistribute, on page 529
router
Configure the BGP, OSPF, and PIM routing protocol to run in a VPN (on vEdge routers only). You can
configure BGP and OSPF routing protocols in all VPNs except for VPN 512, which is the management VPN.
You can configure PIM in all VPNs except for VPN 0, which is the transport VPN reserved for the control
plane, and VPN 512.
Command Hierarchy
vpn vpn-id
router
bgp ...
igmp ...
multicast-replicator local [threshold number]
ospf ...
pim ...
Command History
Release Modification
Examples
Operational Commands
show bgp neighbor
show bgp routes
show bgp summary
show igmp groups
router-id
Configure the OSPF router ID, which is the IP address associated with the router for OSPF adjacencies (on
vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
router-id ipv4-address
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ospf process
Related Topics
priority, on page 501
system-ip, on page 586
router-id
Configure the BGP router ID, which is the IP address associated with the router for BGP sessions (on vEdge
routers only).
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
router-id ip-address
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show bgp summary
Related Topics
system-ip, on page 586
secret
To configure the secret key for Umbrella registration, on Cisco IOS XE SD-WAN devices, use the secret
command.
secret 0 secret
Syntax Description
Command Mode
config-profile
Command History
Release Modification
Examples
Use parameter-map type umbrella global to enter config-profile mode, then use orgid, api-key, and secret
to configure Umbrella registration.
In config-profile mode, you can use show full-configuration to display Umbrella registration details.
Example
This example configures Umbrella registration details.
Device(config)# parameter-map type umbrella global
Device(config-profile)# orgid 1234567
Device(config-profile)# api-key aaa12345aaa12345aaa12345aaa12345
Device(config-profile)# secret 0 bbb12345bbb12345bbb12345bbb12345
security
Configure security parameters (on vEdge routers, vManage NMSs, and vSmart controllers only).
Command Hierarchy
security
control
protocol (dtls | tls)
tls-port number
ipsec (on vEdge routers only)
authentication-type type
rekey seconds
replay-window number
Command History
Release Modification
Operational Commands
show tunnel local-sa
show control summary
send-community
Send the local router's BGP community attribute to the BGP neighbor (on vEdge routers only).
This feature is disabled by default. If you have configured it, use the no send-community command to return
to the default.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
send-community
Command History
Release Modification
Examples
Configure the local vEdge router to send the BGP community attribute to its BGP neighbor
vEdge# show running-config vpn 1 router bgp neighbor 1.10.10.10
vpn 1
router
bgp 123
neighbor 1.10.10.10
no shutdown
remote-as 456
send-community
!
!
!
!
!
Operational Commands
show bgp neighbor
send-ext-community
Send the local router's BGP extended community attribute to the BGP neighbor (on vEdge routers only). This
feature is disabled by default. If you enable it, use the no send-ext-community configuration command to
disable it.
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
send-ext-community
Command History
Release Modification
Examples
Configure the local vEdge router to send the BGP extended community attribute to its BGP neighbor
vm1# show running-config vpn 1 router bgp neighbor 1.10.10.10
vpn 1
router
bgp 123
neighbor 1.10.10.10
no shutdown
remote-as 456
send-ext-community
!
!
!
!
!
Operational Commands
show bgp neighbor
send-path-limit
Configure the maximum number of equal-cost routes that are advertised per prefix (on vSmart controllers
and vEdge routers only).
Command Hierarchy
omp
send-path-limit number
Syntax Description
Command History
Release Modification
Operational Commands
show omp routes
service
Configure a service, such as a firewall or IDS, that is present on the local network in which the vEdge router
is located (on vEdge routers only). Configuring a service allows it to be used in a service chaining policy.
You can configure services in all VPNs except for VPN 0, which is the transport VPN reserved for the control
plane.
Command Hierarchy
vpn vpn-id
service service-name address ip-address
vpn vpn-id
service service-name interface grenumber1 [grenumber2]
Syntax Description
Command History
Release Modification
Examples
shaping-rate
Configure the aggregate traffic rate on an interface to be less than line rate so that the interface transmits less
traffic than it is capable of transmitting (on vEdge routers only). The interface cannot be a VLAN interface
(subinterface).
Shaping rate below 2M is not supported on the following Cisco vEdge devices: Cisco vEdge100b, Cisco
vEdge100m, Cisco vEdge 1000, and Cisco vEdge 2000.
Command Hierarchy
vpn vpn-id
interface interface-name
shaping-rate kbps
Syntax Description
Command History
Release Modification
17.1 Starting with this release, you can no longer configure shaping-rate on a VLAN
interface
Examples
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
shaping-rate 100000
!
!
Operational Commands
show running-config vpn
shutdown
Disable a parameter or property. The no form of the command enables a parameter or property.
Command Hierarchy
Instances of the shutdown and no shutdown command appear throughout the configuration command
hierarchy on vEdge devices.
Command History
Release Modification
Examples
This example enables four interfaces and VPN 0 by including the no shutdown command in the
configuration
vEdge# show running-config vpn 0
vpn 0
interface ge0/0
ip address 10.1.16.16/24
tunnel-interface
color lte
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
!
interface ge0/1
ip address 10.1.18.16/24
no shutdown
!
interface ge0/2
shutdown
!
interface ge0/3
ip address 10.0.21.16/24
no shutdown
!
interface ge0/7
ip address 10.0.100.16/24
no shutdown
!
The IF OPER STATUS column in the show interface command output reports that ge0/0, ge0/1,
ge0/3, and ge0/7 are operational, as per our configuration, and ge0/2 is down:
vEdge# show interface vpn 0
IF IF
Operational Commands
The show commands for the various device functionalities indicate whether that functionality is operationally
up (that is, enabled) or operationally down (that is, disabled).
site-id
Configure the identifier of the site in the Cisco SD-WAN overlay network, such as a branch, campus, or data
center, in which the device resides (for vEdge routers, vManage NMSs, and vSmart controllers).
Command Hierarchy
system
site-id site-id
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show control local-properties
sla-class
Create groupings of properties that identify an application for a policy to use with application-aware routing
(on vSmart controllers only). You can configure a maximum of four SLA classes.
Command Hierarchy
policy
sla-class sla-class-name
jitter milliseconds
latency milliseconds
loss percentage
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show running-config policy sla-class
snmp
Configure the Simple Network Management Protocol. The Cisco SD-WAN software supports SNMPv2 and
SNMPv3 simultaneously. By default, SNMP is disabled.
Command Hierarchy
snmp
community name
authorization (read-only | read-write)
view string
contact string
group group-name authentication
view string
location string
name string
[no] shutdown
trap
group group-name
trap-type
level severity
target vpn vpn-id ip-address udp-port
community-name community-name
group-name group-name
source-interface interface-name
user username
auth authentication
auth-password password
group group-name
priv privacy
priv-password password
view string
oid oid-subtree [exclude]
Command History
Release Modification
Operational Commands
show running-config snmp
sp-organization-name
Configure the name of your service provider for a vBond orchestrator or vSmart controller that is part of a
software multitenant architecture (on vBond orchestrators and vSmart controllers).
Command Hierarchy
system
sp-organization-name name
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show control local-properties
show orchestrator local-properties
Related Topics
request csr upload, on page 844
speed
Set the speed of the interface. Configure the interface speed, for use when the remote end of the connection
does not support autonegotiation.
On all vEdge router models, all interfaces support 1-Gigabit Ethernet SFPs. These SFPs can either be copper
or fiber. For fiber SFPs, the supported speed is 1 Gbps full duplex. For copper SFPs, the supported speeds
are 10/100/1000 Mbps and half/full duplex. By default, the router autonegotiates the speed and duplex values
for the interfaces.
To use a fixed speed and duplex configuration for interfaces that do not support autonegotiation, you must
disable autonegotiation and then use the speed and duplex commands to set the appropriate interface link
characteristics.
Command Hierarchy
vpn vpn-id
interface interface-name
speed speed
Syntax Description
Command History
Release Modification
Examples
vEdge(config-interface-ge0/0)# no autonegotiate
vEdge(config-interface-ge0/0)# speed 100
Operational Commands
show interface
Related Topics
autonegotiate, on page 128
duplex, on page 247
spt-threshold
Configure when a PIM router should join the shortest-path source tree (SPT) (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
pim
spt-threshold kbps
Syntax Description
Command History
Release Modification
Operational Commands
show multicastreplicator
show multicast rpf
show multicast topology
show multicast tunnel
show omp multicast-auto-discover
show omp multicast-routes
show pim interface
show pim neighbor
show pim rp-mapping
ssid
Configure the service set identifier (SSID) for a WLAN (on vEdge cellular wireless routers only). You can
configure up to four SSIDs.
Each SSID is called a virtual access point (VAP) interface. To a client, each VAP interfaces appears as a
different access point (AP) with its own SSID. To provide access to different networks, assign each VAP to
a different VLAN.
Command Hierarchy
wlan radio-band
interface vapnumber
ssid ssid
Syntax Description
Command History
Release Modification
Examples
ssid tb31_pm6_5ghz_vap2
data-security wpa/wpa2-personal
mgmt-security optional
wpa-personal-key $4$BES+IEZB2vcQpeEoSR4ia9JqgDsPNoHukAb8fvxAg5I=
no shutdown
!
interface vap3
ssid tb31_pm6_5ghz_vap3
data-security wpa2-enterprise
mgmt-security optional
radius-servers tag1
no shutdown
!
!
Operational Commands
clear wlan radius-stats
show interface
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
static
Configure static NAT address mappings (on vEdge routers only).
In service VPNs (VPNs except VPN 0 and VPN 512, configure static NAT address mappings on a vEdge
router that is acting as a NAT device. Across all NAT pools, a vEdge router can NAT a maximum of 254
source IP addresses. This is the number of addresses in a /24 prefix, less the .0 and .255 addresses. You cannot
configure translation for .0 and .255 addresses.
In the transport VPN (VPN 0), configure static NAT address mappings to a pool of NAT addresses. You can
configure as many static address mappings as there are IP address in the configured NAT pool. If you configure
no static mappings, NAT address mapping is performed dynamically.
Command Hierarchy
In service VPNs:
vpn vpn-id
interface natpool number
nat
static source-ip ip-address1 translate-ip ip-address2 (inside | outside)
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
Related Topics
encapsulation, on page 256
direction, on page 233
natpool, on page 444
overload, on page 468
static-ingress-qos
Allocate ingress traffic on an interface to a specific queue (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
static-ingress-qos number
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show running-config vpn
static-lease
Assign a static IP address to a client device on the service-side network (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface ge number | subinterface
dhcp-server
static-lease mac-address ip ip-address host-name hostname
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show dhcp interfaces
show dhcp server
stub
Configure an OSPF stub area (on vEdge routers only). A stub area is an area that OSPF does not flood AS
external link-state advertisements (Type 5 LSAs).
Command Hierarchy
vpn vpn-id
router
ospf
area number
stub
no-summary
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show ospf neighbor detail
system
Configure system-wide parameters.
Command Hierarchy
system
aaa
admin-auth-order (local | radius | tacacs)
auth-fallback
auth-order (local | radius | tacacs)
logs
audit-disable
netconf-disable
radius-servers tag
user username
group group-name
password password
usergroup group-name
task (interface | policy | routing | security | system) (read | write)
admin-tech-on-failure
allow-same-site-tunnels
archive
interval minutes
path file-path/filename
ssh-id-file file-path/filename
vpn vpn-id
clock
timezone timezone
console-baud-rate rate
control-session-pps rate
description text
device-groups group-name
domain-id domain-id
eco-friendly-mode (on vEdge Cloud routers only)
gps-location (latitude decimal-degrees | longitude decimal-degrees)
host-name string
host-policer-pps rate
icmp-error-pps rate
idle-timeout minutes
iptables-enable
location string
logging
disk
enable
file
name filename
rotate number
size megabytes
priority priority
host
name (name | ip-address)
port udp-port-number
priority priority
Command History
Release Modification
Examples
Operational Commands
show aaa usergroup
show control local-properties
show logging
show ntp associations
show ntp peer
show orchestrator local-properties
show running-config system
show system status
show uptime
show users
system-ip
Configure a system IP address for a vEdge device.
The system IP address is a persistent IP address that identifies the Cisco vEdge device. It is similar to a router
ID on a regular router, which is the address used to identify the router from which packets originated. The
system IP address is used internally as the device's loopback address in the transport VPN (VPN 0). (Note
that this is not the same as a loopback address that you configure for an interface.)
On a vEdge router, the system IP address is used as the router ID for BGP or OSPF. If you configure a router
ID for either of these protocols and it is different from the system IP address, the router ID takes precedence.
Command Hierarchy
system
system-ip ipv4-address
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show control local-properties
show interface vpn 0
Related Topics
ip address, on page 330
router-id, on page 554
router-id, on page 553
system-tunnel-mtu
Configure the MTU to use on the tunnels that send OMP control traffic between Cisco vEdge devices. These
tunnels are internal tunnels used by the devices to exchange control traffic. This MTU value is not related to,
and has no effect on, interface MTUs.
Generally, you never need to modify the system tunnel MTU. The only case when you might consider
configuring this parameter is when you are adjusting the TCP MSS value.
Command Hierarchy
system
system-tunnel-mtu mtu
Syntax Description
mtu MTU:
MTU size to use on tunnels that carry OMP control traffic.
Range: 500 through 2000 bytes
Default: 1024 bytes
Command History
Release Modification
Examples
Explicitly configure the system tunnel MTU to the default value of 1000 bytes
vEdge(config-system)# system-tunnel-mtu 1000
Operational Commands
show running-config system
Related Topics
tcp-mss-adjust, on page 592
tacacs
Configure the properties of a TACACS+ server that is used in conjunction with AAA to authorize and
authenticate users who attempt to access Cisco vEdge devices.
Command Hierarchy
system
tacacs
authentication password-authentication
server ip-address
auth-port port-number
priority number
secret-key password
source-interface interface-name
vpn vpn-id
timeout seconds
Syntax Description
Command History
Release Modification
Examples
Configure TACACS+
vEdge(config)# system tacacs
vEdge(config-tacacs)# server 1.2.3.4 secret-key $4$aCGzJg5k6M8zj4BgLEFXKw==
vEdge(config-server-1.2.3.4)# exit
vEdge(config-tacacs)# exit
vEdge(config-system)# aaa auth-order local tacacs
vEdge(config-aaa)# exit
vm5(config-system)# show configuration
system
aaa
auth-order local tacacs
!
tacacs
server 1.2.3.4
secret-key $4$aCGzJg5k6M8zj4BgLEFXKw==
vpn 1
exit
!
!
Operational Commands
show running-config system tacacs
Related Topics
aaa, on page 43
admin-auth-order, on page 73
auth-fallback, on page 108
auth-order, on page 111
radius, on page 518
tcp-mss-adjust
Configure the maximum segment size (MSS) of TCP SYN packets passing through a device. By default, the
MSS is dynamically adjusted based on the interface or tunnel MTU such that TCP SYN packets are never
fragmented. For data sent over an interface, the MSS is calculated by adding the interface maximum
transmission unit (MTU), the IP header length, and the maximum TCP header length. For data sent over a
tunnel, the MSS is the sum of the tunnel MTU, the IP header length, and the maximum TCP header length.
The resulting TCP MSS ADJUST will be always a value 84 bytes lower than the MTU, or less. The reason
for this is that the MSS value is derived as:
MSS = MTU – (TCP header with maximum options) – (IP header) – (MPLS header)
MSS = MTU – (60) – (20) – (4)
Command Hierarchy
vpn vpn-id
interface interface-name
tcp-mss-adjust bytes
Syntax Description
Command History
Release Modification
15.3 TCP SYN MSS dynamically adjusted based on the interface or tunnel MTU.
16.3 Maximum TCP MSS changed from 1460 bytes to 1960 bytes.
Examples
IF IF
TCP
ADMIN OPER ENCAP
SPEED MSS RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR
MBPS DUPLEX ADJUST UPTIME PACKETS PACKETS
-----------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 10.1.15.15/24 Up Up null transport 1500 00:0c:29:7d:1e:fe
10 full 1420 0:04:12:25 202419 218746
0 ge0/1 10.1.17.15/24 Up Up null service 1500 00:0c:29:7d:1e:08
10 full 1400 0:04:04:10 448 5
0 ge0/2 - Down Up null service 1500 00:0c:29:7d:1e:12
10 full 1420 0:04:12:33 448 0
0 ge0/3 10.0.20.15/24 Up Up null service 1500 00:0c:29:7d:1e:1c
10 full 1420 0:04:04:10 453 5
0 ge0/6 57.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:3a
10 full 1420 0:04:04:10 448 4
0 ge0/7 10.0.100.15/24 Up Up null service 1500 00:0c:29:7d:1e:44
10 full 1420 0:04:10:19 1044 594
0 system 172.16.255.15/32 Up Up null loopback 1500 00:00:00:00:00:00
10 full 1420 0:04:03:49 0 0
1 ge0/4 10.20.24.15/24 Up Up null service 1500 00:0c:29:7d:1e:26
10 full 1420 0:04:04:07 2009 1603
1 ge0/5 56.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:30
10 full 1420 0:04:04:07 448 4
512 eth0 10.0.1.15/24 Up Up null service 1500 00:50:56:00:01:0f
1000 full 0 0:04:12:18 7581 4581
Operational Commands
show interface
Related Topics
system-tunnel-mtu, on page 588
tcp-optimization
Fine-tune TCP to decrease round-trip latency and improve throughput for TCP traffic (on vEdge routers only).
You can configure TCP optimization in service-side VPNs only (VPNs other than VPN 0 and VPN 512).
Optimizing TCP traffic can be useful for improving the performance of SaaS applications, transcontinental
links, and high-latency transport devices such as VSAT satellite communications systems.
By default, TCP optimization is disabled.
To configure TCP optimization for individual traffic flows rather than across a VPN, create a centralized data
policy that includes the tcp-opt action.
Command Hierarchy
vpn vpn-id
tcp-optimization
Command History
Release Modification
Examples
Operational Commands
show app tcp-opt
Related Topics
tcp-optimization-enabled, on page 595
tcp-optimization-enabled
Enabled TCP optimization (on vEdge routers only).
On vEdge 1000 and vEdge 2000 routers, enabling TCP optimization carves out a separate CPU core to use
for the optimization, because TCP optimization is CPU intensive.
Command Hierarchy
system
tcp-optimization-enabled
Command History
Release Modification
Examples
Operational Commands
show app tcp-opt
Related Topics
tcp-optimization, on page 594
tcp-syn-flood-limit
Configure the number of TCP SYN packets that the router can receive while establishing a TCP connection
to use for a zone-based firewall before the router shuts down the connection (on vEdge routers only).
Command Hierarchy
policy
tcp-syn-flood-limit number
Syntax Description
Command History
Release Modification
Examples
For a zone-based firewall, change the number of TCP SYN packets that the router can receive from
the default of 2000 to 2200
vEdge# show running-config policy
policy
tcp-syn-flood-limit 2200
zone A
vpn 1
!
zone B
vpn 2
vpn 3
vpn 4
!
zone-to-nozone-internet allow
zone-pair zbfw-pair-1
source-zone A
destination-zone B
zone-policy zbfw-policy-1
!
zone-based-policy zbfw-policy-1
sequence 1
match
protocol 6
!
action inspect
!
!
default-action drop
!
!
Operational Commands
show policy zbfw global-statistics
Related Topics
vpn-membership, on page 672
zone, on page 682
tcp-timeout
Configure when NAT translations over a TCP session time out (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
nat
tcp-timeout minutes
Syntax Description
minutes Time:
Time after which NAT translations over TCP sessions time out.
Range: 1 through 65536 minutes
Default: 60 minutes (1 hour)
Command History
Release Modification
Examples
Change the NAT translation timeout value for TCP sessions to 2 hours
vEdge# config
vEdge(config)# vpn 1 interface ge0/4 nat tcp-timeout 120
vEdge(config-nat)# show full-configuration
vpn 1
interface ge0/4
nat
tcp-timeout 120
!
!
!
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
technology
Associate a radio access technology (RAT) with a cellular interface (on vEdge routers only).
Command Hierarchy
vpn 0
interface cellular number
technology technology
Syntax Description
Command History
Release Modification
Examples
no allow-service stun
!
mtu 1428
profile 0
technology auto
no shutdown
!
!
Operational Commands
clear cellular errors
clear cellular session statistics
show cellular modem
show cellular network
show cellular profiles
show cellular radio
show cellular sessions
show cellular status
show interface
Related Topics
profile, on page 507
template-refresh
How often to send the cflowd template record fields to the collector (on vSmart controllers only).
Command Hierarchy
policy
cflowd-template template-name
template-refresh seconds
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear app cflowd flows (on vEdge routers only)
clear app cflowd statistics (on vEdge routers only)
timeout inactivity
Set how long to wait before revoking the authentication of an client that is using 802.1X to access a network
(on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
timeout
inactivity minutes
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
timer
Configure the DNS cache timeout value.
Command Hierarchy
system
timer
dns-cache-timeout minutes
Syntax Description
Command History
Release Modification
Examples
dns-name 10.1.14.14
site-id 100
domain-id 1
protocol dtls
tls-port 0
system-ip 172.16.255.11
chassis-num/unique-id b9a28025-5954-456b-9028-9d74d3ed4e2a
serial-num NOT-A-HARDWARE
keygen-interval 1:00:00:00
register-interval 0:00:00:30
retry-interval 0:00:00:17
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:15:00
port-hopped TRUE
time-since-last-port-hop 0:02:44:55
number-vbond-peers 0
number-active-wan-interfaces 1
...
Operational Commands
clear dns cache
show control local-properties
Related Topics
vbond, on page 658
timers
Configure OSPF timers (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
ospf
timers
spf delay initial-hold-time maximum-hold-time
Syntax Description
Command History
Release Modification
Examples
exit
exit
!
!
!
vEdge# show ospf process | include time
spf-holdtime 1200
spf-max-holdtime 15000
spf-last-exec-time 2607
Operational Commands
show ospf process
timers
Configure global and per-neighbor BGP timers (on vEdge routers only).
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
timers
holdtime seconds
keepalive seconds
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
timers
advertisement-interval seconds
connect-retry seconds
holdtime seconds
keepalive seconds
Syntax Description
Command History
Release Modification
Examples
Modify the connection retry time and the advertisement interval for a BGP neighbor
vEdge# show running-config vpn 1 router bgp neighbor 10.20.25.18
vpn 1
router
bgp 1
neighbor 10.20.25.18
no shutdown
remote-as 2
timers
connect-retry 60
!
password $4$L3rwZmsIiZB6wtBgLEFXKw==
!
!
!
!
Operational Commands
show bgp neighbor detail
timers
Configure OMP timers on vEdge routers and vSmart controllers.
When you change an OMP timer on a device, the BFD sessions on that device go down and then come back
up.
Command Hierarchy
omp
timers
advertisement-interval seconds
eor-timer seconds
graceful-restart-timer seconds
holdtime seconds
Syntax Description
Command History
Release Modification
14.2 Removed keepalive option; changed default hold-time interval from 15 to 60 seconds;
added graceful-restart-timer command.
15.3.5 Change default graceful restart timer value to 12 hours, and changed maximum graceful
restart timer value to 7 days.
Examples
Operational Commands
show omp summary
Related Topics
graceful-restart, on page 272
rekey, on page 533
tloc-extension
Bind this interface, which connects to another vEdge router at the same physical site, to the local router's
WAN transport interface (on vEdge routers only). Note that you can configure the two routers themselves
with different site identifiers.
You cannot configure TLOC extensions on cellular (LTE) interfaces.
Command Hierarchy
vpn 0
interface interface-name
tloc-extension interface-name
Syntax Description
Command History
Release Modification
Examples
In this example, vEdge2 has two circuits, one to the Internet and the second to an MPLS network.
vEdge1 is also located at the same site, but has no circuits. This configuration binds two subinterfaces
from vEdge1 to the two circuit interfaces on vEdge2 so that vEdge1 can establish TLOCs on the
overlay network.
vEdge1# show running-config vpn 0
interface ge0/2.101
ip address 101.1.19.15/24
mtu 1496
tunnel-interface
color red
!
no shutdown
!
interface ge0/2.102
ip address 102.1.19.15/24
mtu 1496
tunnel-interface
color blue
!
no shutdown
!
Operational Commands
show bfd sessions
show control connections
show interface
show omp tlocs
Related Topics
allow-same-site-tunnels, on page 83
tloc-extension-gre-from
Configure an interface as an extended interface, to channel TLOC traffic from a source branch router to the
local WAN interface (on IOS XE routers only).
Command Hierarchy
sdwan
interface interface-name
tloc-extension-gre-from extended-wan-interface-ip-address xconnect wan-interface-name
Syntax Description
Command History
Release Modification
Examples
Bind two subinterfaces from Router 1 to two circuit interfaces on Router 2 so that Router 1 can establish
TLOC connections in the overlay network. Router 2 has two circuits, one to the Internet and the second to an
MPLS network. Router 1 is also located at the same site, but has no circuits and is on a different L3 network.
ISRK2# show sdwan running-config
sdwan
interface ge0/2.101
encapsulation dot1q 101
ip address 30.1.19.16/24
mtu 1496
!
interface ge0/2.102
encapsulation dot1q 102
ip address 40.1.19.16/24
mtu 1496
!
sdwan
interface ge0/0
ip address 172.16.255.2
tunnel-interface
color lte
!
interface ge0/2.101
tloc-extension-gre-from 10.1.19.15 xconnect GigabitEthernet0/0
!
interface ge0/2.102
tloc-extension-gre-from 20.1.19.15 xconnect GigabitEthernet0/3
!
interface ge0/3
ip address 172.16.255.16
tunnel-interface
color mpls
!
!
!
Operational Commands
show sdwan bfd sessions
show sdwan control connections
show sdwan control local-properties
show sdwan interface
show sdwan omp tlocs
Related Topics
tloc-extension-gre-to, on page 619
tloc-extension-gre-to
Configure a tunnel interface over which to run TLOC extensions (on IOS XE routers only). TLOC extensions
allow you to extend a TLOC, over a GRE tunnel, to another router in the branch.
Command Hierarchy
sdwan
interface interface-name
tunnel-interface
tloc-extension-gre-to extended-interface-ip-address
Syntax Description
Command History
Release Modification
Examples
Create a GRE tunnel from Router 1 to Router 2 over an L3 network. Router 2 has two circuits, one to the
Internet and the second to an MPLS network. Router 1 is located at the same site, but has no circuits and is
on a different L3 network.
ISRK1# show sdwan running-config
sdwan
interface ge0/2.101
no shutdown
encapsulation dot1 101
ip address 10.1.19.15/24
mtu 1496
!
interface ge0/2.102
no shutdown
encapsulation dot1 102
ip address 20.1.19.15/24
mtu 1496
!
interface Tunnel1
no shutdown
ip unnumbered GigabitEthernet0/2.101
tunnel source GigabitEthernet0/2.101
tunnel mode sdwan
!
interface Tunnel2
no shutdown
ip unnumbered GigabitEthernet0/2.102
tunnel source GigabitEthernet0/2.102
tunnel mode sdwan
!
sdwan
interface ge0/2.101
tunnel-interface
color lte
tloc-extension-gre-to 30.1.19.16
!
interface ge0/2.102
tunnel-interface
color mpls
tloc-extension-gre-to 40.1.19.16
!
!
Operational Commands
show sdwan bfd sessions
show sdwan control connections
show sdwan control local-properties
show sdwan interface
show sdwan omp tlocs
Related Topics
tloc-extension-gre-from, on page 617
track-default-gateway
For a static route, determine whether the next hop is reachable before adding that route to the device's route
table. By default, this function is enabled.
With gateway tracking enabled, the software sends ARP messages every 10 seconds to the next hop of a static
route. If the software receives an ARP response, it places the static route into the local route table. After 10
consecutive ARP responses are missed, the static route is removed from the route table. The software continues
to periodically send ARP messages, and as soon as it once again receives an ARP responses, the static route
is added back to the route table.
Command Hierarchy
system
track-default-gateway
Command History
Release Modification
Examples
Have the device determine whether the next hop for a static route is reachable before placing the static route
in the local route table:
system
track-default-gateway
Operational Commands
show ip routes
Related Topics
ip route, on page 340
track-interface-tag
Configure a tag to apply to routes associated with a network that is connected to a non-operational interface
(on vEdge routers only). Specifically, the tagging occurs only when a vEdge router has been unable to reset
a port that has stopped transmitting packets but whose status remains Up. This error is reported by the "PCS
issue detected" alarm.
Command Hierarchy
system
track-interface-tag number
Syntax Description
number Tag:
Set the tag string to include in routes associated with a network that is connected to a non-operational
interface.
Range: 1 through 4294967295
Command History
Release Modification
Examples
On a vEdge router, set a tag for tracking a non-operational interface, and on a vSmart controller
create a policy to send data traffic on an alternate path around the interface
vEdge# show running-config system
system
track-interface-tag 555
...
vSmart# show running-config policy
policy
control-policy pcs-policy
sequence 10
match route
omp-tag 555
!
action accept
set
preference 5
!
!
!
default-action accept
!
!
Operational Commands
show running-config system
Related Topics
track-interface-tag, on page 622
track-transport
Checks whether the routed path between the local device and a vBond orchestrator is up using ICMP probes
at regular interval of 3s. By default, transport checking is enabled.
Command Hierarchy
system
[no] track-transport
Command History
Release Modification
Examples
Explicitly configure regular monitoring of the DTLS connection to the vBond orchestrator.
vEdge(config-system)# track-transport
vedge(config-system)# commit and-quit
Commit complete.
vEdge# show transport connection
TRACK
TYPE SOURCE DESTINATION HOST INDEX TIME STATE
----------------------------------------------------------------------------------------
system - 2001:cdba::1:2 system12.vbond 0 Wed May 10 10:27:29 2017 up
system - 2001:cdba::1:3 system12.vbond 0 Wed May 10 10:29:01 2017 up
1 Wed May 10 10:27:30 2017 down
Operational Commands
show transport connection
tracker
Track the status of transport interfaces that connect to the internet (on vEdge routers only).
Tracker uses HTTP. If you are using an endpoint that does not respond to HTTP, then the tracker will remain
in a down state. You need the response to be 200 OK for an up state.
Tracking the interface status is useful when you enable NAT on a transport interface in VPN 0 to allow data
traffic from the router to exit directly to the internet rather than having to first go to a router in a data center.
In this situation, enabling NAT on the transport interface splits the TLOC between the local router and the
data center into two, with one going to the remote router and the other going to the internet.
When you enable transport tunnel tracking, the software periodically probes the path to the internet to determine
whether it is up. If the software detects that this path is down, it withdraws the route to the internet destination,
and traffic destined to the internet is then routed through the data center router. When the software detects
that the path to the internet is again functioning, the route to the internet is reinstalled.
Enable Layer 7 Health Check feature helps in maintaining tunnels health by providing ability to failover of
the tunnels. This helps in minimizing brown out scenarios. Tracker module with endpoint-api-url is used for
L7 Health check in vEdge SD-WAN routers. The Direct Internet Access (DIA) traffic ingressing on SD-WAN
service VPNs is tunnelled to the Secure Internet Gateways (SIG) for securing enterprise traffic. All LAN/WIFI
enabled enterprise client’s traffic, based on routing, is forwarded to the SIG.
Command Hierarchy
system
tracker tracker-name
endpoint-dns-name dns-name
endpoint-ip ip-address
endpoint-api-url api-url
interval seconds
multiplier number
threshold milliseconds
vpn 0
interface interface-name
tracker tracker-name
Syntax Description
endpoint-api-url api-url DNS API URL of tunnel interface Internet security endpoint. This is the
destination in the internet to which the router sends probes to determine the status
of the transport tunnel interface. For each tracker, you must configure either one
DNS name or one IP address or URL.
Command History
Release Modification
Usage Guidelines
Note The endpoint-api-url keyword is supported on IPSec and GRE interfaces. However, endpoint-ip and
endpoint-dns are not supported on IPSec/GRE interfaces.
The endpoint-api-url is used directly on tunnel interface. NAT is not required for tunnels in the Transport
side.
Examples
Enable transport tracking on a NAT interface.
system
tracker nat-tracker
endpoint-ip 1.2.3.4
vpn 0
interface ge0/1
nat
tracker nat-tracker
Related Topics
nat, on page 440
trap group
Configure SNMP trap groups.
For each trap generated by a vEdge device, the device also generates a notification message. Use the show
notification stream command to display these messages.
For SNMPv3, the PDU type for notifications ie either SNMPv2c inform (InformRequest-PDU) or trap
(Trapv2-PDU).
Command Hierarchy
snmp
trap
group group-name
trap-type
level severity
Syntax Description
Command History
Release Modification
Examples
Configure trap groups and associate them with SNMP trap servers.
vEdge(config-snmp)# show full-configuration
snmp
view snmp-view
!
community public
view snmp-view
authorization read-only
!
trap target 0 10.0.0.1 162
group-name all-traps
community-name public
!
trap target 0 10.0.0.2 162
group-name critical-traps
community-name public
!
trap group all-traps
all
Operational Commands
show running-config snmp
Related Topics
show notification stream, on page 1120
trap target, on page 631
trap target
Configure the target SNMP server to receive the SNMP traps generated by this device.
For each trap generated by a vEdge device, the device also generates a notification message. Use the show
notification stream viptela command to display these messages.
Command Hierarchy
snmp
trap
target vpn vpn-id ipv4-address udp-port
community-name community-name
group-name name
source-interface interface-name
Syntax Description
Command History
Release Modification
Release Modification
Examples
Configure trap groups and associate them with SNMP trap servers
vEdge# show running-config snmp
snmp
no shutdown
view v2
oid 1.3.6.1
!
community private
view v2
authorization read-only
!
trap target vpn 0 10.0.100.1 162
group-name test
community-name private
source-interface eth0
!
trap target vpn 0 10.0.100.1 16662
group-name test
community-name private
source-interface eht0
!
trap group test
all
level critical major minor
!
!
!
Operational Commands
show running-config snmp
Related Topics
show notification stream, on page 1120
trap group, on page 628
tunnel-destination
Configure the destination IP address of a GRE tunnel interface (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface gre number
tunnel-destination ip-address
Syntax Description
ip-address IP Address:
IP address of the destination of a GRE tunnel interface.
Command History
Release Modification
Examples
Operational Commands
show interface
show tunnel gre-keepalives
show tunnel statistics
Related Topics
keepalive, on page 357
tunnel-source, on page 640
tunnel-destination
Configure the destination IP address of an IPsec tunnel that is being used for IKE key exchange (on vEdge
routers only).
Command Hierarchy
vpn vpn-id
interface ipsec number
tunnel-destination (dns-name | ipv4-address)
Syntax Description
Command History
Release Modification
Examples
Configure a destination of an IPsec tunnel being used for IKE key exchange
vEdge(config)# vpn 1 interface ipsec1 tunnel-destination dns.viptela.com
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
Related Topics
ike, on page 302
tunnel-source, on page 639
tunnel-interface
Configure the interface to be a secure DTLS or TLS WAN transport connection (on vEdge routers, vManage
NMSs, and vSmart controllers only). Configuring an interface to be a transport tunnel enables the flow of
control and data traffic on the interface. On vEdge routers, it configures the interface's TLOC attributes, which
are carried in the TLOC OMP routes that the vEdge router sends to the vSmart controllers in its domain. For
the TLOC attributes on vEdge routers, you must configure, at a minimum, a color and an encapsulation type.
These two attributes, along with the router's system IP address, are the 3-tuple that uniquely identify each
TLOC.
Because tunnel interfaces connect to the WAN transport, they can be present only in VPN 0, so you can
include the tunnel-interface command only when configuring VPN 0.
On vEdge routers, you can configure up to six tunnel interfaces (a combination of tunnel interfaces on both
physical and loopback interfaces). On vSmart controllers, you can configure only one tunnel interface.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
allow-service service-name
bind interface-name (on vEdge routers only)
carrier carrier-name
color color [restrict]
encapsulation (gre | ipsec) (on vEdge routers only)
preference number
weight number
exclude-controller-group-list number (on vEdge routers only)
group group-id
hello-interval milliseconds
hello-tolerance seconds
hold-time milliseconds (on vEdge routers only)
last-resort-circuit (on vEdge routers only)
low-bandwidth-link (on vEdge routers only)
max-control-connections number (on vEdge routers only)
nat-refresh-interval seconds
port-hop
vbond-as-stun-server (on vEdge routers only)
vmanage-connection-preference number (on vEdge routers only)
Command History
Release Modification
Release Modification
Examples
Operational Commands
show control connections
show interface
show omp tlocs and show omp tlocs detail (to display configured preference and weight values)
tunnel-source
Configure the source IP address of an IPsec tunnel that is being used for IKE key exchange (on vEdge routers
only). To configure the physical interface that is the source of an IPsec tunnel, use the tunnel-source-interface
command.
Command Hierarchy
vpn vpn-id
interface ipsec number
(tunnel-source ipv4-address | tunnel-source-interface interface-name)
Syntax Description
Command History
Release Modification
Examples
Configure the source IPv4 address of the IPsec tunnel used for IKE key exchange
vEdge(config)# vpn 1 interface ipsec1 tunnel-source 10.0.5.11
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
Related Topics
ike, on page 302
tunnel-destination, on page 635
tunnel-source-interface, on page 642
tunnel-source
Configure the source IP address of a GRE tunnel (on vEdge routers only).
To configure the physical interface that is the source of a GRE tunnel, use the tunnel-source-interface
command.
Command Hierarchy
vpn vpn-id
interface gre number
(tunnel-source ip-address | tunnel-source-interface interface-name)
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show interface
show tunnel gre-keepalive
tunnel-source-interface
Configure the physical interface that is the source of an IPsec tunnel that is being used for IKE key exchange
(on vEdge routers only). To configure the IPv4 address that is the source of an IPsec tunnel, use the
tunnel-source command.
Command Hierarchy
vpn vpn-id
interface ipsec number
(tunnel-source ipv4-address | tunnel-source-interface interface-name)
Syntax Description
Command History
Release Modification
Examples
Configure the source physical interface of the IPsec tunnel being used for IKE key exchange
vEdge(config)# vpn 1 interface ipsec1 tunnel-source-interface ge0/2
Operational Commands
clear ipsec ike sessions
show ipsec ike inbound-connections
show ipsec ike outbound-connections
show ipsec ike sessions
Related Topics
ike, on page 302
tunnel-destination, on page 635
tunnel-source, on page 639
tunnel-source-interface
Configure the physical interface that is the source of a GRE tunnel (on vEdge routers only). To configure the
source IP address of a GRE tunnel, use the tunnel-source command.
Command Hierarchy
vpn vpn-id
interface gre number
(tunnel-source ip-address | tunnel-source-interface interface-name)
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show interface
show tunnel gre-keepalive
show tunnel statistics
Related Topics
keepalive, on page 357
tunnel-destination, on page 633
tunnel-source, on page 640
udp-timeout
Configure when NAT translations over a UDP session time out (on vEdge routers only).
Command Hierarchy
vpn vpn-id
interface interface-name
nat
udp-timeout minutes
Syntax Description
minutes Time:
Time after which NAT translations over UDP sessions time out.
Range: 1 through 65536 minutes
Default: 1 minute
Command History
Release Modification
Examples
Change the NAT translation timeout value for UDP sessions to 1 hour
vEdge# config
vEdge(config)# vpn 1 interface ge0/4 nat udp-timeout 60
vEdge(config-nat)# show full-configuration
vpn 1
interface ge0/4
nat
udp-timeout 60
!
!
!
Operational Commands
show ip nat filter
show ip nat interface
show ip nat interface-statistics
update-source
Have BGP use a specific IP address or interface for the TCP connection to the neighbor(on vEdge routers
only).
Command Hierarchy
vpn vpn-id
router
bgp local-as-number
neighbor ip-address
update-source (ip-address | interface-name)
Syntax Description
ip-address IP Address:
IP address to use for the TCP connection to the neighbor, in decimal four-part dotted notation.
Command History
Release Modification
Examples
Configure the IP address to use for the TCP connection to the BGP neighbor
vm6# show running-config vpn 1 router bgp 1 neighbor 10.20.25.18
vpn 1
router
bgp 1
neighbor 10.20.25.18
no shutdown
remote-as 2
!
password $4$L3rwZmsIiZB6wtBgLEFXKw==
update-source 75.0.0.1
!
!
!
!
Operational Commands
show bgp neighbor
upgrade-confirm
Configure the time limit for confirming that a software upgrade is successful. It is recommended that you
configure this on all vEdge devices.
By default, software upgrade confirmation is not enabled. When you enable the confirmation, the device waits
for the amount of time you configure. If the device does not come up within that time, the device reverts to
the previous image.
After you issue the request software install reboot command to upgrade the software and then log in to the
device after the reboot completes, enter the request software upgrade-confirm command within the configured
time limit to confirm that the software upgrade is successful. If you do not, the system automatically reverts
to the previous software image.
Command Hierarchy
system
upgrade-confirm minutes
Syntax Description
Command History
Release Modification
15.2 Support for vBond orchestrator, vManage NMS, and vSmart controller added.
Examples
Set the upgrade confirmation time to 5 minutes. After a software upgrade, when the system reboots
and restarts, if you do not issue a request software upgrade-confirm command within 5 minutes
(either from the CLI or from the vManage NMS), the system automatically reverts to the software
image that was running before the upgrade.
system
upgrade-confirm
!
Operational Commands
request software activate
usb-controller
Enable or disable the USB controller, which drives the external USB ports (on vEdge 1000 and vEdge 2000
series routers only). By default, the USB controller is disabled.
When you change the setting of this command in the configuration, the router reboots immediately, when you
press the Enter key. You are prompted before the reboot occurs.
Enabling the USB controller allows you to copy configurations or files from or to a USB stick installed in the
router.
Note that for vEdge 100 and vEdge 5000 series routers, the USB controller is enabled by default.
Command Hierarchy
system
[no] usb-controller
Command History
Release Modification
Examples
Operational Commands
show hardware environment
user
Configure an SNMPv3 user.
Command Hierarchy
snmp
user username
auth authentication
auth-password password
group group-name
priv privacy
priv-password password
Syntax Description
Command History
Release Modification
Operational Commands
show running-config snmp
Related Topics
group, on page 275
user
system aaa user: Configure a login account for each user who can access the local Cisco vEdge device,
assigning the user a login name and a password and placing them into an authorization group.
Only a user who is logged in as the admin user has permission to create login accounts for users.
If an admin user changes the privileges of a user by changing their group, and if that user is currently logged
in to the device, the user is logged out and must log back in again.
Command Hierarchy
system
aaa
user username
group group-name
password password
Syntax Description
user-name Username:
Name for the user. In Releases 17.1 and later, username can be 1 to 128 characters long, and
it must start with a letter. The name can contain only lowercase letters, the digits 0 through
9, hyphens (-), underscores (_), and periods (.). The name cannot contain any uppercase letters.
In Releases 16.3 and earlier, username can be 1 to 32 characters long, and it must start with
a letter. The name can contain only lowercase letters, the digits 0 through 9, and the hyphen
(-) and underscore (_) characters. The name cannot contain any uppercase letters. The Cisco
SD-WAN software provides one standard username, admin, which is a superuser who has
read and write permissions to all commands and operations on the device.
The following usernames are reserved, so you cannot configure them: backup, basic, bin,
daemon, games, gnats, irc, list, lp, mail, man, news, nobody, proxy, quagga, root, sshd,
sync, sys, uucp, and www-data. Also, names that start with viptela-reserved are reserved.
If a remote server validates authentication and that user is not configured locally, the user is
logged in to the vshell as the user "basic", with a home directory of /home/basic. If a remote
server validates authentication and that user is configured locally, the user is logged in to the
vshell under their local username (say, eve) with a home direction of /home/username (so,
/home/eve).
Command History
Release Modification
17.1 Increased maximum group name to 128 characters and support periods (.) in group
name.
Examples
Operational Commands
show aaa usergroup
show users
Related Topics
auth-fallback, on page 108
auth-order, on page 111
radius, on page 518
tacacs, on page 589
usergroup, on page 656
usergroup
Configure groupings of users and assign authorization privileges to the group. Groups define what tasks the
group members are authorized to perform on the vEdge device.
If an admin user changes the privileges of a user by changing their group, and if that user is currently logged
in to the device, the user is logged out and must log back in again.
Command Hierarchy
system
aaa
usergroup group-name
task (interface | policy | routing | security | system) (read | write)
Syntax Description
Command History
Release Modification
15.3 Force a user to log out when their permissions are changed.
17.1 Increase maximum group name to 128 characters and support periods (.) in group
name.
Examples
Operational Commands
show aaa usergroup
show users
Related Topics
radius, on page 518
tacacs, on page 589
user, on page 653
vbond
Configure the IP address and other information related to the vBond orchestrator.
Command Hierarchy
system
vbond (dns-name | ip-address) [local] [port number] [ztp-server]
In Releases 16.3 and later, the following command hierarchy is also available:
system
vbond [dns-name | host-name | ip-address] [local] [port number] [ztp-server]
Syntax Description
Command History
Release Modification
Release Modification
Examples
Designate the local vEdge router to be a vBond orchestrator in its vEdge overlay network domain:
system
vbond 10.0.4.12 local
!
Operational Commands
nslookup
show control connections
Related Topics
port-hop, on page 493
vbond-as-stun-server
Enable Session Traversal Utilities for NAT (STUN) to allow the tunnel interface to discover its public IP
address and port number when the vEdge router is located behind a NAT (on vEdge routers only). When you
configure this command, vEdge routers can exchange their public IP addresses and port numbers over private
TLOCs.
With this configuration, the vEdge router uses the vBond orchestrator as a STUN server, so the router can
determine its public IP address and public port number. (With this configuration, the router cannot learn the
type of NAT that it is behind.) No overlay network control traffic is sent and no keys are exchanged over
tunnel interface configured to the the vBond orchestrator as a STUN server. However, BFD does come up on
the tunnel, and data traffic can be sent on it.
Because no control traffic is sent over a tunnel interface that is configured to use the vBond orchestrator as a
STUN server, you must configure at least one other tunnel interface on the vEdge router so that it can exchange
control traffic with the vSmart controller and the vManage NMS.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
vbond-as-stun-server
Command History
Release Modification
Examples
Configure two tunnel interfaces, one to use for the exchange of control traffic (ge0/2) and the other
to allow the device to discover its public IP address and port number from the vBond orchestrator
(ge0/1). Note that the no allow-service stun command, which is configured by default on tunnel
interfaces, pertains to allowing or disallowing the vEdge router to generate requests to a generic
STUN server so that the device can determine whether it is behind a NAT and, if so, what kind of
NAT it is and what the device's public IP address and public port number are.
vEdge(config-interface-ge0/1)# show full-configuration
vpn 0
interface ge0/1
ip address 10.0.26.11/24
tunnel-interface
encapsulation ipsec
vbond-as-stun-server
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
no shutdown
!
!
vEdge(config-interface-ge0/1)# exit
vEdge(config-vpn-0)# interface ge0/2
vEdge(config-tunnel-interface)# show full-configuration
vpn 0
interface ge0/2
tunnel-interface
encapsulation ipsec
color lte
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
!
!
!
Operational Commands
show running-config
Related Topics
allow-service, on page 85
view
Define an SNMP MIB view.
Command Hierarchy
snmp
view string
oid oid-subtree [exclude]
Syntax Description
Command History
Release Modification
Examples
no shutdown
view v2
oid 1.3.6.1
!
community private
view v2
authorization read-only
!
!
Operational Commands
show running-config snmp
vlan
Associate a VLAN tag (identifier) with the bridging domain (on vEdge routers only).
Command Hierarchy
bridge bridge-id
vlan vlan-id
Syntax Description
Command History
Release Modification
Examples
Operational Commands
show bridge interface
show bridge mac
show bridge table
vmanage-connection-preference
Set the preference for using a tunnel interface to exchange control traffic with the vManage NMS (on vEdge
routers only). Configuring this option is useful for LTE and other links on which you want to minimize traffic.
Command Hierarchy
vpn 0
interface interface-name
tunnel-interface
vmanage-connection-preference number
Syntax Description
Command History
Release Modification
Examples
Configure a tunnel interface for an LTE interface to be the TLOC that carries control traffic between
the vEdge router and the vManage NMS
vpn 0
interface ge0/0
ip address 10.1.15.15/24
tunnel-interface
color lte
vmanage-connection-preference 8
!
no shutdown
!
Operational Commands
show control local-properties | display xml | include vmanage-connection
Related Topics
low-bandwidth-link, on page 394
vpn
Configure VPNs to use for segmentation of the vEdge overlay network.
Command Hierarchy
vpn vpn-id
bandwidth-downstream kbps (on vEdge routers and vManage NMSs only)
bandwidth-upstream kbps (on vEdge routers and vManage NMSs only)
dns ip-address [primary | secondary]
ecmp-hash-key layer4 (on vEdge routers only)
host hostname ip ip-address
interface interface-name
access-list acl-list (on vEdge routers only)
arp
ip ip-address mac mac-address
arp-timeout seconds (on vEdge routers only)
autonegotiate (on vEdge routers only)
block-non-source-ip (on vEdge routers only)
clear-dont-fragment
dead-peer-detection interval seconds retries number
description text
dhcp-helper ip-address (on vEdge routers only)
dhcp-server (on vEdge routers only)
address-pool prefix/length
exclude ip-address
lease-time seconds
max-leases number
offer-time minutes
options
default-gateway ip-address
dns-servers ip-address
domain-name domain-name
interface-mtu mtu
tftp-servers ip-address
static-lease mac-address ip ip-address host-name hostname
dot1x
accounting-interval seconds
acct-req-attr attribute-number (integer integer | octet octet | string string)
auth-fail-vlan vlan-id
auth-order (mab | radius)
auth-reject-vlan vlan-id
auth-req-attr attribute-number (integer integer | octet octet | string string)
control-direction direction
das
client ip-address
port port-number
require-timestamp
secret-key password
time-window seconds
vpn vpn-id
default-vlan vlan-id
guest-vlan vlan-id
host-mode (multi-auth | multi-host | single-host)
mac-authentication-bypass
allow mac-addresses
server
nas-identifier string
nas-ip-address ip-address
radius-servers tag
reauthentication minutes
timeout
inactivity minutes
wake-on-lan
duplex (full | half)
flow-control (bidirectional | egress | ingress)
ike (on vEdge routers only)
authentication-type type
local-id id
pre-shared-secret password
remote-id id
cipher-suite suite
group number
mode mode
rekey seconds
version number
(ip address prefix/length | ip dhcp-client [dhcp-distance number])
(ipv6 address prefix/length | ipv6 dhcp-client [dhcp-distance number] [dhcp-rapid-commit])
Syntax Description
Command History
Release Modification
Examples
Configure VPN 0, which is the transport VPN used to reach the WAN. Here, the vEdge router connects
to the WAN over interface ge0/1
vpn 0
interface ge0/1
ip address 10.2.6.11/24
color default
preference 10
weight 10
!
no shutdown
!
ip route 0.0.0.0/0 10.2.6.12
!
Operational Commands
show bgp commands (on vEdge routers only)
show interface commands
show multicast commands (on vEdge routers only)
show ospf commands (on vEdge routers only)
show pim commands (on vEdge routers only)
vpn-membership
Configure or apply a centralized data policy based on VPN membership (on vSmart controllers only).
Command Hierarchy
Create a Centralized Data Policy
policy
vpn-membership policy-name
default-action (accept | reject)
sequence number
match
vpn vpn-id
vpn-list list-name
action (accept | reject)
Syntax Description
Command History
Release Modification
Examples
!
vpn-membership vpn-policy
sequence 1
match vpn-list east-vpns
action accept
!
!
default-action reject
!
!
...
apply-policy
site-list east-sites
vpn-membership vpn-policy
!
!
...
Operational Commands
show policy commands
Related Topics
data-policy, on page 211
vrrp
Configure the Virtual Router Redundancy Protocol (VRRP) to allow multiple routers to share a common
virtual IP address for default gateway redundancy (on vEdge routers only).
Hosts are assigned a single default gateway (also called default router) IP address, either through DHCP or
statically for the first-hop router. This situation creates a single point of failure in the network. VRRP provides
default gateway (first-hop router) redundancy through configuration of a virtual IP address shared by multiple
routers on a single LAN or subnet.
One router on the LAN or subnet becomes master, thus assuming the role of the default gateway, and the
other routers take the role of slave. When the master router fails, one of the slaves is elected as the new master
and assumes the role of default gateway.
You cannot configure VRRP on an interface that is in the transport VPN (VPN 0).
Command Hierarchy
vpn vpn-id
interface geslot/port[.subinterface]
vrrp group-number
ipv4 ip-address
priority number
timer seconds
(track-omp | track-prefix-list list-name)
Syntax Description
Command History
Release Modification
vpn 1
interface ge0/1.3
ip address 10.2.3.11/24
mtu 1490
no shutdown
vrrp 3
priority 200
timer 1
ipv4 10.2.3.201
track-prefix-list vrrp-prefix-list
!
!
interface GigabitEthernet0/0/2
description to-LAN
no shutdown
arp timeout 1200
vrf forwarding 1
ip address 10.180.4.3 255.255.255.0
ip redirects
ip mtu 1500
mtu 1500
negotiation auto
vrrp 1 address-family ipv4
vrrpv2
address 10.180.4.1
priority 90
timers advertise 1000
exit
exit
Note For Cisco XE SD-WAN devices, the VRRP timer range is 100 to 3600 milliseconds
Related Topics
timers, on page 612
wake-on-lan
Allow a client to be powered up when the vEdge router receives an Ethernet magic packet frame (on vEdge
routers only). This feature allows you to connect to clients that have been powered down.
Command Hierarchy
vpn vpn-id
interface interface-name
dot1x
wake-on-lan
Command History
Release Modification
Examples
Operational Commands
clear dot1x client
show dot1x clients
show dot1x interfaces
show dot1x radius
show system statistics
Related Topics
control-direction, on page 197
radius, on page 518
wlan
Configure a wireless WAN (WLAN) (on vEdge cellular wireless routers only).
Command Hierarchy
wlan radio-band
channel channel
channel-bandwidth megahertz
country country
guard-interval nanoseconds
interface vapnumber
data-security security
description text
max-clients number
mgmt-security security
radius-servers tag
[no] shutdown
ssid ssid
wpa-personal-key password
Syntax Description
Command History
Release Modification
Examples
Operational Commands
clear wlan radius-stats
show wlan clients
show wlan interfaces
show wlan radios
show wlan radius
Related Topics
radius, on page 518
wpa-personal-key
Configure the password to access a wireless LAN that uses wpa-personal or wpa2-personal security (on
vEdge cellular wireless routers only).
Command Hierarchy
wlan radio-band
interface vapnumber
wpa-personal-key password
Syntax Description
password Password:
Password that users must enter to access the wireless LAN. The password is case sensitive. You
can enter it in clear text or an AES-encrypted key.
Command History
Release Modification
Examples
Set a WPA password for a VAP interface (that is, for an SSID)
vEdge# show running-config wlan 5GH1 interface vap1
wlan 5GHz
interface vap1
ssid GuestNetwork
data-security wpa/wpa2-personal
wpa-personal-key GuestPassword
max-clients 10
no shutdown
!
!
Operational Commands
clear wlan radius-stats
show interface
show wlan clients
show wlan interfaces
zone
Create a group of one or more VPNs in the overlay network that form a zone (on vEdge routers only).
Command Hierarchy
policy
zone zone-name
vpn vpn-id
Syntax Description
vpn VPN:
vpn-id
Numeric identifier of the
VPN.
Range: 0 through 65530
Command History
Release Modification
Examples
!
!
default-action drop
!
!
Operational Commands
show running-config policy
show policy zbfw filter-statistics
Related Topics
zone-based-policy, on page 684
zone-pair, on page 686
zone-to-nozone-internet, on page 688
zone-based-policy
Create a zone-based firewall policy for stateful inspection of ICMP, TCP, and UDP flows between one VPN,
or zone, and another (on vEdge routers only).
Command Hierarchy
Create a Zone-Based Firewall Policy
policy
zone-based-policy zone-policy-name
default-action (drop | inspect | pass)
sequence number
match
destination-data-prefix-list list-name
destination-ip prefix/length
destination-port number
protocol number
source-data-prefix-list list-name
source-ip prefix-length
source-port number
action
drop
inspect
log
pass
Syntax Description
Command History
Release Modification
Examples
zone A
vpn 1
!
zone B
vpn 2
vpn 3
vpn 4
!
zone-to-nozone-internet allow
zone-pair zbfw-pair-1
source-zone A
destination-zone B
zone-policy zbfw-policy-1
!
zone-based-policy zbfw-policy-1
sequence 1
match
protocol 6
!
action inspect
!
!
default-action drop
!
!
Operational Commands
clear policy zbfw filter-statistics
clear policy zbfw global-statistics
clear policy zbfw sessions
show policy zbfw filter-statistics
show policy zbfw global-statistics
show policy zbfw sessions
Related Topics
zone, on page 682
zone-pair, on page 686
zone-to-nozone-internet, on page 688
zone-pair
Configure a zone pair to apply a zone-based firewall policy to traffic flows between a source zone and a
destination zone (on vEdge routers only).
Command Hierarchy
policy
zone-pair pair-name
destination-zone zone-name
source-zone zone-name
zone-policy zone-policy-name
Syntax Description
Command History
Release Modification
Examples
zone-to-nozone-internet allow
zone-pair zbfw-pair-1
source-zone A
destination-zone B
zone-policy zbfw-policy-1
!
zone-based-policy zbfw-policy-1
sequence 1
match
protocol 6
!
action inspect
!
!
default-action drop
!
!
Operational Commands
clear policy zbfw sessions
show policy zbfw sessions
show running-config policy
Related Topics
zone, on page 682
zone-based-policy, on page 684
zone-to-nozone-internet
For a zone-based firewall, control whether packets can reach destination zones that are accessible only over
the public internet if none of the zones in the zone-based firewall policy include VPN 0 (on vEdge routers
only). By default, if you do not include VPN 0 in any of the configured zones, packets can reach their destination
zone over the public internet.
You can add this command to the configuration only after you have configured at least one zone. If you remove
all zones from a configuration, the value of this command returns to the default of allow . If you want to
block internet access, you must configure the deny option again.
Command Hierarchy
policy
zone-to-nozone-internet (allow | deny)
Syntax Description
Command History
Release Modification
Examples
zone-based-policy zbfw-policy-1
sequence 1
match
protocol 6
!
action inspect
!
!
default-action drop
!
!
Operational Commands
clear policy zbfw filter-statistics
clear policy zbfw global-statistics
clear policy zbfw sessions
show policy zbfw filter-statistics
show policy zbfw global-statistics
show policy zbfw sessions
Related Topics
zone, on page 682
zone-based-policy, on page 684
zone-pair, on page 686
Operational Commands
Overview of Operational Commands
clear app cflowd flow-all Clear the cflowd flows in all VPNs.
clear app cflowd flows Clear the cflowd flows in a specific VPN.
clear app dpi all Clear all DPI flows on the vEdge router.
clear app dpi apps Clear specific applications in a particular VPN on the vEdge router.
clear app dpi flows Clear specific DPI flows in a particular VPN on the vEdge router.
clear bgp all Reset BGP peering sessions with all neighbors in a specific VPN.
clear bgp neighbor Reset the peering sessions with a specific BGP neighbor in a VPN.
clear bridge mac Clear the MAC addresses that the vEdge router has learned.
clear cellular session statistics Clear the statistics for cellular sessions.
clear cloudexpress computations Clear computations for Cloud OnRamp for SaaS.
clear cloudinit data Clear bootstrap information received from cloud-init in order to
attach a new cloud-init file.
clear control connections Reset the DTLS connections from the local device to all Cisco vEdge
devices.
clear control connections-history Erase the connection history on the local device.
clear dhcp state Clear IPv4 DHCP state on the local device.
clear dns cache Clear the cache of DNS entries on the local device.
clear history Clear the history of the commands issued in operational mode.
clear igmp interface Clear the interfaces on which IGMP is enabled on the router.
clear igmp protocol Flush all IGMP groups and relearn them.
clear installed-certificates Clear all the certificates on the local device, and return the device to
the factory-default state.
clear ipv6 dhcp state Clear IPv6 DHCP state on the local device.
clear ipv6 neighbor Refresh dynamically created IPv6 entries in the Address Resolution
Protocol (ARP) cache.
clear ipv6 policy Reset all counters for IPv6 access lists.
clear ip mfib record Clear the statistics for a particular group, source, or VPN from the
Multicast Forwarding Information Base.
clear ip mfib stats Clear all statistics from the Multicast Forwarding Information Base.
clear omp all Reset OMP peering sessions with all OMP peers.
clear omp peer Reset the OMP peering sessions with a specific peer.
clear omp routes Recalculate the OMP routes and resend the routes to the IP route
table.
clear omp tlocs Recalculate the OMP TLOCs and resend the TLOCs to the route
table.
clear orchestrator connections-history Clear the history of connections and connection attempts made by
the vBond orchestrator.
clear ospf database Delete the entries in the OSPF link-state database learned from OSPF
neighbors.
clear pim interface Clear PIM interfaces, and relearn all PIM neighbors and joins.
clear pim statistics Clear all PIM-related statistics on the router, and relearn all PIM
neighbors and joins.
clear policy Reset all counters for IPv4 access lists or data policies.
clear policy zbfw filter-statistics clear policy zbfw filter-statistics—Clear the configured zone-based
firewalls.
clear policy zbfw global-statistics clear policy zbfw global-statistics—Zero the statistics about the
packets processed by zone-based firewalls.
clear policy zbfw sessions clear policy zbfw sessions—Clear the session flow information for
zone pairs configured with a zone-based firewall policy
clear reverse-proxy context clear reverse-proxy context—Clear an installed proxy certificate and
reset the control connections that are associated with the proxy.
clear tunnel statistics Zero the information about the packets transmitted and received on
IPsec connections that originate on the local router.
clear wlan radius-stats Clear the statistics about the sessions with RADIUS servers being
used for WLAN authentication.
complete-on-space Have the CLI automatically complete a command name when you
type an unambiguous string and then press the space bar, or have
the CLI list all possible completions when you type an ambiguous
string and then press the space bar.
debug Enable and disable debugging mode for all or selected software
function.
file list List the files in a directory on the Cisco vEdge device.
file show Display the contents of a file on the Cisco vEdge device.
history Set the number of history items that the CLI tracks in operational
mode.
idle-timeout Set how long the CLI is inactive before the user is logged out.
job stop Stop a job that is monitoring a file on the local device.
logout Terminate the current CLI session, a specific CLI session, or the
session of a specific user.
reboot Reboot the Cisco vEdge device to the software image installed on
the other partition.
request aaa unlock-user Reset the account of a user whose account is locked. An account
becomes locked when the user can no longer log in to a Cisco vEdge
device.
request admin-tech Collect system status information in a tar file to aid in troubleshooting
and diagnostics.
request container image install Install a vSmart software image on a vSmart controller container
host.
request container image remove Install a vSmart software image on a vSmart controller container
host.
request control-tunnel add Create a temporary tunnel to use when debugging a failed control
connection.
request control-tunnel delete Delete a temporary tunnel that you created to debug a failed control
connection.
request controller-upload serial-file Upload the certificate serial number file to the local device.
request controller add serial-num Send the certificate serial number of a vManage NMS or a vSmart
controller to the vBond orchestrator.
request controller delete serial-num Delete a vSmart serial number from the vSmart controller serial
number file on the local device.
request csr upload Upload a certificate signing request (CSR) to the Cisco vEdge device.
request daemon ncs restart Restart the NCS network configuration process.
request device Add or delete a vEdge router chassis number on the vBond
orchestrator that is acting as a ZTP server.
request device-upload Add vEdge router chassis numbers by uploading a file that contains
the device information onto the vBond orchestrator that is acting as
a ZTP server.
request download Download a software image or other file to the Cisco vEdge device.
request execute Execute a shell command from within the Cisco SD-WAN CLI.
request ipsec ike-rekey Force IKE to generate new keys for IKE sessions.
request ipsec ipsec-rekey Force IKE to generate new keys for IPsec tunnels that are being used
for IKE sessions.
request nms-server Start and stop a vManage NMS, and display the status of the NMS.
request nms all Start, stop, and perform other operations on all vManage cluster
components.
request nms application-server Start, stop, and perform other operations on a vManage HTTP web
server.
request nms configuration-db Start, stop, and perform other operations on the local vManage
configuration database.
request nms coordination-server Start, stop, and perform other operations on the local vManage
coordination and messaging server.
request nms messaging-server Start, stop, and perform other operations on the local vManage
messaging server.
request nms statistics-db Start, stop, and perform other operations on the local vManage
statistics database.
request port-hop Manually rotate to the next OMP port in the group of
preselected OMP port numbers when a connection cannot be
established.
request reset configuration Reset the device's configuration to the factory-default configuration.
request reset logs Clear the contents of all syslog logging files on the local device.
request root-cert-chain Install or uninstall a file containing the root certificate key chain.
request security ipsec-rekey Force IPsec to generate new keys. Use this command when the IPsec
keys have been compromised.
request software activate Activate a software image on the local Cisco vEdge device.
request software install Install a software image on the Cisco vEdge device.
request software install-image Install a software image on the Cisco vEdge device.
request software remove Remove a software image from the local Cisco vEdge device.
request software reset Return the Cisco vEdge device to the factory-default configuration.
request software secure-boot Check and enforce the secure boot state of the system software
images and, for vEdge hardware routers, of the boot loader.
request software set-default Set a software image to be the default image on the device.
request software upgrade-confirm Confirm that the upgrade to a new software image is successful.
request software verify-image Verify that a Cisco SD-WAN software image is valid and has been
signed.
request upload Upload a file from the Cisco vEdge device to another device in the
network.
request vedge Add a vEdge serial number–chassis number pair to or delete a vEdge
serial number-chassis number pair from the vEdge authorized serial
number file on the local device.
request vsmart add serial-num Send the certificate serial number of a vManage NMS or a vSmart
controller to the vBond orchestrator.
request vsmart delete serial-num Delete a vSmart serial number from the vSmart controller serial
number file on the local device.
screen-length Set the length of the terminal window. Use the more and
nomore command filters to control the length of the output.
screen-width Set the width of the terminal window. Use the tab and notab
command filters to control the width of the output.
show aaa usergroup List the groups configured for AAA role-based access to a Cisco
vEdge device.
show app-route sla-class Display information about the SLA classes operating on the vEdge
router.
show app-route stats Display statistics about data traffic characteristics for all data plane
tunnels.
show app cflowd collector Display information about the configured cflowd collectors that the
vEdge router has learned from a vSmart controller.
show app cflowd flow-count Display the number of current cflowd traffic flows.
show app cflowd template Display the cflowd template information that the vEdge router
transmits periodically to the cflowd collector.
show app dpi applications Display application-aware applications running on the vEdge router.
show app dpi flows Display flow information for the application-aware applications
running on the vEdge router.
show app dpi summary statistics Display summary statistics for DPI flows on the vEdge router.
show app dpi supported-applications List all the application-aware applications supported by the Cisco
SD-WAN software on the vEdge router .
show app log flow-count Display the count of packet flows that are being logged.
show arp Display the IPv4 entries in the Address Resolution Protocol table,
which lists the mapping of IP addresses to device MAC addresses.
show bfd history Display the history of the BFD sessions running on a vEdge router.
show bfd sessions Display information about the BFD sessions running on the local
vEdge router.
show bfd summary Display summary information about the BFD sessions running on
the local vEdge router.
show bfd tloc-summary-list Display BFD session summary information per TLOC.
show boot-partition Display the active boot partition and the software version installed
in the boot partitions.
show bridge mac List the MAC addresses that the vEdge router has learned.
show bridge table List the information in the bridge forwarding table.
show certificate root-ca-cert Display the root certification installed on a Cisco vEdge device.
show certificate serial Display the serial number for a vBond orchestrator or a vSmart
controller. Display the serial number and chassis number for a vEdge
router.
show certificate signing-request Display the certificate signing requests installed on a vSmart
controller or vBond orchestrator.
show certificate validity Find out how long a certificate is valid for.
show cloudexpress applications Display the best interfaces for applications configured with Cloud
OnRamp for SaaS.
show cloudexpress gateway-exits Display loss and latency on each gateway exit for applications
configured with Cloud OnRamp for SaaS.
show cloudexpress local-exits Display application loss and latency computed by Cloud OnRamp
for SaaS.
show configuration commit list Display a list of all configuration commits on the Cisco vEdge device.
show container images List the Cisco SD-WAN software images associated with the vSmart
controller containers.
show container instances List information about the vSmart controller containers running on
the container host.
show control affinity config Display configuration information about the control connections
between the vEdge router and one or more vSmart controllers.
show control affinity status Display the status of the control connections between the vEdge
router and one or more vSmart controllers.
show control connection-info Display information about the control plane connections on the Cisco
vEdge device.
show control connections Display information about active control plane connections.
show control connections-history Display information about control plane connection attempts initiated
by the local device.
show control local-properties Display basic configuration parameters and local properties related
to the control plane.
show control statistics Display statistics about the packets that a vEdge router or vSmart
controller has transmitted and received in the process of establishing
and maintaining secure DTLS connections to Cisco vEdge devices
in the overlay network.
show control summary Display a count of the vBond orchestrators, vManage NMSs, and
vSmart controllers in the overlay network.
show control valid-vedges List the chassis numbers of the valid vEdge routers in the overlay
network.
show control valid-vsmarts List the serial numbers of the valid vSmart controllers in the overlay
network.
show crash Display a list of the core files on the local device.
show devices Display information about the Cisco vEdge devices that a vManage
NMS is managing.
show dhcp interface Display information about the interfaces that are DHCPv4 clients.
show dhcp server Display information about the DHCP server functionality that is
enabled on the router.
show dot1x clients Display information about the 802.1X clients in the network.
show dot1x radius Display information about the RADIUS servers being used for IEEE
802.1X and 802.11i authentication.
show hardware alarms Display information about currently active hardware alarms.
show hardware environment Display status information about the router components, including
component temperature.
show hardware inventory Display an inventory of the hardware components in the router,
including serial numbers.
show hardware poe show hardware poe—Display the status of PoE interfaces.
show hardware real time information Display real-time information about hardware vEdge routers.
show hardware temperature-thresholds Display temperature thresholds at which green, yellow, and red
alarms are generated.
show history Display the history of the commands issued in operational mode.
show igmp interface Display information about the interfaces on which IGMP is enabled
on the router.
show igmp summary Display information about the IGMP version and IGMP timers.
show interface Display information about IPv4 interfaces on a Cisco vEdge device.
show interface arp-stats Display the ARP statistics for each interface.
show interface description Display information information, including the configured interface
description.
show interface packet-sizes Display packet size information for each interface.
show interface sfp detail Display detailed SFP status and digital diagnostic information for
bytes 0 through 95 of an SPF A0 section, as described in SFF-8472.
show interface sfp diagnostic Display SFP diagnostic information for fiber-based SFPs only.
show ipsec ike inbound-connections Display information about the IKE sessions that have been
established to the local router.
show ipsec ike outbound-connections Display information about the IKE sessions that the local router has
established to remote IKE peers.
show ipsec ike sessions Display information about the IKE sessions on the router.
show ipsec inbound-connections Display information about IPsec tunnels that originate on remote
routers.
show ipsec local-sa Display security association information for IPsec tunnels created
for local TLOCs.
show ipsec outbound-connections Display information about the IPsec connections to remote routers.
show ipv6 dhcp interface Display information about interfaces that are DHCPv6 clients.
show ipv6 fib Display the IPv6 entries in the local forwarding table.
show ipv6 interface Display information about IPv6 interfaces on a Cisco vEdge device.
show ipv6 neighbor Display the entries in the Address Resolution Protocol (ARP) table
for IPv6 neighbors, which lists the mapping of IPv6 addresses to
device MAC addresses.
show ipv6 policy Display the IPv6 access lists that are operating on each interface.
access-list-associations
show ipv6 policy access-list-counters Display the number of packets counted by IPv6 access lists
configured on the vEdge router.
show ipv6 policy access-list-names Display the names of the IPv6 access lists configured on the vEdge
router.
show ipv6 policy access-list-policers Display information about the policers configured in IPv6 access
lists.
show ipv6 routes Display the IPv6 entries in the local route table.
show ip fib Display the IPv4 entries in the local forwarding table.
show ip mfib oil Display the list of outgoing interfaces from the Multicast Forwarding
Information Base.
show ip mfib stats Display packet transmission and receipt statistics for active entries
in the Multicast Forwarding Information Base.
show ip mfib summary Display a summary of all active entries in the Multicast Forwarding
Information Base.
show ip nat interface List the interfaces on which NAT is enabled and the NAT
translational filters on those interfaces.
show ip nat interface-statistics List packet, NAT, and ICMP statistics for the interfaces on which
NAT is enabled.
show ip routes Display the IPv4 entries in the local route table.
show jobs View a list of the files that are currently being monitored on the local
device.
show licenses Display the licenses for the software packages used by the Cisco
SD-WAN software.
show multicast topology List information related to the topology of the multicast domain.
show multicast tunnel List information about the IPsec tunnels between multicast peers.
show notification stream Display notifications about events that have occurred on the Cisco
vEdge device.
show ntp associations Display information about the NTP peers with which the Cisco
SD-WAN software is synchronizing its clocks.
show ntp peer Display information about the NTP peers with which the Cisco
SD-WAN software is synchronizing its clocks.
show omp cloudexpress Display OMP routes for applications configured with Cloud OnRamp
for SaaS.
show omp multicast-routes List the multicast routes that OMP has learned from PIM join
messages.
show omp peers Display information about the OMP peering sessions that are active
on the local vSmart controller or vEdge router.
show omp services Display the services learned from OMP peering sessions.
show omp summary Display information about the OMP sessions running between vSmart
controllers and vEdge routers.
show omp tlocs Display information learned from the TLOC routes advertised over
the OMP sessions running between vSmart controllers and vEdge
routers.
show orchestrator connections List the Cisco vEdge devices that have active DTLS connections to
the vBond orchestrator.
show orchestrator connections-history List the history of connections and connection attempts made by the
vBond orchestrator.
show orchestrator local-properties Display the basic configuration parameters of a vBond orchestrator.
show orchestrator statistics Display statistics about the packets that a vBond orchestrator has
transmitted and received in the process of establishing and
maintaining secure DTLS connections to Cisco vEdge devices in
the overlay network.
show orchestrator summary Display a count of the vBond orchestrators, vManage NMSs, and
vSmart controllers in the overlay network.
show orchestrator valid-vedges List the chassis numbers of the valid vEdge routers in the overlay
network.
show orchestrator valid-vmanage-id List the chassis numbers of the valid vManage NMSs in the overlay
network
show orchestrator valid-vsmarts List the serial numbers of the valid vSmart controllers in the overlay
network.
show ospf database List the entries in the OSPF Link-State Advertisement database.
show ospf database-summary List how many of each type of LSA is present in the OSPF database,
along with the total number of LSAs in the database.
show ospf process Display information about the OSPF routing process.
show ospf routes Display the entries that the route table has learned from OSPF.
show parser dump Display all CLI operational commands and their syntax.
show policer Display information about the policers that are in effect.
show policy access-list-associations Display the IPv4 access lists that are operating on each interface.
show policy access-list-counters Display the number of packets counted by IPv4 access lists
configured on the vEdge router.
show policy access-list-names Display the names of the IPv4 access lists configured on the vEdge
router.
show policy access-list-policers Display information about the policers configured in IPv4 access
lists.
show policy data-policy-filter Display information about data policy filters for configured counters
and policers, and for out-of-sequence packets.
show policy qos-map-info Display information about the QoS maps are applied to each interface.
show policy qos-scheduler-info Display information about the configured QoS schedulers and the
associated QoS map.
show policy service-path Display data traffic path information for IPsec data plane tunnels
coming from the service side, for use by application-aware routing.
show policy tunnel-path Display data traffic path information for IPsec data plane tunnels
coming from the tunnel side, for use by application-aware routing.
show policy zbfw filter-statistics show policy zbfw filter-statistics—Display a count of the packets
that match a zone-based firewall's match criteria and the number of
bytes that match the criteria.
show policy zbfw global-statistics show policy zbfw global-statistics—Display information about the
packets processed by zone-based firewalls.
show policy zbfw sessions show policy zbfw sessions—Display the session information for a
zone pair configured with a zone-based firewall policy.
show reboot history Display the history of when this device has been rebooted.
show running-config Display the active configuration that is running on the Cisco vEdge
device.
show sdwan show sdwan—Display SD-WAN related information about the IOS
XE router.
show sdwan policy show sdwan policy—Display information about policy configuration
on the IOS XE router.
show security-info List the configured security information for IPsec tunnel connections.
show software List the software images that are installed on the local device.
show system netfilter Display the iptable entries on the local device.
show system status Display time and process information for the device, as well as CPU,
memory, and disk usage data.
show transport connection Display the status of the DTLS connection to a vBond orchestrator.
show tunnel gre-keepalives Display information about the keepalive packets transmitted and
received on GRE tunnels that originate on the local router.
show tunnel inbound-connections Display information about the IPsec tunnel connections that originate
on the local router, showing the TLOC addresses for both ends of
the tunnel.
show tunnel local-sa Display the IPsec tunnel security associations for the local TLOCs.
show tunnel statistics Display information about the packets transmitted and received on
the data plane tunnels that originate on the local router.
show uptime Show how long the system has been running.
show version Display the active version of the Cisco SD-WAN software running
on the device.
show vrrp Display information about the configured VRRP interfaces and
groups.
show wlan clients Display information about the clients on the wireless WAN.
show wlan interfaces Display information about the virtual access point interfaces.
show wlan radius Display information about the sessions with RADIUS servers being
used for WLAN authentication.
show ztp entries Display a list of the vEdge router chassis numbers that are present
in the ZTP table on the vBond orchestrator that is acting as a ZTP
server.
tools iperf tools iperf—Run tests to display various parameters related to timing,
buffers, and protocols.
tools nping Generate network packets, analyze responses, and measure response
times.
tools stun-client Discover the local device's external IP address when that device is
located behind a NAT device.
traceroute Display the path that packets take to reach a host or IP address on
the network.
vshell Exit from the Cisco SD-WAN CLI to the UNIX shell running on the
device.
To filter operational command output, use the filters described in Command Filters for CLI Operational
Commands.
Command History
Release Modification
Examples
Related Topics
cflowd-template, on page 159
clear app cflowd flows, on page 719
Syntax Description
Command History
Release Modification
Examples
Related Topics
cflowd-template, on page 159
clear app cflowd flow-all, on page 717
show app cflowd flows, on page 906
Command History
Release Modification
Examples
Related Topics
cflowd-template, on page 159
show app cflowd statistics, on page 909
Command History
Release Modification
Examples
Source Dest
Related Topics
app-visibility, on page 91
clear app dpi apps, on page 723
clear app dpi flows, on page 725
show app dpi applications, on page 912
show app dpi flows, on page 913
show app dpi supported-applications, on page 916
Syntax Description
Command History
Release Modification
Examples
Related Topics
app-visibility, on page 91
clear app dpi all, on page 722
clear app dpi flows, on page 725
show app dpi applications, on page 912
show app dpi flows, on page 913
show app dpi supported-applications, on page 916
Syntax Description
Command History
Release Modification
Examples
Source Dest
Related Topics
app-visibility, on page 91
clear app dpi all, on page 722
clear app dpi apps, on page 723
show app dpi applications, on page 912
show app dpi flows, on page 913
show app dpi supported-applications, on page 916
Command History
Release Modification
Examples
VPN COUNT
------------
0 7
Related Topics
clear app log flows, on page 728
log-frequency, on page 376
clear app log flow-all, on page 727
show app log flows, on page 923
show system statistics, on page 1236
Syntax Description
ip-protocol IP Protocol:
number
Clear information logged about flows with the specified IP protocol number.
Command History
Release Modification
Examples
TCP
TIME EGRESS INGRESS
SRC DEST IP CNTRL ICMP TOTAL
TOTAL TO INTF INTF POLICY POLICY POLICY
VPN SRC IP DEST IP PORT PORT DSCP PROTO BITS OPCODE NHOP IP PKTS
BYTES START TIME EXPIRE NAME NAME NAME ACTION DIRECTION
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 10.0.5.11 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 102
28942 Thu Dec 8 11:42:38 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.5.11 10.1.15.15 12366 12366 48 17 0 0 10.1.15.15 10
1910 Thu Dec 8 11:42:28 2016 14 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.5.19 10.1.15.15 12446 12346 48 17 0 0 10.1.15.15 73
17458 Thu Dec 8 11:42:34 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.5.21 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 102
28942 Thu Dec 8 11:42:38 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.5.21 10.1.15.15 12366 12366 48 17 0 0 10.1.15.15 11
2101 Thu Dec 8 11:42:28 2016 15 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.12.20 10.1.15.15 12446 12346 48 17 0 0 10.1.15.15 76
17887 Thu Dec 8 11:42:34 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.12.26 10.1.15.15 0 0 0 1 0 0 10.1.15.15 17
1666 Thu Dec 8 11:42:33 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.12.26 10.1.15.15 12346 12346 48 17 0 0 10.1.15.15 28
7167 Thu Dec 8 11:42:33 2016 28 cpu ge0/0 BlackBird accept inbound-acl
0 10.1.14.14 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 106
32230 Thu Dec 8 11:42:38 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.1.14.14 10.1.15.15 12366 12366 48 17 0 0 10.1.15.15 11
2101 Thu Dec 8 11:42:28 2016 15 cpu ge0/0 BlackBird accept inbound-acl
0 10.1.16.16 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 102
28942 Thu Dec 8 11:42:38 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.1.16.16 10.1.15.15 12366 12366 48 17 0 0 10.1.15.15 11
2101 Thu Dec 8 11:42:28 2016 15 cpu ge0/0 BlackBird accept inbound-acl
TCP
TIME EGRESS INGRESS
SRC DEST IP CNTRL ICMP TOTAL
TOTAL TO INTF INTF POLICY POLICY POLICY
VPN SRC IP DEST IP PORT PORT DSCP PROTO BITS OPCODE NHOP IP PKTS
BYTES START TIME EXPIRE NAME NAME NAME ACTION DIRECTION
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 10.0.5.11 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 3
573 Thu Dec 8 11:43:33 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.0.5.21 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 3
573 Thu Dec 8 11:43:33 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.1.14.14 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 3
573 Thu Dec 8 11:43:33 2016 59 cpu ge0/0 BlackBird accept inbound-acl
0 10.1.16.16 10.1.15.15 12366 12346 48 17 0 0 10.1.15.15 3
573 Thu Dec 8 11:43:33 2016 59 cpu ge0/0 BlackBird accept inbound-acl
Related Topics
clear app log flow-all, on page 727
log-frequency, on page 376
show app log flow-count, on page 922
show app log flows, on page 923
show system statistics, on page 1236
clear arp
Refresh dynamically created IPv4 entries in the Address Resolution Protocol (ARP) cache (on vEdge routers
and vSmart controllers only).
To clear IPv6 entries in the ARP cache, use the clear ipv6 neighbor command.
clear arp [interface interface-name] [ip-address] [vpn vpn-id ]
Syntax Description
interface Interface:
interface-name
Refresh the dynamic ARP cache entries associated with the specific interface.
ip-address IP Address:
Refresh the dynamic ARP cache entries for the specified IP address.
Command History
Release Modification
Examples
Related Topics
clear ipv6 neighbor, on page 764
show arp, on page 932
Command History
Release Modification
Examples
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1.1.1.1 1 up default public-internet 192.168.1.104
69.181.135.19 34601 ipsec 3 1000 3:17:22:43 5
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1.1.1.1 1 up default public-internet 192.168.1.104
69.181.135.19 34601 ipsec 3 1000 3:17:22:43 0
Related Topics
bfd color, on page 142
show bfd history, on page 933
show bfd sessions, on page 935
Command History
Release Modification
Examples
Related Topics
clear bgp neighbor, on page 734
show bgp neighbor, on page 942
Syntax Description
Command History
Release Modification
Examples
Related Topics
clear bgp all, on page 733
show bgp neighbor, on page 942
Command History
Release Modification
Examples
RX RX TX TX
BRIDGE INTERFACE MAC ADDR STATE PKTS OCTETS PKTS OCTETS
-------------------------------------------------------------------------
1 ge0/5 aa:01:05:05:00:01 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:02 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:03 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:04 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:05 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:01 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:02 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:03 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:04 dynamic 1 124 0 0
2 ge0/5 aa:02:05:05:00:05 dynamic 1 124 0 0
Related Topics
bridge, on page 152
show bridge mac, on page 952
Command History
Release Modification
Related Topics
bridge, on page 152
clear bridge mac, on page 735
show bridge interface, on page 950
show bridge mac, on page 952
show bridge table, on page 953
Command History
Release Modification
Examples
Related Topics
cellular, on page 157
clear cellular session statistics, on page 738
profile, on page 507
show cellular modem, on page 954
show cellular network, on page 955
show cellular profiles, on page 957
show cellular radio, on page 958
show cellular sessions, on page 959
show cellular status, on page 960
show interface, on page 1032
Command History
Release Modification
Examples
Related Topics
clear cellular errors, on page 737
show cellular modem, on page 954
show cellular network, on page 955
show cellular profiles, on page 957
show cellular radio, on page 958
show cellular sessions, on page 959
show cellular status, on page 960
show interface, on page 1032
Syntax Description
(none) Clear all computations for all applications in all VPNs configured with Cloud OnRamp for SaaS.
application Specific Application: Clear computations for a specific application configured for Cloud OnRamp
for SaaS.
Values: amazon_aws, box_net, concur, dropbox, google_apps, gotomeeting, intuit, jira, office365,
oracle, salesforce, sap, sugar_crm, webex, zendesk, zoho_crm
Command History
Release Modification
Examples
-----------------------------------------------------------------------
100 salesforce none - - 0 0
100 office365 none - - 0 0
100 amazon_aws none - - 0 0
100 oracle none - - 0 0
100 sap none - - 0 0
100 box_net none - - 0 0
100 dropbox none - - 0 0
100 jira none - - 0 0
100 intuit none - - 0 0
100 concur none - - 0 0
100 zoho_crm none - - 0 0
100 zendesk none - - 0 0
100 gotomeeting none - - 0 0
100 webex none - - 0 0
100 google_apps none - - 0 0
Related Topics
show cloudexpress local-exits, on page 975
Command History
Release Modification
Note This command will reset all the Bidirectional Forwarding Detection (BFD) tunnels on the device.
Command History
Release Modification
Examples
Related Topics
clear omp all, on page 767
show control connections, on page 984
show omp peers, on page 1130
Examples
vEdge# show control connections-history
PEER PEER
PEER PEER PEER SITE DOMAIN PEER PRIVATE PEER PUBLIC LOCAL REMOTE REPEAT
TYPE PROTOCOL SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT LOCAL COLOR STATE ERROR ERROR COUNT DOWNTIME
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
vbond dtls - 0 0 10.1.14.14 12346 10.1.14.14 12346 lte tear_down DISCVBD NOERR 0
2016-02-23T16:33:30-0800
vbond dtls - 0 0 10.1.14.14 12346 10.1.14.14 12346 lte connect DCONFAIL NOERR 4
2016-02-23T16:32:51-0800
Command History
Release Modification
Related Topics
clear orchestrator connections-history, on page 772
show control connections, on page 984
show control connections-history, on page 987
show orchestrator connections-history, on page 1152
clear crash
Delete the core files on the local device. Core files are saved in the /var/crash directory on the local device.
clear crash number
Syntax Description
Command History
Release Modification
Examples
Related Topics
file list, on page 807
file show, on page 808
show crash, on page 1000
Syntax Description
interface interface-name Interface to DHCP Server: Interface to use to reach the DHCP server.
client-mac client-mac MAC Address of DHCP Server: Clear the entry for a single DHCP host based on
the host's MAC address.
Command History
Release Modification
Related Topics
clear dhcp state, on page 746
dhcp-helper, on page 229
dhcp-server, on page 231
show dhcp interface, on page 1004
show dhcp server, on page 1005
Syntax Description
vpn vpn-id Clear the DHCP state of an interface in the specified VPN.
Command History
Release Modification
Examples
Related Topics
clear ipv6 dhcp state, on page 763
show dhcp interface, on page 1004
show dhcp server, on page 1005
show ipv6 dhcp interface, on page 1089
Command History
Release Modification
Examples
In the example output below, the entries in the DNS cache are highlighted in bold. After the DNS
cache is cleared, it takes about 30 seconds for the vSmart controller to reestablish its connection with
the vBond orchestrator and to repopulate its DNS cache.
vSmart# show control local-properties
organization-name Cisco Inc
certificate-status Installed
root-ca-chain-status Installed
certificate-validity Valid
certificate-not-valid-before Jun 29 18:00:05 2015 GMT
certificate-not-valid-after Jun 28 18:00:05 2016 GMT
dns-name 10.1.14.14
site-id 100
domain-id 1
protocol dtls
tls-port 23456
system-ip 172.16.255.19
chassis-num/unique-id faa123ce-d281-43f1-a3f6-c95925d66869
serial-num 12345602
register-interval 0:00:00:30
retry-interval 0:00:00:15
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:30:00
port-hopped FALSE
time-since-last-port-hop 0:00:00:00
number-vbond-peers 1
INDEX IP PORT
-------------------------------
0 10.1.14.14 12346
number-active-wan-interfaces 1
certificate-validity Valid
certificate-not-valid-before Jun 29 18:00:05 2015 GMT
certificate-not-valid-after Jun 28 18:00:05 2016 GMT
dns-name 10.1.14.14
site-id 100
domain-id 1
protocol dtls
tls-port 23456
system-ip 172.16.255.19
chassis-num/unique-id faa123ce-d281-43f1-a3f6-c95925d66869
serial-num 12345602
register-interval 0:00:00:30
retry-interval 0:00:00:15
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:30:00
port-hopped FALSE
time-since-last-port-hop 0:00:00:00
number-vbond-peers 0
number-active-wan-interfaces 1
certificate-validity Valid
certificate-not-valid-before Jun 29 18:00:05 2015 GMT
certificate-not-valid-after Jun 28 18:00:05 2016 GMT
dns-name 10.1.14.14
site-id 100
domain-id 1
protocol dtls
tls-port 23456
system-ip 172.16.255.19
chassis-num/unique-id faa123ce-d281-43f1-a3f6-c95925d66869
serial-num 12345602
register-interval 0:00:00:30
retry-interval 0:00:00:15
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:30:00
port-hopped FALSE
time-since-last-port-hop 0:00:00:00
number-vbond-peers 1
INDEX IP PORT
-------------------------------
0 10.1.14.14 12346
number-active-wan-interfaces 1
Related Topics
timer, on page 606
show control local-properties, on page 991
Syntax Description
interface interface-name Interface Name: Interface through which the client is reachable.
To determine the interface name, use the show dot1x interfaces command.
Command History
Release Modification
Related Topics
show dot1x clients, on page 1006
show dot1x interfaces, on page 1008
show dot1x radius, on page 1010
clear history
Clear the history of the commands issued in operational mode.
clear history
Command History
Release Modification
Examples
Related Topics
history, on page 810
show history, on page 1023
Syntax Description
Command History
Release Modification
Related Topics
clear igmp protocol, on page 752
clear igmp statistics, on page 753
igmp, on page 300
show igmp interface, on page 1026
Syntax Description
Command History
Release Modification
Related Topics
clear igmp interface, on page 751
clear igmp statistics, on page 753
igmp, on page 300
show igmp groups, on page 1024
Syntax Description
Command History
Release Modification
Examples
RX RX TX TX
GENERAL GROUP RX V1 RX V2 RX RX RX GENERAL GROUP TX
VPN QUERY QUERY REPORT REPORT LEAVE UNKNOWN ERROR QUERY QUERY ERROR
-----------------------------------------------------------------------------------
1 0 0 0 0 0 0 0 238 0 0
RX RX TX TX
GENERAL GROUP RX V1 RX V2 RX RX RX GENERAL GROUP TX
VPN QUERY QUERY REPORT REPORT LEAVE UNKNOWN ERROR QUERY QUERY ERROR
-----------------------------------------------------------------------------------
1 0 0 0 0 0 0 0 0 0 0
Related Topics
clear igmp interface, on page 751
clear igmp protocol, on page 752
igmp, on page 300
show igmp statistics, on page 1028
clear installed-certificates
Clear all the certificates on the local device, including the public and private keys and the root certificate, and
return the device to the factory-default state.
clear installed-certificates
Command History
Release Modification
Examples
certificate-validity Valid
certificate-not-valid-before Apr 07 20:03:36 2014 GMT
certificate-not-valid-after Apr 07 20:03:36 2015 GMT
dns-name 10.1.14.14
site-id 100
domain-id 1
system-ip 172.16.255.19
register-interval 0:00:00:30
retry-interval 0:00:00:15
dns-cache-ttl 0:00:30:00
number-vbond-peers 1
INDEX IP PORT
-------------------------------
0 10.1.14.14 12346
number-active-wan-interfaces 1
certificate-validity Valid
certificate-not-valid-before Apr 07 20:03:36 2014 GMT
certificate-not-valid-after Apr 07 20:03:36 2015 GMT
dns-name 10.1.14.14
site-id 100
domain-id 1
system-ip 172.16.255.19
register-interval 0:00:00:30
retry-interval 0:00:00:15
dns-cache-ttl 0:00:30:00
number-vbond-peers 1
INDEX IP PORT
-------------------------------
0 10.1.14.14 12346
number-active-wan-interfaces 1
------------------------------------------------------------------------------------------------------------------------
0 10.0.5.19 12346 10.0.5.19 12346 2 default default up up
Related Topics
reboot, on page 830
request certificate, on page 836
request csr upload, on page 844
request root-cert-chain, on page 880
request vsmart-upload serial-file, on page 898
show control local-properties, on page 991
Syntax Description
queue queue-number Interface Queue: Zero the statistics on the specified queue.
vpn vpn-id VPN: Zero the interface statistics for interfaces in a specific VPN.
Command History
Release Modification
Examples
RX RX RX TX TX TX RX RX TX TX
VPN INTERFACE PACKETS RX OCTETS ERRORS DROPS PACKETS TX OCTETS ERRORS DROPS PPS KBPS PPS KBPS
-----------------------------------------------------------------------------------------------------------------
0 ge0/0 10756769 2545508661 0 1693399 9460046 1401233512 0 1 14 15 15 16
0 ge0/1 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/2 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/4 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/5 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/6 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/7 0 0 0 0 0 0 0 0 0 0 0 0
0 system 0 0 0 0 0 0 0 0 0 0 0 0
1 ge0/3 214082 68435255 0 37160 156849 14532821 0 3 4 2 4 2
512 mgmt0 0 0 0 0 0 0 0 0 0 0 0 0
RX RX RX RX TX TX TX TX RX RX TX TX
VPN INTERFACE PACKETS OCTETS ERRORS DROPS PACKETS OCTETS ERRORS DROPS PPS KBPS PPS KBPS
------------------------------------------------------------------------------------------------------
0 ge0/0 57 13592 0 8 51 7336 0 0 17 46 13 14
0 ge0/1 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/2 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/4 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/5 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/6 0 0 0 0 0 0 0 0 0 0 0 0
0 ge0/7 0 0 0 0 0 0 0 0 0 0 0 0
0 system 0 0 0 0 0 0 0 0 0 0 0 0
1 ge0/3 42 3744 0 0 26 2772 0 0 4 2 4 2
512 mgmt0 0 0 0 0 0 0 0 0 0 0 0
Related Topics
show interface, on page 1032
show interface statistics, on page 1061
Syntax Description
group group-address Clear Statistics from the MFIB: Clear the statistics for a particular group,
source, or VPN from the MFIB.
source source-address
vpn vpn-id
upstream-iif interface-name Upstream Interface: Clear the MFIB statistics for the specified upstream
interface.
upstream-tunnel ip-address Upstream Tunnel: Clear the MFIB statistics for the specified tunnel to a remote
system.
Command History
Release Modification
Examples
Related Topics
clear ip mfib stats, on page 759
show ip mfib summary, on page 1069
Examples
Command History
Release Modification
Related Topics
clear ip mfib record, on page 758
show ip mfib stats, on page 1068
Syntax Description
parameter Filter Parameter: Clear NAT translation filters associated with the specified parameter.
parameter can be nat-ifname, nat-vpn-id, private-dest-address, private-dest-port,
private-source-address, private-source-port, private-vpn-id, and proto. These parameters correspond
to some of the column headers in the show ip nat filter command output.
Command History
Release Modification
Examples
NAT NAT SOURCE DEST SOURCE DEST SOURCE DEST SOURCE DEST FILTER IDLE OUTBOUND
OUTBOUND INBOUND INBOUND
VPN IFNAME VPN PROTOCOL ADDRESS ADDRESS PORT PORT ADDRESS ADDRESS PORT PORT STATE TIMEOUT PACKETS
OCTETS PACKETS OCTETS
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 4697 4697 10.1.15.15 10.1.14.14 64931 64931 established 0:00:00:41 1
98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 14169 14169 10.1.15.15 10.1.14.14 28467 28467 established 0:00:00:44 1
98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 21337 21337 10.1.15.15 10.1.14.14 44555 44555 established 0:00:00:47 1
98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 28505 28505 10.1.15.15 10.1.14.14 40269 40269 established 0:00:00:50 1
98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 39513 39513 10.1.15.15 10.1.14.14 31859 31859 established 0:00:00:53 1
98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 46681 46681 10.1.15.15 10.1.14.14 1103 1103 established 0:00:00:56 1
98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 57176 57176 10.1.15.15 10.1.14.14 38730 38730 established 0:00:00:35 1
98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 64600 64600 10.1.15.15 10.1.14.14 33274 33274 established 0:00:00:38 1
98 1 98
0 ge0/0 0 udp 10.1.15.15 10.0.5.19 12346 12346 10.1.15.15 10.0.5.19 64236 12346 established 0:00:19:59 38
8031 23 5551
0 ge0/0 0 udp 10.1.15.15 10.0.12.20 12346 12346 10.1.15.15 10.0.12.20 64236 12346 established 0:00:19:59 36
7470 23 5551
0 ge0/0 0 udp 10.1.15.15 10.0.12.22 12346 12346 10.1.15.15 10.0.12.22 64236 12346 established 0:00:19:59 679
598771 434 92925
0 ge0/0 0 udp 10.1.15.15 10.1.14.14 12346 12346 10.1.15.15 10.1.14.14 64236 12346 established 0:00:19:59 34
3825 9 3607
0 ge0/0 0 udp 10.1.15.15 10.1.14.14 12346 12350 10.1.15.15 10.1.14.14 64236 12350 established 0:00:19:59 38
5472 23 3634
0 ge0/0 0 udp 10.1.15.15 10.1.16.16 12346 12346 10.1.15.15 10.1.16.16 64236 12346 established 0:00:19:59 38
5472 23 3634
NAT NAT SOURCE DEST SOURCE DEST SOURCE DEST SOURCE DEST FILTER IDLE OUTBOUND
OUTBOUND INBOUND INBOUND
VPN IFNAME VPN PROTOCOL ADDRESS ADDRESS PORT PORT ADDRESS ADDRESS PORT PORT STATE TIMEOUT PACKETS
OCTETS PACKETS OCTETS
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 59484 59484 10.1.15.15 10.1.14.14 17148 17148 established 0:00:00:58 1
98 1 98
0 ge0/0 0 udp 10.1.15.15 10.0.5.19 12346 12346 10.1.15.15 10.0.5.19 64236 12346 established 0:00:19:59 143
25726 128 23166
0 ge0/0 0 udp 10.1.15.15 10.0.12.20 12346 12346 10.1.15.15 10.0.12.20 64236 12346 established 0:00:19:59 141
25165 128 23166
0 ge0/0 0 udp 10.1.15.15 10.0.12.22 12346 12346 10.1.15.15 10.0.12.22 64236 12346 established 0:00:19:59 788
617422 537 110350
0 ge0/0 0 udp 10.1.15.15 10.1.14.14 12346 12346 10.1.15.15 10.1.14.14 64236 12346 established 0:00:19:59 129
9335 9 3607
0 ge0/0 0 udp 10.1.15.15 10.1.14.14 12346 12350 10.1.15.15 10.1.14.14 64236 12350 established 0:00:19:59 227
32688 212 33496
0 ge0/0 0 udp 10.1.15.15 10.1.16.16 12346 12346 10.1.15.15 10.1.16.16 64236 12346 established 0:00:19:59 227
32688 212 33496
Related Topics
clear ip nat statistics, on page 762
nat, on page 440
show ip nat filter, on page 1070
Syntax Description
interface interface-name vpn vpn-id Specific Interface: Clear NAT translation statistics associated with
the specified interface.
vpn vpn-id Specific VPN: Clear NAT translation statistics associated with the
specified VPN.
Command History
Release Modification
Examples
Related Topics
clear ip nat filter, on page 760
nat, on page 440
show ip nat interface-statistics, on page 1074
Syntax Description
vpn vpn-id VPN: Clear the DHCP state of an interface in the specified VPN.
Command History
Release Modification
Related Topics
clear dhcp state, on page 746
show dhcp interface, on page 1004
show dhcp server, on page 1005
show ipv6 dhcp interface, on page 1089
Syntax Description
interface interface-name Interface: Refresh the dynamic ARP cache entries associated with the specific
interface.
ip-address IP Addresss: Refresh the dynamic ARP cache entries for the specified IP address.
vpn vpn-id VPN: Refresh the dynamic ARP cache entries for the specific VPN.
Command History
Release Modification
Examples
IF
VPN NAME IP MAC STATE IDLE TIMER UPTIME
----------------------------------------------------------------------------------------
0 ge0/0 2001::a01:f0d 00:0c:29:57:29:31 dynamic 0:00:00:00 0:00:06:07
0 ge0/0 2001::a01:f0f 00:0c:29:20:77:53 static - 0:00:08:31
0 ge0/0 fe80::20c:29ff:fe20:7753 00:0c:29:20:77:53 static - 0:00:26:32
0 ge0/0 fe80::20c:29ff:fe57:2931 00:0c:29:57:29:31 dynamic 0:00:00:00 0:00:08:06
0 ge0/1 2001::a01:110f 00:0c:29:20:77:5d static - 0:00:08:29
0 ge0/1 fe80::20c:29ff:fe20:775d 00:0c:29:20:77:5d static - 0:00:08:29
0 ge0/2 fe80::20c:29ff:fe20:7767 00:0c:29:20:77:67 static - 0:00:26:36
0 ge0/3 2001::a00:140f 00:0c:29:20:77:71 static - 0:00:08:29
0 ge0/3 fe80::20c:29ff:fe20:7771 00:0c:29:20:77:71 static - 0:00:08:29
0 ge0/6 2001::3900:10f 00:0c:29:20:77:8f static - 0:00:08:28
0 ge0/6 fe80::20c:29ff:fe20:778f 00:0c:29:20:77:8f static - 0:00:08:28
0 ge0/7 fe80::20c:29ff:fe20:7799 00:0c:29:20:77:99 static - 0:00:26:06
IF
VPN NAME IP MAC STATE IDLE TIMER UPTIME
----------------------------------------------------------------------------------------
0 ge0/0 2001::a01:f0f 00:0c:29:20:77:53 static - 0:00:08:31
0 ge0/0 fe80::20c:29ff:fe20:7753 00:0c:29:20:77:53 static - 0:00:26:32
0 ge0/1 2001::a01:110f 00:0c:29:20:77:5d static - 0:00:08:29
0 ge0/1 fe80::20c:29ff:fe20:775d 00:0c:29:20:77:5d static - 0:00:08:29
Related Topics
clear arp, on page 730
show arp, on page 932
show ipv6 neighbor, on page 1096
Syntax Description
name acl-name Access List Counters: Zero the counters associated with the specified access list.
Command History
Release Modification
Related Topics
clear policy, on page 782
show ipv6 policy access-list-counters, on page 1098
show ipv6 policy access-list-names, on page 1099
Command History
Release Modification
Examples
Related Topics
clear control connections, on page 742
clear omp peer, on page 768
clear omp routes, on page 770
clear omp tlocs, on page 771
show omp peers, on page 1130
Syntax Description
soft in Refresh the Peering Session: Re-apply the inbound or outbound policy to the specific peering
|out session.
Command History
Release Modification
Examples
ADDRESS PATH
FAMILY VPN PREFIX FROM PEER ID LABEL STATUS TLOC IP COLOR ENCAP PREFERENCE
--------------------------------------------------------------------------------------------------------------
ipv4 1 10.2.2.0/24 172.16.255.19 133 3806 C,I,R 172.16.255.11 lte ipsec -
172.16.255.20 43 3806 C,R 172.16.255.11 lte ipsec -
1 10.2.3.0/24 172.16.255.19 134 16355 C,I,R 172.16.255.21 lte ipsec -
172.16.255.20 44 16355 C,R 172.16.255.21 lte ipsec -
1 10.20.24.0/24 172.16.255.19 127 34885 C,I,R 172.16.255.15 lte ipsec -
172.16.255.20 20 34885 C,R 172.16.255.15 lte ipsec -
1 10.20.25.0/24 172.16.255.19 131 61944 C,I,R 172.16.255.16 lte ipsec -
172.16.255.20 17 61944 C,R 172.16.255.16 lte ipsec -
1 56.0.1.0/24 172.16.255.19 126 34885 C,I,R 172.16.255.15 lte ipsec -
172.16.255.20 19 34885 C,R 172.16.255.15 lte ipsec -
1 60.0.1.0/24 172.16.255.19 130 61944 C,I,R 172.16.255.16 lte ipsec -
172.16.255.20 16 61944 C,R 172.16.255.16 lte ipsec -
1 61.0.1.0/24 172.16.255.19 129 61944 C,I,R 172.16.255.16 lte ipsec -
172.16.255.20 15 61944 C,R 172.16.255.16 lte ipsec -
1 172.16.255.112/32 172.16.255.19 135 3806 C,I,R 172.16.255.11 lte ipsec -
172.16.255.19 136 16355 C,I,R 172.16.255.21 lte ipsec -
172.16.255.20 45 3806 C,R 172.16.255.11 lte ipsec -
172.16.255.20 46 16355 C,R 172.16.255.21 lte ipsec -
1 172.16.255.117/32 172.16.255.19 128 34885 C,I,R 172.16.255.15 lte ipsec -
DOMAIN SITE
PEER TYPE ID ID STATE UPTIME R/I/S
------------------------------------------------------------------------------
172.16.255.19 vsmart 1 100 up 0:00:00:00 0/0/0
172.16.255.20 vsmart 1 200 up 0:00:09:01 11/11/0
ADDRESS PATH
FAMILY VPN PREFIX FROM PEER ID LABEL STATUS TLOC IP COLOR ENCAP PREFERENCE
--------------------------------------------------------------------------------------------------------------
ipv4 1 10.2.2.0/24 172.16.255.20 43 3806 C,I,R 172.16.255.11 lte ipsec -
1 10.2.3.0/24 172.16.255.20 44 16355 C,I,R 172.16.255.21 lte ipsec -
1 10.20.24.0/24 172.16.255.20 20 34885 C,I,R 172.16.255.15 lte ipsec -
1 10.20.25.0/24 172.16.255.20 17 61944 C,I,R 172.16.255.16 lte ipsec -
1 56.0.1.0/24 172.16.255.20 19 34885 C,I,R 172.16.255.15 lte ipsec -
1 60.0.1.0/24 172.16.255.20 16 61944 C,I,R 172.16.255.16 lte ipsec -
1 61.0.1.0/24 172.16.255.20 15 61944 C,I,R 172.16.255.16 lte ipsec -
1 172.16.255.112/32 172.16.255.20 45 3806 C,I,R 172.16.255.11 lte ipsec -
172.16.255.20 46 16355 C,I,R 172.16.255.21 lte ipsec -
1 172.16.255.117/32 172.16.255.20 21 34885 C,I,R 172.16.255.15 lte ipsec -
1 172.16.255.118/32 172.16.255.20 18 61944 C,I,R 172.16.255.16 lte ipsec -
Related Topics
clear omp all, on page 767
clear omp routes, on page 770
clear omp tlocs, on page 771
show omp peers, on page 1130
Command History
Release Modification
Examples
Related Topics
clear omp all, on page 767
clear omp peer, on page 768
clear omp tlocs, on page 771
show omp routes, on page 1134
Command History
Release Modification
Example
Related Topics
clear omp all, on page 767
clear omp peer, on page 768
clear omp routes, on page 770
show omp tlocs, on page 1143
Command History
Release Modification
Examples
PEER PEER PEER SITE DOMAIN PEER PRIVATE PEER PUBLIC LAST TIME WHEN
TYPE PROTOCOL SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT REMOTE COLOR STATE LOCAL/REMOTE LAST CHANGED
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
vedge dtls 172.16.255.14 400 1 10.1.14.14 12350 10.1.14.14 12350 lte trying RXTRDWN/DISCVBD 2014-07-21T18:23:14
vedge dtls 172.16.255.16 600 1 10.1.16.16 12346 10.1.16.16 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T18:23:14
vedge dtls 172.16.255.15 500 1 10.1.15.15 12346 10.1.15.15 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T18:23:00
vedge dtls 172.16.255.15 500 1 10.1.15.15 12346 10.1.15.15 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T18:22:44
vedge dtls 172.16.255.16 600 1 10.1.16.16 12346 10.1.16.16 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T18:22:43
vedge dtls 172.16.255.14 400 1 10.1.14.14 12350 10.1.14.14 12350 lte trying RXTRDWN/DISCVBD 2014-07-21T18:22:28
vmanage dtls 172.16.255.22 200 0 10.0.12.22 12346 10.0.12.22 12346 default tear_down VM_TMO/NOERR 2014-07-21T18:22:28
vedge dtls 172.16.255.15 500 1 10.1.15.15 12346 10.1.15.15 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:47
vedge dtls 172.16.255.14 400 1 10.1.14.14 12350 10.1.14.14 12350 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:46
vedge dtls 172.16.255.16 600 1 10.1.16.16 12346 10.1.16.16 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:46
vedge dtls 172.16.255.15 500 1 10.1.15.15 12346 10.1.15.15 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:31
vedge dtls 172.16.255.14 400 1 10.1.14.14 12350 10.1.14.14 12350 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:31
vedge dtls 172.16.255.16 600 1 10.1.16.16 12346 10.1.16.16 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:31
vsmart dtls 172.16.255.20 100 1 10.0.12.20 12346 10.0.12.20 12346 default up RXTRDWN/DISTLOC 2014-07-21T13:39:15
vedge dtls 172.16.255.16 600 1 10.1.16.16 12346 10.1.16.16 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:10
vedge dtls 172.16.255.14 400 1 10.1.14.14 12350 10.1.14.14 12350 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:10
vedge dtls 172.16.255.15 500 1 10.1.15.15 12346 10.1.15.15 12346 lte trying RXTRDWN/DISCVBD 2014-07-21T13:39:10
vBond# clear orchestrator connections-history
vBond# show orchestrator connections-history
vBond#
Related Topics
clear control connections-history, on page 743
show control connections, on page 984
show orchestrator connections-history, on page 1152
show orchestrator local-properties, on page 1156
show orchestrator statistics, on page 1159
Syntax Description
Command History
Release Modification
Examples
IF IF DEAD
VPN ADDRESS INDEX NAME NEIGHBOR ID STATE PRI TIME DBsmL RqstL RXmtL
--------------------------------------------------------------------------------------
1 10.20.24.17 0 ge0/4 172.16.255.17 full 1 31 0 0 0
Related Topics
show ospf neighbor, on page 1170
Syntax Description
vpn VPN: Clear the OSPF link-state database of entries from the specified VPN.
vpn-id
Command History
Release Modification
Examples
Related Topics
show ospf database, on page 1165
Syntax Description
interface-name vpn Interface Name: Release the PIM neighbors and joins on a specific interface in
vpn-id a specific VPN.
Command History
Release Modification
Examples
Related Topics
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
show pim neighbor, on page 1179
show pim rp-mapping, on page 1180
show pim statistics, on page 1181
Syntax Description
ip-address vpn vpn-id Neighbor To Clear: Clear a specific neighbor in the specified VPN.
Command History
Release Modification
Examples
Related Topics
clear pim interface, on page 775
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
show pim neighbor, on page 1179
show pim rp-mapping, on page 1180
show pim statistics, on page 1181
Syntax Description
vpn VPN: Clear the PIM protocol state for the specified VPN.
vpn-id
Command History
Release Modification
Examples
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
show pim neighbor, on page 1179
show pim rp-mapping, on page 1180
show pim statistics, on page 1181
Syntax Description
Command History
Release Modification
Examples
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
show pim neighbor, on page 1179
show pim rp-mapping, on page 1180
show pim statistics, on page 1181
Syntax Description
(none) Clear all PIM statistics, neighbors, and joins, and then relearn them.
vpn VPN: Clear the PIM statistics, neighbors, and joins in the specified VPN, and then relearn them.
vpn-id
Command History
Release Modification
Examples
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
show multicast replicator, on page 1111
Command History
Release Modification
Examples
Related Topics
show policer, on page 1183
show policy data-policy-filter, on page 1188
show policy from-vsmart, on page 1191
clear policy
Reset all counters for IPv4 access lists or data policies (on vSmart controllers and vEdge routers only).
clear policy (access-list acl-name | app-route-policy policy-name | data-policy policy-name)
Syntax Description
access-list acl-name Access List Counters: Zero the counters associated with the specified access
list.
app-route-policy policy-name Application-Aware Routing Policy Counter: Zero the counters associated
with the specified application-aware routing policy.
data-policy policy-name Data Policy Counters: Zero the counters associated with the specified data
policy.
Command History
Release Modification
Related Topics
clear ipv6 policy, on page 766
Command History
Release Modification
Examples
Display statistics about packets that the router has processed with zone-based firewall policy
vEdge# show policy zbfw filter-staatistics
Related Topics
show policy zbfw filter-statistics, on page 1199
Command History
Release Modification
Examples
Clear the statistics about packets that the router has processed with zone-based firewalls
vEdge# clear zbfw global-statistics
vEdge# show zbfw global-statistics
fragments : 0
fragments fail : 0
state check fail : 0
flow add fail : 0
unsupported proto : 0
number of flow entries : 0
max half open exceeded : 0
Related Topics
show policy zbfw global-statistics, on page 1200
Syntax Description
(none) Clear the session flow entries for all zone pairs.
name Zone Pair Name: Clear the session flow entries for the specified zone pair.
pair-name
Command History
Release Modification
Examples
ZONE PAIR SOURCE IP DESTINATION SOURCE DESTINATION SOURCE DESTINATION IDLE OUTBOUND OUTBOUND INBOUND INBOUND
FILTER
NAME VPN ADDRESS IP ADDRESS PORT PORT PROTOCOL VPN VPN TIMEOUT PACKETS OCTETS PACKETS OCTETS STATE
------------------------------------------------------------------------------------------------------------------------------------------------------------
zp1 1 10.20.24.17 10.20.25.18 44061 5001 TCP 1 1 0:00:59:59 12552 17581337 6853 463590
established
zp1 1 10.20.24.17 10.20.25.18 44062 5001 TCP 1 1 0:01:00:00 10151 14217536 5561 375290
established
zp1 1 10.20.24.17 10.20.25.18 44063 5001 TCP 1 1 0:00:59:59 7996 11198381 4262 285596
established
zp1 1 10.20.24.17 10.20.25.18 44064 5001 TCP 1 1 0:00:59:59 7066 9895451 3826 257392
established
zp1 1 10.20.24.17 10.20.25.18 44065 5001 TCP 1 1 0:00:59:59 13471 18868856 7440 504408
established
zp1 1 10.20.24.17 10.20.25.18 44066 5001 TCP 1 1 0:00:59:59 8450 11834435 4435 295718
established
vEdge# clear policy zbfw sessions
vEdge# show policy zbfw sessions
ZONE PAIR SOURCE IP DESTINATION SOURCE DESTINATION SOURCE DESTINATION IDLE OUTBOUND OUTBOUND INBOUND INBOUND
FILTER
NAME VPN ADDRESS IP ADDRESS PORT PORT PROTOCOL VPN VPN TIMEOUT PACKETS OCTETS PACKETS OCTETS STATE
------------------------------------------------------------------------------------------------------------------------------------------------------------
zp1 1 10.20.24.17 10.20.25.18 44061 5001 TCP 1 1 0:00:59:59 0 0 0 0
established
zp1 1 10.20.24.17 10.20.25.18 44062 5001 TCP 1 1 0:01:00:00 0 0 0 0
established
zp1 1 10.20.24.17 10.20.25.18 44063 5001 TCP 1 1 0:00:59:59 0 0 0 0
established
zp1 1 10.20.24.17 10.20.25.18 44064 5001 TCP 1 1 0:00:59:59 0 0 0 0
established
zp1 1 10.20.24.17 10.20.25.18 44065 5001 TCP 1 1 0:00:59:59 0 0 0 0
established
zp1 1 10.20.24.17 10.20.25.18 44066 5001 TCP 1 1 0:00:59:59 0 0 0 0
established
Related Topics
show policy zbfw sessions, on page 1202
Command History
Release Modification
Examples
pppoe_tx_pkts : 73
pppoe_rx_pkts : 39
pppoe_tx_session_drops : 0
pppoe_rx_session_drops : 0
pppoe_inv_discovery_pkts : 0
pppoe_ccp_pkts : 12
pppoe_ipcp_pkts : 16
pppoe_lcp_pkts : 35
pppoe_padi_pkts : 4
pppoe_pado_pkts : 2
pppoe_padr_pkts : 2
pppoe_pads_pkts : 2
pppoe_padt_pkts : 2
pppoe_tx_pkts : 0
pppoe_rx_pkts : 0
pppoe_tx_session_drops : 0
pppoe_rx_session_drops : 0
pppoe_inv_discovery_pkts : 0
pppoe_ccp_pkts : 0
pppoe_ipcp_pkts : 0
pppoe_lcp_pkts : 0
pppoe_padi_pkts : 0
pppoe_pado_pkts : 0
pppoe_padr_pkts : 0
pppoe_pads_pkts : 0
pppoe_padt_pkts : 0
Related Topics
show ppp interface, on page 1203
show pppoe session, on page 1204
show pppoe statistics, on page 1205
Command History
Release Modification
Examples
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 2 (0x2)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=California, O=Viptela, OU=ViptelaVmanage,
CN=813fd02c-acca-4c19-857b-119da60f257f
Validity
Not Before: May 11 21:43:29 2018 GMT
Not After : May 4 21:43:29 2048 GMT
Subject: C=US, ST=California, CN=47bd1f2b-3abe-41cd-9b9f-e84db7fd2377, O=ViptelaClient
Related Topics
show certificate reverse-proxy, on page 963
show control connections, on page 984
Command History
Release Modification
Examples
rx_pkt_qos_7: 9251604
icmp_rx.echo_requests: 15
icmp_rx.echo_replies: 257071
icmp_rx.host_unreach: 13
icmp_rx.port_unreach: 58
icmp_rx.dst_unreach_other: 11
icmp_rx.fragment_required: 28
icmp_rx.ttl_expired: 9
icmp_tx.echo_requests: 257764
icmp_tx.echo_replies: 2
icmp_tx.network_unreach: 28
icmp_tx.port_unreach: 137
icmp_tx.fragment_required: 279
Related Topics
show system statistics, on page 1236
Command History
Release Modification
Examples
Related Topics
show tunnel statistics, on page 1252
Syntax Description
Command History
Release Modification
Related Topics
show interface, on page 1032
show wlan clients, on page 1260
show wlan interfaces, on page 1261
show wlan radios, on page 1263
show wlan radius, on page 1265
clock
Set the time and date on the device. If you have configured NTP on the device, the NTP time overwrites the
time and date that you set with the clock command.
clock set date ccyy-mm-dd
clock set time hh:mm:ss.sss
Syntax Description
ccyy-mm-dd Date: Set the date by specifying four-digit year, two-digit month, and two-digit day. The year
can be from 2000 to 2060.
hh:mm:ss.sss Time: Set the time by two-digit hour (using a 24-hour clock), two-digit minute, two-digit
seconds, and an optional three-digit hundredths of seconds.
Note You must set the time and date in a single command, but the order in which you specify them does not matter.
Command History
Release Modification
Examples
Related Topics
ntp, on page 454
show uptime, on page 1255
commit
Confirm or abort a pending commit operation. You issue this commit command from operational mode. You
establish a pending commit operation by using the commit confirmed configuration session management
command.
commit (abort | confirm) [persist-id id]
Syntax Description
confirm Confirm a Pending Commit Operation: Confirm a pending commit operation that was issued
with the commit confirmed configuration command. You must confirm the commit operation
with the time specified with the commit confirmed command; otherwise, the commit aborts.
abort Halt a Pending Commit Operation: Halt a pending commit operation that was issued with the
commit confirmed command. This is the default operation for a pending commit operation.
The commit is also aborted if the CLI session is terminated before you issue a commit confirm
command.
persist-id Token to Identify the Pending Commit Operation: If you specified a token, id, when you
id initiated the pending commit operation, specify that token to either abort or confirm the commit.
Command History
Release Modification
Examples
Related Topics
commit, on page 1297
show configuration commit list, on page 977
complete-on-space
Have the CLI automatically complete a command name when you type an unambiguous string and then press
the space bar, or have the CLI list all possible completions when you type an ambiguous string and then press
the space bar.
complete-on-space (false | true)
Syntax Description
false Do Not Perform Command Completion: Do not have the CLI perform
command completion when you press the space bar. This is the default
setting.
Command History
Release Modification
Examples
Related Topics
show cli, on page 971
config
Enter configuration mode for vEdge devices. In configuration mode, you are editing a copy of the running
configuration, called the candidate configuration, not the actual running configuration. Your changes take
effect only when you issue a commit command.
Note Cisco IOS XE routers such as aggregation and integrated services routers should use the command
config-transaction to enter configuration mode. The config terminal command is not supported on SD-WAN
routers.
Syntax Description
(none) Edit a private copy of the running configuration. This private copy is not locked, so another user
could also edit it at the same time.
terminal Allow Editing from This Terminal Only: Edit a private copy of the running configuration. This
private copy is not locked, so another user could also edit it at the same time.
no-confirm Do Not Allow a Commit Confirmation: Edit a private copy of the running configuration and do
not allow the commit confirmed command to be used to commit the configuration.
exclusive Exclusive Edit: Lock the running configuration and the candidate configuration, and edit the
candidate configuration. No one else can edit the candidate configuration as long as it is locked.
shared Shared Edit: Edit the candidate configuration without locking it. This option allows another
person to edit the candidate configuration at the same time.
Command History
Release Modification
Examples
vEdge# config
Entering configuration mode terminal
vEdge(config)#
Related Topics
file list, on page 807
load, on page 1304
debug
Enable and disable debugging mode for all or selected software function. Debug output is placed in the
/var/log/tmplog/vdebug file on the local device.
[no] debug all
[no] debug aaa login (radius | tacacs)
[no] debug bgp (all | events | fsm | ipcs | packets) vpn vpn-id
[no] debug cflowd (cli | events | ipc | misc | pkt_tx) [level (high | low)]
[no] debug chmgr all
[no] debug cloudexpress (events | ftm | omp | rtm | ttm) [level (high | low)]
[no] debug confd (developer-log [level (high | low)] | snmp)
[no] debug config-mgr (events | pppoe | ra) [level (high | low)]
[no] debug dbgd (events)
[no] debug dhcp-client (all | events | packets)
[no] debug dhcp-helper (all | events | packets)
[no] debug fpm (all | config | dpi | policy | ttm)
[no] debug ftm all[no] debug igmp (config | events | fsm | ipc | packets) [level (high | low)]
[no] debug iked (all | confd | error | events | misc) [level (high | low)]
[no] debug netconf traces[no] debug omp (all | events | ipcs | packets)
[no] debug ospf (all | events | ipcs | ism | lsa | nsm | nssa | packets) vpn vpn-id
[no] debug pim (auto-rp | events | fsm | ipcs | packets) [level (high | low)] vpn vpn-id
[no] debug resolver events [level (high | low)]
[no] debug rtm (events | ipc | next-hop | packets | rib) vpn vpn-id
[no] debug snmp events [level (high | low)]
[no] debug sysmgr all
[no] debug transport events [level (high | low)]
[no] debug tcpd [level (high | low)]
[no] debug ttm events
[no] debug vdaemon (all | confd | error | events | misc | packets) (high | low)
[no] debug vrrp (all | events | packets) vpn vpn-id
Syntax Description
[no] debug all All: Control debugging for all software functions that can be debugged.
[no] debug aaa login AAA Login via RADIUS or TACACS: Control debugging for login attempts
(radius | tacacs) using RADIUS or TACACS.
[no] debug bgp (all | events BGP: Control debugging for BGP:
| fsm | ipcs | packets) vpn
• all—Control the debugging of all BGP events, finite-state machine
vpn-id
transitions, interprocess communications, and packets.
• events—Control the debugging of BGP events, including damping events,
finite-state machine events and transitions, keepalive message events,
next-hop events, and routing table update events.
• fsm—Control the debugging of BGP finite-state machine transitions.
• ipcs—Control the debugging of all BGP interprocess communications.
• packets—Control the debugging of all BGP protocol packets.
• vpn vpn-id—Specify the VPN in which to perform debugging.
[no] debug chmgr all Chassis Manager: Control debugging for the chassis manager.
[no] debug cloudexpress Cloud OnRamp for SaaS: Control debugging for Cloud OnRamp for SaaS
(events | ftm | omp | rtm | (formerly CloudExpress service).
ttm) [level (high | low)]
• events—Control the debugging of events to which the Cloud OnRamp
for SaaS process (daemon) responds, including when the process connects
with a collector or loses connectivity with it, and when the source-interface
as configured in the vSmart template is removed.
• ftm—Control debugging of the communication between Cloud OnRamp
for SaaS and the forwarding table manager.
• level (high | low)—Set the detail of the comments logged by the debugging
operation. The default level, low, provides comments sufficient to help
you understand the actions that are occurring. The level high provides
greater detail for the live debugging that might typically be performed by
the Cisco SD-WAN engineering team.
• omp—Control the debugging of all Cloud OnRamp for SaaS OMP
operations.
• rtm—Control the debugging of communication between the Cloud
OnRamp for SaaS and the route table manager.
• ttm—Control the debugging of communication between the Cloud
OnRamp for SaaS and the tunnel table manager.
[no] debug config-mgr Configuration Manager: Control debugging for the configuration manager.
(events | pppoe | ra)
• events—Control the debugging of events to which the configuration
[level (high | low)]
manager process (daemon) responds, including when the process connects
with a collector or loses connectivity with it, and when the source-interface
as configured in the vSmart template is removed.
• level (high | low)—Set the detail of the comments logged by the debugging
operation. The default level, low, provides comments sufficient to help
you understand the actions that are occurring. The level high provides
greater detail for the live debugging that might typically be performed by
the Cisco engineering team.
• pppoe—Control the debugging of all Cloud OnRamp for SaaS OMP
operations.
• ra—Control the debugging of route advertisements to which the
configuration manager responds.
[no]debug dbgd events Debugger Process: Control debugging for the debugger process itself.
• events—Control the debugging of events to which the debugger process
(daemon) responds.
[no] debug dhcp-client (all DHCP Client: Control the debugging of Dynamic Host Configuration Protocol
| events | packets) (DHCP) client activities.
• all—Control the debugging of all DHCP client events and packets.
• events—Control the debugging of DHCP client protocol events.
• packets—Control the debugging of all DHCP client packets.
[no] debug dhcp-helper DHCP Helper: Control the debugging of Dynamic Host Configuration Protocol
(all | events | packets) (DHCP) helper activities.
• all—Control the debugging of all DHCP helper events and packets.
• events—Control the debugging of DHCP helper protocol events.
• packets—Control the debugging of all DHCP helper packets.
[no] debug fpm (all | config Forwarding Policy Manager: Control debugging for the forwarding policy
| dpi | policy | ttm) manager:
• all—Control the debugging of events related to the forwarding policy
manager, including configuration changes, application-aware routing
events, and communication with the tunnel table manager.
• config—Control the debugging of messages that are logged as a result of
a policy configuration change made either directly on the vEdge router
or because the changes have been pushed from the vSmart controller to
the router.
• dpi—Control the debugging of all application-aware routing (deep packet
inspection) events.
• policy—Control the debugging of messages that are logged as the result
of policy programming events.
• ttm—Control the debugging of communication between the forwarding
policy manager and the tunnel table manager.
[no] debug ftm all[no] Forwarding Table Manager: Control debugging for the forwarding table
debug igmp (config | events manager operations.
| fsm | ipc | packets) [level
(high | low)]
[no] debug iked (all | confd IKE: Control debugging for the forwarding policy manager.
| error | events | misc) [level
• all—Control the debugging of all events related to IKE.
(high | low)]
• confd—Control the debugging of Netconf activity to log all IKE-related
Netconf configuration messages between the local device and the vManage
NMS.
• error—Control the debugging of IKE errors.
• events—Control the debugging of IKE protocol events.
• level (high | low)—Set the detail of the comments logged by the debugging
operation. The default level, low, provides comments sufficient to help
you understand the actions that are occurring. The level high provides
greater detail for the live debugging that might typically be performed by
the Cisco SD-WAN engineering team.
• misc—Control the debugging of miscellaneous IKE events.
[no] debug netconf Netconf: Enable and disable Netconf activity to log all Netconf configuration
traces[no] debug omp (all messages between the local device and the vManage NMS.
| events | ipcs | packets)
Netconf debug messages are logged to the /var/log/confd/netconf.trace file.
[no] debug ospf (all | events OSPF: Control the debugging of OSPF.
| ipcs | ism | lsa | nsm | nssa
• all—Control the debugging of all OSPF functions.
| packets) vpn vpn-id
• events—Control the debugging of OSPF events, including adjacencies,
flooding information, designated router selection, and shortest path first
(SPF) calculations.
• ipcs—Control the debugging of all OSPF interprocess communications.
• ism—Control the debugging of OSPF interface state machine transitions.
• nsm—Control the debugging of OSPF network tate machine transitions.
• lsa—Control the debugging of OSPF LSA messages.
• nssa—Control the debugging of OSPF NSSA messages.
• packets—Control the debugging of all OSPF protocol packets.
[no] debug resolver events Resolver: Control debugging for all resolver process events. The resolver
[level (high | low)] process handles a plethora of tasks, including tracking ARP, MAC addresses,
DNS, and connected interfaces.
• level (high | low)—Set the detail of the comments logged by the debugging
operation. The default level, low, provides comments sufficient to help
you understand the actions that are occurring. The level high provides
greater detail for the live debugging that might typically be performed by
the Cisco SD-WAN engineering team.
[no] debug rtm (events | Route Table Manager: Control debugging for the route table manager.
ipc | next-hop | packets |
• events—Control the debugging of route table manager events.
rib) vpn vpn-id
• ipc—Control the debugging of all route table manager interprocess
communications.
• next-hop—Control the debugging of the route table manager handling of
next hops.
• packets—Control the debugging of the route table manager handling of
route exchange packets.
• rib—Control the debugging of route table manager communication with
the route table.
• vpn vpn-id—Specify the VPN in which to perform debugging.
[no] debug snmp events SNMP: Control debugging for all SNMP events.
[level (high | low)]
• level (high | low)—Set the detail of the comments logged by the debugging
operation. The default level, low, provides comments sufficient to help
you understand the actions that are occurring. The level high provides
greater detail for the live debugging that might typically be performed by
the Cisco SD-WAN engineering team.
[no] debug sysmgr all System Manager: Control debugging for the system manager.
[no] debug tcpd [level TCP Optimization Process: Control debugging for TCP optimization.
(high | low)][no] debug ttm
• level (high | low)—Set the detail of the comments logged by the debugging
events[no] debug vdaemon
operation. The default level, low, provides comments sufficient to help
(all | confd | error | events
you understand the actions that are occurring. The level high provides
| misc | packets) (high |
greater detail for the live debugging that might typically be performed by
low)
the Cisco SD-WAN engineering team.
[no] debug transport Transport Process: Control debugging for all vtracker transport process events.
events [level (high | low)] The vtracker process pings the vBond orchestrator every second.
• level (high | low)—Set the detail of the comments logged by the debugging
operation. The default level, low, provides comments sufficient to help
you understand the actions that are occurring. The level high provides
greater detail for the live debugging that might typically be performed by
the Cisco SD-WAN engineering team.
[no] debug ttm events Tunnel Table Manager: Control debugging for all tunnel table manager events.
[no] debug tcpd [level Vdaemon Process: Control debugging for vdaemon, the Cisco SD-WAN
(high | low)][no] debug ttm software process,
events[no] debug vdaemon
• all—Control the debugging of all vdaemon process functions.
(all | confd | error | events
| misc | packets) (high | • confd—Control the debugging of vdaemon process CLI functions.
low)
• error—Control the debugging error of vdaemon actions.
• events—Control the debugging of vdaemon process events.
• misc—Control the debugging of miscellaneous vdaemon process events.
• packets—Control the debugging of all vdaemon process packets.
[no] debug vrrp (all | VRRP: Control debugging for the Virtual Router Redundancy Protocol (VRRP).
events | packets) vpn vpn-id
• all—Control the debugging of all VRRP events and packets.
• events—Control the debugging of VRRP events.
• packets—Control the debugging of VRRP packets.
Command History
Release Modification
16.3 Starting with Release 16.3, output is placed in the /var/log/tmplog/vdebug file, not the
/var/log/vdebug file.
exit
Exit from the CLI session. The exit and quit commands do the same thing.
exit
Command History
Release Modification
Examples
vEdge# exit
My-MacBook-Pro:~ me$
Related Topics
quit, on page 829
vshell, on page 1289
file list
List the files in a directory on the Cisco SD-WAN device.
file list directory
Syntax Description
directory Name of a Directory: List the files in the specified directory on the Cisco SD-WAN device.
Examples
Command History
Release Modification
Related Topics
file show, on page 808
save, on page 1349
file show
Display the contents of a file on the Cisco SD-WAN device.
file show filename
Syntax Description
Command History
Release Modification
Examples
Related Topics
file list, on page 807
help
Display help information about a CLI command.
help
Command History
Release Modification
Examples
Related Topics
show parser dump, on page 1177
history
Set the number of history items that the CLI tracks in operational mode.
show history number
Syntax Description
show history number Number of History Items: Set the number of commands tracked by the CLI history.
number can be a value from 0 through 1000. The default is 100 commands. To
disable the history feature, set the number to 0.
no history Return to Default Number of History Items: Restore the default history queue length
of 100 commands.
Command History
Release Modification
Examples
Related Topics
clear history, on page 750
show history, on page 1023
idle-timeout
Set how long the CLI is inactive on a device before the user is logged out. If a user is connected to the device
via an SSH connection, the SSH connection is closed after this time expires.
idle-timeout seconds
Syntax Description
idle-timeout seconds Timeout Value: Number of seconds that the CLI is idle before the user is logged out
of the CLI. A value of 0 (zero) sets the time to infinity, so the user is never logged
out.
Range: 0 through 8192 seconds.
Default: 1800 seconds (30 minutes).
Command History
Release Modification
Examples
Related Topics
exit, on page 806
idle-timeout, on page 299
show cli, on page 971
job stop
Stop a job that is monitoring a file on the local device. This command is the same as the UNIX kill command.
job stop job-number
Syntax Description
Command History
Release Modification
Examples
Related Topics
monitor start, on page 816
monitor stop, on page 817
show jobs, on page 1103
logout
Terminate the current CLI session, a specific CLI session, or the session of a specific user.
logout [session session-number] [user username]
Syntax Description
user username Specific User: Terminate the CLI session of a specific user.
Command History
Release Modification
Examples
Related Topics
exit, on page 806
Syntax Description sdwan Name of the Cisco SD-WAN subsystem that is the subject of the event trace. To get a list of
components that support event tracing, use the monitor event-trace ? command.
clear Clears existing trace messages for the specified component from memory on the networking
device.
one-shot Clears any existing trace information from memory, starts event tracing again, and disables the
trace when the trace reaches the size specified.
Usage Guidelines The amount of data collected from the trace depends on the trace message size configured using the monitor
event-trace command in global configuration mode for each instance of a trace.
Use the show monitor event-trace command to display trace messages.
Use the monitor event-trace sdwan dump command to save trace message information for a single event.
By default, trace information is saved in binary format.
Examples The following example shows the privileged EXEC commands to stop event tracing, clear the current
contents of memory, and reenable the trace function for the component. This example assumes that
the tracing function is configured and enabled on the networking device.
The following example shows how the monitor event-trace one-shot command accomplishes
the same function as the previous example except in one command. In this example, once the size
of the trace message file has been exceeded, the trace is terminated.
The following example shows the command for writing trace messages for an event in binary format.
In this example, the trace messages for the SD-WAN component are written to a file.
monitor start
Begin monitoring a file on the local device. When a file is monitored, any logging information is displayed
on the console as it is added to the file.
monitor start filename
Syntax Description
Command History
Release Modification
Examples
Start and stop monitoring a file, and view the files that are being monitored
vEdge# monitor start /var/log/vsyslog
vEdge# show jobs
JOB COMMAND
1 monitor start /var/log/vsyslog
vEdge# log:local7.notice: Dec 16 14:55:26 vsmart SYSMGR[219]: %Viptela-vsmart-SYSMGR-5-NTCE-200025: System clock set to Wed Dec 16 14:55:26 2015 (timezone 'America/Los_Angeles')
log:local7.notice: Dec 16 14:55:27 vsmart SYSMGR[219]: %Viptela-vsmart-SYSMGR-5-NTCE-200025: System clock set to Wed Dec 16 14:55:27 2015 (timezone 'America/Los_Angeles')
Related Topics
job stop, on page 812
monitor stop, on page 817
show jobs, on page 1103
monitor stop
Stop monitoring a file on the local device. When a file is monitored, any logging information is displayed on
the console as it is added to the file.
monitor stop filename
Syntax Description
Command History
Release Modification
Examples
Start and stop monitoring a file, and view the files that are being monitored
vEdge# monitor start /var/log/vsyslog
vEdge# show jobs
JOB COMMAND
1 monitor start /var/log/vsyslog
vEdge# log:local7.notice: Dec 16 14:55:26 vsmart SYSMGR[219]: %Viptela-vsmart-SYSMGR-5-NTCE-200025: System clock set to Wed Dec 16 14:55:26 2015 (timezone 'America/Los_Angeles')
log:local7.notice: Dec 16 14:55:27 vsmart SYSMGR[219]: %Viptela-vsmart-SYSMGR-5-NTCE-200025: System clock set to Wed Dec 16 14:55:27 2015 (timezone 'America/Los_Angeles')
Related Topics
job stop, on page 812
monitor start, on page 816
show jobs, on page 1103
nslookup
Perform a DNS lookup.
nslookup [vpn-id vpn-id] dns-name
Syntax Description
dns-name DNS Name: Perform a DNS lookup to map a fully qualified domain name to one or more IP
addresses.
dns-name can be a hostname string, or an IPv4 or IPv6 address.
vpn-id VPN: Specify the VPN into which to send the ping packets. If you omit the VPN identifier,
vpn-id the default is VPN 0, which is the transport VPN.
Command History
Release Modification
Examples
Name: vedge
Address 1: 172.16.255.100 vedge.dns.com
Name: fe80::20c:29ff:fe9b:a9bb
Address1: fe80::20c:29ff:fe9b:a9bb
Related Topics
ping, on page 821
traceroute, on page 1287
paginate
Control the pagination of command output.
paginate (false | true)
Syntax Description
Command History
Release Modification
Examples
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password $1$zvOh58pk$QLX7/RS/F0c6ar94.xl2k.
!
!
logging
disk
enable
!
!
!
vEdge#
Related Topics
more, on page 1345
nomore, on page 1346
tab, on page 1353
ping
Verify that a network device is reachable on the network, by sending ICMP ECHO_REQUEST packets to
them. This command is effectively identical to the standard UNIX ping command.
ping (hostname | ip-address)
ping vpn vpn-id (hostname | ip-address)
ping [count number] [rapid] [size bytes] [source (interface-name | ip-address)] [wait seconds] vpn vpn-id
(hostname | ip-address)
Syntax Description
(hostname | ip-address) Device to Ping: Name or IPv4 or IPv6 address of the host to ping. For an IPv4
address in a service VPN, you can ping the primary and the secondary addresses.
count number Number of Ping Requests to Send: Number of ping requests to send. If you do
not specify a count, the command operates until you interrupt it by typing
Control-C.
rapid Rapid Pinging: Send five ping requests in rapid succession and display
abbreviated statistics, only for packets transmitted and received, and percentage
of packets lost.
size bytes Size of Ping Request Packets: Size of the packet to send.
Default: 64 bytes (56 bytes of data plus 8 bytes of ICMP header).
source (interface-name | Source of Ping Packets: Interface or IP address from which to send to ping
ip-address) packets. You cannot specify the loopback0 interface in this option.
wait seconds Time to Wait between Each Ping Packet: Time to wait for a response to a ping
packet.
Default: 1 second.
vpn vpn-id VPN in which to Ping: Specify the VPN into which to send the ping packets.
Command History
Release Modification
Examples
Related Topics
tools nping, on page 1278
traceroute, on page 1287
poweroff
Shut down the Cisco SD-WAN device. Issue this command when you need to power down a router. Do not
simply unplug the router.
poweroff
Command History
Release Modification
Examples
vEdge# poweroff
Are you sure you want to power off the system? [yes NO] yes
Starting cleanup
Stopping vedge daemon: sysmgr.
Shutting down
Related Topics
exit, on page 806
vshell, on page 1289
prompt1
Set the operational prompt.
prompt1 string
Syntax Description
Command History
Release Modification
Examples
Related Topics
prompt2, on page 827
show cli, on page 971
prompt2
Set the configuration mode prompt.
prompt2 string
Syntax Description
Command History
Release Modification
Examples
Related Topics
prompt1, on page 825
show cli, on page 971
quit
Exit from the CLI session. The exit and quit commands do the same thing.
quit
Examples
vEdge# quit
My-MacBook-Pro:~ me$
Command History
Release Modification
Related Topics
exit, on page 806
vshell, on page 1289
reboot
Reboot the Cisco SD-WAN device.
Any user can issue the reboot command, but the underlying logging mechanism does not log the user name.
If you subsequently issue a show reboot history command, it shows that the reboot request was issued by an
unnamed user.
Note You cannot issue the reboot command while a software upgrade is in progress.
Syntax Description
(none) Reboot the device. The software prompts you to confirm that you really want to reboot.
now Reboot Immediately: Reboot the device immediately, with no prompt asking you to
confirm that you want to reboot.
other-boot-partition Reboot and Use the Software Image on the Other Disk Partition: (Available in releases
15.3 and earlier.)
When rebooting the device, start the software image that is installed on the other disk
partition. The software prompts you to confirm that you really want to reboot. If the
other partition cannot be mounted or if the directory on the other partition is
unreadable, an error message is displayed and the reboot operation is aborted.
other-boot-partition Switch to the Other Software Image without Rebooting: (Available in releases 15.3
no-sync and earlier.)
Switch to the software image that is installed on the other disk partition without
rebooting the device. If the other partition cannot be mounted or if the directory on
the other partition is unreadable, an error message is displayed and the switch operation
is aborted.
Command History
Release Modification
14.2 Starting with the 14.2 release, you cannot issue the reboot command when a software
upgrade is in progress.
15.3 Starting with the 15.3 release, the reboot other-boot-partition command prompts for
confirmation.
15.4 Starting with 15.4 release, the reboot other-boot-partition command is replaced with
the request software activate command.
Examples
Reboot
vEdge# reboot
Are you sure you want to reboot? [yes,NO] yes
Starting cleanup
Stopping viptela daemon: sysmgr.
Rebooting now
show boot-partition
vEdge# show boot-partition (available in Releases 15.3 and earlier)
reboot other-boot-partition
vEdge# reboot other-boot-partition (available in Releases 15.3 and earlier)
Are you sure you want to boot using image in other boot partition? [yes,NO] <CR>
Aborted: by user
Related Topics
request software activate, on page 882
request software install, on page 883
show boot-partition, on page 949
show reboot history, on page 1206
show software, on page 1233
show system status, on page 1241
Syntax Description
Command History
Release Modification
Examples
Related Topics
aaa, on page 43
show users, on page 1256
request admin-tech
Collect system status information in a compressed tar file, to aid in troubleshooting and diagnostics. This tar
file, which is saved in the user's home directory, contains the output of various commands and the contents
of various files on the local device, including syslog files, files for each process (daemon) running on the
device, core files, and configuration rollback files. For aid in troubleshooting, send the file to Cisco SD-WAN
customer support.
If your Cisco SD-WAN device contains a large number of crash log files, it might take a few minutes for the
request admin-tech command to complete.
On a single device, you can run only one request admin-tech command at a time. If a command is in progress,
the device does not let a second one start.
When a process (daemon) on a Cisco SD-WAN device fails and that failure results in the device rebooting,
the device automatically runs a request admin-tech exclude-cores exclude-logs file before the the device is
rebooted.
To retrieve the admin-tech file from the Cisco SD-WAN device, use SCP. To do this, you must have login
access to the device. To copy the file from the Cisco SD-WAN device, enter the shell from the Cisco SD-WAN
CLI and issue a command in the following format:
vEdge# vshell
vEdge:~$ scp filename .tar.gz username@host-name:path-name
vManage Equivalent
Tools ► Operational Commands ► Select device ► More Actions icon ► Admin Tech
Syntax Description
(none) Collect all system status information, including core files, log files, and the process (daemon)
and operational-related files that are stored in the /var/tech directory on the local device.
exclude-cores Do Not Include Core Files: Do not include any core files in the compressed tar file. Core
files are stored in the /var/crash directory on the local device.
exclude-logs Do Not Include Log Files: Do not include any log files in the compressed tar file. Log files
are stored in the /var/log directory on the local device.
exclude-logs Do Not Include Process-Related Files: Do not include any process (daemon) and
operational-related files in the compressed tar file. These files are stored in the /var/tech
directory on the local device.
Command History
Release Modification
16.1 Added support for running only one request admin-tech command at a time.
Release Modification
Examples
Create an admin tech file and copy it to a user's home directory on a host in the network. For the
SCP command, you must specify the full pathname of where to place the copied file.
vEdge# request admin-tech
Requested admin-tech initiated.
Created admin-tech file '/home/admin/20170712-123416-admin-tech.tar.gz'
vEdge# vshell
vEdge:~$ ls
20170712-123416-admin-tech.tar.gz archive_id_rsa.pub cacert.pem vEdge-signed-cert.pem
vEdge.csr vEdge_blank_config
vEdge:~$ tar -xvf 20170712-123416-admin-tech.tar.gz
var/log/auth.log
var/log/cloud-init.log
var/log/confd/
var/log/confd/devel.log
var/log/confd/error.log.siz
var/log/confd/snmp.log
var/log/confd/error.log.1
var/log/confd/error.log.idx
var/log/kern.log
var/log/lastlog
var/log/messages
var/log/messages.1
var/log/messages.2
var/log/messages.3
var/log/messages.4
var/log/pdb/
var/log/quagga/
var/log/tallylog
var/log/tmplog/
var/log/tmplog/vdebug
var/log/vconfd
var/log/vdebug
var/log/vdebug_2017-07-10_18_16_36.tar.gz
var/log/vdebug_2017-07-10_18_55_14.tar.gz
var/log/vmware-vmsvc.log
var/log/vsyslog
var/log/wtmp
var/tech/
var/tech/uboot_env
var/tech/confd
var/tech/system
var/tech/transport
var/tech/cxp
var/tech/dot1x
var/tech/cflowd
var/tech/dpi
var/tech/app_route
var/tech/config
var/tech/fpmd
var/tech/igmp
var/tech/hardware
var/tech/ompd
var/tech/ftmd
var/tech/dhcpd
var/tech/vdaemon
var/tech/snmp
var/tech/pimd
var/tech/vrrpd
var/tech/sysmgrd
var/tech/ttmd
var/tech/host_details
var/crash/
var/crash/core.cfgmgr.vm5
var/crash/info.core.cfgmgr.vm5.529.1499738114
var/confd/rollback/
var/confd/rollback/rollback22
var/confd/rollback/rollback13
var/confd/rollback/rollback8
var/confd/rollback/rollback9
var/confd/rollback/rollback2
var/confd/rollback/rollback27
var/confd/rollback/rollback5
var/confd/rollback/rollback20
var/confd/rollback/rollback0
var/confd/rollback/rollback1
var/confd/rollback/rollback3
var/confd/rollback/rollback21
var/confd/rollback/rollback25
var/confd/rollback/rollback19
var/confd/rollback/rollback4
var/confd/rollback/rollback23
var/confd/rollback/rollback28
var/confd/rollback/rollback7
var/confd/rollback/rollback18
var/confd/rollback/rollback10
var/confd/rollback/rollback24
var/confd/rollback/rollback12
var/confd/rollback/rollback15
var/confd/rollback/rollback11
var/confd/rollback/rollback6
var/confd/rollback/rollback16
var/confd/rollback/rollback26
var/confd/rollback/rollback14
var/confd/rollback/rollback17
vEdge~$ scp 20170712-123416-admin-tech.tar.gz eve@eve-host:~/.
vEdge-%
eve@eve-host:~$ ls 20170712-123416-admin-tech-tar.gz
20170712-123416-admin-tech-tar.gz
eve@eve-host:~$
Related Topics
admin-tech-on-failure, on page 77
show crash, on page 1000
request certificate
Install a certificate on the Cisco SD-WAN device (on vSmart controllers and vBond orchestrators only).
request certificate install file-path [vpn vpn-id]
Syntax Description
Command History
Release Modification
Related Topics
request csr upload, on page 844
show certificate validity, on page 970
Syntax Description
filename Name of vSmart Software Image: Install the vSmart controller software image in the specified
filename. The file can be in your home directory on the local device, or it can be on a remote
device reachable through FTP, HTTP, SCP, or TFTP. If you are using SCP, you are prompted
for the directory name and filename. No file path name is provided. filename has the format
viptela-release-number-x86_64.tar.gz.
vpn When you include this option, one of the interfaces in the specified VPN is used to retrieve the
vpn-id software image. The interfaces on a vSmart controller are only in VPN 0, the VPN reserved for
the control plane, so you can omit this option because vSmart images are always retrived from
VPN 0.
When you include this option, one of the interfaces in the specified VPN is used to retrieve the
software image. The interfaces on a vSmart controller are only in VPN 0, the VPN reserved for
the control plane, so you can omit this option because vSmart images are always retrived from
VPN 0.
Command History
Release Modification
Related Topics
container, on page 191
request container image remove, on page 838
Syntax Description
filename Name of vSmart Software Image: Name of image that is installed on the vSmart controller container.
Command History
Release Modification
Related Topics
container, on page 191
request container image install, on page 837
Syntax Description
local-private-port ip-address Local Private IP Address and Port Number: Private IP address and
port-number port number for the local side of the tunnel connection.
port-number can be a value from 0 through 65535.
remote-public-ip ip-address Remote Public IP Address and Port Number: Public IP address and
remote-public-port port-number port number for the remote side of the tunnel connection. can be a
value from 0 through 65535.
port-number
Command History
Release Modification
Examples
Related Topics
request control-tunnel delete, on page 840
tools nping, on page 1278
Syntax Description
local-private-ip ip-address Local Private IP Address and Port Number: Private IP address and
local-private-port port-number port number for the local side of the tunnel connection.
port-number can be a value from 0 through 65535.
remote-public-ip ip-address Remote Public IP Address and Port Number: Public IP address and
remote-public-port port-number port number for the remote side of the tunnel connection.
port-number can be a value from 0 through 65535.
Command History
Release Modification
Related Topics
request control-tunnel add, on page 839
Syntax Description
number Serial Number: Certificate serial number to send to the vManage or vSmart controller.
Command History
Release Modification
15.4 Command introduced to replace the request vsmart add serial-num command.
Related Topics
request controller-upload serial-file, on page 843
request controller delete serial-num, on page 842
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator valid-vedges, on page 1162
show orchestrator valid-vsmarts, on page 1164
Syntax Description
number Serial Number: vSmart serial number to delete from the vSmart serial number file on the local
device.
Command History
Release Modification
15.4 Command introduced to replace the request vsmart delete serial-num command.
Related Topics
request controller-upload serial-file, on page 843
request controller add serial-num, on page 841
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator valid-vedges, on page 1162
show orchestrator valid-vsmarts, on page 1164
Syntax Description
filename Name of Certificate File: Install the specified file containing the list of serial numbers for the
vManage NMSs and vSmart controllers in the overlay network. The file can be in your home
directory on the local device, or it can be on a remote device reachable through FTP, HTTP, SCP,
or TFTP. If you are using SCP, you are prompted for the directory name and filename. No file
path name is provided.
vpn Specific VPN: VPN in which the certificate file is located. When you include this option, one of
vpn-id the interfaces in the specified VPN is used to retrieve the file. The interfaces on a vSmart controller
are only in VPN 0, the VPN reserved for the control plane, so you can omit this option because
vSmart images are always retrieved from VPN 0.
Command History
Release Modification
Related Topics
request controller add serial-num, on page 841
request controller delete serial-num, on page 842
Syntax Description
path Path to Certificate File: Upload the CSR in the file at the specified path. The path can be in a
directory on the local device or on a remote device reachable through FTP, HTTP, SCP, or
TFTP. If you are using SCP, you are prompted for the directory name and filename. No file path
name is provided.
regen-rsa Regenerate RSA Key Pair: Generate a new RSA public-private key pair. The RSA key pair is
stored in the server.key file in the /usr/share/viptela directory on the local device.
regen-uuid Regenerate UUID: Generate a new CSR with a unique UUID that is different from the previous
UUID. You can specify this option only on a vBond orchestrator virtual machine (VM). The
option is not available on vEdge router hardware, because the router's UUID is its chassis number.
vpn Specific VPN: VPN in which the CSR file is located. When you include this option, one of the
vpn-id] interfaces in the specified VPN is used to retrieve the file. The interfaces on a vSmart controller
are only in VPN 0, the VPN reserved for the control plane, so you can omit this option because
vSmart images are always retrieved from VPN 0.
Command History
Release Modification
15.3 Removed the org-name option. The command now prompts for the organization name.
Examples
When the vBond orchestrator or vSmart controller is part of a software multitenant architecture,
the command also prompts for the service provider organization name.
vSmart# request csr upload home/admin/vm9.csr
Uploading CSR via VPN 0
Enter service provider organization name : SP Inc
Re-enter service provider organization name : SP Inc
Enter organization name : Cisco SD-WAN
Re-enter organization name : Cisco SD-WAN
Generating CSR for this vSmart device
........[DONE]
Copying ... /home/admin/vm9.csr via VPN 0
CSR upload successful
Related Topics
organization-name, on page 463
request certificate, on page 836
Command History
Release Modification
Examples
Related Topics
request nms application-server, on page 858
request device
request device—Add or delete a vEdge router chassis number on the vBond orchestrator that is acting as a
ZTP server.
request device add chassis-number number strong>serial-numbernumber validity [invalid | valid] vbond
ip-address org-name name [port port-number] [enterprise-root-ca path] request device delete
chassis-number number
validity invalid | valid Device Validity: Whether the vEdge router is allowed to join the overlay
network (valid) or is not allowed (invalid).
enterprise-root-ca path Enterprise Root CA: Path to the enterprise root CA. The path can be an HTTP,
FTP, or TFTP path.
org-name name Organization Name: Name of your organization as specified in the device
certificates.
port port-number Port on the vBond Orchestrator: Port to use on the vBond orchestrator to reach
the WAN network.
Command History
Release Modification
Examples
vBond# request device add chassis-number 12345 serial-number 6789 validity valid vbond 10.1.14.1 org-name cisco
Adding Chassis number 12345 to the database
Successfully added the chassis-number
ROOT
CHASSIS SERIAL VBOND ORGANIZATION CERT
INDEX NUMBER NUMBER VALIDITY VBOND IP PORT NAME PATH
---------------------------------------------------------------------------
1 12345 6789 valid 10.1.14.1 12346 cisco default
Related Topics
request device-upload, on page 848
show ztp entries, on page 1267
request device-upload
request device—Add vEdge router chassis numbers by uploading a file that contains the device information
onto the vBond orchestrator that is acting as a ZTP server.
request device-upload chassis-file file-path [vpn vpn-id]
chassis-file file-path Filename: Name of a CSV file containing the chassis information required by the ZTP
server.
file-path can be one of the following:
• filename—Path to a file in your home directory on the local Cisco vEdge device.
• ftp: file-path—Path to a file on an FTP server.
• http:// url/file-path—Path to a file on a webserver.
• scp: user@host:file-path
• file-path—Path to a file on a TFTP server.
Each row in the CSV file must contain the following information for each vEdge router:
• Chassis number
• Serial number
• Validity (either valid or invalid)
• vBond IP address
• vBond port number (entering a value is optional)
• Organization name
• Path to the root certification (entering a value is optional)
file-path vpn vpn-id VPN: vpn vpn-id VPN in which the remote server is located.
Command History
Release Modification
Examples
The following example uploads the device information from the local router. Here, the root CA path
is omitted, but the comma preceding its value is required.
vBond# vshell
vm4vBond~$ cat ztp-chassis-file
12345,6789,valid,10.1.14.1,12345,cisco,
vBond:~$ exit
exit
vBond request device-upload chassis-file /home/admin/ztp-chassis-file
Uploading chassis numbers via VPN 0
Copying ... /home/admin/ztp-chassis-file via VPN 0
Successfully loaded the chassis numbers file to the database.
Related Topics
request device, on page 847
show ztp entries, on page 1267
request download
request download—Download a software image or other file to the Cisco SD-WAN device (on vEdge routers
and vSmart controllers only).
request download [vpn vpn-id] filename
Syntax Description
filename Name of Software Image or File: Download a software image or other file to the local Cisco
SD-WAN device. The file can be on a remote device reachable through FTP, HTTP, HTTPS,
SCP, or TFTP. If you are using SCP, you are prompted for the directory name and filename;
no file path name is provided. The file is placed in your home directory on the local device.
vpn vpn-id Specific VPN: VPN in which the remote device containing the file to be downloaded is located.
When you include this option, one of the interfaces in the specified VPN is used to retrieve the
software image.
Command History
Release Modification
Related Topics
request software activate, on page 882
request software install, on page 883
request software install-image, on page 885
request software remove, on page 886
request software reset, on page 887
request software verify-image, on page 892
request upload, on page 893
request execute
request execute—Execute a shell command from within the Cisco SD-WAN CLI.
request execute [vpn vpn-id] command (in Releases 15.4 and later)
request execute [vpn vpn-id] "command" (in Releases 15.3 and earlier)
Syntax Description
command Command: Run the specified command in the UNIX shell while still remaining in the Cisco
SD-WAN CLI. In Releases 15.3 and earlier, you must enclose the command within quotation
marks.
vpn VPN: Specific to the VPN in which to execute the command. The default vpn-id is VPN 0.
vpn-id
Command History
Release Modification
Examples
To open an SSH connection from a vManage NMS to an IOS XE router, you must specify the port
number, which is 830.
vManage# request execute vpn 0 ssh 172.16.255.15
ssh: connect to host 172.16.255.15 port 22: Connection refused
vManage# request execute vpn 0 ssh 172.16.255.15 -p 830
admin@172.16.255.15's password:
Related Topics
job stop, on page 812
monitor start, on page 816
monitor stop, on page 817
show jobs, on page 1103
vshell, on page 1289
Syntax Description
filename Boot Loader Filename: Name of the boot loader file. This file must be on the local device. To get
the boot loader file, contact Cisco SD-WAN Customer Support.
Command History
Release Modification
Examples
Related Topics
reboot, on page 830
request interface-reset
request interface-reset—Reset an interface. This command shuts down and then restarts an interface. The
operation occurs so quickly that no indication of the interface's being down is reported in the IF STATUS
fields in the output of the show interface command.
request interface-reset interface interface-name vpn vpn-id
Syntax Description
Command History
Release Modification
Examples
Related Topics
show interface, on page 1032
Syntax Description
ipsec number Interface Name: Name of the IPsec interface on which to force the generation of new keys
for an IKE session.
Command History
Release Modification
Examples
Generate a new key for an IKE session. After the new key is generated, the SPI for the session
changes and the uptime for the sessions resets to zero. You cannot directly display the old and new
keys.
vEdge# show ipsec ike sessions
IF SOURCE DEST
VPN NAME VERSION SOURCE IP PORT DEST IP PORT INITIATOR SPI RESPONDER SPI CIPHER SUITE DH GROUP STATE UPTIME
----------------------------------------------------------------------------------------------------------------------------------------------------------
1 ipsec1 2 10.1.16.16 4500 10.1.15.15 4500 d58a40949a1e6ef8 5906334ba438d48c aes256-cbc-sha1 16 (MODP-4096) ESTABLISHED 0:00:02:08
IF SOURCE DEST
VPN NAME VERSION SOURCE IP PORT DEST IP PORT INITIATOR SPI RESPONDER SPI CIPHER SUITE DH GROUP STATE UPTIME
----------------------------------------------------------------------------------------------------------------------------------------------------------
1 ipsec1 2 10.1.16.16 4500 10.1.15.15 4500 ecdc1457fbd38824 1ee5fd9f7a645c44 aes256-cbc-sha1 16 (MODP-4096) ESTABLISHED 0:00:00:18
Related Topics
rekey, on page 535
request ipsec ipsec-rekey, on page 855
show ipsec ike inbound-connections, on page 1079
show ipsec ike outbound-connections, on page 1081
show ipsec ike sessions, on page 1083
Syntax Description
ipsec number Interface Name: Name of the IPsec interface on which to force the generation of new keys
for an IKE session.
Command History
Release Modification
Examples
Related Topics
rekey, on page 535
request ipsec ike-rekey, on page 854
show ipsec ike inbound-connections, on page 1079
show ipsec ike outbound-connections, on page 1081
show ipsec ike sessions, on page 1083
Syntax Description
status Determine the Status of All vManage Cluster Components: Determine the status of all vManage
cluster components.
jcmd Display Java Process Information: Display information from Java processes running on all
option vManage cluster components.
option can be one of the following:
• gc-class-histo—Histogram of the Java garbage collector. Garbage collection identifies
which objects are being used in heap memory.
• gc-class-stats—Statistics of the Java garbage collector.
• thread-print—Information about the Java threads.
• vm-cmd—Java virtual machine commands.
• vm-flags—Java virtual machine flags.
• vm-sys-props—Java virtual machine system properties.
• vm-uptime—Java virtual machine uptime.
• vm-ver—Java virtual machine version .
Command History
Release Modification
Examples
Related Topics
request nms application-server, on page 858
request nms configuration-db, on page 861
request nms coordination-server, on page 863
request nms messaging-server, on page 865
request nms statistics-db, on page 867
Syntax Description
jcmd option Display Java Process Information: Display information from a Java process running
on the vManage web server.
option can be one of the following:
• gc-class-histo—Histogram of the Java garbage collector. Garbage collection
identifies which objects are being used in heap memory.
• gc-class-stats—Statistics of the Java garbage collector.
• thread-print—Information about the Java threads running on the vManage web
server.
• vm-cmd—Java virtual machine commands on the vManage web server.
• vm-flags—Java virtual machine flags on the vManage web server.
• vm-sys-props—Java virtual machine system properties on the vManage web
server.
• vm-uptime—Java virtual machine uptime on the vManage web server.
• vm-ver—Java virtual machine version on the vManage web server.
update-logo Load a Custom Logo onto the vManage Web Server: Load a logo image to use in the
large-logo-filename upper left corner of all vManage web application server screens. You can load two
small-logo-filename files, a larger version, which is displayed on wider browser screens, and a smaller
version, which is displayed when the screen size narrows. Both files must be PNG
files located on the local device, and both must be 1 MB or smaller in size. For best
resolution, it is recommended that the image for the large logo be 180 x 33 pixels, and
for the small logo 30 x 33 pixels.
resize-data-partition Resize Third vManage Partition: Automatically resize the third partition on the
vManage NMS if the hypervisor has increased the size of this partition. This partition
is the vManage database volume and contains all vManage databases and information
related to them. vManage NMS calculates the size of the database volume only when
it is initially created. If the hypervisor capabilities cause the database volume size to
increase, the vManage NMS recognizes this space and can utilize it only if you issue
the request nms application-server resize-data-partition command.
restart Restart the vManage Web Server: Restart the local vManage web server.
diagnostics Run Diagnostics on vManage Web Server: Run diagnostics on the vManage web
server.
stop Stop the vManage Web Server: Stop the local vManage web server.
software option Web Application Server Software Control: Control the software running on the
vManage application server. can be:
option can be:
• reset—Undo a software upgrade on the vManage server, and return to the previous
software image.
• upgrade filename—Upgrade the software on the vManage server to the image
in the specified file.
• version—Display the version of software running on the vManage server.
Command History
Release Modification
16.2.3 Added software option and move version option under software, and added
diagnostics option.
Examples
Determine the version of software running on the vManage NMS web server
vManage# request nms application-server version
Related Topics
request nms all, on page 856
request nms configuration-db, on page 861
request nms coordination-server, on page 863
request nms messaging-server, on page 865
request nms statistics-db, on page 867
Syntax Description
backup Back Up the vManage Configuration Database: Back up the configuration database to
path path the file located at path.
status Determine the Status of the vManage Configuration Database: Determine the status of
the local vManage configuration database.
jcmd option Display Java Process Information: Display information from Java processes running on
the local vManage configuration database.
option can be one of the following:
• gc-class-histo—Histogram of the Java garbage collector. Garbage collection identifies
which objects are being used in heap memory.
• gc-class-stats—Statistics of the Java garbage collector.
• thread-print—Information about the Java threads running on the vManage web
server.
• vm-cmd—Java virtual machine commands on the vManage web server.
• vm-flags—Java virtual machine flags on the vManage web server.
• vm-sys-props—Java virtual machine system properties on the vManage web server.
• vm-uptime—Java virtual machine uptime on the vManage web server.
• vm-ver—Java virtual machine version on the vManage web server.
restart Restart the vManage Configuration Database: Restart the local vManage configuration
database.
restore Restore vManage Configuration Database: Restore the vManage configuration database
path path from the file located at path.
diagnostics Run Diagnostics on Configuration Database: Run diagnostics on the local vManage
configuration database.
start Start the vManage Configuration Database: Start the local vManage configuration database.
stop Stop the vManage Configuration Database: Stop the local vManage configuration database.
Command History
Release Modification
Examples
Related Topics
request nms all, on page 856
request nms application-server, on page 858
request nms coordination-server, on page 863
request nms messaging-server, on page 865
request nms statistics-db, on page 867
Syntax Description
status Determine the Status of the Coordination Server: Determine the status of the local coordination
server.
jcmd Display Java Process Information: Display information from Java processes running on the
option coordination server.
option can be one of the following:
• gc-class-histo—Histogram of the Java garbage collector. Garbage collection identifies
which objects are being used in heap memory.
• gc-class-stats—Statistics of the Java garbage collector.
• thread-print—Information about the Java threads running on the vManage web server.
• vm-cmd—Java virtual machine commands on the vManage web server.
• vm-flags—Java virtual machine flags on the vManage web server.
• vm-sys-props—Java virtual machine system properties on the vManage web server.
• vm-uptime—Java virtual machine uptime on the vManage web server.
• vm-ver—Java virtual machine version on the vManage web server.
restart Restart the Coordination Server: Restart the local coordination server.
diagnostics Run Diagnostics on the Coordination Server: Run diagnostics on the local vManage coordination
server.
start Start the Coordination Server: Start the local coordination server.
stop Stop the Coordination Server: Stop the local coordination server.
Command History
Release Modification
Examples
Related Topics
request nms all, on page 856
request nms application-server, on page 858
request nms configuration-db, on page 861
request nms messaging-server, on page 865
request nms statistics-db, on page 867
Syntax Description
status Determine the Status of the Messaging Server: Determine the status of the local messaging
server.
jcmd Display Java Process Information: Display information from Java processes running on the
option messaging server.
option can be one of the following:
• gc-class-histo—Histogram of the Java garbage collector. Garbage collection identifies
which objects are being used in heap memory.
• gc-class-stats—Statistics of the Java garbage collector.
• thread-print—Information about the Java threads running on the vManage web server.
• vm-cmd—Java virtual machine commands on the vManage web server.
• vm-flags—Java virtual machine flags on the vManage web server.
• vm-sys-props—Java virtual machine system properties on the vManage web server.
• vm-uptime—Java virtual machine uptime on the vManage web server.
• vm-ver—Java virtual machine version on the vManage web server.
restart Restart the Messaging Server: Restart the local messaging server.
diagnostics Run Diagnostics on the Message Server: Run diagnostics on the local vManage message server.
start Start the Messaging Server: Start the local messaging server.
stop Stop the Messaging Server: Stop the local messaging server.
Command History
Release Modification
Examples
Related Topics
request nms all, on page 856
request nms application-server, on page 858
request nms coordination-server, on page 863
request nms statistics-db, on page 867
Syntax Description
allocate-shards Allocate Unassigned Database Shards. Check for unassigned shards in the vManage statistics
database, and assign them.
jcmd option Display information from a Java process running on the vManage web server. Option can
be one of the following:
• gc-class-histo—Histogram of the Java garbage collector. Garbage collection identifies
which objects are being used in heap memory.
• gc-class-stats—Statistics of the Java garbage collector.
• thread-print—Information about the Java threads running on the vManage web server.
• vm-cmd—Java virtual machine commands on the vManage web server.
• vm-flags—Java virtual machine flags on the vManage web server.
• vm-sys-props—Java virtual machine system properties on the vManage web server.
• vm-uptime—Java virtual machine uptime on the vManage web server.
• vm-ver—Java virtual machine version on the vManage web server.
Command History
Release Modification
Example
:/var/lib/elasticsearch/lib/compress-lzf-1.0.2.jar\
:/var/lib/elasticsearch/lib/elasticsearch-2.2.0.jar\
:/var/lib/elasticsearch/lib/guava-18.0.jar\
:/var/lib/elasticsearch/lib/hppc-0.7.1.jar\
:/var/lib/elasticsearch/lib/jackson-core-2.6.2.jar\
:/var/lib/elasticsearch/lib/jackson-dataformat-cbor-2.6.2.jar\
:/var/lib/elasticsearch/lib/jackson-dataformat-smile-2.6.2.jar\
:/var/lib/elasticsearch/lib/jackson-dataformat-yaml-2.6.2.jar\
:/var/lib/elasticsearch/lib/jna-4.1.0.jar\
:/var/lib/elasticsearch/lib/joda-convert-1.2.jar\
:/var/lib/elasticsearch/lib/joda-time-2.8.2.jar\
:/var/lib/elasticsearch/lib/jsr166e-1.1.0.jar\
:/var/lib/elasticsearch/lib/jts-1.13.jar\
:/var/lib/elasticsearch/lib/log4j-1.2.17.jar\
:/var/lib/elasticsearch/lib/lucene-analyzers-common-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-backward-codecs-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-core-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-grouping-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-highlighter-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-join-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-memory-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-misc-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-queries-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-queryparser-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-sandbox-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-spatial-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-spatial3d-5.4.1.jar\
:/var/lib/elasticsearch/lib/lucene-suggest-5.4.1.jar\
:/var/lib/elasticsearch/lib/netty-3.10.5.Final.jar\
:/var/lib/elasticsearch/lib/securesm-1.0.jar\
:/var/lib/elasticsearch/lib/snakeyaml-1.15.jar\
:/var/lib/elasticsearch/lib/spatial4j-0.5.jar\
:/var/lib/elasticsearch/lib/t-digest-3.0.jar
java.vm.specification.version=1.8
java.home=/usr/lib/jvm/jdk1.8.0_72/jre
sun.arch.data.model=64
sun.java.command=org.elasticsearch.bootstrap.Elasticsearch start
user.language=en
java.specification.vendor=Oracle Corporation
awt.toolkit=sun.awt.X11.XToolkit
java.vm.info=mixed mode
java.version=1.8.0_72
java.ext.dirs=/usr/lib/jvm/jdk1.8.0_72/jre/lib/ext\
:/usr/java/packages/lib/ext
sun.boot.class.path=/usr/lib/jvm/jdk1.8.0_72/jre/lib/resources.jar\
:/usr/lib/jvm/jdk1.8.0_72/jre/lib/rt.jar\
:/usr/lib/jvm/jdk1.8.0_72/jre/lib/sunrsasign.jar\
:/usr/lib/jvm/jdk1.8.0_72/jre/lib/jsse.jar\
:/usr/lib/jvm/jdk1.8.0_72/jre/lib/jce.jar\
:/usr/lib/jvm/jdk1.8.0_72/jre/lib/charsets.jar\
:/usr/lib/jvm/jdk1.8.0_72/jre/lib/jfr.jar\
:/usr/lib/jvm/jdk1.8.0_72/jre/classes
java.vendor=Oracle Corporation
java.awt.headless=true
file.separator=/
java.vendor.url.bug=http\://bugreport.sun.com/bugreport/
sun.io.unicode.encoding=UnicodeLittle
sun.cpu.endian=little
sun.cpu.isalist=
vSmart#
Related Topics
request nms all, on page 856
request nms-server
Start and stop a vManage NMS, and display the status of the NMS (on vManage NMSs only).
request nms-server (start | status | stop)
Syntax Description
Command History
Release Modification
Examples
Check the status of the local vManage NMS, stop and start the server
vManage# request nms-server status
NMS webserver is running
vManage# request nms-server stop
Successfully stopped NMS webserver
vManage# request nms-server status
NMS webserver is not running
vManage# request nms-server start
Successfully started NMS webserver
vManage# request nms-server status
NMS webserver is running
request on-vbond-controller
Delete the serial number of a vEdge router (on vBond orchestrators only).
request on-vbond-controller delete serial-number serial-number
Command History
Release Modification
request on-vbond-vsmart
Delete the serial number of a vEdge router (on vBond orchestrators only).
Starting with Release 16.1, this command has been renamed to request on-vbond-controller.
request on-vbond-vsmart delete serial-number serial-number
Command History
Release Modification
request port-hop
Manually rotate to the next OMP port in the group of preselected OMP port numbers when a connection
cannot be established, and continue the port hopping until a connection can be established (on vEdge routers
only). Each connection attempt times out in about 60 seconds.
One case to issue this command is when NAT entries become stale.
request port-hop color color
Command History
Release Modification
Example
Related Topics
port-hop, on page 493
port-offset, on page 495
show omp tlocs, on page 1143
Command Hierarchy
request reset configuration
Command History
Release Modification
Examples
The following example shows the running configuration on vEdge:
!
bridge 1
interface ge0/0
no native-vlan
no shutdown
!
interface ge0/2
no native-vlan
no shutdown
!
interface ge0/3
no native-vlan
no shutdown
!
!
omp
no shutdown
graceful-restart
advertise connected
!
security
ipsec
rekey 172800
replay-window 4096
authentication-type none ah-sha1-hmac sha1-hmac
!
!
vpn 0
interface ge0/0
no poe
autonegotiate
no shutdown
!
interface ge0/1
ip address 10.1.30.15/24
tunnel-interface
encapsulation ipsec
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
mtu 1600
autonegotiate
no shutdown
!
interface ge0/2
autonegotiate
no shutdown
!
interface ge0/3
autonegotiate
no shutdown
!
interface ge0/4
ip address 1.0.4.1/24
autonegotiate
no shutdown
!
ip route 0.0.0.0/0 10.1.30.113
!
vpn 1
interface irb1
ip address 20.1.1.15/24
autonegotiate
no shutdown
!
!
vpn 512
interface mgmt0
ip address 192.168.15.78/24
autonegotiate
no shutdown
!
ip route 0.0.0.0/0 192.168.15.1
!
vEdge# request reset configuration
Are you sure you want to reset to default configuration? [yes,NO] yes
Mon Apr 24 17:52:33 PDT 2017: The system is going down for reboot NOW!
!
interface ge0/3
shutdown
!
interface ge0/4
shutdown
!
interface ge0/5
shutdown
!
interface ge0/6
shutdown
!
interface ge0/7
shutdown
!
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
!
Related Topics
show reboot history, on page 1206
Command Hierarchy
request reset logs
Command History
Release Modification
Examples
The following example clears the syslog logging files on the vEdge device:
vEdge# file show /var/log/console-log
No license at startup, please load a valid licence.
licence error, could not read hardware identifier v4
licence error, could not read hardware identifier v5
...
vEdge# request reset logs
vEdge# show /var/log/console-log
vEdge#
Related Topics
file list, on page 807
file show, on page 808
job stop, on page 812
logging disk, on page 380
logging server, on page 389
monitor start, on page 816
monitor stop, on page 817
show jobs, on page 1103
show logging, on page 1107
request root-cert-chain
Install or uninstall a file containing the root certificate key chain.
Command Hierarchy
request root-cert-chain install filename [vpn vpn-id]
request root-cert-chain uninstall
Syntax Description install filename Install the specified file containing the root certificate chain The file can be in a your home
directory on the local device, or it can be on a remote device reachable through FTP,
HTTP, SCP, or TFTP. If you are using SCP, you are prompted for the directory name and
filename. No file path name is provided.
vpn vpn-id VPN in which the certificate file is located. When you include this option, one of the
interfaces in the specified VPN is used to retrieve the file. The interfaces on a vSmart
controller are only in VPN 0, the VPN reserved for the control plane, so you can omit this
option because vSmart images are always retrieved from VPN 0.
uninstall Uninstall the file containing the root certificate key chain from the Cisco vEdge device.
Command History
Release Modification
Command Hierarchy
request security ipsec-rekey
Command History
Release Modification
Examples
In this example, the SPIs (keys) for TLOC 172.16.255.15 change from 256 and 257 to 257 and 258:
vEdge# show tunnel local-sa
TLOC ADDRESS TLOC COLOR SPI IP PORT KEY HASH
------------------------------------------------------------------------------
172.16.255.15 lte 256 10.1.15.15 12346 *****b93a
172.16.255.15 lte 257 10.1.15.15 12346 *****b93a
Related Topics
rekey, on page 533
show bfd sessions, on page 935
show ipsec inbound-connections, on page 1085
show ipsec local-sa, on page 1086
show ipsec outbound-connections, on page 1087
Command Hierarchy
request software activate software-image [clean] [now]
Syntax Description
now Activate the specified software image immediately, with no prompt asking you to confirm
that you want to activate.
clean Activate the specified software image, but do not associate the existing configuration file,
and do not associates any files that store information about the device history, such as log
and trace files, with the newly activated software image.
Command History
Release Modification
Examples
Related Topics
request download, on page 850
request software install-image, on page 885
request software remove, on page 886
request software reset, on page 887
request software secure-boot, on page 888
request software set-default, on page 889
request software verify-image, on page 892
show software, on page 1233
show version, on page 1257
Command Hierarchy
request software install filename [download-timeout minutes] [reboot [no-sync] ] [vpn vpn-id]
Syntax Description download-timeoutminutes Specifies the installation timeout value. How long to wait before canceling
requests to install software. The duration ranges from 1 through 1440 minutes
(24 hours). The default time is 60 minutes.
filename Install the software image in specified filename. The file can be in your home
directory on the local device, or it can be on a remote device reachable through
FTP, HTTP, SCP, or TFTP. If you are using SCP, you are prompted for the
directory name and filename. No file path name is provided.
For a vEdge router, filename has the format SD-WAN-
release-number-mips64.tar.bz2 (this image includes both the vEdge
and the software for a hardware-based vBond orchestrator).
For a vSmart controller and software-based vBond orchestrator, filename has
the format SD-WAN-release-number-x86_64.tar.bz2.
For a vManage NMS, filename has the format
vmanage-release-number-x86_64.tar.bz2.
In all the image names, the release number consists of the last two digits of the
release year and a number that indicates which release it is in that year. An
example of a vEdge image name is SD-WAN-16.1-mips64.tar.bz2, for
the first image released in 2016.
When you upgrade the software on a vManage NMS, you should back up the
vManage storage partition before performing the upgrade. See Restore the
vManage NMS .
rebootno-sync Reboot the device after installation of the software image completes. By default,
the device's current configuration is copied to the other hard-disk partition and
is installed with the new software image. If you include the no-sync option, the
software is installed in the other hard-disk partition, and it is installed with the
factory-default configuration. The existing configuration and any files that store
information about the device history, such as log and trace files, are not copied
to the other partition. Effectively, the no-sync option restores the device to its
initial factory configuration.
vpn vpn-id VPN in which the image is located. When you include this option, one of the
interfaces in the specified VPN is used to retrieve the software image. The
interfaces on a vSmart controller are only in VPN 0, the VPN reserved for the
control plane, so you can omit this option because vSmart images are always
retrived from VPN 0.
Command History
Release Modification
15.3.5 download-timeout option and prompt for backing up vManage database are added.
Examples
Related Topics
reboot, on page 830
request software install-image, on page 885
request software secure-boot, on page 888
request software verify-image, on page 892
show boot-partition, on page 949
show software, on page 1233
Command Hierarchy
request software install-image file-system-name
file-system-name Install the software image in the specified file system. The file system must be located on
the local device. Use the request download command to transfer the image file to the local
device.
Command History
Release Modification
Related Topics
request download, on page 850
request software activate, on page 882
request software install, on page 883
request software remove, on page 886
request software reset, on page 887
request software secure-boot, on page 888
request software set-default, on page 889
request software verify-image, on page 892
show software, on page 1233
show version, on page 1257
Command Hierarchy
request software remove file-system-name
Syntax Description file-system-name Name of the software image to delete from the device. You cannot delete the active image.
Command History
Release Modification
Examples
Related Topics
request download, on page 850
request software activate, on page 882
request software install-image, on page 885
request software reset, on page 887
request software secure-boot, on page 888
request software set-default, on page 889
show software, on page 1233
show version, on page 1257
Command Hierarchy
request software reset
Command History
Release Modification
Examples
After the command completes, you are logged out of the device. You may need to press the Return
key to complete the logout process.
vEdge# request software reset
Are you sure you want to reset to factory defaults? [yes,NO] yes
Broadcast message from root@vEdge (console) (Mon Apr 24 17:58:08 2017):
Mon Apr 24 17:58:08 PDT 2017: The system is going down for reboot NOW!
my-computer $
Related Topics
reboot, on page 830
request admin-tech, on page 833
request download, on page 850
request software activate, on page 882
request software install, on page 883
request software install-image, on page 885
request software remove, on page 886
request software secure-boot, on page 888
request software set-default, on page 889
show software, on page 1233
show version, on page 1257
Command Hierarchy
request software secure-boot list request software secure-boot set request software secure-boot status
Syntax Description request software secure-boot list Check secure boot state and check whether software images on the
device are secure or not secure.
request software secure-boot set Remove insecure software images from the device and, for vEdge
hardware routers, remove an insecure boot loader.
request software secure-boot status Display the security status of the software images installed on the
device.
Command History
Release Modification
Examples
Related Topics
reboot, on page 830
request software install-image, on page 885
request software install, on page 883
request software verify-image, on page 892
show boot-partition, on page 949
show software, on page 1233
Command Hierarchy
request software set-default image-name
Syntax Description image-name Name of the software image to designate as the default image on the device.
Command History
Release Modification
Examples
Related Topics
request download, on page 850
request software activate, on page 882
request software install, on page 883
request software remove, on page 886
request software reset, on page 887
request software secure-boot, on page 888
show software, on page 1233
show version, on page 1257
Command Hierarchy
request software upgrade-confirm
Command History
Release Modification
15.1 Command introduced.
15.2 Command support added for vBond orchestrator, vManage NMS, and vSmart controller.
Examples
Configure an upgrade confirm time limit of 5 minutes, upgrade the software manually from the vEdge
router CLI, and confirm that the upgrade has been successful:
vEdge# config
vEdge(config)# system upgrade-confirm 5
vEdge(system)# u
vEdge# request software install viptela-15.1.mips64.tar.bz2 reboot
[Software is installed, and router reboots and restarts.]
user$ ssh -l admin vEdge
Software upgrade completed. Device will revert to previous software version in '300' seconds
unless confirmed.
Execute "request software upgrade-confirm" to confirm the upgrade.
vEdge#
[Less than 5 minutes elapse.]
vEdge# request software upgrade-confirm
Software upgrade confirmed.
vEdge#
Configure an upgrade confirm time limit of 5 minutes, upgrade the software, and log back in to the
router, but do not confirm that the upgrade has been successful:
vEdge# config
vEdge(config)# system upgrade-confirm 5
vEdge(system)# commit and-quit
vEdge# request software install viptela-15.1.mips64.tar.bz2 reboot
[Software is installed, and router reboots and restarts.]
user$ ssh -l admin vEdge
Software upgrade completed. Device will revert to previous software version in '300' seconds
unless confirmed.
Execute "request software upgrade-confirm" to confirm the upgrade.
vEdge#
[More than 5 minutes elapse.]
Software upgrade not confirmed. Device will revert to previous software version.
vEdge#
Related Topics
request software install, on page 883
upgrade-confirm, on page 648
Command Hierarchy
request software verify-image filename
Syntax Description filename Name of the Cisco SD-WAN software image file. This file is a compressed tar file (filename
extension tar.gz) on the local device. The tar file names have the following format, where
x.x.x represents the release version:
• vEdge router—viptela-x.x.x-mips64.tar.gz
• vBond and vSmart—viptela-x.x.x86_64.tar.gz
• vManage—vmanage-x.x.x86_64.tar.gz
Command History
Release Modification
16.1 Command
introduced.
Example
Related Topics
request download, on page 850
request software activate, on page 882
request software install, on page 883
request software install-image, on page 885
request software remove, on page 886
request software reset, on page 887
request upload, on page 893
request upload
Upload a file from the Cisco SD-WAN device to another device in the network (on vEdge routers and vSmart
controllers only).
Command Hierarchy
request upload [vpn vpn-id] destination filename
Syntax Description filename Name of file on the local SD-WAN device to upload to a remote device. If the file is not in your
home directory, specify the full path.
destination Remote device. It must be reachable through FTP, HTTP, SCP, or TFTP. If you are using SCP,
you are prompted for the directory name and filename; no file path name is provided.
vpn VPN in which the remote device containing the file to be downloaded is located. When you
vpn-id include this option, one of the interfaces in the specified VPN is used to retrieve the software
image.
Command History
Release Modification
15.3.3 Command introduced for vEdge 100 routers only.
Related Topics
request download, on page 850
request software activate, on page 882
request software install, on page 883
request software install-image, on page 885
request software remove, on page 886
request software reset, on page 887
show software, on page 1233
request vedge
Add a vEdge serial number–chassis number pair to or delete a vEdge serial number-chassis number pair from
the vEdge authorized serial number file on the local device.
Comamnd Hierarchy
request vedge [add | delete] serial-num number chassis-num number
Syntax Description addserial-num number chassis-num Add vEdge Serial and Chassis Numbers. Add the specified vEdge
number serial and chassis number pair to the vEdge authorized serial number
file on the local device.
deleteserial-num number Delete vEdge Serial and Chassis Number. Remove the specified vEdge
chassis-num number serial and chassis number from the vEdge authorized serial number
file on the local device.
Command History
Release Modification
14.1 Command
introduced.
Related Topics
request vsmart add serial-num, on page 896
request vsmart-upload serial-file, on page 898
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator valid-vedges, on page 1162
show orchestrator valid-vsmarts, on page 1164
Command Hierarchy
request vedge-cloud activate chassis-number number token token
Syntax Description chassis-number Chassis number of the vEdge Cloud router. To obtain the chassis number (UUID) in
number vManage NMS, select the Configuration > Devices screen. In the vEdge List, locate
the Chassis Number column. If the router is not listed in the vEdge List, click Upload
vEdge List to upload the serial number file that contains the vEdge Cloud router's
information.
token token Token identifier of the vEdge Cloud router. To obtain the token in vManage NMS,
select the Configuration > Devices screen. In the vEdge List, locate the Serial No./Token
column. If the router is not listed in the vEdge List, click Upload vEdge List to upload
the serial number file that contains the vEdge Cloud router's information.
Command History
Release Modification
17.1 Command
introduced.
Command Hierarchy
request vsmart add serial-num number
Syntax Description serial-num Certificate serial number to send to the vManage or vSmart controller.
number
Command History
Release Modification
14.1 Command introduced.
Related Topics
request vedge, on page 894
request vsmart delete serial-num, on page 897
request vsmart-upload serial-file, on page 898
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator valid-vedges, on page 1162
show orchestrator valid-vsmarts, on page 1164
Command Hierarchy
request vsmart delete serial-num number
number vSmart serial number to delete from the vSmart serial number file on the local device.
Command History
Release Modification
14.1 Command introduced.
Related Topics
request vedge, on page 894
request vsmart add serial-num, on page 896
request vsmart-upload serial-file, on page 898
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator valid-vedges, on page 1162
show orchestrator valid-vsmarts, on page 1164
Command Hierarchy
request vsmart-upload serial-file filename [vpn vpn-id]
Syntax Description request Name of Certificate File. Install the specified file containing the list of serial numbers
vsmart-upload for the vSmart controllers and the vManage NMSs in the network. The file can be
serial-file filename in a your home directory on the local device, or it can be on a remote device reachable
through FTP, HTTP, SCP, or TFTP. If you are using SCP, you are prompted for the
directory name and filename. No file path name is provided.
vpn vpn-id Specific VPN in which the file is located. When you include this option, one of the
interfaces in the specified VPN is used to retrieve the file. The interfaces on a vSmart
controller are only in VPN 0, the VPN reserved for the control plane, so you can
omit this option because vSmart images are always retrieved from VPN 0.
Command History
Release Modification
14.1 Command introduced.
Related Topics
request vsmart add serial-num, on page 896
request vsmart delete serial-num, on page 897
screen-length
Set the length of the terminal window. For most Cisco SD-WAN software commands, the output is rendered
automatically either by the CLI or by templates that format the output. For these commands, any value that
you set for screen-length command has no effect. Use the more and nomore command filters to control the
length of the output.
Command Hierarchy
screen-length number
Syntax Description screen-length number Set the length of the terminal screen. Number can be a value from 0 through 256.
When you set the screen length to 0, the CLI does not paginate command output.
Command History
Release Modification
14.1 Command
introduced.
Example
vEdge# screen-length 24
vEdge#
Related Topics
screen-width, on page 900
show cli, on page 971
screen-width
Set the width of the terminal window. For most Cisco SD-WAN software commands, the output is rendered
automatically either by the CLI or by templates that format the output. For these commands, any value that
you set for screen-width command has no effect. Use the tab and notab command filters to control
the width of the output.
Command Hierarchy
screen-width number
Syntax Description screen-width number Set the width of the terminal screen. Number can be a value from 20 through 256.
Command History
Release Modification
14.1 Command
introduced.
Example
vEdge# screen-width 80
vEdge#
Related Topics
screen-length, on page 899
show cli, on page 971
Command Syntax
show aaa usergroup
show aaa usergroup task [permission (read | write)]
show aaa usergroup users username
vManage Equivalent
For all Cisco vEdge devices:
Administration ► Manage Users
Syntax Description
Command History
Release Modification
Examples
Related Topics
aaa, on page 43
Command Syntax
show app cflowd collector
vManage Equivalent
For vEdge routers only:
Monitor ► Network ► Application ► Flows
Syntax Description
None
Command History
Release Modification
Examples
COLLECTOR
VPN IP COLLECTOR CONNECTION IPFIX CONNECTION TEMPLATE DATA
ID ADDRESS PORT STATE PROTOCOL VERSION RETRY PACKETS PACKETS
------------------------------------------------------------------------------------------
1024 10.20.7.1 18004 true TCP 10 1 2 0
1024 10.20.7.1 18003 true TCP 10 1 2 0
1024 10.20.7.1 18002 true TCP 10 1 2 0
1024 10.20.7.1 18001 true TCP 10 1 2 0
Related Topics
cflowd-template, on page 159
clear app cflowd flows, on page 719
clear app cflowd statistics, on page 721
show app cflowd flow-count, on page 904
show app cflowd flows, on page 906
show app cflowd statistics, on page 909
show app cflowd template, on page 910
show policy from-vsmart, on page 1191
Command Syntax
show app cflowd flow-count
vManage Equivalent
For vEdge routers only:
Monitor ► Network ► Real Time ► App Log Flow Count
Syntax Description
Command History
Release Modification
Examples
VPN count
------------
1 502
2 452
3 502
4 502
5 502
6 502
7 502
8 502
9 502
10 502
Related Topics
cflowd-template, on page 159
clear app cflowd flows, on page 719
clear app cflowd statistics, on page 721
show app cflowd collector, on page 903
show app cflowd flows, on page 906
show app cflowd statistics, on page 909
show app cflowd template, on page 910
Command Syntax
show app cflowd flows [vpn vpn-id]
show app cflowd flows [vpn vpn-id] [flow-parameter]
show app cflowd flows vpn vpn-id src-ip ip-address dest-ip ip-address src-port port-number
dest-port port-number dscp value
ip-proto protocol-number
vManage Equivalent
For vEdge routers only:
Monitor ► Network ► Real Time ► App Log Flows
Syntax Description
None None
Display cflowd flow information for all flows.
Command History
Release Modification
15.4. Options for flow parameters and IP address, ports, DSCP, and protocol added.
Examples
SRC DEST IP CNTRL ICMP TOTAL TOTAL MIN MAX TO EGRESS INGRESS
APP
VPN SRC IP DEST IP PORT PORT DSCP PROTO BITS OPCODE NHOP IP PKTS BYTES LEN LEN START TIME EXPIRE INTF NAME INTF
NAME ID
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
100 10.1.111.2 18.100.44.4 12345 6789 0 6 24 0 192.168.10.9 23 1902 70 155 Fri Sep 28 17:44:36 2018 45 ipsec1 ge0/3
1118
100 18.100.44.4 10.1.111.2 6789 12345 0 6 16 0 10.1.111.2 41 5914 40 1340 Fri Sep 28 17:39:56 2018 43 ge0/3 ipsec1
1118
Related Topics
cflowd-template, on page 159
Command Syntax
show app cflowd statistics
Syntax Description
Command History
Release Modification
Examples
data_packets : 47243
template_packets : 77
total-packets : 47320
flow-refresh : 271395
flow-ageout : 24203
flow-end-detected : 58
flow-end-forced : 0
Release Information
Related Topics
cflowd-template, on page 159
clear app cflowd flows, on page 719
clear app cflowd statistics, on page 721
show app cflowd flow-count, on page 904
show app cflowd flows, on page 906
show app cflowd template, on page 910
show policy from-vsmart, on page 1191
Command Syntax
show app cflowd template [name template-name] [flow-active-timeout] [flow-inactive-timeout]
[template-refresh]
Syntax Description
None Options
Display information about all the cflowd templates that the vEdge router
has learned from a vSmart controller.
Command History
Release Modification
Examples
Related Topics
cflowd-template, on page 159
clear app cflowd flows, on page 719
clear app cflowd statistics, on page 721
Command Syntax
show app dpi applications [vpn vpn-id]
Syntax Description
None List all applications running on the subnets connected to the vEdge router.
Command History
Release Modification
17.1.2. Removed Source IP and Total Flows fields from command output.
Examples
Related Topics
app-visibility, on page 91
clear app dpi all, on page 722
clear app dpi apps, on page 723
clear app dpi flows, on page 725
show app dpi flows, on page 913
show app dpi supported-applications, on page 916
Syntax Description
None List all application flows running on the subnets connected to the vEdge router.
Command History
Release Modification
Examples
Related Topics
app-visibility, on page 91
clear app dpi all, on page 722
clear app dpi apps, on page 723
clear app dpi flows, on page 725
show app dpi applications, on page 912
show app dpi supported-applications, on page 916
Syntax Description
Command History
Release Modification
Examples
Related Topics
app-visibility, on page 91
clear app dpi apps, on page 723
clear app dpi flows, on page 725
show app dpi applications, on page 912
show app dpi flows, on page 913
show app dpi supported-applications, on page 916
Command Syntax
show app dpi supported-applications
show app dpi supported-applications | tab
Syntax Description
Command History
Release Modification
Usage Guidelines To understand the applications available for each family, you can use command: show app dpi
supported-applications | inc <app_family>.
The following example shows the supported application for Web family:
vEdge# show app dpi supported-applications | <web>
APP
APPLICATION FAMILY APPLICATION LONG NAME FAMILY LONG NAME
ID
------------------------------------------------------------------------------------------------------
ts web Ts Web
2427
tv web Tv.com Web
1062
vg web Vg.no Web
2076
wp web Wp.pl Web
2078
xl web Xl Web
2190
y8 web Y8.com Web
1758
yr web Yr Web
2579
17u web 17u.com Web
1341
24h web 24h.com.vn Web
1820
2ch web 2ch.net Web
1316
Examples
Display abbreviated application information:
APPLICATION FAMILY
------------------------------------------------------
ah network_service
dr web
dv web
hs web
il network_service
ip network_service
ja web
mk web
mq application_service
mt web
nu web
pp network_service
qq instant_messaging
rt web
sm network_service
sp network_service
ss web
st network_service
ts web
tu audio_video
tv web
...
unassigned_ip_prot_251 network_service
unassigned_ip_prot_252 network_service
the_simpsons_tapped_out game
wallstreetjournal_china web
APPLICATION FAMILY
---------------------------------------
biip Web
bild Web
bing Web
bits File Transfer
bithq Peer to Peer
bitme Peer to Peer
bigeye Web
bikhir Web
bigadda Web
bigtent Web
bitcoin Peer to Peer
bitlord Peer to Peer
bitmetv Peer to Peer
bitsoup Peer to Peer
bidorbuy Web
bitenova Peer to Peer
bitshock Peer to Peer
bitworld Peer to Peer
bigupload Web
bitseduce Peer to Peer
bitstrips Game
biglobe_ne Web
bittorrent Peer to Peer
bitvaulttorrent Peer to Peer
bitdefender_update Web
bittorrent_application Peer to Peer
vEdge#
Examples
Display full application information:
APP
APPLICATION FAMILY APPLICATION LONG NAME FAMILY LONG NAME
ID
------------------------------------------------------------------------------------------------------
938
qq instant_messaging QQ Instant Messaging
156
rt web Rt.com Web
2064
sm network_service Sparse Mode Network Service
678
sp network_service ISO 8327 Session Protocol Network Service
937
ss web Ss.lv Web
1943
st network_service Stream protocol Network Service
685
ts web Ts Web
2427
tu audio_video Tu.tv Audio/Video
1060
tv web Tv.com Web
1062
vg web Vg.no Web
2076
wp web Wp.pl Web
2078
xl web Xl Web
2190
y8 web Y8.com Web
1758
yr web Yr Web
2579
17u web 17u.com Web
1341
24h web 24h.com.vn Web
1820
2ch web 2ch.net Web
1316
3pc network_service Third Party Connect Network Service
606
abc peer_to_peer ABC Bittorrent client Peer to Peer
1690
abv web Abv.bg Web
1826
adc peer_to_peer Advanced Direct Connect Peer to Peer
1438
adf web AdF.ly Web
2824
adp web Automatic Data Processing (ADP) Web
3275
afl web AFL Web
2538
afp file_server Apple Filing Protocol File Server
2645
aib web Aib Web
2185
aim instant_messaging AOL Instant Messenger (formerly OSCAR) Instant Messaging
8
--More--
116
moat web Moat Web
2704
moov web Moov.mg Web
1922
mpls routing Multiprotocol Packet Label Switching Routing
119
mqtt middleware MQ Telemetry Transport Middleware
2900
msrp audio_video Message Session Relay Protocol Audio/Video
919
mubi audio_video Mubi Audio/Video
2412
mute peer_to_peer Mute Peer to Peer
124
--More--
Related Topics
app-visibility, on page 91
clear app dpi all, on page 722
clear app dpi apps, on page 723
clear app dpi flows, on page 725
show app dpi applications, on page 912
show app cflowd flows, on page 906
show app dpi flows, on page 913
Command Syntax
show app log flow-count[vpn vpn-id]
Syntax Description
None Display the count of all packet flows that are being logged.
Command History
Release Modification
Examples
VPN COUNT
------------
1 20
Related Topics
clear app log flow-all, on page 727
clear app log flows, on page 728
log-frequency, on page 376
show app log flows, on page 923
show system statistics, on page 1236
Command Syntax
show app log flows [vpn vpn-id] [flow-parameter]
vManage Screen
Monitor ► Network ► ACL Logs
Syntax Description
Command History
Release Modification
Examples
TCP
TIME EGRESS INGRESS
SRC DEST IP CNTRL ICMP TOTAL
TOTAL TO INTF INTF POLICY POLICY
VPN SRC IP DEST IP PORT PORT DSCP PROTO BITS OPCODE NHOP IP PKTS
BYTES START TIME EXPIRE NAME NAME POLICY NAME ACTION
DIRECTION
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 10.0.5.19 10.1.15.15 23556 34576 0 6 16 0 10.1.15.15 8531
Related Topics
action, on page 53
clear app log flow-all, on page 727
clear app log flows, on page 728
log-frequency, on page 376
policy, on page 482
show app log flow-count, on page 922
show system statistics, on page 1236
Command Syntax
show app tcp-opt (active-flows | expired-flows)
show app tcp-opt summary
Syntax Description
Command History
Release Modification
Examples
Display information about active and expired TCP-optimized flows:
app tcp-opt active-flows vpn 1 src-ip 10.20.24.17 dest-ip 10.20.25.18 src-port 53723 dest-port
22
start-time "Fri Mar 17 13:21:02 2017"
egress-intf-name loop0.3
ingress-intf-name ge0_4
tx-bytes 153
rx-bytes 64
tcp-state "In progress"
proxy-identity Client-Proxy
rx-bytes 4333
tcp-state Optimized
proxy-identity Client-Proxy
del-reason Closed
Related Topics
data-policy, on page 211
tcp-optimization, on page 594
Command Syntax
show app-route sla-class
show app-route sla-class (latency [milliseconds] | loss [percentage] | name [string])
Syntax Description
None Display information for all SLA classes configured and operating on the vEdge router
Command History
Release Modification
Examples
The following output shows three SLA classes and the index numbers that identify these classes. The first
line of the output shows the default SLA class (__all_tunnels_sc), and second and third lines show two
configured SLA classes that are operating on the router (test_sla_class and test_sla_class1).
Related Topics
app-route-policy, on page 89
bfd color, on page 142
show app-route stats, on page 930
show bfd sessions, on page 935
show policy service-path, on page 1196
show policy tunnel-path, on page 1198
Command Syntax
show app-route-statsshow app-route stats local-color color [remote-system-ip ip-address]
show app-route stats remote-color color [remote-system-ip ip-address]
show app-route stats remote-system-ip ip-address
Syntax Description
None Display data traffic statistics for all data plane tunnel connections.
Command History
Release Modification
Examples
Related Topics
app-route-policy, on page 89
bfd color, on page 142
show app-route sla-class, on page 928
show bfd sessions, on page 935
show policy service-path, on page 1196
show policy tunnel-path, on page 1198
show arp
show arp—Display the IPv4 entries in the Address Resolution Protocol (ARP) table, which lists the mapping
of IPv4 addresses to device MAC addresses.
To display IPv6 ARP table entries, use the show ipv6 neighbor command.
Command Syntax
show arp [vpn vpn-id]
Syntax Description
vpnvpn-id VPN
List the ARP table entries for the specified VPN.
Command History
Release Modification
Examples
Show arp
Cisco vEdge# show arp
IF
VPN NAME IP MAC STATE IDLE TIMER UPTIME
-----------------------------------------------------------------------------
0 ge0/0 10.0.11.1 00:0c:29:86:ea:83 static - 0:10:10:07
0 ge0/7 10.0.100.11 00:0c:29:86:ea:c9 static - 0:10:10:07
512 eth0 10.0.1.1 00:50:56:c0:00:01 dynamic 0:00:19:04 0:00:05:04
512 eth0 10.0.1.11 00:50:56:00:01:01 static - 0:10:10:03
512 eth0 10.0.1.254 00:50:56:ed:b5:5e dynamic 0:00:17:04 0:00:09:04
Related Topics
arp, on page 103
clear arp, on page 730
show ipv6 neighbor, on page 1096
Command Syntax
show bfd history [color color] [site-id site-id] [state state] [system-ip ip-address]
Syntax Description
None Show the history of all the BFD sessions running on the vEdge router.
Command History
Release Modification
Examples
Related Topics
bfd color, on page 142
show bfd sessions, on page 935
show bfd summary, on page 938
show bfd tloc-summary-list, on page 940
Command Syntax
show bfd sessions [color color] [site-id site-id] [state state] [system-ip ip-address]
Syntax Description
None Show the history of all the BFD sessions running on the vEdge router.
site-id id Site ID
Display the history of BFD sessions to a specific Cisco SD-WAN network site.
Command History
Release Modification
Examples
Display BFD session information for network end points:
Related Topics
bfd color, on page 142
show bfd history, on page 933
show bfd summary, on page 938
show bfd tloc-summary-list, on page 940
Command Syntax
show bfd summary [bfd-sessions-flap | bfd-sessions-max | bfd-sessions-total | bfd-sessions-up]
Syntax Description
None Display all summary information about BFD sessions running on the vEdge router.
Command History
Release Modification
Examples
Related Topics
bfd app-route, on page 140
bfd color, on page 142
show bfd history, on page 933
show bfd sessions, on page 935
show bfd tloc-summary-list, on page 940
Command Syntax
show bfd tloc-summary-list
show bfd tloc-summary-list interface-name [gre | ipsec | ipsec-ike] [sessions-flap |sessions-total |sessions-up]
Syntax Description
None Display all summary information about BFD sessions running on the vEdge router.
Command History
Release Modification
Examples
Related Topics
bfd color, on page 142
show bfd history, on page 933
show bfd sessions, on page 935
show bfd summary, on page 938
Command Syntax
show bgp neighbor [vpn vpn-id] [detail]
show bgp neighbor address-family [address-family-property] [detail]
Syntax Description
vpnvpn-id VPN
List the entries in the ARP table for the specified VPN.
Command History
Release Modification
Examples
Related Topics
show bgp routes, on page 944
show bgp summary, on page 948
Command Syntax
show bgp routes [prefix/length] [vpn vpn-id] [detail]
Syntax Description
Command History
Release Modification
Examples
INFO LOCAL AS
valid,best 0
1 172.16.255.118/32 0 10.20.25.18 0 - 0 incomplete 2
valid,best,external 0
nexthop 0.0.0.0
metric 1000
local-pref 50
weight 0
origin incomplete
as-path Local
ri-peer 0.0.0.0
ri-routerid 172.16.255.16
local true
sourced true
ext-community SoO:0:600
path-status valid,best
tag 0
bgp routes-table vpn 1 172.16.255.112/32
best-path 1
advertised-peers 0
peer-addr 10.20.25.18
info 0
nexthop 0.0.0.0
metric 1000
local-pref 50
weight 0
origin incomplete
as-path Local
ri-peer 0.0.0.0
ri-routerid 172.16.255.16
local true
sourced true
ext-community SoO:0:600
path-status valid,best
tag 0
bgp routes-table vpn 1 172.16.255.117/32
best-path 1
advertised-peers 0
peer-addr 10.20.25.18
info 0
nexthop 0.0.0.0
metric 1000
local-pref 50
weight 0
origin incomplete
as-path Local
ri-peer 0.0.0.0
ri-routerid 172.16.255.16
local true
sourced true
ext-community SoO:0:600
path-status valid,best
tag 0
bgp routes-table vpn 1 172.16.255.118/32
best-path 1
info 0
nexthop 10.20.25.18
metric 0
weight 0
origin incomplete
as-path 2
ri-peer 10.20.25.18
ri-routerid 172.16.255.18
path-status valid,best,external
tag 0
Related Topics
show bgp neighbor, on page 942
show bgp summary, on page 948
Command Syntax
show bgp summary [vpn vpn-id]
Syntax Description
vpnvpn-id VPN
List status information about BGP connections in the specified VPN.
Command History
Release Modification
Examples
Related Topics
show bgp neighbor, on page 942
show bgp routes, on page 944
show boot-partition
show boot-partition—Display the active boot partition and the software version installed in the boot partitions.
Starting in Release 15.4, this command is replaced with the show software command.
Command Syntax
show boot-partition [partition-number]
Syntax Description
None Display information about the boot partitions on the device, including which partition is
active and what software version is installed on each partition.
Command History
Release Modification
Examples
Show boot-partition
vEdge# show boot-partition
PARTITION ACTIVE VERSION TIMESTAMP
--------------------------------------------------------
1 X 14.2.4 2014-11-11T18:16:49+00:00
2 - 14.2.3 2014-11-11T18:35:14+00:00
Related Topics
reboot, on page 830
request software activate, on page 882
request software install, on page 883
Command Syntax
show bridge interface
show bridge interface bridge-id [interface-name [(admin-status | encap-type | ifindex | mtu | oper-status
| rx-octets | rx-pkts | tx-octets | tx-pkts | vlan)]
Syntax Description
Command History
Release Modification
Examples
BRIDGE INTERFACE VLAN STATUS STATUS TYPE IFINDEX MTU PKTS OCTETS PKTS OCTETS
-------------------------------------------------------------------------------------------
1 ge0/2 1 Up Up vlan 34 1500 0 0 2 168
Related Topics
bridge, on page 152
clear bridge mac, on page 735
clear bridge statistics, on page 736
show bridge mac, on page 952
show bridge table, on page 953
Command Syntax
show bridge mac
Syntax Description
None
Command History
Release Modification
Examples
RX RX TX TX
BRIDGE INTERFACE MAC ADDR STATE PKTS OCTETS PKTS OCTETS
-------------------------------------------------------------------------
1 ge0/5 aa:01:05:05:00:01 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:02 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:03 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:04 dynamic 2 248 0 0
1 ge0/5 aa:01:05:05:00:05 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:01 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:02 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:03 dynamic 2 248 0 0
2 ge0/5 aa:02:05:05:00:04 dynamic 1 124 0 0
2 ge0/5 aa:02:05:05:00:05 dynamic 1 124 0 0
Related Topics
bridge, on page 152
clear bridge mac, on page 735
clear bridge statistics, on page 736
show bridge interface, on page 950
show bridge table, on page 953
Command Syntax
show bridge table
Syntax Description
None
Command History
Release Modification
Examples
ROUTING NUM RX RX TX TX
FLOOD FLOOD
BRIDGE NAME VLAN INTERFACE MAX-MACS MACS AGE-TIME(sec) PKTS OCTETS PKTS OCTETS
PKTS OCTETS LEARN AGE MOVE
---------------------------------------------------------------------------------------------------------------------------
1 1 irb1 1024 0 300 2 168 0 0
2 168 0 0 0
2 2 irb2 1024 0 300 3 242 0 0
3 242 0 0 0
50 - irb50 1024 0 300 2 140 0 0
2 140 0 0 0
Related Topics
bridge, on page 152
clear bridge mac, on page 735
clear bridge statistics, on page 736
show bridge interface, on page 950
show bridge mac, on page 952
Command Syntax
show cellular modem
Syntax Description
None
Command History
Release Modification
Examples
Related Topics
cellular, on page 157
clear cellular errors, on page 737
clear cellular session statistics, on page 738
profile, on page 510
show cellular network, on page 955
show cellular profiles, on page 957
show cellular radio, on page 958
show cellular sessions, on page 959
show cellular status, on page 960
show interface, on page 1032
Command Syntax
show cellular network
Syntax Description
None
Command History
Release Modification
Examples
For CDMA networks:
Related Topics
cellular, on page 157
clear cellular errors, on page 737
clear cellular session statistics, on page 738
profile, on page 510
show cellular modem, on page 954
show cellular profiles, on page 957
show cellular radio, on page 958
show cellular sessions, on page 959
show cellular status, on page 960
show interface, on page 1032
Command Syntax
show cellular profiles
Syntax Description
None
Command History
Release Modification
Examples
Related Topics
cellular, on page 157
clear cellular errors, on page 737
clear cellular session statistics, on page 738
profile, on page 510
show cellular modem, on page 954
show cellular network, on page 955
show cellular radio, on page 958
show cellular sessions, on page 959
show cellular status, on page 960
show interface, on page 1032
Command Syntax
show cellular radio
Syntax Description
None
Command History
Release Modification
Examples
Related Topics
cellular, on page 157
clear cellular errors, on page 737
clear cellular session statistics, on page 738
profile, on page 510
show cellular modem, on page 954
show cellular network, on page 955
show cellular profiles, on page 957
show cellular sessions, on page 959
show cellular status, on page 960
show interface, on page 1032
Command Syntax
show cellular session
Syntax Description
None
Command History
Release Modification
Examples
IPv4 :
Assigned address : 100.82.104.116/29
Gateway : 100.82.104.117
Primary DNS server : 198.224.173.135
Secondary DNS server : 198.224.174.135
Related Topics
cellular, on page 157
clear cellular errors, on page 737
clear cellular session statistics, on page 738
profile, on page 507
show cellular modem, on page 954
show cellular network, on page 955
show cellular profiles, on page 957
show cellular radio, on page 958
show cellular status, on page 960
show interface, on page 1032
Command Syntax
show cellular status
Syntax Description
None
Command History
Release Modification
Examples
Related Topics
cellular, on page 157
clear cellular errors, on page 737
clear cellular session statistics, on page 738
profile, on page 510
show cellular modem, on page 954
show cellular network, on page 955
show cellular profiles, on page 957
show cellular radio, on page 958
show cellular sessions, on page 959
show interface, on page 1032
Command Syntax
show certificate installed
Syntax Description
None
Command History
Release Modification
Examples
14:61:7b:d8:d1:45:52:65:e9:17:71:3d:91:a3:1c:
45:ba:1a:28:48:ca:17:63:4d:dc:ff:13:8e:84:65:
94:8a:3c:44:49:f2:2f:e9:ec:70:e6:cc:f5:23:a7:
f4:5d:2f:0d:6a:ec:ce:19:90:af:df:ad:90:76:fa:
1b:86:12:51:d1:9f:6a:86:4b:ab:62:d8:5a:cb:35:
74:f1:36:09:b8:8c:78:be:1d:eb:9b:b3:5a:79:c6:
80:ad:57:55:a9:36:bf:9c:9d:fb:e5:f7:bd:a5:10:
e3:4f:b0:d4:7a:a0:e4:59:47:a4:82:c5:eb:d1:71:
48:13
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Alternative Name:
DNS:VSmart_05_02_2014_22_33_15_077740428.viptela.com
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Certificate Policies:
Policy: 2.16.840.1.113733.1.7.54
CPS: https://www.verisign.com/cps
Full Name:
URI:http://SVRSecure-G3-crl.verisign.com/SVRSecureG3.crl
Related Topics
clear installed-certificates, on page 754
show certificate root-ca-cert, on page 965
show certificate serial, on page 967
show certificate signing-request, on page 968
show certificate validity, on page 970
Command Syntax
show certificate reverse-proxy
Syntax Description
None
Command History
Release Modification
Examples
f8:dc:44:99:a6:45:33:a5:3e:4a:af:6f:f7:bb:ff:fd:66:bd:
71:32:89:45:5e:42:c8:66:07:3e:f4:17:65:fb:f4:e8:5b:7f:
dc:4f:34:da:a3:cf:15:6e:00:4a:69:a3:c3:9a:55:7c:8e:e5:
d7:ae:86:d2:40:a5:c1:f6:82:e8:ef:a2:8c:c5:db:50:cf:cb:
d8:ee:2b:82:9e:da:17:12:16:ae:61:8e:32:17:e4:dd:29:60:
95:50:c8:bd:b8:ab:93:72:ff:13:58:85:85:c2:70:29:71:8f:
5d:8e:ae:ce:48:34:14:3f:24:d1:6e:51:c9:75:7d:78:fd:f6: 77:2f:38:36
Related Topics
show certificate reverse-proxy, on page 963
show control connections, on page 984
Command Syntax
show certificate root-ca-cert
Syntax Description
None
Command History
Release Modification
Examples
35:4e:90:9d:db:b4:8d:73:b6:a0:f0:b0:29:03:f3:
eb:b1:cc:d8:bd:ed:ee:68:cb:77:8d:ef:2c:21:21:
94:f9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Key Identifier:
91:04:EB:99:69:73:EB:4F:6C:E1:F2:B4:7F:D4:21:E4:D4:54:56:ED
X509v3 Authority Key Identifier:
keyid:91:04:EB:99:69:73:EB:4F:6C:E1:F2:B4:7F:D4:21:E4:D4:54:56:ED
DirName:/C=US/ST=California/L=San Jose/OU=Viptela Inc/O=Viptela
Inc/emailAddress=us@viptela.com
serial:DF:08:97:BA:C9:37:11:90
Related Topics
show certificate installed, on page 961
show certificate serial, on page 967
show certificate validity, on page 970
Command Syntax
show certificate serial
Syntax Description
None
Command History
Release Modification
Examples
Related Topics
request vsmart-upload serial-file, on page 898
show certificate installed, on page 961
show certificate root-ca-cert, on page 965
show certificate signing-request, on page 968
show certificate validity, on page 970
Command Syntax
show certificate signing-request [decoded]
Syntax Description
Command History
Release Modification
Examples
Related Topics
show certificate installed, on page 961
show certificate root-ca-cert, on page 965
show certificate serial, on page 967
show certificate validity, on page 970
Command Syntax
show certificate validity
Syntax Description
None
Command History
Release Modification
Examples
Related Topics
request certificate, on page 836
show certificate installed, on page 961
show certificate root-ca-cert, on page 965
show certificate serial, on page 967
show certificate signing-request, on page 968
show cli
show cli—Display the CLI settings.
Command Syntax
show cli
Syntax Description
None
Command History
Release Modification
Examples
Show cli
vEdge# show cli
autowizard false
complete-on-space false
history 100
idle-timeout 1800
ignore-leading-space true
output-file terminal
paginate true
prompt1 \h\M#
prompt2 \h(\m)#
screen-length 43
screen-width 85
service prompt config true
show-defaults false
terminal xterm-256color
timestamp disable
Related Topics
complete-on-space, on page 796
history, on page 810
idle-timeout, on page 811
paginate, on page 819
prompt1, on page 825
prompt2, on page 827
screen-length, on page 899
screen-width, on page 900
timestamp, on page 1270
show clock
show clock—Display the system time.
Command Syntax
show clock
Syntax Description
universal
Display time in UTC.
Command History
Release Modification
Examples
Show clock
vEdge# show clock
Mon Jul 7 13:36:00 PDT 2014
vEdge# show clock universal
Mon Jul 7 20:36:05 UTC 2014
Related Topics
show uptime, on page 1255
timestamp, on page 1270
Command Syntax
show cloudexpress applications vpn-id
Syntax Description
None Display the best interface for all applications in all VPNs configured with Cloud OnRamp for
SaaS.
Command History
Release Modification
Examples
EXIT GATEWAY
LOCAL REMOTE
VPN APPLICATION TYPE SYSTEM IP INTERFACE LATENCY LOSS
COLOR COLOR
---------------------------------------------------------------------------------------------
1 salesforce gateway 172.16.255.14 - 103 1
lte lte
1 google_apps gateway 172.16.255.14 - 47 0
lte lte
Related Topics
clear cloudexpress computations, on page 739
show cloudexpress gateway-exits, on page 974
show cloudexpress local-exits, on page 975
show omp cloudexpress, on page 1124
Command Syntax
show cloudexpress gateway-exits vpn-id
Syntax Description
None Display loss and latency on each gateway exit for all applications in all VPNs configured with
Cloud OnRamp for SaaS.
Command History
Release Modification
Examples
LOCAL REMOTE
VPN APPLICATION GATEWAY IP LATENCY LOSS COLOR COLOR
-------------------------------------------------------------------------------------
1 salesforce 172.16.255.14 72 2 lte lte
1 google_apps 172.16.255.14 16 0 lte lte
Related Topics
clear cloudexpress computations, on page 739
show cloudexpress applications, on page 973
show cloudexpress local-exits, on page 975
show omp cloudexpress, on page 1124
Command Syntax
show cloudexpress local-exits vpn-id
Syntax Description
None Display application loss and latency for all applications on all DIA interfaces in all VPNs enabled
for Cloud OnRamp for SaaS.
Command History
Release Modification
Examples
Related Topics
show cloudexpress local-exits, on page 975
Command Syntax
show configuration commit list [number]
Syntax Description
Command History
Release Modification
Examples
Related Topics
commit, on page 795
Command Syntax
show container images [instances instance-name]
Syntax Description
None List information about the software images for all containers.
Command History
Release Modification
Examples
VERSION INSTANCE
-------------------------------
99.99.999-2440 first_vsmart
second_vsmart
99.99.999-2444 vm10
Related Topics
container, on page 191
show container instances, on page 979
Command Syntax
show container instances [instance-parameter]
Syntax Description
None List information about all the vSmart controller containers running on the container host
Release Modification
Examples
Related Topics
container, on page 191
show container instances, on page 979
Command Syntax
show control affinity config [index [parameter] ]
Syntax Description
None Display information about all control connections between the vEdge router and vSmart
controllers
Release Modification
Examples
Related Topics
show control affinity status, on page 982
show control connections, on page 984
Command Syntax
show control affinity status [index [parameter] ]
Syntax Description
None Display information about all control connections between the vEdge router and vSmart
controllers
Command History
Release Modification
Examples
ASSIGNED CONNECTED CONTROLLERS - System IP( G),.. - System IP of the assigned vSmart
G is the group ID to which
the vSmart belongs
UNASSIGNED CONNECTED CONTROLLERS - System IP( G),.. - System IP of the unassigned vSmart
G is the group ID to which
the vSmart belongs
Related Topics
show control affinity config, on page 980
show control connections, on page 984
show control local-properties, on page 991
Command Syntax
show control connection-info
Syntax Description
None
Command History
Release Modification
Examples
Related Topics
control-session-pps, on page 200
Command Syntax
show control connections [controller-group-id number] [detail]
show control connections instance-id [vbond | vedge | vsmart] [parameters] [detail]
Syntax Description
None Display information about the active control plane connections to all Cisco vEdge
devices in the local domain. Each connection exists on a DTLS connection between
the local device and a remote device in the Cisco SD-WAN overlay network.
Command History
Release Modification
Release Modification
Note The commands show control connections and show control valid-vedges are supported on vEdge platforms
only and do not support on devices with ACT2/TAM modules.
Examples
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
vsmart tls 172.16.255.20 200 1 10.0.12.20 23556
10.0.12.20 23556 mpls No up 0:00:16:30 0
PEER PEER
PEER PEER PEER SITE DOMAIN PEER
PRIV PEER PUB
INDEX TYPE PROT SYSTEM IP ID ID PRIVATE IP
PORT PUBLIC IP PORT REMOTE COLOR STATE
UPTIME
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 vedge dtls 172.16.255.11 100 1 2001::a00:50b
12366 2001::a00:50b 12366 lte up
0:00:00:03
0 vedge dtls 172.16.255.14 400 1 2001::a01:e0e
12366 2001::a01:e0e 12366 lte up
0:00:00:01
0 vedge dtls 172.16.255.15 500 1 2001::a01:f0f
12346 2001::a01:f0f 12346 lte up
0:00:00:08
0 vsmart dtls 172.16.255.20 200 1 2001::a00:c14
12346 2001::a00:c14 12346 default up
0:00:00:17
0 vbond dtls - 0 0 2001::a00:c1a
12346 2001::a00:c1a 12346 default up
0:00:00:18
1 vedge dtls 172.16.255.21 100 1 2001::a00:515
12366 2001::a00:515 12366 lte up
0:00:00:03
1 vedge dtls 172.16.255.16 600 1 2001::a01:1010
12386 2001::a01:1010 12386 lte up
0:00:00:11
1 vbond dtls - 0 0 2001::a00:c1a
12346 2001::a00:c1a
Related Topics
clear control connections, on page 742
controller-group-id, on page 201
show certificate reverse-proxy, on page 963
show control connections-history, on page 987
show control local-properties, on page 991
show control summary, on page 997
show orchestrator connections, on page 1150
tunnel-interface, on page 637
Command Syntax
show control connections-history [index] [detail]
show control connections-history connection-parameter [detail]
Syntax Description
None List the history of connections and connection attempts by this Cisco vEdge device.
Command History
Release Modification
Examples
SSL context.
CTORGNMMIS - Certificate Org name mismatch. SERNTPRES - Serial Number not present.
DCONFAIL - DTLS connection failure. SYSIPCHNG - System-IP changed.
DEVALC - Device memory Alloc failures. TMRALC - Memory Failure.
DHSTMO - DTLS HandShake Timeout. TUNALC - Memory Failure.
DISCVBD - Disconnect vBond after register reply. TXCHTOBD - Failed to send challenge
to BoardID.
DISTLOC - TLOC Disabled. UNMSGBDRG - Unknown Message type or
Bad Register msg.
DUPSER - Duplicate Serial Number. UNAUTHEL - Recd Hello from
Unauthenticated peer.
DUPCLHELO - Recd a Dup Client Hello, Reset Gl Peer. VBDEST - vDaemon process terminated.
HAFAIL - SSL Handshake failure. VECRTREV - vEdge Certification
revoked.
IP_TOS - Socket Options failure. VSCRTREV - vSmart Certificate
revoked.
LISFD - Listener Socket FD Error. VB_TMO - Peer vBond Timed out.
MGRTBLCKD - Migration blocked. Wait for local TMO.
MEMALCFL - Memory Allocation Failure. VM_TMO - Peer vManage Timed out.
NOACTVB - No Active vBond found to connect. VP_TMO - Peer vEdge Timed out.
NOERR - No Error. VS_TMO - Peer vSmart Timed out.
NOSLPRCRT - Unable to get peer's certificate. XTVSTRDN - Extra vSmart tear down.
PEER
PEER
Tx Statistics-
--------------
hello 0
connects 0
registers 0
register-replies 0
challenge 0
challenge-response 0
challenge-ack 0
teardown 0
teardown-all 0
vmanage-to-peer 0
register-to-vmanage 0
Rx Statistics-
--------------
hello 0
connects 0
registers 0
register-replies 0
challenge 0
challenge-response 0
challenge-ack 0
teardown 0
vmanage-to-peer 0
register-to-vmanage 0
----------------------------------------------------------------------------------------
REMOTE-COLOR- default SYSTEM-IP- :: PEER-PERSONALITY- vbond
----------------------------------------------------------------------------------------
site-id 0
domain-id 0
protocol dtls
private-ip 10.1.14.14
private-port 12346
public-ip 10.1.14.14
public-port 12346
UUID/chassis-number af010b09-539b-412e-bd28-d4ca2f45ea1d
state connect [Local Err: ERR_(D)TLS_CONN_FAIL] [Remote Err: NO_ERROR]
downtime 2016-02-19T10:47:13-0800
repeat count 4
previous downtime 2016-02-19T10:46:56-0800
Tx Statistics-
--------------
hello 0
connects 0
registers 0
register-replies 0
challenge 0
challenge-response 0
challenge-ack 0
teardown 0
teardown-all 0
vmanage-to-peer 0
register-to-vmanage 0
Rx Statistics-
--------------
hello 0
connects 0
registers 0
register-replies 0
challenge 0
challenge-response 0
challenge-ack 0
teardown 0
vmanage-to-peer 0
register-to-vmanage 0
Related Topics
clear control connections-history, on page 743
clear orchestrator connections-history, on page 772
show control connections, on page 984
show orchestrator connections-history, on page 1152
Command Syntax
show control local-properties [parameter]
Syntax Description
None Display the basic configuration parameters and local properties related to the control plane.
Command History
Release Modification
16.1. Added instance field to output for vSmart controllers and vManage NMSs.
16.2. Added SPI Time Remaining and Last-Resort Interface fields to output for vEdge
routers.
16.3. Added display information about IPv6 WAN interfaces, NAT type, low-bandwidth
interface, and vManage connection preference.
Examples
certificate-validity Valid
certificate-not-valid-before Dec 15 18:06:59 2016 GMT
certificate-not-valid-after Dec 15 18:06:59 2017 GMT
dns-name 10.0.12.26
site-id 100
domain-id 1
protocol dtls
tls-port 0
system-ip 172.16.255.11
chassis-num/unique-id b5887dd3-3d70-4987-a3a4-6e06c1d64a8c
serial-num 12345714
vsmart-list-version 0
keygen-interval 1:00:00:00
retry-interval 0:00:00:19
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:02:00
port-hopped TRUE
time-since-last-port-hop 0:00:43:16
number-vbond-peers 0
number-active-wan-interfaces 1
VM
PUBLIC PUBLIC PRIVATE PRIVATE
PRIVATE MAX CONTROL/ LAST SPI TIME NAT
CON
INTERFACE IPv4 PORT IPv4 IPv6
PORT VS/VM COLOR STATE CNTRL STUN LR/LB CONNECTION REMAINING
TYPE PRF
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ge0/0 10.1.15.15 12426 10.1.15.15 ::
12426 0/0 lte up 2 no/yes/no No/No 0:00:00:16 0:11:26:41 E
5
ge0/3 10.0.20.15 12406 10.0.20.15 ::
12406 0/0 3g up 2 no/yes/no No/No 0:00:00:13 0:11:26:45 N
5
vEdge# show control local-properties wan-interface-list
RESTRICT/
PUBLIC PUBLIC PRIVATE PRIVATE
PRIVATE MAX CONTROL/ LAST SPI TIME
INTERFACE IPv4 PORT IPv4 IPv6
PORT VS/VM COLOR STATE CNTL STUN LR/LB CONNECTION REMAINING
STUN
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ge0/2 10.0.5.11 12366 10.0.5.11 ::
12366 2/0 lte up 2 no/yes/no No/No 0:00:16:22 0:11:42:46
<weight>1</weight>
<color>lte</color>
<carrier>default</carrier>
<preference>0</preference>
<admin-state>up</admin-state>
<operation-state>up</operation-state>
<last-conn-time>0:00:16:27</last-conn-time>
<restrict-str>no</restrict-str>
<control-str>yes</control-str>
<per-wan-max-controllers>2</per-wan-max-controllers>
<private-ipv6>::</private-ipv6>
<spi-change>0:11:42:41</spi-change>
<last-resort>No</last-resort>
<wan-port-hopped>TRUE</wan-port-hopped>
<wan-time-since-port-hop>0:00:19:11</wan-time-since-port-hop>
<vbond-as-stun-server>no</vbond-as-stun-server>
<vmanage-connection-preference>5</vmanage-connection-preference>
<low-bandwidth-link>No</low-bandwidth-link>
</wan-interface-list>
</local-properties>
</control>
</config>
vSmart# show control local-properties
personality vsmart
organization-name Cisco, Inc.
certificate-status Installed
root-ca-chain-status Installed
certificate-validity Valid
certificate-not-valid-before Dec 15 18:07:15 2016 GMT
certificate-not-valid-after Dec 15 18:07:15 2017 GMT
dns-name 10.0.12.26
site-id 100
domain-id 1
protocol dtls
tls-port 23456
system-ip 172.16.255.19
chassis-num/unique-id 4fc2a9b0-1dc3-4a1e-b1a4-9c565e6ab12b
serial-num 12345707
vedge-list-version 0
vsmart-list-version 0
retry-interval 0:00:00:18
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:02:00
port-hopped FALSE
time-since-last-port-hop 0:00:00:00
number-vbond-peers 1
INDEX IP PORT
-----------------------------------------------------
0 10.0.12.26 12346
number-active-wan-interfaces 2
certificate-validity Valid
certificate-not-valid-before Mar 01 00:07:31 2016 GMT
certificate-not-valid-after Mar 01 00:07:31 2017 GMT
dns-name 10.1.14.14
site-id 200
domain-id 0
protocol dtls
tls-port 23456
system-ip 172.16.101.20
chassis-num/unique-id 9f9e3ca9-b909-43c5-be0e-acb819a45dc0
serial-num 1234560A
vedge-list-version 1
vsmart-list-version 0
retry-interval 0:00:00:19
no-activity-exp-interval 0:00:00:12
dns-cache-ttl 0:00:02:00
port-hopped FALSE
time-since-last-port-hop 0:00:00:00
number-vbond-peers 1
INDEX IP PORT
-------------------------------
0 10.1.14.14 12346
number-active-wan-interfaces 2
Related Topics
show control connections, on page 984
show orchestrator local-properties, on page 1156
show system status, on page 1241
tunnel-interface, on page 637
Command Syntax
show control statistics [counter-name]
Syntax Description
None Display statistics about all packets sent and received by the vEdge router or vSmart controller
as it establishes and maintains DTLS tunnel connections to the Cisco vEdge devices in the
overlay network.
Command History
Release Modification
Examples
dtls-handshake 3
dtls-handshake-failures 0
dtls-handshake-done 3
challenge 4
challenge-response 3
challenge-ack 4
challenge-errors 0
challenge-response-errors 0
challenge-ack-errors 0
challenge-general-errors 0
vmanage-to-peer 0
register_to_vmanage 1
Rx Statistics:
--------------
packets 56725
octets 4170626
errors 0
hello 50897
connects 855
registers 0
register-replies 283
dtls-handshake 15
dtls-handshake-failures 0
dtls-handshake-done 4
challenge 3
challenge-response 4
challenge-ack 3
challenge-failures 0
vmanage-to-peer 1
register_to_vmanage 0
Related Topics
show control connections, on page 984
show control summary, on page 997
show orchestrator statistics, on page 1159
Command Syntax
show control summary [instance]
Syntax Description
None Display a count of all the vBond orchestrators, vEdge routers, vManage NMSs, and vSmart
controllers in the overlay network.
Command History
Release Modification
15.3.3. Added support for multiple vdaemon processes (for vManage NMS only).
15.4. Added support for multiple vdaemon processes for all devices running as VMs.
Examples
Related Topics
show control connections, on page 984
show orchestrator summary, on page 1161
Command Syntax
show control valid-vedges
Syntax Description
None
Command History
Release Modification
Examples
SERIAL
CHASSIS NUMBER NUMBER VALIDITY
------------------------------------
11OD113140004 10000266 valid
11OD145130082 10000142 staging
11OD252130046 100001FF valid
11OD252130049 1000020B valid
11OD252130057 1000020C staging
R26OC126140004 10000369 valid
Related Topics
show control connections, on page 984
show control valid-vsmarts, on page 999
show orchestrator valid-vedges, on page 1162
Syntax Description
None Display the serial numbers of all valid vSmart controllers in the overlay network.
Command History
Release Modification
Examples
Related Topics
show control connections, on page 984
show control valid-vedges, on page 998
show orchestrator valid-vsmarts, on page 1164
show crash
Display a list of the core files on the local device. Core files are saved in the /var/crash directory on the local
device. They are readable by the "admin" user.
show crash [index-number] [core-filename filename]
Syntax Description
Command History
Release Modification
Examples
Show crash
vSmart# show crash
Related Topics
clear crash, on page 744
file list, on page 807
file show, on page 808
logging disk, on page 380
show logging, on page 1107
Syntax Description
This command has no arguments or keywords.
Example
This example shows how to display the trustpoint information on a syslog server:
Router# show crypto pki trustpoints status
crypto pki trustpoint SYSLOG-SIGNING-CA
enrollment url bootflash:vmanage-admin/
fqdn none
fingerprint xxxxxx
revocation-check none
rsakeypair SYSLOG-SIGNING-CA 2048
subject-name CN=CSR-cbc47d9d-45bf-433a-9816-1f12a8b48223_vManage Root CA
show devices
Display information about the Cisco vEdge devices that a vManage NMS is managing (on vManage NMSs
only).
show devices [device device-name] [commit-queue] [state state]
Syntax Description
None List information about all devices that the vManage NMS is managing.
Specific device device-name List information about a specific device that the vManage NMS is
Device managing.
Specific State state state List information about a specific state. state can be admin-state,
last-transaction-id, oper-state, and oper-state-error-tag. These states correspond to the
column headings in the output of the show devices command.
Command History
Release Modification
Examples
Display information about all the Cisco vEdge devices that a vManage NMS is managing:
Show devices
vManage# show devices
OPER
STATE LAST
---------------------------------------------------------------------
myvedge 0 [ ] disabled - -
vedge-172.16.255.11 0 [ ] enabled - -
vedge-172.16.255.14 0 [ ] disabled - -
vedge-172.16.255.15 0 [ ] enabled - -
vedge-172.16.255.16 0 [ ] enabled - -
vedge-172.16.255.21 0 [ ] enabled - -
vsmart-172.16.255.19 0 [ ] enabled - -
vsmart-172.16.255.20 0 [ ] enabled - -
Syntax Description
None Display information about all interfaces that are DHCPv4 clients.
Lease State state Display the DHCPv4 client interface state information.
VPN vpn vpn-id Display DHCPv4 client interface information for a specific VPN.
Command History
Release Modification
Examples
Related Topics
clear dhcp server-bindings, on page 745
dhcp-helper, on page 229
dhcp-server, on page 231
show dhcp server, on page 1005
show ipv6 dhcp interface, on page 1089
Syntax Description
None Display information about all DHCP server functionality enabled on the router.
Client Binding bindings mac-address Display the DHCP binding information for the client with the specified
MAC address.
DHCP dhcp-property Display information about a specific DHCP property. dhcp-property can be
Property one of client-ip ip-address, host-name hostname, lease-time, least-time-remaining, and
static-binding (false | true).
VPN vpn vpn-id Display DHCP server information for a specific VPN.
Command History
Examples
Release Modification
VPN IFNAME CLIENT MAC CLIENT IP LEASE TIME REMAINING BINDING HOST NAME
----------------------------------------------------------------------------------------------
1 ge1/2 00:00:00:79:64:01 192.168.15.101 1:00:00:00 0:13:37:25 false --
Related Topics
clear dhcp server-bindings, on page 745
clear dhcp state, on page 746
dhcp-server, on page 231
show dhcp interface, on page 1004
Command Hierarchy
show dot1x clients [detail]
show dot1x clients eapol [detail]
show dot1x clients interface interface-name [macaddress mac-address]
Syntax Description
None Display standard information about the 802.1X clients in the network.
Detailed Client Information detail Display detailed information about the 802.1X clients.
EAPOL State eapol Display the Extensible Authentication Protocol over LAN (EAPOL)
status for each 802.1X client.
Specific Interface and MAC interface interface-name [macaddress mac-address] Display the
Address 802.1X clients on a specific interface, or display a specific client on a
specific interface.
Command History
Release Modification
Examples
Display information about the 802.1X clients on an 802.1X–enabled interface:
Related Topics
clear dot1x client, on page 749
dot1x, on page 242
show dot1x interfaces, on page 1008
show dot1x radius, on page 1010
show system statistics, on page 1236
Syntax Description
Command History
Release Modification
Examples
Display information about the 802.1X on an 802.1Z–enabled interface:
Interface ge0/1:
Operational state : Up
Host mode : Multi Auth
MAB server : true
MAB local : true
Wake On LAN : true
Reauthentication period : 600 seconds
Inactivity timeout : 3600 seconds
Guest VLAN : 11
Auth fail VLAN : 12
Auth reject VLAN : 13
Default VLAN :
Primary radius server : 192.168.48.12
Secondary radius server : 192.168.48.11
Interim accounting interval : disabled
Number of connected clients : 1
Interface ge0/2:
Operational state : Down
Host mode : Single Host
MAB server : false
MAB local : false
Wake On LAN : false
Reauthentication period : disabled
Inactivity timeout : disabled
Guest VLAN : none
Auth fail VLAN : none
Auth reject VLAN : none
Default VLAN :
Related Topics
clear dot1x client, on page 749
dot1x, on page 242
show dot1x clients, on page 1006
show dot1x radius, on page 1010
show system statistics, on page 1236
Command Hierarchy
show dot1x radius
Syntax Description
None
Command History
Release Modification
Examples
Display information about the RADIUS servers that are being used for IEEE 802.1X WAN and 802.11i
WLAN authentication:
Timeouts : 3
Unknown types : 0
Packets dropped : 0
Related Topics
clear dot1x client, on page 749
show dot1x interfaces, on page 1008
radius, on page 518
show dot1x clients, on page 1006
show system statistics, on page 1236
Syntax Description
Command History
Release Modification
Examples
---------------------------------------------------------------------------------------------------------------
5 0 Power Supply Down Thu Nov 07 14:19:21 PST 2 Minor Power supply '0'
down or not present
5 1 Power Supply Down Thu Nov 07 14:19:21 PST 2 Minor Power supply '1'
down or not present
Related Topics
show hardware environment, on page 1013
show hardware inventory, on page 1016
show hardware real time information, on page 1019
show hardware temperature-thresholds, on page 1021
show interface sfp detail, on page 1053
show interface sfp diagnostic, on page 1058
Syntax Description
None None:
Display status information about all router components.
Command History
Release Modification
Release Modification
Output Fields
LEDs
In Releases 17.1 and later, the command output shows the status of the hardware router LEDs, as follows:
• vEdge 100b—System LED
• vEdge 100m—System and WWAN LEDs
• vEdge 100wm—System, WLAN, and WWAN LEDs
• vEdge 1000—Status and System LEDs
• vEdge 2000—PIM Status, Status, and System LEDs
Example
HW
DEV
---------------------------------------------------------------------------------------------------
Temperature Sensors PIM 0 OK 35 degrees C/95 degrees F
PEM Power supply 0 Down Present: yes; Powered On: no; Fault: no
Operational Commands
show hardware alarms
show hardware inventory
show hardware real-time-information
show hardware temperature-thresholds
Related Topics
show hardware alarms, on page 1012
show hardware inventory, on page 1016
show hardware real time information, on page 1019
show hardware temperature-thresholds, on page 1021
Syntax Description
None:
Display the inventory of all router components.
Command History
Release Modification
Output Fields
For vEdge routers that support WLAN interfaces, the Description column for the Chassis includes the country
code (shows as CC:).
Example
HW
DEV
HW TYPE INDEX VERSION PART NUMBER SERIAL NUMBER HW DESCRIPTION
---------------------------------------------------------------------------------------------------------------------------------
Chassis 0 6.2 81001730400 1780F2215160008 vEdge-100wm-GB. CPLD rev: 0x2, PCB rev: F, CC: US. Mfg Date: 19/05/2016
CPU 0 None None None Dual-Core Octeon-III
DRAM 0 None None None 2048 MB DDR3
PIM 0 None ge-fixed-5 None 5x 1GE Fixed Module
PIM 1 None Wireless LAN None Wireless LAN Module
PIM 2 None Wireless WAN None Wireless WAN Module
FanTray 0 None None None Fixed Fan Tray - 1 Fan
vEdge-Cloud# show hardware inventory
HW
DEV SERIAL
HW TYPE INDEX VERSION PART NUMBER NUMBER HW DESCRIPTION
--------------------------------------------------------------------
Chassis 0 1.0 vEdge-Cloud sim vEdge-Cloud
PIM 0 None ge-8 None Max 8 x 1GE VM ports
Operational Commands
show hardware alarms
show hardware environment
show hardware temperature-thresholds
show interface sfp detail
show interface sfp diagnostic
Related Topics
show hardware alarms, on page 1012
show hardware environment, on page 1013
show hardware temperature-thresholds, on page 1021
show interface sfp detail, on page 1053
show interface sfp diagnostic, on page 1058
Component measurement List the components and the information in the Measurement
Measurement column, such as a component's temperature.
Component Status status List the components and the information in the Status column.
Fan Fans [fan-name] Display information about all the fans or about a specific fan. Note that
Information the Cisco SD-WAN software maintains the fans at an optimal fan speed, raising the speed
as the ambient temperature increases and decreasing the speed as the temperature decreases,
to keep the vEdge router operating at the lowest possible temperature in the green temperature
threshold.
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
kern.err: Jul 12 23:14:03 vedge kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
kern.err: Jul 12 23:14:03 vedge kernel: sd 0:0:0:0: [sda] No Caching mode page found
kern.err: Jul 12 23:14:03 vedge kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
Operational Commands
show hardware alarms
show hardware environment
show hardware temperature-thresholds
show interface sfp detail
show interface sfp diagnostic
Related Topics
show hardware alarms, on page 1012
show hardware environment, on page 1013
show hardware temperature-thresholds, on page 1021
show interface sfp detail, on page 1053
show interface sfp diagnostic, on page 1058
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
HW
DEV SERIAL
HW TYPE INDEX VERSION PART NUMBER NUMBER HW DESCRIPTION
--------------------------------------------------------------------
Chassis 0 1.0 vEdge-Cloud sim vEdge-Cloud
Operational Commands
show hardware alarms
show hardware environment
show hardware real-time-information
show interface sfp detail
show interface sfp diagnostic
Related Topics
show hardware alarms, on page 1012
show hardware environment, on page 1013
show hardware real time information, on page 1019
show hardware temperature-thresholds, on page 1021
show interface sfp diagnostic, on page 1058
show history
show history—Display the history of the commands issued in operational mode.
show history [number]
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
Operational Commands
show history
Related Topics
clear history, on page 750
history, on page 810
show history, on page 1321
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
Operational Commands
clear igmp interface
igmp
show igmp groups
show igmp statistics
how igmp summary
Related Topics
igmp, on page 300
show igmp interface, on page 1026
vpnvpn-id VPN
vpn vpn-id Display IGMP information for interfaces in a specific VPN.
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
OTHER
IF GROUP QUERY QUERIER
VPN NAME IF ADDR COUNT QUERIER QUERIER IP INTERVAL STATE EXPIRY EVENT
---------------------------------------------------------------------------------------------------
1 ge0/4 10.20.24.15/24 0 true 10.20.24.15 0:00:02:00 querier - init-event
1 ge0/5 56.0.1.15/24 1 true 56.0.1.15 0:00:01:51 querier - init-event
Operational Commands
clear igmp interface
igmp
show igmp groups
show igmp statistics
how igmp summary
Related Topics
clear igmp interface, on page 751
igmp, on page 300
show igmp groups, on page 1024
show igmp statistics, on page 1028
show igmp summary, on page 1030
VPN VPN:
vpn vpn-id Display IGMP group information for interfaces in a specific VPN.
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
RX RX TX TX
GENERAL GROUP RX V1 RX V2 RX RX RX GENERAL GROUP TX
VPN QUERY QUERY REPORT REPORT LEAVE UNKNOWN ERROR QUERY QUERY ERROR
-----------------------------------------------------------------------------------
1 0 0 0 0 0 0 0 238 0 0
Operational Commands
igmp
show igmp groups
show igmp interface
how igmp summary
Related Topics
igmp, on page 300
show igmp groups, on page 1024
show igmp interface, on page 1026
show igmp summary, on page 1030
Command History
Release Modification
Output Fields
Last Member Query How many group-specific query messages the router sends when it has receives a
Count Leave Group message for a group before assuming that no members of the group
remain on the interface. When no members appear to be present, the vEdge router
removes the IGMP state for the group.
Last Member Query How long the router waits, in seconds, to receive a response a group-specific query
Response message. The default value is 1 second (1000 milliseconds). You cannot modify this
value.
Other Querier How long to wait for another IGMP querier to time out before assuming the role of
Timeout querier. If IGMP on an interface or circuit detects another querier that has a lower IP
than its own, it must become a non-querier on that network, and it starts watching for
query messages from the querier. If the vEdge router has not received a query message
from the querier in the Other Querier Timeout interval, it resumes the role of querier.
The default other querier timeout value is 125 seconds. You cannot modify this value.
Query Interval How often the router sends IGMP general query messages to solicit membership
information. The default is 125 seconds. You cannot modify this value.
Query Response Maximum amount of time, in seconds, that the router waits to receive a response to a
Interval general query message. The default is 10 seconds. You cannot modify this value.
Example
Operational Commands
igmp
show igmp groups
show igmp interface
how igmp statistics
Related Topics
igmp, on page 300
show igmp groups, on page 1024
show igmp interface, on page 1026
show igmp statistics, on page 1028
show interface
show interface—Display information about IPv4 interfaces on a Cisco vEdge device.
show interface [detail] [interface-name] [vpn vpn-id]
Command History
Release Modification
Output Fields
The following are the fields in the show interface command output:
1Duplex Whether the interface is operating in duplex or simplex mode. This field does not apply
to virtual interfaces, such as GRE, IRB, loopback, and system interfaces..
Encapsulation Type Encapsulation configured on the interface with the encapsulation command.
If Admin Status Administrative status of the interface; that is, its status as a result of the interface's
configuration. The status can be either Up or Down. By default, interfaces are
administratively down, and you must include the no shutdown command in the
interface's configuration to bring the interface up. An interface that is both
administratively and operationally up is able to transmit and receive traffic. To bring
down an interface administratively, include the shutdown command in the interface's
configuration.
If Oper Status Operational status of the interface; that is, its status as a result of operational factors.
The status can be either Up or Down. An interface can be operationally up if it is
Interface is administratively up, the interface link layer state is up, and the interface
initialization has completed. An interface that is both administratively and operationally
up is able to transmit and receive traffic. If the operational status is down, the interface
is functionally down and is not able to transmit or receive any traffic.
MTU MTU size for packets being send over the interface.
Port Type Describes the port's function from the point of view of the overlay network. It can be
one of the following:
loopback—Loopback interface. The device's system IP address is listed as a loopback
interface.
service—Interface for data traffic.
transport—Interface running a DTLS control session.
RX Packets and TX For GRE interfaces, these fields show counts of the data traffic received and transmitted
Packets on GRE tunnels. To display GRE keepalive traffic counts, use the show tunnel
gre-keepalives command. To display all GRE tunnel statistics, use the show tunnel
statistics gre command.
Speed Speed of the interface, in megabits per second (Mbps). This field does not apply to
virtual interfaces, such as GRE, IRB, loopback, and system interfaces.
TCP MSS Adjust Maximum segment size (MSS) of TCP SYN packets on the interface. For more
information see tcp-mss-adjust.
Uptime How long the interface has been up, in days, hours, minutes, and seconds.
The following are the additional fields included in the show interface detail command output:
• addr-type—Type of address configured on the interface, either IPv4 or IPv6, and how the address is
configured, either dynamic or static.
• allow-service—Services allowed on the interface. For more information, see allow-service.
• arp-add-fails—Packets for which an ARP entry in the forwarding plane could not be created.
• bad-label—Packets dropped because of an invalid next-hop label record for a destination.
• cpu-policer-drops—Packets destined to the control plane dropped because they exceeded the CPU policer
limit.
• dot1x-rx-pkts—802.1X packets received on the interface.
• dot1x-tx-pkts—802.1X packets transmitted on the interface.
• filter-drops—Packets dropped because of an implicit or explicit localized data policy (ACL) filter
configuration.
• icmp-redirect-rx-drops—
• icmp-redirect-tx-drops—ICMP redirect packets dropped by the interface.
• shaping-rate—Traffic rate on the interface if rate is configured with the shaping-rate command to be less
than the maximum rate.
• split-horizon-drops—BGP packets dropped as a result of split-horizon determination that the router was
advertising a route back on the same interface from which it was learned.
• tx-arp-rate-limit-drops—Number of ARP packets generated by the forwarding plane that exceed the CPU
rate limit, which is 16 ARP packets sent towards the CPU and 128 ARP packets send towards physical
ports.
• tx-broadcast-pkts—Transmission rate of broadcast packets, in packets per second.
• tx-drops—Transmitted packets that were dropped.
• tx-errors—Transmitted packets that were errored.
• tx-icmp-mirrored-drops—ICMP redirect packets dropped by the system.
• tx-icmp-policer-drops—ICMP packets generated by the system that were dropped because of ICMP
policer limits.
• tx-multicast-pkts—Transmitted multicast packets.
• tx-no-arp-drops—Packets dropped in the forwarding plane because of a missing ARP entry for a destination
IP address.
• tx-octets—Number of octets in transmitted packets.
Example
VPN INTERFACE TYPE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX ADJUST UPTIME PACKETS
PACKETS
--------------------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 ipv4 10.1.15.15/24 Up Up null transport 1500 00:0c:29:7d:1e:fe 1000 full 1420 0:19:51:22 795641
857981
0 ge0/1 ipv4 10.1.17.15/24 Up Up null service 1500 00:0c:29:7d:1e:08 1000 full 1420 0:19:42:43 5754 10
0 ge0/2 ipv4 - Down Up null service 1500 00:0c:29:7d:1e:12 1000 full 1420 0:19:51:27 5752 0
0 ge0/3 ipv4 10.0.20.15/24 Up Up null service 1500 00:0c:29:7d:1e:1c 1000 full 1420 0:19:42:43 5763 9
0 ge0/6 ipv4 57.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:3a 1000 full 1420 0:19:42:43 5750 10
0 ge0/7 ipv4 10.0.100.15/24 Up Up null service 1500 00:0c:29:7d:1e:44 1000 full 1420 0:19:48:22 7469 1346
0 system ipv4 172.16.255.15/32 Up Up null loopback 1500 00:00:00:00:00:00 0 full 1420 0:19:42:19 0 0
1 ge0/4 ipv4 10.20.24.15/24 Up Up null service 1500 00:0c:29:7d:1e:26 1000 full 1420 0:19:42:40 13263 7653
1 ge0/5 ipv4 56.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:30 1000 full 1420 0:19:42:40 5730 8
512 eth0 ipv4 10.0.1.15/24 Up Up null service 1500 00:50:56:00:01:0f 0 full 0 0:19:51:22 47033 31894
port-type transport
ifindex 1
mtu 1500
hwaddr 00:0c:29:7d:1e:fe
speed-mbps 1000
duplex full
auto-neg false
pause-type ""
tcp-mss-adjust 1420
uptime 0:19:51:44
allow-service dhcp,dns,icmp
rx-packets 795901
rx-octets 146499972
rx-errors 0
rx-drops 2920
tx-packets 858263
tx-octets 147918066
tx-errors 0
tx-drops 0
rx-pps 11
rx-kbps 16
tx-pps 12
tx-kbps 17
rx-arp-requests 44
tx-arp-replies 52
tx-arp-requests 2139
rx-arp-replies 2085
arp-add-fails 2
rx-arp-reply-drops 0
rx-arp-rate-limit-drops 0
tx-arp-rate-limit-drops 0
rx-arp-non-local-drops 13
tx-arp-request-fail 0
tx-no-arp-drops 0
rx-ip-ttl-expired 0
interface-disabled 0
rx-policer-drops 0
rx-non-ip-drops 0
filter-drops 0
mirror-drops 0
cpu-policer-drops 0
tx-icmp-policer-drops 0
tx-icmp-mirrored-drops 0
split-horizon-drops 0
route-lookup-fail 0
bad-label 0
rx-multicast-pkts 7511
rx-broadcast-pkts 2997
tx-multicast-pkts 7437
tx-broadcast-pkts 88
num-flaps 1
shaping-rate 0
dot1x-tx-pkts 0
dot1x-rx-pkts 0
rx-policer-remark 0
Operational Commands
show interface arp-stats
show interface description
show interface errors
vpnvpn-id VPN:
Display ARP statistics for interfaces in a specific VPN.
Command History
Release Modification
Output Fields
The following are the fields included in the show interface arp-stats command output:
• rx-arp-requests/tx-arp-replies, RX Requests/Tx Replies—Number of ARP requests received on the
interface, and number of replies sent to these ARP requests.
• tx-arp-requests/rx-arp-replies, TX Requests/Rx Replies—Number of ARP requests sent on the interface,
and number of replies received to these ARP requests.
• arp-add-fails, Add Fails—Packets for which an ARP entry in the forwarding plane could not be created.
• rx-arp-reply-drops, RX Reply Drops—Currently, the software does not increment this counter.
• rx-arp-rate-limit-drops, RX Rate Limit Drops—Currently, the software does not increment this counter.
• tx-arp-rate-limit-drops, TX Rate Limit Drops—Number of ARP packets generated by the forwarding
plane that exceed the CPU rate limit, which is 16 ARP packets sent towards the CPU and 128 ARP
packets send towards physical ports.
• rx-arp-non-local-drops, RX Non-Local Drops—Received ARP packets that do not match the destination
IP address of any local IP address.
• tx-arp-request-fail—Packets that could not be transmitted because an ARP request for the MAC address
corresponding to the destination IP address was unable to retrieve a MAC address.
• tx-no-arp-drops, TX No ARP Drops—Packets dropped in the forwarding plane because of a missing
ARP entry for a destination IP address.
Example
VPN INTERFACE TYPE REQUESTS REPLIES REQUESTS REPLIES FAILS DROPS DROPS DROPS DROPS FAIL DROPS
-----------------------------------------------------------------------------------------------------------------------------------
0 ge0/2 ipv4 0 0 0 0 0 0 0 0 0 0 0
0 ge0/3 ipv4 0 0 0 0 0 0 0 0 0 0 0
0 ge0/4 ipv4 0 0 0 0 0 0 0 0 0 0 0
0 ge0/5 ipv4 0 0 0 0 0 0 0 0 0 0 0
0 ge0/6 ipv4 0 0 0 0 0 0 0 0 0 0 0
0 ge0/7 ipv4 0 0 0 0 0 0 0 0 0 0 0
0 system ipv4 - - - - - - - - - - -
0 vmanage_system ipv4 - - - - - - - - - - -
1 ge0/7.23 ipv4 0 8 0 0 0 0 0 0 0 0 0
RX RX TX RX TX TX
VPN INTERFACE TYPE REQUESTS REPLIES REQUESTS REPLIES FAILS DROPS DROPS DROPS DROPS FAIL DROPS
------------------------------------------------------------------------------------------------------------------------------
Operational Commands
show arp
show interface
show interface description
show interface errors
show interface packet-sizes
show interface port-stats
show interface queue
None None:
Display information about all interfaces, including any configured interface description.
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
IF IF
ADMIN OPER
VPN INTERFACE IP ADDRESS STATUS STATUS DESCRIPTION
---------------------------------------------------------------------
0 ge0/0 10.1.15.15/24 Up Up Internet connection
0 ge0/1 10.1.17.15/24 Up Up -
0 ge0/2 - Down Up -
0 ge0/3 10.0.20.15/24 Up Up -
0 ge0/6 57.0.1.15/24 Up Up -
0 ge0/7 10.0.100.15/24 Up Up -
0 system 172.16.255.15/32 Up Up -
Operational Commands
description
show interface
show interface arp-stats
show interface errors
vpnvpn-id VPN:
Display error information for interfaces in a specific VPN.
Command History
Release Modification
Output Fields
Following are explanations of the output fields:
• arp-add-fails—Packets for which an ARP entry in the forwarding plane could not be created.
• bad-label—Packets dropped because of an invalid next-hop label record for a destination.
• cpu-policer-drops—Packets destined to the control plane dropped because they exceeded the CPU policer
limit.
• filter-drops—Packets dropped because of an implicit or explicit localized data policy (ACL) filter
configuration.
• fragment-df-drops—Packets dropped because their size is larger than the configure MTU, if the Don't
Fragment bit is set.
• interface-disabled—Incoming packets dropped because the interface port is not enabled.
• ip-fwd-null-hop—Packets that could not be forwarded because the next-hop address was invalid or the
next hop was unavailable.
• ip-fwd-unknown-nh-type—Packets dropped because the next-hop type was unknown.
• mirror-drops—Fragmented packets that are being mirrored to a destination.
• port-disabled-rx—Incoming packets dropped because the interface port is not enabled.
• port-disabled-tx—Outgoing packets dropped because the interface port is not enabled.
• route-lookup-fail—Packets that could not be forwarded because no route is present in the forwarding
table (FIB).
• rx-arp-cpu-rate-limit-drops—ARP reply packets dropped because the number of packets exceeded the
CPU rate limit.
• rx-arp-non-local-drops—Received ARP packets that do not match the destination IP address of any local
IP address.
• rx-arp-rate-limit-drops—Currently, the software does not increment this counter.
• rx-arp-reply-drops—Currently, the software does not increment this counter.
• rx-dmac-filter-drops—Received packets that do not match the destination MAC address corresponding
to the Layer 3 interface.
• rx-fcs-align-errors— In MIPS-based Cisco vEdge devices, like Cisco vEdge 1000 or Cisco vEdge 2000,
this counter is the sum of all dropped error packets. The errors may be caused due to:
• FCS (frame check sequence) errors
• alignment errors
These errors are detected at the hardware layer but are not related to DMAC (Destination MAC) filter
drop or lack of room in the receiver FIFO.
• rx-implicit-acl-drops—Received packets dropped because of an implicit route policy (access list). Router
tunnel interfaces also have implicit ACLs, which are also referred to as services. Some of these are present
by default on the tunnel interface, and they are in effect unless you disable them. Through configuration,
you can also enable other implicit ACLs. On vEdge routers, the following services are enabled by default:
DHCP (for DHCPv4 and DHCPv6), DNS, and ICMP. You can also enable services for BGP, Netconf,
NTP, OSPF, SSHD, and STUN. To enable the logging of the headers of packets dropped because they
do not match a service configure with an allow-service command, configure policy implicit-acl-logging
(on vEdge routers only).
• rx-inb-errors—Currently, the software does not increment this counter.
• rx-interface-not-found—Packets dropped because of an invalid VLAN tag.
• rx-ip-errors—Received packets whose IP or Thernet header could not be parsed.
• rx-ip-ttl-expired—Received IP packets whose time-to-live value expired.
• rx-non-ip-drops—Received packets other than IP or ARP packets that the interface dropped.
• rx-oversize-errors—Currently, the software does not increment this counter.
• rx-policer-drops—Incoming packets dropped because of the rate exceeded the configured ingress policer
rate.
• rx-replay-integrity-drops—Received packets dropped because the IPsec packet arrive outside of the
anti-replay window or because the integrity check performed by ESP or AH failed. To view the configured
anti-replay window, use the show security-info command. To modify the anti-replay window size, use
the security ipsec replay-window configuration command.
• rx-undersize-errors—Currently, the software does not increment this counter.
• rx-wred-drops—Incoming packets dropped because of a RED drop profile associated with an interface
queue. To configure a RED drop profile, use the drops option when configuring a QoS scheduler.
• split-horizon-drops—BGP packets dropped as a result of split-horizon determination that the router was
advertising a route back on the same interface from which it was learned.
• tx-arp-rate-limit-drops—Number of ARP packets generated by the forwarding plane that exceed the CPU
rate limit, which is 16 ARP packets sent towards the CPU and 128 ARP packets send towards physical
ports.
• tx-arp-request-fail—Packets that could not be transmitted because an ARP request for the MAC address
corresponding to the destination IP address was unable to retrieve a MAC address.
• tx-collision-drops—Packets dropped because the interface attempted to send packets at the same time.
• tx-fragment-drops—Packets dropped because of issues related to fragmentation, such as when a fragment
exceeds the MTU size when the DF bit is set and when issues occur in reassembling packets after
fragmentation.
• tx-fragment-needed—Packets requiring fragmentation because they are larger than the interface's MTU.
• tx-icmp-mirrored-drops—ICMP redirect packets dropped by the system.
• tx-icmp-policer-drops—ICMP packets generated by the system that were dropped because of ICMP
policer limits.
• tx-interface-disabled—Currently, the software does not increment this counter.
• tx-no-arp-drops—Packets dropped in the forwarding plane because of a missing ARP entry for a destination
IP address.
• tx-underflow-pkts—Packets dropped during transmission because packet data was not made available
to the TX FIFO in time. This situation can result in FCS errors on the receiving side.
Example
tx-collision-drops 0
...
Operational Commands
show interface
show interface arp-stats
show interface description
show interface packet-sizes
show interface port-stats
show interface queue
show interface statistics
Related Topics
show interface, on page 1032
show interface arp-stats, on page 1038
show interface description, on page 1041
show interface packet-sizes, on page 1047
show interface port-stats, on page 1049
show interface queue, on page 1051
show interface statistics, on page 1061
vpnvpn-id VPN:
Display packet size information for interfaces in a specific VPN.
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
512 mgmt0 - - - - - - - - - - - - -
-
Operational Commands
show interface
show interface arp-stats
show interface description
show interface errors
show interface port-stats
show interface queue
show interface statistics
Related Topics
show interface, on page 1032
show interface arp-stats, on page 1038
show interface description, on page 1041
show interface errors, on page 1043
show interface port-stats, on page 1049
show interface queue, on page 1051
show interface statistics, on page 1061
vpnvpn-id VPN:
vpn vpn-id Display port statistics for a specific VPN.
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
RX DMAC RX RX RX RX RX RX FCS RX TX TX TX
TX TX TX
PAUSE FILTER DROP DROP WRED INTERFACE RX INB OVERSIZE ALIGN UNDERSIZE UNDERFLOW COLLISION PAUSE
FRAGMENTS TX FRAGMENT WRED LLQ
VPN INTERFACE PKTS DROPS PKTS OCTETS DROPS NOT FOUND ERRORS ERRORS ERRORS ERRORS PKTS DROPS PKTS
NEEDED FRAGMENTS DROPS DROPS DROPS
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 0 975 0 0 0 0 0 0 0 0 0 0 0
0 0 0 - 0
0 ge0/2 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 - 0
0 ge0/4 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 - 0
0 ge0/5 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 - 0
0 ge0/6 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 - 0
0 ge0/7 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 - 0
0 system - - - - - - - - - - - - -
- - - - -
1 ge0/1 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 - 0
1 ge0/3 0 27 0 0 0 0 0 0 0 0 0 0 0
0 0 34 - 0
512 mgmt0 - - - - - - - - - - - - -
- - - - -
Operational Commands
show interface
show interface arp-stats
show interface description
show interface errors
show interface packet-sizes
show interface queue
show interface statistics
Related Topics
show interface, on page 1032
show interface arp-stats, on page 1038
show interface description, on page 1041
show interface errors, on page 1043
show interface packet-sizes, on page 1047
show interface queue, on page 1051
show interface statistics, on page 1061
Syntax Description
None None:
Display standard interface queue statistics.
vpnvpn-id VPN:
Display interface queue statistics for interfaces in a specific VPN.
Note The queue drop details are dispalyed when you pass commands, show interface statistics and
show interface port-stats.
Command History
Release Modification
Output Fields
QNUM
Queue number. Hardware vEdge routers have 8 queues, numbered 0 through 7. From 17.2.7 Release onwards,
vEdge Cloud software router have 8 queues, numbered 0 through 7.
The remaining output fields are self-explanatory.
Example
6 0 0 0 0 0 0 0 0 0 0 0 0
7 0 0 0 0 0 0 0 0 0 0 0 0
Operational Commands
show interface
show interface arp-stats
show interface description
show interface errors
show interface packet-sizes
show interface port-stats
show interface statistics
Related Topics
show interface, on page 1032
show interface arp-stats, on page 1038
show interface description, on page 1041
show interface errors, on page 1043
show interface packet-sizes, on page 1047
show interface port-stats, on page 1049
show interface statistics, on page 1061
Command History
Release Modification
Output Fields
The output fields are drawn from the SFP addresses listed below. Not all fields are valid or make sense for
all SFP types.
Fiber SFPs
Example
vEdge-1000# show interface sfp detail ge0/5
sfp detail ge0/5
Present Yes
Physical identifier SFP/SFP+
Connector type "LC (Lucent connector)"
Transceiver compliance "1000 Base-SX"
Encoding 8b/10b
Nominal speed "1.20 Gbps"
Rate select options Unspecified
62.5um OM1 fiber length 270m
50um OM2 fiber length 550m
Laser wavelength 850nm
Vendor name "AVAGO "
Vendor OUI 00:17:6a
Vendor number "AFBR-5710PZ "
Vendor revision " "
Vendor serial number "AM13412D2Z7 "
Date code 2013/10/11
Feature options
Loss of signal Yes
Signal detect No
Tx fault Yes
Tx disable Yes
Rate select No
Tunable wavelength No
Rx decision threshold No
Linear receive output No
Power level 1
Cooled laser No
Timing type "Internal retimer"
Paged A2 access No
Digital diagnostics
Supported No
Enhanced options
Soft rate select control No
Application select control No
Soft rate select control/monitor No
Soft Rx LOS monitor No
Soft Tx fault monitor No
Soft Tx disable control/monitor No
Supports all alarms/warning flags No
Copper SFPs
For a 1-Gigabit Ethernet copper SFP:
vEdge1000# show interface sfp detail ge0/4
sfp detail ge0/4
Present Yes
Physical identifier SFP/SFP+
Connector type Unknown/unspecified
Transceiver compliance "1000 Base-T"
Encoding 8b/10b
Nominal speed "1.20 Gbps"
Rate select options Unspecified
Copper min link length 100m
Vendor name "FINISAR CORP. "
Operational Commands
show hardware alarms
show hardware environment
show hardware inventory transceiver
show hardware temperature-thresholds
show interface sfp diagnostic
Related Topics
show hardware alarms, on page 1012
show hardware environment, on page 1013
show hardware inventory, on page 1016
show hardware temperature-thresholds, on page 1021
show interface sfp diagnostic, on page 1058
Command History
Release Modification
Output Fields
The output fields are drawn from the SFP addresses listed below. Not all fields are valid or make sense for
all SFP types.
The following information is displayed for SFP diagnostics. Measurement information is presented as
floating-point data.
Threshold and measurement data are all floating point data and are specified for accuracy relative to the source
data. Measurement units are included in the value label.
In addition to allowing current measurements to be display, each of the following measurements has associated
flag status indicating whether the measurement is in or out of alarm or warning state. This data is sourced
from A2.112-117 SFP data.
Based on options declared to be supported by the SFP, several bit-based statuses are included in the display
output. These include items such as select, transmit disable state, and receive loss-of-signal state, and are from
A2.110.
Measurement High Warning High Alarm Low Warning Low Alarm Current
Optical laser A2.44 to A2.45 A2.40 to A2.41 A2.46 to A2.47 A2.42 to A2.43 A2.106 to
temperature A2.107
Optical TEC A2.52 to A2.53 A2.48 to A2.49 A2.54 to A2.55 A2.50 to A2.51 A2.108 to
current A2.109
Measurement High Warning High Alarm Low Warning Low Alarm Current
Receive power A2.36 to A2.37 A2.32 to A2.33 A2.38 to A2.39 A2.34 to A2.35 A2.104 to
A2.105
SFP temperature A2.4 to A2.5 A2.0 to A2.1 A2.6 to A2.7 A2.2 to A2.3 A2.96 to A2.97
Supply voltage A2.12 to A2.13 A2.8 to A2.9 A2.14 to A2.15 A2.10 to A2.11 A2.98 to A2.99
Transmit bias A2.20 to A2.21 A2.16 to A2.17 A2.22 to A2.23 A2.18 to A2.19 A2.100 to
current A2.101
Example
For a 1-Gigabit Ethernet copper SFP:
Operational Commands
show hardware alarms
show hardware environment
vpnvpn-id VPN:
Display interface statistics for interfaces in a specific VPN.
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
RX RX RX RX TX TX TX TX RX
RX TX TX
VPN INTERFACE PACKETS OCTETS ERRORS DROPS PACKETS OCTETS ERRORS DROPS PPS
Kbps PPS Kbps
----------------------------------------------------------------------------------------------------------
0 eth0 8014 910140 0 0 5664 1032739 0 0 0 0
0 0
0 eth1 131517 24476039 0 0 154517 37400773 0 0 12
18 14 28
0 eth3 - - - - - - - - - -
- -
0 system 0 0 0 0 0 0 0 0 0 0
0 0
512 eth2 414 56320 0 0 7 558 0 0 0 0
0 0
Operational Commands
show interface
show interface arp-stats
show interface buffer-pool-status
show interface description
show interface errors
show interface packet-sizes
show interface port-stats
show interface queue
Related Topics
show interface, on page 1032
show interface arp-stats, on page 1038
show system buffer-pool-status, on page 1234
show interface description, on page 1041
show interface errors, on page 1043
show interface packet-sizes, on page 1047
show interface port-stats, on page 1049
show interface queue, on page 1051
show ip dns-snoop
Display details of a fully qualified domain name (FQDN) and its corresponding IP address mapping information.
The DNS snooping agent (DSA) maintains an "IP cache" table of fully qualified domain names (FQDN) and
their corresponding IP addresses. The command displays the complete information in this table (all option),
or details for specific FQDN's (pattern option) or IP addresses (address option).
(for Cisco IOS XE SD-WAN devices)
Command Syntax
show ip dns-snoop {address ip-address | all pattern pattern}
Syntax Description
address ip-address Display details for a specific IP address in the DSA IP cache
table.
all Display details for all IP addresses in the DSA IP cache table.
pattern pattern Display details for a specific FQDN in the DSA IP cache table,
matching a text pattern.
Command Mode
Privileged EXEC mode
Command History
Release Modification
Examples
Example
Device# show ip dns-snoop all
IP Address Client(s) Expire RegexId Dirty Match
------------------------------------------------------------------------------
192.168.0.1 0x1 992 0xef270000 0x00 cisco\.com
show ip fib
show ip fib—Display the IPv4 entries in the local forwarding table (on vEdge routers only).
show ip fib [vpn vpn-id]
show ip fib [vpn vpn-id] [tloc (color color | tloc-ip ip-address)]
show ip fib vpn vpn-id [ipv4-prefix/length]
Command History
Release Modification
IF IF TCP
ADMIN OPER ENCAP SPEED MSS RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX ADJUST UPTIME PACKETS PACKET
-----------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 10.1.15.15/24 Up Up null transport 1500 00:0c:29:7d:1e:fe 10 full 0 0:02:38:45 96014 95934
0 ge0/1 10.1.17.15/24 Up Up null service 1500 00:0c:29:7d:1e:08 10 full 0 0:02:38:45 226 4
0 ge0/2 - Down Up null service 1500 00:0c:29:7d:1e:12 10 full 0 0:02:38:45 226 0
0 ge0/3 10.0.20.15/24 Up Up null service 1500 00:0c:29:7d:1e:1c 10 full 0 0:02:38:45 230 4
0 ge0/6 57.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:3a 10 full 0 0:02:38:45 226 4
0 ge0/7 10.0.100.15/24 Up Up null service 1500 00:0c:29:7d:1e:44 10 full 0 0:02:37:09 906 577
0 system 172.16.255.15/32 Up Up null loopback 1500 00:00:00:00:00:00 10 full 0 0:02:25:04 0 0
1 ge0/4 10.20.24.15/24 Up Up null service 1500 00:0c:29:7d:1e:26 10 full 0 0:02:25:22 1152 951
1 ge0/5 56.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:30 10 full 0 0:02:25:22 216 4
512 eth0 10.0.1.15/24 Up Up null service 1500 00:50:56:00:01:0f 1000 full 0 0:02:38:38 6198 3
PATH ATTRIBUTE
VPN PREFIX FROM PEER ID LABEL STATUS TYPE TLOC IP COLOR ENCAP PREFERENCE
--------------------------------------------------------------------------------------------------------------------------------------
1 10.2.2.0/24 172.16.255.19 103 2 C,I,R installed 172.16.255.11 lte ipsec -
172.16.255.20 103 2 C,R installed 172.16.255.11 lte ipsec -
1 10.2.3.0/24 172.16.255.19 81 2 C,I,R installed 172.16.255.21 lte ipsec -
172.16.255.20 81 2 C,R installed 172.16.255.21 lte ipsec -
1 10.20.24.0/24 0.0.0.0 32769 2 C,Red,R installed 172.16.255.15 lte ipsec -
0.0.0.0 32779 2 C,Red,R installed 172.16.255.15 lte gre -
1 10.20.25.0/24 172.16.255.19 77 2 C,I,R installed 172.16.255.16 lte ipsec -
172.16.255.20 73 2 C,R installed 172.16.255.16 lte ipsec -
1 56.0.1.0/24 0.0.0.0 32769 2 C,Red,R installed 172.16.255.15 lte ipsec -
0.0.0.0 32779 2 C,Red,R installed 172.16.255.15 lte gre -
1 60.0.1.0/24 172.16.255.19 78 2 C,I,R installed 172.16.255.16 lte ipsec -
Operation Commands
ip route
ipv6 route
route-consistency-check
show interface
show ip routes
show ipv6 fib
show omp routes
Related Topics
ip route, on page 340
ipv6 route, on page 351
route-consistency-check, on page 548
show interface, on page 1032
show ip routes, on page 1076
show ipv6 fib, on page 1091
show omp routes, on page 1134
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
Operational Commands
show ip mfib summary
show ip mfib stats
Related Topics
show ip mfib summary, on page 1069
show ip mfib stats, on page 1068
Command Syntax
show ip mfib stats
Output Fields
Rx Policy Drop, Tx Policy Drop
The number of inbound or outbound packets dropped as the result of applying a policy. The remaining output
fields are self-explanatory.
Command History
Release Modification
RX RX TX TX RX TX INVALID
RX RX TX TX CTRL PACKETS OCTETS PACKETS OCTETS AVG RPF POLICY POLICY OIL TX
VPN GROUP SOURCE PKTS OCTETS PKTS OCTETS PKTS (PPS) (KBPS) (PPS) (KBPS) REPLICATION FAILURE DROP DROP FAILURE FAILURE
-----------------------------------------------------------------------------------------------------------------------------------------------------
1 224.0.1.39 0.0.0.0 0 0 0 0 0 0 0 0 0 0.00 0 0 0 0 0
1 224.0.1.40 0.0.0.0 0 0 0 0 0 0 0 0 0 0.00 0 0 0 0 0
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
NUM NUM
VPN UPSTREAM UPSTREAM SERVICE TUNNEL
ID GROUP SOURCE IF TUNNEL OILS OILS
---------------------------------------------------------------
1 224.0.1.39 0.0.0.0 --- 0.0.0.0 0 0
1 224.0.1.40 0.0.0.0 --- 0.0.0.0 0 0
1 225.0.0.1 0.0.0.0 ge0/4 0.0.0.0 0 1
Operational Commands
show ip mfib oil
show ip mfib stats
Related Topics
show ip mfib oil, on page 1067
show ip mfib stats, on page 1068
Command History
Release Modification
Output Fields
The output fields are self-explanatory.
Example
NAT NAT SOURCE DEST SOURCE DEST SOURCE DEST SOURCE DEST FILTER IDLE
OUTBOUND OUTBOUND INBOUND INBOUND
VPN IFNAME VPN PROTOCOL ADDRESS ADDRESS PORT PORT ADDRESS ADDRESS PORT PORT STATE
TIMEOUT PACKETS OCTETS PACKETS OCTETS
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 4697 4697 10.1.15.15 10.1.14.14 64931 64931 established
0:00:00:41 1 98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 14169 14169 10.1.15.15 10.1.14.14 28467 28467 established
0:00:00:44 1 98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 21337 21337 10.1.15.15 10.1.14.14 44555 44555 established
0:00:00:47 1 98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 28505 28505 10.1.15.15 10.1.14.14 40269 40269 established
0:00:00:50 1 98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 39513 39513 10.1.15.15 10.1.14.14 31859 31859 established
0:00:00:53 1 98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 46681 46681 10.1.15.15 10.1.14.14 1103 1103 established
0:00:00:56 1 98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 57176 57176 10.1.15.15 10.1.14.14 38730 38730 established
0:00:00:35 1 98 1 98
0 ge0/0 0 icmp 10.1.15.15 10.1.14.14 64600 64600 10.1.15.15 10.1.14.14 33274 33274 established
0:00:00:38 1 98 1 98
0 ge0/0 0 udp 10.1.15.15 10.0.5.19 12346 12346 10.1.15.15 10.0.5.19 64236 12346 established
0:00:19:59 38 8031 23 5551
0 ge0/0 0 udp 10.1.15.15 10.0.12.20 12346 12346 10.1.15.15 10.0.12.20 64236 12346 established
0:00:19:59 36 7470 23 5551
0 ge0/0 0 udp 10.1.15.15 10.0.12.22 12346 12346 10.1.15.15 10.0.12.22 64236 12346 established
0:00:19:59 679 598771 434 92925
0 ge0/0 0 udp 10.1.15.15 10.1.14.14 12346 12346 10.1.15.15 10.1.14.14 64236 12346 established
0:00:19:59 34 3825 9 3607
0 ge0/0 0 udp 10.1.15.15 10.1.14.14 12346 12350 10.1.15.15 10.1.14.14 64236 12350 established
0:00:19:59 38 5472 23 3634
0 ge0/0 0 udp 10.1.15.15 10.1.16.16 12346 12346 10.1.15.15 10.1.16.16 64236 12346 established
0:00:19:59 38 5472 23 3634
Operational Commands
show ip nat interface
show ip nat interface-statistics
Related Topics
nat, on page 440
show ip nat interface, on page 1072
show ip nat interface-statistics, on page 1074
Command Syntax
show ip nat interface [nat-vpn vpn-id] [nat-parameter]
Syntax Description None List information about all NAT interfaces in all VPNs.
Command History
Release Modification
Output Fields
In the Map Type field, all SD-WAN NAT types are endpoint-independent.
The other output fields are self-explanatory.
Output
vEdge# show ip nat interface
FIB NUMBER
FILTER FILTER IP
VPN IFNAME MAP TYPE FILTER TYPE COUNT COUNT IP POOLS
-------------------------------------------------------------------------------------------------------
1 natpool1 endpoint-independent address-port-restricted 0 0 10.15.1.4/30 4
1 natpool7 endpoint-independent address-port-restricted 0 0 10.21.26.15/32 1
1 natpool8 endpoint-independent address-port-restricted 0 0 10.21.27.15/32 1
1 natpool9 endpoint-independent address-port-restricted 0 0 10.21.28.15/32 1
1 natpool10 endpoint-independent address-port-restricted 0 0 10.21.29.15/32 1
1 natpool11 endpoint-independent address-port-restricted 0 0 10.21.30.15/32 1
1 natpool12 endpoint-independent address-port-restricted 0 0 10.21.31.15/32 1
1 natpool13 endpoint-independent address-port-restricted 0 0 10.21.32.15/32 1
1 natpool14 endpoint-independent address-port-restricted 0 0 10.21.33.15/32 1
1 natpool15 endpoint-independent address-port-restricted 0 0 10.21.34.15/32 1
1 natpool16 endpoint-independent address-port-restricted 0 0 10.21.35.15/32 1
Operational Commands
nat
show ip nat filter
show ip nat interface-statistics
Related Topics
nat, on page 440
show ip nat filter, on page 1070
show ip nat interface-statistics, on page 1074
Command Syntax
show ip nat filter interface-statistics [nat-vpn vpn-id]
nat-vpn VPN:
vpn-id
Display statistics for the interfaces in the specified VPN.
Command History
Release Modification
Operational Commands
nat
show ip nat filter
show ip nat interface-statistics
Related Topics
nat, on page 440
show ip nat filter, on page 1070
show ip nat interface, on page 1072
show ip routes
show ip routes—Display the IPv4 entries in the local route table. On vSmart controllers, the route table
incorporates forwarding information.
Command Syntax
show ip routes [ipv4-address] [ipv4prefix /length] [bgp] [connected] [gre] [nat] [natpool-inside]
[natpool-outside] [omp] [ospf] [static] [summary [protocol protocol] ] [detail ]
show ip routes vpn vpn-id [ipv4-address] [ipv4prefix/length] [bgp] [connected] [gre] [nat] [natpool-inside]
[natpool-outside] [omp] [ospf] [static] [detail]
Syntax Description
None:
List standard information about the entries in the local IPv4 route table.
Note Any BFD event (up/down) for a vEdge peer will result in withdrawal and re-installation of all OMP routes
learnt from the remote vEdge, consequently, re-setting the uptime as well.
Command History
Release Modification
Examples
Example 1
vEdge# show ip routes
Codes Proto-sub-type:
IA -> ospf-inter-area,
E1 -> ospf-external1, E2 -> ospf-external2,
N1 -> ospf-nssa-external1, N2 -> ospf-nssa-external2,
e -> bgp-external, i -> bgp-internal
Codes Status flags:
F -> fib, S -> selected, I -> inactive,
B -> blackhole, R -> recursive
PROTOCOL NEXTHOP NEXTHOP NEXTHOP
VPN PREFIX PROTOCOL SUB TYPE IF NAME ADDR VPN TLOC IP COLOR ENCAP STATUS
----------------------------------------------------------------------------------------------------------------------------------
0 0.0.0.0/0 static - ge0/0 10.1.15.13 - - - - F,S
0 10.0.20.0/24 connected - ge0/3 - - - - - F,S
0 10.0.100.0/24 connected - ge0/7 - - - - - F,S
0 10.1.15.0/24 connected - ge0/0 - - - - - F,S
0 10.1.17.0/24 connected - ge0/1 - - - - - F,S
0 57.0.1.0/24 connected - ge0/6 - - - - - F,S
0 172.16.255.15/32 connected - system - - - - - F,S
1 10.1.17.15/32 nat - ge0/1 - 0 - - - F,S
1 10.20.24.0/24 ospf - ge0/4 - - - - - -
1 10.20.24.0/24 connected - ge0/4 - - - - - F,S
1 10.20.25.0/24 omp - - - - 172.16.255.16 lte ipsec F,S
1 56.0.1.0/24 connected - ge0/5 - - - - - F,S
1 60.0.1.0/24 omp - - - - 172.16.255.16 lte ipsec F,S
1 61.0.1.0/24 omp - - - - 172.16.255.16 lte ipsec F,S
512 10.0.1.0/24 connected - eth0 - - - - - F,S
Example 2
vEdge# show ip routes summary
ADDRESS
VPN FAMILY PROTOCOL RECEIVED INSTALLED
----------------------------------------------
0 ipv4 connected 6 6
0 ipv4 static 0 0
0 ipv4 ospf 5 4
0 ipv4 bgp 0 0
0 ipv4 omp 0 0
1 ipv4 connected 3 3
1 ipv4 static 0 0
1 ipv4 ospf 0 0
1 ipv4 bgp 1 1
1 ipv4 omp 4 4
512 ipv4 connected 1 1
512 ipv4 static 0 0
Example 3
vEdge# show ip routes 172.16.255.112/32 detail
Codes Proto-sub-type:
IA -> ospf-inter-area,
E1 -> ospf-external1, E2 -> ospf-external2,
N1 -> ospf-nssa-external1, N2 -> ospf-nssa-external2,
e -> bgp-external, i -> bgp-internal
Codes Status flags:
F -> fib, S -> selected, I -> inactive,
B -> blackhole, R -> recursive
--------------------------------------------
VPN 1 PREFIX 172.16.255.112/32
--------------------------------------------
proto ospf
proto-sub-type E2
distance 110
metric 20
uptime 2:17:37:59
omp-tag 100
ospf-tag 20
nexthop-ifname ge0/0
nexthop-addr 10.2.2.12
status F,S
Related Topics
ip route, on page 340
route-consistency-check, on page 548
show ip fib, on page 1064
show ipv6 routes, on page 1101
show omp routes, on page 1134
Command Syntax
show ipsec ike inbound-connections
show ipsec ike inbound-connections source-ip-address [source-port [destination-ip-address [destination-port
] ] ] [ (ciphersuite suite | new-key-hash hash | new-spi spi | old-key-hash hash | old-spi spi) ] ] ] ]
Syntax Description
None:
Display information for all the IKE sessions that have
been established to the local router.
Command History
Release Modification
Example
For the following example, the output of the show ipsec ike inbound-connections command on the
vEdge1 router shows the IKE-enabled IPsec tunnel connection that originates on the vEdge2 router,
whose tunnel source IP address is 10.1.16.16. The command output on the vEdge2 router shows the
connection from vEdge1, whose tunnel source IP address is 10.1.15.15.
vEdge1# show running-config vpn 1 interface ipsec1
vpn 1
interface ipsec1
ip address 10.1.1.1/30
tunnel-source 10.1.15.15
tunnel-destination 10.1.16.16
ike
version 2
rekey 14400
cipher-suite aes256-cbc-sha1
group 16
authentication-type
pre-shared-key
pre-shared-secret $8$jr37xShEUPZF2zuiZFpTqqBHSlCHVX1XLut1o62mh7c=
!
!
!
ipsec
rekey 14400
replay-window 32
cipher-suite aes256-cbc-sha1
!
no shutdown
!
!
-----------------------------------------------------------------------------------------------------------------------------------------------------
10.1.16.16 4500 10.1.15.15 4500 257 256 aes256-cbc-sha1 ****01be ****a0df
-----------------------------------------------------------------------------------------------------------------------------------------------------
10.1.15.15 4500 10.1.16.16 4500 257 256 aes256-cbc-sha1 ****4485 ****48e3
Related Topics
show ipsec ike outbound-connections, on page 1081
show ipsec ike sessions, on page 1083
Command Syntax
show ipsec ike outbound-connections
show ipsec ike outbound-connections source-ip-address [source-port [destination-ip-address
[destination-port] [spi ] ] ] [ (ciphersuite suite | key-hash hash | tunnel-mtu mtu ) ] ] ] ]
Syntax Description
None:
Display information for all the IKE sessions that have been
established to remote IKE peers.
Command History
Release Modification
Examples On the vEdge1 router, the output of the show ipsec ike outbound-connections command shows the
IKE-enabled IPsec tunnel connection that originates from the local router, whose tunnel source IP
address is 10.1.15.15. The command output on the vEdge2 router shows the connection originating
from that router, 10.1.15.15.
vEdge1# show running-config vpn 1 interface ipsec1
vpn 1
interface ipsec1
ip address 10.1.1.1/30
tunnel-source 10.1.15.15
tunnel-destination 10.1.16.16
ike
version 2
rekey 14400
cipher-suite aes256-cbc-sha1
group 16
authentication-type
pre-shared-key
pre-shared-secret $8$jr37xShEUPZF2zuiZFpTqqBHSlCHVX1XLut1o62mh7c=
!
!
!
ipsec
rekey 14400
replay-window 32
cipher-suite aes256-cbc-sha1
!
no shutdown
!
!
Related Topics
show ipsec ike inbound-connections, on page 1079
show ipsec ike sessions, on page 1083
Command Syntax
show ipsec ike sessions
Syntax Description
None
Command History
Release Modification
IF SOURCE DEST
VPN NAME VERSION SOURCE IP PORT DEST IP PORT INITIATOR SPI RESPONDER SPI CIPHER SUITE DH GROUP STATE UPTIME
----------------------------------------------------------------------------------------------------------------------------------------------------------
1 ipsec1 2 10.1.15.15 4500 10.1.16.16 4500 ccb1a7c4a770752e 6179faf6884bfd38 aes256-cbc-sha1 16 (MODP-4096) ESTABLISHED
0:00:08:38
IF SOURCE DEST
VPN NAME VERSION SOURCE IP PORT DEST IP PORT INITIATOR SPI RESPONDER SPI CIPHER SUITE DH GROUP STATE UPTIME
----------------------------------------------------------------------------------------------------------------------------------------------------------
1 ipsec1 2 10.1.16.16 4500 10.1.15.15 4500 ccb1a7c4a770752e 6179faf6884bfd38 aes256-cbc-sha1 16 (MODP-4096) ESTABLISHED
0:00:09:23
Related Topics
show ipsec ike inbound-connections, on page 1079
show ipsec ike outbound-connections, on page 1081
Command Syntax
show ipsec inbound-connections
show ipsec inbound-connections local-tloc-address [local-color [remote-tloc-address [remote-color [ (dest-ip
|dest-port | source-ip | source-port) ] ] ] ]
Syntax Description
None:
Display information for all the IPsec connections that originate
on the vEdge router. The tunnel connections are listed in order
according to the local TLOC address.
Command History
Release Modification
Related Topics
show ipsec local-sa, on page 1086
show ipsec outbound-connections, on page 1087
Command Syntax
show ipsec local-sa
show ipsec local-sa tloc-address [color [spi [ (auth-key-hash |encrypt-key-hash | ip |port) ] ] ] ]
Syntax Description
None:
Display information for the security associations for all IPsec tunnels
that originate on the local router. The SA information is listed in
order according to the local TLOC address.
Command History
Release Modification
TLOC ADDRESS TLOC COLOR SPI IPv4 IPv6 PORT KEY HASH
--------------------------------------------------------------------------------------------------------------
172.16.255.11 lte 256 10.0.5.11 :: 12366 *****cfdc
Related Topics
rekey, on page 533
request security ipsec-rekey, on page 881
show ipsec inbound-connections, on page 1085
show ipsec outbound-connections, on page 1087
Command Syntax
show ipsec outbound-connections [source-ip-address]
show ipsec outbound-connections [authentication-used string |tunnel-mtu number]
show ipsec outbound-connections (remote-tloc-address ip-address | remote-tloc-color color)
Command History
Release Modification
Examples
Related Topics
rekey, on page 533
show ipsec inbound-connections, on page 1085
show ipsec local-sa, on page 1086
Command Syntax
show ipv6 dhcp interface [vpn vpn-id] [interface-name]
show ipv dhcp interface [dns-list] [state]
Syntax Description
None:
Display information about all interfaces that are DHCPv6 clients.
vpn VPN:
vpn-id
Display DHCPv6 client interface information for a specific VPN.
Output Fields
The state can be one of bound, init, rebind, release, renew, and request.
The DNS column lists the IPv6 addresses of the DNS servers returned by DHCPv6.
The remaining output fields are self-explanatory.
Command History
Release Modification
TIME
VPN INTERFACE STATE ACQUIRED IP SERVER LEASE TIME REMAINING
GATEWAY INDEX DNS
------------------------------------------------------------------------------------------------------------------------------
0 ge0/1 init - - - -
0 ge0/2 bound 2001::a00:55e/64 0:1:0:1:1f:80:20:ef:0:c:29:6:79:94 0:02:00:00 0:01:58:08 -
0 fec0::1
1 fec0::2
2 fec0::3
Related Topics
ipv6 dhcp-client, on page 349
show dhcp interface, on page 1004
show ipv6 interface, on page 1093
Command Syntax
show ipv6 fib [vpn vpn-id]
show ipv6 fib [vpn vpn-id] [tloccolor color | tloc-ip ip-address]
show ipv6 fib vpn vpn-id [ipv4-prefix/length]
Syntax Description
None:
List standard information about the IPv6 entries in the forwarding table.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
------------------------------------------------------------------------------------------------------------------------------
0 ::/0 ge0/2 2001::100:50d - - - -
0 ::/0 ge0/1 2001::100:1a17 - - - -
0 2001::a00:500/120 ge0/2 - - - - -
0 2001::a00:50b/120 ge0/2 - - - - -
0 2001::a00:1a00/120 ge0/1 - - - - -
0 2001::a00:1a0b/128 ge0/1 - - - - -
0 2001::a00:6510/128 loopback1 - - - - -
0 2001::a00:6502/128 loopback2 - - - - -
0 2001::a00:6503/128 loopback3 - - - - -
0 2001::a00:7504/128 loopback4 - - - - -
0 fe80::20c:29ff:feab:b762/128 ge0/1 - - - - -
0 fe80::20c:29ff:feab:b76c/128 ge0/2 - - - - -
0 fe80::20c:29ff:feab:b776/128 ge0/3 - - - - -
0 fe80::20c:29ff:feab:b780/128 ge0/4 - - - - -
0 fe80::20c:29ff:feab:b78a/128 ge0/5 - - - - -
0 fe80::20c:29ff:feab:b794/128 ge0/6 - - - - -
0 fe80::20c:29ff:feab:b79e/128 ge0/7 - - - - -
Related Topics
show ipv6 interface, on page 1093
show ipv6 routes, on page 1101
show ip fib, on page 1064
show omp routes, on page 1134
Command Syntax
show ipv6 interface [detail] [interface-name] [vpn vpn-id]
Syntax Description
None:
Display standard information about the interfaces on the Cisco SD-WAN device.
Output Fields
The remaining output fields are self-explanatory.
Command History
Release Modification
Examples
Example 1
vEdge# show ipv6 interface
IF IF TCP
0:01:30:00 2 6 fe80::20c:29ff:feab:b762/64
0 ge0/2 ipv6 2001::a00:50b/120 Up Up null service 1500 00:0c:29:ab:b7:6c 1000 full 1420
0:01:30:00 21 5 fe80::20c:29ff:feab:b76c/64
0 ge0/3 ipv6 fd00:1234::/16 Up Up null service 1500 00:0c:29:ab:b7:76 1000 full 1420
0:01:08:33 0 8 fe80::20c:29ff:feab:b776/64
0 ge0/4 ipv6 - Up Up null service 1500 00:0c:29:ab:b7:80 1000 full 1420
0:01:30:00 18 5 fe80::20c:29ff:feab:b780/64
0 ge0/5 ipv6 - Down Up null service 1500 00:0c:29:ab:b7:8a 1000 full 1420
0:01:44:19 1 1 fe80::20c:29ff:feab:b78a/64
0 ge0/6 ipv6 - Down Up null service 1500 00:0c:29:ab:b7:94 1000 full 1420
0:01:44:19 0 1 fe80::20c:29ff:feab:b794/64
0 ge0/7 ipv6 - Up Up null service 1500 00:0c:29:ab:b7:9e 1000 full 1420
0:01:43:02 55 5 fe80::20c:29ff:feab:b79e/64
0 system ipv6 - Up Up null loopback 1500 00:00:00:00:00:00 10 full 1420
0:01:29:31 0 0 -
0 loopback1 ipv6 2001::a00:6501/128 Up Up null transport 1500 00:00:00:00:00:00 10 full 1420
0:03:49:09 0 0 -
0 loopback2 ipv6 2001::a00:6502/128 Up Up null transport 1500 00:00:00:00:00:00 10 full 1420
0:03:49:05 0 0 -
0 loopback3 ipv6 2001::a00:6503/128 Up Up null transport 1500 00:00:00:00:00:00 10 full 1420
0:03:49:01 0 0 -
0 loopback4 ipv6 2001::a00:6504/128 Up Up null transport 1500 00:00:00:00:00:00 10 full 1420
0:03:48:54 0 0 -
Example 2
vEdge# show ipv6 interface detail ge0/1
interface vpn 0 interface ge0/1 af-type ipv6
if-admin-status Up
if-oper-status Up
if-addrv6
ipv6-address 2001::a00:1a0b/120
secondary-v6 false
link-local false
if-addrv6
ipv6-address fe80::20c:29ff:fe9b:a9bb/64
secondary-v6 false
link-local true
encap-type null
port-type service
ifindex 2
mtu 1500
hwaddr 00:0c:29:9b:a9:bb
speed-mbps 1000
duplex full
auto-neg false
pause-type tx_pause,rx_pause
tcp-mss-adjust 1420
uptime 0:03:54:48
rx-packets 332832
rx-octets 64713372
rx-errors 0
rx-drops 0
tx-packets 66
tx-octets 5472
tx-errors 0
tx-drops 16
rx-pps 24
rx-kbps 37
tx-pps 0
tx-kbps 0
rx-ip-ttl-expired 0
interface-disabled 0
rx-policer-drops 0
rx-non-ip-drops 0
filter-drops 0
mirror-drops 0
cpu-policer-drops 0
tx-icmp-policer-drops 0
split-horizon-drops 0
route-lookup-fail 0
bad-label 0
rx-multicast-pkts 21
rx-broadcast-pkts 0
tx-multicast-pkts 6
tx-broadcast-pkts 2
num-flaps 2
rx-policer-remark 0
Example 3
vSmart# show ipv6 interface eth1
IF IF
TCP LINK
AF ADMIN OPER ENCAP SPEED
MSS RX TX LOCAL
VPN INTERFACE TYPE IPV6 ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS
DUPLEX ADJUST UPTIME PACKETS PACKETS ADDRESS
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 eth1 ipv6 2001:a0:5:0:20c:29ff:fea4:333d/64 Up Up null transport 1500 00:0c:29:a4:33:3d 1000
full - 0:00:34:45 202689 163339 -
Related Topics
show interface, on page 1032
show ipv6 neighbor, on page 1096
show ipv6 routes, on page 1101
Command Syntax
show ipv6 neighbor [vpn vpn-id]
Syntax Description
None:
List all the IPv6 entries in the ARP table.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Related Topics
clear arp, on page 730
show arp, on page 932
show ipv6 interface, on page 1093
show ipv6 routes, on page 1101
Command Syntax
show ipv6 policy access-list-associations
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
INTERFACE INTERFACE
NAME NAME DIRECTION
------------------------------------------
ipv6-policy ge0/2 out
Related Topics
access-list, on page 45
show policy access-list-associations, on page 1184
Command Syntax
show ipv6 policy access-list-counters
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
access-list, on page 47
show policy access-list-counters, on page 1185
Command Syntax
show policy access-list-names
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
NAME
--------------------
ipv6-policy
Related Topics
access-list, on page 47
show policy access-list-names, on page 1186
Command Syntax
show ipv6 policy access-list-policers
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Examples Display a list of policers configured in access lists. This output shows that the policer named
"p1_police" was applied in sequence 10 in the access list "ipv6_p1" in sequences 10, 20, and 30 in
the "ipv6_plp" access list.
vEdge# show policy access-list-policers
OOS
NAME POLICER NAME PACKETS
-------------------------------------------
ipv6_p1 10.p1_police 0
ipv6_plp 10.p1_police 0
20.p1_police 0
30.p2_police 0
Related Topics
clear policer statistics, on page 781
show policer, on page 1183
show policy access-list-policers, on page 1187
Command Syntax
show ipv6 routes [detail] [ipv6-address] [ipv6-prefix/length] [bgp] [connected] [omp] [ospf] [static]
[summary protocol protocol] [vpn vpn-id]
show ipv6 routes vpn vpn-id [detail] [ipv6-address] [ipv6-prefix/length] [bgp] [connected] [omp] [ospf]
[static]
Syntax Description
None:
List standard information about the entries in the local IPv6 route table.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
VPN PREFIX PROTOCOL SUB TYPE IF NAME ADDR VPN TLOC IP COLOR
ENCAP STATUS
---------------------------------------------------------------------------------------------------------------------------------------------
0 fd00::/16 connected - ge0/3 - - - -
- F,S
Related Topics
show ip routes, on page 1076
show ipv6 interface, on page 1093
show ipv6 neighbor, on page 1096
show jobs
show jobs—View a list of the files that are currently being monitored on the local device. This command is
the same as the UNIX jobs command.
Command Syntax
show jobs
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Examples Start and stop monitoring a file, and view the files that are being monitored:
vEdge# monitor start /var/log/vsyslog
vEdge# show jobs
JOB COMMAND
1 monitor start /var/log/vsyslog
vEdge# log:local7.notice: Dec 16 14:55:26 vsmart SYSMGR[219]:
%Viptela-vsmart-SYSMGR-5-NTCE-200025: System clock set to Wed Dec 16 14:55:26 2015 (timezone
'America/Los_Angeles')
log:local7.notice: Dec 16 14:55:27 vsmart SYSMGR[219]: %Viptela-vsmart-SYSMGR-5-NTCE-200025:
System clock set to Wed Dec 16 14:55:27 2015 (timezone 'America/Los_Angeles')
Related Topics
job stop, on page 812
monitor start, on page 816
monitor stop, on page 817
show licenses
show licenses—Display the licenses for the software packages used by the Cisco SD-WAN software.
Command Syntax
show licenses [list | package package-name]
Syntax Description
None:
Display the licenses for all the software packages used by the Cisco SD-WAN
software.
Output Fields
The output of the show licenses command is quite extensive. To read all the licenses, it is recommended that
you save the command output to a file:
vEdge# show licenses | save filename
Command History
Release Modification
file
flex
freeradius-client
gdb
grep
icu
init-ifupdown
initscripts
iperf
iproute2
iptables
kmod
libevent
libpam
libtool
liburcu
libxml2
logrotate
lttng-ust
modutils-initscripts
ncurses
net-tools
netbase
ntp
ocf-linux
openssh
openssl
opkg
opkg-config-base
pciutils
perl
procps
protobuf
protobuf-c
psplash
python-smartpm
quagga
rpm
rpm-postinsts
shadow
shadow-securetty
strace
sysfsutils
sysklogd
sysvinit
sysvinit-inittab
tar
tcpdump
tinylogin
tunctl
tzdata
udev
udev-extraconf
update-rc.d
usbutils
util-linux
v86d
valgrind
viptela-cp
Related Topics
show version, on page 1257
show log
show log—Display the contents of system log (syslog) files.
Command Syntax
show log filename [tail number]
Syntax Description
Filename Filename:
Name of the syslog file.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
file list, on page 807
file show, on page 808
logging disk, on page 380
logging server, on page 389
show crash, on page 1000
show logging, on page 1107
show logging
show logging—Display the settings for logging syslog messages.
Command Syntax
show logging [logging-parameter]
Syntax Description
None:
Display all logging information.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
file list, on page 807
file show, on page 808
logging disk, on page 380
logging server, on page 389
show crash, on page 1000
show monitor event-trace sdwan [all] component { all | back hour:minute | clock
hour:minute | from-boot seconds | latest | parameters }
Syntax Description all-traces (Optional) Displays all event trace messages in memory to the console.
back mmm | hhh:mm } Specifies how far back from the current time you want to view messages. For
example, you can gather messages from the last 30 minutes. The time argument
is specified either in minutes or in hours and minutes format (mmm or hh:mm).
clock hh:mm Displays event trace messages starting from a specific clock time in hours and
minutes format (hh:mm).
from-boot seconds Displays event trace messages starting from a specified number of seconds after
booting (uptime).
latest Displays only the event trace messages since the last command was entered.
parameters Displays the trace parameters. The only parameter displayed is the size (number
of trace messages) of the trace file.
Usage Guidelines The trace function is not locked while information is being displayed to the console, which means that new
trace messages can accumulate in memory. If entries accumulate faster than they can be displayed, some
messages can be lost. If this happens, the show monitor event-trace command will generate a message
indicating that some messages might be lost; however, messages will continue to display on the console. If
the number of lost messages is excessive, the show monitor event-trace command will stop displaying
messages.
Example
The following is sample output from the show monitor event-trace command for the SD-WAN
device. Notice that each trace message is numbered and is followed by a time stamp (derived from
the device uptime). Following the time stamp is the component-specific message data.
Command Syntax
show multicast replicator [vpn vpn-id]
Syntax Description
None:
List standard information about multicast replicators.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
show pim neighbor, on page 1179
Command Syntax
show multicast rpf [vpn vpn-id]
Syntax Description
None:
List standard RPF information.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
RPF RPF
RPF NEXTHOP NBR IF RPF
VPN RPF ADDRESS STATUS COUNT ADDR NAME TUNNEL
----------------------------------------------------------
1 10.20.25.18 resolved 1 - ge0/4 -
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
show pim neighbor, on page 1179
Command Syntax
show multicast topology [vpn vpn-id]
Syntax Description
None:
List standard information related to the topology of the multicast domain.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
Command Syntax
show multicast tunnel [vpn vpn-id]
Syntax Description
None:
List standard information about the multicast IPsec tunnels.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
TUNNEL TUNNEL
VPN ADDRESS STATUS REPLICATOR
----------------------------------------
1 172.16.255.11 UP no
172.16.255.14 UP yes
172.16.255.15 UP no
172.16.255.21 UP no
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
Command Syntax
show nms-server running
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
request nms-server, on page 871
Command Syntax
show notification stream viptela [from date-time] [last number] [to date-time]
Syntax Description
None:
Display notifications about all events.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
vpn-id 0
if-name ge0/7
new-state up
!
!
notification
eventTime 2013-12-06T18:32:25.568821+00:00
interface-state-change
vpn-id 0
if-name system
new-state up
!
!
notification
eventTime 2013-12-06T18:32:25.585694+00:00
omp-state-change
new-state up
!
!
notification
eventTime 2013-12-06T18:32:26.780149+00:00
interface-state-change
vpn-id 0
if-name ge0/0
new-state up
!
!
Related Topics
file list, on page 807
trap group, on page 628
trap target, on page 631
Command Syntax
show ntp associations
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
IDX ASSOCID STATUS CONF REACHABILITY AUTH CONDITION LAST EVENT COUNT
-------------------------------------------------------------------------------
1 18402 80a3 yes no none reject unreachable 10
2 18403 967a yes yes none sys.peer sys_peer 7
Related Topics
ntp, on page 454
show ntp peer, on page 1123
Command Syntax
show ntp peer [index] [parameter]
Syntax Description
None:
Display standard information about the interfaces on the Cisco SD-WAN device.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
ntp, on page 454
show ntp associations, on page 1122
Command Syntax
show omp cloudexpress [detail]
Syntax Description
None:
Display OMP routes for all applications in all VPNs configured with Cloud OnRamp for SaaS.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
APP
VPN ORIGINATOR ID APP NAME FROM PEER STATUS
-------------------------------------------------------------
1 172.16.255.14 1 salesforce 172.16.255.19 C,I,R
172.16.255.20 C,I,R
1 172.16.255.14 16 google_apps 172.16.255.19 C,I,R
172.16.255.20 C,I,R
Related Topics
clear cloudexpress computations, on page 739
show cloudexpress applications, on page 973
Command Syntax
show omp multicast-auto-discover [detail]
show omp multicast-auto-discover [detail] [family ipv4] [entries advertised destination-peer-address]
show omp multicast-auto-discover [detail] [family ipv4] [entries received source-peer-address] [loss-reason
reason | status status]
Syntax Description
None:
List standard information about the PIM IPsec tunnels.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
ADDRESS SOURCE
FAMILY VPN ORIGINATOR FROM PEER STATUS
-----------------------------------------------------
ipv4 1 172.16.255.11 172.16.255.19 C,I,R
172.16.255.20 C,I,R
1 172.16.255.14 172.16.255.19 C,I,R
172.16.255.20 C,I,R
1 172.16.255.15 172.16.255.19 C,I,R
172.16.255.20 C,I,R
1 172.16.255.16 0.0.0.0 C,Red,R
1 172.16.255.21 172.16.255.19 C,I,R
172.16.255.20 C,I,R
Related Topics
show omp multicast-routes, on page 1128
show multicast topology, on page 1115
Command Syntax
show omp multicast-routes [detail]
show omp multicast-routes [detail] [family ipv4] [entries]
Syntax Description
None:
List standard information about the routes that OMP has learned from PIM join
messages.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
ADDRESS SOURCE
FAMILY TYPE VPN ORIGINATOR DESTINATION GROUP SOURCE FROM PEER RP STATUS
-----------------------------------------------------------------------------------------------------------
ipv4 (*,G) 1 172.16.255.14 172.16.255.16 225.0.0.1 0.0.0.0 172.16.255.19 10.20.25.18 C,I,R
172.16.255.20 10.20.25.18 C,I,R
Related Topics
show omp multicast-auto-discover, on page 1126
show multicast topology, on page 1115
Command Syntax
show omp peers [detail]
show omp peers ip-address [detail]
Syntax Description
None:
List information about all OMP peering sessions on the local device.
Output Fields
Field Explanation
last-downtime The last time that an OMP peering session went down.
last-uptime The last time that an OMP peering session came up.
Field Explanation
Command History
Release Modification
Examples
Example 1
vEdge# show omp peers
R -> routes received
I -> routes installed
S -> routes sent
DOMAIN SITE
PEER TYPE ID ID STATE UPTIME R/I/S
------------------------------------------------------------------------------
172.16.255.19 vsmart 1 100 up 0:04:09:59 7/7/3
172.16.255.20 vsmart 1 200 up 0:04:10:14 7/0/3
peer 172.16.255.19
type vsmart
domain-id 1
site-id 100
state up
version 1
legit yes
upcount 1
downcount 0
last-uptime 2014-11-12T14:52:19+00:00
last-downtime 0000-00-00T00:00:00+00:00
uptime 0:04:12:30
hold-time 15
graceful-restart supported
graceful-restart-interval 300
hello-sent 3032
hello-received 3030
handshake-sent 1
handshake-received 1
alert-sent 0
alert-received 0
inform-sent 5
inform-received 5
update-sent 8
update-received 27
policy-sent
policy-received
total-packets-sent 3046
total-packets-received 3063
routes-received 7
routes-installed 7
routes-sent 3
tlocs-received 4
tlocs-installed 4
tlocs-sent 1
services-received 0
services-installed 0
services-sent 1
mcast-routes-received 0
mcast-routes-installed 0
mcast-routes-sent 0
Example 2
vSmart# show omp peers
R -> routes received
I -> routes installed
S -> routes sent
DOMAIN SITE
PEER TYPE ID ID STATE UPTIME R/I/S
------------------------------------------------------------------------------
172.16.255.11 vedge 1 100 up 0:00:38:20 3/0/9
172.16.255.14 vedge 1 400 up 0:00:38:22 0/0/11
172.16.255.15 vedge 1 500 up 0:00:38:22 3/0/8
172.16.255.16 vedge 1 600 up 0:00:38:21 4/0/7
172.16.255.20 vsmart 1 200 up 0:00:38:24 11/0/11
172.16.255.21 vedge 1 100 up 0:00:38:20 3/0/9
Example 3
vSmart# show omp peers
R -> routes received
I -> routes installed
S -> routes sent
DOMAIN SITE
PEER TYPE ID ID STATE UPTIME R/I/S
------------------------------------------------------------------------------
172.16.255.11 vedge 1 100 up 0:05:19:17 3/0/5
172.16.255.14 vedge 1 400 up 0:05:19:17 0/0/7
172.16.255.15 vedge 1 500 down-in-gr 3/0/0
172.16.255.16 vedge 1 600 down 0/0/0
172.16.255.20 vsmart 1 200 up 0:05:19:21 7/0/7
172.16.255.21 vedge 1 100 up 0:05:19:20 3/0/5
Related Topics
clear omp peer, on page 768
show control connections, on page 984
show omp routes, on page 1134
show omp services, on page 1138
show omp summary, on page 1140
show omp tlocs, on page 1143
Command Syntax
show omp routes [prefix/length | ip-address] [family family] [vpn vpn-id] [detail]
show omp routes vpn vpn-id (prefix/length | ip-address) [detail]
Syntax Description
None:
List routing information about all OMP peering sessions on the local device.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Examples
Example 1
vSmart# show omp routes
Code:
C -> chosen
I -> installed
Red -> redistributed
Rej -> rejected
L -> looped
R -> resolved
S -> stale
Ext -> extranet
Inv -> invalid
U -> TLOC unresolved
PATH ATTRIBUTE
VPN PREFIX FROM PEER ID LABEL STATUS TYPE TLOC IP COLOR ENCAP
PREFERENCE
--------------------------------------------------------------------------------------------------------------------------------------
1 10.2.2.0/24 172.16.255.11 16 2 C,R installed 172.16.255.11 lte ipsec -
Example 2
When you configure BGP to propagate AS path information into BGP, the command output shows
the AS path that OMP receives from BGP:
vEdge# show running-config vpn 1 router bgp
vpn 1
router
bgp 1
router-id 172.16.255.16
propagate-aspath
timers
keepalive 1
holdtime 3
!
address-family ipv4-unicast
redistribute static
redistribute omp
!
neighbor 10.20.25.18
no shutdown
remote-as 2
timers
connect-retry 2
advertisement-interval 1
!
password $8$3w2P/jZ95uTcMf2u7Xr4ibkyHEi88zoDa4Gz3a30shU=
!
!
!
!
INFO LOCAL AS
VPN PREFIX ID NEXTHOP METRIC PREF WEIGHT ORIGIN PATH PATH STATUS TAG
--------------------------------------------------------------------------------------------------------------
1 172.16.255.118/32 0 10.20.25.18 0 - 0 incomplete 2 valid,best,external 0
---------------------------------------------------
omp route entries for vpn 1 route 172.16.255.118/32
---------------------------------------------------
RECEIVED FROM:
peer 0.0.0.0
path-id 38
label 2
status C,Red,R
loss-reason not set
lost-to-peer not set
lost-to-path-id not set
Attributes:
originator 172.16.255.16
type installed
tloc 172.16.255.16, lte, ipsec
ultimate-tloc not set
domain-id not set
overlay-id 1
site-id 600
preference not set
tag not set
origin-proto eBGP
origin-metric 0
as-path "2"
unknown-attr-len not set
ADVERTISED TO:
peer 172.16.255.19
Attributes:
originator 172.16.255.16
label 2
path-id 38
tloc 172.16.255.16, lte, ipsec
ultimate-tloc not set
domain-id not set
site-id 600
overlay-id 1
preference not set
tag not set
origin-proto eBGP
origin-metric 0
as-path "2"
unknown-attr-len not set
ADVERTISED TO:
peer 172.16.255.20
Attributes:
originator 172.16.255.16
label 2
path-id 38
tloc 172.16.255.16, lte, ipsec
ultimate-tloc not set
domain-id not set
site-id 600
overlay-id 1
preference not set
tag not set
origin-proto eBGP
origin-metric 0
as-path "2"
unknown-attr-len not set
vEdge#
Related Topics
clear omp routes, on page 770
show control connections, on page 984
show omp peers, on page 1130
show omp services, on page 1138
show omp summary, on page 1140
show omp tlocs, on page 1143
Command Syntax
show omp services [vpn vpn-id] [detail]
show omp services [advertised | received] [vpn vpn-id] [detail]
show omp services [vpn vpn-id] originator ip-address [advertised | received] [detail]
show omp services [vpn vpn-id] service service-name [advertised | received] [detail]
Syntax Description
None:
List information about the services learned from OMP peering sessions.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
show control connections, on page 984
show omp peers, on page 1130
show omp routes, on page 1134
show omp summary, on page 1140
show omp tlocs, on page 1143
Command Syntax
show omp summary [parameter-name]
Syntax Description
None:
List information about the OMP peering sessions running on the local device
Output Fields
Field Explanation
Field Explanation
Command History
Release Modification
Example
tlocs-sent 16
services-received 8
services-installed 4
services-sent 4
mcast-routes-received 0
mcast-routes-installed 0
mcast-routes-sent 0
hello-sent 80765
hello-received 80782
hsndshake-sent 13
handshake-received 13
alert-sent 4
alert-received 4
inform-sent 24
inform-received 24
update-sent 633
update-received 278
policy-sent 0
policy-received 0
total-packets-sent 81439
total-packets-received 81101
vsmart-peers 1
vedge-peers 4
Related Topics
show control connections, on page 984
show omp peers, on page 1130
show omp routes, on page 1134
show omp services, on page 1138
show omp tlocs, on page 1143
Command Syntax
show omp tlocs [detail] [parameter-name]
Syntax Description
None:
List information about all TLOCs that the local device has learned about.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
PUBLIC PRIVATE
PSEUDO PUBLIC PRIVATE
PUBLIC IPV6 PRIVATE IPV6 BFD
TLOC IP COLOR ENCAP FROM PEER STATUS KEY PUBLIC IP PORT PRIVATE IP PORT
IPV6 PORT IPV6 PORT STATUS
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------
172.16.254.1 lte ipsec 172.16.254.1 C,I,R 1 10.102.2.2 12366 10.102.2.2 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.2.2 12366 10.102.2.2 12366
:: 0 :: 0 -
172.16.254.1 3g ipsec 172.16.254.1 C,I,R 1 10.101.2.2 12366 10.101.2.2 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.2.2 12366 10.101.2.2 12366
:: 0 :: 0 -
172.16.254.2 lte ipsec 172.16.254.2 C,I,R 1 10.102.3.3 12366 10.102.3.3 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.3.3 12366 10.102.3.3 12366
:: 0 :: 0 -
172.16.254.2 3g ipsec 172.16.254.2 C,I,R 1 10.101.3.3 12366 10.101.3.3 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.3.3 12366 10.101.3.3 12366
:: 0 :: 0 -
172.16.254.3 lte ipsec 172.16.254.3 C,I,R 1 10.102.4.4 12366 10.102.4.4 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.4.4 12366 10.102.4.4 12366
:: 0 :: 0 -
172.16.254.3 3g ipsec 172.16.254.3 C,I,R 1 10.101.4.4 12366 10.101.4.4 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.4.4 12366 10.101.4.4 12366
:: 0 :: 0 -
172.16.254.4 lte ipsec 172.16.254.4 C,I,R 1 10.102.5.5 12366 10.102.5.5 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.5.5 12366 10.102.5.5 12366
:: 0 :: 0 -
172.16.254.4 3g ipsec 172.16.254.4 C,I,R 1 10.101.5.5 12366 10.101.5.5 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.5.5 12366 10.101.5.5 12366
:: 0 :: 0 -
172.16.254.5 lte ipsec 172.16.254.5 C,I,R 1 10.102.6.6 12366 10.102.6.6 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.6.6 12366 10.102.6.6 12366
:: 0 :: 0 -
172.16.254.5 3g ipsec 172.16.254.5 C,I,R 1 10.101.6.6 12366 10.101.6.6 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.6.6 12366 10.101.6.6 12366
:: 0 :: 0 -
PUBLIC PRIVATE
PSEUDO PUBLIC PRIVATE
PUBLIC IPV6 PRIVATE IPV6 BFD
TLOC IP COLOR ENCAP FROM PEER STATUS KEY PUBLIC IP PORT PRIVATE IP PORT
IPV6 PORT IPV6 PORT STATUS
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------
172.16.254.1 lte ipsec 172.16.254.1 C,I,R 1 10.102.2.2 12366 10.102.2.2 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.2.2 12366 10.102.2.2 12366
:: 0 :: 0 -
172.16.254.1 3g ipsec 172.16.254.1 C,I,R 1 10.101.2.2 12366 10.101.2.2 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.2.2 12366 10.101.2.2 12366
:: 0 :: 0 -
172.16.254.2 lte ipsec 172.16.254.2 C,I,R 1 10.102.3.3 12366 10.102.3.3 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.3.3 12366 10.102.3.3 12366
:: 0 :: 0 -
172.16.254.2 3g ipsec 172.16.254.2 C,I,R 1 10.101.3.3 12366 10.101.3.3 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.3.3 12366 10.101.3.3 12366
:: 0 :: 0 -
172.16.254.3 lte ipsec 172.16.254.3 C,I,R 1 10.102.4.4 12366 10.102.4.4 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.4.4 12366 10.102.4.4 12366
:: 0 :: 0 -
172.16.254.3 3g ipsec 172.16.254.3 C,I,R 1 10.101.4.4 12366 10.101.4.4 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.4.4 12366 10.101.4.4 12366
:: 0 :: 0 -
172.16.254.4 lte ipsec 172.16.254.4 C,I,R 1 10.102.5.5 12366 10.102.5.5 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.5.5 12366 10.102.5.5 12366
:: 0 :: 0 -
172.16.254.4 3g ipsec 172.16.254.4 C,I,R 1 10.101.5.5 12366 10.101.5.5 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.5.5 12366 10.101.5.5 12366
:: 0 :: 0 -
172.16.254.5 lte ipsec 172.16.254.5 C,I,R 1 10.102.6.6 12366 10.102.6.6 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.6.6 12366 10.102.6.6 12366
:: 0 :: 0 -
172.16.254.5 3g ipsec 172.16.254.5 C,I,R 1 10.101.6.6 12366 10.101.6.6 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.6.6 12366 10.101.6.6 12366
:: 0 :: 0 -
PUBLIC PRIVATE
PSEUDO PUBLIC PRIVATE
PUBLIC IPV6 PRIVATE IPV6 BFD
TLOC IP COLOR ENCAP FROM PEER STATUS KEY PUBLIC IP PORT PRIVATE IP PORT
IPV6 PORT IPV6 PORT STATUS
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------
172.16.254.1 lte ipsec 172.16.254.1 C,I,R 1 10.102.2.2 12366 10.102.2.2 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.2.2 12366 10.102.2.2 12366
:: 0 :: 0 -
172.16.254.1 3g ipsec 172.16.254.1 C,I,R 1 10.101.2.2 12366 10.101.2.2 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.2.2 12366 10.101.2.2 12366
:: 0 :: 0 -
172.16.254.2 lte ipsec 172.16.254.2 C,I,R 1 10.102.3.3 12366 10.102.3.3 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.3.3 12366 10.102.3.3 12366
:: 0 :: 0 -
172.16.254.2 3g ipsec 172.16.254.2 C,I,R 1 10.101.3.3 12366 10.101.3.3 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.3.3 12366 10.101.3.3 12366
:: 0 :: 0 -
172.16.254.3 lte ipsec 172.16.254.3 C,I,R 1 10.102.4.4 12366 10.102.4.4 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.4.4 12366 10.102.4.4 12366
:: 0 :: 0 -
172.16.254.3 3g ipsec 172.16.254.3 C,I,R 1 10.101.4.4 12366 10.101.4.4 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.4.4 12366 10.101.4.4 12366
:: 0 :: 0 -
172.16.254.4 lte ipsec 172.16.254.4 C,I,R 1 10.102.5.5 12366 10.102.5.5 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.5.5 12366 10.102.5.5 12366
:: 0 :: 0 -
172.16.254.4 3g ipsec 172.16.254.4 C,I,R 1 10.101.5.5 12366 10.101.5.5 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.5.5 12366 10.101.5.5 12366
:: 0 :: 0 -
172.16.254.5 lte ipsec 172.16.254.5 C,I,R 1 10.102.6.6 12366 10.102.6.6 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.102.6.6 12366 10.102.6.6 12366
:: 0 :: 0 -
172.16.254.5 3g ipsec 172.16.254.5 C,I,R 1 10.101.6.6 12366 10.101.6.6 12366
:: 0 :: 0 -
172.16.255.132 C,R 1 10.101.6.6 12366 10.101.6.6 12366
:: 0 :: 0 -
vEdge# show omp tlocs detail
---------------------------------------------------
tloc entries for 172.16.254.1
lte
ipsec
---------------------------------------------------
RECEIVED FROM:
peer 172.16.254.1
status C,I,R
loss-reason not set
lost-to-peer not set
lost-to-path-id not set
Attributes:
attribute-type installed
encap-key not set
encap-proto 0
encap-spi 376
encap-auth sha1-hmac,ah-sha1-hmac
encap-encrypt aes256
public-ip 10.102.2.2
public-port 12366
private-ip 10.102.2.2
private-port 12366
public-ip ::
public-port 0
private-ip ::
private-port 0
domain-id not set
site-id 2
overlay-id not set
preference 0
tag not set
stale not set
weight 1
version 2
gen-id 0x80000000
carrier default
restrict 0
groups [ 0 ]
border not set
unknown-attr-len not set
RECEIVED FROM:
peer 172.16.255.132
status C,R
loss-reason not set
lost-to-peer not set
lost-to-path-id not set
Attributes:
attribute-type installed
encap-key not set
encap-proto 0
encap-spi 376
encap-auth sha1-hmac,ah-sha1-hmac
encap-encrypt aes256
public-ip 10.102.2.2
public-port 12366
private-ip 10.102.2.2
private-port 12366
public-ip ::
public-port 0
private-ip ::
private-port 0
domain-id not set
site-id 2
overlay-id not set
preference 0
tag not set
stale not set
weight 1
version 2
gen-id 0x80000000
carrier default
restrict 0
groups [ 0 ]
border not set
unknown-attr-len not set
ADVERTISED TO:
peer 172.16.254.2
Attributes:
encap-key not set
encap-proto 0
encap-spi 376
encap-auth sha1-hmac,ah-sha1-hmac
encap-encrypt des,des3
public-ip 10.102.2.2
public-port 12366
private-ip 10.102.2.2
private-port 12366
public-ip ::
public-port 0
private-ip ::
private-port 0
domain-id not set
site-id 2
overlay-id not set
preference 0
tag not set
stale not set
weight 1
version 2
gen-id 0x80000000
carrier default
restrict 0
groups [ 0 ]
border not set
unknown-attr-len not set
ADVERTISED TO:
peer 172.16.254.3
Attributes:
encap-key not set
encap-proto 0
encap-spi 376
encap-auth sha1-hmac,ah-sha1-hmac
encap-encrypt des,des3
public-ip 10.102.2.2
public-port 12366
private-ip 10.102.2.2
private-port 12366
public-ip ::
public-port 0
private-ip ::
private-port 0
domain-id not set
site-id 2
overlay-id not set
preference 0
tag not set
stale not set
weight 1
version 2
gen-id 0x80000000
carrier default
restrict 0
groups [ 0 ]
border not set
unknown-attr-len not set
ADVERTISED TO:
peer 172.16.254.4
Attributes:
encap-key not set
encap-proto 0
encap-spi 376
encap-auth sha1-hmac,ah-sha1-hmac
encap-encrypt des,des3
public-ip 10.102.2.2
public-port 12366
private-ip 10.102.2.2
private-port 12366
public-ip ::
public-port 0
private-ip ::
private-port 0
domain-id not set
site-id 2
overlay-id not set
preference 0
tag not set
stale not set
weight 1
version 2
gen-id 0x80000000
carrier default
restrict 0
groups [ 0 ]
border not set
unknown-attr-len not set
ADVERTISED TO:
peer 172.16.254.5
Attributes:
encap-key not set
encap-proto 0
encap-spi 376
encap-auth sha1-hmac,ah-sha1-hmac
encap-encrypt des,des3
public-ip 10.102.2.2
public-port 12366
private-ip 10.102.2.2
private-port 12366
public-ip ::
public-port 0
private-ip ::
private-port 0
domain-id not set
site-id 2
overlay-id not set
preference 0
tag not set
stale not set
weight 1
version 2
gen-id 0x80000000
carrier default
restrict 0
groups [ 0 ]
border not set
unknown-attr-len not set
ADVERTISED TO:
peer 172.16.255.132
Attributes:
encap-key not set
encap-proto 0
encap-spi 376
encap-auth sha1-hmac,ah-sha1-hmac
encap-encrypt des,des3
public-ip 10.102.2.2
public-port 12366
private-ip 10.102.2.2
private-port 12366
public-ip ::
public-port 0
private-ip ::
private-port 0
domain-id not set
site-id 2
overlay-id not set
preference 0
tag not set
stale not set
weight 1
version 2
gen-id 0x80000000
carrier default
restrict 0
groups [ 0 ]
border not set
unknown-attr-len not set
...
Related Topics
clear omp tlocs, on page 771
show control connections, on page 984
show omp peers, on page 1130
show omp routes, on page 1134
show omp services, on page 1138
show omp summary, on page 1140
Command Syntax
show orchestrator connections [vsmart [site-id] ] [detail]
Syntax Description
None:
List information about all the Cisco SD-WAN devices that have active DTLS connections
to the vBond orchestrator.
Output Fields
For the State columen, the operational state can be one of the following: challenge, challenge_ack,
challenge_resp, connect, down, handshake, tear_down, trying, and up.
The remaining output fields are self-explanatory.
Command History
Release Modification
Examples
Example 1
vBond# show orchestrator connections
PEER PEER
Example 2
vBond# show orchestrator connections detail
-----------------------------------------------------------------------------------------
REMOTE-COLOR- default SYSTEM-IP- 172.16.255.19 PEER-PERSONALITY- vsmart
-----------------------------------------------------------------------------------------
site-id 100
domain-id 1
protocol dtls
private-ip 10.0.5.19
private-port 12346
public-ip 10.0.5.19
public-port 12346
state up [Local Err: NO_ERROR] [Remote Err: NO_ERROR]
uptime 0:03:26:48
hello interval 1000
hello tolerance 12000
Tx Statistics-
--------------
hello 12408
connects 780
registers 0
register-replies 365
challenge 1
challenge-response 0
challenge-ack 1
teardown 0
teardown-all 0
vmanage-to-peer 0
register-to-vmanage 0
Rx Statistics-
--------------
hello 12408
connects 0
registers 365
register-replies 0
challenge 0
challenge-response 1
challenge-ack 0
teardown 0
vmanage-to-peer 0
register-to-vmanage 0
...
Related Topics
show control connections, on page 984
show orchestrator local-properties, on page 1156
show orchestrator statistics, on page 1159
Command Syntax
show orchestrator connections-history [index] [detail]
show orchestrator connections-history connection-parameter [detail]
Syntax Description
None:
List the history of connections and connection attempts between Cisco vEdge devices
and the vBond orchestrator.
Output Fields
Field Explanation
Field Explanation
Public Port Public UDP port number used to connect to the vBond
orchestrator.
Command History
Release Modification
Example
Example 1
vEdge# show orchestrator connections-history
Legend for Errors
BDSGVERFL - Board ID signature verify failure ORPTMO - Remote client peer timeout
Example 2
vEdge# show orchestrator connections-history 0 detail
----------------------------------------------------------------------------------------
REMOTE-COLOR- lte SYSTEM-IP- 172.16.255.15 PEER-PERSONALITY- vedge
----------------------------------------------------------------------------------------
site-id 500
domain-id 1
protocol dtls
private-ip 10.1.15.15
private-port 12346
public-ip 10.1.15.15
public-port 12346
state trying [Local Err: ERR_RX_TEAR_DOWN] [Remote Err: ERR_DISCONNECT_VBOND]
downtime 2014-07-21T13:39:10
Tx Statistics-
--------------
hello 0
connects 0
registers 0
register-replies 1
challenge 1
challenge-response 0
challenge-ack 1
teardown 0
teardown-all 0
vmanage-to-peer 0
register-to-vmanage 0
Rx Statistics-
--------------
hello 0
connects 0
registers 1
register-replies 0
challenge 0
challenge-response 1
challenge-ack 0
teardown 1
vmanage-to-peer 0
register-to-vmanage 0
Related Topics
show control connections, on page 984
show orchestrator local-properties, on page 1156
show orchestrator statistics, on page 1159
Command Syntax
show orchestrator local-properties [parameter]
Syntax Description
None:
Display the basic vBond configuration parameters.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
certificate-validity Valid
certificate-not-valid-before Feb 16 21:07:01 2016 GMT
certificate-not-valid-after Feb 15 21:07:01 2017 GMT
chassis-num/unique-id 8155a210-9342-459c-b404-5904895236e0
serial-num 1234560B
number-active-wan-interfaces 1
protocol dtls
ADMIN OPERATION
INDEX IP PORT VSMARTS VMANAGES STATE STATE
-------------------------------------------------------------------
0 10.1.14.14 12346 4 1 up up
Related Topics
show control local-properties, on page 991
show orchestrator connections, on page 1150
show system status, on page 1241
Command Syntax
show orchestrator reverse-proxy-mapping
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
clear reverse-proxy context, on page 788
show certificate reverse-proxy, on page 963
show control connections, on page 984
show control local-properties, on page 991
Command Syntax
show orchestrator statistics [counter-name]
Syntax Description
None:
Display statistics about handshaking packets sent and received by the vBond orchestrator as
it establishes, maintains, and tears down DTLS connections to the Cisco SD-WAN devices in
the overlay network.
Output Fields
Rx Statistics: Statistics about received handshaking packets.
Tx Statistics: Statistics about transmitted handshaking packets.
Command History
Release Modification
Example
Tx Statistics:
--------------
Packets 3180
Octets 357705
Error 0
Blocked 0
Connects 1599
Registers 0
Register Replies 1581
DTLS Handshake 0
DTLS Handshake Failures 0
DTLS Handshake Done 0
Challenge 25
Challenge Response 0
Challenge Ack 25
Challenge Errors 0
Challenge Response Errors 0
Challenge Ack Errors 0
Challenge General Errors 0
Rx Statistics:
--------------
Packets 48297
Octets 2207567
Errors 0
Connects 0
Registers 1581
Register Replies 0
DTLS Handshake 74
DTLS Handshake Failures 0
DTLS Handshake Done 25
Challenge 0
Challenge Response 25
Challenge Ack 0
Challenge Failures 0
Related Topics
show orchestrator connections, on page 1150
show orchestrator local-properties, on page 1156
Command Syntax
show orchestrator summary [instance]
Syntax Description
None:
Display a count of all the Cisco vEdge devices, vManage NMSs, and vSmart controllers in the
overlay network.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Related Topics
show control summary, on page 997
show orchestrator connections, on page 1150
Command Syntax
show orchestrator valid-vedges
Syntax Description
None
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
SERIAL
CHASSIS NUMBER NUMBER VALIDITY
------------------------------------
11OD113140004 10000266 valid
11OD145130082 10000142 staging
11OD252130046 100001FF valid
11OD252130049 1000020B valid
11OD252130057 1000020C staging
R26OC126140004 10000369 valid
Related Topics
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator connections, on page 1150
show orchestrator valid-vmanage-id, on page 1163
show orchestrator valid-vsmarts, on page 1164
Command Syntax
show orchestrator valid-vmanage-id [serial-number]
Syntax Description
None:
Display the chassis numbers of all valid vManage NMSs in the overlay network.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
CHASSIS NUMBER
--------------------------------------
72d0229c-7bb6-4bfd-b7f3-648fc78392c7
db51d941-9055-44a3-8f9f-09e305e0d60e
f23cfb69-8485-4e95-b02a-f5b27c9809b7
Related Topics
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator connections, on page 1150
show orchestrator valid-vedges, on page 1162
show orchestrator valid-vsmarts, on page 1164
Command Syntax
show orchestrator valid-vsmarts [serial-number]
Syntax Description
None:
Display the serial numbers of all valid vSmart controllers in the overlay network.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
SERIAL
NUMBER
----------
12345601
12345602
Related Topics
show control valid-vedges, on page 998
show control valid-vsmarts, on page 999
show orchestrator connections, on page 1150
show orchestrator valid-vedges, on page 1162
show orchestrator valid-vmanage-id, on page 1163
show orchestrator valid-vsmarts, on page 1164
Command Syntax
show ospf database [vpn vpn-id] [ospf-parameter] [detail]
Syntax Description
None:
List all the entries in the OSPF LSA database.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
Example 1
vEdge# show ospf database
LSA LINK ADVERTISING
VPN AREA TYPE ID ROUTER AGE CHECKSUM SEQ#
-------------------------------------------------------------------------------------------------
0 51 router 172.16.255.11 172.16.255.11 624 0xe19f 0x80000004
0 51 router 172.16.255.13 172.16.255.13 622 0x2dd9 0x80000010
0 51 router 172.16.255.14 172.16.255.14 622 0xb6ad 0x80000004
0 51 router 172.16.255.15 172.16.255.15 623 0xca94 0x80000004
0 51 router 172.16.255.16 172.16.255.16 625 0xde7b 0x80000004
0 51 router 172.16.255.21 172.16.255.21 623 0xcb96 0x80000005
0 51 network 10.0.5.13 172.16.255.13 623 0x8f7c 0x80000002
Example 2
vEdge# show ospf database area 0 detail
LS age - 489
Options - 0x2 <E>
LS Flags - 0x3
Flags - 0x2 <ASBR>
LS Type - router-LSA
Link State ID - 172.16.255.11
Advertising Router - 172.16.255.11
LS Seq Number - 0x8000001c
Checksum - 0x93d6
Length - 36
Number of Links - 1
Related Topics
clear ospf database, on page 774
show ospf database-summary, on page 1167
show ospf interface, on page 1168
show ospf neighbor, on page 1170
show ospf process, on page 1172
show ospf routes, on page 1175
Command Syntax
show ospf database-summary [vpn vpn-id] [ospf-lsa]
Syntax Description
None:
List a summary of all the LSAs in the OSPF LSA database.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
AS
ROUTER NETWORK SUMMARY EXTERNAL NSSA TOTAL
VPN AREA LSA LSA LSA LSA LSA LSA
------------------------------------------------------------
0 51 6 4 0 0 0 10
Related Topics
show ospf database, on page 1165
show ospf interface, on page 1168
show ospf neighbor, on page 1170
show ospf process, on page 1172
show ospf routes, on page 1175
Command Syntax
show ospf interface [vpn vpn-id]
show ospf route vpn vpn-id[ip-address [interface-index [ospf-property] ] ]
Syntax Description
None:
List standard information about all interfaces that are running OSPF.
Output Fields
The output fields are self-explanatory.
Command History
Release Modification
Example
delay 1
ospf-if-state if-backup
priority 1
designated-router-id 172.16.255.12
backup-designated-router-id 172.16.255.11
designated-router-ip 10.2.2.12
backup-designated-router-ip 10.2.2.11
members designated
hello-timer 10
dead-interval 40
retransmit-timer 5
neighbor-count 1
adj-neighbor-count 1
hello-due-time 5
oper-state true
Related Topics
show ospf database, on page 1165
show ospf database-summary, on page 1167
show ospf neighbor, on page 1170
show ospf routes, on page 1175
Command Syntax
show ospf neighbor [detail] [vpn vpn-id ]
show ospf route vpn vpn-id [ip-address[ospf-property] ]
Syntax Description
None:
List standard information about OSPF neighbors.
Command History
Release Modification
Examples
Example 1
vEdge# show ospf neighbor
DBsmL -> Database Summary List
RqstL -> Link State Request List
RXmtl -> Link State Retransmission List
INTERFACE IF DEAD
VPN ADDRESS INDEX NAME NEIGHBOR ID STATE PRI TIMER DBsmL RqstL RXmtL
-------------------------------------------------------------------------------------------
0 10.0.5.13 0 ge0/2 172.16.255.13 full 13 36 0 0 0
Example 2
vEdge# show ospf neighbor vpn 1 detail
ospf neighbor vpn 1 neighbor 10.2.2.12 interface-index 0
if-name ge0/0
router-id 172.16.255.12
if-address 10.2.2.12
area 0
area-type regular
neighbor-state full
interface-state if-dr
priority 1
state-changes 6
progressive-change-time 504
designated-router-id 10.2.2.12
backup-designated-router-id 10.2.2.11
dead-timer 30
db-summary-list 0
link-state-req-list 0
link-state-retrans-list 0
options E
Related Topics
show ospf database, on page 1165
show ospf database-summary, on page 1167
show ospf interface, on page 1168
show ospf process, on page 1172
show ospf routes, on page 1175
Command Syntax
show ospf process [vpn vpn-id] [ospf-property]
show ospf process area area-id [ospf-property]
Syntax Description
None:
List information about the OSPF routing process.
Command History
Release Modification
Examples
ls-upd-sent 8
ls-ack-received 9
ls-ack-sent 11
area 51
num-interfaces 1
num-full-adj-routers 2
spf-exec-count 12
lsa-count 10
router-lsa-count 6
router-lsa-checksum 277194
network-lsa-count 4
network-lsa-checksum 162825
summary-lsa-count 0
summary-lsa-checksum 0
asbr-lsa-count 0
asbr-lsa-checksum 0
nssa-lsa-count 0
nssa-lsa-checksum 0
ospf process vpn 1
router-id 172.16.255.11
rfc1583-compatible true
spf-delay 200
spf-holdtime 1000
spf-max-holdtime 10000
spf-hold-multiplier 3
spf-last-exec-time 1030
lsa-refresh-interval 10
external-lsa-count 15
external-lsa-checksum 464360
number-areas 1
ignore-down-bit false
hello-received 122
hello-sent 123
dbd-received 3
dbd-sent 3
ls-req-received 1
ls-req-sent 1
ls-upd-received 27
ls-upd-sent 24
ls-ack-received 6
ls-ack-sent 8
area 0
backbone-area true
num-interfaces 1
num-full-adj-routers 1
spf-exec-count 8
lsa-count 5
router-lsa-count 3
router-lsa-checksum 112202
network-lsa-count 2
network-lsa-checksum 122064
summary-lsa-count 0
summary-lsa-checksum 0
asbr-lsa-count 0
asbr-lsa-checksum 0
nssa-lsa-count 0
nssa-lsa-checksum 0
Related Topics
show ospf database, on page 1165
show ospf database-summary, on page 1167
show ospf interface, on page 1168
Syntax Description
None List standard information about the entries the route table has learned from OSPF.
Detailed detail List detailed information about the entries the route table has learned from OSPF.
Information
Route Prefix prefix/length prefix vpn vpn-id List route information for the specified route prefix
learned from OSPF. If you omit the prefix length, you must specify a VPN identifier
so that the Cisco SD-WAN software can find the route that best matches the prefix.
Specific OSPF Route route-type [prefix/length] List the information about entries for specific OSPF
Type route types and optionally learned from the specified IP prefix. For a list of route
types, see the Output Fields table below.
VPN-Specific Routes vpn vpn- id List only the route table entries for the specified VPN.
Command History
Release Modification
Examples
ROUTE DEST IF
VPN TYPE PREFIX ID AREA COST PATH TYPE TYPE NEXT HOP NAME
-----------------------------------------------------------------------------------------
0 router 172.16.255.13/32 0 51 10 intra-area router 10.0.5.13 ge0/2
0 network 10.0.5.0/24 0 51 10 intra-area network 0.0.0.0 ge0/2
0 network 10.0.12.0/24 0 51 20 intra-area network 10.0.5.13 ge0/2
0 network 10.1.14.0/24 0 51 20 intra-area network 10.0.5.13 ge0/2
0 network 10.1.15.0/24 0 51 20 intra-area network 10.0.5.13 ge0/2
0 network 10.1.16.0/24 0 51 20 intra-area network 10.0.5.13 ge0/2
1 router 172.16.255.12/32 0 0 10 intra-area router 10.2.2.12 ge0/0
1 router 172.16.255.21/32 0 0 20 intra-area router 10.2.2.12 ge0/0
1 network 10.2.2.0/24 0 0 10 intra-area network 0.0.0.0 ge0/0
1 network 10.2.3.0/24 0 0 20 intra-area network 10.2.2.12 ge0/0
1 external 172.16.255.112/32 0 - - external2 network 10.2.2.12 ge0/0
vEdge# show ospf routes detail
Related Topics
show ip routes, on page 1076
show ospf database, on page 1165
show ospf database-summary, on page 1167
show ospf interface, on page 1168
show ospf neighbor, on page 1170
show ospf process, on page 1172
Syntax Description
Command command-name Display the specific CLI operational command or command hierarchy and the
syntax of those commands.
Command History
Release Modification
Examples
Related Topics
help, on page 809
show parser dump, on page 1322
Syntax Description
None List standard information about interfaces that are running PIM.
VPN-Specific vpn vpn-id List only the PIM interfaces in the specified VPN.
Interfaces
Command History
Release Modification
Examples
JOIN
IF NEIGHBOR HELLO PRUNE
VPN NAME IF ADDR COUNT INTERVAL PRIORITY DR ADDRESS INTERVAL
-------------------------------------------------------------------------------
1 ge0/0 10.2.2.11/24 1 30 1 10.2.2.12 60
1 ge0/5 10.0.9.11/24 1 30 1 10.0.9.14 60
1 ge0/6 10.0.10.11/24 1 30 1 10.0.10.14 60
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim neighbor, on page 1179
show pim rp-mapping, on page 1180
show pim statistics, on page 1181
Syntax Description
VPN-Specific vpn vpn-id List only the PIM neighbors in the specified VPN.
Neighbors
Command History
Release Modification
Examples
HOLD
VPN IF NAME NBR ADDR UP TIME EXPIRES PRIORITY TIME DR ADDRESS
------------------------------------------------------------------------------
1 ge0/0.1 10.0.9.11 0:08:19:01 0:00:01:44 1 105 10.0.9.14
1 ge0/1.1 10.0.10.11 0:08:19:01 0:00:01:44 1 105 10.0.10.14
2 ge0/0.2 20.0.9.11 0:08:19:01 0:00:01:44 1 105 20.0.9.14
2 ge0/1.2 20.0.10.11 0:08:19:01 0:00:01:44 1 105 20.0.10.14
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
clear pim protocol, on page 777
show pim rp-mapping, on page 1180
show pim statistics, on page 1181
Syntax Description
VPN vpn vpn-id Display the group-to-RP mappings for a specific VPN.
Command History
Release Modification
Examples
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show omp multicast-routes, on page 1128
show pim interface, on page 1178
show pim neighbor, on page 1179
show pim statistics, on page 1181
Syntax Description
Specific parameter Display the counters for a single PIM counter. parameter can be assert-rx,
Statistic assert-tx, auto-rp-announce-rx, auto-rp-mapping-rx, bad-rx, hello-rx, hello-tx,
join-prune-rx, join-prune-tx, unknown-rx, and unsupported-rx.
Command History
Release Modification
Examples
Related Topics
clear pim interface, on page 775
clear pim neighbor, on page 776
clear pim protocol, on page 777
clear pim rp-mapping, on page 778
clear pim statistics, on page 779
show multicast replicator, on page 1111
show multicast rpf, on page 1113
show multicast topology, on page 1115
show multicast tunnel, on page 1117
show policer
Display information about the policers that are in effect (on vEdge routers only).
show policer [burst bytes] [oos-action action] [oos-pkts number] [rate bps]
Syntax Description
Specific Burst Size burst bytes Display information about policers that match the specified burst
size.Range: 0 through 264 – 1 bytes
Specific Out-of-Specification oos-action action Display information about policers that match the specified
Action OOS action. A policed packet is out of specification when the policer does
not allow it to pass. Depending on the policer configuration, these packets
are either dropped or they are remarked, which sets the packet loss priority
(PLP) value on the egress interface to high.Action: drop, remark
Specific Out-of-Specification oos-pkts number Display information about policers that match the
Packet Count specified OOS packet count.Range: 0 through 264 – 1
Specific Bandwidth rate bps Display information about policers that match the specified
bandwidth.Range: 0 through 264 – 1 bps
Command History
Release Modification
Examples
Display the policers that are in effect on the router:
Show policer
vEdge# show policer
OOS OOS
NAME INDEX DIRECTION RATE BURST ACTION PKTS
----------------------------------------------------------------
ge0_0_llq 10 out 200000000000 15000 drop 0
ge0_3_llq 11 out 200000000000 15000 drop 0
Related Topics
clear policer statistics, on page 781
show policy data-policy-filter, on page 1188
show policy from-vsmart, on page 1191
Syntax Description
None Display all access lists operating on the vEdge router's interfaces.
Specific Access access-list-name Display the interfaces on which the specific access list is operating.
List
Command History
Release Modification
Examples
INTERFACE INTERFACE
NAME NAME DIRECTION
------------------------------------------
ALLOW_OSPF_PACKETS ge0/0 in
Related Topics
access-list, on page 47
show ipv6 policy access-list-associations, on page 1097
show policy access-list-counters, on page 1185
show policy access-list-names, on page 1186
show policy access-list-policers, on page 1187
show policy data-policy-filter, on page 1188
Syntax Description
None Display the count of packets that have been collected by all data policies on the local
vEdge router.
Specific Access access-list-name Display the count of packets that have been collected by the specified
List data policy on the local vEdge router.
Command History
Release Modification
Examples
Related Topics
access-list, on page 47
show ipv6 policy access-list-counters, on page 1098
show policy access-list-associations, on page 1184
show policy access-list-names, on page 1186
show policy access-list-policers, on page 1187
show policy data-policy-filter, on page 1188
Syntax Description
Command History
Release Modification
Examples
NAME
--------------------
ALLOW_OSPF_PACKETS
Related Topics
access-list, on page 47
show ipv6 policy access-list-names, on page 1099
show policy access-list-associations, on page 1184
show policy access-list-counters, on page 1185
show policy access-list-policers, on page 1187
show policy data-policy-filter, on page 1188
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Example
Display a list of policers configured in access lists. This output shows that the policer named
"p1_police" was applied in sequence 10 in the access list "acl_p1" in sequences 10, 20, and 30 in the
"acl_plp" access list.
vEdge# show policy access-list-policers
OOS
NAME POLICER NAME PACKETS
-------------------------------------------
acl_p1 10.p1_police 0
acl_plp 10.p1_police 0
20.p1_police 0
30.p2_police 0
Related Topics
clear policer statistics, on page 781
show ipv6 policy access-list-policers, on page 1100
show policer, on page 1183
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Examples
Example 1
Display the number of packets and bytes for four configured data policy counters:
vSmart# show running-config policy data-policy
policy
data-policy Local-City-Branch
vpn-list-Guest-VPN
sequence 10
action accetp
count Guest-Wifi-Traffic
cflod
!
!
default-action accept
!
vpn-list Service-VPN
sequence 10
match
destination-data-prefix-list Business-Prefixes
destination-port 80
!
action accept
count Business-Traffic
cflowd
!
!
sequence 20
match
destination-port 10090
protocol 6
!
action accept
count Other-Branch-Traffic
cflowd
!
!
sequence 30
action accept
count Misc-Traffic
cflowd
!
!
default-action accept
!
!
Example 2
Display packet information for policers. This output shows that the policer named "police" was
applied in sequences 10, 20, and 30 in the data policy "dp1" and in sequence 10 in the "dp2" data
policy.
vEdge# show policy data-policy-filter
POLICER OOS OOS
NAME NAME COUNTER NAME PACKETS BYTES NAME PACKETS BYTES
------------------------------------------------------------------------------------
dp1 vpn_1_list police_count 0 0
police_count20 0 0 10.police 0
20.police 0
30.police 0
dp2 vpn_1_list 10.police 0
Example 3
For a data policy that includes a policer, display the policers:
vEdge# show policy from-vsmart
from-vsmart data-policy dp1
direction from-service
vpn-list vpn_1_list
sequence 10
match
protocol 1
action accept
count police_count
set
policer police
sequence 20
action accept
count police_count20
set
policer police
sequence 30
action accept
set
policer police
default-action accept
from-vsmart policer police
rate 10000000
burst 1000000
exceed remark
from-vsmart lists vpn-list vpn_1_list
vpn 1
Related Topics
clear policer statistics, on page 781
show ipv6 policy access-list-policers, on page 1100
show policer, on page 1183
show policy from-vsmart, on page 1191
Syntax Description
None None: Display all the data policies that the vSmart controller has pushed to the
vEdge router.
app-route-policy Application Route Policies: Display only the application-aware routing policies
that the vSmart controller has pushed to the vEdge router.
cflowd-template cflowd Templates: Display only the cflowd template information that that
[template-option] vSmart controller has pushed to the vEdge router.
template-option can be one of collector, flow-active-timeout,
flow-inactive-timeout, and template-refresh.
data-policy Data Policies: Display only the data policies that the vSmart controller has
pushed to the vEdge router.
lists (data-prefix-list | Lists: Display only the policy-related lists that the vSmart controller has pushed
vpn-list) to the vEdge router.
policer Policers: Display only the policers that the vSmart controller has pushed to the
vEdge router.
sla-class SLA Classes: Display only the SLA classes for application-aware routing that
the vSmart controller has pushed to the vEdge router.
Command History
Release Modification
14.1 Command introduced.
14.2 Command renamed from show omp data-policy to show policy
from-vsmart.
Examples
Example 1
vEdge# show policy from-vsmart
from-vsmart sla-class test_sla_class
latency 50
from-vsmart app-route-policy test_app_route_policy
vpn-list vpn_1_list
sequence 1
match
destination-ip 10.2.3.21/32
action
sla-class test_sla_class
sla-class strict
sequence 2
match
destination-port 80
action
sla-class test_sla_class
no sla-class strict
sequence 3
match
destination-data-prefix-list test_data_prefix_list
action
sla-class test_sla_class
sla-class strict
sequence 4
match
source-port 8000
action
sla-class test_sla_class
no sla-class strict
sequence 5
match
dscp 10
action
count app-route-dscp
sla-class test_sla_class
no sla-class strict
sequence 7
match
protocol 6
action
sla-class test_sla_class
sla-class strict
sequence 8
match
protocol 17
action
sla-class test_sla_class
no sla-class strict
sequence 9
match
protocol 1
action
count app-route-icmp
sla-class test_sla_class
sla-class strict
from-vsmart lists vpn-list vpn_1_list
vpn 1
vpn 102
Example 2
vEdge# show policy from-vsmart cflowd-template
from-vsmart cflowd-template test-cflowd-template
flow-active-timeout 30
flow-inactive-timeout 30
template-refresh 30
collector vpn 1 address 172.16.255.15 port 13322
vm5# show policy from-vsmart cflowd-template collector
from-vsmart cflowd-template test-cflowd-template
collector vpn 1 address 172.16.255.15 port 13322
Related Topics
cflowd-template, on page 159
policy, on page 482
show app cflowd template, on page 910
show policy data-policy-filter, on page 1188
Syntax Description
Command History
Release Modification
14.1 Command introduced.
Example
Related Topics
show policy qos-scheduler-info, on page 1195
Syntax Description
Command History
Release Modification
14.1 Command introduced.
Example
Related Topics
show policy qos-map-info, on page 1194
Syntax Description
all All Possible Paths: Display all possible paths for a packet.
dest-ip ip-address dest-port Destination IP Address and Port Number: IP address and port number
port-number of the remote end of the IPsec tunnel.
app application-name DPI Application: Display the packets associated with the specified
DPI application.
dscp value DSCP Value: DSCP value being used on the IPsec tunnel.Range: 0
through 63
interface interface-name Interface: Name of the local interface being used for the IPsec tunnel.
protocol number Protocol: Number of the protocol being used on the IPsec tunnel.
source-ip ip-address source-port Source IP Address and Port Number: IP address and port number of
port-number the local end of the IPsec tunnel.
Command History
Release Modification
15.1 Command introduced.
Example
Related Topics
show app-route sla-class, on page 928
show app-route stats, on page 930
Syntax Description
all All Possible Paths: Display all possible paths for a packet.
dest-ip ip-address dest-port Destination IP Address and Port Number: IP address and port number
port-number of the remote end of the IPsec tunnel.
app application-name DPI Application: Display the packets associated with the specified
DPI application.
dscp value DSCP Value: DSCP value being used on the IPsec tunnel.
interface interface-name Interface: Name of the local interface being used for the IPsec tunnel.
protocol number Protocol: Number of the protocol being used on the IPsec tunnel.
source-ip ip-address source-port Source IP Address and Port Number: IP address and port number of
port-number the local end of the IPsec tunnel.
Command History
Release Modification
15.2 Command renamed from show app-route path and introduced.
Example
vEdge# show policy tunnel-path vpn 0 interface ge0/2 source-ip 10.0.5.11 dest-ip 10.0.5.21
protocol 6
source-port 12346 dest-port 12346
Nexthop: Direct
Interface ge0/2 index: 3
Related Topics
show app-route stats, on page 930
show app-route sla-class, on page 928
show policy service-path, on page 1196
Syntax Description
None
Command History
Release Modification
18.2 Command introduced.
Example
For the configured zone-based firewalls, display the number of packets and the number of bytes that
match the match criteria in the firewalls:
vEdge# show policy zbfw filter-statistics
Related Topics
clear policy zbfw filter-statistics, on page 783
clear policy zbfw global-statistics, on page 784
Syntax Description
None
Example
Display statistics about packets that the router has processed with zone-based firewalls:
vEdge# show policy zbfw global-statistics
Total ZBF packets : 0
Fragments : 0
Fragments fail : 0
State check fail : 0
Flow add fail : 0
Unsupported proto : 0
Number of flow entries : 0
Max half open exceeded : 0
MBox message full : 0
Packets Implicitly Allowed :
No Pair Same Zone : 0
No Zone to No Zone : 0
Zone to No Zone Inet : 0
TCP Stats :
TCP Retrans Seg : 0
TCP Out of Order Seg : 0
Packets Implicitly Dropped :
During Policy Change : 0
Invalid Filter : 0
No Pair for Diff Zone : 0
Zone to No Zone : 0
Zone to No Zone Inet : 0
TCP Drops :
Internal invalid tcp state : 0
Stray seg : 0
Invalid flags : 0
Syn with data : 0
Invalid win scale option : 0
Invalid seg synsent state : 0
Invalid ack num : 0
Invalid ack flag : 0
Reset to Responder : 0
Retrans invalid flags : 0
Reset in window : 0
Invalid sequence number : 0
Invalid seg synrcvd state : 0
Syn in window : 0
Unexpected TCP payload : 0
Related Topics
clear policy zbfw global-statistics, on page 784
Syntax Description
None
Command History
Release Modification
18.2 Command introduced.
Example
For the configured zone-based firewalls, display the number of packets and the number of bytes that
match the match criteria in the firewalls:
vEdge# show policy zbfw sessions
ZONE PAIR SOURCE IP DESTINATION SOURCE DESTINATION SOURCE DESTINATION IDLE OUTBOUND OUTBOUND INBOUND INBOUND FILTER
NAME VPN ADDRESS IP ADDRESS PORT PORT PROTOCOL VPN VPN TIMEOUT PACKETS OCTETS PACKETS OCTETS STATE
------------------------------------------------------------------------------------------------------------------------------------------------------------
zp1 1 10.20.24.17 10.20.25.18 44061 5001 TCP 1 1 0:00:59:59 12552 17581337 6853 463590 established
zp1 1 10.20.24.17 10.20.25.18 44062 5001 TCP 1 1 0:01:00:00 10151 14217536 5561 375290 established
zp1 1 10.20.24.17 10.20.25.18 44063 5001 TCP 1 1 0:00:59:59 7996 11198381 4262 285596 established
zp1 1 10.20.24.17 10.20.25.18 44064 5001 TCP 1 1 0:00:59:59 7066 9895451 3826 257392 established
zp1 1 10.20.24.17 10.20.25.18 44065 5001 TCP 1 1 0:00:59:59 13471 18868856 7440 504408 established
zp1 1 10.20.24.17 10.20.25.18 44066 5001 TCP 1 1 0:00:59:59 8450 11834435 4435 295718 established
Related Topics
clear policy zbfw sessions, on page 785
Syntax Description
None
Command History
Release Modification
15.3.3 Command introduced.
Example
Related Topics
clear pppoe statistics, on page 787
show pppoe session, on page 1204
show pppoe statistics, on page 1205
Syntax Description
None
Command History
Release Modification
15.3.3 Command introduced.
Example
--------------------------------------------------------------------------------------------
0 ge0/1 1 00:0c:29:2e:20:1a 00:0c:29:be:27:f5 ppp1 branch100 -
Related Topics
clear pppoe statistics, on page 787
show ppp interface, on page 1203
show pppoe statistics, on page 1205
Syntax Description
None
Command History
Release Modification
15.3.3 Command introduced.
Example
Related Topics
clear pppoe statistics, on page 787
show pppoe session, on page 1204
show ppp interface, on page 1203
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Example
Related Topics
reboot, on page 830
show system status, on page 1241
show running-config
Display the active configuration that is running on the Cisco vEdge device. Use the details filter with this
command to display the default values for configured components.
show running-config [configuration-hierarchy]
show running-config [configuration-hierarchy] | details
Syntax Description
| details Default Values in Running Configuration: Display the default values for the
components configured in the running configuration.
configuration-hierarchy Specific Configuration Hierarchy: Display the active configuration for a specific
hierarchy in the configuration.
Command History
Release Modification
14.1 Command introduced.
Examples
Example 1
vEdge# show running-config system
system
host-name vedge1
system-ip 172.16.255.1
domain-id 1
site-id 1
clock timezone America/Los_Angeles
vbond 10.0.14.4
aaa
auth-order local radius
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password $1$zvOh58pk$QLX7/RS/F0c6ar94.xl2k.
!
user eve
password $1$aLEJ6jve$aBpPQpkl3h.SvA2dt4/6E/
group operator
!
!
logging
disk
enable
!
!
!
Example 2
vEdge# show running-config vpn 1
vpn 1
name ospf_and_bgp_configs
router
ospf
router-id 172.16.255.15
timers spf 200 1000 10000
redistribute static
redistribute omp
area 0
interface ge0/4
exit
exit
!
pim
interface ge0/5
exit
exit
!
interface ge0/4
ip address 10.20.24.15/24
no shutdown
!
interface ge0/5
ip address 56.0.1.15/24
no shutdown
!
!
vEdge# show running-config vpn 1 | details
vpn 1
name ospf_and_bgp_configs
no ecmp-hash-key layer4
router
ospf
router-id 172.16.255.15
auto-cost reference-bandwidth 100
compatible rfc1583
distance external 0
distance inter-area 0
distance intra-area 0
timers spf 200 1000 10000
redistribute static
redistribute omp
area 0
interface ge0/4
hello-interval 10
dead-interval 40
retransmit-interval 5
priority 1
network broadcast
exit
exit
!
pim
no shutdown
no auto-rp
interface ge0/5
hello-interval 30
join-prune-interval 60
exit
exit
!
interface ge0/4
ip address 10.20.24.15/24
flow-control autoneg
no clear-dont-fragment
no pmtu
mtu 1500
no shutdown
arp-timeout 1200
!
interface ge0/5
ip address 56.0.1.15/24
flow-control autoneg
no clear-dont-fragment
no pmtu
mtu 1500
no shutdown
arp-timeout 1200
!
!
Related Topics
config, on page 797
show sdwan
Display SD-WAN related information about the IOS XE router.
show sdwan app-fwd
show sdwan app-route
show sdwan bfd
show sdwan certificate
show sdwan confd-logs
show sdwan control
show sdwan crash
show sdwan debugs
show sdwan ipsec
show sdwan nat-fwd
show sdwan notification
show sdwan omp
show sdwan policy
show sdwan running-config
show sdwan security-info
show sdwan software
show sdwan transport
show sdwan tunnel
show sdwan version
show sdwan zbfw
show sdwan zonebfwdp
Syntax Description
The options for the show sdwan commands are the same as for the equivalent vEdge router commands.
Command History
Release Modification
16.9.1 Command introduced.
Example
The example output for the show sdwan commands is the same as for the equivalent vEdge router
commands. Below is an example output for the show sdwan app-route command.
ISR4K# show sdwan app-route stats
app-route statistics 10.239.136.233 35.164.167.186 ipsec 12366 12366
remote-system-ip 172.16.100.6
local-color custom2
remote-color 3g
mean-loss 0
mean-latency 20
mean-jitter 0
sla-class-index 0
TOTAL AVERAGE AVERAGE TX DATA RX DATA
INDEX PACKETS LOSS LATENCY JITTER PKTS PKTS
----------------------------------------------------------
0 662 0 21 0 0 0
1 663 0 21 0 0 0
2 663 1 20 0 0 0
3 663 0 20 0 0 0
4 662 0 20 0 0 0
5 664 1 20 0 0 0
app-route statistics 10.239.136.233 64.71.131.98 ipsec 12366 59448
remote-system-ip 172.16.255.210
local-color custom2
remote-color default
mean-loss 100
mean-latency 0
mean-jitter 0
sla-class-index 0
TOTAL AVERAGE AVERAGE TX DATA RX DATA
INDEX PACKETS LOSS LATENCY JITTER PKTS PKTS
----------------------------------------------------------
0 661 661 0 0 0 0
1 662 662 0 0 0 0
2 661 661 0 0 0 0
3 662 662 0 0 0 0
4 661 661 0 0 0 0
5 664 664 0 0 0 0
Related Topics
show sdwan policy, on page 1227
Status
------
TCP OPT Operational State : RUNNING
TCP Proxy Operational State : RUNNING
Device#show sdwan appqoe nat-statistics
==========================================================
NAT Statistics
==========================================================
Insert Success : 48975831
Delete Success : 48975823
Duplicate Entries : 19
Allocation Failures : 0
Port Alloc Success : 0
Port Alloc Failures : 0
Port Free Success : 0
Port Free Failures : 0
Device# show sdwan appqoe service-chain status
Service State
------- -----
SNORT Connection UP
Device#show sdwan appqoe libuinet-statistics
==========================================================
Libuinet Statistics
==========================================================
SPPI Statistics:
Available Packets : 1214696704
Errored Available Packets : 111235402
Rx Packets : 1214696704
Failed Rx Packets : 0
Tx Packets : 1124139791
Tx Full Wait : 0
Failed Tx Packets : 0
PD Alloc Success : 1226942851
PD Alloc Failed : 0
PB Current Count : 32768
Pipe Disconnect : 0
Vpath Statistics:
Packets In : 1214696704
Control Packets : 250438
Data Packets : 1214446263
Packets Dropped : 351131
Non-Vpath Packets : 3
Decaps : 1214446263
Encaps : 1123889349
Packets Out : 1111643206
Syn Packets : 12248341
Syn Drop Max PPS Reached : 0
IP Input Packets : 1214095132
IP Input Bytes : 856784254349
IP Output Packets : 1111643202
IP Output Bytes : 917402419856
Flow Info Allocs : 12248341
Flow Info Allocs Failed : 0
Flow Info Allocs Freed : 12248339
Rx Version Prob Packets : 1
Rx Control Packets : 250437
Rx Control Healthprobe Pkts: 250437
ICMP incoming packet count: 0
ICMP processing success: 0
ICMP processing failures: 0
Non-Syn nat lkup failed Pkts: 348691
Nat lkup success for Syn Pkts: 248
Vpath drops due to min threshhold: 0
Flow delete notify TLV Pkts: 12246147
Failed to allocate flow delete notify TLV Pkts: 0
Failed to send flow delete notify TLV Pkts: 0
Failed to create new connection: 2192
show sdwan appqoe flow closed { all | detail | flow-id flow-id | server-port port-number | server-ip
server-ip [ server-port port-number ] | client-ip client-ip [ server-port port-number ] | server-port
port-number }
Optimized Flows
---------------
T:TCP, S:SSL, U:UTD
show sdwan appqoe flow flow-id [ debug { all | SSL | TCP | UTD } ]
TCP stats
---------
Client Bytes Received : 1702
Client Bytes Sent : 2877
Server Bytes Received : 4102
Server Bytes Sent : 1511
TCP Client Rx Pause : 0x0
TCP Server Rx Pause : 0x0
TCP Client Tx Enabled : 0x0
TCP Server Tx Enabled : 0x0
Client Flow Pause State : 0x0
Server Flow Pause State : 0x0
TCP Flow Bytes Consumed : 0
TCP Client Close Done : 0x0
TCP Server Close Done : 0x0
TCP Client FIN Rcvd : 0x0
TCP Server FIN Rcvd : 0x0
TCP Client RST Rcvd : 0x0
TCP Server RST Rcvd : 0x0
TCP FIN/RST Sent : 0x0
Flow Cleanup State : 0x0
TCP Flow Events
1. time:4024.495732 :: Event:TCPPROXY_EVT_FLOW_CREATED
2. time:4024.495748 :: Event:TCPPROXY_EVT_SYNCACHE_ADDED
3. time:4024.496141 :: Event:TCPPROXY_EVT_ACCEPT_DONE
4. time:4024.496246 :: Event:TCPPROXY_EVT_CONNECT_START
5. time:4024.746338 :: Event:TCPPROXY_EVT_CONNECT_DONE
6. time:4024.746351 :: Event:TCPPROXY_EVT_FLOW_CREATE_UTD_SENT
7. time:4024.746420 :: Event:TCPPROXY_EVT_FLOW_CREATE_UTD_RSP_SUCCESS
8. time:4024.746442 :: Event:TCPPROXY_EVT_FLOW_CREATE_SSL_DONE
9. time:4024.746466 :: Event:TCPPROXY_EVT_FLOW_ENABLE_SSL
10. time:4024.746491 :: Event:TCPPROXY_EVT_DATA_ENABLED_SUCCESS
SSL stats
---------
S-to-C Encrypted Bytes Written : 638
S-to-C Encrypted Bytes Read : 638
S-to-C Decrypted Bytes Written : 319
S-to-C Decrypted Bytes Read : 319
S-to-C Clear Flow Bytes : 0
C-to-S Encrypted Bytes Written : 1059
C-to-S Encrypted Bytes Read : 1059
C-to-S Decrypted Bytes Written : 740
C-to-S Decrypted Bytes Read : 740
C-to-S Clear Flow Bytes : 0
show sdwan appqoe flow vpn-id vpn-id { client-ip client-ip [ server-ip server-ip [ server-port
port-number ] ] | server-ip server-ip server-port port-number | server-port port-number }
Syntax Description
None.
Command Mode
Privileged EXEC mode
Command History
Release Modification
Cisco IOS XE Release 17.2 This command was introduced.
Examples
Example
Device# show sdwan cloudexpress applications
cloudexpress applications vpn 1 office365
exit-type local
interface GigabitEthernet1
latency 1
loss 40
cloudexpress applications vpn 1 amazon_aws
exit-type gateway
gateway-system-ip 10.0.0.1
latency 1
loss 0
local-color lte
remote-color lte
cloudexpress applications vpn 1 dropbox
exit-type gateway
gateway-system-ip 10.0.0.1
latency 19
loss 0
local-color lte
remote-color lte
Syntax Description
This command has no arguments or keywords.
Command Mode
Privileged EXEC mode
Command History
Release Modification
Cisco IOS XE Release 17.2 This command was introduced.
Examples
Example
Device# show sdwan cloudexpress gateway-exits
cloudexpress gateway-exits vpn 1 office365 10.0.0.1
latency 2
loss 50
local-color lte
remote-color lte
cloudexpress gateway-exits vpn 1 amazon_aws 10.0.0.2
latency 1
loss 0
local-color lte
remote-color lte
cloudexpress gateway-exits vpn 1 dropbox 10.0.0.2
latency 19
loss 0
local-color lte
remote-color lte
Syntax Description
This command has no arguments or keywords.
Command Mode
Privileged EXEC mode
Command History
Release Modification
Cisco IOS XE Release 17.2 This command was introduced.
Examples
Example
Device# show sdwan cloudexpress local-exits
VPN APPLICATION INTERFACE LATENCY LOSS
----------------------------------------------------------------------
1 office365 GigabitEthernet1 1 43
1 office365 GigabitEthernet5 1 42
Command Syntax
show sdwan omp routes [prefix/length | ip-address] [family family address] [vpn vpn-id] ] [detail]
Syntax Description
None Lists the routing information about all OMP peering sessions on the local device.
Output Fields
The output fields are self-explanatory.
Command Default NA
Examples
Code:
C -> chosen
I -> installed
Red -> redistributed
Rej -> rejected
L -> looped
R -> resolved
S -> stale
Ext -> extranet
Inv -> invalid
Stg -> staged
U -> TLOC unresolved
PATH ATTRIBUTE
VPN PREFIX FROM PEER ID LABEL STATUS TYPE TLOC IP
COLOR ENCAP PREFERENCE
--------------------------------------------------------------------------------------------------------------------------------------
1 192.0.2.0/24 192.168.1.3 1 1001 C,I,R installed 192.168.1.152
biz-internet ipsec -
202 192.0.2.1/24 192.168.1.3 2 1002 C,I,R installed 192.168.1.152
biz-internet ipsec -
202 192.0.2.0/24 0.0.0.0 68 1002 C,Red,R installed 192.168.1.121
biz-internet ipsec -
---------------------------------------------------
omp route entries for vpn 202 route 192.0.2.0/24
---------------------------------------------------
RECEIVED FROM:
peer 0.0.0.0
path-id 68
label 1002
status C,Red,R
loss-reason not set
lost-to-peer not set
lost-to-path-id not set
Attributes:
originator 192.168.1.121
type installed
tloc 192.168.1.121, biz-internet, ipsec
domain-id not set
site-id 121
overlay-id 1
preference not set
tag not set
origin-proto connected
origin-metric 0
as-path not set
unknown-attr-len not set
ADVERTISED TO:
peer 192.168.1.3
advertise-id 68
Attributes:
originator 192.168.1.121
label 1002
path-id 68
tloc 192.168.1.121, biz-internet, ipsec
---------------------------------------------------
omp route entries for vpn 202 route 192.0.2.0/24
---------------------------------------------------
RECEIVED FROM:
peer 192.168.1.3
path-id 2
label 1002
status C,I,R
loss-reason not set
lost-to-peer not set
lost-to-path-id not set
Attributes:
originator 192.168.1.152
type installed
tloc 192.168.1.152, biz-internet, ipsec
ultimate-tloc not set
domain-id not set
overlay-id 1
site-id 152
preference not set
tag not set
origin-proto connected
origin-metric 0
as-path not set
unknown-attr-len not set
---------------------------------------------------
omp route entries for vpn 202 route 192.0.2.1/24
---------------------------------------------------
RECEIVED FROM:
peer 0.0.0.0
path-id 68
label 1002
status C,Red,R
loss-reason not set
lost-to-peer not set
lost-to-path-id not set
Attributes:
originator 192.168.1.121
type installed
tloc 192.168.1.121, biz-internet, ipsec
ultimate-tloc not set
domain-id not set
overlay-id 1
site-id 121
preference not set
tag not set
origin-proto connected
origin-metric 0
as-path not set
Code:
C -> chosen
I -> installed
Red -> redistributed
Rej -> rejected
L -> looped
R -> resolved
S -> stale
Ext -> extranet
Inv -> invalid
Stg -> staged
U -> TLOC unresolved
PATH
TO PEER ADVERTISE ID ID
----------------------------------------
192.168.1.3 68 68
Code:
C -> chosen
I -> installed
Red -> redistributed
Rej -> rejected
L -> looped
R -> resolved
S -> stale
Ext -> extranet
Inv -> invalid
Stg -> staged
U -> TLOC unresolved
PATH ATTRIBUTE
Syntax Description
The options for the show sdwan policy commands are the same as for the equivalent vEdge router commands.
Command History
Release Modification
16.9.1 Command introduced.
Note The show sdwan policy data-policy-filter commands display in different formats depending on if the counter
has a value or not. If the counter has a value, the output for the show sdwan policy data-policy-filter displays
in a linear format. If the counter does not have a value, the output displays in a tabular format.
Example
The example output for the show sdwan policy commands is the same as for the equivalent vEdge
router commands. Below is an example output for the show sdwan policy app-route-policy-filter
command.
ISR4K# show sdwan policy app-route-policy-filter
app-route-policy-filter app_route_policy_pm9008
app-route-policy-vpnlist all_vpns
app-route-policy-counter count_appr_pm9008_1001
packets 15126027
bytes 15305251759
app-route-policy-counter count_appr_pm9008_1002
packets 10364400
bytes 11151607158
app-route-policy-counter count_appr_pm9008_1003
packets 0
bytes 0
app-route-policy-counter count_appr_pm9008_1004
packets 265882
bytes 34997066
Related Topics
show sdwan, on page 1210
Syntax Description
interface interface-name Specifies the name of the local interface being used for the IPsec tunnel.
source-ip ip-address Specifies the source IP address number of the local end of the IPsec tunnel.
dest-ip ip-address Specifies the destination IP address of the remote end of the IPsec tunnel.
protocol number Specifies the number of the protocol being used on the IPsec tunnel.
source-port port-number Specifies the port number of the local end of the IPsec tunnel.
dest-port port-number Specifies the port number of the remote end of the IPsec tunnel.
app application-name Displays the packets associated with the specified DPI application.
dscp value Specifies the DSCP value being used on the IPsec tunnel.Range: 0 through
63
Command Default NA
Command History
Release Modification
Cisco IOS XE Release Amsterdam 17.2.1r This command was introduced.
Usage Guidelines You identify the IP packet by specifying fields in the IP header. You can use this command when using
application-aware routing, to determine that path taken by the packets associated with a DPI application.
Example
Syntax Description
interface interface-name Specifies the name of the local interface being used for the IPsec tunnel.
source-ip ip-address Specifies the source IP address number of the local end of the IPsec tunnel.
dest-ip ip-address Specifies the destination IP address of the remote end of the IPsec tunnel.
protocol number Specifies the number of the protocol being used on the IPsec tunnel.
source-port port-number Specifies the port number of the local end of the IPsec tunnel.
dest-port port-number Specifies the port number of the remote end of the IPsec tunnel.
app application-name Displays the packets associated with the specified DPI application.
dscp value Specifies the DSCP value being used on the IPsec tunnel.Range: 0 through
63
Command Default NA
Command History
Release Modification
Cisco IOS XE Release Amsterdam 17.2.1r This command was introduced.
Usage Guidelines You identify the IP packet by specifying fields in the IP header. You can use this command when using
application-aware routing, to determine that path taken by the packets associated with a DPI application.
Example
show security-info
List the configured security information for IPsec tunnel connections (on vEdge routers only).
show security-info [authentication-type | rekey | replay-window]
Syntax Description
None List information about all configured IPsec tunnel security parameters.
authentication-type Authentication: List the configured authentication type for IPsec tunnels.
rekeyr Rekeying Time: List the configured rekeying time for IPsec tunnels, in seconds.
replay-window Replay Window: List the configured replay window size for IPsec tunnels.
Command History
Release Modification
14.2 Command introduced.
Example
Related Topics
ipsec, on page 345
show software
List the software images that are installed on the local device (on vEdge routers and vSmart controllers).
show software image-name [active | confirmed | default | previous | timestamp]
show software
Syntax Description
None List information about all software images installed on the local device.
[active | confirmed | default | Software Image Status: List whether the image is the actively running
previous | timestamp] image, the default image, or the previously running image, when the image
was installed, and who confirmed the software installation.
image-name Specific Software Image: List information about a specific software image.
Command History
Release Modification
15.3.3 Command introduced for vEdge 100 routers only.
Example
Related Topics
request download, on page 850
request software activate, on page 882
request software install-image, on page 885
request software remove, on page 886
request software reset, on page 887
show version, on page 1257
Syntax Description
None
Command History
Release Modification
17.2 Command introduced.
Example
Related Topics
show interface queue, on page 1051
show interface statistics, on page 1061
show system statistics, on page 1236
Syntax Description
None
Command History
Release Modification
15.4.3 Command introduced.
Example
Related Topics
iptables-enable, on page 346
Syntax Description
diff Statistics Changes: Display the changes in statistics since you last issued the show system statistics
command.
Command History
Release Modification
14.1 Command introduced.
Example
rx_pkts : 172639782
rx_drops : 0
ip_fwd : 123848170
ip_fwd_mirror_pkts : 0
ip_fwd_arp : 10899
ip_fwd_to_egress : 61493879
ip_fwd_invalid_oil : 0
ip_v6_mcast_drops : 0
ip_fwd_mcast_invalid_iif : 0
ip_fwd_mcast_life_exceeded_drops : 0
rx_mcast_threshold_exceeded : 0
ip_fwd_invalid_tun_oil : 0
rx_mcast_policy_fwd_drops : 0
rx_mcast_mirror_fwd_drops : 0
ip_fwd_null_mcast_group : 0
ip_fwd_null_nhop : 210416
ip_fwd_unknown_nh_type : 0
ip_fwd_nat_on_tunnel : 0
ip_fwd_to_cpu : 25051507
ip_fwd_to_cpu_nat_xlates : 0
ip_fwd_from_cpu_nat_xlates : 0
ip_fwd_to_cpu_nat_drops : 0
ip_fwd_from_cpu_non_local : 0
ip_fwd_rx_ipsec : 46576642
ip_fwd_mcast_pkts : 0
ip_fwd_rx_gre : 0
nat_xlate_outbound : 63509046
nat_xlate_outbound_drops : 966598
nat_xlate_inbound : 31683862
nat_xlate_inbound_fail : 257
rx_bcast : 9724255
cflowd_pkts : 769419
rx_mcast : 28365292
rx_mcast_link_local : 28365240
rx_mcast_filter_to_cpu : 0
rx_mcast_filter_to_cpu_and_fwd : 0
rx_gre_decap : 0
rx_gre_drops : 0
rx_gre_policer_drops : 0
rx_implicit_acl_drops : 9618739
rx_ipsec_decap : 46574988
rx_ip6_ipsec_drops : 0
rx_sa_ipsec_drops : 0
rx_spi_ipsec_drops : 2
rx_replay_drops : 545
rx_replay_integrity_drops : 9
rx_next_hdr_ipsec_drops : 0
rx_mac_compare_ipsec_drops : 0
rx_err_pad_ipsec_drops : 0
rx_ipsec_policer_drops : 0
rx_pre_ipsec_pkts : 0
rx_pre_ipsec_drops : 0
rx_pre_ipsec_policer_drops : 0
rx_pre_ipsec_decap : 0
openssl_aes_decrypt : 0
qat_aes_decrypt : 0
openssl_gcm_decrypt : 46575030
qat_gcm_decrypt : 0
rx_ipsec_bad_inner : 0
rx_bad_label : 0
service_label_fwd : 0
rx_host_local_pkt : 0
rx_host_mirror_drops : 0
rx_tunneled_pkts : 0
rx_cp_non_local : 0
tx_if_not_preferred : 2
tx_vsmart_drop : 0
rx_invalid_port : 0
port_disabled_rx : 0
ip_disabled_rx : 0
rx_invalid_qtags : 44
rx_non_ip_drops : 892
rx_ip_errs : 0
pko_wred_drops : 0
tx_queue_exceeded : 0
rx_policer_drops : 0
rx_policer_remark : 0
route_to_host : 0
ttl_expired : 0
icmp_redirect : 0
bfd_rx_non_ip : 0
bfd_tx_record_changed : 41
bfd_rx_record_invalid : 0
bfd_rx_parse_err : 0
rx_arp_rate_limit_drops : 0
rx_arp_non_local_drops : 47220007
rx_arp_reqs : 69873
rx_arp_replies : 760095
arp_add_fail : 38578773
unknown_nh_type : 0
buf_alloc_fails : 0
ecmp_discards : 0
app_route_policy_discards : 0
cbf_discards : 0
filter_drops : 0
invalid_back_ptr : 0
tunnel_loop_drops : 0
to_cpu_policer_drops : 28046800
mirror_drops : 0
split_horizon_drops : 0
rx_no_tun_if : 0
tx_pkts : 155590511
tx_errors : 0
tx_bcast : 508522
tx_mcast : 249169
port_disabled_tx : 5
ip_disabled_tx : 0
tx_fragment_needed : 0
tx_mcast_fragment_needed : 0
fragment_df_drops : 0
tx_fragments : 0
tx_fragment_drops : 0
tx_fragment_fail : 0
tx_fragment_alloc_fail : 0
tunnel_pmtu_lowered : 0
tx_gre_pkts : 0
tx_gre_drops : 0
tx_gre_policer_drops : 0
tx_gre_encap : 0
tx_ipsec_pkts : 46694074
tx_ipsec_mcast_pkts : 0
tx_ip6_ipsec_drops : 0
tx_no_out_sa_ipsec_drops : 0
tx_zero_spi_ipsec_drops : 0
tx_no_tunn_ipsec_drops : 0
tx_ipsec_policer_drops : 0
tx_ipsec_encap : 46694074
tx_ipsec_mcast_encap : 0
tx_pre_ipsec_pkts : 46694074
tx_no_out_sa_pre_ipsec_drops : 0
tx_no_tunn_pre_ipsec_drops : 0
openssl_aes_encrypt : 0
qat_aes_encrypt : 0
openssl_gcm_encrypt : 46694074
qat_gcm_encrypt : 0
tx_pre_ipsec_policer_drops : 0
tx_pre_ipsec_encap : 46694074
tx_arp_replies : 69899
tx_arp_reqs : 508502
tx_arp_req_fail : 2
tx_no_arp_drop : 4
tx_arp_rate_limit_drops : 5
tx_icmp_policer_drops : 0
tx_icmp_mirrored_drops : 0
bfd_tx_fail : 0
bfd_alloc_fail : 0
bfd_timer_add_fail : 0
bfd_tx_pkts : 46385012
bfd_rx_pkts : 46278322
bfd_tx_octets : 7107533768
bfd_rx_octets : 7104071388
bfd_pmtu_tx_pkts : 23522
bfd_pmtu_rx_pkts : 23199
bfd_pmtu_tx_octets : 29353636
bfd_pmtu_rx_octets : 8886087
bfd_rec_down : 0
bfd_rec_invalid : 0
bfd_lkup_fail : 0
rx_icmp_echo_requests : 0
rx_icmp_echo_replies : 846060
rx_icmp_network_unreach : 210414
rx_icmp_host_unreach : 1109
rx_icmp_port_unreach : 0
rx_icmp_protocol_unreach : 0
rx_icmp_fragment_required : 0
rx_icmp_dst_unreach_other : 0
rx_icmp_ttl_expired : 0
rx_icmp_redirect : 0
rx_icmp_src_quench : 0
rx_icmp_bad_ip_hdr : 0
rx_icmp_other_types : 4398628
tx_icmp_echo_requests : 602847
tx_icmp_echo_replies : 0
tx_icmp_network_unreach : 210416
tx_icmp_host_unreach : 0
tx_icmp_port_unreach : 0
tx_icmp_protocol_unreach : 0
tx_icmp_fragment_required : 0
tx_icmp_dst_unreach_other : 0
tx_icmp_ttl_expired : 0
tx_icmp_redirect : 0
tx_icmp_src_quench : 0
tx_icmp_bad_ip_hdr : 0
tx_icmp_other_types : 2
gre_ka_tx_pkts : 0
gre_ka_rx_pkts : 0
gre_ka_tx_ipv4_options_drop : 0
gre_ka_tx_non_ip : 0
gre_ka_tx_parse_err : 0
gre_ka_tx_record_changed : 0
gre_ka_tx_fail : 0
gre_ka_alloc_fail : 0
gre_ka_timer_add_fail : 0
gre_ka_rx_non_ip : 0
gre_ka_rx_rec_invalid : 0
dot1x_rx_pkts : 0
dot1x_tx_pkts : 0
dot1x_rx_drops : 0
dot1x_tx_drops : 0
dot1x_vlan_if_not_found_drops : 0
dot1x_mac_learn_drops : 0
dns_req_snoop : 0
dns_res_snoop : 0
redirect_dns_req : 0
ctrl_loop_fwd : 0
ctrl_loop_fwd_drops : 0
rx_replay_drops_tc0 : 0
rx_replay_drops_tc1 : 0
rx_replay_drops_tc2 : 545
rx_replay_drops_tc3 : 0
rx_replay_drops_tc4 : 0
rx_replay_drops_tc5 : 0
rx_replay_drops_tc6 : 0
rx_replay_drops_tc7 : 0
rx_window_drops_tc0 : 0
rx_window_drops_tc1 : 0
rx_window_drops_tc2 : 768
rx_window_drops_tc3 : 0
rx_window_drops_tc4 : 0
rx_window_drops_tc5 : 0
rx_window_drops_tc6 : 0
rx_window_drops_tc7 : 0
rx_unexpected_replay_drops_tc0 : 0
rx_unexpected_replay_drops_tc1 : 0
rx_unexpected_replay_drops_tc2 : 0
rx_unexpected_replay_drops_tc3 : 0
rx_unexpected_replay_drops_tc4 : 0
rx_unexpected_replay_drops_tc5 : 0
rx_unexpected_replay_drops_tc6 : 0
rx_unexpected_replay_drops_tc7 : 0
rx_replay_integrity_drops_tc0 : 9
rx_replay_integrity_drops_tc1 : 0
rx_replay_integrity_drops_tc2 : 0
rx_replay_integrity_drops_tc3 : 0
rx_replay_integrity_drops_tc4 : 0
rx_replay_integrity_drops_tc5 : 0
rx_replay_integrity_drops_tc6 : 0
rx_replay_integrity_drops_tc7 : 0
icmp_redirect_tx_drops : 0
icmp_redirect_rx_drops : 0
Related Topics
clear system statistics, on page 790
show app log flow-count, on page 922
show app log flows, on page 923
show system buffer-pool-status, on page 1234
show tunnel statistics, on page 1252
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Examples
Example 1
In Releases 17.1 and later:
vEdge# show system status
Personality: vedge
Model name: vedge-1000
Services: None
vManaged: false
Commit pending: false
Configuration template: None
Example 2
In Releases 16.3.2 and later:
vEdge# show system status
Personality: vedge
Model name: vedge-cloud
Services: None
vManaged: false
Commit pending: false
Configuration template: None
Example 3
In Releases 15.4 and later for all Cisco vEdge devices, and in Release 15.3 for vEdge 100 routers
only:
vEdge# show system status
Cisco SD-WAN (tm) vedge Operating System Software
Copyright (c) 2013-2016 by Cisco, Inc.
Version: 16.1.0
Personality: vedge
Model name: vedge-cloud
Services: None
vManaged: false
Commit pending: false
Configuration template: None
Personality: vsmart
Model name: vsmart
Services: None
vManaged: false
Commit pending: false
Configuration template: None
Policy template: None
Policy template version: None
Example 4
In Releases 15.3 and earlier for all Cisco vEdge devices except vEdge 100 routers:
Last reboot: .
System uptime: 0 days 10 hrs 34 min 41 sec
Current time: Tue Nov 03 22:11:43 PST 2015
Personality: vedge
Services: None
vManaged: false
Commit pending: false
Last reboot: .
System uptime: 0 days 06 hrs 52 min 52 sec
Current time: Wed Sep 23 17:36:45 PDT 2015
Personality: vsmart
Services: None
vManaged: false
Commit pending: false
Configuration template: None
Policy template: None
Policy template version: None
Related Topics
show reboot history, on page 1206
show uptime, on page 1255
show version, on page 1257
show tech-support
To display general information about the Cisco SD-WAN devices, use the show tech-support command in
the privileged EXEC mode.
show tech-support
Syntax Description
This command has no arguments or keywords.
Command Default NA
Usage Guidelines When a Cisco device reboots, it collects system status information in a compressed tar file to aid in
troubleshooting and diagnostics. The tar file is saved in your system's home directory and contains the following
information:
• output of commands
• content of files on the local device
• core files
• syslog files for each process
• configuration rollback files
This command is useful for collecting a large amount of information about devices for troubleshooting. The
output of this command can be provided to technical support representatives when reporting a problem. The
command output displays the output of a number of show commands at once. The output from this command
varies depending on your platform and configuration. Where as, the command request admin-tech collects
all system status information, including core files, log files, and the process (daemon) and operational-related
files that are stored in the /var/tech directory on the local device. For more information on admin-tech
command, see request admin-tech. The show tech-support command displays the output from the following
show commands, as listed in the order below:
• show platform
• show platform software status control-processor brief
• show platform resources
• show memory statistics history
• show memory allocating-process total
• show process memory sorted
Example
The following is sample output from the show tech-support command. Following are the excerpts
from /var/tech/ios file extracted from the admin-tech tar file which shows that the corresponding
command output is captured in admin-tech.
No log to display
Syntax Description
history Connection History and Index: Display the complete connection history or the connection
[index] history of a specific indexed item.
state state Connection State: Display connections with the specified state.
state can be up or down.
ip-address vBond Address: IP address of the vBond orchestrator or the DNS name that points to the
vBond orchestrator.
Command History
Release Modification
14.1 Command introduced.
Example
Related Topics
track-transport, on page 624
Syntax Description
vpn-id Specific VPN: Display keepalive information for GRE tunnels in a specific VPN.
Command History
Release Modification
15.4.1 Command introduced.
Example
REMOTE REMOTE
IF ADMIN OPER KA TX RX TX RX TX RX
VPN NAME SOURCE IP DEST IP STATE STATE ENABLED PACKETS PACKETS PACKETS PACKETS ERRORS ERRORS TRANSITIONS
----------------------------------------------------------------------------------------------------------------------------
0 gre1 10.0.5.11 172.168.1.1 up down true 0 0 370 0 0 0 0
0 gre2 10.0.5.11 172.168.122.11 up down true 0 0 644 0 0 0 0
Related Topics
keepalive, on page 357
show interface, on page 1032
show tunnel statistics, on page 1252
tunnel-destination, on page 633
tunnel-source, on page 640
Syntax Description
None Display information for all the IPsec connections that originate
on the vEdge router. The tunnel connections are listed in order
according to the local TLOC address.
Command History
Release Modification
14.1 Command introduced.
Example
Related Topics
show tunnel local-sa, on page 1251
show ipsec outbound-connections, on page 1087
Syntax Description
None Display information for all the IPsec tunnels that originate on the
router. The tunnel connections are listed in order according to the
local TLOC address.
tloc-address [color [spi [(auth-key-hash Specific SA: Display information for a specific security association.
| encrypt-key-hash | ip | port) ] ] ] ]
Command History
Release Modification
14.1 Command introduced.
Example
Related Topics
rekey, on page 533
request security ipsec-rekey, on page 881
show tunnel inbound-connections, on page 1250
show ipsec outbound-connections, on page 1087
Syntax Description
None Display statistics for all data plane tunnels, for both IPsec and GRE tunnels.
Note that the output fields are specific for IPsec, so for GRE tunnels, the
values for all fields are zero or empty.
dest-ip ip-addressdest-port Destination IP Address or Port: Display statistics for the specified destination
port-number address or destination port number.
source-ip Source IP Address or Port: Display statistics for the specified source address
ip-addresssource-port or source port number.
port-number
tunnel-protocol (gre | ipsec) Tunnel Protocol: Display tunnel statistics for either GRE or IPsec tunnels.
To display the count of data packets, use the show interface command. To
display the count of only GRE keepalive packets, use the show tunnel
gre-keepalives command.
Command History
Release Modification
14.1 Command introduced.
16.3.2 Added bfd option and display BFD hello and PMTU packet
statistics.
Example
Example 1
vEdge# show tunnel statistics
TCP
TUNNEL SOURCE DEST LOCAL REMOTE TUNNEL MSS
PROTOCOL SOURCE IP DEST IP PORT PORT SYSTEM IP COLOR COLOR MTU tx-pkts tx-octets rx-pkts rx-octets ADJUST
---------------------------------------------------------------------------------------------------------------------------------------
ipsec 10.1.15.15 10.0.5.11 12366 12366 172.16.255.11 lte lte 1441 31726 4895251 31723 5341408 1361
ipsec 10.1.15.15 10.0.5.21 12366 12366 172.16.255.21 lte lte 1441 31712 4896936 31712 5339686 1361
ipsec 10.1.15.15 10.1.14.14 12366 12366 172.16.255.14 lte lte 1441 31730 4899623 31727 5344598 1361
ipsec 10.1.15.15 10.1.16.16 12366 12366 172.16.255.16 lte lte 1441 31723 4895980 31723 5338796 1361
Example 2
vEdge# show tunnel statistics bfd
BFD BFD BFD BFD BFD BFD
ECHO ECHO BFD BFD PMTU PMTU PMTU PMTU
TUNNEL SOURCE DEST TX RX ECHO TX ECHO RX TX RX TX RX
PROTOCOL SOURCE IP DEST IP PORT PORT PKTS PKTS OCTETS OCTETS PKTS PKTS OCTETS OCTETS
-------------------------------------------------------------------------------------------------------------
ipsec 10.1.15.15 10.0.5.11 12366 12366 32284 32281 2663437 2663186 42 42 33220 31981
ipsec 10.1.15.15 10.0.5.21 12366 12366 32267 32267 2662031 2662024 45 45 37623 32407
ipsec 10.1.15.15 10.1.14.14 12366 12366 32283 32280 2663358 2663100 47 47 37917 35002
ipsec 10.1.15.15 10.1.16.16 12366 12366 32282 32282 2663265 2663265 41 41 34228 29273
Related Topics
clear tunnel statistics, on page 792
show interface, on page 1032
show system statistics, on page 1236
show tunnel gre-keepalives, on page 1249
Syntax Description
This command has no arguments or keywords.
Command History
Release Modification
Examples
The command displays a table with the registration details:
Column Description
show uptime
Show how long the system has been running. This command is the same as the UNIX uptime command.
show uptime
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Example
Related Topics
show system status, on page 1241
show users
Display the users currently logged in to the device.
show users
vManage Equivalent
For all Cisco vEdge devices:
Monitor > Network > Real Time > Users
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Example
Example
vEdge# show users
AUTH
SESSION USER CONTEXT FROM PROTO GROUP LOGIN TIME
--------------------------------------------------------------------------------
96 admin cli 10.0.1.1 ssh netadmin 2014-07-24T14:57:43+00:00
Related Topics
aaa, on page 43
request aaa unlock-user, on page 832
show version
Display the active version of the Cisco SD-WAN software running on the device.
show version
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Example
Example
vEdge# show version
15.3.3
Related Topics
request software install, on page 883
show vrrp
Display information about the configured VRRP interfaces and groups (on vEdge routers only).
show vrrp [interfaces interface-name] [groups group-number [vrrp-parameter] ]
show vrrp vpn vpn-id [interfaces interface-name] [groups group-number [vrrp-parameter] ]
Syntax Description
None: Display information about all VRRP interfaces and groups configured on
the local vEdge router, for all VPNs.
vpn vpn-id VPN: Refresh the dynamic ARP cache entries for the specific VPN.
groups group-number VRRP Group: Display information for a specific VRRP group.
groups group-number VRRP Parameter: Display information about a specific VRRP parameter in a
vrrp-parameter VRRP group. vrrp-parameter can be one of the following, which correspond to
the header fields in the show vrrp output:
• advertisement-timer [number]
• last-state-change-time [ccyy-mm-ddthh:mm:ss]
• master-down-timer [number]
• omp-state [down | up]
• prefix-list-state [resolved | unresolved]
• priority [number]
• track-prefix-list [prefix-list-name]
• virtual-ip [ip-address]
• virtual-mac [mac-address]
• vrrp-state [backup | init | master]
Command History
Release Modification
14.1 Command introduced.
Example
Example
vEdge# show vrrp
MASTER TRACK PREFIX
GROUP VIRTUAL VRRP OMP ADVERTISEMENT DOWN PREFIX LIST
VPN IF NAME ID IP VIRTUAL MAC PRIORITY STATE STATE TIMER TIMER LAST STATE CHANGE TIME LIST STATE
---------------------------------------------------------------------------------------------------------------------------------------------
2 ge0/6.1 2 10.2.2.4 00:0c:29:ab:b7:94 100 master up 1 3 2017-06-21T05:21:32+00:00 - unresolved
Related Topics
show interface, on page 1032
vrrp, on page 674
Syntax Description
vap-number Specific VAP: Display information about the clients connected to a specific virtual access point.
Command History
Release Modification
16.3 Command introduced.
Example
Example
Display information about all clients connected to all VAPs on the WLAN:
vEdge# show wlan clients
Related Topics
show interface, on page 1032
show wlan interfaces, on page 1261
show wlan radios, on page 1263
Note The show interface command displays no information about VAP interfaces.
detail Detailed VAP Interface Information: Display detailed information about the VAP interfaces.
vap-id Specific VAP: Display information about a specific virtual access point.
Command History
Release Modification
16.3 Command introduced.
Examples
Example 1
Display regular and detailed information about all the VAP interfaces on the WLAN:
vEdge# show wlan interfaces
MGMT ADMIN OPER NUM
VAP SSID BSSID DATA SECURITY SECURITY BAND MODE STATUS STATUS CLIENTS
-------------------------------------------------------------------------------------------------------------------
vap0 tb31_pm6_5ghz_vap0 80:b7:09:08:b7:6a none none 5 GHz 802.11ac Up Up 0
vap1 tb31_pm6_5ghz_vap1 80:b7:09:08:b7:6b wpa/wpa2-enterprise none 5 GHz 802.11ac Up Up 0
vap2 tb31_pm6_5ghz_vap2 80:b7:09:08:b7:6c wpa/wpa2-personal optional 5 GHz 802.11ac Up Up 8
vap3 tb31_pm6_5ghz_vap3 80:b7:09:08:b7:6d wpa2-enterprise optional 5 GHz 802.11ac Up Up 0
Example 2
Display information about a specific VAP:
vEdge# show wlan interfaces
vap1 :
IEEE 802.11ac 5 GHz SSID: test2
Admin status: Up, Oper status: Up
BSSID: 80:b7:09:01:39:0b
Related Topics
show interface, on page 1032
show wlan clients, on page 1260
show wlan radios, on page 1263
Syntax Description
radio-name Specific Radio: Display information about a specific radio and about a specific radio
[parameter] parameter. parameter can be one of the column heads in the output of the regular
show wlan radios command.
Command History
Release Modification
16.3 Command introduced.
Examples
Example 1
Display information about all WLAN radios:
vEdge# show wlan radios
Example 2
Display information about a specific radio:
vEdge# show wlan radios wifi0
wifi0 :
IEEE 802.11ac 5 GHz 80 MHz
MAC address: 80:b7:09:08:b7:6a
Channel: 36 Frequency: 5180 MHz
Regulatory country: United States
Guard interval: 400 ns
Number of VAPs: 4
Related Topics
show interface, on page 1032
show wlan clients, on page 1260
show wlan interfaces, on page 1261
Syntax Description
tag Tag Associated with a RADIUS Server: The tag can be from 4 through 16 characters long. You
configure it with the wlan interface vap number radius-servers tag command.
Command History
Release Modification
17.1 Command introduced.
Example
Example 1
Display information about the RADIUS servers that are being used for WLAN authentication:
vEdge# show wlan radius
vap1 :
Primary Server, Tag: tag_dummy1, IP: 10.20.24.15, VPN: 1
Priority: 0, Source interface:
Authentication information
Server Port: 1812, Active: true, Round trip time: 0
Access requests : 0, retransmissions : 0, challenges : 0
Access accepts : 0, rejects : 0, malformed responses : 0
Bad authenticators : 0, pending requests : 0, timeouts : 0
Unknown types : 0, packets dropped : 0
Accounting information
Server Port: 0, Active: false, Round trip time: 0
Requests : 0, retransmissions : 0, responses : 0
Bad authenticators : 0, pending requests : 0, timeouts : 0
Unknown types : 0, packets dropped : 0, malformed responses : 0
vap1 :
Secondary Server, Tag: tag1, IP: 10.20.24.113, VPN: 1
Priority: 0, Source interface:
Authentication information
Server Port: 1812, Active: false, Round trip time: 0
Access requests : 0, retransmissions : 0, challenges : 0
Access accepts : 0, rejects : 0, malformed responses : 0
Bad authenticators : 0, pending requests : 0, timeouts : 0
Unknown types : 0, packets dropped : 0
Accounting information
Server Port: 0, Active: false, Round trip time: 0
Requests : 0, retransmissions : 0, responses : 0
Related Topics
clear wlan radius-stats, on page 793
show interface, on page 1032
show wlan clients, on page 1260
show wlan interfaces, on page 1261
show wlan radios, on page 1263
Syntax Description
chassis-number number | organization-name Chassis Information: List the entries corresponding to the
name | root-cert-path path | validity (valid | specific chassis-related information.
invalid) | vbond-ip ip-address | vbond-port
number
row-index Table Row: List the ZTP entry corresponding to the
specified row number in the ZTP table.
Command History
Release Modification
15.3 Command introduced.
Example
Example 1
vBond# request device add chassis-number 12345 serial-number 6789 validity valid vbond
10.1.14.1 org-name viptela
Adding Chassis number 12345 to the database
Successfully added the chassis-number
Related Topics
request device, on page 847
request device-upload, on page 848
tcpdump
Print a description of the contents of control plane packets on a network interface that match a boolean
expression. This command is the same as the UNIX tcpdump command.
tcpdump [help] [interface interface-name] [options " unix-options "] [vpn vpn-id]
Syntax Description
interface interface-name Interface to Watch: Name of the interface on which to perform a TCP dump.
options " unix-options " Options: One or more of the UNIX tcpdump command options, from among
the following: [ –AbdDefhHIJKlLnNOpqStuUv] [–B size] [–c count] [–E
algorithm:secret] [–j timestamp-type] [–M secret] [–T type] [–y data-link-type]
[expression]
You must enclose unix-options in quotation marks.
For an explanation of the options, see http://www.tcpdump.org/tcpdump_
man.html.
vpn vpn-id VPN to Watch: VPN identifier in which the interface is located.
Command History
Release Modification
14.1 Command introduced.
Example
Example 1
vEdge# tcpdump vpn 1
tcpdump in vpn 1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ge0_0, link-type EN10MB (Ethernet), capture size 65535 bytes
19:29:49.765224 IP 10.2.2.11 > 224.0.0.5: OSPFv2, Hello, length 48
19:29:49.768263 IP 10.2.2.12 > 224.0.0.5: OSPFv2, Hello, length 48
^C
2 packets captured
2 packets received by filter
0 packets dropped by kernel
vEdge# tcpdump vpn 512 interface eth0 options "-v -n tcp port 22"
tcpdump -i eth0 -s 128 -v -n tcp port 22 in VPN 512
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 128 bytes
14:42:45.077442 IP (tos 0x10, ttl 64, id 50767, offset 0, flags [DF], proto TCP (6), length 184)
10.0.1.33.22 > 10.0.1.1.53312: Flags [P.], seq 3975104349:3975104481, ack 1536172049, win 218, options [nop,nop,TS val
82477842 ecr 561859671], length 132
14:42:45.077571 IP (tos 0x10, ttl 64, id 8995, offset 0, flags [DF], proto TCP (6), length 52)
10.0.1.1.53312 > 10.0.1.33.22: Flags [.], cksum 0x1648 (incorrect -> 0xe882), ack 132, win 372, options [nop,nop,TS val
561859682 ecr 82477842], length 0
14:42:45.121925 IP (tos 0x10, ttl 64, id 50768, offset 0, flags [DF], proto TCP (6), length 632)
...
timestamp
Control the inclusion of timestamp information in command output and logging files.
timestamp (disable | enable)
Syntax Description
disable Disable Timestamp Information: Disable the inclusion of timestamp information. This is the default.
Command History
Release Modification
14.1 Command introduced.
Example
Example 1
vEdge# timestamp enable
vEdge# timestamp disable
Tue Feb 18 19:09:37.112 UTC
vEdge# timestamp enable
vEdge#
Related Topics
show clock, on page 972
tools ip-route
Display IP routes and the routing cache. This command is effectively the standard Linux ip-route command.
tools ip-route
Syntax Description
None
Command History
Release Modification
16.1 Command introduced.
Example
Example 1
vEdge# tools ip-route
default via 10.0.5.13 dev eth1 proto zebra
10.0.1.0/24 dev eth0 proto kernel scope link src 10.0.1.19
10.0.5.0/24 dev eth1 proto kernel scope link src 10.0.5.19
172.16.255.11 via 127.0.1.254 dev tun_0_0 src 172.16.255.19
172.16.255.14 via 127.0.1.253 dev tun_1_0 src 172.16.255.19
172.16.255.15 via 127.0.1.254 dev tun_0_0 src 172.16.255.19
172.16.255.16 via 127.0.1.253 dev tun_1_0 src 172.16.255.19
172.16.255.20 via 127.0.1.254 dev tun_0_0 src 172.16.255.19
172.16.255.21 via 127.0.1.254 dev tun_0_0 src 172.16.255.19
Related Topics
show ip routes, on page 1076
tools iperf
Run tests to display various parameters related to timing, buffers, and the TCP and UDP protocols for IPv4
and IPv6 (on vEdge routers only). This command is similar to the standard iperf command.
tools iperf [options options] [vpn vpn-id]
tools iperf help
Syntax Description
options options Command Options: See the Example Output below for a list of all the tools iperf
command options.
Command History
Release Modification
17.1 Command introduced.
Example
Example 1
vEdge# tools iperf helpUSAGE:
Options:
help Show usage
vpn VPN or namespace
options iperf options
Client/Server:
-f, --format [kmKM] format to report: Kbits, Mbits, KBytes, MBytes
-i, --interval # seconds between periodic bandwidth reports
-l, --len #[KM] length of buffer to read or write (default 8 KB)
-m, --print_mss print TCP maximum segment size (MTU - TCP/IP header)
-o, --output <filename> output the report or error message to this specified file
-p, --port # server port to listen on/connect to
-u, --udp use UDP rather than TCP
-w, --window #[KM] TCP window size (socket buffer size)
-B, --bind <host> bind to <host>, an interface or multicast address
-C, --compatibility for use with older versions does not sent extra msgs
-M, --mss # set TCP maximum segment size (MTU - 40 bytes)
-N, --nodelay set TCP no delay, disabling Nagle's Algorithm
-V, --IPv6Version Set the domain to IPv6
Server specific:
Client specific:
-b, --bandwidth #[KM] for UDP, bandwidth to send at in bits/sec
(default 1 Mbit/sec, implies -u)
-c, --client <host> run in client mode, connecting to <host>
-d, --dualtest Do a bidirectional test simultaneously
-n, --num #[KM] number of bytes to transmit (instead of -t)
-r, --tradeoff Do a bidirectional test individually
-t, --time # time in seconds to transmit for (default 10 secs)
-F, --fileinput <name> input the data to be transmitted from a file
-I, --stdin input the data to be transmitted from stdin
-L, --listenport # port to receive bidirectional tests back on
-P, --parallel # number of parallel client threads to run
-T, --ttl # time-to-live, for multicast (default 1)
-Z, --linux-congestion <algo> set TCP congestion control algorithm (Linux only)
Miscellaneous:
-x, --reportexclude [CDMSV] exclude C(connection) D(data) M(multicast) S(settings)
V(server) reports
-y, --reportstyle C report as a Comma-Separated Values
-h, --help print this message and quit
-v, --version print version information and quit
The TCP window size option can be set by the environment variable
TCP_WINDOW_SIZE. Most other options can be set by an environment variable
IPERF_<long option name>, such as IPERF_BANDWIDTH.
Determine the data transfer rate and bandwidth available between two vEdge routers. Set up the
client side:
Client-vEdge# tools iperf vpn 0 options -s
option_list, -s
arg list, -s
iperf -s in VPN 0
------------------------------------------------------------
Server listening on TCP port 5001
TCP window size: 85.3 KByte (default)
------------------------------------------------------------
View the output and terminate the test on the client vEdge router:
[ 5] local 172.16.255.13 port 5001 connected with 10.0.12.26 port 54421
[ ID] Interval Transfer Bandwidth
[ 5] 0.0-10.1 sec 239 MBytes 200 Mbits/sec
^CClient-vEdge#
Related Topics
ping, on page 821
tools nping, on page 1278
tools ss, on page 1282
tools minicom
Connect to the serial console through USB ports (on vEdge 1000, vEdge 2000, and vEdge 5000 routers only).
This command is effectively the standard Linux minicom command.
tools minicom options options
tools minicom help
Syntax Description
options Command Options: See the Linux minicom man page for a list of all the tools minicom
options command options.
Command History
Release Modification
17.1 Command
introduced.
Example
Example 1
Access the serial console of a remote device through the USB port on a vEdge 1000 router:
1. Connect the USB port of a vEdge 1000 or vEdge 200 router to a console port, either on the router
or another device.
2. Exit from the CLI to the router's shell:
vEdge1000# vshell
6. Press Ctrl-a and z, set up the port with the minicom tool, and save the configuration.
Related Topics
console-baud-rate, on page 189
tools netstat
Display information about network connections, routing tables, interface statistics, masquerading connections,
and multicast memberships. This command is effectively the standard Linux netstat command.
tools netstat [options options] [vpn vpn-id]
tools netstat help
Syntax Description
options options Command Options: See the Example Output below for a list of all the tools netstat
command options.
Command History
Release Modification
15.4.5 Command introduced.
Examples
Example 1
vEdge# tools netstat help
USAGE:
Options:
help Show usage
vpn VPN or namspace
options Netstat options
Example 2
vEdge# tools netstat vpn 512 options -anr
Netstat -anr in VPN 512
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.0.99.0 0.0.0.0 255.255.255.0 U 0 0 0 mgmt0
127.1.0.0 0.0.0.0 255.255.255.0 U 0 0 0 loop0.2
vEdge# tools netstat options -anr
Netstat -anr in VPN 0
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.0.100.0 0.0.0.0 255.255.255.0 U 0 0 0 ge1_7
127.1.0.0 0.0.0.0 255.255.255.0 U 0 0 0 loop0
127.1.1.0 0.0.0.0 255.255.255.0 U 0 0 0 loop1
Example 3
vEdge# tools netstat
Netstat in VPN 0
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 localhost.localdo:39339 localhost.localdom:2424 TIME_WAIT
tcp 0 0 localhost.localdo:39173 localhost.localdom:2424 TIME_WAIT
tcp 0 0 localhost.localdoma:iax localhost.localdo:55613 TIME_WAIT
tcp 0 0 localhost.localdo:39100 localhost.localdom:2424 TIME_WAIT
tcp 0 0 localhost.localdo:39299 localhost.localdom:2424 TIME_WAIT
tcp 0 0 localhost.localdo:51278 localhost.localdom:9300 ESTABLISHED
tcp 0 0 localhost.localdo:60695 localhost.localdom:4565 ESTABLISHED
tcp 0 0 localhost.localdo:39133 localhost.localdom:2424 TIME_WAIT
tcp 0 0 localhost.localdo:50682 localhost.localdom:9300 ESTABLISHED
Related Topics
ping, on page 821
tools nping, on page 1278
tools ss, on page 1282
tools nping
Generate network packets, analyze responses, and measure response times. This command is effectively the
standard Linux nping command.
nping generates network packets of different protocols. You can use the command as a simple ping utility to
detect active hosts, and you can use it to generate raw packets to perform network stack stress tests, ARP
poisoning, denial-of-service attacks, route tracing, among other things.
Nping echo mode displays how generated probes change in transit so that you can track differences between
transmitted and received packets.
tools nping (hostname | ip-address) [options options] [vpn vpn-id]
tools nping help
Syntax Description
options options Command Options: See the Example Output below for a list of all the tools nping
command options.
hostname | Host To Check Connectivity To: Name or IP address of host to check connectivity to.
ip-address
vpn vpn-id Specific VPN: Run the command in a specific VPN.
Default: VPN 0
Command History
Release Modification
16.1 Command introduced.
Example
Example 1
vEdge# tools nping help
USAGE:
Options:
help Show usage
vpn VPN or namspace
options Nping options
Nping in VPN 0
Nping 0.6.47 ( http://nmap.org/nping )
Usage: nping [Probe mode] [Options] {target specification}
TARGET SPECIFICATION:
Targets may be specified as hostnames, IP addresses, networks, etc.
Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.*.1-24
PROBE MODES:
--tcp-connect : Unprivileged TCP connect probe mode.
--tcp : TCP probe mode.
--udp : UDP probe mode.
--icmp : ICMP probe mode.
--arp : ARP/RARP probe mode.
--tr, --traceroute : Traceroute mode (can only be used with
TCP/UDP/ICMP modes).
TCP CONNECT MODE:
-p, --dest-port <port spec> : Set destination port(s).
-g, --source-port <portnumber> : Try to use a custom source port.
TCP PROBE MODE:
-g, --source-port <portnumber> : Set source port.
-p, --dest-port <port spec> : Set destination port(s).
--seq <seqnumber> : Set sequence number.
--flags <flag list> : Set TCP flags (ACK,PSH,RST,SYN,FIN...)
--ack <acknumber> : Set ACK number.
--win <size> : Set window size.
--badsum : Use a random invalid checksum.
UDP PROBE MODE:
-g, --source-port <portnumber> : Set source port.
-p, --dest-port <port spec> : Set destination port(s).
--badsum : Use a random invalid checksum.
ICMP PROBE MODE:
--icmp-type <type> : ICMP type.
--icmp-code <code> : ICMP code.
--icmp-id <id> : Set identifier.
--icmp-seq <n> : Set sequence number.
--icmp-redirect-addr <addr> : Set redirect address.
--icmp-param-pointer <pnt> : Set parameter problem pointer.
--icmp-advert-lifetime <time> : Set router advertisement lifetime.
--icmp-advert-entry <IP,pref> : Add router advertisement entry.
--icmp-orig-time <timestamp> : Set originate timestamp.
--icmp-recv-time <timestamp> : Set receive timestamp.
--icmp-trans-time <timestamp> : Set transmit timestamp.
ARP/RARP PROBE MODE:
--arp-type <type> : Type: ARP, ARP-reply, RARP, RARP-reply.
--arp-sender-mac <mac> : Set sender MAC address.
--arp-sender-ip <addr> : Set sender IP address.
--arp-target-mac <mac> : Set target MAC address.
--arp-target-ip <addr> : Set target IP address.
IPv4 OPTIONS:
-S, --source-ip : Set source IP address.
--dest-ip <addr> : Set destination IP address (used as an
alternative to {target specification} ).
--tos <tos> : Set type of service field (8bits).
--id <id> : Set identification field (16 bits).
--df : Set Don't Fragment flag.
--mf : Set More Fragments flag.
--ttl <hops> : Set time to live [0-255].
--badsum-ip : Use a random invalid checksum.
--ip-options <S|R [route]|L [route]|T|U ...> : Set IP options
--ip-options <hex string> : Set IP options
--mtu <size> : Set MTU. Packets get fragmented if MTU is
small enough.
IPv6 OPTIONS:
-6, --IPv6 : Use IP version 6.
--dest-ip : Set destination IP address (used as an
alternative to {target specification}).
--hop-limit : Set hop limit (same as IPv4 TTL).
--traffic-class <class> : : Set traffic class.
--flow <label> : Set flow label.
ETHERNET OPTIONS:
--dest-mac <mac> : Set destination mac address. (Disables
ARP resolution)
--source-mac <mac> : Set source MAC address.
--ether-type <type> : Set EtherType value.
PAYLOAD OPTIONS:
--data <hex string> : Include a custom payload.
--data-string <text> : Include a custom ASCII text.
--data-length <len> : Include len random bytes as payload.
ECHO CLIENT/SERVER:
--echo-client <passphrase> : Run Nping in client mode.
--echo-server <passphrase> : Run Nping in server mode.
--echo-port <port> : Use custom <port> to listen or connect.
--no-crypto : Disable encryption and authentication.
--once : Stop the server after one connection.
--safe-payloads : Erase application data in echoed packets.
TIMING AND PERFORMANCE:
Options which take <time> are in seconds, or append 'ms' (milliseconds),
's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m, 0.25h).
--delay <time> : Adjust delay between probes.
--rate <rate> : Send num packets per second.
MISC:
-h, --help : Display help information.
-V, --version : Display current version number.
-c, --count <n> : Stop after <n> rounds.
-e, --interface <name> : Use supplied network interface.
-H, --hide-sent : Do not display sent packets.
-N, --no-capture : Do not try to capture replies.
--privileged : Assume user is fully privileged.
--unprivileged : Assume user lacks raw socket privileges.
--send-eth : Send packets at the raw Ethernet layer.
--send-ip : Send packets using raw IP sockets.
--bpf-filter <filter spec> : Specify custom BPF filter.
OUTPUT:
-v : Increment verbosity level by one.
-v[level] : Set verbosity level. E.g: -v4
-d : Increment debugging level by one.
-d[level] : Set debugging level. E.g: -d3
-q : Decrease verbosity level by one.
-q[N] : Decrease verbosity level N times
--quiet : Set verbosity and debug level to minimum.
--debug : Set verbosity and debug to the max level.
EXAMPLES:
nping scanme.nmap.org
nping --tcp -p 80 --flags rst --ttl 2 192.168.1.1
nping --icmp --icmp-type time --delay 500ms 192.168.254.254
nping --echo-server "public" -e wlan0 -vvv
nping --echo-client "public" echo.nmap.org --tcp -p1-1024 --flags ack
SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES
Related Topics
ping, on page 821
tools netstat, on page 1276
traceroute, on page 1287
tools ss
Display socket statistics for a Cisco vEdge device. This command is effectively the standard Linux ss
command. The output of the tools ss command is similar to the output of the tools netstat command, but
more state and TCP information is displayed.
tools ss [options options] [vpn vpn-id]
tools ss help
Syntax Description
options options Command Options: See the Example Output below for a list of all the tools netstat
command options.
Command History
Release Modification
16.2 Command introduced.
Examples
Example 1
vEdge# tools ss help
USAGE:
Options:
help Show usage
vpn VPN or namespace
options ss options
Example 2
vEdge# tools ss vpn 512
ss in VPN 512
Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port
u_dgr ESTAB 0 0 * 25172 * 0
u_dgr ESTAB 0 0 * 33267 * 0
u_dgr ESTAB 0 0 * 38346 * 0
u_dgr ESTAB 0 0 * 44878 * 0
u_dgr ESTAB 0 0 * 45056 * 0
u_dgr ESTAB 0 0 * 443913 * 0
u_dgr ESTAB 0 0 * 443914 * 0
u_dgr ESTAB 0 0 * 444218 * 0
u_str ESTAB 0 0 * 25494 * 0
u_str ESTAB 0 0 /var/run/quagga/zebra_protobuf_monitor.api.512 25495 * 0
Related Topics
tools netstat, on page 1276
tools stun-client
Discover the local device's external IP address when that device is located behind a NAT device. This command
obtains a port mapping for the device and optionally discovers properties about the Network Address Translator
(NAT) between the local device and a server. This command is similar to a standard Linux stun , stunc ,
and stun-client commands.
Device discovery is done using the Session Traversal Utilities for NAT (STUN) protocol, which is defined
in RFC 5389 .
tools stun-client [options options] server (domain-name | ip-address) [port port-number] [vpn vpn-id]
tools stun-client help
Syntax Description
options options Command Options: See the Example Output below for a list of all the
tools stun-client command options.
server (domain-name | ip-address) Remote STUN Server: Remote server to attach to, and port to use to
[port port-number] reach the server. The default port number for UDP and TCP is 3478.
Command History
Release Modification
16.2 Command introduced.
Examples
Example 1
Perform a generic basic binding STUN test against Googles STUN server:
vEdge# tools stun-client vpn 0 options "--mode basic stun.l.google.com 19302"
stunclient --mode basic stun.l.google.com 19302 in VPN 0
Binding test: success
Local address: 50.247.64.109:56485
Mapped address: 50.247.64.109:56485
Example 2
Perform a full test to detect NAT type against Google's STUN server:
vEdge# tools stun-client vpn 0 options "--mode full stun.l.google.com 19302"
stunclient --mode full stun.l.google.com 19302 in VPN 0
Binding test: success
Example 3
Perform a full NAT detection test using UDP source port 12346 (the default DTLS/IPsec port) against
Google's STUN server:
vEdge# tools stun-client vpn 0 options "--mode full --localport 12346 stun.l.google.com
19302"
stunclient --mode full --localport 12346 stun.l.google.com 19302 in VPN 0
Binding test: success
Local address: 50.247.64.109:12346
Mapped address: 50.247.64.109:12346
Behavior test: success
Nat behavior: Direct Mapping
Filtering test: success
Nat filtering: Endpoint Independent Filtering
Example 4
Display help for the tools stun-client command:
vEdge# tools stun-client help
...
The following options are supported:
--mode MODE
--localaddr INTERFACE
--localport PORTNUMBER
--family IPVERSION
--protocol PROTO
--verbosity LOGLEVEL
--help
--localport PORTNUM
PORTNUM is a value between 1 to 65535. It is the UDP or TCP port that the primary and
alternate interfaces listen on as the primary port for binding requests. If not specified,
the
system randomly chooses an available port.
--family IPVERSION
IPVERSION is either "4" or "6" to specify the usage of IPv4 or IPv6. The default value is
"4".
--verbosity LOGLEVEL
Set the logging verbosity level. 0 is the default, for minimal output and logging). 1 shows
slightly more, and 2 and higher show even more.
EXAMPLES
traceroute
Display the path that packets take to reach a host or IP address on the network.
traceroute interface interface-name [size bytes] [options options] (hostname | ip-address)
traceroute vpn vpn-id [interface interface-name] [size bytes] [options " options "] (hostname | ip-address)
Syntax Description
interface Interface: Interface through which traceroute probe should send packets.
interface-name
(hostname | Network Host: Hostname or IPv4 or IPv6 address of a system on the network.
ip-address)
options " options Options: One or more options for the traceroute probe. option can be one or more of
" the following. Enclose the options in quotation marks (" ").
• –d: Set the SO_DEBUG options to socket.
• –f first-ttl: Report the traceroute probe results starting with the specified hop in
the path.
• –g gateway: Add an IP source route gateway to the outgoing packet.
• –I (capital letter "i"): Use ICMP echo packets instead of UDP datagrams.
• –i (lowercase letter "i") interface-name: Network interface from which to obtain
the source IP address for outgoing traceroute probe packets.
• –m maximum-ttl: Set the maximum time-to-live value, which is the maximum
number of hops.
• –n: Print numeric IP addresses.
• –p port: Base UDP port number to use in traceroute probes. The default port is
33434.
• –q probes: Number of probes to send per TTL. The default is 3.
• –r: Bypass the normal route tables, and send the traceroute probe directly to a host.
• –s source-ip-address: Source IP address to use in the probe packets.
• –t tos: Type-of-service value to use in the probe packets. The default is 0.
• –v: Display output in verbose mode.
• –w wait-time: Time, in seconds, to wait for a response. The default is 3 seconds.
• –z pause-time: Time, in milliseconds, to pause between probes. The default is 0
milliseconds.
size bytes Probe Packet Size: Size of the traceroute probe packets, in bytes. The maximum packet
size is 32,768 bytes.
Command History
Release Modification
14.1 Command introduced.
Usage Guidelines When a traceroute packet inside a service VPN arrives on the WAN interface:
• The Cisco vEdge device responds with a source IP of one of the interfaces in the service VPN.
• The Cisco IOS XE SD-WAN device responds with a source IP of the WAN interface where the packet
is received.
Examples
Example 1
vEdge-112# traceroute vpn 1 192.168.111.30
Traceroute in vpn 1
traceroute to 192.168.111.30 (192.168.111.30), 30 hops max, 46 byte packets
1 172.23.2.2 (172.23.2.2) 0.171 ms 0.196 ms 0.126 ms
2 100.100.100.11 (100.100.100.11) 0.128 ms 0.197 ms 0.127 ms
3 100.100.100.12 (100.100.100.12) 0.165 ms 0.194 ms 0.146 ms
4 172.23.111.2 (172.23.111.2) 0.218 ms 0.227 ms 0.214 ms
5 192.168.111.30 (192.168.111.30) 1.173 ms 0.824 ms 1.239 ms
Example 2
vEdge# traceroute host 10.2.3.12 size 1000 vpn 1 options "-q1 -w1 -m5"
Traceroute -q1 -w1 -m5 10.2.3.12 in VPN 1
traceroute to 10.2.3.12 (10.2.3.12), 5 hops max, 1000 byte packets
1 10.20.24.15 (10.20.24.15) 0.254 ms
2 10.0.5.21 (10.0.5.21) 1.318 ms
3 10.2.3.12 (10.2.3.12) 1.310 ms
Related Topics
ping, on page 821
show interface, on page 1032
show ipv6 interface, on page 1093
tools nping, on page 1278
vshell
Exit from the Cisco SD-WAN CLI to the Linux shell running on the device. In the shell, the default terminal
is xterm.
Use the UNIX exit command to return to the CLI. If the shell session is inactive, it times out after 15 minutes,
and the device returns to the Cisco SD-WAN CLI.
Once you are in the shell, you can use standard Linux commands to perform standard operations, such as
listing files, changing directories, and copying files off the device. To edit a file, use the vi editor.
vshell
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Example
Example 1
vEdge# show version
15.4.3
vEdge# vshell
vEdge$ echo $TERM
xterm
vEdge:~$ exit
exit
vEdge#
To open an SSH connection from a vManage NMS to an IOS XE router, you must specify the port
number, which is 830:
vManage# vshell
vManage:~$ ssh 172.16.255.15 -p 830
admin@172.16.255.15's password:
Related Topics
exit, on page 806
quit, on page 829
request execute, on page 851
clear Clear all changes made to the configuration during the current session.
commit Activate the commands in the configuration on the Cisco vEdge device
and make it the running configuration.
exit Exit from the current mode in the configuration, or exit configuration
mode altogether.
revert Copy the running configuration into the current candidate configuration.
show configuration Display changes that have been made to the configuration during the
current editing session.
show configuration commit Display the configuration changes that took effect as the result of a
previous commit operation.
show configuration diff Display changes that have been made to the configuration during the
current editing session.
show configuration merge Display a combination of the running and target configurations.
show configuration rollback Compare the current target configuration to the configuration in a
previously committed version, and display the differences.
show full-configuration Display the current configuration, which is a combination of the running
and candidate configurations.
show history Display the history of the commands issued in the current configuration
session.
abort
Exit configure mode immediately, without displaying a prompt warning you to save uncommitted changes.
abort
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1(config)# abort
vedge1#
Related Topics
clear, on page 1296
commit, on page 1297
rollback, on page 1309
clear
Clear all changes made to the configuration during the current session.
clear
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vvedge1(config)# clear
All configuration changes will be lost. Proceed? [yes, NO] yes
vedge1(config)#
Related Topics
abort, on page 1295
rollback, on page 1309
commit
Activate the commands in the configuration on the Cisco vEdge device and make it the running configuration.
You issue this commit command from configuration mode.
commit (abort | and-quit | check | confirmed [timeout] [persist] | no-confirm) [comment text] [label text]
[persist-id id] [save-running filename]
Syntax Description
None: Activate the commands in the configuration and remain at the same hierarchy
in configuration mode.
comment text Add a text comment about the commit operation. If the text string contains spaces,
enclose the entire string in quotation marks (" "). Any comments are display in the
output of the show configuration commit list command.
label text Add a text label that describes the commit operation. If the text string contains spaces,
enclose the entire string in quotation marks (" "). Any labels are display in the output
of the show configuration commit list command.
and-quit Exit from Configuration Mode: Active the configuration and return to operational mode.
confirmed Provisional Commit Operation: Commit the current configuration to the running
[timeout] [persist] configuration. If no commit confirm command is issued before the timeout period,
specified in minutes, expires, the configuration reverts to what was active before the
commit confirmed command was issued. The default timeout is 10 minutes. The
configuration session terminates after you issue this command, because no further
editing is possible. This command is available only in configure exclusive and
configure shared mode when the system has been configured with a candidate
configuration. If the CLI session is terminated before the commit confirm command
is issued, the configuration reverts to the previously active configuration. If you include
the persist option, you can terminate the CLI session before you issue the commit
confirm command, and you can then confirm the pending commit in a later session
by supplying the persist token as an argument to the commit command using the
persist-id option.
persist-id id Persist Token: If a prior confirming commit operation has been performed with the
persist argument, include the persist-id option, specifying the same persist token, to
modify the ongoing confirming commit process. This allows you, for example, to abort
an ongoing persist commit operation or extend the timeout.
save-running Save the Configuration to a File: Save a text copy of the running configuration to the
filename specified file.
check Validate the Configuration: Validate current configuration and indicate any configuration
errors.
Command History
Release Modification
14.1 Command introduced.
Example
Example 1
vedge1(config-system)# commit and-quit
Commit complete.
vedge1#
Related Topics
commit, on page 795
show configuration commit list, on page 977
validate, on page 1324
describe
Display internal information about how a configuration command is implemented.
describe command
Syntax Description
command Information about a Command: Display internal information about a command's implementation.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vm4(config)# describe vpn
Common
Source : YANG
Module : viptela-vpn
Namespace : http://viptela.com/vpn
Path : /vpn
Node : container
Revision : 2013-02-12
Exported agents : all
Checksum : 5b30372a4dedcad2a01633f79395720
Related Topics
show parser dump, on page 1177
do
Run an operational command from within configuration mode.
do command
Syntax Description
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1(config-vpn-0)# do show version
14.0b 20131206-2 build 52
vedge1(config)#
Related Topics
Overview of Operational Commands, on page 715
end
Exit configuration mode.
end [no-confirm]
Syntax Description
None: If no changes have been made to the configuration, exit configuration mode immediately.
If changes have been made, you are asked to save the changes before existing configuration
mode.
no-confirm Exit Immediately: Exit configuration mode immediately, without committing an changes to the
configuration.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1(config-banner)# end
Uncommitted changes found, commit them? [yes/no/CANCEL] no
vedge1#
Related Topics
abort, on page 1295
exit, on page 1302
exit
Exit from the current mode in the configuration, or exit configuration mode altogether.
exit [configuration-mode] [level] [no-confirm]
Syntax Description
None: Exit from the current level in the configuration, and move up one hierarchy
level.
configuration-mode Exit Configuration Mode: If changes have been made to the configuration, you are
prompted to commit them.
no-confirm Exit Configuration Mode Immediately: Exit configuration mode immediately, without
being prompted to commit any changes to the configuration.
level Exit the Current Level: Exit from the current level in the configuration, and move up
one hierarchy level. This is the default behavior if you type the exit command with no
options.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1(config)# vpn 0 interface ge0/0
vedge1(config-interface-ge0/0)# exit
vedge1(config-vpn-0)#vedge1(config-banner)# exit configuration-mode
Uncommitted changes found, commit them? [yes/no/CANCEL] no
vedge1#
Related Topics
end, on page 1301
help
Display help information about a command.
help command
Syntax Description
command Help about a Command: Display short help information about a command.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1(config)# help banner
Help for command: banner
Set banners
Related Topics
show parser dump, on page 1322
show parser dump, on page 1177
load
Load the configuration from a file.
load (merge | override | replace) file-path
Syntax Description
file-path File Path: Path to the directory and filename of the file containing the configuration. It
can be one of the following:
• ftp:// user:password@host:port/file-path—Path to a file on an FTP server.
• scp:// user @ host : file-path
• / file-path / filename—Path to a file on the local Cisco vEdge device.
merge file-path Merge with the Existing Configuration: Merge the configuration in the specified file with
the current configuration.
override Override the Existing Configuration: Delete the current configuration and then replace
file-path it with a new configuration, which is loaded from the specified file.
replace file-path Replace the Existing Configuration: Replace the corresponding parts of the current
configuration with the contents of the specified file. This option differs from the override
option in that only the parts of the configuration contained in the specified file are replaced.
The rest of the configuration is unchanged.
Note load override and load merge is not supported on Cisco IOS XE devices.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Load the configuration from a file on the router:
vm4(config)# load replace test-configuration-file
Loading.
1.18 KiB parsed in 0.09 sec (12.05 KiB/sec)
vm4(config)#
Related Topics
file list, on page 807
rollback, on page 1309
save, on page 1311
no
Delete or unset a configuration command or parameter.
no command
Syntax Description
command Delete or Unset a Command: Delete or unset the specified command from the configuration.
Command History
Release Modification
14.1 Command
introduced.
Examples
Example 1
Delete the login banner from the configuration:
vm4(config)# banner login "Welcome to vEdge4"
vm4(config-banner)# commit and-quit
Commit complete.
vm4# show running-config banner
banner
login "Welcome to vEdge4"
!
vm4# config
Entering configuration mode terminal
vm4(config)# no banner login
vm4(config)# commit and-quit
Commit complete.
vm4# show running-config banner
% No entries found.
Example 2
Enable the operation of an interface:
vm4# show running-config vpn 0 interface ge0/7vpn 0
interface ge0/7
ip address 10.0.100.14/24
no shutdown
!
!
Related Topics
Overview of Configuration Commands, on page 42
pwd
Display the current path in the configuration hierarchy.
pwd
Syntax Description
None
Command History
Release Modification
14.1 Commad
introduced.
Example
Example 1
vedge1(config)# pwd
At top level
vedge1(config)# vpn 0 interface ge0/0
vedge1(config-interface-ge0/0)# pwd
Current submode path:
vpn vpn-instance 0 \ interface ge0/0
vedge1(config-interface-ge0/0)#
Related Topics
exit, on page 1302
top, on page 1323
revert
Copy the running configuration into the current candidate configuration.
revert [no-confirm]
Syntax Description
None: Copy the running configuration into the current candidate configuration, thus losing all
configuration changes that have been made during this session. You are prompted to confirm
this action.
no-confirm Return to the Running Configuration Immediately: Immediately copy the running configuration
into the current candidate configuration, thus losing all configuration changes that have been
made during this session. You are not prompted to confirm this action.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1(config)# revert
% No configuration changes.
vedge1(config)# no banner
vedge1(config)# revert
All configuration changes will be lost. Proceed? [yes, NO] no
Aborted: by user
vedge1(config)#
Related Topics
load, on page 1304
rollback, on page 1309
rollback
Return to a previously committed configuration.
rollback (configuration [number] | selective number)
Syntax Description
rollback Return to the Previously Committed Configuration: Return to the most recently
configuration committed configuration. You are not prompted to confirm this action, and you lose
all configuration changes that have been made during this session.
Command History
Release Modification
14.1 Command
introduced.
Examples
Example 1
Roll back to the last two sets of configuration changes:
vsmart(config)# do show running-config policy
% No entries found.
vsmart(config)# policy lists site-list s site-id 10
vsmart(config-site-list-s)# commit
Commit complete.
config# do show running-config policy
policy
lists
site-list s
site-id 10
!
!
!vsmart(config-lists)# vpn-list v vpn 1
vsmart(config-vpn-list-v)# commit
Commit complete.
vsmart(config-vpn-list-v)#
vsmart(config)# do show running-config policy
policy
lists
vpn-list v
vpn 1
!
site-list s
site-id 10
!
!
!
vsmart(config)# rollback configuration
Possible completions:
0 2013-12-12 12:01:05 by admin via cli
1 2013-12-12 12:00:50 by admin via cli
<cr> latest
vsmart(config)# rollback configuration 1 ========> rollback 0 and 1 are applied
vsmart(config)# show configuration
policy
lists
no vpn-list v
no site-list s
!
!
Example 2
Roll back to only the second previous configuration:
vsmart(config)# clear
All configuration changes will be lost. Proceed? [yes, NO] yes
vsmart(config)# show configuration
% No configuration changes found.
vsmart(config)# rollback selective
Possible completions:
0 2013-12-12 12:01:05 by admin via cli
1 2013-12-12 12:00:50 by admin via cli
<cr> latest
vsmart(config)# rollback selective 1 ==========> Only rollback 1 applied
vsmart(config)# top show configuration
policy
lists
no site-list s
!
!
Related Topics
load, on page 1304
revert, on page 1308
save
Save the entire current configuration or parts of it to a file.
save file-path[hierarchy] [overwrite]
Syntax Description
file-path File Path: Path to the directory and filename of the file containing the
configuration. It can be one of the following:
• ftp: file-path—Path to a file on an FTP server.
• scp: user @ host : file-path.
• / file-path / filename—Path to a file on the local Cisco vEdge device.
save filename Save the Entire Configuration: Save the entire configuration to a file.
save filename hierarchy Save a Portion of the Configuration: Save the specified configuration hierarchy
to a file.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Save the configuration to a file:
vedge1(config)# save config-system system
Saving system
vedge1(config)# do file show config-system
system
host-name vedge1
system-ip 172.16.255.1
domain-id 1
site-id 1
clock timezone America/Los_Angeles
vbond 10.0.14.4
aaa
auth-order local radius
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password $1$zvOh58pk$QLX7/RS/F0c6ar94.xl2k.
!
user eve
password $1$aLEJ6jve$aBpPQpkl3h.SvA2dt4/6E/
group operator
!
!
logging
disk
enable
!
!
!
Related Topics
file list, on page 807
file show, on page 808
load, on page 1304
show configuration
Display changes that have been made to the configuration during the current editing session. The changes are
displayed is the same format as the configuration is displayed when you issue a show full-configuration
configuration command or a show running-config operational command.
show configuration [hierarchy]
Syntax Description
hierarchy Specific Hierarchy: Show all the changes in a specific configuration hierarchy.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display all configuration changes:
vm4(config)# banner motd "Welcome to vEdge4"
vm4(config-banner)# top
vm4(config)# show configuration
banner
motd "Welcome to vEdge4"
!
Related Topics
show configuration commit, on page 1314
show configuration diff, on page 1316
show configuration merge, on page 1317
show configuration running, on page 1319
show full-configuration, on page 1320
Syntax Description
(rollback-number | latest) Configuration Changes Since a Specific Commit: List the configuration
changes since a specific commit operation. rollback-number is the commit
identifier. latest is the last commit operation. The changes are displayed is
the same format as the configuration is displayed when you issue a show
full-configuration configuration command or a show
running-config operational command.
diff (rollback-number | latest) Configuration Changes Since a Specific Commit, in Diff Format: List the
configuration changes since a specific commit operation. rollback-number is
the commit identifier. latest is the last commit operation. The changes are
displayed is a UNIX diff-style format.
list [number] Show the Configuration Commit History: List the commit identifiers and
information about the previous commit operations.
Command History
Release Modification
14.1 Command
introduced.
Examples
Example 1
Display configuration changes:
vm4(config)# show configuration commit changes diff 1
+banner
+ login "Welcome to vEdge4"
+!
vm4(config)# show configuration commit changes 1
banner
login "Welcome to vEdge4"
!
Example 2
List an abridged commit history:
Related Topics
show configuration, on page 1313
show configuration diff, on page 1316
show configuration merge, on page 1317
show configuration running, on page 1319
show full-configuration, on page 1320
Syntax Description
hierarchy Specific Hierarchy: Show all the changes in a specific configuration hierarchy.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display all configuration changes:
vm4(config)# show configuration diff
banner
+ login "Welcome to vEdge4"
!
Related Topics
show configuration, on page 1313
show configuration commit, on page 1314
show configuration rollback, on page 1318
show configuration running, on page 1319
show full-configuration, on page 1320
Syntax Description
None: Show a combination of the running and target configurations for the entire configuration.
hierarchy Specific Hierarchy: Show a combination of the running and target configurations for the specific
configuration hierarchy.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display the merged configuration for a specific command hierarchy:
vm4(config)# show configuration merge banner
banner
login "Welcome to vEdge4"
motd "Welcome to vEdge4"
!
Related Topics
show configuration, on page 1313
show configuration commit, on page 1314
show configuration diff, on page 1316
show configuration rollback, on page 1318
show configuration running, on page 1319
show full-configuration, on page 1320
Syntax Description
(rollback-number | Specific Previous Commit: List the configuration differences since a specific
latest) commit operation. rollback-number is the commit identifier. latest is the last
commit operation.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display the configuration differences from previously committed configurations:
vm4(config)# show configuration rollback changes 1
banner
login "Welcome to vEdge4"
no motd "Welcome to vEdge4"
!
vm4(config)# show configuration rollback changes 2
no banner
vm4(config)# show configuration rollback changes 3
no banner
vpn 0
interface ge0/4
tunnel-interface
clear-dont-fragment
!
!
!
Related Topics
rollback, on page 1309
show configuration, on page 1313
show configuration commit, on page 1314
show configuration diff, on page 1316
show configuration running, on page 1319
Syntax Description
hierarchy Specific Hierarchy: Show the running configuration in a specific configuration hierarchy.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display the running configuration in a hierarchy:
vm4(config)# show configuration running banner
banner
motd "Welcome to vEdge4"
!
Related Topics
show configuration, on page 1313
show configuration commit, on page 1314
show configuration diff, on page 1316
show configuration merge, on page 1317
show configuration rollback, on page 1318
show full-configuration, on page 1320
show full-configuration
Display the current configuration, which is a combination of the running and candidate configurations.
show full-configuration [hierarchy]
Syntax Description
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display the running and candidate configuration in a hierarchy:
vm4(config)# show full-configuration banner
banner
login "Welcome to vEdge4"
motd "Welcome to vEdge4"
!
Related Topics
show configuration, on page 1313
show configuration commit, on page 1314
show configuration diff, on page 1316
show configuration merge, on page 1317
show configuration running, on page 1319
show history
Display the history of the commands issued in the current configuration session.
show history [number]
Syntax Description
None: Display all commands that have been issued in the current configuration session.
number Specific Number of Commands: Display the specified number of most recent commands that have
been issued in the current configuration session.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display a limited number of configuration session commands:
vm4(config)# show history 12
02:07:53 -- show configuration merge banner
02:09:45 -- show configuration rollback changes 14
02:10:11 -- show full-configuration
02:14:20 -- show full-configuration banner
02:15:52 -- show configuration running
02:18:18 -- show configuration running banner
02:22:06 -- show configuration rollback changes 1
02:22:13 -- show configuration rollback changes 2
02:22:16 -- show configuration rollback changes 3
02:34:36 -- show configuration this omp
02:34:43 -- show configuration this banner
02:35:32 -- show history 12
vm4(config)#
Related Topics
show history, on page 1023
Syntax Description
hierarchy Specific Hierarchy: Display the syntax of the configuration commands in a specified hierarchy.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
Display a limited number of configuration session commands:
vm4(config)# show parser dump banner
banner
banner login <string,-min:-1-chars,-max:-128-chars>
banner login <string,-min:-1-chars,-max:-128-chars> motd
<string,-min:-1-chars,-max:-128-chars>
banner motd <string,-min:-1-chars,-max:-128-chars>
Related Topics
show parser dump, on page 1177
top
Move to the top level of the configuration hierarchy.
top [configuration-command]
Syntax Description
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1(config-interface-ge0/0)# top
vedge1(config)# system aaa usergroup operator
vedge1(config-usergroup-operator)# top banner motd "Welcome"
vedge1(config-usergroup-operator)# top show configuration
banner
motd Welcome
!
vedge1(config-usergroup-operator)#
Related Topics
exit, on page 1302
validate
Verify that the candidate configuration contains no errors.
validate
Syntax Description
None
Command History
Release Modification
14.1 Command introduced.
Example
Example 1
vm4(config)# validate
Validation complete
vm4(config)#
Related Topics
commit, on page 1297
begin Display the command output beginning with the line that contains the
specified string. The string is case-sensitive.
best-effort Display the command output or continue loading a file even if some kind of
failure has occurred that might interfere with the process.
context-match Display the upper hierarchy in which a command or string appears in the
configuration.
count Count the number of lines in the command output. The count of lines includes
the line on which you type the command.
details Display the default values for commands in the running configuration.
exclude Exclude the lines that contain the string defined by the regular expression
from the command output.
include Include only the lines that contain the string defined by the regular expression
in the command output.
linnum Number the lines in the command output. This command effectively counts
the numbers of lines in the output.
match-all Display the command output that matches all command-output filters.
match-any Display the command output that matches any one of the command-output
filters.
sort-by Arrange the command output based on the values in a particular field.
tab Display tabular command output in table even if the table is wider than the
width of the screen.
until Display the command output, ending with the line that contains the specified
string. The string is case-sensitive.
Note that not all filters are available with all commands.
append
Append the command output to a file.
append filename
Syntax Description
filename Name of File: Append the command output to the specified filename.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1# show interface | append interface-file
vedge1# file list
interface-file
vedge1
Related Topics
file list, on page 807
file show, on page 808
save, on page 1349
begin
Display the command output beginning with the line that contains the specified string. The string is
case-sensitive.
begin string
Syntax Description
string String to Match: Text string to find to start displaying command output. The string is case-sensitive.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge# show ip route
Codes Protocol: <-- These 11 lines explain the values in the output.
C -> connected, S -> static
O -> ospf, B -> bgp
M -> omp
Codes Proto-sub-type:
IA -> ospf-inter-area
E1 -> ospf-external1, E2 -> ospf-external2
N1 -> ospf-nssa-external1, N2 -> ospf-nssa-external2
e -> bgp-external, i -> bgp-internal
Codes Rstatus flags:
F -> fib, S -> selected
PROTOCOL NEXTHOP NEXTHOP
VPN ROUTE PROTOCOL SUB TYPE IFNAME ADDR TLOC IP COLOR ENCAP RSTATUS
----------------------------------------------------------------------------------------------
0 0.0.0.0/0 S - ge0/0 10.0.11.3 - - - F,S
0 10.0.11.0/24 C - ge0/0 - - - - F,S
0 10.0.100.0/24 C - ge0/7 - - - - F,S
0 172.16.255.1/32 C - system - - - - F,S
vedge# show ip route | begin PROTOCOL <-- Display only the IP routes, without the key.
Related Topics
until, on page 1354
best-effort
Display the command output or continue loading a file even if some kind of failure has occurred that might
interfere with the process.
best-effort
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
context-match
Display the upper hierarchy in which a command or string appears in the configuration.
context-match string
Syntax Description
Command History
Release Modification
14.2 Command
introduced.
Example
Example 1
vm5# show running-config | context-match ospf
vpn 1
ospf
Related Topics
Overview of Command Filters for CLI Operational Commands, on page 1328
count
Count the number of lines in the command output. The count of lines includes the line on which you type the
command.
count
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show ip routes vpn 0
Codes Proto-sub-type:
IA -> ospf-inter-area,
E1 -> ospf-external1, E2 -> ospf-external2,
N1 -> ospf-nssa-external1, N2 -> ospf-nssa-external2,
e -> bgp-external, i -> bgp-internal
Codes Status flags:
F -> fib, S -> selected, I -> inactive,
B -> blackhole, R -> recursive
Related Topics
linnum, on page 1342
de-select
Do not display a field in the command output.
de-select field
Syntax Description
field Column Not To Display: Field not to display in the command output. Use the de-select ? command to
determine the possible completions for each command.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show ospf neighbor
DBsmL -> Database Summary List
RqstL -> Link State Request List
RXmtl -> Link State Retransmission List
IF IF DEAD
VPN ADDRESS INDEX NAME NEIGHBOR ID STATE PRI TIME DBsmL RqstL RXmtL
---------------------------------------------------------------------------------------
1 10.10.10.2 0 ge0/3 11.11.11.1 full 1 38 0 0 0
Related Topics
exclude, on page 1340
select, on page 1350
details
Display the default values for commands in the running configuration.
details
Syntax Description
None
Command History
Release Modification
14.2 Command
introduced.
Examples
Example 1
vm5# show running-config system logging
system
logging
disk
enable
!
!
!
vm5# show running-config system logging | details
system
logging
disk
enable
file size 10
file rotate 10
priority information
!
!
!
Example 2
vm5# show running-config vpn 1
vpn 1
name ospf_and_bgp_configs
router
ospf
router-id 172.16.255.15
timers spf 200 1000 10000
redistribute static
redistribute omp
area 0
interface ge0/4
exit
exit
!
pim
interface ge0/5
exit
exit
!
interface ge0/4
ip address 10.20.24.15/24
no shutdown
!
interface ge0/5
ip address 56.0.1.15/24
no shutdown
!
!
vm5# show running-config vpn 1 | details
vpn 1
name ospf_and_bgp_configs
no ecmp-hash-key layer4
router
ospf
router-id 172.16.255.15
auto-cost reference-bandwidth 100
compatible rfc1583
distance external 0
distance inter-area 0
distance intra-area 0
timers spf 200 1000 10000
redistribute static
redistribute omp
area 0
interface ge0/4
hello-interval 10
dead-interval 40
retransmit-interval 5
priority 1
network broadcast
exit
exit
!
pim
no shutdown
no auto-rp
interface ge0/5
hello-interval 30
join-prune-interval 60
exit
exit
!
interface ge0/4
ip address 10.20.24.15/24
flow-control autoneg
no clear-dont-fragment
no pmtu
mtu 1500
no shutdown
arp-timeout 1200
!
interface ge0/5
ip address 56.0.1.15/24
flow-control autoneg
no clear-dont-fragment
no pmtu
mtu 1500
no shutdown
arp-timeout 1200
!
!
Related Topics
show running-config, on page 1207
Overview of Command Filters for CLI Operational Commands, on page 1328
display xml
Render the command output as XML.
display xml
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1# show control local-properties | display xml
<config xmlns="http://tail-f.com/ns/config/1.0">
<control xmlns="http://viptela.com/security">
<local-properties>
<device-type>vedge</device-type>
<organization-name></organization-name>
<certificate-status>Not-Installed</certificate-status>
<root-ca-chain-status>Not-Installed</root-ca-chain-status>
<dns-name>10.0.14.4</dns-name>
<site-id>1</site-id>
<domain-id>1</domain-id>
<system-ip>172.16.255.1</system-ip>
<keygen-interval>0:01:00:00</keygen-interval>
<number-vbond-peers>0</number-vbond-peers>
<number-active-wan-interfaces>1</number-active-wan-interfaces>
<wan-interface-list>
<index>0</index>
<public-ip>0.0.0.0</public-ip>
<public-port>0</public-port>
<private-ip>10.0.11.1</private-ip>
<private-port>12346</private-port>
<num-vsmarts>0</num-vsmarts>
<weight>1</weight>
<color>default</color>
<preference>0</preference>
<admin-state>unknown</admin-state>
<operation-state>unknown</operation-state>
</wan-interface-list>
</local-properties>
</control>
</config>
exclude
Exclude the lines that contain the string defined by the regular expression from the command output.
exclude regular-expression
Syntax Description
regular-expression String to Match: String to match when excluding lines from the command output.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show interface vpn 0
IF IF
ADMIN OPER ENCAP SPEED RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX UPTIME PACKETS PACKETS
--------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 10.0.0.1/24 Up Up null transport 1500 00:0c:bd:05:df:b7 100 full 11:04:15:07 14549495 12435677
0 ge0/1 - Down Down null service 1500 00:0c:bd:05:df:b8 - - - 0 0
0 ge0/2 - Down Down null service 1500 00:0c:bd:05:df:b5 - - - 0 0
0 ge0/4 - Down Down null service 1500 00:0c:bd:05:df:bb - - - 0 0
0 ge0/5 - Down Down null service 1500 00:0c:bd:05:df:bc - - - 0 0
0 ge0/6 - Down Down null service 1500 00:0c:bd:05:df:b9 - - - 0 0
0 ge0/7 - Down Down null service 1500 00:0c:bd:05:df:ba - - - 0 0
0 system 1.1.1.3/32 Up Up null loopback 1500 00:00:00:00:00:00 10 full 11:04:15:17 0 0
hw-vedge# show interface vpn 0 | exclude IF | exclude ADMIN | exclude VPN | exclude ---
0 ge0/0 10.0.0.1/24 Up Up null transport 1500 00:0c:bd:05:df:b7 100 full 11:04:15:31 14549857 12435986
0 ge0/1 - Down Down null service 1500 00:0c:bd:05:df:b8 - - - 0 0
0 ge0/2 - Down Down null service 1500 00:0c:bd:05:df:b5 - - - 0 0
0 ge0/4 - Down Down null service 1500 00:0c:bd:05:df:bb - - - 0 0
0 ge0/5 - Down Down null service 1500 00:0c:bd:05:df:bc - - - 0 0
0 ge0/6 - Down Down null service 1500 00:0c:bd:05:df:b9 - - - 0 0
0 ge0/7 - Down Down null service 1500 00:0c:bd:05:df:ba - - - 0 0
0 system 1.1.1.3/32 Up Up null loopback 1500 00:00:00:00:00:00 10 full 11:04:15:41 0 0
Related Topics
de-select, on page 1334
include, on page 1341
include
Include only the lines that contain the string defined by the regular expression in the command output.
include regular-expression
Syntax Description
regular-expression String to Match: String to match when including lines from the command output.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show interface vpn 0 | include 10.1.1.8/24
0 ge0/0 10.0.0.1/24 Up Up null transport 1500 00:0c:bd:05:df:b7 100 full 11:04:20:18 14554291 12439750
Related Topics
exclude, on page 1340
select, on page 1350
linnum
Number the lines in the command output. This command effectively counts the numbers of lines in the output.
linnum
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show interface vpn 0 | linnum1:
2: IF IF
3: ADMIN OPER ENCAP SPEED RX TX
4: VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX UPTIME PACKETS PACKETS
5: -----------------------------------------------------------------------------------------------------------------------------------------
6: 0 ge0/0 10.0.0.1/24 Up Up null transport 1500 00:0c:bd:05:df:b7 100 full 11:04:22:04 14555968 12441172
7: 0 ge0/1 - Down Down null service 1500 00:0c:bd:05:df:b8 - - - 0 0
8: 0 ge0/2 - Down Down null service 1500 00:0c:bd:05:df:b5 - - - 0 0
9: 0 ge0/4 - Down Down null service 1500 00:0c:bd:05:df:bb - - - 0 0
10: 0 ge0/5 - Down Down null service 1500 00:0c:bd:05:df:bc - - - 0 0
11: 0 ge0/6 - Down Down null service 1500 00:0c:bd:05:df:b9 - - - 0 0
12: 0 ge0/7 - Down Down null service 1500 00:0c:bd:05:df:ba - - - 0 0
13: 0 system 1.1.1.3/32 Up Up null loopback 1500 00:00:00:00:00:00 10 full 11:04:22:14 0
Related Topics
count, on page 1333
match-all
Display the command output that matches all command-output filters.
match-all
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vm9# show control connections
PEER PEER
TYPE SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT REMOTE COLOR STATE UPTIME
-----------------------------------------------------------------------------------------------------------------------------------------------------
vedge 172.16.255.11 100 1 10.0.5.11 12346 10.0.5.11 12346 lte up 0:02:31:49
TYPE SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT REMOTE COLOR STATE UPTIME
-----------------------------------------------------------------------------------------------------------------------------------------------------
vsmart 172.16.255.20 200 1 10.0.12.20 12346 10.0.12.20 12346 default up 0:02:33:42
Related Topics
match-any, on page 1344
select, on page 1350
match-any
Display the command output that matches any one of the command-output filters. Matching any is the default
behavior when matching command output.
match-any
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vm9# show control connections
PEER PEER
TYPE SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT REMOTE COLOR STATE UPTIME
-----------------------------------------------------------------------------------------------------------------------------------------------------
vedge 172.16.255.11 100 1 10.0.5.11 12346 10.0.5.11 12346 lte up 0:02:31:49
TYPE SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT REMOTE COLOR STATE UPTIME
-----------------------------------------------------------------------------------------------------------------------------------------------------
vsmart 172.16.255.20 200 1 10.0.12.20 12346 10.0.12.20 12346 default up 0:02:33:38
Related Topics
match-all, on page 1343
select, on page 1350
more
Paginate the command output. This is the default behavior.
more
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show interface | more IF IF
Related Topics
nomore, on page 1346
nomore
Do not paginate command output.
nomore
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show interface | nomore
IF IF
ADMIN OPER ENCAP SPEED RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX UPTIME PACKETS PACKETS
--------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 10.0.0.1/24 Up Up null transport 1500 00:0c:bd:05:df:b7 100 full 11:04:33:54 14566836 12450259
0 ge0/1 - Down Down null service 1500 00:0c:bd:05:df:b8 - - - 0 0
0 ge0/2 - Down Down null service 1500 00:0c:bd:05:df:b5 - - - 0 0
0 ge0/4 - Down Down null service 1500 00:0c:bd:05:df:bb - - - 0 0
0 ge0/5 - Down Down null service 1500 00:0c:bd:05:df:bc - - - 0 0
0 ge0/6 - Down Down null service 1500 00:0c:bd:05:df:b9 - - - 0 0
0 ge0/7 - Down Down null service 1500 00:0c:bd:05:df:ba - - - 0 0
0 system 1.1.1.3/32 Up Up null loopback 1500 00:00:00:00:00:00 10 full 11:04:34:05 0 0
1 ge0/3 10.1.1.1/24 Up Up null service 1500 00:0c:bd:05:df:b6 1000 full 11:04:33:52 277881 231784
hw-vedge#
Related Topics
more, on page 1345
notab
Display tabular command output in a list rather than in a table. Note that if tabular command output is wider
that the screen width, the output is automatically displayed in a list. Use the tab filter to override this display
behavior. Use the screen-width command to set the screen width, or simply drag the terminal window to the
desired size. Changing the screen size by dragging the window overrides the width set by the screen-width
command.
notab
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show interface vpn 0 | notab
interface vpn 0 interface ge0/0
ip-address 10.0.0.1/24
if-admin-status Up
if-oper-status Up
encap-type null
port-type transport
mtu 1500
hwaddr 00:0c:bd:05:df:b7
speed-mbps 100
duplex full
uptime 11:04:40:13
rx-packets 14572308
tx-packets 12455087
interface vpn 0 interface ge0/1
ip-address -
if-admin-status Down
if-oper-status Down
encap-type null
port-type service
mtu 1500
hwaddr 00:0c:bd:05:df:b8
rx-packets 0
--More--
Related Topics
screen-width, on page 900
tab, on page 1353
repeat
Redisplay the output of a show command periodically.
repeat seconds
Syntax Description
seconds Repeat Time: How often to repeat the command, in seconds. Type Control-C to terminate the display.
Command History
Release Modification
14.1 Command
introduced.
save
Save the command output to a file.
save filename [overwrite]
Syntax Description
filename Name of File: Save the command output in the specified filename.
overwrite Overwrite the File Contents: Overwrite the contents of an existing file.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vedge1# show interface | save interface-file
vedge1# file list
interface-file
vedge1#
Related Topics
append, on page 1329
file list, on page 807
file show, on page 808
select
Display fields to display in the command output.
select field
Syntax Description
field Field To Add: Field to display in the command output. Use the select ? command to determine the
available fields for each command.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vm9# show control connections | select ? Description: Display control connections information
Possible completions:
local-color Local Color
private-ip Private ip
private-port Private port
remote-color Remote Color
rx_challenge Rx Challenge
rx_challenge_ack Rx Challenge Ack
rx_challenge_resp Rx Challenge Response
rx_connects Rx Connects
rx_hello Rx Hello
rx_register_replies Rx Register Replies
rx_registers Rx Registers
rx_teardown Rx Teardown
state State
system-ip System IP address
tx_challenge Tx Challenge
tx_challenge_ack Tx Challenge Ack
tx_challenge_resp Tx Challenge Response
tx_connects Tx Connects
tx_hello Tx Hello
tx_register_replies Tx Register Replies
tx_registers Tx Registers
tx_teardown Tx Teardown
tx_teardown_all Tx Teardown all connections
uptime Uptime
vm9# show control connections | select state
PEER PEER
TYPE SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT REMOTE COLOR STATE UPTIME
-----------------------------------------------------------------------------------------------------------------------------------------------------
vedge 172.16.255.11 100 1 10.0.5.11 12346 10.0.5.11 12346 lte up 0:02:32:46
Related Topics
de-select, on page 1334
match-all, on page 1343
match-any, on page 1344
sort-by
Arrange the command output based on the values in a particular field.
sort-by field
Syntax Description
field Column Not To Display: Field by which to arrange the command output. Use the sort-by ? command
to determine the possible completions for each command.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vm9# show control connections
PEER PEER
PEER PEER SITE DOMAIN PEER PRIVATE PEER PUBLIC
TYPE SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT REMOTE COLOR STATE UPTIME
-----------------------------------------------------------------------------------------------------------------------------------------------------
vedge 172.16.255.11 100 1 10.0.5.11 12346 10.0.5.11 12346 lte up 0:01:13:09
vedge 172.16.255.21 100 1 10.0.5.21 12346 10.0.5.21 12346 lte up 0:01:13:09
vedge 172.16.255.14 400 1 10.1.14.14 12350 10.1.14.14 12350 lte up 0:01:13:07
vedge 172.16.255.15 500 1 10.1.15.15 12346 10.1.15.15 12346 lte up 0:01:13:09
vedge 172.16.255.16 600 1 10.1.16.16 12346 10.1.16.16 12346 lte up 0:01:13:07
vsmart 172.16.255.20 200 1 10.0.12.20 12346 10.0.12.20 12346 default up 0:01:13:21
vbond - 0 0 10.1.14.14 12346 10.1.14.14 12346 default up 0:01:13:23
Related Topics
exclude, on page 1340
include, on page 1341
tab
Display tabular command output in table even if the table is wider than the width of the screen. If the command
output is wider that the screen width, it wraps onto two or more lines. Use the screen-width command to set
the screen width, or simply drag the terminal window to the desired size. Changing the screen size by dragging
the window overrides the width set by the cli screen-width command.
tab
Syntax Description
None
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
vm1# show interface ge0/1
interface vpn 0 interface ge0/1
ip-address 10.0.26.11/24
if-admin-status Up
if-oper-status Up
encap-type null
port-type service
mtu 1500
hwaddr 00:0c:29:ab:b7:62
speed-mbps 10
duplex full
uptime 0:00:49:33
rx-packets 3
tx-packets 2
vm1# show interface ge0/1 | tab
IF IF
ADMIN OPER ENCAP PORT SPEED RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE TYPE MTU HWADDR MBPS DUPLEX UPTIME PACKETS PACKETS
-------------------------------------------------------------------------------------------------------------------------------------
0 ge0/1 10.0.26.11/24 Up Up null service 1500 00:0c:29:ab:b7:62 10 full 0:00:49:46 3 2
Related Topics
notab, on page 1347
screen-width, on page 900
until
Display the command output, ending with the line that contains the specified string. The string is case-sensitive.
until string
Syntax Description
string String to Match: Text string to find to start displaying command output. The string is case-sensitive.
Command History
Release Modification
14.1 Command
introduced.
Example
Example 1
hw-vedge# show interface | until 10.0.0.1
IF IF
ADMIN OPER ENCAP SPEED RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX UPTIME PACKETS PACKETS
--------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 10.0.0.1/24 Up Up null transport 1500 00:0c:bd:05:df:b7 100 full 11:05:10:21 14598208 1247744
Related Topics
begin, on page 1330