Cisco 7600 mac address table size


If this keyword is not specified, the ingress side assumes a CoS value of 0 for quality of service QoS purposes. You can specify up to 32 bridge-domain command entries using dot1q tag for a single PVC. The highest tag value in a group of bridge-domain commands must be greater than the first tag entered but no more than 32 greater. Optional Enables bridging broadcast mode on this PVC. This option is not supported for multipoint bridging. Frame Relay DLCI configuration Interface configuration—Only the dot1q and dot1q-tunnel keywords are supported in interface configuration mode.

The dot1q-tunnel keyword was added. The dot1q-tunnel keyword is not supported in this release. The dot1q-tunnel and split-horizon keywords are supported in this release. This command was renamed from bridge-vlan to bridge-domain. The access , broadcast , ignore-bpdu-pid , and increment keywords were added. Support for the lan-fcs and broadcast keywords was removed. The ignore-bpdu-pid and pvst-tlv keywords were added. This is referred to as strict mode. Entering the ignore-bpdu-pid keyword creates loose mode.

Both modes are described as follows:. Note The bridge-domain and bre-connect commands are mutually exclusive.

Cisco IOS LAN Switching Command Reference

This configuration uses IEEE Then use the dot1q option on the customer routers. Note The access , dot1q , and dot1q-tunnel options are mutually exclusive. If you do not specify any of these options, the connection operates in "raw" bridging access mode, which is similar to access, except that the connection does act on and transmit BPDU packets. RFC bridged PVCs must terminate on the ATM interface, and the bridged traffic must be forwarded over an Ethernet interface, unless the split-horizon option is used, which allows bridging of traffic across bridged PVCs.

It also cannot be configured for PVCs on the main interface.

Catalyst / Switches ARP or CAM Table Issues Troubleshooting - Cisco

In interface configuration mode, only the dot1q and dot1q-tunnel keyword options are supported. The following example shows a range of PVCs being configured, with the bridge domain number being incremented for each PVC in the range:. To map a subinterface to specific inner customer-edge and outer provider-edge VLAN tags using See the "Usage Guidelines" section for additional information. The bridge-vlan command has been deprecated and replaced by the bridge-domain subinterface command.

See the "Usage Guidelines" section for more information. You must have previously enabled QinQ translation on the main interface using the mode dot1q-in-dot1q access-gateway command before you can use the bridge-vlan command on a subinterface. You must also use the encapsulation dot1q command on the subinterface to specify the trunk VLAN to use on outgoing packets. Each provider-edge VLAN supports a maximum of 32 customer-edge VLANs, which must be in a contiguous block that starts on a number divisible by 32 for example: Entering the dot1q keyword results in QinQ translation, which is also known as a double-tag to single-tag translation.

When you enter the dot1q-tunnel keyword, the inner customer-edge tag is left unchanged. This results in transparent tunneling, which is also known as a double-tag to double-tag translation. The out-range keyword is allowed only if you enter the dot1q-tunnel keyword. You can use the out-range keyword to match the packets that do not have a customer-edge VLAN tag. This use of a double-tagged tunnel is called QinQ tunneling. This example shows how to configure a double-tag-to-single-tag translation of packets that are tagged with both an inner customer-edge VLAN of 41 and an outer provider-edge VLAN of The translated outgoing packets have a single trunk VLAN tag of This example shows how to configure a double-tag-to-double-tag translation of packets that are tagged with both an inner customer-edge VLAN of and an outer provider-edge VLAN of This example shows how to configure a double-tag-to-double-tag translation of out-of-range packets.

If this configuration is given together with the configuration shown above, this subinterface matches packets with an outer provider-edge VLAN of 41 and an inner customer-edge VLAN that is either missing, or that is in the range from 0 to 95 or from to Tip To display a list of the internal VLANs that are currently in use on the router, use the show vlan internal usage command. Sets the Displays interface statistics for IEEE Displays a list of the internal VLANs that are currently in use on the router. To remove a specified address or set of addresses from the MAC address table, use the clear mac-address-table command in privileged EXEC mode.

Optional Interface type: Optional Module and port number. The see the "Usage Guidelines" section for valid values. Port interface number ranges based on type of Ethernet switch network module used:. All MAC addresses on the router being configured are cleared. If the clear mac-address-table command is invoked with no options, all MAC addresses are removed. If you specify an address but do not specify an interface, the address is deleted from all interfaces. If you specify an interface but do not specify an address, all addresses on the specified interface are removed.

If the clear mac-address-table command is invoked with no options, all dynamic addresses are removed. If a targeted address is not present in the MAC forwarding table, the following error message appears:. Enter the clear mac-address-table dynamic command to remove all dynamic entries from the table. The interface-number argument designates the module and port number. Valid values for interface-number depend on the specified interface type and the chassis and module that are used.

The following example shows how to clear all dynamic addresses in the MAC forwarding table:. The following example shows how to clear the static address The following example shows the permanent address Configures the length of time the switch keeps dynamic MAC addresses in memory before discarding. Associates a permanent unicast or multicast MAC address with a particular switched port interface. Associates a restricted static address with a particular switched port interface. To clear the port-channel information, use the clear pagp command in privileged EXEC mode.

This example shows how to clear the port-channel information for a specific group:. To restart the protocol migration process, use the clear spanning-tree detected-protocol command in privileged EXEC mode. The type of interface that you want to clear the detected spanning tree protocol for. The of the interface that you want to clear the detected spanning tree protocol for. For example, a bridge running RSTP can send These mechanisms are not always able to revert to the most efficient mode.

For example, an RSTP bridge that is designated for a legacy Similarly, an MST port assumes that it is a boundary port when the bridges to which it is connected have joined the same region. To force the MST port to renegotiate with the neighbors, enter the clear spanning-tree detected-protocol command. This example shows how to restart the protocol migration on a specific interface:. Support in a specific If you do not specify a vlan-id ; the software-cached counter values for all existing VLANs are cleared.

To delete existing The following example shows how to clear an existing mapped The following example shows how to clear all mapped To remove virtual LAN statistics from any statically or system-configured entries, use the clear vlan statistics command in privileged EXEC mode. To list the TopN processes and specific TopN reports, use the collect top counters interface command. The default is 20 physical ports. Type of ports to be used in the TopN request; valid values are all , ethernet , fastethernet , gigabitethernet , tengigabitethernet , layer-2 vlan-num , and layer The default is all.

The layer-2 vlan-num keyword and argument represents the number of Layer 2 interfaces. Optional Specifies the interval over which the statistics are gathered. The default is 30 seconds. Specifies the port statistic to generate the report on; valid values are as follows:. This is the default. If you specify an interval of 0 seconds, the TopN report is generated based on the absolute counters value.

Specifying the interval seconds keyword and the sort-by-value argument w hen the sorting criteria is utilization will not return a valid report because utilization can only be computed over an interval. For example, this syntax- collect top counters interface fastEthernet sort-by utilization interval 45 , will not generate a valid report. Only a TopN task with a done status is allowed to display the report.

If you try to view a report that is incomplete pending , an appropriate message is displayed. When the TopN reports are ready, a syslog message is displayed that the TopN reports are available. You can use the show top interface report command to view the reports. You can display the TopN reports multiple times until you enter the clear top interface report command to clear the reports. Use the clear top interface report command to clear the reports. This example shows how to sort the TopN report based on the receive and transmit broadcast packets:.

This example shows how to sort the TopN report based on the receive and transmit broadcast packets and specify the TopN sampling interval:. To disable the ISL, use the no form of this command. Valid values on all platforms except the Cisco series are from 1 to On the Cisco series, valid values are from 1 to ISL encapsulation adds a byte header to the beginning of the Ethernet frame. To enter the subinterface configuration mode, you must enter the interface configuration mode first and then enter the interface command to specify a subinterface.

Displays statistics for all interfaces configured on the router or access server. To enable IEEE Security association identifier. This value is used as the VLAN identifier. IEEE Interface configuration config-if Subinterface configuration config-subif. If the MAC access list permits the address, the software continues to process the packet. If the access list denies the address, the software discards the packet and returns an Internet Control Message Protocol ICMP host unreachable message.

On Catalyst series switches, this command is supported on Layer 2 ports only. Configures an IP access list to be used for packets transmitted from the asynchronous host. To access a subcommand to define extended MAC-access lists, use the mac access-list extended command in global configuration mode. To remove MAC-access lists, use the no form of this command.

Once you enter the mac access-list extended name command, use the following subset to create or delete entries in a MAC-access list:. Permits access if the conditions are matched. Source MAC address in the form: Optional Destination MAC address in the form: Optional Name or number of the protocol; see below for a list of valid values.

When you enter the src-mac mask or dest-mac mask value, note these guidelines and restrictions:. Use 1 bit as a wildcard. For example, to match an address exactly, use The first matching entry is used. To improve performance, place the most commonly used entries near the beginning of the access list. You cannot add entries to the middle of a list. An ACE created with the mac access-list extended command with the ip keyword filters malformed, invalid, deliberately corrupt EtherType 0x IP frames only; it does not filter any other IP traffic. To classify Layer 3 packets as Layer 2 packets, use the mac packet-classify command in interface configuration mode.

To return to the default settings, use the no form of this command. Microflow policing does not work on interfaces that have the mac packet-classify command enabled. Traffic is classified based on This example shows how to classify incoming and outgoing Layer 3 packets as Layer 2 packets:. To configure the maximum aging time for entries in the Layer 2 table, use the mac - address - table aging - time command in global configuration mode. To reset maximum aging time to the default setting, use the no form of this command. MAC address table entry maximum age.

Valid values are 0, and from 5 to seconds. Aging time is counted from the last time that the switch detected the MAC address. The default value is seconds. Valid values are from 2 to The routed-mac keyword was added. The aging time entry will take the specified value. Valid entries are from 10 to seconds. To add dynamic addresses to the MAC address table, use the mac - address - table dynamic command in global configuration mode. Dynamic addresses are automatically added to the address table and dropped from it when they are not in use. To remove dynamic entries from the MAC address table, use the no form of this command.

Port to which packets destined for hw-address are forwarded. Optional Port interface number. The ranges are based on type of Ethernet switch network module used:. Optional Add dynamic addresses to the ATM module in slot 1 or 2. The port is always 0 for an ATM interface. The interface and vlan parameters together specify a destination to which packets destined for hw - address are forwarded. The vlan keyword is optional if the port is a static-access or dynamic-access VLAN port. The vlan keyword is required for multi-VLAN and trunk ports.

This keyword is required on trunk ports to specify to which VLAN the dynamic address is assigned. Valid IDs are 1 to ; do not enter leading zeroes. Optional The interface and vlan parameters together specify a destination to which packets destined for hw - address are forwarded. This command should be used only for testing purposes. Sets the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated. To enable MAC-address learning, use the mac-address-table learning command in global configuration mode.

To disable learning, use the no form of this command. You can use the module num keyword and argument to specify supervisor engines or DFCs only. You can use the vlan vlan-id keyword and argument on switch-port VLANs only. You cannot use the vlan vlan-id keyword and argument to configure learning on routed interfaces. This example shows how to enable MAC-address learning on a switch-port interface on all modules:. This example shows how to enable MAC-address learning on a switch-port interface on a specified module:.

This example shows how to disable MAC-address learning on a specified switch-port interface for all modules:. This example shows how to enable MAC-address learning on a routed interface on all modules:. This example shows how to enable MAC-address learning on a routed interface for a specific module:. This example shows how to disable MAC-address learning for all modules on a specific routed interface:.

To enable MAC limiting, use the mac-address-table limit command in global configuration mode. To disable MAC limiting, use the no form of this command. This command is not supported on Cisco series routers that are configured with a Supervisor Engine Displays information about all switches currently shortcutting for the specified IPX flows. The destination network and destination node of IPX packet flows. The destination network address consists of 1 to 8 hexadecimal numbers in the format xxxxxxxx.

The destination node address consists of 12 hexadecimal numbers in the format xxxx. Optional The source network of the IPX flow. The address of the source network consists of 1 to 8 hexadecimal numbers in the format yyyyyyyy. The following example shows how to display the switch that is shortcutting routed flows to the specified IPX flow:.

Table Of Contents

To specify an interface as the management interface, use the mls rp management-interface command in interface configuration mode. To remove an interface as the management interface, use the no form of this command. No interface is specified as the management interface. If you fail to select this interface, no connection between the MLS route processor RP and the MLS switching engine occurs, and any routing updates or changes to access lists are not reflected on the switch.

The following example shows how to select a management interface:. To remove the NDE address, use the no form of this command. Use the following syntax to specify an IP subnet address:. The following example shows how to set the NDE address to Selects the router interface to be Layer 3 switched and then adds that interface to a VTP domain.

To assign a VLAN identification number to an interface, use the mls rp vlan-id command in interface configuration mode. To remove a VLAN identification number, use the no form of this command. The following example shows how to assign the VLAN identification number to an interface:. Displays MLS details. To remove a VTP domain, use the no form of this command. To enable the hardware switching, use the mls switching command in global configuration mode.

To disable hardware switching, use the no form of this command. This command is not supported on Cisco series routers that are configured with a Supervisor Engine 2. This example shows how to enable the hardware switching:. This example shows how to disable the hardware switching:. Enables the hardware switching of the unicast traffic for an interface. To enable the hardware switching of the unicast traffic for an interface, use the mls switching unicast command in interface configuration mode. To disable the hardware switching of the unicast traffic for an interface, use the no form of this command.

Hardware switching of the unicast traffic for an interface is not enabled. This example shows how to enable the hardware switching for an interface:. This example shows how to disable the hardware switching for an interface:. Support was added for Q-in-Q link bundles using virtual port-channel interfaces. This use of a double-tagged tunnel is also referred to as Q-in-Q tunneling. The mode dot1q-in-dot1q access-gateway command enhances Q-in-Q tunneling by tagging packets with two VLAN tags to allow multiple VLANs to be trunked together across an intermediate network.

This use of double-tagged tunnels performs the following functions:. Also, if one interface member of the link bundle goes down, its PE VLANs are automatically reallocated to the other members of the bundle. Note You must remove all IP addresses that have been configured on the interface before using the mode dot1q-in-dot1q access-gateway command. After configuring the mode dot1q-in-dot1q access-gateway command, use the bridge-domain subinterface configuration command to configure the VLAN mapping to be used on each subinterface.

Note Port-channel interface counters as shown by the show counters interface port-channel and show interface port-channel counters commands are not supported for channel groups that are using GE-WAN interfaces for Q-in-Q link bundling. Tip The mls qos trust command has no effect on a GE-WAN interface or port-channel group that has been configured with the mode dot1q-in-dot1q access-gateway command.

This example shows a typical configuration for the mode dot1q-in-dot1q access-gateway command:. This example shows the system message that appears when you try to configure the mode dot1q-in-dot1q access-gateway command without first removing the IP address configuration:. This example shows how to disable QinQ mapping on an interface by using the no form of the mode dot1q-in-dot1q access-gateway command. In addition, this command automatically removes all subinterfaces on the interface and all of the subinterface QinQ mappings configured with the bridge-domain subinterface configuration command and service policies.

This example shows a virtual port-channel interface that was created and assigned with two GE-WAN interfaces. The mode dot1q-in-dot1q access-gateway command is then enabled on the port-channel interface to allow it to act as a QinQ link bundle:. This example shows the error message that appears if you attempt to enable QinQ translation on a port-channel interface that contains one or more invalid interfaces:. Accesses the QoS class map configuration mode to configure QoS class maps. Accesses QoS policy-map configuration mode to configure the QoS policy map. Sets the Displays the information that is related to Q-in-Q translation and is contained in the XCM on board the supervisor engine.

Number of the SPAN session. For Cisco , , and series routers, valid values are 1 and 2. Optional Specifies the interface number; valid entries are 1 and 2. Optional Port interface number ranges are based on the type of Ethernet switch network module used:. Optional Specifies monitor received traffic only. Optional Specifies monitor transmitted traffic only. Optional Specifies monitor received and transmitted traffic. A trunking interface monitors all VLANs and all received and transmitted traffic.

These SPAN support restrictions were added:. This command was implemented on the Cisco series, Cisco series, and Cisco series routers. This command was changed to support the SSO mode and change the default mode. Support for this command was introduced on the Supervisor Engine 2. The new range is from 1 to for specified platforms.

The port-channel number supports six EtherChannels and eight ports in each channel. If you attempt to add another destination interface to a session that already has a destination interface configured, you will get an error.


  1. "Show mac address-table count" a useful Cisco IOS command - Network technologies and trends.
  2. Catalyst 6500/6000 Switches ARP or CAM Table Issues Troubleshooting.
  3. convert csv to xlsx mac.

The show monitor command displays the SPAN service module session only if it is allocated in the system. It also displays a list of allowed modules and a list of active modules that can use the service module session. This example shows how to clear the configuration for all sessions:. This example shows how to clear the configuration for all remote sessions:. To remove one or more source or destination interfaces from the session, remove a source VLAN from the session, remove filtering, or delete a session, use the no form of this command.

Specifies the interface type. By default both received and transmitted traffic are monitored. Note The filter keyword is not supported on the Cisco series or the Cisco series routers. This command was introduced on the Catalyst family switches. The SPAN support restrictions were added:. This command was introduced on the Supervisor Engine 2. The following changes were made to this command on the Supervisor Engine The number of valid values for port-channel number depends on the software release.

Cisco IOS Release Only one destination per SPAN session is supported. If you attempt to add another destination interface to a session that already has a destination interface configured, you get an error. You must first clear any sources for a SPAN session before switching to another type of source. If you enter the filter keyword on a monitored trunk interface, only traffic on the set of specified VLANs is monitored. Port channel interfaces are displayed in the list of interface options if you have configured the interfaces.

VLAN interfaces are not supported. However, you can span a particular VLAN by entering the monitor session session source vlan vlan - id command. Use these formatting guidelines when configuring monitor sessions:. The analysis-module slot-number and the data-port port-number keywords and arguments are supported only on NAM. The number of valid values for port-channel number are a maximum of 64 values ranging from 1 to You cannot share the destination interfaces among SPAN sessions.

For example, a single destination interface can belong to one SPAN session only and cannot be configured as a destination interface in another SPAN session. If you configure SPAN on high-traffic interfaces, you may saturate fabric channels, replication engines, and interfaces. The port-channel interfaces are displayed in the list of interface options if you have configured the interfaces.

The VLAN interfaces are not supported. However, you can span a particular VLAN by entering the monitor session session source vlan vlan-id command. This example shows how to configure multiple sources for a session:. This example shows how to clear the configuration for sessions 1 and To disable MRVP, use the no form of this command. MVRP is administratively disabled. MRVP is administratively enabled on each interface. MVRP is operational on an interface only if MVRP is administratively enabled both globally at the device level and at the interface level. Other MVRP-related operations can then be enabled on the interface.

The following example configures global MVRP on the device and interfaces:. Sets the registrars in a MAD instance associated with an interface. Sets period timers that are used in MRP on a specified interface. Displays the MVRP configuration at the device level. To enable automatic learning of dynamic MAC table entries, use the mvrp mac-learning command in global configuration mode. To disable automatic learning of dynamic MAC table entries, use the no form of this command. Automatic MAC learning is disabled by default.

The following example enable automatic learning of dynamic MAC table entries:. To disable the registrars, use the no form of this command. Normal is the default state. The mvrp registration command is operational only if MVRP is configured on an interface.

The no mvrp registration command sets the registrar state to the default normal. This command can be used to set the registrar in a MAD instance associated with an interface to one of the three states. This command is effective only if MVRP is operational on the interface. The following example sets a fixed, forbidden, and normal registrar on a MAD instance:. Enables MVRP globally on a device and on a particular interface. Sets period timers that are used in MRP on a given interface. To remove the timer value, use the no form of this command. Specifies the time it takes for a LeaveAll timer to expire.

Sets the timer value to periodic, a fixed value of centiseconds. Join timer value: The no mvrp timer command resets the timer value to the default value. The following example sets the timer levels on an interface:. To return to the default name, use the no form of this command. Name to give the MST region. It can be any string with a maximum length of 32 characters.

CCNA How Switches Learn MAC Addresses

Two or more Cisco series routers with the same VLAN mapping and configuration version number are considered to be in different MST regions if the region names are different. Sets the revision number for the MST configuration. To learn the input interface of the incoming packets, use the pagp learn-method command in interface configuration mode.

Specifies how to learn the address on the port channel. Specifies how to learn the address on the physical port within the bundle. The default is aggregation-port. This example shows how to set the learning method to learn the address on the physical port within the bundle:.

This example shows how to set the learning method to learn the address on the port channel within the bundle:. To select a port in hot standby mode, use the pagp port-priority command in interface configuration mode. Priority number; valid values are from 1 to The higher the priority means the better the chances are that the port will be selected in the hot standby mode. Learns the input interface of the incoming packets. To allow more than one port-channel subinterface to use the same dot1q VLAN configuration, use the platform port-channel local-significance command in global configuration mode.


  • .
  • .
  • .
  • LAN Switching Commands.
  • To disable multiple port-channel subinterfaces from using the same dot1q VLAN configuration, use the no form of this command. Port-channel number. The valid range for port-channel numbers is 1 to More than one port-channel subinterface cannot use the same dot1q VLAN configuration. You must use this command before adding any subinterfaces. When you configure this command, the internal VLAN used by the port-channel subinterface is different from the dot1q VLAN configured on the subinterface. This example shows how to select port-channels 18 and 19 to use the identical dot1q VLAN configuration:.

    To configure the port load share deferral interval for all port channels, use the port-channel load-defer command in global configuration mode. To reset the port defer interval to the default setting, use the no form of this command. Sets the time interval in seconds by which load sharing will be deferred on the switch.

    Valid range is from 1 to seconds. The default deferal interval is seconds. The port defer interval is seconds. To reduce data loss following a stateful switchover SSO , port load share deferral can be enabled by entering the port-channel port load-defer command on a port channel of a switch that is connected by a multichassis EtherChannel MEC to a virtual switching system VSS. The load share deferral interval is determined by a single global timer configurable by the port-channel load-defer command.

    After an SSO switchover, a period of several seconds to several minutes can be required for the reinitialization of line cards and the reestablishment of forwarding tables, particularly multicast topologies. The valid range of seconds is 1 to seconds; the default is seconds. This example shows how to set the global port deferral interval to 60 seconds:. This example shows how to verify the configuration of the port deferral interval on a port channel:.

    Creates a port channel virtual interface and enters interface configuration mode. Enables the port load share deferral feature on a port channel. Displays the EtherChannel information for a channel. To enable the temporary deferral of port load sharing during the connection or reconnection of a port channel, use the port-channel port load-defer command in interface configuration mode. To disable the deferral of port load sharing on a port channel, use the no form of this command. The port load share deferral feature is not enabled on a port channel. To reduce data loss following a stateful switchover SSO , a port load share deferral can be enabled on a port channel of a switch that is connected by a multichassis EtherChannel MEC to a virtual switching system VSS.

    During the deferral period, the load share of a deferred member port is set to 0. In this state, the deferred port is capable of receiving data and control traffic, and of sending control traffic, but the port is prevented from sending data traffic over the MEC to the VSS. Upon expiration of the global deferral timer, the deferred member port exits the deferral state and the port assumes its normal configured load share. Load share deferral is applied only if at least one other member port of the port channel is currently active with a nonzero load share.

    If a port enabled for load share deferral is the first member bringing up the EtherChannel, the deferral feature does not apply and the port will forward traffic immediately. The load share deferral interval is determined by a single global timer configurable from 1 to seconds by the port-channel load-defer command. The default interval is seconds. This example shows how to enable the load share deferral feature on port channel 50 of a switch that is an MEC peer to a VSS:. This example shows how to verify the state of the port deferral feature on a port channel:.

    Configures the global port load share deferral time interval for port channels. A configuration restriction was added. If you enter the pvlan command on a port-security port, the following error message is displayed:. If so, any isolated or community VLAN configuration for the other ports within the 12 ports is inactive.

    To reactivate the ports, remove the isolated or community VLAN port configuration and enter the shutdown and no shutdown commands. Note In Release In releases earlier than Release A promiscuous port is a private port that is assigned to a primary VLAN. This traffic can only be received by standard trunking ports and promiscuous ports that are assigned to the corresponding primary VLAN. You can specify only one isolated vlan-id in the vlan command, while multiple community VLANs are allowed. The private-vlan commands do not take effect until you exit the VLAN configuration mode. The associated secondary VLANs are not deleted.

    To remove the association, use the no form of this command. Each pair is made up of at least two special unidirectional VLANs, and it is used by isolated ports, or by a community of ports to communicate with routers, or both. Note The private-vlan association command does not take effect until you exit the VLAN configuration mode.

    The secondary-vlan-list argument cannot contain spaces; it can contain multiple comma-separated items. This command is valid in the interface configuration mode of the primary VLAN. If you configure a mapping between two VLANs that do not have a valid Layer 2 association, the mapping configuration does not take effect. This example also shows the output if you try to change the mapping for the primary VLAN 2 only:. The default is VLAN 1; the range to configure is 2 to This command was implemented on the Cisco series router.

    To avoid the delay introduced by relaying messages in software for link-failure or VLAN-blocking notification during load balancing, REP floods packets at the HFL to a regular multicast address. These messages are flooded to the whole network, not just the REP segment. Switches that do not belong to the segment treat them as data traffic.

    Configuring an administrative VLAN for the whole domain can control flooding of these messages. There can be only one administrative VLAN on a switch and on a segment. You can verify your settings by entering the show interfaces rep detail privileged EXEC command. To return to the default configuration, use the no form of this command. You can display the port ID for an interface by entering the show interface interface-id rep detail command. Identify the VLAN blocking alternate port by entering the offset number of a neighbor. The primary edge port has an offset number of 1; positive numbers above 1 identify downstream neighbors of the primary edge port.

    Negative numbers identify the secondary edge port offset number —1 and its downstream neighbors. Identify the VLAN blocking alternate port as the segment port on which you entered the rep segment segment-id preferred interface configuration command. Note Entering the preferred keyword does not ensure that the preferred port is the alternate port; it gives it preference over other similar ports.

    The default behavior after you enter the rep preempt segment privileged EXEC command for manual preemption is to block all VLANs at the primary edge port. This behavior remains until you configure the rep block port command. If the primary edge port cannot determine which port is to be the alternate port, the default action is no preemption and no VLAN load balancing. You must enter this command on the REP primary edge port. When you select an alternate port by entering an offset number, this number identifies the downstream neighbor port of an edge port.

    You would never enter an offset value of 1 because that is the offset number of the primary edge port itself. If you have configured a preempt delay time by entering the rep preempt delay seconds interface configuration command and a link failure and recovery occurs, VLAN load balancing begins after the configured preemption time period elapses without another link failure. The alternate port specified in the load-balancing configuration blocks the configured VLANs and unblocks all other segment ports.

    If the primary edge port cannot determine the alternate port for VLAN balancing, the default action is no preemption. Each port in a segment has a unique port ID. The port ID format is similar to the one used by the spanning tree algorithm: The alternate port is identified by its port ID, shown in bold in the output of the show interfaces rep detail command for the Router A port. This example shows how to configure VLAN load balancing by using a neighbor offset number and how to verify the configuration by entering the show interfaces rep detail privileged EXEC command:.

    Welcome to TechTarget's expert community for technology professionals.

    To restore the default age-out timer value, use the no form of this command. Range is from ms to ms in multiples of 40 ms. The default is 5 ms. REP is a Cisco proprietary protocol that provides functionality to:. Configures the number of retries before the REP link is disabled. To restore the default number of retries, use the no form of this command. The number of LSL retries. The acceptable range is between 3 and 10 retries. The default number of retries is 5. The rep lsl-retries command is used to configure the number of retries before the REP link is disabled.

    This example shows how to configure REP link status layer number of retries. Configures the REP link status layer age-out timer value. To configure a waiting period after a segment port failure and recovery before Resilient Ethernet Protocol REP VLAN load balancing is triggered, use the rep preempt delay command in interface configuration mode. To remove the configured delay, use the no form of this command. The number of seconds to delay REP preemption. The range is 15 to No preemption delay is set. If you do not enter the rep preempt delay command, the default is manual preemption with no delay.

    You must enter this command and configure a preempt time delay if you want VLAN load balancing to automatically trigger after a link failure and recovery. Note that the timer restarts after each link failure. When the timer expires, the REP primary edge alerts the alternate port to perform VLAN load-balancing configured by using the rep block port interface configuration command and prepares the segment for the new topology.

    This example shows how to configure a REP preemption time delay of seconds on the primary edge port:. You can verify your settings by entering the show interfaces rep privileged EXEC command. Displays REP configuration and status for all interfaces or the specified interface. ID of the REP segment.

    The range is from 1 to After you enter the rep preempt segment segment-id command, a confirmation message appears before the command is executed because preemption can cause network disruption. Enter this command on the router on the segment that has the primary edge port. There is not a no version of this command. This example shows how to manually trigger REP preemption on segment with the confirmation message:.

    To enable Resilient Ethernet Protocol REP on the interface and to assign a segment ID to the interface, use the rep segment command in interface configuration mode. To disable REP on the interface, use the no form of this command. The segment for which REP will be enabled. Assign a segment ID to the interface. Optional Identify the interface as one of the two REP edge ports.

    Entering the edge keyword without the primary keyword configures the port as the secondary edge port. Optional On an edge port, specify that the port is the primary edge port. A segment has only one primary edge port. If you configure two ports in a segment as the primary edge port for example, ports on different switches the REP selects one of them to serve as the segment primary edge port.

    Optional On an edge port, specify the segment edge as one with no external REP neighbor. Optional Specify that the port is the preferred alternate port or the preferred port for VLAN load balancing. Note Configuring a port as preferred does not guarantee that it becomes the alternate port; it merely gives it a slight edge among equal contenders. The alternate port is usually a previously failed port. REP is disabled on the interface.

    When REP is enabled on an interface, the default is for the port to be a regular segment port. This command was changed to add the no-neighbor keyword. REP ports must be Layer 2 trunk ports. REP ports should not be configured as one of these port types:. You must configure two edge ports on each REP segment, a primary edge port and a port to act as a secondary edge port. If you configure two ports in a segment as the primary edge port for example, ports on different switches the configuration is allowed, but the REP selects one of them to serve as the segment primary edge port.

    You can configure the non-rep switch facing ports as edge no- neighbor ports. These ports inherit the properties of edge ports, and overcome the limitation of not being able to converge quickly during a failure. If you enable REP on two ports on a switch, the ports must both be either regular segment ports or edge ports. REP ports follow these rules:. Enter the show rep topology privileged EXEC command on a port in the segment to verify which port is the segment primary edge port. REP interfaces come up in a blocked state and remain in a blocked state until notified that it is safe to unblock.

    You need to be aware of this to avoid sudden connection losses. You should configure REP only in networks with redundancy. Configuring REP in a network without redundancy causes loss of connectivity. This example shows how to enable REP on a regular nonedge segment port:. Router config-if rep segment 1 edge no-neighbor primary. Verify Settings with the show interfaces rep Command. To verify which port in the segment is the primary edge port, enter the show rep topology privileged EXEC command.

    Displays information about all ports in the segment, including which one was configured and selected as the primary edge port. Identify a physical interface or port channel to receive STCNs. The range is 1 to You can also configure a sequence of segments for example , 77, You use this command to notify other portions of the Layer 2 network of topology changes that occur in the local REP segment. This removes obsolete entries in the Layer 2 forwarding table in other parts of the network, which allows faster network convergence.

    To set the revision number for the Multiple Spanning Tree Revision number for the configuration; valid values are from 0 to Two Cisco series routers that have the same configuration but different revision numbers are considered to be part of two different regions. This example shows how to set the revision number of the MST configuration:. Displays information about the spanning-tree state. Skip to content Skip to footer. Book Contents Book Contents. Introduction bridge-domain through instance VLAN mac address-group through revision set port flowcontrol through show udld show vlan through spanning-tree vlan udld through vtp v2-mode.

    Find Matches in This Book. PDF - Complete Book 8. August 3, Defaults No access list is applied to the interface or subinterface. Add the vlan vlan and cos value keywords and arguments. Add the ip keyword to the list of valid protocol names. Once you enter the mac access-list extended name command, use the following subset to create or delete entries in a MAC ACL: Table 1 mac access-list extended Command Syntax Syntax Description no Optional Deletes a statement from an access list.

    Valid entries for the protocol argument are as follows: Enter MAC addresses as three 4-byte values in dotted hexadecimal format; for example, Enter MAC-address masks as three 4-byte values in dotted hexadecimal format. Use 1 bit as a wildcard. For example, to match an address exactly, use For the optional protocol , you can enter either the EtherType or the keyword.

    Entries without a protocol match any protocol. Access lists entries are scanned in the order that you enter them. The first matching entry is used. To improve performance, place the most commonly used entries near the beginning of the access list. An implicit deny any any entry exists at the end of an access list unless you include an explicit permit any any entry at the end of the list. All new entries to an existing list are placed at the end of the list.

    You cannot add entries to the middle of a list. Command Default The default aging time is seconds. This command cannot be disabled. Enter 0 seconds to disable aging. The ranges are based on type of Ethernet switch network module used: Catalyst Switches Optional The interface and vlan parameters together specify a destination to which packets destined for hw - address are forwarded.

    Switch config mac-address-table dynamic 00c0. Usage Guidelines You can use the module num keyword and argument to specify supervisor engines or DFCs only. Examples This example shows how to enable MAC-address learning on a switch-port interface on all modules: Defaults The defaults are as follows: If you do not specify a maximum number, an action, or a notification, the default settings are used.


    • Maximum MAC address table size - Cisco Community.
    • Network technologies and trends.
    • Cisco IOS Additional Commands for Supervisor Engine 2T.
    • The flood keyword is supported on VLAN interfaces only. The flood action occurs only if the limit action is configured and is violated. The flood keyword disables the constant unknown unicast flooding, but allows a few seconds of flooding in between for its own sensing. In the shutdown state, the VLAN remains in the blocked state until you reenable it through the command syntax. Command Default The default settings are as follows: Disabled If notification of the dynamic changes to the MAC address table is enabled, the default settings are as follows: Command Default MAC-move notification is not enabled.

      Examples This example shows how to enable MAC-move notification: Usage Guidelines When you enable CAM table usage monitoring, the number of valid entries in the CAM table are counted and if the percentage of the CAM utilization is higher or equal to the specified threshold, a message is displayed. Examples This example shows how to enable CAM table usage monitoring notification and use the default settings: H maximum maximum addresses ] no mac-address-table secure [H.

      H Optional Specifies bit hardware address. Catalyst Switches Secure addresses can be assigned to only one port at a time. Router config mac-address-table secure maximum 10? Switch config mac-address-table secure 00c0. Use the no form of this command to do the following: Remove entries that are profiled by the combination of specified entry information. Re-enable IGMP snooping for the specified address.

      Router config mac-address-table static C. Examples The following example shows how to add static entries to the MAC address table: Router config mac-address-table static Router config mac-address-table static 0C Defaults The default settings are as follows: Layer 2 MAC address table entries are not synchronized by default.

      If the command is enabled, the value of the activity-time keyword is seconds. Usage Guidelines We recommend that you configure the activity time so that at least two activity times exist within the regular Layer 2 aging time or within the aging time used for VLANs in distributed EtherChannels if this feature is used only for distributed EtherChannels.

      Examples This example shows how to specify the activity timer interval: Defaults Unicast-flood protection is not enabled. Usage Guidelines This command is supported on Cisco series routers that are configured with a Supervisor Engine 2 only. Set the limit kfps argument to 10 Kfps. Set the filter minutes argument to 5 minutes. Examples This example shows how to set the flood rate limit to floods per second fps and display a system message when the rate limit has been exceeded: Defaults No match clause is specified.

      The following commands appear in the command-line interface CLI help but are not supported by the quality of service QoS as implemented on the policy feature card PFC: Command Default MLS is disabled. Examples The following example enables MLS: Defaults No shortcuts are configured. Examples This example shows how to allow the external systems to establish IP shortcuts with IP-input access lists: Defaults This command has no default settings.

      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size
      cisco 7600 mac address table size Cisco 7600 mac address table size

Related cisco 7600 mac address table size



Copyright 2019 - All Right Reserved