Cisco IOS Command Reference For Cisco Aironet Access .

2y ago
30 Views
4 Downloads
2.11 MB
338 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Gideon Hoey
Transcription

Cisco IOS Command Reference forCisco Aironet Access Points and BridgesCisco IOS Release 12.4(25d)JA and 12.3(8)JEEDecember 2010Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax: 408 527-0883Text Part Number: OL-24115-01

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALLSTATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUTWARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THATSHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSEOR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s publicdomain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITHALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUTLIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OFDEALING, USAGE, OR TRADE PRACTICE.IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCOOR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human Network aretrademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You,Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems,Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing,FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo,LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels,ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and theWebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationshipbetween Cisco and any other company. (0807R)Cisco IOS Command Reference for Cisco Aironet Access Points and BridgesCopyright 2010 Cisco Systems, Inc. All rights reserved.

CONTENTSPrefacevUsing the Command-Line InterfaceType of Memory1-11-1CLI Command Modes 1-1User EXEC Mode 1-2Privileged EXEC Mode 1-2Global Configuration Mode 1-3Interface Configuration Mode 1-3Cisco IOS Commands for Access Pointsand Bridges 2-1List of Supported Cisco IOS CommandsA-1Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-01iii

ContentsCisco IOS Command Reference for Cisco Aironet Access Points and Bridgesiv0L-24115-01

PrefaceAudienceThis guide is for the networking professional using the Cisco IOS command-line interface (CLI) tomanage Cisco Aironet access points and bridges that run Cisco IOS software. Before using this guide,you should have experience working with Cisco IOS commands and access point and bridge softwarefeatures.You also need to be familiar with the concepts and terminology of Ethernet and local areanetworking.PurposeThis guide provides information about new and revised Cisco IOS commands. For information about thestandard Cisco IOS commands, refer to the IOS documentation set available from the Cisco.com home tsd products support series home.htmlThis guide does not provide procedures for configuring your access point or bridge. For detailedconfiguration procedures, refer to the Cisco IOS Software Configuration Guide for Cisco Aironet AccessPoints, the Cisco Aironet 1300 Series Outdoor Access Point/Bridge Software Configuration Guide, orthe Cisco Aironet 1400 Series Bridge Software Configuration Guide for this release.OrganizationThis guide is organized into these sections:Chapter 1, “Using the Command-Line Interface,” describes how to access the command modes and usethe command-line interface (CLI) to configure software features.Chapter 2, “Cisco IOS Commands for Access Points and Bridges,” describes in alphabetical order theCisco IOS commands that you use to configure and monitor your access point or bridge.Appendix A, “List of Supported Cisco IOS Commands,” lists the Cisco IOS commands that accesspoints and bridges support. Cisco IOS commands that are not in this list have not been tested on accesspoints and bridges and might not be supported.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-01v

PrefaceConventionsThis publication uses these conventions to convey instructions and information:Command descriptions use these conventions: Commands and keywords are in boldface text. Arguments for which you supply values are in italic. Square brackets ([ ]) means optional elements. Braces ({ }) group required choices, and vertical bars ( ) separate the alternative elements. Braces and vertical bars within square brackets ([{ }]) mean a required choice within an optionalelement.Notes, cautions, and warnings use these conventions and symbols:NoteCautionWarningMeans reader take note. Notes contain helpful suggestions or references to materials not contained inthis manual.Means reader be careful. In this situation, you might do something that could result in equipmentdamage or loss of data.The warning symbol means danger. You are in a situation that could cause bodily injury. Before youwork on any equipment, be aware of the hazards involved with electrical circuitry and be familiarwith standard practices for preventing accidents.Related PublicationsThese documents provide complete information about the access point and are available from thisCisco.com html Cisco IOS Software Configuration Guide for Cisco Aironet Access Points, Cisco IOS Releases12.4(25d)JA & 12.3(8)JEE and the Cisco IOS Software Configuration Guide for Aironet 1400 SeriesWireless Bridge (12.3.(8)JA) describe major product features and how to install and configure accesspoints and bridges. Getting Started Guide: Cisco Aironet 1260 Series Access Points; Getting Started Guide: CiscoAironet 1040 Series Access Points; Quick Start Guide: Cisco Aironet 1250 Series Access Points; andQuick Start Guide: Cisco Aironet 1400 Series Wireless Bridges describe how to attach cables, mountthe access point or bridge, and how to obtain product documentation. A quick start guide is includedin the shipping box with your access point or bridge. Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.4(23c)JA and Release Notesfor Cisco Aironet Access Points and Bridges for Cisco IOS Release 12.4(21a)JY describe features,important notes, and caveats for access points and bridges running this release.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridgesvi0L-24115-01

PrefaceObtaining Documentation, Obtaining Support, and SecurityGuidelinesFor information on obtaining documentation, obtaining support, providing documentation feedback,security guidelines, and also recommended aliases and general Cisco documents, see the monthlyWhat’s New in Cisco Product Documentation, which also lists all new and revised Cisco technicaldocumentation, w/whatsnew.htmlCisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-01vii

PrefaceCisco IOS Command Reference for Cisco Aironet Access Points and Bridgesviii0L-24115-01

C H A P T E R1Using the Command-Line InterfaceThis chapter describes how to use the Cisco IOS command-line interface (CLI) for configuring softwarefeatures on your access point or bridge.For a complete description of the new and revised Cisco IOS commands supported by access points andbridges, see Appendix A, “List of Supported Cisco IOS Commands.”For more information on Cisco IOS commands, refer to the Cisco IOS Release 12.3 Command Summary.For task-oriented configuration steps, refer to the Cisco IOS Software Configuration Guide for CiscoAironet Access Points or the Cisco Aironet 1400 Series Wireless Bridge Software Configuration Guide.Type of MemoryThe access point and bridge Flash memory stores the Cisco IOS software image, the startupconfiguration file, and helper files.CLI Command ModesThis section describes the CLI command mode structure. Command modes support specific Cisco IOScommands. For example, the interface interface-id command works only when entered in globalconfiguration mode.These are the main command modes for access points and bridges: User EXEC Privileged EXEC Global configuration Interface configurationTable 1-1 lists the main command modes, how to access each mode, the prompt you see in that mode,and how to exit that mode. The prompts listed use the default name ap.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-011-1

Chapter 1Using the Command-Line InterfaceCLI Command ModesTable 1-1Command Modes SummaryCommand ModeAccess MethodPromptExitUser EXECThis is the first level of access.AP Enter the logout command.Change terminal settings,perform basic tasks, and listsystem information.Privileged EXECFrom user EXEC mode, enter the AP#enable command.To exit to user EXEC mode, enter thedisable command.GlobalconfigurationFrom privileged EXEC mode,enter the configure command.To exit to privileged EXEC mode,enter the exit or end command, orpress Ctrl-Z.InterfaceconfigurationFrom global configuration mode, AP(config-if)#specify terminal then specify aninterface by entering theinterface command followed bythe interface type and number.AP(config)#To exit to privileged EXEC mode,enter the end command, or pressCtrl-Z.To exit to global configuration mode,enter the exit command.User EXEC ModeAfter you access the device, you are automatically in user EXEC command mode. The EXEC commandsavailable at the user level are a subset of those available at the privileged level. In general, use the EXECcommands to temporarily change terminal settings, perform basic tests, and list system information.The supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt.AP ?Privileged EXEC ModeBecause many of the privileged commands configure operating parameters, privileged access should bepassword-protected to prevent unauthorized use. The privileged command set includes those commandscontained in user EXEC mode, as well as the configure privileged EXEC command through which youaccess the remaining command modes.If your system administrator has set a password, you are prompted to enter it before being granted accessto privileged EXEC mode. The password does not appear on the screen and is case sensitive.The privileged EXEC mode prompt is the device name followed by the pound sign (#):AP#Enter the enable command to access privileged EXEC mode:AP enableAP#Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges1-20L-24115-01

Chapter 1Using the Command-Line InterfaceCLI Command ModesThe supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt.AP# ?To return to user EXEC mode, enter the disable privileged EXEC command.Global Configuration ModeGlobal configuration commands apply to features that affect the device as a whole. Use the configureprivileged EXEC command to enter global configuration mode. The default is to enter commands fromthe management console.When you enter the configure command, a message prompts you for the source of the configurationcommands:AP# configureConfiguring from terminal, memory, or network [terminal]?You can specify the terminal or memory as the source of configuration commands.This example shows you how to access global configuration mode:AP# configure terminalEnter configuration commands, one per line. End with CNTL/Z.AP(config)#The supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt:AP(config)# ?To exit global configuration command mode and to return to privileged EXEC mode, enter the end orexit command, or press Ctrl-Z.Interface Configuration ModeInterface configuration commands modify the operation of the interface. Interface configurationcommands always follow a global configuration command, which defines the interface type.Use the interface interface-id command to access interface configuration mode. The new prompt meansinterface configuration mode:AP(config-if)#The supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt:AP(config-if)# ?To exit interface configuration mode and to return to global configuration mode, enter the exitcommand. To exit interface configuration mode and to return to privileged EXEC mode, enter the endcommand, or press Ctrl-Z.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-011-3

Chapter 1Using the Command-Line InterfaceCLI Command ModesCisco IOS Command Reference for Cisco Aironet Access Points and Bridges1-40L-24115-01

C H A P T E R2Cisco IOS Commands for Access Pointsand BridgesThis chapter lists and describes Cisco IOS commands in Cisco IOS Release 12.3(8)JA that you use toconfigure and manage your access point, bridge, and wireless LAN. The commands are listedalphabetically. Refer to Appendix A, “List of Supported Cisco IOS Commands,” for a complete list ofCisco IOS commands supported by access points and bridges.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-1

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa authentication login default local cacheaaa authentication login default local cacheTo set a local login cache for authentication, authorization, and accounting (AAA) authentication, usethe aaa authentication login default local cache command in global configuration mode. To disablethe local login cache, use the no form of this command:[no] aaa authentication login default local cache [word radius tacacs ]Syntax DescriptionwordCharacter string used to name the local login cache used for AAAauthentication login.radius(Optional) Specifies the RADIUS host used for the AAA authenticationlogin.tacacs (Optional) Specifies the TACACS host used for the AAA authenticationlogin.Command DefaultThere is no default for this command.Command ModesGlobal configurationCommand HistoryReleaseModification12.3(7)JAThis command was introduced.ExamplesThe following example creates a local cache for an AAA authentication list called tac admin set as thedefault list used for all login authentications. This authentication checks the local cache first, and if theinformation is not available, the authentication server (group tac admin) is contacted and theinformation is also stored in the local cache.AP(config)# aaa authentication login default cache tac admin group tac adminRelated CommandsCommandDescriptionaaa authorization exec defaultlocal cacheSets the local cache for AAA exec authorizationaaa cache profileSets the AAA cache profile nameaaa group serverSets the AAA group server namecache authorization profileSets the cache authorization profile namecache expirySets the expiration time for the local cacheserverSets the IP address for the serverCisco IOS Command Reference for Cisco Aironet Access Points and Bridges2-20L-24115-01

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa authorization exec default local cacheaaa authorization exec default local cacheTo set a local cache for AAA exec authorization, use the aaa authorization exec default local cachecommand in global configuration mode. To disable the local cache, use the no form of this command:[no] aaa authorization exec default local cache [word radius tacacs ]Syntax DescriptionwordCharacter string used to name the local cache for exec AAA authorization.radius(Optional) Specifies the RADIUS server used for the exec AAAauthorization.tacacs (Optional) Specifies the TACACS server used for the exec AAAauthorization.Command DefaultThere is no default for this command.Command ModesGlobal configurationCommand HistoryReleaseModification12.3(7)JAThis command was introduced.ExamplesThe following example creates a local exec mode cache for an AAA authorization list called tac adminset as the default list used for all login authorizations. This authorization checks the local cache first, andif the information is not available, the authorization server (group tac admin) is contacted and theinformation is also stored in the local cache.AP(config)# aaa authorization exec default cache tac admin group tac adminRelated CommandsCommandDescriptionaaa authentication login defaultlocal cacheSets local cache for AAA authentication loginaaa cache profileSets the AAA cache profile nameaaa group serverSets the AAA group server namecache authentication profileSets the cache authentication profile namecache expirySets the expiration time for the local cacheserverSets the IP address for the serverCisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-3

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa cache profileaaa cache profileTo set storage rules for the AAA cache, use the aaa cache profile command in global configurationmode. To disable the AAA cache profile, use the no form of this command:[no] aaa cache profile name[no] profile exact match [no-auth][no] regexp match expression [any only] [no-auth][no] all [no-auth]Syntax DescriptionnameCharacter string used to name the AAA cache profile.profile exact matchSpecifies a username that must exactly match the AAA server responsebefore the information is saved in the cache.no-authSpecifies that password authentication is not performed.regexp match expression Specifies a regular expression that must match the AAA server responsebefore the information is included in the cache.NoteThis option is not recommended because it can require extensiveprocessing time.anySpecifies that any AAA server response that matchesregexp match expression is saved in the cache.onlySpecifies that only 1 AAA server response that matchesregexp match expression is saved in the cache.allSpecifies that all AAA server responses are saved in the cache.Command DefaultThere is no default for this command.Command ModesGlobal configurationCommand HistoryReleaseModification12.3(7)JAThis command was introduced.ExamplesThe following example sets a name of admin cache for the AAA cache pro

iii Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges 0L-24115-01 CONTENTS Preface v Using the Command-Line Interface 1-1 Type of Memory 1-1 CLI Command Modes 1-1 User EXEC Mode 1-2 Privileged EXEC Mode 1-2 Global Configuration Mode 1-3 Interface Configuration Mode

Related Documents:

Oct 27, 2014 · Cisco ISR 4400 Series Cisco ISR 4300 Series Cisco ISR 4431 Cisco ISR 4321 Cisco ISR 4451 Cisco ISR 4331 Cisco ISR 4351 Table 1 Cisco IOS XE 3S–to–Cisco IOS Release Number Mapping Cisco IOS XE 3S Release Cisco IOS Release 3.14 15.5(1)S 3.13S 15.4(3)S 3

Router Software Origin Validation (RPKI RTR & BGP Modifications) available in Cisco IOS and IOS-XR Cisco IOS code available in IOS XE-3.5.0/15.1(3)S Cisco IOS platforms targeted ASR1K, 7600, ME3600/ ME3800, ASR 903 Cisco IOS-XR available in the XR-4.2.1 Cisco IOS-X

XML Conversion Draft - 03/07/2011 iii Cisco IOS Server Load Balancing Configuration Guide OL-24559-01 CONTENTS CHAPTER 1 Cisco IOS SLB Features Roadmap 1-1 CHAPTER 2 Information About Cisco IOS SLB 2-1 Overview 2-1 Benefits of IOS SLB 2-3 Cisco IOS SLB Features 2-4 Routing Features 2-4 Algorithms for Server Load Balancing 2-5 Bind ID Support 2-6

Cisco ASA 5505 Cisco ASA 5505SP Cisco ASA 5510 Cisco ASA 5510SP Cisco ASA 5520 Cisco ASA 5520 VPN Cisco ASA 5540 Cisco ASA 5540 VPN Premium Cisco ASA 5540 VPN Cisco ASA 5550 Cisco ASA 5580-20 Cisco ASA 5580-40 Cisco ASA 5585-X Cisco ASA w/ AIP-SSM Cisco ASA w/ CSC-SSM Cisco C7600 Ser

C O N T E N T S Using the Cisco IOS Command-Line Interface 1 Finding Feature Information 1 Cisco IOS XE CLI Command Modes Overview 1 Cisco IOS XE CLI Task List 2 Getting Context-Sensitive Help 3 Using the no and default Forms of Commands 5 Using Command History 6 Using CLI Editing Features and Shortcuts 6 Moving the Cursor on the Command Line 6 Completing a Partial Command Name 7

Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unified Computing System (Cisco UCS), Cisco UCS B-Series Blade Servers, Cisco UCS C-Series Rack Servers, Cisco UCS S-Series Storage Servers, Cisco UCS Manager, Cisco UCS

Cisco Internetwork Operating System (IOS) . The Command Structure Cisco IOS Command Reference To navigate to Cisco’s Command Reference to find a particular command: 1. Go to www.cisco.com 2. Click Support. . enable secret provides greater security because the password is encrypted.

The following Cisco IOS software releases support software activation on Cisco ISRs: † Cisco 3900 series, 2900 series, and 1900 series ISRs running Cisco IOS Release 15.0(1)M. – Cisco 3925E and Cisco 3945E ISR running Cisco IOS Release 15.1(1)T. † Right to Use license is supported on Cisco IOS Release 15.0(1)M4, 15.1(1)T2, 15.1(2)T2, 15.1 .