- Show Interfaces Serial 020 Serial
- Show Interfaces Serial 020 Internet Download Manager
- Show Interfaces Serial 020 Idm
![Show interfaces serial 020 serial Show interfaces serial 020 serial](https://dcloud-cms.cisco.com/wp-content/uploads/show_ip_interface_brief_cmd.png)
Verify all your settings. After you verify the setting, then use “up” to enable the interface up exit all. Note, You need to configure management interface on the highest eth port for each member in the group with a unique IP address! Example 10-1 A Sample Output of the show interface serial n Command. BStubRFRNorm#sho int s1. 01 Seriall is up, line protocol is up. 02 Hardware is HD64570. 03 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usee, rely 255/255, load 1/255. Example 10-1 A Sample Output of the show interface serial n Command (Continued). The CLI ( command line interface ) for Moxa switches can be accessed through either the serial console or Telnet console. For either type of connection, access to the command line interface is generally referred to as an EXEC. This tutorial explains basic show commands (such as show ip route, show ip interfaces brief, show version, show flash, show running-config, show startup-config, show controllers, etc.) in Cisco router with examples. Learn how to use show commands in Cisco router to get specific information.
Here is a list of basic CLI commands which will help you manage your Dell PowerConnect series switches…
Show
/// Port VLAN details
> show interfaces switchport gigabitethernet 1/0/1
/// Port channel VLAN details
> show interfaces switchport port-channel 1
/// Port configuration
> show interfaces configuration gigabitethernet 1/0/1
/// Port channel configuration
> show interfaces configuration port-channel 1
/// VLAN 100 details
> show vlan tag 100
/// Display static routes
> show ip route static
/// Stack info
> show switch
/// Show all access-lists
> show access-lists
/// Port VLAN details
> show interfaces switchport gigabitethernet 1/0/1
/// Port channel VLAN details
> show interfaces switchport port-channel 1
/// Port configuration
> show interfaces configuration gigabitethernet 1/0/1
/// Port channel configuration
> show interfaces configuration port-channel 1
/// VLAN 100 details
> show vlan tag 100
/// Display static routes
> show ip route static
/// Stack info
> show switch
/// Show all access-lists
> show access-lists
Find physical port using MAC
/// This will return a port #
> sh mac address-table address d4:be:d9:e8:d0:8d
/// This will return a port #
> sh mac address-table address d4:be:d9:e8:d0:8d
Config
All config commands must be run under Global Config Mode.
All config commands must be run under Global Config Mode.
/// Enable Privileged EXEC mode
> enable
/// Enter Global Configuration mode
> config
> enable
/// Enter Global Configuration mode
> config
Create VLAN
/// Enter VLAN mode
> vlan database
/// Create VLANs number 100 to 150
> vlan 100-150
/// Enter VLAN mode
> vlan database
/// Create VLANs number 100 to 150
> vlan 100-150
Select Interface
/// Select one port
> interface gigabitethernet 1/0/1
/// Select one port
> interface gigabitethernet 1/0/1
Select Interface range
/// Select a range of ports
> interface range gigabitethernet 1/0/1-24
/// Select a range of ports
> interface range gigabitethernet 1/0/1-24
Port VLAN Modes
General — The port belongs to VLANs, and each VLAN is user-defined as tagged or untagged (full 802.1Q mode).
General — The port belongs to VLANs, and each VLAN is user-defined as tagged or untagged (full 802.1Q mode).
PVID (1-4095) — Enter a VLAN ID to be added to untagged packets. The possible values are 1-4095. VLAN 4095 is defined according to standard and industry practice as the discard VLAN. Packets classified to the discard VLAN are dropped.
/// Select interface
> interface gigabitethernet 1/0/1
/// Change VLAN mode to general
> switchport mode general
/// Set native VLAN to 100 (U)
> switchport general pvid vlan 100
/// Add VLAN 101 as untagged
> switchport general allowed vlan add 101 untagged
/// Add VLAN 102 as tagged
> switchport general allowed vlan add 102 tagged
> interface gigabitethernet 1/0/1
/// Change VLAN mode to general
> switchport mode general
/// Set native VLAN to 100 (U)
> switchport general pvid vlan 100
/// Add VLAN 101 as untagged
> switchport general allowed vlan add 101 untagged
/// Add VLAN 102 as tagged
> switchport general allowed vlan add 102 tagged
Access — The port belongs to a single untagged VLAN. When a port is in Access mode, the packet types that are accepted on the port cannot be designated. Ingress filtering cannot be enabled/disabled on an access port.
![Interfaces Interfaces](https://www.computernetworkingnotes.org/images/cisco/ccna-study-guide/show-interface-serial.png)
Show Interfaces Serial 020 Serial
/// Select interface
> interface gigabitethernet 1/0/1
/// Change VLAN mode to access
> switchport mode access
/// Make port a member of VLAN 100 (U)
> switchport access vlan 100
> interface gigabitethernet 1/0/1
/// Change VLAN mode to access
> switchport mode access
/// Make port a member of VLAN 100 (U)
> switchport access vlan 100
Trunk — The port belongs to VLANs on which all ports are tagged (except for one port that can be untagged).
/// Select interface
> interface gigabitethernet 1/0/1
/// Change VLAN mode to trunk
> switchport mode trunk
/// Set native VLAN to 100 (U), only one untagged VLAN allowed
> switchport trunk native vlan 100
/// Make port a member of VLAN 102 (T)
> switchport trunk allowed vlan 102
> interface gigabitethernet 1/0/1
/// Change VLAN mode to trunk
> switchport mode trunk
/// Set native VLAN to 100 (U), only one untagged VLAN allowed
> switchport trunk native vlan 100
/// Make port a member of VLAN 102 (T)
> switchport trunk allowed vlan 102
Set port IP address and mask
/// Set the IP address with mask
> ip address 1.1.1.1 255.255.255.0
/// Set the IP address with mask
> ip address 1.1.1.1 255.255.255.0
Create a port channel
/// Create port-channel 1
> interface port-channel 1
/// Create port-channel 1
> interface port-channel 1
Add ports to port channel
/// Select interface
> interface gigabitethernet 1/0/1
/// Add port 1 to port-channel 1
> channel-group 1
/// Select interface
> interface gigabitethernet 1/0/1
/// Add port 1 to port-channel 1
> channel-group 1
Set route
/// Set a static route
> ip route 1.1.1.1 (dest.) 255.255.255.0 (mask) 2.2.2.2 (gw)
/// Set a static route
> ip route 1.1.1.1 (dest.) 255.255.255.0 (mask) 2.2.2.2 (gw)
Enabling PortFast
/// Select interface
> interface ethernet 1/0/1
/// Enable portfast on port
> spanning-tree portfast
/// Select interface
> interface ethernet 1/0/1
/// Enable portfast on port
> spanning-tree portfast
/// Select interface range
> interface range ethernet all
/// Enable portfast on range
> spanning-tree portfast
> interface range ethernet all
/// Enable portfast on range
> spanning-tree portfast
Create a IP based Access-List
/// Create access-list ACL1
> ip access-list extended ACL1
/// Deny 1.10 access to 1.1
> deny ip 10.40.1.10 255.255.255.0 10.40.1.1 255.255.255.0
/// Permit everything else
> permit ip any any
/// Select interface
> interface gigabitethernet 1/0/1
/// Apply ACL to port
> service-acl input (output) ACL1
/// Create access-list ACL1
> ip access-list extended ACL1
/// Deny 1.10 access to 1.1
> deny ip 10.40.1.10 255.255.255.0 10.40.1.1 255.255.255.0
/// Permit everything else
> permit ip any any
/// Select interface
> interface gigabitethernet 1/0/1
/// Apply ACL to port
> service-acl input (output) ACL1
Using TFTP download software and boot code to stacked switches
Copy software first, then copy the boot software.
/// Copy software to all switches
> copy tftp://{tftp address}/{file name} unit://*/image
/// Copy boot software to all switches
> copy tftp://{tftp address}/{file name} unit://*/boot
/// Verify active image
> show bootvar
/// Activate new image on all switches
> boot system image-1 all
/// Reload stack
> reload
Copy software first, then copy the boot software.
/// Copy software to all switches
> copy tftp://{tftp address}/{file name} unit://*/image
/// Copy boot software to all switches
> copy tftp://{tftp address}/{file name} unit://*/boot
/// Verify active image
> show bootvar
/// Activate new image on all switches
> boot system image-1 all
/// Reload stack
> reload
Verifying EIGRP
Router#show ip eigrp neighbors | Displays the neighbor table. |
Router#show ip eigrp neighbors detail | Displays a detailed neighbor table. |
TIP The show ip eigrp neighbors detail command verifies whether a neighbor is configured as a stub router. | |
Router#show ip eigrp interfaces | Shows information for each interface. |
Router#show ip eigrp interfaces serial 0/0/0 | Shows information for a specific interface. |
Router#show ip eigrp interfaces 100 | Shows information for interfaces running process 100. |
Router#show ip eigrp topology | Displays the topology table. Bensoftware. |
TIP The show ip eigrp topology command shows you where your feasible successors are. | |
Router#show ip eigrp traffic | Shows the number and type of packets sent and received. |
Router#show ip route | Shows the complete routing table. |
Router#show ip route eigrp | Shows a routing table with only EIGRP entries. |
Router#show ip protocols | Shows the parameters and current state of the active routing protocol process. |
Router#show key-chain | Shows authentication key information. |
Show Interfaces Serial 020 Internet Download Manager
Troubleshooting EIGRP
Show Interfaces Serial 020 Idm
Router#debug eigrp fsm | Displays events/actions related to EIGRP feasible successor metrics (FSM) |
Router#debug eigrp packet | Displays events/actions related to EIGRP packets |
Fileward 1 72. Router#debug eigrp neighbor | Displays events/actions related to your EIGRP neighbors Keytty 1 2 6 x 4. |
Router#debug ip eigrp | Displays events/actions related to EIGRP protocol packets. |
Router#debug ip eigrp neighbor | Displays events/actions related to your EIGRP neighbors |
Router#debug ip eigrp notifications | Displays EIGRP event notifications |