{
	"id": "abe16bb4-1508-4c90-b9b5-3b7a751ed79e",
	"created_at": "2026-04-06T00:14:59.965573Z",
	"updated_at": "2026-04-10T03:35:21.491386Z",
	"deleted_at": null,
	"sha1_hash": "5dacd89b28259d61f8c320930f0f88602f21f000",
	"title": "Cisco IOS Configuration Fundamentals Command Reference - show protocols through showmon [Support]",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 684240,
	"plain_text": "Cisco IOS Configuration Fundamentals Command Reference -\r\nshow protocols through showmon [Support]\r\nPublished: 2025-12-16 · Archived: 2026-04-05 13:06:08 UTC\r\nshow protocols through showmon\r\nshow protocols through showmon\r\nshow protocols\r\nTo display the configured protocols, use the show protocols command in user EXEC or privileged EXEC mode.\r\nshow protocols [interface-name interface-number]\r\nSyntax Description\r\ninterface-name(Optional) The type of interfaces. It can\r\nbe one of the following values:\r\nATM --ATM interface\r\nAsync --Async interface\r\nAuto-Template --Auto-Template\r\ninterface\r\nBVI --Bridge-Group Virtual\r\nInterface\r\nCDMA-Ix --CDMA Ix interface\r\nContainer --Container interface\r\nCTunnel --CTunnel interface\r\nDialer --Dialer interface\r\nEthernet --Institute of Electriacl\r\nElectronics Engineers (IEEE)\r\n802.3\r\nFastEthernet --FastEthernet IEEE\r\n802.3\r\nvoaBypassIn --VOA-Bypass-In interface\r\nvoaBypassOut --VOA-Bypass-Out interface\r\nvoaFilterIn --VOA-Filter-In interface\r\nvoaFilterOut --VOA-Filter-Out interface\r\nvoaIn --VOA-In interface\r\nvoaOut --VOA-Out\r\ninterface\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 1 of 155\n\nEsconPhy --ESCON interface\r\nfcpa --Fiber Channel\r\nFilter --Filter interface\r\nmultiservice --Multiservice\r\ninterface\r\nPos-channel --POS Channel\r\ninterfaces\r\nSBC --Session Border Controller\r\nSYSCLOCK --Telecom-Bus\r\nClock Controller\r\nTunnel --Tunnel interface\r\nVif --PGM Multicast Host\r\ninterface\r\nVirtual-Access --Virtual access\r\ninterface\r\nVirtual-PPP --Virtual PPP\r\ninterface\r\nVirtual-Template --Virtual\r\ntemplate interface\r\nVirtual-TokenRing --Virtual\r\nTokenRing\r\nVlan --Catalyst VLANs\r\nvmi --Virtual Multipoint Interface\r\ninterface-number\r\n(Optional) Interface number.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 2 of 155\n\nRelease Modification\r\n10.0 This command was introduced.\r\n12.0(3)T\r\nThe command was integrated in a release earlier than Cisco IOS Release\r\n12.0(3)T.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nCisco IOS XE Release\r\n2.1\r\nThis command was integrated into Cisco IOS XE Release 2.1.\r\nUsage Guidelines\r\nThe show protocols command shows the global and interface-specific status of any configured Level 3 protocol.\r\nExamples\r\nThe following is sample output from the show protocols command. The field names are self-explanatory.\r\nRouter# show protocols\r\nGlobal values:\r\n Internet Protocol routing is enabled\r\nFastEthernet0/0 is up, line protocol is up\r\n Internet address is 10.4.9.14/24\r\nvmi1 is down, line protocol is down\r\nFastEthernet0/1 is up, line protocol is up\r\n Internet address is 10.4.8.14/24\r\nATM2/0 is administratively down, line protocol is down\r\nATM2/0.1 is administratively down, line protocol is down\r\nATM2/0.2 is administratively down, line protocol is down\r\nATM2/0.200 is administratively down, line protocol is down\r\nEthernet3/0 is administratively down, line protocol is down\r\nEthernet3/0.1 is administratively down, line protocol is down\r\nEthernet3/1 is administratively down, line protocol is down\r\nEthernet3/2 is administratively down, line protocol is down\r\nEthernet3/3 is administratively down, line protocol is down\r\nATM6/0 is administratively down, line protocol is down\r\nSSLVPN-VIF0 is up, line protocol is up\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 3 of 155\n\nInterface is unnumbered. Using address of SSLVPN-VIF0 (0.0.0.0)\r\nVirtual-Access1 is down, line protocol is down\r\nVirtual-Template1 is down, line protocol is down\r\nVirtual-Access2 is up, line protocol is up\r\nPort-channel5 is down, line protocol is down\r\nPort-channel5.1 is down, line protocol is down\r\nPort-channel15 is down, line protocol is down\r\nVirtual-Template100 is down, line protocol is down\r\n Interface is unnumbered. Using address of vmi1 (0.0.0.0)\r\nDialer3 is up, line protocol is up\r\nFor more information on the parameters or protocols shown in this sample output, see the Cisco IOS IP\r\nAddressing Services Configuration Guide and the Cisco IOS IP Routing Protocols Configuration Guide.\r\nshow region\r\nTo display valid memory regions (memory mapping) in use on your system, use the show region command in\r\nprivileged EXEC mode.\r\nshow region [address hex-address]\r\nSyntax Description\r\naddress hex-address(Optional) If a hexadecimal address is specified, this command will search the region list\r\nfor the specified address.\r\nCommand Default\r\nAll memory regions are displayed.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n12.2(13) This command was introduced.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 4 of 155\n\nRelease Modification\r\n12.0(23)S This command was integrated into Cisco IOS Release 12.0(23)S.\r\n12.2(25)S\r\nThis command was modified. The command output was updated to display information\r\nabout free regions.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\n12.2(33)SRE\r\nThis command was modified. The output was updated to display heap region memory size in\r\nchunks of 16 MB.\r\nUsage Guidelines\r\nThis command can be useful for troubleshooting system bus errors. The system encounters a bus error when the\r\nprocessor tries to access a memory location that either does not exist (a software error) or does not respond\r\nproperly (a hardware problem).\r\nTo use the show region command to troubleshoot a bus error, note the memory location address from the show\r\nversion command, the show context command, or from the system error message that alerted you to the bus error.\r\nThe show region command can then be used to determine if that address is a valid memory location.\r\nFor example, in the output of the show version command after a system restart caused by a bus error, you will see\r\noutput similar to “System restarted by bus error at PC 0x30EE546, address 0xBB4C4.” In this case, the memory\r\nlocation that the router tried to access is 0xBB4C4. If the address falls within one of the ranges in the show region\r\noutput, it means that the router was accessing a valid memory address, but the hardware corresponding to that\r\naddress is not responding properly. This indicates a hardware problem.\r\nIf the address reported by the bus error does not fall within the ranges displayed in the show region output, this\r\nerror means that the router was trying to access an address that is not valid, which indicates that it is a Cisco IOS\r\nsoftware problem.\r\nMore detailed information is available on Cisco.com in Tech Note #7949, \"Troubleshooting Bus Error Crashes\".\r\nTransient Memory Allocation\r\nThe Transient Memory Allocation feature is enabled on platforms like the Cisco 7200 series router and the Cisco\r\n10000 series router. This feature allocates all transient memory in a separate memory address space (separate\r\nregion), so that there is no interleaving of static and transient memory blocks. Hence, the output of the show\r\nregion command will have heap region memory size in chunks of 16 MB.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 5 of 155\n\nExamples\r\nThe following is sample output from the show region command:\r\nRouter# show region\r\nRegion Manager:\r\n Start End Size(b) Class Media Name\r\n 0x0C000000 0x0FFFFFFF 67108864 Iomem R/W iomem\r\n 0x20000000 0x2FFFFFFF 268435456 Local R/W extended_2\r\n 0x50000000 0x5FFFFFFF 268435456 Local R/W extended_1\r\n 0x60000000 0x7BFFFFFF 469762048 Local R/W main\r\n 0x600090F8 0x6200A807 33560336 IText R/O main:text\r\n 0x62014C50 0x62F5B1EF 16016800 IData R/W main:data\r\n 0x62F5B1F0 0x6333500F 4038176 IBss R/W main:bss\r\n 0x63335010 0x6359A0D3 2511044 Local R/W main:saved-data\r\n 0x6359A0D4 0x6459A0D3 16777216 Local R/W main:heap\r\n 0x7B000000 0x7BFFFFFF 16777216 Local R/W main:heap\r\n 0x80000000 0x8BFFFFFF 201326592 Local R/W main:(main_k0)\r\n 0xA0000000 0xABFFFFFF 201326592 Local R/W main:(main_k1)\r\nFree Region Manager:\r\n \r\n Start End Size(b) Class Media Name\r\n 0x6459A12C 0x7AFFFFA7 380001916 Local R/W heap\r\nThe following table describes the significant fields shown in the display.\r\nTable 1. show region Field Descriptions\r\nField Description\r\nStart Start address of the memory block.\r\nEnd End address of the memory block.\r\nSize(b) Size of the memory block.\r\nClass Class of the memory.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 6 of 155\n\nField Description\r\nMedia Type of the region media. Read-only (R/O), read-write (R/W), and so on.\r\nName Name of the region.\r\nIomem Input/output (I/O) memory. It is a type of packet memory.\r\nLocal Local memory.\r\nIText Image text memory.\r\nIData Image data memory.\r\nIBss Image blind source separation (BSS) memory.\r\nR/W Read and write memory.\r\nR/O Read-only memory.\r\nRelated Commands\r\nCommand Description\r\nshow context\r\nDisplays information stored in NVRAM when an unexpected system reload (system\r\nexception) occurs.\r\nshow\r\nmemory\r\nDisplays detailed memory statistics for the system.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 7 of 155\n\nCommand Description\r\nshow version Shows hardware and software information for the system.\r\nshow registry\r\nTo display the function registry information when Cisco IOS or Cisco IOS Software Modularity images are\r\nrunning, use the show registry command in user EXEC or privileged EXEC mode.\r\nCisco IOS Software\r\nshow registry [registry-name [registry-number] ] [brief | statistics]\r\nCisco IOS Software Modularity\r\nshow registry [name [registry-name [registry-number] ]] [brief [name [registry-name [registry-number] ]] |\r\npreemptions | rpcp status | statistics [brief] [name [registry-name [registry-number] ]] [remote]] [process\r\n{process-name | process-id}]\r\nSyntax Description\r\nCisco IOS Software Syntax\r\nregistry-name (Optional) Name of the registry to display.\r\nregistry-number (Optional) Number of the registry to display.\r\nbrief (Optional) Displays limited functions and services information.\r\nstatistics (Optional) Displays function registry statistics.\r\nCisco IOS Software Modularity Syntax\r\nname (Optional) Displays information about a specific registry.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 8 of 155\n\nCisco IOS Software Syntax\r\nregistry-name (Optional) Name of the registry to examine.\r\nregistry-number (Optional) Number of the registry to examine.\r\nbrief (Optional) Displays limited functions and services information.\r\npreemptions (Optional) Displays registry preemptions information.\r\nrpcp status (Optional) Displays status of remote procedure call (RPC) proxy.\r\nstatistics (Optional) Displays function registry statistics.\r\nremote (Optional) Displays name server interactions and call statistics.\r\nprocess (Optional) Displays process-specific information.\r\nprocess-name (Optional) Process name.\r\nprocess-id (Optional) Process ID. Number in range from 1 to 4294967295.\r\nCommand Default\r\nIf no options are specified, registry information is displayed for all registries.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#)\r\nCommand History\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 9 of 155\n\nRelease Modification\r\n11.1 This command was introduced.\r\n12.2(18)SXF4\r\nKeywords and arguments were added to support Software Modularity images and this\r\ncommand was integrated into Cisco IOS Release 12.2(18)SXF4.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nExamples\r\nExample output varies between Cisco IOS software images and Cisco IOS Software Modularity software images.\r\nTo view the appropriate output, choose one of the following sections:\r\nCisco IOS Software\r\nCisco IOS Software Modularity\r\nExamples\r\nThe following is sample output from the show registry command using the brief keyword:\r\nRouter# show registry atm 3/0/0 brief\r\nRegistry objects: 1799 bytes: 213412\r\n--\r\nRegistry 23: ATM Registry\r\n Service 23/0:\r\n Service 23/1:\r\n Service 23/2:\r\n Service 23/3:\r\n Service 23/4:\r\n Service 23/5:\r\n Service 23/6:\r\n Service 23/7:\r\n Service 23/8:\r\n Service 23/9:\r\n Service 23/10:\r\n Service 23/11:\r\n Service 23/12:\r\n Service 23/13:\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 10 of 155\n\nService 23/14:\r\n.\r\n.\r\n.\r\nRegistry 25: ATM routing Registry\r\n Service 25/0:\r\nThe following table describes the significant fields shown in the display.\r\nTable 2. show registry brief (Cisco IOS) Field Descriptions\r\nField Description\r\nRegistry objects Number of objects in the registry.\r\nbytes Registry size, in bytes.\r\nRegistry Displays the specified registry service number and type of registry service.\r\nExamples\r\nThe following is partial sample output from the show registry command when running a software Modularity\r\nimage:\r\nRouter# show registry\r\nRegistry information for ios-base:1:\r\n=====================================================\r\n----------------------------\r\nAAA_ACCOUNTING : 11 services\r\n / 1 : List list[000]\r\n / 2 : List list[000]\r\n / 3 : Case size[020] list[000] default=0x7267C5D0 returnd\r\n / 4 : Case size[020] list[000] default=0x7267C5D0 returnd\r\n 16 0x72779400\r\n / 5 : Case size[020] list[000] default=0x7267C5D0 returnd\r\n / 6 : Case size[020] list[000] default=0x7267C5D0 returnd\r\n 16 0x7277915C\r\n / 7 : Retval size[020] list[000] default=0x7267C5E4 returno\r\n / 8 : Retval size[020] list[000] default=0x7267C5E4 returno\r\n / 9 : Retval size[020] list[000] default=0x7267C5E4 returno\r\n / 10 : Stub 0x7267C5E4 return_zero\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 11 of 155\n\n/ 11 : Stub 0x76545BA0\r\nAAA_ACCOUNTING : 11 services, 140 global bytes, 160 heap bytes\r\n.\r\n.\r\n.\r\nThe following table describes the significant fields shown in the display.\r\nTable 3. show registry (Software Modularity) Field Descriptions\r\nField Description\r\nRegistry information Displays the registry information by process name.\r\nservices Number of services displayed.\r\nglobal bytes Number of bytes for the service,\r\nheap bytes Size of the service heap, in bytes,\r\nshow reload\r\nTo display the reload status on the router, use the show reload command in EXEC mode.\r\nshow reload\r\nSyntax Description\r\nThis command has no arguments or keywords.\r\nCommand Modes\r\nEXEC\r\nCommand History\r\nRelease Modification\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 12 of 155\n\nRelease Modification\r\n11.2 This command was introduced.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nUsage Guidelines\r\nYou can use the show reload command to display a pending software reload. To cancel the reload, use the reload\r\ncancel privileged EXEC command.\r\nExamples\r\nThe following sample output from the show reload command shows that a reload is schedule for 12:00 a.m.\r\n(midnight) on Saturday, April 20:\r\nRouter# show reload\r\nReload scheduled for 00:00:00 PDT Sat April 20 (in 12 hours and 12 minutes)\r\nRouter#\r\nRelated Commands\r\nCommand Description\r\nreload Reloads the operating system.\r\nshow reload history\r\nTo display the reason for the device reload and its history, use the show reload history command in privileged\r\nEXEC mode.\r\nshow reload history\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 13 of 155\n\nCommand History\r\nRelease Modification\r\nCisco IOS\r\nXE\r\n17.13.1a\r\nThis command was introduced (as show reload-history ) on Cisco Catalyst 8200, 8300, and\r\n8500 Series Edge Platforms, Cisco Catalyst 8000V Edge Software, Cisco 4000 Series\r\nIntegrated Services Routers, Cisco 1000 Series Integrated Services Routers, and Cisco ASR\r\n1000 Series Aggregation Services Router .\r\nCisco IOS\r\nXE\r\n17.14.1a\r\nThis command was modified from show reload-history to show reload history. This command\r\nis supported on Cisco Catalyst 8200, 8300, and 8500 Series Edge Platforms, Cisco Catalyst\r\n8000V Edge Software, Cisco 4000 Series Integrated Services Routers, Cisco 1000 Series\r\nIntegrated Services Routers, and Cisco ASR 1000 Series Aggregation Services Routers.\r\nUsage Guidelines\r\nYou can use this command when you want to view the reload history details.\r\nNote\r\nThis command displays the history for a maximum of 10 reloads.\r\nExamples\r\nThe following is sample output of the show reload-history command:\r\nDevice#show reload-history\r\nReload History:\r\nReload Index: 1\r\nReload Code: Reload\r\nReload Description: Reload Command\r\nReload Severity: Normal Reboot\r\nReload Time: 01:33:44 UTC Wed Nov 30 2022\r\nReload Index: 2\r\nReload Code: Critical Process Fault\r\nReload Description: Critical process stack_mgr fault on rp_0_0 (rc=137), system report at\r\nbootflash:core/Yang_Test-system-report_20221130-012929-UTC.tar.gz\r\nReload Severity: Abnormal Reboot\r\nReload Time: 01:31:11 UTC Wed Nov 30 2022\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 14 of 155\n\nReload Index: 3\r\nReload Code: Image Install\r\nReload Description: Image Install\r\nReload Severity: Normal Reboot\r\nReload Time: 01:25:03 UTC Wed Nov 30 2022\r\nReload Index: 4\r\nReload Code: Critical Process Fault\r\nReload Description: Critical process rif_mgr fault on rp_0_0 (rc=137), system report at\r\nbootflash:core/Yang_Test-system-report_20221130-011127-UTC.tar.gz\r\nReload Severity: Abnormal Reboot\r\nReload Time: 01:13:08 UTC Wed Nov 30 2022\r\nReload Index: 5\r\nReload Code: Reload\r\nReload Description: Reload Command\r\nReload Severity: Normal Reboot\r\nReload Time: 01:08:26 UTC Wed Nov 30 2022\r\nReload Index: 6\r\nReload Code: Critical Process Fault\r\nReload Description: Critical process wncmgrd fault on rp_0_0 (rc=137), system report at\r\nbootflash:core/Yang_Test-system-report_20221130-010338-UTC.tar.gz\r\nReload Severity: Abnormal Reboot\r\nReload Time: 01:05:23 UTC Wed Nov 30 2022\r\nReload Index: 7\r\nReload Code: Reload\r\nReload Description: Reload Command\r\nReload Severity: Normal Reboot\r\nReload Time: 01:01:09 UTC Wed Nov 30 2022\r\nReload Index: 8\r\nReload Code: Reload\r\nReload Description: Reload Command\r\nReload Severity: Normal Reboot\r\nReload Time: 00:57:27 UTC Wed Nov 30 2022\r\nReload Index: 9\r\nReload Code: Reload\r\nReload Description: Reload Command\r\nReload Severity: Normal Reboot\r\nReload Time: 00:22:34 UTC Wed Nov 30 2022\r\nReload Index: 10\r\nReload Code: Fast Switchover\r\nReload Description: redundancy force-switchover\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 15 of 155\n\nReload Severity: Normal Reboot\r\nReload Time: 23:40:01 UTC Tue Nov 29 2022\r\nNote\r\nThe show reload-history command is applicable to Cisco IOS XE 17.13.1a release.\r\nExamples\r\nThe following is sample output of the show reload history command:\r\nDevice#show reload history\r\nReload History:\r\nUnit ID: rp0\r\nReload Index: 1\r\nReload Code: Reload\r\nReload Severity: Normal Reboot\r\nReload Description: Reload Command\r\nCrash Data: -NA-HA Status: Active\r\nSoftware Version: 17.15.20240201:182652101\r\nReload Time: 17:54:47 UTC Mon Feb 5 2024\r\nNote\r\nThe show reload history command is applicable to Cisco IOS XE 17.14.1a and later releases.\r\nshow resource-pool queue\r\nTo display resource pool and queue information about the router, use the show resource-pool queue command in\r\nuser EXEC or privileged EXEC mode.\r\nshow resource-pool queue {description | statistics}\r\nSyntax Description\r\ndescription Displays information about the resource-pool queue description.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 16 of 155\n\nstatistics Displays information about the resource-pool queue statistics.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n15.0(1)M This command was introduced in a release earlier than Cisco IOS Release 15.0(1)M.\r\nUsage Guidelines\r\nUse the show resource-pool queue command to display the resource pool and queue information on the router.\r\nExamples\r\nThe following is sample output from the show resource-pool queue description command. The field descriptions\r\nare self-explanatory.\r\nRouter# show resource-pool description\r\nResource-management call state description\r\nState Description\r\n--------------------------- -----------\r\nRM_DNIS_AUTHOR : Waiting for DNIS author\r\nRM_DNIS_AUTH_SUCCEEDED : Waiting for resource alloc\r\nRM_DNIS_RES_ALLOCATED : Call established\r\nRM_DNIS_REQ_IDLE : Disc while in RM_DNIS_AUTHOR/RM_DNIS_AUTH_SUCCEEDED\r\n/RM_DNIS_REQ_IDLE_AUTHOR\r\nRM_DNIS_REQ_IDLE_AUTHOR : New call while in RM_DNIS_REQ_IDLE\r\nRM_RPM_RES_AUTHOR : Waiting for RPM author\r\nRM_RPM_RES_ALLOCATING : Waiting for resource alloc\r\nRM_RPM_RES_ALLOCATED : RPM call established\r\nRM_RPM_AUTH_REQ_IDLE : Disc while in RM_RPM_RES_AUTHOR\r\n/RM_RPM_AUTH_REQ_IDLE_AUTHOR\r\nRM_RPM_RES_REQ_IDLE : Disc while in RM_RPM_RES_ALLOCATING\r\n/RM_RPM_RES_REQ_IDLE_AUTHOR\r\nRM_RPM_AUTH_REQ_IDLE_AUTHOR: New call while in RM_RPM_AUTH_REQ_IDLE\r\nRM_RPM_RES_REQ_IDLE_AUTHOR : New call while in RM_RPM_RES_REQ_IDLE\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 17 of 155\n\nRM_RPM_DISCONNECTING : RPM initiates disconnect and is waiting for ack\r\nRM_RPM_DISCONNECTING_AUTHOR: New call while in RM_RPM_DISCONNECTING\r\n5400-XM-1#sh resource-pool queue stat\r\nThe following is sample output from the show resource-pool queue statistics command:\r\nRouter# show resource-pool statistics\r\nResource-management event queue information (queue depth 0)\r\nEvent In queue Total\r\n--------------------------- ---------- ----------\r\nDIALER_INCALL : 0 0\r\nDIALER_DISCON : 0 0\r\nGUARDTIMER_EXPIRY_EVENT : 0 0\r\nRM_DNIS_AUTHOR_SUCCESS : 0 0\r\nRM_DNIS_AUTHOR_FAIL : 0 0\r\nRM_DNIS_RES_ALLOC_SUCCESS : 0 0\r\nRM_DNIS_RES_ALLOC_FAIL : 0 0\r\nRM_DNIS_RPM_REQUEST : 0 0\r\nRM_RPM_RES_AUTHOR_SUCCESS : 0 0\r\nRM_RPM_RES_AUTHOR_FAIL : 0 0\r\nRM_RPM_RES_ALLOC_SUCCESS : 0 0\r\nRM_RPM_RES_ALLOC_FAIL : 0 0\r\nRM_RPM_DISC_ACK : 0 0\r\n--------------------------- ---------- ----------\r\nSUM : 0 0\r\nResource-management call information (0 active calls)\r\nState Active Total\r\n--------------------------- ---------- ----------\r\nRM_DNIS_AUTHOR : 0 0\r\nRM_DNIS_AUTH_SUCCEEDED : 0 0\r\nRM_DNIS_RES_ALLOCATED : 0 0\r\nRM_DNIS_REQ_IDLE : 0 0\r\nRM_DNIS_REQ_IDLE_AUTHOR : 0 0\r\nRM_RPM_RES_AUTHOR : 0 0\r\nRM_RPM_RES_ALLOCATING : 0 0\r\nRM_RPM_RES_ALLOCATED : 0 0\r\nRM_RPM_AUTH_REQ_IDLE : 0 0\r\nRM_RPM_RES_REQ_IDLE : 0 0\r\nRM_RPM_AUTH_REQ_IDLE_AUTHOR: 0 0\r\nRM_RPM_RES_REQ_IDLE_AUTHOR : 0 0\r\nRM_RPM_DISCONNECTING : 0 0\r\nRM_RPM_DISCONNECTING_AUTHOR: 0 0\r\n--------------------------- ---------- ----------\r\nSUM : 0 0\r\n00:03:34 since last clear command\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 18 of 155\n\nOther resource-management info:\r\nActive Processes 4\r\nThrottle limit 4 (0 calls rejected)\r\nEvent queue depth 0 (peak 0)\r\nPending calls 0 (peak 0)\r\nBuffer queue depth 648 (low watermark 648)\r\nshow rhosts\r\nTo display information about current remote hosts, use the show rhosts command in privileged EXEC mode.\r\nshow rhosts\r\nSyntax Description\r\nThis command has no arguments or keywords.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n12.4(22)T This command was introduced in a release earlier than Cisco IOS Release 12.4(22)T.\r\n12.2(33)SRC\r\nThis command was integrated into a release earlier than Cisco IOS Release\r\n12.2(33)SRC.\r\n12.2(33)SXI This command was integrated into a release earlier than Cisco IOS Release 12.2(33)SXI.\r\nCisco IOS 2.1\r\nXE\r\nThis command was integrated into Cisco IOS XE Release 2.1.\r\nExamples\r\nThe following is sample output from the show rhosts command.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 19 of 155\n\nRouter# show rhosts\r\nLocal user Host/Access list Remote user\r\ntcp-scale-mcp1 12 tcp-scale-mcp2\r\ntcp-scale-mcp1 12 tcp-scale-3\r\nThe following table describes the significant fields shown in the display.\r\nTable 4. show rhosts Field Descriptions\r\nField Description\r\nLocal user\r\nDisplays the name of the user on the local router. This name gets communicated to the\r\nnetwork administrator or to the user on the remote system.\r\nHost/Access\r\nlist\r\nDisplays the name or the IP address of the remote host from which the local router will\r\naccept remotely executed commands.\r\nRemote user\r\nDisplays the name of the user on the remote host from which the router will accept remotely\r\nexecuted commands.\r\nRelated Commands\r\nCommand Description\r\nip rcmd remote-hostCreates an entry for the remote user in a local authentication database so that remote users\r\ncan execute commands on the router using RSH or RCP.\r\nshow rom-monitor\r\nTo show both the read-only and the upgrade ROM monitor (ROMMON) image versions and also the ROMMON\r\nimage running on the Cisco 7200 VXR or Cisco 7301 router, use the show rom-monitor command in user EXEC,\r\nprivileged EXEC, or diagnostic mode.\r\nSupported Platforms Other than the Cisco ASR1000 Series Routers\r\nshow rom-monitor\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 20 of 155\n\nCisco ASR 1000 Series Routers\r\nshow rom-monitor slot\r\nSyntax Description\r\nslot\r\nSpecifies the slot that contains the ROMMON. Options include:\r\nnumber --The number of the SIP slot that requires the ROMMON upgrade.\r\nF0 --Embedded Service Processor slot 0.\r\nF1 --Embedded Service Processor slot 1.\r\nFP active --Active Embedded Service Processor.\r\nFP standby --Sstandby Embedded Service Processor.\r\nR0 --Route Processor slot 0.\r\nR1 --Route Processor slot 1.\r\nRP active --Active Route Processor.\r\nRP standby --Standby Route Processor.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#) Diagnostic (diag)\r\nCommand History\r\nRelease Modification\r\n12.0(28)S This command was introduced on the Cisco 7200 VXR router.\r\n12.3(9)\r\nThis command was integrated into Cisco IOS Release 12.3(9) and implemented on the\r\nCisco 7301 router.\r\n12.3(8)T This command was integrated into Cisco IOS Release 12.3(8)T.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 21 of 155\n\nRelease Modification\r\n12.2SX\r\nThis command is supported in the Cisco IOS Release 12.2SX train. Support in a specific\r\n12.2SX release of this train depends on your feature set, platform, and platform hardware.\r\nCisco IOS XE\r\nRelease 2.1\r\nThis command was introduced on the Cisco ASR 1000 Series Routers and the following\r\nenhancements were introduced:\r\nThis command was introduced in diagnostic mode. The command can be entered in\r\nboth privileged EXEC and diagnostic mode on the Cisco ASR 1000 Series Routers.\r\nThe slot argument was introduced.\r\n15.0(1)M\r\nThe command was modified on Cisco 1800 series routers. The output of the command was\r\nmodified to let you know that the upgradable ROMMON version is not visible due to the\r\nlicense activity and reload is required.\r\nUsage Guidelines\r\nUse the show rom-monitor command when the router boots a Cisco IOS software iamge. In this case, the device\r\nprompt will be something like “Router\u003e”. Use the showmon command when the device boot to Rom Monitor\r\nmode instead of booting a Cisco IOS image. In this case, the device prompt will be something like “rommon n \u003e”\r\nwhere \"n\" is a number.\r\nNote\r\nOn Cisco 1800 series routers, the show rom-monitor command does not show the version of the\r\nupgradable ROMMON. To view the version of the upgradable ROMMON, you may need to reload\r\nthe router while using the upgradable ROMMON image. If you are using the read-only ROMMON,\r\nthen the upgradable ROMMON disappears. You need to run the upgrade rom-monitor file command\r\nfor the upgradable ROMMON. Otherwise, the upgrade rom-monitor preference upgrade command is\r\nrejected with the message “No Upgrade ROMMON present, cannot select it.” During ROMMON\r\nbootup, if you are running upgradable ROMMON, then the ROMMON first displays the read-only\r\nROMMON message, “Running new upgrade for first time.” This message is followed by the\r\nupgradable ROMMON message.\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 22 of 155\n\nThe following sample output from the show rom-monitor command, applicable to both the Cisco 7200 VXR and\r\nCisco 7301 routers, displays both the ROMMON images and verifies that the upgrade ROMMON image is\r\nrunning:\r\nRouter\u003e show rom-monitor\r\nReadOnly ROMMON version:\r\nSystem Bootstrap, Version 12.2(20031011:151758)\r\nCopyright (c) 2004 by Cisco Systems, Inc.\r\nUpgrade ROMMON version:\r\nSystem Bootstrap, Version 12.2(20031011:151758)\r\nCopyright (c) 2004 by Cisco Systems, Inc.\r\nCurrently running ROMMON from Upgrade region\r\nROMMON from Upgrade region is selected for next boot\r\nThe following is sample output from the show rom-monitor command in on Cisco 1800 series routers. To view the ve\r\nRouter# show rom-monitor\r\nReadOnly ROMMON version:\r\nSystem Bootstrap, Version 12.3(8r)YH3, RELEASE SOFTWARE (fc1)\r\nTechnical Support: http://www.cisco.com/techsupport\r\nCopyright (c) 2005 by cisco Systems, Inc.\r\nUpgrade ROMMON version is not visible due to recent license activity,\r\nsuch as license installation, removal, or the use of evaluation license\r\nReload is required to show the upgrade ROMMON version\r\nCurrently running ROMMON from Upgrade region\r\nROMMON from Upgrade region is selected for next boot\r\nRouter# reload\r\nProceed with reload? [confirm]\r\n*Apr 13 18:44:08.583: %SYS-5-RELOAD: Reload requested by console. Reload Reason: Reload Command.\r\nSystem Bootstrap, Version 12.3(8r)YH3, RELEASE SOFTWARE (fc1)\r\nTechnical Support: http://www.cisco.com/techsupport\r\nCopyright (c) 2005 by cisco Systems, Inc.\r\n Running new upgrade for first time\r\nSystem Bootstrap, Version 12.3(8r)YH13, RELEASE SOFTWARE (fc1)\r\nTechnical Support: http://www.cisco.com/techsupport\r\nCopyright (c) 2008 by cisco Systems, Inc.\r\nC1800 platform with 262144 Kbytes of main memory with parity disabled\r\nUpgrade ROMMON initialized\r\nIn the following example, the ROMMON image in RP 0 of a Cisco ASR 1006 router is verified using the show\r\nrom-monitor command:\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 23 of 155\n\nRouter# show rom-monitor r0\r\nSystem Bootstrap, Version 12.2(33r)XN1, RELEASE SOFTWARE (fc1)\r\nTechnical Support: http://www.cisco.com/techsupport\r\nCopyright (c) 2007 by cisco Systems, Inc.\r\nThe fields in the examples are self-explanatory.\r\nshow rom-monitor slot\r\nTo display the ROM monitor (ROMMON) status, use the show rom-monitor command in user EXEC or\r\nprivileged EXEC mode.\r\nshow rom-monitor slot num {sp | rp}\r\nSyntax Description\r\nnum Displays the slot number of the ROMMON for which the status is to be displayed.\r\nsp Displays the ROMMON status of the switch processor.\r\nrp Displays the ROMMON status of the route processor.\r\nCommand Modes\r\nUser EXEC Privileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.2(14)SX Support for this command was introduced on the Supervisor Engine 720.\r\n12.2(17d)SXB\r\nSupport for this command on the Supervisor Engine 2 was integrated into Release\r\n12.2(17d)SXB.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 24 of 155\n\nRelease Modification\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nUsage Guidelines\r\nWhen you enter the show rom-monitor slot command, the output displays the following:\r\nRegion region1 and region2--Displays the status of the ROMMON image and the order of preference from\r\nwhich the region1 or region2 images should be booted. The ROMMON image status values are as follows:\r\nFirst run--Indicates that a check of the new image is being run.\r\nInvalid--Indicates that the new image has been checked and the upgrade process has started.\r\nApproved--Indicates that the ROMMON field upgrade process has completed.\r\nCurrently running--This field displays the currently running image and the region.\r\nThe sp or rp keyword is required only if a supervisor engine is installed in the specified slot.\r\nExamples\r\nThis example shows how to display ROMMON information:\r\nRouter# show rom-monitor slot 1 sp\r\n Region F1:APPROVED\r\n Region F2:FIRST_RUN, preferred\r\n Currently running ROMMON from F1 region\r\nRouter#\r\nRelated Commands\r\nCommand Description\r\nupgrade rom-monitor Sets the execution preference on a ROMMON.\r\nshow running identity policy\r\nTo display identity policy information, use the show running identity policy command in privileged EXEC mode.\r\nshow running identity policy [name]\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 25 of 155\n\nSyntax Description\r\nname (Optional) Name of the identity policy.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n12.2(18)SX This command was introduced.\r\nExamples\r\nThe following is output from the show running identity policy command:\r\nRouter# show running identity policy\r\nBuilding configuration...\r\nCurrent configuration:\r\nidentity policy p1\r\n access-group some-acl\r\nidentity policy p2\r\n access-group another-acl\r\n redirect url http://www.foo.com/bar.html match redirect-acl\r\nend\r\nRelated Commands\r\nCommand Description\r\nshow running-configuration Displays the running configuration for a router.\r\nshow running identity profile\r\nTo display identity profile information, use the show running identity profile command in privileged EXEC mode.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 26 of 155\n\nshow running identity profile [default | dot1x | eapoudp]\r\nSyntax Description\r\ndefault (Optional) Displays default identity profile information.\r\ndot1x (Optional) Displays 802.1x identity profile information.\r\neapoudp (Optional) Displays EAPoUDP identity profile information.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n12.2(18)SX This command was introduced.\r\nExamples\r\nThe following is output from the show running identity profile command:\r\nRouter# show running identity profile\r\nBuilding configuration...\r\nCurrent configuration:\r\nidentity profile default\r\n device authorize type cisco ip phone\r\nidentity profile eapoudp\r\n device authorize ip-address 10.0.0.0 255.0.0.0 policy p1\r\nidentity profile dot1x\r\n device authorize mac-address 0001.0203.0405 ffff.ffff.ffff policy p2\r\nend\r\nRelated Commands\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 27 of 155\n\nCommand Description\r\nshow running-configuration Displays the running configuration for a router.\r\nshow running-config\r\nTo display the contents of the current running configuration file or the configuration for a specific module, Layer\r\n2 VLAN, class map, interface, map class, policy map, or virtual circuit (VC) class, use the show running-config\r\ncommand in privileged EXEC mode.\r\nshow running-config [options]\r\nSyntax Description\r\noptions (Optional) Keywords used to customize output. You can enter more than one keyword.\r\nall --Expands the output to include the commands that are configured with default\r\nparameters. If the all keyword is not used, the output does not display commands configured\r\nwith default parameters.\r\nbrief --Displays the configuration without certification data and encrypted filter details. The\r\nbrief keyword can be used with the linenum keyword.\r\nclass-map [name ] [linenum ]--Displays class map information. The linenum keyword can\r\nbe used with the class-map name option.\r\ncontrol-plane [cef-exception | host | transit ]--Displays control-plane information. The cef-exception , host , and transit keywords can be used with the control-plane option.\r\nflow {exporter | monitor | record }--Displays global flow configuration commands. The\r\nexporter , monitor , and record keywords can be used with the flow option.\r\nfull --Displays the full configuration.\r\ninterface type number -- Displays interface-specific configuration information. If you use\r\nthe interface keyword, you must specify the interface type and the interface number (for\r\nexample, interface ethernet 0 ). Keywords for common interfaces include async , ethernet ,\r\nfastEthernet , group-async , loopback , null , serial , and virtual-template . Use the show run\r\ninterface ? command to determine the interfaces available on your system.\r\nlinenum --Displays line numbers in the output. The brief or full keyword can be used with\r\nthe linenum keyword. The linenum keyword can be used with the class-map , interface ,\r\nmap-class , policy-map , and vc-class keywords.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 28 of 155\n\nmap-class [atm | dialer | frame-relay ] [name ] [linenum ]--Displays map class information.\r\nThis option is described separately; see the show running-config map-class command page.\r\npartition types -- Displays the configuration corresponding to a partition. The types keyword\r\ncan be used with the partition option.\r\npolicy-map [name ] [linenum ]--Displays policy map information. The linenum keyword\r\ncan be used with the policy-map name option.\r\nvc-class [name ] [linenum ]--Displays VC-class information (the display is available only on\r\ncertain devices such as the Cisco 7500 series devices). The linenum keyword can be used\r\nwith the vc-class name option.\r\nview full --Enables the display of a full running configuration. This is for view-based users\r\nwho typically can only view the configuration commands that they are entitled to access for\r\nthat particular view.\r\nvrf name --Displays the Virtual routing and forwarding (VRF)-aware configuration module\r\nnumber .\r\nvlan [vlan-id ]--Displays the specific VLAN information ; valid values are from 1 to 4094.\r\nCommand Default\r\nThe default syntax, show running-config , displays the contents of the running configuration file, except\r\ncommands configured using the default parameters.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n11.0 This command was introduced.\r\n12.0 This command was replaced by the more system:running-config command.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 29 of 155\n\nRelease Modification\r\n12.0(1)T\r\nThis command was integrated into Cisco IOS Release 12.0(1)T, and the output modifier (| )\r\nwas added.\r\n12.2(4)T This command was modified. The linenum keyword was added.\r\n12.3(8)T This command was modified. The view full option was added.\r\n12.2(14)SX\r\nThis command was integrated into Cisco IOS Release 12.2(14)SX. The module number and\r\nvlan vlan-id keywords and arguments were added for the Supervisor Engine 720.\r\n12.2(17d)SXB\r\nThis command was integrated into Release 12.2(17d)SXB and implemented on the\r\nSupervisor Engine 2.\r\n12.2(33)SXH This command was modified. The all keyword was added.\r\n12.2(31)SB2\r\nThis command was integrated into Cisco IOS Release 12.2(31)SB2. This command was\r\nenhanced to display the configuration information for traffic shaping overhead accounting\r\nfor ATM and was implemented on the Cisco 10000 series device for the PRE3.\r\n12.2(33)SRC This command was integrated into Cisco IOS Release 12.2(33)SRC.\r\n12.2(33)SB This command was modified. Support for the Cisco 7300 series device was added.\r\n12.4(24)T\r\nThis command was modified in a release earlier than Cisco IOS Release 12.4(24)T. The\r\npartition and vrf keywords were added. The module and vlan keywords were removed.\r\n15.0(1)M\r\nThis command was modified. The output was modified to include encrypted filter\r\ninformation.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 30 of 155\n\nRelease Modification\r\n12.2(33)SXI\r\nThis command was modified. The output was modified to display Access Control List\r\n(ACL) information.\r\nUsage Guidelines\r\nThe show running-config command is technically a command alias (substitute or replacement syntax) of the more\r\nsystem:running-config command. Although the use of more commands is recommended (because of their uniform\r\nstructure across platforms and their expandable syntax), the show running-config command remains enabled to\r\naccommodate its widespread use, and to allow typing shortcuts such as show run .\r\nThe show running-config interface command is useful when there are multiple interfaces and you want to look at\r\nthe configuration of a specific interface.\r\nThe linenum keyword causes line numbers to be displayed in the output. This option is useful for identifying a\r\nparticular portion of a very large configuration.\r\nYou can enter additional output modifiers in the command syntax by including a pipe character (|) after the\r\noptional keyword. For example, show running-config interface serial 2/1 linenum | begin 3 . To display the output\r\nmodifiers that are available for a keyword, enter | ? after the keyword. Depending on the platform you are using,\r\nthe keywords and the arguments for the options argument may vary.\r\nPrior to Cisco IOS Release 12.2(33)SXH, the show running-config command output omitted configuration\r\ncommands set with default values. Effective with Cisco IOS Release 12.2(33)SXH, the show running-config all\r\ncommand displays complete configuration information, including the default settings and values. For example, if\r\nthe Cisco Discovery Protocol (abbreviated as CDP in the output) hold-time value is set to its default of 180:\r\nThe show running-config command does not display this value.\r\nThe show running-config all displays the following output: cdp holdtime 180.\r\nIf the Cisco Discovery Protocol holdtime is changed to a nondefault value (for example, 100), the output of the\r\nshow running-config and show running-config all commands is the same; that is, the configured parameter is\r\ndisplayed.\r\nNote\r\nIn Cisco IOS Release 12.2(33)SXH, the all keyword expands the output to include some of the\r\ncommands that are configured with default values. In subsequent Cisco IOS releases, additional\r\nconfiguration commands that are configured with default values will be added to the output of the\r\nshow running-config all command.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 31 of 155\n\nEffective with Cisco IOS Release 12.2(33)SXI, the show running-config command displays ACL information. To\r\nexclude ACL information from the output, use the show running | section exclude ip access | access list command.\r\nCisco 7600 Series Device\r\nIn some cases, you might see a difference in the duplex mode that is displayed between the show interfaces\r\ncommand and the show running-config command. The duplex mode that is displayed in the show interfaces\r\ncommand is the actual duplex mode that the interface is running. The show interfaces command displays the\r\noperating mode of an interface, and the show running-config command displays the configured mode of the\r\ninterface.\r\nThe show running-config command output for an interface might display the duplex mode but no configuration\r\nfor the speed. This output indicates that the interface speed is configured as auto and that the duplex mode that is\r\ndisplayed becomes the operational setting once the speed is configured to something other than auto. With this\r\nconfiguration, it is possible that the operating duplex mode for that interface does not match the duplex mode that\r\nis displayed with the show running-config command.\r\nExamples\r\nThe following example shows the configuration for serial interface 1. The fields are self-explanatory.\r\nDevice# show running-config interface serial 1\r\nBuilding configuration...\r\nCurrent configuration:\r\n!\r\ninterface Serial1\r\n no ip address\r\n no ip directed-broadcast\r\n no ip route-cache\r\n no ip mroute-cache\r\n shutdown\r\nend\r\nThe following example shows the configuration for Ethernet interface 0/0. Line numbers are displayed in the\r\noutput. The fields are self-explanatory.\r\nDevice# show running-config interface ethernet 0/0 linenum\r\nBuilding configuration...\r\nCurrent configuration : 104 bytes\r\n 1 : !\r\n 2 : interface Ethernet0/0\r\n 3 : ip address 10.4.2.63 255.255.255.0\r\n 4 : no ip route-cache\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 32 of 155\n\n5 : no ip mroute-cache\r\n 6 : end\r\nThe following example shows how to set line numbers in the command output and then use the output modifier to\r\nstart the display at line 10. The fields are self-explanatory.\r\nDevice# show running-config linenum | begin 10\r\n 10 : boot-start-marker\r\n 11 : boot-end-marker\r\n 12 : !\r\n 13 : no logging buffered\r\n 14 : enable password #####\r\n 15 : !\r\n 16 : spe 1/0 1/7\r\n 17 : firmware location bootflash:mica-modem-pw.172.16.0.0.bin\r\n 18 : !\r\n 19 : !\r\n 20 : resource-pool disable\r\n 21 : !\r\n 22 : no aaa new-model\r\n 23 : ip subnet-zero\r\n 24 : ip domain name cisco.com\r\n 25 : ip name-server 172.16.11.48\r\n 26 : ip name-server 172.16.2.133\r\n 27 : !\r\n 28 : !\r\n 29 : isdn switch-type primary-5ess\r\n 30 : !\r\n .\r\n .\r\n .\r\n 126 : end\r\nThe following example shows how to display the module and status configuration for all modules on a Cisco 7600\r\nseries device. The fields are self-explanatory.\r\nDevice#\r\nshow running-config\r\nBuilding configuration...\r\nCurrent configuration:\r\n!\r\nversion 12.0\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 33 of 155\n\nservice timestamps debug datetime localtime\r\nservice timestamps log datetime localtime\r\nno service password-encryption\r\n!\r\nhostname device\r\n!\r\nboot buffersize 126968\r\nboot system flash slot0:7600r\r\nboot bootldr bootflash:c6msfc-boot-mz.120-6.5T.XE1.0.83.bin\r\nenable password lab\r\n!\r\nclock timezone Pacific -8\r\nclock summer-time Daylight recurring\r\nredundancy\r\n main-cpu\r\n auto-sync standard\r\n!\r\nip subnet-zero\r\n!\r\nip multicast-routing\r\nip dvmrp route-limit 20000\r\nip cef\r\nmls flow ip destination\r\nmls flow ipx destination\r\ncns event-service server\r\n!\r\nspanning-tree portfast bpdu-guard\r\nspanning-tree uplinkfast\r\nspanning-tree vlan 200 forward-time 21\r\nport-channel load-balance sdip\r\n!\r\n!\r\n!\r\n shutdown\r\n!\r\n!\r\n.\r\n.\r\n.\r\nIn the following sample output from the show running-config command, the shape average command indicates\r\nthat the traffic shaping overhead accounting for ATM is enabled. The BRAS-DSLAM encapsulation type is qinq\r\nand the subscriber line encapsulation type is snap-rbe based on the ATM adaptation layer 5 (AAL5) service. The\r\nfields are self-explanatory\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 34 of 155\n\nDevice# show running-config\r\n.\r\n.\r\n.\r\nsubscriber policy recording rules limit 64\r\nno mpls traffic-eng auto-bw timers frequency 0\r\ncall rsvp-sync\r\n!\r\ncontroller T1 2/0\r\nframing sf\r\nlinecode ami\r\n!\r\ncontroller T1 2/1\r\nframing sf\r\nlinecode ami\r\n!\r\n!\r\npolicy-map unit-test\r\nclass class-default\r\nshape average percent 10 account qinq aal5 snap-rbe\r\n!\r\nThe following is sample output from the show running-config class-map command. The fields in the display are\r\nself-explanatory.\r\nDevice# show running-config class-map\r\nBuilding configuration...\r\nCurrent configuration : 2910 bytes\r\n!\r\nclass-map type stack match-all ip_tcp_stack\r\n match field IP protocol eq 0x6 next TCP\r\nclass-map type access-control match-all my\r\n match field UDP dest-port eq 1111\r\n match encrypted\r\n filter-version 0.1, Dummy Filter 2\r\n filter-id 123\r\n filter-hash DE0EB7D3C4AFDD990038174A472E4789\r\n algorithm aes256cbc\r\n cipherkey realm-cisco.sym\r\n ciphervalue #\r\noeahb4L6JK+XuC0q8k9AqXvBeQWzVfdg8WV67WEXbiWdXGQs6BEXqQeb4Pfow570zM4eDw0gxlp/Er8w\r\n/lXsmolSgYpYuxFMYb1KX/H2iCXvA76VX7w5TElb/+6ekgbfP/d5ms6DEzKa8DlOpl+Q95lP194PsIlU\r\nwCyfVCwLS+T8p3RDLi8dKBgQMcDW4Dha1ObBJTpV4zpwhEdMvJDu5PATtEQhFjhN/UYeyQiPRthjbkJn\r\nLzT8hQFxwYwVW8PCjkyqEwYrr+R+mFG/C7tFRiooaW9MU9PCpFd95FARvlU=#\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 35 of 155\n\nexit\r\nclass-map type stack match-all ip_udp_stack\r\n match field IP protocol eq 0x11 next UDP\r\nclass-map type access-control match-all psirt1\r\n match encrypted\r\n filter-version 0.0_DummyVersion_20090101_1830\r\n filter-id cisco-sa-20090101-dummy_ddts_001\r\n filter-hash FC50BED10521002B8A170F29AF059C53\r\n algorithm aes256cbc\r\n cipherkey realm-cisco.sym\r\n ciphervalue #\r\nDkGbVq0FPAsVJKguU15lQPDfZyTcHUXWsj8+tD+dCSYW9cjkRU9jyST4vO4u69/L62QlbyQuKdyQmb10\r\n6sAeY5vDsDfDV05k4o5eD+j8cMt78iZT0Qg7uGiBSYBbak3kKn/5w2gDd1vnivyQ7g4Ltd9+XM+GP6XL\r\n27RrXeP5A5iGbzC7KI9t6riZXk0gmR/vFw1a5wck0D/iQHIlFa/yRPoKMSFlqfIlLTe5NM7JArSTKET2\r\npu7wZammTz4FF6rY#\r\n exit\r\n match start TCP payload-start offset 0 size 10 regex \"abc.*def\"\r\n match field TCP source-port eq 1234\r\nclass-map type access-control match-all psirt2\r\n match encrypted\r\n filter-version 0.0_DummyVersion_20090711_1830\r\n filter-id cisco-sa-20090711-dummy_ddts_002\r\n filter-hash DE0EB7D3C4AFDD990038174A472E4789\r\n algorithm aes256cbc\r\n cipherkey realm-cisco.sym\r\nThe following example shows that the teletype (tty) line 2 is reserved for communicating with the 2nd core:\r\nDevice# show running\r\nBuilding configuration...\r\nCurrent configuration:\r\n!\r\nversion 12.0\r\nservice timestamps debug uptime\r\nservice timestamps log uptime\r\nno service password-encryption\r\n!\r\nhostname device\r\n!\r\nenable password lab\r\n!\r\nno ip subnet-zero\r\n!\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 36 of 155\n\n!\r\n!\r\ninterface Ethernet0\r\n ip address 172.25.213.150 255.255.255.128\r\n no ip directed-broadcast\r\n no logging event link-status\r\n!\r\ninterface Serial0\r\n no ip address\r\n no ip directed-broadcast\r\n no ip mroute-cache\r\n shutdown\r\n no fair-queue\r\n!\r\ninterface Serial1\r\n no ip address\r\n no ip directed-broadcast\r\n shutdown\r\n!\r\nip default-gateway 172.25.213.129\r\nip classless\r\nip route 0.0.0.0 0.0.0.0 172.25.213.129\r\n!\r\n!\r\nline con 0\r\n transport input none\r\nline 1 6\r\n no exec\r\n transport input all\r\nline 7\r\n no exec\r\n exec-timeout 300 0\r\n transport input all\r\nline 8 9\r\n no exec\r\n transport input all\r\nline 10\r\n no exec\r\n transport input all\r\n stopbits 1\r\nline 11 12\r\n no exec\r\n transport input all\r\nline 13\r\n no exec\r\n transport input all\r\n speed 115200\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 37 of 155\n\nline 14 16\r\n no exec\r\n transport input all\r\nline aux 0\r\nline vty 0 4\r\n password cisco\r\n login\r\n!\r\nend\r\nRelated Commands\r\nCommand Description\r\nbandwidth\r\nSpecifies or modifies the bandwidth allocated for a class belonging to a policy map,\r\nand enables ATM overhead accounting.\r\nboot config\r\nSpecifies the device and filename of the configuration file from which the device\r\nconfigures itself during initialization (startup).\r\nconfigure terminal Enters global configuration mode.\r\ncopy running-config startup-config\r\nCopies the running configuration to the startup configuration. (Command alias for the\r\ncopy system:running-config nvram:startup-config command.)\r\nshape\r\nShapes traffic to the indicated bit rate according to the algorithm specified, and\r\nenables ATM overhead accounting.\r\nshow interfaces Displays statistics for all interfaces configured on the device or access server.\r\nshow policy-map\r\nDisplays the configuration of all classes for a specified service policy map or all\r\nclasses for all existing policy maps, and displays ATM overhead accounting\r\ninformation, if configured.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 38 of 155\n\nCommand Description\r\nshow startup-config\r\nDisplays the contents of NVRAM (if present and valid) or displays the configuration\r\nfile pointed to by the CONFIG_FILE environment variable. (Command alias for the\r\nmore:nvram startup-config command.)\r\nshow running-config control-plane\r\nTo display the control plane information for the running configuration, use the show running-config control-plane\r\ncommand in privileged EXEC mode.\r\nshow running-config control-plane [cef-exception | host | transit]\r\nSyntax Description\r\ncef-exception (Optional) Displays information about control plane Cisco Express Forwarding exceptions.\r\nhost (Optional) Displays information about the control plane host.\r\ntransit (Optional) Displays information about control plane transit.\r\nCommand Default\r\nIf no keyword is specified, all information about the control plane is displayed.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n12.4(24)T This command was introduced in a release earlier than Cisco IOS Release 12.4(24)T.\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 39 of 155\n\nThe following is sample output from the show running-config control-plane command. The field descriptions are\r\nself-explanatory.\r\nRouter# show running-config control-plane\r\n \r\nBuilding configuration...\r\nCurrent configuration : 14 bytes\r\n!\r\ncontrol-plane\r\n!\r\nend\r\nRelated Commands\r\nCommand Description\r\nshow running-configDisplays the contents of the current running configuration file or the configuration for a\r\nspecific module.\r\nshow running-config map-class\r\nTo display only map-class configuration information from the running configuration file, use the show running-config map-class command in privileged EXEC mode.\r\nshow running-config map-class [atm [map-class-name] | dialer [map-class-name] | frame-relay [map-class-name] ] [linenum]\r\nSyntax Description\r\natm (Optional) Displays only ATM map-class configuration lines.\r\ndialer (Optional) Displays only dialer map-class configuration lines.\r\nframe-relay (Optional) Displays only Frame Relay map-class configuration lines.\r\nmap-class-name (Optional) Displays only configuration lines for the specified map-class.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 40 of 155\n\nlinenum (Optional) Displays line numbers in the output.\r\nCommand Default\r\nDisplays all map-class configuration in the running configuration file.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.1\r\nThe map-class extension to the show running-config command was introduced to show only\r\nlines pertaining to dialer or Frame Relay map classes.\r\n12.1(2)T The atm , dialer , and frame-relay keywords and map-class-name argument were introduced.\r\n12.2(4)T The linenum keyword was added.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nUsage Guidelines\r\nUse the show running-config map-class command to display the following information from the running\r\nconfiguration file:\r\nAll map classes configured on the router.\r\nMap classes configured specifically for ATM, Frame Relay, or dialer.\r\nA specific ATM, Frame Relay, or dialer map class.\r\nUse the linenum keyword to display line numbers in the output. This option is useful for identifying a particular\r\nportion of a very large configuration.\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 41 of 155\n\nExamples\r\nThe following example displays all map classes configured on the router:\r\nRouter# show running-config map-class\r\n \r\nBuilding configuration...\r\nCurrent configuration:\r\n!\r\nmap-class frame-relay cir60\r\n frame-relay bc 16000\r\n frame-relay adaptive-shaping becn\r\n!\r\nmap-class frame-relay cir70\r\n no frame-relay adaptive-shaping\r\n frame-relay priority-group 2\r\n!\r\nmap-class atm vc100\r\n atm aal5mux\r\n!\r\nmap-class dialer dialer1\r\n dialer idle-timeout 10\r\nend\r\nExamples\r\nThe following example displays all Frame Relay map classes on the router:\r\nRouter# show running-config map-class frame-relay\r\n \r\nBuilding configuration...\r\nCurrent configuration:\r\n!\r\nmap-class frame-relay cir60\r\n frame-relay bc 16000\r\n frame-relay adaptive-shaping becn\r\n!\r\nmap-class frame-relay cir70\r\n no frame-relay adaptive-shaping\r\n frame-relay priority-group 2\r\nend\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 42 of 155\n\nThe following example displays a specific map class called class1. Line numbers are displayed in the output.\r\nRouter# show running-config map-class frame-relay class1 linenum\r\n \r\nBuilding configuration...\r\nCurrent configuration:\r\n1 : !\r\n2 : map-class frame-relay boy\r\n3 : no frame-relay adaptive-shaping\r\n4 : frame-relay cir 1000\r\n5 : end\r\nRelated Commands\r\nCommand Description\r\nmap-class atm Specifies the ATM map class for an SVC.\r\nmap-class dialer\r\nDefines a class of shared configuration parameters associated with the dialer map\r\ncommand for outgoing calls from an ISDN interface and for PPP callback.\r\nmap-class frame-relay Specifies a map class to define QoS values for a Frame Relay VC.\r\nmore system:running-configDisplays contents of the currently running configuration file (equivalent to the show\r\nrunning-config command.)\r\nshow running-config partition\r\nTo display the list of commands that make up the current running configuration for a specific part of the system’s\r\nglobal running configuration, use the show running-config partition command in privileged EXEC mode.\r\nshow running-config partition part\r\nSyntax Description\r\npart The part argument will consist of one or more keyword options. These keywords represent a partition\r\nof the system’s running configuration state, as a major-descriptor and, in some cases, one or more\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 43 of 155\n\nminor-descriptors.\r\nFor example, in the command show running-config partition router eigrp 1 , the major-descriptor for\r\nthe part argument is the router keyword, and the minor-descriptors for the part argument are the eigrp\r\n1 keywords.\r\nThe actual list of part keyword options will depend on your system hardware, what feature set you are\r\nrunning, and what features are currently configured on your system.\r\nSome examples of command part keyword options are provided here for reference. Use the show\r\nrunning-config partition ? command on your system to view the list of command options available on\r\nyour system.\r\naccess-list --Displays all running configuration commands that make up the access-list\r\nconfiguration partition.\r\nboot --Displays all running configuration commands that make up the boot configuration\r\npartition.\r\nclass-map --Displays all running configuration commands that make up the class-map\r\nconfiguration partition.\r\nglobal-cdp --Displays all running configuration commands that make up the global CDP\r\nconfiguration partition.\r\ninterface [type slot /port /number ]--Displays all running configuration commands that make up\r\nthe interfaces configuration partition or the configuration commands that are applied to the\r\nspecified interface.\r\nline --Displays all running configuration commands that make up the line command\r\nconfiguration partition.\r\npolicy-map --Displays all running configuration commands that make up the policy-map\r\nconfiguration partition.\r\nroute-map --Displays all running configuration commands that make up the route-map\r\nconfiguration partition.\r\nrouter [protocol ]--Displays all running configuration commands that make up the router\r\nconfiguration partition, or the configuration commands for the specified routing protocol.\r\nservice --Displays all running configuration commands that make up the services (small server)\r\nconfiguration partition.\r\nsnmp --Displays all running configuration commands that make up the SNMP configuration\r\npartition.\r\n| - Allows for the addition of output modifiers.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 44 of 155\n\nCommand Default\r\nNone\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n12.2(33)SRB\r\nThis command was introduced for Cisco 7600 series images in Cisco IOS Release 12.2SR as\r\npart of the “Configuration Partitioning” feature.\r\n12.2(33)SB\r\nThis command was integrated into Cisco IOS Release 12.2(33)SB and implemented on the\r\nCisco 10000 series.\r\n12.2(33)SXI This command was integrated into Cisco IOS Release 12.2(33)SXI.\r\nUsage Guidelines\r\nWhen the Configuration Partitioning feature is enabled, the system groups the configuration state of the device\r\ninto parts (called “partitions”) for the purpose of generating the virtual running configuration file (the list of\r\nconfiguration commands). The selective processing of the system’s configuration state for the purpose of\r\ngenerating a partial running configuration is called “configuration partitioning.”\r\nNote\r\nThis command is not related to hard drive or flash drive partitioning.\r\nThis granular access to configuration information offers important performance benefits for high-end routing\r\nplatforms with very large configuration files, as the system wide generation of a complete virtual configuration\r\nfile from all components on systems with large and complex configurations can become overly resource intensive\r\nand be unacceptably slow.\r\nThe show running-config partition command allows you to display only the part of the running configuration that\r\nyou want to examine, while also allowing the system to process only the collection of system components (such as\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 45 of 155\n\nspecific interfaces) that you need to display. This is in contrast to other existing extensions to the show running-config command, which only filter the generated list after all system components have been processed.\r\nThe Configuration Partitioning feature is enabled by default in Cisco IOS software images that support the feature.\r\nTo disable the feature, use the no parser config partition command.\r\nExamples\r\nIn the following example, the system generates a view of the running configuration by polling only the\r\ncomponents associated with the access-list parts of the running configuration state, and then displays only those\r\naccess-list-related configuration commands.\r\nRouter# show running-config partition access-list\r\n Building configuration...\r\nCurrent configuration : 127 bytes\r\n!\r\nConfiguration of Partition access-list\r\n!\r\naccess-list 90 permit 0.0.0.0 1.2.3.5\r\naccess-list 100 permit 10 any any\r\n!\r\nend\r\nIn the following example, only the main configuration partition associated with the interface configuration is\r\nqueried, and only the configuration commands associated with Fast Ethernet interface 0/1 are displayed.\r\nRouter# show running-config partition interface fastethernet0/1\r\nBuilding configuration...\r\nCurrent configuration : 213 bytes\r\n!\r\nConfiguration of Partition interface FastEthernet0/1\r\n!\r\n!\r\ninterface FastEthernet0/1\r\n ip address 10.4.2.39 255.255.255.0\r\n no ip route-cache cef\r\n no ip route-cache\r\n duplex half\r\n ipv6 enable\r\n no cdp enable\r\n!\r\n!\r\nend\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 46 of 155\n\nRelated Commands\r\nCommand Description\r\ncopy running-config startup-config\r\nCopies the running configuration to the default startup configuration file.\r\nshow interfaces Displays statistics for all interfaces configured on the router or access server.\r\nshow running-configGenerates and displays a virtual configuration file that lists all configuration\r\ncommands that are in effect on the system.\r\nshow startup-config\r\nDisplays the contents of NVRAM (if present and valid) or displays the configuration\r\nfile pointed to by the CONFIG_FILE environment variable. (Command alias for the\r\nmore:nvram startup-config command.)\r\nshow scp\r\nTo display Switch-Module Configuration Protocol (SCP) information, use the show scp in privileged EXEC mode\r\non the Switch Processor.\r\nshow scp {accounting | counters | linecards [details] | mcast {group group-id | inst} | process id | status}\r\nSyntax Description\r\naccounting Displays information about the SCP accounting.\r\ncounters Displays information about the SCP counter.\r\nlinecards\r\nDisplays information about the Optical Services Module (OSM) wide area network (WAN)\r\nmodules in the chassis.\r\ndetails (Optional) Displays detailed information about the OSM WAN module.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 47 of 155\n\nmcast Displays information about the SCP multicast.\r\ngroup group-id(Optional) Displays information for a specific group and group ID; valid values are from 1\r\nto 127.\r\ninst (Optional) Displays information for an instance.\r\nprocess id Displays all the processes that have registered an SAP with SCP.\r\nstatus Displays information about the local SCP server status.\r\nCommand Default\r\nThis command has no default settings.\r\nCommand Modes\r\nPrivileged EXEC on the Switch Processor\r\nCommand History\r\nRelease Modification\r\n12.2(14)SX Support for this command was introduced on the Supervisor Engine 720.\r\n12.2(17d)SXB\r\nSupport for this command on the Supervisor Engine 2 was extended to Release\r\n12.2(17d)SXB.\r\n12.2(18)SXE\r\nThe output of the show scp process command was changed to display all the processes that\r\nhave registered an SAP with SCP on the Supervisor Engine 720 only.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 48 of 155\n\nRelease Modification\r\n15.0(1)S\r\nThe output of the show scp status command was changed to additionally display the Flow\r\nControl State (FC-State) and the Flow Control Count (FC-Count)\r\nExamples\r\nThis example displays the SCP flow control status:\r\nRouter# show scp status\r\nRx 185, Tx 181, scp_my_addr 0x14\r\nId Sap Channel name current/peak/retry/dropped/totaltime(queue/process/ack) FC-state FC-count\r\n-------------------------------------------------------------- --------- ---- -------\r\n 0 18 SCP Unsolicited:18 801/ 0/ 0/ 0/ 0 0/ 0/ 0 off 0\r\n 1 80 SCP Unsolicited:80 0/ 0/ 0/ 0/ 0 0/ 0/ 0 off 0\r\n 2 23 SCP async: LCP#5 0/ 0/ 0/ 0/ 0 0/ 0/ 0 off 0\r\n 3 0 SCP Unsolicited:0 0/ 1/ 0/ 0/ 5 0/ 0/ 0 off 0\r\n--------------------------------------------------------------------------------------------------------------------------\r\nFC-state indicates the flow control state and FC-count indicates the number of times flow control has been turned\r\non.\r\nThis example shows how to display all the processes that have registered an SAP with SCP:\r\nRouter# show module\r\nMod Ports Card Type Model Serial No.\r\n--- ----- -------------------------------------- ------------------ -----------\r\n 1 48 48-port 10/100 mb RJ45 WS-X6148-RJ-45 SAL091800RY\r\n 2 0 2 port adapter Enhanced FlexWAN WS-X6582-2PA JAE0940MH7Z\r\n 3 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC SAL09391KZH\r\n 5 2 Supervisor Engine 720 (Active) WS-SUP720-3BXL SAL09337UE6\r\n 6 2 Supervisor Engine 720 (Hot) WS-SUP720-3BXL SAL09148P59\r\nMod MAC addresses Hw Fw Sw Status\r\n--- ---------------------------------- ------ ------------ ------------ -------\r\n 1 0013.c3f8.d2c4 to 0013.c3f8.d2f3 5.0 8.3(1) 8.6(0.366)TA Ok\r\n 2 0015.2bc3.5b40 to 0015.2bc3.5b7f 2.1 12.2(nightly 12.2(nightly Ok\r\n 3 0015.6324.ed48 to 0015.6324.ed4f 3.1 5.4(2) 8.6(0.366)TA Ok\r\n 5 0014.a97d.b0ac to 0014.a97d.b0af 4.3 8.4(2) 12.2(nightly Ok\r\n 6 0013.7f0d.0660 to 0013.7f0d.0663 4.3 8.4(2) 12.2(nightly Ok\r\nMod Sub-Module Model Serial Hw Status\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 49 of 155\n\n---- --------------------------- ------------------ ----------- ------- -------\r\n 5 Policy Feature Card 3 WS-F6K-PFC3BXL SAL09337NVE 1.6 Ok\r\n 5 MSFC3 Daughterboard WS-SUP720 SAL09327AU6 2.3 Ok\r\n 6 Policy Feature Card 3 WS-F6K-PFC3BXL SAL1033Y0YK 1.8 Ok\r\n 6 MSFC3 Daughterboard WS-SUP720 SAL09158XB3 2.3 Ok\r\nMod Online Diag Status\r\n---- -------------------\r\n 1 Pass\r\n 2 Pass\r\n 3 Pass\r\n 5 Pass\r\n 6 Pass\r\nRouter# attach 5\r\nTrying Switch ...\r\nEntering CONSOLE for Switch\r\nType \"^C^C^C\" to end this session\r\nSwitch-sp#\r\nshow scp process\r\nSap Pid Name\r\n=== === ====\r\n0 180 CWAN-RP SCP Input Process\r\n18 42 itasca\r\n20 3 Exec\r\n21 3 Exec\r\n22 180 CWAN-RP SCP Input Process\r\nTotal number of SAP registered = 5\r\nRouter#\r\nshow slot\r\nTo display information about the PCMCIA flash memory cards file system, use the show slot command in user\r\nEXEC or privileged EXEC mode.\r\nshow slot [all | chips | detailed | err | summary]\r\nSyntax Description\r\nall\r\n(Optional) Displays all possible flash system information for all PCMCIA flash cards in the\r\nsystem.\r\nchips (Optional) Displays flash chip information.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 50 of 155\n\ndetailed (Optional) Displays the flash detailed directory.\r\nerr (Optional) Displays the flash chip erase and write retries.\r\nsummary (Optional) Displays the flash partition summary.\r\nCommand Modes\r\nUser EXEC Privileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.0 This command was introduced.\r\nUsage Guidelines\r\nUse the show slot command to display details about the files in a particular linear PCMCIA flash memory card of\r\nless than 20 MB and some 32 MB linear PCMCIA cards.\r\nNote\r\nUse the show disk command for ATA PCMCIA cards. Other forms of this commands are show disk0:\r\nand show disk1: .\r\nFor more information regarding file systems and flash cards, access the PCMCIA Filesystem Compatibility Matrix\r\nand Filesystem Information document at the following URL:\r\nhttp://www.cisco.com/en/US/partner/products/hw/routers/ps341/products_tech_note09186a00800a7515.shtml\r\nTo see which flash cards are used in your router, use the show version command and look at the bottom portion of\r\nthe output.\r\nThe following display indicates an ATA PCMCIA flash disk.\r\nRouter# show version\r\n.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 51 of 155\n\n.\r\n46976K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).\r\nThe following display indicates a linear PCMCIA flash card with 20480K bytes of flash memory in card at slot 1\r\nwith a sector size of 128K.\r\nRouter# show version\r\n.\r\n.\r\n20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K).\r\nNote\r\nIn some cases the show slot command will not display the file systems, use show slot0: or show slot1:\r\n.\r\nExamples\r\nThe following example displays information about slot 0. The output is self-explanatory.\r\nRouter# show slot\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nThe following example shows all possible flash system information for all PCMCIA flash cards in the system.\r\nRouter# show slot all\r\nPartition Size Used Free Bank-Size State Copy Mode\r\n 1 20223K 10821K 9402K 4096K Read/Write Direct\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n addr fcksum ccksum\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n 0x40 0x5EA3 0x5EA3\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name\r\n 1 1 89A0 2048KB INTEL 28F016SA\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 52 of 155\n\n2 1 89A0 2048KB INTEL 28F016SA\r\n 1 2 89A0 2048KB INTEL 28F016SA\r\n 2 2 89A0 2048KB INTEL 28F016SA\r\n 1 3 89A0 2048KB INTEL 28F016SA\r\n 2 3 89A0 2048KB INTEL 28F016SA\r\n 1 4 89A0 2048KB INTEL 28F016SA\r\n 2 4 89A0 2048KB INTEL 28F016SA\r\n 1 5 89A0 2048KB INTEL 28F016SA\r\n 2 5 89A0 2048KB INTEL 28F016SA\r\nThe following example shows flash chip information\r\nRouter# show slot chips\r\n \r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name\r\n 1 1 89A0 2048KB INTEL 28F016SA\r\n 2 1 89A0 2048KB INTEL 28F016SA\r\n 1 2 89A0 2048KB INTEL 28F016SA\r\n 2 2 89A0 2048KB INTEL 28F016SA\r\n 1 3 89A0 2048KB INTEL 28F016SA\r\n 2 3 89A0 2048KB INTEL 28F016SA\r\n 1 4 89A0 2048KB INTEL 28F016SA\r\n 2 4 89A0 2048KB INTEL 28F016SA\r\n 1 5 89A0 2048KB INTEL 28F016SA\r\n 2 5 89A0 2048KB INTEL 28F016SA\r\nThe following example show the flash detailed directory.\r\nRouter# show slot detailed\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n addr fcksum ccksum\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n 0x40 0x5EA3 0x5EA3\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nThe following example shows the flash chip erase and write retries.\r\nRouter# show slot err\r\n \r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 53 of 155\n\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name erase write\r\n 1 1 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 1 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 2 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 2 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 3 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 3 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 4 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 4 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 5 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 5 89A0 2048KB INTEL 28F016SA 0 0\r\nThe following example shows the flash partition summary.\r\nRouter# show\r\n slot summary\r\n \r\nPartition Size Used Free Bank-Size State Copy Mode\r\n 1 20223K 10821K 9402K 4096K Read/Write Direct\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nRelated Commands\r\nCommand Description\r\ndir slot0: Directory listing of files on a PCMCIA Flash card located in slot0.\r\ndir slot1: Directory listing of files on a PCMCIA Flash card located in slot1.\r\nshow slot0: Displays information about the PCMCIA flash memory card’s file system located in slot 0.\r\nshow slot1: Displays information about the PCMCIA flash memory card’s file system located in slot 1.\r\nshow slot0:\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 54 of 155\n\nTo display information about the PCMCIA flash memory card’s file system located in slot 0, use the show slot0:\r\ncommand in user EXEC or privileged EXEC mode.\r\nshow slot0: [all | chips | detailed | err | summary]\r\nSyntax Description\r\nall\r\n(Optional) Displays all possible flash system information for all PCMCIA flash cards in the\r\nsystem.\r\nchips (Optional) Displays flash chip information.\r\ndetailed (Optional) Displays the flash detailed directory.\r\nerr (Optional) Displays the flash chip erase and write retries.\r\nsummary (Optional) Displays the flash partition summary.\r\nCommand Modes\r\nUser EXEC Privileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.0 This command was introduced.\r\n12.2SX\r\nThis command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX\r\nrelease of this train depends on your feature set, platform, and platform hardware.\r\nUsage Guidelines\r\nUse the show slot0: command to display details about the files in a particular linear PCMCIA flash memory card\r\nof less than 20 MB and some 32 MB linear PCMCIA cards.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 55 of 155\n\nNote\r\nUse the show disk command for ATA PCMCIA cards. Other forms of this commands are show disk0:\r\nand show disk1: .\r\nFor more information regarding file systems and flash cards, access the PCMCIA Filesystem Compatibility Matrix\r\nand Filesystem Information document at the following URL:\r\nhttp://www.cisco.com/en/US/partner/products/hw/routers/ps341/products_tech_note09186a00800a7515.shtml\r\nTo see which flash cards are used in your router, use the show version command and look at the bottom portion of\r\nthe output.\r\nThe following display indicates an ATA PCMCIA flash disk.\r\nRouter# show version\r\n.\r\n.\r\n46976K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).\r\nThe following display indicates a linear PCMCIA flash card with 20480K bytes of flash memory in card at slot 1\r\nwith a sector size of 128K.\r\nRouter# show version\r\n.\r\n.\r\n20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K).\r\nNote\r\nIn some cases the show slot command will not display the file systems, use show slot0: or show slot1:\r\n.\r\nExamples\r\nThe following example displays information about slot 0. The output is self-explanatory.\r\nRouter# show slot0:\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 56 of 155\n\n1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nRouter# show slot0: all\r\nPartition Size Used Free Bank-Size State Copy Mode\r\n 1 20223K 10821K 9402K 4096K Read/Write Direct\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n addr fcksum ccksum\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n 0x40 0x5EA3 0x5EA3\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name\r\n 1 1 89A0 2048KB INTEL 28F016SA\r\n 2 1 89A0 2048KB INTEL 28F016SA\r\n 1 2 89A0 2048KB INTEL 28F016SA\r\n 2 2 89A0 2048KB INTEL 28F016SA\r\n 1 3 89A0 2048KB INTEL 28F016SA\r\n 2 3 89A0 2048KB INTEL 28F016SA\r\n 1 4 89A0 2048KB INTEL 28F016SA\r\n 2 4 89A0 2048KB INTEL 28F016SA\r\n 1 5 89A0 2048KB INTEL 28F016SA\r\n 2 5 89A0 2048KB INTEL 28F016SA\r\nThe following example shows flash chip information.\r\nRouter# show slot0: chips\r\n \r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name\r\n 1 1 89A0 2048KB INTEL 28F016SA\r\n 2 1 89A0 2048KB INTEL 28F016SA\r\n 1 2 89A0 2048KB INTEL 28F016SA\r\n 2 2 89A0 2048KB INTEL 28F016SA\r\n 1 3 89A0 2048KB INTEL 28F016SA\r\n 2 3 89A0 2048KB INTEL 28F016SA\r\n 1 4 89A0 2048KB INTEL 28F016SA\r\n 2 4 89A0 2048KB INTEL 28F016SA\r\n 1 5 89A0 2048KB INTEL 28F016SA\r\n 2 5 89A0 2048KB INTEL 28F016SA\r\nThe following example show the flash detailed directory.\r\nRouter# show slot0: detailed\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 57 of 155\n\naddr fcksum ccksum\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n 0x40 0x5EA3 0x5EA3\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nThe following example shows the flash chip erase and write retries.\r\nRouter# show slot0: err\r\n \r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name erase write\r\n 1 1 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 1 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 2 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 2 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 3 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 3 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 4 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 4 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 5 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 5 89A0 2048KB INTEL 28F016SA 0 0\r\nThe following example shows the flash partition summary.\r\nRouter# show\r\n slot0: summary\r\n \r\nPartition Size Used Free Bank-Size State Copy Mode\r\n 1 20223K 10821K 9402K 4096K Read/Write Direct\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nRelated Commands\r\nCommand Description\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 58 of 155\n\nCommand Description\r\ndir slot0: Directory listing of files on a PCMCIA Flash card located in slot0.\r\ndir slot1: Directory listing of files on a PCMCIA Flash card located in slot1.\r\nshow slot1: Displays information about the PCMCIA flash memory card’s file system located in slot 1.\r\nshow slot Displays information about the PCMCIA flash memory cards.\r\nshow slot1:\r\nTo display information about the PCMCIA flash memory card’s file system located in slot 1, use the show slot1:\r\ncommand in user EXEC or privileged EXEC mode.\r\nshow slot1: [all | chips | detailed | err | summary]\r\nSyntax Description\r\nall\r\n(Optional) Displays all possible flash system information for all PCMCIA flash cards in the\r\nsystem.\r\nchips (Optional) Displays flash chip information.\r\ndetailed (Optional) Displays the flash detailed directory.\r\nerr (Optional) Displays the flash chip erase and write retries.\r\nsummary (Optional) Displays the flash partition summary.\r\nCommand Modes\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 59 of 155\n\nUser EXEC Privileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.0 This command was introduced.\r\nUsage Guidelines\r\nUse the show slot1: command to display details about the files in a particular linear PCMCIA flash memory card\r\nof less than 20 MB and some 32 MB linear PCMCIA cards located in slot 1.\r\nNote\r\nUse the show disk command for ATA PCMCIA cards. Other forms of this commands are show disk0:\r\nand show disk1: .\r\nFor more information regarding file systems and flash cards, access the PCMCIA Filesystem Compatibility Matrix\r\nand Filesystem Information document at the following URL:\r\nhttp://www.cisco.com/en/US/partner/products/hw/routers/ps341/products_tech_note09186a00800a7515.shtml\r\nTo see which flash cards are used in your router, use the show version command and look at the bottom portion of\r\nthe output.\r\nThe following display indicates an ATA PCMCIA flash disk.\r\nRouter# show version\r\n.\r\n.\r\n46976K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).\r\nThe following display indicates a linear PCMCIA flash card with 20480K bytes of flash memory in card at slot 1\r\nwith a sector size of 128K.\r\nRouter# show version\r\n.\r\n.\r\n20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K).\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 60 of 155\n\nNote\r\nIn some cases the show slot command will not display the file systems. Use show slot0: or show\r\nslot1: .\r\nExamples\r\nThe following example displays information about slot 0 using the slot0:\r\n command form. The output is self-explanatory.\r\nRouter# show slot1\r\n:\r\nPCMCIA Slot1 flash directory:\r\nFile Length Name/status\r\n 1 10907068 c3660-bin-mz.123-7.9.PI4\r\n[10907132 bytes used, 5739008 available, 16646140 total]\r\n16384K bytes of processor board PCMCIA Slot1 flash (Read/Write)\r\nRouter# show slot1: all\r\nPartition Size Used Free Bank-Size State Copy Mode\r\n 1 20223K 10821K 9402K 4096K Read/Write Direct\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n addr fcksum ccksum\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n 0x40 0x5EA3 0x5EA3\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name\r\n 1 1 89A0 2048KB INTEL 28F016SA\r\n 2 1 89A0 2048KB INTEL 28F016SA\r\n 1 2 89A0 2048KB INTEL 28F016SA\r\n 2 2 89A0 2048KB INTEL 28F016SA\r\n 1 3 89A0 2048KB INTEL 28F016SA\r\n 2 3 89A0 2048KB INTEL 28F016SA\r\n 1 4 89A0 2048KB INTEL 28F016SA\r\n 2 4 89A0 2048KB INTEL 28F016SA\r\n 1 5 89A0 2048KB INTEL 28F016SA\r\n 2 5 89A0 2048KB INTEL 28F016SA\r\nThe following example shows flash chip information.\r\nRouter# show slot1: chips\r\n \r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name\r\n 1 1 89A0 2048KB INTEL 28F016SA\r\n 2 1 89A0 2048KB INTEL 28F016SA\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 61 of 155\n\n1 2 89A0 2048KB INTEL 28F016SA\r\n 2 2 89A0 2048KB INTEL 28F016SA\r\n 1 3 89A0 2048KB INTEL 28F016SA\r\n 2 3 89A0 2048KB INTEL 28F016SA\r\n 1 4 89A0 2048KB INTEL 28F016SA\r\n 2 4 89A0 2048KB INTEL 28F016SA\r\n 1 5 89A0 2048KB INTEL 28F016SA\r\n 2 5 89A0 2048KB INTEL 28F016SA\r\nThe following example show the flash detailed directory.\r\nRouter# show slot1: detailed\r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n addr fcksum ccksum\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n 0x40 0x5EA3 0x5EA3\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nThe following example shows the flash chip erase and write retries.\r\nRouter# show slot1: err\r\n \r\nPCMCIA Slot0 flash directory:\r\nFile Length Name/status\r\n 1 11081464 c3660-bin-mz.123-9.3.PI5b\r\n[11081528 bytes used, 9627844 available, 20709372 total]\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\n Chip Bank Code Size Name erase write\r\n 1 1 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 1 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 2 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 2 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 3 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 3 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 4 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 4 89A0 2048KB INTEL 28F016SA 0 0\r\n 1 5 89A0 2048KB INTEL 28F016SA 0 0\r\n 2 5 89A0 2048KB INTEL 28F016SA 0 0\r\nThe following example shows the flash partition summary.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 62 of 155\n\nRouter# show\r\n slot1: summary\r\n \r\nPartition Size Used Free Bank-Size State Copy Mode\r\n 1 20223K 10821K 9402K 4096K Read/Write Direct\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nRelated Commands\r\nCommand Description\r\ndir slot0: Directory listing of files on a PCMCIA Flash card located in slot0.\r\ndir slot1: Directory listing of files on a PCMCIA Flash card located in slot1.\r\nshow slot0: Displays information about the PCMCIA flash memory card’s file system located in slot 0.\r\nshow slot Displays information about the PCMCIA flash memory cards.\r\nshow software authenticity file\r\nTo display information related to software authentication for a specific image file, use the show software\r\nauthenticity file command in privileged EXEC mode.\r\nshow software authenticity file {flash0:filename | flash1:filename | flash:filename | nvram:filename |\r\nusbflash0:filename | usbflash1:filename}\r\nSyntax Description\r\nflash0: Displays information related to software authentication for flash 0 resources.\r\nfilename Name of the filename in memory.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 63 of 155\n\nflash1: Displays information related to software authentication for flash 1 resources.\r\nflash: Displays information related to software authentication for flash resources.\r\nnvram: Displays information related to software authentication for NVRAM resources.\r\nusbflash0:\r\nDisplays information related to software authentication for Universal Serial Bus (USB) flash 0\r\nresources.\r\nusbflash1: Displays information related to software authentication for USB flash 1 resources.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n15.0(1)M This command was introduced for the Cisco 1941, 2900, and 3900 routers.\r\nUsage Guidelines\r\nThe show software authenticity file command allows you to display software authentication related information\r\nthat includes image credential information, key type used for verification, signing information, and other attributes\r\nin the signature envelope, for a specific image file. The command handler will extract the signature envelope and\r\nits fields from the image file and dump the required information.\r\nExamples\r\nThe following example displays software authentication related information for an image file named c3900-\r\nuniversalk9-mz.SSA:\r\nRouter# show software authenticity file flash0:c3900-universalk9-mz.SSA\r\nFile Name : flash0:c3900-universalk9-mz.SSA\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 64 of 155\n\nImage type : Development\r\n Signer Information\r\n Common Name : xxx\r\n Organization Unit : xxx\r\n Organization Name : xxx\r\n Certificate Serial Number : xxx\r\n Hash Algorithm : SHA512\r\nSignature Algorithm : 2048-bit RSA\r\n Key Version : A\r\nThe following table describes the significant fields shown in the display.\r\nTable 5. show software authenticity file Field Descriptions\r\nField Description\r\nFile Name\r\nName of the filename in the memory. For example, flash0:c3900-universalk9-mz.SSA\r\nrefers to filename c3900-universalk9-mz.SSA in flash memory (flash0:).\r\nImage type Displays the type of image.\r\nSigner Information Signature information.\r\nCommon Name Displays the name of the software manufacturer.\r\nOrganization Unit Displays the hardware the software image is deployed on.\r\nOrganization\r\nName\r\nDisplays the owner of the software image.\r\nCertificate Serial\r\nNumber\r\nDisplays the certificate serial number for the digital signature.\r\nHash Algorithm Displays the type of hash algorithm used in digital signature verification.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 65 of 155\n\nField Description\r\nSignature\r\nAlgorithm\r\nDisplays the type of signature algorithm used in digital signature verification.\r\nKey Version Displays the key version used for verification.\r\nRelated Commands\r\nCommand Description\r\nshow software\r\nauthenticity keys\r\nDisplays the software public keys that are in the storage with the key types.\r\nshow software\r\nauthenticity running\r\nDisplays information related to software authentication for the current ROMMON,\r\nmonitor library (monlib), and Cisco IOS image used for booting.\r\nshow software authenticity keys\r\nTo display the software public keys that are in the storage with the key types, use the show software authenticity\r\nkeys command in privileged EXEC mode.\r\nshow software authenticity keys\r\nSyntax Description\r\nThis command has no argument or keywords.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 66 of 155\n\nRelease Modification\r\n15.0(1)M This command was introduced for the Cisco 1941, 2900, and 3900 routers.\r\nUsage Guidelines\r\nThe display from this command includes the public keys that are in the storage with the key types.\r\nExamples\r\nThe following is sample output from the show software authenticity keys command:\r\nRouter# show software authenticity keys\r\nPublic Key #1 Information\r\n-------------------------\r\nKey Type : Release (Primary)\r\nPublic Key Algorithm : RSA\r\nModulus :\r\n CC:CA:40:55:8C:71:E2:4A:3A:B6:9D:5C:94:1D:02:BA:\r\n .....\r\n 26:04:6B:33:EB:70:2B:18:24:C7:D9:31:3E:77:24:85\r\nExponent : xxx\r\nKey Version : A\r\nPublic Key #2 Information\r\n-------------------------\r\nKey Type : Development (Primary)\r\nPublic Key Algorithm : RSA\r\nModulus :\r\n CC:CA:40:55:8C:71:E2:4A:3A:B6:9D:5C:94:1D:02:BA:\r\n .....\r\n 26:04:6B:33:EB:70:2B:18:24:C7:D9:31:3E:77:24:85\r\nExponent : xxx\r\nKey Version : A\r\nThe following table describes the significant fields shown in the display.\r\nTable 6. show software authenticity running Field Descriptions\r\nField Description\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 67 of 155\n\nField Description\r\nPublic Key # Public key number.\r\nKey Type Displays the key type used for image verification.\r\nPublic Key Algorithm Displays the name of the algorithm used for public key cryptography.\r\nModulus Modulus of the public key algorithm.\r\nExponent Exponent of the public key algorithm\r\nKey Version Displays the key version used for verification.\r\nRelated Commands\r\nCommand Description\r\nshow software\r\nauthenticity file\r\nDisplays information related to software authentication for the loaded image file.\r\nshow software\r\nauthenticity running\r\nDisplays information related to software authentication for the current ROM\r\nmonitor (ROMMON), monitor library (monlib), and Cisco IOS image used for\r\nbooting.\r\nshow software authenticity running\r\nTo display information related to software authentication for the current ROM monitor (ROMMON), monitor\r\nlibrary (monlib), and Cisco IOS image used for booting, use the show software authenticity running command in\r\nprivileged EXEC mode.\r\nshow software authenticity running\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 68 of 155\n\nSyntax Description\r\nThis command has no arguments or keywords.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n15.0(1)M This command was introduced for the Cisco 1941, 2900, and 3900 routers.\r\nUsage Guidelines\r\nThe information displayed by the show software authenticity running command about the current ROMMON,\r\nmonlib and Cisco IOS image used for booting includes:\r\nImage credential information\r\nKey type used for verification\r\nSigning information\r\nAny other attributes in the signature envelope\r\nExamples\r\nThe following example displays software authentication related information for the current ROM monitor\r\n(ROMMON), monitor library (monlib), and Cisco IOS image used for booting:\r\nRouter(mode-prompt\r\n)# show software authenticity running\r\nSYSTEM IMAGE\r\n-------------------\r\nImage type : Development\r\nSigner Information\r\nCommon Name : xxx\r\nOrganization Unit : xxx\r\nOrganization Name : xxx\r\nCertificate Serial Number : xxx\r\nHash Algorithm : xxx\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 69 of 155\n\nSignature Algorithm : 2048-bit RSA\r\nKey Version : xxx\r\nVerifier Information\r\nVerifier Name : ROMMON 2\r\nVerifier Version : System Bootstrap, Version 12.4(20090409:084310)\r\nROMMON 2\r\n---------------\r\nImage type : Development\r\nSigner Information\r\nCommon Name : xxx\r\nOrganization Unit : xxx\r\nOrganization Name : xxx\r\nCertificate Serial Number : xxx\r\nHash Algorithm : xxx\r\nSignature Algorithm : 2048-bit RSA\r\nKey Version : xxx\r\nVerifier Information\r\nVerifier Name : ROMMON 2\r\nVerifier Version : System Bootstrap, Version 12.4(20090409:084310)\r\nThe following table describes the significant fields shown in the display.\r\nTable 7. show software authenticity running Field Descriptions\r\nField Description\r\nSYSTEM IMAGE Section of the output displaying the system image information.\r\nImage type Displays the type of image.\r\nCommon Name Displays the name of the software manufacturer.\r\nOrganization Unit Displays the hardware the software image is deployed on.\r\nOrganization Name Displays the owner of the software image.\r\nCertificate Serial\r\nNumber\r\nDisplays the certificate serial number for the digital signature.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 70 of 155\n\nField Description\r\nHash Algorithm Displays the type of hash algorithm used in digital signature verification.\r\nSignature Algorithm Displays the type of signature algorithm used in digital signature verification.\r\nKey Version Displays the key version used for verification.\r\nVerifier Name\r\nName of the program responsible for performing the digital signature\r\nverification.\r\nVerifier Version\r\nVersion of the program responsible for performing the digital signature\r\nverification.\r\nROMMON 2\r\nSection of the output displaying the current ROM monitor (ROMMON)\r\ninformation.\r\nRelated Commands\r\nCommand Description\r\nshow software authenticity file\r\nDisplays the software authenticity related information for the loaded image\r\nfile.\r\nshow software authenticity\r\nkeys\r\nDisplays the software public keys that are in the storage with the key types.\r\nshow software package\r\nTo display information about a specific bundle or package file, use the show software package command in\r\nprivileged EXEC mode.\r\nshow software package bundle or package url [detail] [verbose]\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 71 of 155\n\nSyntax Description\r\nbundle or\r\npackage url\r\nSpecify the name of the bundle or package file whose information should be displayed.\r\ndetail\r\n(optional) This command option is intended to provide additional details about the\r\nspecified package or bundle file. Currently, no additional information is displayed.\r\nverbose (optional) provides some additional info in the log files\r\nCommand Default\r\nNo default behavior or values.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\nIOS XE 3.2.0 SE Command introduced.\r\nCisco IOS XE Release 3.3 SE This command was integrated.\r\nUsage Guidelines\r\nThe 'show software package' command displays information about the specified bundle or package file.\r\nIf a package file is specified, this command displays information from its package metadata.\r\nIf a bundle file is specified, this command displays information from its bundle metadata, and also information\r\nfrom the package metadata of each package included in the bundle.\r\nExamples\r\nThe following example shows the show software package output for a bundle file.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 72 of 155\n\ninfra-p2-3#show software package flash:cat3k_caa-universalk9.SSA.03.09.19.\r\n EMP.150-9.19.EMP.bin\r\nPackage: cat3k_caa-universalk9.SSA.03.09.19.EMP.150-9.19.EMP.bin\r\n Size: 220766688\r\n Timestamp: 2012-11-15 11:53:50 UTC\r\n Canonical path: /flash/cat3k_caa-universalk9.SSA.03.09.19.EMP.150-9.19.EMP.bin\r\n Header size: 2928 bytes\r\n Internal package information:\r\n Name: rp_super\r\n BuildTime: Thu Nov 15 01:55:09 PST 2012\r\n ReleaseDate: Thu Nov 15 01:55:09 PST 2012\r\n RouteProcessor: mips\r\n Platform: ng3k\r\n User: udonthi\r\n PackageName: cat3k_caa-universalk9\r\n Build: 03.09.19.EMP\r\n Dependencies: PROVIDES:cat3k_caa-base,03.09.19.EMP,mips;cat3k_caa-infra,03.09.19.EMP,\r\n mips;cat3k_caa-platform,03.09.19.EMP,mips;cat3k_caa-iosd-universalk9,150-9.19.EMP,\r\n mips;cat3k_caa-wcm,03.09.19.EMP,mips;cat3k_caa-drivers,03.09.19.EMP,mips;\r\n BuildType: Production\r\n Package is bootable from media and tftp.\r\n Package contents:\r\n Package: cat3k_caa-base.SSA.03.09.19.EMP.pkg\r\n Size: 74390336\r\n Timestamp: 2012-11-15 11:55:30 UTC\r\n Header size: 412 bytes\r\n Internal package information:\r\n Name: rp_base\r\n BuildTime: Thu Nov 15 01:52:19 PST 2012\r\n ReleaseDate: Thu Nov 15 01:52:19 PST 2012\r\n RouteProcessor: mips\r\n Platform: ng3k\r\n User: udonthi\r\n PackageName: cat3k_caa-base\r\n Build: 03.09.19.EMP\r\n Dependencies: PROVIDES: nova-gold,03.09.19.EMP,mips; nova-goldlib,03.09.19.EMP,mips;\r\n nova-base,03.09.19.EMP,mips#REQUIRES:#WORKSWITH:#CONFLICTS:#\r\n BuildType: Production\r\n Package is not bootable.\r\n Package: cat3k_caa-drivers.SSA.03.09.19.EMP.pkg\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 73 of 155\n\nSize: 2734772\r\n Timestamp: 2012-11-15 11:55:37 UTC\r\n Header size: 252 bytes\r\n Internal package information:\r\n Name: drivers\r\n BuildTime: Thu Nov 15 01:54:53 PST 2012\r\n ReleaseDate: Thu Nov 15 01:54:53 PST 2012\r\n RouteProcessor: mips\r\n Platform: ng3k\r\n User: udonthi\r\n PackageName: cat3k_caa-drivers\r\n Build: 03.09.19.EMP\r\n Dependencies: PROVIDES: ng3k-drivers,03.09.19.EMP,mips#REQUIRES:#WORKSWITH:\r\n #CONFLICTS:#\r\n BuildType: Production\r\n Package is not bootable.\r\n Package: cat3k_caa-infra.SSA.03.09.19.EMP.pkg\r\n Size: 32465772\r\n Timestamp: 2012-11-15 11:55:32 UTC\r\n Header size: 436 bytes\r\n Internal package information:\r\n Name: rp_infra\r\n BuildTime: Thu Nov 15 01:53:08 PST 2012\r\n ReleaseDate: Thu Nov 15 01:53:08 PST 2012\r\n RouteProcessor: mips\r\n Platform: ng3k\r\n User: udonthi\r\n PackageName: cat3k_caa-infra\r\n Build: 03.09.19.EMP\r\n Dependencies: PROVIDES: nova-infra,03.09.19.EMP,mips;\r\n nova-infralibs,03.09.19.EMP,mips; nova-web,03.09.19.EMP,mips;\r\n nova-shell,03.09.19.EMP,mips; nova-console-relay,03.09.19.EMP,mips;\r\n nova-mgmte,03.09.19.EMP,mips; nova-ng3k-flash,03.09.19.EMP,mips#\r\nEQUIRES:#WORKSWITH:#CONFLICTS:#\r\n BuildType: Production\r\n Package is not bootable.\r\n Package: cat3k_caa-iosd-universalk9.SSA.150-9.19.EMP.pkg\r\n Size: 30384940\r\n Timestamp: 2012-11-15 11:55:34 UTC\r\n Header size: 372 bytes\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 74 of 155\n\nInternal package information:\r\n Name: rp_iosd\r\n BuildTime: Thu Nov 15 01:54:09 PST 2012\r\n ReleaseDate: Thu Nov 15 01:54:09 PST 2012\r\n RouteProcessor: mips\r\n Platform: ng3k\r\n User: udonthi\r\n PackageName: cat3k_caa-iosd-universalk9\r\n Build: 150-9.19.EMP\r\n Dependencies: PROVIDES: iosd-stuff,03.09.19.EMP,mips; nova-ioslibs-required,\r\n 03.09.19.EMP,mips; ioucon,150-9.19.EMP,mips;\r\n ng3k-iosd-universalk9,150-9.19.EMP,mips#REQUIRES:#WORKSWITH:#CONFLICTS:#\r\n BuildType: Production\r\n Package is not bootable.\r\n Package: cat3k_caa-platform.SSA.03.09.19.EMP.pkg\r\n Size: 18148064\r\n Timestamp: 2012-11-15 11:55:33 UTC\r\n Header size: 296 bytes\r\n Internal package information:\r\n Name: rp_platform\r\n BuildTime: Thu Nov 15 01:53:39 PST 2012\r\n ReleaseDate: Thu Nov 15 01:53:39 PST 2012\r\n RouteProcessor: mips\r\n Platform: ng3k\r\n User: udonthi\r\n PackageName: cat3k_caa-platform\r\n Build: 03.09.19.EMP\r\n Dependencies: PROVIDES: nova-platformlibs-required,03.09.19.EMP,mips;\r\n ng3k-platform,03.09.19.EMP,mips#REQUIRES:#WORKSWITH:#CONFLICTS:#\r\n BuildType: Production\r\n Package is not bootable.\r\n Package: cat3k_caa-wcm.SSA.03.09.19.EMP.pkg\r\n Size: 62638800\r\n Timestamp: 2012-11-15 11:55:37 UTC\r\n Header size: 280 bytes\r\n Internal package information:\r\n Name: rp_wcm\r\n BuildTime: Thu Nov 15 01:54:34 PST 2012\r\n ReleaseDate: Thu Nov 15 01:54:34 PST 2012\r\n RouteProcessor: mips\r\n Platform: ng3k\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 75 of 155\n\nUser: udonthi\r\n PackageName: cat3k_caa-wcm\r\n Build: 03.09.19.EMP\r\n Dependencies: PROVIDES: wcm-ng3k,03.09.19.EMP,mips; nova-wcmlibs-required,\r\n 03.09.19.EMP,mips#REQUIRES:#WORKSWITH:#CONFLICTS:#\r\n BuildType: Production\r\n Package is not bootable.\r\ninfra-p2-3#\r\nRelated Commands\r\nCommand Description\r\nsoftware clean\r\nUse this command to remove any and all packages and provisioning files that are no\r\nlonger in use.\r\nsoftware install file Install Cisco IOS XE files.\r\nsoftware commit\r\nUse this command to commit a package set that was installed using the auto-rollback\r\ncommand option of the software install command.\r\nsoftware install\r\nsource switch\r\nUse this command to install the running IOS XE software packages from one stack\r\nmember to one or more other stack members.\r\nsoftware rollback\r\nUse this command to roll back the committed Cisco IOS XE Software to a previous\r\ninstallation point.\r\nshow version\r\nTo display information about the currently loaded software along with hardware and\r\ndevice information, use the show version command.\r\nshow software installer rollback-timer\r\nThe show software installer rollback-timer command displays the current auto-rollback timer status for a\r\nstandalone platform or all switches in a stacked system.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 76 of 155\n\nshow software installer rollback-timer\r\nCommand Default\r\nThere are no command options.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\nIOS XE 3.2.0 SE Command introduced.\r\nCisco IOS XE Release 3.3 SE This command was integrated.\r\nUsage Guidelines\r\nThere are no command options.\r\nExamples\r\nTo show the auto-rollback timer status for the current switch, perform the following.\r\ninfra-p2-3#show software installer rollback-timer\r\nSwitch# Status Duration\r\n----------------------------------\r\n1 active 00:31:28\r\n2 active 00:31:43\r\ninfra-p2-3#\r\ninfra-p2-3#show software installer rollback-timer\r\nSwitch# Status Duration\r\n----------------------------------\r\n1 inactive -\r\n2 inactive -\r\ninfra-p2-3#\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 77 of 155\n\nRelated Commands\r\nCommand Description\r\nsoftware clean\r\nUse this command to remove any and all packages and provisioning files that are no\r\nlonger in use.\r\nsoftware install file Install Cisco IOS XE files.\r\nsoftware commit\r\nUse this command to commit a package set that was installed using the auto-rollback\r\ncommand option of the software install command.\r\nsoftware install\r\nsource switch\r\nUse this command to install the running IOS XE software packages from one stack\r\nmember to one or more other stack members.\r\nsoftware rollback\r\nUse this command to roll back the committed Cisco IOS XE Software to a previous\r\ninstallation point.\r\nshow version\r\nTo display information about the currently loaded software along with hardware and\r\ndevice information, use the show version command.\r\nshow stacks\r\nTo monitor the stack usage of processes and interrupt routines, use the show stacks command in EXEC mode.\r\nshow stacks PID\r\nSyntax Description\r\nPID Process identifier of the process that allocated the stack. The value ranges from 1 to 8192.\r\nCommand Modes\r\nPrivilege EXEC (#)\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 78 of 155\n\nCommand History\r\nRelease Modification\r\nCisco IOS 10.0 This command was introduced.\r\nCisco IOS 12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nUsage Guidelines\r\nThe display from this command includes the reason for the last system reboot. If the system was reloaded because\r\nof a system failure, a saved system stack trace is displayed. This information is of use only to your technical\r\nsupport representative in analyzing crashes in the field. It is included here in case you need to read the displayed\r\nstatistics to an engineer over the phone.\r\nUse the show stacks PID command to print the call stack of the process with ID ranging from 1 to 8192. This\r\ncommand displays the following information:\r\nStack segment: Where the process stack lies in the memory.\r\nList of FP: \u003caddress\u003e: The Frame Pointer (FP) for each frame in the call stack.\r\nList of RA: \u003caddress\u003e: The Return Address (RA) of each frame in the call stack.\r\nExamples\r\nThe following is a sample output from the show stacks command following a system failure:\r\nDevice# show stacks\r\nMinimum process stacks:\r\nFree/Size Name\r\n 652/1000 Router Init\r\n 726/1000 Init\r\n 744/1000 BGP Open\r\n 686/1200 Virtual Exec\r\nInterrupt level stacks:\r\nLevel Called Free/Size Name\r\n 1 0 1000/1000 env-flash\r\n 3 738 900/1000 Multiport Communications Interfaces\r\n 5 178 970/1000 Console UART\r\nSystem was restarted by bus error at PC 0xAD1F4, address 0xD0D0D1A\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 79 of 155\n\nGS Software (GS3), Version 9.1(0.16), BETA TEST SOFTWARE\r\nCompiled Tue 11-Aug-92 13:27 by jthomas\r\nStack trace from system failure:\r\nFP: 0x29C158, RA: 0xACFD4\r\nFP: 0x29C184, RA: 0xAD20C\r\nFP: 0x29C1B0, RA: 0xACFD4\r\nFP: 0x29C1DC, RA: 0xAD304\r\nFP: 0x29C1F8, RA: 0xAF774\r\nFP: 0x29C214, RA: 0xAF83E\r\nFP: 0x29C228, RA: 0x3E0CA\r\nFP: 0x29C244, RA: 0x3BD3C\r\nExamples\r\nThe following is a sample output from the show stacks PID command:\r\nDevice# show stack 10\r\nProcess 10: WATCH_AFS\r\n Stack segment 0x21668518 - 0x216690D0\r\n FP: 0x21669068, RA: 0x31A3D79C\r\nDevice# show stack 100\r\nProcess 100: dev_device_inserted\r\n Stack segment 0x418D1CC8 - 0x418D2880\r\n FP: 0x418D2830, RA: 0x30488210\r\nDevice# show stack 200\r\nProcess 200: WAAS Process\r\n Stack segment 0x41B76DB8 - 0x41B79C98\r\n FP: 0x41B79BE8, RA: 0x335ABEB4\r\nDevice# sh stack 311\r\nProcess 311: Virtual Exec\r\n Stack segment 0x24625DFC - 0x2462BBBC\r\n FP: 0x2462AEC0, RA: 0x3333372C\r\n FP: 0x2462AF60, RA: 0x36AF9250\r\nRelated Commands\r\nCommand Description\r\nshow processes Displays information about the active processes.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 80 of 155\n\nshow startup-config\r\nThe more nvram:startup-config command has been replaced by the show startup-config command. See the\r\ndescription of the more command in the “Cisco IOS File System Commands” chapter for more information.\r\nshow subsys\r\nTo display the subsystem information, use the show subsys command in privileged EXEC mode.\r\nshow subsys [class class | name name]\r\nSyntax Description\r\nclass\r\nclass\r\n(Optional) Displays the subsystems of the specified class. Valid classes are driver , ehsa , ifs ,\r\nkernel , library , license , management , microcode , pre-ehsa , pre-driver , protocol , registry , and\r\nsysinit .\r\nname\r\nname\r\n(Optional) Displays the specified subsystem. Use the asterisk character (*) as a wildcard at the end\r\nof the name to list all subsystems, starting with the specified characters.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n11.1 This command was introduced.\r\n12.3\r\nThis command was modified. The ehsa , ifs , microcode , pre-driver , and sysinit classes were\r\nadded.\r\n12.3T This command was modified The pre-ehsa class was added.\r\n12.2(33)SRA\r\nThis command was modified. The driver , ehsa , kernel , library , management , pre-driver ,\r\npre-ehsa , protocol , and registry classes were added.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 81 of 155\n\nRelease Modification\r\n12.2(35)SE2\r\nThis command was modified. The driver , ehsa , kernel , library , license , management , pre-driver , pre-ehsa , protocol , and registry classes were added.\r\nUsage Guidelines\r\nUse the show subsys command to confirm that all required features are in the running image.\r\nExamples\r\nThe following is sample output from the show subsys command:\r\nRouter# show subsys\r\nName Class Version\r\nstatic_map Kernel 1.000.001\r\narp Kernel 1.000.001\r\nether Kernel 1.000.001\r\ncompress Kernel 1.000.001\r\nalignment Kernel 1.000.002\r\nmonvar Kernel 1.000.001\r\nslot Kernel 1.000.001\r\noir Kernel 1.000.001\r\natm Kernel 1.000.001\r\nip_addrpool_sys Library 1.000.001\r\nchat Library 1.000.001\r\ndialer Library 1.000.001\r\nflash_services Library 1.000.001\r\nip_localpool_sys Library 1.000.001\r\nnvram_common Driver 1.000.001\r\nASP Driver 1.000.001\r\nsonict Driver 1.000.001\r\noc3suni Driver 1.000.001\r\noc12suni Driver 1.000.001\r\nds3suni Driver 1.000.001\r\nThe following is sample output from the show subsys command that includes the license class:\r\nRouter# show subsys name license\r\nName Class Version\r\nlicense_mgmt_local Management 1.000.001\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 82 of 155\n\nlicense_admin_local Management 1.000.001\r\nlicense_debug_core Management 1.000.001\r\nlicense_test_ui Management 1.000.001\r\ntest_license_parser Management 1.000.001\r\nlicense_ui Management 1.000.001\r\nlicense_parser Management 1.000.001\r\nlicense_registry Registry 1.000.001\r\nlicense_client License 1.000.001\r\nThe table below describes the fields shown in the display.\r\nTable 8. show subsys Field Descriptions\r\nField Description\r\nName Name of the subsystem.\r\nClass\r\nClass of the subsystem. Possible classes include Driver, Ehsa, Ifs, Kernel, Library, License,\r\nManagement, Microcode, Pre-Ehsa, Pre-driver, Protocol, Registry, and Sysinit.\r\nVersion Version of the subsystem.\r\nshow sup-bootflash\r\nTo display information about the sup-bootflash file system, use the show sup-bootflash command in privileged\r\nEXEC mode.\r\nshow sup-bootflash [all | chips | filesys]\r\nSyntax Description\r\nall (Optional) Displays all possible Flash information.\r\nchips (Optional) Displays information about the Flash chip.\r\nfilesys (Optional) Displays information about the file system.\r\nCommand Default\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 83 of 155\n\nThis command has no default settings.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.2(14)SX Support for this command was introduced on the Supervisor Engine 720.\r\n12.217d)SXB\r\nSupport for this command on the Supervisor Engine 2 was extended to Release\r\n12.2(17d)SXB.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nExamples\r\nThis example shows how to display a summary of bootflash information:\r\nRouter#\r\nshow sup-bootflash\r\n-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name\r\n1 .. image EBC8FC4D A7487C 6 10700796 Nov 19 1999 07:07:37 halley\r\n2 .. unknown C7EB077D EE2620 25 4644130 Nov 19 1999 07:50:44 cat6000-sup_\r\n5-3-3-CSX.bin\r\n645600 bytes available (15345184 bytes used)\r\nRouter#\r\nThis example shows how to display all bootflash information:\r\nRouter#\r\nshow sup-bootflash all\r\n-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name\r\n1 .. image EBC8FC4D A7487C 6 10700796 Nov 19 1999 07:07:37 halley\r\n2 .. unknown C7EB077D EE2620 25 4644130 Nov 19 1999 07:50:44 cat6000-sup_\r\n5-3-3-CSX.bin\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 84 of 155\n\n645600 bytes available (15345184 bytes used)\r\n-------- F I L E S Y S T E M S T A T U S --------\r\n Device Number = 2\r\nDEVICE INFO BLOCK: bootflash\r\n Magic Number = 6887635 File System Vers = 10000 (1.0)\r\n Length = 1000000 Sector Size = 40000\r\n Programming Algorithm = 19 Erased State = FFFFFFFF\r\n File System Offset = 40000 Length = F40000\r\n MONLIB Offset = 100 Length = F568\r\n Bad Sector Map Offset = 3FFF8 Length = 8\r\n Squeeze Log Offset = F80000 Length = 40000\r\n Squeeze Buffer Offset = FC0000 Length = 40000\r\n Num Spare Sectors = 0\r\n Spares:\r\nSTATUS INFO:\r\n Writable\r\n NO File Open for Write\r\n Complete Stats\r\n No Unrecovered Errors\r\n No Squeeze in progress\r\nUSAGE INFO:\r\n Bytes Used = EA2620 Bytes Available = 9D9E0\r\n Bad Sectors = 0 Spared Sectors = 0\r\n OK Files = 2 Bytes = EA2520\r\n Deleted Files = 0 Bytes = 0\r\n Files w/Errors = 0 Bytes = 0\r\n******** Intel SCS Status/Register Dump ********\r\nCOMMON MEMORY REGISTERS: Bank 0\r\n Intelligent ID Code : 890089\r\n Compatible Status Reg: 800080\r\nDEVICE TYPE:\r\n Layout : Paired x16 Mode\r\n Write Queue Size : 64\r\n Queued Erase Supported : No\r\nRouter#\r\nThis example shows how to display information about the Flash chip:\r\nRouter# show sup-bootflash chips\r\n******** Intel SCS Status/Register Dump ********\r\nCOMMON MEMORY REGISTERS: Bank 0\r\n Intelligent ID Code : 890089\r\n Compatible Status Reg: 800080\r\nDEVICE TYPE:\r\n Layout : Paired x16 Mode\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 85 of 155\n\nWrite Queue Size : 64\r\n Queued Erase Supported : No\r\nRouter#\r\nThis example shows how to display information about the file system:\r\nRouter# show sup-bootflash filesys\r\n-------- F I L E S Y S T E M S T A T U S --------\r\n Device Number = 2\r\nDEVICE INFO BLOCK: bootflash\r\n Magic Number = 6887635 File System Vers = 10000 (1.0)\r\n Length = 1000000 Sector Size = 40000\r\n Programming Algorithm = 19 Erased State = FFFFFFFF\r\n File System Offset = 40000 Length = F40000\r\n MONLIB Offset = 100 Length = F568\r\n Bad Sector Map Offset = 3FFF8 Length = 8\r\n Squeeze Log Offset = F80000 Length = 40000\r\n Squeeze Buffer Offset = FC0000 Length = 40000\r\n Num Spare Sectors = 0\r\n Spares:\r\nSTATUS INFO:\r\n Writable\r\n NO File Open for Write\r\n Complete Stats\r\n No Unrecovered Errors\r\n No Squeeze in progress\r\nUSAGE INFO:\r\n Bytes Used = EA2620 Bytes Available = 9D9E0\r\n Bad Sectors = 0 Spared Sectors = 0\r\n OK Files = 2 Bytes = EA2520\r\n Deleted Files = 0 Bytes = 0\r\n Files w/Errors = 0 Bytes = 0\r\nRouter#\r\n \r\nshow system jumbomtu\r\nTo display the g lobal maximum transmission unit (MTU) setting, use the show system jumbomtu command in\r\nprivileged EXEC mode.\r\nshow system jumbomtu\r\nSyntax Description\r\nThis command has no arguments or keywords.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 86 of 155\n\nCommand Default\r\nThis command has no default settings.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.2(17d)SXB\r\nSupport for this command on the Supervisor Engine 2 was extended to Release\r\n12.2(17d)SXB.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nExamples\r\nThis example shows how to display the global MTU setting:\r\nRouter# show system jumbomtu\r\nGlobal Ethernet MTU is 1550 bytes.\r\nRouter#\r\nRelated Commands\r\nCommand Description\r\nsystem jumbomtu Sets the maximum size of the Layer 2 and Layer 3 packets.\r\nshow tech-support\r\nTo display general information about the router when it reports a problem, use the show tech-support command in\r\nprivileged EXEC mode.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 87 of 155\n\nshow tech-support [page] [password] [cef | ipc | ipmulticast [vrf vrf-name] | isis | mpls | ipsec [peer ipv4\r\naddress | vrf vrf-name] | ospf [process-id | detail] | rsvp | voice | wccp]\r\nCisco 7600 Series\r\nshow tech-support [cef | ipmulticast [vrf vrf-name] | isis | password [page] | platform | page | rsvp]\r\nCisco ASR 900 Series, Cisco ASR 920 Series, Cisco NCS 4200 Series\r\nshow tech-support platform cef ipv4 address [ vrf vrf-name ] | bfd { gal GAL-BFD-tunnel-number | ipv4 ip-address { GigabitEthernet TenGigabitEthernet } | multihop ip-address | poch-ipv4 ip-address {\r\nGigabitEthernet TenGigabitEthernet } } | multicast ipv4 ip-address | qos\r\nSyntax Description\r\npage (Optional) Causes the output to display a page of information at a time.\r\npassword (Optional) Leaves passwords and other security information in the output.\r\ncef (Optional) Displays show command output specific to Cisco Express Forwarding.\r\nipc (Optional) Displays show command output specific to Inter-Process Communication (IPC).\r\nipmulticast\r\n(Optional) Displays show command output that is related to the IP Multicast configuration,\r\nincluding Protocol Independent Multicast (PIM) information, Internet Group Management\r\nProtocol (IGMP) information, and Distance Vector Multicast Routing Protocol (DVMRP)\r\ninformation.\r\nvrf vrf-name\r\n(Optional) Specifies a multicast Virtual Private Network (VPN) routing and forwarding\r\ninstance (VRF).\r\nipsec (Optional) Displays show command output related to the IPSec configuration.\r\npeer ipv4\r\naddress\r\n(Optional) Specifies the IPv4 address of a peer.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 88 of 155\n\nisis\r\n(Optional) Displays show command output specific to Connectionless Network Service\r\n(CLNS) and Intermediate System-to-Intermediate System Protocol (IS-IS).\r\nmpls\r\n(Optional) Displays show command output specific to Multiprotocol Label Switching\r\n(MPLS) forwarding and applications.\r\nospf [process-id | detail](Optional) Displays show command output specific to Open Shortest Path First Protocol\r\n(OSPF) networking.\r\nrsvp\r\n(Optional) Displays show command output specific to Resource Reservation Protocol\r\n(RSVP) networking.\r\nvoice (Optional) Displays show command output specific to voice networking.\r\nwccp\r\n(Optional) Displays show command output specific to Web Cache Communication Protocol\r\n(WCCP).\r\nplatform (Optional) Displays platform-specific show command output.\r\nbfd Displays debug information for BFD sessions.\r\ngal\r\nDisplays debug information for Generic Associated Channel Label (GAL) (Label 13) BFD\r\nsessions. Tunnel range is from 1—2147483647.\r\nipv4 Displays debug information for an IPv4 BFD session.\r\nmultihop Displays debug information for multihop BFD sessions.\r\npoch-ipv4 Displays debug information for a micro BFD session.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 89 of 155\n\nmulticast Displays debug information for multicast IPv4 sessions.\r\nqos Displays debug information for qos sessions\r\nCommand Default\r\nThe output scrolls without page breaks. Passwords and other security information are removed from the output.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n11.2 This command was introduced.\r\n11.3(7), 11.2(16)\r\nThis command was modified. The output for this command was expanded to show\r\nadditional information for boot , bootflash , context , and traffic for all enabled\r\nprotocols.\r\n12.0\r\nThis command was modified. The output for this command was expanded to show\r\nadditional information for boot , bootflash , context , and traffic for all enabled\r\nprotocols. The cef , ipmulticast , isis , mlps , and ospf keywords were added to this\r\ncommand.\r\n12.2(13)T\r\nThis command was modified. Support for AppleTalk EIGRP, Apollo Domain, Banyan\r\nVINES, Novell Link-State Protocol, and XNS was removed from Cisco IOS software.\r\n12.2(14)SX Support for this command was added for the Supervisor Engine 720.\r\n12.3(4)T\r\nThis command was modified. The output of this command was expanded to include the\r\noutput from the show inventory command.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 90 of 155\n\nRelease Modification\r\n12.2(17d)SXB\r\nSupport for this command on the Supervisor Engine 2 was extended to Release\r\n12.2(17d)SXB.\r\n12.2(30)S\r\nThis command was modified. The show tech-support ipmulticast command was\r\nchanged as follows:\r\nSupport for bidirectional PIM and Multicast VPN (MVPN) was added.\r\nThe vrf vrf-name keyword and argument were added.\r\nThe output of the show tech-support ipmulticast command (without the vrf vrf-name\r\nkeyword and argument) was changed to include the output from these commands:\r\nshow ip pim int df\r\nshow ip pim mdt\r\nshow ip pim mdt bgp\r\nshow ip pim rp metric\r\n12.3(16) This command was integrated into Cisco IOS Release 12.3(16).\r\n12.2(18)SXF This command was modified. The show tech-support ipmulticast command was\r\nchanged as follows:\r\nSupport for bidirectional PIM and MVPN was added.\r\nThe vrf vrf-name keyword and argument were added.\r\nThe output of the show tech-support ipmulticast vrf command was changed to include\r\nthe output from these commands:\r\nshow mls ip multicast rp-mapping gm-cache\r\nshow mmls gc process\r\nshow mmls msc rpdf-cache\r\nThe output of the show tech-support ipmulticast command (without the vrf vrf-name\r\nkeyword and argument) was changed to include the output from these commands:\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 91 of 155\n\nRelease Modification\r\nshow ip pim int df\r\nshow ip pim mdt\r\nshow ip pim mdt bgp\r\nshow ip pim rp metric\r\nSupport to interrupt and terminate the show tech-support output was added.\r\n12.4(7) This command was integrated into Cisco IOS Release 12.4(7).\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\n12.4(9)T\r\nThis command was modified. The output of this command was expanded to include\r\npartial show dmvpn details command output.\r\n15.0(1)M This command was modified. The wccp and voice keywords were added.\r\n12.2(33)SRE This command was modified. The wccp keyword was added.\r\nCisco IOS XE\r\nRelease 2.5\r\nThis command was modified. The wccp keyword was added.\r\n15.3(2)T\r\nThis command was modified. The output was extended to include select output for the\r\nGroup Domain of Interpretation (GDOI) configuration on key servers and group\r\nmembers.\r\nCisco IOS XE\r\nRelease 3.9S\r\nThis command was modified. The output was extended to include select output for the\r\nGDOI configuration on key servers and group members.\r\n15.4(1)T This command was modified. The output of the ipsec keyword was modified.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 92 of 155\n\nRelease Modification\r\nCisco IOS XE\r\nCupertino 17.9.1\r\nThe command show tech-support plafom cef is enhanced to display IP address\r\ninformation.\r\nCisco IOS XE\r\nDublin 17.10.1\r\nThe command show tech-support plafom bfd and show tech-support plafom multicast\r\nis introduced to display information on BFD and multicast sessions respectively.\r\nCisco IOS XE\r\nDublin 17.10.1\r\nThe show tech support and show tech-support platform are enhanced with additional\r\ncommands on the Cisco ASR 920 router.\r\nCisco IOS XE\r\nDublin 17.12.1\r\nThe command show tech-support plafom bfd qos command is introduced to display\r\ninformation on Qos sessions.\r\nUsage Guidelines\r\nTo interrupt and terminate the show tech-support output, simultaneously press and release the CTRL , ALT , and 6\r\nkeys.\r\nPress the Return key to display the next line of output, or press the Spacebar to display the next page of\r\ninformation. If you do not enter the page keyword, the output scrolls (that is, it does not stop for page breaks).\r\nIf you do not enter the password keyword, passwords and other security-sensitive information in the output are\r\nreplaced with the label “\u003cremoved\u003e.”\r\nThe show tech-support command is useful for collecting a large amount of information about your routing device\r\nfor troubleshooting purposes. The output of this command can be provided to technical support representatives\r\nwhen reporting a problem.\r\nEffective with CSCsg71173, password authentication protocol (PAP) and challenge handshake authentication\r\nprotocol (CHAP) passwords are not displayed in the output of this command.\r\nNote\r\nThis command can generate a very large amount of output. You may want to redirect the output to a\r\nfile using the show inventory | redirect url command syntax extension. Redirecting the output to a file\r\nalso makes sending this output to your technical support representative easier. For more information\r\nabout this option, see the command documentation for show \u003ccommand\u003e | redirect .\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 93 of 155\n\nThe show tech-support command displays the output of a number of show commands at once. The output from\r\nthis command varies depending on your platform and configuration. For example, access servers display voice-related show command output. Additionally, the show protocol traffic commands are displayed for only the\r\nprotocols enabled on your device. For a sample display of the output of the show tech-support command, see the\r\nindividual show command listed.\r\nIf you enter the show tech-support command without arguments, the output displays, but is not limited to, the\r\nequivalent of these show commands:\r\nshow appletalk traffic\r\nshow bootflash\r\nshow bootvar\r\nshow buffers\r\nshow cdp neighbors\r\nshow cef\r\nshow clns traffic\r\nshow context\r\nshow controllers\r\nshow crypto gdoi\r\nshow crypto gdoi gm\r\nshow crypto gdoi gm acl\r\nshow crypto gdoi gm pubkey\r\nshow crypto gdoi gm rekey detail\r\nshow crypto gdoi gm replay\r\nshow crypto gdoi ipsec sa\r\nshow crypto gdoi ks\r\nshow crypto gdoi ks acl\r\nshow crypto gdoi ks coop\r\nshow crypto gdoi ks coop version\r\nshow crypto gdoi ks identifier detail\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 94 of 155\n\nshow crypto gdoi ks member\r\nshow crypto gdoi ks policy\r\nshow crypto gdoi ks rekey\r\nshow crypto gdoi ks replay\r\nshow decnet traffic\r\nshow disk0: all\r\nshow dmvpn details\r\nshow environment\r\nshow fabric channel-counters\r\nshow file systems\r\nshow interfaces\r\nshow interfaces switchport\r\nshow interfaces trunk\r\nshow ip interface\r\nshow ip traffic\r\nshow logging\r\nshow mac-address-table\r\nshow module\r\nshow power\r\nshow processes cpu\r\nshow processes memory\r\nshow running-config\r\nshow spanning-tree\r\nshow stacks\r\nshow version\r\nshow vlan\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 95 of 155\n\nThe following additional commands for show tech-support command are added on the Cisco ASR 920 router:\r\nshow cdp neighbors\r\nshow ethernet cfm errors\r\nshow ethernet cfm maintenance-points remote\r\nshow ethernet cfm maintenance-points local\r\nshow ethernet ring g8032 summary\r\nshow flow monitor\r\nshow mac address-table detail | include REMOTE\r\nshow mac address-table dynamic\r\nshow platform hardware pp active efp\r\nshow lldp neighbors\r\nshow platform hardware pp active interface all\r\nshow platform software infrastructure punt statistics\r\nshow platform software infrastructure lsmpi punt\r\nshow rep topology\r\nshow rep topology detail\r\nrequest platform software sdcli \"nile stats channel 0?\r\nrequest platform software sdcli \"nile stats channel 0\r\nshow xconnect all\r\nThe following additional commands are added to show tech-support platform command on the Cisco ASR 920\r\nrouter:\r\nshow tech-support platform layer2 interface efp\r\nshow tech-support platform layer2 bridge-domain id\r\nshow tech-support platform pvppd dump vlan interface\r\nshow tech platform snmp-dyinggasp packets count\r\nCrypto information is not duplicated by the show dmvpn details command output.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 96 of 155\n\nNote\r\nWhen the show tech-support command is entered on a virtual switch (VS), the output displays the output of the\r\nshow module command and the show power command for both the active and standby switches.\r\nUse of the optional cef , ipc , ipmulticast , isis , mpls , ospf , or rsvp keywords provides a way to display a number\r\nof show commands specific to a particular protocol or process in addition to the show commands listed previously.\r\nFor example, if your Technical Assistance Center (TAC) support representative suspects that you have a problem\r\nin your Cisco Express Forwarding (CEF) configuration, you may be asked to provide the output of the show tech-support cef command . The show tech-support [page] [password] cef command will display the output from the\r\nfollowing commands in addition to the output for the standard show tech-support command:\r\nshow adjacency summary\r\nshow cef drop\r\nshow cef events\r\nshow cef interface\r\nshow cef not-cef-switched\r\nshow cef timers\r\nshow interfaces stats\r\nshow ip cef events summary\r\nshow ip cef inconsistency records detail\r\nshow ip cef summary\r\nIf you enter the ipmulticast keyword, the output displays, but is not limited to, these show commands:\r\nshow ip dvmrp route\r\nshow ip igmp groups\r\nshow ip igmp interface\r\nshow ip mcache\r\nshow ip mroute\r\nshow ip mroute count\r\nshow ip pim interface\r\nshow ip pim interface count\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 97 of 155\n\nshow ip pim interface df\r\nshow ip pim mdt\r\nshow ip pim mdt bgp\r\nshow ip pim neighbor\r\nshow ip pim rp\r\nshow ip pim rp metric\r\nshow mls ip multicast rp-mapping gm-cache\r\nshow mmls gc process\r\nshow mmls msc rpdf-cache\r\nIf you enter the wccp keyword, the output displays, but is not limited to, these show commands:\r\nshow ip wccp service-number\r\nshow ip wccp interfaces cef\r\nASR 900, ASR 920, NCS 4200 Series\r\nUse the show tech-support platform cef command to view the IPv4 address information.\r\nNote\r\nIPv6 address information is not supported.\r\nUse the show tech-support platform bfd command to view BFD debug session information.\r\nUse the show tech-support platform multicast command to view IPv4 session information.\r\nExamples\r\nRouter# show tech-support platform cef ipv4 10.10.10.8/32\r\n.\r\n.\r\n% Warning! Execution of the platform flow scripts can\r\ncause temporary glitch to VTY sessions. It is advised to\r\nexecute this command under the supervision of Cisco TAC\r\nAre you sure you want to proceed? [yes/no]: yes\r\n###### Log file at bootflash:/l3flow_log_22_44_29_562.txt ###########\r\nExecuting ASIC DUMP command\r\nPlatform CEF is programmed\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 98 of 155\n\nKINDLY SHARE THE FILE ***l3flow_log_22_44_29_562.txt*** FROM BOOTFLASH\r\nRouter# show tech-support platform cef ipv4 10.10.10.8/32 vrf vrf1\r\n.\r\n.\r\n% Warning! Execution of the platform flow scripts can\r\ncause temporary glitch to VTY sessions. It is advised to\r\nexecute this command under the supervision of Cisco TAC\r\nAre you sure you want to proceed? [yes/no]: yes\r\n###### Log file at bootflash:/l3flow_log_22_44_29_562.txt ###########\r\nExecuting ASIC DUMP command\r\nPlatform CEF is programmed\r\nKINDLY SHARE THE FILE ***l3flow_log_22_44_29_562.txt*** FROM BOOTFLASH\r\nRouter# show tech-support platform bfd ?\r\n gal Dump GAL BFD\r\n ipv4 debug an ipv4 bfd session\r\n multihop Dump multihop BFD\r\n poch-ipv4 debug a micro-bfd session\r\nRouter#show tech-support platform bfd ipv4 1.1.1.1 gi0/0/1 ?\r\n | Output modifiers\r\n \u003ccr\u003e \u003ccr\u003e\r\n \r\nRouter#show tech-support platform bfd multihop 1.1.1.1 ?\r\n | Output modifiers\r\n \u003ccr\u003e \u003ccr\u003e\r\nRouter#sh tech-support platform bfd gal ?\r\n \u003c1-2147483647\u003e GAL BFD tunnel number\r\nRouter#show tech-support platform bfd gal 1 ?\r\n | Output modifiers\r\n \u003ccr\u003e \u003ccr\u003e\r\nRelated Commands\r\nCommand Description\r\ndir Displays a list of files on a file system.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 99 of 155\n\nCommand Description\r\nshow appletalk\r\ntraffic\r\nDisplays statistics about AppleTalk traffic, including MAC IP traffic.\r\nshow bootflash Displays the contents of boot flash memory.\r\nshow bootvar\r\nDisplays the contents of the BOOT environment variable, the name of the configuration\r\nfile pointed to by the CONFIG_FILE environment variable, the contents of the\r\nBOOTLDR environment variable, and the configuration register setting.\r\nshow buffers Displays statistics for the buffer pools on the network server.\r\nshow cdp\r\nneighbors\r\nDisplays detailed information about neighboring devices discovered using Cisco\r\nDiscovery Protocol.\r\nshow cef Displays information about packets forwarded by Cisco Express Forwarding.\r\nshow clns traffic Displays a list of the CLNS packets this router has seen.\r\nshow \u003c command\r\n\u003e | redirect\r\nRedirects the output of any show command to a file.\r\nshow context Displays context data.\r\nshow controllers Displays information that is specific to the hardware.\r\nshow controllers\r\ntech-support\r\nDisplays general information about a VIP card for problem reporting.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 100 of 155\n\nCommand Description\r\nshow crypto gdoi Displays information about a GDOI configuration.\r\nshow disk:0 Displays flash or file system information for a disk located in slot 0:\r\nshow dmvpn\r\ndetails\r\nDisplays detail DMVPN information for each session, including Next Hop Server\r\n(NHS) and NHS status, crypto session information, and socket details.\r\nshow\r\nenvironment\r\nDisplays temperature, voltage, and blower information on the Cisco 7000 series routers,\r\nCisco 7200 series routers, Cisco 7500 series routers, Cisco 7600 series routers, Cisco\r\nAS5300 series access servers, and the Gigabit Switch Router.\r\nshow fabric\r\nchannel counters\r\nDisplays the fabric channel counters for a module.\r\nshow file system Lists available file systems.\r\nshow interfaces Displays statistics for all interfaces configured on the router or access server.\r\nshow interfaces\r\nswitchport\r\nDisplays the administrative and operational status of a switching (nonrouting) port.\r\nshow interfaces\r\ntrunk\r\nDisplays the interface-trunk information.\r\nshow inventory\r\nDisplays the product inventory listing and UDI of all Cisco products installed in the\r\nnetworking device.\r\nshow ip interface Displays the usability status of interfaces configured for IP.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 101 of 155\n\nCommand Description\r\nshow ip traffic Displays statistics about IP traffic.\r\nshow ip wccp Displays global statistics related to WCCP.\r\nshow logging Displays the state of syslog and the contents of the standard system logging buffer.\r\nshow mac-address table\r\nDisplays the MAC address table.\r\nshow module Displays module status and information.\r\nshow power Displays the current power status of system components.\r\nshow processes\r\ncpu\r\nDisplays information about the active processes.\r\nshow processes\r\nmemory\r\nDisplays the amount of memory used.\r\nshow running-config\r\nDisplays the current configuration of your routing device.\r\nshow spanning-tree\r\nDisplays information about the spanning tree state.\r\nshow stacks Displays the stack usage of processes and interrupt routines.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 102 of 155\n\nCommand Description\r\nshow version\r\nDisplays the configuration of the system hardware, the software version, the names and\r\nsources of configuration files, and the boot images.\r\nshow vlan Displays VLAN information.\r\nshow template\r\nTo display template information, use the show template command in user EXEC or privileged EXEC mode.\r\nshow template [template-name]\r\nSyntax Description\r\ntemplate-name (Optional) The template name.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n12.2(33)SRE This command was introduced in a release earlier than Cisco IOS Release 12.2(33)SRE.\r\n12.2(33)SXI This command was introduced in a release earlier than Cisco IOS Release 12.2(33)SXI.\r\n12.4(24)T This command was introduced in a release earlier than Cisco IOS Release 12.4(24)T.\r\nCisco IOS 2.1\r\nXE\r\nThis command was integrated into Cisco IOS XE Release 2.1 on the Cisco ASR 1000\r\nSeries Aggregation Services Router.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 103 of 155\n\nExamples\r\nThe following is sample output from the show template command displaying template information. The fields are\r\nself-explanatory.\r\nRouter# show template\r\nTemplate class/type Component(s)\r\ntemplate1 owner ppp peer dialer\r\nRelated Commands\r\nCommand Description\r\ntemplate Configures a particular customer profile template.\r\nshow usb controllers\r\nTo display USB host controller information, use the show usb controllers command in privileged EXEC mode.\r\nshow usb controllers [controller-number]\r\nSyntax Description\r\ncontroller-number (Optional) Displays information only for the specified controller.\r\nCommand Default\r\nInformation about all controllers on the system are displayed.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 104 of 155\n\nRelease Modification\r\n12.3(14)T This command was introduced.\r\n12.4(11)T This command was integrated into the Cisco 7200VXR NPE-G2 platform.\r\nUsage Guidelines\r\nUse the show usb controllers command to display content such as controller register specific information, current\r\nasynchronous buffer addresses, and period scheduling information. You can also use this command to verify that\r\ncopy operations are occurring successfully onto a USB flash module.\r\nExamples\r\nThe following example is sample output from the show usb controllers command:\r\nRouter# show usb controllers\r\nName:1362HCD\r\nController ID:1\r\nController Specific Information:\r\n Revision:0x11\r\n Control:0x80\r\n Command Status:0x0\r\n Hardware Interrupt Status:0x24\r\n Hardware Interrupt Enable:0x80000040\r\n Hardware Interrupt Disable:0x80000040\r\n Frame Interval:0x27782EDF\r\n Frame Remaining:0x13C1\r\n Frame Number:0xDA4C\r\n LSThreshold:0x628\r\n RhDescriptorA:0x19000202\r\n RhDescriptorB:0x0\r\n RhStatus:0x0\r\n RhPort1Status:0x100103\r\n RhPort2Status:0x100303\r\n Hardware Configuration:0x3029\r\n DMA Configuration:0x0\r\n Transfer Counter:0x1\r\n Interrupt:0x9\r\n Interrupt Enable:0x196\r\n Chip ID:0x3630\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 105 of 155\n\nBuffer Status:0x0\r\n Direct Address Length:0x80A00\r\n ATL Buffer Size:0x600\r\n ATL Buffer Port:0x0\r\n ATL Block Size:0x100\r\n ATL PTD Skip Map:0xFFFFFFFF\r\n ATL PTD Last:0x20\r\n ATL Current Active PTD:0x0\r\n ATL Threshold Count:0x1\r\n ATL Threshold Timeout:0xFF\r\nInt Level:1\r\nTransfer Completion Codes:\r\n Success :920 CRC :0\r\n Bit Stuff :0 Stall :0\r\n No Response :0 Overrun :0\r\n Underrun :0 Other :0\r\n Buffer Overrun :0 Buffer Underrun :0\r\nTransfer Errors:\r\n Canceled Transfers :2 Control Timeout :0\r\nTransfer Failures:\r\n Interrupt Transfer :0 Bulk Transfer :0\r\n Isochronous Transfer :0 Control Transfer:0\r\nTransfer Successes:\r\n Interrupt Transfer :0 Bulk Transfer :26\r\n Isochronous Transfer :0 Control Transfer:894\r\nUSBD Failures:\r\n Enumeration Failures :0 No Class Driver Found:0\r\n Power Budget Exceeded:0\r\nUSB MSCD SCSI Class Driver Counters:\r\n Good Status Failures :3 Command Fail :0\r\n Good Status Timed out:0 Device not Found:0\r\n Device Never Opened :0 Drive Init Fail :0\r\n Illegal App Handle :0 Bad API Command :0\r\n Invalid Unit Number :0 Invalid Argument:0\r\n Application Overflow :0 Device in use :0\r\n Control Pipe Stall :0 Malloc Error :0\r\n Device Stalled :0 Bad Command Code:0\r\n Device Detached :0 Unknown Error :0\r\n Invalid Logic Unit Num:0\r\nUSB Aladdin Token Driver Counters:\r\n Token Inserted :1 Token Removed :0\r\n Send Insert Msg Fail :0 Response Txns :434\r\n Dev Entry Add Fail :0 Request Txns :434\r\n Dev Entry Remove Fail:0 Request Txn Fail:0\r\n Response Txn Fail :0 Command Txn Fail:0\r\n Txn Invalid Dev Handle:0\r\nUSB Flash File System Counters:\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 106 of 155\n\nFlash Disconnected :0 Flash Connected :1\r\n Flash Device Fail :0 Flash Ok :1\r\n Flash startstop Fail :0 Flash FS Fail :0\r\nUSB Secure Token File System Counters:\r\n Token Inserted :1 Token Detached :0\r\n Token FS success :1 Token FS Fail :0\r\n Token Max Inserted :0 Create Talker Failures:0\r\n Token Event :0 Destroy Talker Failures:0\r\n Watched Boolean Create Failures:0\r\nshow usb device\r\nTo display USB device information, use the show usb device command in privileged EXEC mode.\r\nshow usb device [controller-ID [device-address] ]\r\nSyntax Description\r\ncontroller-ID (Optional) Displays information only for the devices under the specified controller.\r\ndevice-address (Optional) Displays information only for the device with the specified address.\r\nCommand Default\r\nInformation for all devices attached to the system are displayed.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.3(14)T This command was introduced.\r\n12.4(11)T This command was integrated into the Cisco 7200VXR NPE-G2 platform.\r\nUsage Guidelines\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 107 of 155\n\nUse the show usb device command to display information for either a USB flash drive or a USB eToken, as\r\nappropriate.\r\nExamples\r\nThe following example is sample output from the show usb device command:\r\nRouter# show usb device\r\n \r\nHost Controller:1\r\nAddress:0x1\r\nDevice Configured:YES\r\nDevice Supported:YES\r\nDescription:DiskOnKey\r\nManufacturer:M-Sys\r\nVersion:2.0\r\nSerial Number:0750D84030316868\r\nDevice Handle:0x1000000\r\nUSB Version Compliance:2.0\r\nClass Code:0x0\r\nSubclass Code:0x0\r\nProtocol:0x0\r\nVendor ID:0x8EC\r\nProduct ID:0x15\r\nMax. Packet Size of Endpoint Zero:64\r\nNumber of Configurations:1\r\nSpeed:Full\r\nSelected Configuration:1\r\nSelected Interface:0\r\nConfiguration:\r\n Number:1\r\n Number of Interfaces:1\r\n Description:\r\n Attributes:None\r\n Max Power:140 mA\r\n Interface:\r\n Number:0\r\n Description:\r\n Class Code:8\r\n Subclass:6\r\n Protocol:80\r\n Number of Endpoints:2\r\n Endpoint:\r\n Number:1\r\n Transfer Type:BULK\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 108 of 155\n\nTransfer Direction:Device to Host\r\n Max Packet:64\r\n Interval:0\r\n Endpoint:\r\n Number:2\r\n Transfer Type:BULK\r\n Transfer Direction:Host to Device\r\n Max Packet:64\r\n Interval:0\r\nHost Controller:1\r\nAddress:0x11\r\nDevice Configured:YES\r\nDevice Supported:YES\r\nDescription:eToken Pro 4254\r\nManufacturer:AKS\r\nVersion:1.0\r\nSerial Number:\r\nDevice Handle:0x1010000\r\nUSB Version Compliance:1.0\r\nClass Code:0xFF\r\nSubclass Code:0x0\r\nProtocol:0x0\r\nVendor ID:0x529\r\nProduct ID:0x514\r\nMax. Packet Size of Endpoint Zero:8\r\nNumber of Configurations:1\r\nSpeed:Low\r\nSelected Configuration:1\r\nSelected Interface:0\r\nConfiguration:\r\n Number:1\r\n Number of Interfaces:1\r\n Description:\r\n Attributes:None\r\n Max Power:60 mA\r\n Interface:\r\n Number:0\r\n Description:\r\n Class Code:255\r\n Subclass:0\r\n Protocol:0\r\n Number of Endpoints:0\r\nThe following table describes the significant fields shown in the display.\r\nTable 9. show usb device Field Descriptions\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 109 of 155\n\nField Description\r\nDevice\r\nhandle\r\nInternal memory handle allocated to the device.\r\nDevice\r\nClass code\r\nThe class code supported by the device.\r\nThis number is allocated by the USB-IF. If this field is reset to 0, each interface within a\r\nconfiguration specifies its own class information, and the various interfaces operate\r\nindependently. If this field is set to a value between 1 and FEH, the device supports different\r\nclass specifications on different interfaces, and the interfaces may not operate independently.\r\nThis value identifies the class definition used for the aggregate interfaces. If this field is set to\r\nFFH, the device class is vendor-specific.\r\nDevice\r\nSubclass\r\ncode\r\nThe subclass code supported by the device. This number is allocated by the USB-IF.\r\nDevice\r\nProtocol\r\nThe protocol supported by the device. If this field is set to 0, the device does not use class-specific protocols on a device basis. If this field is set to 0xFF, the device uses a vendor-specific protocol on a device basis.\r\nInterface\r\nClass code\r\nThe class code supported by the interface. If the value is set to 0xFF, the interface class is\r\nvendor specific. All other values are allocated by the USB-IF.\r\nInterface\r\nSubclass\r\ncode\r\nThe subclass code supported by the interface. All values are allocated by the USB-IF.\r\nInterface\r\nProtocol\r\nThe protocol code supported by the interface. If this field is set to 0, the device does not use a\r\nclass-specific protocol on this interface. If this field is set to 0xFF, the device uses a vendor-specific protocol for this interface.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 110 of 155\n\nField Description\r\nMax\r\nPacket\r\nMaximum data packet size, in bytes.\r\nshow usb driver\r\nTo display information about registered USB class drivers and vendor-specific drivers, use the show usb driver\r\ncommand in privileged EXEC mode.\r\nshow usb driver [index]\r\nSyntax Description\r\nindex (Optional) Displays information only for drivers on the specified index.\r\nCommand Default\r\nInformation about all drivers is displayed.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.3(14)T This command was introduced.\r\n12.4(11)T This command was integrated into the Cisco 7200VXR NPE-G2 platform.\r\nCisco IOS XE Release 3.6 This command was integrated into Cisco IOS XE Release 3.6.\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 111 of 155\n\nThe following example is sample output for the show usb driver command:\r\nRouter# show usb driver\r\n \r\nIndex:0\r\nOwner Mask:0x6\r\nClass Code:0x0\r\nSubclass Code:0x0\r\nProtocol:0x0\r\nInterface Class Code:0x8\r\nInterface Subclass Code:0x6\r\nInterface Protocol Code:0x50\r\nProduct ID:0x655BD598\r\nVendor ID:0x64E90000\r\nAttached Devices:\r\n Controller ID:1, Device Address:1\r\nIndex:1\r\nOwner Mask:0x1\r\nClass Code:0x0\r\nSubclass Code:0x0\r\nProtocol:0x0\r\nInterface Class Code:0x0\r\nInterface Subclass Code:0x0\r\nInterface Protocol Code:0x0\r\nProduct ID:0x514\r\nVendor ID:0x529\r\nAttached Devices:\r\n Controller ID:1, Device Address:17\r\nIndex:2\r\nOwner Mask:0x5\r\nClass Code:0x9\r\nSubclass Code:0x6249BD58\r\nProtocol:0x2\r\nInterface Class Code:0x5DC0\r\nInterface Subclass Code:0x5\r\nInterface Protocol Code:0xFFFFFFFF\r\nProduct ID:0x2\r\nVendor ID:0x1\r\nAttached Devices:\r\n None\r\nIndex:3\r\nOwner Mask:0x10\r\nClass Code:0x0\r\nSubclass Code:0x0\r\nProtocol:0x0\r\nInterface Class Code:0x0\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 112 of 155\n\nInterface Subclass Code:0x0\r\nInterface Protocol Code:0x0\r\nProduct ID:0x0\r\nVendor ID:0x0\r\nAttached Devices:\r\n None\r\nThe following table describes the significant field shown in the display.\r\nTable 10. show usb driver Field Descriptions\r\nField Description\r\nOwner\r\nMask\r\nIndicates the fields that are used in enumeration comparison. The driver can own different\r\ndevices on the basis of their product or vendor IDs and device or interface class, subclass, and\r\nprotocol codes.\r\nshow usb port\r\nTo sisplay USB root hub port information, use the show usb port command in privileged EXEC mode.\r\nshow usb port [port-number]\r\nSyntax Description\r\nport-number(Optional) Displays information only for a specified. If the port-number is not issued,\r\ninformation for all root ports will be displayed.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.3(14)T This command was introduced.\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 113 of 155\n\nThe following sample from the show usb port command shows the status of the port 1 on the router:\r\nRouter# show usb port\r\nPort Number:0\r\nStatus:Enabled\r\nConnection State:Connected\r\nSpeed:Full\r\nPower State:ON\r\nPort Number:1\r\nStatus:Enabled\r\nConnection State:Connected\r\nSpeed:Low\r\nPower State:ON\r\nshow usb tree\r\nTo display information about the port state and all attached devices, use the show usb tree command in privileged\r\nEXEC mode.\r\nshow usb tree\r\nSyntax Description\r\nThis command has no arguments or keywords.\r\nCommand Modes\r\nEXEC\r\nCommand History\r\nRelease Modification\r\n12.3(14)T This command was introduced.\r\nExamples\r\nThe following example is sample output from the show usb tree command. This output shows that both a USB\r\nflash module and a USB eToken are currently enabled.\r\nRouter# show usb tree\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 114 of 155\n\n[Host Id:1, Host Type:1362HCD, Number of RH-Port:2]\r\n\u003cRoot Port0:Power=ON Current State=Enabled\u003e\r\n Port0:(DiskOnKey) Addr:0x1 VID:0x08EC PID:0x0015 Configured (0x1000000)\r\n\u003cRoot Port1:Power=ON Current State=Enabled\u003e\r\n Port1:(eToken Pro 4254) Addr:0x11 VID:0x0529 PID:0x0514 Configured (0x1010000)\r\nshow usbtoken\r\nTo display information about the USB eToken (such as the eToken ID), use the show usbtoken command in\r\nprivileged EXEC mode.\r\nshow usbtoken [0-9]: {all | filesystem}\r\nSyntax Description\r\n0-9\r\n(Optional) One of the ten available flash drives you can choose from; valid values: 0-9. If you do\r\nnot specify a number, 0 is used by default\r\nall (Optional) All configuration files stored on the eToken.\r\nfilesystem (Optional) Name of a configuration file.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.3(14)T This command was introduced.\r\n12.4(11)T This command was integrated into the Cisco 7200VXR NPE-G2 platform.\r\nCisco IOS XE Release 3.6 This command was integrated into Cisco IOS XE Release 3.6.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 115 of 155\n\nUsage Guidelines\r\nUse the show usbtoken command to verify whether a USB eToken is inserted in the router.\r\nExamples\r\nThe following example is sample output from the show usbtoken command:\r\nRouter# show usbtoken0\r\nToken ID :43353334\r\nToken device name : token0\r\nVendor name : Vendor34\r\nProduct Name :Etoken Pro\r\nSerial number : 22273a334353\r\nFirmware version : 4.1.3.2\r\nTotal memory size : 32 KB\r\nFree memory size : 16 KB\r\nFIPS version : Yes/No\r\nToken state : “Active” | “User locked” | “Admin locked” | “System Error” | “Uknown”\r\nATR (Answer To Reset) :\"3B F2 98 0 FF C1 10 31 FE 55 C8 3\"\r\nThe following table describes the significant fields shown in the display.\r\nTable 11. show usbtoken Field Descriptions\r\nField Description\r\nToken ID Token identifier.\r\nToken device name A unique name derived by the token driver.\r\nATR (Answer to Reset) Information replied by Smart cards when a reset command is issued.\r\nshow version\r\nTo display information about the currently loaded software along with hardware and device information, use the\r\nshow version command in user EXEC, privileged EXEC, or diagnostic mode.\r\nshow version\r\nCisco Catalyst 3850 Series Switches and Cisco 5760 Series Wireless Controllers\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 116 of 155\n\nshow version [switchnode] [running | committed | provisioned]\r\nCisco ASR 1000 Series Routers\r\nshow version [rp-slot] [installed [user-interface] | provisioned | running]\r\nCisco Catalyst 4500e Series Switches running IOS XE software\r\nshow version [rp-slot] [running]\r\nCisco Catalyst 6500 Series Routers\r\nshow version [epld slot]\r\nSyntax Description\r\nswitchnode (optional) Only a single switch may be specified. Default is all switches in a stacked system.\r\nrunning\r\n(optional) Specifies information on the files currently running.\r\ncat3850 and ct5760: (optional) Displays information about the active package set currently\r\nrunning on the switch. When booted in installed mode, this is typically the set of packages\r\nlisted in the booted provisioning file. When booted in bundle mode, this is typically the set of\r\npackages contained in the booted bundle.\r\ncommitted\r\n(optional) Displays information about the committed package set. If no installation operations\r\nhave been performed since bootup, this output will be the same as show version running . If\r\nany installation operations have been performed since bootup, this output will display the set\r\nof packages that will be activated/running on the next reload.\r\nNote\r\n \r\nThis command option is only applicable when running in installed mode.\r\nprovisioned\r\n(optional)Specifies information on the software files that are provisioned.\r\ncat3850 and ct5760: (optional) Displays information about the provisioned package set. In\r\nmost cases, the provisioned package set is the same as the committed package set. These\r\npackage sets will differ if an installation was performed with the ‘auto-rollback’ option and the\r\ninstalled packages have not yet been committed using the 'software commit' command. This\r\ncommand option is only applicable when running in installed mode.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 117 of 155\n\nrp-slot\r\nSpecifies the software of the RP in a specific RP slot of a Cisco ASR 1000 Series Router.\r\nOptions include:\r\nr0 --the RP in RP slot 0.\r\nr1 --the RP in RP slot 1.\r\nrp active --the active RP.\r\nrp standby --the standby RP.\r\ninstalled Specifies information on the software installed on the RP\r\nuser-interface\r\nSpecifies information on the files related to the user-interface.\r\nepld slot (Optional) Specifies the software of the EPLD slot of a Cisco Catalyst 6500 Series Router.\r\nCommand Default\r\nNo default behavior or values.\r\nCommand Modes\r\nUser EXEC (\u003e) Privileged EXEC (#) Diagnostic (diag)--Cisco ASR 1000 Series Routers only\r\nCommand History\r\nRelease Modification\r\n9.0 This command was introduced.\r\n12.1EC This command was integrated into Cisco IOS Release 12.1EC.\r\n12.1(1a)T1\r\nThis command was modified to include information about the clock card on CMTS\r\nrouters.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 118 of 155\n\nRelease Modification\r\n12.3BC This command was integrated into Cisco IOS Release 12.3BC.\r\n12.3(4)T The output format of this command was updated.\r\n12.2(14)SX Support for this command was introduced on the Supervisor Engine 720.\r\n12.2(17d)SXB\r\nSupport for this command on the Supervisor Engine 2 was extended to\r\n12.2(17d)SXB.\r\n12.2(25)S The output format of this command was updated.\r\n12.2(33)SCA\r\nThis command was integrated into Cisco IOS Release 12.2(33)SCA. Support for the\r\nCisco uBR7225VXR router was added.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nCisco IOS XE\r\nRelease 2.1\r\nThis command was introduced on the Cisco ASR 1000 Series Routers, and the\r\nfollowing enhancements were introduced:\r\nthe command became available in diagnostic mode.\r\nthe rp-slot , installed , user-interface , provisioned , and running options all\r\nbecame available for the first time.\r\n12.2(18)SX Added ELPD keyword and output for the Cisco Catalyst 6500 Series Router.\r\nCisco IOS XE\r\nRelease 2.4\r\nThe output format of this command was updated.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 119 of 155\n\nRelease Modification\r\nCisco IOS XE\r\nRelease 3.1.0.SG\r\nThis command was introduced on the Cisco Catalyst 4500e Serfies Switches with\r\nsupport for the rp-slot parameter and running command option.\r\nIOS XE 3.2.0 SE\r\nCommand introduced on the Cisco Catalyst 3850 Series Switches and Cisco 5760\r\nSeries Wireless Controllers with support for the switch keyword and running,\r\nprovisioned and committed command options.\r\nCisco IOS XE\r\nRelease 3.3 SE\r\nThis command was integrated.\r\nUsage Guidelines\r\nThis command displays information about the Cisco IOS software version currently running on a routing device,\r\nthe ROM Monitor and Bootflash software versions, and information about the hardware configuration, including\r\nthe amount of system memory. Because this command displays both software and hardware information, the\r\noutput of this command is the same as the output of the show hardware command. (The show hardware command\r\nis a command alias for the show version command.)\r\nSpecifically, the show version command provides the following information:\r\nSoftware information\r\nMain Cisco IOS image version\r\nMain Cisco IOS image capabilities (feature set)\r\nLocation and name of bootfile in ROM\r\nBootflash image version (depending on platform)\r\nDevice-specific information\r\nDevice name\r\nSystem uptime\r\nSystem reload reason\r\nConfig-register setting\r\nConfig-register settings for after the next reload (depending on platform)\r\nHardware information\r\nPlatform type\r\nProcessor type\r\nProcessor hardware revision\r\nAmount of main (processor) memory installed\r\nAmount I/O memory installed\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 120 of 155\n\nAmount of Flash memory installed on different types (depending on platform)\r\nProcessor board ID\r\nThe output of this command uses the following format:\r\nCisco IOS Software, \u003cplatform\u003e Software (\u003cimage-id\u003e), Version \u003csoftware-version\u003e,\r\n \u003csoftware-type\r\nTechnical Support: http://www.cisco.com/techsupport\r\nCopyright (c) \u003cdate-range\u003e by Cisco Systems, Inc.\r\nCompiled \u003cday\u003e \u003cdate\u003e \u003ctime\u003e by \u003ccompiler-id\u003e\r\nROM: System Bootstrap, Version \u003csoftware-version\u003e, \u003csoftware-type\u003e\r\nBOOTLDR: \u003cplatform\u003e Software (image-id), Version \u003csoftware-version\u003e, \u003csoftware-type\u003e\r\n\u003crouter-name\u003e uptime is \u003cw\u003e weeks, \u003cd\u003e days, \u003ch\u003e hours,\r\n\u003cm\u003e minutes\r\nSystem returned to ROM by reload at \u003ctime\u003e \u003cday\u003e \u003cdate\u003e\r\nSystem image file is \"\u003cfilesystem-location\u003e/\u003csoftware-image-name\u003e\"\r\nLast reload reason: \u003creload-reason\u003eCisco \u003cplatform-processor-type\u003e\r\nprocessor (revision \u003cprocessor-revision-id\u003e) with \u003cfree-DRAM-memory\u003e\r\nK/\u003cpacket-memory\u003eK bytes of memory.\r\nProcessor board ID \u003cID-number\r\n\u003cCPU-type\u003e CPU at \u003cclock-speed\u003eMhz, Implementation \u003cnumber\u003e, Rev \u003c\r\nRevision-number\u003e, \u003ckilobytes-Processor-Cache-Memory\u003eKB \u003ccache-Level\u003e Cache\r\nSee the Examples section for descriptions of the fields in this output.\r\nCisco ASR 1000 Series Routers\r\nEntering show version without any of the options on the Cisco ASR 1000 Series Router will generate output\r\nsimilar to show version on other Cisco routers.\r\nIn order to understand the show version output on Cisco ASR 1000 Series Routers, it is important to understand\r\nthat the individual sub-packages run the processes on the router. Among other things, the output of this command\r\nprovides information on where various individual sub-packages are stored on the router, and which processes\r\nthese individual sub-packages are and are not currently running.\r\nMore specifically, the command displays each individual sub-package file on the router, the hardware where the\r\nsub-package could be running, and whether the sub-package is currently being run on that hardware.\r\nThe show version provisioned command displays only the individual sub-packages that can be provisioned, which\r\nare the RP-specific sub-packages (RP Access, RP Base, RP Control, and RP IOS) and the provisioning file. The\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 121 of 155\n\noutput includes the individual sub-package file, the hardware where the sub-package could be running, and\r\nwhether the sub-package is currently being run on that hardware.\r\nThe command displays only the individual sub-packages that are currently active. The output includes the\r\nindividual sub-package file and the hardware where the sub-package is running.\r\nCisco Catalyst 4500e Series Switches\r\nEntering show version without any of the options on a Cisco Catalyst 4500e Series Switch running IOS XE\r\nsoftware will generate output similar to show version on other Cisco platforms. One notable difference is that the\r\noutput displays the IOS XE software version instead of the IOS image version.\r\nThe IOS XE software bundle includes a set of individual packages that comprise the complete set of software that\r\nruns on the switch. The show version running command displays the list individual packages that are currently\r\nactive, that is, the set of packages included in the IOS XE software bundle currently running on the Cisco Catalyst\r\n4500e Series Switch.\r\nCisco Catalyst 3850 Series Switches and Cisco 5760 Series Wireless Controllers\r\nEntering show version without any of the options on a Cisco Catalyst 3850 Series Switch or Cisco 5760 Series\r\nWireless Controller will generate output similar to show version on other Cisco platforms. One notable difference\r\nis that the output displays the IOS XE software version instead of the IOS image version.\r\nThe IOS XE software bundle includes a set of individual packages that comprise the complete set of software that\r\nruns on the switch or wireless controller.\r\nThe show version running command displays the list of individual packages that are currently running on the\r\nswitch. When booted in installed mode, this is typically the set of packages listed in the booted provisioning file.\r\nWhen booted in bundle mode, this is typically the set of packages contained in the bundle.\r\nThe show version committed command displays information about the switch's or wireless controller's committed\r\npackage set. If no installation operations have been performed since bootup, this output will be the same as show\r\nversion running . If any installation operations have been performed since bootup, this output will display the set\r\nof packages that will be activated/running on the next reload. This command is not applicable when running in\r\nbundle mode.\r\nThe show version provisioned command displays information about the provisioned package set. In most cases,\r\nthe provisioned package set is the same as the committed package set. These package sets will differ if an\r\ninstallation was performed with the auto-rollback option and the installed packages have not yet been committed\r\nby use of the software commit command. This command is not applicable when running in bundle mode.\r\nExamples\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 122 of 155\n\nThe following is sample output from the show version command issued on a Cisco 3660 running Cisco IOS\r\nRelease 12.3(4)T:\r\nRouter# show version\r\n \r\nCisco IOS Software, 3600 Software (C3660-I-M), Version 12.3(4)T\r\nTAC Support: http://www.cisco.com/tac\r\nCopyright (c) 1986-2003 by Cisco Systems, Inc.\r\nCompiled Thu 18-Sep-03 15:37 by ccai\r\nROM: System Bootstrap, Version 12.0(6r)T, RELEASE SOFTWARE (fc1)\r\nROM:\r\nC3660-1 uptime is 1 week, 3 days, 6 hours, 41 minutes\r\nSystem returned to ROM by power-on\r\nSystem image file is \"slot0:tftpboot/c3660-i-mz.123-4.T\"\r\nCisco 3660 (R527x) processor (revision 1.0) with 57344K/8192K bytes of memory.\r\nProcessor board ID JAB055180FF\r\nR527x CPU at 225Mhz, Implementation 40, Rev 10.0, 2048KB L2 Cache\r\n3660 Chassis type: ENTERPRISE\r\n2 FastEthernet interfaces\r\n4 Serial interfaces\r\nDRAM configuration is 64 bits wide with parity disabled.\r\n125K bytes of NVRAM.\r\n16384K bytes of processor board System flash (Read/Write)\r\nFlash card inserted. Reading filesystem...done.\r\n20480K bytes of processor board PCMCIA Slot0 flash (Read/Write)\r\nConfiguration register is 0x2102\r\nExamples\r\nThe following is sample output from the show version command issued on a Cisco 7200 router running Cisco IOS\r\nRelease 12.4(4)T. This output shows the total bandwidth capacity and the bandwith capacity that is configured on\r\nthe Cisco 7200. Displaying bandwidth capacity is available in Cisco IOS Release 12.2 and later releases.\r\nRouter# show version\r\nCisco IOS Software, 7200 Software (C7200-JS-M), Version 12.4(4)T, RELEASE SOFTW)\r\nTechnical Support: http://www.cisco.com/techsupport\r\nCopyright (c) 1986-2005 by Cisco Systems, Inc.\r\nCompiled Thu 27-Oct-05 05:58 by ccai\r\nROM: System Bootstrap, Version 12.1(20000710:044039) [nlaw-121E_npeb 117], DEVEE\r\nBOOTLDR: 7200 Software (C7200-KBOOT-M), Version 12.3(16), RELEASE SOFTWARE (fc4)\r\nrouter uptime is 5 days, 18 hours, 2 minutes\r\nSystem returned to ROM by reload at 02:45:12 UTC Tue Feb 14 2006\r\nSystem image file is \"disk0:c7200-js-mz.124-4.T\"\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 123 of 155\n\nLast reload reason: Reload Command\r\nCisco 7206VXR (NPE400) processor (revision A) with 491520K/32768K bytes of memo.\r\nProcessor board ID 26793934\r\nR7000 CPU at 350MHz, Implementation 39, Rev 3.2, 256KB L2 Cache\r\n6 slot VXR midplane, Version 2.6\r\nLast reset from power-on\r\n \r\nPCI bus mb0_mb1 (Slots 0, 1, 3 and 5) has a capacity of 600 bandwidth points.\r\nCurrent configuration on bus mb0_mb1 has a total of 440 bandwidth points.\r\nThis configuration is within the PCI bus capacity and is supported.\r\nPCI bus mb2 (Slots 2, 4, 6) has a capacity of 600 bandwidth points.\r\nCurrent configuration on bus mb2 has a total of 390 bandwidth points\r\nThis configuration is within the PCI bus capacity and is supported.\r\nPlease refer to the following document \"Cisco 7200 Series Port Adaptor\r\nHardware Configuration Guidelines\" on Cisco.com \u003chttp://www.cisco.com\u003e\r\nfor c7200 bandwidth points oversubscription and usage guidelines.\r\n4 Ethernet interfaces\r\n2 FastEthernet interfaces\r\n2 ATM interfaces\r\n125K bytes of NVRAM.\r\n62976K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).\r\n125952K bytes of ATA PCMCIA card at slot 1 (Sector size 512 bytes).\r\n8192K bytes of Flash internal SIMM (Sector size 256K).\r\nConfiguration register is 0x2002\r\n \r\nRouter#\r\nFor information about PCI buses and bandwidth calculation, go to the \"Cisco 7200 Series Port Adapter Installation\r\nRequirements\" chapter, of the Cisco 7200 Series Port Adapter Hardware Configuration Guidelines guide.\r\nThe following table describes the significant fields shown in the display.\r\nTable 12. show version Field Descriptions\r\nField Description\r\nCisco IOS Software, platform Software\r\n(image-id ), Version software-version ,\r\nrelease-type\r\nFor example:\r\nCisco IOS Software, 7200 Software\r\n(C7200-G4JS-M), Version 12.3(4)T\r\nplatform --Cisco hardware device name.\r\nimage-id --The coded software image identifier, in the format\r\nplatform-features-format (for example, “c7200-g4js-mz”.\r\nsoftware-version --The Cisco IOS software release number, in\r\nthe format x .y (z )A , where x.y is the main release identifier, z\r\nis the maintenance release number, and A , where applicable, is\r\nthe special release train identifier. For example, 12.3(4)T\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 124 of 155\n\nField Description\r\nindicates the fourth maintenance release of the 12.3T special\r\ntechnology release train.\r\nNote\r\n \r\nIn the full software image filename, 12.3(4)T\r\nappears as 123-4.T. In the IOS Upgrade Planner,\r\n12.3(4)T appears as 12.3.4T (ED).\r\nrelease-type --The description of the release type. Possible\r\nvalues include MAINTENANCE [for example, 12.3(3)] or\r\nINTERIM [for example, 12.3(3.2)].\r\nTip\r\n \r\nRefer to “The ABC’s of Cisco IOS Networking”\r\n(available on Cisco.com) for more information on\r\nCisco IOS software release numbering and\r\nsoftware versions.\r\nCisco IOS is a registered trademark (R) of Cisco Systems, Inc.\r\nTechnical Support:\r\nhttp://www.cisco.com/techsupport\r\nCopyright (c) date-range by Cisco\r\nSystems, Inc.\r\nThe Cisco Technical Support \u0026 Documentation website\r\ncontains thousands of pages of searchable technical content,\r\nincluding links to products, technologies, solutions, technical\r\ntips, and tools. Registered Cisco.com users can log in from this\r\npage to access even more content.\r\nCisco IOS software, including the source code, user-help, and\r\ndocumentation, is copyrighted by Cisco Systems, Inc. It is\r\nCisco’s policy to enforce its copyrights against any third party\r\nwho infringes on its copyright.\r\nROM: System Bootstrap, Version\r\n12.0(6r)T, RELEASE SOFTWARE (fc1)\r\nThe system “bootstrap” software, stored in ROM memory.\r\nBOOTFLASH:\r\nThe system “bootflash” software, stored in Flash memory (if\r\napplicable).\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 125 of 155\n\nField Description\r\ndevice uptime is ...\r\nFor example:\r\nC3660-1 uptime is 1 week, 3 days, 6 hours,\r\n41 minutes\r\nThe amount of time the system has been up and running.\r\nSystem returned to ROM by reload-reason\r\nat timedaydate\r\nFor example:\r\nSystem returned to ROM by reload at\r\n20:56:53 UTC Tue Nov 4 2003\r\nShows the last recorded reason for a system reload, and time of\r\nlast reload.\r\nLast reload reason: reload-reason\r\nFor example:\r\nLast reload reason: Reload command\r\nShows the last recorded reason for a system reload.\r\nLast reset from reset-reason\r\nFor example:\r\nLast reset from power-on\r\nShows the last recorded reason for a system reset. Possible\r\nreset-reason values include:\r\npower-on--System was reset with the initial power on\r\nor a power cycling of the device.\r\ns/w peripheral--System was reset due to a software\r\nperipheral.\r\ns/w nmi--System was reset by a nonmaskable interrupt\r\n(NMI) originating in the system software. For example,\r\non some systems, you can configure the device to reset\r\nautomatically if two or more fans fail.\r\npush-button--System was reset by manual activation of\r\na RESET push-button (also called a hardware NMI).\r\nwatchdog--System was reset due to a watchdog process.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 126 of 155\n\nField Description\r\nunexpected value--May indicate a bus error, such as for\r\nan attempt to access a nonexistent address (for example,\r\n“System restarted by bus error at PC 0xC4CA, address\r\n0x210C0C0”).\r\n(This field was formerly labeled as the “System restarted by”\r\nfield.”)\r\nSystem image file is “file-location/ file-name ”\r\nFor example:\r\nSystem image file is \"slot0:tftpboot/c3660-\r\ni-mz.123-3.9.T2\"\r\nDisplays the file location (local or remote filesystem) and the\r\nsystem image name.\r\nCisco platform (processor-type ) processor\r\n(revision processor-revision-id ) with free -\r\nDRAM-memory K/ packet-memory K bytes\r\nof memory.\r\nExample--Separate DRAM and Packet\r\nMemory:\r\nCisco RSP4 (R5000) processor with\r\n65536K/2072K bytes of memory\r\nExample--Combined DRAM and Packet\r\nMemory:\r\nCisco 3660 (R527x) processor (revision\r\n1.0) with 57344K/8192K bytes of memory.\r\nThis line can be used to determine how much Dynamic RAM\r\n(DRAM) is installed on your system, in order to determine if\r\nyou meet the “Min. Memory” requirement for a software\r\nimage. DRAM (including SDRAM) is used for system\r\nprocessing memory and for packet memory.\r\nTwo values, separated by a slash, are given for DRAM: The\r\nfirst value tells you how DRAM is available for system\r\nprocessing, and the second value tells you how much DRAM\r\nis being used for Packet memory.\r\nThe first value, Main Processor memory, is either:\r\nThe amount of DRAM available for the processor, or\r\nThe total amount of DRAM installed on the system.\r\nThe second value, Packet memory, is either:\r\nThe total physical input/output (I/O) memory (or “Fast\r\nmemory”) installed on the router (Cisco 4000, 4500,\r\n4700, and 7500 series), or\r\nThe amount of “shared memory” used for packet\r\nbuffering. In the shared memory scheme (Cisco 2500,\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 127 of 155\n\nField Description\r\n2600, 3600, and 7200 Series), a percentage of DRAM is\r\nused for packet buffering by the router's network\r\ninterfaces.\r\nNote\r\n \r\nThe terms “I/O memory” or “iomem”; “shared\r\nmemory”; “Fast memory” and “PCI memory” all\r\nrefer to “Packet Memory”. Packet memory is\r\neither separate physical RAM or shared DRAM.\r\nSeparate DRAM and Packet Memory\r\nThe 4000, 4500, 4700, and 7500 series routers have separate\r\nDRAM and Packet memory, so you only need to look at the\r\nfirst number to determine total DRAM. In the example to the\r\nleft for the Cisco RSP4, the first value shows that the router\r\nhas 65536K (65,536 kilobytes, or 64 megabytes) of DRAM.\r\nThe second value, 8192K, is the Packet memory.\r\nCombined DRAM and Packet Memory\r\nThe 2500, 2600, 3600, and 7200 series routers require a\r\nminimum amount of I/O memory to support certain interface\r\nprocessors.\r\nThe 1600, 2500, 2600, 3600, and 7200 series routers use a\r\nfraction of DRAM as Packet memory, so you need to add both\r\nnumbers to find out the real amount of DRAM. In the example\r\nto the left for the Cisco 3660, the router has 57,344 kilobytes\r\n(KB) of free DRAM and 8,192 KB dedicated to Packet\r\nmemory. Adding the two numbers together gives you 57,344K\r\n+ 8,192K = 65,536K, or 64 megabytes (MB) of DRAM.\r\nFor more details on memeory requirements, see the document\r\n\"How to Choose a Cisco IOS® Software Release\" on\r\nCisco.com.\r\nConfiguration register is value Shows the current configured hex value of the software\r\nconfiguration register. If the value has been changed with the\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 128 of 155\n\nField Description\r\nFor example:\r\nConfiguration register is 0x2142 (will be\r\n0x2102 at next reload)\r\nconfig-register command, the register value that will be used at\r\nthe next reload is displayed in parenthesis.\r\nThe boot field (final digit) of the software configuration\r\nregister dictates what the system will do after a reset.\r\nFor example, when the boot field of the software configuration\r\nregister is set to 00 (for example, 0x0), and you press the NMI\r\nbutton on a Performance Route Processor (PRP), the user-interface remains at the ROM monitor prompt (rommon\u003e) and\r\nwaits for a user command to boot the system manually. But if\r\nthe boot field is set to 01 (for example, 0x1), the system\r\nautomatically boots the first Cisco IOS image found in the\r\nonboard Flash memory SIMM on the PRP.\r\nThe factory-default setting for the configuration register is\r\n0x2102. This value indicates that the router will attempt to\r\nload a Cisco IOS software image from Flash memory and load\r\nthe startup configuration file.\r\nExamples\r\nThis example shows how to display the configuration of the system hardware, the software version, the names and\r\nsources of configuration files, and the boot images:\r\nRouter# show version\r\nCisco Internetwork Operating System Software\r\nIOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1 (nightly.E020626) NIG\r\nHTLY BUILD\r\nCopyright (c) 1986-2002 by cisco Systems, Inc.\r\nCompiled Wed 26-Jun-02 06:20 by\r\nImage text-base: 0x40008BF0, data-base: 0x419BA000\r\nROM: System Bootstrap, Version 12.1(11r)E1, RELEASE SOFTWARE (fc1)\r\nRouter uptime is 2 weeks, 8 hours, 48 minutes\r\nTime since Router switched to active is 1 minute\r\nSystem returned to ROM by power-on (SP by power-on)\r\nSystem image file is \"sup-bootflash:c6sup22-jsv-mz\"\r\ncisco Catalyst 6000 (R7000) processor with 112640K/18432K bytes of memory.\r\nProcessor board ID SAD06210067\r\nR7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 129 of 155\n\nLast reset from power-on\r\nBridging software.\r\nX.25 software, Version 3.0.0.\r\nSuperLAT software (copyright 1990 by Meridian Technology Corp).\r\nTN3270 Emulation software.\r\n3 Virtual Ethernet/IEEE 802.3 interface(s)\r\n48 FastEthernet/IEEE 802.3 interface(s)\r\n381K bytes of non-volatile configuration memory.\r\n16384K bytes of Flash internal SIMM (Sector size 512K).\r\nConfiguration register is 0x2102\r\nRouter#\r\nThe following table describes the fields that are shown in the example.\r\nTable 13. show version Field Descriptions\r\nField Description\r\nIOS (tm) c6sup2_rp Software\r\n(c6sup2_rp-JSV-M), Version\r\n12.1(nightly.E020626) NIGHTLY\r\nBUILD\r\nVersion number. Always specify the complete version number\r\nwhen reporting a possible software problem. In the example\r\noutput, the version number is 12.1.\r\nROM: System Bootstrap, Version\r\n12.1(11r)E1, RELEASE SOFTWARE\r\n(fc1)\r\nBootstrap version string.\r\nBOOTFLASH: 7200 Software (C7200-\r\nBOOT-M), Version 11.1(472),\r\nRELEASE SOFTWARE\r\nBoot version string.\r\nRouter uptime is Amount of time that the system has been up and running.\r\nTime since Router switched to active Amount of time since switchover occurred.\r\nSystem restarted by Log of how the system was last booted, both as a result of normal\r\nsystem startup and of system error. For example, information can\r\nbe displayed to indicate a bus error that is typically the result of an\r\nattempt to access a nonexistent address, as follows:\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 130 of 155\n\nField Description\r\nSystem restarted by bus error at PC 0xC4CA, address 0x210C0C0\r\nSystem image file is\r\nIf the software was booted over the network, the Internet address\r\nof the boot host is shown. If the software was loaded from\r\nonboard ROM, this line reads “running default software.”\r\ncisco Catalyst 6000 (R7000) processor\r\nwith 112640K/18432K bytes of\r\nmemory.\r\nRemaining output in each display that shows the hardware\r\nconfiguration and any nonstandard software options.\r\nConfiguration register is\r\nConfiguration register contents that are displayed in hexadecimal\r\nnotation.\r\nThe output of the show version EXEC command can provide certain messages, such as bus error messages. If\r\nsuch error messages appear, report the complete text of this message to your technical support specialist.\r\nThis example shows how to display the ELPD version information of a slot:\r\nRouter# show version epld 4\r\n \r\nModule 4 EPLD's:\r\nNumber of EPLD's: 6\r\nEPLD A : 0x5\r\nEPLD B : 0x2\r\nEPLD C : 0x1\r\nEPLD D : 0x1\r\nEPLD E : 0x1\r\nRouter#\r\nExamples\r\nThe following is sample output from the show version command for a Cisco uBR7246 VXR with the cable clock\r\ncard installed:\r\nRouter#\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 131 of 155\n\nCisco Internetwork Operating System Software\r\nIOS (tm) 7200 Software (UBR7200-P-M), Version 12.1(10)EC, RELEASE SOFTWARE\r\nTAC Support: http://www.cisco.com/tac\r\nCopyright (c) 1986-2000 by cisco Systems, Inc.\r\nCompiled Wed 02-Feb-00 16:49 by ccai\r\nImage text-base:0x60008900, data-base:0x61192000\r\nROM:System Bootstrap, Version 12.0(15)SC, RELEASE SOFTWARE\r\nVXR1 uptime is 2 days, 1 hour, 24 minutes\r\nSystem returned to ROM by power-on at 10:54:38 PST Sat Feb 5 2000\r\nSystem restarted at 11:01:08 PST Sat Feb 5 2000\r\nSystem image file is \"slot1:ubr7200-p-mz.121-0.8.T\"\r\ncisco uBR7246VXR (NPE300) processor (revision B) with 122880K/40960K bytes of memory.\r\nProcessor board ID SAB0329005N\r\nR7000 CPU at 262Mhz, Implementation 39, Rev 1.0, 256KB L2, 2048KB L3 Cache\r\n6 slot VXR midplane, Version 2.0\r\nLast reset from power-on\r\nX.25 software, Version 3.0.0.\r\nNational clock card with T1 controller\r\n1 FastEthernet/IEEE 802.3 interface(s)\r\n2 Cable Modem network interface(s)\r\n125K bytes of non-volatile configuration memory.\r\n16384K bytes of Flash PCMCIA card at slot 0 (Sector size 128K).\r\n20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K).\r\n4096K bytes of Flash internal SIMM (Sector size 256K).\r\nConfiguration register is 0x0\r\nRouter#\r\nThe following table describes significant fields shown in these displays.\r\nTable 14. show version Field Descriptions\r\nField Description\r\nIOS (tm) 7200 Software\r\n(UBR7200-P-M), Version\r\nxx.x\r\nAlways specify the complete version number when reporting a possible\r\nsoftware problem. In the example, the version number is Cisco IOS Release\r\n12.1(10)EC.\r\nROM: System Bootstrap Bootstrap version string.\r\nRouter uptime is The amount of time the system has been up and running.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 132 of 155\n\nField Description\r\nSystem restarted at\r\nAlso displayed is a log of how the system was last booted, as a result of\r\nnormal system startup or system error.\r\nSystem image file is\r\nIf the software was booted over the network, the Internet address of the boot\r\nhost is shown. If the software was loaded from onboard ROM, this line\r\nreads “running default software.”\r\ncisco uBR7246VXR\r\n(NPE300) processor\r\nThe remaining output in each display shows the hardware configuration and\r\nany nonstandard software options.\r\nConfiguration register is The configuration register contents, displayed in hexadecimal notation.\r\nThe output of the show version command can also provide certain messages, such as bus error messages. If such\r\nerror messages appear, report the complete text of this message to your technical support specialist.\r\nExamples\r\nThe following example shows sample output from the show version command on a Cisco uBR10012 universal\r\nbroadband router running Cisco IOS Release 12.3(17b)BC4:\r\nRouter\u003e show version\r\nCisco Internetwork Operating System Software\r\nIOS (tm) 10000 Software (UBR10K2-K9P6U2-M), Version 12.3(17b)BC4, RELEASE SOFTWA\r\nRE (fc1)\r\nTechnical Support: http://www.cisco.com/techsupport\r\nCopyright (c) 1986-2006 by cisco Systems, Inc.\r\nCompiled Wed 22-Nov-06 11:41 by tinhuang\r\nImage text-base: 0x60010F0C, data-base: 0x62480000\r\nROM: System Bootstrap, Version 12.0(20020314:211744) [REL-pulsar_sx.ios-rommon 1\r\n12], DEVELOPMENT SOFTWARE\r\nubr10k uptime is 2 days, 22 hours, 13 minutes\r\nSystem returned to ROM by reload at 01:34:58 UTC Sun Jun 8 2008\r\nSystem image file is \"disk0:ubr10k2-k9p6u2-mz.123-17b.BC4\"\r\nLast reload reason: Reload command\r\nThis product contains cryptographic features and is subject to United\r\nStates and local country laws governing import, export, transfer and\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 133 of 155\n\nuse. Delivery of Cisco cryptographic products does not imply\r\nthird-party authority to import, export, distribute or use encryption.\r\nImporters, exporters, distributors and users are responsible for\r\ncompliance with U.S. and local country laws. By using this product you\r\nagree to comply with applicable laws and regulations. If you are unable\r\nto comply with U.S. and local laws, return this product immediately.\r\nA summary of U.S. laws governing Cisco cryptographic products may be found at:\r\nhttp://www.cisco.com/wwl/export/crypto/tool/stqrg.html\r\nIf you require further assistance please contact us by sending email to\r\nexport@cisco.com.\r\ncisco uBR10000 (PRE2-RP) processor with 946175K/98304K bytes of memory.\r\nProcessor board ID TBA05380380\r\nR7000 CPU at 500MHz, Implementation 39, Rev 4.1, 256KB L2, 8192KB L3 Cache\r\nBackplane version 1.1, 8 slot\r\nLast reset from register reset\r\nPXF processor tmc0 is running.\r\nPXF processor tmc1 is running.\r\nPXF processor tmc2 is running.\r\nPXF processor tmc3 is running.\r\n1 TCCplus card(s)\r\n1 FastEthernet/IEEE 802.3 interface(s)\r\n3 Gigabit Ethernet/IEEE 802.3 interface(s)\r\n24 Cable Modem network interface(s)\r\n2045K bytes of non-volatile configuration memory.\r\n125440K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).\r\n125440K bytes of ATA PCMCIA card at slot 1 (Sector size 512 bytes).\r\n65536K bytes of Flash internal SIMM (Sector size 512KB).\r\nSecondary is up.\r\nSecondary has 1044480K bytes of memory.\r\nConfiguration register is 0x2102\r\nExamples\r\nIn Cisco IOS XE Release 2.4\r\nIn the following example, the show version command is responsible for displaying the packages installed, provisi\r\nIn the following example, the command is entered on a Cisco ASR 1000 Series Router in diagnostic mode. Note\r\nthat the output shows what every file that can be found in the consolidated package is or is not currently running\r\n(provisioning file, RP Access, RP Base, RP Control, RP IOS, ESP Base, SIP Base, SIP SPA).\r\nPE23_ASR-1006#\r\nPackage: Provisioning File, version: n/a, status: active\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 134 of 155\n\nFile: consolidated:packages.conf, on: RP0\r\n Built: n/a, by: n/a\r\n File SHA1 checksum: b6cb06b1ed02e041d48644340aa077833cff2076\r\nPackage: rpbase, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-rpbase.02.04.00.122-33.XND.pkg, on: RP0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 093f2c935b9dc4ed136623bc43488c6517b9a4ae\r\nPackage: rpcontrol, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-rpcontrol.02.04.00.122-33.XND.pkg, on: RP0/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: d71e05c824cb889048b3353257bd16129eb72c44\r\nPackage: rpios-advipservicesk9, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-rpios-advipservicesk9.02.04.00.122-33.XND.pkg, on: RP0/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 4167d300514153f67c3815c487c270c14449185d\r\nPackage: rpaccess, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-rpaccess.02.04.00.122-33.XND.pkg, on: RP0/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 0b0d108cd2683570778668697b7ffca2451b78b3\r\nPackage: rpcontrol, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpcontrol.02.04.00.122-33.XND.pkg, on: RP0/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: d71e05c824cb889048b3353257bd16129eb72c44\r\nPackage: rpios-advipservicesk9, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpios-advipservicesk9.02.04.00.122-33.XND.pkg, on: RP0/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 4167d300514153f67c3815c487c270c14449185d\r\nPackage: rpaccess, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpaccess.02.04.00.122-33.XND.pkg, on: RP0/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 0b0d108cd2683570778668697b7ffca2451b78b3\r\nPackage: rpbase, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpbase.02.04.00.122-33.XND.pkg, on: RP1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 093f2c935b9dc4ed136623bc43488c6517b9a4ae\r\nPackage: rpcontrol, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpcontrol.02.04.00.122-33.XND.pkg, on: RP1/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: d71e05c824cb889048b3353257bd16129eb72c44\r\nPackage: rpios-advipservicesk9, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpios-advipservicesk9.02.04.00.122-33.XND.pkg, on: RP1/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 4167d300514153f67c3815c487c270c14449185d\r\nPackage: rpaccess, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpaccess.02.04.00.122-33.XND.pkg, on: RP1/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 0b0d108cd2683570778668697b7ffca2451b78b3\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 135 of 155\n\nPackage: rpcontrol, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpcontrol.02.04.00.122-33.XND.pkg, on: RP1/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: d71e05c824cb889048b3353257bd16129eb72c44\r\nPackage: rpios-advipservicesk9, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpios-advipservicesk9.02.04.00.122-33.XND.pkg, on: RP1/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 4167d300514153f67c3815c487c270c14449185d\r\n \r\nPackage: rpaccess, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-rpaccess.02.04.00.122-33.XND.pkg, on: RP1/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 0b0d108cd2683570778668697b7ffca2451b78b3\r\nPackage: espbase, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-espbase.02.04.00.122-33.XND.pkg, on: ESP0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 3ae9255c7272a30f5dae319dec109acd29d9ae87\r\nPackage: espbase, version: 02.04.00.122-33.XND, status: inactive\r\n File: consolidated:asr1000rp1-espbase.02.04.00.122-33.XND.pkg, on: ESP1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 3ae9255c7272a30f5dae319dec109acd29d9ae87\r\nPackage: sipbase, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-sipbase.02.04.00.122-33.XND.pkg, on: SIP0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: fc6e41d7de2ded3a16b6dc7e5e3a1151b788d254\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP0/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP0/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP0/2\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP0/3\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipbase, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-sipbase.02.04.00.122-33.XND.pkg, on: SIP1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: fc6e41d7de2ded3a16b6dc7e5e3a1151b788d254\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP1/0\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 136 of 155\n\nBuilt: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP1/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: active\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP1/2\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP1/3\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipbase, version: 02.04.00.122-33.XND, status: inactive\r\n File: consolidated:asr1000rp1-sipbase.02.04.00.122-33.XND.pkg, on: SIP2\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: fc6e41d7de2ded3a16b6dc7e5e3a1151b788d254\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP2/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP2/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP2/2\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP2/3\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipbase, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipbase.02.04.00.122-33.XND.pkg, on: SIP3\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: fc6e41d7de2ded3a16b6dc7e5e3a1151b788d254\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP3/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP3/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 137 of 155\n\nFile: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP3/2\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP3/3\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\n \r\nPackage: sipbase, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipbase.02.04.00.122-33.XND.pkg, on: SIP4\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: fc6e41d7de2ded3a16b6dc7e5e3a1151b788d254\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP4/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP4/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP4/2\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP4/3\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipbase, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipbase.02.04.00.122-33.XND.pkg, on: SIP5\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: fc6e41d7de2ded3a16b6dc7e5e3a1151b788d254\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP5/0\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP5/1\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: sipspa, version: 02.04.00.122-33.XND, status: n/a\r\n File: consolidated:asr1000rp1-sipspa.02.04.00.122-33.XND.pkg, on: SIP5/2\r\n Built: 2009-06-29_23.07, by: mcpre\r\n File SHA1 checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nPackage: Sipspa, Version: 02.04.00.122-33.xnd, Status: N/a\r\n File: Consolidated:asr1000rp1-sipspa.02.04.00.122-33.xnd.pkg, On: Sip5/3\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 138 of 155\n\nBuilt: 2009-06-29_23.07, By: Mcpre\r\n File Sha1 Checksum: 24fb5b788582e062c900e2713b5c56a2704ca836\r\nTable 15. show version installed, provisioned, and running Field Descriptions\r\nField Description\r\nPackage: The individual sub-package name.\r\nversion: The consolidated package version of the individual sub-package.\r\nstatus:\r\nReveals if the sub-package is active or inactive for the specific hardware component\r\nonly.\r\nFile: The location and filename of the individual sub-package file.\r\non: The hardware component.\r\nBuilt: The date the individual sub-package was built.\r\nFile SHA1\r\nchecksum:\r\nThe SHA1 sum for the file. This sum can be compared against a SHA1 sum generated\r\nby any SHA1 sum-generating tool.\r\nExamples\r\nThe following is sample output from the show version command on a Cisco Catalyst 3850 Series Switch that is\r\nthe active switch in a 2-member stack:\r\ninfra-p2-3#show version\r\nCisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.09.19.EMP\r\nCopyright (c) 1986-2012 by Cisco Systems, Inc.\r\nCompiled Thu 15-Nov-12 01:45 by udonthi\r\nROM: IOS-XE ROMMON\r\nBOOTLDR: C3850 Boot Loader (C3850-HBOOT-M) Version 1.2, engineering software (D)\r\ninfra-p2-3 uptime is 5 minutes\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 139 of 155\n\nUptime for this control processor is 7 minutes\r\nSystem returned to ROM by reload\r\nSystem image file is \"flash:packages.conf\"\r\nLast reload reason: Reload command\r\nThis product contains cryptographic features and is subject to United\r\nStates and local country laws governing import, export, transfer and\r\nuse. Delivery of Cisco cryptographic products does not imply\r\nthird-party authority to import, export, distribute or use encryption.\r\nImporters, exporters, distributors and users are responsible for\r\ncompliance with U.S. and local country laws. By using this product you\r\nagree to comply with applicable laws and regulations. If you are unable\r\nto comply with U.S. and local laws, return this product immediately.\r\nA summary of U.S. laws governing Cisco cryptographic products may be found at:\r\nhttp://www.cisco.com/wwl/export/crypto/tool/stqrg.html\r\nIf you require further assistance please contact us by sending email to\r\nexport@cisco.com.\r\nLicense Level: Ipservices\r\nLicense Type: Permanent\r\nNext reload license Level: Ipservices\r\ncisco WS-C3850X-24P-PROTO2 (MIPS) processor with 2097152K bytes of physical memory.\r\nProcessor board ID FHH1515P03Y\r\n1 Virtual Ethernet interface\r\n56 Gigabit Ethernet interfaces\r\n8 Ten Gigabit Ethernet interfaces\r\n2048K bytes of non-volatile configuration memory.\r\n2097152K bytes of physical memory.\r\n160618K bytes of Crash Files at crashinfo:.\r\n160618K bytes of Crash Files at crashinfo-1:.\r\n706860K bytes of Flash at flash:.\r\n698827K bytes of Flash at flash-1:.\r\n3915670K bytes of USB Flash at usbflash0:.\r\n0K bytes of Dummy USB Flash at usbflash0-1:.\r\n0K bytes of at webui:.\r\nBase Ethernet MAC Address : 64:00:f1:25:11:00\r\nMotherboard Assembly Number : 73-12240-03\r\nMotherboard Serial Number : FHH15130010\r\nModel Revision Number : 01\r\nMotherboard Revision Number : 02\r\nModel Number : WS-C3850X-24P-PROTO2\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 140 of 155\n\nSystem Serial Number : FHH1515P03Y\r\nSwitch Ports Model SW Version SW Image Mode\r\n------ ----- ----- ---------- ---------- ----\r\n 1 32 WS-C3850X-24P-PROT 03.09.19.EMP cat3k_caa-universalk9 INSTALL\r\n 2 32 WS-C3850X-24P-PROT 03.09.19.EMP cat3k_caa-universalk9 INSTALL\r\nSwitch 01\r\n---------\r\nSwitch uptime : 7 minutes\r\nBase Ethernet MAC Address : 64:00:f1:25:1a:00\r\nMotherboard Assembly Number : 73-12240-03\r\nMotherboard Serial Number : FHH1513000T\r\nModel Revision Number : 01\r\nMotherboard Revision Number : 02\r\nModel Number : WS-C3850X-24P-PROTO2\r\nSystem Serial Number : FHH1515P047\r\nConfiguration register is 0x2 (will be 0x102 at next reload)\r\ninfra-p2-3#\r\nIn the following example, the show version running command is entered on a Cisco Catalyst 3850 Series Switch\r\nto view information about the packages currently running on both switches in a 2-member stack:\r\ninfra-p2-3#show version running\r\nPackage: Base, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-base.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:52:19 PST 2012, by: udonthi\r\nPackage: Drivers, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-drivers.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:54:53 PST 2012, by: udonthi\r\nPackage: Infra, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-infra.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:53:08 PST 2012, by: udonthi\r\nPackage: IOS, version: 150-9.19.EMP, status: active\r\n File: cat3k_caa-iosd-universalk9.SSA.150-9.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:54:09 PST 2012, by: udonthi\r\nPackage: Platform, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-platform.SSA.03.09.19.EMP.pkg, on: Switch1\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 141 of 155\n\nBuilt: Thu Nov 15 01:53:39 PST 2012, by: udonthi\r\nPackage: WCM, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-wcm.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:54:34 PST 2012, by: udonthi\r\nPackage: Base, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-base.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:52:19 PST 2012, by: udonthi\r\nPackage: Drivers, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-drivers.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:54:53 PST 2012, by: udonthi\r\nPackage: Infra, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-infra.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:53:08 PST 2012, by: udonthi\r\nPackage: IOS, version: 150-9.19.EMP, status: active\r\n File: cat3k_caa-iosd-universalk9.SSA.150-9.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:54:09 PST 2012, by: udonthi\r\nPackage: Platform, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-platform.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:53:39 PST 2012, by: udonthi\r\nPackage: WCM, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-wcm.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:54:34 PST 2012, by: udonthi\r\nIn the following example, the show version provisioned and show version committed commands are entered on a\r\nCisco Catalyst 3850 Series Switch that is the active switch in a 2-member stack. The show version committed\r\ncommands displays information about the packages in the committed package set that will be running on the next\r\nreload. The show version provisioned command displays information about the packages in the provisioned\r\npackage set.\r\nIn most cases, the show version provisioned and show version committed output will display the same\r\ninformation, since the provisioned and committed packages sets include the same packages. The provisioned\r\npackage set may differ from the committed package set in cases where a software install operation was performed\r\nwith the auto-rollback command option, and the software commit command has not yet been entered. This is the\r\ncase in the sample output below, where the packages from the 03.09.19.EMP were installed with the auto-rollback\r\ncommand option, but the 'software commit' command has not yet been entered.\r\nThe show version provisioned and show version committed commands are not applicable when the switch is\r\nbooted in bundle mode.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 142 of 155\n\ninfra-p2-3#show version provisioned\r\nPackage: Provisioning File, version: n/a, status: active\r\n File: packages.conf, on: Switch1\r\n Built: n/a, by: n/a\r\nPackage: Base, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-base.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:52:19 PST 2012, by: udonthi\r\nPackage: Infra, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-infra.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:53:08 PST 2012, by: udonthi\r\nPackage: Platform, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-platform.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:53:39 PST 2012, by: udonthi\r\nPackage: IOS, version: 150-9.19.EMP, status: active\r\n File: cat3k_caa-iosd-universalk9.SSA.150-9.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:54:09 PST 2012, by: udonthi\r\nPackage: WCM, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-wcm.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:54:34 PST 2012, by: udonthi\r\nPackage: Drivers, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-drivers.SSA.03.09.19.EMP.pkg, on: Switch1\r\n Built: Thu Nov 15 01:54:53 PST 2012, by: udonthi\r\nPackage: Provisioning File, version: n/a, status: active\r\n File: packages.conf, on: Switch2\r\n Built: n/a, by: n/a\r\nPackage: Base, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-base.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:52:19 PST 2012, by: udonthi\r\nPackage: Infra, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-infra.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:53:08 PST 2012, by: udonthi\r\nPackage: Platform, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-platform.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:53:39 PST 2012, by: udonthi\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 143 of 155\n\nPackage: IOS, version: 150-9.19.EMP, status: active\r\n File: cat3k_caa-iosd-universalk9.SSA.150-9.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:54:09 PST 2012, by: udonthi\r\nPackage: WCM, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-wcm.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:54:34 PST 2012, by: udonthi\r\nPackage: Drivers, version: 03.09.19.EMP, status: active\r\n File: cat3k_caa-drivers.SSA.03.09.19.EMP.pkg, on: Switch2\r\n Built: Thu Nov 15 01:54:53 PST 2012, by: udonthi\r\ninfra-p2-3#show version committed\r\nPackage: Provisioning File, version: n/a, status: active\r\n File: packages.conf, on: Switch1\r\n Built: n/a, by: n/a\r\nPackage: Base, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-base.SSA.03.09.17.EMP.pkg, on: Switch1\r\n Built: Mon Nov 12 20:27:51 PST 2012, by: udonthi\r\nPackage: Infra, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-infra.SSA.03.09.17.EMP.pkg, on: Switch1\r\n Built: Mon Nov 12 20:28:53 PST 2012, by: udonthi\r\nPackage: Platform, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-platform.SSA.03.09.17.EMP.pkg, on: Switch1\r\n Built: Mon Nov 12 20:29:33 PST 2012, by: udonthi\r\nPackage: IOS, version: 150-9.17.EMP, status: active\r\n File: cat3k_caa-iosd-universalk9.SSA.150-9.17.EMP.pkg, on: Switch1\r\n Built: Mon Nov 12 20:29:58 PST 2012, by: udonthi\r\nPackage: WCM, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-wcm.SSA.03.09.17.EMP.pkg, on: Switch1\r\n Built: Mon Nov 12 20:30:29 PST 2012, by: udonthi\r\nPackage: Drivers, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-drivers.SSA.03.09.17.EMP.pkg, on: Switch1\r\n Built: Mon Nov 12 20:31:01 PST 2012, by: udonthi\r\nPackage: Provisioning File, version: n/a, status: active\r\n File: packages.conf, on: Switch2\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 144 of 155\n\nBuilt: n/a, by: n/a\r\nPackage: Base, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-base.SSA.03.09.17.EMP.pkg, on: Switch2\r\n Built: Mon Nov 12 20:27:51 PST 2012, by: udonthi\r\nPackage: Infra, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-infra.SSA.03.09.17.EMP.pkg, on: Switch2\r\n Built: Mon Nov 12 20:28:53 PST 2012, by: udonthi\r\nPackage: Platform, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-platform.SSA.03.09.17.EMP.pkg, on: Switch2\r\n Built: Mon Nov 12 20:29:33 PST 2012, by: udonthi\r\nPackage: IOS, version: 150-9.17.EMP, status: active\r\n File: cat3k_caa-iosd-universalk9.SSA.150-9.17.EMP.pkg, on: Switch2\r\n Built: Mon Nov 12 20:29:58 PST 2012, by: udonthi\r\nPackage: WCM, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-wcm.SSA.03.09.17.EMP.pkg, on: Switch2\r\n Built: Mon Nov 12 20:30:29 PST 2012, by: udonthi\r\nPackage: Drivers, version: 03.09.17.EMP, status: active\r\n File: cat3k_caa-drivers.SSA.03.09.17.EMP.pkg, on: Switch2\r\n Built: Mon Nov 12 20:31:01 PST 2012, by: udonthi\r\ninfra-p2-3#\r\nTable 16. Table 5,Cisco Catalyst 3850 Series Switches and Cisco 5760 Series Wireless Controllers show version\r\nrunning Field Descriptions\r\nField Description\r\nPackage: The individual sub-package name.\r\nversion: The individual sub-package version.\r\nstatus: Reveals if the package is active or inactive for the specific Supervisor module.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 145 of 155\n\nField Description\r\nFile: The filename of the individual package file.\r\non: The slot number of the Active or Standby Supervisor that this package is running on.\r\nBuilt: The date the individual package was built.\r\nExamples\r\nThe following is sample output from the show version command on a Cisco Catalyst 4500e Series Switch running\r\nIOS XE software:\r\nSwitch#show version\r\nCisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software\r\n(cat4500e-UNIVERSALK9-M), Experimental Version 3.1.0.SG\r\n[/nobackup/xxxx/cwab/build/arch_ppc/buildtree-ios/vob/ios/sys 100] Copyright (c)\r\n1986-2010 by Cisco Systems, Inc.\r\nCompiled Mon 19-Apr-10 09:19 by xxxx\r\nCisco IOS-XE software, Copyright (c) 2005-2010 by cisco Systems, Inc.\r\nAll rights reserved. Certain components of Cisco IOS-XE software are licensed under the\r\nGNU General Public License (\"GPL\") Version 2.0. The software code licensed under GPL\r\nVersion 2.0 is free software that comes with ABSOLUTELY NO WARRANTY. You can redistribute\r\nand/or modify such GPL code under the terms of GPL Version 2.0. For more details, see\r\nthe documentation or \"License Notice\" file accompanying the IOS-XE software, or the\r\napplicable URL provided on the flyer accompanying the IOS-XE software.\r\nImage text-base: 0x100D9954, data-base: 0x14B379D8\r\nROM: 12.2(54r)XO(0.246)\r\nJawa Revision 7, Snowtrooper Revision 0x0.0x14\r\ngsgsw-g9-35 uptime is 4 minutes\r\nUptime for this control processor is 5 minutes System returned to ROM by reload System\r\nimage file is \"tftp://1.2.3.4/tftpboot/xxxx/x.bin\"\r\nThis product contains cryptographic features and is subject to United States and local\r\ncountry laws governing import, export, transfer and use. Delivery of Cisco cryptographic\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 146 of 155\n\nproducts does not imply third-party authority to import, export, distribute or use\r\nencryption.\r\nImporters, exporters, distributors and users are responsible for compliance with U.S. and\r\nlocal country laws. By using this product you agree to comply with applicable laws and\r\nregulations. If you are unable to comply with U.S. and local laws, return this product\r\nimmediately.\r\nA summary of U.S. laws governing Cisco cryptographic products may be found at:\r\nhttp://www.cisco.com/wwl/export/crypto/tool/stqrg.html\r\nIf you require further assistance please contact us by sending email to export@cisco.com.\r\nLicense Information for 'iosd'\r\n License Level: entservices Type: Evaluation\r\n Next reboot license Level: entservices\r\ncisco WS-C4510R-E (MPC8572) processor (revision 2) with 786516K/16384K bytes of memory.\r\nProcessor board ID SPE1046002Q\r\nMPC8572 CPU at 1.5GHz, Supervisor 7\r\nLast reset from Reload\r\n1 Virtual Ethernet interface\r\n84 Gigabit Ethernet interfaces\r\n14 Ten Gigabit Ethernet interfaces\r\nConfiguration register is 0x920\r\nSwitch#\r\nIn the following example, the show version running command is entered on a Cisco Catalyst 4500e Series Switch\r\nto view the list of packages contained in the IOS XE software bundle currently loaded on the system.\r\nSwitch# show version running\r\nPackage: Base, version: 3.0.0, status: active\r\n30\r\n File: cat4500e-base.SSA.3.0.0.pkg, on: Slot5\r\n From Bundle: cat4500e-universalk9.SSA.3.1.0.SG\r\n Built: Mon Apr 19 10:08:38 PDT 2010, by: xxxx\r\nPackage: Infra, version: 3.0.0, status: active\r\n File: cat4500e-infra.SSA.3.0.0.pkg, on: Slot5\r\n From Bundle: cat4500e-universalk9.SSA.3.1.0.SG\r\n Built: Mon Apr 19 10:09:30 PDT 2010, by: xxxx\r\nPackage: IOS, version: 150-1.XO, status: active\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 147 of 155\n\nFile: cat4500e-universalk9.SSA.150-1.XO.pkg, on: Slot5\r\n From Bundle: cat4500e-universalk9.SSA.3.1.0.SG\r\n Built: Mon Apr 19 10:10:02 PDT 2010, by: xxxx\r\nPackage: Base, version: 3.0.0, status: active\r\n File: cat4500e-base.SSA.3.0.0.pkg, on: Slot6\r\n From Bundle: cat4500e-universalk9.SSA.3.1.0.SG\r\n Built: Mon Apr 19 10:08:38 PDT 2010, by: xxxx\r\nPackage: Infra, version: 3.0.0, status: active\r\n File: cat4500e-infra.SSA.3.0.0.pkg, on: Slot6\r\n From Bundle: cat4500e-universalk9.SSA.3.1.0.SG\r\n Built: Mon Apr 19 10:09:30 PDT 2010, by: xxxx\r\nPackage: IOS, version: 150-1.XO, status: active\r\n File: cat4500e-universalk9.SSA.150-1.XO.pkg, on: Slot6\r\n From Bundle: cat4500e-universalk9.SSA.3.1.0.SG\r\n Built: Mon Apr 19 10:10:02 PDT 2010, by: xxxx\r\n Switch#\r\nTable 17. Table 6,Cisco Catalyst 4500e Series Switches show version running Field Descriptions\r\nField Description\r\nPackage: The individual sub-package name.\r\nversion: The individual sub-package version.\r\nstatus: Reveals if the package is active or inactive for the specific Supervisor module.\r\nFile: The filename of the individual package file.\r\non: The slot number of the Active or Standby Supervisor that this package is running on.\r\nFrom Bundle: The name of the IOS XE software bundle that includes this package.\r\nBuilt: The date the individual package was built.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 148 of 155\n\nRelated Commands\r\nCommand Description\r\nshow diag\r\nDisplays hardware and diagnostic information for a networking device, a line card, a\r\nprocessor, a jacket card, a chassis, or a network module.\r\nshow\r\ninventory\r\nDisplays the Cisco Unique Device Identifier information, including the Product ID, the\r\nVersion ID, and the Serial Number, for the hardware device and hardware components.\r\nshow warm-reboot\r\nTo display the statistics for attempted warm reboots, use the show warm-reboot command in privileged EXEC\r\nmode.\r\nshow warm-reboot\r\nSyntax Description\r\nThis command has no arguments or keywords.\r\nCommand Modes\r\nPrivileged EXEC\r\nCommand History\r\nRelease Modification\r\n12.3(2)T This command was introduced.\r\n12.2(18)S This command was integrated into Cisco IOS Relase 12.2(18)S.\r\n12.2(28)SB This command was integrated into Cisco IOS Relase 12.2(28)SB.\r\nUsage Guidelines\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 149 of 155\n\nUse the show warm-reboot command to see if warm rebooting is enabled, and, if so, how many warm reloads\r\nhave occurred and how much space in kilobytes (KB) is consumed by warm-reboot storage, which is the RAM\r\narea used to store the data segment that enables warm reloading to function.\r\nExamples\r\nThe following example is sample output from the show warm-reboot command:\r\nRouter# show warm-reboot\r\nWarm Reboot is enabled\r\nStatistics:\r\n10 warm reboots have taken place since the last cold reboot\r\nXXX KB taken up by warm reboot storage\r\nRelated Commands\r\nCommand Description\r\nwarm-reboot Enables a router to warm-reboot.\r\nshow wiretap\r\nTo display the intercept status, use the show wiretap command in privileged EXEC mode.\r\nshow wiretap [id [stream-id] | idbs]\r\nSyntax Description\r\nid (Optional) CCC ID number. The CCC ID value range is from 1 to 2147483647.\r\nstream-id\r\n(Optional) The ID value range is from 1to 2147483647.\r\nidbs\r\n(Optional) Displays the Interface Descriptive Block (IDB) to which the Access Control List\r\n(ACL) is applied.\r\nCommand Default\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 150 of 155\n\nIf the id is not specified , information for all wiretap configurations and IDBs is displayed.\r\nCommand Modes\r\nPrivileged EXEC (#)\r\nCommand History\r\nRelease Modification\r\n15.0(1)M\r\nThis command was introduced in a release earlier than Cisco IOS\r\nRelease 15.0(1)M.\r\n12.2 (33)SXI\r\nThis command was integrated into a release earlier than Cisco IOS\r\nRelease 12.2(33)SXI.\r\nUsage Guidelines\r\nUse the show wiretap command to display the intercept status.\r\nExamples\r\nThe following is sample output from the show wiretap command. The field descriptions are self-explanatory.\r\nRouter# show wiretap\r\nMediation Device 0x00000001\r\n TTl = 3130\r\n Time left = 3127 minutes\r\n MD IP Address = 6.6.6.12\r\n MD SNMP IF index = 0\r\n MD HW IF index = 0\r\n MD Source IP address = 6.6.6.14\r\n MD UDP port = 7777\r\n DSCP value = af41\r\n Platform data = 0x00000000\r\n Stream count = 1\r\n Streams associated with MD\r\n Generic stream 0x00000002\r\n Status = 1\r\n Packets intercepted = 0\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 151 of 155\n\nPackets dropped = 0\r\n Type = Session\r\n Index 0x00000002\r\n Acnt ID 0x00000001\r\n SNMP provisioned intercept\r\n Status 0\r\nshow whoami\r\nTo display information about the terminal line of the current user, including host name, line number, line speed,\r\nand location, use the show whoami command in EXEC mode.\r\nshow whoami [text]\r\nSyntax Description\r\ntext (Optional) Additional data to print to the screen.\r\nCommand Modes\r\nEXEC\r\nCommand History\r\nRelease Modification\r\n10.0 This command was introduced.\r\n12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.\r\nUsage Guidelines\r\nIf text is included as an argument in the command, that text is displayed as part of the additional data about the\r\nline.\r\nTo prevent the information from being lost if the menu display clears the screen, this command always displays a -\r\n-More-- prompt before returning. Press the space bar to return to the prompt.\r\nExamples\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 152 of 155\n\nThe following example is sample output from the show whoami command:\r\nRouter\u003e show whoami\r\nComm Server \"Router\", Line 0 at 0bps. Location \"Second floor, West\"\r\n--More--\r\nRouter\u003e\r\nshowmon\r\nTo show both the ReadOnly and the Upgrade ROMmon image versions when you are in ROMmon mode, as well\r\nas which ROMmon image is running on the Cisco 7200 VXR or Cisco 7301 router, use the showmon command in\r\nROM monitor mode.\r\nshowmon\r\nSyntax Description\r\nThis command has no arguments or keywords.\r\nCommand Default\r\nNo default behavior or values\r\nCommand Modes\r\nROM monitor mode\r\nCommand History\r\nRelease Modification\r\n12.0(28)S\r\nThis command was introduced on the Cisco 7200 VXR router. It was introduced in ROMmon\r\nversion 12.3(4r)T1 for the Cisco 7200 VXR router.\r\n12.3(8)T\r\nThis command was integrated into Cisco IOS Release 12.3(8)T and supported on the Cisco 7200\r\nVXR router and Cisco 7301 router. It was introduced in ROMmon version 12.3(4r)T2 for the\r\nCisco 7301 router.\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 153 of 155\n\nRelease Modification\r\n12.3(9)\r\nThis command was integrated into Cisco IOS Release 12.3(9) and supported on the Cisco 7200\r\nVXR router and Cisco 7301 router.\r\nUsage Guidelines\r\nUse the showmon command when you are in ROM monitor mode. Use the show rom-monitor command when\r\nyou are in Cisco IOS.\r\nExamples\r\nThe following example, applicable to both the Cisco 7200 VXR and Cisco 7301 routers, uses the showmon\r\ncommand in ROMmon to display both ROMmon images and to verify that the Upgrade ROMmon image is\r\nrunning:\r\nrommon 1 \u003e showmon\r\nReadOnly ROMMON version is:\r\nSystem Bootstrap, Version 12.2(20031011:151758) [biff]\r\nCopyright (c) 2004 by Cisco Systems, Inc.\r\nUpgrade ROMMON version is:\r\nSystem Bootstrap, Version 12.2(20031011:151758) [biff]\r\nCopyright (c) 2004 by Cisco Systems, Inc.\r\nUpgrade ROMMON currently running\r\nUpgrade ROMMON is selected for next boot\r\nrommon 2 \u003e\r\nRelated Commands\r\nCommand Description\r\nrommon-prefSelects a ReadOnly or Upgrade ROMmon image to be booted on the next reload of a Cisco\r\n7200 VXR or Cisco 7301 when you are in ROMmon.\r\nBack to Top\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 154 of 155\n\nSource: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html\r\n#wp2760878733\r\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733\r\nPage 155 of 155\n\nshow sup-bootflash -#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name\n1 .. image EBC8FC4D A7487C 6 10700796 Nov 19 1999 07:07:37 halley\n2 .. unknown C7EB077D EE2620 25 4644130 Nov 19 1999 07:50:44 cat6000-sup_\n5-3-3-CSX.bin    \n645600 bytes available (15345184 bytes used)  \nRouter#    \nThis example shows how to display all bootflash information: \nRouter#    \nshow sup-bootflash all   \n-#-ED--type-- --crc----seek-- nlen-length- -----date/time------ name\n1 .. image EBC8FC4D A7487C 6 10700796 Nov 19 1999 07:07:37 halley\n2 .. unknown C7EB077D EE2620 25 4644130 Nov 19 1999 07:50:44 cat6000-sup_\n5-3-3-CSX.bin    \n   Page 84 of 155\n\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733   \ninfra-p2-3#show version provisioned  \nPackage: Provisioning File, version: n/a, status: active\nFile: packages.conf, on: Switch1  \nBuilt: n/a, by: n/a  \nPackage: Base, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-base.SSA.03.09.19.EMP.pkg,   on: Switch1\nBuilt: Thu Nov 15 01:52:19 PST 2012, by: udonthi \nPackage: Infra, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-infra.SSA.03.09.19.EMP.pkg,   on: Switch1\nBuilt: Thu Nov 15 01:53:08 PST 2012, by: udonthi \nPackage: Platform, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-platform.SSA.03.09.19.EMP.pkg,   on: Switch1\nBuilt: Thu Nov 15 01:53:39 PST 2012, by: udonthi \nPackage: IOS, version: 150-9.19.EMP, status: active\nFile: cat3k_caa-iosd-universalk9.SSA.150-9.19.EMP.pkg,   on: Switch1\nBuilt: Thu Nov 15 01:54:09 PST 2012, by: udonthi \nPackage: WCM, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-wcm.SSA.03.09.19.EMP.pkg,  on: Switch1\nBuilt: Thu Nov 15 01:54:34 PST 2012, by: udonthi \nPackage: Drivers, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-drivers.SSA.03.09.19.EMP.pkg,   on: Switch1\nBuilt: Thu Nov 15 01:54:53 PST 2012, by: udonthi \nPackage: Provisioning File, version: n/a, status: active\nFile: packages.conf, on: Switch2  \nBuilt: n/a, by: n/a  \nPackage: Base, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-base.SSA.03.09.19.EMP.pkg,   on: Switch2\nBuilt: Thu Nov 15 01:52:19 PST 2012, by: udonthi \nPackage: Infra, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-infra.SSA.03.09.19.EMP.pkg,   on: Switch2\nBuilt: Thu Nov 15 01:53:08 PST 2012, by: udonthi \nPackage: Platform, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-platform.SSA.03.09.19.EMP.pkg,   on: Switch2\nBuilt: Thu Nov 15 01:53:39 PST 2012, by: udonthi \n   Page 143 of 155\n\nhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733   \nPackage: IOS, version: 150-9.19.EMP, status: active \nFile: cat3k_caa-iosd-universalk9.SSA.150-9.19.EMP.pkg,   on: Switch2\nBuilt: Thu Nov 15 01:54:09 PST 2012, by: udonthi \nPackage: WCM, version: 03.09.19.EMP, status: active \nFile: cat3k_caa-wcm.SSA.03.09.19.EMP.pkg,  on: Switch2\nBuilt: Thu Nov 15 01:54:34 PST 2012, by: udonthi \nPackage: Drivers, version: 03.09.19.EMP, status: active\nFile: cat3k_caa-drivers.SSA.03.09.19.EMP.pkg,   on: Switch2\nBuilt: Thu Nov 15 01:54:53 PST 2012, by: udonthi \ninfra-p2-3#show version committed  \nPackage: Provisioning File, version: n/a, status: active\nFile: packages.conf, on: Switch1  \nBuilt: n/a, by: n/a  \nPackage: Base, version: 03.09.17.EMP, status: active\nFile: cat3k_caa-base.SSA.03.09.17.EMP.pkg,  on: Switch1\nBuilt: Mon Nov 12 20:27:51 PST 2012, by: udonthi \nPackage: Infra, version: 03.09.17.EMP, status: active\nFile: cat3k_caa-infra.SSA.03.09.17.EMP.pkg,   on: Switch1\nBuilt: Mon Nov 12 20:28:53 PST 2012, by: udonthi \nPackage: Platform, version: 03.09.17.EMP, status: active\nFile: cat3k_caa-platform.SSA.03.09.17.EMP.pkg,   on: Switch1\nBuilt: Mon Nov 12 20:29:33 PST 2012, by: udonthi \nPackage: IOS, version: 150-9.17.EMP, status: active \nFile: cat3k_caa-iosd-universalk9.SSA.150-9.17.EMP.pkg,   on: Switch1\nBuilt: Mon Nov 12 20:29:58 PST 2012, by: udonthi \nPackage: WCM, version: 03.09.17.EMP, status: active \nFile: cat3k_caa-wcm.SSA.03.09.17.EMP.pkg,  on: Switch1\nBuilt: Mon Nov 12 20:30:29 PST 2012, by: udonthi \nPackage: Drivers, version: 03.09.17.EMP, status: active\nFile: cat3k_caa-drivers.SSA.03.09.17.EMP.pkg,   on: Switch1\nBuilt: Mon Nov 12 20:31:01 PST 2012, by: udonthi \nPackage: Provisioning File, version: n/a, status: active\nFile: packages.conf, on: Switch2  \n   Page 144 of 155",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733"
	],
	"report_names": [
		"show_protocols_through_showmon.html#wp2760878733"
	],
	"threat_actors": [
		{
			"id": "2864e40a-f233-4618-ac61-b03760a41cbb",
			"created_at": "2023-12-01T02:02:34.272108Z",
			"updated_at": "2026-04-10T02:00:04.97558Z",
			"deleted_at": null,
			"main_name": "WildCard",
			"aliases": [],
			"source_name": "ETDA:WildCard",
			"tools": [
				"RustDown",
				"SysJoker"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "f9806b99-e392-46f1-9c13-885e376b239f",
			"created_at": "2023-01-06T13:46:39.431871Z",
			"updated_at": "2026-04-10T02:00:03.325163Z",
			"deleted_at": null,
			"main_name": "Watchdog",
			"aliases": [
				"Thief Libra"
			],
			"source_name": "MISPGALAXY:Watchdog",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "256a6a2d-e8a2-4497-b399-628a7fad4b3e",
			"created_at": "2023-11-30T02:00:07.299845Z",
			"updated_at": "2026-04-10T02:00:03.484788Z",
			"deleted_at": null,
			"main_name": "WildCard",
			"aliases": [],
			"source_name": "MISPGALAXY:WildCard",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434499,
	"ts_updated_at": 1775792121,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/5dacd89b28259d61f8c320930f0f88602f21f000.pdf",
		"text": "https://archive.orkl.eu/5dacd89b28259d61f8c320930f0f88602f21f000.txt",
		"img": "https://archive.orkl.eu/5dacd89b28259d61f8c320930f0f88602f21f000.jpg"
	}
}