{"id":1399,"date":"2022-02-15T02:52:00","date_gmt":"2022-02-15T10:52:00","guid":{"rendered":"https:\/\/jmcristobal.com\/?p=1399"},"modified":"2022-02-14T18:44:06","modified_gmt":"2022-02-15T02:44:06","slug":"cisco-ios-commands","status":"publish","type":"post","link":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2022\/02\/15\/cisco-ios-commands\/","title":{"rendered":"Cisco IOS commands"},"content":{"rendered":"<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Commands Used to Monitor and Manipulate the CAM Table Task<\/span><\/strong><br><br>Display all MAC addresses learned on a specific interface<br>Switch# show mac address-table dynamic interface type number<\/p>\n\n\n\n<p>Display the current CAM table size<br>Switch# show mac address-table count<\/p>\n\n\n\n<p>Enter a static CAM table entry<br>Switch(config)# mac address-table static mac-address vlan vlan-id { drop | interface type number}<\/p>\n\n\n\n<p>Clear a CAM entry<br>Switch# clear mac address-table dynamic [ address mac-address | interface type number | vlan vlan-id ]\n\n\n\n<p>Display TCAM utilization<br>Switch# show platform tcam utilization<\/p>\n\n\n\n<p>Display the current memory template<br>Switch# show sdm prefer<\/p>\n\n\n\n<p>Configure a preferred memory template<br>Switch()# sdm prefer template<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Switch Port Configuration Commands<\/span><\/strong><\/p>\n\n\n\n<p>Select a port.<br>Switch(config)# interface type member\/module\/number<\/p>\n\n\n\n<p>Select multiple ports.<br>Switch(config)# interface range type member\/module\/number[, type member\/module\/number \u2026]<br>or<br>Switch(config)# interface range type member\/module\/first-number \u2013 last-number<\/p>\n\n\n\n<p>Define an interface macro.<br>Switch(config)# define interface-range macro-name type member\/module\/number[, type member\/module\/number\u2026] [ type member\/module\/first-number \u2013 lastnumber] [\u2026]\n\n\n\n<p>Switch(config)# interface range macro macro-na me<\/p>\n\n\n\n<p>Identify port.<br>Switch(config-if)# description description-string<\/p>\n\n\n\n<p>Set port speed.<br>Switch(config-if)# speed {10 | 100 | 1000 | auto}<\/p>\n\n\n\n<p>Set port mode.<br>Switch(config-if)# duplex {auto | full | half}<\/p>\n\n\n\n<p>Detect port error conditions.<br>Switch(config-if)# errdisable detect cause [all| causename]\n\n\n\n<p>Automatically recover from errdisable.<br>Switch(config-if)# errdisable recovery cause [ all| causename]<br>Switch(config-if)# errdisable recovery interval seconds<\/p>\n\n\n\n<p>Manually recover from errdisable.<br>Switch(config-if)# shutdown<br>Switch(config-if)# no shutdown<\/p>\n\n\n\n<p>Display ports in errdisable state<br>Switch(config)# show interface status err-diablead<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Neighbor Discovery Commands<\/span><\/strong><\/p>\n\n\n\n<p>Display CDP neighbor information.<br>Switch# show cdp neighbors [ type member\/module\/number] [detail]\n\n\n\n<p>Control CDP operation globally.<br>Switch(config)# [no] cdp run<\/p>\n\n\n\n<p>Control CDP operation on an interface.<br>Switch(config-if)# [ no] cdp enable<\/p>\n\n\n\n<p>Display LLDP neighbor information.<br>Switch(config)# show lldp neighbors [ type member\/module\/number] [ detail]\n\n\n\n<p>Control LLDP operation globally.<br>Switch(config)# [ no] lldp run<\/p>\n\n\n\n<p>Control LLDP operation on an interface.<br>Switch(config-if)# [ no] lldp { receive | Transmit}<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Power over Ethernet Commands<\/span><\/strong><\/p>\n\n\n\n<p>Set PoE behavior.<br>Switch(config-if)# power inline { auto | static} [max milliwatts]\n\n\n\n<p>Disable PoE on a switch port<br>Switch(config-if)# power inline never<\/p>\n\n\n\n<p>Display PoE status.<br>Switch# show power inline [ type member\/mod\/num] [detail]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">VLAN and Trunking Configuration Commands<\/span><\/strong><br><br>Create VLAN.<br>Switch(config)# vlan vlan-num<br>Switch(config-vlan)# name vlan-nameAssign port to VLAN.<br>Switch(config)# interface type member\/module\/number<br>Switch(config-if)# switchport mode access<br>Switch(config-if)# switchport access vlan vlan-num<\/p>\n\n\n\n<p><br>Configure trunk.<br>Switch(config)# interface type member\/module\/number<br>Switch(config-if)# switchport trunk encapsulation {isl | dot1q | negotiate }<br>Switch(config-if)# switchport trunk native vlan vlan-id<br>Switch(config-if)# switchport trunk allowed vlan { vlan-list | all | {add | except | remove} vlan-list }<br>Switch(config-if)# switchport mode {trunk | dynamic {desirable | auto }}<\/p>\n\n\n\n<p><br>Define the trunking on a port to a Cisco IP phone.<br>Switch(config-if)# switchport voice vlan { vlan-id | dot1p | untagged | none }<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">VLAN and Trunking Troubleshooting<\/span><\/strong><br><br>Verify VLAN configuration.<br>Switch# show vlan id vlan-id<br>Switch# show vlan [ brief ]\n\n\n\n<p>Verify active trunk parameters.<br>Switch# show interface type member\/module\/number trunk<\/p>\n\n\n\n<p>Compare trunk configuration and active parameters.<br>Switch# show interface type member\/module\/number switchport<\/p>\n\n\n\n<p>Verify DTP operation.<br>Switch# show dtp [ interface type member\/module\/nombre]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">VTP Configuration Commands<\/span><\/strong><br><br>Define the VTP domain.<br>Switch(config)# vtp domain domain-nameSet the VTP mode.<br>Switch(config)# vtp mode { server | client | transparent | off }<\/p>\n\n\n\n<p>Define an optional VTP password.<br>Switch(config)# vtp password password [ hidden | secret ]\n\n\n\n<p>Configure VTP version. <br>Switch(config)# vtp version { 1 | 2 | 3 }<\/p>\n\n\n\n<p>Enable VTP pruning.<br>Switch(config)# vtp pruning<\/p>\n\n\n\n<p>Select VLANs eligible for pruning on a trunk interface.<br>Switch(config)# interface type member\/ module\/number<br>Switch(config-if)# switchport trunk pruning vlan { add | except | none | remove } vlan-list<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">STP Configuration Commands<\/span><\/strong><br><br>Enable STP.<br>Switch(config)# spanning-tree vlan-id<br><br>Set bridge priority.<br>Switch(config)# spanning-tree vlan vlan-id priority bridge-priority<br><br>Set root bridge (macro).<br>Switch(config)# spanning-tree vlan vlan-id root { primary | secondary } [ diameter diameter ]<br><br>Set port cost.<br>Switch(config-if)# spanning-tree [ vlan vlan-id ] cost cost<br><br>Set port priority.<br>Switch(config-if)# spanning-tree [ vlan vlan-id ] port-priority port-priority<br><br>Set STP timers.<br>Switch(config)# spanning-tree [ vlan vlan-id ] hello-time seconds<br>Switch(config)# spanning-tree [ vlan vlan-id ] forward-time seconds<br>Switch(config)# spanning-tree [ vlan vlan-id ] max-age seconds<br><br>Set PortFast on an interface.<br>Switch(config-if)# spanning-tree portfast<br><br>Set UplinkFast on a switch.<br>Switch(config)# spanning-tree uplinkfast [ max-update-rate pkts-per-second ]<br><br>Set BackboneFast on a switch.<br>Switch(config)# spanning-tree backbonefast<\/p>\n\n\n\n<p><br><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">STP Protection Configuration Commands<\/span><\/strong><br><br>Enable Root Guard. \u2014<br>Switch(config-if)# spanningtree guarda root<br><br>Enable BPDU Guard.<br>Switch(config)# spanning-tree portfast bpduguard default<br>Switch(config-if )# spanningtree bpduguard enable<\/p>\n\n\n\n<p>Enable Loop Guard.<br>Switch(config)# spanning-tree loopguard default<br>Switch(config-if)# spanningtree guard loop<\/p>\n\n\n\n<p>Enable UDLD.<br>Switch(config)# udld {enable | aggressive | message time seconds}<br>Switch(config-if)# udld {enable | aggressive | disable}<\/p>\n\n\n\n<p>Enable BPDU filtering.<br>Switch(config)# spanning-tree bpdufilter default<br>Switch(config-if)# spanningtree bpdufilter enable<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">STP Protection Activity Commands<\/span><\/strong><\/p>\n\n\n\n<p>Look for ports that have been put in an inconsistent state.<br>Switch# show spanning-tree inconsistentports<\/p>\n\n\n\n<p>Display the global BPDU Guard, BPDU filter, and Loop Guard states.<br>Switch# show spanning-tree summary<\/p>\n\n\n\n<p>Show UDLD status.<br>Switch# show udld [ type mod\/num ]\n\n\n\n<p>Reenable all ports that UDLD has errdisabled.<br>Switch# udld reset<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">RSTP Configuration<\/span><\/strong><br><br>Define an edge port.<br>Switch(config-if)# spanning-tree portfast<br><br>Override a port type.<br>Switch(config-if)# spanning-tree link-type point-to-point<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">MST Region Configuration Commands<\/span><\/strong><br><br>Enable MST on a switch.<br>Switch(config)# spanning-tree mode mst<\/p>\n\n\n\n<p>Enter MST configuration mode.<br>Switch(config)# spanning-tree mst configuration<\/p>\n\n\n\n<p>Name the MST region.<br>Switch(config-mst)# name name<\/p>\n\n\n\n<p>Set the configuration revision number.<br>Switch(config-mst)# revision version<br><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">EtherChannel Configuration Commands Task<\/span><\/strong><br><br>Select a load-balancing method for the switch.<br>port-channel load-balance method<\/p>\n\n\n\n<p>Use a PAgP mode on an interface.<br>channel-protocol PAgP<br>channel-group number mode { on | {{ auto | desirable } [ non-silent ]}}<\/p>\n\n\n\n<p>Assign the LACP system priority.<br>lacp system-priority priority<\/p>\n\n\n\n<p>Use an LACP mode on an interface.<br>channel-protocol LACP<br>channel-group number mode { on | passive | active }<br>lacp port-priority priority<\/p>\n\n\n\n<p>Configure EtherChannel Guard<br>[ no ] spanning-tree etherchannel guard misconfig<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Inter-VLAN Routing Configuration Commands<\/span><\/strong><br><br>Put a port into Layer 2 mode.<br>Switch(config-if)# switchport<\/p>\n\n\n\n<p>Put a port into Layer 3 mode.<br>Switch(config-if)# no switchport<\/p>\n\n\n\n<p>Define an SVI. <br>Switch(config)# interface vlan vlan-id<\/p>\n\n\n\n<p><span class=\"has-inline-color has-vivid-cyan-blue-color\"><strong>Multilayer Switching Verification Commands<\/strong><\/span><br><br>Show a Layer 2 port status.<br>Switch# show interface type member\/ module\/number switchport<\/p>\n\n\n\n<p>Show a Layer 3 port status.<br>Switch# show interface type member\/ module\/number<\/p>\n\n\n\n<p>Show an SVI status.<br>Switch# show interface vlan vlan-id<\/p>\n\n\n\n<p>View the FIB contents.<br>Switch# show ip cef<\/p>\n\n\n\n<p>View FIB information for an interface.<br>Switch# show ip cef [ type member\/ module\/number | vlan vlan-id ] [ detail ]\n\n\n\n<p>View FIB information for an IP prefix.<br>Switch# show ip cef [ prefix-ip prefixmask ] [ longer-prefixes ] [ detail ]\n\n\n\n<p>View FIB adjacency information.<br>Switch# show adjacency [ type member\/ module\/number | vlan vlan-id ] [ summary | detail ]\n\n\n\n<p>View counters for packets not switched by CEF.<br>Switch# show cef not-cef-switched<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">DHCP Commands Related to IPv4<\/span><\/strong><br><br>Exclude addresses from a DHCP server scope.<br>Switch(config-if)# ip dhcp excluded-address start-ip end-ip<br><br>Define a DHCP server scope.<br>Switch(config-if)# ip dhcp pool pool-name<\/p>\n\n\n\n<p>Identify the IP subnet for the server scope.<br>Switch(config-dhcp)# network ip-address subnet-mask<\/p>\n\n\n\n<p>Identify the default router used in the server scope.<br>Switch(config-dhcp)# default-router ip-address [ ip-address2 ] [ ip-address3 ] \u2026<\/p>\n\n\n\n<p>Define the DHCP server lease time.<br>Switch(config-dhcp )# lease {infinite | { days [hours [ minutes ]]}}<\/p>\n\n\n\n<p>Define a DHCP option.<br>Switch(dhcp-config)# option option-num value<\/p>\n\n\n\n<p>Configure a manual DHCP binding.<br>Switch(config)# ip dhcp pool pool-name<br>Switch(dhcp-config)# host ip-address mask<br>Switch(dhcp-config)# client-identifier identifier<br>Switch(dhcp-config)# exit<\/p>\n\n\n\n<p>Enable DHCP relay on a Layer 3 interface.<br>Switch(config-if)# ip helper-address ip-address<\/p>\n\n\n\n<p>Display current DHCP bindings.<br>Switch# show ip dhcp binding<\/p>\n\n\n\n<p>Manually clear a DHCP binding.<br>Switch# clear ip dhcp binding { * | ip-address }<\/p>\n\n\n\n<p>DHCP Commands Related to IPv6<br>Define an IPv6 address prefix on a Layer 3 interface.<br>Switch(config)# interface type member\/module\/number<br>Switch(config-if)# ipv6 address ipv6-prefix<\/p>\n\n\n\n<p>Define a DHCPv6 pool.<br>Switch(config)# ipv6 dhcp pool pool-name<br>Switch(config-dhcpv6)# address prefix ipv6-prefix<br>Switch(config-dhcpv6)# dns-server dns-address<br>Switch(config-dhcpv6)# domain-name name<\/p>\n\n\n\n<p>Bind a DHCPv6 pool to a Layer 3 interface.<br>Switch(config)# interface type member\/module\/number<br>Switch(config-if)# ipv6 address ipv6-address<br>Switch(config-if)# ipv6 dhcp server pool-name<\/p>\n\n\n\n<p>Enable DHCPv6 Lite options.<br>Switch(config-if)# ipv6 nd other-config-Flag<\/p>\n\n\n\n<p>Enable DHCPv6 relay on a Layer 3 interface.<br>Switch(config-if)# ipv6 dhcp relay destination ipv6- address<\/p>\n\n\n\n<p>Manually clear a DHCPv6 binding.<br>Switch# clear ipv6 dhcp binding { * | ipv6-address }<\/p>\n\n\n\n<p>Display a summary of DHCPv6 pool activity.<br>Switch# show ipv6 dhcp pool<\/p>\n\n\n\n<p>Display current DHCPv6 bindings.<br>Switch# show ipv6 dhcp binding [ ipv6-address ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Switch Logging Configuration Commands<\/span><\/strong><\/p>\n\n\n\n<p>Log to the console port.<br>Switch(config)# logging console severity<\/p>\n\n\n\n<p>Log to a buffer.<br>Switch(config)# logging buffered severity <br>Switch(config)# logging buffered size<\/p>\n\n\n\n<p>Display the logging buffer.<br>Switch# show logging<\/p>\n\n\n\n<p>Log to a syslog server.<br>Switch(config)# logging host<br>Switch(config)# logging trap severity<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Time Clock Configuration Commands<\/span><\/strong><\/p>\n\n\n\n<p>Display the clock. <br>Switch# show clock [detail]\n\n\n\n<p>Set the local time zone.<br>Switch(config)# clock timezone name offset-hours [ offsetminutes ]<br>Switch(config)# clock summer-time name date start-month date year hh:mm end-month day year hh:mm [ offset-minutes ]\n\n\n\n<p>Synchronize with an NTP server.<br>Switch(config)# ntp server ip-address [ prefer ] [ version { 3 | 4 }]\n\n\n\n<p>Verify NTP synchronization.<br>Switch# show ntp status Switch# show ntp associations<\/p>\n\n\n\n<p>Use NTP authentication.<br>Switch(config)# ntp authentication-key key-number md5 keystring<br>Switch(config)# ntp authenticate<br>Switch(config)# ntp trusted-key key-number<br>Switch(config)# ntp server ip-address key key-number<\/p>\n\n\n\n<p>Limit NTP access.<br>Switch(config)# access-list acl-num permit ip-address mask<br>Switch(config)# ntp access-group {serve-only | serve | peer | query-only } acl-num<\/p>\n\n\n\n<p>Add time stamps to logging messages.<br>Switch(config)# service timestamps log datetime [ localtime ] [ show-timezone ] [ msec ] [ year ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">SNMP Configuration Commands<\/span><\/strong><\/p>\n\n\n\n<p>Define SNMPv1 or SNMPv2C access.<br>Switch(config)# snmp-server community community string [ ro | rw ] [ access-list-number ]\n\n\n\n<p>Define an SNMPv1 trap receiver.<br>Switch(config)# snmp-server host host-address community-string [ trap-type ]\n\n\n\n<p>Define an SNMPv2C trap or inform receiver.<br>Switch(config)# snmp-server host host-address [ informs ] version 2c community-string<\/p>\n\n\n\n<p>Definir una vista SNMPv3<br>Switch(config)# snmp-server view view-name oid-tree<\/p>\n\n\n\n<p>Definir un grupo de usuarios<br>Switch(config)# snmp-server group group-name v3 { noauth | auth | priv } [ read read-view ] [ write write-view ] [ notify notify-view ] [ access access-list ]\n\n\n\n<p>Definir un usuario<br>Switch(config)# snmp-server user user-name group-name v3 auth {md5 | sha auth-password priv { des | 3des | aes { 128 | 192 | 256 } priv-password [ access-list ]\n\n\n\n<p>Define an SNMPv3 trap or inform receiver.<br>Switch(config)# snmp-server host host-address [ informs ] version 3 { noauth | auth | priv } user-name [ trap-type ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">IP SLA Configuration and Monitoring Commands<\/span><\/strong><\/p>\n\n\n\n<p>Enable IP SLA responder.<br>Switch(config)# ip sla responder<\/p>\n\n\n\n<p>Authenticate IP SLA operations.<br>Switch(config)# key chain chain-name<br>Switch(config-keychain)# key key-number<br>Switch(config-keychain-key)# key-string string<br>Switch(config-keychain-key)# exit<br>Switch(config-keychain)# exit<br>Switch(config)# ip sla key-chain chain-name<\/p>\n\n\n\n<p>Define a new IP SLA operation.<br>Switch(config)# ip sla operation-number<\/p>\n\n\n\n<p>Define an ICMP echo test.<br>Switch(config-ip-sla)# icmp-echo destination-ip-addr [ sourceip-addr]\n\n\n\n<p>Define a UDP jitter test.<br>Switch(config-ip-sla)# udp-jitter destination-ip-addr dest-udpport [ source-ip source-ip-addr] [ source-port source-udp-port] [num-packets number-of-packets] [ interval packet-interval]\n\n\n\n<p>Define UDP jitter codec.<br>Switch(config-ip-sla)# udp-jitter destination-ip-addr dest-udp-port codec { g711alaw| g711ulaw| g729a}<\/p>\n\n\n\n<p>Set the test frequency.<br>Switch(config-ip-sla)# frequency seconds<\/p>\n\n\n\n<p>Set the test schedule.<br>Switch(config)# ip sla schedule operation-number [ life { forever | seconds}] [ start-time { hh:mm[:ss] [ month day| day month] | pending| now| after hh:mm:ss}] [ ageout seconds] [ recurring]\n\n\n\n<p>Display the IP SLA test configuration.<br>Switch# show ip sla configuration [ operation-number]\n\n\n\n<p>Display the results of an IP SLA test operation.<br>Switch# show ip sla statistics [operation-number] [aggregated] [detail]\n\n\n\n<p>Configure a local SPAN session source.<br>Switch(config)# monitor session session-number source { interface type member\/mod\/num | vlan vlan-id }[ rx | tx | both ]\n\n\n\n<p>Configure a local SPAN session destination.<br>Switch(config)# monitor session session-number destination interface type member\/mod\/num [ encapsulation replicate ]\n\n\n\n<p>Enable ingress traffic from the destination interface.<br>\u2026 ingress { dot1q vlan vlan-id | isl | untagged vlan vlan-id }<\/p>\n\n\n\n<p>Filter VLANs from a trunk link as a SPAN source.<br>Switch(config)# monitor session session-number filter vlan vlan-range<\/p>\n\n\n\n<p>Create an RSPAN VLAN.<br>Switch(config)# vlan vlan-id<br>Switch(config-vlan)# remote-span<\/p>\n\n\n\n<p>Configure an RSPAN session on the source switch.<br>Switch(config)# monitor session session-number source { interface type member\/mod\/num | vlan vlan-id }[ rx | tx | both ]<br>Switch(config)# monitor session session-number destination remote vlan rspan-vlan-id<\/p>\n\n\n\n<p>Configure an RSPAN session on the destination switch.<br>Switch(config)# monitor session session-number source remote vlan rspan-vlan-id<br>Switch(config)# monitor session session-number destination interface type member\/mod\/num [ encapsulation replicate]\n\n\n\n<p>Display active SPAN sessions.<br>Switch# show monitor [ session { session-number | all | local | range range-list | remote }] [ detail ]\n\n\n\n<p>Delete SPAN sessions.<br>Switch(config)# no monitor session { session | range sessionrange } | local | all }<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Supervisor Redundancy Configuration Commands<\/span><\/strong><\/p>\n\n\n\n<p>Enable supervisor redundancy.<br>Switch(config)# redundancy<\/p>\n\n\n\n<p>Set the supervisor redundancy mode.<br>Switch(config-red)# mode { rpr| rpr-plus| sso}<\/p>\n\n\n\n<p>Display supervisor redundancy states.<br>Switch# show redundancy states<\/p>\n\n\n\n<p>Enable supervisor redundancy synchronization.<br>Switch(config-red)# main-cpu<br>Switch(config-r-mc)# auto-sync { startup-config | config-register| bootvar}<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">HSRP Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Set the HSRP priority.<br>Switch(config-if)# standby group priority priority<\/p>\n\n\n\n<p>Set the HSRP timers.<br>Switch(config-if)# standby group timers hello holdtime<\/p>\n\n\n\n<p>Allow router preemption.<br>Switch(config-if)# standby group preempt [ delay seconds ]\n\n\n\n<p>Use group authentication.<br>Switch(config-if)# standby group authentication string<\/p>\n\n\n\n<p>Adjust priority by tracking an interface.<br>Switch(config-if)# standby group track type member\/module\/number decrementvalue<\/p>\n\n\n\n<p>Assign the virtual router address.<br>Switch(config-if)# standby group ip ip address [ secondary ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">VRRP Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Assign a VRRP router priority (default 100).<br>Switch(config-if)# vrrp group priority level<\/p>\n\n\n\n<p>Alter the advertisement timer (default 1 second).<br>Switch(config-if)# vrrp group timers advertise [ msec ] interval<\/p>\n\n\n\n<p>Learn the advertisement interval from the master router.<br>Switch(config-if)# vrrp group timers learn<\/p>\n\n\n\n<p>Disable preempting (default is to preempt).<br>Switch(config-if)# no vrrp group preempt<\/p>\n\n\n\n<p>Change the preempt delay (default 0 seconds).<br>Switch(config-if)# vrrp group preempt [ delay seconds ]\n\n\n\n<p>Use authentication for advertisements.<br>Switch(config-if)# vrrp group authentication string<\/p>\n\n\n\n<p>Assign a virtual IP address.<br>Switch(config-if)# vrrp group ip ip-address [ secondary ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">GLBP Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Assign a GLBP priority.<br>Switch(config-if)# glbp group priority level<\/p>\n\n\n\n<p>Allow GLBP preemption.<br>Switch(config-if)# glbp group preempt [ delay minimum seconds ]\n\n\n\n<p>Define an object to be tracked.<br>Switch(config)# track object-number interface type member\/module\/number { line-protocol | ip routing }<\/p>\n\n\n\n<p>Define the weighting thresholds.<br>Switch(config-if)# glbp group weighting maximum [ lower lower ] [ upper upper ]\n\n\n\n<p>Track an object.<br>Switch(config-if)# glbp group weighting track object-number [ decrement value ]\n\n\n\n<p>Choose the load-balancing method.<br>Switch(config-if)# glbp group loadbalancing [ round-robin | weighted | hostdependent ]\n\n\n\n<p>Assign a virtual router address.<br>Switch(config-if)# glbp group ip [ ip-address [ secondary ]]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Port Security Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Enable port security on an interface.<br>Switch(config-if)# switchport port-security<\/p>\n\n\n\n<p>Set the maximum number of learned addresses.<br>Switch(config-if)# switchport port-security maximum max-addr<\/p>\n\n\n\n<p>Define a static MAC address.<br>Switch(config-if)# switchport port-security macaddress mac-addr<\/p>\n\n\n\n<p>Define an action to take.<br>Switch(config-if)# switchport port-security violation {shutdown | restrict | protect}<\/p>\n\n\n\n<p>Display port security status.<br>Switch# show port-security [ interface type member\/module\/number ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Port-Based Authentication Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Define a method list for 802.1X.<br>Switch(config)# aaa authentication dot1x default group radius<\/p>\n\n\n\n<p>Globally enable 802.1X.<br>Switch(config)# dot1x system-auth-control<\/p>\n\n\n\n<p>Define the 802.1X behavior on a port.<br>Switch(config-if)# dot1x port-control {forceauthorized | force- unauthorized | auto }<\/p>\n\n\n\n<p>Support more than one host on a port.<br>Switch(config-if)# dot1x host-mode multi-host<\/p>\n\n\n\n<p>Display 802.1X interface status.<br>Switch# show dot1x [ all ] [ interface type member\/ module\/number ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Storm Control Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Enable a Storm Control threshold on an interface.<br>Switch(config-if)# storm-control { broadcast | multicast | unicast } level { level [ level-low ] | bps bps [ bps-low ] | pps pps [ pps-low ]}<\/p>\n\n\n\n<p>Define an action for Storm Control. (By default, frames are dropped if this command is not present.)<br>Switch(config-if)# storm-control action { shutdown | trap }<\/p>\n\n\n\n<p>Display Storm Control status.<br>Switch# show storm-control [ interface-id ] [ broadcast | multicast | unicast ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">VLAN ACL Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Define a VACL.<br>Switch(config)# vlan access-map map-name [ sequencenumber ]\n\n\n\n<p>Define a matching condition.<br>Switch(config-access-map)# match {ip address { acl-number | acl-name }} | { mac address acl-name }}<\/p>\n\n\n\n<p>Define an action.<br>Switch(config-access-map)# action { drop | forward [ capture ] | redirect type mod\/num }<\/p>\n\n\n\n<p>Apply the VACL to VLANs.<br>Switch(config)# vlan filter map-name vlan-list vlan-list<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Private VLAN Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Define a secondary VLAN.<br>Switch(config)# vlan vlan-id<br>Switch(config-vlan)# private-vlan { isolated | community }<\/p>\n\n\n\n<p>Define a primary VLAN; associate it with secondary VLANs.<br>Switch(config)# vlan vlan-id<br>Switch(config-vlan)# private-vlan primary<br>Switch(config-vlan)# private-vlan association { secondary-vlan-list | add secondary-vlan-list | remove secondary-vlan-list }<\/p>\n\n\n\n<p>Associate ports with private VLANs.<br>Switch(config-if)# switchport mode private-vlan { host | promiscuous }<\/p>\n\n\n\n<p>Associate nonpromiscuous ports with private VLANs.<br>Switch(config-if)# switchport private-vlan hostassociation primary-vlan-id secondary-vlan-id<\/p>\n\n\n\n<p>Associate promiscuous ports with private VLANs.<br>Switch(config-if)# switchport private-vlan mapping { primary-vlan-id} {secondary-vlan-list } | { add secondary-vlan-list} | { remove secondary-vlan-list }<\/p>\n\n\n\n<p>Associate secondary VLANs with a primary VLAN Layer 3 SVI.<br>Switch(config-if)# private-vlan mapping { secondaryvlan-list | add secondary-vlan-list | remove secondary-vlan-list }<\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">DHCP Snooping Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Globally enable DHCP snooping.<br>Switch(config)# ip dhcp snooping<\/p>\n\n\n\n<p>Define a trusted interface.<br>Switch(config-if)# ip dhcp snooping trust<\/p>\n\n\n\n<p>Limit the interface DHCP packet rate.<br>Switch(config-if)# ip dhcp snooping limit rate rate<\/p>\n\n\n\n<p>Display DHCP snooping status.<br>Switch# show ip dhcp snooping [ binding ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">IP Source Guard Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Define a static IP source binding entry.<br>Switch(config)# ip source binding macaddress vlan vlan-id ip-address interface type member\/module\/number<\/p>\n\n\n\n<p>Enable IP source guard on an interface.<br>Switch(config-if)# ip verify source [ portsecurity ]\n\n\n\n<p>Display IP source guard status.<br>Switch# show ip verify source [ interface type member\/module\/number ]\n\n\n\n<p>Display IP source binding database.<br>Switch# show ip source binding [ ip-address ] [ mac-address ] [ dhcp-snooping | static ] [ interface type member\/module\/number ] [ vlan vlan-id ]\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Dynamic ARP Inspection Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Enable DAI on a VLAN.<br>Switch(config)# ip arp inspection vlan vlanrange<\/p>\n\n\n\n<p>Define a trusted interface.<br>Switch(config-if)# ip arp inspection trust<\/p>\n\n\n\n<p>Define a static ARP inspection binding.<br>Switch(config)# arp access-list acl-name permit ip host sender-ip mac host sendermac [ log ]\n\n\n\n<p>Apply static ARP inspection bindings.<br>Switch(config)# ip arp inspection filter arpacl-name vlan vlan-range [ static ]\n\n\n\n<p>Validate addresses within ARP replies.<br>Switch(config)# ip arp inspection validate {[ src-mac ] [ dst-mac ] [ ip ]}<\/p>\n\n\n\n<p>Display DAI status.<br>Switch# show ip arp inspection<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">AAA Configuration Commands Task Command Syntax<\/span><\/strong><\/p>\n\n\n\n<p>Enable AAA on a switch.<br>Switch(config)# aaa new-model<\/p>\n\n\n\n<p>Use local authentication.<br>Switch(config)# username username password password<\/p>\n\n\n\n<p>Define individual authentication servers.<br>Switch(config)# radius-server host { hostname | ip-address } [ key string ]<br>Switch(config)# tacacs-server host { hostname | ip-address } [ key string ]\n\n\n\n<p>Define a group of authentication servers.<br>Switch(config)# aaa group server { radius | tacacs+ } group-name<br>Switch(config-sg)# server ip-address<\/p>\n\n\n\n<p>Define a list of authentication methods to try.<br>Switch(config)# aaa authentication login { default | list-name } method1 [ method2 \u2026 ]\n\n\n\n<p>Apply an authentication method list to a line.<br>Switch(config-line)# login authentication { default | list-name }<\/p>\n\n\n\n<p>Define a list of authorization methods to try.<br>Switch(config)# aaa authorization { commands | config-commands | configuration | exec | network | reverseaccess } { default | list-name } method1 [ method2 \u2026 ]\n\n\n\n<p>Apply an authorization method list to a line.<br>Switch(config)# authorization { commands level | exec | reverse-access } { default | listname }<\/p>\n\n\n\n<p>Define a list of accounting methods to try.<br>Switch(config)# aaa accounting { system | exec | commands level } {default | list- name } { start-stop | stop-only | wait-start | none } method1 [ method2\u2026 ]\n\n\n\n<p>Apply an accounting method list to a line.<br>Switch(config-line)# accounting { commands level | connection | exec } { default | listname }<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Configuring NSF (by Routing Protocol)<\/span><\/strong><\/p>\n\n\n\n<p>BGP<br>Switch(config)# router bgp as-number<br>Switch(config-router)# bgp graceful-restart<\/p>\n\n\n\n<p>EIGRP<br>Switch(config)# router eigrp as-number<br>Switch(config-router)# nsf<\/p>\n\n\n\n<p>OSPF<br>Switch(config)# router ospf process-id<br>Switch(config-router)# nsf<\/p>\n\n\n\n<p>IS-IS<br>Switch(config)# router isis [tag ]<br>Switch(config-router)# nsf [ cisco | ietf]<br>Switch(config-router)# nsf interval [minutes ]<br>Switch(config-router)# nsf t3 { manual [ seconds] | adjacency }<br>Switch(config-router)# nsf interface wait seconds<\/p>","protected":false},"excerpt":{"rendered":"<p>Commands Used to Monitor and Manipulate the CAM Table TaskDisplay all MAC addresses learned on a specific interfaceSwitch# show mac address-table dynamic <\/p>","protected":false},"author":2,"featured_media":1392,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[233],"tags":[280,523,340,407,427],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cisco IOS commands - JMCristobal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco IOS commands - JMCristobal\" \/>\n<meta property=\"og:description\" content=\"Commands Used to Monitor and Manipulate the CAM Table TaskDisplay all MAC addresses learned on a specific interfaceSwitch# show mac address-table dynamic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/\" \/>\n<meta property=\"og:site_name\" content=\"JMCristobal\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/web.facebook.com\/JMCristobalHomepage\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-15T10:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-15T02:44:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jmcristobal.com\/wp-content\/uploads\/2022\/01\/RS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"206\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"JMCristobal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jmcristobalhome\" \/>\n<meta name=\"twitter:site\" content=\"@jmcristobalhome\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"JMCristobal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/\"},\"author\":{\"name\":\"JMCristobal\",\"@id\":\"https:\/\/jmcristobal.com\/es\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118\"},\"headline\":\"Cisco IOS commands\",\"datePublished\":\"2022-02-15T10:52:00+00:00\",\"dateModified\":\"2022-02-15T02:44:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/\"},\"wordCount\":3037,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/jmcristobal.com\/es\/#organization\"},\"keywords\":[\"cisco\",\"commands\",\"ios\",\"router\",\"switch\"],\"articleSection\":[\"Enterprise Infrastructure\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/\",\"url\":\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/\",\"name\":\"Cisco IOS commands - JMCristobal\",\"isPartOf\":{\"@id\":\"https:\/\/jmcristobal.com\/es\/#website\"},\"datePublished\":\"2022-02-15T10:52:00+00:00\",\"dateModified\":\"2022-02-15T02:44:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jmcristobal.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco IOS commands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jmcristobal.com\/es\/#website\",\"url\":\"https:\/\/jmcristobal.com\/es\/\",\"name\":\"JMCristobal\",\"description\":\"Networking and more\",\"publisher\":{\"@id\":\"https:\/\/jmcristobal.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jmcristobal.com\/es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jmcristobal.com\/es\/#organization\",\"name\":\"JMCristobal\",\"url\":\"https:\/\/jmcristobal.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/jmcristobal.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png\",\"contentUrl\":\"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png\",\"width\":518,\"height\":436,\"caption\":\"JMCristobal\"},\"image\":{\"@id\":\"https:\/\/jmcristobal.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.youtube.com\/JMCristobalHomepage\",\"https:\/\/web.facebook.com\/JMCristobalHomepage\",\"https:\/\/twitter.com\/jmcristobalhome\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/jmcristobal.com\/es\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118\",\"name\":\"JMCristobal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/jmcristobal.com\/es\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/2.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/2.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g\",\"caption\":\"JMCristobal\"},\"url\":\"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/author\/jmcristobal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco IOS commands - JMCristobal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/","og_locale":"es_ES","og_type":"article","og_title":"Cisco IOS commands - JMCristobal","og_description":"Commands Used to Monitor and Manipulate the CAM Table TaskDisplay all MAC addresses learned on a specific interfaceSwitch# show mac address-table dynamic","og_url":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/","og_site_name":"JMCristobal","article_publisher":"https:\/\/web.facebook.com\/JMCristobalHomepage","article_published_time":"2022-02-15T10:52:00+00:00","article_modified_time":"2022-02-15T02:44:06+00:00","og_image":[{"width":350,"height":206,"url":"https:\/\/jmcristobal.com\/wp-content\/uploads\/2022\/01\/RS.png","type":"image\/png"}],"author":"JMCristobal","twitter_card":"summary_large_image","twitter_creator":"@jmcristobalhome","twitter_site":"@jmcristobalhome","twitter_misc":{"Escrito por":"JMCristobal","Tiempo de lectura":"14 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#article","isPartOf":{"@id":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/"},"author":{"name":"JMCristobal","@id":"https:\/\/jmcristobal.com\/es\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118"},"headline":"Cisco IOS commands","datePublished":"2022-02-15T10:52:00+00:00","dateModified":"2022-02-15T02:44:06+00:00","mainEntityOfPage":{"@id":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/"},"wordCount":3037,"commentCount":0,"publisher":{"@id":"https:\/\/jmcristobal.com\/es\/#organization"},"keywords":["cisco","commands","ios","router","switch"],"articleSection":["Enterprise Infrastructure"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/","url":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/","name":"Cisco IOS commands - JMCristobal","isPartOf":{"@id":"https:\/\/jmcristobal.com\/es\/#website"},"datePublished":"2022-02-15T10:52:00+00:00","dateModified":"2022-02-15T02:44:06+00:00","breadcrumb":{"@id":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jmcristobal.com\/2022\/02\/15\/cisco-ios-commands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jmcristobal.com\/es\/"},{"@type":"ListItem","position":2,"name":"Cisco IOS commands"}]},{"@type":"WebSite","@id":"https:\/\/jmcristobal.com\/es\/#website","url":"https:\/\/jmcristobal.com\/es\/","name":"JMCristobal","description":"Networking and more","publisher":{"@id":"https:\/\/jmcristobal.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jmcristobal.com\/es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/jmcristobal.com\/es\/#organization","name":"JMCristobal","url":"https:\/\/jmcristobal.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/jmcristobal.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png","contentUrl":"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png","width":518,"height":436,"caption":"JMCristobal"},"image":{"@id":"https:\/\/jmcristobal.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/JMCristobalHomepage","https:\/\/web.facebook.com\/JMCristobalHomepage","https:\/\/twitter.com\/jmcristobalhome"]},{"@type":"Person","@id":"https:\/\/jmcristobal.com\/es\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118","name":"JMCristobal","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/jmcristobal.com\/es\/#\/schema\/person\/image\/","url":"http:\/\/2.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g","contentUrl":"http:\/\/2.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g","caption":"JMCristobal"},"url":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/author\/jmcristobal\/"}]}},"jetpack_featured_media_url":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/wp-content\/uploads\/2022\/01\/RS.png","_links":{"self":[{"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/posts\/1399"}],"collection":[{"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/comments?post=1399"}],"version-history":[{"count":2,"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/posts\/1399\/revisions"}],"predecessor-version":[{"id":1544,"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/posts\/1399\/revisions\/1544"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/media\/1392"}],"wp:attachment":[{"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/media?parent=1399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/categories?post=1399"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/wp-json\/wp\/v2\/tags?post=1399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}