Академический Документы
Профессиональный Документы
Культура Документы
Tricks
Helpful Cisco IOS commands to make
your life a breeze
By: Todd Montgomery
Version 1 May 2019
Published by: TipofTheHat
Copyright 2019 by Todd Montgomery
“I learned IOS one weekend and it changed my whole life”
-Some guy losing it late one night in the data center
Rights
All rights reserved. The book or any portion thereof may not be reproduced
or used in any manner whatsoever without the express written permission of
the author except for the use of brief quotations in a book review.
Disclaimer:
The Author is an independent content developer not associated or affiliated
with the vendor mentioned throughout this book. The names and titles
mentioned in this book are the trademarks of Cisco Systems, Inc.
I mention these names and/or the relevant terminologies only for describing
the relevant technology and command line examples. I develop study
material entirely on my own without endorsement from Cisco System. This
material is fully copywrited.
Liability
Although the author has have made every effort to ensure that the
information in this book was accurate at press time, the author does not
assume and hereby disclaims any liability to any party for any loss, damage,
or disruption caused by errors or omissions, whether such errors or omissions
result from negligence, accident, or any other cause.
The Author presents the material in this book “as is” without warranty. All
precautions have been taken to ensure the accuracy of the information given,
neither the Author or TipOfThe Hat shall have any liability to any entity or
individual with respect to any losses or damaged incurred directly or
indirectly by the information contained here or any references to products in
the examples.
Trademarks
All trademarks belong to their respective vendors. The Author is aware of the
trademarks and is not the owner of them. All trademark references are used to
explain the topics covered in this book and there is no intention by the Author
of trademark infringement. The use of any trademark name is intended to be
an endorsement of any affiliation of this document by the trademark owner.
Cisco and IOS are registered trademarks of Cisco Systems, Inc.
Introduction
This books purpose is to present to the reader many unusual or
undocumented Cisco IOS commands. Knowledge of these little known
commands can help you be more productive in your day to day work with
IOS based products. This is not meant to be a “How do I learn IOS” guide,
there are many fine books out there that cover that topic. However, during the
day to day work with Cisco devices, there are many commands that make
configuring and troubleshooting device easier. If you have ever said “Wow, I
didn’t know you could do that!” This is your book.
The material is presented in a condensed “what you need to know” format
that covers the services and topics in many different sections on IOS.
About the Author
Todd Montgomery has over 35 years of networking experience and has held
a number of roles with equipment vendors, large enterprises, systems
integrators, The Department of Defense, and as a published author of Cloud
computing and data center books. He holds many industry certifications
including Cisco CCNP/CCDP.
Currently he is writing books on AWS certifications and is consulting on
network automation, security and analytics. Todd lives in Austin, TX and can
be contacted at toddmont@thegateway.net
Also by Todd Montgomery:
CompTIA Cloud+ Study Guide: Exam CV0-001
CompTIA Cloud+ Study Guide: Exam CV0-002
CCNA Cloud Complete Study Guide: Exam 210-451 and Exam 210-455
CCNA Data Center: Introducing Cisco Data Center Technologies Study
Guide: Exam 640-916
AWS Certified Solutions Architect Associate Certification guide
AWS Certified Cloud Practitioner Certification guide
Description
This book was created to pass along many helpful or obscure Cisco IOS
commands “Stupid IOS Tricks” that has been collected over 30 years of
working with Cisco devices. I have documented many commands that are
undocumented, unusual and just plain helpful.
It is a given that many of these examples may or may not be present on the
different IOS types and versions and some commands may be specific to IOS
trains such as IOS-XR, IOS-XE, and NX-OS. Not all IOS version support
features and examples offered in this book, your mileage will vary based on
the products and versions you are running.
Some of these commands are used by TAC and considered unsupported and
come with no documentation. Many others are seldom used but useful to
know.
This book was created to share that knowledge and make working with IOS
devices easier, save you time and be more efficient.
Contents
Rights
Disclaimer:
Liability
Trademarks
Introduction
About the Author
Description
Show interface command
Show run
CLI Keyboard shortcuts
Show users logged into the Cisco device
Show parser commands
Diff command from running and startup
Viewing text files in flash
Archive config
Terminal commands
Finding a source MAC address
Mac Address Table modifications
Determining a connected device IP address on a switch
Complete investigation of a connected device
Top bandwidth consumers
FIB Forwarding information Base
CDP Neighbor commands
Switchport commands
Alias commands
VLAN Commands
Cable diagnostics
Show Hardware hidden command
Logging commands
Chassis and System commands
Track down ports with interface errors
IP Cache Flow
SSH base config
IP Forwarding commands
OSPF commands
Regular expressions
Cisco debug interpreter
AAA Authentication
Stackwise switch stacking
Beacon LED on NX-OS switches
Catalyst Power supplies
Multicast
Embedded Packet Capture
BGP Public route servers
Service commands
Low-level show commands
Default, Reload, rollback and commit config commands
Interface range command
Transceivers SFPs
IPSec commands
NAT commands
Access-List commands
Miscellaneous IOS commands that are helpful
Escape sequences
Netflow
Show inventory
Interface range command
Redundancy
Communicating with a Standby RP
Reload, Shut Down, or Power Cycle
Show Module command
Show platform command
SNMP Commands
DNS lookup on the Cisco device
Set the Cisco device as a TFTP server
Summaries and filters on the routing table
Telnet / SSH access into privilege mode
Show what IP port numbers are open
DHCP Server Basic Config
DNS Domain Name Server
Setting the date and Time:
NTP Network Time Protocol
Alias commands
VRF Lite
UDLD
IPSLA
Embedded Event Manager EEM
System debugging and dumps:
Show interface command
Switch#show interface gi1/0/1 switchport
Switch#show interface status
Switch#Show interface summary
Switch#Show interface capabilities
Switch#Show interface trunk
Switch#show interface transceiver
Switch#show interface counter errors
Switch#show interface status ?
err-disabled Show interface error disabled state
inactive Show interface inactive state
module Limit display to interfaces on module
Switch#show interfaces counters protocol status
Protected: false
Unknown unicast blocked: disabled
Unknown multicast blocked: disabled
Appliance trust: none
This filters on IP address 10.x and the slash is a regular expression to include
the dot after the 10.
Switch#Show run | include 10/.
And you get the output starting with the first appearance to the text string
“Interface”, it is similar to the begin filter of show run | begin <text> but
allows you to filter inline.
All regular expressions are allowed after the forward to slash to filter show
run output.
The + command after the forward slash will filter all lines with that text in it.
It is similar to the “include” filter but can be done inline when viewing show
run parser output.
--More --
+Interface
You can redirect the show run output to storage, there are many options here
but to send the configuration to flash enter:
Switch#show run | redirect flash:/mybackupconfig.cfg
See the “more” command in this document for information on how to read
the file in flash.
C9407#who
Line User Host(s) Idle Location
* 2 vty 0 toddmont idle 00:00:00 192.168.1.1
C9407#systat
C9407#systat all
Show parser commands
Router#show parser stat
Last configuration file parsed: Number of Commands: 151, Time: 615 ms
Cisco#terminal length 0
Terminal length turns off pagination and the output is given all at once
(instead of hitting Space/Enter to walk through the output. Useful if you're
saving your session to a file.
Any other value controls how many lines are printed before requiring
Space/Enter
No term length reverts to default
Finding a source MAC address
In a traditional network, this is done by a little CLI dance: Resolve the IP
address if need be, log into the default gateway for that subnet, check the
ARP table for the MAC address, and start tracing it.
Router#trace mac 2880.2301.8998 6033.4b8c.5306
Source 2880.2301.8998 found on test-s-02
1 test-s-02 (10.200.8.253) : Gi1/0/8 => Po1
2 test-s-01 (10.200.8.252) : Po1 => Gi1/0/40
Destination 6033.4b8c.5306 found on test-s-01
Layer 2 trace completed
Look at overall and rx/tx traffic counters and they should be incrementing
with little or no errors
clear counters interface gi7/0/1 to set everything to zero
Make sure that the switch is seeing the connected devices MAC address
Show vlan250
Show ip arp vlan 250 (look for arp mapping to the MAC)
Ping vrf <vrf-name> 10.1.1.1
Show ip arp vlan250 (if arp is “incomplete” then it is not responding.
Cat9500#show ip arp vrf DATA
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.16.121.1 - 00be.758e.4381 ARPA Vlan10
Internet 172.16.121.20 0 Incomplete ARPA
This command will make it much quicker to find a lot of devices using CDP
at once without the clutter. To output a list of the remote device names,
Cat9500#show cdp neighbor detail | include Dev|IP
Cat9500#show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Te3/0/2, Te3/0/3, Te3/0/4, Te3/0/5,
Te3/0/6, Te3/0/7, Te3/0/8, Fo3/0/9, Fo3/0/10, Te4/0/2
Te4/0/5, Te4/0/6, Te4/0/7, Te4/0/8, Fo4/0/9,
Fo4/0/10, Te6/0/31, Te6/0/32, Te6/0/41
Te6/0/42, Te7/0/29, Te7/0/30, Te7/0/31,
Te7/0/32, Te7/0/41, Te7/0/42
Switch(config-vlan)#VLAN Autostate
No auto state command on the VLAN and the VLAN comes up/up even with
no interfaces up. Ping with nothing plugged into the VLAN. This command
forces the vlan to up/up with nothing plugged in.
Cable diagnostics
Some switch models can test the cabling for you. This allows you to see if
LAN cable pairs are faulty, determine the appx length of the cabling, and if
there's an issue with the local/remote cable pairs. Running this test is
intrusive and the interface will go down. Be careful using it on a live port.
Also, the interface must be up for this to work.
Cat9500#test cable-diagnos tdr int gig0/1
Cat9500#show cable-diagnostics tdr int gi0/14
Cat9500#Test cable tdr interface <interface>
Interface Speed Local pair Pair length Remote pair Pair status
--------- ----- ---------- ------------------ ----------- ------------
Te10/0/46 unkno Pair A 52 +/- 5 meters N/A Impedance Mismatch
Pair B 53 +/- 5 meters N/A Open
Pair C 62 +/- 5 meters N/A Short
Pair D 53 +/- 5 meters N/A Impedance Mismatch
Show Hardware hidden command
Switch#Show hardware
Switch#show hardware led
Logging commands
Switch#show logging onboard RP active voltage detail
----------------------------------------------------------------------
TEMPERATURE SUMMARY INFORMATION
----------------------------------------------------------------------
Number of sensors :4
----------------------------------------------------------------------
Sensor ID Normal Range Maximum Sensor Value
--------------------------------------------------------------------------------
SYSTEM INLET 0 56 - 66 43
SYSTEM OUTLET 1 63 - 73 51
CORE TEMP 2 107 - 117 58
DOPPLER TEMP 3 107 - 117 58
----------------------------------------------------------------------
Sensor Value
Total Time of each Sensor
----------------------------------------------------------------------
value: 22
18h, 0s, 0s, 0s,
value: 24
579h, 0s, 0s, 0s,
value: 25
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608
.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
router#show ip traffic
Be careful, there is a lot of output here usually
SSH base config
ip ssh time-out 60
ip ssh version 2
transport input ssh (in Line VTY section to restrict inputs to only SSH this
will exclude telnet access)
ip domain-name mydomain.com (need a domain name defined to create a
crypto key for SSH access)
crypto key generate rsa modulus 2048
Outgoing SSH from an IOS device
Cat9500#ssh -l <username> <host-IP or DNS>
IP Forwarding commands
Router(config)#ip forwarding accounting adjacency-update
If there are capitals. Username then the switch is communicating with the
ACS switch, if it is lowercase “username” then you need to log in with the
local credentials.
Switch_stack##switch 1 priority 15
A higher priority value for a stack member increases has priority
The priority value can be 1 to 15. The default priority is 1. Do a reload.
Switch_stack##show switch
Switch/Stack Mac Address : 00aa.6e03.8700 - Local Mac Address
Mac persistency wait time: Indefinite
H/W Current
Switch# Role Mac Address Priority Version State
------------------------------------------------------------
*1 Active 00aa.6623.fc48 15 V07 Ready
2 Standby 00aa.6e69.ac36 1 V07 Ready
Gives the following for each switch in the stack and is platform dependent:
Switch_stack#show environment stack
SWITCH: 1
Switch 1 FAN 1 is OK
Switch 1 FAN 2 is OK
Switch 1 FAN 3 is OK
FAN PS-1 is OK
FAN PS-2 is OK
Switch 1: SYSTEM TEMPERATURE is OK
Inlet Temperature Value: 30 Degree Celsius
Temperature State: GREEN
Yellow Threshold : 46 Degree Celsius
Red Threshold : 56 Degree Celsius
To find the physical master switch, log into the device and do a show switch
to get the masters MAC address, then do a show version to see what the base
MAC address is for the switch, if they match, it is the master. Unfortunately,
Cisco did not add a beacon LED on most of their products, so there may be
easy way to do this. Another method is to pop a cable or shut/no shut a port
and look in the log file to the port number, the first digit is the switch
number.
switch_stack#show flash-1:
-#- --length-- ---------date/time--------- path
2 2097152 May 09 2019 12:26:18.0000000000 +00:00 nvram_config
3 15950464 Aug 29 2018 01:29:21.0000000000 +00:00 cat3k_caa-
guestshell.16.03.06.SPA.pkg
4 22302593 Aug 29 2018 01:29:18.0000000000 +00:00 cat3k_caa-
rpbase.16.03.06.SPA.pkg
5 265124472 Aug 29 2018 01:29:21.0000000000 +00:00 cat3k_caa-
rpcore.16.03.06.SPA.pkg
show version switch 1 and 2 will show what IOS version each switch is
running
<clip>
Switch#show version
<clip>
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ----------
* 1 56 WS-C3850-48T 16.3.6 CAT3K_CAA-UNIVERSALK9
INSTALL
2 56 WS-C3850-48T 16.3.6 CAT3K_CAA-UNIVERSALK9
INSTALL
Switch 02
---------
Switch uptime : 25 minutes
Base Ethernet MAC Address : 00:aa:6e:03:84:00
Motherboard Assembly Number : 73-16296-08
Motherboard Serial Number : FOC222849UJ
Model Revision Number : AB0
Motherboard Revision Number : B0
Model Number : WS-C3850-48T
System Serial Number : FOC2229L3N9
Switch#show ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C -
Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry, E - Extranet,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,
Y - Joined MDT-data group, y - Sending to MDT-data group,
G - Received BGP C-Mroute, g - Sent BGP C-Mroute,
N - Received BGP Shared-Tree Prune, n - BGP C-Mroute suppressed,
Q - Received BGP S-A Route, q - Sent BGP S-A Route,
V - RD & Vector, v - Vector, p - PIM Joins on route,
x - VxLAN group, c - PFP-SA cache created entry
Outgoing interface flags: H - Hardware switched, A - Assert winner, p - PIM
Join
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
Cat9500#show ip mfib ?
A.B.C.D/nn Group IP address/prefix length
Hostname or A.B.C.D Source or group IP address
active Active multicast sources
all Display link scope and non link scope routes
count Route and packet count data
global global/default table override for routing context
instance Select table instance
interface Interface settings and status
linkscope Display link scope routes
route Display routes
status General settings and status
summary Summary statistics
update-sets Bundle update sets
verbose Verbose
vrf Select VPN Routing/Forwarding instance
| Output modifiers
<cr>
Cat9500#show ip mfib
Entry Flags: C - Directly Connected, S - Signal, IA - Inherit A flag,
ET - Data Rate Exceeds Threshold, K - Keepalive
DDE - Data Driven Event, HW - Hardware Installed
ME - MoFRR ECMP entry, MNE - MoFRR Non-ECMP entry, MP
- MFIB
MoFRR Primary, RP - MRIB MoFRR Primary, P - MoFRR
Primary
MS - MoFRR Entry in Sync, MC - MoFRR entry in MoFRR
Client.
I/O Item Flags: IC - Internal Copy, NP - Not platform switched,
NS - Negate Signalling, SP - Signal Present,
A - Accept, F - Forward, RA - MRIB Accept, RF - MRIB Forward,
MA - MFIB Accept, A2 - Accept backup,
RA2 - MRIB Accept backup, MA2 - MFIB Accept backup
Router(config)#clear interface
Bounces (stop/restart) an interface. Same as shut/no shut
Router#reload in X
If you lock yourself out, the device will reload and as long as you didn't write
the config, you can get back in. If the change worked, " reload cancel " so
you don't reboot the device and wipe your working change.
This command replaces the current running configuration file with a saved
configuration file.
time minutes—Specifies the time (in minutes) within which you must enter
the configure confirm command to confirm replacement of the current
running configuration file. If the configure confirm command is not entered
within the specified time limit, the configuration replace operation is
automatically reversed (in other words, the current running configuration file
is restored to the configuration state that existed prior to entering the
configure replace command).
Switch#tclsh
Enters the tcl shell (Product dependent IOS-XR)
Switch#ttcp
Built in throughput tester, similar to IPERF
Switch#configure replace
Replaces current config with new one (no merge)
Switch#ping
(no options) - extended ping, can set QoS etc.
Switch#show ip traffic
Show summary of router traffic
Switch#debug ip routing
Shows the detailed change in the routing table
Switch#show protocols
Shows all the IP and mask information on the box
Cntrl – shift 6 + x
The base Cisco escape sequence, usually works, sometime does not.
Netflow
Global configuration mode:
ip flow-export destination {ip-address | hostname} udp-port
Repeat above step to configure a second NetFlow export destination if
desired
ip flow-export version 9
interface interface-type interface-number
ip flow {ingress | egress}
Repeat Steps to enable NetFlow on other interfaces
interface GigabitEthernet2/0/0.10
encapsulation dot1Q 10
ip route-cache flow
ip flow egress
ip flow-export destination 10.10.1.2 9996
ip flow-export source loopback0
ip flow-cache timeout active 1
ip flow-cache timeout inactive 15
NAME: "Switch 1 - Power Supply B", DESCR: "Switch 1 - Power Supply B"
PID: PWR-C1-350WAC , VID: V02 , SN: FOCxxxxxxxxxx
NAME: "Switch 1 FRU Uplink Module 1", DESCR: "2x1G 2x10G Uplink
Module"
PID: C3850-NM-2-10G , VID: V01 , SN: FOCxxxxxxxxxx
Cat9500#show redundancy ?
clients Redundancy Facility (RF) client list
config-sync Show Redundancy Config Sync status
counters Redundancy Facility (RF) operational counters
domain Specify the RF domain
history Redundancy Facility (RF) history
idb-sync-history Redundancy Facility (RF) IDB sync history
states Redundancy Facility (RF) states
switchover Redundancy Facility (RF) switchover
trace Redundancy Facility (RF) trace
| Output modifiers
<cr>
invalid client tx = 0
null tx by client = 0
tx failures = 0
tx msg length invalid = 0
buffers tx = 200032
tx buffers unavailable = 0
buffers rx = 199308
buffer release errors = 0
Router#show redundancy
Displays the redundancy status of the RPs. This command also displays the
boot and switch-over history for the RPs.
Router#redundancy switchover
Forces a manual switchover to the standby RP. This command works only if
the standby RP is installed and in the “ready” state.
Router#show platform
Displays the status for node, including the redundancy status of the RP cards.
In EXEC mode, this command displays status for the nodes assigned to the
SDR. In administration EXEC mode, this command displays status for all
nodes in the system.
This command administratively turns the power off for a node. It is entered in
administrative configuration mode. The changes do not take effect until you
enter the commit command.
This command works in EXEC mode and reloads the Cisco IOS XR software
on a specific node or all nodes.
To specify all nodes in the stack, enter the “all” keyword in place of the node-
id argument. The node reloads with the current running configuration and
active software set for that node.
9400#hw-module shutdown location node-id
This command is run from admin (#) mode and administratively shuts down
the specified node. Nodes that are shut down still have power but cannot load
or operate Cisco IOS XR software.
This command cannot be used to shut down the RP from which the command
is entered, it only works for line cards.
Show Module command
C9407#show module
Chassis Type: C9407R
service dhcp
ip dhcp relay information option
!
interface vlan 10
ip address 10.0.0.1 255.0.0.0
ip helper-address 30.0.0.2
ip domain-name cisco.com
Defines cisco.com as the Default Domain Name
ip ospf name-lookup
Makes it easier to identify a router because the router is displayed by name
rather than by its router ID or neighbor ID
Setting the date and Time:
CAT9300#clock set 09:30:00 12 september 2019
Cat9300#show clock
13:15:39.008 EDT Sun Apr 7 2019
NTP Network Time Protocol
NTP master
clock timezone PST -8
clock summer-time PDT recurring
clock set 13:00:00 20 apr 2007
NTP client
clock timezone PST -8
clock summer-time PDT recurring
ntp server 192.168.1.2
On the client, before entering the ntp server IP address, do a ping to the NTP
servers IP address to verify that it's a valid IP address, or it will take a long,
long time to synchronize.
NTP Authentication:
Switch(config)# ntp authentication-key 1 md5 MySecretKey
Switch(config)# ntp trusted-key 1
Switch(config)# ntp authenticate
VRF Validation:
Show ip vrf DATA
Show ip route vrf <NAME>
Ping vrf <NAME> 10.1.1.1
There are no routes in the main routing table, they are all in the individual vrf
tables
UDLD
Regular may not disable a port, it is best to go with aggressive
Global:
Router(config)#Udld aggressive | enable message time <1-90 default is 15
seconds>
Interface normal mode:
(Interface)#Udld port
Monitoring
Switch#show udld [interface-id | neighbors]
Recovering:
(config-if)#Shut / no shut
(config-if)#No udld port / udld port
(config-if)#udld reset
(config)#errdisable recovery cause udld
IPSLA
Measures network performance and service level agreement validations
This is Cisco proprietary and can only be implemented with Cisco devices as
the originator and responder
The originator and responder are imbedded in IOS on the device.
Measurement capabilities:
Connectivity (directional)
Delay (round-trip and per direction)
Jitter (per direction)
Packet loss (per direction)
Packet sequencing (in order)
Path (per hop)
Server download time
Results can be read from SNMP for external management applications, can
read for the MIB or the Cisco device can send traps.
To view results:
Cat9300#show ip sla application
Embedded Event Manager EEM
Using the Embedded Event Manager you can trigger off of complex network
events and the run scripts and programs programs directly on the IOS box.
EEM is partitioned into of three sections;
Event Detectors,
Policies and
Programming languages.
Event Detectors
The core to using EEM involved the event detectors. Event detectors are
built-in capabilities to watch for specific situations or conditions. IOS adds
event detectors over time with new releases of code.
EEM Event Detectors:
SNMP
OIR (Online Insertion and Removal)
CLI Command Line Interface
Syslog
XML-RPC
IP SLAs
NetFlow
Application specific event
Config change
Interface counters
Redundancy framework
SNMP notification (i.e. when the device receives a trap)
Resource
Timer
Timer subscriber
IOS Process
Counter
GOLD (Generic OnLine Diagnostics)
Environmental
Routing
Enhanced Object Tracking (EOT)
None (launch the event manually)
Policies determine what process is run when an event is detected. Policies
save you from having to to manually deal with every possible event, It
automates the process.
EEM supports three methods of programmability and scripting.
1. Applets – enables the CLI to be run when a set of conditions is
triggered
2. Tcl - (Tool Command Language)
3. IOS.sh - newer versions of IOS support IOS.sh (IOS shell) macros
similar to Linux bash shell
EEM Actions supported:
Sending a email messages
Executing a cisco command.
Generating SNMP traps
Reloading the router
Generating prioritized syslog messages
Switching to a secondary processor in a redundant platform
requesting system information when an event occurs (like show tech, show
proccess cpu history).
Here is an example EEM configuration that monitors an interface for being
shutdown and re-enables it:
EEM testing:
Router#debug event manager action cli
Example rollback event:
switch# config t
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)#
switch(config)# event manager applet rollbackTrigger
switch(config-applet)#
switch(config-applet)# description “Rollback trigger.”
switch(config-applet)# event cli match “rollback *”
switch(config-applet)# action 1.0 cli copy running-config
bootflash:last_config
switch(config)# copy running-config startup-config
Router#test crash
Makes the router crash any way you want.
Router#debug buffer
Additional buffer debugging.
debug crypto isakmp detail
Crypto ISAKMP internals debugging.
Router#debug oir
Debug online insertion and removal
Router#debug sanity
Router#debug subsys
Debug discrete subsystems.
Router#exception-slave dump X.X.X.X
Router#exception-slave corefile
Router#test leds
Router#test memory
Router#test transmit
Router#write core
Does a full core dump, reboots router