Cisco IOS Configuration Fundamentals Command Reference - show protocols through showmon [Support] show protocols To display the configured protocols, use the show protocols command in user EXEC or privileged EXEC mode. Syntax Descriptioninterface- name (Optional) The type of interfaces. It can be one of the following values: •ATM—ATM interface •Async—Async interface •Auto- Template—Auto- Template interface •BVI—Bridge- Group Virtual Interface •CDMA- Ix—CDMA Ix interface •Container—Container interface •CTunnel—CTunnel interface •Dialer—Dialer interface •Ethernet—Institute of Electrical Electronics Engineers (IEEE) 8.
Fast. Ethernet—Fast. Ethernet IEEE 8. 02. ![]() Escon. Phy—ESCON interface •fcpa—Fiber Channel •Filter—Filter interface •multiservice—Multiservice interface •Pos- channel—POS Channel interfaces •SBC—Session Border Controller •SYSCLOCK—Telecom- Bus Clock Controller •Tunnel—Tunnel interface •Vif—PGM Multicast Host interface •Virtual- Access—Virtual access interface •Virtual- PPP—Virtual PPP interface •Virtual- Template—Virtual template interface •Virtual- Token. Ring—Virtual Token. Ring •Vlan—Catalyst VLANs •vmi—Virtual Multipoint Interface •voa. View and Download Zebra PrintServer user reference manual online. Zebra Technologies PrintServer User Guide. PrintServer Print Server pdf manual download. View and Download Nortel Meridian M3903 quick reference manual online. Meridian M3903 IP Phone pdf manual download. Bypass. In—VOA- Bypass- In interface •voa. Bypass. Out—VOA- Bypass- Out interface •voa. Filter. In—VOA- Filter- In interface •voa. Filter. Out—VOA- Filter- Out interface •voa. In—VOA- In interface •voa. Out—VOA- Out interface interface- number (Optional) Interface number. Command Modes User EXEC (> )Privileged EXEC (#) Command History. Release. Modification. This command was introduced. T The command was integrated in a release earlier than Cisco IOS Release 1. T. 1. 2. 2(3. 3)SRA This command was integrated into Cisco IOS Release 1. SRA. Cisco IOS XE Release 2. This command was integrated into Cisco IOS XE Release 2. Usage Guidelines The show protocols command shows the global and interface- specific status of any configured Level 3 protocol. ![]() Examples The following is sample output from the show protocols command. The field names are self- explanatory. Router# show protocols. Internet Protocol routing is enabled. Fast. Ethernet. 0/0 is up, line protocol is up. Internet address is 1. Fast. Ethernet. 0/1 is up, line protocol is up. Internet address is 1. ATM2/0 is administratively down, line protocol is down. ATM2/0. 1 is administratively down, line protocol is down. ATM2/0. 2 is administratively down, line protocol is down. ATM2/0. 2. 00 is administratively down, line protocol is down. Ethernet. 3/0 is administratively down, line protocol is down. Ethernet. 3/0. 1 is administratively down, line protocol is down. Ethernet. 3/1 is administratively down, line protocol is down. Ethernet. 3/2 is administratively down, line protocol is down. Ethernet. 3/3 is administratively down, line protocol is down. ATM6/0 is administratively down, line protocol is down. SSLVPN- VIF0 is up, line protocol is up. Interface is unnumbered. Using address of SSLVPN- VIF0 (0. Virtual- Access. 1 is down, line protocol is down. Virtual- Template. Virtual- Access. 2 is up, line protocol is up. Port- channel. 5 is down, line protocol is down. Port- channel. 5. Port- channel. 15 is down, line protocol is down. Virtual- Template. Interface is unnumbered. Using address of vmi. Dialer. 3 is up, line protocol is up. For more information on the parameters or protocols shown in this sample output, see the Cisco IOS IP Addressing Services Configuration Guide and the Cisco IOS IP Routing Protocols Configuration Guide. To display valid memory regions (memory mapping) in use on your system, use the show region command in privileged EXEC mode. Syntax Descriptionaddresshex- address (Optional) If a hexadecimal address is specified, this command will search the region list for the specified address. Command Default All memory regions are displayed. Command Modes Privileged EXEC (#) Command History. Release. Modification. This command was introduced. S This command was integrated into Cisco IOS Release 1. S. 1. 2. 2(2. 5)S This command was modified. The command output was updated to display information about free regions. SRA This command was integrated into Cisco IOS Release 1. SRA. 1. 2. 2(3. 3)SRE This command was modified. The output was updated to display heap region memory size in chunks of 1. MB. Usage Guidelines This command can be useful for troubleshooting system bus errors. The system encounters a bus error when the processor tries to access a memory location that either does not exist (a software error) or does not respond properly (a hardware problem). To use the show region command to troubleshoot a bus error, note the memory location address from the show version command, the show context command, or from the system error message that alerted you to the bus error. The show region command can then be used to determine if that address is a valid memory location. For example, in the output of the show version command after a system restart caused by a bus error, you will see output similar to "System restarted by bus error at PC 0x. EE5. 46, address 0x. BB4. C4." In this case, the memory location that the router tried to access is 0x. BB4. C4. If the address falls within one of the ranges in the show region output, it means that the router was accessing a valid memory address, but the hardware corresponding to that address is not responding properly. This indicates a hardware problem. If the address reported by the bus error does not fall within the ranges displayed in the show region output, this error means that the router was trying to access an address that is not valid, which indicates that it is a Cisco IOS software problem. More detailed information is available on Cisco. Tech Note #7. 94. Troubleshooting Bus Error Crashes. Transient Memory Allocation The Transient Memory Allocation feature is enabled on platforms like the Cisco 7. Cisco 1. 00. 00 series router. This feature allocates all transient memory in a separate memory address space (separate region), so that there is no interleaving of static and transient memory blocks. Hence, the output of the show region command will have heap region memory size in chunks of 1. MB. Examples The following is sample output from the show region command: Router# show region. Region Manager. Start End Size(b) Class Media Name. C0. 00. 00. 0 0x. FFFFFFF 6. 71. 08. Iomem R/W iomem. FFFFFFF 2. 68. 43. Local R/W extended_2. FFFFFFF 2. 68. 43. Local R/W extended_1. BFFFFFF 4. 69. 76. Local R/W main. 0x. F8 0x. 62. 00. A8. IText R/O main: text. C5. 0 0x. 62. F5. B1. EF 1. 60. 16. IData R/W main: data. F5. B1. F0 0x. 63. F 4. 03. 81. 76 IBss R/W main: bss. A0. D3 2. 51. 10. Local R/W main: saved- data. A0. D4 0x. 64. 59. A0. D3 1. 67. 77. Local R/W main: heap. B0. 00. 00. 0 0x. BFFFFFF 1. 67. 77. Local R/W main: heap. BFFFFFF 2. 01. 32. Local R/W main: (main_k. A0. 00. 00. 00 0x. ABFFFFFF 2. 01. 32. Local R/W main: (main_k. Free Region Manager. Start End Size(b) Class Media Name. A1. 2C 0x. 7AFFFFA7 3. Local R/W heap. Table 1. Table 1. 51 show region Field Descriptions. Field. Description. Start Start address of the memory block. End End address of the memory block. Size(b) Size of the memory block. Class Class of the memory. Media Type of the region media. Read- only (R/O), read- write (R/W), and so on. Name Name of the region. Iomem Input/output (I/O) memory. It is a type of packet memory. Local Local memory. IText Image text memory. IData Image data memory. IBss Image blind source separation (BSS) memory. R/W Read and write memory. R/O Read- only memory. Related Commands. Command. Descriptionshow context Displays information stored in NVRAM when an unexpected system reload (system exception) occurs. Displays detailed memory statistics for the system. Shows hardware and software information for the system. To display the function registry information when Cisco IOS or Cisco IOS Software Modularity images are running, use the show registry command in user EXEC or privileged EXEC mode. Cisco IOS Software show registry[registry- name [registry- number]] [brief | statistics] Cisco IOS Software Modularity show registry[name [registry- name [registry- number]]] [brief [name [registry- name[registry- number]]] |preemptions|rpcp status |statistics [brief] [name [registry- name [registry- number]]] [remote]] [process{process- name|process- id}] Syntax Description. Cisco IOS Software Syntax. Optional) Name of the registry to display. Optional) Number of the registry to display. Optional) Displays limited functions and services information. Optional) Displays function registry statistics. Intel Active Management Technology - Wikipedia. A part of the Intel AMT web management interface, accessible even when the computer is sleeping. Intel Active Management Technology (AMT) is hardware and firmware technology for remote out- of- band management of personal computers,[1][2][3][4][5] in order to monitor, maintain, update, upgrade, and repair them.[1]Out- of- band (OOB) or hardware- based management is different from software- based (or in- band) management and software management agents.[1][2]Hardware- based management works at a different level from software applications, and uses a communication channel (through the TCP/IP stack) that is different from software- based communication (which is through the software stack in the operating system). Hardware- based management does not depend on the presence of an OS or locally installed management agent. Hardware- based management has been available on Intel/AMD based computers in the past, but it has largely been limited to auto- configuration using DHCP or BOOTP for dynamic IP address allocation and diskless workstations, as well as wake- on- LAN (WOL) for remotely powering on systems.[6] AMT is not intended to be used by itself; it is intended to be used with a software management application.[1] It gives a management application (and thus, the system administrator who uses it) access to the PC down the wire, in order to remotely do tasks that are difficult or sometimes impossible when working on a PC that does not have remote functionalities built into it.[1][3][7]AMT is designed into a secondary (service) processor located on the motherboard,[8] and uses TLS- secured communication and strong encryption to provide additional security.[2] AMT is part of the Intel Management Engine, which is built into PCs with Intel v. Pro technology.[2] AMT has moved towards increasing support for DMTFDesktop and mobile Architecture for System Hardware (DASH) standards and AMT Release 5. DASH version 1. 0/1. AMT provides similar functionality to IPMI, although AMT is designed for client computing systems as compared with the typically server- based IPMI. Currently, AMT is available in desktops, servers, ultrabooks, tablets, and laptops with Intel Core v. Pro processor family, including Intel Core i. Intel Xeon processor E3- 1. Intel has confirmed a Remote Elevation of Privilege bug (CVE- 2. Management Technology, on 1 May 2. Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2. Kaby Lake in 2. 01. IME (Intel Management Engine).[1. Non- free service access[edit]Although i. AMT may be included for free in devices sold to the public and to small businesses, the full capabilities of i. AMT, including encrypted remote access via a public key certificate and automatic remote device provisioning of unconfigured i. AMT clients, are not accessible for free to the general public or to the direct owners of i. AMT equipped devices. AMT cannot be fully utilized to its maximum potential without purchasing additional software or management services from Intel or another 3rd partyindependent software vendor (ISV) or value added reseller (VAR). Intel itself provides a developer's toolkit software package which allows basic access to i. AMT, but is not intended to be normally used to access the technology.[1. Only basic modes of access are supported, without full access to the encrypted communications of the complete purchased management system.[1. Features[edit]Intel AMT includes hardware- based remote management, security, power management, and remote configuration features that enable independent remote access to AMT- enabled PCs.[1][7][1. Intel AMT is security and management technology that is built into PCs with Intel v. Pro technology.[1][6] PCs with Intel v. Pro include many other[clarification needed] "platform" (general PC) technologies and features.[citation needed]Intel AMT uses a hardware- based out- of- band (OOB) communication channel[1] that operates regardless of the presence of a working operating system. The communication channel is independent of the PC's power state, the presence of a management agent, and the state of many hardware components such as hard disk drives and memory. Most AMT features are available OOB, regardless of PC power state.[1] Other features require the PC to be powered up (such as console redirection via serial over LAN (SOL), agent presence checking, and network traffic filtering).[1] Intel AMT has remote power- up capability. Hardware- based features can be combined with scripting to automate maintenance and service.[1]Hardware- based AMT features on laptop and desktop PCs include: Encrypted, remote communication channel for network traffic between the IT console and Intel AMT.[1][2]Ability for a wired PC (physically connected to the network) outside the company's firewall on an open LAN to establish a secure communication tunnel (via AMT) back to the IT console.[1][2] Examples of an open LAN include a wired laptop at home or at an SMB site that does not have a proxy server. Remote power up / power down / power cycle through encrypted WOL.[1][2]Remote boot, via integrated device electronics redirect (IDE- R).[1][2]Console redirection, via serial over LAN (SOL).[1]Keyboard, video, mouse (KVM) over network. Hardware- based filters for monitoring packet headers in inbound and outbound network traffic for known threats (based on programmable timers), and for monitoring known / unknown threats based on time- based heuristics. Laptops and desktop PCs have filters to monitor packet headers. Desktop PCs have packet- header filters and time- based filters.[1][2][1. Isolation circuitry (previously and unofficially called "circuit breaker" by Intel) to port- block, rate- limit, or fully isolate a PC that might be compromised or infected.[1][2][1. Agent presence checking, via hardware- based, policy- based programmable timers. A "miss" generates an event; you can specify that the event generate an alert.[1][2][1. OOB alerting.[1][2]Persistent event log, stored in protected memory (not on the hard drive).[1][2]Access (preboot) the PC's universal unique identifier (UUID).[1][2]Access (preboot) hardware asset information, such as a component's manufacturer and model, which is updated every time the system goes through power- on self- test (POST).[1][2]Access (preboot) to third- party data store (TPDS), a protected memory area that software vendors can use, in which to version information, . DAT files, and other information.[1][2]Remote configuration options, including certificate- based zero- touch remote configuration, USB key configuration (light- touch), and manual configuration.[1][2][1. Protected Audio/Video Pathway for playback protection of DRM- protected media. Laptops with AMT also include wireless technologies: History[edit]Software updates provide upgrades to the next minor version of Intel AMT. New major releases of Intel AMT are built into a new chipset, and are updated through new hardware.[2]Applications[edit]Almost all AMT features are available even if the PC is in a powered- off state but with its power cord attached, if the operating system has crashed, if the software agent is missing, or if hardware (such as a hard drive or memory) has failed.[1][2] The console- redirection feature (SOL), agent presence checking, and network traffic filters are available after the PC is powered up.[1][2]Intel AMT supports these management tasks: Remotely power up, power down, power cycle, and power reset the computer.[1]Remote boot the PC by remotely redirecting the PC's boot process, causing it to boot from a different image, such as a network share, bootable CD- ROM or DVD, remediation drive, or other boot device.[1][7] This feature supports remote booting a PC that has a corrupted or missing OS. Remotely redirect the system's I/O via console redirection through serial over LAN (SOL).[1] This feature supports remote troubleshooting, remote repair, software upgrades, and similar processes. Access and change BIOS settings remotely.[1] This feature is available even if PC power is off, the OS is down, or hardware has failed. This feature is designed to allow remote updates and corrections of configuration settings. This feature supports full BIOS updates, not just changes to specific settings. Detect suspicious network traffic.[1][1.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
October 2017
Categories |