Cisco IOS-XR
General
Show Pending Commit Changes
show commit changes diff
Show all VLANs in a building
(might not be applicable if you don't work where I work)
show run int be 1[BLDG#].*
Find MAC Addresses in ARP Table
(must know VRF first)
show arp vrf r[0000] | inc [last4MAC]
Show DHCP Helper(s) for a VRF
show run | beg profile r1570 relay
Show Uptime of a Node/Linecard
admin show logging onboard uptime loc 1/0/CPU0
Packet Capture
On A9k:
Add monitor-session to the interface on which you wish to perform packet capture. If the monitor session is already on another interface, you may want to remove it from there first.
(config)# conf (config)# int be10121.910 (config-subif)# monitor-session rsb ethernet
On capture server (i.e., rsb-9k):
sudo tcpdump -ni p2p1 -w cap1.pcap
- -n
- don't resolve IP addresses
- -i
- specifies interfaces to listen on
- -w
- output file
Show any current monitor-sessions:
show monitor-session rsb status
Routing
Edit a Prefix List
edit prefix-list [prefix-list name] vim
Clear an ARP Entry
clear arp-cache bundle-ether 20011.2105 [A.B.C.D] location all
SFP/Optics
Show Optical Transceiver Info
show controllers Hu0/0/0/7 phy
Initial Config
OOB Management & SSH Config
hostname router-1 domain vrf management name davehome.net domain vrf management name-server 10.4.4.4 domain vrf management name-server 10.8.8.8 vrf management description OOB Management address-family ipv4 unicast ! ! control-plane management-plane out-of-band vrf management interface MgmtEth0/RP0/CPU0/0 root ! ! ! interface MgmtEth0/RP0/CPU0/0 vrf management ipv4 address 10.16.0.2 255.255.255.0 no shutdown ! router static vrf management address-family ipv4 unicast 0.0.0.0/0 10.16.0.1 ! ! ! ssh server v2 ssh server vrf management
TACACS Config
tacacs source-interface MgmtEth0/RP0/CPU0/0 vrf management aaa group server tacacs+ authservers vrf management server-private 10.9.1.1 port 49 key 0 <insert key here> ! server-private 10.9.2.2 port 49 key 0 <insert key here> ! ! aaa accounting exec default start-stop group authservers aaa accounting system default start-stop group authservers aaa accounting commands default start-stop group authservers aaa authorization exec default group authservers local aaa authorization commands default group authservers local aaa authentication login default group authservers local
Smart Licensing
1. In config mode:
call-home vrf management service active contact smart-licensing source-interface MgmtEth0/RP0/CPU0/0 profile CiscoTAC-1 active destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService destination transport-method http ! ! crypto ca trustpoint Trustpool vrf management
2. In exec mode:
Our NCS' didn't ship with all the CA's, so we downloaded them:
crypto ca trustpool import url http://www.cisco.com/security/pki/trs/ios.p7b
3. Check to make sure CA's were installed (should be more than five certs now):
show crypto ca trustpool
4. Now license the router:
license smart register idtoken <insert_token_here>
show license status