3Com Plumbing Product 3CRUS2475 User Manual

3Com® Unified Gigabit Wireless  
PoE Switch 24  
Command Reference Guide  
3CRUS2475  
www.3Com.com  
Part No. 10015248 Rev. AA  
Published October 2006  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING THE CLI  
1
Overview  
This document describes the Command Line Interface (CLI) used to  
manage the 3Com Unified Gigabit Wireless PoE switch.  
Most of the CLI commands are applicable to all devices.  
This chapter describes how to start using the CLI and the CLI command  
editing features.  
CLI Command Modes  
Introduction To assist in configuring the device, the Command Line Interface (CLI) is  
divided into different command modes. Each command mode has its  
own set of specific commands. Entering a question mark ? at the system  
prompt (console prompt) displays a list of commands available for that  
particular command mode.  
From each mode, a specific command is used to navigate from one  
command mode to another. The standard order to access the modes is as  
follows: User EXEC mode, Privileged EXEC mode, Global Configuration  
mode, and Interface Configuration mode.  
When starting a session, the initial mode is the User EXEC mode. Only a  
limited subset of commands are available in User EXEC mode. This level is  
reserved for tasks that do not change the configuration. To enter the next  
level, the Privileged EXEC mode, a password is required.  
The Privileged EXEC mode gives access to commands that are restricted  
on User EXEC mode and provides access to the device Configuration  
mode.  
The Global Configuration mode manages the device configuration on a  
global level.  
The Interface Configuration mode configures specific interfaces in the  
device.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
20  
CHAPTER 1: USING THE CLI  
User EXEC Mode After logging into the device, the user is automatically in User EXEC  
command mode unless the user is defined as a privileged user. In general,  
the User EXEC commands allow the user to perform basic tests, and list  
system information.  
The user-level prompt consists of the device host name followed by the  
angle bracket (>).  
Console>  
The default host name is Console unless it has been changed using the  
hostname command in the Global Configuration mode.  
Privileged EXEC Privileged access is password protected to prevent unauthorized use  
because many of the Privileged commands set operating system  
parameters. The password is not displayed on the screen and is case  
sensitive.  
Privileged users enter directly into the Privileged EXEC mode. To enter the  
Privileged EXEC mode from the User EXEC mode, perform the following  
steps:  
1 At the prompt enter the enable command and press <Enter>. A  
password prompt is displayed.  
2 Enter the password and press <Enter>. The password is displayed as *.  
The Privileged EXEC mode prompt is displayed. The Privileged EXEC mode  
prompt consists of the device host name followed by #.  
3 To return from the Privileged EXEC mode to the User EXEC mode, use the  
disable command.  
The following example illustrates how to access the Privileged EXEC  
mode and return to the User EXEC mode:  
Console> enable  
Enter Password: ******  
Console#  
Console# disable  
Console>  
4 The exit command is used to return from any mode to the previous  
mode except when returning to the User EXEC mode from the Privileged  
EXEC mode. For example, the exit command is used to return from the  
Interface Configuration mode to the Global Configuration mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Overview  
21  
Global Configuration Global Configuration mode commands apply to features that affect the  
Mode system as a whole, rather than just a specific interface. The configure  
Privileged EXEC mode command is used to enter the Global  
Configuration mode.  
To enter the Global Configuration mode perform the following steps:  
1 At the Privileged EXEC mode prompt, enter the configure command and  
press <Enter>. The Global Configuration mode prompt is displayed. The  
Global Configuration mode prompt consists of the device host name  
followed by (config) and #.  
Console(config)#  
2 To return from the Global Configuration mode to the Privileged EXEC  
mode, the user can use one of the following commands:  
exit  
end  
Ctrl+Z  
The following example illustrates how to access the Global Configuration  
mode and return to the Privileged EXEC mode:  
Console#  
Console# configure  
Console(config)# exit  
Console#  
Interface Interface Configuration mode commands modify specific interface  
Configuration and operations. The following are the Interface Configuration modes:  
Specific  
Line Interface — Contains commands to configure the management  
connections. These include commands such as line timeout settings,  
etc. The line Global Configuration mode command is used to enter  
the Line Configuration command mode.  
Configuration Modes  
VLAN Database — Contains commands to create a VLAN as a  
whole. The vlan database Global Configuration mode command is  
used to enter the VLAN Database Interface Configuration mode.  
Management Access List — Contains commands to define  
management access-lists. The management access-list Global  
Configuration mode command is used to enter the Management  
Access List Configuration mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
22  
CHAPTER 1: USING THE CLI  
Ethernet — Contains commands to manage port configuration. The  
interface ethernet Global Configuration mode command is used to  
enter the Interface Configuration mode to configure an Ethernet type  
interface.  
Port Channel — Contains commands to configure port-channels, for  
example, assigning ports to a port-channel. Most of these commands  
are the same as the commands in the Ethernet interface mode, and  
are used to manage the member ports as a single entity. The  
interface port-channel Global Configuration mode command is  
used to enter the Port Channel Interface Configuration mode.  
SSH Public Key-chain — Contains commands to manually specify  
other device SSH public keys. The crypto key pubkey-chain ssh  
Global Configuration mode command is used to enter the SSH Public  
Key-chain Configuration mode.  
QoS — Contains commands related to service definitions. The qos  
Global Configuration mode command is used to enter the QoS  
services configuration mode.  
MAC Access-List — Configures conditions required to allow traffic  
based on MAC addresses. The mac access-list Global Configuration  
mode command is used to enter the MAC access-list configuration  
mode.  
Starting the CLI  
The device can be managed over a direct connection to the device  
console port or via a Telnet connection. The device is managed by  
entering command keywords and parameters at the prompt. Using the  
device command-line interface (CLI) is very similar to entering commands  
on a UNIX system.  
If access is via a Telnet connection, ensure that the device has a defined IP  
address, corresponding management access is granted, and the  
workstation used to access the device is connected to the device prior to  
using CLI commands.  
The following instructions are for use on the console line only.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Editing Features  
23  
To start using the CLI, perform the following steps:  
1 Connect the DB9 null-modem or cross over cable to the RS-232 serial  
port of the device to the RS-232 serial port of the terminal or computer  
running the terminal emulation application.  
a Set the data format to 8 data bits, 1 stop bit, and no parity.  
b Set Flow Control to none.  
c Under Properties, select VT100 for Emulation mode.  
d Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure  
that the setting is for Terminal keys (not Windows keys).  
Note: When using HyperTerminal with Microsoft® Windows 2000,  
ensure that Windows® 2000 Service Pack 2 or later is installed.With  
Windows 2000 Service Pack 2, the arrow keys function properly in  
HyperTerminal’s VT100 emulation. Go to www.microsoft.com for  
information on Windows 2000 service packs.  
2 Enter the following commands to begin the configuration procedure:  
Console> enable  
Console# configure  
Console(config)#  
3 Configure the device and enter the necessary commands to complete the  
required tasks.  
4 When finished, exit the session with the exit command.  
When a different user is required to log onto the system, use the login  
Privileged EXEC mode command. This effectively logs off the current user  
and logs on the new user.  
Editing Features  
Entering Commands A CLI command is a series of keywords and arguments. Keywords identify  
a command, and arguments specify configuration parameters. For  
example, in the command show interfaces status ethernet g11,  
show, interfaces and status are keywords, ethernet is an argument  
that specifies the interface type, and g11 specifies the port.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
24  
CHAPTER 1: USING THE CLI  
To enter commands that require parameters, enter the required  
parameters after the command keyword. For example, to set a password  
for the administrator, enter:  
Console(config)# username admin password alansmith  
When working with the CLI, the command options are not displayed. The  
command is not selected from a menu, but is manually entered. To see  
what commands are available in each mode or within an Interface  
Configuration, the CLI does provide a method of displaying the available  
commands, the command syntax requirements and in some instances  
parameters required to complete the command. The standard command  
to request help is ?.  
There are two instances where help information can be displayed:  
Keyword lookup — The character ? is entered in place of a  
command. A list of all valid commands and corresponding help  
messages are is displayed.  
Partial keyword lookup — If a command is incomplete and or the  
character ? is entered in place of a parameter. The matched keyword  
or parameters for this command are displayed.  
To assist in using the CLI, there is an assortment of editing features. The  
following features are described:  
Terminal Command Buffer  
Command Completion  
Nomenclature  
Keyboard Shortcuts  
Terminal Command Buffer  
Every time a command is entered in the CLI, it is recorded on an internally  
managed Command History buffer. Commands stored in the buffer are  
maintained on a First In First Out (FIFO) basis. These commands can be  
recalled, reviewed, modified, and reissued. This buffer is not preserved  
across device resets.  
Table 1:  
Keyword  
Table 2:  
Description  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Editing Features  
25  
Up-arrow key  
Ctrl+P  
Recalls commands in the history buffer,  
beginning with the most recent  
command. Repeats the key sequence  
to recall successively older commands.  
Down-arrow key  
Returns to more recent commands in  
the history buffer after recalling  
commands with the up-arrow key.  
Repeating the key sequence will recall  
successively more recent commands.  
By default, the history buffer system is enabled, but it can be disabled at  
any time. For information about the command syntax to enable or disable  
the history buffer, see history.  
There is a standard default number of commands that are stored in the  
buffer. The standard number of 10 commands can be increased to 216.  
By configuring 0, the effect is the same as disabling the history buffer  
system. For information about the command syntax for configuring the  
command history buffer, see history size.  
To display the history buffer, see “show history”.  
Negating the Effect of Commands  
For many configuration commands, the prefix keyword no can be  
entered to cancel the effect of a command or reset the configuration to  
the default value. This guide describes the negation effect for all  
applicable commands.  
Command Completion  
If the command entered is incomplete, invalid or has missing or invalid  
parameters, then the appropriate error message is displayed. This assists  
in entering the correct command. By pressing the <Tab> button, an  
incomplete command is entered. If the characters already entered are not  
enough for the system to identify a single matching command, press ? to  
display the available commands matching the characters already entered.  
Nomenclature  
When referring to an Ethernet port in a CLI command, the following  
format is used:  
For an Ethernet port: Ethernet_type port_number  
The Ethernet type may be Gigabit Ethernet (indicated by “g”).  
For example, g3 stands for Gigabit Ethernet port 3 on the device.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
26  
CHAPTER 1: USING THE CLI  
The ports may be described on an individual basis or within a range. Use  
format port number-port number to specify a set of consecutive ports  
and port number, port number to indicates a set of non-consecutive  
ports. For example, g1-3 stands for Gigabit Ethernet ports 1, 2 and 3, and  
g1,5 stands for Gigabit Ethernet ports 1 and 5.  
Keyboard Shortcuts  
The CLI has a range of keyboard shortcuts to assist in editing the CLI  
commands. The following table describes the CLI shortcuts.  
Table 3:  
Keyboard Key  
Table 4:  
Description  
Up-arrow key  
Recalls commands from the history  
buffer, beginning with the most recent  
command. Repeat the key sequence to  
recall successively older commands.  
Down-arrow key  
Returns the most recent commands  
from the history buffer after recalling  
commands with the up arrow key.  
Repeating the key sequence will recall  
successively more recent commands.  
Ctrl+A  
Moves the cursor to the beginning of  
the command line.  
Ctrl+E  
Moves the cursor to the end of the  
command line.  
Ctrl+Z / End  
Backspace key  
Returns back to the Privileged EXEC  
mode from any configuration mode.  
Deletes one character left to the cursor  
position.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Editing Features  
27  
CLI Command Conventions  
When entering commands there are certain command entry standards  
that apply to all commands. The following table describes the command  
conventions.  
Convention  
Description  
[ ]  
In a command line, square brackets  
indicates an optional entry.  
{ }  
In a command line, curly brackets  
indicate a selection of compulsory  
parameters separated by the |  
character. One option must be  
selected. For example: flowcontrol  
{auto|on|off} means that for the  
flowcontrol command either auto,  
on or off must be selected.  
Italic font  
Indicates a parameter.  
<Enter>  
Indicates an individual key on the  
keyboard. For example, <Enter>  
indicates the Enter key.  
Ctrl+F4  
Any combination keys pressed  
simultaneously on the keyboard.  
Screen Display  
Indicates system messages and  
prompts appearing on the console.  
all  
When a parameter is required to define  
a range of ports or parameters and all  
is an option, the default for the  
command is all when no parameters  
are defined. For example, the  
command interface range  
port-channel has the option of either  
entering a range of channels, or  
selecting all. When the command is  
entered without a parameter, it  
automatically defaults to all.  
Copying and Pasting Up to 1000 lines of text (or commands) can be copied and pasted into  
Text the device.  
It is the user’s responsibility to ensure that the text copied into the device  
consists of legal commands only.  
This feature is dependent on the baud rate of the device.  
When copying and pasting commands from a configuration file, make  
sure that the following conditions exist:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
28  
CHAPTER 1: USING THE CLI  
A device Configuration mode has been accessed.  
The commands contain no encrypted data, like encrypted passwords  
or keys. Encrypted data cannot be copied and pasted into the device.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
AAA COMMANDS  
2
aaa authentication  
login  
The aaa authentication login Global Configuration mode command  
defines login authentication. To restore defaults, use the no form of this  
command.  
Syntax  
aaa authentication login {default | list-name} method1 [method2...]  
no aaa authentication login {default | list-name}  
Parameters  
default — Uses the listed authentication methods that follow this  
argument as the default list of methods when a user logs in.  
list-name — Character string used to name the list of authentication  
methods activated when a user logs in. (Range: 1-12 characters)  
method1 [method2...] — Specify at least one method from the  
following list:  
Keyword  
enable  
line  
Description  
Uses the enable password for authentication.  
Uses the line password for authentication.  
Uses the local username database for authentication.  
Uses no authentication.  
local  
none  
radius  
tacacs  
Uses the list of all RADIUS servers for authentication.  
Uses the list of all TACACS+ servers for authentication.  
Default Configuration  
The local user database is checked. This has the same effect as the  
command aaa authentication login list-name local.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
30  
CHAPTER 2: AAA COMMANDS  
On the console, login succeeds without any authentication check if the  
authentication method is not defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
The default and optional list names created with the aaa authentication  
login command are used with the login authentication command.  
Create a list by entering the aaa authentication login list-name method  
command for a particular protocol, where list-name is any character  
string used to name this list. The method argument identifies the list of  
methods that the authentication algorithm tries, in the given sequence.  
The additional methods of authentication are used only if the previous  
method returns an error, not if it fails. To ensure that the authentication  
succeeds even if all methods return an error, specify none as the final  
method in the command line.  
Example  
The following example configures the authentication login.  
Console(config)# aaa authentication  
login default radius tacacs enable line local none  
aaa authentication  
enable  
The aaa authentication enable Global Configuration mode command  
defines authentication method lists for accessing higher privilege levels.  
To restore defaults, use the no form of this command.  
Syntax  
aaa authentication enable {default | list-name} method1 [method2...]  
no aaa authentication enable {default | list-name}  
Parameters  
default — Uses the listed authentication methods that follow this  
argument as the default list of methods, when using higher privilege  
levels.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
aaa authentication enable  
31  
list-name — Character string used to name the list of authentication  
methods activated, when using access higher privilege levels. (Range:  
1-12 characters)  
method1 [method2...] — Specify at least one method from the  
following list:  
Keyword  
enableT  
line  
Description  
Uses the enable password for authentication.  
Uses the line password for authentication.  
Uses no authentication.  
none  
radius  
Uses the list of all RADIUS servers for authentication.  
Uses username $enabx$., where x is the privilege level.  
Uses the list of all TACACS+ servers for authentication.  
Uses username "$enabx$." where x is the privilege level.  
tacacs  
Default Configuration  
I
If the default list is not set, only the enable password is checked. This has  
the same effect as the command aaa authentication enable default  
enable.  
On the console, the enable password is used if it exists. If no password is  
set, the process still succeeds. This has the same effect as using the  
command aaa authentication enable default enable none.  
Command Mode  
Global Configuration mode  
User Guidelines  
The default and optional list names created with the aaa authentication  
enable command are used with the enable authentication command.  
The additional methods of authentication are used only if the previous  
method returns an error, not if it fails. To ensure that the authentication  
succeeds even if all methods return an error, specify none as the final  
method in the command line.  
All aaa authentication enable default requests sent by the device to a  
RADIUS or TACACS+ server include the username $enabx$., where x is  
the requested privilege level.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
32  
CHAPTER 2: AAA COMMANDS  
The following example sets the enable password for authentication when  
accessing higher privilege levels.  
Console(config)# aaa authentication enable default enable  
login  
authentication  
The login authentication Line Configuration mode command specifies  
the login authentication method list for a remote telnet or console. To  
restore the default configuration specified by the aaa authentication  
login command, use the no form of this command.  
Syntax  
Login authentication {default | list-name}  
no login authentication  
Parameters  
default — Uses the default list created with the aaa authentication  
login command.  
list-name — Uses the indicated list created with the aaa  
authentication login command.  
Default Configuration  
Uses the default set with the command aaa authentication login.  
Command Mode  
Line Configuration mode  
User Guidelines  
To change (or rename) an authentication method, use the negate  
command and create a new rule with the new method name.  
Example  
The following example specifies the default authentication method for a  
console.  
Console(config)# line console  
Console(config-line)# login authentication default  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
enable authentication  
33  
enable  
authentication  
The enable authentication Line Configuration mode command  
specifies the authentication method list when accessing a higher privilege  
level from a remote Telnet or console. To restore the default configuration  
specified by the aaa authentication enable command, use the no form  
of this command.  
Syntax  
enable authentication {default | list-name}  
no enable authentication  
Parameters  
default — Uses the default list created with the aaa authentication  
enable command.  
list-name — Uses the indicated list created with the aaa  
authentication enable command.  
Default Configuration  
Uses the default set with the aaa authentication enable command.  
Command Mode  
Line Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example specifies the default authentication method when  
accessing a higher privilege level from a console.  
Console(config)# line console  
Console(config-line)# enable authentication default  
ip http  
authentication  
The ip http authentication Global Configuration mode command  
specifies authentication methods for HTTP server users. To restore the  
default configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
34  
CHAPTER 2: AAA COMMANDS  
Syntax  
ip http authentication method1 [method2...]  
no ip http authentication  
Parameters  
Method1 [method2...] — Specify at least one method from the  
following list:  
Keyword  
local  
Description  
Uses the local username database for authentication.  
Uses no authentication.  
none  
radius  
tacacs  
Uses the list of all RADIUS servers for authentication.  
Uses the list of all TACACS+ servers for  
authentication.  
Default Configuration  
The local user database is checked. This has the same effect as the  
command ip http authentication local.  
Command Mode  
Global Configuration mode  
User Guidelines  
The additional methods of authentication are used only if the previous  
method returns an error, not if it fails. To ensure that the authentication  
succeeds even if all methods return an error, specify none as the final  
method in the command line.  
Example  
The following example configures the HTTP authentication.  
Console(config)# ip http authentication radius tacacs local  
none  
ip https  
authentication  
The ip https authentication Global Configuration mode command  
specifies authentication methods for HTTPS server users. To restore the  
default configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show authentication methods  
35  
Syntax  
ip https authentication method1 [method2...]  
no ip https authentication  
Parameters  
method1 [method2...] — Specify at least one method from the  
following list:  
Keyword  
local  
Source or Destination  
Uses the local username database for authentication.  
Uses no authentication.  
none  
radius  
tacacs  
Uses the list of all RADIUS servers for authentication.  
Uses the list of all TACACS+ servers for authentication.  
Default Configuration  
The local user database is checked. This has the same effect as the  
command ip https authentication local.  
Command Mode  
Global Configuration mode  
User Guidelines  
The additional methods of authentication are used only if the previous  
method returns an error, not if it fails. To ensure that the authentication  
succeeds even if all methods return an error, specify none as the final  
method in the command line.  
Example  
The following example configures HTTPS authentication.  
Console(config)# ip https authentication radius tacacs local  
none  
show  
authentication  
methods  
The show authentication methods Privileged EXEC mode command  
displays information about the authentication methods.  
Syntax  
show authentication methods  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
36  
CHAPTER 2: AAA COMMANDS  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the authentication configuration.  
Console# show authentication methods  
Login Authentication Method Lists  
---------------------------------  
Default: Local  
Enable Authentication Method Lists  
----------------------------------  
Default: Radius, Enable  
Console_Enable: Enable, None  
Line  
Login Method List  
-----------------  
Default  
Enable Method List  
------------------  
Default  
--------------  
Console  
Telnet  
Default  
Default  
SSH  
Default  
Default  
http: Local  
https: Local  
dot1x:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
password  
37  
password  
The password Line Configuration mode command specifies a password  
on a line. To remove the password, use the no form of this command.  
Syntax  
password password [encrypted]  
no password  
Parameters  
password — Password for this level. (Range: 1-159 characters)  
encrypted — Encrypted password to be entered, copied from  
another device configuration.  
Default Configuration  
No password is defined.  
Command Mode  
Line Configuration mode  
User Guidelines  
If a password is defined as encrypted, the required password length is 32  
characters.  
Example  
The following example specifies the password called ‘secret’ on a console.  
Console(config)# line console  
Console(config-line)# password secret  
enable password  
The enable password Global Configuration mode command sets a local  
password to control access to user and privilege levels. To remove the  
password requirement, use the no form of this command.  
Syntax  
enable password [level level] password [encrypted]  
no enable password [level level]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
38  
CHAPTER 2: AAA COMMANDS  
Parameters  
password — Password for this level. (Range: 1-159 characters)  
level — Level for which the password applies. If not specified the level  
is 15  
(Range: 1-15).  
encrypted — Encrypted password entered, copied from another  
device configuration.  
Default Configuration  
No enable password is defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets a local level 15 password called ‘secret’ to  
control access to user and privilege levels. .  
Console(config)# enable password secret level 15  
username  
The username Global Configuration mode command creates a user  
account in the local database. To remove a user name, use the no form of  
this command.  
Syntax  
username name [password password] [level level] [encrypted]  
no username name  
Parameters  
name — The name of the user. (Range: 1-20 characters)  
password — The authentication password for the user. (Range: 1-159  
characters)  
level — The user level (Range: 1-15). If a level is not specified, the level  
is automaically set to 1.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
username  
39  
encrypted — Encrypted password entered, copied from another  
device configuration.  
Default Configuration  
No user is defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
User account can be created without a password.  
Example  
The following example configures user called bob with password ‘lee’  
and user level 15 to the system.  
Console(config)# username bob password lee level 15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
40  
CHAPTER 2: AAA COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACL COMMANDS  
3
ip access-list  
The ip access-list Global Configuration mode command enables the  
IP-Access Configuration mode and creates Layer 3 ACLs. To delete an  
ACL, use the no form of this command.  
Syntax  
ip access-list name  
no ip access-list name  
Parameters  
name — Specifies the name of the ACL. (Range: 0-32 characters)  
Default Configuration  
The default for all ACLs is deny-all.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example shows how to create an IP ACL.  
Console(config)# ip access-list ip-acl1  
Console(config-ip-al)#  
permit (ip)  
The permit IP-Access List Configuration mode command permits traffic if  
the conditions defined in the permit statement match.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
42  
CHAPTER 3: ACL COMMANDS  
Syntax  
permit {any | protocol} {any | {source source-wildcard}} {any |  
{destination destination-wildcard}} [dscp dscp number | ip-precedence  
ip-precedence]  
permit-icmp {any | {source source-wildcard}} {any | {destination  
destination-wildcard}} {any | icmp-type} {any | icmp-code} [dscp number |  
ip-precedence number]  
permit-igmp {any | {source source-wildcard}} {any | {destination  
destination-wildcard}} {any | igmp-type} [dscp number | ip-precedence  
number]  
permit-tcp {any | {source source-wildcard}} {any | source-port} {any  
|{destination destination-wildcard}} {any | destination-port} [dscp number  
| ip-precedence number] [flags list-of-flags]  
permit-udp {any | {source source-wildcard}} {any | source-port} {any |  
{destination destination-wildcard}} {any | destination-port} [dscp number  
| ip-precedence number]  
Parameters  
source — Specifies the source IP address of the packet. Specify any to  
indicate IP address 0.0.0.0 and mask 255.255.255.255.  
source-wildcard — Specifies wildcard to be applied to the source IP  
address. Use 1s in bit positions to be ignored. Specify any to indicate  
IP address 0.0.0.0 and mask 255.255.255.255.  
destination — Specifies the destination IP address of the packet.  
Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255.  
destination-wildcard — Specifies wildcard to be applied to the  
destination IP address. Use 1s in bit positions to be ignored. Specify  
any to indicate IP address 0.0.0.0 and mask 255.255.255.255.  
protocol — Specifies the abbreviated name or number of an IP  
protocol. (Range: 0-255)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
permit (ip)  
43  
The following table lists the protocols that can be specified:  
Protocol  
IP Protocol  
Abbreviated Name  
Number  
1
Internet Control Message Protocol  
Internet Group Management Protocol  
IP in IP (encapsulation) Protocol  
Transmission Control Protocol  
Exterior Gateway Protocol  
Interior Gateway Protocol  
User Datagram Protocol  
Host Monitoring Protocol  
Reliable Data Protocol  
icmp  
igmp  
ipinip  
tcp  
2
4
6
egp  
8
igp  
9
udp  
17  
hmp  
rdp  
20  
27  
Inter-Domain Policy Routing Protocol  
Ipv6 protocol  
idpr  
35  
ipv6  
41  
Routing Header for IPv6  
Fragment Header for IPv6  
Inter-Domain Routing Protocol  
Reservation Protocol  
ipv6-route  
ipv6-frag  
idrp  
43  
44  
45  
rsvp  
46  
General Routing Encapsulation  
Encapsulating Security Payload (50)  
Authentication Header  
gre  
47  
esp  
50  
ah  
51  
ICMP for IPv6  
ipv6-icmp  
eigrp  
ospf  
pim  
58  
EIGRP routing protocol  
88  
Open Shortest Path Protocol  
Protocol Independent Multicast  
Layer Two Tunneling Protocol  
ISIS over IPv4  
89  
103  
115  
124  
(25504)  
l2tp  
isis  
(any IP protocol)  
any  
dscp — Indicates matching the dscp number with the packet dscp  
value.  
ip-precedence — Indicates matching ip-precedence with the packet  
ip-precedence value.  
icmp-type — Specifies an ICMP message type for filtering ICMP  
packets. Enter a value or one of the following values: echo-reply,  
destination-unreachable, source-quench, redirect,  
Download from Www.Somanuals.com. All Manuals Search And Download.  
44  
CHAPTER 3: ACL COMMANDS  
alternate-host-address, echo-request, router-advertisement,  
router-solicitation, time-exceeded, parameter-problem,  
timestamp, timestamp-reply, information-request,  
information-reply, address-mask-request, address-mask-reply,  
traceroute, datagram-conversion-error, mobile-host-redirect,  
ipv6-where-are-you, ipv6-i-am-here,  
mobile-registration-request, mobile-registration-reply,  
domain-name-request, domain-name-reply, skip and photuris.  
(Range: 0-255)  
icmp-code — Specifies an ICMP message code for filtering ICMP  
packets. ICMP packets that are filtered by ICMP message type can also  
be filtered by the ICMP message code. (Range: 0-255)  
igmp-type — IGMP packets can be filtered by IGMP message type.  
Enter a number or one of the following values: dvmrp, host-query,  
host-report, pim or trace. (Range: 0-255)  
destination-port — Specifies the UDP/TCP destination port. (Range:  
0-65535)  
source-port — Specifies the UDP/TCP source port. (Range: 0-65535)  
list-of-flags — Specifies a list of TCP flags that can be triggered. If a  
flag is set, it is prefixed by “+”. If a flag is not set, it is prefixed by “-”.  
The possible values are: +urg, +ack, +psh, +rst, +syn, +fin, -urg,  
-ack, -psh, -rst, -syn and -fin. The flags are concatenated into one  
string. For example: +fin-ack.  
Default Configuration  
No IPv4 ACL is defined.  
Command Mode  
IP-Access List Configuration mode  
User Guidelines  
Use the ip access-list Global Configuration mode command to enable  
the IP-Access List Configuration mode.  
Before an Access Control Element (ACE) is added to an ACL, all packets  
are permitted. After an ACE is added, an implied deny-any-any  
condition exists at the end of the list and those packets that do not match  
the conditions defined in the permit statement are denied.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
deny (IP)  
45  
Example  
The following example shows how to define a permit statement for an IP  
ACL.  
Console(config)# ip access-list ip-acl1  
Console(config-ip-al)# permit rsvp 192.1.1.1 0.0.0.0 any dscp56  
deny (IP)  
The deny IP-Access List Configuration mode command denies traffic if  
the conditions defined in the deny statement match.  
Syntax  
deny [disable-port] {any | protocol} {any | {source source-wildcard}}  
{any | {destination destination-wildcard}} [dscp dscp number |  
ip-precedence ip-precedence]  
deny-icmp  
deny-igmp  
deny-tcp  
deny-udp  
Parameters  
disable-port — Specifies that the port is disabled.  
source — Specifies the IP address or host name from which the packet  
was sent. Specify any to indicate IP address 0.0.0.0 and mask  
255.255.255.255.  
source-wildcard — (Optional for the first type) Specifies wildcard bits  
by placing 1s in bit positions to be ignored. Specify any to indicate IP  
address 0.0.0.0 and mask 255.255.255.255.  
destination — Specifies the IP address or host name to which the  
packet is being sent. Specify any to indicate IP address 0.0.0.0 and  
mask 255.255.255.255.  
destination-wildcard — (Optional for the first type) Specifies wildcard  
bits by placing 1s in bit positions to be ignored. Specify any to  
indicate IP address 0.0.0.0 and mask 255.255.255.255.  
protocol — Specifies the abbreviated name or number of an IP  
protocol. The following table lists protocols that can be specified:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
46  
CHAPTER 3: ACL COMMANDS  
Abbreviated  
Name  
Protocol  
Number  
IP Protocol  
Internet Control Message Protocol  
Internet Group Management Protocol  
IP in IP (encapsulation) Protocol  
Transmission Control Protocol  
Exterior Gateway Protocol  
Interior Gateway Protocol  
User Datagram Protocol  
icmp  
igmp  
ip  
1
2
4
tcp  
6
egp  
8
igp  
9
udp  
17  
20  
27  
35  
41  
43  
44  
45  
46  
47  
50  
51  
58  
88  
89  
94  
103  
115  
124  
(25504)  
Host Monitoring Protocol  
Reliable Data Protocol  
hmp  
rdp  
Inter-Domain Policy Routing Protocol  
Ipv6 protocol  
idpr  
ipv6  
ipv6-route  
ipv6-frag  
idrp  
Routing Header for IPv6  
Fragment Header for IPv6  
Inter-Domain Routing Protocol  
Reservation Protocol  
rsvp  
gre  
General Routing Encapsulation  
Encapsulating Security Payload (50)  
Authentication Header  
esp  
ah  
ICMP for IPv6  
ipv6-icmp  
eigrp  
ospf  
ipip  
EIGRP routing protocol  
Open Shortest Path Protocol  
IP-within-IP Encapsulation Protocol  
Protocol Independent Multicast  
Layer Two Tunneling Protocol  
ISIS over IPv4  
pim  
l2tp  
isis  
(any IP protocol)  
any  
dscp — Indicates matching the dscp number with the packet dscp  
value.  
ip-precedence — Indicates matching ip-precedence with the packet  
ip-precedence value.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
mac access-list  
47  
Default Configuration  
This command has no default configuration  
Command Mode  
IP-Access List Configuration mode  
User Guidelines  
Use the ip access-list Global Configuration mode command to enable  
the IP-Access List Configuration mode.  
Before an Access Control Element (ACE) is added to an ACL, all packets  
are permitted. After an ACE is added, an implied deny-any-any  
condition exists at the end of the list and those packets that do not match  
the defined conditions are denied.  
Example  
The following example shows how to define a permit statement for an IP  
ACL.  
Console(config)# ip access-list ip-acl1  
Console(config-ip-al)# deny rsvp 192.1.1.1 0.0.0.255 any  
mac access-list  
The mac access-list Global Configuration mode command enables the  
MAC-Access List Configuration mode and creates Layer 2 ACLs. To delete  
an ACL, use the no form of this command.  
Syntax  
mac access-list name  
no mac access-list name  
Parameters  
name — Specifies the name of the ACL. (Range: 0-32 characters)  
Default Configuration  
The default for all ACLs is deny all.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
48  
CHAPTER 3: ACL COMMANDS  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example shows how to create a MAC ACL.  
Console(config)# mac access-list macl-acl1  
Console(config-mac-al)#  
permit (MAC)  
The permit MAC-Access List Configuration mode command defines  
permit conditions of an MAC ACL.  
Syntax  
permit {any | {host source source-wildcard} any | {destination  
destination-wildcard}} [vlan vlan-id] [cos cos cos-wildcard] [ethtype  
eth-type]  
Parameters  
source — Specifies the source MAC address of the packet.  
source-wildcard — Specifies wildcard bits to be applied to the source  
MAC address. Use 1s in bit positions to be ignored.  
destination — Specifies the MAC address of the host to which the  
packet is being sent.  
destination-wildcard — Specifies wildcard bits to be applied to the  
destination MAC address. Use 1s in bit positions to be ignored.  
vlan-id — Specifies the ID of the packet vlan. (Range: 0-4095)  
cos — Specifies the Class of Service (CoS) for the packet. (Range: 0-7)  
cos-wildcard — Specifies wildcard bits to be applied to the CoS.  
eth-type — Specifies the Ethernet type of the packet .(Range:  
0-65535)  
Default Configuration  
No MAC ACL is defined.  
Command Mode  
MAC-Access List Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
deny (MAC)  
49  
User Guidelines  
Before an Access Control Element (ACE) is added to an ACL, all packets  
are permitted. After an ACE is added, an implied deny-any-any  
condition exists at the end of the list and those packets that do not match  
the conditions defined in the permit statement are denied.  
If the VLAN ID is specified, the policy map cannot be connected to the  
VLAN interface.  
Example  
The following example shows how to create a MAC ACL with permit  
rules.  
Console(config)# mac access-list macl-acl1  
Console(config-mac-al)# permit 6:6:6:6:6:6 0:0:0:0:0:0 any  
vlan 6  
deny (MAC)  
The deny MAC-Access List Configuration mode command denies traffic  
if the conditions defined in the deny statement match.  
Syntax  
deny [disable-port] {any | {source source-wildcard} {any | {destination  
destination- wildcard}}[vlan vlan-id] [cos cos cos-wildcard] [ethtype  
eth-type]  
Parameters  
disable-port — Indicates that the port is disabled if the statement is  
deny.  
source — Specifies the MAC address of the host from which the  
packet was sent.  
source-wildcard — (Optional for the first type) Specifies wildcard bits  
by placing 1s in bit positions to be ignored.  
destination — Specifies the MAC address of the host to which the  
packet is being sent.  
destination-wildcard — (Optional for the first type) Specifies wildcard  
bits by placing 1s in bit positions to be ignored.  
vlan-id — Specifies the ID of the packet vlan.  
cos — Specifies the packetss Class of Service (CoS).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
50  
CHAPTER 3: ACL COMMANDS  
cos-wildcard — Specifies wildcard bits to be applied to the CoS.  
eth-type — Specifies the packets Ethernet type.  
Default Configuration  
This command has no default configuration.  
Command Mode  
MAC-Access List Configuration mode  
User Guidelines  
MAC BPDU packets cannot be denied.  
This command defines an Access Control Element (ACE). An ACE can  
only be removed by deleting the ACL, using the no mac access-list  
Global Configuration mode command. Alternatively, the Web-based  
interface can be used to delete ACEs from an ACL.  
Before an Access Control Element (ACE) is added to an ACL, all packets  
are permitted. After an ACE is added, an implied deny-any-any  
condition exists at the end of the list and those packets that do not match  
the conditions defined in the permit statement are denied.  
If the VLAN ID is specified, the policy map cannot be connected to the  
VLAN interface.  
Example  
The following example shows how to create a MAC ACL with deny rules  
on a device.  
Console(config)# mac access-list macl1  
Console (config-mac-acl)# deny 6:6:6:6:6:6:0:0:0:0:0:0 any  
service-acl  
The service-acl Interface Configuration mode command applies an ACL  
to the input interface. To detach an ACL from an input interface, use the  
no form of this command.  
Syntax  
service-acl {input acl-name}  
no service-acl {input}  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show access-lists  
51  
Parameters  
acl-name—Specifies the ACL to be applied to the input interface.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Interface (Ethernet, port-channel) Configuration mode.  
User Guidelines  
In advanced mode, when an ACL is bound to an interface, the port trust  
mode is set to trust 12-13 and not to 12.  
Example  
The following example binds (services) an ACL to VLAN 2.  
Console(config)# interface vlan  
2
Console(config-if)# service-acl input macl1  
show access-lists  
The show access-lists Privileged EXEC mode command displays access  
control lists (ACLs) defined on the device.  
Syntax  
show access-lists [name]  
Parameters  
name — The name of the ACL.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
52  
CHAPTER 3: ACL COMMANDS  
Example  
The following example displays access lists defined on a device.  
Console# show access-lists  
IP access list ACL1  
permit ip host 172.30.40.1 any  
permit rsvp host 172.30.8.8 any  
show interfaces  
access-lists  
The show interfaces access-lists Privileged EXEC mode command  
displays access lists applied on interfaces.  
Syntax  
show interfaces access-lists [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — Valid Ethernet port.  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show interfaces access-lists  
53  
Example  
The following example displays ACLs applied to the interfaces of a device:  
Console# show interfaces access-lists  
Interface  
---------  
g1  
Input ACL  
---------  
ACL1  
g1  
ACL3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
54  
CHAPTER 3: ACL COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ADDRESS TABLE COMMANDS  
4
bridge address  
The bridge address Interface Configuration (VLAN) mode command  
adds a MAC-layer station source address to the bridge table. To delete  
the MAC address, use the no form of this command.  
Syntax  
bridge address mac-address {ethernet interface | port-channel  
port-channel-number} [permanent | delete-on-reset |  
delete-on-timeout | secure]  
no bridge address [mac-address]  
Parameters  
mac-address — A valid MAC address.  
interface — A valid Ethernet port.  
port-channel-number — A valid port-channel number.  
permanent — The address can only be deleted by the no bridge  
address command.  
delete-on-reset — The address is deleted after reset.  
delete-on-timeout — The address is deleted after "age out" time  
has expired.  
secure — The address is deleted after the port changes mode to  
unlock learning (no port security command). This parameter is only  
available when the port is in the learning locked mode.  
Default Configuration  
No static addresses are defined. The default mode for an added address is  
permanent.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
56  
CHAPTER 4: ADDRESS TABLE COMMANDS  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
Using the no form of the command without specifying a MAC address  
deletes all static MAC addresses belonging to this VLAN).  
Example  
The following example adds a permanent static MAC-layer station source  
address 3aa2.64b3.a245 on port 1 to the bridge table.  
Console(config)# interface vlan  
2
Console(config-if)# bridge address 3aa2.64b3.a245 ethernet g16  
permanent  
bridge multicast  
filtering  
The bridge multicast filtering Global Configuration mode command  
enables filtering multicast addresses. To disable filtering multicast  
addresses, use the no form of this command.  
Syntax  
bridge multicast filtering  
no bridge multicast filtering  
Default Configuration  
Filtering multicast addresses is disabled. All multicast addresses are  
flooded to all ports.  
Command Mode  
Global Configuration mode  
User Guidelines  
If multicast devices exist on the VLAN, do not change the unregistered  
multicast addresses state to drop on the switch ports.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
bridge multicast address  
57  
If multicast devices exist on the VLAN and IGMP-snooping is not enabled,  
the bridge multicast forward-all command should be used to enable  
forwarding all multicast packets to the multicast switches.  
Example  
In the folowing example, bridge multicast filtering is enabled.  
Console(config)# bridge multicast filtering  
bridge multicast  
address  
The bridge multicast address Interface Configuration (VLAN) mode  
command registers a MAC-layer multicast address in the bridge table and  
statically adds ports to the group. To unregister the MAC address, use the  
no form of this command.  
Syntax  
bridge multicast address {mac-multicast-address | ip-multicast-address}  
bridge multicast address {mac-multicast-address | ip-multicast-address}  
[add | remove] {ethernet interface-list | port-channel  
port-channel-number-list}  
no bridge multicast address {mac-multicast-address |  
ip-multicast-address}  
Parameters  
add — Adds ports to the group. If no option is specified, this is the  
default option.  
remove — Removes ports from the group.  
mac-multicast-address — A valid MAC multicast address.  
ip- multicast-address — A valid IP multicast address.  
interface-list — Separate nonconsecutive Ethernet ports with a  
comma and no spaces; a hyphen is used to designate a range of ports.  
port-channel-number-list — Separate nonconsecutive port-channels  
with a comma and no spaces; a hyphen is used to designate a range  
of ports.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
58  
CHAPTER 4: ADDRESS TABLE COMMANDS  
Default Configuration  
No multicast addresses are defined.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
If the command is executed without add or remove, the command only  
registers the group in the bridge database.  
Static multicast addresses can only be defined on static VLANs.  
Example  
The following example registers the MAC address:  
Console(config)# interface vlan  
8
Console(config-if)# bridge multicast address 01:00:5e:02:02:03  
The following example registers the MAC address and adds ports  
statically.  
Console(config)# interface vlan  
8
Console(config-if)# bridge multicast address 01:00:5e:02:02:03  
add ethernet g1, g2  
bridge multicast  
forbidden address  
The bridge multicast forbidden address Interface Configuration  
(VLAN) mode command forbids adding a specific multicast address to  
specific ports. Use the no form of this command to restore the default  
configuration.  
Syntax  
bridge multicast forbidden address {mac-multicast-address |  
ip-multicast-address} {add | remove} {ethernet interface-list |  
port-channel port-channel-number-list}  
no bridge multicast forbidden address {mac-multicast-address |  
ip-multicast-address}  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
bridge multicast forward-all  
59  
Parameters  
add — Adds ports to the group.  
remove — Removes ports from the group.  
mac-multicast-address — A valid MAC multicast address.  
ip- multicast-address — A valid IP multicast address.  
interface-list — Separate nonconsecutive Ethernet ports with a  
comma and no spaces; hyphen is used to designate a range of ports.  
port-channel-number-list — Separate nonconsecutive valid  
port-channels with a comma and no spaces; a hyphen is used to  
designate a range of port-channels.  
Default Configuration  
No forbidden addresses are defined.  
Command Modes  
Interface Configuration (VLAN) mode  
User Guidelines  
Before defining forbidden ports, the multicast group should be  
registered.  
Example  
In this example, MAC address 0100.5e02.0203 is forbidden on port g9  
within VLAN 8.  
Console(config)# interface vlan  
8
Console(config-if)# bridge multicast address 0100.5e.02.0203  
Console(config-if)# bridge multicast forbidden address  
0100.5e02.0203 add ethernet g  
9
bridge multicast  
forward-all  
The bridge multicast forward-all Interface Configuration (VLAN) mode  
command enables forwarding all multicast packets on a port. To restore  
the default configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
60  
CHAPTER 4: ADDRESS TABLE COMMANDS  
Syntax  
bridge multicast forward-all {add | remove} {ethernet interface-list |  
port-channel port-channel-number-list}  
no bridge multicast forward-all  
Parameters  
add — Force forwarding all multicast packets.  
remove — Do not force forwarding all multicast packets.  
interface-list — Separate nonconsecutive Ethernet ports with a  
comma and no spaces; a hyphen is used to designate a range of ports.  
port-channel-number-list — Separates nonconsecutive port-channels  
with a comma and no spaces; a hyphen is used to designate a range  
of port-channels.  
Default Configuration  
This setting is disabled.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In this example, all multicast packets on port 8 are forwarded.  
Console(config)# interface vlan 2  
Console(config-if)# bridge multicast forward-all add  
ethernet g8  
bridge multicast  
forbidden  
forward-all  
The bridge multicast forbidden forward-all Interface Configuration  
(VLAN) mode command forbids a port to be a forward-all-multicast port.  
To restore the default configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
bridge multicast forbidden forward-all  
61  
Syntax  
bridge multicast forbidden forward-all {add | remove} {ethernet  
interface-list | port-channel port-channel-number-list}  
no bridge multicast forbidden forward-all  
Parameters  
add — Forbids forwarding all multicast packets.  
remove — Does not forbid forwarding all multicast packets.  
interface-list — Separates nonconsecutive Ethernet ports with a  
comma and no spaces; a hyphen is used to designate a range of ports.  
port-channel-number-list — Separates nonconsecutive port-channels  
with a comma and no spaces; a hyphen is used to designate a range  
of port-channels.  
Default Configuration  
This setting is disabled.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
IGMP snooping dynamically discovers multicast device ports. When a  
multicast device port is discovered, all the multicast packets are  
forwarded to it unconditionally.  
This command prevents a port from becoming a multicast device port.  
Example  
In this example, forwarding all multicast packets to g1 with VLAN 2 is  
forbidden.  
Console(config)# interface vlan  
Console(config-if)# bridge multicast forbidden forward-all  
add ethernet g  
2
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
62  
CHAPTER 4: ADDRESS TABLE COMMANDS  
bridge aging-time  
The bridge aging-time Global Configuration mode command sets the  
address table aging time. To restore the default configuration, use the no  
form of this command.  
Syntax  
bridge aging-time seconds  
no bridge aging-time  
Parameters  
seconds — Time in seconds. (Range: 10-630 seconds)  
Default Configuration  
The default setting is 300 seconds.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In the following example, the bridge aging time is set to 250 seconds.  
Console(config)# bridge aging-time 250  
clear bridge  
The clear bridge Privileged EXEC mode command removes any learned  
entries from the forwarding database.  
Syntax  
clear bridge  
Default Configuration  
This command has no default configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
port security  
63  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In the following example, the bridge tables are cleared.  
Console# clear bridge  
port security  
The port security Interface Configuration mode command locks the port  
to block unknown traffic and prevent the port from learning new  
addresses. To restore the default configuration, use the no form of this  
command.  
Syntax  
port security [forward | discard | discard-shutdown] [trap seconds]  
[max]  
no port security  
Parameters  
forward — Forwards packets with unlearned source addresses, but  
does not learn the address.  
discard — Discards packets with unlearned source addresses. This is  
the default if no option is indicated.  
discard-shutdown — Discards packets with unlearned source  
addresses. The port is also shut down.  
trap seconds — Sends SNMP traps and defines the minimum amount  
of time in seconds between consecutive traps. (Range: 1-1000000)  
max — Maximum number of addresses that can be learned on the  
interface. (Range: 1-128)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
64  
CHAPTER 4: ADDRESS TABLE COMMANDS  
Default Configuration  
This setting is disabled.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In this example, port g1 forwards all packets without learning addresses  
of packets from unknown sources and sends traps every 100 seconds if a  
packet with an unknown source address is received.  
Console(config)# interface ethernet g1  
Console(config-if)# port security forward trap 100  
port security mode  
The port security mode Interface Configuration mode command  
configures the port security mode. To restore the default configuration,  
use the no form of this command.  
Syntax  
port security mode {lock | mac-addresses}  
no port security mode  
Parameters  
lock — Saves the current dynamic MAC addresses associated with the  
port and disables learning, relearning and aging.  
mac-addresses — Deletes the current dynamic MAC addresses  
associated with the port and learns up to the maximum number  
addresses allowed on the port. Relearning and aging are enabled.  
Default Configuration  
This setting is disabled.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
port security routed secure-address  
65  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In this example, port security mode is set to dynamic for Ethernet  
interface g7.  
Console(config)# interface ethernet g7  
Console(config-if)# port security mode mac-addresses  
port security routed  
secure-address  
The port security routed secure-address Interface Configuration  
(Ethernet, port-channel) mode command adds a MAC-layer secure  
address to a routed port. Use the no form of this command to delete a  
MAC address.  
Syntax  
port security routed secure-address mac-address  
no port security routed secure-address mac-address  
Parameters  
mac-address — A valid MAC address.  
Default Configuration  
No addresses are defined.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode. Cannot be  
configured for a range of interfaces (range context).  
User Guidelines  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
66  
CHAPTER 4: ADDRESS TABLE COMMANDS  
The command enables adding secure MAC addresses to a routed port in  
port security mode. The command is available when the port is a routed  
port and in port security mode. The address is deleted if the port exits the  
security mode or is not a routed port.  
Example  
In this example, the MAC-layer address 66:66:66:66:66:66 is added to  
port g1.  
Console(config)# interface ethernet g1  
Console(config-if)# port security routed secure-address  
66:66:66:66:66:66  
show bridge  
address-table  
The show bridge address-table Privileged EXEC mode command  
displays all entries in the bridge-forwarding database.  
Syntax  
show bridge address-table [vlan vlan] [ethernet interface |  
port-channel port-channel-number | address mac address]  
Parameters  
vlan — Specifies a valid VLAN, such as VLAN 1.  
interface — A valid Ethernet port.  
port-channel-number — A valid port-channel number.  
mac address — A valid MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show bridge address-table static  
67  
User Guidelines  
Internal usage VLANs (VLANs that are automatically allocated on ports  
with a defined Layer 3 interface) are presented in the VLAN column by a  
port number and not by a VLAN ID.  
"Special" MAC addresses that were not statically defined or dynamically  
learned are displayed in the MAC address table. This includes, for  
example, MAC addresses defined in ACLS.  
Example  
In this example, all classes of entries in the bridge-forwarding database  
are displayed.  
Console# show bridge address-table  
Aging time is 300 sec  
interface  
---------  
1
mac address  
Port  
Type  
-------------- ----  
-------  
dynamic  
00:60:70:4C:73 g8  
:FF  
1
00:60:70:8C:73 g8  
:FF  
dynamic  
static  
200  
00:10:0D:48:37 g9  
:FF  
show bridge  
address-table static  
The show bridge address-table static Privileged EXEC mode command  
displays statically created entries in the bridge-forwarding database.  
Syntax  
show bridge address-table static [vlan vlan] [ethernet interface |  
port-channel port-channel-number]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
68  
CHAPTER 4: ADDRESS TABLE COMMANDS  
Parameters \  
vlan — Specifies a valid VLAN, such as VLAN 1.  
interface — A valid Ethernet port.  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In this example, all static entries in the bridge-forwarding database are  
displayed.  
Console# show bridge address-table static  
Aging time is 300 sec  
vlan  
----  
mac address  
port  
----  
type  
--------------  
---  
--------------  
---  
1
00:60:70:4C:73  
:FF  
g8  
g8  
g9  
Permanent  
1
00:60.70.8C.73  
:FF  
delete-on-time  
out  
200  
00:10:0D:48:37  
:FF  
delete-on-rese  
t
show bridge  
The show bridge address-table count Privileged EXEC mode command  
address-table count displays the number of addresses present in the Forwarding Database.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show bridge address-table count  
69  
Syntax  
show bridge address-table count [vlan vlan] [ethernet  
interface-number | port-channel port-channel-number]  
Parameters  
vlan — Specifies a valid VLAN, such as VLAN 1.  
interface — A valid Ethernet port.  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In this example, the number of addresses present in all VLANs are  
displayed.  
Console# show bridge address-table count  
Capacity: 8192  
Free: 8083  
Used: 109  
Secure addresses: 2  
Static addresses: 1  
Dynamic addresses: 97  
Internal addresses: 9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
70  
CHAPTER 4: ADDRESS TABLE COMMANDS  
show bridge  
multicast  
address-table  
The show bridge multicast address-table Privileged EXEC mode  
command displays multicast MAC address or IP address table  
information.  
Syntax  
show bridge multicast address-table [vlan vlan-id] [address  
mac-multicast-address | ip-multicast-address] [format ip | format mac]  
Parameters  
vlan-id — Indicates the VLAN ID. This has to be a valid VLAN ID value.  
mac-multicast-address — A valid MAC multicast address.  
ip-multicast-address — A valid IP multicast address.  
format ip / mac — Multicast address format. Can be ip or mac. If the  
format is unspecified, the default is mac.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
A MAC address can be displayed in IP format only if it is in the range of  
0100.5e00.0000-0100.5e7f.ffff.  
Example  
In this example, multicast MAC address and IP address table information  
is displayed.  
Console# show bridge multicast address-table  
Vlan  
----  
1
MAC Address  
Type  
Ports  
--------------  
-------  
static  
----------  
g1, g2  
01:00:5e:02:02  
:03  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show bridge multicast address-table  
71  
19  
19  
01:00:5e:02:02  
:08  
static  
g1-8  
00:00:5e:02:02  
:08  
dynamic  
g9-11  
Forbidden ports for multicast addresses:  
Vlan  
----  
1
MAC Address  
Ports  
-----  
8
--------------  
01:00:5e:02:02  
:03  
19  
01:00:5e:02:02  
:08  
8
Console# show bridge multicast address-table format ip  
Vlan  
----  
IP/MAC Address  
Type  
Ports  
--------------  
---  
------  
---------  
1
224-239.130|2.  
2.3  
static  
static  
dynamic  
g1, g2  
g1-8  
19  
19  
224-239.130|2.  
2.8  
224-239.130|2.  
2.8  
g9-11  
Forbidden ports for multicast addresses:  
Vlan  
----  
IP/MAC Address  
Ports  
--------------  
---  
------  
1
224-239.130|2.  
2.3  
g8  
g8  
19  
224-239.130|2.  
2.8  
A multicast MAC address maps to multiple IP addresses as shown above.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
72  
CHAPTER 4: ADDRESS TABLE COMMANDS  
show bridge  
multicast filtering  
The show bridge multicast filtering Privileged EXEC mode command  
displays the multicast filtering configuration.  
Syntax  
show bridge multicast filtering vlan-id  
Parameters  
vlan-id — Indicates the VLAN ID. This has to be a valid VLAN ID value.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In this example, the multicast configuration for VLAN 1 is displayed.  
Console# show bridge multicast filtering  
1
Filtering: Enabled  
VLAN: 1  
Port  
----  
g1  
Static  
Status  
---------  
---------  
Filter  
g2  
Filter  
g3  
-
Filter  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show ports security  
73  
show ports security  
The show ports security Privileged EXEC mode command displays the  
port-lock status.  
Syntax  
show ports security [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — A valid Ethernet port.  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
In this example, all classes of entries in the port-lock status are displayed:  
Console# show ports security  
Port  
----  
g1  
Status Learni Action Maximu Trap  
ng  
Frequency  
m
------ ------ ------ ------ ------ ---------  
-
--  
-
-
-
Locked Dynami Discar 3  
Enable 100  
c
d
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
74  
CHAPTER 4: ADDRESS TABLE COMMANDS  
g2  
g3  
Unlock Dynami -  
ed  
28  
-
-
c
Locked Disabl Discar 8  
Disabl -  
e
ed  
d,  
Shutdo  
wn  
The following table describes the fields shown above.  
Field  
Description  
Port  
The port number.  
Status  
The values are: Locked/Unlocked.  
The learning mode.  
Learning  
Action  
Maximum  
Action on violation.  
The maximum number of addresses that can be associated on  
this port in theStatic Learning mode or in the Dynamic Learning mode.  
Sends traps in case of a violation.  
The minimum time interval between consecutive traps.  
Trap  
Frequency  
show ports security  
addresses  
The show ports security addresses Privileged EXEC mode command  
displays the current dynamic addresses in locked ports.  
Syntax  
show ports security addresses [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — A valid Ethernet port.  
port-channel-number — A valid port-channel number  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show ports security addresses  
75  
User Guidelines  
There are no user guidelines for this command.  
Example  
This example displays dynamic addresses in all currently locked ports.  
Console# show ports security addresses  
Port  
----  
g1  
Status  
Learning  
--------  
Lock  
Current  
Maximum  
--------  
Disabled  
Disabled  
Enabled  
-------  
-------  
-
-
0
1
1
1
g2  
Lock  
g3  
Max-addres  
ses  
g4  
g5  
6
Port is a member in port-channel ch1  
Disabled  
Enabled  
Lock  
-
0
1
Max-addres  
ses  
10  
ch1  
ch2  
Enabled  
Enabled  
Max-addres  
ses  
0
0
50  
Max-addres  
ses  
128  
This example displays dynamic addresses in the currently locked port 1.  
Console# show ports security addresses ethernet 1  
Port  
----  
g1  
Status  
Learning  
--------  
Lock  
Current  
-------  
-
Maximum  
-------  
1
--------  
Disabled  
Download from Www.Somanuals.com. All Manuals Search And Download.  
76  
CHAPTER 4: ADDRESS TABLE COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ETHERNET CONFIGURATION  
COMMANDS  
5
interface ethernet  
The interface ethernet Global Configuration mode command enters  
the interface configuration mode to configure an Ethernet type interface.  
Syntax  
interface ethernet interface  
Parameters  
interface — Valid Ethernet port. Elana  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables configuring Ethernet port g18.  
Console(config)# interface ethernet g18  
interface range  
ethernet  
The interface range ethernet Global Configuration mode command  
configures multiple Ethernet type interfaces at the same time.  
Syntax  
interface range ethernet {port-list | all}  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
78  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Parameters  
port-list — List of valid ports. Where more than one port is listed,  
separate the nonconsecutive ports with a comma and no spaces, use a  
hyphen to designate a range of ports and group a list separated by  
commas in brackets.  
all — All Ethernet ports.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Commands under the interface range context are executed  
independently on each active interface in the range. If the command  
returns an error on one of the active interfaces, it does not stop executing  
commands on other active interfaces.  
Example  
The following example shows how ports g18 to g20 and g1 to g24 are  
grouped to receive the same command.  
Console(config)# interface range ethernet g18-g20,g1-g24  
Console(config-if)#  
shutdown  
The shutdown Interface Configuration (Ethernet, port-channel) mode  
command disables an interface. To restart a disabled interface, use the no  
form of this command.  
Syntax  
shutdown  
no shutdown  
Default Configuration  
The interface is enabled.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
description  
79  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example disables Ethernet port g5 operations.  
Console(config)# interface ethernet g  
5
Console(config-if)# shutdown  
The following example restarts the disabled Ethernet port.  
Console(config)# interface ethernet g  
5
Console(config-if)# no shutdown  
description  
The description Interface Configuration (Ethernet, port-channel) mode  
command adds a description to an interface. To remove the description,  
use the no form of this command.  
Syntax  
description string  
no description  
Parameters  
string — Comment or a description of the port to enable the user to  
remember what is attached to the port. (Range: 1-64 characters)  
Default Configuration  
The interface does not have a description.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
80  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Example  
The following example adds a description to Ethernet port g5.  
Console(config)# interface ethernet g  
5
Console(config-if)# description "RD SW#3"  
speed  
The speed Interface Configuration (Ethernet, port-channel) mode  
command configures the speed of a given Ethernet interface when not  
using auto-negotiation. To restore the default configuration, use the no  
form of this command.  
Syntax  
speed {10 | 100 | 1000| 10000}  
Parameters  
10 — Forces10 Mbps operation.  
100 — Forces 100 Mbps operation.  
1000 — Forces 1000 Mbps operation.  
10000 — Forces 10000 Mbps operation.  
Default Configuration  
Maximum port capability  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the speed operation of Ethernet port  
g5 to 100 Mbps operation.  
Console(config)# interface ethernet g  
5
Console(config-if)# speed 100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
duplex  
81  
duplex  
The duplex Interface Configuration (Ethernet) mode command  
configures the full/half duplex operation of a given Ethernet interface  
when not using auto-negotiation. To restore the default configuration,  
use the no form of this command.  
Syntax  
duplex {half | full}  
Parameters  
no duplex  
half — Forces half-duplex operation  
full — Forces full-duplex operation  
Default Configuration  
The interface is set to full duplex.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
When configuring a particular duplex mode on the port operating at  
10/100 Mbps, disable the auto-negotiation on that port.  
Half duplex mode can be set only for ports operating at 10 Mbps or 100  
Mbps.  
Example  
The following example configures the duplex operation of Ethernet port  
g1 to full duplex operation.  
Console(config)# interface ethernet g  
1
Console(config-if)# duplex full  
negotiation  
The negotiation Interface Configuration (Ethernet, port-channel) mode  
command enables auto-negotiation operation for the speed and duplex  
parameters of a given interface. To disable auto-negotiation, use the no  
form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
82  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Syntax  
negotiation [capability1 [capability2…capability5]]  
no negotiation  
Parameters  
capability — Specifies the capabilities to advertise. (Possible values:  
10h, 10f, 100h,100f, 1000f)  
Default Configuration  
Auto-negotiation is enabled.  
If unspecified, the default setting is to enable all capabilities of the port.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
If capabilities were specified when auto-negotiation was previously  
entered, not specifying capabilities when currently entering  
auto-negotiation overrides the previous configuration and enables all  
capabilities.  
Example  
The following example enables auto-negotiation on Ethernet port 1.  
Console(config)# interface ethernet  
Console(config-if)# negotiation  
1
flowcontrol  
The flowcontrol Interface Configuration (Ethernet, port-channel) mode  
command configures flow control on a given interface. To disable flow  
control, use the no form of this command.  
Syntax  
flowcontrol {auto | on | off}  
no flowcontrol  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
mdix  
83  
Parameters  
auto — Indicates auto-negotiation  
on — Enables flow control.  
off — Disables flow control.  
Default Configuration  
Flow control is off.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
Negotiation should be enabled for flow control auto.  
Example  
In the following example, flow control is enabled on port 1.  
Console(config)# interface ethernet  
Console(config-if)# flowcontrol on  
1
mdix  
The mdix Interface Configuration (Ethernet) mode command enables  
cable crossover on a given interface. To disable cable crossover, use the  
no form of this command.  
Syntax  
mdix {on | auto}  
no mdix  
Parameters  
on — Manual mdix is enabled.  
auto — Automatic mdi/mdix is enabled.  
Default Configuration  
The default setting is on.  
Command Mode  
Interface Configuration (Ethernet) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
84  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
User Guidelines  
Auto: All possibilities to connect a PC with cross or normal cables are  
supported and are automatically detected.  
On: It is possible to connect to a PC only with a normal cable and to  
connect to another device only with a cross cable.  
No: It is possible to connect to a PC only with a cross cable and to  
connect to another device only with a normal cable.  
Example  
In the following example, automatic crossover is enabled on port 1.  
Console(config)# interface ethernet  
Console(config-if)# mdix auto  
1
clear counters  
The clear counters Privileged EXEC mode command clears statistics on  
an interface.  
Syntax  
clear counters [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — Valid Ethernet port. Elana  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
set interface active  
85  
Example  
In the following example, the counters for interface 1 are cleared.  
Console# clear counters ethernet g2  
set interface active  
The set interface active Privileged EXEC mode command reactivates an  
interface that was shutdown.  
Syntax  
set interface active {ethernet interface | port-channel  
port-channel-number}  
Parameters  
interface — Valid Ethernet port. Elana  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
This command is used to activate interfaces that were configured to be  
active, but were shutdown by the system for some reason (e.g., port  
security).  
Example  
The following example reactivates interface 1.  
Console# set interface active ethernet g1  
show interfaces  
advertise  
The show interfaces advertise Privileged EXEC mode command  
displays auto-negotiation data.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
86  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Syntax  
show interfaces advertise [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — Valid Ethernet port.Elana  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Modes  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays auto-negotiation information.  
Console# show interfaces advertise  
Port  
----  
Type  
Neg  
Operational  
Link  
Advertisement  
-----------  
-------  
--------------  
--------------  
--  
1
2
3
4
5
100M-Copper  
100M-Copper  
100M-Copper  
100M-Copper  
100M-Copper  
Enabled  
Enabled  
Enabled  
Enabled  
Enabled  
--  
--  
--  
--  
100f, 100h,  
10f, 10h  
6
7
100M-Copper  
100M-Copper  
Enabled  
Enabled  
--  
--  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show interfaces configuration  
87  
8
100M-Copper  
100M-Copper  
100M-Copper  
100M-Copper  
100M-Copper  
Enabled  
--  
--  
--  
--  
--  
9
Enabled  
Enabled  
Enabled  
Enabled  
10  
11  
12  
show interfaces  
configuration  
The show interfaces configuration Privileged EXEC mode command  
displays the configuration for all configured interfaces.  
Syntax  
show interfaces configuration [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — Valid Ethernet port.Elana  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Modes  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the configuration of all configured  
interfaces:  
Console# show interfaces configuration  
Port  
Type  
Dupl  
ex  
Spee  
d
Neg  
Flow  
Ctrl  
Admi  
n
Stat  
e
Back  
Pres  
sure  
Mdix  
Mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
88  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
----  
1
----  
----  
---  
----  
--  
----  
-
----  
---  
----  
Off  
Off  
Off  
Off  
Off  
Off  
Off  
Off  
Off  
Off  
Off  
----  
-
----  
----  
----  
Auto  
Auto  
Auto  
Auto  
Auto  
Auto  
Auto  
Auto  
Auto  
Auto  
Auto  
100M  
-Cop  
per  
Full  
Full  
Full  
Full  
Full  
Full  
Full  
Full  
Full  
Full  
Full  
100  
100  
100  
100  
100  
100  
100  
100  
100  
100  
100  
Enab  
led  
Up  
Up  
Up  
Up  
Up  
Up  
Up  
Up  
Up  
Up  
Up  
Disa  
bled  
2
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
3
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
4
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
5
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
6
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
7
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
8
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
9
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
10  
11  
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
100M  
-Cop  
per  
Enab  
led  
Disa  
bled  
show interfaces  
status  
The show interfaces status Privileged EXEC mode command displays  
the status of all configured interfaces.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show interfaces status  
89  
Syntax  
show interfaces status [ethernet interface| port-channel  
port-channel-number |]  
Parameters  
interface — A valid Ethernet port. Elana  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the status of all configured interfaces.  
Console# show interfaces status  
Port  
Type  
Dupl  
ex  
Spee  
d
Neg  
Flow  
Ctrl  
Link  
Stat  
e
Back  
Pres  
sure  
Mdix  
Mode  
----  
----  
----  
---  
----  
--  
----  
-
----  
---  
----  
--  
----  
-
----  
----  
----  
--  
1
2
3
100M  
-Cop  
per  
--  
--  
--  
--  
--  
--  
--  
--  
--  
Down  
Down  
Down  
--  
--  
--  
100M  
-Cop  
per  
--  
--  
100M  
-Cop  
per  
--  
--  
Download from Www.Somanuals.com. All Manuals Search And Download.  
90  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
4
100M  
-Cop  
per  
--  
--  
100  
--  
--  
--  
--  
--  
--  
--  
--  
--  
Off  
--  
--  
--  
--  
--  
--  
--  
Down  
Up  
--  
--  
5
100M  
-Cop  
per  
Full  
--  
Enab  
led  
Disa  
bled  
Auto  
--  
6
100M  
-Cop  
per  
--  
--  
--  
--  
--  
--  
--  
Down  
Down  
Down  
Down  
Down  
Down  
Down  
--  
--  
--  
--  
--  
--  
--  
7
100M  
-Cop  
per  
--  
--  
8
100M  
-Cop  
per  
--  
--  
9
100M  
-Cop  
per  
--  
--  
10  
11  
12  
100M  
-Cop  
per  
--  
--  
100M  
-Cop  
per  
--  
--  
100M  
-Cop  
per  
--  
--  
show interfaces  
description  
The show interfaces description Privileged EXEC mode command  
displays the description for all configured interfaces.  
Syntax  
show interfaces description [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — Valid Ethernet port. (Full syntax: unit/port)  
port-channel-number — A valid port-channel number.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show interfaces counters  
91  
Default Configuration  
This command has no default configuration.  
Command Modes  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays descriptions of configured interfaces.  
Console# show interfaces description  
Port  
----  
g1  
Description  
-----------  
lab  
g2  
g3  
g4  
g5  
g6  
ch1  
ch2  
show interfaces  
counters  
The show interfaces counters Privileged EXEC mode command displays  
traffic seen by the physical interface.  
Syntax  
show interfaces counters [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — A valid Ethernet port. Elana  
port-channel-number — A valid port-channel number.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
92  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Default Configuration  
This command has no default configuration.  
Command Modes  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays traffic seen by the physical interface.  
Console# show interfaces counters  
Port  
----  
g1  
InOctets  
--------  
183892  
0
InUcastPkts InMcastPkts InBcastPkts  
----------- ----------- -----------  
0
0
0
0
0
0
0
0
0
g1  
g1  
123899  
Port  
OutOctets  
OutUcastPkt OutMcastPkt OutBcastPkt  
s
s
s
-----  
----------  
----------- ----------- -----------  
-
0
0
0
-
0
0
0
-
0
0
0
g1  
g1  
g1  
9188  
0
8789  
Ch  
---  
1
InOctets  
--------  
27889  
InUcastPkts InMcastPkts InBcastPkts  
----------  
0
----------- -----------  
0
0
Download from Www.Somanuals.com. All Manuals Search And Download.  
show interfaces counters  
93  
Ch  
---  
1
OutOctets  
---------  
23739  
OutUcastPkt OutMcastPkt OutBcastPkt  
s
s
s
----------- ----------- -----------  
-
-
-
0
0
0
The following table describes the fields shown in the display.  
Console# show interfaces counters ethernet  
1
Port  
InOctets  
InUcastPkts InMcastPkts InBcastPkts  
------  
----------- ----------- ----------- -----------  
---  
g1  
183892  
0
0
0
Port  
------  
g1  
OutOctets  
OutUcastPkt OutMcastPkt OutBcastPkt  
s
s
s
----------- ----------- ----------- -----------  
---  
-
-
9188  
0
0
0
FCS Errors: 0  
Single Collision Frames: 0  
Late Collisions: 0  
Excessive Collisions: 0  
Oversize Packets: 0  
Internal MAC Rx Errors: 0  
Received Pause Frames: 0  
Transmitted Pause Frames: 0  
The following table describes the fields shown in the display.  
Field  
Description  
InOctets  
Counted received octets.  
Counted received unicast packets.  
Counted received multicast packets.  
InUcastPkts  
InMcastPkts  
Download from Www.Somanuals.com. All Manuals Search And Download.  
94  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Field  
Description  
InBcastPkts  
OutOctets  
OutUcastPkts  
OutMcastPkts  
OutBcastPkts  
FCS Errors  
Counted received broadcast packets.  
Counted transmitted octets.  
Counted transmitted unicast packets.  
Counted transmitted multicast packets.  
Counted transmitted broadcast packets.  
Counted received frames that are an integral number of  
octets in length but do not pass the FCS check.  
Single Collision  
Frames  
Counted frames that are involved in a single collision, and  
are subsequently transmitted successfully.  
Late Collisions  
Number of times that a collision is detected later than one  
slotTime into the transmission of a packet.  
Excessive Collisions  
Oversize Packets  
Number of excessive collisions received on the selected  
interface.  
Counted frames received that exceed the maximum  
permitted frame size.  
Internal MAC Rx  
Errors  
Counted frames for which reception fails due to an  
internal MAC sublayer received error.  
Received Pause  
Frames  
Counted MAC Control frames received with an opcode  
indicating the PAUSE operation.  
Transmitted Pause  
Frames  
Counted MAC Control frames transmitted on this  
interface with an opcode indicating the PAUSE operation.  
port storm-control  
include-multicast  
(GC)  
The port storm-control include-multicast Interface Configuration  
mode command enables counting multicast packets in the port  
storm-control broadcast rate command. To disable counting multicast  
packets, use the no form of this command.  
Syntax  
port storm-control include-multicast  
no port storm-control include-multicast  
Default Configuration  
Multicast packets are not counted.  
Command Modes  
Interface Configuration (Ethernet) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
port storm-control include-multicast (IC)  
95  
User Guidelines  
To control multicasts storms, use the port storm-control broadcast  
enable and port storm-control broadcast rate commands.  
Example  
The following example enables counting multicast packets.  
Console# configure  
Console(config-if)# port storm-control include-multicast  
Console(config-if)# port storm-control iinclude-multicast  
unknown-unicast  
port storm-control  
include-multicast  
(IC)  
The port storm-control include-multicast Interface Configuration  
(Ethernet) mode command counts multicast packets in broadcast storm  
control. To disable counting multicast packets, use the no form of this  
command.  
Syntax  
port storm-control include-multicast [unknown-unicast]  
no port storm-control include-multicast  
Parameters  
unknown-unicast — Specifies also counting unknown unicast  
packets.  
Default Configuration  
Multicast packets are not counted.  
Command Modes  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
96  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Example  
The following example enables counting broadcast and multicast packets  
on Ethernet port 2.  
Console(config)# interface ethernet  
2
Console(config-if)# port storm-control include-multicast  
unknown-unicast  
port storm-control  
broadcast enable  
The port storm-control broadcast enable Interface Configuration  
(Ethernet) mode command enables broadcast storm control. To disable  
broadcast storm control, use the no form of this command.  
Syntax  
port storm-control broadcast enable  
no port storm-control broadcast enable  
Default Configuration  
Broadcast storm control is disabled.  
Command Modes  
Interface Configuration (Ethernet) mode  
User Guidelines  
Use the port storm-control broadcast rate Interface Configuration  
(Ethernet) mode command, to set the maximum allowable broadcast  
rate.  
Use the port storm-control include-multicast Global Configuration  
mode command to enable counting multicast packets in the storm  
control calculation.  
Example  
The following example enables broadcast storm control on port 1 of a  
device.  
Console(config)# interface ethernet  
1
Console(config-if)# port storm-control broadcast enable  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
port storm-control broadcast rate  
97  
port storm-control  
broadcast rate  
The port storm-control broadcast rate Interface Configuration  
(Ethernet) mode command configures the maximum broadcast rate. To  
restore the default configuration, use the no form of this command.  
Syntax  
port storm-control broadcast rate rate  
no port storm-control broadcast rate  
Parameters  
rate — Maximum kilobits per second of broadcast and multicast traffic  
on a port. (Range of 3500-1000000)  
Default Configuration  
The default storm control broadcast rate is 3500 Kbits/Sec.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
Use the port storm-control broadcast enable Interface Configuration  
mode command to enable broadcast storm control.  
Example  
The following example configures a port storm-control broadcast rate  
4000 on port g2.  
(config)# interface ethernet g2  
Console(config-if)# port storm-control broadcast rate 4000  
show ports  
storm-control  
The show ports storm-control Privileged EXEC mode command  
displays the storm control configuration.  
Syntax  
show ports storm-control [interface]  
Parameters  
interface — A valid Ethernet port. Elana  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
98  
CHAPTER 5: ETHERNET CONFIGURATION COMMANDS  
Default Configuration  
This command has no default configuration.  
Command Modes  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the storm control configuration.  
Console# show ports storm-control  
Port  
----  
State  
-----  
Rate  
[Kbits/Sec]  
Included  
--------  
--------------  
--  
g1  
g2  
g3  
g4  
g5  
g6  
Disabled  
Disabled  
Disabled  
Disabled  
Disabled  
Disabled  
3500  
3500  
3500  
3500  
3500  
3500  
Broadcast  
Broadcast  
Broadcast  
Broadcast  
Broadcast  
Broadcast  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LINE COMMANDS  
6
line  
The line Global Configuration mode command identifies a specific line  
for configuration and enters the Line Configuration command mode.  
Syntax  
line {console | telnet | ssh}  
Parameters  
console — Console terminal line.  
telnet — Virtual terminal for remote console access (Telnet).  
ssh — Virtual terminal for secured remote console access (SSH).  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the device as a virtual terminal for  
remote console access.  
Console(config)# line telnet  
Console(config-line)#  
speed  
The speed Line Configuration mode command sets the line baud rate.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
100  
CHAPTER 6: LINE COMMANDS  
Syntax  
speed bps  
Parameters  
bps — Baud rate in bits per second (bps). Possible values are 2400,  
4800, 9600, 19200, 38400, 57600 and 115200.  
Default Configuration  
The default speed is 19200 bps.  
Command Mode  
Line Configuration (console) mode  
User Guidelines  
This command is available only on the line console.  
The configured speed is applied when Autobaud is disabled. This  
configuration applies only to the current session.  
Example  
The following example configures the line baud rate.  
Console(config)# line console  
Console(config-line)# speed 115200  
autobaud  
The autobaud Line Configuration mode command sets the line for  
automatic baud rate detection (autobaud). To disable automatic baud  
rate detection, use the no form of the command.  
Syntax  
autobaud  
no autobaud  
Default Configuration  
Autobaud is disabled.  
Command Mode  
Line Configuration (console) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
exec-timeout 101  
User Guidelines  
This command is available only on the line console.  
To start communication using Autobaud , press <Enter> twice. This  
configuration applies only to the current session.  
Example  
The following example enables autobaud.l  
Console(config)# line console  
Console(config-line)# autobaud  
exec-timeout  
The exec-timeout Line Configuration mode command sets the interval  
that the system waits until user input is detected. To restore the default  
configuration, use the no form of this command.  
Syntax  
exec-timeout minutes [seconds]  
no exec-timeout  
Parameters  
minutes — Specifies the number of minutes for the timeout. (Range:  
0-65535)  
seconds — Specifies additional time intervals in seconds. (Range:  
0-59)  
Default Configuration  
The default configuration is 10 minutes.  
Command Mode  
Line Configuration mode  
User Guidelines  
To specify no timeout, enter the exec-timeout 0 command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
102  
CHAPTER 6: LINE COMMANDS  
Example  
The following example configures the interval that the system waits until  
user input is detected to 20 minutes.  
Console(config)# line console  
Console(config-line)# exec-timeout 20  
history  
The history Line Configuration mode command enables the command  
history function. To disable the command history function, use the no  
form of this command.  
Syntax  
history  
no history  
Default Configuration  
The command history function is enabled.  
Command Mode  
Line Configuration mode  
User Guidelines  
This command enables the command history function for a specified line.  
To enable or disable the command history function for the current  
terminal session, use the terminal history user EXEC mode command.  
Example  
The following example enables the command history function for Telnet.  
Console(config)# line telnet  
Console(config-line)# history  
history size  
The history size Line Configuration mode command configures the  
command history buffer size for a particular line. To reset the command  
history buffer size to the default configuration, use the no form of this  
command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
terminal history 103  
Syntax  
history size number-of-commands  
no history size  
Parameters  
number-of-commands—Number of commands that the system  
records in its history buffer. (Range: 10-200)  
Default Configuration  
The default history buffer size is 10.  
Command Mode  
Line Configuration mode  
User Guidelines  
This command configures the command history buffer size for a  
particular line. To configure the command history buffer size for the  
current terminal session, use the terminal history size User EXEC mode  
command.  
Example  
The following example changes the command history buffer size to 100  
entries for a particular line.  
Console(config)# line telnet  
Console(config-line)# history size 100  
terminal history  
The terminal history User EXEC mode command enables the command  
history function for the current terminal session. To disable the command  
history function, use the no form of this command.  
Syntax  
terminal history  
no terminal history  
Default Configuration  
The default configuration for all terminal sessions is defined by the  
history line configuration command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
104  
CHAPTER 6: LINE COMMANDS  
Command Mode  
User EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example disables the command history function for the  
current terminal session.  
Console> terminal no history  
terminal history  
size  
The terminal history size User EXEC mode command configures the  
command history buffer size for the current terminal session. To reset the  
command history buffer size to the default setting, use the no form of  
this command.  
Syntax  
terminal history size number-of-commands  
no terminal history size  
Parameters  
number-of-commands — Specifies the number of commands the  
system may record in its command history buffer. (Range: 10-200)  
Default Configuration  
The default command history buffer size is 10.  
Command Mode  
User EXEC mode  
User Guidelines  
The terminal history size user EXEC command configures the size of  
the command history buffer for the current terminal session. To change  
the default size of the command history buffer, use the history line  
configuration command.  
The maximum number of commands in all buffers is 256.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show line 105  
Example  
The following example configures the command history buffer size to 20  
commands for the current terminal session.  
Console> terminal history size 20  
show line  
The show line Privileged EXEC mode command displays line parameters.  
Syntax  
show line [console | telnet | ssh]  
Parameters  
console — Console terminal line.  
telnet — Virtual terminal for remote console access (Telnet).  
ssh — Virtual terminal for secured remote console access (SSH).  
Default Configuration  
If the line is not specified, the default value is console.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the line configuration.  
Console# show line  
Console configuration:  
Interactive timeout: Disabled  
History: 10  
Baudrate: 9600  
Databits: 8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
106  
CHAPTER 6: LINE COMMANDS  
Parity: none  
Stopbits: 1  
Telnet configuration:  
Interactive timeout: 10 minutes  
10 seconds  
History: 10  
SSH configuration:  
Interactive timeout: 10 minutes  
10 seconds  
History: 10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PHY DIAGNOSTICS COMMANDS  
7
test copper-port tdr The test copper-port tdr Privileged EXEC mode command uses Time  
Domain Reflectometry (TDR) technology to diagnose the quality and  
characteristics of a copper cable attached to a port.  
Syntax  
test copper-port tdr interface  
Parameters  
interface — A valid Ethernet port. Elana  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
The port to be tested should be shut down during the test, unless it is a  
combination port with fiber port active.  
The maximum length of cable for the TDR test is 120 meters.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
108  
CHAPTER 7: PHY DIAGNOSTICS COMMANDS  
Example  
The following example results in a report on the cable attached to port  
g3.  
Console# test copper-port tdr g3  
Cable is open at 64 meters  
Console# test copper-port tdr g3  
Can’t perform this test on fiber ports  
show copper-ports  
tdr  
The show copper-ports tdr Privileged EXEC mode command displays  
information on the last Time Domain Reflectometry (TDR) test performed  
on copper ports.  
Syntax  
show copper-ports tdr [interface]  
Parameters  
interface — A valid Ethernet port. Elana  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
The maximum length of cable for the TDR test is 120 meters.  
Example  
The following example displays information on the last TDR test  
performed on all copper ports.  
Console# show copper-ports tdr  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show copper-ports cable-length 109  
Port  
----  
Result  
------  
Length  
[meters]  
Date  
----  
--------------  
-
g1  
g2  
OK  
Short  
50  
13:32:00 23  
July 2005  
g3  
g4  
Test has not been performed  
Open  
64  
13:32:00 23  
July 2005  
g5  
Fiber  
-
-
show copper-ports  
cable-length  
The show copper-ports cable-length Privileged EXEC mode command  
displays the estimated copper cable length attached to a port.  
Syntax  
show copper-ports cable-length [interface]  
Parameters  
interface — A valid Ethernet port. Elana  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
The port must be active and working in 1000M mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
110  
CHAPTER 7: PHY DIAGNOSTICS COMMANDS  
Example  
The following example displays the estimated copper cable length  
attached to all ports.  
Console# show copper-ports cable-length  
Port  
----  
g1  
Length [meters]  
---------------------  
< 50  
g2  
Copper not active  
110-140  
g3  
g1  
Fiber  
show fiber-ports  
optical-transceiver  
The show fiber-ports optical-transceiver Privileged EXEC mode  
command displays the optical transceiver diagnostics.  
Syntax  
show fiber-ports optical-transceiver [interface] [detailed]  
Parameters  
interface — A valid Ethernet port.Elana  
detailed — Detailed diagnostics.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
To test optical transceivers, ensure a fiber link is present.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show fiber-ports optical-transceiver 111  
Example  
The following example displays the optical transceiver diagnostics results.  
Console# show fiber-ports optical-transceiver 21  
Curre  
nt  
Output  
Power  
Port  
----  
21  
Temp  
----  
OK  
Volta  
ge  
Power  
Input  
-----  
OK  
LOS  
---  
No  
-----  
--  
-----  
--  
-----  
-
OK  
OK  
OK  
Temp – Internally measured transceiver temperature.  
Voltage - Internally measured supply voltage.  
Current – Measured TX bias current.  
Output Power – Measured TX output power in milliWatts.  
Input Power – Measured RX received power in milliWatts.  
LOS – Loss of signal  
N/A - Not Available, N/S - Not Supported, W - Warning, E - Error  
Download from Www.Somanuals.com. All Manuals Search And Download.  
112  
CHAPTER 7: PHY DIAGNOSTICS COMMANDS  
Console# show fiber-ports optical-transceiver 21 detailed  
Current Output  
Voltage Power Power  
[Volt] [mA] [mWatt] [mWatt]  
------- ------- ------  
3.35 8.43 2.72  
Port  
Temp  
[C]  
----  
34  
Input  
LOS  
----  
21  
-----  
7.71  
-------  
No  
Temp – Internally measured transceiver temperature.  
Voltage - Internally measured supply voltage.  
Current – Measured TX bias current.  
Output Power – Measured TX output power in milliWatts.  
Input Power – Measured RX received power in milliWatts.  
LOS – Loss of signal  
N/A - Not Available, N/S - Not Supported, W - Warning, E - Error  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PORT CHANNEL COMMANDS  
8
interface  
port-channel  
The interface port-channel Global Configuration mode command  
enters the Global Configuration mode to configure a specific  
port-channel.  
Syntax  
interface port-channel port-channel-number  
Parameters  
port-channel-number — A valid port-channel number. (Range: 1-8)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Eight aggregated links can be defined with up to eight member ports per  
port-channel. The aggregated links’ valid IDs are 1-8.  
Example  
The following example enters the context of port-channel number 1.  
Console(config)# interface port-channel  
1
interface range  
port-channel  
The interface range port-channel Global Configuration mode  
command enters the Global Configuration mode to configure multiple  
port-channels.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
114  
CHAPTER 8: PORT CHANNEL COMMANDS  
Syntax  
interface range port-channel {port-channel-range | all}  
Parameters  
port-channel-range — List of valid port-channels to add. Separate  
nonconsecutive port-channels with a comma and no spaces. A  
hyphen designates a range of port-channels. (Range: 1-8)  
all — All valid port-channels.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Commands under the interface range context are executed  
independently on each interface in the range.  
Example  
The following example groups port-channels 1, 2 and 6 to receive the  
same command.  
Console(config)# interface range port-channel 1-2,6  
channel-group  
The channel-group Interface Configuration (Ethernet) mode command  
associates a port with a port-channel. To remove a port from a  
port-channel, use the no form of this command.  
Syntax  
channel-group port-channel-number mode {on | auto}  
no channel-group  
Parameters  
port-channel_number — Specifies the number of the valid  
port-channel for the current port to join. (Range: 1-8)  
on — Forces the port to join a channel without an LACP operation.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show interfaces port-channel 115  
auto — Allows the port to join a channel as a result of an LACP  
operation.  
Default Configuration  
The port is not assigned to a port-channel.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example forces port 1 to join port-channel 1 without an  
LACP operation.  
Console(config)# interface ethernet g  
1
Console(config-if)# channel-group mode on  
1
show interfaces  
port-channel  
The show interfaces port-channel Privileged EXEC mode command  
displays port-channel information.  
Syntax  
show interfaces port-channel [port-channel-number]  
Parameters  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
116  
CHAPTER 8: PORT CHANNEL COMMANDS  
The following example displays information on all port-channels.  
Console# show interfaces port-channel  
Channel  
-------  
Ports  
-------------------------------  
--  
1
2
3
Active: g1, g2  
Active: g2, g7 Inactive: g1  
Active: g3, g8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
QOS COMMANDS  
9
qos  
The qos Global Configuration mode command enables quality of service  
(QoS) on the device. To disable QoS on the device, use the no form of this  
command.  
Syntax  
qos [basic | advanced ]  
no qos  
Parameters  
basic — QoS basic mode.  
advanced — QoS advanced mode, which enables the full range of  
QoS configuration.  
Default Configuration  
The QoS basic mode is enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables QoS on the device.  
Console(config)# qos basic  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
118  
CHAPTER 9: QOS COMMANDS  
show qos  
The show qos Privileged EXEC mode command displays the quality of  
service (QoS) mode for the device.  
Syntax  
show qos  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
Trust mode is displayed if QoS is enabled in basic mode.  
Example  
The following example displays QoS attributes when QoS is enabled in  
basic mode on the device.  
Console# show qos  
Qos: basic  
Basic trust: vpt  
class-map  
The class-map Global Configuration mode command creates or modifies  
a class map and enters the Class-map Configuration mode. To delete a  
class map, use the no form of this command.  
Syntax  
class-map class-map-name [match-all | match-any]  
no class-map class-map-name  
Parameters  
class-map-name — Specifies the name of the class map (Range: 0-32  
characters).  
match-all — Checks that the packet matches all classification criteria  
in the class map match statement.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
class-map 119  
match-any — Checks that the packet matches one or more  
classification criteria in the class map match statement.  
Default Configuration  
By default, the match-all parameter is selected.  
Command Mode  
Global Configuration mode  
User Guidelines  
The class-map Global Configuration mode command is used to define  
packet classification, marking and aggregate policing as part of a globally  
named service policy applied on a per-interface basis.  
The Class-Map Configuration mode enables entering up to two match  
Class-map Configuration mode commands to configure the classification  
criteria for the specified class. If two match Class-map Configuration  
mode commands are entered, each should point to a different type of  
ACL (e.g., one to an IP ACL and one to a MAC ACL). Since packet  
classification is based on the order of the classification criteria, the order  
in which the match Class-Map Configuration mode commands are  
entered is important.  
If there is more than one match statement in a match-all class map and  
the same classification field appears in the participating ACLs, an error  
message is generated.  
Note:  
A class map in match-all mode cannot be configured if it contains both  
an IP ACL and a MAC ACL with an ether type that is not 0x0800.  
Example  
The following example creates a class map called class1 and configures it  
to check that packets match all classification criteria in the class map  
match statement.  
Console(config)# class-map class1 match-all  
Console(config-cmap)#  
Download from Www.Somanuals.com. All Manuals Search And Download.  
120  
CHAPTER 9: QOS COMMANDS  
show class-map  
The show class-map Privileged EXEC mode command displays all class  
maps.  
Syntax  
show class-map [class-map-name]  
Parameters  
class-map-name — Specifies the name of the class map to be  
displayed.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example shows the class map for class1.  
Console# show class-map class1  
Class Map match-any class1 (id4)  
match  
The match Class-map Configuration mode command defines the match  
criteria for classifying traffic. To delete the match criteria, use the no form  
of this command.  
Syntax  
match access-group acl-name  
no match access-group acl-name  
Parameters  
acl-name — Specifies the name of an IP or MAC ACL. (Range: 0-32  
characters)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
policy-map 121  
Default Configuration  
No match criterion is supported.  
Command Mode  
Class-map Configuration mode.  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example defines the match criterion for classifying traffic as  
an access group called ‘enterprise’ in a class map called ‘class1’.  
Console (config)# class-map class1  
Console (config-cmap)# match access-group enterprise  
policy-map  
The policy-map Global Configuration mode command creates a policy  
map and enters the Policy-map Configuration mode. To delete a policy  
map, use the no form of this command.  
Syntax  
policy-map policy-map-name  
no policy-map policy-map-name  
Parameters  
policy-map-name — Specifies the name of the policy map (Range:  
0-32 characters).  
Command Mode  
Global Configuration mode  
User Guidelines  
Before configuring policies for classes whose match criteria are defined in  
a class map, use the policy-map Global Configuration mode command  
to specify the name of the policy map to be created or modified.  
Class policies in a policy map can only be defined if match criteria has  
already been defined for the classes. Use the class-map Global  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
122  
CHAPTER 9: QOS COMMANDS  
Configuration and match Class-map Configuration commands to define  
the match criteria of a class.  
Only one policy map per interface per direction is supported. A policy  
map can be applied to multiple interfaces and directions.  
Example  
The following example creates a policy map called ‘policy1’ and enters  
the Policy-map Configuration mode.  
Console (config)# policy-map policy1  
Console (config-pmap)#  
class  
The class Policy-map Configuration mode command defines a traffic  
classification and enters the Policy-map Class Configuration mode. To  
remove a class map from the policy map, use the no form of this  
command.  
Syntax  
class class-map-name [access-group acl-name]  
no class class-map-name  
Parameters  
class-map-name — Specifies the name of an existing class map. If the  
class map does not exist, a new class map will be created under the  
specified name (Range: 0-32 characters).  
acl-name — Specifies the name of an IP or MAC ACL.  
Default Configuration  
No policy map is defined.  
Command Mode  
Policy-map Configuration mode  
User Guidelines  
Before modifying a policy for an existing class or creating a policy for a  
new class, use the policy-map Global Configuration mode command to  
specify the name of the policy map to which the policy belongs and to  
enter the Policy-map Configuration mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show policy-map 123  
Use the service-policy (Ethernet, Port-channel) Interface Configuration  
mode command to attach a policy map to an interface. Use an existing  
class map to attach classification criteria to the specified policy map and  
use the access-group parameter to modify the classification criteria of  
the class map.  
If this command is used to create a new class map, the name of an IP or  
MAC ACL must also be specified.  
Example The following example defines a traffic classification called  
‘class1’ with an access-group called ‘enterprise’. The class is in a policy  
map called policy1.  
Console(config)# policy-map policy1  
Console (config-pmap)# class class1 access-group enterprise  
show policy-map  
The show policy-map Privileged EXEC mode command displays the  
policy maps.  
Syntax  
show policy-map [policy-map-name [class-name]]  
Parameters  
policy-map-name — Specifies the name of the policy map to be  
displayed.  
class-name — Specifies the name of the class whose QoS policies are  
to be displayed.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
124  
CHAPTER 9: QOS COMMANDS  
Example  
The following example displays all policy maps.  
Console# show policy-map  
Policy Map policy1  
class class1  
set Ip dscp 7  
Policy Map policy2  
class class 2  
police 96000 4800 exceed-action drop  
class class3  
police 124000 96000 exceed-action policed-dscp-transmit  
trust cos-dscp  
The trust cos-dscp Policy-map Class Configuration mode command  
configures the trust state. The trust state determines the source of the  
internal DSCP value used by Quality of Service (QoS). To restore the  
default configuration, use the no form of this command.  
Syntax  
trust cos-dscp  
no trust cos-dscp  
Default Configuration  
The port is not in the trust mode.  
If the port is in trust mode, the internal DSCP value is derived from the  
ingress packet.  
Command Mode  
Policy-map Class Configuration mode  
User Guidelines  
Action serviced to a class, so that if an IP packet arrives, the queue is  
assigned per DSCP. If a non-IP packet arrives, the queue is assigned per  
CoS (VPT).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
set 125  
Example  
The following example configures the trust state for a class called ‘class1’  
in a policy map called ‘policy1’.  
Console (config)# policy-map policy1  
Console (config-pmap)# class class1  
Console (config-pmap-c)# trust cos dscp  
set  
The set Policy-map Class Configuration mode command sets new values  
in the IP packet.  
Syntax  
set {dscp new-dscp | queue queue-id | cos new-cos}  
no set  
Parameters  
new-dscp — Specifies a new DSCP value for the classified traffic.  
(Range: 0-63)  
queue-id — Specifies an explicit queue ID for setting the egress  
queue.  
new-cos — Specifies a new user priority for marking the packet.  
(Range: 0-7)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Policy-map Class Configuration mode  
User Guidelines  
This command is mutually exclusive with the trust Policy-map Class  
Configuration command within the same policy map.  
Policy maps that contain set or trust Policy-map Class Configuration  
commands or that have ACL classifications cannot be attached to an  
egress interface by using the service-policy (Ethernet, Port-channel)  
Interface Configuration mode command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
126  
CHAPTER 9: QOS COMMANDS  
To return to the Policy-map Configuration mode, use the exit command.  
To return to the Privileged EXEC mode, use the end command.  
Example  
The following example sets the DSCP value in the packet to 56 for classes  
in policy map called ‘policy1’.  
Console (config)# policy-map policy1  
Console (config-pmap)# set dscp 56  
police  
The police Policy-map Class Configuration mode command defines the  
policer for classified traffic. To remove a policer, use the no form of this  
command.  
Syntax  
police committed-rate-bps committed -burst-byte [exceed-action  
{drop | policed-dscp-transmit}]  
no police  
Parameters  
committed-rate-bps — Specifies the average traffic rate (CIR) in bits  
per second (bps).  
committed -burst-byte — Specifies normal burst size (CBS) in bytes.  
drop — Indicates that when the rate is exceeded, the packet is  
dropped.  
policed-dscp-transmit — Indicates that when the rate is exceeded,  
the DSCP of the packet is remarked according to the policed-DSCP  
map as configured by the qos map policed-dscp Global  
Configuration mode command.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Policy-map Class Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
service-policy 127  
User Guidelines  
Policing uses a token bucket algorithm. CIR represents the speed with  
which the token is removed from the bucket. CBS represents the depth of  
the bucket.  
Example  
The following example defines a policer for classified traffic. When the  
traffic rate exceeds 124,000 bps or the normal burst size exceeds 96000  
bps, the packet is dropped. The class is called ‘class1’ and is in a policy  
map called ‘policy1’.  
Console (config)# policy-map policy1  
Console (config-pmap)# class class1  
Console (config-pmap-c)# police 124000 9600 exceed-action drop  
service-policy  
The service-policy Interface Configuration (Ethernet, port-Channel)  
mode command applies a policy map to the input of a particular  
interface. To detach a policy map from an interface, use the no form of  
this command.  
Syntax  
service-policy {input policy-map-name}  
no service-policy {input}  
Parameters  
policy-map-name — Specifies the name of the policy map to be  
applied to the input interface.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Interface Configuration (Ethernet, port-Channel) mode  
User Guidelines  
Only one policy map per interface per direction is supported.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
128  
CHAPTER 9: QOS COMMANDS  
Example  
The following example attaches a policy map called ‘policy1’ to the input  
interface.  
Console(config-if)# service-policy input policy1  
qos  
The qos aggregate-policer Global Configuration mode command  
defines the policer parameters that can be applied to multiple traffic  
classes within the same policy map. To remove an existing aggregate  
policer, use the no form of this command.  
aggregate-policer  
Syntax  
qos aggregate-policer aggregate-policer-name committed-rate-bps  
excess-burst-byte exceed-action {drop | policed-dscp-transmit}  
no qos aggregate-policer  
Parameters  
aggregate-policer-name — Specifies the name of the aggregate  
policer.  
committed-rate-bps — Specifies the average traffic rate (CIR) in bits  
per second (bps).  
excess-burst-byte — Specifies the normal burst size (CBS) in bytes.  
drop — Indicates that when the rate is exceeded, the packet is  
dropped.  
policed-dscp-transmit — Indicates that when the rate is exceeded,  
the DSCP of the packet is remarked.  
Default Configuration  
No aggregate policer is defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
Policers that contain set or trust Policy-map Class Configuration  
commands or that have ACL classifications cannot be attached to an  
output interface.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show qos aggregate-policer 129  
Define an aggregate policer if the policer is shared with multiple classes.  
Policers in one port cannot be shared with other policers in another  
device; traffic from two different ports can be aggregated for policing  
purposes.  
An aggregate policer can be applied to multiple classes in the same policy  
map; An aggregate policer cannot be applied across multiple policy maps.  
This policer can also be used in Cascade police to make a cascade policer.  
An aggregate policer cannot be deleted if it is being used in a policy map.  
The no police aggregate Policy-map Class Configuration command  
must first be used to delete the aggregate policer from all policy maps.  
Policing uses a token bucket algorithm. CIR represents the speed with  
which the token is removed from the bucket. CBS represents the depth of  
the bucket.  
Example  
The following example defines the parameters of a policer called  
‘policer1’ that can be applied to multiple classes in the same policy map.  
When the average traffic rate exceeds 124,000 bps or the normal burst  
size exceeds 96000 bps, the packet is dropped.  
Console (config)# qos aggregate-policer policer1 124000 96000  
exceed-action drop  
show qos  
aggregate-policer  
The show qos aggregate-policer Privileged EXEC mode command  
displays the aggregate policer parameter.  
Syntax  
show qos aggregate-policer [aggregate-policer-name]  
Parameters  
aggregate-policer-name — Specifies the name of the aggregate  
policer to be displayed.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
130  
CHAPTER 9: QOS COMMANDS  
User Guidelines  
There are no user guidelines.  
Example  
The following example displays the parameters of the aggregate policer  
called ‘policer1’.  
Console# show qos aggregate-policer policer1  
aggregate-policer policer1 96000 4800 exceed-action drop  
not used by any policy map  
police aggregate  
The police aggregate Policy-map Class Configuration mode command  
applies an aggregate policer to multiple classes within the same policy  
map. To remove an existing aggregate policer from a policy map, use the  
no form of this command.  
Syntax  
police aggregate aggregate-policer-name  
no police aggregate aggregate-policer-name  
Parameters  
aggregate-policer-name — Specifies the name of the aggregate  
policer.  
·Default Configuration  
This command has no default configuration.  
Command Mode  
Policy-map Class Configuration mode  
User Guidelines  
An aggregate policer can be applied to multiple classes in the same policy  
map; An aggregate policer cannot be applied across multiple policy maps  
or interfaces.  
To return to the Policy-map Configuration mode, use the exit command.  
To return to the Privileged EXEC mode, use the end command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
wrr-queue cos-map 131  
Example  
The following example applies the aggregate policer called ‘policer’1 to a  
class called ‘class1’ in policy map called ‘policy1’.  
Console(config)# policy-map policy1  
Console(config-pmap)# class class1  
Console(config-pmap-c)# police aggregate policer1  
wrr-queue cos-map  
The wrr-queue cos-map Global Configuration mode command maps  
Class of Service (CoS) values to a specific egress queue. To restore the  
default configuration, use the no form of this command.  
Syntax  
wrr-queue cos-map queue-id cos1...cos8  
no wrr-queue cos-map [queue-id]  
Parameters  
queue-id — Specifies the queue number to which the CoS values are  
mapped.  
cos1...cos8 — Specifies CoS values to be mapped to a specific queue.  
(Range: 0-7)  
Default Configuration  
CoS values are mapped to 8 queues as follows:  
Cos0 is mapped to queue 3.  
Cos1 is mapped to queue 1.  
Cos2 is mapped to queue 2.  
Cos3 is mapped to queue 4.  
Cos4 is mapped to queue 5.  
Cos5 is mapped to queue 6.  
Cos6 is mapped to queue 7.  
Cos7 is mapped to queue 8.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
132  
CHAPTER 9: QOS COMMANDS  
User Guidelines  
This command can be used to distribute traffic into different queues,  
where each queue is configured with different Weighted Round Robin  
(WRR) and Weighted Random Early Detection (WRED) parameters.  
It is recommended to specifically map a single VPT to a queue, rather  
than mapping multiple VPTs to a single queue. Use the priority-queue  
out Interface Configuration (Ethernet, Port-channel) mode command to  
enable expedite queues.  
Example  
The following example maps CoS 7 to queue 2.  
Console(config)# wrr-queue cos-map 2 7  
wrr-queue  
bandwidth  
The wrr-queue-bandwith Interface Configuration (Ethernet,  
port-channel) mode command assigns weights to each Weighted Round  
Robin (WRR) queue. The weight ratio determines the frequency by which  
the packet scheduler dequeues packets from each queue. To restore the  
default configuration, use the no form of this command.  
Syntax  
wrr-queue bandwidth weight1 weight2 ... weight_n  
no wrr-queue bandwidth  
Parameters  
weight1 weight2 ... weight_n — Sets the ratio of the bandwidth  
assigned by the WRR packet scheduler for the packet queues.  
Separate each value by a space. (Range: 6-255)  
Default Configuration  
The default WRR weight ratio is one-eighth of the sum of all queue  
weights (each weight is set to 6).  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
priority-queue out num-of-queues 133  
User Guidelines  
Use the priority-queue out num-of-queues Global Configuration  
mode command to configure a queue as WRR or Strict Priority. Use this  
command to define a WRR weight per interface.  
The weight ratio for each queue is defined by the queue weight divided  
by the sum of all queue weights (i.e., the normalized weight). This sets  
the bandwidth allocation for each queue.  
A queue can be assigned a WRR weight of 0, in which case no bandwidth  
is allocated to the queue and the shared bandwidth is divided among the  
remaining queues.  
All eight queues participate in the WRR, excluding the queues that are  
assigned as expedite queues. The weights of the expedite queues are  
ignored in the ratio calculation.  
An expedite queue is a priority queue, and it is serviced before the other  
queues are serviced. Use the priority-queue out Interface Configuration  
(Ethernet, port-channel) mode command to enable expedite queues.  
Example  
The following example assigns a weight of 6 to each of the 8 WRR  
queues.  
Console(config-if)# wrr-queue bandwidth 6 6 6 6 6 6 6 6  
priority-queue out  
num-of-queues  
The priority-queue out num-of-queues Global Configuration mode  
command configures the number of expedite queues. To restore the  
default configuration, use the no form of this command.  
Syntax  
priority-queue out num-of-queues number-of-queues  
no priority-queue out num-of-queues  
Parameters  
number-of-queues — Specifies the number of expedite queues.  
Expedite queues have higher indexes. (Range: 0-4)  
Default Configuration  
All queues are expedite queues.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
134  
CHAPTER 9: QOS COMMANDS  
Command Mode  
Global Configuration mode  
User Guidelines  
Configuring the number of expedite queues affects the Weighted Round  
Robin (WRR) weight ratio because fewer queues participate in the WRR.  
Example  
The following example configures the number of expedite queues as 0.  
Console(config)# priority-queue out num-of-queues  
0
traffic-shape  
The traffic-shape Interface Configuration (Ethernet, port-channel) mode  
command configures the shaper of the egress port/queue. To disable the  
shaper, use the no form of this command.  
Syntax  
traffic-shape {committed-rate committed-burst}  
no traffic-shape  
Parameters  
committed-rate — Specifies the average traffic rate (CIR) in kilobits per  
second (kbps).  
(Range: 64 kbps-1000000)  
excess-burst — Specifies the excess burst size (CBS) in bytes.  
Default Configuration  
No shape is defined.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
This command activates the shaper on a specified egress port or egress  
queue.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
rate-limit interface configuration 135  
To activate the shaper on an egress port, enter the Interface  
Configuration mode and specify the port number. The CIR and the CBS  
will be applied to the specified port.  
Example  
The following example sets a shaper on Ethernet port g5 when the  
average traffic rate exceeds 124 kbps or the normal burst size exceeds  
10,000 bytes.  
Console(config)# interface ethernet g5  
Console(config-if) traffic-shape 124 10000  
rate-limit interface  
configuration  
The rate-limit interface configuration command mode limits the rate  
of the incoming traffic. The no form of this command is used to disable  
rate limit.  
Syntax r  
rate-limit kbps  
no rate-limit  
Parameters •  
kbps — Maximum of kilobits per second of ingress traffic on a port.  
(Range: 1 - 1000000)  
Default Configuration  
1000 Kbits/Sec  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
The command can be enabled on a specific port only if the port  
storm-control broadcast enable interface configuration command is not  
enabled on that port.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
136  
CHAPTER 9: QOS COMMANDS  
Examples  
The following example limits the rate of the incoming traffic to 62.  
Console(config-ip)# rate-limit 62  
show qos interface  
The show qos interface Privileged EXEC mode command displays  
Quality of Service (QoS) information on the interface.  
Syntax  
show qos interface [ethernet interface-number | port-channel  
number | port-channel number] [queueing | policers | shapers]  
Parameters  
interface-number — Valid Ethernet port number.  
number — Valid port-channel number.  
queuing — Displays the queue strategy (WRR or EF), the weight for  
WRR queues, the CoS to queue map and the EF priority.  
policers — Displays the shaper of the specified interface and the  
shaper for the queue on the specified interface.  
shapers — Displays all the policers configured for this interface, their  
setting and the number of policers currently unused.  
Default Configuration  
There is no default configuration for this command.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
If no keyword is specified, port QoS mode (for example., DSCP trusted,  
CoS trusted, untrusted), default CoS value, DSCP-to-DSCP-mutation map  
attached to the port, and policy map attached to the interface are  
displayed.  
If no interface is specified, QoS information about all interfaces is  
displayed.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show qos interface 137  
Example  
The following example displays the buffer settings for queues on Ethernet  
port 1.  
Console# show qos interface ether-  
net g1 buffers  
Ethernet g1  
Notify Q  
depth  
qi Si  
d
ze  
1
12  
5
2
3
4
5
6
7
8
12  
5
12  
5
12  
5
12  
5
12  
5
12  
5
12  
5
qi  
d
Threshold  
1
2
3
10  
0
10  
0
10  
0
Download from Www.Somanuals.com. All Manuals Search And Download.  
138  
CHAPTER 9: QOS COMMANDS  
4
5
6
7
8
10  
0
N/  
A
N/  
A
N/  
A
N/  
A
qi Mi Ma Pr Mi Ma Pr Mi Ma Prob  
Weight  
d
n
x
ob n  
x
ob n  
x
DP2  
DP DP DP DP DP DP DP DP  
0
0
0
1
1
1
2
2
1
2
3
4
N/ N/ N/ N/ N/ N/ N/ N/ N/A  
N/A  
N/A  
N/A  
N/A  
A
A
A
A
A
A
A
A
N/ N/ N/ N/ N/ N/ N/ N/ N/A  
A
A
A
A
A
A
A
A
N/ N/ N/ N/ N/ N/ N/ N/ N/A  
A
A
A
A
A
A
A
A
N/ N/ N/ N/ N/ N/ N/ N/ N/A  
A
A
A
A
A
A
A
A
5
6
7
8
50 60 13 65 80 6  
50 60 13 65 80 6  
50 60 13 65 80 6  
50 60 13 65 80 6  
85 95 4  
85 95 4  
85 95 4  
85 95 4  
2
2
2
2
qos map  
policed-dscp  
The qos map policed-dscp Global Configuration mode command  
modifies the policed-DSCP map for remarking purposes. To restore the  
default map, use the no form of this command.  
Syntax  
qos map policed-dscp dscp-list to dscp-mark-down  
no qos map policed-dscp  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
qos map dscp-queue 139  
Parameters  
dscp- list — Specifies up to 8 DSCP values separated by a space.  
(Range: 0-63)  
dscp-mark-down — Specifies the DSCP value to mark down. (Range:  
0-63)  
Default Configuration  
The default map is the Null map, which means that each incoming DSCP  
value is mapped to the same DSCP value.  
Command Mode  
Global Configuration mode.  
User Guidelines  
DSCP values 3,11,19… cannot be remapped to other values.  
Example  
The following example marks down incoming DSCP value 3 as DSCP  
value 43 on the policed-DSCP map.  
Console(config)# qos map policed-dscp  
3
to 43  
Reserved DSCP. DSCP 3 was not configured.  
qos map  
dscp-queue  
The qos map dscp-queue Global Configuration mode command  
modifies the DSCP to CoS map. To restore the default map, use the no  
form of this command.  
Syntax  
qos map dscp-queue dscp-list to queue-id  
no qos map dscp-queue  
Parameters  
dscp-list — Specifies up to 8 DSCP values separated by a space.  
(Range: 0 - 63)  
queue-id — Specifies the queue number to which the DSCP values are  
mapped.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
140  
CHAPTER 9: QOS COMMANDS  
Default Configuration  
The following table describes the default map.  
DSCP  
value  
0-7  
1
8-15  
2
16-23 24-31 32-39 40-47 48-56 57-63  
Queu  
e-ID  
3
4
5
6
7
8
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example maps DSCP values 33, 40 and 41 to queue 1.  
Console(config)# qos map dscp-queue 33 40 41 to  
1
qos trust (Global)  
The qos trust Global Configuration mode command configures the  
system to the basic mode and trust state. To return to the untrusted state,  
use the no form of this command.  
Syntax  
qos trust {cos | dscp}  
no qos trust  
Parameters  
cos — Indicates that ingress packets are classified with packet CoS  
values. Untagged packets are classified with the default port CoS  
value.  
dscp — Indicates that ingress packets are classified with packet DSCP  
values.  
Default Configuration  
CoS is the default trust mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
qos trust (Interface) 141  
Command Mode  
Global Configuration mode  
User Guidelines  
Packets entering a quality of service (QoS) domain are classified at the  
edge of the QoS domain. When packets are classified at the edge, the  
switch port within the QoS domain can be configured to one of the  
trusted states because there is no need to classify the packets at every  
device in the domain.  
A switch port on an inter-QoS domain boundary can be configured to the  
DSCP trust state, and, if the DSCP values are different between the QoS  
domains, the DSCP to DSCP mutation map can be applied.  
Use this command to specify whether the port is trusted and which fields  
of the packet to use to classify traffic.  
When the system is configured as trust DSCP, traffic is mapped to a  
queue according to the DSCP-queue map.  
Example  
The following example configures the system to the DSCP trust state.  
Console(config)# qos trust dscp  
qos trust (Interface) The qos trust Interface Configuration (Ethernet, port-channel) mode  
command enables each port trust state while the system is in the basic  
QoS mode. To disable the trust state on each port, use the no form of this  
command.  
Syntax  
qos trust  
no qos trust  
Default Configuration  
qos trust is enabled on each port when the system is in basic mode.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
142  
CHAPTER 9: QOS COMMANDS  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures Ethernet port 15 to the default trust  
state.  
Console(config)# interface ethernet 15  
Console(config-if) qos trust  
qos cos  
The qos cos Interface Configuration (Ethernet, port-channel) mode  
command defines the default CoS value of a port. To restore the default  
configuration, use the no form of this command.  
Syntax  
qos cos default-cos  
no qos cos  
Parameters  
default-cos — Specifies the default CoS value of the port. (Range: 0-7)  
Default Configuration  
Default CoS value of a port is 0.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
If the port is trusted, the default CoS value of the port is used to assign a  
CoS value to all untagged packets entering the port.  
Example  
The following example configures port g15 default CoS value to 3.  
Console(config)# interface ethernet g15  
Console(config-if) qos cos 3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
qos dscp-mutation 143  
qos dscp-mutation  
The qos dscp-mutation Global Configuration mode command applies  
the DSCP Mutation map to a system DSCP trusted port. To restore the  
trust state with no DSCP mutation, use the no form of this command.  
Syntax  
qos dscp-mutation  
no qos dscp-mutation  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode.  
User Guidelines  
The DSCP to DSCP mutation map is applied to a port at the boundary of  
a Quality of Service (QoS) administrative domain.  
If two QoS domains have different DSCP definitions, use the DSCP to  
DSCP mutation map to match one set of DSCP values with the DSCP  
values of another domain.  
Apply the DSCP to DSCP mutation map only to ingress and to  
DSCP-trusted ports. Applying this map to a port causes IP packets to be  
rewritten with newly mapped DSCP values at the ingress ports.  
If the DSCP to DSCP mutation map is applied to an untrusted port, class  
of service (CoS) or IP-precedence trusted port, this command has no  
immediate effect until the port becomes DSCP-trusted.  
Example  
The following example applies the DSCP Mutation Map to system DSCP  
trusted ports.  
Console(config)# qos dscp-mutation  
qos map  
dscp-mutation  
The qos map dscp-mutation Global Configuration mode command  
modifies the DSCP to DSCP mutation map. To restore the default DSCP to  
DSCP mutation map, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
144  
CHAPTER 9: QOS COMMANDS  
Syntax  
qos map dscp-mutation in-dscp to out-dscp  
no qos map dscp-mutation  
Parameters  
in-dscp — Specifies up to 8 DSCP values separated by spaces. (Range:  
0-63)  
out-dscp — Specifies up to 8 DSCP values separated by spaces.  
(Range: 0-63)  
Default Configuration  
The default map is the Null map, which means that each incoming DSCP  
value is mapped to the same DSCP value.  
Command Mode  
Global Configuration mode.  
User Guidelines  
This is the only map that is not globally configured. it is possible to have  
several maps and assign each one to different ports.  
Example  
The following example changes DSCP values 1, 2, 4, 5 and 6 to DSCP  
Mutation Map value 63.  
Console(config)# qos map dscp-mutation 1 2 4 5 6 to 63  
security-suite  
enable  
The security-suite enable Global Configuration mode command  
enables the security suite feature. Use the no form of this command to  
disable the security suite feature.  
Syntax  
security-suite enable global-rules-only  
no security-suite enable  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
security-suite dos protect 145  
Parameters  
global-rules-only — Specifies that all the security suites commands  
would be only global commands. This setting saves space in the  
Ternary Content Addressable Memory (TCAM).  
Default Configuration  
No protection is configured.  
Command Mode  
Global Configuration mode  
User Guidelines  
MAC ACLs should be removed before the security-suite is enabled. The  
rules can be reentered after the security-suite is enabled.  
If ACLs or policy maps are assigned on ports, per interface security-suite  
rules cannot be enabled.  
Example  
The following example enables the security suite feature and specifies  
that all the security suites commands would be only global commands.  
Console(config)# security-suite enable global-rules-only  
security-suite dos  
protect  
The security-suite dos protect Global Configuration mode command  
protects the system from specific well-known Denial Of Service attacks.  
Use the no form of this command to disable protection.  
Syntax  
security-suite dos protect {add attack | remove attack}  
no security-suite dos protect  
Parameters  
attack — Specify the attack type. See the usage guidelines for list of  
attacks.  
Default Configuration  
No protection is configured.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
146  
CHAPTER 9: QOS COMMANDS  
Command Mode  
Global Configuration mode  
User Guidelines  
The following table describes a list of DoS attacks and the protection  
type:  
Attack  
Keyword  
Protection  
Stacheldraht  
Distribution DoS attack  
stacheldraht  
Discard TCP packets with source TCP  
port equal to 16660.  
Invasor Trojan  
invasor-trojan  
Discard TCP packets with destination  
TCP port equal to 2140 and source  
TCP port equal to 1024.  
Back Orifice Trojan  
back-orifice-tr  
ojan  
Discard UDP packets with destination  
UDP port equal to 31337 and source  
UDP port equal to 1024.  
Example  
The following example protects the system from the Invasor Trojan.  
Console(config)# security-suite dos protect add  
invasor-trojan  
security-suite deny  
martian-addresses  
The security-suite deny martian-addresses Global Configuration  
mode command denies packets containing reserved IP addresses. Use the  
no form of this command to permit those addresses.  
Syntax  
security-suite deny martian-addresses {reserved | add {ip-address  
{mask | prefix-length}} | remove {ip-address {mask | prefix-length}}  
no security-suite deny martian-addresses  
Parameters  
ip-address — Specify the packets to discard, with that IP address as  
the source IP address or the destination IP address.  
mask — Specifies the network mask of the IP address.  
prefix-length — Specifies the number of bits that comprise the IP  
address prefix. The prefix length must be preceded by a forward slash  
(/).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
security-suite deny martian-addresses 147  
reserved — Specify to discard packets with source address or  
destination address in the block of the reserved IP addresses. See the  
usage guidelines for a list of reserved addresses.  
Default Configuration  
Martian addresses are allowed.  
Command Mode  
Global Configuration mode  
User Guidelines  
The following table describes the reserved addresses:  
Address block  
Present use  
0.0.0.0/8 (except 0.0.0.0/32  
as source address)  
Addresses in this block refer to source hosts on  
"this" network.  
127.0.0.0/8  
This block is assigned for use as the Internet host  
loopback address.  
192.0.2.0/24  
This block is assigned as "TEST-NET" for use in  
documentation and example code.  
224.0.0.0/4 as source  
This block, formerly known as the Class D address  
space, is allocated for use in IPv4 multicast  
address assignments.  
240.0.0.0/4 (except  
255.255.255.255/32 as  
destination address)  
This block, formerly known as the Class E address  
space, is reserved.  
The following table describes some other Special IP addresses:  
Address block  
10.0.0.0/8  
Present use  
Private-Use Networks.  
169.254.0.0/16  
This is the "link local" block. It is allocated for  
communication between hosts on a single link.  
Hosts obtain these addresses by  
auto-configuration, such as when a DHCP server  
may not be found.  
172.16.0.0/12  
192.88.99.0/24  
Private-Use Networks.  
This block is allocated for use as 6to4 relay  
anycast addresses.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
148  
CHAPTER 9: QOS COMMANDS  
Address block  
Present use  
192.168.0.0/16  
198.18.0.0/15  
Private-Use Networks.  
This block has been allocated for use in  
benchmark tests of network interconnect  
devices.  
Example  
The following example discard all packets with a source address or a  
destination address in the block of the reserved IP addresses.  
Console(config)# security-suite deny martian-addresses  
reserved add 127.0.0.0/8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CLOCK COMMANDS  
10  
clock set  
The clock set Privileged EXEC mode command manually sets the system  
clock.  
Syntax  
clock set hh:mm:ss day month year  
or  
clock set hh:mm:ss month day year  
Parameters  
hh:mm:ss — Current time in hours (military format), minutes, and  
seconds. (hh: 0-23, mm: 0-59, ss: 0-59)  
day — Current day (by date) in the month. (Range: 1-31)  
month — Current month using the first three letters by name. (Range:  
Jan, …, Dec)  
year — Current year. (Range: 2000-2097)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
150  
CHAPTER 10: CLOCK COMMANDS  
Example  
The following example sets the system time to 13:32:00 on March 7th,  
2005.  
Console# clock set 13:32:00 7 Mar 2005  
clock source  
The clock source Global Configuration mode command configures an  
external time source for the system clock. Use no form of this command  
to disable external time source.  
Syntax  
clock source {sntp}  
no clock source  
Parameters  
sntp — SNTP servers  
Default Configuration  
No external clock source  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures an external time source for the system  
clock.  
Console(config)# clock source sntp  
clock timezone  
The clock timezone Global Configuration mode command sets the time  
zone for display purposes. To set the time to the Coordinated Universal  
Time (UTC), use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
clock summer-time 151  
Syntax  
clock timezone hours-offset [minutes minutes-offset] [zone acronym]  
no clock timezone  
Parameters  
hours-offset — Hours difference from UTC. (Range: –12 hours to +13  
hours)  
minutes-offset — Minutes difference from UTC. (Range: 0-59)  
acronym — The acronym of the time zone. (Range: Up to 4  
characters)  
Default Configuration  
Clock set to UTC.  
Command Mode  
Global Configuration mode  
User Guidelines  
The system internally keeps time in UTC, so this command is used only for  
display purposes and when the time is manually set.  
Example  
The following example sets the timezone to 6 hours difference from UTC.  
Console(config)# clock timezone -6 zone CST  
clock summer-time  
The clock summer-time Global Configuration mode command  
configures the system to automatically switch to summer time (daylight  
saving time). To configure the software not to automatically switch to  
summer time, use the no form of this command.  
Syntax  
clock summer-time recurring {usa | eu | {week day month hh:mm  
week day month hh:mm}} [offset offset] [zone acronym]  
clock summer-time date date month year hh:mm date month year  
hh:mm [offset offset] [zone acronym]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
152  
CHAPTER 10: CLOCK COMMANDS  
clock summer-time date month date year hh:mm month date year  
hh:mm [offset offset] [zone acronym]  
no clock summer-time recurring  
Parameters  
recurring — Indicates that summer time should start and end on the  
corresponding specified days every year.  
date — Indicates that summer time should start on the first specific  
date listed in the command and end on the second specific date in the  
command.  
usa — The summer time rules are the United States rules.  
eu — The summer time rules are the European Union rules.  
week — Week of the month. (Range: 1-5, first, last)  
day — Day of the week (Range: first three letters by name, like sun)  
date — Date of the month. (Range:1-31)  
month — Month. (Range: first three letters by name, like Jan)  
year — year - no abbreviation (Range: 2000-2097)  
hh:mm — Time in military format, in hours and minutes. (Range: hh:  
0-23, mm:0-59)  
offset — Number of minutes to add during summer time. (Range:  
1-1440)  
acronym — The acronym of the time zone to be displayed when  
summer time is in effect. (Range: Up to 4 characters)  
Default Configuration  
Summer time is disabled.  
offset — Default is 60 minutes.  
acronym — If unspecified default to the timezone acronym.  
If the timezone has not been defined, the default is UTC.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
sntp authentication-key 153  
User Guidelines  
In both the date and recurring forms of the command, the first part of  
the command specifies when summer time begins, and the second part  
specifies when it ends. All times are relative to the local time zone. The  
start time is relative to standard time. The end time is relative to summer  
time. If the starting month is chronologically after the ending month, the  
system assumes that you are in the southern hemisphere.  
USA rule for daylight savings time:  
Start: First Sunday in April  
End: Last Sunday in October  
Time: 2 am local time  
EU rule for daylight savings time:  
Start: Last Sunday in March  
End: Last Sunday in October  
Time: 1.00 am (01:00)  
Example  
The following example sets summer time starting on the first Sunday in  
April at 2 am and finishing on the last Sunday in October at 2 am.  
Console(config)# clock summer-time recurring first sun apr 2:00  
last sun oct 2:00  
sntp  
The sntp authentication-key Global Configuration mode command  
defines an authentication key for Simple Network Time Protocol (SNTP).  
To remove the authentication key for SNTP, use the no form of this  
command.  
authentication-key  
Syntax  
sntp authentication-key number md5 value  
no sntp authentication-key number  
Parameters  
number — Key number (Range: 1-4294967295)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
154  
CHAPTER 10: CLOCK COMMANDS  
value — Key value (Range: 1-8 characters)  
Default Configuration  
No authentication key is defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
Multiple keys can be generated.  
Example  
The following example defines the authentication key for SNTP.  
Console(config)# sntp authentication-key  
8
md5 ClkKey  
sntp authenticate  
The sntp authenticate Global Configuration mode command grants  
authentication for received Simple Network Time Protocol (SNTP) traffic  
from servers. To disable the feature, use the no form of this command.  
Syntax  
sntp authenticate  
no sntp authenticate  
Default Configuration  
No authentication  
Command Mode  
Global Configuration mode  
User Guidelines  
The command is relevant for both unicast and broadcast.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
sntp trusted-key 155  
Example  
The following example defines the authentication key for SNTP and  
grants authentication.  
Console(config)# sntp authentication-key  
Console(config)# sntp trusted-key  
8
md5 ClkKey  
8
sntp trusted-key  
The sntp trusted-key Global Configuration mode command  
authenticates the identity of a system to which Simple Network Time  
Protocol (SNTP) will synchronize. To disable authentication of the identity  
of the system, use the no form of this command.  
Syntax  
sntp trusted-key key-number  
no sntp trusted-key key-number  
Parameters  
key-number — Key number of authentication key to be trusted.  
(Range: 1-4294967295)  
Default Configuration  
No keys are trusted.  
Command Mode  
Global Configuration mode  
User Guidelines  
The command is relevant for both received unicast and broadcast.  
If there is at least 1 trusted key, then unauthenticated messages will be  
ignored.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
156  
CHAPTER 10: CLOCK COMMANDS  
Example  
The following example authenticates key 8.  
Console(config)# sntp authentication-key  
Console(config)# sntp trusted-key  
8
md5 ClkKey  
8
sntp client poll  
timer  
The sntp client poll timer Global Configuration mode command sets  
the polling time for the Simple Network Time Protocol (SNTP) client. To  
restoreTo restoreTo restore default configuration, use the no form of this  
command.  
Syntax  
sntp client poll timer seconds  
no sntp client poll timer  
Parameters  
seconds — Polling interval in seconds. (Range: 60-86400)  
Default Configuration  
Polling interval is 1024 seconds.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets the polling time for the SNTP client to 120  
seconds.  
Console(config)# sntp client poll timer 120  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
sntp anycast client enable 157  
sntp anycast client  
enable  
The sntp anycast client enable Global Configuration mode command  
enables SNTP anycast client. To disable the SNTP anycast client, use the  
no form of this command.  
Syntax  
sntp anycast client enable  
no sntp anycast client enable  
Default Configuration  
The SNTP anycast client is disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Polling time is determined by the sntp client poll timer Global  
Configuration mode command.  
Use the sntp client enable (Interface) Interface Configuration mode  
command to enable the SNTP client on a specific interface.  
Example  
The following example enables SNTP anycast clients.  
console(config)# sntp anycast client enable  
sntp client enable  
(Interface)  
The sntp client enable Interface Configuration (Ethernet, port-channel,  
VLAN) mode command enables the Simple Network Time Protocol (SNTP)  
client on an interface. This applies to both receive broadcast and anycast  
updates. To disable the SNTP client, use the no form of this command.  
Syntax  
sntp client enable  
no sntp client enable  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
158  
CHAPTER 10: CLOCK COMMANDS  
Default Configuration  
The SNTP client is disabled on an interface.  
Command Mode  
Interface Configuration (Ethernet, port-channel, VLAN) mode  
User Guidelines  
Use the sntp anycast client enable Global Configuration mode  
command to enable anycast clients globally.  
Example  
The following example enables the SNTP client on Ethernet port g3.  
Console(config)# interface ethernet g3  
Console(config-if)# sntp client enable  
sntp unicast client  
enable  
The sntp unicast client enable Global Configuration mode command  
enables the device to use the Simple Network Time Protocol (SNTP) to  
request and accept SNTP traffic from servers. To disable requesting and  
accepting SNTP traffic from servers, use the no form of this command.  
Syntax  
sntp unicast client enable  
no sntp unicast client enable  
Default Configuration  
The SNTP unicast client is disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Use the sntp server Global Configuration mode command to define  
SNTP servers.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
sntp unicast client poll 159  
Example  
The following example enables the device to use the Simple Network  
Time Protocol (SNTP) to request and accept SNTP traffic from servers.  
Console(config)# sntp unicast client enable  
sntp unicast client  
poll  
The sntp unicast client poll Global Configuration mode command  
enables polling for the Simple Network Time Protocol (SNTP) predefined  
unicast servers. To disable the polling for SNTP client, use the no form of  
this command.  
Syntax  
sntp unicast client poll  
no sntp unicast client poll  
Default Configuration  
Polling is disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Polling time is determined by the sntp client poll timer Global  
Configuration mode command.  
Example  
The following example enables polling for SNTP predefined unicast  
clients.  
Console(config)# sntp unicast client poll  
sntp server  
The sntp server Global Configuration mode command configures the  
device to use the Simple Network Time Protocol (SNTP) to request and  
accept SNTP traffic from a specified server. To remove a server from the  
list of SNTP servers, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
160  
CHAPTER 10: CLOCK COMMANDS  
Syntax  
sntp server {ip-address | hostname}[poll] [key keyid]  
no sntp server host  
Parameters  
ip-address — IP address of the server.  
hostname — Hostname of the server. (Range: 1-158 characters)  
poll — Enable polling.  
keyid — Authentication key to use when sending packets to this peer.  
(Range:1-4294967295)  
Default Configuration  
No servers are defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
Up to 8 SNTP servers can be defined.  
Use the sntp unicast client enable Global Configuration mode  
command to enable predefined unicast clients globally.  
To enable polling you should also use the sntp unicast client poll Global  
Configuration mode command for global enabling.  
Polling time is determined by the sntp client poll timer Global  
Configuration mode command.  
Example  
The following example configures the device to accept SNTP traffic from  
the server on 192.1.1.1.  
Console(config)# sntp server 192.1.1.1  
show clock  
The show clock Privileged EXEC mode command displays the time and  
date from the system clock.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show clock 161  
Syntax  
show clock [detail]  
Parameters  
detail — Shows timezone and summertime configuration.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
The symbol that precedes the show clock display indicates the following:  
Symbol  
Description  
*
Time is not authoritative.  
Time is authoritative.  
(blank)  
.
Time is authoritative, but SNTP is not synchronized.  
Example  
The following example displays the time and date from the system clock.  
Console# show clock  
15:29:03 PDT(UTC-7) Jun 17 2005  
Time source is SNTP  
Console# show clock detail  
15:29:03 PDT(UTC-7) Jun 17 2005  
Time source is SNTP  
Download from Www.Somanuals.com. All Manuals Search And Download.  
162  
CHAPTER 10: CLOCK COMMANDS  
Time zone:  
Acronym is PST  
Offset is UTC-8  
Summertime:  
Acronym is PDT  
Recurring every year.  
Begins at first Sunday of April at 2:00.  
Ends at last Sunday of October at 2:00.  
Offset is 60 minutes.  
show sntp  
configuration  
The show sntp configuration Privileged EXEC mode command shows  
the configuration of the Simple Network Time Protocol (SNTP).  
Syntax  
show sntp configuration  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the current SNTP configuration of the  
device.  
Console# show sntp configuration  
Polling interval: 1024 seconds  
MD5 Authentication keys: 8, 9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show sntp status 163  
Authentication is required for synchronization.  
Trusted Keys: 8, 9  
Unicast Clients Polling: Enabled  
Server  
Polling  
-------  
Enabled  
Disabled  
Encryption Key  
--------------  
9
-----------  
176.1.1.8  
176.1.8.179  
Disabled  
Broadcast Clients: Enabled  
Anycast Clients: Enabled  
Broadcast Interfaces: g1, g3  
show sntp status  
The show sntp status Privileged EXEC mode command shows the status  
of the Simple Network Time Protocol (SNTP).  
Syntax  
show sntp status  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
164  
CHAPTER 10: CLOCK COMMANDS  
Example  
The following example shows the status of the SNTP.  
Console# show sntp status  
Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast  
Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993)  
Unicast servers:  
Server  
Status  
Last response  
Offset  
[mSec]  
Delay  
[mSec]  
--------  
---  
-------  
Up  
-------------------- ------  
--------  
------  
117.79  
189.19  
176.1.1.  
8
19:58:22.289 PDT Feb  
19 2005  
7.33  
176.1.8.  
179  
Unknown  
12:17.17.987 PDT Feb  
19 2005  
8.98  
Anycast server:  
Server  
Interfac  
e
Status  
-----  
Last  
response  
Offset  
Delay  
[mSec]  
------  
[mSec]  
-----  
--------  
-
-------  
--------  
--------  
--------  
-----  
176.1.11  
.8  
VLAN 118  
Up  
9:53:21.  
789 PDT  
Feb 19  
2005  
7.19  
119.89  
Broadcas  
t:  
Interfac  
e
IP  
Address  
Last response  
--------  
-
--------  
-
----------------------------  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show sntp status 165  
g13  
0.0.0.0  
00:00:00.0 Feb 19 2005  
vlan 1  
16.1.1.2  
00  
15:15:16  
.0 LLBG  
Feb 19  
2006  
Download from Www.Somanuals.com. All Manuals Search And Download.  
166  
CHAPTER 10: CLOCK COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RMON COMMANDS  
11  
show rmon  
statistics  
The show rmon statistics Privileged EXEC mode command displays  
RMON Ethernet statistics.  
Syntax  
show rmon statistics {ethernet interface number | port-channel  
port-channel-number}  
Parameters  
interface number — Valid Ethernet port.  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays RMON Ethernet statistics for Ethernet  
port g1.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
168  
CHAPTER 11: RMON COMMANDS  
Console# show rmon statistics ethernet 1  
Port: 1  
Octets: 878128  
Broadcast: 7  
Packets: 978  
Multicast: 1  
CRC Align Errors: 0  
Undersize Pkts: 0  
Fragments: 0  
Collisions: 0  
Oversize Pkts: 0  
Jabbers: 0  
64 Octets: 98  
65 to 127 Octets: 0  
256 to 511 Octets: 0  
1024 to 1518 Octets: 389  
128 to 255 Octets: 0  
512 to 1023 Octets: 491  
The following table describes the significant fields shown in the display.  
Field  
Description  
Octets  
The total number of octets of data (including those in bad  
packets) received on the network (excluding framing bits but  
including FCS octets).  
Packets  
The total number of packets (including bad packets, broadcast  
packets, and multicast packets) received.  
Broadcast  
Multicast  
The total number of good packets received and directed to the  
broadcast address. This does not include multicast packets.  
The total number of good packets received and directed to a  
multicast address. This number does not include packets  
directed to the broadcast address.  
CRC Align  
Errors  
The total number of packets received with a length (excluding  
framing bits, but including FCS octets) of between 64 and  
1518 octets, inclusive, but with either a bad Frame Check  
Sequence (FCS) with an integral number of octets (FCS Error)  
or a bad FCS with a non-integral number of octets (Alignment  
Error).  
Collisions  
The best estimate of the total number of collisions on this  
Ethernet segment.  
Undersize Pkts  
The total number of packets received, less than 64 octets long  
(excluding framing bits, but including FCS octets) and  
otherwise well formed.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
rmon collection history 169  
Field  
Description  
Oversize Pkts  
The total number of packets received, longer than 1518 octets  
(excluding framing bits, but including FCS octets) and  
otherwise well formed.  
Fragments  
Jabbers  
The total number of packets received, less than 64 octets in  
length (excluding framing bits but including FCS octets) and  
either a bad Frame Check Sequence (FCS) with an integral  
number of octets (FCS Error) or a bad FCS with a non-integral  
number of octets (Alignment Error).  
The total number of packets received, longer than 1518 octets  
(excluding framing bits, but including FCS octets), and either a  
bad Frame Check Sequence (FCS) with an integral number of  
octets (FCS Error) or a bad FCS with a non-integral number of  
octets (Alignment Error).  
64 Octets  
The total number of packets (including bad packets) received  
that are 64 octets in length (excluding framing bits but  
including FCS octets).  
65 to 127  
Octets  
The total number of packets (including bad packets) received  
that are between 65 and 127 octets in length inclusive  
(excluding framing bits but including FCS octets).  
128 to 255  
Octets  
The total number of packets (including bad packets) received  
that are between 128 and 255 octets in length inclusive  
(excluding framing bits but including FCS octets).  
256 to 511  
Octets  
The total number of packets (including bad packets) received  
that are between 256 and 511 octets in length inclusive  
(excluding framing bits but including FCS octets).  
512 to 1023  
Octets  
The total number of packets (including bad packets) received  
that are between 512 and 1023 octets in length inclusive  
(excluding framing bits but including FCS octets).  
1024 to 1518  
Octets  
The total number of packets (including bad packets) received  
that are between 1024 and 1518 octets in length inclusive  
(excluding framing bits but including FCS octets).  
rmon collection  
history  
The rmon collection history Interface Configuration (Ethernet,  
port-channel) mode command enables a Remote Monitoring (RMON)  
MIB history statistics group on an interface. To remove a specified RMON  
history statistics group, use the no form of this command.  
Syntax  
rmon collection history index [owner ownername] [buckets  
bucket-number] [interval seconds]  
no rmon collection history index  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
170  
CHAPTER 11: RMON COMMANDS  
Parameters  
index — Specifies the statistics group index . (Range: 1-65535)  
ownername — Specifies the RMON statistics group owner name.  
(Range: 0-160 characters)  
bucket-number — Number of buckets specified for the RMON  
collection history group of statistics. If unspecified, defaults to 50.  
(Range:1-65535)  
seconds — Number of seconds in each polling cycle. (Range: 1-3600)  
Default Configuration  
RMON statistics group owner name is an empty string.  
Number of buckets specified for the RMON collection history statistics  
group is 50.  
Number of seconds in each polling cycle is 1800.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
Cannot be configured for a range of interfaces (Range context).  
Example  
The following example enables a Remote Monitoring (RMON) MIB history  
statistics group on Ethernet port g1 with index number 1 and a polling  
interval period of 2400 seconds.  
Console(config)# interface ethernet g1  
Console(config-if)# rmon collection history 1 interval 2400  
show rmon  
collection history  
The show rmon collection history Privileged EXEC mode command  
displays the requested RMON history group statistics.  
Syntax  
show rmon collection history [ethernet interface | port-channel  
port-channel-number]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show rmon collection history 171  
Parameters  
interface — Valid Ethernet port. Elana  
port-channel-number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays all RMON history group statistics.  
Console# show rmon collection history  
Index  
-----  
Interfac  
e
Interval  
--------  
Requeste  
d
Samples  
Granted  
Samples  
Owner  
--------  
-
--------  
-
-------  
-------  
1
2
g1  
g1  
30  
50  
50  
50  
50  
CLI  
1800  
Manager  
The following table describes the significant fields shown in the display.  
Field  
Description  
Index  
An index that uniquely identifies the  
entry.  
Interface  
Interval  
The sampled Ethernet interface  
The interval in seconds between  
samples.  
Requested Samples  
Granted Samples  
Owner  
The requested number of samples to  
be saved.  
The granted number of samples to be  
saved.  
The entity that configured this entry  
Download from Www.Somanuals.com. All Manuals Search And Download.  
172  
CHAPTER 11: RMON COMMANDS  
show rmon history  
The show rmon history Privileged EXEC mode command displays  
RMON Ethernet history statistics.  
Syntax  
show rmon history index {throughput | errors | other} [period  
seconds]  
Parameters  
index — Specifies the requested set of samples. (Range: 1-65535)  
throughput — Indicates throughput counters.  
errors — Indicates error counters.  
other — Indicates drop and collision counters.  
seconds — Specifies the period of time in seconds. (Range:  
1-4294967295)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays RMON Ethernet history statistics for index  
1.  
Console# show rmon history  
1
throughput  
Sample Set: 1  
Interface: g1  
Owner: CLI  
Interval: 1800  
Granted samples: 50  
Requested samples:  
50  
Maximum table size: 500  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show rmon history 173  
Time  
Octets  
Packets  
-------  
Broadcas  
t
Multicas  
t
Util  
--------  
--------  
----  
--------  
-
--------  
--  
--------  
-
-----  
Jan 18  
2005  
21:57:00  
30359596  
2
357568  
275686  
3289  
2789  
7287  
5878  
19%  
20%  
Jan 18  
2005  
28769630  
4
21:57:30  
Console# show rmon history  
1
errors  
Sample Set: 1  
Interface: g1  
Owner: Me  
Interval: 1800  
Requested samples:  
50  
Granted samples: 50  
Maximum table size: 500 (800 after reset)  
Time  
CRC  
Align  
Undersiz  
e
Oversize  
--------  
0
Fragment  
s
Jabbers  
-------  
0
--------  
--  
--------  
-
--------  
-
--------  
-
Jan 18  
2005  
1
1
49  
21:57:00  
Jan 18  
2005  
1
1
0
27  
0
21:57:30  
Console# show rmon history  
1
other  
Download from Www.Somanuals.com. All Manuals Search And Download.  
174  
CHAPTER 11: RMON COMMANDS  
Sample Set: 1  
Owner: Me  
Interface: g1  
Interval: 1800  
Granted samples: 50  
Requested samples:  
50  
Maximum table size: 500  
Time  
Dropped  
Collisio  
ns  
------------------- --------  
-
--------  
--  
Jan 18 2005  
21:57:00  
3
0
Jan 18 2005  
21:57:30  
3
0
The following table describes significant fields shown in the example:  
Field  
Time  
Description  
Date and Time the entry is recorded.  
Octets  
The total number of octets of data (including those in bad  
packets) received on the network (excluding framing bits but  
including FCS octets).  
Packets  
The number of packets (including bad packets) received during  
this sampling interval.  
Broadcast  
Multicast  
The number of good packets received during this sampling  
interval that were directed to the broadcast address.  
The number of good packets received during this sampling  
interval that were directed to a multicast address. This number  
does not include packets addressed to the broadcast address.  
Util  
The best estimate of the mean physical layer network utilization  
on this interface during this sampling interval, in hundredths of  
a percent.  
CRC Align  
The number of packets received during this sampling interval  
that had a length (excluding framing bits but including FCS  
octets) between 64 and 1518 octets, inclusive, but had either a  
bad Frame Check Sequence (FCS) with an integral number of  
octets (FCS Error) or a bad FCS with a non-integral number of  
octets (Alignment Error).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
rmon alarm 175  
Field  
Description  
Undersize  
The number of packets received during this sampling interval  
that were less than 64 octets long (excluding framing bits but  
including FCS octets) and were otherwise well formed.  
Oversize  
The number of packets received during this sampling interval  
that were longer than 1518 octets (excluding framing bits but  
including FCS octets) but were otherwise well formed.  
Fragments  
The total number of packets received during this sampling  
interval that were less than 64 octets in length (excluding  
framing bits but including FCS octets) had either a bad Frame  
Check Sequence (FCS) with an integral number of octets (FCS  
Error), or a bad FCS with a non-integral number of octets  
(AlignmentError). It is normal for etherHistoryFragments to  
increment because it counts both runts (which are normal  
occurrences due to collisions) and noise hits.  
Jabbers  
The number of packets received during this sampling interval  
that were longer than 1518 octets (excluding framing bits but  
including FCS octets), and had either a bad Frame Check  
Sequence (FCS) with an integral number of octets (FCS Error)  
or a bad FCS with a non-integral number of octets (Alignment  
Error).  
Dropped  
The total number of events in which packets were dropped by  
the probe due to lack of resources during this sampling interval.  
This number is not necessarily the number of packets dropped,  
it is just the number of times this condition has been detected.  
Collisions  
The best estimate of the total number of collisions on this  
Ethernet segment during this sampling interval.  
rmon alarm  
The rmon alarm Global Configuration mode command configures alarm  
conditions. To remove an alarm, use the no form of this command.  
Syntax  
rmon alarm index variable interval rthreshold fthreshold revent fevent  
[type type] [startup direction] [owner name]  
no rmon alarm index  
Parameters  
index — Specifies the alarm index. (Range: 1-65535)  
variable — Specifies the object identifier of the variable to be sampled.  
interval — Specifies the interval in seconds during which the data is  
sampled and compared with rising and falling thresholds. (Range:  
0-2147483647)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
176  
CHAPTER 11: RMON COMMANDS  
rthreshold — Specifies the rising threshold. (Range: 0-2147483647)  
fthreshold — Specifies the falling threshold. (Range: 0-2147483647)  
revent — Specifies the event index used when a rising threshold is  
crossed.(Range: 1-65535)  
fevent — Specifies the event index used when a falling threshold is  
crossed. (Range: 1-65535)  
type — Specifies the method used for sampling the selected variable  
and calculating the value to be compared against the thresholds.  
Possible values are absolute and delta.  
If the method is absolute, the value of the selected variable is compared  
directly with the thresholds at the end of the sampling interval. If the  
method is delta, the selected variable value of the last sample is subtracted  
from the current value, and the difference is compared with the thresholds.  
direction — Specifies the alarm that may be sent when this entry is  
first set to valid. Possible values are rising, rising-falling and falling.  
If the first sample (after this entry becomes valid) is greater than or equal  
to rthreshold and direction is equal to rising or rising-falling, a single  
rising alarm is generated. If the first sample (after this entry becomes  
valid) is less than or equal to fthreshold and direction is equal to falling or  
rising-falling, a single falling alarm is generated.  
name — Specifies the name of the person who configured this alarm.  
If unspecified, the name is an empty string.  
Default Configuration  
The type is absolute.  
The startup direction is rising-falling.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the following alarm conditions:  
Alarm index — 1000  
Variable identifier — 3Com  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show rmon alarm-table 177  
Sample interval — 360000 seconds  
Rising threshold — 1000000  
Falling threshold — 1000000  
Rising threshold event index — 10  
Falling threshold event index — 20  
Console(config)# rmon alarm 1000 3Com 360000 1000000 1000000 10  
20  
show rmon  
alarm-table  
The show rmon alarm-table Privileged EXEC mode command displays  
the alarms table.  
Syntax  
show rmon alarm-table  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the alarms table.  
Console# show rmon alarm-table  
Index  
-----  
OID  
Owner  
-------------------- -------  
--  
1
1.3.6.1.2.1.2.2.1.10 CLI  
.1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
178  
CHAPTER 11: RMON COMMANDS  
2
3
1.3.6.1.2.1.2.2.1.10 Manager  
.1  
1.3.6.1.2.1.2.2.1.10 CLI  
.9  
The following table describes significant fields shown in the example:  
Field  
Index  
OID  
Description  
An index that uniquely identifies the entry.  
Monitored variable OID.  
Owner  
The entity that configured this entry.  
show rmon alarm  
The show rmon alarm Privileged EXEC mode command displays alarm  
configuration.  
Syntax  
show rmon alarm number  
Parameters  
number — Specifies the alarm index. (Range: 1-65535)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays RMON 1 alarms.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show rmon alarm 179  
Console# show rmon alarm 1  
Alarm 1  
-------  
OID: 1.3.6.1.2.1.2.2.1.10.1  
Last sample Value: 878128  
Interval: 30  
Sample Type: delta  
Startup Alarm: rising  
Rising Threshold: 8700000  
Falling Threshold: 78  
Rising Event: 1  
Falling Event: 1  
Owner: CLI  
The following table describes the significant fields shown in the display:  
Field  
Alarm  
OID  
Description  
Alarm index.  
Monitored variable OID.  
Last Sample  
Value  
The statistic value during the last sampling period. For example, if  
the sample type is delta, this value is the difference between the  
samples at the beginning and end of the period. If the sample  
type is absolute, this value is the sampled value at the end of the  
period.  
Interval  
The interval in seconds over which the data is sampled and  
compared with the rising and falling thresholds.  
Sample Type  
The method of sampling the variable and calculating the value  
compared against the thresholds. If the value is absolute, the  
value of the variable is compared directly with the thresholds at  
the end of the sampling interval. If the value is delta, the value of  
the variable at the last sample is subtracted from the current  
value, and the difference compared with the thresholds.  
Startup  
Alarm  
The alarm that may be sent when this entry is first set. If the first  
sample is greater than or equal to the rising threshold, and  
startup alarm is equal to rising or rising and falling, then a single  
rising alarm is generated. If the first sample is less than or equal  
to the falling threshold, and startup alarm is equal falling or rising  
and falling, then a single falling alarm is generated.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
180  
CHAPTER 11: RMON COMMANDS  
Field  
Description  
Rising  
Threshold  
A sampled statistic threshold. When the current sampled value is  
greater than or equal to this threshold, and the value at the last  
sampling interval is less than this threshold, a single event is  
generated.  
Falling  
Threshold  
A sampled statistic threshold. When the current sampled value is  
less than or equal to this threshold, and the value at the last  
sampling interval is greater than this threshold, a single event is  
generated.  
Rising Event  
Falling Event  
Owner  
The event index used when a rising threshold is crossed.  
The event index used when a falling threshold is crossed.  
The entity that configured this entry.  
rmon event  
The rmon event Global Configuration mode command configures an  
event. To remove an event, use the no form of this command.  
Syntax  
rmon event index type [community text] [description text] [owner  
name]  
no rmon event index  
Parameters  
index — Specifies the event index. (Range: 1-65535)  
type — Specifies the type of notification generated by the device  
about this event. Possible values: none, log, trap, log-trap.  
community text — If the specified notification type is trap, an SNMP  
trap is sent to the SNMP community specified by this octet string.  
(Range: 0-127 characters)  
description text — Specifies a comment describing this event.  
(Range: 0-127 characters)  
name — Specifies the name of the person who configured this event.  
If unspecified, the name is an empty string.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show rmon events 181  
User Guidelines  
If log is specified as the notification type, an entry is made in the log table  
for each event. If trap is specified, an SNMP trap is sent to one or more  
management stations.  
Example  
The following example configures an event identified as index 10 and for  
which the device generates a notification in the log table.  
Console(config)# rmon event 10 log  
show rmon events  
The show rmon events Privileged EXEC mode command displays the  
RMON event table.  
Syntax  
show rmon events  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the RMON event table.  
Console# show rmon events  
Index  
-----  
Descript  
ion  
Type  
Communit  
y
Owner  
Last  
time  
sent  
--------  
------  
--------  
--------  
-
-------  
--------  
--------  
----  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
182  
CHAPTER 11: RMON COMMANDS  
1
2
Errors  
Log  
CLI  
Jan 18  
2006  
23:58:17  
High  
Broadcas  
t
Log-Trap  
device  
Manager  
Jan 18  
2006  
23:59:48  
The following table describes significant fields shown in the example:  
Field  
Description  
Index  
An index that uniquely identifies the event.  
A comment describing this event.  
Description  
Type  
The type of notification that the device generates about this  
event. Can have the following values: none, log, trap,  
log-trap. In the case of log, an entry is made in the log table for  
each event. In the case of trap, an SNMP trap is sent to one or  
more management stations.  
Community  
If an SNMP trap is to be sent, it is sent to the SNMP community  
specified by this octet string.  
Owner  
The entity that configured this event.  
Last time sent  
The time this entry last generated an event. If this entry has not  
generated any events, this value is zero.  
show rmon log  
The show rmon log Privileged EXEC mode command displays the RMON  
log table.  
Syntax  
show rmon log [event]  
Parameters  
event — Specifies the event index. (Range: 0-65535)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
rmon table-size 183  
Example  
The following example displays the RMON log table.  
Console# show rmon log  
Maximum table size: 500  
Event  
Description  
--------------  
Errors  
Time  
-------  
---------  
1
1
2
Jan 18 2006 23:48:19  
Jan 18 2006 23:58:17  
Jan 18 2006 23:59:48  
Errors  
High Broadcast  
Console# show rmon log  
Maximum table size: 500 (800 after reset)  
Event  
Description  
--------------  
Errors  
Time  
-------  
---------  
1
1
2
Jan 18 2006 23:48:19  
Jan 18 2006 23:58:17  
Jan 18 2006 23:59:48  
Errors  
High Broadcast  
The following table describes the significant fields shown in the display:  
Field  
Description  
Event  
An index that uniquely identifies the event.  
A comment describing this event.  
The time this entry was created.  
Description  
Time  
rmon table-size  
The rmon table-size Global Configuration mode command configures  
the maximum size of RMON tables. To return to the default  
configuration, use the no form of this command.  
Syntax  
rmon table-size {history entries | log entries}  
no rmon table-size {history | log}  
Parameters  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
184  
CHAPTER 11: RMON COMMANDS  
history entries — Maximum number of history table entries. (Range:  
20 -32767)  
log entries — Maximum number of log table entries. (Range:  
20-32767)  
Default Configuration  
History table size is 270.  
Log table size is 200.  
Command Mode  
Global Configuration mode  
User Guidelines  
The configured table size taskes effect after the device is rebooted.  
Example  
The following example configures the maximum RMON history table sizes  
to 100 entries.  
Console(config)# rmon table-size history 100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IGMP SNOOPING COMMANDS  
12  
ip igmp snooping  
(Global)  
The ip igmp snooping Global Configuration mode command enables  
Internet Group Management Protocol (IGMP) snooping. To disable IGMP  
snooping, use the no form of this command.  
Syntax  
ip igmp snooping  
no ip igmp snooping  
Default Configuration  
IGMP snooping is disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
IGMP snooping can only be enabled on static VLANs. It must not be  
enabled on Private VLANs or their community VLANs.  
Example  
The following example enables IGMP snooping.  
Console(config)# ip igmp snooping  
ip igmp snooping  
(Interface)  
The ip igmp snooping Interface Configuration (VLAN) mode command  
enables Internet Group Management Protocol (IGMP) snooping on a  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
186  
CHAPTER 12: IGMP SNOOPING COMMANDS  
specific VLAN. To disable IGMP snooping on a VLAN interface, use the no  
form of this command.  
Syntax  
ip igmp snooping  
no ip igmp snooping  
Default Configuration  
IGMP snooping is disabled .  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
IGMP snooping can only be enabled on static VLANs. It must not be  
enabled on Private VLANs or their community VLANs.  
Example  
The following example enables IGMP snooping on VLAN 2.  
Console(config)# interface vlan  
2
Console(config-if)# ip igmp snooping  
ip igmp snooping  
mrouter  
learn-pim-dvmrp  
The ip igmp snooping mrouter learn-pim-dvmrp Interface  
Configuration (VLAN) mode command enables automatic learning of  
multicast device ports in the context of a specific VLAN. To remove  
automatic learning of multicast device ports, use the no form of this  
command.  
Syntax  
ip igmp snooping mrouter learn-pim-dvmrp  
no ip igmp snooping mrouter learn-pim-dvmrp  
Default Configuration  
Automatic learning of multicast device ports is enabled.  
Command Mode  
Interface Configuration (VLAN) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ip igmp snooping host-time-out 187  
User Guidelines  
Multicast device ports can be configured statically using the bridge  
multicast forward-all Interface Configuration (VLAN) mode command.  
Example  
The following example enables automatic learning of multicast device  
ports on VLAN 2.  
Console(config) # interface vlan  
2
Console(config-if)# ip igmp snooping mrouter learn-pim-dvmrp  
ip igmp snooping  
host-time-out  
The ip igmp snooping host-time-out Interface Configuration (VLAN)  
mode command configures the host-time-out. If an IGMP report for a  
multicast group was not received for a host-time-out period from a  
specific port, this port is deleted from the member list of that multicast  
group. To restore the default configuration, use the no form of this  
command.  
Syntax  
ip igmp snooping host-time-out time-out  
no ip igmp snooping host-time-out  
Parameters  
time-out — Specifies the host timeout in seconds. (Range:  
1-2147483647)  
Default Configuration  
The default host-time-out is 260 seconds.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
The timeout should be at least greater than  
2*query_interval+max_response_time of the IGMP router.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
188  
CHAPTER 12: IGMP SNOOPING COMMANDS  
Example  
The following example configures the host timeout to 300 seconds.  
Console(config)# interface vlan  
2
Console(config-if)# ip igmp snooping host-time-out 300  
ip igmp snooping  
mrouter-time-out  
The ip igmp snooping mrouter-time-out Interface Configuration  
(VLAN) mode command configures the mrouter-time-out. The ip igmp  
snooping mrouter-time-out Interface Configuration (VLAN) mode  
command is used for setting the aging-out time after multicast device  
ports are automatically learned. To restore the default configuration, use  
the no form of this command.  
Syntax  
ip igmp snooping mrouter-time-out time-out  
no ip igmp snooping mrouter-time-out  
Parameters  
time-out — Specifies the Multicast device timeout in seconds (Range:  
1-2147483647)  
Default Configuration  
The default value is 300 seconds.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the multicast device timeout to 200  
seconds.  
Console(config)# interface vlan  
2
Console(config-if)# ip igmp snooping mrouter-time-out 200  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ip igmp snooping leave-time-out 189  
ip igmp snooping  
leave-time-out  
The ip igmp snooping leave-time-out Interface Configuration (VLAN)  
mode command configures the leave-time-out. If an IGMP report for a  
multicast group was not received for a leave-time-out period after an  
IGMP Leave was received from a specific port, this port is deleted from  
the member list of that multicast group.To restore the default  
configuration, use the no form of this command.  
Syntax  
ip igmp snooping leave-time-out {time-out | immediate-leave}  
no ip igmp snooping leave-time-out  
Parameters  
time-out — Specifies the leave-timeout in seconds for IGMP queries.  
(Range: 0-2147483647)  
immediate-leave — Indicates that the port should be immediately  
removed from the members list after receiving IGMP Leave.  
Default Configuration  
The default leave-time-out configuration is 10 seconds.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
The leave timeout should be set greater than the maximum time that a  
host is allowed to respond to an IGMP query.  
Use immediate leave only where there is just one host connected to a  
port.  
Example  
The following example configures the host leave timeout to 60 seconds.  
Console(config)# interface vlan  
2
Console(config-if)# ip igmp snooping leave-time-out 60  
show ip igmp  
snooping mrouter  
The show ip igmp snooping mrouter Privileged EXEC mode command  
displays information on dynamically learned multicast device interfaces.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
190  
CHAPTER 12: IGMP SNOOPING COMMANDS  
Syntax  
show ip igmp snooping mrouter [interface vlan-id]  
Parameters  
vlan-id — Specifies the VLAN number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays multicast device interfaces in VLAN 1000.  
Console# show ip igmp snooping mrouter interface 1000  
VLAN  
----  
1000  
Ports  
-----  
g1  
Detected multicast devices that are forbidden statically:  
VLAN  
----  
1000  
Ports  
-----  
g19  
show ip igmp  
snooping interface  
The show ip igmp snooping interface Privileged EXEC mode  
command displays IGMP snooping configuration.  
Syntax  
show ip igmp snooping interface vlan-id  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show ip igmp snooping groups 191  
Parameters  
vlan-id — Specifies the VLAN number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays IGMP snooping information on VLAN  
1000.  
Console# show ip igmp snooping interface  
4
IGMP Snooping is globaly disabled  
IGMP Snooping is enabled on VLAN 4  
IGMP host timeout is 260 sec  
IGMP Immediate leave is disabled. IGMP leave timeout is 10 sec  
IGMP mrouter timeout is 300 sec  
Automatic learning of multicast router ports is enabled  
show ip igmp  
snooping groups  
The show ip igmp snooping groups Privileged EXEC mode command  
displays multicast groups learned by IGMP snooping.  
Syntax  
show ip igmp snooping groups [vlan vlan-id] [address  
ip-multicast-address]  
Parameters  
vlan-id — Specifies the VLAN number.  
ip-multicast-address — Specifies the IP multicast address.  
Default Configuration  
This command has no default configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
192  
CHAPTER 12: IGMP SNOOPING COMMANDS  
Command Mode  
Privileged EXEC mode  
User Guidelines  
To see the full multicast address table (including static addresses) use the  
show bridge multicast address-table Privileged EXEC command.  
Example  
The following example shows IGMP snooping information on multicast  
groups.  
Console# show ip igmp snooping groups  
Vlan  
----  
IP Address  
Querier  
-------  
Ports  
--------------  
---  
----------  
1
224-239.130|2.  
2.3  
Yes  
Yes  
g1, g2  
g9-11  
19  
224-239.130|2.  
2.8  
IGMP Reporters that are forbidden statically:  
---------------------------------------------  
Vlan  
----  
IP Address  
Ports  
-----  
--------------  
---  
1
224-239.130|2.  
2.3  
g19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LACP COMMANDS  
13  
lacp system-priority The lacp system-priority Global Configuration mode command  
configures the system priority. To restore the default configuration, use  
the no form of this command.  
Syntax  
lacp system-priority value  
no lacp system-priority  
Parameters  
value — Specifies system priority value. (Range: 1-65535)  
Default Configuration  
The default system priority is 1.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the system priority to 120.  
Console(config)# lacp system-priority 120  
lacp port-priority  
The lacp port-priority Interface Configuration (Ethernet) mode  
command configures physical port priority. To return to the default  
configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
194  
CHAPTER 13: LACP COMMANDS  
Syntax  
lacp port-priority value  
no lacp port-priority  
Parameters  
value — Specifies port priority. (Range: 1-65535)  
Default Configuration  
The default port priority is 1.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example defines the priority of Ethernet port g6 as 247.  
Console(config)# interface ethernet g  
6
Console(config-if)# lacp port-priority 247  
lacp timeout  
The lacp timeout Interface Configuration (Ethernet) mode command  
assigns an administrative LACP timeout. To return to the default  
configuration, use the no form of this command.  
Syntax  
lacp timeout {long | short}  
no lacp timeout  
Parameters  
long — Specifies the long timeout value.  
short — Specifies the short timeout value.  
Default Configuration  
The default port timeout value is long.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show lacp ethernet 195  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example assigns a long administrative LACP timeout to  
Ethernet port g6.  
Console(config)# interface ethernet g  
6
Console(config-if)# lacp timeout long  
show lacp ethernet  
The show lacp ethernet Privileged EXEC mode command displays LACP  
information for Ethernet ports.  
Syntax  
show lacp ethernet interface [parameters | statistics |  
protocol-state]  
Parameters  
interface — Valid Ethernet port.Elana  
parameters — Link aggregation parameter information.  
statistics — Link aggregation statistics information.  
protocol-state — Link aggregation protocol-state information.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example display LACP information for Ethernet port 1.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
196  
CHAPTER 13: LACP COMMANDS  
Console# show lacp ethernet g1  
1 LACP parameters:  
Actor  
system  
1
priority:  
system mac  
addr:  
00:00:12:34:56  
:78  
port Admin  
key:  
30  
port Oper key:  
30  
21  
port Oper  
number:  
port Admin  
priority:  
1
port Oper  
priority:  
1
port Admin  
timeout:  
LONG  
LONG  
port Oper  
timeout:  
LACP Activity:  
Aggregation:  
collecting:  
distributing:  
expired:  
ACTIVE  
AGGREGATABLE  
FALSE  
FALSE  
FALSE  
Partner  
system  
0
priority:  
system mac  
addr:  
00:00:00:00:00  
:00  
port Admin  
key:  
0
Download from Www.Somanuals.com. All Manuals Search And Download.  
show lacp ethernet 197  
port Oper key:  
0
0
port Oper  
number:  
port Admin  
priority:  
0
port Oper  
priority:  
0
port Oper  
timeout:  
LONG  
LACP Activity:  
Aggregation:  
PASSIVE  
AGGREGATABLE  
FALSE  
synchronizatio  
n:  
collecting:  
distributing:  
expired:  
FALSE  
FALSE  
FALSE  
g1 LACP Statistics:  
LACP PDUs sent:  
2
2
LACP PDUs received:  
g1 LACP Protocol State:  
LACP State Machines:  
Receive FSM:  
Port Disabled  
State  
Mux FSM:  
Detached State  
Periodic Tx  
FSM:  
No Periodic  
State  
Control Variables:  
BEGIN:  
FALSE  
LACP_Enabled:  
Ready_N:  
TRUE  
FALSE  
Selected:  
UNSELECTED  
Download from Www.Somanuals.com. All Manuals Search And Download.  
198  
CHAPTER 13: LACP COMMANDS  
Port_moved:  
NNT:  
FALSE  
FALSE  
FALSE  
Port_enabled:  
Timer counters:  
periodic tx  
timer:  
0
0
0
current while  
timer:  
wait while  
timer:  
show lacp  
port-channel  
The show lacp port-channel Privileged EXEC mode command displays  
LACP information for a port-channel.  
Syntax  
show lacp port-channel [port_channel_number]  
Parameters  
port_channel_number — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays LACP information about port-channel 1.  
Console# show lacp port-channel  
1
Port-Channel ch1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show lacp port-channel 199  
Port Type Gigabit Ethernet  
Attached Lag id:  
Actor  
System  
1
Priority:  
MAC Address:  
00:02:85:0E:1C  
:00  
Admin Key:  
Oper Key:  
1000  
1000  
Partner  
System  
0
Priority:  
MAC Address:  
00:00:00:00:00  
:00  
Oper Key:  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
200  
CHAPTER 13: LACP COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
POWER OVER ETHERNET  
COMMANDS  
14  
power inline  
The power inline Interface Configuration mode command configures  
the administrative mode of the inline power on an interface.  
Syntax  
power inline {auto | never}  
Parameters  
auto — Turns on the device discovery protocol and applies power to  
the device.  
never Turns off the device discovery protocol and stops supplying  
power to the device.  
Default Configuration  
Auto  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example turns on the device discovery protocol on port 4.  
Console(config)# interface ethernet  
4
Console(config-if)# power inline auto  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
202  
CHAPTER 14: POWER OVER ETHERNET COMMANDS  
power inline  
powered-device  
The power inline powered-device Interface Configuration mode  
command adds a description of the powered device type. Use the no  
form of this command to remove the description.  
Syntax  
power inline powered-device pd-type  
no power inline powered-device  
Parameters  
pd-type — Comment or a description to assist in recognising what is  
the type of the powered device attached to this interface. (Range: up  
to 24 characters)  
Default Configuration  
There is no default configuration for this command.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example adds a description of the device connected to port  
4 as ‘ip phone’.  
Console(config)# interface ethernet  
4
Console(config-if)# power inline powered-device ip phone  
power inline  
priority  
The power inline priority Interface Configuration mode command  
configures the priority of the interface from the point of view of inline  
power management. Use the no form of this command to restore  
defaults.  
Syntax  
power inline priority {critical | high | low}  
no power inline priority  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
power inline usage-threshold 203  
Parameters  
critical — The operation of the powered device is critical.  
high — The operation of the powered device is in high priority.  
low — The operation of the powered is in low priority.  
Default Configuration  
Low priority  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets the priority of port 4 from the point of view  
of inline power management to ‘high’.  
Console(config)# interface ethernet  
4
Console(config-if)# power inline priority high  
power inline  
usage-threshold  
The power inline usage-threshold Global Configuration mode  
command configures the threshold for initiating inline power usage  
alarms. Use the no form of this command to restore defaults.  
Syntax  
power inline usage-threshold percents  
no power inline usage-threshold  
Parameters  
percents — Specifies the threshold in percents to compare to  
measured power. (Range: 1–99%)  
Default Configuration  
The default threshold is 95%.  
Command Mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
204  
CHAPTER 14: POWER OVER ETHERNET COMMANDS  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command. Example  
The following example configures the threshold for initiating inline power  
usage alarms to 90 percent.  
Console(config)# power inline usage-threshold 90  
power inline traps  
enable  
The power inline traps enable Global Configuration mode command  
enable inline power traps. Use the no form of this command to disable  
traps.  
Syntax  
power inline traps enable  
no power inline traps enable  
Parameters  
This command has no arguments or keywords.  
Default Configuration  
Disabled  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables inline power traps.  
Console(config)# power inline traps enable  
show power inline  
The show power inline Privileged EXEC mode command displays  
information about the inline power.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
show power inline 205  
Syntax  
show power inline [ethernet interface ]  
Parameters  
interface — Valid Ethernet port. Elana  
Default Configuration  
There is no default configuration for this command.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays information about the inline power.  
Console# show power inline  
Unit  
----  
1
Power  
-----  
On  
Nominal Consume Usage  
Thresho Traps  
ld  
Power  
r Power  
-----  
------- ------  
--  
------- -----  
--  
400  
0 Watts (0%)  
95  
Disabl  
e
Watts  
Admin  
Oper  
Port  
----  
Powere State  
d
Device  
Status  
Priorit  
y
Class  
------ ------ ------  
------  
---  
-------  
-
------  
-
--  
Download from Www.Somanuals.com. All Manuals Search And Download.  
206  
CHAPTER 14: POWER OVER ETHERNET COMMANDS  
1
2
3
Auto  
Auto  
Auto  
Search  
ing  
low  
low  
low  
class0  
class0  
class0  
Search  
ing  
Search  
ing  
Console# show power inline ethernet  
1
Admin  
Oper  
Port  
----  
Powere State  
d
Device  
Priori  
ty  
State  
Class  
------ ------ ------  
------ ------  
------  
------  
--  
--  
-
--  
g1  
IP  
Auto  
High  
On  
Class  
0
Phone  
Model  
A
Overload Counter: 1  
Short Counter: 0  
Denied Counter: 0  
Absent Counter: 0  
Invalid Signature Counter: 0  
The following table describes the fields shown in the display:  
Field  
Description  
Power  
The inline power sourcing equipment operational status.  
The inline power sourcing equipment nominal power in Watts.  
Measured usage power in Watts.  
Nominal Power  
Consumed  
Power  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show power inline 207  
Field  
Description  
Usage  
Threshold  
The usage threshold expressed in percents for comparing the  
measured power and initiating an alarm if threshold is  
exceeded.  
Traps  
Indicates if inline power traps are enabled.  
The Ethernet port number.  
Port  
Powered device  
Admin State  
A description of the powered device type.  
Indicates if the port is enabled to provide power. Admin State  
can be Auto or Never.  
Priority  
The priority of the port from the point of view of inline power  
management. Priority can be Critical, High or Low.  
Oper State  
Describes the inline power operational state of the port. Oper  
State can be On, Off, Test-Fail, Testing, Searching or Fault.  
Classification  
Power consumption classification of the powered device.  
Overload  
Counter  
Counts the number of overload conditions that has been  
detected.  
Short Counter  
Counts the number of short conditions that has been detected.  
DeniedCounter Counts the number of times power has been denied.  
AbsentCounter Counts the number of times power has been removed because  
powered device dropout was detected.  
Invalid  
Signature  
Counter  
Counts the number of times an invalid signature of a powered  
device was detected.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
208  
CHAPTER 14: POWER OVER ETHERNET COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SPANNING-TREE COMMANDS  
15  
spanning-tree  
The spanning-tree Global Configuration mode command enables  
spanning-tree functionality. To disable the spanning-tree functionality, use  
the no form of this command.  
Syntax  
spanning-tree  
no spanning-tree  
Default Configuration  
Spanning-tree is enabled.  
Command Modes  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables spanning-tree functionality.  
Console(config)# spanning-tree  
spanning-tree  
mode  
The spanning-tree mode Global Configuration mode command  
configures the spanning-tree protocol. To restore the default  
configuration, use the no form of this command.  
Syntax  
spanning-tree mode {stp | rstp| mstp}  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
210  
CHAPTER 15: SPANNING-TREE COMMANDS  
no spanning-tree mode  
Parameters  
stp — Indicates that the Spanning Tree Protocol (STP) is enabled.  
rstp — Indicates that the Rapid Spanning Tree Protocol (RSTP) is  
enabled.  
mstp — Indicates that the Multiple Spanning Tree Protocol (RSTP) is  
enabled.  
Default Configuration  
STP is enabled.  
Command Modes  
Global Configuration mode  
User Guidelines  
In RSTP mode, the device uses STP when the neighbor device uses STP.  
In MSTP mode, the device uses RSTP when the neighbor device uses RSTP  
and uses STP when the neighbor device uses STP.  
Example  
The following example configures the spanning-tree protocol to RSTP.  
console(config)# spanning-tree mode rstp  
spanning-tree  
forward-time  
The spanning-tree forward-time Global Configuration mode  
command configures the spanning-tree bridge forward time, which is the  
amount of time a port remains in the listening and learning states before  
entering the forwarding state. To restore the default configuration, use  
the no form of this command.  
Syntax  
spanning-tree forward-time seconds  
no spanning-tree forward-time  
Parameters  
seconds — Time in seconds. (Range: 4-30)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
spanning-tree hello-time 211  
Default Configuration  
The default forwarding time for the IEEE Spanning Tree Protocol (STP) is  
15 seconds.  
Command Modes  
Global Configuration mode  
User Guidelines  
When configuring the forwarding time, the following relationship should  
be kept:  
2*(Forward-Time - 1) >= Max-Age  
Example  
The following example configures the spanning tree bridge forwarding  
time to 25 seconds.  
Console(config)# spanning-tree forward-time 25  
spanning-tree  
hello-time  
The spanning-tree hello-time Global Configuration mode command  
configures the spanning tree bridge hello time, which is how often the  
device broadcasts hello messages to other devices.To restore the default  
configuration, use the no form of this command.  
Syntax  
spanning-tree hello-time seconds  
no spanning-tree hello-time  
Parameters  
seconds — Time in seconds. (Range: 1-10)  
Default Configuration  
The default hello time for IEEE Spanning Tree Protocol (STP) is 2 seconds.  
Command Modes  
Global Configuration mode  
User Guidelines  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
212  
CHAPTER 15: SPANNING-TREE COMMANDS  
When configuring the hello time, the following relationship should be  
kept:  
Max-Age >= 2*(Hello-Time + 1)  
Example  
The following example configures spanning tree bridge hello time to 5  
seconds.  
Console(config)# spanning-tree hello-time 5  
spanning-tree  
max-age  
The spanning-tree max-age Global Configuration mode command  
configures the spanning tree bridge maximum age. To restore the default  
configuration, use the no form of this command.  
Syntax  
spanning-tree max-age seconds  
no spanning-tree max-age  
Parameters  
seconds — Time in seconds. (Range: 6-40)  
Default Configuration  
The default maximum age for IEEE Spanning Tree Protocol (STP) is 20  
seconds.  
Command Modes  
Global Configuration mode  
User Guidelines  
When configuring the maximum age, the following relationships should  
be kept:  
2*(Forward-Time - 1) >= Max-Age  
Max-Age >= 2*(Hello-Time + 1)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
spanning-tree priority 213  
Example  
The following example configures the spanning tree bridge  
maximum-age to 10 seconds.  
Console(config)# spanning-tree max-age 10  
spanning-tree  
priority  
The spanning-tree priority Global Configuration mode command  
configures the spanning tree priority of the device. The priority value is  
used to determine which bridge is elected as the root bridge. To restore  
the default configuration, use the no form of this command.  
Syntax  
spanning-tree priority priority  
no spanning-tree priority  
Parameters  
priority — Priority of the bridge. (Range: 0-61440 in steps of 4096)  
Default Configuration  
The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.  
Command Modes  
Global Configuration mode  
User Guidelines  
The bridge with the lowest priority is elected as the root bridge.  
Example  
The following example configures spanning tree priority to 12288.  
Console(config)# spanning-tree priority 12288  
spanning-tree  
disable  
The spanning-tree disable Interface Configuration mode command  
disables spanning tree on a specific port. To enable spanning tree on a  
port, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
214  
CHAPTER 15: SPANNING-TREE COMMANDS  
Syntax  
spanning-tree disable  
no spanning-tree disable  
Default Configuration  
Spanning tree is enabled on all ports.  
Command Modes  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example disables spanning-tree on Ethernet port g5.  
Console(config)# interface ethernet g5  
Console(config-if)# spanning-tree disable  
spanning-tree cost  
The spanning-tree cost Interface Configuration mode command  
configures the spanning tree path cost for a port. To restore the default  
configuration, use the no form of this command.  
Syntax  
spanning-tree cost cost  
no spanning-tree cost  
Parameters  
cost — Path cost of the port (Range: 1-200,000,000)  
Default Configuration  
Default path cost is determined by port speed and path cost method  
(long or short) as shown below:  
Interface  
Long  
Short  
Port-channel  
20,000  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
spanning-tree port-priority 215  
Gigabit Ethernet (1000  
Mbps)  
20,000  
4
Fast Ethernet (100 Mbps) 200,000  
19  
Ethernet (10 Mbps)  
2,000,000  
100  
Command Modes  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
The path cost method is configured using the spanning-tree pathcost  
method Global Configuration mode command.  
Example  
The following example configures the spanning-tree cost on Ethernet  
port g15 to 35000.  
Console(config)# interface ethernet g15  
Console(config-if)# spanning-tree cost 35000  
spanning-tree  
port-priority  
The spanning-tree port-priority Interface Configuration mode  
command configures port priority. To restore the default configuration,  
use the no form of this command.  
Syntax  
spanning-tree port-priority priority  
no spanning-tree port-priority  
Parameters  
priority — The priority of the port. (Range: 0-240 in multiples of 16)  
Default Configuration  
The default port priority for IEEE Spanning TreeProtocol (STP) is 128.  
Command Modes  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
216  
CHAPTER 15: SPANNING-TREE COMMANDS  
Example  
The following example configures the spanning priority on Ethernet port  
g15 to 96.  
Console(config)# interface ethernet g15  
Console(config-if)# spanning-tree port-priority 96  
spanning-tree  
portfast  
The spanning-tree portfast Interface Configuration mode command  
enables PortFast mode. In PortFast mode, the interface is immediately put  
into the forwarding state upon linkup without waiting for the standard  
forward time delay. To disable PortFast mode, use the no form of this  
command.  
Syntax  
spanning-tree portfast [auto]  
no spanning-tree portfast  
Parameters  
auto — Specifies that the software waits for 3 seconds (With no  
BPDUs received on the interface) before putting the interface into the  
PortFast mode.  
Default Configuration  
PortFast mode is disabled.  
Command Modes  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
This feature should be used only with interfaces connected to end  
stations. Otherwise, an accidental topology loop could cause a data  
packet loop and disrupt device and network operations.  
Example  
The following example enables PortFast on Ethernet port g15.  
Console(config)# interface ethernet g15  
Console(config-if)# spanning-tree portfast  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
spanning-tree link-type 217  
spanning-tree  
link-type  
The spanning-tree link-type Interface Configuration mode command  
overrides the default link-type setting determined by the duplex mode of  
the port and enables Rapid Spanning Tree Protocol (RSTP) transitions to  
the forwarding state. To restore the default configuration, use the no  
form of this command.  
Syntax  
spanning-tree link-type {point-to-point | shared}  
no spanning-tree spanning-tree link-type  
Parameters  
point-to-point —Indicates that the port link type is point-to-point.  
shared — Indicates that the port link type is shared.  
Default Configuration  
The device derives the port link type from the duplex mode. A full-duplex  
port is considered a point-to-point link and a half-duplex port is  
considered a shared link.  
Command Modes  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables shared spanning-tree on Ethernet port  
g15.  
Console(config)# interface ethernet g15  
Console(config-if)# spanning-tree link-type shared  
spanning-tree  
pathcost method  
The spanning-tree pathcost method Global Configuration mode  
command sets the default path cost method. To return to the default  
configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
218  
CHAPTER 15: SPANNING-TREE COMMANDS  
Syntax  
spanning-tree pathcost method {long | short}  
no spanning-tree pathcost method  
Parameters  
long — Specifies port path costs with a range of 1-200,000,000 .  
short — Specifies port path costs with a range of 0-65,535.  
Default Configuration  
Short path cost method.  
Command Mode  
Global Configuration mode  
User Guidelines  
This command is only operational with the device in Interface mode.  
This command applies to all spanning tree instances on the device.  
The cost is set using the spanning-tree cost command.  
Example  
The following example sets the default path cost method to long.  
Console(config)# spanning-tree pathcost method long  
spanning-tree bpdu The spanning-tree bpdu Global Configuration mode command defines  
BPDU handling when the spanning tree is disabled globally or on a single  
interface. To restore the default configuration, use the no form of this  
command.  
Syntax  
spanning-tree bpdu {filtering | flooding}  
no spanning-tree bpdu  
Parameters  
filtering — Filter BPDU packets when the spanning tree is disabled on  
an interface.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
clear spanning-tree detected-protocols 219  
flooding — Flood BPDU packets when the spanning tree is disabled  
on an interface.  
Default Configuration  
The default setting is flooding.  
Command Modes  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example defines BPDU packet flooding when the  
spanning-tree is disabled on an interface.  
Console(config)# spanning-tree bpdu flooding  
clear spanning-tree  
detected-protocols  
The clear spanning-tree detected-protocols Privileged EXEC mode  
command restarts the protocol migration process (forces renegotiation  
with neighboring devices) on all interfaces or on a specified interface.  
Syntax  
clear spanning-tree detected-protocols [ethernet interface |  
port-channel port-channel-number]  
Parameters  
interface — A valid Ethernet port.  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Modes  
Privileged EXEC mode  
User Guidelines  
This feature should be used only when working in RSTP or MSTP mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
220  
CHAPTER 15: SPANNING-TREE COMMANDS  
Example  
The following example restarts the protocol migration process on  
Ethernet port g11.  
Console# clear spanning-tree detected-protocols ethernet g11  
spanning-tree mst  
priority  
The spanning-tree mst priority Global Configuration mode command  
configures the device priority for the specified spanning-tree instance. To  
restore the default configuration, use the no form of this command.  
Syntax  
spanning-tree mst instance-id priority priority  
no spanning-tree mst instance-id priority  
Parameters  
instance -id—ID of the spanning -tree instance (Range: 1-15).  
priority—Device priority for the specified spanning-tree instance  
(Range: 0-61440 in multiples of 4096).  
Default Configuration  
The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.  
Command Mode  
Global Configuration mode  
User Guidelines  
The device with the lowest priority is selected as the root of the spanning  
tree.  
Example  
The following example configures the spanning tree priority of instance 1  
to 4096.  
Console (config) # spanning-tree mst  
1
priority 4096  
spanning-tree mst  
max-hops  
The spanning-tree mst priority Global Configuration mode command  
configures the number of hops in an MST region before the BDPU is  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
spanning-tree mst port-priority 221  
discarded and the port information is aged out. To restore the default  
configuration, use the no form of this command.  
Syntax  
spanning-tree mst max-hops hop-count  
no spanning-tree mst max-hops  
Parameters  
hop-count—Number of hops in an MST region before the BDPU is  
discarded .(Range: 1-40)  
Default Configuration  
The default number of hops is 20.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the maximum number of hops that a  
packet travels in an MST region before it is discarded to 10.  
Console (config) # spanning-tree mst max-hops 10  
spanning-tree mst  
port-priority  
The spanning-tree mst port-priority Interface Configuration mode  
command configures port priority for the specified MST instance. To  
restore the default configuration, use the no form of this command.  
Syntax  
spanning-tree mst instance-id port-priority priority  
no spanning-tree mst instance-id port-priority  
Parameters  
instance-ID—ID of the spanning tree instance. (Range: 1-15)  
priority—The port priority. (Range: 0-240 in multiples of 16)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
222  
CHAPTER 15: SPANNING-TREE COMMANDS  
Default Configuration  
The default port priority for IEEE Multiple Spanning Tree Protocol (MSTP)  
is 128.  
Command Modes  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the port priority of port g1 to 144.  
Console(config)# interface ethernet g1  
Console(config-if)# spanning-tree mst  
1
port-priority 144  
spanning-tree mst  
cost  
The spanning-tree mst cost Interface Configuration mode command  
configures the path cost for multiple spanning tree (MST) calculations. If a  
loop occurs, the spanning tree considers path cost when selecting an  
interface to put in the forwarding state. To restore the default  
configuration, use the no form of this command.  
Syntax  
spanning-tree mst instance-id cost cost  
no spanning-tree mst instance-id cost  
Parameters  
instance-ID—ID of the spanning -tree instance (Range: 1-16).  
cost—The port path cost. (Range: 1-200,000,000)  
Default Configuration  
Default path cost is determined by port speed and path cost method  
(long or short) as shown below:  
Interface  
Long  
Short  
Port-channel  
20,000  
20,000  
4
4
Gigabit Ethernet (1000 Mbps)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
spanning-tree mst configuration 223  
Fast Ethernet (100 Mbps)  
Ethernet (10 Mbps)  
200,000  
2,000,000  
19  
100  
Command Modes  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the MSTP instance 1 path cost for  
Ethernet port 9 to 4.  
Console(config) # interface ethernet  
9
Console(config-if) # spanning-tree mst  
1
cost  
4
spanning-tree mst  
configuration  
The spanning-tree mst configuration Global Configuration mode  
command enables configuring an MST region by entering the Multiple  
Spanning Tree (MST) mode.  
Syntax  
spanning-tree mst configuration  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
All devices in an MST region must have the same VLAN mapping,  
configuration revision number and name.  
Example  
The following example configures an MST region.  
Console(config)# spanning-tree mst configuration  
Console(config-mst)#  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
224  
CHAPTER 15: SPANNING-TREE COMMANDS  
instance (mst)  
The instance MST Configuration mode command maps VLANS to an  
MST instance.  
Syntax  
instance instance-id {add | remove} vlan vlan-range  
Parameters  
instance-ID—ID of the MST instance (Range: 1-15).  
vlan-range—VLANs to be added to or removed from the specified  
MST instance. To specify a range of VLANs, use a hyphen. To specify a  
series of VLANs, use a comma. (Range: 1-4094).  
Default Configuration  
VLANs are mapped to the common and internal spanning tree (CIST)  
instance (instance 0).  
Command Modes  
MST Configuration mode  
User Guidelines  
All VLANs that are not explicitly mapped to an MST instance are mapped  
to the common and internal spanning tree (CIST) instance (instance 0)  
and cannot be unmapped from the CIST.  
For two or more devices to be in the same MST region, they must have  
the same VLAN mapping, the same configuration revision number, and  
the same name.  
Example  
The following example maps VLANs 10-20 to MST instance 1.  
Console(config)# spanning-tree mst configuration  
Console(config-mst)# instance 1 add vlan 10-20  
name (mst)  
The name MST Configuration mode command defines the configuration  
name. To restore the default setting, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
revision (mst) 225  
Syntax  
name string  
Parameters  
string — MST configuration name. The name is case-sensitive. (Range:  
1-32 characters)  
Default Configuration  
The default name is the MAC address.  
Command Mode  
MST Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example defines the configuration name as region1.  
Console(config) # spanning-tree mst configuration  
Console(config-mst) # name region1  
revision (mst)  
The revision MST Configuration mode command defines the  
configuration revision number. To restore the default configuration, use  
the no form of this command.  
Syntax  
revision value  
no revision  
Parameters  
value — Configuration revision number (Range: 0-65535).  
Default Configuration  
The default configuration revision number is 0.  
Command Mode  
MST Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
226  
CHAPTER 15: SPANNING-TREE COMMANDS  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets the configuration revision to 1.  
Console(config) # spanning-tree mst configuration  
Console(config-mst) # revision  
1
show (mst)  
The show MST Configuration mode command displays the current or  
pending MST region configuration.  
Syntax  
show {current | pending}  
Parameters  
current—Indicates the current region configuration.  
pending—Indicates the pending region configuration.  
Default Configuration  
This command has no default configuration.  
Command Mode  
MST Configuration mode  
User Guidelines  
The pending MST region configuration takes effect only after exiting the  
MST Configuration mode.  
Example  
The following example displays a pending MST region configuration.  
Console(config-mst)# show pending  
Pending MST configuration  
Name: Region1  
Revision: 1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
exit (mst) 227  
Instance  
Vlans Mapped  
------------  
1-9,21-4094  
10-20  
State  
--------  
-------  
Enabled  
Enabled  
0
1
exit (mst)  
The exit MST Configuration mode command exits the MST  
Configuration mode, and applies all configuration changes.  
Syntax  
exit  
Default Configuration  
This command has no default configuration.  
Command Mode  
MST Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example exits the MST Configuration mode and saves  
changes.  
Console(config) # spanning-tree mst configuration  
Console(config-mst) # exit  
Console(config) #  
abort (mst)  
The abort MST Configuration mode command exits the MST  
Configuration mode without applying the configuration changes.  
Syntax  
abort  
Default Configuration  
This command has no default configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
228  
CHAPTER 15: SPANNING-TREE COMMANDS  
Command Mode  
MST Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example exits the MST Configuration mode without saving  
changes.  
Console(config) # spanning-tree mst configuration  
Console(config-mst) # abort  
spanning-tree  
guard root  
The spanning-tree guard root Interface Configuration (Ethernet,  
port-channel) mode command enables root guard on all spanning tree  
instances on the interface. Root guard prevents the interface from  
becoming the root port of the device. To disable root guard on the  
interface, use the no form of this command.  
Syntax  
spanning-tree guard root  
no spanning-tree guard root  
Default Configuration  
Root guard is disabled.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
Root guard can be enabled when the device operates in STP, RSTP and  
MSTP.  
When root guard is enabled, the port changes to the alternate state if  
spanning-tree calculations selects the port as the root port.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show spanning-tree 229  
Example  
The following example prevents Ethernet port g1 from being the root  
port of the device.  
Console(config) # interface ethernet g1  
Console(config-mst) # spanning-tree guard root  
show spanning-tree The show spanning-tree Privileged EXEC mode command displays  
spanning-tree configuration.  
Syntax  
show spanning-tree [ethernet interface -number| port-channel  
port-channel-number] [instance instance-id]  
show spanning-tree [detail] [active | blockedports] [instance  
instance-id]  
show spanning-tree mst-configuration  
Parameters  
interface -number— A valid Ethernet port.  
port-channel-number — A valid port channel number.  
detail — Indicates detailed information.  
active — Indicates active ports only.  
blockedports — Indicates blocked ports only.  
mst-configuration— Indicates the MST configuration identifier.  
instance-id—Specifies ID of the spanning tree instance.  
Default Configuration  
This command has no default configuration.  
Command Modes  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
230  
CHAPTER 15: SPANNING-TREE COMMANDS  
Example  
The following example displays spanning-tree information.  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: short  
CST  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (1)  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
20  
Hello Time 2  
sec  
Forward Delay 15 sec  
Max  
hops  
Interfaces  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
FWD  
Role  
----  
Root  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.1  
No  
P2p  
bound  
(RSTP  
)
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 231  
g2  
Enabl  
ed  
128.2  
20000  
FWD  
Desg  
No  
Share  
d
(STP)  
g3  
g4  
Disab  
led  
128.3  
128.4  
20000  
20000  
-
-
-
-
Enabl  
ed  
BLK  
ALTN  
No  
Share  
d
(STP)  
g5  
Enabl  
ed  
128.5  
20000  
DIS  
-
-
-
Console# show spanning-tree  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
This switch is the root.  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Interfaces  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
FWD  
Role  
----  
Desg  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.1  
No  
P2p  
(RSTP  
)
g2  
Enabl  
ed  
128.2  
20000  
FWD  
Desg  
No  
Share  
d
(STP)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
232  
CHAPTER 15: SPANNING-TREE COMMANDS  
g3  
g4  
Disab  
led  
128.3  
128.4  
20000  
20000  
-
-
-
-
Enabl  
ed  
FWD  
Desg  
No  
Share  
d
(STP)  
g5  
Enabl  
ed  
128.5  
20000  
DIS  
-
-
-
Console# show spanning-tree  
Spanning tree disabled (BPDU filtering) mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
N/A  
Addre  
ss  
N/A  
Path  
Cost  
N/A  
Root  
Port  
N/A  
Hello Time N/A  
Max Age N/A  
Forward Delay N/A  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Interfaces  
Name  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
Role  
----  
PortF  
ast  
Type  
----  
----  
-----  
--  
-----  
---  
-----  
-----  
---  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 233  
g1  
g2  
g3  
g4  
g5  
Enabl  
ed  
128.1  
128.2  
128.3  
128.4  
128.5  
20000  
20000  
20000  
20000  
20000  
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Enabl  
ed  
Disab  
led  
Enabl  
ed  
Enabl  
ed  
Console# show spanning-tree active  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Interfaces  
Download from Www.Somanuals.com. All Manuals Search And Download.  
234  
CHAPTER 15: SPANNING-TREE COMMANDS  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
FWD  
Role  
----  
Root  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.1  
128.2  
128.4  
No  
No  
No  
P2p  
(RSTP  
)
g2  
g4  
Enabl  
ed  
20000  
20000  
FWD  
BLK  
Desg  
ALTN  
Share  
d
(STP)  
Enabl  
ed  
Share  
d
(STP)  
Console# show spanning-tree blockedports  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 235  
Interfaces  
Name  
----  
g4  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
BLK  
Role  
----  
ALTN  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.4  
No  
Share  
d
(STP)  
Console# show spanning-tree detail  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Number of topology changes 2 last change occurred 2d18h ago  
Download from Www.Somanuals.com. All Manuals Search And Download.  
236  
CHAPTER 15: SPANNING-TREE COMMANDS  
Times  
:
hold 1, topology change 35, notification 2  
hello 2, max age 20, forward delay 15  
Port 1 (1) enabled  
State: Forwarding  
Port id: 128.1  
Role: Root  
Port cost: 20000  
Type: P2p (configured: auto)  
RSTP  
Port Fast: No (configured:no)  
Designated bridge Priority:  
32768  
Address: 00:01:42:97:e0:00  
Designated path cost: 0  
Designated port id: 128.25  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 2 (2) enabled  
State: Forwarding  
Port id: 128.2  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto)  
STP  
Port Fast: No (configured:no)  
Designated bridge Priority:  
32768  
Address: 00:02:4b:29:7a:00  
Designated path cost: 20000  
Designated port id: 128.2  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 3 (3) disabled  
State: N/A  
Role: N/A  
Port id: 128.3  
Port cost: 20000  
Type: N/A (configured: auto)  
Port Fast: N/A (configured:no)  
Designated bridge Priority: N/A Address: N/A  
Designated port id: N/A  
Designated path cost: N/A  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 237  
Number of transitions to forwarding state: N/A  
BPDU: sent N/A, received N/A  
Port 4 (4) enabled  
State: Blocking  
Port id: 128.4  
Role: Alternate  
Port cost: 20000  
Type: Shared (configured:auto)  
STP  
Port Fast: No (configured:no)  
Designated bridge Priority:  
28672  
Address: 00:30:94:41:62:c8  
Designated path cost: 20000  
Designated port id: 128.25  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 5 (5) enabled  
State: Disabled  
Role: N/A  
Port id: 128.5  
Port cost: 20000  
Type: N/A (configured: auto)  
Port Fast: N/A (configured:no)  
Designated bridge Priority: N/A Address: N/A  
Designated port id: N/A  
Designated path cost: N/A  
Number of transitions to forwarding state: N/A  
BPDU: sent N/A, received N/A  
Download from Www.Somanuals.com. All Manuals Search And Download.  
238  
CHAPTER 15: SPANNING-TREE COMMANDS  
Console# show spanning-tree ethernet  
1
Port 1 (1) enabled  
State: Forwarding  
Port id: 128.1  
Role: Root  
Port cost: 20000  
Type: P2p (configured: auto)  
RSTP  
Port Fast: No (configured:no)  
Designated bridge Priority:  
32768  
Address: 00:01:42:97:e0:00  
Designated path cost: 0  
Designated port id: 128.25  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Console# show spanning-tree mst-configuration  
Name: Region1  
Revision: 1  
Instance  
--------  
Vlans mapped  
------------  
State  
-----  
--  
g0  
g1  
1-9, 21-4094  
10-20  
Enabl  
ed  
Enabl  
ed  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 239  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Interfaces  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
FWD  
Role  
----  
Root  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.1  
128.2  
No  
No  
P2p  
Bound  
(RSTP  
)
g2  
Enabl  
ed  
20000  
FWD  
Desg  
Share  
d
Bound  
(STP)  
g3  
g4  
Enabl  
ed  
128.3  
128.4  
20000  
20000  
FWD  
FWD  
Desg  
Desg  
No  
No  
P2p  
Enabl  
ed  
P2p  
###### MST 1 Vlans Mapped: 10-20  
CST Root ID  
Prior  
ity  
24576  
Addre  
ss  
00:02:4b:29:89:76  
20000  
Path  
Cost  
Root  
Port  
g4 (4)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
240  
CHAPTER 15: SPANNING-TREE COMMANDS  
Rem  
19  
hops  
Bridge ID  
Prior  
ity  
32768  
Addre  
ss  
00:02:4b:29:7a  
:00  
Interfaces  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
FWD  
Role  
----  
Boun  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.1  
128.2  
No  
No  
P2p  
Bound  
(RSTP  
)
g2  
Enabl  
ed  
20000  
FWD  
Boun  
Share  
d
Bound  
(STP)  
g3  
g4  
Enabl  
ed  
128.3  
128.4  
20000  
20000  
BLK  
FWD  
Altn  
Desg  
No  
No  
P2p  
Enabl  
ed  
P2p  
Console# show spanning-tree detail  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 241  
Path  
Cost  
20000  
Root  
Port  
1 (g1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Port 1 (g1) enabled  
State: Forwarding  
Port id: 128.1  
Role: Root  
Port cost: 20000  
Type: P2p (configured: auto) Boundary  
RSTP  
Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:01:42:97:e0:00  
Designated port id: 128.25  
Designated path cost: 0  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 2 (g2) enabled  
State: Forwarding  
Port id: 128.2  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Boundary  
STP  
Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Download from Www.Somanuals.com. All Manuals Search And Download.  
242  
CHAPTER 15: SPANNING-TREE COMMANDS  
Port 3 (g3) enabled  
State: Forwarding  
Port id: 128.3  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.3  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 4 (g4) enabled  
State: Forwarding  
Port id: 128.4  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
###### MST 1 Vlans Mapped: 10-20  
Root ID  
Prior  
ity  
24576  
Addre  
ss  
00:02:4b:29:89:76  
Path  
Cost  
20000  
4 (4)  
19  
Port  
Cost  
Rem  
hops  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 243  
Bridge ID  
Prior  
ity  
32768  
Addre  
ss  
00:02:4b:29:7a:00  
Number of topology changes 2 last change  
occurred 1d9h ago  
Times: hold 1, topology change 2, notification 2  
hello 2, max age 20, forward delay 15  
Port 1 (g1) enabled  
State: Forwarding  
Port id: 128.1  
Role: Boundary  
Port cost: 20000  
Type: P2p (configured: auto) Boundary  
RSTP  
Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.1  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 2 (g2) enabled  
State: Forwarding  
Port id: 128.2  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Boundary  
STP  
Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Download from Www.Somanuals.com. All Manuals Search And Download.  
244  
CHAPTER 15: SPANNING-TREE COMMANDS  
Port 3 (g3) disabled  
State: Blocking  
Port id: 128.3  
Role: Alternate  
Port cost: 20000  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:1a:19  
Designated port id: 128.78  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 4 (g4) enabled  
State: Forwarding  
Port id: 128.4  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 245  
Path  
Cost  
20000  
Root  
Port  
1 (g1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Bridg  
e ID  
Prior  
ity  
32768  
Addre  
ss  
00:02:4b:29:7a  
:00  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Max  
20  
hops  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
Download from Www.Somanuals.com. All Manuals Search And Download.  
246  
CHAPTER 15: SPANNING-TREE COMMANDS  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: short  
CST  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (1)  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
20  
Hello Time 2  
sec  
Forward Delay 15 sec  
Max  
hops  
Interfaces  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
FWD  
Role  
----  
Root  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.1  
No  
P2p  
bound  
(RSTP  
)
g2  
g3  
Enabl  
ed  
128.2  
128.3  
20000  
20000  
FWD  
-
Desg  
-
No  
-
Share  
d
(STP)  
Disab  
led  
-
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 247  
g4  
g5  
Enabl  
ed  
128.4  
128.5  
20000  
20000  
BLK  
DIS  
ALTN  
-
No  
-
Share  
d
(STP)  
Enabl  
ed  
-
Console# show spanning-tree  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
This switch is the root.  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Interfaces  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
FWD  
Role  
----  
Desg  
PortF  
ast  
Type  
-----  
--  
-----  
---  
-----  
20000  
-----  
---  
-----  
-----  
Enabl  
ed  
128.1  
No  
P2p  
(RSTP  
)
g2  
Enabl  
ed  
128.2  
20000  
FWD  
Desg  
No  
Share  
d
(STP)  
g3  
g4  
Disab  
led  
128.3  
128.4  
20000  
20000  
-
-
-
-
Enabl  
ed  
FWD  
Desg  
No  
Share  
d
(STP)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
248  
CHAPTER 15: SPANNING-TREE COMMANDS  
g5  
Enabl  
ed  
128.5  
20000  
DIS  
-
-
-
Console# show spanning-tree  
Spanning tree disabled (BPDU filtering) mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
N/A  
Addre  
ss  
N/A  
Path  
Cost  
N/A  
Root  
Port  
N/A  
Hello Time N/A  
Max Age N/A  
Forward Delay N/A  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Interfaces  
Name  
----  
g1  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
-
Role  
----  
-
PortF  
ast  
Type  
----  
-
-----  
--  
-----  
---  
-----  
20000  
20000  
-----  
---  
Enabl  
ed  
128.1  
-
g2  
Enabl  
ed  
128.2  
-
-
-
-
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 249  
g3  
g4  
g5  
Disab  
led  
128.3  
128.4  
128.5  
20000  
20000  
20000  
-
-
-
-
-
-
-
-
-
-
-
-
Enabl  
ed  
Enabl  
ed  
Console# show spanning-tree active  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (g1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Interfaces  
Name  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
Role  
----  
PortF  
ast  
Type  
----  
-----  
--  
-----  
---  
-----  
-----  
---  
-----  
-----  
Download from Www.Somanuals.com. All Manuals Search And Download.  
250  
CHAPTER 15: SPANNING-TREE COMMANDS  
g1  
g2  
g4  
Enabl  
ed  
128.1  
128.2  
128.4  
20000  
20000  
20000  
FWD  
FWD  
BLK  
Root  
Desg  
ALTN  
No  
No  
No  
P2p  
(RSTP  
)
Enabl  
ed  
Share  
d
(STP)  
Enabl  
ed  
Share  
d
(STP)  
Console# show spanning-tree blockedports  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Interfaces  
Name State  
Prio.  
Nbr  
Cost  
Sts  
Role  
PortF  
ast  
Type  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 251  
----  
4
-----  
--  
-----  
---  
-----  
20000  
---  
BLK  
----  
ALTN  
-----  
---  
-----  
-----  
Enabl  
ed  
128.4  
No  
Share  
d
(STP)  
Console# show spanning-tree detail  
Spanning tree enabled mode RSTP  
Default port cost method: long  
Root  
ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (g1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay 15 sec  
Bridg  
e ID  
Prior  
ity  
36864  
Addre  
ss  
00:02:4b:29:7a:00  
Max Age 20 sec  
Hello Time 2  
sec  
Forward Delay 15 sec  
Number of topology changes 2 last change occurred 2d18h ago  
Times  
:
hold 1, topology change 35, notification 2  
hello 2, max age 20, forward delay 15  
Port 1 (g1) enabled  
Download from Www.Somanuals.com. All Manuals Search And Download.  
252  
CHAPTER 15: SPANNING-TREE COMMANDS  
State: Forwarding  
Role: Root  
Port id: 128.1  
Port cost: 20000  
Type: P2p (configured: auto)  
RSTP  
Port Fast: No (configured:no)  
Designated bridge Priority:  
32768  
Address: 00:01:42:97:e0:00  
Designated path cost: 0  
Designated port id: 128.25  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 2 (g2) enabled  
State: Forwarding  
Port id: 128.2  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto)  
STP  
Port Fast: No (configured:no)  
Designated bridge Priority:  
32768  
Address: 00:02:4b:29:7a:00  
Designated path cost: 20000  
Designated port id: 128.2  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 3 (g3) disabled  
State: N/A  
Role: N/A  
Port id: 128.3  
Port cost: 20000  
Type: N/A (configured: auto)  
Port Fast: N/A (configured:no)  
Designated bridge Priority: N/A Address: N/A  
Designated port id: N/A  
Designated path cost: N/A  
Number of transitions to forwarding state: N/A  
BPDU: sent N/A, received N/A  
Port 4 (g4) enabled  
State: Blocking  
Role: Alternate  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 253  
Port id: 128.4  
Port cost: 20000  
Type: Shared (configured:auto)  
STP  
Port Fast: No (configured:no)  
Address: 00:30:94:41:62:c8  
Designated path cost: 20000  
Designated bridge Priority:  
28672  
Designated port id: 128.25  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 5 (g5) enabled  
State: Disabled  
Role: N/A  
Port id: 128.5  
Port cost: 20000  
Type: N/A (configured: auto)  
Port Fast: N/A (configured:no)  
Designated bridge Priority: N/A Address: N/A  
Designated port id: N/A  
Designated path cost: N/A  
Number of transitions to forwarding state: N/A  
BPDU: sent N/A, received N/A  
Console# show spanning-tree ethernet  
1
Port 1 (g1) enabled  
State: Forwarding  
Port id: 128.1  
Role: Root  
Port cost: 20000  
Type: P2p (configured: auto)  
RSTP  
Port Fast: No (configured:no)  
Designated bridge Priority:  
32768  
Address: 00:01:42:97:e0:00  
Designated path cost: 0  
Designated port id: 128.25  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Download from Www.Somanuals.com. All Manuals Search And Download.  
254  
CHAPTER 15: SPANNING-TREE COMMANDS  
Console# show spanning-tree mst-configuration  
Name: Region1  
Revision: 1  
Instance  
Vlans mapped  
------------  
State  
--------  
-----  
--  
g0  
g1  
1-9, 21-4094  
10-20  
Enabl  
ed  
Enabl  
ed  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (g1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Interfaces  
Name  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
Role  
----  
PortF  
ast  
Type  
----  
-----  
--  
-----  
---  
-----  
-----  
---  
-----  
-----  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 255  
g1  
g2  
Enabl  
ed  
128.1  
128.2  
20000  
20000  
FWD  
FWD  
Root  
Desg  
No  
No  
P2p  
Bound  
(RSTP  
)
Enabl  
ed  
Share  
d
Bound  
(STP)  
g3  
g4  
Enabl  
ed  
128.3  
128.4  
20000  
20000  
FWD  
FWD  
Desg  
Desg  
No  
No  
P2p  
Enabl  
ed  
P2p  
###### MST 1 Vlans Mapped: 10-20  
CST Root ID  
Prior  
ity  
24576  
Addre  
ss  
00:02:4b:29:89:76  
Path  
Cost  
20000  
4 (g4)  
19  
Root  
Port  
Rem  
hops  
Bridge ID  
Prior  
ity  
32768  
Addre  
ss  
00:02:4b:29:7a  
:00  
Interfaces  
Name  
State  
Prio.  
Nbr  
Cost  
Sts  
---  
Role  
----  
PortF  
ast  
Type  
----  
-----  
--  
-----  
---  
-----  
-----  
---  
-----  
-----  
Download from Www.Somanuals.com. All Manuals Search And Download.  
256  
CHAPTER 15: SPANNING-TREE COMMANDS  
g1  
g2  
Enabl  
ed  
128.1  
128.2  
20000  
20000  
FWD  
FWD  
Boun  
Boun  
No  
No  
P2p  
Bound  
(RSTP  
)
Enabl  
ed  
Share  
d
Bound  
(STP)  
g3  
g4  
Enabl  
ed  
128.3  
128.4  
20000  
20000  
BLK  
FWD  
Altn  
Desg  
No  
No  
P2p  
Enabl  
ed  
P2p  
Console# show spanning-tree detail  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (g1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Port 1 (g1) enabled  
State: Forwarding  
Port id: 128.1  
Role: Root  
Port cost: 20000  
Type: P2p (configured: auto) Boundary  
RSTP  
Port Fast: No  
(configured:no)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 257  
Designated bridge Priority:  
32768  
Address:  
00:01:42:97:e0:00  
Designated port id: 128.25  
Designated path cost: 0  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 2 (g2) enabled  
State: Forwarding  
Port id: 128.2  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Boundary  
STP  
Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 3 (g3) enabled  
State: Forwarding  
Port id: 128.3  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.3  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 4 (g4) enabled  
State: Forwarding  
Port id: 128.4  
Role: Designated  
Port cost: 20000  
Download from Www.Somanuals.com. All Manuals Search And Download.  
258  
CHAPTER 15: SPANNING-TREE COMMANDS  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
###### MST 1 Vlans Mapped: 10-20  
Root ID  
Prior  
ity  
24576  
Addre  
ss  
00:02:4b:29:89:76  
Path  
Cost  
20000  
4 (4)  
19  
Port  
Cost  
Rem  
hops  
Bridge ID  
Prior  
ity  
32768  
Addre  
ss  
00:02:4b:29:7a:00  
Number of topology changes 2 last change  
occurred 1d9h ago  
Times: hold 1, topology change 2, notification 2  
hello 2, max age 20, forward delay 15  
Port 1 (g1) enabled  
State: Forwarding  
Port id: 128.1  
Role: Boundary  
Port cost: 20000  
Type: P2p (configured: auto) Boundary  
RSTP  
Port Fast: No  
(configured:no)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 259  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.1  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 120638  
Port 2 (g2) enabled  
State: Forwarding  
Port id: 128.2  
Role: Designated  
Port cost: 20000  
Type: Shared (configured: auto) Boundary  
STP  
Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 3 (g3) disabled  
State: Blocking  
Port id: 128.3  
Role: Alternate  
Port cost: 20000  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:1a:19  
Designated port id: 128.78  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Port 4 (g4) enabled  
State: Forwarding  
Port id: 128.4  
Role: Designated  
Port cost: 20000  
Download from Www.Somanuals.com. All Manuals Search And Download.  
260  
CHAPTER 15: SPANNING-TREE COMMANDS  
Type: Shared (configured: auto) Internal Port Fast: No  
(configured:no)  
Designated bridge Priority:  
32768  
Address:  
00:02:4b:29:7a:00  
Designated port id: 128.2  
Designated path cost:  
20000  
Number of transitions to forwarding state: 1  
BPDU: sent 2, received 170638  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
20000  
Path  
Cost  
Root  
Port  
1 (g1)  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Bridg  
e ID  
Prior  
ity  
32768  
Addre  
ss  
00:02:4b:29:7a  
:00  
Hello Time 2  
sec  
Max Age 20 sec  
Forward Delay  
15 sec  
Max  
20  
hops  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show spanning-tree 261  
Console# show spanning-tree  
Spanning tree enabled mode MSTP  
Default port cost method: long  
###### MST 0 Vlans Mapped: 1-9, 21-4094  
CST Root ID  
Prior  
ity  
32768  
Addre  
ss  
00:01:42:97:e0:00  
Download from Www.Somanuals.com. All Manuals Search And Download.  
262  
CHAPTER 15: SPANNING-TREE COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURATION AND IMAGE FILE  
COMMANDS  
16  
copy  
The copy Privileged EXEC mode command copies files from a source to a  
destination.  
Syntax  
copy source-url destination-url  
Parameters  
source-url — The source file location URL or reserved keyword of the  
source file to be copied. (Range: 1-160 characters)  
destination-url — The destination file URL or reserved keyword of the  
destination file. (Range: 1-160 characters)  
The following table displays keywords and URL prefixes.  
Keyword  
flash:  
Source or Destination  
Source or destination URL for flash  
memory. It’s the default in case a URL  
is specified without a prefix.  
running-config  
startup-config  
image  
Represents the current running  
configuration file.  
Represents the startup configuration  
file.  
If the source file, represents the active  
image file. If the destination file,  
represents the non-active image file.  
boot  
Boot file.  
tftp://  
Source or destination URL for a TFTP  
network server. The syntax for this alias  
is tftp://host/[directory]/filename. The  
host can be represented by its IP  
address or hostname.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
264  
CHAPTER 16: CONFIGURATION AND IMAGE FILE COMMANDS  
Keyword  
xmodem:  
Source or Destination  
Source for the file from a serial  
connection that uses the Xmodem  
protocol.  
null:  
Null destination for copies or files. A  
remote file can be copied to null to  
determine its size.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
The location of a file system dictates the format of the source or  
destination URL.  
The entire copying process may take several minutes and differs from  
protocol to protocol and from network to network.  
*.prv and *.sys files cannot be copied.  
Understanding Invalid Combinations of Source and Destination  
Some invalid combinations of source and destination exist. Specifically,  
you cannot copy if one of the following conditions exist:  
The source file and destination file are the same file.  
xmodem: is the destination file. The source file can be copied to image,  
boot and null: only.  
tftp:// is the source file and destination file on the same copy.  
The following table describes copy characters:  
Character  
!
Description  
For network transfers, indicates that the copy process is taking place. Eac  
point indicates successful transfer of ten packets (512 bytes each).  
.
For network transfers, indicates that the copy process timed out. General  
in a row means that the copy process may fail.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
copy 265  
Copying an Image File from a Server to Flash Memory  
To copy an image file from a server to flash memory, use the copy  
source-url image command.  
Copying a Boot File from a Server to Flash Memory  
To copy a boot file from a server to flash memory, enter the copy  
source-url boot command.  
Copying a Configuration File from a Server to the Running  
Configuration File  
To load a configuration file from a network server to the running  
configuration file of the device, enter the copy source-url  
running-config command. The commands in the loaded configuration  
file are added to those in the running configuration file as if the  
commands were typed in the command-line interface (CLI). Thus, the  
resulting configuration file is a combination of the previous running  
configuration and the loaded configuration files with the loaded  
configuration file taking precedence.  
Copying a Configuration File from a Server to the Startup  
Configuration To copy a configuration file from a network server to  
the startup configuration file of the device, enter copy source-url  
startup-config. The startup configuration file is replaced by the copied  
configuration file.  
Storing the Running or Startup Configuration on a Server  
Use the copy running-config destination-url command to copy the  
current configuration file to a network server using TFTP. Use the copy  
startup-config destination-url command to copy the startup  
configuration file to a network server.  
Saving the Running Configuration to the Startup Configuration  
To copy the running configuration to the startup configuration file, enter  
the copy running-config startup-config command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
266  
CHAPTER 16: CONFIGURATION AND IMAGE FILE COMMANDS  
Example  
The following example copies system image file1 from the TFTP server  
172.16.101.101 to a non-active image file.  
Console# copy tftp://172.16.101.101/file1 image  
Accessing file 'file1' on 172.16.101.101...  
Loading file1 from 172.16.101.101:  
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  
!!!!!!!!!!!!!!!!!!!!!!!!! [OK]  
Copy took 0:01:11 [hh:mm:ss]  
delete  
The delete Privileged EXEC mode command deletes a file from a flash  
memory device.  
Syntax  
delete url  
Parameters  
url — The location URL or reserved keyword of the file to be deleted.  
(Range: 1-160 characters)  
The following table displays keywords and URL prefixes:  
Keyword  
flash:  
Source or Destination  
Source or destination URL for flash memory. It’s the default in case  
a URL is specified without a prefix.  
startup-co  
nfig  
Represents the startup configuration file.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
boot system 267  
User Guidelines  
*.sys, *.prv, image-1 and image-2 files cannot be deleted.  
Example  
The following example deletes the file called ‘test’ from the flash memory.  
Console# delete flash:test  
Delete flash:test? [confirm]  
boot system  
The boot system Privileged EXEC mode command specifies the system  
image that the device loads at startup.  
Syntax  
boot system {image-1 | image-2}  
Parameters  
image-1 — Specifies image 1 as the system startup image.  
image-2 — Specifies image 2 as the system startup image.  
Default Configuration  
The default setting is the unit number.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
Use the show bootvar command to find out which image is the active  
image.  
Example  
The following example loads the system image 1 at device startup.  
Console# boot system image-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
268  
CHAPTER 16: CONFIGURATION AND IMAGE FILE COMMANDS  
show  
running-config  
The show running-config Privileged EXEC mode command displays the  
contents of the currently running configuration file.  
Syntax  
show running-config  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the contents of the running configuration  
file.  
Console# show running-config  
hostname device  
interface ethernet g1  
ip address 176.242.100.100 255.255.255.0  
duplex full  
speed 1000  
interface ethernet g2  
ip address 176.243.100.100 255.255.255.0  
duplex full  
speed 1000  
show  
startup-config  
The show startup-config Privileged EXEC mode command displays the  
contents of the startup configuration file.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
show bootvar 269  
Syntax  
show startup-config  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the contents of the running configuration  
file.  
Console# show startup-config  
hostname device  
interface ethernet g1  
ip address 176.242.100.100 255.255.255.0  
duplex full  
speed 1000  
interface ethernet g2  
ip address 176.243.100.100 255.255.255.0  
duplex full  
speed 1000  
show bootvar  
The show bootvar Privileged EXEC mode command displays the active  
system image file that is loaded by the device at startup.  
Syntax  
show bootvar Elana  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
270  
CHAPTER 16: CONFIGURATION AND IMAGE FILE COMMANDS  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the active system image file that is loaded  
by the device at startup. Elana  
Console# show bootvar  
Unit  
----  
Active Image  
------------  
Selected for next  
boot  
--------------------  
--  
1
2
3
image-1  
image-2  
image-1  
image-1  
image-2  
image-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RADIUS COMMAND  
17  
radius-server host  
The radius-server host Global Configuration mode command specifies  
a RADIUS server host. To delete the specified RADIUS host, use the no  
form of this command.  
Syntax  
radius-server host {ip-address | hostname} [auth-port  
auth-port-number] [timeout timeout] [retransmit retries] [deadtime  
deadtime] [key key-string] [source source] [priority priority] [usage  
type]  
no radius-server host {ip-address | hostname}  
Parameters  
ip-address — IP address of the RADIUS server host.  
hostname — Hostname of the RADIUS server host. (Range: 1-158  
characters)  
auth-port-number — Port number for authentication requests. The  
host is not used for authentication if the port number is set to 0.  
(Range: 0-65535)  
timeout — Specifies the timeout value in seconds. (Range: 1-30)  
retries — Specifies the retransmit value. (Range: 1-10)  
deadtime — Length of time in minutes during which a RADIUS server  
is skipped over by transaction requests. (Range: 0-2000)  
key-string — Specifies the authentication and encryption key for all  
RADIUS communications between the device and the RADIUS server.  
This key must match the encryption used on the RADIUS daemon. To  
specify an empty string, enter "". (Range: 0-128 characters)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
272  
CHAPTER 17: RADIUS COMMAND  
source — Specifies the source IP address to use for communication.  
0.0.0.0 is interpreted as request to use the IP address of the outgoing  
IP interface.  
priority — Determines the order in which servers are used, where 0  
has the highest priority. (Range: 0-65535)  
type — Specifies the usage type of the server. Possible values: login,  
dot.1x, wireless or all.  
Default Configuration  
No RADIUS server host is specified.  
The port number for authentication requests is 1812.  
The usage type is all.  
Command Mode  
Global Configuration mode  
User Guidelines  
To specify multiple hosts, multiple radius-server host commands can be  
used.  
If no host-specific timeout, retries, deadtime or key-string values are  
specified, global values apply to each RADIUS server host.  
The address type of the source parameter must be the same as the  
ip-address parameter.  
Example  
The following example specifies a RADIUS server host with IP address  
192.168.10.1, authentication request port number 20 and a 20-second  
timeout period.  
Console(config)# radius-server host 192.168.10.1 auth-port 20  
timeout 20  
radius-server key  
The radius-server key Global Configuration mode command sets the  
authentication and encryption key for all RADIUS communications  
between the device and the RADIUS daemon. To restore the default  
configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
radius-server retransmit 273  
Syntax  
radius-server key [key-string]  
no radius-server key  
Parameters  
key-string — Specifies the authentication and encryption key for all  
RADIUS communications between the device and the RADIUS server.  
This key must match the encryption used on the RADIUS daemon.  
(Range: 0-128 characters)  
Default Configuration  
The key-string is an empty string.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example defines the authentication and encryption key for  
all RADIUS communications between the device and the RADIUS  
daemon.  
Console(config)# radius-server key enterprise-server  
radius-server  
retransmit  
The radius-server retransmit Global Configuration mode command  
specifies the number of times the software searches the list of RADIUS  
server hosts. To reset the default configuration, use the no form of this  
command.  
Syntax  
radius-server retransmit retries  
no radius-server retransmit  
Parameters  
retries — Specifies the retransmit value. (Range: 1-10)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
274  
CHAPTER 17: RADIUS COMMAND  
Default Configuration  
The software searches the list of RADIUS server hosts 3 times.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the number of times the software  
searches all RADIUS server hosts to 5 times.  
console(config)# radius-server retransmit 5  
radius-server  
source-ip  
The radius-server source-ip Global Configuration mode command  
specifies the source IP address used for communication with RADIUS  
servers. To restore the default configuration, use the no form of this  
command.  
Syntax  
radius-server source-ip source  
no radius-source-ip source  
Parameters  
source — Specifies a valid source IP address.  
Default Configuration  
The source IP address is the IP address of the outgoing IP interface.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
radius-server timeout 275  
Example  
The following example configures the source IP address used for  
communication with all RADIUS servers to 10.1.1.1.  
console(config)# radius-server source-ip 10.1.1.1  
radius-server  
timeout  
The radius-server timeout Global Configuration mode command sets  
the interval during which the device waits for a server host to reply. To  
restore the default configuration, use the no form of this command.  
Syntax  
radius-server timeout timeout  
no radius-server timeout  
Parameters  
timeout — Specifies the timeout value in seconds. (Range: 1-30)  
Default Configuration  
The timeout value is 3 seconds.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the timeout interval on all RADIUS  
servers to 5 seconds.  
Console(config)# radius-server timeout 5  
radius-server  
deadtime  
The radius-server deadtime Global Configuration mode command  
improves RADIUS response time when servers are unavailable. The  
command is used to cause the unavailable servers to be skipped. To  
restore the default configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
276  
CHAPTER 17: RADIUS COMMAND  
Syntax  
radius-server deadtime deadtime  
no radius-server deadtime  
Parameters  
deadtime — Length of time in minutes during which a RADIUS server  
is skipped over by transaction requests. (Range: 0-2000)  
Default Configuration  
The deadtime setting is 0.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets all RADIUS server deadtimes to 10 minutes.  
Console(config)# radius-server deadtime 10  
show radius-servers The show radius-servers Privileged EXEC mode command displays the  
RADIUS server settings.  
Syntax  
show radius-servers  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show radius-servers 277  
Example  
The following example displays RADIUS server settings.  
Console# show radius-servers  
IP  
addre  
ss  
Port  
Auth  
TimeO  
ut  
Retra  
nsmit  
DeadT  
ime  
Sourc  
e IP  
Prior  
ity  
Usage  
-----  
----  
----  
1645  
1645  
-----  
--  
-----  
-----  
-----  
-
-----  
---  
-----  
---  
-----  
All  
172.1  
6.1.1  
Globa  
l
Globa  
l
Globa  
l
-
1
172.1  
6.1.2  
11  
8
Globa  
l
Globa  
l
2
All  
Global values  
-------------  
TimeOut: 3  
Retransmit: 3  
Deadtime: 0  
Source IP: 172.16.8.1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
278  
CHAPTER 17: RADIUS COMMAND  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PORT MONITOR COMMANDS  
18  
port monitor  
The port monitor Interface Configuration mode command starts a port  
monitoring session. To stop a port monitoring session, use the no form of  
this command.  
Syntax  
port monitor src-interface [rx | tx]  
no port monitor src-interface  
Parameters  
src-interface — Valid Ethernet port.Elana  
rx Monitors received packets only.  
tx Monitors transmitted packets only.  
Default Configuration  
Monitors both received and transmitted packets.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
This command enables traffic on one port to be copied to another port,  
or between the source port (src-interface) and a destination port (port  
being configured).  
The following restrictions apply to ports configured as destination ports:  
The port cannot be already configured as a source port.  
The port cannot be a member in a port-channel.  
An IP interface is not configured on the port.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
280  
CHAPTER 18: PORT MONITOR COMMANDS  
GVRP is not enabled on the port.  
The port is not a member of a VLAN, except for the default VLAN (will  
automatically be removed from the default VLAN).  
The following restrictions apply to ports configured to be source ports:  
The port cannot be already configured as a destination port.  
Maximum number of source ports can be up to eight.  
Example  
The following example copies traffic for both directions (Tx and Rx) on port  
g8 (source port) to port 1 (destination port).  
Console(config)# interface ethernet g1  
Console(config-if)# port monitor g8  
show ports monitor The show ports monitor Privileged EXEC mode command displays the  
port monitoring status.  
Syntax  
show ports monitor  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example shows how the port monitoring status is  
displayed.  
Console# show ports monitor  
Source  
Port  
Destinatio  
n Port  
Type  
Status  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show ports monitor 281  
----------  
-
----------  
------  
-----  
-------  
g1  
8
8
8
RX,TX  
RX,TX  
RX  
Active  
Active  
Active  
g2  
g18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
282  
CHAPTER 18: PORT MONITOR COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SNMP COMMANDS  
19  
snmp-server  
community  
The snmp-server community Global Configuration mode command  
configures the community access string to permit access to the SNMP  
protocol. To remove the specified community string, use the no form of  
this command.  
Syntax  
snmp-server community community [ro | rw | su] [ip-address] [view  
view-name]  
snmp-server community-group community group-name [ip-address]  
no snmp-server community community [ip-address]  
Parameters  
community — Community string that acts like a password and permits  
access to the SNMP protocol. (Range: 1-20 characters)  
ro — Indicates read-only access (default).  
rw — Indicates read-write access.  
su — Indicates SNMP administrator access.  
ip-address — Specifies the IP address of the management station.  
group-name — Specifies the name of a previously defined group. A  
group defines the objects available to the community. (Range: 1-30  
characters)  
view-name — Specifies the name of a previously defined view. The  
view defines the objects available to the community. (Range: 1-30  
characters).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
284  
CHAPTER 19: SNMP COMMANDS  
Default Configuration  
No communities are defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
The view-name parameter cannot be specified for su, which has access  
to the whole MIB.  
The view-name parameter can be used to restrict the access rights of a  
community string. When it is specified:  
An internal security name is generated.  
The internal security name for SNMPv1 and SNMPv2 security models is  
mapped to an internal group name.  
The internal group name for SNMPv1 and SNMPv2 security models is  
mapped to a view-name (read-view and notify-view always, and for rw  
for write-view also)  
The group-name parameter can also be used to restrict the access rights  
of a community string. When it is specified:  
An internal security name is generated.  
The internal security name for SNMPv1 and SNMPv2 security models is  
mapped to the group name.  
Example  
The following example defines community access string public to permit  
administrative access to SNMP protocol at an administrative station with  
IP address 192.168.1.20.  
Console(config)# snmp-server community public su 192.168.1.20  
snmp-server view  
The snmp-server view Global Configuration mode command creates or  
updates a Simple Network Management Protocol (SNMP) server view  
entry. To remove a specified SNMP server view entry, use the no form of  
this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
snmp-server view 285  
Syntax  
snmp-server view view-name oid-tree {included | excluded}  
no snmp-server view view-name [oid-tree]  
Parameters  
view-name — Specifies the label for the view record that is being  
created or updated. The name is used to reference the record. (Range:  
1-30 characters)  
oid-tree — Specifies the object identifier of the ASN.1 subtree to be  
included or excluded from the view. To identify the subtree, specify a  
text string consisting of numbers, such as 1.3.6.2.4, or a word, such as  
system. Replace a single subidentifier with the asterisk (*) wildcard to  
specify a subtree family; for example 1.3.*.4.  
included — Indicates that the view type is included.  
excluded — Indicates that the view type is excluded.  
Default Configuration  
No view entry exists.  
Command Mode  
Global Configuration mode  
User Guidelines  
This command can be entered multiple times for the same view record.  
The number of views is limited to 64.  
No check is made to determine that a MIB node corresponds to the  
"starting portion" of the OID until the first wildcard.  
Example  
The following example creates a view that includes all objects in the  
MIB-II system group except for sysServices (System 7) and all objects for  
interface 1 in the MIB-II interface group.  
Console(config)# snmp-server view user-view system included  
Console(config)# snmp-server view user-view system.7 excluded  
Console(config)# snmp-server view user-view ifEntry.*.1  
included  
Download from Www.Somanuals.com. All Manuals Search And Download.  
286  
CHAPTER 19: SNMP COMMANDS  
snmp-server group  
The snmp-server group Global Configuration mode command  
configures a new Simple Management Protocol (SNMP) group or a table  
that maps SNMP users to SNMP views. To remove a specified SNMP  
group, use the no form of this command.  
Syntax  
snmp-server group groupname {v1 | v2 | v3 {noauth | auth | priv}  
[notify notifyview]} [read readview] [write writeview]  
no snmp-server group groupname {v1 | v2 | v3 [noauth | auth | priv]}  
Parameters  
groupname—Specifies the name of the group (Range: 1-30  
characters).  
v1 — Indicates the SNMP Version 1 security model.  
v2 — Indicates the SNMP Version 2 security model.  
v3 — Indicates the SNMP Version 3 security model.  
noauth — Indicates no authentication of a packet. Applicable only to  
the SNMP Version 3 security model.  
auth — Indicates authentication of a packet without encrypting it.  
Applicable only to the SNMP Version 3 security model.  
priv — Indicates authentication of a packet with encryption.  
Applicable only to the SNMP Version 3 security model.  
name — Specifies the context of a packet. The following context is  
supported: Router. If the context name is unspecified, all contexts are  
defined.  
readview — Specifies a string that is the name of the view that  
enables only viewing the contents of the agent. If unspecified, all  
objects except for the community-table and SNMPv3 user and access  
tables are available.  
writeview — Specifies a string that is the name of the view that  
enables entering data and configuring the contents of the agent. If  
unspecified, nothing is defined for the write view.  
notifyview — Specifies a string that is the name of the view that  
enables specifying an inform or a trap. If unspecified, nothing is  
defined for the notify view. Applicable only to the SNMP Version 3  
security model.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
snmp-server user 287  
Default Configuration  
No group entry exists.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example attaches a group called user-group to SNMPv3  
and assigns to the group the privacy security level and read access rights  
to a view called user-view.  
Console(config)# snmp-server group user-group v3 priv read  
user-view  
snmp-server user  
The snmp-server user Global Configuration mode command configures  
a new SNMP Version 3 user. To remove a user, use the no form of this  
command.  
Syntax  
snmp-server user username groupname [remote engineid-string] [  
auth-md5 password | auth-sha password | auth-md5-key  
md5-des-keys | auth-sha-key sha-des-keys]  
no snmp-server user username [remote engineid-string]  
Parameters  
username — Specifies the name of the user on the host that connects  
to the agent. (Range: 1-30 characters)  
groupname — Specifies the name of the group to which the user  
belongs. (Range: 1-30 characters)  
engineid-string — Specifies the engine ID of the remote SNMP entity  
to which the user belongs. The engine ID is a concatenated  
hexadecimal string. Each byte in the hexadecimal character string is  
two hexadecimal digits. Each byte can be separated by a period or  
colon. (Range: 5-32 characters)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
288  
CHAPTER 19: SNMP COMMANDS  
auth-md5 password — Indicates the HMAC-MD5-96 authentication  
level. The user should enter a password for authentication and  
generation of a DES key for privacy. (Range: 1-32 characters)  
auth-sha password—Indicates the HMAC-SHA-96 authentication  
level. The user should enter a password for authentication and  
generation of a DES key for privacy. (Range: 1-32 characters)  
auth-md5-key md5-des-keys — Indicates the HMAC-MD5-96  
authentication level. The user should enter a concatenated  
hexadecimal string of the MD5 key (MSB) and the privacy key (LSB). If  
authentication is only required, 16 bytes should be entered; if  
authentication and privacy are required, 32 bytes should be entered.  
Each byte in the hexadecimal character string is two hexadecimal  
digits. Each byte can be separated by a period or colon. (16 or 32  
bytes)  
auth-sha-key sha-des-keys — Indicates the HMAC-SHA-96  
authentication level. The user should enter a concatenated  
hexadecimal string of the SHA key (MSB) and the privacy key (LSB). If  
authentication is only required, 20 bytes should be entered; if  
authentication and privacy are required, 36 bytes should be entered.  
Each byte in the hexadecimal character string is two hexadecimal  
digits. Each byte can be separated by a period or colon. (20 or 36  
bytes)  
Default Configuration  
No group entry exists.  
Command Mode  
Global Configuration mode  
User Guidelines  
If auth-md5 or auth-sha is specified, both authentication and privacy are  
enabled for the user.  
When a show running-config Privileged EXEC mode command is  
entered, a line for this user will not be displayed. To see if this user has  
been added to the configuration, type the show snmp users Privileged  
EXEC mode command.  
An SNMP EngineID has to be defined to add SNMP users to the device.  
Changing or removing the SNMP EngineID value deletes SNMPv3 users  
from the devices database.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
snmp-server engineID local 289  
The remote engineid designates the remote management station and  
should be defined to enable the device to receive informs.  
Example  
The following example configures an SNMPv3 user John in a group called  
user-group.  
Console(config)# snmp-server user John user-group  
snmp-server  
engineID local  
The snmp-server engineID local Global Configuration mode command  
specifies the Simple Network Management Protocol (SNMP) engineID on  
the local device. To remove the configured engine ID, use the no form of  
this command.  
Syntax  
snmp-server engineID local {engineid-string | default}  
no snmp-server engineID local  
Parameters  
engineid-string—Specifies a character string that identifies the engine  
ID. (Range: 5-32 characters)  
default—The engine ID is created automatically based on the device  
MAC address.  
Default Configuration  
The engine ID is not configured.  
If SNMPv3 is enabled using this command, and the default is specified,  
the default engine ID is defined per standard as:  
First 4 octets — first bit = 1, the rest is IANA Enterprise number = 674.  
Fifth octet — set to 3 to indicate the MAC address that follows.  
Last 6 octets — MAC address of the device.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
290  
CHAPTER 19: SNMP COMMANDS  
User Guidelines  
To use SNMPv3, you have to specify an engine ID for the device. You can  
specify your own ID or use a default string that is generated using the  
MAC address of the device.  
If the SNMPv3 engine ID is deleted or the configuration file is erased,  
SNMPv3 cannot be used. By default, SNMPv1/v2 are enabled on the  
device. SNMPv3 is enabled only by defining the Local Engine ID.  
If you want to specify your own ID, you do not have to specify the entire  
32-character engine ID if it contains trailing zeros. Specify only the  
portion of the engine ID up to the point where just zeros remain in the  
value. For example, to configure an engine ID of  
123400000000000000000000, you can specify snmp-server engineID  
local 1234.  
Since the engine ID should be unique within an administrative domain,  
the following is recommended:  
For a standalone device, use the default keyword to configure the engine  
ID.  
Changing the value of the engine ID has the following important  
side-effect. A user's password (entered on the command line) is  
converted to an MD5 or SHA security digest. This digest is based on both  
the password and the local engine ID. The users command line password  
is then destroyed, as required by RFC 2274. As a result, the security  
digests of SNMPv3 users become invalid if the local value of the engine ID  
change, and the users will have to be reconfigured.  
You cannot specify an engine ID that consists of all 0x0, all 0xF or  
0x000000001.  
The show running-config Privileged EXEC mode command does not  
display the SNMP engine ID configuration. To see the SNMP engine ID  
configuration, enter the snmp-server engineID local Global  
Configuration mode command.  
Example  
The following example enables SNMPv3 on the device and sets the local  
engine ID of the device to the default value.  
Console(config) # snmp-server engineID local default  
Download from Www.Somanuals.com. All Manuals Search And Download.  
snmp-server enable traps 291  
snmp-server enable  
traps  
The snmp-server enable traps Global Configuration mode command  
enables the device to send SNMP traps. To disable SNMP traps, use the  
no form of the command.  
Syntax  
snmp-server enable traps  
no snmp-server enable traps  
Default Configuration  
SNMP traps are enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables SNMP traps.  
Console(config)# snmp-server enable traps  
snmp-server filter  
The snmp-server filter Global Configuration mode command creates or  
updates a Simple Network Management Protocol (SNMP) server filter  
entry. To remove the specified SNMP server filter entry, use the no form of  
this command.  
Syntax  
snmp-server filter filter-name oid-tree {included | excluded}  
no snmp-server filter filter-name [oid-tree]  
Parameters  
filter-name — Specifies the label for the filter record that is being  
updated or created. The name is used to reference the record. (Range:  
1-30 characters)  
oid-tree — Specifies the object identifier of the ASN.1 subtree to be  
included or excluded from the view. To identify the subtree, specify a  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
292  
CHAPTER 19: SNMP COMMANDS  
text string consisting of numbers, such as 1.3.6.2.4, or a word, such as  
system. Replace a single subidentifier with the asterisk (*) wildcard to  
specify a subtree family; for example, 1.3.*.4.  
included — Indicates that the filter type is included.  
excluded — Indicates that the filter type is excluded.  
Default Configuration  
No filter entry exists.  
Command Mode  
Global Configuration mode  
User Guidelines  
This command can be entered multiple times for the same filter record.  
Later lines take precedence when an object identifier is included in two or  
more lines.  
Example  
The following example creates a filter that includes all objects in the  
MIB-II system group except for sysServices (System 7) and all objects for  
interface 1 in the MIB-II interfaces group.  
Console(config)# snmp-server filter filter-name system  
included  
Console(config)# snmp-server filter filter-name system.7  
excluded  
Console(config)# snmp-server filter filter-name ifEntry.*.1  
included  
snmp-server host  
The snmp-server host Global Configuration mode command specifies  
the recipient of Simple Network Management Protocol Version 1 or  
Version 2 notifications. To remove the specified host, use the no form of  
this command.  
Syntax  
snmp-server host {ip-address | hostname} community-string [traps |  
informs] [1 | 2] [udp-port port] [filter filtername] [timeout seconds]  
[retries retries]  
no snmp-server host {ip-address | hostname} [traps | informs]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
snmp-server host 293  
Parameters  
ip-address — Specifies the IP address of the host (targeted recipient).  
hostname — Specifies the name of the host. (Range:1-158 characters)  
community-string — Specifies a password-like community string sent  
with the notification operation.  
(Range: 1-20)  
traps — Indicates that SNMP traps are sent to this host. If unspecified,  
SNMPv2 traps are sent to the host.  
informs — Indicates that SNMP informs are sent to this host. Not  
applicable to SNMPv1.  
1 — Indicates that SNMPv1 traps will be used.  
2 — Indicates that SNMPv2 traps will be used. If  
port—Specifies the UDP port of the host to use. If unspecified, the  
default UDP port number is 162.  
(Range:1-65535)  
filtername — Specifies a string that defines the filter for this host. If  
unspecified, nothing is filtered.  
(Range: 1-30 characters)  
seconds — Specifies the number of seconds to wait for an  
acknowledgment before resending informs. If unspecified, the default  
timeout period is 15 seconds.  
(Range: 1-300)  
retries — Specifies the maximum number of times to resend an  
inform request. If unspecified, the default maximum number of  
retries is 3. (Range: 0-255)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
294  
CHAPTER 19: SNMP COMMANDS  
User Guidelines  
When configuring an SNMPv1 or SNMPv2 notification recipient, a  
notification view for that recipient is automatically generated for all the  
MIB.  
When configuring an SNMPv1 notification recipient, the Inform option  
cannot be selected.  
If a trap and inform are defined on the same target, and an inform was  
sent, the trap is not sent.  
Example  
The following example enables SNMP traps for host 10.1.1.1 with  
community string "management" using SNMPv2.  
Console(config)# snmp-server host 10.1.1.1 management 2  
snmp-server  
v3-host  
The snmp-server v3-host Global Configuration mode command  
specifies the recipient of Simple Network Management Protocol Version 3  
notifications. To remove the specified host, use the no form of this  
command.  
Syntax  
snmp-server v3-host {ip-address | hostname} username [traps |  
informs] {noauth | auth | priv} [udp-port port] [filter filtername]  
[timeout seconds] [retries retries]  
no snmp-server host {ip-address | hostname} username [traps |  
informs]  
Parameters  
ip-address — Specifies the IP address of the host (targeted recipient).  
hostname — Specifies the name of the host. (Range:1-158 characters)  
username — Specifies the name of the user to use to generate the  
notification. (Range: 1-24)  
traps — Indicates that SNMP traps are sent to this host.  
informs — Indicates that SNMP informs are sent to this host.  
noauth — Indicates no authentication of a packet.  
auth — Indicates authentication of a packet without encrypting it.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
snmp-server trap authentication 295  
priv — Indicates authentication of a packet with encryption.  
port — Specifies the UDP port of the host to use. If unspecified, the  
default UDP port number is 162. (Range: 1-65535)  
filtername—Specifies a string that defines the filter for this host. If  
unspecified, nothing is filtered. (Range: 1-30 characters)  
seconds — Specifies the number of seconds to wait for an  
acknowledgment before resending informs. If unspecified, the default  
timeout period is 15 seconds. (Range: 1-300)  
retries — Specifies the maximum number of times to resend an inform  
request. If unspecified, the default maximum number of retries is 3.  
(Range: 0-255)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
A user and notification view are not automatically created. Use the  
snmp-server user, snmp-server group and snmp-server view Global  
Configuration mode commands to generate a user, group and notify  
group, respectively.  
Example  
The following example configures an SNMPv3 host.  
Console(config)# snmp-server v3-host 192.168.0.20 john noauth  
snmp-server trap  
authentication  
The snmp-server trap authentication Global Configuration mode  
command enables the device to send SNMP traps when authentication  
fails. To disable SNMP failed authentication traps, use the no form of this  
command.  
Syntax  
snmp-server trap authentication  
no snmp-server trap authentication  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
296  
CHAPTER 19: SNMP COMMANDS  
Default Configuration  
SNMP failed authentication traps are enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables SNMP failed authentication traps.  
Console(config)# snmp-server trap authentication  
snmp-server  
contact  
The snmp-server contact Global Configuration mode command  
configures the system contact (sysContact) string. To remove system  
contact information, use the no form of the command.  
Syntax  
snmp-server contact text  
no snmp-server contact  
Parameters  
text — Specifies the string that describes system contact information.  
(Range: 1-160 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Do not include spaces in the text string or place text that includes spaces  
inside quotation marks.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
snmp-server location 297  
The following example configures the system contact point called  
3Com_Technical_Support.  
console(config)# snmp-server contact 3Com_Technical_Support  
snmp-server  
location  
The snmp-server location Global Configuration mode command  
configures the system location string. To remove the location string, use  
the no form of this command.  
Syntax  
snmp-server location text  
no snmp-server location  
Parameters  
text — Specifies a string that describes system location information.  
(Range: 1-160 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Do not include spaces in the text string or place text that includes spaces  
inside quotation marks.  
Example  
The following example defines the device location as New_York.  
Console(config)# snmp-server location New_York  
snmp-server set  
The snmp-server set Global Configuration mode command defines the  
SNMP MIB value.  
Syntax  
snmp-server set variable-name name1 value1 [ name2 value2 …]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
298  
CHAPTER 19: SNMP COMMANDS  
Parameters  
variable-name — MIB variable name (Range 1-160 characters).  
name value — List of name and value pairs. In the case of scalar MIBs,  
only a single pair of name values. In the case of an entry in a table, at  
least one pair of name and value followed by one or more fields  
(Range 1-160 characters).  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Although the CLI can set any required configuration, there might be a  
situation where a SNMP user sets a MIB variable that does not have an  
equivalent command. In order to generate configuration files that  
support those situations, the snmp-server set command is used.  
This command is case-sensitive.  
Example  
The following example configures the scalar MIB sysName with the value  
3Com.  
Console(config)# snmp-server set sysName sysname 3Com  
show snmp  
The show snmp Privileged EXEC mode command displays the SNMP  
status.  
Syntax  
show snmp  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show snmp 299  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the SNMP communications status.  
Console# show snmp  
Commu Community-Ac  
nity- cess  
Stri  
ng  
View  
name  
IP  
addre  
ss  
----- ----------  
-----  
----- -----  
---- ---  
publi read only  
c
user- All  
view  
priva read write  
te  
Defau 172.16.1.1  
lt  
priva su  
te  
Defau 172.17.1.1  
ltSup  
er  
Community-st  
ring  
Group IP address  
name  
Type  
------------  
----  
----- ----------  
-----  
publi  
c
user- all  
group  
Traps are enabled.  
Authentication trap is enabled.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
300  
CHAPTER 19: SNMP COMMANDS  
Version 1,2 notifications  
Target  
Address  
Type  
Commu Versi UDP  
nity on Port  
Filte TO  
Retr  
ies  
r
Sec  
Name  
------------  
--  
----- ----- ----- ----  
---- --  
----- ---  
-
----  
---  
192.122.173.  
42  
Trap  
publi 2  
c
162  
15  
3
192.122.173.  
42  
Infor publi 2  
162  
15  
3
m
c
Version 3 notifications  
Target  
Address  
Type  
Usern Secu  
UDP  
Port  
Filte TO  
Retr  
ies  
ame  
rity  
r
Sec  
Level  
Name  
------------  
--  
----- ----- ----- ----  
----- ---  
-
----  
---  
----  
--  
192.122.173.  
42  
Infor Bob  
m
Priv  
162  
15  
3
System Contact: Robert  
System Location: Marketing  
The following table describes the significant fields shown in the display.  
Field  
Description  
Community-string  
Community-access  
IP Address  
Community access string to permit access to the SNMP protoco  
Type of access - read-only, read-write, super access  
Management station IP Address.  
Trap-Rec-Address  
Trap-Rec-Community  
Version  
Targeted Recipient  
Statistics sent with the notification operation.  
SNMP version for the sent trap 1 or 2.  
show snmp  
engineid  
The show snmp engineID Privileged EXEC mode command displays the  
ID of the local Simple Network Management Protocol (SNMP) engine.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show snmp views 301  
Syntax  
show snmp engineID  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the SNMP engine ID.  
Console# show snmp engineID  
Local SNMP engineID: 08009009020C0B099C075878  
show snmp views  
The show snmp views Privileged EXEC mode command displays the  
configuration of views.  
Syntax  
show snmp views [viewname]  
Parameters  
viewname — Specifies the name of the view. (Range: 1-30)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
302  
CHAPTER 19: SNMP COMMANDS  
Example  
The following example displays the configuration of views.  
Console# show snmp views  
Name  
OID Tree  
Type  
-----------  
-------------------- ---------  
---  
user-view  
user-view  
user-view  
1.3.6.1.2.1.1  
Included  
Excluded  
1.3.6.1.2.1.1.7  
1.3.6.1.2.1.2.2.1.*. Included  
1
show snmp groups  
The show snmp groups Privileged EXEC mode command displays the  
configuration of groups.  
Syntax  
show snmp groups [groupname]  
Parameters  
groupname—Specifies the name of the group. (Range: 1-30)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the configuration of views.  
Console# show snmp groups  
Name  
Security  
Views  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show snmp filters 303  
Model  
Level  
-----  
Read  
Write  
Notify  
------- -----  
-------  
------- ------- -------  
user-gr V3  
oup  
priv  
priv  
priv  
Default ""  
""  
manager V3  
s-group  
Default Default ""  
manager V3  
s-group  
Default ""  
""  
The following table describes significant fields shown above.  
Field  
Description  
Name  
Name of the group.  
Security  
Model  
SNMP model in use (v1, v2 or v3).  
Security Level  
Authentication of a packet with encryption.  
Applicable only to SNMP v3 security.  
Views  
Read  
Name of the view that enables only viewing the  
contents of the agent. If unspecified, all objects  
except the community-table and SNMPv3 user and  
access tables are available.  
Write  
Notify  
Name of the view that enables entering data and  
managing the contents of the agent.  
Name of the view that enables specifying an inform or  
a trap.  
show snmp filters  
The show snmp filters Privileged EXEC mode command displays the  
configuration of filters.  
Syntax  
show snmp filters [filtername]  
Parameters  
filtername—Specifies the name of the filter. (Range: 1-30)  
Default Configuration  
This command has no default configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
304  
CHAPTER 19: SNMP COMMANDS  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the configuration of filters.  
Console# show snmp filters  
Name  
OID Tree  
Type  
-----------  
-------------------- ---------  
---  
user-filter  
user-filter  
user-filter  
1.3.6.1.2.1.1  
Included  
Excluded  
1.3.6.1.2.1.1.7  
1.3.6.1.2.1.2.2.1.*. Included  
1
show snmp users  
The show snmp users Privileged EXEC mode command displays the  
configuration of users.  
Syntax  
show snmp users [username]  
Parameters  
username—Specifies the name of the user. (Range: 1-30)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show snmp users 305  
Example  
The following example displays the configuration of users.  
Console# show snmp users  
Name  
Group name  
Auth Method  
---------  
Remote  
------  
------------  
--------------  
-----------  
John  
John  
user-group  
user-group  
md5  
md5  
08009009020C0B  
099C075879  
Download from Www.Somanuals.com. All Manuals Search And Download.  
306  
CHAPTER 19: SNMP COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP ADDRESS COMMANDS  
20  
ip address  
The ip address Interface Configuration (default VLAN) mode command  
sets an IP address. To remove an IP address, use the no form of this  
command.  
Syntax  
ip address ip-address {mask | prefix-length}  
no ip address ip-address  
Parameters  
ip-address — Specifies the valid IP address.  
mask — Specifies the valid network mask of the IP address.  
prefix-length — Specifies the number of bits that comprise the IP  
address prefix. The prefix length must be preceded by a forward slash  
(/). (Range: 8-30)  
Default Configuration  
No IP address is defined for interfaces.  
Command Mode  
Interface Configuration (default VLAN) mode  
User Guidelines  
Only the default VLAN get be assigned an IP address.  
An IP address cannot be configured for a range of interfaces (range  
context).  
This command is only functional if the device is in Switch mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
308  
CHAPTER 20: IP ADDRESS COMMANDS  
Example  
The following example configures VLAN 1 with IP address 131.108.1.27  
and subnet mask 255.255.255.0.  
Console(config)# interface vlan 1  
Console(config-if)# ip address 131.108.1.27 255.255.255.0  
ip address dhcp  
The ip address dhcp Interface Configuration (default VLAN) mode  
command acquires an IP address for an Ethernet interface from the  
Dynamic Host Configuration Protocol (DHCP) server. To deconfigure an  
acquired IP address, use the no form of this command.  
Syntax  
ip address dhcp [hostname host-name]  
no ip address dhcp  
Parameters  
host-name — Specifies the name of the host to be placed in the DHCP  
option 12 field. This name does not have to be the same as the host  
name specified in the hostname Global Configuration mode  
command. (Range: 1-20 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Interface Configuration (default VLAN) mode  
User Guidelines  
This command is only functional if the device is in Switch mode.  
The ip address dhcp command allows any interface to dynamically learn  
its IP address by using the DHCP protocol.  
Some DHCP servers require that the DHCPDISCOVER message have a  
specific host name. The ip address dhcp hostname host-name  
command is most typically used when the host name is provided by the  
system administrator.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ip default-gateway 309  
If the device is configured to obtain its IP address from a DHCP server, it  
sends a DHCPDISCOVER message to provide information about itself to  
the DHCP server on the network.  
If the ip address dhcp command is used with or without the optional  
keyword, the DHCP option 12 field (host name option) is included in the  
DISCOVER message. By default, the specified DHCP host name is the  
globally configured host name of the device. However, the ip address  
dhcp hostname host-name command can be used to place a different  
host name in the DHCP option 12 field.  
The no ip address dhcp command deconfigures any IP address that was  
acquired, and sends a DHCPRELEASE message.  
Example  
The following example acquires an IP address for Ethernet port g16 from  
DHCP.  
Console(config)# interface ethernet g16  
Console(config-if)# ip address dhcp  
ip default-gateway  
The ip default-gateway Global Configuration mode command defines  
a default gateway (device). To restore the default configuration, use the  
no form of this command.  
Syntax  
ip default-gateway ip-address  
no ip default-gateway  
Parameters  
ip-address — Specifies the valid IP address of the currently defined  
default gateway.  
Default Configuration  
No default gateway is defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
310  
CHAPTER 20: IP ADDRESS COMMANDS  
This command is only operational in Switch mode.  
Example  
The following example defines default gateway 192.168.1.1.  
Console(config)# ip default-gateway 192.168.1.1  
show ip interface  
The show ip interface Privileged EXEC mode command displays the  
usability status of configured IP interfaces.  
Syntax  
show ip interface [ethernet interface-number | vlan vlan-id |  
port-channel port-channel number |]  
Parameters  
interface-number — Specifies the valid Ethernet port.  
vlan-id — Specifies the valid VLAN number.  
port-channel number — Specifies the valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example the displays the configured IP interfaces and their  
types.  
Console# show ip interface  
Proxy ARP is  
disabled  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
arp 311  
IP address  
I/F  
Type  
Direct  
Broadcast  
-------------  
---------  
--------------  
--  
10.7.1.192/24  
10.7.2.192/24  
1
2
Static  
Static  
disable  
disable  
arp  
The arp Global Configuration mode command adds a permanent entry in  
the Address Resolution Protocol (ARP) cache. To remove an entry from the  
ARP cache, use the no form of this command.  
Syntax  
arp ip_addr hw_addr {ethernet interface-number | vlan vlan-id |  
port-channel port-channel number.}  
no arp ip_addr {ethernet interface-number | vlan vlan-id |  
port-channel port-channel number.}  
Parameters  
ip_addr — Valid IP address or IP alias to map to the specified MAC  
address.  
hw_addr — Valid MAC address to map to the specified IP address or IP  
alias.  
interface-number — Valid Ethernet port.  
vlan-id — Valid VLAN number.  
port-channel number. — Valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuratin mode  
User Guidelines  
The software uses ARP cache entries to translate 32-bit IP addresses into  
48-bit hardware addresses. Because most hosts support dynamic  
resolution, static ARP cache entries do not generally have to be specified.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
312  
CHAPTER 20: IP ADDRESS COMMANDS  
Example  
The following example adds IP address 198.133.219.232 and MAC  
address 00:00:0c:40:0f:bc to the ARP table.  
Console(config)# arp 198.133.219.232 00:00:0c:40:0f:bc ethernet  
6
arp timeout  
The arp timeout Global Configuration mode command configures how  
long an entry remains in the ARP cache. To restore the default  
configuration, use the no form of this command.  
Syntax  
arp timeout seconds  
no arp timeout  
Parameters  
seconds — Time (in seconds) that an entry remains in the ARP cache.  
(Range: 1-40000000)  
Default Configuration  
The default timeout is 60000 seconds.  
Command Mode  
Global Configuration mode  
User Guidelines  
It is recommended not to set the timeout value to less than 3600.  
Example  
The following example configures the ARP timeout to 12000 seconds.  
Console(config)# arp timeout 12000  
clear arp-cache  
The clear arp-cache Privileged EXEC mode command deletes all dynamic  
entries from the ARP cache.  
Syntax  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
show arp 313  
clear arp-cache  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example deletes all dynamic entries from the ARP cache.  
Console# clear arp-cache  
show arp  
The show arp Privileged EXEC mode command displays entries in the  
ARP table.  
Syntax  
show arp  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays entries in the ARP table.  
Console# show arp  
ARP timeout: 80000 Seconds  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
314  
CHAPTER 20: IP ADDRESS COMMANDS  
Interface  
---------  
IP address  
----------  
HW address  
Status  
--------------  
---  
-------  
g1  
g2  
10.7.1.102  
10.7.1.135  
00:10:B5:04:DB  
:4B  
Dynamic  
Static  
00:50:22:00:2A  
:A4  
ip domain-name  
The ip domain-name Global Configuration mode command defines a  
default domain name used by the software to complete unqualified host  
names (names without a dotted-decimal domain name). To remove the  
default domain name, use the no form of this command.  
Syntax  
ip domain-name name  
no ip domain-name  
Parameters  
name — Specifies the default domain name used to complete  
unqualified host names. Do not include the initial period that  
separates an unqualified name from the domain name. (Range: 1-158  
characters)  
Default Configuration  
A default domain name is not defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example defines default domain name www.3Com.com.  
Console(config)# ip domain-name www.3Com.com  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ip name-server 315  
ip name-server  
The ip name-server Global Configuration mode command defines the  
available name servers. To remove a name server, use the no form of this  
command.  
Syntax  
ip name-server server-address [server-address2 … server-address8]  
no ip name-server [server-address1 … server-address8]  
Parameters  
server-address — Specifies IP addresses of the name server.  
Default Configuration  
No name server addresses are specified.  
Command Mode  
Global Configuration mode  
User Guidelines  
The preference of the servers is determined by the order in which they  
were entered.  
Up to 8 servers can be defined using one command or using multiple  
commands.  
Example  
The following example sets the available name server.  
Console(config)# ip name-server 176.16.1.18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
316  
CHAPTER 20: IP ADDRESS COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MANAGEMENT ACL COMMANDS  
21  
management  
access-list  
The management access-list Global Configuration mode command  
configures a management access list and enters the Management  
Access-list Configuration command mode. To delete an access list, use  
the no form of this command.  
Syntax  
management access-list name  
no management access-list name  
Parameters  
name — Access list name. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Use this command to configure a management access list. The command  
enters the Access-list Configuration mode, where permit and deny access  
rules are defined using the permit (Management) and deny  
(Management) commands.  
If no match criteria are defined, the default is deny.  
If you reenter an access list context, the new rules are entered at the end  
of the access list.  
Use the management access-class command to select the active access  
list.  
The active management list cannot be updated or removed.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
318  
CHAPTER 21: MANAGEMENT ACL COMMANDS  
Management ACL requires a valid management interface, which is a port,  
VLAN, or port-channnel with an IP address or console interface.  
Management ACL only restricts access to the device for management  
configuration or viewing.  
Example  
The following example creates a management access list called ‘mlist’,  
configures management Ethernet interfaces g1 and g9 and makes the  
new access list the active list.  
Console(config)# management access-list mlist  
Console(config-macl)# permit ethernet 1g  
Console(config-macl)# permit ethernet g9  
Console(config-macl)# exit  
Console(config)# management access-class mlist  
The following example creates a management access list called ‘mlist’,  
configures all interfaces to be management interfaces except Ethernet  
interfaces g1 and g9 and makes the new access list the active list.  
Console(config)# management access-list mlist  
Console(config-macl)# deny ethernet g1  
Console(config-macl)# deny ethernet g9  
Console(config-macl)# permit  
Console(config-macl)# exit  
Console(config)# management access-class mlist  
permit  
(Management)  
The permit Management Access-List Configuration mode command  
defines a permit rule.  
Syntax  
permit [ethernet interface-number | vlan vlan-id | port-channel  
port-channel-number |] [service service]  
permit ip-source ip-address [mask mask | prefix-length] [ethernet  
interface-number | vlan vlan-id | port-channel port-channel-number |]  
[service service]  
Parameters  
interface-number — A valid Ethernet port number.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
deny (Management) 319  
vlan-id — A valid VLAN number.  
port-channel-number — A valid port channel index.  
ip-address — A valid source IP address.  
mask — A valid network mask of the source IP address.  
prefix-length — Number of bits that comprise the source IP address  
prefix. The prefix length must be preceded by a forward slash (/).  
(Range: 0-32)  
service — Service type. Possible values: telnet, ssh, http, https and  
snmp.  
Default Configuration  
If no permit rule is defined, the default is set to deny.  
Command Mode  
Management Access-list Configuration mode  
User Guidelines  
Rules with Ethernet, VLAN and port-channel parameters are valid only if  
an IP address is defined on the appropriate interface.  
The system supports up to 128 management access rules.  
Example  
The following example permits all ports in the access list called ‘mlist’.  
Console(config)# management access-list mlist  
Console(config-macl)# permit  
deny  
(Management)  
The deny Management Access-List Configuration mode command  
defines a deny rule.  
Syntax  
deny [ethernet interface-number | vlan vlan-id | port-channel  
port-channel-number |] [service service]  
deny ip-source ip-address [mask mask | prefix-length] [ethernet  
interface-number | vlan vlan-id | port-channel port-channel-number |]  
[service service]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
320  
CHAPTER 21: MANAGEMENT ACL COMMANDS  
Parameters  
interface-number — A valid Ethernet port number.  
vlan-id — A valid VLAN number.  
port-channel-number — A valid port-channel number.  
ip-address — A valid source IP address.  
mask — A valid network mask of the source IP address.  
mask prefix-length — Specifies the number of bits that comprise the  
source IP address prefix. The prefix length must be preceded by a  
forward slash (/). (Range: 0-32)  
service — Service type. Possible values: telnet, ssh, http, https and  
snmp.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Management Access-list Configuration mode  
User Guidelines  
Rules with Ethernet, VLAN and port-channel parameters are valid only if  
an IP address is defined on the appropriate interface.  
The system supports up to 128 management access rules.  
Example  
The following example denies all ports in the access list called ‘mlist’.  
Console(config)# management access-list mlist  
Console(config-macl)# deny  
management  
access-class  
The management access-class Global Configuration mode command  
restricts management connections by defining the active management  
access list. To disable this restriction, use the no form of this command.  
Syntax  
management access-class {console-only | name}  
no management access-class  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show management access-list 321  
Parameters  
console-only — Indicates that the device can be managed only from  
the console.  
name — Specifies the name of the access list to be used. (Range: 1-32  
characters)  
Default Configuration  
If no access list is specified, an empty access list is used.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures an access list called ‘mlist’ as the  
management access list.  
Console(config)# management access-class mlist  
show management  
access-list  
The show management access-list Privileged EXEC mode command  
displays management access lists.  
Syntax  
show management access-list [name]  
Parameters  
name — Specifies the name of a management access list. (Range:  
1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
322  
CHAPTER 21: MANAGEMENT ACL COMMANDS  
There are no user guidelines for this command.  
Example  
The following example displays the ‘mlist’ management access list.  
Console# show management access-list mlist  
mlist  
-----  
permit ethernet g1  
permit ethernet g2  
! (Note: all other access implicitly denied)  
show management  
access-class  
The show management access-class Privileged EXEC mode command  
displays the active management access list.  
Syntax  
show management access-class  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays information about the active  
management access list.  
Console# show management access-class  
Management access-class is enabled, using access list mlist  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
WIRELESS ROGUE AP  
COMMANDS  
22  
rogue-detect  
enable (Radio)  
The rogue-detect enable AP Interface Radio Configuration mode  
command enables detection of rogue APs. To disable rouge APs  
detection, use the no form of this command.  
Syntax  
rogue-detect enable  
no rogue-detect enable  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
Rogue detection is disabled.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
Use the rogue-detect enable Global Configuration command to  
globally enable/disable rogue detection. Rouge detection can be enabled  
on a specific AP only if rogue detection is enabled globally and for the AP.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
324  
CHAPTER 22: WIRELESS ROGUE AP COMMANDS  
Example  
The following example enables the detection of rogue APs.  
Console (Config-wlan-ap)# enterprise config  
Console (Config-ap)# interface radio 802.11g  
Console (Config-ap-radio-if)# rogue-detect enable  
rogue-detect  
rogue-scan-interval  
The rogue-detect rogue-scan-interval AP Interface Radio  
Configuration mode command defines the scanning interval for rogue  
APs. To restore defaults, use the no form of this command.  
Syntax  
rogue-detect rogue-scan-interval {long | medium | short}  
no rogue-detect rogue-scan-interval  
Parameters  
long — Scanning interval of 240 seconds.  
medium — Scanning interval of 150 seconds.  
short — Scanning interval of 20 seconds.  
Default Configuration  
The default scanning interval is long.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
A long scanning interval causes the least disruption of user traffic  
performance, while a short scanning interval causes the most disruption  
of user traffic performance.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
wlan rogue-detect rogue-ap 325  
The following example defines the scanning interval for rogue APs at 150  
seconds.  
Console (Config-ap)# interface radio 802.11g  
Console (Config-ap-radio-if)# rogue-detect rogue-scan-inter-  
val medium  
wlan rogue-detect  
rogue-ap  
The wlan rogue-detect rogue-ap Global Configuration mode  
command sets the status of rouge APs. To restore defaults, use the no  
form of this command.  
Syntax  
wlan rogue-detect rogue-ap mac-address state {known | mitigate}  
no wlan rogue-detect rogue-ap mac-address state  
Parameters  
mac-address — The rogue AP MAC address.  
known — Specify that the rogue AP is known.  
mitigate — Specify that the rogue AP should be mitigated.  
Default Configuration  
New.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets the status of rogue AP with the MAC address  
00-9E-92-4C-73-FCas known.  
Console (config-ap)# wlan rogue-detect rogue-ap  
00-9E-92-4C-73-FC state known  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
326  
CHAPTER 22: WIRELESS ROGUE AP COMMANDS  
clear wlan rogue-ap The clear wlan rogue-ap Privileged EXEC mode command deletes a  
rogue AP from the rogue APs list.  
Syntax  
clear wlan rogue-ap mac-address  
Parameters  
mac-address — The rogue AP MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
Deleting a rogue AP from the list does not mitigate or suppress the rogue.  
If the rogue AP is still physically present and active, it will reappear in the  
Rogue Access Point list after subsequent scans for rogue APs is  
performed.  
Example  
The following example deletes a rogue AP with the MAC address  
00-9E-92-4C-73-FC from the rogue APs list.  
Console# clear wlan rogue-ap 00-9E-92-4C-73-FC  
show wlan  
rogue-aps  
configuration  
The show wlan rogueaps configuration Privileged EXEC mode  
command displays information about rogue APs detection configuration.  
Syntax  
show wlan rogue-aps configuration [name | mac-address]  
Parameters  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
show wlan rogue-aps list 327  
name — Specify the AP name. (Range: 1-32 characters)  
mac-address — Specify the AP MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays information about rogue APs detection  
configuration.  
Console# show wlan rogue-aps configuration  
Rogue APs detection is enabled.  
AP name  
-----------  
AP1  
Radio  
Scanning  
--------  
Enabled  
Enabled  
Enabled  
Enabled  
Interval  
-------------  
Long  
--------  
a
g
a
g
AP1  
Long  
AP2  
Long  
AP2  
Long  
show wlan  
rogue-aps list  
The show wlan rogue-aps list Privileged EXEC mode command displays  
information about potential rogue APs.  
Syntax  
show wlan rogue-aps list [mac mac-address]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
328  
CHAPTER 22: WIRELESS ROGUE AP COMMANDS  
Parameters  
mac-address — The rogue AP MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
The show wlan rogue-aps list command displays each rogue at one entry,  
even if it was discovered by more than one Radio.  
Example  
The following example displays information about potential rogue APs.  
Console# show wlan rogue-aps list  
MAC  
Address  
Status  
------  
New  
SSID  
----  
test  
c1  
Ch  
--  
1
Last seen  
---------  
----------  
-
WlanSys-82  
-73-FC  
3-Aug-2005  
15:41:43  
WlanSys-82  
-78-FC  
Known  
3
3-Aug-2005  
15:48:12  
WlanSys-82  
-79-FC  
Mitigated  
3
3-Aug-2005  
19:32:42  
show wlan  
rogue-aps  
neighborhood  
The show wlan rogue-aps neighborhood Privileged EXEC mode  
command displays a list of APs that have detected a rogue AP.  
Syntax  
show wlan rogue-aps neighborhood mac-address  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan rogue-aps neighborhood 329  
Parameters  
mac-address — The AP MAC address detecting rogue APs.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays a list of APs that has detected a rogue AP  
with the MAC address:  
00-9E-93-82-73-FC.  
Console# show wlan rogue-aps neighborhood 00-9E-93-82-73-FC  
AP name  
-----------  
AP1  
Signal [dBm]  
-------------------  
-62  
-68  
-68  
AP2  
Lobby  
Download from Www.Somanuals.com. All Manuals Search And Download.  
330  
CHAPTER 22: WIRELESS ROGUE AP COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WIRELESS ESS COMMANDS  
23  
wlan ess create  
The wlan ess create Global Configuration mode command creates an  
ESS. To remove the ESS, use the no form of this command.  
Syntax  
wlan ess create index ssid  
no wlan ess create index  
Parameters  
index — The ESS index. (Range: 2-65535)  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Default Configuration  
ESS number 1 always exists.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example creates an ESS with the index of 1200 and the  
SSID of ‘abc123’.  
Console (config)# wlan ess create 1200 abc123  
wlan ess configure  
The wlan ess configure Global Configuration mode command enters  
the ESS Configuration mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
332  
CHAPTER 23: WIRELESS ESS COMMANDS  
Syntax  
wlan ess configure {id index | ssid ssid}  
Parameters  
index — The ESS index. (Range: 1-65535)  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters the ESS ‘enterprise’ configuration mode.  
Console (Config)# wlan ess configure id 1200  
Console (Config-ess)#  
ssid  
The ssid ESS Configuration mode command configures the SSID name of  
an ESS.  
Syntax  
ssid ssid  
Parameters  
ssid — The SSID string of the ESS name. (Range:1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
ESS Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
open vlan 333  
User Guidelines  
The SSID string must be a unique string in the system. The command fails  
if there already exists an SSID with the same name.  
Example  
The following example configures the SSID name of an ESS as  
‘enterprise’.  
Console (config)# ssid enterprise  
Console (config)# wlan ess configure ssid enterprise  
open vlan  
The open vlan ESS Configuration mode command configures the ESS  
VLAN when there is no security suite for the ESS. To restore defaults, use  
the no form of this command.  
Syntax  
open vlan vlan-id  
no open vlan  
Parameters  
vlan-id — VLAN ID of the ESS default VLAN.  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Default Configuration  
VLAN number 1.  
Command Mode  
ESS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the ESS VLAN when there is no security  
suite for the ESS to VLAN ID number 2.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
334  
CHAPTER 23: WIRELESS ESS COMMANDS  
Console (Config)# wlan ess configure ssid enterprise  
Console (Config-ess)# open vlan  
2
qos  
The qos ESS Configuration mode command enables QoS in an ESS. To  
disable QoS, use the no form of this command.  
Syntax  
qos {wmm | svp}  
no qos  
Parameters  
wmm — Wi-Fi WMM mode.  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Default Configuration  
QoS in an ESS is disabled.  
Command Mode  
ESS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables QoS in an ESS in the Wi-Fi WMM mode.  
Console (Config)# wlan ess configure ssid enterprise  
Console (Config-ess)# qos wwm  
load-balancing  
The load-balancing ESS Configuration mode command enables load  
balancing in an ESS. To disable load balancing, use the no form of this  
command.  
Syntax  
load-balancing {association | periodically}  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
mac-filtering action 335  
no load-balancing  
Parameters  
association — Load balancing calculations are performed when a  
station attempts to associate with an AP in the ESS. The associating  
station can be moved to an adjacent AP in the ESS prior to association.  
periodically — Load balancing calculations are performed at a fixed  
interval for all APs in an ESS. Stations are moved to suitable APs in the  
ESS based on load balancing calculations.  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Default Configuration  
Disabled.  
Command Mode  
ESS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables load balancing in an ESS where a station  
attempts to associate with an AP in the ESS.  
Console (Config)# wlan ess configure ssid enterprise  
Console (Config-ess)# load-balancing association  
mac-filtering action  
The mac-filtering action ESS Configuration mode command enables  
source MAC address filtering in an ESS. To disable source MAC address  
filtering, use the no form of this command.  
Syntax  
mac-filtering action {permit | deny}  
no mac-filtering action  
Parameters  
permit — Permit only stations where their MAC address is in the  
MAC-address-filtering list.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
336  
CHAPTER 23: WIRELESS ESS COMMANDS  
deny — Deny stations where their MAC address is in the  
MAC-address-filtering list.  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Default Configuration  
Disabled.  
Command Mode  
ESS Configuration mode  
User Guidelines  
The decision to allow a station to access the ESS is done only during  
the association time.  
Use the mac-filtering list command to configure the  
MAC-address-filtering list.  
Example  
The following example denies source MAC-address filtering in an ESS.  
Console (Config)# wlan ess configure ssid enterprise  
Console (Config-wlan-ess)# mac-filtering action deny  
mac-filtering list  
The mac-filtering list ESS Configuration mode command adds and  
removes MAC addresses from the MAC address filtering list in an ESS. To  
delete all the MAC addresses, use the no form of this command.  
Syntax  
mac-filtering list {add | remove} mac-address  
no mac-filtering list  
Parameters  
add — Adds the defined MAC addresses to the MAC address filtering  
list in an ESS.  
remove — Removes the defined MAC addresses from the MAC  
address filtering list in an ESS.  
mac-address — A valid MAC address.  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
security suite create 337  
Default Configuration  
Empty list.  
Command Mode  
ESS Configuration mode  
User Guidelines  
Use the mac-filtering action ESS configuration command to enable the  
MAC-address-filtering list and to define the MAC-address-filtering list  
type.  
Example  
The following example adds the MAC address 00-9E-92-4C-73-FC to the  
MAC address filtering list in an ESS.  
Console (Config)# wlan ess configure ssid enterprise  
Console (Config-wlan-ess)# mac-filtering list add  
00-9E-92-4C-73-FC  
security suite create The security suite create ESS Configuration command creates a security  
suite for an ESS. To delete a security suite, use the no form of this  
command.  
Syntax  
security suite create type [{key-hex | key-ascii} encryption-key]  
no security suite create type  
Parameters  
type — The security suite type. Available values are as follows:  
open-wep — No authentication with WEP for data encryption. Wired  
Equivalent Privacy (WEP) is a scheme to secure wireless networks  
(WiFi). Because a wireless network broadcasts messages using radio, it  
is particularly susceptible to eavesdropping. WEP provides comparable  
confidentiality to a traditional wired network. WEP provides a bare  
minimal level of security that can deter casual snooping.  
shared-wep — Shared authentication only with WEP encryption.  
open-shared-wep — Open or shared authentication with WEP  
encryption.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
338  
CHAPTER 23: WIRELESS ESS COMMANDS  
802.1x — 802.1x authentication with WEP.  
wpa — Wi-Fi Protected Access (WPA and WPA2) are systems to  
secure wireless (Wi-Fi) networks. WPA implements the majority of the  
IEEE 802.11i standard, and was intended as an intermediate measure to  
take the place of WEP while 802.11i was prepared. WPA is designed to  
work with all wireless network interface cards, but not necessarily with  
first generation wireless access points. WPA2 implements the full  
standard, but will not work with some older network cards.  
wpa-psk — WPA with pre-shared key.  
wpa2 — Indicates that Wi-Fi Protected Access 2 (WPA) is the selected  
WLAN security method. WPA2 with 802.1x authenticates WLAN  
users and dynamically generate keys.  
wpa2-psk — WPA2 with pre-shared key.  
key — A key must be entered for open-wep, shared-wep,  
openshared-wep, wpa-psk and wpa2-psk. A key should not be  
entered for 802.1x, wpa and wpa2. See the key command in  
Security-Suite ESS Configuration mode for information on the range  
of the key size.  
key-hex — Specifies the entry of a pre-shared key (psk) in hexadecimal  
format. (Range: 10-26 characters)  
key-ascii — Specifies the entry of a pre-shared key (psk) in ASCII  
format. (Key length: 5 or 13 characters)  
encryption-key — Specifies the pre-shared key. See usage guidelines  
for the key size range.  
ssid — The ESS SSID string. (Range: 1-32 characters)  
Default Configuration  
WPA security suite exists.  
Command Mode  
ESS Configuration mode  
User Guidelines  
If no security-suite exists, the product works in 802.11 open security  
mode.  
WPA security suite and WPA-PSK security suite cannot exist  
simultaneously.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
security suite configure 339  
WPA2 security suite and WPA2-PSK security suite cannot exist  
simultaneously.  
At one time, only one security-suite per ESS can exist.  
Open-WEP security suite and WEP security suite cannot exist  
simultaneously.  
For Open-WEP and WEP keys you should enter one of the following  
options: 40 bits or 104 bits.  
For WPA-PSK and WPA2-PSK keys you should enter 8 – 63 ASCII chars  
(It is recommended to enter at least 20 chars), or 256 bits in hex  
format.  
Example  
The following example creates a security suite for an ESS.  
Console (Config)# wlan ess configuressid enterprise  
Console (Config-wlan-ess)# security suite create open-wep  
security suite  
configure  
The security suite configure ESS Configuration mode command enters  
the Security-Suite Configuration mode.  
Syntax  
security suite configure type  
Parameters  
type — The security suite type. Available values are as follows:  
open-wep — No authentication with WEP for data encryption. Wired  
Equivalent Privacy (WEP) is a scheme to secure wireless networks  
(WiFi). Because a wireless network broadcasts messages using radio, it  
is particularly susceptible to eavesdropping. WEP provides comparable  
confidentiality to a traditional wired network. WEP provides a bare  
minimal level of security that can deter casual snooping.  
shared-wep — Shared authentication only with WEP encryption.  
open-shared-wep — Open or shared authentication with WEP  
encryption.  
802.1x — 802.1x authentication with WEP.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
340  
CHAPTER 23: WIRELESS ESS COMMANDS  
wpa — Wi-Fi Protected Access (WPA and WPA2) are systems to  
secure wireless (Wi-Fi) networks. WPA implements the majority of the  
IEEE 802.11i standard, and was intended as an intermediate measure to  
take the place of WEP while 802.11i was prepared. WPA is designed to  
work with all wireless network interface cards, but not necessarily with  
first generation wireless access points. WPA2 implements the full  
standard, but will not work with some older network cards.  
wpa-psk — WPA with pre-shared key.  
wpa2 — WPA2 method only.  
wpa2-psk — WPA2 with pre-shared key.  
Default Configuration  
WPA security suite exists.  
Command Mode  
ESS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters the Security-Suite Configuration mode.  
Console (Config-wlan-ess)# security suite configure wpa  
Console (Config-ess-security)#  
vlan (Security-Suite  
ESS)  
The vlan Security-Suite ESS Configuration mode command configures  
the policy VLAN for a security-suite. To restore the default configuration,  
use the no form of this command.  
Syntax  
vlan vlan-id  
no vlan  
Parameters  
vlan-id — VLAN ID of the ESS default VLAN.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
timer (Security-Suite ESS) 341  
Default Configuration  
VLAN #1  
Command Mode  
Security-Suite ESS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the policy VLAN for a security-suite to  
VLAN ID 5.  
Console (Config-wlan-ess)# security suite configure wpa  
Console (Config-ess-security)# vlan  
5
timer  
(Security-Suite ESS)  
The timer Security-Suite ESS Configuration mode command configures  
the key exchange timers for a Security-Suite. To restore the default  
configuration, use the no form of this command.  
Syntax  
timer rekey-time-unicast {never | minutes}  
no timer rekey-time-unicast  
timer rekey-time-multicast {never | minutes}  
no timer rekey-time-multicast  
timer reauth-time {never | seconds}  
no timer reauth-time  
timer idle-time {never | seconds}  
no timer idle-time  
Parameters  
rekey-time-unicast minutes — Unicast rekeying timeout period.  
(Range: 1-4294967295)  
rekey-time-multicast minutes — Multicast rekeying timeout period.  
(Range: 1-4294967295)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
342  
CHAPTER 23: WIRELESS ESS COMMANDS  
reauth-time seconds — Re-authentication timeout period. (Range:  
1-4294967295)  
idle-time seconds — DLE timeout period. (Range: 1-9676800)  
never — There is an unlimited rekeying timeout period.  
Default Configuration  
rekey-time-unicast — Never  
rekey-time-multicast — Never  
reauth-time — 14400  
idle-time — Never  
Command Mode  
Security-Suite ESS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the key exchange timers for a  
security-suite as an unlimited rekeying timeout period.  
Console (Conf\ig-wlan-ess)# security suite configure wpa  
Console (Config-ess-security)# timer rekey-time-unicast never  
update-gkey-on-lea The update-gkey-on-leave Security-Suite ESS Configuration mode  
ve (Security-Suite  
ESS)  
command defines that a group key should be updated after a station  
leaves the AP. To disable updates, use the no form of this command.  
Syntax  
update-gkey-on-leave  
no update-gkey-on-leave  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
wpa2 pre-authentication 343  
No key is defined.  
Command Mode  
Security-Suite ESS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example defines that a group key should be updated after  
a station leaves the AP.  
Console (Config-wlan-ess)# security suite configure wpa  
Console (Config-ess-security)# update-gkey-on-leave  
wpa2  
pre-authentication  
The wpa2 pre-authentication ESS Configuration mode command  
enables WPA2 pre-authentication in an ESS. Use the wpa2  
pre-authentication command in ESS Configuration mode. To disable  
WPA2 pre-authentication, use the no form of this command.  
Syntax  
wpa2 pre-authentication  
no wpa2 pre-authentication  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
This command has no default configuration.  
Command Mode  
ESS Configuration mode  
User Guidelines  
The command can only be enabled if WPA2 PMK caching is enabled.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
344  
CHAPTER 23: WIRELESS ESS COMMANDS  
Example  
The following example enables WPA2 pre-authentication in an ESS.  
Console (Config-wlan-ess)# configure ssid enterprise  
Console (Config-ess-security)# wpa2 pre-authentication  
show wlan ess  
The show wlan Privileged EXEC mode command displays information on  
the ESS configuration.  
Syntax  
show wlan ess configuration [id 1-65535 | ssid 1-32]  
show wlan ess vlans [id 1-65535 | ssid 1-32]  
show wlan ess radios [id 1-65535 | ssid 1-32]  
Parameters  
index — The ESS index. (Range: 1-65535)  
ssid — The SSID string of the ESS. (Range: 32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan ess 345  
Example  
The following example configures the display of the WLAN ESS  
configuration.  
console # show wlan ess configuration  
Index  
SSID  
----  
Securit  
y Suite  
Load  
Bal.  
QoS  
---  
WMM  
Dis  
MAC Filter  
------  
Dis  
-----  
-------  
-
-------  
--  
1
2
Enterpr  
ise  
WPA,  
WPA2  
Assoc.  
Guest  
Open  
Dis  
Permit  
The following example configures the display of the defined ESS  
configurations.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
346  
CHAPTER 23: WIRELESS ESS COMMANDS  
Console # show wlan ess configuration 1  
Index: 1  
SSID: Enterprise  
Load Balancing: Association  
QoS: WMM  
Mac Filter: Disabled  
WPA2 Preauthentication: Enabled  
Open VLAN: 1  
Security Suite: WPA  
VLAN: 8  
Unicast Rekeying Timeout: Never  
Multicast Rekeying Timeout: Never  
Update Group Key On Leave: Enabled  
Security Suite: WPA2  
VLAN: 9  
Unicast Rekeying Timeout: Never  
Multicast Rekeying Timeout: Never  
Update Group Key On Leave: Enabled  
Console # show wlan ess configuration 2  
Index: 2  
SSID: Guest  
Load Balancing: Disabled  
QoS: Disabled  
Mac Filter: Permit  
WPA2 Preauthentication: Enabled  
Open VLAN: 1  
Security suite: WPA  
VLAN: 1  
Unicast Rekeying Timeout: 0  
Multicast Rekeying Timeout: 0  
Update Group Key On Leave: Enabled  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show wlan ess mac-filtering lists 347  
The following example configures the display of WLAN ESS radios’  
configuration.  
Console # show wlan ess radios  
Index  
-----  
1
SSID  
Radios  
------  
-----  
Enterprise  
AP1(a), AP1(g),  
AP2(a), AP2(g),  
AP3(a), AP3(g)  
2
Guest  
AP1(g), AP2(g)  
show wlan ess  
mac-filtering lists  
The show wlan Privileged EXEC mode command displays the ESS MAC  
filtering lists.  
Syntax  
show wlan ess mac-filtering lists {id index | ssid ssid}  
Parameters  
index — The ESS index. (Range: 1-65535)  
ssid — The SSID string of the ESS. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the ESS MAC filtering lists.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
348  
CHAPTER 23: WIRELESS ESS COMMANDS  
Console # show wlan ess mac-filtering lists guest  
Action: Permit  
00-9E-93-82-83-A1  
00-9E-93-82-83-A2  
00-9E-93-82-83-A3  
show wlan ess  
counters  
The show wlan ess counters Privileged EXEC mode command displays  
the number of stations at each ESS.  
Syntax  
show wlan ess counters [index | ssid]  
Parameters  
index — The ESS index. (Range: 1-65535)  
ssid — The SSID string of the ESS. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays station numbers at each ESS.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan ess counters 349  
Console# show wlan ess counters  
Index  
SSID  
Stations  
-------  
182  
-----  
----  
1
2
Enterprise  
Guest  
3
The following example displays station numbers at ESS ‘enterprise’.  
Console# show wlan ess counters ssid enterprise  
AP  
Radio  
Stations  
--  
----  
--------  
AP1  
AP1  
AP2  
AP2  
AP3  
a
g
a
g
a
32  
29  
12  
42  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
350  
CHAPTER 23: WIRELESS ESS COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WIRELESS AP GENERAL  
COMMANDS  
24  
clear wlan ap  
The clear wlan ap Privileged EXEC mode command deactivates an AP.  
Syntax  
clear wlan ap {name | mac-address}  
Parameters  
name — The AP name. (Range: 1-32 characters)  
mac-address — The AP MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
When the configurations of all the deactivated AP is deleted, the AP  
may reappear in the AP Discovery Table.  
The clear wlan ap command can also be used to remove an AP that  
is irrelevant (either associated with another device or removed from  
the system) from the APs discovery table. If the AP is still relevant (not  
associated with another device and not removed from the system), it  
should not be removed from the discovery table.  
Example  
The following example deactivates an AP called enterprise.  
Console (config)# clear wlan ap enterprise  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
352  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
wlan ap active  
The wlan ap active Global Configuration mode command activates an  
AP.  
Syntax  
wlan ap active mac-address [template template-name]  
Parameters  
mac-address — MAC address of the AP to be activated.  
template-name — Specify a template AP to be used. If unspecified the  
device defaults to the AP default parameters .(Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example activates an AP with the MAC address  
00:0e:35:63:5c:a7.  
Console (Config)# wlan ap active 00:0e:35:63:5c:a7  
wlan ap key  
The wlan ap key Global Configuration mode command configures a  
secure key for communication to an AP. To remove an AP, use the no  
form of the command.  
Syntax  
wlan ap {name | mac-address} key {hex hex-number | ascii string}  
no wlan ap {name | mac-address} key  
Parameters  
name — The AP name. The AP name can be specified only for active  
APs. (Range: 1-16 characters)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
wlan ap config 353  
mac-address — The AP MAC address.  
hex hex-number — The secure key in hexadecimal format. 32  
hexadecimal characters must be entered.  
ascii string — The secure key in hexadecimal format. From 1-16  
characters can be entered. If less than 16 characters are entered, the  
software completes the key to 16 characters with blank characters.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
If the secure key is not set before activation at the AP, that key would be  
transferred to the AP on activation.  
A key cannot be removed in an active AP.  
Example  
The following example configures a secure key for communication to an  
AP called ‘enterprise’.  
Console (config)# wlan ap enterprise key ascii 1234567  
wlan ap config  
The wlan ap config Global Configuration mode command sets the  
device in AP Configuration mode.  
Syntax  
wlan ap {name | mac-address} config  
Parameters  
name — The AP name. (Range: 1-32 characters)  
mac-address — The AP MAC address.  
Default Configuration  
This command has no default configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
354  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
Command Mode  
Global Configuration mode  
User Guidelines  
Only active APs can be placed in AP Configuration mode.  
Example  
The following example sets the device in AP Configuration mode.  
Console (Config)# wlan ap CR1 config  
Console (Config-wlan-ap)#  
name  
The name AP Configuration mode command configures a wireless AP  
name. To restore the default configuration, use the no form of this  
command.  
Syntax  
name string  
no name  
Parameters  
name — The AP name.  
Default Configuration  
The APs MAC address.  
Command Mode  
AP Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures a wireless AP name to ‘enterprise’ .  
Console (Config)# wlan ap CR1 config  
Console (Config-ap)# name enterprise  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
tunnel priority 355  
tunnel priority  
The tunnel priority AP Configuration mode command configures a  
wireless AP priority for VLAN tunneling. To restore default settings, use  
the no form of this command.  
Syntax  
tunnel priority priority  
no priority  
Parameters  
priority — The relative priority of the wireless AP as a source for  
VLANs. The number 0 indicates that the AP cannot be a source for  
VLANs. (Range: 0-99)  
Default Configuration  
The default wireless AP priority for VLAN tunneling is 20.  
Command Mode  
AP Configuration mode  
User Guidelines  
If one of the stations that are associated with an AP is associated with a  
VLAN that the AP does not have a direct connection to, the AP initiates a  
tunnel with the AP that has a direct connection to that VLAN. The AP  
with the highest tunneling priority in the network is chosen as the source  
of the VLAN.  
Example  
The following example configures a wireless AP priority for VLAN  
tunneling to 30.  
Console (Config)# wlan ap CR1 config  
Console (Config-ap)# tunnel priority 30  
wan enable  
The wan enable AP configuration mode command accommodates  
certain timing constrains in the communication to a remotely connected  
wireless AP separated by a WAN link or the Internet. To disable WAN  
support, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
356  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
Syntax  
wan enable  
no wan enable  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
Disabled  
Command Mode  
AP Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example accommodates certain timing constrains in the  
communication to a remotely connected wireless AP separated by a WAN  
link or the Internet.  
Console (Config)# wlan ap CR1 config  
Console (Config-ap)# wan enable  
interface ethernet  
The enter interface AP Configuration mode command configures an  
interface and enters the Interface Configuration mode.  
Syntax  
interface ethernet  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
This command has no default configuration.  
Command Mode  
AP Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
vlan allowed 357  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters the Interface Configuration mode.  
Console (Config-ap)# interface ethernet  
Console (Config-ap-if)#  
vlan allowed  
The vlan allowed AP interface Ethernet Configuration mode command  
adds or removes VLANs to the Ethernet port of a wireless AP. To restore  
the default configuration, use the no form of this command.  
Syntax  
vlan allowed {add vlan-list | remove vlan-list}  
no vlan allowed  
Parameters  
add vlan-list — List of VLAN IDs to add. Separate nonconsecutive  
VLAN IDs with a comma and no spaces; use a hyphen to designate a  
range of IDs.  
remove vlan-list — List of VLAN IDs to remove. Separate  
nonconsecutive VLAN IDs with a comma and no spaces; use a hyphen  
to designate a range of IDs.  
Default Configuration  
VLAN number 1.  
Command Mode  
AP interface Ethernet Configuration mode  
User Guidelines  
A VLAN cannot be removed from the allowed VLANs if it is defined as a  
native VLAN.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
358  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
The following example adds VLANs 1,2,3 and 4 to the Ethernet port of a  
wireless AP.  
Console (Config-ap)# interface ethernet  
Console (Config-ap-if)# vlan allowed add 1-4  
vlan native  
The vlan native AP interface Ethernet Configuration mode command  
sets the native VLAN of the Ethernet port of a wireless AP. To restore the  
default configuration, use the no form of this command.  
Syntax  
vlan native vlan-id  
no vlan native  
Parameters  
vlan-id — VLAN ID of the native VLAN.  
Default Configuration  
VLAN #1  
Command Mode  
AP interface Ethernet Configuration mode  
User Guidelines  
A VLAN can be defined as a native VLAN only if it is one of the allowed  
VLANs.  
Example  
The following example sets the native VLAN of the Ethernet port for a  
wireless AP to 2.  
Console (Config-ap)# interface ethernet  
Console (Config-ap-if)# vlan native  
2
wlan template ap  
configure  
The wlan template ap configure Global Configuration mode command  
places the device in wireless AP Template Configuration mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
set wlan copy 359  
Syntax  
wlan template ap configure name  
Parameters  
name — The name of the AP template. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
All AP configuration commands are relevant to template APs, except for  
the name AP configuration command and wlan ap key Global  
Configuration commands.  
Example  
The following example places the device in wireless AP template  
configuration mode to configure template called ‘type1’.  
Console (Config)# wlan template ap configure type1  
Console (Config-wlan-template-ap)#  
set wlan copy  
The set wlan copy wireless AP template configuration command copies  
the wireless AP configuration parameters from the template AP to an AP.  
Syntax  
set wlan copy ap {default | template-name} to ap ap-name  
set wlan copy ap ap-name to template ap {template-name}  
Parameters  
default — The default template.  
template-name — The template AP name. (Range: 1 – 32 characters)  
ap-name — The AP name. (Range: 1 – 32 characters)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
360  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
Default Configuration  
This command has no default configuration.  
Command Mode  
Wireless AP template configuration mode  
User Guidelines  
Copying the template to an AP overrides the entire AP configuration with  
the template configuration.  
Example  
The following example copies a wirless AP configuration parameters from  
a template AP “enterprise” to an AP called “Switch”.  
Console (Config)# wlan template ap configure type1  
Console (Config-wlan-template-ap)# set wlan copy ap enterprise  
to ap Switch  
show wlan aps  
The show wlan aps Privileged EXEC mode command displays  
information on active APs.  
Syntax  
show wlan aps [name | mac-address]  
show wlan aps radio [a | g]  
show wlan aps ess [ssid]  
show wlan aps vlans [ssid]  
show wlan aps version [name | mac-address]  
Parameters  
name — The AP name. (Range: 1-32 characters)  
mac-address — The AP MAC address.  
a — Radio type is 802.1a.  
g — Radio type is 802.1g.  
ssid — The ESS SSID. (Range: 1-32 characters)  
Default Configuration  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan aps 361  
name  
ssid  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays information on active APs.  
Console # show wlan aps  
Name  
------  
AP1  
MAC Address  
-----------------  
Type  
------  
a, g  
State  
--------  
Enabled  
00-9E-92-4C-73-  
FC  
AP2  
00-9E-92-4C-73-  
FD  
a, g  
Disabled  
Download from Www.Somanuals.com. All Manuals Search And Download.  
362  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
The following example displays detailed information on a specific active  
AP:  
Console # show wlan aps AP1  
Name: AP1  
MAC Address: 00-9E-92-4C-73-FC  
Type: a, g  
State: Enabled  
Status: Disabled  
802.11a Radio: Enabled  
802.11g Radio: Enabled  
VLANs Allowed: 2, 3  
Native VLAN: 2  
Tunnel Priority: 20  
IP address: 172.16.1.1  
DNS name: wlan-switch1.ge.com  
WAN Timing Constrains: Disabled  
Console Logging: Disabled  
The following example displays important radio information on all the  
active APs.  
Console # show wlan aps radio  
Name  
Radio  
State  
Power  
Channel Traffic Allow  
Oper Admin  
------- ------- ------- ------- ------- ------- -------  
-
-
-
----  
------- -------  
------- -------  
AP1  
AP1  
AP2  
AP2  
a
g
a
g
Enabled Maximum LG  
Enabled Maximum LG  
Enabled Maximum 44  
Enabled Maximum 11  
Enabled N/A  
Enabled Enabled  
Enabled N/A  
Enabled Enabled  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show wlan aps 363  
The following example displays the SSIDs that are associated with each  
active AP.  
Console # show wlan aps ess  
Name  
Radio  
SSID  
State  
Advertise  
------  
--------  
------  
--------  
-----------  
--  
AP1  
AP1  
AP2  
AP2  
a
a
g
a
Enterprise  
Guest  
Enabled  
Enabled  
Enabled  
Enabled  
Enabled  
Enabled  
Enabled  
Enabled  
Enterprise  
Guest  
The following example displays:  
1) Station VLANs: List all the VLANs required for the stations that are  
associated with that AP.  
2) Ethernet VLANs: The VLANs configured on the AP Ethernet port.  
3) Priority: The priority of the AP as a source for tunneling.  
Console # show wlan aps vlans  
Name  
Station VLANs  
Ethernet VLANs  
Priority  
------  
--------------  
------  
--------------  
--------  
-------------  
AP1  
AP2  
1, 2, 3  
1, 2  
30  
20  
1, 2, 3, 4  
1, 3, 4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
364  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
The following example displays the AP model, serial number and  
software versions.  
Console # show wlan aps versions  
Name  
Model  
Serial  
number  
BootLoader  
Version  
Software  
Version  
-------  
--------  
----------- ----------- -----------  
---------  
----------- -----------  
--------  
1.1.0.1  
1.1.0.1  
----  
AP1  
AP2  
A1  
A1  
3987587439  
1.2.71 (d)  
1.2.71 (d)  
398758638  
7
show wlan ap  
interface radio  
The show wlan ap interface radio Privileged EXEC mode command  
displays information on an AP radio interface.  
Syntax  
show wlan ap {name | mac-address} interface radio {a | g} [ess ssid]  
Parameters  
name — The AP name.  
mac-address — The AP MAC address.  
a — Radio type is 802.1a.  
g — Radio type is 802.1g.  
ssid — The ESS SSID.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan ap interface ethernet 365  
Example  
The following example displays information on an AP radio interface.  
Console # show wlan ap AP1 interface radio g  
State: Enabled  
Allow traffic: Enabled  
Channel: Least Congested (11).  
Power: Maximum  
Allow 802.11b: Enabled  
Preamble: Long  
RTS Threshold: 2312 bytes  
Antenna: Diversity  
Beacon Period: 100 ms  
SSID  
BSSID  
--------  
Advertise  
--------------  
Enabled  
Data Rates  
------  
----------------  
6(m), 9, 12, 18, 24, 36, 48, 54  
1(m), 2, 5.5, 6, 9, 11, 12, 18, 24  
Enterprise  
Guest  
Enabled  
Enabled  
Enabled  
show wlan ap  
interface ethernet  
The show wlan ap interface ethernet Privileged EXEC mode command  
displays information on an AP radio interface.  
Syntax  
show wlan ap {name | mac-address} interface ethernet  
Parameters  
name — The AP name.  
mac-address — The AP MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
366  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
Example  
The following example displays information on an AP radio interface.  
Console # show wlan ap AP1 interface ethernet  
VLANs Allowed: 2, 3  
Native VLAN: 2  
Tunnel source: Enabled  
Tunnel priority: 20  
Ethernet MAC address: 00-9E-92-8C-73-FC  
show wlan aps  
counters  
The show wlan aps counters Privileged EXEC mode command displays  
information on the AP traffic.  
Syntax  
show wlan aps counters [radio a | g] [ap name]  
Parameters  
radio a | b — Specified Radio type. If unspecified shows the total  
traffic on the AP.  
ap name — Specified AP name. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan aps counters 367  
The following example displays information on the AP traffic.  
Console# show wlan aps counters  
Name  
Stations  
Name  
Stations  
------  
----------- ------  
--  
-----------  
--  
AP1  
AP2  
19  
23  
AP1  
AP2  
19  
23  
Name  
InUcastPk  
ts  
InPkts  
InOctets  
In Errors  
------  
----------- ----------  
--  
----------- -----------  
------  
---  
AP1  
AP2  
756857  
846584  
8691  
9132  
8432  
2
8921  
2
Name  
InUcastPk  
ts  
InPkts  
InOctets  
In Errors  
------  
----------- ----------  
--  
----------- -----------  
------  
---  
AP1  
AP2  
756857  
846584  
8691  
9132  
8432  
2
8921  
2
Name  
OutUcastP  
kts  
OutPkts  
OutOctets  
Out Errors  
------  
AP1  
---------  
87398238  
846584  
----------  
922982  
--------  
8118710  
783278  
-------  
2
2
AP2  
913287  
Download from Www.Somanuals.com. All Manuals Search And Download.  
368  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
Console# show wlan aps counters ap AP1  
Number of stations: 19  
In Octets: 756857  
In Packets: 8691  
In Unicast Packets: 8432  
In Data Packets: 8533  
In Management Packets: 158  
In Errors: 2  
Out Octets: 87398238  
Out Packets: 922982  
Out Unicast Packets: 811871  
Out Data Packets: 881831  
Out Management Packets: 41151  
Out Errors: 0  
show wlan aps  
discovered  
The show wlan aps discovered Privileged EXEC mode command  
displays wireless APs that were discovered but not activated.  
Syntax  
show wlan aps discovered [mac-address]  
Parameters  
mac-address — MAC address of the AP.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan template aps 369  
The following example displays wireless APs that were discovered but  
were not activated.  
Console # show wlan aps discovered  
MAC Address  
Key  
Discovery Time  
Status  
--------------  
---  
--------------  
--------  
----------  
00-9E-92-4C-73  
-FC  
3-Aug-2005  
15:41:43  
Discovered  
Discovered  
00-9E-92-4C-73  
-FD  
3-Aug-2005  
17:19:48  
show wlan  
template aps  
The show wlan template aps Privileged EXEC mode command displays  
the template AP configuration.  
Syntax  
show wlan template aps [name]  
Parameters  
name — Specify the AP name.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays displays the template AP configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
370  
CHAPTER 24: WIRELESS AP GENERAL COMMANDS  
Console # show wlan template aps  
Name  
Radio a  
--------  
Enabled  
Enabled  
Enabled  
Radio g  
--------  
Enabled  
Enabled  
Enabled  
-------  
default  
indoor  
outdoor  
Console # show wlan aps indoor  
NAME: vivi  
MAC Address: 00:f0:00:00:06:25  
802.11a Radio: Enabled  
802.11g Radio: Enabled  
Type: a, g  
State: Enabled  
VLANs Allowed: 2, 3  
Native VLAN: 2  
Tunnel Source: Enabled  
Tunnel Priority: 20  
WAN Timing Constraints: Disabled  
Console Logging: Disabled  
Radio a  
--------  
State: Enabled  
Allow traffic: Enabled  
Channel: Least Congested  
Power: Max  
Preamble: Long  
RTS Threshold: 2312  
Antenna: Diversity  
Beacon Period: 100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SSH COMMANDS  
25  
ip ssh port  
The ip ssh port Global Configuration mode command specifies the port  
to be used by the SSH server. To restore the default configuration, use the  
no form of this command.  
Syntax  
ip ssh port port-number  
no ip ssh port  
Parameters  
port-number — Port number for use by the SSH server (Range:  
1-65535).  
Default Configuration  
The default port number is 22.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example specifies the port to be used by the SSH server as  
8080.  
Console(config)# ip ssh port 8080  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
372  
CHAPTER 25: SSH COMMANDS  
ip ssh server  
The ip ssh server Global Configuration mode command enables the  
device to be configured from a SSH server. To disable this function, use  
the no form of this command.  
Syntax  
ip ssh server  
no ip ssh server  
Default Configuration  
Device configuration from a SSH server is disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
If encryption keys are not generated, the SSH server is in standby until the  
keys are generated. To generate SSH server keys, use the crypto key  
generate dsa, and crypto key generate rsa Global Configuration  
mode commands.  
Example  
The following example enables configuring the device from a SSH server.  
Console(config)# ip ssh server  
crypto key generate The crypto key generate dsa Global Configuration mode command  
dsa  
generates DSA key pairs.  
Syntax  
crypto key generate dsa  
Default Configuration  
DSA key pairs do not exist.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
crypto key generate rsa 373  
User Guidelines  
DSA keys are generated in pairs: one public DSA key and one private DSA  
key. If the device already has DSA keys, a warning and prompt to replace  
the existing keys with new keys are displayed.  
This command is not saved in the device configuration; however, the keys  
generated by this command are saved in the private configuration, which  
is never displayed to the user or backed up on another device.  
This command may take a considerable period of time to execute.  
Example  
The following example generates DSA key pairs.  
Console(config)# crypto key generate dsa  
crypto key generate The crypto key generate rsa Global Configuration mode command  
rsa  
generates RSA key pairs.  
Syntax  
crypto key generate rsa  
Default Configuration  
RSA key pairs do not exist.  
Command Mode  
Global Configuration mode  
User Guidelines  
RSA keys are generated in pairs: one public RSA key and one private RSA  
key. If the device already has RSA keys, a warning and prompt to replace  
the existing keys with new keys are displayed.  
This command is not saved in the device configuration; however, the keys  
generated by this command are saved in the private configuration which  
is never displayed to the user or backed up on another device.  
This command may take a considerable period of time to execute.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
374  
CHAPTER 25: SSH COMMANDS  
Example  
The following example generates RSA key pairs.  
Console(config)# crypto key generate rsa  
ip ssh pubkey-auth  
The ip ssh pubkey-auth Global Configuration mode command enables  
public key authentication for incoming SSH sessions. To disable this  
function, use the no form of this command.  
Syntax  
ip ssh pubkey-auth  
no ip ssh pubkey-auth  
Default Configuration  
Public Key authentication fo incoming SSH sessions is disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
AAA authentication is independent.  
Example  
The following example enables public key authentication for incoming  
SSH sessions.  
Console(config)# ip ssh pubkey-auth  
crypto key  
pubkey-chain ssh  
The crypto key pubkey-chain ssh Global Configuration mode  
command enters the SSH Public Key-chain Configuration mode. The  
mode is used to manually specify other device public keys such as SSH  
client public keys.  
Syntax  
crypto key pubkey-chain ssh  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
user-key 375  
Default Configuration  
No keys are specified.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters the SSH Public Key-chain Configuration  
mode and manually configures the RSA key pair for SSH public key-chain  
bob.  
Console(config)# crypto key pubkey-chain ssh  
Console(config-pubkey-chain)# user-key bob  
Console(config-pubkey-key)# key-string rsa  
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl  
Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+  
ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+  
Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g  
kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq  
muSn/Wd05iDX2IExQWu08licglk02LYciz  
+Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY  
0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA  
6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+  
Rmt5nhhqdAtN/4oJfce166DqVX1gWmN  
zNR4DYDvSzg0lDnwCAC8Qh  
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9  
user-key  
The user-key SSH Public Key-string Configuration mode command  
specifies which SSH public key is manually configured. To remove an SSH  
public key, use the no form of this command.  
Syntax  
user-key username {rsa | dsa}  
no user-key username  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
376  
CHAPTER 25: SSH COMMANDS  
Parameters  
username — Specifies the username of the remote SSH client. (Range:  
1-48 characters)  
rsa — Indicates the RSA key pair.  
dsa — Indicates the DSA key pair.  
Default Configuration  
No SSH public keys exist.  
Command Mode  
SSH Public Key-string Configuration mode  
User Guidelines  
Follow this command with the key-string SSH Public Key-String  
Configuration mode command to specify the key.  
Example  
The following example enables manually configuring an SSH public key  
for SSH public key-chain bob.  
Console(config)# crypto key pubkey-chain ssh  
Console(config-pubkey-chain)# user-key bob rsa  
Console(config-pubkey-key)# key-string row  
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl  
key-string  
The key-string SSH Public Key-string Configuration mode command  
manually specifies an SSH public key.  
Syntax  
key-string  
key-string row key-string  
Parameters  
row — Indicates the SSH public key row by row.  
key-string — Specifies the key in UU-encoded DER format;  
UU-encoded DER format is the same format in the authorized_keys  
file used by OpenSSH. (Range:0-160)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
key-string 377  
Default Configuration  
No keys exist.  
Command Mode  
SSH Public Key-string Configuration mode  
User Guidelines  
Use the key-string SSH Public Key-string Configuration mode command  
to specify which SSH public key is to be interactively configured next. To  
complete the command, you must enter a row with no characters.  
Use the key-string row SSH Public Key-string Configuration mode  
command to specify the SSH public key row by row. Each row must begin  
with a key-string row command. This command is useful for  
configuration files.  
Example  
The following example enters public key strings for SSH public key client  
bob.  
Console(config)# crypto key pubkey-chain ssh  
Console(config-pubkey-chain)# user-key bob rsa  
Console(config-pubkey-key)# key-string  
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl  
Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+  
ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+  
Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g  
kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq  
muSn/Wd05iDX2IExQWu08licglk02LYciz  
+Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY  
0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA  
6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+  
Rmt5nhhqdAtN/4oJfce166DqVX1gWmN  
zNR4DYDvSzg0lDnwCAC8Qh  
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9  
Console(config)# crypto key pubkey-chain ssh  
Console(config-pubkey-chain)# user-key bob rsa  
Console(config-pubkey-key)# key-string row AAAAB3Nza  
Console(config-pubkey-key)# key-string row C1yc2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
378  
CHAPTER 25: SSH COMMANDS  
show ip ssh  
The show ip ssh Privileged EXEC mode command displays the SSH server  
configuration.  
Syntax  
show ip ssh  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the SSH server configuration.  
Console# show ip ssh  
SSH server enabled. Port: 22  
RSA key was generated.  
DSA (DSS) key was generated.  
SSH Public Key Authentication is enabled.  
Active incoming sessions:  
IP address  
----------  
172.16.0.1  
SSH  
username  
Version  
Cipher  
-------  
DES  
Auth Code  
----------  
HMAC-SHA1  
----------- ---------  
-
John Brown  
2.0 3  
The following table describes the significant fields shown in the display.  
Field  
Description  
IP address  
SSH username  
Version  
Client address  
User name  
SSH version number  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show crypto key mypubkey 379  
Field  
Description  
Cipher  
Encryption type (3DES, Blowfish, RC4)  
Auth Code  
Authentication Code (HMAC-MD5,  
HMAC-SHA1)  
show crypto key  
mypubkey  
The show crypto key mypubkey Privileged EXEC mode command  
displays the SSH public keys on the device.  
Syntax  
show crypto key mypubkey [rsa | dsa]  
Parameters  
rsa — Indicates the RSA key.  
dsa — Indicates the DSA key.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the SSH public RSA keys on the device.  
Console# show crypto key mypubkey rsa  
RSA key data:  
005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B  
55D6AB22  
04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C  
73A05DD2  
BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301  
87685768  
Fingerprint(Hex): 77:C7:19:85:98:19:27:96:C9:CC:83:C5:78:89:F8:86  
Fingerprint(Bubble Babble): yteriuwt jgkljhglk yewiury hdskjfryt  
gfhkjglk  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
380  
CHAPTER 25: SSH COMMANDS  
show crypto key  
pubkey-chain ssh  
The show crypto key pubkey-chain ssh Privileged EXEC mode  
command displays SSH public keys stored on the device.  
Syntax  
show crypto key pubkey-chain ssh [username username]  
[fingerprint {bubble-babble | hex}]  
Parameters  
username — Specifies the remote SSH client username.  
bubble-babble — Fingerprint in Bubble Babble format.  
hex — Fingerprint in Hex format.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays SSH public keys stored on the device.  
Console# show crypto key pubkey-chain ssh  
Username  
--------  
Fingerprint  
-------------------------------  
----------------  
bob  
9A:CC:01:C5:78:39:27:86:79:CC:2  
3:C5:98:59:F1:86  
john  
98:F7:6E:28:F2:79:87:C8:18:F8:8  
8:CC:F8:89:87:C8  
Console# show crypto key pubkey-chain ssh username bob  
Username: bob  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show crypto key pubkey-chain ssh 381  
Key: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241  
00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4  
Fingerprint: 9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
382  
CHAPTER 25: SSH COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WEB SERVER COMMANDS  
26  
ip http server  
The ip http server Global Configuration mode command enables  
configuring the device from a browser. To disable this function, use the  
no form of this command.  
Syntax  
ip http server  
no ip http server  
Default Configuration  
HTTP server is enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Only a user with access level 15 can use the Web server.  
Example  
The following example enables configuring the device from a browser.  
Console(config)# ip http server  
ip http port  
The ip http port Global Configuration mode command specifies the TCP  
port to be used by the Web browser interface. To restore the default  
configuration, use the no form of this command.  
Syntax  
ip http port port-number  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
384  
CHAPTER 26: WEB SERVER COMMANDS  
no ip http port  
Parameters  
port-number — Port number for use by the HTTP server. (Range:  
1-65535)  
Default Configuration  
The default port number is 80.  
Command Mode  
Global Configuration mode  
User Guidelines  
Specifying 0 as the port number effectively disables HTTP access to the  
device.  
Example  
The following example configures the http port number to 100.  
Console(config)# ip http port 100  
ip http  
exec-timeout  
The ip http exec-timeout Global Configuration mode command sets  
the interval, which the system waits to user input in http sessions before  
automatic logoff. To restore the default configuration, use the no form of  
this command.  
Syntax  
ip http exec-timeout minutes [seconds]  
no ip http exec-timeout  
Parameters  
minutes — Integer that specifies the number of minutes. (Range:  
0-65535)  
seconds — Additional time intervals in seconds. (Range: 0-59)  
Default Configuration  
There is no default configuration for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ip https server 385  
Command Mode  
Global Configuration mode  
User Guidelines  
This command also configures the exec-timeout for HTTPS in case the  
HTTPS timeout was not set.  
To specify no timeout, enter the ip https exec-timeout 0 0 command.  
ip https server  
The ip https server Global Configuration mode command enables  
configuring the device from a secured browser. To restore the default  
configuration, use the no form of this command.  
Syntax  
ip https server  
no ip https server  
Default Configuration  
Disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Use the crypto certificate generate Global Configuration mode  
command to generate an HTTPS certificate.  
Example  
The following example enables configuring the device from a secured  
browser.  
Console(config)# ip https server  
ip https port  
The ip https port Global Configuration mode command specifies the  
TCP port used by the server to configure the device through the Web  
browser. To restore the default configuration, use the no form of this  
command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
386  
CHAPTER 26: WEB SERVER COMMANDS  
Syntax  
ip https port port-number  
no ip https port  
Parameters  
port-number — Port number to be used by the HTTP server. (Range:  
1-65535)  
Default Configuration  
The default port number is 443.  
Command Mode  
Global Configuration mode  
User Guidelines  
Specifying 0 as the port number effectively disables HTTP access to the  
device.  
Example  
The following example configures the https port number to 100.  
Console(config)# ip https port 100  
Console(config)# ip https port 100  
crypto certificate  
generate  
The crypto certificate generate Global Configuration mode command  
generates a self-signed HTTPS certificate.  
Syntax  
crypto certificate [number] generate [key-generate length] [cn  
common- name] [ou organization-unit] [or organization] [loc location] [st  
state] [cu country] [duration days]  
Parameters  
number — Specifies the certificate number. (Range: 1-2)  
key-generate — Regenerate the SSL RSA key.  
length — Specifies the SSL RSA key length. (Range: 512-2048)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
crypto certificate generate 387  
common- name — Specifies the fully qualified URL or IP address of the  
device. (Range: 1-64)  
organization — Specifies the organization name. (Range: 1-64)  
organization-unit — Specifies the organization-unit or department  
name.(Range: 1-64)  
location — Specifies the location or city name. (Range: 1-64)  
state — Specifies the state or province name. (Range: 1-64)  
country — Specifies the country name. (Range: 2-2)  
days — Specifies number of days certification is valid. (Range:  
30-3650)  
Default Configuration  
The Certificate and SSL’s RSA key pairs do not exist.  
If no RSA key length is specified, the default length is 1024.  
If no URL or IP address is specified, the default common name is the  
lowest IP address of the device at the time that the certificate is  
generated.  
If the number of days is not specified, the default period of time that the  
certification is valid is 365 days.  
Command Mode  
Global Configuration mode  
User Guidelines  
The command is not saved in the device configuration; however, the  
certificate and keys generated by this command are saved in the private  
configuration (which is never displayed to the user or backed up to  
another device).  
Use this command to generate a self-signed certificate for the device.  
If the RSA keys do not exist, parameter key-generate must be used.  
Example  
The following example regenerates an HTTPS certificate.  
Console(config)# crypto certificate 1 generate key-generate  
Download from Www.Somanuals.com. All Manuals Search And Download.  
388  
CHAPTER 26: WEB SERVER COMMANDS  
crypto certificate  
request  
The crypto certificate request Privileged EXEC mode command  
generates and displays certificate requests for HTTPS.  
Syntax  
crypto certificate number request [cn common- name][ou  
organization-unit] [or organization] [loc location] [st state] [cu country]  
Parameters  
number — Specifies the certificate number. (Range: 1-2)  
common- name — Specifies the fully qualified URL or IP address of the  
device. (Range: 1- 64)  
organization-unit — Specifies the organization-unit or department  
name. (Range: 1-64)  
organization — Specifies the organization name. (Range: 1-64)  
location — Specifies the location or city name. (Range: 1-64)  
state — Specifies the state or province name. (Range: 1-64)  
country — Specifies the country name. (Range: 2-2)  
Default Configuration  
There is no default configuration for this command.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
Use this command to export a certificate request to a Certification  
Authority. The certificate request is generated in Base64-encoded X.509  
format.  
Before generating a certificate request you must first generate a  
self-signed certificate using the crypto certificate generate Global  
Configuration mode command. Be aware that you have to reenter the  
certificate fields.  
After receiving the certificate from the Certification Authority, use the  
crypto certificate import Global Configuration mode command to  
import the certificate into the device. This certificate replaces the  
self-signed certificate.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
crypto certificate import 389  
Example  
The following example generates and displays a certificate request for  
HTTPS.  
Console# crypto certificate 1 request  
-----BEGIN CERTIFICATE REQUEST-----  
MIwTCCASoCAQAwYjELMAkGA1UEBhMCUFAxCzAJBgNVBAgTAkNDMQswCQYDVQQH  
EwRDEMMAoGA1UEChMDZGxkMQwwCgYDVQQLEwNkbGQxCzAJBgNVBAMTAmxkMRAw  
DgKoZIhvcNAQkBFgFsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8ecwQ  
HdML0831i0fh/F0MV/Kib6Sz5p+3nUUenbfHp/igVPmFM+1nbqTDekb2ymCu6K  
aKvEbVLF9F2LmM7VPjDBb9bb4jnxkvwW/wzDLvW2rsy5NPmH1QVl+8Ubx3GyCm  
/oW93BSOFwxwEsP58kf+sPYPy+/8wwmoNtDwIDAQABoB8wHQYJKoZIhvcNAQkH  
MRDjEyMwgICCAgICAICAgIMA0GCSqGSIb3DQEBBAUAA4GBAGb8UgIx7rB05m+2  
m5ZZPhIwl8ARSPXwhVdJexFjbnmvcacqjPG8pIiRV6LkxryGF2bVU3jKEipcZa  
g+uNpyTkDt3ZVU72pjz/fa8TF0n3  
-----END CERTIFICATE REQUEST-----  
CN= router.gm.com  
0= General Motors  
C= US  
crypto certificate  
import  
The crypto certificate import Global Configuration mode command  
imports a certificate signed by the Certification Authority for HTTPS.  
Syntax  
crypto certificate number import  
Parameters  
number — Specifies the certificate number. (Range: 1-2)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Use this command to enter an external certificate (signed by Certification  
Authority) to the device. To end the session, enter an empty line.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
390  
CHAPTER 26: WEB SERVER COMMANDS  
The imported certificate must be based on a certificate request created by  
the crypto certificate request Privileged EXEC mode command.  
If the public key found in the certificate does not match the device's SSL  
RSA key, the command fails.  
This command is not saved in the device configuration; however, the  
certificate imported by this command is saved in the private configuration  
(which is never displayed to the user or backed up to another device).  
Example  
The following example imports a certificate signed by Certification  
Authority for HTTPS.  
Console(config)# crypto certificate  
1
import  
-----BEGIN CERTIFICATE-----  
dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS  
nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr  
yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw  
CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47  
ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v  
L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl  
-----END CERTIFICATE-----  
Certificate imported successfully.  
Issued to: router.gm.com  
Issued by: www.verisign.com  
Valid from: 8/9/2003 to 8/9/2004  
Subject: CN= router.gm.com, 0= General Motors, C= US  
Finger print: DC789788 DC88A988 127897BC BB789788  
ip https certificate  
The ip https certificate Global Configuration mode command  
configures the active certificate for HTTPS. To return to the default  
configuration, use the no form of this command.  
Syntax  
ip https certificate number  
no ip https certificate  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show crypto certificate mycertificate 391  
Parameters  
number — Specifies the certificate number. (Range: 1-2)  
Default Configuration  
There is no default configuration for this command.  
Command Mode  
Global Configuration mode  
User Guidelines  
The crypto certificate generate command should be used to generate  
HTTPS certificates.  
Example  
The following example configures the active certificate for HTTPS.  
Console(config)# ip https certificate  
1
show crypto  
certificate  
mycertificate  
The show crypto certificate mycertificate Privileged EXEC mode  
command displays the SSH certificates of the device.  
Syntax  
show crypto certificate mycertificate [number]  
Parameters  
number — Specifies the certificate number. (Range: 1-2)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
392  
CHAPTER 26: WEB SERVER COMMANDS  
The following example displays the certificate.  
Console# show crypto certificate mycertificate  
1
-----BEGIN CERTIFICATE-----  
MIICFTCCAX4CAQAwDQYJKoZIhvcNAQEEBQAwUzELMAkGA1UEBhMCICAxCjAIBgNV  
BAgTASAxCjAIBgNVBAcTASAxFDASBgNVBAMTCzEwLjYuNDEuMTM4MQowCAYDVQQK  
EwEgMQowCAYDVQQLEwEgMB4XDTAzMDQzMDIwNTE1NFoXDTA0MDQyOTIwNTE1NFow  
UzELMAkGA1UEBhMCICAxCjAIBgNVBAgTASAxCjAIBgNVBAcTASAxFDASBgNVBAMT  
CzEwLjYuNDEuMTM4MQowCAYDVQQKEwEgMQowCAYDVQQLEwEgMIGfMA0GCSqGSIb3  
DQEBAQUAA4GNADCBiQKBgQDrQxdrGjKwJMtq6YDF4aAoCnY2vXTivToJEn9vI55y  
eIwn4n2dH1fKCxhnvJSmMk+jtA9pbQTALSWCm2S3jllZyWsE/tnnPUkkuNtApBa6  
6OOy80lpYdpJuSJ8V/0wwvLYooh9h3PDDhSuWaWzCAlV94g1UzkNvrBsGEL5TPEp  
BQIDAQABMA0GCSqGSIb3DQEBBAUAA4GBADjg8wGBLdVHQVAOAo89zV2ZbpYbSxR9  
RwJ4P6VaFRh2xnpDZXRASp482Tan9SQcUWcVIq2iFIKggXYeMSoHOB+0M+pf77PC  
/m9UHVoHTjssPSAsU/7OGMGXVRFri0XhPgety9xsR+9zE1q2vPrrl7PW/+kupb3J  
ZRZ/KAct/5zl  
-----END CERTIFICATE-----  
Issued by : C= , ST= , L= , CN=10.6.41.138, O= , OU=  
Valid From: Apr 30 20:51:54 2003 GMT  
Valid to: Apr 29 20:51:54 2004 GMT  
Subject: C= , ST= , L= , CN=10.6.41.138, O= , OU=  
SHA1 Fingerprint: B3536E86 9487B229 C0A44199 DAB98046 7861F705  
show ip http  
The show ip http Privileged EXEC mode command displays the HTTP  
server configuration.  
Syntax  
show ip http  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show ip https 393  
Example  
The following example displays the HTTP server configuration.  
Console# show ip http  
HTTP server enabled. Port: 80  
show ip https  
The show ip https Privileged EXEC mode command displays the HTTPS  
server configuration.  
Syntax  
show ip https  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the HTTP server configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
394  
CHAPTER 26: WEB SERVER COMMANDS  
Console# show ip https  
HTTPS server enabled. Port: 443  
Certificate 1 is not active.  
Issued by : C= , ST= , L= , CN=10.6.41.138, O= , OU=  
Valid From: Apr 30 20:51:54 2003 GMT  
Valid to: Apr 29 20:51:54 2004 GMT  
Subject: C= , ST= , L= , CN=10.6.41.138, O= , OU=  
SHA1 Fingerprint: B3536E86 9487B229 C0A44199 DAB98046 7861F705  
Certificate 2 is active.  
Issued by : C= , ST= , L= , CN=10.6.41.138, O= , OU=  
Valid From: Apr 30 22:16:01 2003 GMT  
Valid to: Apr 29 22:16:01 2004 GMT  
Subject: C= , ST= , L= , CN=10.6.41.138, O= , OU=  
SHA1 Fingerprint: 3DBDF89B 6B3E46A2 4255D023 42A361F2 90ED7042  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TACACS+ COMMANDS  
27  
tacacs-server host  
The tacacs-server host Global Configuration mode command specifies a  
TACACS+ host. To delete the specified name or address, use the no form  
of this command.  
Syntax  
tacacs-server host {ip-address | hostname} [single-connection] [port  
port-number] [timeout timeout] [key key-string] [source source]  
[priority priority]  
no tacacs-server host {ip-address | hostname}  
Parameters  
ip-address — IP address of the TACACS+ server.  
hostname — Host name of the TACACS+ server. (Range: 1-158  
characters)  
single-connection — Indicates a single-connection. Rather than have  
the device open and close a TCP connection to the daemon each time  
it must communicate, the single-connection option maintains a single  
open connection between the device and the daemon.  
port-number — Specifies a server port number. The host is not used  
for authentication if the port number is set to 0. The host is not used  
for authentication if the port number is set to 0. (Range: 0-65535)  
timeout — Specifies the timeout value in seconds. (Range: 1-30)  
key-string — Specifies the authentication and encryption key for all  
TACACS+ communications between the device and the TACACS+  
server. This key must match the encryption used on the TACACS+  
daemon. To specify an empty string, enter "". (Range: 0-128  
characters)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
396  
CHAPTER 27: TACACS+ COMMANDS  
source — Specifies the source IP address to use for the  
communication. 0.0.0.0 indicates a request to use the IP address of  
the outgoing IP interface.  
priority — Determines the order in which the TACACS+ servers are  
used, where 0 is the highest priority. (Range: 0-65535)  
Default Configuration  
No TACACS+ host is specified.  
If no port number is specified, default port number 49 is used.  
If no host-specific timeout, key-string or source value is specified, the  
global value is used.  
If no TACACS+ server priority is specified, default priority 0 is used.  
Command Mode  
Global Configuration mode  
User Guidelines  
Multiple tacacs-server host commands can be used to specify multiple  
hosts.  
Example  
The following example specifies a TACACS+ host.  
Console(config)# tacacs-server host 172.16.1.1  
tacacs-server key  
The tacacs-server key Global Configuration mode command sets the  
authentication encryption key used for all TACACS+ communications  
between the device and the TACACS+ daemon. To disable the key, use  
the no form of this command.  
Syntax  
tacacs-server key key-string  
no tacacs-server key  
Parameters  
key-string — Specifies the authentication and encryption key for all  
TACACS+ communications between the device and the TACACS+  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
tacacs-server timeout 397  
server. This key must match the encryption used on the TACACS+  
daemon. (Range: 0-128 characters)  
Default Configuration  
Empty string.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets the authentication encryption key for all  
TACACS+ servers.  
Console(config)# tacacs-server key enterprise  
tacacs-server  
timeout  
The tacacs-server timeout Global Configuration mode command sets  
the interval during which the device waits for a TACACS+ server to reply.  
To restore the default configuration, use the no form of this command.  
Syntax  
tacacs-server timeout timeout  
no tacacs-server timeout  
Parameters  
timeout — Specifies the timeout value in seconds. (Range: 1-30)  
Default Configuration  
5 seconds  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
398  
CHAPTER 27: TACACS+ COMMANDS  
Example  
The following example sets the timeout value to 30 for all TACACS+  
servers.  
Console(config)# tacacs-server timeout 30  
tacacs-server  
source-ip  
The tacacs-server source-ip Global Configuration mode command  
configures the source IP address to be used for communication with  
TACACS+ servers. To restore the default configuration, use the no form  
of this command.  
Syntax  
tacacs-server source-ip source  
no tacacs-server source-ip source  
Parameters  
source — Specifies the source IP address.  
Default Configuration  
The source IP address is the address of the outgoing IP interface.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example specifies the source IP address for all TACACS+  
servers.  
Console(config)# tacacs-server source-ip 172.16.8.1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show tacacs 399  
show tacacs  
The show tacacs Privileged EXEC mode command displays configuration  
and statistical information about a TACACS+ server.  
Syntax  
show tacacs [ip-address]  
Parameters  
ip-address — Name or IP address of the TACACS+ server.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays configuration and statistical information  
about a TACACS+ server.  
Console# show tacacs  
Device Configuration  
--------------------  
IP  
addres  
s
Status  
------  
Port  
----  
49  
Single  
Connec  
tion  
TimeOu  
t
Source  
IP  
Priority  
--------  
1
------  
----  
------  
------  
-----  
------  
-
------  
---  
172.16  
.1.1  
Connec  
ted  
No  
Global  
Global  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
400  
CHAPTER 27: TACACS+ COMMANDS  
Global values  
-------------  
TimeOut: 3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SYSLOG COMMANDS  
28  
logging on  
The logging on Global Configuration mode command controls error  
message logging. This command sends debug or error messages to a  
logging process, which logs messages to designated locations  
asynchronously to the process that generated the messages. To disable  
the logging process, use the no form of this command.  
Syntax  
logging on  
no logging on  
Default Configuration  
Logging is enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
The logging process controls the distribution of logging messages at  
various destinations, such as the logging buffer, logging file or syslog  
server. Logging on and off at these destinations can be individually  
configured using the logging buffered, logging file, and logging  
Global Configuration mode commands. However, if the logging on  
command is disabled, no messages are sent to these destinations. Only  
the console receives messages.  
Example  
The following example enables logging error messages.  
Console(config)# logging on  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
402  
CHAPTER 28: SYSLOG COMMANDS  
logging  
The logging Global Configuration mode command logs messages to a  
syslog server. To delete the syslog server with the specified address from  
the list of syslogs, use the no form of this command.  
Syntax  
logging {ip-address | hostname} [port port] [severity level] [facility  
facility] [description text]  
no logging {ip-address | hostname}  
Parameters  
ip-address — IP address of the host to be used as a syslog server.  
hostname — Specifies the host name of the syslog server. (Range:  
1-158 characters)  
port — Specifies the port number for syslog messages. (Range:  
1-65535)  
level — Specifies the severity level of logged messages sent to the  
syslog servers. Possible values: emergencies, alerts, critical, errors,  
warnings, notifications, informational and debugging.  
facility — Specifies the facility that is indicated in the message.  
Possible values: local0, local1, local2, local3, local4, local5, local6,  
local7.  
text — Syslog server description. (Range: 1-64 characters)  
Default Configuration  
The default port number is 514.  
The default logging message level is informational.  
The default facility is local7.  
Command Mode  
Global Configuration mode  
User Guidelines  
Up to 8 syslog servers can be used.  
If no specific severity level is specified, the global values apply to each  
server.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
logging console 403  
Example  
The following example limits logged messages sent to the syslog server  
with IP address 10.1.1.1 to severity level critical.  
Console(config)# logging 10.1.1.1 severity critical  
logging console  
The logging console Global Configuration mode command limits  
messages logged to the console based on severity. To disable logging to  
the console, use the no form of this command.  
Syntax  
logging console level  
no logging console  
Parameters  
level — Specifies the severity level of logged messages displayed on  
the console. The possible values are: emergencies, alerts, critical,  
errors, warnings, notifications, informational, debugging.  
Default Configuration  
The default severity level is informational.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example limits logging messages displayed on the console  
to severity level errors.  
Console(config)# logging console errors  
logging buffered  
The logging buffered Global Configuration mode command limits  
syslog messages displayed from an internal buffer based on severity. To  
cancel using the buffer, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
404  
CHAPTER 28: SYSLOG COMMANDS  
Syntax  
logging buffered level  
no logging buffered  
Parameters  
level — Specifies the severity level of messages logged in the buffer.  
The possible values are: emergencies, alerts, critical, errors,  
warnings, notifications, informational, debugging.  
Default Configuration  
The default severity level is informational.  
Command Mode  
Global Configuration mode  
User Guidelines  
All the syslog messages are logged to the internal buffer. This command  
limits the messages displayed to the user.  
Example  
The following example limits syslog messages displayed from an internal  
buffer based on severity level debugging.  
Console(config)# logging buffered debugging  
logging buffered  
size  
The logging buffered size Global Configuration mode command  
changes the number of syslog messages stored in the internal buffer. To  
restore the default configuration, use the no form of this command.  
Syntax  
logging buffered size number  
no logging buffered size  
Parameters  
number — Specifies the maximum number of messages stored in the  
history table. (Range: 20-400)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
clear logging 405  
Default Configuration  
The default number of messages is 200.  
Command Mode  
Global Configuration mode  
User Guidelines  
This command takes effect only after Reset.  
Example  
The following example changes the number of syslog messages stored in  
the internal buffer to 300.  
Console(config)# logging buffered size 300  
clear logging  
The clear logging Privileged EXEC mode command clears messages from  
the internal logging buffer.  
Syntax  
clear logging  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example clears messages from the internal logging buffer.  
Console# clear logging  
Clear Logging File [y/n]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
406  
CHAPTER 28: SYSLOG COMMANDS  
logging file  
The logging file Global Configuration mode command limits syslog  
messages sent to the logging file based on severity. To cancel using the  
buffer, use the no form of this command.  
Syntax  
logging file level  
no logging file  
Parameters  
level — Specifies the severity level of syslog messages sent to the  
logging file. Possible values are: emergencies, alerts, critical, errors,  
warnings, notifications, informational and debugging.  
Default Configuration  
The default severity level is errors.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example limits syslog messages sent to the logging file  
based on severity level alerts.  
Console(config)# logging file alerts  
clear logging file  
The clear logging file Privileged EXEC mode command clears messages  
from the logging file.  
Syntax  
clear logging file  
Default Configuration  
This command has no default configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
aaa logging 407  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example clears messages from the logging file.  
Console# clear logging file  
Clear Logging File [y/n]  
aaa logging  
The aaa logging Global Configuration mode command enables logging  
AAA login events. To disable logging AAA login events, use the no form  
of this command.  
Syntax  
aaa logging login  
no aaa logging login  
Parameters  
login — Indicates logging messages related to successful login events,  
unsuccessful login events and other login-related events.  
Default Configuration  
Logging AAA login events is enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Other types of AAA events are not subject to this command.  
Example  
The following example enables logging messages related to AAA login  
events.  
Console(config)# aaa logging login  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
408  
CHAPTER 28: SYSLOG COMMANDS  
file-system logging  
The file-system logging Global Configuration mode command enables  
logging file system events. To disable logging file system events, use the  
no form of this command.  
Syntax  
file-system logging copy  
no file-system logging copy  
file-system logging delete-rename  
no file-system logging delete-rename  
Parameters  
copy — Indicates logging messages related to file copy operations.  
delete-rename — Indicates logging messages related to file deletion  
and renaming operations.  
Default Configuration  
Logging file system events is enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables logging messages related to file copy  
operations.  
Console(config)# file-system logging copy  
management  
logging  
The management logging Global Configuration command enables  
logging management access list (ACL) events. To disable logging  
management access list events, use the no form of this command.  
Syntax  
management logging deny  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
show logging 409  
no management logging deny  
Parameters  
deny — Indicates logging messages related to deny actions of  
management ACLs.  
Default Configuration  
Logging management ACL events is enabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Other types of management ACL events are not subject to this command.  
Example  
The following example enables logging messages related to deny actions  
of management ACLs.  
Console(config)# management logging deny  
show logging  
The show logging Privileged EXEC mode command displays the state of  
logging and the syslog messages stored in the internal buffer.  
Syntax  
show logging  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
410  
CHAPTER 28: SYSLOG COMMANDS  
The following example displays the state of logging and the syslog  
messages stored in the internal buffer.  
Console# show logging  
Logging is enabled.  
Console logging: level debugging. Console Messages: 0 Dropped  
(severity).  
Buffer logging: level debugging. Buffer Messages: 11 Logged, 200  
Max.  
File logging: level notifications. File Messages: 0 Dropped  
(severity).  
Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped  
(severity).  
Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped  
(severity).  
2 messages were not logged (resources)  
Application filtering control  
Application  
-----------  
AAA  
Event  
Status  
-----  
------  
Login  
Enabled  
Enabled  
Enabled  
Enabled  
File system  
File system  
Management ACL  
Copy  
Delete-Rename  
Deny  
Buffer log:  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0,  
changed state to up  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg0,  
changed state to up  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg1,  
changed state to up  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg2,  
changed state to up  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg3,  
changed state to up  
11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by  
console  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show logging file 411  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface FastEthernet0/0, changed state to up  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet0, changed state to down  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet1, changed state to down  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet2, changed state to down  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet3, changed state to down  
show logging file  
The show logging file Privileged EXEC mode command displays the  
state of logging and the syslog messages stored in the logging file.  
Syntax  
show logging file  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
412  
CHAPTER 28: SYSLOG COMMANDS  
Example  
The following example displays the logging state and the syslog messages  
stored in the logging file.  
Console# show logging file  
Logging is enabled.  
Console logging: level debugging. Console Messages: 0 Dropped  
(severity).  
Buffer logging: level debugging. Buffer Messages: 11 Logged, 200  
Max.  
File logging: level notifications. File Messages: 0 Dropped  
(severity).  
Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped  
(severity).  
Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped  
(severity).  
2 messages were not logged (resources)  
Application filtering control  
Application  
-----------  
AAA  
Event  
Status  
-----  
------  
Login  
Enabled  
Enabled  
Enabled  
Enabled  
File system  
File system  
Management ACL  
Copy  
Delete-Rename  
Deny  
Buffer log:  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0,  
changed state to up  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg0,  
changed state to up  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg1,  
changed state to up  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show syslog-servers 413  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg2,  
changed state to up  
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernetg3,  
changed state to up  
11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by  
console  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface FastEthernet0/0, changed state to up  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet0, changed state to down  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet1, changed state to down  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet2, changed state to down  
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on  
Interface Ethernet3, changed state to down  
show  
syslog-servers  
The show syslog-servers Privileged EXEC mode command displays the  
settings of the syslog servers.  
Syntax  
show syslog-servers  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the settings of the syslog servers.  
Console# show syslog-servers  
Device Configuration  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
414  
CHAPTER 28: SYSLOG COMMANDS  
IP address  
Port  
Severity  
Facility  
Description  
-----------  
----------- ----  
-
----------- --------  
--  
192.180.2.2 514  
7
Information local7  
al  
192.180.2.2 514  
8
Warning  
local7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WIRELESS AP BSS COMMANDS  
29  
bss  
The bss Interface Radio Configuration mode command adds or removes  
ESS to/from a radio interface.  
Syntax  
bss {add {ess-index | ssid} | remove {ess-index | ssid}}  
Parameters  
ess-index — The ESS index. (Range: 1-65535)  
ssid — The SSID string of the ESS. (Range: 1-32 characters)  
Default Configuration  
The default ESS is automatically added to the radio interface.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example adds an ESS to a radio interface called ‘enterprise’.  
Config# wlan ap CR1 config  
Console (Config-ap)# interface radio 802.11g  
Console (Config-ap-radio-if)# bss add enterprise  
bss enable  
The bss enable Interface Radio Configuration mode command places  
the device in BSS configuration mode.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
416  
CHAPTER 29: WIRELESS AP BSS COMMANDS  
Syntax  
bss enable {index | ssid}  
Parameters  
index — The ESS index. (Range: 1-65535)  
ssid — The SSID string of the ESS. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example places SSID device called ‘enterprise’ in BSS  
Configuration mode.  
Console (Config-ap-radio-if)#c bss enable  
Console (Config-ap-radio-if)# bss enable enterprise  
Console (Config-ap-bss-if)#  
advertise-ssid  
The advertise-ssid BSS Configuration mode command advertises the  
BSS SSID. To disable advertising, use the no form of this command.  
Syntax  
advertise-ssid  
no advertise-ssid  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
The BSS SSID is advertised.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
data-rates 417  
Command Mode  
BSS Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example advertises the BSS SSID.  
Console (Config-ap-radio-if)# bss configure enterprise  
Console (Config-ap-bss-if)#  
data-rates  
The data-rates BSS Configuration mode command configures the data  
rates used in a BSS. To restore defaults, use the no form of this  
command.  
Syntax  
data-rates {[mandatory] add | remove} rate1 [rate1…12]  
no data-rates  
The command can be implemented as follows:  
data-rates mandatory add rate1 [rate1…12]  
data-rates {add | remove} rate1 [rate1…12]  
Parameters  
rate-list — Specifies the data rates that should be supported. Available  
rates are as follows:  
802.11g — 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48 and 54.  
802.11a — 6, 9, 12, 18, 24, 36, 48 and 54.  
Default Configuration  
All rates are optional except for the following rates that are mandatory:  
802.11g: 1.  
802.11a: 6.  
Command Mode  
BSS Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
418  
CHAPTER 29: WIRELESS AP BSS COMMANDS  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the data rates used in a BSS to 2 while  
complying with 802.11g.  
Console (Config-ap-radio)# bss configure enterprise  
Console (Config-wlan-ap-radio-bss-if)# data-rates mandatory add  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
SYSTEM MANAGEMENT  
COMMANDS  
30  
ping  
The ping User EXEC mode command sends ICMP echo request packets  
to another node on the network.  
Syntax  
ping {ip-address | hostname}[size packet_size] [count packet_count]  
[timeout time_out]  
Parameters  
ip-address — IP address to ping.  
hostname — Host name to ping. (Range: 1-158 characters)  
packet_size — Number of bytes in a packet. The actual packet size is  
eight bytes larger than the specified size specified because the device  
adds header information. (Range: 56-1472 bytes)  
packet_count — Number of packets to send. If 0 is entered, it pings  
until stopped. (Range: 0-65535 packets)  
time_out — Timeout in milliseconds to wait for each reply. (Range:  
50-65535 milliseconds)  
Default Configuration  
Default packet size is 56 bytes.  
Default number of packets to send is 4.  
Default timeout value is 2000 milliseconds.  
Command Mode  
User EXEC mode  
User Guidelines  
Press Esc to stop pinging.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
420  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
Following are examples of unsuccessful pinging:  
Destination does not respond. If the host does not respond, a “no answer  
from host” appears in ten seconds.  
Destination unreachable. The gateway for this destination indicates that  
the destination is unreachable.  
Network or host unreachable. The device found no corresponding entry  
in the route table.  
Example  
The following example displays pinging results:  
Console> ping 10.1.1.1  
Pinging 10.1.1.1 with 64 bytes of data:  
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms  
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms  
64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms  
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms  
----10.1.1.1 PING Statistics----  
4 packets transmitted, 4 packets received, 0% packet loss  
round-trip (ms) min/avg/max = 7/8/11  
Console> ping yahoo.com  
Pinging yahoo.com 66.218.71.198 with 64 bytes of data:  
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms  
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms  
64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms  
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms  
----10.1.1.1 PING Statistics----  
4 packets transmitted, 4 packets received, 0% packet loss  
round-trip (ms) min/avg/max = 7/8/11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
traceroute 421  
traceroute  
The traceroute User EXEC mode command discovers routes that packets  
actually take when traveling to their destination.  
Syntax  
traceroute {ip-address |hostname}[size packet_size] [ttl max-ttl] [count  
packet_count] [timeout time_out] [source ip-address] [tos tos]  
Parameters  
ip-address — IP address of the destination host.  
hostname — Host name of the destination host. (Range: 1-158  
characters)  
packet_size — Number of bytes in a packet. (Range: 40-1472)  
max-ttl — The largest TTL value that can be used. The traceroute  
command terminates when the destination is reached or when this  
value is reached. (Range:1-255)  
packet_count — The number of probes to be sent at each TTL level.  
(Range:1-10)  
time_out — The number of seconds to wait for a response to a probe  
packet.  
(Range:1-60)  
ip-address — One of the devices interface addresses to use as a  
source address for the probes. The device normally selects what it feels  
is the best source address to use.  
tos — The Type-Of-Service byte in the IP Header of the packet. (Range:  
0-255)  
Default Configuration  
The default number of bytes in a packet is 40.  
The default maximum TTL value is 30.  
The default number of probes to be sent at each TTL level is 3.  
The default timeout interval in seconds is 3.  
Command Mode  
User EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
422  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
User Guidelines  
The traceroute command takesadvantage of the error messages  
generated by the devices when a datagram exceeds its time-to-live (TTL)  
value.  
The traceroute command starts by sending probe datagrams with a TTL  
value of one. This causes the first device to discard the probe datagram  
and send back an error message. The traceroute command sends several  
probes at each TTL level and displays the round-trip time for each.  
The traceroute command sends out one probe at a time. Each outgoing  
packet may result in one or two error messages. A "time exceeded" error  
message indicates that an intermediate device has seen and discarded the  
probe. A "destination unreachable" error message indicates that the  
destination node has received the probe and discarded it because it could  
not deliver the packet. If the timer goes off before a response comes in,  
the traceroute command prints an asterisk (*).  
The traceroute command terminates when the destination responds,  
when the maximum TTL is exceeded or when the user interrupts the trace  
by pressing Esc.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
traceroute 423  
Example  
The following example discovers the routes that packets will actually take  
when traveling to their destination.  
Console> traceroute umaxp1.physics.lsa.umich.edu  
Type Esc to abort.  
Tracing the route to umaxp1.physics.lsa.umich.edu  
(141.211.101.64)  
1 i2-gateway.stanford.edu (192.68.191.83) 0 msec 0 msec 0 msec  
2 STAN.POS.calren2.NET (171.64.1.213) 0 msec 0 msec 0 msec  
3 SUNV--STAN.POS.calren2.net (198.32.249.73) 1 msec 1 msec 1 msec  
4 Abilene--QSV.POS.calren2.net (198.32.249.162) 1 msec 1 msec 1  
msec  
5 kscyng-snvang.abilene.ucaid.edu (198.32.8.103) 33 msec 35 msec  
35 msec  
6 iplsng-kscyng.abilene.ucaid.edu (198.32.8.80) 47 msec 45 msec  
45 msec  
7 so-0-2-0x1.aa1.mich.net (192.122.183.9) 56 msec 53 msec 54  
msec  
8 atm1-0x24.michnet8.mich.net (198.108.23.82) 56 msec 56 msec 57  
msec  
9 * * *  
10 A-ARB3-LSA-NG.c-SEB.umnet.umich.edu (141.211.5.22) 58 msec 58  
msec 58 msec  
11 umaxp1.physics.lsa.umich.edu (141.211.101.64) 62 msec 63 msec  
63 msec  
The following table describes significant fields shown above.  
Field  
Description  
1
Indicates the sequence number of the device in the path to  
the host.  
i2-gateway.stan Host name of this device.  
ford.edu  
192.68.191.83  
IP address of this device.  
1 msec 1 msec  
1 msec  
Round-trip time for each probe sent.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
424  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
The following table describes characters that may appear in the  
traceroute command output.  
Field  
Description  
*
?
The probe timed out.  
Unknown packet type.  
A
Administratively unreachable. Usually, this output  
indicates that an access list is blocking traffic.  
F
Fragmentation is required and DF is set.  
Host unreachable.  
H
N
P
Network unreachable.  
Protocol unreachable.  
Source quench.  
Q
R
S
Fragment reassembly time exceeded.  
Source route failed.  
U
Port unreachable.  
telnet  
The telnet User EXEC mode command enables logging on to a host that  
supports Telnet.  
Syntax  
telnet {ip-address | hostname} [port] [keyword1......]  
Parameters  
ip-address — IP address of the destination host.  
hostname — Host name of the destination host. (Range: 1-158  
characters)  
port — A decimal TCP port number, or one of the keywords listed in  
the Ports table in the User Guidelines.  
keyword — One or more keywords listed in the Keywords table in the  
User Guidelines.  
Default Configuration  
The default port is the Telnet port (decimal23) on the host.  
Command Mode  
User EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
telnet 425  
User Guidelines  
Telnet software supports special Telnet commands in the form of Telnet  
sequences that map generic terminal control functions to operating  
system-specific functions. To enter a Telnet sequence, press the escape  
sequence keys (Ctrl-shift-6) followed by a Telnet command character.  
Special Telnet Sequences  
Telnet Sequence  
Ctrl-shift-6-b  
Ctrl-shift-6-c  
Ctrl-shift-6-h  
Ctrl-shift-6-o  
Ctrl-shift-6-t  
Ctrl-shift-6-u  
Purpose  
Break  
Interrupt Process (IP)  
Erase Character (EC)  
Abort Output (AO)  
Are You There? (AYT)  
Erase Line (EL)  
At any time during an active Telnet session, Telnet commands can be  
listed by pressing the Ctrl-shift-6-? keys at the system prompt.  
A sample of this list follows. Note that the Ctrl-shift-6 sequence appears  
as ^^ on the screen.  
Console> ‘Ctrl-shift-6’ ?  
[Special telnet escape help]  
^^ B sends telnet BREAK  
^^ C sends telnet IP  
^^ H sends telnet EC  
^^ O sends telnet AO  
^^ T sends telnet AYT  
^^ U sends telnet EL  
Ctrl-shift-6 x suspends the session (return to system command  
prompt)  
Several concurrent Telnet sessions can be opened and switched. To open  
a subsequent session, the current connection has to be suspended by  
pressing the escape sequence keys (Ctrl-shift-6) and x to return to the  
system command prompt. Then open a new connection with the telnet  
User EXEC mode command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
426  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
Keywords Table  
Options  
/echo  
Description  
Enables local echo.  
/quiet  
Prevents onscreen display of all messages from the  
software.  
/source-interface Specifies the source interface.  
/stream  
Turns on stream processing, which enables a raw TCP  
stream with no Telnet control sequences. A stream  
connection does not process Telnet options and can be  
appropriate for connections to ports running UNIX-to-UNIX  
Copy Program (UUCP) and other non-Telnet protocols.  
Ctrl-shift-6 x  
Return to System Command Prompt  
Ports Table  
Keyword  
BGP  
Description  
Port Number  
Border Gateway Protocol 179  
chargen  
cmd  
Character generator  
Remote commands  
Daytime  
19  
514  
13  
daytime  
discard  
domain  
echo  
Discard  
9
Domain Name Service  
Echo  
53  
7
exec  
Exec  
512  
79  
finger  
ftp  
Finger  
File Transfer Protocol  
FTP data connections  
Gopher  
21  
ftp-data  
gopher  
hostname  
ident  
20  
70  
NIC hostname server  
Ident Protocol  
Internet Relay Chat  
Kerberos login  
Kerberos shell  
Login  
101  
113  
194  
543  
544  
513  
515  
119  
irc  
klogin  
kshell  
login  
lpd  
Printer service  
nntp  
Network News Transport  
Protocol  
Download from Www.Somanuals.com. All Manuals Search And Download.  
resume 427  
Keyword  
pim-auto-rp  
pop2  
Description  
Port Number  
PIM Auto-RP  
496  
109  
110  
25  
Post Office Protocol v2  
Post Office Protocol v3  
pop3  
smtp  
Simple Mail Transport  
Protocol  
sunrpc  
Sun Remote Procedure  
Call  
111  
syslog  
tacacs  
Syslog  
514  
49  
TAC Access Control  
System  
talk  
Talk  
517  
23  
telnet  
time  
uucp  
Telnet  
Time  
37  
Unix-to-Unix Copy  
Program  
540  
whois  
www  
Nickname  
43  
80  
World Wide Web  
This command lists concurrent telnet connections to remote hosts that  
were opened by the current telnet session to the local device. It does not  
list telnet connections to remote hosts that were opened by other telnet  
sessions.  
Example  
The following example displays connecting to 176.213.10.50 via Telnet.  
Console> telnet 176.213.10.50  
Esc U sends telnet EL  
resume  
The resume User EXEC mode command enables switching to another  
open Telnet session.  
Syntax  
resume [connection]  
Parameters  
connection — The connection number. (Range: 1-4 connections)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
428  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
Default Configuration  
The default connection number is that of the most recent connection.  
Command Mode  
User EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following command switches to open Telnet session number 1.  
Console> resume 1  
reload  
The reload Privileged EXEC mode command reloads the operating  
system.  
Syntax  
reload  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
Caution should be exercised when resetting the device, to ensure that no  
other activity is being performed. In particular, the user should verify that  
no configuration files are being downloaded at the time of reset.  
Example  
The following example reloads the operating system.  
Console# reload  
This command will reset the whole system and disconnect your  
current session. Do you want to continue (y/n) [n]?  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
hostname 429  
hostname  
The hostname Global Configuration mode command specifies or  
modifies the device host name. To remove the existing host name, use  
the no form of the command.  
Syntax  
hostname name  
no hostname  
Parameters  
name — The host name. of the device. (Range: 1-160 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example specifies the device host name.  
Console(config)# hostname enterprise  
enterprise(config)#  
show users  
The show users Privileged EXEC mode command displays information  
about the active users.  
Syntax  
show users  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
430  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays information about the active users.  
Console# show users  
Username  
----------  
Bob  
Protocol  
-----------  
Serial  
SSH  
Location  
------------  
John  
172.16.0.1  
172.16.0.8  
172.16.1.7  
Robert  
Betty  
HTTP  
Telnet  
show sessions  
The show sessions Privileged EXEC mode command lists open Telnet  
sessions.  
Syntax  
show sessions  
Default Configuration  
There is no default configuration for this command.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example lists open Telnet sessions.  
Console# show sessions  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show system 431  
Connection  
----------  
Host  
Address  
Port  
Byte  
----  
----------- ----------  
--  
-----  
1
2
Remote  
device  
172.16.1.1  
23  
23  
89  
8
172.16.1.2  
172.16.1.2  
The following table describes significant fields shown above.  
Field  
Description  
Connection  
Host  
Connection number.  
Remote host to which the device is  
connected through a Telnet session.  
Address  
Port  
IP address of the remote host.  
Telnet TCP port number  
Byte  
Number of unread bytes for the user to  
see on the connection.  
show system  
The show system Privileged EXEC mode command displays system  
information.  
Syntax  
show system  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the system information.  
Console# show system  
System Description:  
Ethernet Switch  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
432  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
System Up Time  
01,12:00:02  
(days, hour:min:sec)  
System Contact:  
System Name:  
<contact name>  
<device name>  
System Location:  
System MAC Address:  
System Object ID:  
<location>  
00:11:22:33:44:55  
1.3.6.1.4.1.43.1.20.24  
Unit  
Temperature (Celsius)  
Status  
-----------  
1
-----------  
0
-----------  
UNAVAILABLE  
show version  
The show version Privileged EXEC mode command displays system  
version information.  
Syntax  
show version [unit unit]  
Parameters  
unit— Specifies the number of the unit. (Range: 1-8)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
service cpu-utilization 433  
Example  
The following example displays system version information (only for  
demonstration purposes).  
Console# show version  
Unit  
----  
1
SW version  
----------  
1.0.0.0  
Boot version  
------------  
2.178  
HW version  
----------  
1.0.0  
2
1.0.0.0  
2.178  
1.0.0  
service  
cpu-utilization  
The service cpu-utilization Global Configuration mode command  
enables measuring CPU utilization. To restore the default configuration,  
use the no form of this command.  
Syntax  
service cpu-utilization  
no service cpu-utilization  
Default Configuration  
Disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
Use the show cpu utilization Privileged EXEC command to view  
information on CPU utilization.  
Example  
This example enables measuring CPU utilization.  
Console(config)# service cpu-utilization  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
434  
CHAPTER 30: SYSTEM MANAGEMENT COMMANDS  
show cpu  
utilization  
The show cpu utilization Privileged EXEC mode command displays  
information about CPU utilization.  
Syntax  
show cpu utilization  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
Use the service cpu-utilization Global Configuration mode command to  
enable measuring CPU utilization.  
Example  
The following example configures the CPU utilization information display.  
Console# show cpu utilization  
CPU utilization service is on.  
CPU utilization  
--------------------------------------------------  
five seconds: 5%; one minute: 3%; five minutes: 3%  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
USER INTERFACE COMMANDS  
31  
enable  
The enable Privileged EXEC mode command enters the Privileged EXEC  
mode.  
Syntax  
enable [privilege-level]  
Parameters  
privilege-level — Privilege level to enter the system. (Range: 1-15)  
Default Configuration  
The default privilege level is 15.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters Privileged EXEC mode:  
Console> enable  
enter password:  
Console#  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
436  
CHAPTER 31: USER INTERFACE COMMANDS  
disable  
The disable Privileged EXEC mode command returns to the User EXEC  
mode.  
Syntax  
disable [privilege-level]  
Parameters  
privilege-level — Privilege level to enter the system. (Range: 1-15)  
Default Configuration  
The default privilege level is 1.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example return to Users EXEC mode.  
Console# disable  
Console>  
login  
The login User EXEC mode command changes a login username.  
Syntax  
login  
Default Configuration  
This command has no default configuration.  
Command Mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
configure 437  
User EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters Privileged EXEC mode and logs in with  
username admin.  
Console> login  
User Name:admin  
Password:*****  
Console#  
configure  
The configure Privileged EXEC mode command enters the Global  
Configuration mode.  
Syntax  
configure  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters Global Configuration mode.  
Console# configure  
Console(config)#  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
438  
CHAPTER 31: USER INTERFACE COMMANDS  
exit (Configuration) The exit command exits any configuration mode to the next highest  
mode in the CLI mode hierarchy.  
Syntax  
exit  
Default Configuration  
This command has no default configuration.  
Command Mode  
All configuration modes  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example changes the configuration mode from Interface  
Configuration mode to Privileged EXEC mode.  
Console(config-if)# exit  
Console(config)# exit  
Console#  
exit  
The exit Privileged/User EXEC mode command closes an active terminal  
session by logging off the device.  
Syntax  
exit  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged and User EXEC modes  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
end 439  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example closes an active terminal session.  
Console> ex1.7it  
end  
The end command ends the current configuration session and returns to  
the Privileged EXEC mode.  
Syntax  
end  
Default Configuration  
This command has no default configuration.  
Command Mode  
All configuration modes.  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example changes from Global Configuration mode to  
Privileged EXEC mode.  
Console(config)# end  
Console#  
help  
The help command displays a brief description of the help system.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
440  
CHAPTER 31: USER INTERFACE COMMANDS  
Syntax  
help  
Default Configuration  
This command has no default configuration.  
Command Mode  
All command modes  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example describes the help system.  
Console# help  
Help may be requested at any point in a command by entering a  
question mark '?'. If nothing matches the currently entered  
incomplete command, the help list is empty. This indicates that  
for a query at this point, there is no command matching the  
current input. If the request is within a command, enter backspace  
and erase the entered characters to a point where the request  
results in a display.  
Help is provided when:  
1. There is a valid command and a help request is made for  
entering a parameter or argument (e.g. 'show ?'). All possible  
parameters or arguments for the entered command are displayed.  
2. An abbreviated argument is entered and a help request is made  
for arguments matching the input (e.g. 'show pr?').  
terminal data-dump The terminal data-dump User EXEC mode command enables dumping  
all the output of a show command without prompting. To disable  
dumping, use the no form of this command.  
Syntax  
terminal data-dump  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
debug-mode 441  
no terminal data-dump  
Default Configuration  
Dumping is disabled.  
Command Mode  
User EXEC mode  
User Guidelines  
By default, a More prompt is displayed when the output contains more  
lines than can be displayed on the screen. Pressing the Enter key displays  
the next line; pressing the Spacebar displays the next screen of output.  
The data-dump command enables dumping all output immediately after  
entering the show command.  
This command is relevant only for the current session.  
Example  
This example dumps all output immediately after entering a show  
command.  
Console> terminal data-dump  
debug-mode  
The debug-mode Privileged EXEC Command mode switches to debug mode.  
Syntax  
debug-mode  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privilaged EXEC  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
442  
CHAPTER 31: USER INTERFACE COMMANDS  
User Guidelines  
There are no user guidelines for this command.  
show history  
The show history Privileged EXEC mode command lists the commands  
entered in the current session.  
Syntax  
show history  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
The buffer includes executed and unexecuted commands.  
Commands are listed from the first to the most recent command.  
The buffer remains unchanged when entering into and returning from  
configuration modes.  
Example  
The following example displays all the commands entered while in the  
current Privileged EXEC mode.  
Console# show version  
SW version 3.131 (date 23-Jul-2005 time 17:34:19)  
HW version 1.0.0  
Console# show clock  
15:29:03 Jun 17 2005  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
show privilege 443  
Console# show history  
show version  
show clock  
show history  
3 commands were logged (buffer size is 10)  
show privilege  
The show privilege Privileged/User EXEC mode command displays the  
current privilege level.  
Syntax  
show privilege  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged and User EXEC modes  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays the current privilege level for the  
Privileged EXEC mode.  
Console# show privilege  
Current privilege level is 15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
444  
CHAPTER 31: USER INTERFACE COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GVRP COMMANDS  
32  
gvrp enable  
(Global)  
GARP VLAN Registration Protocol (GVRP) is an industry-standard protocol  
designed to propagate VLAN information from device to device. With  
GVRP, a single device is manually configured with all desired VLANs for  
the network, and all other devices on the network learn these VLANs  
dynamically.  
The gvrp enable Global Configuration mode command enables GVRP  
globally. To disable GVRP on the device, use the no form of this  
command.  
Syntax  
gvrp enable  
no gvrp enable  
Default Configuration  
GVRP is globally disabled.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables GVRP globally on the device.  
Console(config)# gvrp enable  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
446  
CHAPTER 32: GVRP COMMANDS  
gvrp enable  
(Interface)  
The gvrp enable Interface Configuration (Ethernet, port-channel) mode  
command enables GVRP on an interface. To disable GVRP on an  
interface, use the no form of this command.  
Syntax  
gvrp enable  
no gvrp enable  
Default Configuration  
GVRP is disabled on all interfaces.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
An access port does not dynamically join a VLAN because it is always a  
member in only one VLAN.  
Membership in an untagged VLAN is propagated in the same way as in a  
tagged VLAN. That is, the PVID is manually defined as the untagged  
VLAN VID.  
Example  
The following example enables GVRP on Ethernet port g6.  
Console(config)# interface ethernet g  
6
Console(config-if)# gvrp enable  
garp timer  
The garp timer Interface Configuration (Ethernet, Port channel) mode  
command adjusts the values of the join, leave and leaveall timers of GARP  
applications. To restore the default configuration, use the no form of this  
command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
garp timer 447  
Syntax  
garp timer {join | leave | leaveall} timer_value  
no garp timer  
Parameters  
{join | leave | leaveall} — Indicates the type of timer.  
timer_value — Timer values in milliseconds in multiples of 10. (Range:  
10-2147483640)  
Default Configuration  
Following are the default timer values:  
Join timer — 200 milliseconds  
Leave timer — 600 milliseconds  
Leavall timer — 10000 milliseconds  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
The following relationship must be maintained between the timers:  
Leave time must be greater than or equal to three times the join time.  
Leave-all time must be greater than the leave time.  
Set the same GARP timer values on all Layer 2-connected devices. If the  
GARP timers are set differently on Layer 2-connected devices, the GARP  
application will not operate successfully.  
Example  
The following example sets the leave timer for Ethernet port g6 to 900  
milliseconds.  
Console(config)# interface ethernet g6  
Console(config-if)# garp timer leave 900  
Download from Www.Somanuals.com. All Manuals Search And Download.  
448  
CHAPTER 32: GVRP COMMANDS  
gvrp  
The gvrp vlan-creation-forbid Interface Configuration (Ethernet,  
vlan-creation-forbid port-channel) mode command disables dynamic VLAN creation or  
modification. To enable dynamic VLAN creation or modification, use the  
no form of this command.  
Syntax  
gvrp vlan-creation-forbid  
no gvrp vlan-creation-forbid  
Default Configuration  
Dynamic VLAN creation or modification is enabled.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
This command forbids dynamic VLAN creation from the interface. The  
creation or modification of dynamic VLAN registration entries as a result  
of the GVRP exchanges on an interface are restricted only to those VLANs  
for which static VLAN registration exists.  
Example  
The following example disables dynamic VLAN creation on Ethernet port  
1.  
Console(config)# interface eth7ernet  
1
Console(config-if)# gvrp vlan-creation-forbid  
gvrp  
The gvrp registration-forbid Interface Configuration (Ethernet,  
port-channel) mode command deregisters all dynamic VLANs on a port  
and prevents VLAN creation or registration on the port. To allow dynamic  
registration of VLANs on a port, use the no form of this command.  
registration-forbid  
Syntax  
gvrp registration-forbid  
no gvrp registration-forbid  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
clear gvrp statistics 449  
Default Configuration  
Dynamic registration of VLANs on the port is allowed.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example forbids dynamic registration of VLANs on Ethernet  
port g1.  
Console(config)# interface ethernet g  
1
Console(config-if)# gvrp registration-forbid  
clear gvrp statistics  
The clear gvrp statistics Privileged EXEC mode command clears all  
GVRP statistical information.  
Syntax  
clear gvrp statistics [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — A valid Ethernet port. (Full syntax: unit/port)  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
450  
CHAPTER 32: GVRP COMMANDS  
Example  
The following example clears all GVRP statistical information on Ethernet  
port g1.  
Console# clear gvrp statistics ethernet g1  
show gvrp  
configuration  
The show gvrp configuration Privieged EXEC mode command displays  
GVRP configuration information, including timer values, whether GVRP  
and dynamic VLAN creation is enabled, and which ports are running  
GVRP.  
Syntax  
show gvrp configuration [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — A valid Ethernet port. Elana  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privieged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays GVRP configuration information.  
Console# show gvrp configuration  
GVRP Feature is currently enabled on the device.  
Timers (milliseconds)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show gvrp statistics 451  
Port(s) Status  
Registr Dynamic Join  
Leave  
Leave  
All  
ation  
VLAN  
Creatio  
n
------  
------- ------- ------- ----  
-----  
-------  
--  
-----  
Enabled Normal  
Enabled Normal  
----  
g1  
g4  
Enabled 200  
Enabled 200  
600  
600  
10000  
10000  
show gvrp statistics The show gvrp statistics Privieged EXEC mode command displays GVRP  
statistics.  
Syntax  
show gvrp statistics [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — A valid Ethernet port. Elana  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privieged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example shows GVRP statistical information.  
Console# show gvrp configuration  
GVRP Feature is currently enabled on the device.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
452  
CHAPTER 32: GVRP COMMANDS  
Timers (milliseconds)  
Port(  
s)  
Statu  
s
Regis  
trati  
on  
Dynam  
ic  
VLAN  
Creat  
ion  
Join  
Leave  
Leave All  
-----  
-
-----  
--  
-----  
-----  
--  
-----  
-----  
-
----  
-----  
---------  
g1  
g4  
Enabl  
ed  
Norma  
l
Enabl  
ed  
200  
200  
600  
600  
10000  
10000  
Enabl  
ed  
Norma  
l
Enabl  
ed  
show gvrp  
error-statistics  
The show gvrp error-statistics Privieged EXEC mode command displays  
GVRP error statistics.  
Syntax  
show gvrp error-statistics [ethernet interface | port-channel  
port-channel-number]  
Parameters  
interface — A valid Ethernet port. Elana  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privieged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show gvrp error-statistics 453  
Example  
The following example displays GVRP statistical information.  
Console# show gvrp error-statistics  
GVRP Error Statistics:  
Legend:  
INVPROT :  
INVATYP :  
INVAVAL :  
Invalid  
Protocol Id  
INVALEN :  
INVEVENT:  
Invalid  
Attribute  
Length  
Invalid  
Attribute  
Type  
Invalid  
Event  
Invalid  
Attribute  
Value  
Port INVPROT INVATYP INVAVAL INVALEN INVEVENT  
Download from Www.Somanuals.com. All Manuals Search And Download.  
454  
CHAPTER 32: GVRP COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VLAN COMMANDS  
33  
vlan database  
The vlan database Global Configuration mode command enters the  
VLAN Configuration mode.  
Syntax  
vlan database  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enters the VLAN database mode.  
Console(config)# vlan database  
Console(config-vlan)#  
vlan  
Use the vlan VLAN Database mode command to create a VLAN. To  
delete a VLAN, use the no form of this command.  
Syntax  
vlan vlan-range  
no vlan vlan-range  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
456  
CHAPTER 33: VLAN COMMANDS  
Parameters  
vlan-range — Specifies a list of VLAN IDs to be added. Separate  
nonconsecutive VLAN IDs with a comma and no spaces; a hyphen  
designates a range of IDs. (Range: 2-4094)  
Default Configuration  
This command has no default configuration.  
Command Mode  
VLAN Database mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example VLAN number 1972 is created.  
Console(config)# vlan database  
Console(config-vlan)# vlan 1972  
interface vlan  
The interface vlan Global Configuration mode command enters the  
Interface Configuration (VLAN) mode.  
Syntax  
interface vlan vlan-id  
Parameters  
vlan-id — Specifies an existing VLAN ID.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
interface range vlan 457  
Example  
The following example configures VLAN 1 with IP address 131.108.1.27.  
Console(config)# interface vlan 1  
Console(config-if)# ip address 131.108.1.27  
interface range vlan The interface range vlan Global Configuration mode command enables  
simultaneously configuring multiple VLANs.  
Syntax  
interface range vlan {vlan-range | all}  
Parameters  
vlan-range — Specifies a list of VLAN IDs to be added. Separate  
nonconsecutive VLAN IDs with a comma and no spaces; a hyphen  
designates a range of IDs. (Range: 2-4094)  
all — All existing static VLANs.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Global Configuration mode  
User Guidelines  
Commands under the interface range context are executed  
independently on each interface in the range. If the command returns an  
error on one of the interfaces, an error message is displayed and  
execution of the command continues on the other interfaces.  
Configuring all ports may consume an excessive amount of time. Define  
only the required ports to save time.  
Example  
The following example groups VLANs 221, 228 and 889 to receive the  
same command.  
Console(config)# interface range vlan 221-228,889  
Console(config-if)#  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
458  
CHAPTER 33: VLAN COMMANDS  
name  
The name Interface Configuration mode command adds a name to a  
VLAN. To remove the VLAN name, use the no form of this command.  
Syntax  
name string  
no name  
Parameters  
string — Unique name to be associated with this VLAN.  
(Range: 1-32 characters)  
Default Configuration  
No name is defined.  
Command Mode  
Interface Configuration (VLAN) mode. Cannot be configured for a range  
of interfaces (range context).  
User Guidelines  
The name string may include numbers and other characters (#,@,% etc.)  
but no spaces.  
Example  
The following example gives VLAN number 19 the name Marketing.  
Console(config)# interface vlan 19  
Console(config-if)# name Marketing  
switchport access  
vlan  
The switchport access vlan Interface Configuration mode command  
configures the VLAN ID when the interface is in access mode. To restore  
the default configuration, use the no form of this command.  
Syntax  
switchport access vlan {vlan-id }  
no switchport access vlan  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
switchport trunk allowed vlan 459  
Parameters  
vlan-id — Specifies the ID of the VLAN to which the port is configured.  
Default Configuration  
All ports belong to VLAN 1.  
Command Mode  
Interface configuration (Ethernet, port-channel) mode  
User Guidelines  
The command automatically removes the port from the previous VLAN  
and adds it to the new VLAN.  
Example  
The following example configures a VLAN ID of 23 to the untagged layer  
2 VLAN Ethernet port 1.  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode access  
switchport trunk  
allowed vlan  
The switchport trunk allowed vlan Interface Configuration mode  
command adds or removes VLANs to or from a trunk port.  
Syntax  
switchport trunk allowed vlan {add vlan-list | remove vlan-list}  
Parameters  
add vlan-list — List of VLAN IDs to be added. Separate  
nonconsecutive VLAN IDs with a comma and no spaces. A hyphen  
designates a range of IDs.  
remove vlan-list — List of VLAN IDs to be removed. Separate  
nonconsecutive VLAN IDs with a comma and no spaces. A hyphen  
designates a range of IDs.  
Default Configuration  
This command has no default configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
460  
CHAPTER 33: VLAN COMMANDS  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example adds VLANs 1, 2, 5 to 6 to the allowed list of the 1  
Ethernet port 1.  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode trunk  
console(config-if)# switchport trunk allowed vlan add 1-2,5-6  
switchport trunk  
native vlan  
The switchport trunk native vlan Interface Configuration mode  
command defines the native VLAN when the interface is in trunk mode.  
To restore the default configuration, use the no form of this command.  
Syntax  
switchport trunk native vlan vlan-id  
no switchport trunk native vlan  
Parameters  
vlan-id— Specifies the ID of the native VLAN.  
Default Configuration  
VID=1.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
The command adds the port as a member in native VLAN. If the port is  
already in the VLAN (as allowed) it will automatically change the last entry  
to native.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
switchport general allowed vlan 461  
The command adds the port as a member in native VLAN 2. If the port is  
already configured as a native VLAN 3 it will automatically change the last  
entry (VLAN 2). Only one native VLAN can be configured to the port.  
Example  
The following example configures VLAN number 123 as the native VLAN  
when Ethernet port 1 is in trunk mode.  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode trunk  
Console(config-if)# switchport trunk native vlan 123  
switchport general  
allowed vlan  
The switchport general allowed vlan Interface Configuration mode  
command adds or removes VLANs from a general port.  
Syntax  
switchport general allowed vlan add vlan-list [tagged | untagged]  
switchport general allowed vlan remove vlan-list  
Parameters  
add vlan-list — Specifies the list of VLAN IDs to be added. Separate  
nonconsecutive VLAN IDs with a comma and no spaces. A hyphen  
designates a range of IDs.  
remove vlan-list — Specifies the list of VLAN IDs to be removed.  
Separate nonconsecutive VLAN IDs with a comma and no spaces. A  
hyphen designates a range of IDs.  
tagged — Indicates that the port transmits tagged packets for the  
VLANs.  
untagged — Indicates that the port transmits untagged packets for  
the VLANs.  
Default Configuration  
If the port is added to a VLAN without specifying tagged or untagged,  
the default setting is tagged.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
462  
CHAPTER 33: VLAN COMMANDS  
User Guidelines  
This command enables changing the egress rule (for example from  
tagged to untagged) without first removing the VLAN from the list.  
Example  
The following example adds VLANs 2, 5, and 6 to the allowed list of  
Ethernet port 1.  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode general  
Console(config-if)# switchport general allowed vlan add 2,5-6  
tagged  
switchport general  
pvid  
The switchport general pvid Interface Configuration mode command  
configures the PVID when the interface is in general mode. To restore the  
default configuration, use the no form of this command.  
Syntax  
switchport general pvid vlan-id  
no switchport general pvid  
Parameters  
vlan-id — Specifies the PVID (Port VLAN ID).  
Default Configuration  
If the default VLAN is enabled, PVID = 1. Otherwise, PVID=4095.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
switchport general ingress-filtering disable 463  
Example  
The following example configures the PVID for Ethernet port 1, when the  
interface is in general mode.  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode general  
Console(config-if)# switchport general pvid 234  
switchport general  
ingress-filtering  
disable  
The switchport general ingress-filtering disable Interface  
Configuration mode command disables port ingress filtering. To restore  
the default configuration, use the no form of this command.  
Syntax  
switchport general ingress-filtering disable  
no switchport general ingress-filtering disable  
Default Configuration  
Ingress filtering is enabled.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example disables port ingress filtering on Ethernet port 1  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode general  
Console(config-if)# switchport general ingress-filtering disable  
switchport general  
The switchport general acceptable-frame-type tagged-only  
acceptable-frame-ty Interface Configuration mode command discards untagged frames at  
pe tagged-only  
ingress. To restore the default configuration, use the no form of this  
command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
464  
CHAPTER 33: VLAN COMMANDS  
Syntax  
switchport general acceptable-frame-type tagged-only  
no switchport general acceptable-frame-type tagged-only  
Default Configuration  
All frame types are accepted at ingress.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures Ethernet port 1 to discard untagged  
frames at ingress.  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode general  
Console(config-if)# switchport general acceptable-frame-type  
tagged-only  
switchport  
forbidden vlan  
The switchport forbidden vlan Interface Configuration mode  
command forbids adding specific VLANs to a port. To restore the default  
configuration, use the remove parameter for this command.  
Syntax  
switchport forbidden vlan {add vlan-list | remove vlan-list}  
Parameters  
add vlan-list — Specifies the list of VLAN IDs to be added. Separate  
nonconsecutive VLAN IDs with a comma and no spaces. A hyphen  
designates a range of IDs.  
remove vlan-list — Specifies the list of VLAN IDs to be removed.  
Separate nonconsecutive VLAN IDs with a comma and no spaces. A  
hyphen designates a range of IDs.  
Default Configuration  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show vlan 465  
All VLANs are allowed.  
Command Mode  
Interface Configuration (Ethernet, port-channel) mode  
User Guidelines  
This command can be used to prevent GVRP from automatically making  
the specified VLANs active on the selected ports.  
Example  
The following example forbids adding VLAN IDs 234 to 256 to Ethernet  
port 1.  
Console(config)# interface ethernet 1  
Console(config-if)# switchport mode trunk  
Console(config-if)# switchport forbidden vlan add 234-256  
show vlan  
The show vlan Privileged EXEC mode command displays VLAN  
information.  
Syntax  
show vlan [id vlan-id | name vlan-name]  
Parameters  
vlan-id — specifies a VLAN ID  
vlan-name — Specifies a VLAN name string. (Range: 1-32 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
466  
CHAPTER 33: VLAN COMMANDS  
Example  
The following example displays all VLAN information.  
Console# show vlan  
VLAN  
----  
Name  
Ports  
Type  
----  
Authorizati  
on  
-------  
--------  
-----------  
--  
1
default  
1,2  
1
other  
Required  
Required  
Required  
Required  
Required  
Required  
Required  
10  
11  
20  
21  
30  
31  
91  
VLAN0010  
VLAN0011  
VLAN0020  
VLAN0021  
VLAN0030  
VLAN0031  
VLAN0011  
dynamic  
static  
static  
static  
static  
static  
static  
1
1
1
1
Not  
Required  
3978  
Guest VLAN  
guest  
-
show vlan internal  
usage  
The show vlan internal usage Privileged EXEC mode command displays  
a list of VLANs used internally by the device.  
Syntax  
show vlan internal usage  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show interfaces switchport 467  
Example  
The following example displays VLANs used internally by the device.  
Console# show vlan internal usage  
Usage  
-------- ----  
14 50  
VLAN  
Reserved  
--------  
Yes  
IP address  
----------  
Inactive  
show interfaces  
switchport  
The show interfaces switchport Privileged EXEC mode command  
displays the switchport configuration.  
Syntax  
show interfaces switchport {ethernet interface | port-channel  
port-channel-number}  
Parameters  
interface — A valid Ethernet port number.  
port-channel-number — A valid port-channel number.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
468  
CHAPTER 33: VLAN COMMANDS  
Example  
The following example displays the switchport configuration for Ethernet  
port.  
Console# show interfaces switchport ethernet g5  
Port: g5  
Port Mode: General  
Gvrp Status: enabled  
Ingress Filtering: true  
Acceptable Frame Type: admitAll  
Ingress UnTagged VLAN < NATIVE >: 1  
Port is member in:  
Vlan  
-------  
1
Name  
-------  
1
Engree rule  
-------  
Membership Type  
-------  
Untagged  
System  
Forbidden VLANS:  
Vlan  
Name  
-------  
-------  
Classification rules:  
Mac based VLANs  
Group ID  
-------  
Vlan ID  
-------  
Subnet based VLANs:  
Group ID  
-------  
Vlan ID  
-------  
Download from Www.Somanuals.com. All Manuals Search And Download.  
802.1X COMMANDS  
34  
aaa authentication  
dot1x  
The aaa authentication dot1x Global Configuration mode command  
specifies one or more authentication, authorization, and accounting  
(AAA) methods for use on interfaces running IEEE 802.1x. To restore the  
default configuration, use the no form of this command.  
Syntax  
aaa authentication dot1x default method1 [method2...]  
no aaa authentication dot1x default  
Parameters  
method1 [method2...] — Specify at least one method from the  
following list:  
Keyword  
RADIUS  
None  
Description  
Uses the list of all RADIUS servers for authentication  
Uses no authentication  
Default Configuration  
No authentication method is defined.  
Command Mode  
Global Configuration mode  
User Guidelines  
Additional methods of authentication are used only if the previous  
method returns an error and not if the request for authentication is  
denied. To ensure that authentication succeeds even if all methods return  
an error, specify none as the final method in the command line.  
The RADIUS server must support MD-5 challenge and EAP type frames.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
470  
CHAPTER 34: 802.1X COMMANDS  
Example  
The following example uses the aaa authentication dot1x default  
command with no authentication.  
Console# configure  
Console(config)# aaa authentication dot1x default none  
dot1x  
system-auth-contro  
l
The dot1x system-auth-control Global Configuration mode command  
enables 802.1x globally. To restore the default configuration, use the no  
form of this command.  
Syntax  
dot1x system-auth-control  
no dot1x system-auth-control  
Default Configuration  
802.1x is disabled globally.  
Command Modes  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables 802.1x globally.  
Console(config)# dot1x system-auth-control  
dot1x port-control  
The dot1x port-control Interface Configuration mode command  
enables manually controlling the authorization state of the port. To  
restore the default configuration, use the no form of this command.  
Syntax  
dot1x port-control {auto | force-authorized | force-unauthorized}  
no dot1x port-control  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
dot1x re-authentication 471  
Parameters  
auto — Enables 802.1x authentication on the interface and causes  
the port to transition to the authorized or unauthorized state based  
on the 802.1x authentication exchange between the port and the  
client.  
force-authorized — Disables 802.1x authentication on the interface  
and causes the port to transition to the authorized state without any  
authentication exchange required. The port resends and receives  
normal traffic without 802.1x-based authentication of the client.  
force-unauthorized — Denies all access through this interface by  
forcing the port to transition to the unauthorized state and ignoring  
all attempts by the client to authenticate. The device cannot provide  
authentication services to the client through the interface.  
Default Configuration  
Port is in the force-authorized state  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
It is recommended to disable spanning tree or to enable spanning-tree  
PortFast mode on 802.1x edge ports (ports in auto state that are  
connected to end stations), in order to get immediately to the forwarding  
state after successful authentication.  
Example  
The following example enables 802.1x authentication on Ethernet port  
16.  
Console(config)# interface ethernet 16  
Console(config-if)# dot1x port-control auto  
dot1x  
re-authentication  
The dot1x re-authentication Interface Configuration mode command  
enables periodic re-authentication of the client. To restore the default  
configuration, use the no form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
472  
CHAPTER 34: 802.1X COMMANDS  
Syntax  
dot1x re-authentication  
no dot1x re-authentication  
Default Configuration  
Periodic re-authentication is disabled.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example enables periodic re-authentication of the client.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x re-authentication  
dot1x timeout  
re-authperiod  
The dot1x timeout re-authperiod Interface Configuration mode  
command sets the number of seconds between re-authentication  
attempts. To restore the default configuration, use the no form of this  
command.  
Syntax  
dot1x timeout re-authperiod seconds  
no dot1x timeout re-authperiod  
Parameters  
seconds — Number of seconds between re-authentication attempts.  
(Range: 300-4294967295)  
Default Configuration  
Re-authentication period is 3600 seconds.  
Command Mode  
Interface Configuration (Ethernet) mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
dot1x re-authenticate 473  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example sets the number of seconds between  
re-authentication attempts, to 300.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x timeout re-authperiod 300  
dot1x  
re-authenticate  
The dot1x re-authenticate Privileged EXEC mode command manually  
initiates a re-authentication of all 802.1x-enabled ports or the specified  
802.1x-enabled port.  
Syntax  
dot1x re-authenticate [ethernet interface]  
Parameters  
interface — Valid Ethernet port. (Full syntax: unit/port)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following command manually initiates a re-authentication of  
802.1x-enabled Ethernet port g16.  
Console# dot1x re-authenticate ethernet g16  
dot1x timeout  
quiet-period  
The dot1x timeout quiet-period Interface Configuration mode  
command sets the number of seconds that the device remains in the  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
474  
CHAPTER 34: 802.1X COMMANDS  
quiet state following a failed authentication exchange (for example, the  
client provided an invalid password). To restore the default configuration,  
use the no form of this command.  
Syntax  
dot1x timeout quiet-period seconds  
no dot1x timeout quiet-period  
Parameters  
seconds — Specifies the time in seconds that the device remains in the  
quiet state following a failed authentication exchange with the client.  
(Range: 0-65535 seconds)  
Default Configuration  
Quiet period is 60 seconds.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
During the quiet period, the device does not accept or initiate  
authentication requests.  
The default value of this command should only be changed to adjust for  
unusual circumstances, such as unreliable links or specific behavioral  
problems with certain clients and authentication servers.  
To provide a faster response time to the user, a smaller number than the  
default value should be entered.  
Example  
The following example sets the number of seconds that the device  
remains in the quiet state following a failed authentication exchange to  
3600.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x timeout quiet-period 3600  
Download from Www.Somanuals.com. All Manuals Search And Download.  
dot1x timeout tx-period 475  
dot1x timeout  
tx-period  
The dot1x timeout tx-period Interface Configuration mode command  
sets the number of seconds that the device waits for a response to an  
Extensible Authentication Protocol (EAP)-request/identity frame from the  
client before resending the request. To restore the default configuration,  
use the no form of this command.  
Syntax  
dot1x timeout tx-period seconds  
no dot1x timeout tx-period  
Parameters  
seconds — Specifies the time in seconds that the device waits for a  
response to an EAP-request/identity frame from the client before  
resending the request. (Range: 1-65535 seconds)  
Default Configuration  
Timeout period is 30 seconds.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
The default value of this command should be changed only to adjust for  
unusual circumstances, such as unreliable links or specific behavioral  
problems with certain clients. and authentication servers  
Example  
The following command sets the number of seconds that the device waits  
for a response to an EAP-request/identity frame, to 3600 seconds.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x timeout tx-period 3600  
dot1x max-req  
The dot1x max-req Interface Configuration mode command sets the  
maximum number of times that the device sends an Extensible  
Authentication Protocol (EAP)-request/identity frame (assuming that no  
response is received) to the client, before restarting the authentication  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
476  
CHAPTER 34: 802.1X COMMANDS  
process. To restore the default configuration, use the no form of this  
command.  
Syntax  
dot1x max-req count  
no dot1x max-req  
Parameters  
count — Number of times that the device sends an  
EAP-request/identity frame before restarting the authentication  
process. (Range: 1-10)  
Default Configuration  
The default number of times is 2.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
The default value of this command should be changed only to adjust for  
unusual circumstances, such as unreliable links or specific behavioral  
problems with certain clients. and authentication servers  
Example  
The following example sets the number of times that the device sends an  
EAP-request/identity frame to 6.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x max-req  
6
dot1x timeout  
supp-timeout  
The dot1x timeout supp-timeout Interface Configuration mode  
command sets the time for the retransmission of an Extensible  
Authentication Protocol (EAP)-request frame to the client. To restore the  
default configuration, use the no form of this command.  
Syntax  
dot1x timeout supp-timeout seconds  
no dot1x timeout supp-timeout  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
dot1x timeout server-timeout 477  
Parameters  
seconds — Time in seconds that the device waits for a response to an  
EAP-request frame from the client before resending the request.  
(Range: 1-65535 seconds)  
Default Configuration  
Default timeout period is 30 seconds.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
The default value of this command should be changed only to adjust for  
unusual circumstances, such as unreliable links or specific behavioral  
problems with certain clients. and authentication servers  
Example  
The following example sets the timeout period before retransmitting an  
EAP-request frame to the client to 3600 seconds.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x timeout supp-timeout 3600  
dot1x timeout  
server-timeout  
The dot1x timeout server-timeout Interface Configuration mode  
command sets the time that the device waits for a response from the  
authentication server. To restore the default configuration, use the no  
form of this command.  
Syntax  
dot1x timeout server-timeout seconds  
no dot1x timeout server-timeout  
Parameters  
seconds — Time in seconds that the device waits for a response from  
the authentication server.  
(Range: 1-65535 seconds)  
Default Configuration  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
478  
CHAPTER 34: 802.1X COMMANDS  
The timeout period is 30 seconds.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
The actual timeout can be determined by comparing the dot1x timeout  
server-timeout value and the result of multiplying the radius-server  
retransmit value with the radius-server timeout value and selecting  
the lower of the two values.  
Example  
The following example sets the time for the retransmission of packets to  
the authentication server to 3600 seconds.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x timeout server-timeout 3600  
show dot1x  
The show dot1x Privileged EXEC mode command displays the 802.1x  
status of the device or specified interface.  
Syntax  
show dot1x [ethernet interface]  
Parameters  
interface — Valid Ethernet port. (Full syntax: unit/port)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show dot1x 479  
The following example displays the status of 802.1x-enabled Ethernet  
ports.  
Console# show dot1x  
802.1x is enabled  
Port  
----  
g1  
Admin  
Mode  
Oper  
Mode  
Reauth  
Control  
Reauth  
Period  
Username  
--------  
Bob  
--------  
--  
--------  
-
-------  
Ena  
------  
3600  
3600  
3600  
3600  
3600  
Auto  
Auto  
Auto  
Authoriz  
ed  
g2  
Authoriz  
ed  
Ena  
John  
g3  
Unauthor  
ized  
Ena  
Clark  
n/a  
g4  
Force-au  
th  
Authoriz  
ed  
Dis  
g5  
Force-au  
th  
Unauthor  
ized*  
Dis  
n/a  
* Port is down or not present.  
Console# show dot1x ethernet  
802.1x is enabled.  
3
Port  
----  
g3  
Admin  
Mode  
Oper  
Mode  
Reauth  
Control  
Reauth  
Period  
Username  
--------  
Clark  
--------  
--  
--------  
-
-------  
Ena  
------  
Auto  
Unauthor  
ized  
3600  
Download from Www.Somanuals.com. All Manuals Search And Download.  
480  
CHAPTER 34: 802.1X COMMANDS  
Quiet period: 60 Seconds  
Tx period:30 Seconds  
Max req: 2  
Supplicant timeout: 30 Seconds  
Server timeout: 30 Seconds  
Session Time (HH:MM:SS): 08:19:17  
MAC Address: 00:08:78:32:98:78  
Authentication Method: Remote  
Termination Cause: Supplicant logoff  
Authenticator State Machine  
State: HELD  
Backend State Machine  
State: IDLE  
Authentication success: 9  
Authentication fails: 1  
fThe following table describes the significant fields shown in the display.  
Field  
Description  
Port  
The port number.  
Admin mode  
The port admin mode. Possible values:  
Force-auth, Force-unauth, Auto.  
Oper mode  
The port oper mode. Possible values:  
Authorized, Unauthorized or Down.  
Reauth Control  
Reauth Period  
Username  
Reauthentication control.  
Reauthentication period.  
The username representing the identity  
of the Supplicant. This field shows the  
username in case the port control is  
auto. If the port is Authorized, it shows  
the username of the current user. If the  
port is unauthorized it shows the last  
user that was authenticated  
successfully.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show dot1x users 481  
Field  
Description  
Quiet period  
The number of seconds that the device  
remains in the quiet state following a  
failed authentication exchange (for  
example, the client provided an invalid  
password).  
Tx period  
Max req  
The number of seconds that the device  
waits for a response to an Extensible  
Authentication Protocol  
(EAP)-request/identity frame from the  
client before resending the request.  
The maximum number of times that  
the device sends an Extensible  
Authentication Protocol (EAP)-request  
frame (assuming that no response is  
received) to the client before restarting  
the authentication process.  
Supplicant timeout  
Server timeout  
Session Time  
Time in seconds the switch waits for a  
response to an EAP-request frame from  
the client before resending the request.  
Time in seconds the switch waits for a  
response from the authentication  
server before resending the request.  
The amount of time the user is logged  
in.  
MAC address  
The supplicant MAC address.  
Authentication Method  
The authentication method used to  
establish the session.  
Termination Cause  
State  
The reason for the session termination.  
The current value of the Authenticator  
PAE state machine and of the Backend  
state machine.  
Authentication success  
Authentication fails  
The number of times the state machine  
received a Success message from the  
Authentication Server.  
The number of times the state machine  
received a Failure message from the  
Authentication Server.  
show dot1x users  
The show dot1x users Privileged EXEC mode command displays active  
802.1x authenticated users for the device.  
Syntax  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
482  
CHAPTER 34: 802.1X COMMANDS  
show dot1x users [username username]  
Parameters  
username — Supplicant username (Range: 1-160 characters)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays 802.1x users.  
Console# show dot1x users  
Port  
-----  
g1  
Username  
--------  
Bob  
Session  
Time  
Auth Method  
MAC  
Address  
----------- ----------- -----------  
-
---  
1d:03:08.58 Remote  
0008:3b79:8  
787  
g2  
John  
08:19:17  
None  
0008:3b89:3  
127  
Console# show dot1x users username Bob  
Username: Bob  
Port  
-----  
g1  
Username  
--------  
Bob  
Session  
Time  
Auth Method  
MAC  
Address  
----------- ----------- -----------  
-
---  
1d:03:08.58 Remote  
0008:3b79:8  
787  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show dot1x statistics 483  
The following table describes the significant fields shown in the display.  
Field  
Description  
Port  
The port number.  
Username  
The username representing the identity  
of the Supplicant.  
Session Time  
The period of time the Supplicant is  
connected to the system.  
Authentication Method  
MAC Address  
Authentication method used by the  
Supplicant to open the session.  
MAC address of the Supplicant.  
show dot1x  
statistics  
The show dot1x statistics Privileged EXEC mode command displays  
802.1x statistics for the specified interface.  
Syntax  
show dot1x statistics ethernet interface  
Parameters  
interface — Valid Ethernet port.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays 802.1x statistics for the specified  
interface.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
484  
CHAPTER 34: 802.1X COMMANDS  
Console# show dot1x statistics ethernet 1  
EapolFramesRx: 11  
EapolFramesTx: 12  
EapolStartFramesRx: 12  
EapolLogoffFramesRx: 1  
EapolRespIdFramesRx: 3  
EapolRespFramesRx: 6  
EapolReqIdFramesTx: 3  
EapolReqFramesTx: 6  
InvalidEapolFramesRx: 0  
EapLengthErrorFramesRx: 0  
LastEapolFrameVersion: 1  
LastEapolFrameSource: 00:08:78:32:98:78  
The following table describes the significant fields shown in the display.  
Field  
Description  
EapolFramesRx  
The number of valid EAPOL frames of  
any type that have been received by  
this Authenticator.  
EapolFramesTx  
The number of EAPOL frames of any  
type that have been transmitted by this  
Authenticator.  
EapolStartFramesRx  
EapolLogoffFramesRx  
EapolRespIdFramesRx  
EapolRespFramesRx  
The number of EAPOL Start frames that  
have been received by this  
Authenticator.  
The number of EAPOL Logoff frames  
that have been received by this  
Authenticator.  
The number of EAP Resp/Id frames that  
have been received by this  
Authenticator.  
The number of valid EAP Response  
frames (other than Resp/Id frames) that  
have been received by this  
Authenticator.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
dot1x auth-not-req 485  
Field  
Description  
EapolReqIdFramesTx  
The number of EAP Req/Id frames that  
have been transmitted by this  
Authenticator.  
EapolReqFramesTx  
The number of EAP Request frames  
(other than Rq/Id frames) that have  
been transmitted by this Authenticator.  
InvalidEapolFramesRx  
The number of EAPOL frames that have  
been received by this Authenticator in  
which the frame type is not  
recognized.  
EapLengthErrorFramesRx  
The number of EAPOL frames that have  
been received by this Authenticator in  
which the Packet Body Length field is  
invalid.  
LastEapolFrameVersion  
LastEapolFrameSource  
The protocol version number carried in  
the most recently received EAPOL  
frame.  
The source MAC address carried in the  
most recently received EAPOL frame.  
dot1x auth-not-req  
The dot1x auth-not-req Interface Configuration (VLAN) mode  
command enables unauthorized devices access to the VLAN. To disable  
access to the VLAN, use the no form of this command.  
Syntax  
dot1x auth-not-req  
no dot1x auth-not-req  
Default Configuration  
Access is enabled.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
An access port cannot be a member in an unauthenticated VLAN.  
The native VLAN of a trunk port cannot be an unauthenticated VLAN.  
For a general port, the PVID can be an unauthenticated VLAN (although  
only tagged packets would be accepted in the unauthorized state.)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
486  
CHAPTER 34: 802.1X COMMANDS  
Example  
The following example enables access to the VLAN to unauthorized  
devices.  
Console(config)# interface vlan 5  
Console(config-if)# dot1x auth-not-req  
dot1x  
multiple-hosts  
The dot1x multiple-hosts Interface Configuration mode command  
enables multiple hosts (clients) on an 802.1x-authorized port, where the  
authorization state of the port is set to auto. To restore the default  
configuration, use the no form of this command.  
Syntax  
dot1x multiple-hosts  
no dot1x multiple-hosts  
Default Configuration  
Multiple hosts are disabled.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
This command enables the attachment of multiple clients to a single  
802.1x-enabled port. In this mode, only one of the attached hosts must  
be successfully authorized for all hosts to be granted network access. If  
the port becomes unauthorized, all attached clients are denied access to  
the network.  
For unauthenticated VLANs, multiple hosts are always enabled.  
Multiple-hosts must be enabled to enable port security on the port.  
Example  
The following command enables multiple hosts (clients) on an  
802.1x-authorized port.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x multiple-hosts  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
dot1x single-host-violation 487  
dot1x  
single-host-violatio  
n
The dot1x single-host-violation Interface Configuration mode  
command configures the action to be taken, when a station whose MAC  
address is not the supplicant MAC address, attempts to access the  
interface. Use the no form of this command to restore defaults.  
Syntax  
dot1x single-host-violation {forward | discard | discard-shutdown}  
[trap seconds]  
no port dot1x single-host-violation  
Parameters  
forward — Forwards frames with source addresses that are not the  
supplicant address, but does not learn the source addresses.  
discard — Discards frames with source addresses that are not the  
supplicant address.  
discard-shutdown — Discards frames with source addresses that are  
not the supplicant address. The port is also shut down.  
trap — Indicates that SNMP traps are sent.  
seconds — Specifies the minimum amount of time in seconds  
between consecutive traps.  
(Range: 1- 1000000)  
Default Configuration  
Frames with source addresses that are not the supplicant address are  
discarded.  
No traps are sent.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
The command is relevant when multiple hosts is disabled and the user  
has been successfully authenticated.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
488  
CHAPTER 34: 802.1X COMMANDS  
Example  
The following example forwards frames with source addresses that are  
not the supplicant address and sends consecutive traps at intervals of 100  
seconds.  
Console(config)# interface ethernet g16  
Console(config-if)# dot1x single-host-violation forward trap  
100  
dot1x guest-vlan  
The dot1x guest-vlan Interface Configuration (VLAN) mode command  
defines a guest VLAN. To restore the default configuration, use the no  
form of this command.  
Syntax  
dot1x guest-vlan  
no dot1x guest-vlan  
Default Configuration  
No VLAN is defined as a guest VLAN.  
Command Mode  
Interface Configuration (VLAN) mode  
User Guidelines  
Use the dot1x guest-vlan enable Interface Configuration mode  
command to enable unauthorized users on an interface to access the  
guest VLAN.  
If the guest VLAN is defined and enabled, the port automatically joins the  
guest VLAN when the port is unauthorized and leaves it when the port  
becomes authorized. To be able to join or leave the guest VLAN, the port  
should not be a static member of the guest VLAN.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
dot1x guest-vlan enable 489  
Example  
The following example defines VLAN 2 as a guest VLAN.  
Console#  
Console# configure  
Console(config)# vlan database  
Console(config-vlan)# vlan  
Console(config-vlan)# exit  
2
Console(config)# interface vlan  
2
Console(config-if)# dot1x guest-vlan  
dot1x guest-vlan  
enable  
The dot1x vlans guest-vlan enable Interface Configuration mode  
command enables unauthorized users on the interface access to the  
Guest VLAN. To disable access, use the no form of this command  
Syntax  
dot1x guest-vlan enable  
no dot1x guest-vlan enable  
Default Configuration  
Disabled.  
Command Mode  
Interface Configuration (Ethernet) mode  
User Guidelines  
A device can have only one global guest VLAN. The guest VLAN is defined  
using the dot1x guest-vlan Interface Configuration mode command.  
Example  
The following example enables unauthorized users on Ethernet port 1 to  
access the guest VLAN.  
Console# configure  
Console(config)# interface ethernet g1  
Console(config-if)# dot1x guest-vlan enable  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
490  
CHAPTER 34: 802.1X COMMANDS  
show dot1x  
advanced  
The show dot1x advanced Privileged EXEC mode command displays  
802.1x advanced features for the device or specified interface.  
Syntax  
show dot1x advanced [ethernet interface]  
Parameters  
interface — Valid Ethernet port. (Full syntax: unit/port)  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays 802.1x advanced features for the device.  
Console# show dot1x advanced  
Guest VLAN: 2  
Unauthenticated VLANs: 91,92  
Interface  
---------  
g1  
Multiple Hosts  
--------------  
Disabled  
Guest VLAN  
----------  
Enabled  
g2  
Enabled  
Disabled  
Console# show dot1x advanced ethernet  
Guest VLAN: 2  
1
Unauthenticated VLANs: 91,92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show dot1x advanced 491  
Interface  
---------  
g1  
Multiple Hosts  
--------------  
Disabled  
Guest VLAN  
----------  
Enabled  
Single host parameters  
Violation action: Discard  
Trap: Enabled  
Trap frequency: 100  
Status: Single-host locked  
Violations since last trap: 9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
492  
CHAPTER 34: 802.1X COMMANDS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WIRELESS AP RADIO COMMANDS  
35  
interface radio  
The interface radio AP Configuration mode command places the device  
in Radio Configuration mode.  
Syntax  
interface radio {802.11a | 802.11g}  
Parameters  
802.11a — In accordance with 802.11a protocol.  
802.11g — In accordance with 802.11g protocol.  
Default Configuration  
This command has no default configuration.  
Command Mode  
AP Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example places the device in the Radio Configuration  
mode, complying with the 802.11a protocol.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-ap-radio-if)#  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
494  
CHAPTER 35: WIRELESS AP RADIO COMMANDS  
enable (ap radio)  
The enable AP Interface Radio Configuration mode command  
administratively enables the radio. To administratively disable the radio,  
use the no form of this command.  
Syntax  
enable  
no enable  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
Enable.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
Use the wlan tx-power off Global Configuration command to globally  
enable/disable TX power. TX power is enabled on specific AP only if TX  
power is enabled globally and for the AP.  
Example  
The following example administratively enables the radio.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# enable  
channel  
The channel AP Interface Radio Configuration mode command  
configure the RF channel. To restore the default configuration, use the no  
form of this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
channel 495  
Syntax  
channel {number | frequency | least-congested}  
no channel  
Parameters  
number — Specifies a channel number. The ranges are as follows:  
802.11g — 1 – 14.  
802.11a — 34, 36, 38, 40, 42, 44, 46, 48, 52, 56, 60, 64, 149, 153, 157,  
161.  
frequency — Specifies the center frequency for the radio channel. The  
ranges are as follows:  
802.11g — 2412, 2417, 2422, 2427, 2432, 2437, 2442, 2447, 2452,  
2457, 2462, 2467, 2472, 2484.  
802.11a — 5170, 5180, 5190, 5200, 5210, 5220, 5230, 5240, 5260,  
5280, 5300, 5320, 5745, 5765, 5785, 5805.  
least-congested — Enables or disables the scanning for a least busy  
radio channel.  
Default Configuration  
Least congested channel.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
The valid frequencies depend on the country code that was set by the  
wlan country-code Global Configuration command.  
Example  
The following example configures the RF channel to a 802.11g frequency  
of 2437  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# channel 802.11g 2437  
Download from Www.Somanuals.com. All Manuals Search And Download.  
496  
CHAPTER 35: WIRELESS AP RADIO COMMANDS  
power  
The power AP Interface Radio Configuration mode command configures  
the power level. To restore the default configuration, use the no form of  
this command.  
Syntax  
power {max | half | quarter | eighth | min}  
no power  
Parameters  
max — Maximum power.  
half — Half of the maximum power.  
quarter — Quarter of the maximum power.  
eighth — Eighth of the maximum power.  
min — Minimum power.  
Default Configuration  
Maximum power.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
The maximum power depends on the country code that was set by  
the wlan country-code Global Configuration command.  
The power is off if the wlan tx-power off Global Configuration  
command was activated.  
Example  
The following example configures the power level to half the maximum  
power.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# power half  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
allow traffic 497  
allow traffic  
The allow traffic AP Interface Radio Configuration mode command  
allows users traffic. To disallow users traffic, use the no form of this  
command.  
Syntax  
allow traffic  
no allow traffic  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
Users traffic is allowed.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example allows user traffic.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# allow traffic  
preamble  
The preamble AP Interface Radio Configuration mode command  
configures the preamble support for 802.11g transceivers. To restore  
default, use the no form of this command.  
Syntax  
preamble {long | short}  
no preamble  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
498  
CHAPTER 35: WIRELESS AP RADIO COMMANDS  
Parameters  
long — The AP supports long and short preambles.  
short — The AP supports short preambles.  
Command Mode  
AP Interface Radio configuration mode  
User Guidelines  
This command is only relevant for 802.11g transceivers.  
Example  
The following example configures the preamble support for 802.11g  
transceivers to long.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# preamble long  
rts threshold  
The rts threshold AP Interface Radio Configuration mode command  
configures the Request-To-Send (RTS) threshold. To restore defaults, use  
the no form of this command.  
Syntax  
rts threshold number  
no rts threshold  
Parameters  
number — Specifies the packet size, in bytes, above which the access  
point negotiates an RTS/CTS before sending out the packet. (Range:  
0-2347)  
Default Configuration  
The default RTS threshold is 2312 bytes.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
antenna 499  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the RTS threshold to 2300 bytes.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# rts threshold 2300  
antenna  
The antenna AP Interface Radio Configuration mode command  
configures an antenna for the transceiver. To restore defaults, use the no  
form of this command.  
Syntax  
antenna {diversity | 1 | 2}  
no antenna  
Parameters  
diversity — Specifies the antenna with the best signal.  
1 — Specifies antenna number 1.  
2 — Specifies antenna number 2.  
Default Configuration  
Diversity  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
500  
CHAPTER 35: WIRELESS AP RADIO COMMANDS  
Example  
The following example configures antenna 1 for the transceiver.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# antenna  
1
beacon period  
The beacon period AP Interface Radio Configuration mode command  
configures the beacon period. To restore defaults, use the no form of this  
command.  
Syntax  
beacon period milliseconds  
no beacon period  
Parameters  
milliseconds — Specifies the beacon time in milliseconds. (Range: 50 -  
300)  
Default Configuration  
The default beacon period is 100 milliseconds.  
Command Mode  
AP Interface Radio Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the beacon period to 300 milliseconds.  
Console (Config-wlan-ap)# interface radio 802.11g  
Console (Config-wlan-ap-radio)# beacon period 300  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
WIRELESS WLAN COMMANDS  
36  
wlan tx-power off  
The wlan tx-power off Global Configuration mode command turns off  
all APs transmitters. To enable transmit Power, use the no form of this  
command.  
Syntax  
wlan tx-power off  
no wlan tx-power off  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
Auto  
Command Mode  
Global Configuration mode  
User Guidelines  
Use the enable AP interface radio configuration command to  
enable/disable TX power of specific AP.  
TX power is enabled on a specific AP only if TX power is enabled globally  
and for the AP.  
Example  
The following example turns off all AP transmitters.  
Console (config)# wlan tx-power off  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
502  
CHAPTER 36: WIRELESS WLAN COMMANDS  
wlan country-code  
The wlan country-code Global Configuration mode command  
configures the country code in which the device is located and the  
physical location of AP connected to the device. To restore defaults, use  
the no form of this command.  
Syntax  
wlan country-code code  
no wlan country-code  
Parameters  
code — Specify the ISO country-code. See the user guidelines for a list  
of country codes.  
Default Configuration  
Product specific.  
Command Mode  
Global Configuration mode  
User Guidelines  
The following table lists the supported country codes.  
Country  
Albania  
Algeria  
Code  
AL  
Country  
Code  
GL  
Country  
Pakistan  
Panama  
Code  
PK  
Greenland  
DZ  
Gaudelou  
pe  
GP  
PA  
Andorra  
Argentina  
Armenia  
AD  
AR  
Guatemala GT  
Paraguay  
Peru  
PY  
PE  
PH  
Guyana  
GY  
VA  
AM  
Holy See  
(Vatican  
City)  
Philippines  
Australia  
AU  
Hong  
Kong  
HK  
Poland  
PL  
Austria  
AT  
AZ  
Hungary  
Iceland  
HU  
IS  
Portugal  
PT  
PR  
Azerbaijan  
Puerto  
Rico  
Bahamas  
Bahrain  
BS  
India  
IN  
ID  
Qatar  
QA  
RO  
BH  
Indonesia  
Romania  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
wlan country-code 503  
Country  
Code  
Country  
Code  
Country  
Code  
Belarus  
BY  
Iran  
IR  
Russian  
Federation  
RU  
Belgium  
Belize  
BE  
BZ  
BO  
Ireland  
Israel  
Italy  
IE  
IL  
IT  
San  
Marino  
SM  
SA  
CS  
Saudi  
Arabia  
Bolivia  
Serbia and  
Monteneg  
ro  
Bosniaand BA  
Herzogovi  
na  
Japan  
JP  
Singapore  
SG  
Brazil  
BR  
Jordan  
JO  
KZ  
Slovakia  
Slovenia  
SK  
SI  
Brunei  
Darussala  
m
BN  
Kazakhsta  
n
Bulgaria  
BG  
CA  
North  
Korea  
KP  
KR  
South  
Africa  
ZA  
ES  
Canada  
South  
Korea  
Spain  
Chile  
CL  
Kuwait  
Latvia  
KW  
LV  
Sri Lanka  
Sweden  
LK  
SE  
China  
CN  
CO  
Colombia  
Lebanon  
LB  
Switzerlan  
d
CH  
Costa Rica  
Croatia  
CR  
HR  
Liechtenst  
ein  
LI  
Syria  
SY  
Lithuania  
LT  
Taiwan,  
Provinceof  
China  
TW  
Cyprus  
CY  
CZ  
DK  
Luxembou  
rg  
LU  
Thailand  
TH  
TR  
Czech  
Republic  
Macau  
MO  
MK  
MY  
Turkey  
Denmark  
Macedoni  
a
Ukraine  
UA  
AE  
Dominican DO  
Republic  
Malaysia  
United  
Arab  
Emirates  
Ecuador  
EC  
Martinique MQ  
United  
Kingdom  
GB  
Download from Www.Somanuals.com. All Manuals Search And Download.  
504  
CHAPTER 36: WIRELESS WLAN COMMANDS  
Country  
Code  
Country  
Code  
Country  
Code  
Egypt  
EG  
Mexico  
MX  
United  
States  
US  
Estonia  
EE  
Moldova,  
Republic  
of  
MD  
Uruguay  
UY  
Finland  
France  
FI  
Monaco  
Morocco  
MC  
MA  
NL  
Uzbekistan UZ  
FR  
GE  
Venezuela  
Vietnam  
VE  
Georgia  
Netherlan  
ds  
VN  
Germany  
DE  
New  
Zealand  
NZ  
Virgin  
Islands  
(U.S.)  
VI  
Gibralter  
Greece  
GI  
Norway  
Oman  
NO  
GR  
OM  
Example  
The following example configures the country code in which the device is  
located, as the US.  
Console (config)# wlan country-code us  
wlan tx-power auto  
enable  
The wlan tx-power auto enable Global Configuration mode command  
enables Auto Transmit Power. To disable Auto Transmit Power, use the no  
form of this command.  
Syntax  
wlan tx-power auto enable  
no wlan tx-power auto enable  
Parameters  
This command has no keywords or arguments.  
Default Configuration  
Disabled.  
Command Mode  
Global Configuration mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
wlan tx-power auto interval 505  
User Guidelines  
The Auto Transmit Power algorithm adjusts the transmit power of APs, so  
the signal strength heard at the second-closest access point is as close as  
possible to the target signal-strength configured by the wlan tx-power  
auto signal-strength Global Configuration command.  
Example  
The following example enables Auto Transmit Power.  
Console (config)# wlan tx-power auto enable  
wlan tx-power auto  
interval  
The wlan tx-power auto interval Global Configuration mode  
command configures the recalculation Auto Transmit Power period. To  
restore defaults, use the no form of this command.  
Syntax  
wlan tx-power auto interval minutes  
no wlan tx-power auto interval  
Parameters  
minutes — Specifies the recalculation period, in minutes. (Range:  
1–15000 minutes)  
Default Configuration  
The default recalculation period is 10 minutes.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the recalculation Auto Transmit Power  
period to 1200 minutes.  
Console (config)# wlan tx-power auto interval 1200  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
506  
CHAPTER 36: WIRELESS WLAN COMMANDS  
wlan tx-power auto  
signal-strength  
The wlan tx-power auto signal-strength Global Configuration mode  
command configures the target signal strength heard at the  
second-closest AP. To restore defaults, use the no form of this command.  
Syntax  
wlan tx-power auto signal-strength dbm  
no wlan tx-power auto signal-strength  
Parameters  
dbm — Specifies the signal strength, in dBm. (Range: -40 dBm – -80  
dBm)  
Default Configuration  
The default target signal strength is -68 dBm.  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the target signal strength heard at the  
second-closest AP to -50 dBm.  
Console (config)# wlan tx-power auto signal-strength -50  
wlan tx-power auto  
signal-loss  
The wlan tx-power auto signal-loss Global Configuration mode  
command configures the minimum signal loss difference  
(transmitted-received) below which two AP radios are considered too  
close. To restore defaults, use the no form of this command.  
Syntax  
wlan tx-power auto signal-loss db  
no wlan tx-power auto signal-loss  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
wlan station idle-timeout 507  
Parameters  
db — Specifies the signal loss, in dB. (Range: 20-80 dB)  
Default Configuration  
The default minimum signal loss difference is 60 dB.  
Command Mode  
Global Configuration mode  
User Guidelines  
The Auto Transmit Power algorithm adjusts AP power due to another AP  
which is very close, because it is impossible to avoid interference in that  
case and the APs will have essentially the same coverage zone. The  
minimum signal loss is the signal strength difference (transmitted -  
received) below which two radios are considered too close.  
Example  
The following example configures the minimum signal loss difference to  
30 dB.  
Console (config)# wlan tx-power auto signal-loss 30  
wlan station  
idle-timeout  
The wlan station idle-timeout Global Configuration mode command  
configures the length of time before an idle station is removed from the  
system and required to login. To restore defaults, use the no form of this  
command.  
Syntax  
wlan station idle-timeout minutes  
no wlan station idle-timeout  
Parameters  
minutes — Specifies the IDLE timeout in minutes. (Range: 3-1440)  
Default Configuration  
The default timeout is 30 minutes.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
508  
CHAPTER 36: WIRELESS WLAN COMMANDS  
Command Mode  
Global Configuration mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example configures the length of time before an idle  
station is removed from the system and required to login, to 10 minutes.  
Console (config)# wlan station idle-timeout 10  
clear wlan station  
The clear wlan station Privileged EXEC mode command disassociates a  
station.  
Syntax  
clear wlan station mac-address  
Parameters  
mac-address — The station MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example disassociates a station with the MAC address  
00-9E-92-4C-73-FC.  
Console# clear wlan station 00-9E-92-4C-73-FC  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan 509  
show wlan  
The show wlan Privileged EXEC mode displays information on the  
WLAN configuration.  
Syntax  
show wlan  
Parameters  
This command has no arguments or keywords.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
510  
CHAPTER 36: WIRELESS WLAN COMMANDS  
Example  
The following example specifies the WLAN information for user called  
‘Device’.  
console# show wlan aps Device  
NAME: Device  
MAC Address: 00:f0:00:00:06:25  
Type: a, g  
State: Active  
802.11a Radio: Enabled  
802.11g Radio: Enabled  
VLANs Allowed: 2, 3, 4, 5, 66, 77, 88, 99, 221, 224, 226, 666,  
1000  
Native VLAN: 1  
Tunnel Source State: Enabled  
Tunnel Priority: 39  
IP Address: 1.1.1.11  
DNS Name:  
WAN Timing Constraints: Enabled  
Console Logging: Enabled  
console#  
show wlan  
auto-tx-power  
The show wlan auto-tx-power Privileged EXEC mode command  
displays information on the WLAN automatic power transmission  
configuration.  
Syntax  
show wlan auto-tx-power  
Parameters  
This command has no arguments or keywords.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan logging configuration 511  
User Guidelines  
There are no user guidelines for this command.  
Example  
The following example displays information on the WLAN automatic  
power transmission configuration.  
Console # show wlan auto-tx-power  
Automatic Transmit Power is enabled  
Interval: 10 minutes  
Signal Strength: -68 dBm  
Signal Loss: 60 dB  
show wlan logging  
configuration  
The show wlan logging configuration Privileged EXEC mode  
command displays information on the WLAN logging configuration.  
Syntax  
show wlan logging configuration  
Parameters  
This command has no arguments or keywords.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
512  
CHAPTER 36: WIRELESS WLAN COMMANDS  
Example  
The following example displays information on the WLAN logging  
configuration.  
Console # show wlan logging configuration  
Station authorized: Disabled  
Station unauthorized: Disabled  
Station deletion: Disabled  
Station roaming: Enabled  
show wlan stations  
The show wlan stations Privileged EXEC mode command displays  
information on WLAN stations.  
Syntax  
show wlan stations [mac mac-address | ap name]  
Parameters  
mac mac-address — The stations MAC address.  
ap name — The AP name (Range: 1 - 32 characters).  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
show wlan stations counters 513  
Example  
The following example displays information on WLANs.  
Console# show wlan stations  
MAC Address  
----------  
State  
SSID  
AP  
Session Time  
---------  
------  
-------  
------  
00-9E-93-82-83-91 Authorized Enterprise AP1(g)  
00-9E-93-82-83-92 Authorized Enterprise AP2(g)  
1d 03:08:58  
08:19:17  
show wlan stations  
counters  
The show wlan stations counters Privileged EXEC mode command  
displays information on WLAN stations traffic.  
Syntax  
show wlan stations counters [mac mac-address]  
Parameters  
mac mac-address — The stations MAC address.  
Default Configuration  
This command has no default configuration.  
Command Mode  
Privileged EXEC mode  
User Guidelines  
There are no user guidelines for this command.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
514  
CHAPTER 36: WIRELESS WLAN COMMANDS  
Example  
The following example displays information on WLAN stations.  
Console# show wlan stations counters  
Number of stations: 2  
MAC Address  
----------  
InPkts  
------  
OutPkts  
-------  
1289  
MIC Errors  
---------  
00-9E-93-82-83-91 183892  
00-9E-93-82-83-92 128977  
0
0
5327  
console# show wlan stations counters mac 00:0e:35:63:5c:a7  
MAC Address  
InPkts  
OutPkts  
-------  
8
MIC Errors  
---------  
0
----------------- ------  
00:0e:35:63:5c:a7 13264  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
37  
This section describes problems that may arise when installing the device  
and how to resolve these issues. This section includes the following  
topics:  
Problem Management — Provides information about problem  
management with the devices.  
Troubleshooting Solutions — Provides a list of troubleshooting  
issues and solutions for using the devices.  
Problem  
Management  
Problem management includes isolating and quantifying problems, and  
applying solutions.  
When a problem is detected, the exact nature of the problem must be  
determined. Problem analysis includes how the problem is detected, and  
what are its possible causes. With the problem known, the effects of the  
problem are recorded, including all known results of the problem. Once  
the problem is quantified, theappropriate solution can be applied.  
Solutions to common troubleshooting issues are found either in this  
document, or can be obtained through Customer Support.  
If no solution is found in this document, please contact Customer  
Support for advice and instructions.  
Troubleshooting  
Solutions  
Listed below are possible troubleshooting problems and their solutions.  
These error messages include:  
Cannot connect to management using RS-232 serial connection  
Cannot connect to switch management using Telnet, HTTP, SNMP, etc.  
Self-test exceeds 15 seconds.  
No connection is established and the port LED is on.  
Device is in a reboot loop  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
516  
CHAPTER 37: TROUBLESHOOTING  
No connection and the port LED is off  
Add and Edit pages do not open.  
Lost password  
Problem  
Possible Cause  
Solution  
Cannot connect to  
management using  
RS-232 serial connection  
Ensure the terminal  
emulator program is set  
to  
VT-100 compatible,  
9600 baud rate, no  
parity, 8 data bits and  
one stop bit.  
Use the included cable,  
or ensure that the  
pin-out complies with a  
standard null-modem  
cable.  
Cannot connect to  
switch management  
using Telnet, HTTP,  
SNMP, etc.  
Ensure that the switch  
has a valid IP address,  
subnet mask and a  
configured default  
gateway.  
Check that your cable is  
properly connected with  
a valid link light, and that  
the port has not been  
disabled.  
Ensure that your  
management station is  
plugged into the  
appropriate VLAN to  
manage the device.  
If you cannot connect  
using Telnet or the web,  
the maximum number of  
connections may already  
be open. Please try again  
at a later time.  
No response from the  
terminal emulation  
software  
Faulty serial cable  
Replace the serial cable.  
Incorrect serial cable  
Replace the serial cable  
for a pin-to-pin  
straight/flat cable.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Troubleshooting Solutions 517  
Problem  
Possible Cause  
Solution  
Software settings  
Reconfigure the  
emulation software  
connection settings.  
Response from the  
terminal emulations  
software is not readable.  
Faulty serial cable  
Software settings  
Replace the serial cable.  
Reconfigure the  
emulation software  
connection settings.  
Self-test exceeds 15  
seconds.  
The device may not be  
correctly installed.  
Remove and reinstall the  
device. If that does not  
help, consult your  
technical support  
representative.  
No connection is  
established and the port  
LED is on.  
Wrong network address  
in the workstation.  
Configure the network  
address in the  
workstation.  
No network address set.  
Configure the network  
address in the  
workstation.  
Wrong or missing  
protocol.  
Configure the  
workstation with IP  
protocol.  
Faulty ethernet cable.  
Faulty port.  
Replace the cable.  
Replace the module.  
Replace the module.  
Faulty module.  
Incorrect initial  
configuration.  
Erase the connection and  
reconfigure the port.  
Device is in a reboot loop Software fault  
Download and install  
another working or  
previous software  
version from the console  
Download from Www.Somanuals.com. All Manuals Search And Download.  
518  
CHAPTER 37: TROUBLESHOOTING  
Problem  
Possible Cause  
Solution  
No connection and the  
port LED is off  
Incorrect ethernet cable,  
e.g., crossed rather than  
straight cable, or vice  
versa, split pair (incorrect  
twisting of pairs).  
Check pinout and  
replace if necessary.  
Fiber optical cable  
connection is reversed.  
Change if necessary.  
Check Rx and Tx on the  
fiber-optic cable.  
Bad cable.  
Replace with a tested  
cable.  
Wrong cable type.  
Verify that all 10 Mbps  
connections use a Cat 5  
cable.  
Check the port LED or  
zoom screen in the NMS  
application, and change  
settings if necessary.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Troubleshooting Solutions 519  
Problem  
Possible Cause  
Solution  
Add and Edit pages do  
not open.  
A pop-up blocker is  
enabled.  
Disable pop-up blockers.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
520  
CHAPTER 37: TROUBLESHOOTING  
Problem  
Lost password  
Possible Cause  
Solution  
The Password Recovery  
Procedure enables the  
user to override the  
current password  
configuration, and  
disables the need for a  
password to access the  
console.  
The password recovery is  
effective until the device  
is reset. If the  
password/user name has  
been forgotten or lost,  
the password must be  
reconfigured using either  
the CLI commands or via  
the Embedded Web  
Interface.  
The Password Recovery  
Procedure is invoked  
from the Startup menu:  
Reboot the system either  
by disconnecting the  
power supply, or enter  
the command: the  
following message is  
displayed:  
Console #reload  
Are you sure you  
want to reboot the  
system (y/n)[n]?  
Enter Y. The device  
reboots. After the POST,  
when the text  
Autoboot in 2  
seconds - press  
RETURN or Esc. to  
abort and enter  
prom.” is displayed,  
press <Enter>.  
The Startup Menu is  
displayed.  
[1] Download software  
[2] Erase flash file  
[3] Erase flash sectors  
[4] Password Recovery  
Procedure  
[5] Enter Diagnostic  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Mode  
Troubleshooting Solutions 521  
Download from Www.Somanuals.com. All Manuals Search And Download.  
522  
CHAPTER 37: TROUBLESHOOTING  
Download from Www.Somanuals.com. All Manuals Search And Download.  

3Com Switch LANplex 2500 User Manual
Abocom Network Router PL1000 User Manual
AEG Power Supply PROTECT A User Manual
Agilent Technologies Power Supply 16048A User Manual
Aiwa CRT Television AV 14F703 User Manual
Alvin Picnic Table Drafting Table User Manual
Amerec Stove PKLE 181 User Manual
Avital Automobile Alarm G5103 User Manual
Axor Plumbing Product Bridge User Manual
Behringer Stereo Equalizer DEQ1024 User Manual