HP Hewlett Packard Switch 445942 001 User Manual

HP 10Gb Ethernet BL-c Switch  
ISCLI Reference Guide  
Part number: 445942-001  
Third Edition: June 2007  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Contents  
Contents  
ISCLI reference  
ISCLI basics  
Information Commands  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Contents  
Statistics Commands  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Configuration Commands  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Operations Commands  
Boot Options  
Maintenance Commands  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
ISCLI reference  
Introduction  
The HP 10Gb Ethernet BL-c Switch is ready to perform basic switching functions right out of the box. Some  
of the more advanced features, however, require some administrative configuration before they can be  
used effectively. This guide provides a command reference for the HP 10GbE switch.  
The extensive switching software included in the switch provides a variety of options for accessing and  
configuring the switch:  
Text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or remote  
Telnet/Secure Shell (SSH) session  
Simple Network Management Protocol (SNMP) support for access through network management  
software such as HP Systems Insight Manager  
A browser-based management interface for interactive network access through a Web browser  
The ISCLI provides a direct method for collecting switch information and performing switch configuration.  
Use a basic terminal to view information and statistics about the switch, and to perform any necessary  
configuration.  
This chapter explains how to access the ISCLI to the switch.  
Additional references  
Additional information about installing and configuring the switch is available in the following guides,  
HP 10Gb Ethernet BL-c Switch User Guide  
HP 10Gb Ethernet BL-c Switch Command Reference  
HP 10Gb Ethernet BL-c Switch Application Guide  
HP 10Gb Ethernet BL-c Switch Browser-based Interface Reference  
HP 10Gb Ethernet BL-c Switch Quick Setup Instructions  
Connecting to the switch  
You can access the command line interface in one of the following ways:  
Using a console connection via the console port  
Using a Telnet connection over the network  
Using a Secure Shell (SSH) connection to securely log in over a network  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
ISCLI reference  
Establishing a console connection  
To establish a console connection with the switch, you need:  
A null modem cable with a female DB-9 connector (See the HP 10Gb Ethernet BL-c Switch User  
Guide for more information.)  
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in  
the table below.  
Table 1 Console configuration parameters  
Parameter  
Baud Rate  
Data Bits  
Value  
9600  
8
Parity  
None  
1
Stop Bits  
Flow Control  
None  
To establish a console connection with the switch:  
1. Connect the terminal to the console port using the null modem cable.  
2. Power on the terminal.  
3. Press the Enter key a few times on the terminal to establish the connection.  
4. You will be required to enter a password for access to the switch.  
Setting an IP address  
To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP) address  
set for the switch. The switch can get its IP address in one of the following ways:  
Management port access:  
Using a Dynamic Host Control Protocol (DHCP) server—When the /cfg/sys/dhcpcommand  
is enabled, the management interface (interface 250) requests its IP address from a DHCP  
server. The default value for the /cfg/sys/dhcpcommand is enabled.  
Configuring manually—If the network does not support DHCP, you must configure the  
management interface (interface 250) with an IP address. If you want to access the switch from a  
remote network, you also must configure the management gateway (gateway 254).  
Uplink port access:  
Using a Bootstrap Protocol (BOOTP) server—By default, the management interface is set up to  
request its IP address from a BOOTP server. If you have a BOOTP server on the network, add the  
Media Access Control (MAC) address of the switch to the BOOTP configuration file located on  
the BOOTP server. The MAC address can be found in the System Information (See the “System  
information” section in the “Information Commands” chapter.) If you are using a DHCP server  
that also does BOOTP, you do not have to configure the MAC address.  
Configuring manually—If the network does not support BOOTP, you must configure the  
management port with an IP address.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
ISCLI reference  
Establishing a Telnet connection  
A Telnet connection offers the convenience of accessing the HP 10GbE switch from any workstation  
connected to the network. Telnet provides the same options for user, operator, and administrator access  
as those available through the console port. By default, Telnet is enabled on the switch. The switch  
supports four concurrent Telnet connections.  
Once the IP parameters are configured, you can access the ISCLI using a Telnet connection. To establish a  
Telnet connection with the switch, run the Telnet program on the workstation and enter the telnet  
command, followed by the switch IP address:  
telnet <10GbE switch IP address>  
You will then be prompted to enter a password. The password determines the access level: administrator,  
operator, or user. See the “Accessing the switch” section later in this chapter for description of default  
passwords.  
Establishing an SSH connection  
Although a remote network administrator can manage the configuration of a switch via Telnet, this  
method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to securely  
log into the switch over the network.  
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over  
the network is encrypted and secure. In order to use SSH, you must first configure it on the switch. See the  
“Secure Shell Server configuration” section in the “Configuration Commands” chapter for information on  
how to configure SSH.  
The switch can perform only one session of key/cipher generation at a time. Therefore, an SSH/Secure  
Copy (SCP) client will not be able to log in if the switch is performing key generation at that time or if  
another client has just logged in before this client. Similarly, the system will fail to perform the key  
generation if an SSH/SCP client is logging in at that time.  
The supported SSH encryption and authentication methods are listed below.  
Server Host Authentication—Client RSA authenticates the switch in the beginning of every connection  
Key Exchange—RSA  
Encryption:  
AES256-CBC  
AES192-CBC  
AES128-CBC  
3DES-CBC  
3DES  
ARCFOUR  
User Authentication—Local password authentication; Remote Authentication Dial-in User Service  
(RADIUS)  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
ISCLI reference  
The following SSH clients are supported:  
SSH 3.0.1 for Linux (freeware)  
SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)  
OpenSSH_3.9 for Linux (FC 3)  
FedoraCore 3 for SCP commands  
PuTTY Release 0.58 (Simon Tatham) for Windows  
NOTE: The HP 10GbE switch implementation of SSH is based on versions 1.5 and 2.0, and  
supports SSH clients from version 1.0 through version 2.0. SSH clients of other versions are not  
supported. You may configure the client software to use protocol SSH version 1 or version 2.  
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can  
access the ISCLI to enable SSH.  
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the  
sshcommand, followed by the user account name and the switch IP address:  
>> # ssh <user>@<10GbE switch IP address>  
You will then be prompted to enter your password.  
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the  
prompt, enter yesto continue.  
Accessing the switch  
To enable better switch management and user accountability, the HP 10GbE switch provides different  
levels or classes of user access. Levels of access to the CLI and Web management functions and screens  
increase as needed to perform various switch management tasks. The three levels of access are:  
User—Interaction with the switch is completely passive—nothing can be changed on the switch.  
Users may display information that has no security or privacy implications, such as switch statistics  
and current operational state information.  
Operator—Interaction with the switch is completely passive—nothing can be changed on the switch.  
Users may display information that has no security or privacy implications, such as switch statistics  
and current operational state information.  
Administrator—Administrators are the only ones that may make permanent changes to the switch  
configuration—changes that are persistent across a reload/reset of the switch. Administrators can  
access switch functions to configure and troubleshoot problems on the switch. Because administrators  
can also make temporary (operator-level) changes as well, they must be aware of the interactions  
between temporary and permanent changes.  
Access to switch functions is controlled through the use of unique usernames and passwords. Once you  
are connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password.  
The password entered determines the access level. The default user names/password for each access  
level is listed in the following table.  
NOTE: It is recommended that you change default switch passwords after initial configuration and  
as regularly as required under your network security policies. For more information, see the “Setting  
passwords” section in the “First-time configuration” chapter.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
ISCLI reference  
Table 2 User access levels  
User account Description and tasks performed  
User  
The User has no direct responsibility for switch management. He or she can view all switch  
status information and statistics, but cannot make any configuration changes to the switch.  
The user account is enabled by default, and the default password is user.  
Oper  
Admin  
The Operator has no direct responsibility for switch management. He or she can view all switch  
status information and statistics, but cannot make any configuration changes to the switch.  
By default, the operator account is disabled and has no password.  
The super user administrator has complete access to all command modes on the switch,  
including the ability to change both the user and administrator passwords.  
The admin account is enabled by default, and the default password is admin.  
NOTE: With the exception of the adminuser, access to each user level can be disabled by setting  
the password to an empty value.  
Once you enter the administrator password and it is verified, you are given complete access to the  
HP 10GbE switch.  
Idle timeout  
By default, the HP 10GbE switch disconnects the console, Telnet, or SSH session after five minutes of  
inactivity. This function is controlled by the idle timeout parameter, which can be set from 1 to 60 minutes.  
To change this parameter, see the “System configuration” section in the “Configuration Commands”  
chapter.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
ISCLI reference  
Typographical conventions  
The following table describes the typographic styles used in this guide:  
Table 3 Typographical conventions  
Typeface or symbol  
Meaning  
Indicate a variable to enter based on the description inside the brackets. Do not type  
the brackets as you enter the command.  
angle brackets < >  
Example: If the command syntax is  
ping <IP address>  
Enter: ping 192.32.10.12  
bold body text  
Indicates user-interface objects, such as buttons and tabs.  
plain Courier text  
Indicates command syntax and system output (for example: prompts and system  
messages). Example:  
configure terminal  
Indicate required elements in syntax descriptions where there is more than one  
option. You must choose only one of the options. Do not type the braces when  
entering the command.  
braces { }  
Example: If the command syntax is:  
show portchannel {<1-12>|hash|information}  
Enter one of the following:  
show portchannel <1-12>  
show portchannel hash  
show portchannel information  
Indicate optional elements in syntax descriptions. Do not type the brackets when  
entering the command.  
brackets [ ]  
Example: If the command syntax is:  
show ip interface [<1-250>]  
Enter one of the following:  
show ip interface  
show ip interface 1  
italic text  
Indicates variables in command syntax descriptions. Also indicates new terms and  
book titles.  
Example: If the command syntax is:  
show spanning-tree stp <1-128>  
Then, <1-128> represents a number between 1 and 128.  
Separates choices for command keywords and arguments. Enter only one of the  
choices. Do not type the vertical line when entering the command.  
vertical line |  
Example: If the command syntax is:  
show portchannel {<1-12>|hash|information}  
Enter one of the following:  
show portchannel <1-12>  
show portchannel hash  
show portchannel information  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
ISCLI basics  
Introduction  
The ISCLI is used for viewing switch information and statistics. In addition, the administrator can use the  
CLI for performing all levels of switch configuration.  
This chapter describes the ISCLI Command Modes, and provides a list of commands and shortcuts that  
typically are from all the command modes within the ISCLI.  
Accessing the ISCLI  
The first time you start the HP 10GbE switch, it boots into the AOS CLI. To access the ISCLI, enter the  
following command and reset the switch:  
Main# boot/mode iscli  
To access the AOS CLI, enter the following command from the ISCLI and reload the switch:  
Switch(config)# boot cli-mode aos  
The switch retains your CLI selection, even when you reset the configuration to factory defaults. The CLI  
boot mode is not part of the configuration settings.  
ISCLI Command Modes  
The ISCLI has three major command modes, listed in order of increasing privileges, as follows:  
User EXEC mode: This is the initial mode of access. By default, password checking is disabled for this  
mode.  
Privileged EXEC mode: The mode is accessed from User EXEC mode. If the Privileged EXEC password is  
enabled, you must enter a password to access Privileged EXEC mode.  
Global Configuration mode: This mode allows you to make changes to the running configuration of the  
switch. If you save the configuration, the settings survive a reload of the HP 10GbE switch. Several  
submodes are available within the Global Configuration mode (the following table for more information.  
Each command mode provides a specific set of commands. The command set of each higher-privilege  
mode is a superset of the lower-privilege mode(s). All commands available in lower-lower-privilege modes  
are available in the higher-privilege modes.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
ISCLI basics  
The following table describes the ISCLI command modes.  
Table 4 ISCLI Command Modes  
Command Mode/Prompt Command used to enter or exit.  
User EXEC  
Switch>  
Default mode, entered automatically  
exit—Exit  
logout—Exit  
Privileged EXEC  
Switch#  
enable—Enter Privileged EXEC mode, from User EXEC mode  
disable—Exit to User EXEC mode  
exitor logout—Quit ISCLI  
Global configuration  
Switch(config)#  
configure terminal—Enter Global Configuration mode, from  
Privileged EXEC mode  
endor exit—Exit to Privileged EXEC mode  
Interface port  
Switch(config-if)#  
interface port <port number>—Enter Interface port mode, from  
Global Configuration mode  
exit—Exit to Global Configuration mode  
end—Exit to Privileged EXEC mode  
VLAN configuration  
Switch(config-vlan)#  
vlan <1-4095>—Enter VLAN Configuration mode, from Global  
Configuration mode  
exit—Exit to Global Configuration mode  
end—Exit to Privileged EXEC mode  
Interface IP configuration  
Switch(config-ip-if)#  
interface ip <1-250>—Enter Interface IP Configuration mode, from  
Global Configuration mode  
exit—Exit to Global Configuration mode  
end—Exit to Privileged EXEC mode  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ISCLI basics  
Global commands  
Some basic commands are recognized throughout the ISCLI hierarchy. These commands are useful for  
obtaining online Help, navigating through the interface, and saving configuration changes. To get help  
about a specific command, type the command, followed by help.  
The following table describes the global commands.  
Table 5 Global commands  
Command  
Action  
?
Provides more information about a specific command or lists commands available at  
the current level.  
exit  
Go up one level in the command-mode structure.  
copy running-config  
startup-config  
Write configuration changes to non-volatile flash memory.  
exit or quit  
ping  
Exit from the command line interface and log out.  
Verifies station-to-station connectivity across the network. The format is:  
ping <host name>|<IP address> [attempts (1-32)> [msec delay]]  
[-m|-mgt|-d|-data]  
IP address is the hostname or IP address of the device.  
number of tries (optional) is the number of attempts (1-32).  
msec delay (optional) is the number of milliseconds between attempts.  
By default, the -m or -mgt option for the management port is used. To use data  
ports, specify the -d or –dataoption.  
traceroute  
Identifies the route used for station-to-station connectivity across the network. The format  
is:  
traceroute <host name>|<IP address> [<max-hops> [ msec delay ]]  
IP address is the hostname or IP address of the target station.  
max-hops (optional) is the maximum distance to trace (1-32 devices).  
msec delay (optional) is the number of milliseconds to wait for the response.  
telnet  
Allows you to Telnet out of the switch. The format is as follows:  
telnet <host name> | <IP address> [<port number>]  
show history  
console-log  
who  
Displays the 10 most recent commands.  
Enables or disables console logs for the current session.  
Displays a list of users who are currently logged in.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
ISCLI basics  
Command line interface shortcuts  
The following shortcuts allow you to enter commands quickly and easily.  
Command abbreviation  
Most commands can be abbreviated by entering the first characters that distinguish the command from  
the others in the same mode. For example, consider the following full command:  
Switch(config)# spanning-tree stp 1 bridge hello 2  
The command shown above could also be entered as:  
Switch(config)# sp stp 1 br h 2  
Tab completion  
Enter the first letter of a command at any prompt and press the Tab key to display all available  
commands or options that begin with that letter. Enter additional letters to further refine the list of  
commands or options displayed.  
If only one command fits the input text when you press the Tab key, that command is supplied on the  
command line, waiting to be entered.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Information Commands  
Introduction  
You can view configuration information for the switch in the ISCLI. This chapter discusses how to use the  
ISCLI to display switch information.  
The following table describes general information commands.  
Table 6 Information commands  
Command  
Usage  
show sys-info  
Displays system information.  
Command mode: All  
show layer2 information  
show layer3 information  
show rmon  
Displays Layer 2 information.  
Command mode: All  
Displays Layer 3 information.  
Command mode: All  
Displays Remote Monitoring Information.  
Command mode: All  
show interface link  
Displays configuration information about each port, including:  
Port number  
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)  
Duplex mode (half, full, or any)  
Flow control for transmit and receive (no, yes, or any)  
Link status (up or down)  
Command mode: All except User EXEC  
show interface information  
Displays port status information, including:  
Port number  
Whether the port uses VLAN tagging or not  
Port VLAN ID (PVID)  
Port name  
VLAN membership  
Command mode: All except User EXEC  
show geaport  
show sfp  
Displays GEA port mapping information, used by service personnel.  
Command mode: All  
Displays the status of the Small Form Pluggable (SFP) module on each Fiber  
External Port.  
Command mode: All  
show ufd  
Displays Uplink Failure Detection information.  
Command mode: All  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Table 6 Information commands  
Command  
Usage  
show information-dump  
Dumps all switch information available (10K or more, depending on your  
configuration).  
If you want to capture dump data to a file, set your communication software  
on your workstation to capture session data prior to issuing the dump  
commands.  
Command mode: All  
System Information commands  
The following table describes the System Information commands.  
Table 7 System Information commands  
Command  
Usage  
show snmp-server v3  
Displays SNMP v3 information.  
Command mode: All  
show sys-info  
Displays system information, including:  
System date and time  
Switch model name and number  
Switch name and location  
Time of last boot  
MAC address of the switch management processor  
IP address of IP interface #1  
Hardware version and part number  
Software image file and version number  
Configuration name  
Log-in banner, if one is configured  
Command mode: All  
show logging messages  
show access user  
Displays most recent syslog messages.  
Command mode: All  
Displays User Access information.  
Command mode: All except User EXEC  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
SNMPv3 Information commands  
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework  
by supporting the following:  
a new SNMP message format  
security for messages  
access control  
remote configuration of SNMP parameters  
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276.  
The following table describes the SNMPv3 Information commands.  
Table 8 SNMPv3 Information commands  
Command  
Usage  
show snmp-server v3 user  
Displays User Security Model (USM) table information.  
Command mode: All  
show snmp-server v3 view  
Displays information about view name, subtrees, mask and  
type of view.  
Command mode: All  
show snmp-server v3 access  
show snmp-server v3 group  
Displays View-based Access Control information.  
Command mode: All  
Displays information about the group that includes the security  
model, user name, and group name.  
Command mode: All  
show snmp-server v3 community  
show snmp-server v3 target-address  
show snmp-server v3 target-parameters  
show snmp-server v3 notify  
Displays information about the community table.  
Command mode: All  
Displays the Target Address table.  
Command mode: All  
Displays the Target parameters table.  
Command mode: All  
Displays the Notify table.  
Command mode: All  
show snmp-server v3  
Displays all the SNMPv3 information.  
Command mode: All  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
SNMPv3 USM User Table information  
The following command displays SNMPv3 user information:  
show snmp-server v3 user  
Command mode: All  
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and  
privacy of messages. This security model makes use of a defined set of user identities displayed in the  
USM user table. The USM user table contains information like:  
the user name  
a security name in the form of a string whose format is independent of the Security Model  
an authentication protocol, which is an indication that the messages sent on behalf of the user can  
be authenticated  
the privacy protocol.  
The following table describes the SNMPv3 User Table information.  
Table 9 User Table parameters  
Field  
Description  
User Name  
This is a string that represents the name of the user that you can use to access the switch.  
Protocol  
This indicates whether messages sent on behalf of this user are protected from disclosure  
using a privacy protocol. Switch software supports DES algorithm for privacy. The  
software also supports two authentication algorithms: MD5 and HMAC-SHA.  
SNMPv3 View Table information  
The following command displays the SNMPv3 View Table:  
show snmp-server v3 view  
Command mode: All  
View Name  
Subtree  
Mask  
Type  
------------------ ---------------------------- ------------- --------  
iso  
1
included  
included  
excluded  
excluded  
excluded  
v1v2only  
v1v2only  
v1v2only  
v1v2only  
1
1.3.6.1.6.3.15  
1.3.6.1.6.3.16  
1.3.6.1.6.3.18  
The user can control and restrict the access allowed to a group to only a subset of the management  
information in the management domain that the group can access within each context by specifying the  
group’s rights in terms of a particular MIB view for security reasons.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Information Commands  
The following table describes the SNMPv3 View Table information.  
Table 10 View Table parameters  
Field  
Description  
View Name  
Displays the name of the view.  
Subtree  
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object  
instances which have a common Object Identifier prefix to their names.  
Mask  
Type  
Displays the bit mask.  
Displays whether a family of view subtrees is included or excluded from the MIB view.  
SNMPv3 Access Table information  
The following command displays SNMPv3 access information:  
show snmp-server v3 access  
Command mode: All  
Group Name Model Level  
ReadV  
WriteV NotifyV  
---------- ------- ------------ --------- -------- -------  
v1v2grp  
snmpv1 noAuthNoPriv iso  
usm authPriv iso  
iso  
iso  
v1v2only  
iso  
admingrp  
The access control sub system provides authorization services.  
The vacmAccessTablemaps a group name, security information, a context, and a message type,  
which could be the read or write type of operation or notification into a MIB view.  
The View-based Access Control Model defines a set of services that an application can use for checking  
access rights of a group. This group’s access rights are determined by a read-view, a write-view, and a  
notify-view. The read-view represents the set of object instances authorized for the group while reading  
the objects. The write-view represents the set of object instances authorized for the group when writing  
objects. The notify-view represents the set of object instances authorized for the group when sending a  
notification.  
The following table describes the SNMPv3 Access Table information.  
Table 11 Access Table parameters  
Field  
Description  
Group Name  
Prefix  
Model  
Displays the name of group.  
Displays the prefix that is configured to match the values.  
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.  
Level  
Displays the minimum level of security required to gain rights of access. For example,  
noAuthNoPriv, authNoPriv,or auth-Priv.  
ReadV  
Displays the MIB view to which this entry authorizes the read access.  
Displays the MIB view to which this entry authorizes the write access.  
Displays the Notify view to which this entry authorizes the notify access.  
WriteV  
NotifyV  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
SNMPv3 Group Table information  
The following command displays SNMPv3 group information:  
show snmp-server v3 group  
Command mode: All  
Sec Model User Name  
Group Name  
---------- ----------------------------- -------------------------------  
snmpv1  
usm  
v1v2only  
adminmd5  
adminsha  
v1v2grp  
admingrp  
admingrp  
usm  
A group is a combination of security model and security name that defines the access rights assigned to  
all the security names belonging to that group. The group is identified by a group name.  
The following table describes the SNMPv3 Group Table information.  
Table 12 Group Table parameters  
Field  
Description  
Sec Model  
User Name  
Group Name  
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.  
Displays the name for the group.  
Displays the access name of the group.  
SNMPv3 Community Table information  
The following command displays SNMPv3 community information:  
show snmp-server v3 community  
Command mode: All  
Index  
---------- ---------- -------------------- ----------  
trap1 public v1v2only v1v2trap  
Name  
User Name  
Tag  
This command displays the community table information stored in the SNMP engine.  
The following table describes the SNMPv3 Community Table information.  
Table 13 Community Table information  
Field  
Description  
Index  
Displays the unique index value of a row in this table.  
Displays the community string, which represents the configuration.  
Displays the User Security Model (USM) user name.  
Name  
User Name  
Tag  
Displays the community tag. This tag specifies a set of transport endpoints from which a  
command responder application accepts management requests and to which a command  
responder application sends an SNMP trap.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Information Commands  
SNMPv3 Target Address Table information  
The following command displays SNMPv3 target address information:  
show snmp-server v3 target-address  
Command mode: All  
Name  
---------- --------------- ---- ---------- ---------------  
trap1 47.81.25.66 162 v1v2trap v1v2param  
Transport Addr Port Taglist  
Params  
This command displays the SNMPv3 target address table information, which is stored in the SNMP  
engine.  
The following table describes the SNMPv3 Target Address Table information.  
Table 14 Target Address Table information  
Field  
Description  
Name  
Displays the locally arbitrary, but unique identifier associated with this  
snmpTargetAddrEntry.  
Transport Addr  
Port  
Displays the transport addresses.  
Displays the SNMP UDP port number.  
Taglist  
This column contains a list of tag values which are used to select target addresses for  
a particular SNMP message.  
Params  
The value of this object identifies an entry in the snmpTargetParamsTable. The  
identified entry contains SNMP parameters to be used when generating messages to  
be sent to this transport address.  
SNMPv3 Target Parameters Table information  
The following command displays SNMPv3 target parameters information:  
show snmp-server v3 target-parameters  
Command mode: All  
Name  
------------------- -------- -------------------- --------- -----------  
v1v2param snmpv2c v1v2only snmpv1 noAuthNoPriv  
MP Model User Name  
Sec Model Sec Level  
The following table describes the SNMPv3 Target Parameters Table information.  
Table 15 Target Parameters Table information  
Field  
Description  
Name  
Displays the locally arbitrary, but unique identifier associated with this  
snmpTargeParamsEntry.  
MP Model  
Displays the Message Processing Model used when generating SNMP messages using this entry.  
User Name  
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be  
generated using this entry.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Information Commands  
Table 15 Target Parameters Table information  
Field  
Description  
Sec Model  
Displays the security model used when generating SNMP messages using this entry. The system  
may choose to return an inconsistentValueerror if an attempt is made to set this variable to  
a value for a security model which the system does not support.  
Sec Level  
Displays the level of security used when generating SNMP messages using this entry.  
SNMPv3 Notify Table information  
The following command displays the SNMPv3 Notify Table:  
show snmp-server v3 notify  
Command mode: All  
Name  
-------------------- --------------------  
v1v2trap v1v2trap  
Tag  
The following table describes the SNMPv3 Notify Table information.  
Table 16 SNMPv3 Notify Table information  
Field  
Name  
Tag  
Description  
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.  
This represents a single tag value which is used to select entries in the snmpTargetAddrTable.  
Any entry in the snmpTargetAddrTable that contains a tag value equal to the value of this  
entry is selected. If this entry contains a value of zero length, no entries are selected.  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
SNMPv3 dump  
The following command displays SNMPv3 information:  
show snmp-server v3  
Command mode: All  
Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00  
usmUser Table:  
User Name  
Protocol  
-------------------------------- --------------------------------  
admin  
NO AUTH, NO PRIVACY  
HMAC_MD5, DES PRIVACY  
HMAC_SHA, DES PRIVACY  
NO AUTH, NO PRIVACY  
adminmd5  
adminsha  
v1v2only  
vacmAccess Table:  
Group Name Prefix Model Level  
Match ReadV WriteV NotifyV  
---------- ------ ------- ------------ ------ ------- -------- ------  
admin  
usm  
snmpv1 noAuthNoPriv exact org  
usm authPriv exact org  
noAuthNoPriv exact org  
org  
org  
org  
org  
v1v2grp  
admingrp  
v1v2only  
org  
vacmViewTreeFamily Table:  
View Name Subtree  
-------------------- --------------- ------------ --------------  
Mask  
Type  
org  
1.3  
included  
included  
excluded  
excluded  
excluded  
v1v2only  
v1v2only  
v1v2only  
v1v2only  
1.3  
1.3.6.1.6.3.15  
1.3.6.1.6.3.16  
1.3.6.1.6.3.18  
vacmSecurityToGroup Table:  
Sec Model User Name  
Group Name  
---------- ------------------------------- -----------------------  
snmpv1  
usm  
v1v2only  
admin  
v1v2grp  
admin  
usm  
adminsha  
admingrp  
snmpCommunity Table:  
Index Name  
User Name  
Tag  
---------- ---------- -------------------- ----------  
snmpNotify Table:  
Name  
Tag  
-------------------- --------------------  
snmpTargetAddr Table:  
Name  
Transport Addr Port Taglist Params  
---------- --------------- ---- ---------- ---------------  
snmpTargetParams Table:  
Name  
MP Model User Name  
Sec Model Sec Level  
-------------------- -------- ------------------ --------- -------  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
System information  
The following command displays system information:  
show sys-info  
Command mode: All  
System Information at 6:56:22 Thu Jan 11, 2007  
Time zone: America/US/Pacific  
HP 10 Gb Ethernet Blade Switch  
sysName:  
sysLocation:  
RackId: Default RUID  
RackName: Default Rack Name  
EnclosureSerialNumber: -none-  
EnclosureName: Default Chassis Name  
BayNumber: 1  
Switch has been up for 3 days, 14 hours, 56 minutes and 22 seconds.  
Last boot: 17:25:38 Mon Jan 8, 2007 (software reset)  
MAC address: 00:10:00:01:00:01  
Revision:  
IP (If 1) address: 10.14.4.16  
Switch Serial No:  
Hardware Part No:  
Spare Part No:  
Software Version 1.0.0 (FLASH image2), active configuration.  
System information includes:  
System date and time  
Switch model name and number  
HP c-Class Rack name and location  
Time of last boot  
MAC address of the switch management processor  
IP address of the switch  
Software image file and version number  
Current configuration block (active, backup, or factory default)  
Login banner, if one is configured  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Show recent syslog messages  
The following command displays system log messages:  
show logging messages  
Command mode: All  
Date Time  
Severity level  
-----------------  
NOTICE  
Message  
---- ----  
-------  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:41  
Jul 8 17:25:42  
Jul 8 17:25:42  
Jul 8 17:25:42  
Jul 8 17:25:42  
Jul 8 17:25:42  
Jul 8 17:25:42  
system: link up on port 1  
system: link up on port 8  
system: link up on port 7  
system: link up on port 12  
system: link up on port 11  
system: link up on port 14  
system: link up on port 13  
system: link up on port 16  
system: link up on port 15  
system: link up on port 17  
system: link up on port 20  
system: link up on port 18  
system: link up on port 19  
system: link up on port 21  
system: link up on port 4  
system: link up on port 3  
system: link up on port 6  
system: link up on port 5  
system: link up on port 10  
system: link up on port 9  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
NOTICE  
Each message contains a date and time field and has a severity level associated with it. One of eight  
different prefixes is used to indicate the condition:  
EMERG—indicates the system is unusable  
ALERT—indicates action should be taken immediately  
CRIT—indicates critical conditions  
ERR—indicates error conditions or eroded operations  
WARNING—indicates warning conditions  
NOTICE—indicates a normal but significant condition  
INFO—indicates an information message  
DEBUG—indicates a debug-level message  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
System user information  
The following command displays user status information:  
show access user  
Command mode: All except User EXEC  
Usernames:  
user  
oper  
admin  
- enabled  
- disabled  
- Always Enabled  
Current User ID table:  
1: name tech1 , ena, cos user  
2: name tech2 , ena, cos user  
, password valid, online  
, password valid, offline  
The following table describes the User Name information.  
Table 17 User Name Information  
Field  
Usage  
user  
Displays the status of the useraccess level.  
Displays the status of the oper(operator) access level.  
Displays the status of the admin(administrator) access level.  
oper  
admin  
Current User ID Table  
Displays the status of configured user IDs. To configure new user IDs, use the  
following command: access user x  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Layer 2 information  
The following table describes the Layer 2 Information commands. The following sections provide more  
detailed information and commands.  
Table 18 Layer 2 information commands  
Command  
Usage  
show mac-address-table  
Displays Forwarding Database Information.  
Command mode: All  
show lacp information  
Displays a summary of LACP information.  
Command mode: All  
show qos transmit-queue information  
show dot1x information  
Displays 802.1p Information.  
Command mode: All  
Displays 802.1x Information.  
Command mode: All  
show spanning-tree stp <1-128>  
information  
In addition to seeing if STP is enabled or disabled, you can  
view the following STP bridge information:  
Priority  
Hello interval  
Maximum age value  
Forwarding delay  
Aging time  
You can also refer to the following port-specific STP  
information:  
Port number and priority  
Cost  
State  
Command mode: All  
show spanning-tree mstp cist  
information  
Displays Common internal Spanning Tree (CIST) bridge  
information, including the following:  
Priority  
Hello interval  
Maximum age value  
Forwarding delay  
You can also view port-specific CIST information, including  
the following:  
Port number and priority  
Cost  
State  
Command mode: All  
show portchannel information  
When trunk groups are configured, you can view the state of  
each port in the various trunk groups.  
Command mode: All  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Table 18 Layer 2 information commands  
Command  
Usage  
show vlan information  
Displays VLAN configuration information, including:  
VLAN Number  
VLAN Name  
Status  
Port membership of the VLAN  
Command mode: All  
show layer2  
Dumps all switch information available from Layer 2 memory  
(10K or more, depending on your configuration).  
If you want to capture dump data to a file, set your  
communication software on your workstation to capture session  
data prior to issuing the dump commands.  
Command mode: All  
FDB information commands  
The forwarding database (FDB) contains information that maps the media access control (MAC) address  
of each known device to the switch port where the device address was learned. The FDB also shows  
which other ports have seen frames destined for a particular MAC address.  
NOTE: The master forwarding database supports up to 8K MAC address entries on the  
management processor (MP) per switch.  
Table 19 FDB information commands  
Command  
Usage  
show mac-address-table address  
<mac-address>  
Displays a single database entry by its MAC address. You are  
prompted to enter the MAC address of the device.  
Enter the MAC address using the format:  
xx:xx:xx:xx:xx:xx.(For example:  
08:00:20:12:34:56)  
You can also enter the MAC address using the format:  
xxxxxxxxxxxx. (For example: 080020123456)  
Command mode: All  
show mac-address-table port <port  
number>  
Displays all FDB entries for a particular port.  
Command mode: All  
show mac-address-table vlan <1-4095>  
Displays all FDB entries on a single VLAN. The range is  
1-4095.  
Command mode: All  
show mac-address-table state  
{flood|forward|ifmac|ignore|trunk|  
unknown}  
Displays all FDB entries that match a particular state.  
Command mode: All  
show mac-address-table  
Displays all entries in the Forwarding Database.  
Command mode: All  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Show all FDB information  
The following command displays Forwarding Database information:  
show mac-address-table  
Command mode: All  
MAC address  
VLAN Port Trnk State  
----------------- ---- ---- ---- -----  
00:02:01:00:00:00 300  
1
TRK  
FWD  
FWD  
FWD  
FWD  
FWD  
FWD  
FWD  
FWD  
FWD  
FWD  
FWD  
FWD  
00:02:01:00:00:01 300 20  
00:02:01:00:00:02 300 20  
00:02:01:00:00:03 300 20  
00:02:01:00:00:04 300 20  
00:02:01:00:00:05 300 20  
00:02:01:00:00:06 300 20  
00:02:01:00:00:07 300 20  
00:02:01:00:00:08 300 20  
00:02:01:00:00:09 300 20  
00:02:01:00:00:0a 300 20  
00:02:01:00:00:0b 300 20  
00:02:01:00:00:0c 300 20  
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the  
trunking (TRK) state, the Trnkfield displays the trunk group number. If the state for the port is listed as  
unknown (UNK), the MAC address has not yet been learned by the switch, but has only been seen as a  
destination address. When an address is in the unknown state, no outbound port is indicated.  
Clearing entries from the forwarding database  
To delete a static MAC address from the forwarding database (FDB), see the “Static FDB configuration”  
section in the “Configuration Commands” chapter.  
Link Aggregation Control Protocol information  
The following table describes the Link Aggregation Control Protocol information commands.  
Table 20 LACP information commands  
Command  
Usage  
show interface port <port number> lacp  
aggregator  
Displays LACP aggregator information for the port.  
Command mode: All  
show lacp  
Displays LACP information for the port.  
Command mode: All  
show lacp information  
Displays all LACP information parameters.  
Command mode: All  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Information Commands  
LACP dump  
The following command displays LACP information:  
show lacp information  
Command mode: All  
>> LACP# dump  
port lacp  
adminkey operkey selected  
prio  
attached trunk  
aggr  
----------------------------------------------------------------------  
1 off  
2 off  
3 off  
4 off  
5 off  
6 off  
7 off  
8 off  
1
2
3
4
5
6
7
8
1
2
3
4
5
6
7
8
n
n
n
n
n
n
n
n
32768  
32768  
32768  
32768  
32768  
32768  
32768  
32768  
--  
--  
--  
--  
--  
--  
--  
--  
--  
--  
--  
--  
--  
--  
--  
--  
LACP dump includes the following information for each port in the HP 10GbE switch:  
lacp—Displays the port’s LACP mode (active, passive, or off)  
adminkey—Displays the value of the port’s adminkey.  
operkey—Shows the value of the port’s operational key.  
selected—Indicates whether the port has been selected to be part of a Link Aggregation Group.  
prio—Shows the value of the port priority.  
attached aggr—Displays the aggregator associated with each port.  
trunk—This value represents the LACP trunk group number.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
802.1x information  
The following command displays 802.1x information:  
show dot1x information  
Command mode: All  
System capability : Authenticator  
System status : disabled  
Protocol version : 1  
Authenticator  
PAE State  
Backend  
Auth State  
Port Auth Mode  
Auth Status  
---- ------------ ------------ -------------- ----------  
1
2
3
4
5
6
7
8
9
force-auth  
force-auth  
force-auth  
force-auth  
force-auth  
force-auth  
force-auth  
force-auth  
force-auth  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
unauthorized initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
initialize  
10 force-auth  
11 force-auth  
12 force-auth  
13 force-auth  
14 force-auth  
15 force-auth  
16 force-auth  
*17 force-auth  
*19 force-auth  
*20 force-auth  
*21 force-auth  
------------------------------------------------------------------  
* - Port down or disabled  
The following table describes the IEEE 802.1x parameters.  
Table 21 802.1x information  
Field  
Description  
Port  
Displays each port’s name.  
Auth Mode  
Displays the Access Control authorization mode for the port. The  
Authorization mode can be one of the following:  
force-unauth  
auto  
force-auth  
Auth Status  
Displays the current authorization status of the port, either authorizedor  
unauthorized.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Table 21 802.1x information  
Field  
Description  
Authenticator PAE State  
Displays the Authenticator Port Access Entity State. The PAE state can be  
one of the following:  
initialize  
disconnected  
connecting  
authenticating  
authenticated  
aborting  
held  
forceAuth  
Backend Auth State  
Displays the Backend Authorization State. The Backend Authorization state  
can be one of the following:  
request  
response  
success  
fail  
timeout  
idle  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Information Commands  
Spanning Tree information  
The following table describes the Spanning Tree Protocol (STP) information commands.  
Table 22 STP information commands  
Command  
Usage  
show spanning-tree stp <1-128>  
Displays information about the spanning tree group.  
Command mode: All  
show spanning-tree stp <1-128> bridge  
show spanning-tree [<1-128>] information  
Displays STP bridge information.  
Command mode: All  
Displays STP information.  
Command mode: All  
The following command displays Spanning Tree information:  
show spanning-tree stp <1-128> information  
Command mode: All  
------------------------------------------------------------------  
upfast disabled, update 40  
------------------------------------------------------------------  
Spanning Tree Group 1: On (STP/PVST+)  
VLANs: 1  
Current Root:  
Path-Cost  
8
Port Hello MaxAge FwdDel  
20 20 15  
8000 00:02:a5:d1:0f:ed  
2
Parameters: Priority Hello MaxAge FwdDel Aging  
32768 20 15 180  
2
Port Priority Cost FastFwd State  
Designated Bridge Des Port  
---- -------- ---- -------- ---------- ------------------- -------  
1
2
3
0
0
0
0
0
0
n
n
n
FORWARDING *  
FORWARDING *  
FORWARDING *  
The switch software uses the IEEE 802.1d Spanning Tree Protocol (STP). If RSTP/MSTP is turned on, see  
the “Rapid Spanning Tree information” section for Spanning Tree Group information. In addition to  
seeing if STP is enabled or disabled, you can view the following STP bridge information:  
Status of Uplink Fast (upfast)  
Current root MAC address  
Path cost  
Port  
Hello interval  
Maximum age value  
Forwarding delay  
Aging time  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
You can also refer to the following port-specific STP information:  
Port number and priority  
Cost  
State  
Port Fast Forwarding state  
Designated bridge  
Designated port  
The following table describes the STP parameters.  
Table 23 STP parameters  
Parameter  
Description  
Current Root  
Shows information about the root bridge for the Spanning Tree. Information includes  
the priority (hex) and MAC address of the root.  
Path-Cost  
Port  
Path-cost is the total path cost to the root bridge. It is the summation of the path cost  
between bridges (up to the root bridge).  
The current root port refers to the port on the switch that receives data from the current  
root. Zero (0) indicates the root bridge of the STP.  
Priority (bridge)  
Hello  
The bridge priority parameter controls which bridge on the network will become the  
STP root bridge.  
The hello time parameter specifies, in seconds, how often the root bridge transmits a  
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge  
uses the root bridge hello value.  
MaxAge  
The maximum age parameter specifies, in seconds, the maximum time the bridge  
waits without receiving a configuration bridge protocol data unit before it reconfigures  
the STP network. If the bridge is not the root bridge, it uses the MaxAgevalue of the  
root bridge.  
FwdDel  
The forward delay parameter specifies, in seconds, the amount of time that a bridge  
port has to wait before it changes from learning state to forwarding state. If the bridge  
is not the root bridge, it uses the FwdDelvalue of the root bridge.  
Aging  
The aging time parameter specifies, in seconds, the amount of time the bridge waits  
without receiving a packet from a station before removing the station from the  
Forwarding Database.  
Priority (port)  
The port priority parameter helps determine which bridge port becomes the  
designated port. In a network topology that has multiple bridge ports connected to a  
single segment, the port with the lowest port priority becomes the designated port for  
the segment.  
Cost  
The port path cost parameter is used to help determine the designated port for a  
segment. Generally speaking, the faster the port, the lower the path cost.  
State  
The State field shows the current state of the port. The State field can be one of the  
following: BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.  
Designated bridge  
Designated port  
Shows information about the bridge connected to each port, if applicable. Information  
includes the priority (hex) and MAC address of the Designated Bridge.  
The port ID of the port on the Designated Bridge to which this port is connected. This  
information includes the port priority (hex) and the port number (hex).  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
Rapid Spanning Tree and Multiple Spanning Tree information  
The following command displays RSTP/MSTP information:  
show spanning-tree stp <1-128> information  
Command mode: All  
------------------------------------------------------------------  
upfast disabled, update 40  
------------------------------------------------------------------  
Spanning Tree Group 1: On (RSTP)  
VLANs: 1-3  
Current Root:  
Path-Cost Port Hello MaxAge FwdDel  
20 15  
8000 00:00:01:00:19:00  
0
0
9
Parameters: Priority Hello MaxAge FwdDel Aging  
32768 20 15 300  
9
Port Prio Cost State Role  
Designated Bridge Des Port Type  
---- ---- ---- ------ ---- --------------------- -------- ----  
1
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
DSB  
DSB  
3
DSB  
4
DSB  
5
DSB  
6
DSB  
7
DSB  
8
DSB  
9
DSB  
10  
11  
12  
DISC  
FWD DESG 8000-00:00:01:00:19:00 8017 P2P2,Edge  
FWD DESG 8000-00:00:01:00:19:00 8018 P2P  
The switch software can be set to use the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) or the IEEE  
802.1s Multiple Spanning Tree Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following  
RSTP bridge information for the Spanning Tree Group:  
Status of Uplink Fast (upfast)  
Current root MAC address  
Path-Cost  
Port  
Hello interval  
Maximum age value  
Forwarding delay  
Aging time  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
You can also refer to the following port-specific RSTP information:  
Port number and priority  
Cost  
State  
Role  
Designated bridge and port  
Link type  
The following table describes the STP parameters in RSTP or MSTP mode.  
Table 24 Rapid Spanning Tree parameter descriptions  
Parameter  
Description  
Current Root  
Shows information about the root bridge for the Spanning Tree. Information includes  
the priority (hex) and MAC address of the root.  
Path-Cost  
Port  
Path-cost is the total path cost to the root bridge. It is the summation of the path cost  
between bridges (up to the root bridge).  
The current root port refers to the port on the switch that receives data from the current  
root. Zero (0) indicates the root bridge of the STP.  
Priority (bridge)  
Hello  
The bridge priority parameter controls which bridge on the network will become the  
STP root bridge.  
The hello time parameter specifies, in seconds, how often the root bridge transmits a  
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge  
uses the root bridge hello value.  
MaxAge  
The maximum age parameter specifies, in seconds, the maximum time the bridge waits  
without receiving a configuration bridge protocol data unit before it reconfigures the  
STP network. If the bridge is not the root bridge, it uses the MaxAgevalue of the root  
bridge.  
FwdDel  
The forward delay parameter specifies, in seconds, the amount of time that a bridge  
port has to wait before it changes from learning state to forwarding state. If the bridge  
is not the root bridge, it uses the FwdDelvalue of the root bridge.  
Aging  
The aging time parameter specifies, in seconds, the amount of time the bridge waits  
without receiving a packet from a station before removing the station from the  
Forwarding Database.  
Priority (port)  
The port priority parameter helps determine which bridge port becomes the designated  
port. In a network topology that has multiple bridge ports connected to a single  
segment, the port with the lowest port priority becomes the designated port for the  
segment.  
Cost  
The port path cost parameter is used to help determine the designated port for a  
segment. Generally speaking, the faster the port, the lower the path cost. A setting of  
zero (0) indicates that the cost will be set to the appropriate default after the link speed  
has been auto-negotiated.  
State  
Shows the current state of the port. The State field in RSTP/MSTP mode can be one of  
the following: Discarding (DISC), Learning (LRN), Forwarding (FWD), or Disabled  
(DSB).  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
Table 24 Rapid Spanning Tree parameter descriptions  
Parameter  
Description  
Role  
Shows the current role of this port in the Spanning Tree. The port role can be one of the  
following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master  
(MAST), or Unknown (UNK).  
Designated bridge  
Shows information about the bridge connected to each port, if applicable. Information  
includes the priority (hex) and MAC address of the Designated Bridge.  
Designated port  
Type  
The port ID of the port on the Designated Bridge to which this port is connected.  
Type of link connected to the port, and whether the port is an edge port. Link type  
values are AUTO, P2P, or SHARED.  
Common Internal Spanning Tree information  
The following command displays Common Internal Spanning Tree (CIST) information:  
show spanning-tree mstp cist information  
Command mode: All  
Mstp Digest: 0xac36177f50283cd4b83821d8ab26de62  
Common Internal Spanning Tree:  
VLANs MAPPED: 1-16 18-31 33-4094  
VLANs: 1 25 26 4095  
Current Root:  
Path-Cost Port MaxAge FwdDel  
8000 00:03:42:fa:3b:80  
0
1
20  
15  
CIST Regional Root:  
Path-Cost  
11  
8000 00:03:42:fa:3b:81  
Parameters: Priority MaxAge FwdDel Hops  
32768 20 15 20  
Port Prio Cost State Role Designated Bridge  
Des Port Hello Type  
---- ---- ---- ------ ---- --------------------- -------- ----- ----  
1 128 2000 FWD DESG 8000-00:03:42:fa:3b:80 8001  
2 128 2000 FWD DESG 8000-00:03:42:fa:3b:80 8002  
3 128 2000 DSB  
4 P2P, Edge  
4 128 2000 DSB  
5 128 2000 DSB  
6 128 2000 DSB  
7 128 2000 DSB  
8 128 2000 DSB  
9 128 2000 DSB  
10 128 0  
DSB  
11 128 2000 FWD DESG 8000-00:03:42:fa:3b:80  
12 128 2000 DSB  
...  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
In addition to seeing if Common Internal Spanning Tree (CIST) is enabled or disabled, you can view the  
following CIST bridge information:  
Status of Uplink Fast (upfast)  
CIST root  
CIST regional root  
Priority  
Maximum age value  
Forwarding delay  
Hops  
You can also refer to the following port-specific CIST information:  
Port number and priority  
Cost  
State  
Role  
Designated bridge and port  
Hello interval  
Link type and port type  
The following table describes the CIST parameters.  
Table 25 Common Internal Spanning Tree parameter descriptions  
Parameter  
Description  
CIST Root  
Shows information about the root bridge for the Common Internal Spanning Tree  
(CIST). Values on this row of information refer to the CIST root.  
CIST Regional Root  
Priority (bridge)  
MaxAge  
Shows information about the root bridge for this MSTP region. Values on this row of  
information refer to the regional root.  
The bridge priority parameter controls which bridge on the network will become the  
STP root bridge.  
The maximum age parameter specifies, in seconds, the maximum time the bridge  
waits without receiving a configuration bridge protocol data unit before it reconfigures  
the STP network.  
FwdDel  
The forward delay parameter specifies, in seconds, the amount of time that a bridge  
port has to wait before it changes from learning state to forwarding state.  
Hops  
Shows the maximum number of bridge hops allowed before a packet is dropped.  
Priority (port)  
The port priority parameter helps determine which bridge port becomes the  
designated port. In a network topology that has multiple bridge ports connected to a  
single segment, the port with the lowest port priority becomes the designated port for  
the segment.  
Cost  
The port path cost parameter is used to help determine the designated port for a  
segment. Generally speaking, the faster the port, the lower the path cost. A setting of  
zero (0) indicates that the cost will be set to the appropriate default after the link  
speed has been auto-negotiated.  
State  
Shows the current state of the port. The state field can be one of the following:  
Discarding (DISC), Forwarding (FWD), or Disabled (DSB).  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
Table 25 Common Internal Spanning Tree parameter descriptions  
Parameter  
Description  
Role  
Shows the current role of this port in the Spanning Tree. The port role can be one of  
the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP),  
Master (MAST).  
Designated Bridge  
Designated Port  
Hello  
Shows information about the bridge connected to each port, if applicable. Information  
includes the priority (hex) and MAC address of the Designated Bridge.  
The port ID of the port on the Designated Bridge to which this port is connected.  
Information includes the port priority (hex) and the port number (hex).  
The hello time parameter specifies, in seconds, how often the root bridge transmits a  
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge  
uses the root bridge hello value.  
Type  
Type of link connected to the port, and whether the port is an edge port. Link type  
values are AUTO, P2P, or SHARED.  
Trunk group information  
The following command displays Trunk Group information:  
show portchannel information  
Command mode: All  
Trunk group 1, Enabled  
port state:  
20: STG 1 forwarding  
21: STG 1 forwarding  
When trunk groups are configured, you can view the state of each port in the various trunk groups.  
NOTE: If Spanning Tree Protocol on any port in the trunk group is set to forwarding, the remaining  
ports in the trunk group are set to forwarding.  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
VLAN information  
The following table describes the VLAN information commands.  
Table 26 VLAN information commands  
Command  
Usage  
show vlan  
Displays VLAN information  
Command mode: All  
show vlan information  
Displays VLAN information, including spanning tree assignment.  
Command mode: All  
The following command displays VLAN information:  
show vlan  
Command mode: All  
VLAN  
Name  
Status Ports  
---- -------------------------------- ------ ----------------  
1
Default VLAN  
pc03p  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
ena  
4 5  
2
2
7
7
pc07f  
11  
14  
15  
16  
17  
18  
19  
20  
21  
22  
24  
pc04u  
11  
8600-14  
8600-15  
8600-16  
8600-17  
35k-1  
14  
15  
16  
6
18  
35k-2  
19  
35k-3  
20  
35k-4  
21  
pc07z  
21  
redlan  
21  
300 ixiaTraffic  
4000 bpsports  
4095 Mgmt VLAN  
1 12 13 21  
3-6 8-10  
17  
This information display includes all configured VLANs and all member ports that have an active link  
state.  
VLAN information includes:  
VLAN Number  
VLAN Name  
Status  
Port membership of the VLAN  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Layer 3 information  
The following table describes basic Layer 3 Information commands. The following sections provide more  
detailed information and commands.  
Table 27 Layer 3 information commands  
Command  
Usage  
show ip route  
Displays all routes configured in the switch.  
Command mode: All except User EXEC  
show ip information  
show ip arp  
Displays general IP information.  
Command mode: All except User EXEC  
Displays Address Resolution Protocol (ARP) Information.  
Command mode: All except User EXEC  
show ip ospf information  
show interface ip rip  
show layer3 information  
Displays the OSPF information.  
Command mode: All except User EXEC  
Displays RIP user’s configuration.  
Command mode: All  
Displays IP Information. IP information, includes:  
IP interface information: Interface number, IP address, subnet mask, VLAN  
number, and operational status.  
Default gateway information: Metric for selecting which configured  
gateway to use, gateway number, IP address, and health status  
IP forwarding information: Enable status, lnet and lmask  
Port status  
Command mode: All except User EXEC  
show ip igmp  
Displays IGMP Information.  
Command mode: All except User EXEC  
show ip vrrp information  
show layer3  
Displays the VRRP Information.  
Command mode: All except User EXEC  
Dumps all switch information available from Layer 3 memory (10K or more,  
depending on your configuration).  
If you want to capture dump data to a file, set your communication software  
on your workstation to capture session data prior to issuing the dump  
commands.  
Command mode: All except User EXEC  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Route information  
Using the commands listed below, you can display all or a portion of the IP routes currently held in the  
switch.  
Table 28 Route Information commands  
Command  
Usage  
show ip route address <IP address>  
Displays a single route by destination IP address.  
Command mode: All except User EXEC  
show ip route gateway <IP address>  
Displays routes to a single gateway.  
Command mode: All except User EXEC  
show ip route type  
{indirect|direct|local|broadcast|martian|  
multicast}  
Displays routes of a single type.  
Command mode: All except User EXEC  
show ip route tag  
{fixed|static|addr|rip|ospf|broadcast|  
multicast|martian}  
Displays routes of a single tag.  
Command mode: All except User EXEC  
show ip route interface <1-250>  
Displays routes on a single interface.  
Command mode: All except User EXEC  
show ip route  
Displays all routes configured in the switch.  
Command mode: All except User EXEC  
Show all IP Route information  
The following command displays IP route information:  
show ip route  
Command mode: All except User EXEC  
Status code: * - best  
Destination  
Mask  
Gateway  
Type  
Tag  
Metr If  
--------------- --------------- --------------- --------- --------- ---- --  
* 11.0.0.0  
* 11.0.0.1  
255.0.0.0  
11.0.0.1  
direct  
local  
fixed  
addr  
211  
211  
211  
12  
255.255.255.255 11.0.0.1  
* 11.255.255.255 255.255.255.255 11.255.255.255 broadcast broadcast  
* 12.0.0.0  
* 12.0.0.1  
255.0.0.0  
12.0.0.1  
direct  
local  
fixed  
addr  
255.255.255.255 12.0.0.1  
12  
* 12.255.255.255 255.255.255.255 12.255.255.255 broadcast broadcast  
12  
* 13.0.0.0  
255.0.0.0  
11.0.0.2  
indirect ospf  
2
211  
24  
* 47.0.0.0  
255.0.0.0  
47.133.88.1  
47.133.88.46  
indirect static  
* 47.133.88.0  
255.255.255.0  
direct  
broadcast broadcast 2  
martian martian  
multicast addr  
fixed  
24  
* 172.30.52.223 255.255.255.255 172.30.52.223  
* 224.0.0.0  
* 224.0.0.5  
224.0.0.0  
0.0.0.0  
255.255.255.255 0.0.0.0  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
The following table describes the Typeparameter.  
Table 29 IP Routing Type information  
Field  
Description  
indirect  
The next hop to the host or subnet destination will be forwarded through a router at the  
Gateway address.  
direct  
Packets will be delivered to a destination host or subnet attached to the switch.  
Indicates a route to one of the switch’s IP interfaces.  
Indicates a broadcast route.  
local  
broadcast  
martian  
The destination belongs to a host or subnet which is filtered out. Packets to this  
destination are discarded.  
multicast  
Indicates a multicast route.  
The following table describes the Tagparameter.  
Table 30 IP Routing Tag information  
Field  
Description  
fixed  
static  
addr  
The address belongs to a host or subnet attached to the switch.  
The address is a static route which has been configured on the switch.  
The address belongs to one of the switch’s IP interfaces.  
The address was learned by the Routing Information Protocol (RIP).  
The address was learned by Open Shortest Path First (OSPF).  
Indicates a broadcast address.  
rip  
ospf  
broadcast  
martian  
The address belongs to a filtered group.  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Information Commands  
ARP information  
The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry,  
address status flags, VLAN, and port for the address, and port referencing information.  
The following table describes the Address Resolution Protocol commands.  
Table 31 ARP information  
Command  
Usage  
show ip arp find <IP address>  
Displays a single ARP entry by IP address.  
Command mode: All except User EXEC  
show ip arp interface port <port  
number>  
Displays the ARP entries on a single port.  
Command mode: All except User EXEC  
show ip arp vlan <1-4095>  
Displays the ARP entries on a single VLAN.  
Command mode: All except User EXEC  
show ip arp  
Displays all ARP entries, including:  
IP address and MAC address of each entry  
Address status flag  
The VLAN and port to which the address belongs  
The ports which have referenced the address (empty if no  
port has routed traffic to the IP address shown)  
Command mode: All except User EXEC  
show ip arp reply  
Displays the ARP address list: IP address, IP mask, MAC address,  
and VLAN flags.  
Command mode: All except User EXEC  
Show all ARP entry information  
The following command displays ARP information:  
show ip arp  
Command mode: All except User EXEC  
IP address  
Flags  
MAC address  
VLAN  
Port  
----  
18  
--------------- -----  
192.168.2.4  
-----------------  
00:50:8b:b2:32:cb  
00:0e:7f:25:89:b5  
00:0f:6a:ed:46:00  
----  
1
1
1
192.168.2.19  
17  
192.168.2.61  
P
The Flag field provides additional information about an entry. If no flag displays, the entry is normal.  
Table 32 ARP dump flag parameters  
Flag  
Description  
P
R
U
Permanent entry created for switch IP interface.  
Indirect route entry.  
Unresolved ARP entry. The MAC address has not been learned.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Information Commands  
ARP address list information  
The following command displays ARP address list information:  
show ip arp reply  
Command mode: All except User EXEC  
IP address  
--------------- --------------- ----------------- ---- -----  
205.178.18.66 255.255.255.255 00:70:cf:03:20:04  
205.178.50.1 255.255.255.255 00:70:cf:03:20:06 1  
IP mask  
MAC address  
VLAN Flags  
P
205.178.18.64 255.255.255.255 00:70:cf:03:20:05 1  
This screen displays all entries in the ARP cache.  
OSPF information  
The following table describes the OSPF commands.  
Table 33 OSPF information commands  
Command  
Usage  
show ip ospf general-information  
Displays general OSPF information.  
Command mode: All except User EXEC  
show ip ospf area information [<0-2>]  
show ip ospf interface [<1-249>]  
Displays area information for a particular area index. If no  
parameter is supplied, it displays area information for all the  
areas.  
Command mode: All except User EXEC  
Displays interface information for a particular interface. If no  
parameter is supplied, it displays information for all the  
interfaces.  
Command mode: All except User EXEC  
show ip ospf area-virtual-link  
information  
Displays information about all the configured virtual links.  
Command mode: All except User EXEC  
show ip ospf neighbor  
Displays the status of all the current neighbors.  
Command mode: All except User EXEC  
show ip ospf summary-range <0-2>  
Displays the list of summary ranges belonging to non-NSSA  
areas.  
Command mode: All except User EXEC  
show ip ospf summary-range-nssa <0-2>  
show ip ospf routes  
Displays the list of summary ranges belonging to NSSA areas.  
Command mode: All except User EXEC  
Displays OSPF routing table.  
Command mode: All except User EXEC  
show ip ospf information  
Displays the OSPF information.  
Command mode: All except User EXEC  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
OSPF general information  
The following command displays general OSPF information:  
show ip ospf general-information  
Command mode: All except User EXEC  
OSPF Version 2  
Router ID: 10.10.10.1  
Started at 1663 and the process uptime is 4626  
Area Border Router: yes, AS Boundary Router: no  
LS types supported are 6  
External LSA count 0  
External LSA checksum sum 0x0  
Number of interfaces in this router is 2  
Number of virtual links in this router is 1  
16 new lsa received and 34 lsa originated from this router  
Total number of entries in the LSDB 10  
Database checksum sum 0x0  
Total neighbors are 1, of which  
2 are >=INIT state,  
2 are >=EXCH state,  
2 are =FULL state  
Number of areas is 2, of which 3-transit 0-nssa 0-stub  
Area Id : 0.0.0.0  
Authentication : none  
Import ASExtern : yes  
Number of times SPF ran : 8  
Area Border Router count : 2  
AS Boundary Router count : 0  
LSA count : 5  
Summary : noSummary  
OSPF interface information  
The following command displays OSPF interface information:  
show ip ospf interface [<1-249>]  
Command mode: All except User EXEC  
Ip Address 10.10.12.1, Area 0.0.0.1, Admin Status UP  
Router ID 10.10.10.1, State DR, Priority 1  
Designated Router (ID) 10.10.10.1, Ip Address 10.10.12.1  
Backup Designated Router (ID) 10.10.14.1, Ip Address 10.10.12.2  
Timer intervals, Hello 10, Dead 40, Wait 40, Retransmit 5,  
Transit delay 1  
Neighbor count is 1 If Events 4, Authentication type none  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
OSPF Database information  
The following table describes the OSPF Database information commands.  
Table 34 OSPF Database information commands  
Command  
Usage  
show ip ospf database advertising-  
router <router ID>  
Takes advertising router as a parameter. Displays all the Link  
State Advertisements (LSAs) in the LS database that have the  
advertising router with the specified router ID, for example:  
20.1.1.1.  
Command mode: All except User EXEC  
show ip ospf database asbr-summary  
[advertising-router <router ID>  
|link-state-id <A.B.C.D> | self]  
Displays ASBR summary LSAs. The usage of this command is as  
follows:  
asbrsum adv-rtr 20.1.1.1displays ASBR summary  
LSAs having the advertising router 20.1.1.1.  
asbrsum link_state_id 10.1.1.1displays ASBR  
summary LSAs having the link state ID 10.1.1.1.  
asbrsum selfdisplays the self advertised ASBR summary  
LSAs.  
asbrsumwith no parameters displays all the ASBR summary  
LSAs.  
Command mode: All except User EXEC  
show ip ospf database database-  
summary  
Displays the following information about the LS database in a  
table format:  
The number of LSAs of each type in each area.  
The total number of LSAs for each area.  
The total number of LSAs for each LSA type for all areas  
combined.  
The total number of LSAs for all LSA types for all areas  
combined.  
No parameters are required.  
Command mode: All except User EXEC  
show ip ospf database external  
[advertising-router <router ID>  
|link-state-id <A.B.C.D> | self]  
Displays the AS-external (type 5) LSAs with detailed information  
of each field of the LSAs.  
Command mode: All except User EXEC  
show ip ospf database network  
[advertising-router <router ID>  
|link-state-id <A.B.C.D> | self]  
Displays the network (type 2) LSAs with detailed information of  
each field of the LSA.network LS database.  
Command mode: All except User EXEC  
show ip ospf database nssa  
[advertising-router <router ID>  
|link-state-id <A.B.C.D> | self]  
Displays the NSSA (type 7) LSAs with detailed information of  
each field of the LSAs.  
Command mode: All except User EXEC  
show ip ospf database router  
[advertising-router <router ID>  
|link-state-id <A.B.C.D> | self]  
Displays the router (type 1) LSAs with detailed information of  
each field of the LSAs.  
Command mode: All except User EXEC  
show ip ospf database self  
Displays all the self-advertised LSAs. No parameters are  
required.  
Command mode: All except User EXEC  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
Table 34 OSPF Database information commands  
Command  
Usage  
show ip ospf database summary  
[advertising-router <router ID> |  
linkstate-id <A.B.C.D> | self]  
Displays the network summary (type 3) LSAs with detailed  
information of each field of the LSAs.  
Command mode: All except User EXEC  
show ip ospf database  
Displays all the LSAs.  
Command mode: All except User EXEC  
OSPF route codes information  
The following command displays OSPF route information:  
show ip ospf routes  
Command mode: All except User EXEC  
Codes: IA - OSPF inter area,  
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2  
E1 - OSPF external type 1, E2 - OSPF external type 2  
* - best  
IA 10.10.0.0/16 via 200.1.1.2  
IA 40.1.1.0/28 via 20.1.1.2  
IA 80.1.1.0/24 via 200.1.1.2  
IA 100.1.1.0/24 via 20.1.1.2  
IA 140.1.1.0/27 via 20.1.1.2  
IA 150.1.1.0/28 via 200.1.1.2  
E2 172.18.1.1/32 via 30.1.1.2  
E2 172.18.1.2/32 via 30.1.1.2  
E2 172.18.1.3/32 via 30.1.1.2  
E2 172.18.1.4/32 via 30.1.1.2  
E2 172.18.1.5/32 via 30.1.1.2  
E2 172.18.1.6/32 via 30.1.1.2  
E2 172.18.1.7/32 via 30.1.1.2  
E2 172.18.1.8/32 via 30.1.1.2  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
Routing Information Protocol  
The following table describes the Routing Information Protocol (RIP) information commands.  
Table 35 RIP information commands  
Command  
Usage  
show ip rip routes  
Displays RIP routes.  
Command mode: All except User EXEC  
show ip rip interface [<1-249>]  
Displays RIP interface information.  
Command mode: All except User EXEC  
show interface ip rip  
Displays RIP user’s configuration.  
Command mode: All  
RIP Routes information  
The following command displays RIP route information:  
show ip rip routes  
Command mode: All except User EXEC  
3.0.0.0/8 via 30.1.1.11 metric 4  
4.0.0.0/16 via 30.1.1.11 metric 16  
10.0.0.0/8 via 30.1.1.2 metric 3  
20.0.0.0/8 via 30.1.1.2 metric 2  
This table contains all dynamic routes learned through RIP, including the routes that are undergoing  
garbage collection with metric = 16. This table does not contain directly connected routes and locally  
configured static routes.  
RIP user configuration  
The following command displays RIP user information:  
show interface ip [<1-250>] rip  
Command mode: All  
RIP USER CONFIGURATION :  
RIP on update 30  
RIP Interface 2 : 102.1.1.1, enabled  
version 2, listen enabled, supply enabled, default none  
poison disabled, trigg enabled, mcast enabled, metric 1  
auth none, key none  
RIP Interface 3 : 103.1.1.1, enabled  
version 2, listen enabled, supply enabled, default none  
poison disabled, trigg enabled, mcast enabled, metric 1  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Information Commands  
IP information  
The following command displays Layer 3 information:  
show layer3 information  
Command mode: All  
IP information:  
Interface information:  
1: 10.80.23.243  
255.255.254.0 10.80.23.255, vlan 1, up  
255.255.0.0 10.20.255.255, vlan 4095, up  
250: 10.20.7.144  
Default gateway information: metric strict  
1: 10.80.22.1,  
254: 10.20.1.1,  
vlan any, up active  
vlan 4095, up active  
Current BOOTP relay settings: OFF  
0.0.0.0, 0.0.0.0  
Current IP forwarding settings: OFF, dirbr disabled  
Current network filter settings:  
none  
Current route map settings:  
The following interface and default gateway information is displayed:  
Interface number  
IP address  
IP mask  
IP broadcast address  
Operational status  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
IGMP multicast group information  
The following table describes the commands used to display information about IGMP groups learned by  
the switch.  
Table 36 IGMP Multicast Group commands  
Command  
Usage  
show ip igmp groups address <IP  
address>  
Displays a single IGMP multicast group by its IP address.  
Command mode: All except User EXEC  
show ip igmp groups vlan <1-4094>  
Displays all IGMP multicast groups on a single VLAN.  
Command mode: All except User EXEC  
show ip igmp groups interface port  
<port number>  
Displays all IGMP multicast groups on a single port.  
Command mode: All except User EXEC  
show ip igmp groups portchannel <1-40>  
Displays all IGMP multicast groups on a single trunk group.  
Command mode: All except User EXEC  
show ip igmp groups detail  
Displays details about IGMP multicast groups, including  
source and timer information.  
Command mode: All except User EXEC  
show ip igmp groups  
Displays information for all multicast groups.  
Command mode: All except User EXEC  
IGMP group information  
The following command displays IGMP group information:  
show ip igmp groups  
Command mode: All  
Note: Local groups (224.0.0.x) are not snooped/relayed and will not appear.  
Source  
Group  
VLAN  
Port  
Version  
Mode Expires Fwd  
-------------- --------------- ------- ------ -------- ----- ------- ---  
10.1.1.1  
232.1.1.1  
232.1.1.1  
232.1.1.1  
235.0.0.1  
236.0.0.1  
2
2
2
9
9
21  
21  
21  
21  
21  
V3  
V3  
V3  
V3  
V3  
INC  
INC  
INC  
INC  
EXC  
4:16  
4:16  
-
Yes  
Yes  
No  
10.1.1.5  
*
10.10.10.43  
*
2:26  
-
Yes  
Yes  
IGMP Group information includes:  
IGMP source address  
IGMP Group address  
VLAN and port  
IGMP version  
IGMPv3 filter mode  
Expiration timer value  
IGMP multicast forwarding state  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
IGMP multicast router information  
The following table describes the commands used to display information about multicast routers learned  
through IGMP Snooping.  
Table 37 IGMP Multicast Router information commands  
Command  
Usage  
show ip igmp mrouter vlan <1-4094>  
Displays information for all multicast groups on a single VLAN.  
Command mode: All except User EXEC  
show ip igmp mrouter information  
Displays information for all multicast groups learned by the switch.  
Command mode: All except User EXEC  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
VRRP information  
Virtual Router Redundancy Protocol (VRRP) support on HP 10GbE switch provides redundancy between  
routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on  
each participating VRRP-capable routing device. One of the virtual routers is then elected as the master,  
based on a number of priority criteria, and assumes control of the shared virtual router IP address. If the  
master fails, one of the backup virtual routers will assume routing authority and take control of the virtual  
router IP address.  
The following command displays VRRP information:  
show ip vrrp information  
Command mode: All except User EXEC  
VRRP information:  
1: vrid 2, 205.178.18.210, if 1, renter, prio 100, master, server  
2: vrid 1, 205.178.18.202, if 1, renter, prio 100, backup  
3: vrid 3, 205.178.18.204, if 1, renter, prio 100, master, proxy  
When virtual routers are configured, you can view the status of each virtual router using this command.  
VRRP information includes:  
Virtual router number  
Virtual router ID and IP address  
Interface number  
Ownership status  
owner identifies the preferred master virtual router. A virtual router is the owner when the IP  
address of the virtual router and its IP interface are the same.  
renter identifies virtual routers which are not owned by this device  
Priority value. During the election process, the virtual router with the highest priority becomes master.  
Activity status  
master identifies the elected master virtual router.  
backup identifies that the virtual router is in backup mode.  
init identifies that the virtual router is waiting for a startup event. Once it receives a startup  
event, it transitions to master if its priority is 255, (the IP address owner), or transitions to backup  
if it is not the IP address owner.  
Server status. The server state identifies virtual routers.  
Proxy status. The proxy state identifies virtual proxy routers, where the virtual router shares the same  
IP address as a proxy IP address. The use of virtual proxy routers enables redundant switches to  
share the same IP address, minimizing the number of unique IP addresses that must be configured.  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
802.1p information  
The following command displays 802.1p information:  
show qos transmit-queue information  
Command mode: All  
Current priority to COS queue information:  
Priority COSq Weight  
-------- ---- ------  
0
1
2
3
4
5
6
7
0
0
0
0
1
1
1
1
1
1
1
1
2
2
2
2
Current port priority information:  
Port Priority COSq Weight  
----- -------- ---- ------  
1
2
3
4
0
0
0
0
0
0
0
0
1
1
1
1
20  
21  
0
0
0
0
1
1
The following table describes the IEEE 802.1p priority to COS queue information.  
Table 38 802.1p Priority to COS Queue information  
Field  
Description  
Priority  
Displays the 802.1p Priority level.  
Displays the Class of Service queue.  
Displays the scheduling weight of the COS queue.  
Cosq  
Weight  
The following table describes the IEEE 802.1p port priority information.  
Table 39 802.1p Port Priority information  
Field  
Description  
Port  
Displays the port number.  
Priority  
Cosq  
Displays the 802.1p Priority level.  
Displays the Class of Service queue.  
Displays the scheduling weight.  
Weight  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
ACL information  
The following table describes the commands used to display information about Access Control Lists and  
Groups.  
Table 40 ACL information commands  
Command  
Usage  
show access-control list <1-384>  
Displays information about the selected ACL.  
Command mode: All except User EXEC  
show access-control group <1-384>  
Displays information about ACL Groups.  
Command mode: All except User EXEC  
show access-control  
Displays information about all ACLs.  
Command mode: All  
The following command displays Access Control List information:  
show access-control  
Command mode: All  
Current ACL information:  
------------------------  
Filter 1 profile:  
Ethernet  
- VID  
: 1/0xfff  
Actions  
: Set COS to 0  
Filter 2 profile:  
Ethernet  
- VID  
: 1/0xfff  
: Permit  
Actions  
No ACL groups configured.  
ACL information provides configuration parameters for each Access Control List. It also shows which ACLs  
are included in each ACL Group.  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
RMON Information  
The following command displays general RMON information:  
show rmon  
Command mode: All  
RMON history information  
The following command displays RMON history information:  
show rmon history  
Command mode: All  
RMON History group configuration:  
Index  
IFOID  
Interval Rbnum Gbnum  
----- ------------------------------ -------- ----- -----  
1
2
3
4
5
1.3.6.1.2.1.2.2.1.1.21  
1.3.6.1.2.1.2.2.1.1.18  
1.3.6.1.2.1.2.2.1.1.20  
1.3.6.1.2.1.2.2.1.1.19  
1.3.6.1.2.1.2.2.1.1.21  
30  
30  
5
5
5
5
5
5
5
5
5
5
30  
30  
1800  
The following table describes the RMON History Information parameters.  
Table 41 RMON History Information  
Command  
Index  
Usage  
Displays the index number that identifies each history instance.  
Displays the MIB Object Identifier.  
IFOID  
Interval  
Rbnum  
Displays the time interval for each sampling bucket.  
Displays the number of requested buckets, which is the number of data slots into  
which data is to be saved.  
Gbnum  
Displays the number of granted buckets that may hold sampled data.  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Information Commands  
RMON alarm information  
The following command displays RMON alarm information:  
show rmon alarm  
Command mode: All  
RMON Alarm group configuration:  
Index Interval Type rLimit  
fLimit rEvtIdx fEvtIdx last value  
----- -------- ---- -------- -------- ------- ------- ----------  
1
2
30 abs  
900 abs  
300 abs  
1800 abs  
1800 abs  
1800 abs  
1800 abs  
1800 abs  
1800 abs  
1800 abs  
1800 abs  
10  
0
0
10  
20  
0
1
0
0
1
1
1
1
1
1
1
1
0
2
0
0
0
0
0
0
0
0
0
0
0
3
10  
10  
10  
10  
10  
10  
10  
10  
10  
0
4
0
5
0
0
8
0
56344540  
10  
11  
15  
18  
100  
0
0
0
0
0
0
0
0
0
0
Index  
OID  
----- ------------------------------  
1
2
1.3.6.1.2.1.2.2.1.10.257  
1.3.6.1.2.1.2.2.1.11.258  
1.3.6.1.2.1.2.2.1.12.259  
1.3.6.1.2.1.2.2.1.13.260  
1.3.6.1.2.1.2.2.1.14.261  
1.3.6.1.2.1.2.2.1.10.271  
1.3.6.1.2.1.2.2.1.15.262  
1.3.6.1.2.1.2.2.1.16.263  
1.3.6.1.2.1.2.2.1.19.266  
1.3.6.1.2.1.2.2.1.10.270  
1.3.6.1.2.1.2.2.1.17.264  
3
4
5
8
10  
11  
15  
18  
100  
The following table describes the RMON Alarm Information parameters.  
Table 42 RMON Alarm Information  
Command  
Index  
Usage  
Displays the index number that identifies each alarm instance.  
Interval  
Displays the time interval over which data is sampled and compared with the rising and  
falling thresholds.  
Type  
Displays the method of sampling the selected variable and calculating the value to be  
compared against the thresholds, as follows:  
abs—absolute value, the value of the selected variable is compared directly with the  
thresholds at the end of the sampling interval.  
delta—delta value, the value of the selected variable at the last sample is subtracted  
from the current value, and the difference compared with the thresholds.  
rLimit  
fLimit  
Displays the rising threshold for the sampled statistic.  
Displays the falling threshold for the sampled statistic.  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Table 42 RMON Alarm Information  
Command  
Usage  
rEvtIdx  
Displays the rising alarm event index that is triggered when a rising threshold is crossed.  
Displays the falling alarm event index that is triggered when a falling threshold is crossed.  
Displays the last sampled value.  
fEvtIdx  
Last value  
OID  
Displays the MIB Object Identifier for each alarm index.  
RMON event information  
The following command displays RMON event information:  
show rmon event  
Command mode: All  
RMON Event group configuration:  
Index Type  
Last Sent  
Description  
----- ---- ---------------- ---------------------------------  
1 both  
2 none  
0D: 0H: 1M:20S Event_1  
0D: 0H: 0M: 0S Event_2  
3 log  
0D: 0H: 0M: 0S Event_3  
4 trap  
0D: 0H: 0M: 0S Event_4  
5 both  
0D: 0H: 0M: 0S Log and trap event for Link Down  
0D: 0H: 0M: 0S Log and trap event for Link Up  
0D: 0H: 0M: 0S Send log and trap for icmpInMsg  
0D: 0H: 0M: 0S Send log and trap for icmpInEchos  
0D: 0H: 0M: 0S Event_100  
10 both  
11 both  
15 both  
100 both  
The following table describes the RMON Event Information parameters.  
Table 43 RMON Event Information  
Command  
Index  
Usage  
Displays the index number that identifies each event instance.  
Displays the type of notification provided for this event, as follows: log, trap, both.  
Type  
Last Sent  
Displays the time that passed since the last switch reboot, when the most recent event was  
triggered. This value is cleared when the switch reboots.  
Description  
Displays a text description of the event.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Information Commands  
Link status information  
The following command displays link information:  
show interface link  
Command mode: All except User EXEC  
------------------------------------------------------------------  
Port Speed Duplex Flow Ctrl Link  
---- ----- -------- --TX-----RX-- ------  
1
2
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
10000  
100  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
full  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
yes  
down  
down  
down  
down  
down  
down  
down  
down  
up  
3
4
5
6
7
8
9
10  
11  
12  
13  
14  
15  
16  
17  
18  
19  
20  
21  
down  
down  
down  
down  
down  
down  
down  
up  
10000  
10000  
10000  
10000  
down  
down  
down  
down  
Use this command to display link status information about each port on a switch, including:  
Port number  
Port speed (10000 Mb/s or 100 Mb/s)  
Duplex mode (half, full, or any)  
Flow control for transmit and receive (no, yes, or any)  
Link status (up, down, or disabled)  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Port information  
The following command displays port information:  
show interface information  
Command mode: All except User EXEC  
Port Tag RMON PVID  
NAME  
VLAN(s)  
---- --- ---- ---- -------------- -------------------------------  
1 n d  
2 n d  
3 n d  
4 n d  
5 n d  
6 n d  
7 n d  
8 n d  
9 n d  
10 n d  
11 n d  
12 n d  
13 n d  
14 n d  
15 n d  
16 n d  
1 Downlink1  
1 Downlink2  
1 Downlink3  
1 Downlink4  
1 Downlink5  
1 Downlink6  
1 Downlink7  
1 Downlink8  
1 Downlink9  
1 Downlink10  
1 Downlink11  
1 Downlink12  
1 Downlink13  
1*Downlink14  
1*Downlink15  
1*Downlink16  
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
17 n d 4095 Mgmt  
4095  
1
18 n d  
19 n d  
20 n d  
21 n d  
1*Uplink1  
1*Uplink2  
1*Uplink3  
1*Uplink4  
1
1
1
* = PVID is tagged.  
Port information includes:  
Port number  
Whether the port uses VLAN tagging or not (yor n)  
Whether Remote Monitoring (RMON) is enabled or disabled (eor d)  
Port VLAN ID (PVID)  
Port name  
VLAN membership  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Logical Port to GEA Port mapping  
The following command displays information about GEA ports:  
show geaport  
Command mode: All  
Logical Port GEA Port(0-based) GEA Unit  
------------ ----------------- ---------  
1
2
2
4
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
3
6
4
8
5
10  
12  
14  
16  
3
6
7
8
9
10  
11  
12  
13  
14  
15  
16  
17  
18  
19  
20  
21  
5
7
9
11  
13  
15  
17  
255  
18  
19  
0
1
This display correlates the logical port number to the GEA unit on which each port resides.  
Fiber Port SFP status  
The following command displays XFP information:  
show sfp  
Command mode: All  
------------------------------------------  
Port Device TX-Enable RX-Signal TX-Fault  
------ ------ --------- --------- --------  
XFP1 SR-XFP enabled  
XFP2 SR-XFP enabled  
XFP3 SR-XFP enabled  
ok  
LOST  
ok  
N/A  
N/A  
N/A  
XFP4 SR-XFP **** NOT Installed ****  
This command displays the status of the Small Form Pluggable (SFP) module on each Fiber External Port.  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Information Commands  
Uplink Failure Detection information  
The following command displays Uplink Failure Detection (UFD) information:  
show ufd  
Command mode: All except User EXEC  
Uplink Failure Detection: Enabled  
LtM status: Down  
Member  
STG  
STG State  
Link Status  
-----------  
down  
--------- ---  
------------  
port 20  
1
10  
15  
DISABLED  
DISABLED *  
DISABLED *  
* = STP turned off for this port.  
LtD status: Auto Disabled  
Member  
Link Status  
-----------  
disabled  
---------  
port 1  
port 2  
port 3  
port 4  
disabled  
disabled  
disabled  
Uplink Failure Detection (UFD) information includes:  
UFD status, either enabled or disabled  
LtM status and member ports  
Spanning Tree status for LtM ports  
LtD status and member ports  
Information dump  
The following command dumps switch information:  
show information-dump  
Command mode: All  
Use the dumpcommand to dump all switch information available from switch memory (10K or more,  
depending on your configuration). This data is useful for tuning and debugging switch performance.  
If you want to capture dump data to a file, set the communication software on your workstation to capture  
session data prior to issuing the dump commands.  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Statistics Commands  
Introduction  
You can view switch performance statistics in the user, operator, and administrator command modes. This  
chapter discusses how to use the ISCLI to display switch statistics.  
The following table describes general Statistics commands.  
Table 44 Statistics commands  
Command  
Usage  
show layer3 counters  
Displays Layer 3 Statistics.  
Command mode: All  
show snmp-server counters  
show ntp counters  
Displays SNMP statistics.  
Command mode: All  
Displays Network Time Protocol (NTP) Statistics.  
You can execute the clear command option to delete all statistics.  
Command mode: All  
clear ntp  
Clears Network Time Protocol (NTP) Statistics.  
Command mode: All  
show ufd counters  
show counters  
Displays Uplink Failure Detection statistics.  
Command mode: All  
Dumps all switch statistics. Use this command to gather data for tuning and  
debugging switch performance. If you want to capture dump data to a file,  
set your communication software on your workstation to capture session  
data prior to issuing the dumpcommand.  
Command mode: All  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
Port Statistics  
The following table describes the Port Statistics commands. The following sections provide more detailed  
information and commands.  
Table 45 Port Statistics commands  
Command  
Usage  
show interface port <port number> dot1x  
counters  
Displays IEEE 802.1x statistics for the port.  
Command mode: All  
show interface port <port number>  
bridging-counters  
Displays bridging (“dot1”) statistics for the port.  
Command mode: All  
show interface port <port number>  
ethernet-counters  
Displays Ethernet (“dot3”) statistics for the port.  
Command mode: All  
show interface port <port number>  
interface-counters  
Displays interface statistics for the port.  
Command mode: All  
show interface port <port number> ip-  
counters  
Displays Internet Protocol statistics for the port.  
Command mode: All  
show interface port <port number> link-  
counters  
Displays link statistics for the port.  
Command mode: All  
show interface port <port number> rmon-  
counters  
Displays Remote Monitoring (RMON) statistics for the  
port.  
Command mode: All  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
802.1x statistics  
Use the following command to display the 802.1x authenticator statistics of the selected port:  
show interface port <port number> dot1x counters  
Command mode: All  
Authenticator Statistics:  
eapolFramesRx  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
eapolFramesTx  
eapolStartFramesRx  
eapolLogoffFramesRx  
eapolRespIdFramesRx  
eapolRespFramesRx  
eapolReqIdFramesTx  
eapolReqFramesTx  
invalidEapolFramesRx = 0  
eapLengthErrorFramesRx = 0  
lastEapolFrameVersion = 0  
lastEapolFrameSource = 00:00:00:00:00:00  
Authenticator Diagnostics:  
authEntersConnecting  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
= 0  
authEapLogoffsWhileConnecting  
authEntersAuthenticating  
authSuccessesWhileAuthenticating  
authTimeoutsWhileAuthenticating  
authFailWhileAuthenticating  
authReauthsWhileAuthenticating  
authEapStartsWhileAuthenticating  
authEapLogoffWhileAuthenticating  
authReauthsWhileAuthenticated  
authEapStartsWhileAuthenticated  
authEapLogoffWhileAuthenticated  
backendResponses  
backendAccessChallenges  
backendOtherRequestsToSupplicant  
backendNonNakResponsesFromSupplicant = 0  
backendAuthSuccesses  
backendAuthFails  
= 0  
= 0  
The following table describes the 802.1x authenticator diagnostics for a selected port:  
Table 46 802.1x statistics for port  
Statistics  
Description  
Authenticator Diagnostics  
authEntersConnecting  
Total number of times that the state machine transitions to the  
CONNECTING state from any other state.  
authEapLogoffsWhileConnecting  
Total number of times that the state machine transitions from  
CONNECTING to DISCONNECTED as a result of receiving an  
EAPOL-Logoff message.  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
Table 46 802.1x statistics for port  
Statistics  
Description  
authEntersAuthenticating  
Total number of times that the state machine transitions from  
CONNECTING to AUTHENTICATING, as a result of an  
EAPResponse/Identitymessage being received from the  
Supplicant.  
authSuccessesWhileAuthenticating  
Total number of times that the state machine transitions from  
AUTHENTICATING to AUTHENTICATED, as a result of the Backend  
Authentication state machine indicating successful authentication of  
the Supplicant.  
authTimeoutsWhileAuthenticating  
authFailWhileAuthenticating  
authReauthsWhileAuthenticating  
authEapStartsWhileAuthenticating  
authEapLogoffWhileAuthenticating  
authReauthsWhileAuthenticated  
authEapStartsWhileAuthenticated  
authEapLogoffWhileAuthenticated  
backendResponses  
Total number of times that the state machine transitions from  
AUTHENTICATING to ABORTING, as a result of the Backend  
Authentication state machine indicating authentication timeout.  
Total number of times that the state machine transitions from  
AUTHENTICATING to HELD, as a result of the Backend  
Authentication state machine indicating authentication failure.  
Total number of times that the state machine transitions from  
AUTHENTICATING to ABORTING, as a result of a re-authentication  
request  
Total number of times that the state machine transitions from  
AUTHENTICATING to ABORTING, as a result of an EAPOL-Start  
message being received from the Supplicant.  
Total number of times that the state machine transitions from  
AUTHENTICATING to ABORTING, as a result of an EAPOL-Logoff  
message being received from the Supplicant.  
Total number of times that the state machine transitions from  
AUTHENTICATED to CONNECTING, as a result of a re-  
authentication request.  
Total number of times that the state machine transitions from  
AUTHENTICATED to CONNECTING, as a result of an EAPOL-Start  
message being received from the Supplicant.  
Total number of times that the state machine transitions from  
AUTHENTICATED to DISCONNECTED, as a result of an  
EAPOLLogoffmessage being received from the Supplicant.  
Total number of times that the state machine sends an initial Access-  
Request packet to the Authentication server. Indicates that the  
Authenticator attempted communication with the Authentication  
Server.  
backendAccessChallenges  
Total number of times that the state machine receives an initial  
Access-Challenge packet from the Authentication server. Indicates  
that the Authentication Server has communication with the  
Authenticator.  
backendOtherRequestsToSupplicant  
Total number of times that the state machine sends an EAP-Request  
packet (other than an Identity, Notification, Failure, or Success  
message) to the Supplicant. Indicates that the Authenticator chose an  
EAP-method.  
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Statistics Commands  
Table 46 802.1x statistics for port  
Statistics  
Description  
backendNonNakResponsesFrom  
Supplicant  
Total number of times that the state machine receives a response from  
the Supplicant to an initial EAP-Request, and the response is  
something other than EAP-NAK. Indicates that the Supplicant can  
respond to the Authenticators chosen EAP-method.  
backendAuthSuccesses  
backendAuthFails  
Total number of times that the state machine receives an Accept  
message from the Authentication Server. Indicates that the Supplicant  
has successfully authenticated to the Authentication Server.  
Total number of times that the state machine receives a Reject  
message from the Authentication Server. Indicates that the Supplicant  
has not authenticated to the Authentication Server.  
Bridging statistics  
Use the following command to display the bridging statistics of the selected port:  
show interface port <port number> bridging-counters  
Command mode: All  
Bridging statistics for port 1:  
dot1PortInFrames:  
63242584  
dot1PortOutFrames:  
63277826  
dot1PortInDiscards:  
0
0
0
dot1TpLearnedEntryDiscards:  
dot1StpPortForwardTransitions:  
The following table describes the bridging statistics for a selected port:  
Table 47 Bridging statistics for port  
Statistics  
Description  
dot1PortInFrames  
The number of frames that have been received by this port from its  
segment.  
A frame received on the interface corresponding to this port is counted  
by this object, if and only if, it is for a protocol being processed by the  
local bridging function, including bridge management frames.  
dot1PortOutFrames  
dot1PortInDiscards  
The number of frames that have been transmitted by this port to its  
segment.  
A frame transmitted on the interface corresponding to this port is counted  
by this object, if and only if, it is for a protocol being processed by the  
local bridging function, including bridge management frames.  
Count of valid frames received which were discarded (that is, filtered) by  
the forwarding process.  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 47 Bridging statistics for port  
Statistics  
Description  
dot1TpLearnedEntryDiscards  
The total number of Forwarding Database entries, which have been or  
would have been learned, but have been discarded due to a lack of  
space to store them in the Forwarding Database.  
If this counter is increasing, it indicates that the Forwarding Database is  
regularly becoming full (a condition which has adverse performance  
effects on the sub network).  
If this counter has a significant value but is not presently increasing, it  
indicates that the problem has been occurring but is not persistent.  
dot1StpPortForwardTransitions  
The number of times this port has transitioned from the Learning state to  
the Forwarding state.  
Ethernet statistics  
Use the following command to display the ethernet statistics of the selected port:  
show interface port <port number> ethernet-counters  
Command mode: All  
Ethernet statistics for port 1:  
dot3StatsAlignmentErrors:  
0
0
dot3StatsFCSErrors:  
dot3StatsSingleCollisionFrames:  
dot3StatsMultipleCollisionFrames:  
dot3StatsLateCollisions:  
0
0
0
dot3StatsExcessiveCollisions:  
dot3StatsInternalMacTransmitErrors:  
dot3StatsFrameTooLongs:  
0
NA  
0
dot3StatsInternalMacReceiveErrors:  
0
The following table describes the Ethernet statistics for a selected port:  
Table 48 Ethernet statistics for port  
Statistics  
Description  
dot3StatsAlignmentErrors  
A count of frames received on a particular interface that are not an  
integral number of octets in length and do not pass the Frame  
Check Sequence (FCS) check.  
The count represented by an instance of this object is incremented  
when the alignmentErrorstatus is returned by the MAC service  
to the Logical Link Control (LLC) (or other MAC user).  
Received frames for which multiple error conditions obtained are,  
according to the conventions of IEEE 802.3 Layer Management,  
counted exclusively according to the error status presented to the  
LLC.  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 48 Ethernet statistics for port  
Statistics  
Description  
dot3StatsFCSErrors  
A count of frames received on a particular interface that are an  
integral number of octets in length but do not pass the Frame  
Check Sequence (FCS) check.  
The count represented by an instance of this object is incremented  
when the frameCheckErrorstatus is returned by the MAC  
service to the LLC (or other MAC user).  
Received frames for which multiple error conditions obtained are,  
according to the conventions of IEEE 802.3 Layer Management,  
counted exclusively according to the error status presented to the  
LLC.  
dot3StatsSingleCollisionFrames  
dot3StatsMultipleCollisionFrames  
dot3StatsLateCollisions  
A count of successfully transmitted frames on a particular interface  
for which transmission is inhibited by exactly one collision.  
A frame that is counted by an instance of this object is also  
counted by the corresponding instance of the ifOutUcastPkts,  
ifOutMulticastPkts, or ifOutBroadcastPkts, and is not  
counted by the corresponding instance of the  
dot3StatsMultipleCollisionFrameobject.  
A count of successfully transmitted frames on a particular interface  
for which transmission is inhibited by more than one collision.  
A frame that is counted by an instance of this object is also  
counted by the corresponding instance of either the  
ifOutUcastPkts, ifOutMulticastPkts, or  
ifOutBroadcastPkts, and is not counted by the corresponding  
instance of the dot3StatsSingleCollisionFramesobject.  
The number of times that a collision is detected on a particular  
interface later than 512 bit-times into the transmission of a packet.  
Five hundred and twelve bit-times corresponds to 51.2  
microseconds on a 10 Mbps system. A (late) collision included in a  
count represented by an instance of this object is also considered  
as a (generic) collision for purposes of other collision-related  
statistics.  
dot3StatsExcessiveCollisions  
A count of frames for which transmission on a particular interface  
fails due to excessive collisions.  
dot3StatsInternalMacTransmitErrors  
A count of frames for which transmission on a particular interface  
fails due to an internal MAC sublayer transmit error.  
A frame is only counted by an instance of this object if it is not  
counted by the corresponding instance of either the  
dot3StatsLateCollisionsobject, the  
dot3StatsExcessiveCollisionsobject, or the  
dot3StatsCarrierSenseErrorsobject.  
The precise meaning of the count represented by an instance of this  
object is implementation specific. In particular, an instance of this  
object may represent a count of transmission errors on a particular  
interface that are not otherwise counted.  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Statistics Commands  
Table 48 Ethernet statistics for port  
Statistics  
Description  
dot3StatsFrameTooLongs  
A count of frames received on a particular interface that exceeds  
the maximum permitted frame size.  
The count represented by an instance of this object is incremented  
when the frameTooLongstatus is returned by the MAC service to  
the LLC (or other MAC user).  
Received frames for which multiple error conditions obtained are,  
according to the conventions of IEEE 802.3 Layer Management,  
counted exclusively according to the error status presented to the  
LLC.  
dot3StatsInternalMacReceiveErrors  
A count of frames for which reception on a particular interface fails  
due to an internal MAC sublayer receive error.  
A frame is only counted by an instance of this object if it is not  
counted by the corresponding instance of the  
dot3StatsFrameTooLongsobject, the  
dot3StatsAlignmentErrorsobject, or the  
dot3StatsFCSErrorsobject.  
The precise meaning of the count represented by an instance of this  
object is implementation specific. In particular, an instance of this  
object may represent a count of received errors on a particular  
interface that are not otherwise counted.  
Interface statistics  
Use the following command to display the interface statistics of the selected port:  
show interface port <port number> interface-counters  
Command mode: All  
Interface statistics for port 1:  
ifHCIn Counters  
ifHCOut Counters  
Octets:  
51697080313  
51721056808  
UcastPkts:  
BroadcastPkts:  
MulticastPkts:  
Discards:  
65356399  
65385714  
0
0
0
0
6516  
0
0
Errors:  
21187  
The following table describes the interface (IF) statistics for a selected port:  
Table 49 Interface statistics for port  
Statistics  
Description  
Octets—IfHCIn  
The total number of octets received on the interface, including framing characters.  
UcastPkts—IfHCIn  
The number of packets, delivered by this sublayer to a higher sublayer, which were  
not addressed to a multicast or broadcast address at this sublayer.  
BroadcastPkts—IfHCIn  
The number of packets, delivered by this sublayer to a higher sublayer, which were  
addressed to a broadcast address at this sublayer.  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
Table 49 Interface statistics for port  
Statistics  
Description  
MulticastPkts—IfHCIn  
The total number of packets, delivered by this sublayer. These are the packets that  
higher-level protocols requested to be transmitted, and which were addressed to a  
multicast address at this sublayer, including those that were discarded or not sent.  
For a MAC layer protocol, this includes both group and functional addresses.  
Discards—IfHCIn  
Errors—IfHCIn  
The number of inbound packets which were chosen to be discarded even though  
no errors were detected to prevent their being delivered to a higher-layer protocol.  
One possible reason for discarding such a packet could be to free up buffer space.  
For packet-oriented interfaces, the number of inbound packets that contained errors  
preventing them from being delivered to a higher-layer protocol.  
For character-oriented or fixed-length interfaces, the number of inbound  
transmission units that contained errors preventing them from being deliverable to a  
higher-layer protocol.  
Octets—IfHCOut  
The total number of octets transmitted out of the interface, including framing  
characters.  
UcastPkts—IfHCOut  
The total number of packets that higher-level protocols requested to be transmitted,  
and which were not addressed to a multicast or broadcast address at this sublayer,  
including those that were discarded or not sent.  
BroadcastPkts—IfHCOut  
MulticastPkts—IfHCOut  
The total number of packets that higher-level protocols requested to be transmitted,  
and which were addressed to a broadcast address at this sublayer, including those  
that were discarded or not sent. This object is a 64-bit version of  
ifOutBroadcastPkts.  
The total number of packets that higher-level protocols requested to be transmitted,  
and which were addressed to a multicast address at this sublayer, including those  
that were discarded or not sent.  
For a MAC layer protocol, this includes both group and functional addresses. This  
object is a 64-bit version of ifOutMulticastPkts.  
Discards—IfHCOut  
Errors—IfHCOut  
The number of outbound packets that were chosen to be discarded even though no  
errors had been detected to prevent their being transmitted. One possible reason  
for discarding such a packet could be to free up buffer space.  
For packet-oriented interfaces, the number of outbound packets that could not be  
transmitted because of errors.  
For character-oriented or fixed-length interfaces, the number of outbound  
transmission units that could not be transmitted because of errors.  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Statistics Commands  
Internet Protocol (IP) statistics  
Use the following command to display the interface protocol statistics of the selected port:  
show interface port <port number> ip-counters  
Command mode: All  
GEA IP statistics for port 1:  
ipInReceives :  
ipInHeaderError:  
ipInDiscards :  
0
0
0
The following table describes the Internet Protocol (IP) statistics for a selected port:  
Table 50 IP statistics for port  
Statistics  
Description  
ipInReceives  
The total number of input datagrams received from interfaces, including those received  
in error.  
ipInHeaderError  
ipInDiscards  
The number of input datagrams discarded because the IP address in their IP header's  
destination field was not a valid address to be received at this entity (the switch).  
The number of input IP datagrams for which no problems were encountered to prevent  
their continued processing, but which were discarded (for example, for lack of buffer  
space). Note that this counter does not include any datagrams discarded while awaiting  
re-assembly.  
Link statistics  
Use the following command to display the link statistics of the selected port:  
show interface port <port number> link-counters  
Command mode: All  
Link statistics for port 1:  
linkStateChange:  
2
The following table describes the link statistics for a selected port:  
Table 51 Link statistics for port  
Statistic  
Description  
linkStateChange  
The total number of link state changes.  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Statistics Commands  
Layer 2 statistics  
The following table describes the Layer 2 statistics commands. The following sections provide more  
detailed information and commands.  
Table 52 Layer 2 Statistics commands  
Command  
Usage  
show mac-address-table counters  
Displays the Forwarding Database statistics.  
Command mode: All  
show interface port <port number>  
lacp counters  
Displays Link Aggregation Control Protocol (LACP) statistics.  
Command mode: All  
show layer2 counters  
Displays all Layer 2 statistics.  
Command mode: All  
FDB statistics  
Use the following command to display statistics regarding the use of the forwarding database, including  
the number of new entries, finds, and unsuccessful searches:  
show mac-address-table counters  
Command mode: All  
FDB statistics:  
current:  
91 hiwat:  
91  
These commands enable you to display statistics regarding the use of the forwarding database, including  
the number of current entries and the maximum number of entries ever recorded.  
The following table describes the Forwarding Database (FDB) statistics:  
Table 53 Forwarding Database statistics  
Statistic  
Description  
current  
Current number of entries in the Forwarding Database.  
Highest number of entries recorded at any given time in the Forwarding Database.  
hiwat  
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Statistics Commands  
LACP statistics  
Use the following command to display Link Aggregation Control Protocol (LACP) statistics:  
show interface port <port number> lacp counters  
Command mode: All  
Valid LACPDUs received  
- 0  
- 0  
Valid Marker PDUs received  
Valid Marker Rsp PDUs received - 0  
Unknown version/TLV type  
Illegal subtype received  
LACPDUs transmitted  
- 0  
- 0  
- 0  
- 0  
- 0  
Marker PDUs transmitted  
Marker Rsp PDUs transmitted  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
Layer 3 statistics  
The following table describes basic Layer 3 statistics commands. The following sections provide more  
detailed information and commands.  
Table 54 Layer 3 Statistics commands  
Command  
Usage  
show ip counters  
Displays IP statistics.  
Command mode: All except User EXEC  
clear ip counters  
Clears IP statistics. Use this command with caution as it deletes all  
the IP statistics.  
Command mode: All except User EXEC  
show ip route counters  
show ip arp counters  
show ip dns counters  
show ip icmp counters  
show ip tcp counters  
show ip udp counters  
Displays route statistics.  
Command mode: All except User EXEC  
Displays Address Resolution Protocol (ARP) statistics.  
Command mode: All except User EXEC  
Displays Domain Name System (DNS) statistics.  
Command mode: All except User EXEC  
Displays ICMP statistics.  
Command mode: All except User EXEC  
Displays Transmission Control Protocol (TCP) statistics.  
Command mode: All except User EXEC  
Displays User Datagram Protocol (UDP) statistics. Add the argument,  
clear, to clear UDP statistics.  
Command mode: All except User EXEC  
show ip igmp counters  
show layer3 igmp-groups  
Displays IGMP statistics.  
Command mode: All except User EXEC  
Displays the total number of IGMP groups that are  
learned/configured on the switch.  
Command mode: All except User EXEC  
show layer3 ipmc-groups  
clear ip igmp [<1-4094>] counters  
show ip ospf counters  
Displays the total number of current IP multicast groups.  
Command mode: All except User EXEC  
Clears all IGMP statistics for the selected VLANs.  
Command mode: All above Priv EXEC  
Displays OSPF statistics.  
Command mode: All above Priv EXEC  
clear ip ospf counters  
show ip vrrp counters  
Clears all OSPF statistics.  
Command mode: All above Priv EXEC  
When virtual routers are configured, you can display VRRP statistics:  
Command mode: All above Priv EXEC  
clear ip vrrp counters  
Clears VRRP statistics.  
Command mode: All above Priv EXEC  
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
Table 54 Layer 3 Statistics commands  
Command  
Usage  
show ip rip counters  
Displays Routing Information Protocol (RIP) statistics.  
Command mode: All above Priv EXEC  
clear ip rip counters  
show ip gea  
Clears Routing Information Protocol (RIP) statistics.  
Command mode: All above Priv EXEC  
Displays GEA statistics.  
Command mode: All above Priv EXEC  
show layer3 counters  
Displays all Layer 3 statistics.  
Command mode: All except User EXEC  
IP statistics  
The following command displays IP statistics:  
show ip counters  
Command mode: All except User EXEC  
IP statistics:  
ipInReceives: 36475  
ipInAddrErrors: 905  
ipInUnknownProtos: 0  
ipInDelivers: 4103  
ipOutDiscards: 0  
ipInHdrErrors: 0  
ipInDiscards: 0  
ipOutRequests: 30974  
ipDefaultTTL: 255  
The following table describes the IP statistics:  
Table 55 IP statistics  
Statistics  
Description  
ipInReceives  
The total number of input datagrams received from interfaces, including those  
received in error.  
ipInHdrErrors  
ipInAddrErrors  
The number of input datagrams discarded due to errors in their IP headers,  
including bad checksums, version number mismatch, other format errors, time-to-live  
exceeded, errors discovered in processing their IP options, and so on.  
The number of input datagrams discarded because the IP address in their IP header  
destination field was not a valid address to be received at this switch. This count  
includes invalid addresses (for example, 0.0.0.0) and addresses of unsupported  
classes (for example, Class E).  
For entities which are not IP gateways and therefore do not forward datagrams, this  
counter includes datagrams discarded because the destination address was not a  
local address.  
ipInUnknownProtos  
The number of locally addressed datagrams received successfully but discarded  
because of an unknown or unsupported protocol.  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 55 IP statistics  
Statistics  
Description  
ipInDiscards  
The number of input IP datagrams for which no problems were encountered to  
prevent their continued processing, but which were discarded (for example, for lack  
of buffer space).  
This counter does not include any datagrams discarded while awaiting re-assembly.  
ipInDelivers  
ipOutRequests  
The total number of input datagrams successfully delivered to IP user-protocols  
(including ICMP).  
The total number of IP datagrams that local IP user-protocols (including ICMP)  
supplied to IP in requests for transmission.  
This counter does not include any datagrams counted in ipForwDatagrams.  
ipOutDiscards  
ipDefaultTTL  
The number of output IP datagrams for which no problem was encountered to  
prevent their transmission to their destination, but which were discarded (for  
example, for lack of buffer space).  
This counter would include datagrams counted in ipForwDatagramsif any such  
packets met this (discretionary) discard criterion.  
The default value inserted into the Time-To-Live (TTL) field of the IP header of  
datagrams originated at this switch, whenever a TTL value is not supplied by the  
transport layer protocol.  
Route statistics  
The following command displays route statistics:  
show ip route counters  
Command mode: All except User EXEC  
Route statistics:  
ipRoutesCur:  
ipRoutesMax:  
8 ipRoutesHighWater:  
4096  
8
The following table describes the Route statistics:  
Table 56 Route statistics  
Statistics  
Description  
ipRoutesCur  
The total number of outstanding routes in the route table.  
The maximum number of supported routes.  
ipRoutesMax  
ipRoutesHighWater  
The highest number of routes ever recorded in the route table.  
81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
ARP statistics  
The following command displays Address Resolution Protocol statistics.  
show ip arp counters  
Command mode: All except User EXEC  
ARP statistics:  
arpEntriesCur:  
2 arpEntriesHighWater:  
4095  
4
arpEntriesMax:  
The following table describes the Address Resolution Protocol (ARP) statistics:  
Table 57 ARP statistics  
Statistic  
Description  
arpEntriesCur  
arpEntriesMax  
arpEntriesHighWater  
The total number of outstanding ARP entries in the ARP table.  
The maximum number of ARP entries that are supported.  
The highest number of ARP entries ever recorded in the ARP table.  
DNS statistics  
show ip dns counters  
Command mode: All except User EXEC  
DNS statistics:  
dnsInRequests:  
0 dnsOutRequests:  
0
0
dnsBadRequests:  
The following table describes the Domain Name System (DNS) statistics:  
Table 58 DNS statistics  
Statistic  
Description  
dnsInRequests  
dnsOutRequests  
dnsBadRequests  
The total number of DNS request packets that have been received.  
The total number of DNS response packets that have been transmitted.  
The total number of DNS request packets received that were dropped.  
82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
ICMP statistics  
The following command displays ICMP statistics:  
show ip icmp counters  
Command mode: All except User EXEC  
ICMP statistics:  
icmpInMsgs:  
245802 icmpInErrors:  
1393  
icmpInDestUnreachs:  
icmpInParmProbs:  
icmpInRedirects:  
icmpInEchoReps:  
icmpInTimestampReps:  
icmpInAddrMaskReps:  
icmpOutErrors:  
41 icmpInTimeExcds:  
0 icmpInSrcQuenchs:  
0 icmpInEchos:  
0
0
18  
244350 icmpInTimestamps:  
0 icmpInAddrMasks:  
0
0
0 icmpOutMsgs:  
253810  
0 icmpOutDestUnreachs:  
0 icmpOutParmProbs:  
0 icmpOutRedirects:  
253777 icmpOutEchoReps:  
0 icmpOutTimestampReps:  
0 icmpOutAddrMaskReps:  
15  
0
icmpOutTimeExcds:  
icmpOutSrcQuenchs:  
icmpOutEchos:  
0
18  
0
icmpOutTimestamps:  
icmpOutAddrMasks:  
0
The following table describes the Internet Control Messaging Protocol (ICMP) statistics:  
Table 59 ICMP statistics  
Statistics  
Description  
icmpInMsgs  
The total number of ICMP messages which the switch received. Note that this counter  
includes all those counted by icmpInErrors.  
icmpInErrors  
The number of ICMP messages which the switch received but determined as having  
ICMP specific errors (for example bad ICMP checksums and bad length).  
icmpInDestUnreachs  
icmpInTimeExcds  
icmpInParmProbs  
icmpInSrcQuenchs  
The number of ICMP Destination Unreachable messages received.  
The number of ICMP Time Exceeded messages received.  
The number of ICMP Parameter Problem messages received.  
The number of ICMP Source Quench (buffer almost full, stop sending data) messages  
received.  
icmpInRedirects  
icmpInEchos  
The number of ICMP Redirect messages received.  
The number of ICMP Echo (request) messages received.  
The number of ICMP Echo Reply messages received.  
The number of ICMP Timestamp (request) messages received.  
The number of ICMP Timestamp Reply messages received.  
The number of ICMP Address Mask Request messages received.  
The number of ICMP Address Mask Reply messages received.  
icmpInEchoReps  
icmpInTimestamps  
icmpInTimestampReps  
icmpInAddrMasks  
icmpInAddrMaskReps  
icmpOutMsgs  
The total number of ICMP messages which this switch attempted to send. Note that  
this counter includes all those counted by icmpOutErrors.  
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 59 ICMP statistics  
Statistics  
Description  
icmpOutErrors  
The number of ICMP messages that this switch did not send due to problems  
discovered within ICMP such as a lack of buffer. This value should not include errors  
discovered outside the ICMP layer such as the inability of IP to route the resultant  
datagram. In some implementations there may be no types of errors that contribute to  
this counter's value.  
icmpOutDestUnreachs  
icmpOutTimeExcds  
icmpOutParmProbs  
icmpOutSrcQuenchs  
The number of ICMP Destination Unreachable messages sent.  
The number of ICMP Time Exceeded messages sent.  
The number of ICMP Parameter Problem messages sent.  
The number of ICMP Source Quench (buffer almost full, stop sending data) messages  
sent.  
icmpOutRedirects  
icmpOutEchos  
The number of ICMP Redirect messages sent.  
The number of ICMP Echo (request) messages sent.  
The number of ICMP Echo Reply messages sent.  
icmpOutEchoReps  
icmpOutTimestamps  
icmpOutTimestampReps  
icmpOutAddrMasks  
icmpOutAddrMaskReps  
The number of ICMP Timestamp (request) messages sent.  
The number of ICMP Timestamp Reply messages sent.  
The number of ICMP Address Mask Request messages sent.  
The number of ICMP Address Mask Reply messages sent.  
TCP statistics  
The following command displays TCP statistics:  
show ip tcp counters  
Command mode: All except User EXEC  
TCP statistics:  
tcpRtoAlgorithm:  
tcpRtoMax:  
4 tcpRtoMin:  
0
240000 tcpMaxConn:  
252214 tcpPassiveOpens:  
528 tcpEstabResets:  
756401 tcpOutSegs:  
0 tcpInErrs:  
512  
tcpActiveOpens:  
tcpAttemptFails:  
tcpInSegs:  
7
4
756655  
tcpRetransSegs:  
tcpCurBuff:  
0
3
0 tcpCurConn:  
tcpOutRsts:  
417  
The following table describes the Transmission Control Protocol (TCP) statistics:  
Table 60 TCP statistics  
Statistics  
Description  
tcpRtoAlgorithm  
The algorithm used to determine the timeout value used for retransmitting unacknowledged  
octets.  
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 60 TCP statistics  
Statistics  
Description  
tcpRtoMin  
The minimum value permitted by a TCP implementation for the retransmission timeout,  
measured in milliseconds. More refined semantics for objects of this type depend upon the  
algorithm used to determine the retransmission timeout. In particular, when the timeout  
algorithm is rsre(3), an object of this type has the semantics of the LBOUND quantity  
described in Request For Comments (RFC) 793.  
tcpRtoMax  
The maximum value permitted by a TCP implementation for the retransmission timeout,  
measured in milliseconds. More refined semantics for objects of this type depend upon the  
algorithm used to determine the retransmission timeout. In particular, when the timeout  
algorithm is rsre(3), an object of this type has the semantics of the UBOUND quantity  
described in RFC 793.  
tcpMaxConn  
The limit on the total number of TCP connections the switch can support. In entities where the  
maximum number of connections is dynamic, this object should contain the value -1.  
tcpActiveOpens  
tcpPassiveOpens  
tcpAttemptFails  
The number of times TCP connections have made a direct transition to the SYN-SENT state  
from the CLOSED state.  
The number of times TCP connections have made a direct transition to the SYN-RCVD state  
from the LISTEN state.  
The number of times TCP connections have made a direct transition to the CLOSED state  
from either the SYN-SENT state or the SYN-RCVD state, plus the number of times TCP  
connections have made a direct transition to the LISTEN state from the SYN-RCVD state.  
tcpEstabResets  
tcpInSegs  
The number of times TCP connections have made a direct transition to the CLOSED state  
from either the ESTABLISHED state or the CLOSE- WAIT state.  
The total number of segments received, including those received in error. This count includes  
segments received on currently established connections.  
tcpOutSegs  
The total number of segments sent, including those on current connections but excluding  
those containing only retransmitted octets.  
tcpRetransSegs  
The total number of segments retransmitted, that is, the number of TCP segments transmitted  
containing one or more previously transmitted octets.  
tcpInErrs  
tcpCurBuff  
tcpCurConn  
tcpOutRsts  
The total number of segments received in error (for example, bad TCP checksums).  
The total number of outstanding memory allocations from heap by TCP protocol stack.  
The total number of outstanding TCP sessions that are currently opened.  
The number of TCP segments sent containing the reset (RST) flag.  
85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Statistics Commands  
UDP statistics  
The following command displays UDP statistics:  
show ip udp counters  
Command mode: All except User EXEC  
UDP statistics:  
udpInDatagrams:  
udpInErrors:  
54 udpOutDatagrams:  
0 udpNoPorts:  
43  
1578077  
The following table describes the User Datagram Protocol (UDP) statistics:  
Table 61 UDP statistics  
Statistics  
Description  
udpInDatagrams  
udpOutDatagrams  
udpInErrors  
The total number of UDP datagrams delivered to the switch.  
The total number of UDP datagrams sent from this switch.  
The number of received UDP datagrams that could not be delivered for reasons other  
than the lack of an application at the destination port.  
udpNoPorts  
The total number of received UDP datagrams for which there was no application at the  
destination port.  
IGMP Multicast Group statistics  
The following command displays statistics about the use of the IGMP Multicast Groups:  
show ip igmp counters  
Command mode: All except User EXEC  
IGMP Snoop vlan 1 statistics:  
------------------------------------------------------------  
rxIgmpValidPkts:  
0
0
0
0
0
0
0
rxIgmpInvalidPkts:  
0
0
rxIgmpGenQueries:  
rxIgmpGrpSpecificQueries:  
rxIgmpGroupSrcSpecificQueries:  
rxIgmpLeaves:  
rxIgmpReports:  
0
0
0
0
txIgmpReports:  
txIgmpGrpSpecificQueries:  
rxIgmpV3CurrentStateRecords:  
rxIgmpV3FilterChangeRecords:  
txIgmpLeaves:  
rxIgmpV3SourceListChangeRecords:  
These commands enable you to display statistics regarding the use of the IGMP Multicast Groups.  
The following table describes the IGMP statistics:  
Table 62 IGMP statistics  
Statistic  
Description  
rxIgmpValidPkts  
rxIgmpInvalidPkts  
rxIgmpGenQueries  
Total number of valid IGMP packets received  
Total number of invalid packets received  
Total number of General Membership Query packets received  
86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Statistics Commands  
Table 62 IGMP statistics  
Statistic  
Description  
rxIgmpGrpSpecificQueries  
Total number of Membership Query packets received from specific  
groups  
Total number of Group Source  
rxIgmpLeaves  
Specific Queries (GSSQ) received  
Total number of Leave requests received  
Total number of Membership Reports received  
Total number of Membership reports transmitted  
rxIgmpReports  
txIgmpReports  
txIgmpGrpSpecificQueries  
Total number of Membership Query packets transmitted to specific  
groups  
txIgmpLeaves  
Total number of Leave messages transmitted  
Total number of Current State records received  
Total number of Source List Change records received  
Total number of Filter Change records received.  
rxIgmpV3CurrentStateRecords  
rxIgmpV3SourceListChangeRecords  
rxIgmpV3FilterChangeRecords  
OSPF statistics  
The following table describes OSPF statistics commands.  
Table 63 OSPF Statistics commands  
Command  
Usage  
show ip ospf counters general  
Displays OSPF global statistics.  
Command mode: All except User EXEC  
show ip ospf counters aindex [<0-2>]  
Displays area index statistics.  
Command mode: All except User EXEC  
show ip ospf counters interface [<1-249>]  
Displays interface statistics.  
Command mode: All except User EXEC  
87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
OSPF global statistics  
The following command displays OSPF global statistics:  
show ip ospf counters general  
Command mode: All except User EXEC  
OSPF stats  
----------  
Rx/Tx Stats:  
Rx  
Tx  
--------  
--------  
Pkts  
0
23  
4
0
518  
12  
1
hello  
database  
ls requests  
ls acks  
3
7
7
ls updates  
Nbr change stats:  
hello  
9
7
Intf change Stats:  
up 4  
2
0
2
2
2
2
0
0
2
0
0
1
start  
down 2  
n2way  
loop 0  
adjoint ok  
negotiation done  
exchange done  
bad requests  
bad sequence  
loading done  
n1way  
unloop 0  
wait timer 2  
backup 0  
nbr change 5  
rst_ad  
down  
Timers kickoff  
hello  
514  
retransmit  
lsa lock  
lsa ack  
1028  
0
0
0
0
0
dbage  
summary  
ase export  
The following table describes the OSPF global statistics:  
Table 64 OSPF global statistics  
Statistic  
Description  
Rx Tx stats:  
Rx Pkts  
The sum total of all OSPF packets received on all OSPF areas and interfaces.  
The sum total of all OSPF packets transmitted on all OSPF areas and interfaces.  
The sum total of all Hello packets received on all OSPF areas and interfaces.  
The sum total of all Hello packets transmitted on all OSPF areas and interfaces.  
Tx Pkts  
Rx Hello  
Tx Hello  
Rx Database  
The sum total of all Database Description packets received on all OSPF areas and  
interfaces.  
88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 64 OSPF global statistics  
Statistic  
Description  
Tx Database  
The sum total of all Database Description packets transmitted on all OSPF areas and  
interfaces.  
Rx ls Requests  
Tx ls Requests  
The sum total of all Link State Request packets received on all OSPF areas and interfaces.  
The sum total of all Link State Request packets transmitted on all OSPF areas and  
interfaces.  
Rx ls Acks  
Tx ls Acks  
The sum total of all Link State Acknowledgement packets received on all OSPF areas and  
interfaces.  
The sum total of all Link State Acknowledgement packets transmitted on all OSPF areas  
and interfaces.  
Rx ls Updates  
Tx ls Updates  
The sum total of all Link State Update packets received on all OSPF areas and interfaces.  
The sum total of all Link State Update packets transmitted on all OSPF areas and  
interfaces.  
Nbr change stats:  
hello  
The sum total of all Hello packets received from neighbors on all OSPF areas and  
interfaces.  
Start  
The sum total number of neighbors in this state (that is, an indication that Hello packets  
should now be sent to the neighbor at intervals of HelloIntervalseconds) across all  
OSPF areas and interfaces.  
n2way  
The sum total number of bidirectional communication establishment between this router  
and other neighboring routers.  
adjoint ok  
negotiation done  
The sum total number of decisions to be made (again) as to whether an adjacency should  
be established/maintained with the neighbor across all OSPF areas and interfaces.  
The sum total number of neighbors in this state wherein the Master/slave relationship has  
been negotiated, and sequence numbers have been exchanged, across all OSPF areas  
and interfaces.  
exchange done  
The sum total number of neighbors in this state (that is, in an adjacency's final state)  
having transmitted a full sequence of Database Description packets, across all OSPF  
areas and interfaces.  
bad requests  
bad sequence  
The sum total number of Link State Requests which have been received for a link state  
advertisement not contained in the database across all interfaces and OSPF areas.  
The sum total number of Database Description packets which have been received that  
either:  
Has an unexpected DD sequence number  
Unexpectedly has the init bit set  
Has an options field differing from the last Options field received in a Database  
Description packet.  
Any of these conditions indicate that some error has occurred during adjacency  
establishment for all OSPF areas and interfaces.  
loading done  
The sum total number of link state updates received for all out-of-date portions of the  
database across all OSPF areas and interfaces.  
89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Statistics Commands  
Table 64 OSPF global statistics  
Statistic  
Description  
n1way  
The sum total number of Hello packets received from neighbors, in which this router is not  
mentioned across all OSPF interfaces and areas.  
rst_ad  
down  
The sum total number of times the Neighbor adjacency has been reset across all OPSF  
areas and interfaces.  
The total number of Neighboring routers down (that is, in the initial state of a neighbor  
conversation) across all OSPF areas and interfaces.  
Intf Change Stats:  
up  
The sum total number of interfaces up in all OSPF areas.  
The sum total number of interfaces down in all OSPF areas.  
down  
loop  
The sum total of interfaces no longer connected to the attached network across all OSPF  
areas and interfaces.  
unloop  
The sum total number of interfaces, connected to the attached network in all OSPF areas.  
wait timer  
The sum total number of times the Wait Timer has been fired, indicating the end of the  
waiting period that is required before electing a (Backup) Designated Router across all  
OSPF areas and interfaces.  
backup  
The sum total number of Backup Designated Routers on the attached network for all OSPF  
areas and interfaces.  
nbr change  
The sum total number of changes in the set of bidirectional neighbors associated with  
any interface across all OSPF areas.  
Timers Kickoff:  
hello  
The sum total number of times the Hello timer has been fired (which triggers the send of  
a Hello packet) across all OPSF areas and interfaces.  
retransmit  
lsa lock  
lsa ack  
The sum total number of times the Retransmit timer has been fired across all OPSF areas  
and interfaces.  
The sum total number of times the Link State Advertisement (LSA) lock timer has been fired  
across all OSPF areas and interfaces.  
The sum total number of times the LSA Ack timer has been fired across all OSPF areas  
and interfaces.  
dbage  
The total number of times the data base age (Dbage) has been fired.  
The total number of times the Summary timer has been fired.  
summary  
ase export  
The total number of times the Autonomous System Export (ASE) timer has been fired.  
90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Statistics Commands  
VRRP statistics  
Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy  
between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID  
number on each participating VRRP-capable routing device.  
One of the virtual routers is then elected as the master, based on a number of priority criteria, and  
assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers  
will assume routing authority and take control of the virtual router IP address.  
When virtual routers are configured, you can display protocol statistics for VRRP:  
The following command displays statistics for the VRRP LAN:  
show ip vrrp counters  
Command mode: All except User EXEC  
>> Layer 3 Statistics# vrrp  
VRRP statistics:  
vrrpInAdvers:  
0 vrrpBadAdvers:  
0
0
vrrpOutAdvers:  
vrrpBadVersion:  
vrrpBadAddress:  
vrrpBadPassword:  
0 vrrpBadVrid:  
0 vrrpBadData:  
0 vrrpBadInterval:  
0
0
0
The following table describes the VRRP statistics.  
Table 65 VRRP statistics  
Field  
Description  
vrrpInAdvers  
vrrpOutAdvers  
vrrpBadVersion  
vrrpBadAddress  
vrrpBadPassword  
vrrpBadAdvers  
vrrpBadVrid  
The total number of VRRP advertisements that have been received.  
The total number of VRRP advertisements that have been sent.  
The total number of VRRP advertisements that had a bad version number.  
The total number of VRRP advertisements that had a bad address.  
The total number of VRRP advertisements that had a bad password.  
The total number of VRRP advertisements received that were dropped.  
The total number of VRRP advertisements that had a bad virtual router ID.  
The total number of VRRP advertisements that had bad data.  
vrrpBadData  
vrrpBadInterval  
The total number of VRRP advertisements that had a bad interval.  
91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
RIP statistics  
The following command displays RIP statistics:  
show ip rip counters  
Command mode: All except User EXEC  
RIP ALL STATS INFORMATION:  
RIP packets received = 12  
RIP packets sent = 75  
RIP request received = 0  
RIP response received = 12  
RIP request sent = 3  
RIP response sent = 72  
RIP route timeout = 0  
RIP bad size packet received = 0  
RIP bad version received = 0  
RIP bad zeros received = 0  
RIP bad src port received = 0  
RIP bad src IP received = 0  
RIP packets from self received = 0  
GEA Layer 3 statistics  
The following table describes the Layer 3 GEA statistics commands.  
Table 66 Layer 3 GEA statistics commands  
Command  
Usage  
show ip gea bucket <IP address>  
Displays GEA statistics for a specific IP address.  
Command mode: All except User EXEC  
show ip gea  
Displays all GEA statistics.  
Command mode: All except User EXEC  
GEA Layer 3 statistics  
The following command displays GEA statistics:  
show ip gea  
Command mode: All except User EXEC  
GEA L3 statistics:  
Max L3 table size  
: 4096  
Number of L3 entries used  
: 3  
Max LPM table size  
: 512  
: 4  
Number of LPM entries used  
92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Statistics Commands  
Management Processor statistics  
The following table describes the MP-specific Statistics commands. The following sections provide more  
detailed information and commands.  
Table 67 MP-specific Statistics commands  
Command  
Usage  
show mp packet  
Displays packet statistics, to check for leads and load.  
Command mode: All  
show mp tcp-block  
show mp udp-block  
show mp cpu  
Displays all Transmission Control Protocol (TCP) control blocks (TCB) that are in use.  
Command mode: All  
Displays all User Datagram Protocol (UDP) control blocks (UCB) that are in use.  
Command mode: All  
Displays CPU utilization for periods of up to 1, 4, and 64 seconds.  
Command mode: All  
Packet statistics  
The following command displays packet statistics:  
show mp packet  
Command mode: All except User EXEC  
Packet counts:  
allocs:  
mediums:  
jumbos:  
smalls:  
failures:  
36692  
frees:  
36692  
0
0
0
0
mediums hi-watermark:  
jumbos hi-watermark:  
smalls hi-watermark:  
3
0
2
The following table describes the packet statistics.  
Table 68 MP specific packet statistics  
Field  
Description  
allocs  
Total number of packet allocations from the packet buffer pool by the TCP/IP protocol  
stack.  
frees  
Total number of times the packet buffers are freed (released) to the packet buffer pool  
by the TCP/IP protocol stack.  
mediums  
Total number of packet allocations with size between 128 to 1536 bytes from the  
packet buffer pool by the TCP/IP protocol stack.  
mediums hi-watermark  
jumbos  
The highest number of packet allocation with size between 128 to 1536 bytes from  
the packet buffer pool by the TCP/IP protocol stack.  
Total number of packet allocations with more than 1536 bytes from the packet buffer  
pool by the TCP/IP protocol stack.  
jumbos hi-watermark  
The highest number of packet allocation with more than 1536 bytes from the packet  
buffer pool by the TCP/IP protocol stack.  
93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Statistics Commands  
Table 68 MP specific packet statistics  
Field  
Description  
smalls  
Total number of packet allocations with size less than 128 bytes from the packet  
buffer pool by the TCP/IP protocol stack.  
smalls hi-watermark  
failures  
The highest number of packet allocation with size less than 128 bytes from the packet  
buffer pool by the TCP/IP protocol stack.  
Total number of packet allocation failures from the packet buffer pool by the TCP/IP  
protocol stack.  
TCP statistics  
The following command displays TCP statistics:  
show mp tcp-block  
Command mode: All except User EXEC  
All TCP allocated control blocks:  
10ad41e8: 0.0.0.0  
0 <=> 0.0.0.0  
1171 <=> 47.80.23.243  
80 listen  
10ad5790: 47.81.27.5  
23 established  
The following table describes the Transmission Control Protocol (TCP) control block (TCB) statistics shown  
in this example:  
Table 69 TCP statistics  
Description  
Memory  
Example statistic  
10ad41e8/10ad5790  
0.0.0.0/47.81.27.5  
0/1171  
Destination IP address  
Destination port  
Source IP  
0.0.0.0/47.80.23.243  
80/23  
Source port  
State  
listen/established  
94  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Statistics Commands  
UDP statistics  
The following command displays UDP statistics:  
show mp udp-block  
Command mode: All except User EXEC  
All UDP allocated control blocks:  
161: listen  
The following table describes the User Datagram Protocol (UDP) control block (UCB) statistics shown in  
this example:  
Table 70 UDP statistics  
Description  
Control block  
State  
Example Statistic  
161  
listen  
CPU statistics  
The following command displays the CPU utilization statistics:  
show mp cpu  
Command mode: All except User EXEC  
CPU utilization:  
cpuUtil1Second:  
cpuUtil4Seconds:  
cpuUtil64Seconds:  
8%  
9%  
8%  
The following table describes the management port CPU utilization statistics:  
Table 71 CPU statistics  
Statistics  
Description  
cpuUtil1Second  
cpuUtil4Seconds  
cpuUtil64Seconds  
The utilization of MP CPU over 1 second. This is shown as a percentage.  
The utilization of MP CPU over 4 seconds. This is shown as a percentage.  
The utilization of MP CPU over 64 seconds. This is shown as a percentage.  
ACL statistics  
The following command displays the statistics for Access Control Lists (ACLs):  
show access-control counters  
Command mode: All except User EXEC  
Hits for ACL 1: 26057515  
Hits for ACL 2: 26057497  
95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Statistics Commands  
SNMP statistics  
The following command displays SNMP statistics:  
show snmp-server counters  
Command mode: All except User EXEC  
SNMP statistics:  
snmpInPkts:  
54 snmpInBadVersions:  
0 snmpInBadC'tyUses:  
0 snmpEnableAuthTraps:  
54 snmpInBadTypes:  
0 snmpInNoSuchNames:  
0 snmpInReadOnlys:  
0 snmpInTotalReqVars:  
0 snmpInGetRequests:  
52 snmpInSetRequests:  
0 snmpInTraps:  
0
0
snmpInBadC'tyNames:  
snmpInASNParseErrs:  
snmpOutPkts:  
0
0
snmpInTooBigs:  
0
snmpInBadValues:  
snmpInGenErrs:  
0
105  
2
snmpInTotalSetVars:  
snmpInGetNexts:  
0
snmpInGetResponses:  
snmpOutTooBigs:  
0
0 snmpOutNoSuchNames:  
0 snmpOutReadOnlys:  
0 snmpOutGetRequests:  
0 snmpOutSetRequests:  
54 snmpOutTraps:  
2
snmpOutBadValues:  
snmpOutGenErrs:  
0
0
snmpOutGetNexts:  
snmpOutGetResponses:  
snmpSilentDrops:  
0
0
0 snmpProxyDrops:  
0
The following table describes the Simple Network Management Protocol (SNMP) statistics:  
Table 72 SNMP statistics  
Statistics  
Description  
snmpInPkts  
The total number of messages delivered to the SNMP entity from the transport service.  
snmpInBadVersions  
The total number of SNMP messages, which were delivered to the SNMP protocol  
entity and were for an unsupported SNMP version.  
snmpInBadC'tyNames  
snmpInBadC'tyUses  
The total number of SNMP messages delivered to the SNMP entity that used an SNMP  
community name not known to the switch.  
The total number of SNMP messages delivered to the SNMP protocol entity that  
represented an SNMP operation which was not allowed by the SNMP community  
named in the message.  
snmpInASNParseErrs  
The total number of ASN.1 (Abstract Syntax Notation One) or BER (Basic Encoding  
Rules), errors encountered by the SNMP protocol entity when decoding SNMP  
messages received.  
The Open Systems Interconnection (OSI) method of specifying abstract objects is called  
ASN.1 (Abstract Syntax Notation One, defined in X.208), and one set of rules for  
representing such objects as strings of ones and zeros is called the BER (Basic  
Encoding Rules, defined in X.209).  
ASN.1 is a flexible notation that allows one to define a variety of data types, from  
simple types such as integers and bit strings to structured types such as sets and  
sequences.  
BER describes how to represent or encode values of each ASN.1 type as a string of  
eight-bit octets.  
snmpEnableAuthTraps  
An object to enable or disable the authentication traps generated by this switch.  
96  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 72 SNMP statistics  
Statistics  
Description  
snmpOutPkts  
The total number of SNMP messages which were passed from the SNMP protocol  
entity to the transport service.  
snmpInBadTypes  
snmpInTooBigs  
The total number of SNMP messages which failed ASN.1 parsing.  
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP  
protocol entity and for which the value of the error-status field is too big.  
snmpInNoSuchNames  
snmpInBadValues  
snmpInReadOnlys  
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP  
protocol entity and for which the value of the error-status field is noSuchName.  
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP  
protocol entity and for which the value of the error-status field is badValue.  
The total number of valid SNMP Protocol Data Units (PDUs), which were delivered to  
the SNMP protocol entity and for which the value of the error-status field is read-only.  
It should be noted that it is a protocol error to generate an SNMP PDU, which contains  
the value read-only in the error-status field. As such, this object is provided as a means  
of detecting incorrect implementations of the SNMP.  
snmpInGenErrs  
The total number of SNMP Protocol Data Units (PDUs), which were delivered to the  
SNMP protocol entity and for which the value of the error-status field is genErr.  
snmpInTotalReqVars  
The total number of MIB objects which have been retrieved successfully by the SNMP  
protocol entity as a result of receiving valid SNMP Get-Request and Get-Next Protocol  
Data Units (PDUs).  
snmpInTotalSetVars  
The total number of MIB objects, which have been altered successfully by the SNMP  
protocol entity as a result of receiving valid SNMP Set-Request Protocol Data Units  
(PDUs).  
snmpInGetRequests  
snmpInGetNexts  
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have been  
accepted and processed by the SNMP protocol entity.  
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been  
accepted and processed by the SNMP protocol entity.  
snmpInSetRequests  
snmpInGetResponses  
snmpInTraps  
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been  
accepted and processed by the SNMP protocol entity.  
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have been  
accepted and processed by the SNMP protocol entity.  
The total number of SNMP Trap Protocol Data Units (PDUs), which have been accepted  
and processed by the SNMP protocol entity.  
snmpOutTooBigs  
The total number of SNMP Protocol Data Units (PDUs), which were generated by the  
SNMP protocol entity and for which the value of the error-status field is too big.  
snmpOutNoSuchNames  
snmpOutBadValues  
The total number of SNMP Protocol Data Units (PDUs), which were generated by the  
SNMP protocol entity and for which the value of the error-status is noSuchName.  
The total number of SNMP Protocol Data Units (PDUs), which were generated by the  
SNMP protocol entity and for which the value of the error-status field is badValue.  
snmpOutReadOnlys  
snmpOutGenErrs  
Not in use.  
The total number of SNMP Protocol Data Units (PDUs), which were generated by the  
SNMP protocol entity and for which the value of the error-status field is genErr.  
97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Statistics Commands  
Table 72 SNMP statistics  
Statistics  
Description  
snmpOutGetRequests  
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have been  
generated by the SNMP protocol entity.  
snmpOutGetNexts  
snmpOutSetRequests  
snmpOutGetResponses  
snmpOutTraps  
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been  
generated by the SNMP protocol entity.  
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been  
generated by the SNMP protocol entity.  
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have been  
generated by the SNMP protocol entity.  
The total number of SNMP Trap Protocol Data Units (PDUs), which have been  
generated by the SNMP protocol entity.  
snmpSilentDrops  
The total number of GetRequest-PDUs, GetNextRequest-PDUs,  
GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs  
delivered to the SNMP entity that were silently dropped because the size of a reply  
containing an alternate Response-PDU with an empty variable-bindings field was too  
large.  
snmpProxyDrops  
The total number of GetRequest-PDUs, GetNextRequest-PDUs,  
GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs  
delivered to the SNMP entity that were silently dropped because the transmission of the  
message to a proxy target failed in a manner (other than a time-out) such that no  
Response-PDU could be returned.  
NTP statistics  
The following command displays NTP statistics:  
show ntp counters  
Command mode: All  
NTP statistics:  
Primary Server:  
Requests Sent:  
Responses Received:  
Updates:  
17  
17  
1
Secondary Server:  
Requests Sent:  
Responses Received:  
Updates:  
0
0
0
Last update based on response from primary server.  
Last update time: 18:04:16 Tue Mar 13, 2006  
Current system time: 18:55:49 Tue Mar 13, 2006  
The switch uses NTP (Network Timing Protocol) version 3 to synchronize the switch’s internal clock with an  
atomic time-calibrated NTP server. With NTP enabled, the switch can accurately update its internal clock  
to be consistent with other devices on the network and generates accurate syslogs.  
The following table describes the NTP statistics:  
98  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Table 73 NTP statistics  
Statistics  
Description  
Primary Server  
Requests Sent—The total number of NTP requests the switch sent to  
the primary NTP server to synchronize time.  
Responses Received—The total number of NTP responses received  
from the primary NTP server.  
Updates—The total number of times the switch updated its time based  
on the NTP responses received from the primary NTP server.  
Secondary Server  
Requests Sent—The total number of NTP requests the switch sent to  
the secondary NTP server to synchronize time.  
Responses Received—The total number of NTP responses received  
from the secondary NTP server.  
Updates—The total number of times the switch updated its time based  
on the NTP responses received from the secondary NTP server.  
Last update based on  
response from primary server  
Last update of time on the switch based on either primary or secondary  
NTP response received.  
Last update time  
The time stamp showing the time when the switch was last updated.  
Current system time  
The switch system time when the command show ntp counterswas  
issued.  
Uplink Failure Detection statistics  
The following command allows you to display Uplink Failure Detection (UFD) statistics.  
show ufd counters  
Command mode: All  
Uplink Failure Detection statistics:  
Number of times LtM link failure: 1  
Number of times LtM link in Blocking State: 0  
Number of times LtD got auto disabled: 1  
The following table describes the Uplink Failure Detection (UFD) statistics:  
Table 74 Uplink Failure Detection statistics  
Statistic  
Description  
Number of times LtM link failure  
The total numbers of times that link failures were detected on  
the uplink ports in the Link to Monitor group.  
Number of times LtM link in Blocking  
State  
The total number of times that Spanning Tree Blocking state  
was detected on the uplink ports in the Link to Monitor group.  
Number of times LtD got auto disabled  
The total numbers of times that downlink ports in the Link to  
Disable group were automatically disabled because of a  
failure in the Link to Monitor group.  
99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Statistics Commands  
Statistics dump  
The following command dumps switch statistics:  
show counters  
Use the dumpcommand to dump all switch statistics available (40K or more, depending on your  
configuration). This data can be used to tune or debug switch performance.  
If you want to capture dump data to a file, set your communication software on your workstation to  
capture session data prior to issuing the dump commands.  
100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Introduction  
The Configuration commands are available only from an administrator login. They include commands for  
configuring every aspect of the HP 10GbE switch . Changes can be saved to non-volatile memory  
(NVRAM).  
The following table describes the basic Configuration commands. The following sections provide more  
detailed information and commands.  
Table 75 Configuration commands  
Command  
Usage  
show running-config  
Dumps current configuration to a script file.  
Command mode: All  
copy running-config {ftp|tftp}  
copy {ftp|tftp} running-config  
Backs up current configuration to FTP/TFTP server.  
Command mode: All  
Restores current configuration from FTP/TFTP server.  
Command mode: All  
Viewing and saving changes  
As you use the configuration commands to set switch parameters, the changes you make take effect  
immediately. You do not need to apply configuration changes when you use the ISCLI. Any changes are  
lost the next time the switch boots unless the changes are explicitly saved.  
Saving the configuration  
You must save configuration changes to flash memory, so the switch reloads the setting when you reset  
the switch.  
IMPORTANT: If you do not save the changes, they are lost the next time the system is reloaded.  
To save the new configuration, enter the following command at any prompt:  
Switch# copy running-config startup-config  
When you save configuration changes, the changes are saved to the active configuration block.  
For instructions about selecting the configuration to run at the next system reload, see the “Selecting a  
configuration block” section in the “Boot Options” chapter.  
101  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Configuration Commands  
System configuration  
These commands allow you to configure switch management parameters such as user and administrator  
privilege mode passwords, browser-based management settings, and management access list.  
The following table describes the System Configuration commands.  
Table 76 System Configuration commands  
Command  
Usage  
system date <yyyy> <mm> <dd>  
Prompts the user for the system date.  
Command mode: Global configuration  
system time <hh>:<mm>:<ss>  
Configures the system time using a 24-hour clock format.  
Command mode: Global configuration  
system timezone  
Configures the time zone where the switch resides. You are prompted to  
select your location (continent, country, region) by the timezone wizard.  
Once a region is selected, the switch updates the time to reflect local  
changes to Daylight Savings Time, etc.  
Command mode: Global configuration  
[no] system daylight  
Enables or disables Daylight Savings Time in the system clock. When  
enabled, the switch adds an extra hour to the system clock so that it is  
consistent with the local clock. The default setting is disabled.  
Command mode: Global configuration  
system idle <1-60>  
Sets the idle timeout for CLI sessions, from 1 to 60 minutes. The default  
value is 5 minutes.  
This setting affects both the console port and Telnet port.  
Command mode: Global configuration  
[no] system notice <1-1024  
characters multi-line> <’-‘  
to end>  
Displays login notice immediately before the “Enter password:” prompt.  
This notice can contain up to 1024 characters and new lines.  
Command mode: Global configuration  
[no] banner <1-80 characters>  
[no] hostname <string>  
[no] system bootp  
Configures a login banner of up to 80 characters. When a user or  
administrator logs into the switch, the login banner is displayed.  
Command mode: Global configuration  
Enables or disables displaying of the host name (system administrator’s  
name) in the command line interface.  
Command mode: Global configuration  
Enables or disables the use of BOOTP. If you enable BOOTP, the switch  
will query its BOOTP server for all of the switch IP parameters. The default  
value is enabled.  
Command mode: Global configuration  
[no] dhcp  
Enables or disables Dynamic Host Control Protocol for setting the  
management IP address on interface 250. When enabled, the IP address  
obtained from the DHCP server overrides the static IP address.  
Command mode: Global configuration  
102  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 76 System Configuration commands  
Command  
Usage  
[no] enable <string>  
Allows administrators to assign the Privilege EXEC password. The  
password will be required to enter Privilege EXEC mode. The default value  
is disabled.  
Command mode: Global configuration  
show system  
Displays the current system parameters.  
Command mode: All  
System host log configuration  
The following table describes the Syslog Configuration commands.  
Table 77 Syslog Configuration commands  
Command  
Description  
[no] logging host {<1-2>} address {<IP  
address>}  
Sets the IP address of the first or second syslog host. For  
example, 100.10.1.1.  
Command mode: Global configuration  
logging host {<1-2>} severity {<1-7>}  
Sets the severity level of the first or second syslog host  
displayed. The default is 7, which means log all the severity  
levels.  
Command mode: Global configuration  
logging host {<1-2>} facility {<1-7>}  
This option sets the facility level of the first or seconds syslog  
host displayed. The default is 0.  
Command mode: Global configuration  
[no] logging console  
Enables or disables delivering syslog messages to the  
console. When necessary, disabling console ensures the  
switch is not affected by syslog messages. It is enabled by  
default.  
Command mode: Global configuration  
103  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 77 Syslog Configuration commands  
Command  
Description  
[no] logging log {<feature>}  
Displays a list of features for which syslog messages can be  
generated. You can choose to enable/disable specific  
features or enable/disable syslog on all available features.  
Features include:  
cfg  
cli  
console  
do1x  
ip  
management  
ntp  
ospf  
rmon  
spanning-tree-group  
ssh  
system  
ufd  
vlan  
vrrp  
web  
Command mode: Global configuration  
show logging  
Displays the current syslog settings.  
Command mode: All  
104  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Secure Shell Server configuration  
Telnet traffic on the network is not secure. These commands enable Secure Shell (SSH) access from any  
SSH client. The SSH program securely logs into another computer over a network and executes  
commands in a secure environment. All data using SSH is encrypted.  
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on SSH.  
The following table describes the SSHD Configuration commands.  
Table 78 SSHD Configuration commands  
Command  
Description  
ssh interval <0-24>  
Defines interval for auto-generating the RSA server key. The switch will  
auto-generate the RSA server key at the interval defined in this command.  
The range is 0-24 hours.  
The value of zero (0) means the RSA server key auto-generation is  
disabled. If the switch has been busy performing any other key generation  
and the assigned time of interval expires, the RSA server will skip  
generating the key.  
Command mode: Global configuration  
ssh scp-password  
Defines the administrator password that is for Secure Copy (SCP) only.  
The username for this SCP administrator is scpadmin.  
Typically, SCP is used to copy files securely from one machine to another.  
In the switch, SCP is used to download and upload the switch  
configuration using secure channels.  
Command mode: Global configuration  
ssh generate-host-key  
Generates the RSA host keys manually. The switch creates this key  
automatically while configuring the switch with Secure Shell (SSH). But  
you can generate the key manually by using this command if you need to  
overwrite the key for security reasons. The command will take effect  
immediately.  
Command mode: Global configuration  
ssh generate-server-key  
Generates the RSA server key. The switch creates this key automatically  
while configuring the switch with Secure Shell (SSH). You can generate  
the key manually by using this command if you need to overwrite the key  
for security reasons. The command will take effect immediately.  
Command mode: Global configuration  
ssh port <TCP port number>  
ssh scp-enable  
Sets the SSH server port number.  
Command mode: Global configuration  
Enables the SCP apply and save.  
Command mode: Global configuration  
no ssh scp-enable  
ssh enable  
Disables the SCP apply and save. This is the default for SCP.  
Command mode: Global configuration  
Enables the SSH server.  
Command mode: Global configuration  
105  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 78 SSHD Configuration commands  
Command  
Description  
no ssh enable  
Disables the SSH server. This is the default for the SSH server.  
Command mode: Global configuration  
show ssh  
Displays the current SSH server configuration.  
Command mode: All  
RADIUS server configuration  
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on RADIUS.  
The following table describes the RADIUS Server Configuration commands.  
Table 79 RADIUS Server Configuration commands  
Command  
Description  
[no] radius-server primary-host  
<IP address> key <1-32 characters>  
Sets the primary RADIUS server address and shared secret  
between the switch and the RADIUS server(s).  
Command mode: Global configuration  
[no] radius-server secondary-host  
<IP address> key <1-32 characters>  
Sets the secondary RADIUS server address and shared secret  
between the switch and the RADIUS server(s).  
Command mode: Global configuration  
radius-server port <UDP port  
number>  
Enter the number of the User Datagram Protocol (UDP) port to be  
configured, between 1500-3000. The default is 1645.  
Command mode: Global configuration  
radius-server retransmit <1-3>  
radius-server timeout <1-10>  
[no] radius-server telnet-backdoor  
[no] radius-server secure-backdoor  
radius-server enable  
Sets the number of failed authentication requests before switching  
to a different RADIUS server. The range is 1-3 requests. The  
default is 3 requests.  
Command mode: Global configuration  
Sets the amount of time, in seconds, before a RADIUS server  
authentication attempt is considered to have failed. The range is  
1-10 seconds. The default is 3 seconds.  
Command mode: Global configuration  
Enables or disables the RADIUS back door for  
telnet/SSH/HTTP/HTTPS. This command does not apply when  
secure backdoor is enabled.  
Command mode: Global configuration  
Enables or disables the RADIUS back door using secure password  
for telnet/SSH/HTTP/HTTPS. This command does not apply when  
backdoor (telnet) is enabled.  
Command mode: Global configuration  
Enables the RADIUS server.  
Command mode: Global configuration  
106  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 79 RADIUS Server Configuration commands  
Command  
Description  
no radius-server enable  
Disables the RADIUS server. This is the default.  
Command mode: Global configuration  
show radius-server  
Displays the current RADIUS server parameters.  
Command mode: All  
IMPORTANT: If RADIUS is enabled, you must login using RADIUS authentication when connecting  
via the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can  
connect using noradiusand the administrator password even if the backdoor or secure backdoor  
(secbd) are disabled.  
If Telnet backdoor is enabled, type in noradius as a backdoor to bypass RADIUS checking, and  
use the administrator password to log into the switch. The switch allows this even if RADIUS servers  
are available.  
If secure backdoor is enabled, type in noradius as a backdoor to bypass RADIUS checking, and  
use the administrator password to log into the switch. The switch allows this only if RADIUS servers  
are not available.  
TACACS+ server configuration  
TACACS+ (Terminal Access Controller Access Control System) is an authentication protocol that allows a  
remote access server to forward a user's logon password to an authentication server to determine whether  
access can be allowed to a given system. TACACS+ and Remote Authentication Dial-In User Service  
(RADIUS) protocols are more secure than the TACACS encryption protocol. TACACS+ is described in  
RFC 1492.  
TACACS+ protocol is more reliable than RADIUS, as TACACS+ uses the Transmission Control Protocol  
(TCP) whereas RADIUS uses the User Datagram Protocol (UDP). Also, RADIUS combines authentication  
and authorization in a user profile, whereas TACACS+ separates the two operations.  
TACACS+ offers the following advantages over RADIUS as the authentication device:  
TACACS+ is TCP-based, so it facilitates connection-oriented traffic.  
It supports full-packet encryption, as opposed to password-only in authentication requests.  
It supports decoupled authentication, authorization, and accounting.  
The following table describes the TACACS+ Server Configuration commands.  
Table 80 TACACS+ Server Configuration commands  
Command  
Description  
[no] tacacs-server primary-host <IP  
address> key <1-32 characters>  
Defines the primary TACACS+ server address and shared  
secret between the switch and the TACACS+ server(s).  
Command mode: Global configuration  
[no] tacacs-server secondary-host <IP  
address> key <1-32 characters>  
Defines the secondary TACACS+ server address and shared  
secret between the switch and the TACACS+ server(s).  
Command mode: Global configuration  
107  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 80 TACACS+ Server Configuration commands  
Command  
Description  
tacacs-server port <TCP port number>  
Enter the number of the TCP port to be configured, between 1  
and 65000. The default is 49.  
Command mode: Global configuration  
tacacs-server retransmit <1-3>  
tacacs-server timeout <4-15>  
Sets the number of failed authentication requests before  
switching to a different TACACS+ server. The range is 1-3  
requests. The default is 3 requests.  
Command mode: Global configuration  
Sets the amount of time, in seconds, before a TACACS+  
server authentication attempt is considered to have failed. The  
range is 4-15 seconds. The default is 5 seconds.  
Command mode: Global configuration  
[no] tacacs-server telnet-backdoor  
[no] tacacs-server secure-backdoor  
[no] tacacs-server privilege-mapping  
Enables or disables the TACACS+ back door for  
telnet/SSH/HTTP/HTTPS. This command does not apply when  
secure backdoor is enabled.  
Command mode: Global configuration  
Enables or disables the TACACS+ back door using secure  
password for telnet/SSH/HTTP/HTTPS. This command does  
not apply when backdoor (telnet) is enabled.  
Command mode: Global configuration  
Enables or disables TACACS+ privilege-level mapping.  
The default value is disabled.  
Command mode: Global configuration  
tacacs-server user-mapping {<0-15>  
user|oper|admin}  
Maps a TACACS+ authorization level to a switch user level.  
Enter a TACACS+ privilege level (0-15), followed by the  
corresponding HP 10GbE switch user level (user, oper,  
admin).  
Command mode: Global configuration  
tacacs-server enable  
no tacacs-server enable  
show tacacs-server  
Enables the TACACS+ server.  
Command mode: Global configuration  
Disables the TACACS+ server.  
Command mode: Global configuration  
Displays current TACACS+ configuration parameters.  
Command mode: All  
IMPORTANT: If TACACS+ is enabled, you must login using TACACS+ authentication when  
connecting via the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled,  
so you can connect using notacacsand the administrator password even if the backdoor or  
secure backdoor are disabled.  
If Telnet backdoor is enabled, type in notacacs as a backdoor to bypass TACACS+ checking,  
and use the administrator password to log into the switch. The switch allows this even if TACACS+  
servers are available.  
If secure backdoor is enabled, type in notacacsas a backdoor to bypass TACACS+ checking,  
108  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Commands  
and use the administrator password to log into the switch. The switch allows this only if TACACS+  
servers are not available.  
NTP server configuration  
These commands enable you to synchronize the switch clock to a Network Time Protocol (NTP) server. By  
default, this option is disabled.  
The following table describes the NTP Server Configuration commands.  
Table 81 NTP Server Configuration commands  
Command  
Description  
[no] ntp primary-server [<IP  
address>|mgt-port|data-port]  
Prompts for the IP addresses of the primary NTP server to which you want  
to synchronize the switch clock. For example, 100.10.1.1.  
By default, the mgt-port option for the management port is used. To  
use data ports, specify the data-portoption.  
Command mode: Global configuration  
[no] ntp secondary-server  
[<IP address>|mgt-port|data-  
port]  
Prompts for the IP addresses of the secondary NTP server to which you  
want to synchronize the switch clock. For example, 100.10.1.2.  
By default, the mgt-port option for the management port is used. To  
use data ports, specify the data-portoption.  
Command mode: Global configuration  
ntp interval <1-44640>  
Specifies the interval, in minutes (1-44640), to resynchronize the switch  
clock with the NTP server. The default is 1440 seconds.  
Command mode: Global configuration  
ntp enable  
no ntp enable  
show ntp  
Enables the NTP synchronization service.  
Command mode: Global configuration  
Disables the NTP synchronization service. This is the default.  
Command mode: Global configuration  
Displays the current NTP service settings.  
Command mode: All  
109  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
System SNMP configuration  
The switch software supports SNMP-based network management. In SNMP model of network  
management, a management station (client/manager) accesses a set of variables known as  
MIBs (Management Information Base) provided by the managed device (agent). If you are running an  
SNMP network management station on your network, you can manage the switch using the following  
standard SNMP MIBs:  
MIB II (RFC 1213)  
Ethernet MIB (RFC 1643)  
Bridge MIB (RFC 1493)  
An SNMP agent is a software process on the managed device that listens on UDP port 161 for SNMP  
messages. Each SNMP message sent to the agent contains a list of management objects to retrieve or to  
modify.  
SNMP parameters that can be modified include:  
System name  
System location  
System contact  
Use of the SNMP system authentication trap function  
Read community string  
Write community string  
The following table describes the System SNMP Configuration commands. The following sections provide  
more detailed information and commands.  
Table 82 System SNMP Configuration commands  
Command  
Description  
hostname <1-64 characters>  
Configures the name for the system. The name can have a maximum of  
64 characters.  
Command mode: Global configuration  
snmp-server location <1-64  
characters>  
Configures the name of the system location. The location can have a  
maximum of 64 characters.  
Command mode: Global configuration  
snmp-server contact <1-64  
characters>  
Configures the name of the system contact. The contact can have a  
maximum of 64 characters.  
Command mode: Global configuration  
snmp-server read-community  
<1-32 characters>  
Configures the SNMP read community string. The read community string  
controls SNMP “get” access to the switch. It can have a maximum of 32  
characters. The default read community string is public.  
Command mode: Global configuration  
snmp-server write-community  
<1-32 characters>  
Configures the SNMP write community string. The write community string  
controls SNMP “set” and “get” access to the switch. It can have a  
maximum of 32 characters. The default write community string is  
private.  
Command mode: Global configuration  
110  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 82 System SNMP Configuration commands  
Command  
Description  
snmp-server timeout <1-30>  
Sets the timeout value for the SNMP state machine. The range is 1-30  
minutes. The default value is 5 minutes.  
Command mode: Global configuration  
[no] snmp-server  
authentication-trap enable  
Enables or disables the use of the system authentication trap facility. The  
default setting is disabled.  
Command mode: Global configuration  
[no] snmp-server link-trap  
[no] snmp-server ufd-trap  
show snmp-server  
Enables or disables the sending of SNMP link up and link down traps. The  
default setting is enabled.  
Command mode: Global configuration  
Enables or disables the sending of Uplink Failure Detection traps. The  
default setting is disabled.  
Command mode: Global configuration  
Displays the current SNMP configuration.  
Command mode: All  
SNMPv3 configuration  
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework  
by supporting the following:  
a new SNMP message format  
security for messages  
access control  
remote configuration of SNMP parameters  
For more details on the SNMPv3 architecture please see RFC2271 to RFC2275.  
The following table describes the SNMPv3 Configuration commands.  
Table 83 SNMPv3 Configuration commands  
Command  
Description  
snmp-server user <1-16>  
Configures a user security model (USM) entry for an authorized user. You can  
also configure this entry through SNMP. The range is 1-16.  
Command mode: Global configuration  
snmp-server view <1-128>  
snmp-server access <1-32>  
Configures different MIB views. The range is 1-128.  
Command mode: Global configuration  
Configures access rights. The View-based Access Control Model defines a set  
of services that an application can use for checking access rights of the user.  
You need access control when you have to process retrieval or modification  
request from an SNMP entity. The range is 1-32.  
Command mode: Global configuration  
111  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 83 SNMPv3 Configuration commands  
Command  
Description  
snmp-server group <1-16>  
Configures an SNMP group. A group maps the user name to the access group  
names and their access rights needed to access SNMP management objects.  
A group defines the access rights assigned to all names that belong to a  
particular group. The range is 1-16.  
Command mode: Global configuration  
snmp-server community  
<1-16>  
Configures a community table entry. The community table contains objects for  
mapping community strings and version-independent SNMP message  
parameters. The range is 1-16.  
Command mode: Global configuration  
snmp-server target-address  
<1-16>  
Configures the destination address and user security levels for outgoing  
notifications. This is also called the transport endpoint. The range is 1-16.  
Command mode: Global configuration  
snmp-server target-  
parameters <1-16>  
Configures SNMP parameters, consisting of message processing model,  
security model, security level, and security name information. There may be  
multiple transport endpoints associated with a particular set of SNMP  
parameters, or a particular transport endpoint may be associated with several  
sets of SNMP parameters. The range is 1-16.  
Command mode: Global configuration  
snmp-server notify <1-16>  
Configures a notification index. A notification application typically monitors a  
system for particular events or conditions, and generates Notification-Class  
messages based on these events or conditions. The range is 1-16.  
Command mode: Global configuration  
snmp-server version  
{v1v2v3|v3only}  
Enables or disables the access to SNMP version 1 and version 2. This  
command is enabled by default.  
Command mode: Global configuration  
show snmp-server v3  
Displays the current SNMPv3 configuration.  
Command mode: All  
112  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Commands  
User Security Model configuration  
You can make use of a defined set of user identities using this Security Model. An SNMP engine must  
have the knowledge of applicable attributes of a user.  
These commands help you create a user security model entry for an authorized user. You need to provide  
a security name to create the USM entry.  
The following table describes the User Security Model Configuration commands.  
Table 84 User Security Model Configuration commands  
Command  
Description  
snmp-server user <1-16> name  
<1-32 characters>  
Configures a string up to 32 characters long that represents the name  
of the user. This is the login name that you need in order to access the  
switch.  
Command mode: Global configuration  
snmp-server user <1-16>  
authentication-protocol  
{md5|sha|none} authentication-  
password <password>  
Configures the authentication protocol and password.  
The authentication protocol can be HMAC-MD5-96 or HMAC-SHA-96,  
or none. The default algorithm is none.  
When you configure an authentication algorithm, you must provide a  
password; otherwise you receive an error message during validation.  
This command allows you to create or change your password for  
authentication.  
Command mode: Global configuration  
snmp-server user <1-16>  
privacy-protocol {des|none}  
privacy-password <password>  
Configures the type of privacy protocol and the privacy password.  
The privacy protocol protects messages from disclosure. The options  
are des (CBC-DES Symmetric Encryption Protocol) or none. If you  
specify des as the privacy protocol, then make sure that you have  
selected one of the authentication protocols (MD5 or HMAC-SHA-96).  
If you select none as the authentication protocol, you receive an error  
message.  
You can create or change the privacy password.  
Command mode: Global configuration  
no snmp-server user <1-16>  
show snmp-server user <1-16>  
Deletes the USM user entries.  
Command mode: Global configuration  
Displays the USM user entries.  
Command mode: All  
113  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
SNMPv3 View configuration  
The following table describes the SNMPv3 View Configuration commands.  
Table 85 SNMPv3 View Configuration commands  
Command  
Description  
snmp-server view <1-128> name  
<1-32 characters>  
Defines the name for a family of view subtrees up to a maximum of 32  
characters.  
Command mode: Global configuration  
snmp-server view <1-128> tree  
<1-64 characters>  
Defines the Object Identifier (OID), a string which, when combined with  
the corresponding mask, defines a family of view subtrees.  
An example of an OID is 1.3.6.1.2.1.1.1.0.  
Command mode: Global configuration  
snmp-server view <1-128> mask  
<1-32 characters>  
Defines the bit mask, which in combination with the corresponding tree  
defines a family of view subtrees. The mask can have a maximum of 32  
characters.  
Command mode: Global configuration  
snmp-server view <1-128> type  
{included|excluded}  
Selects whether the corresponding instances of  
vacmViewTreeFamilySubtree and vacmViewTreeFamilyMask  
define a family of view subtrees, which is included in or excluded from  
the MIB view.  
Command mode: Global configuration  
no snmp-server view <1-128>  
show snmp-server view <1-128>  
Deletes the vacmViewTreeFamilygroup entry.  
Command mode: Global configuration  
Displays the current vacmViewTreeFamilyconfiguration.  
Command mode: All  
View-based Access Control Model configuration  
The view-based Access Control Model defines a set of services that an application can use for checking  
access rights of the user. Access control is needed when the user has to process SNMP retrieval or  
modification request from an SNMP entity.  
The following table describes the User Access Control Configuration commands.  
Table 86 View-based Access Control Configuration commands  
Command  
Description  
snmp-server access <1-32> name  
<1-32 characters>  
Defines the name of the group, up to a maximum of 32 characters.  
Command mode: Global configuration  
snmp-server access <1-32>  
security {usm|snmpv1|snmpv2}  
Allows you to select the security model to be used.  
Command mode: Global configuration  
114  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 86 View-based Access Control Configuration commands  
Command  
Description  
snmp-server access <1-32> level  
{noAuthNoPriv|authNo-  
Priv|authPriv}  
Defines the minimum level of security required to gain access rights.  
The level noAuthNoPrivmeans that the SNMP message will be  
sent without authentication and without using a privacy protocol.  
The level authNoPrivmeans that the SNMP message will be sent  
with authentication but without using a privacy protocol. The  
authPrivmeans that the SNMP message will be sent both with  
authentication and using a privacy protocol.  
Command mode: Global configuration  
snmp-server access <1-32> read-  
view <1-32 characters>  
Defines a 32 character long read view name that allows you read  
access to a particular MIB view. If the value is empty or if there is no  
active MIB view having this value then no access is granted.  
Command mode: Global configuration  
snmp-server access <1-32> write-  
view <1-32 characters>  
Defines a 32 character long write view name that allows you write  
access to the MIB view. If the value is empty or if there is no active  
MIB view having this value then no access is granted.  
Command mode: Global configuration  
snmp-server access <1-32> notify-  
view <1-32 characters>  
Defines a 32 character long notify view name that allows you notify  
access to the MIB view.  
Command mode: Global configuration  
no snmp-server access <1-32>  
show snmp-server access <1-32>  
Deletes the View-based Access Control entry.  
Command mode: Global configuration  
Displays the View-based Access Control configuration.  
Command mode: All  
SNMPv3 Group configuration  
The following table describes the SNMPv3 Group Configuration commands.  
Table 87 SNMPv3 Group Configuration commands  
Command  
Description  
snmp-server group <1-16>  
security {usm|snmpv1|snmpv2}  
Defines the security model.  
Command mode: Global configuration  
snmp-server group <1-16>  
user-name <1-32 characters>  
Sets the user name. The user name can have a maximum of  
32 characters.  
Command mode: Global configuration  
snmp-server group <1-16>  
group-name <1-32 characters>  
The name for the access group. The group name can have a maximum of  
32 characters.  
Command mode: Global configuration  
no snmp-server group <1-16>  
Deletes the vacmSecurityToGroupentry.  
Command mode: Global configuration  
115  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 87 SNMPv3 Group Configuration commands  
Command  
Description  
show snmp-server group <1-16>  
Displays the current vacmSecurityToGroupconfiguration.  
Command mode: All  
SNMPv3 Community Table configuration  
These commands are used for configuring the community table entry. The configured entry is stored in the  
community table list in the SNMP engine. This table is used to configure community strings in the Local  
Configuration Datastore (LCD) of SNMP engine.  
The following table describes the SNMPv3 Community Table Configuration commands.  
Table 88 SNMPv3 Community Table Configuration commands  
Command  
Description  
snmp-server community <1-16>  
index <1-32 characters>  
Configures the unique index value of a row in this table. The index can  
have a maximum of 32 characters.  
Command mode: Global configuration  
snmp-server community <1-16>  
name <1-32 characters>  
Defines the name, up to 32 characters.  
Command mode: Global configuration  
snmp-server community <1-16>  
user-name <1-32 characters>  
Defines a readable 32 character string that represents the corresponding  
value of an SNMP community name in a security model.  
Command mode: Global configuration  
snmp-server community <1-16>  
tag <1-255 characters>  
Configures a tag of up to 255 characters maximum. This tag specifies a  
set of transport endpoints to which a command responder application  
sends an SNMP trap.  
Command mode: Global configuration  
no snmp-server community  
<1-16>  
Deletes the community table entry.  
Command mode: Global configuration  
show snmp-server community  
<1-16>  
Displays the community table configuration.  
Command mode: All  
SNMPv3 Target Address Table configuration  
These commands allow you to set passwords and display current user statistics. Passwords can be a  
maximum of 15 characters. To disable a user, set the password to null.  
The following table describes the SNMPv3 Target Address Table Configuration commands.  
Table 89 SNMPv3 Target Address Table Configuration commands  
Command  
Description  
snmp-server target-address <1-16>  
address <IP address> name <1-32  
characters>  
Configures the locally arbitrary, but unique identifier, target  
address name associated with this entry.  
Command mode: Global configuration  
116  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
Table 89 SNMPv3 Target Address Table Configuration commands  
Command  
Description  
snmp-server target-address <1-16> name  
<1-32 characters> address <transport  
IP address>  
Configures a transport address IP that can be used in the  
generation of SNMP traps.  
Command mode: Global configuration  
snmp-server target-address <1-16> port  
<transport address port (1-65535)>  
Configures a transport address port that can be used in the  
generation of SNMP traps.  
Command mode: Global configuration  
snmp-server target-address <1-16>  
taglist <1-255 characters>  
Configures a list of tags (up to 255 characters maximum) that  
are used to select target addresses for a particular operation.  
Command mode: Global configuration  
snmp-server target-address <1-16>  
parameters-name <1-32 characters>  
Defines the name.  
Command mode: Global configuration  
no snmp-server target-address <1-16>  
show snmp-server target-address <1-16>  
Deletes the Target Address Table entry.  
Command mode: Global configuration  
Displays the current Target Address Table configuration.  
Command mode: All  
SNMPv3 Target Parameters Table configuration  
You can configure the target parameters entry and store it in the target parameters table in the SNMP  
engine. This table contains parameters that are used to generate a message. The parameters include the  
message processing model (for example: SNMPv3, SNMPv2c, SNMPv1), the security model (for  
example: USM), the security name, and the security level (noAuthnoPriv, authNoPriv, or  
authPriv).  
The following table describes the SNMPv3 Target Parameters Table Configuration commands.  
Table 90 SNMPv3 Target Parameters Table Configuration commands  
Command  
Description  
snmp-server target-parameters <1-16>  
name <1-32 characters>  
Configures the locally arbitrary, but unique identifier that is  
associated with this entry.  
Command mode: Global configuration  
snmp-server target-parameters <1-16>  
message {snmpv1|snmpv2c|snmpv3}  
Configures the message processing model that is used to  
generate SNMP messages.  
Command mode: Global configuration  
snmp-server target-parameters <1-16>  
security {usm|snmpv1|snmpv2}  
Selects the security model to be used when generating the  
SNMP messages.  
Command mode: Global configuration  
snmp-server target-parameters <1-16>  
user-name <1-32 characters>  
Defines the name that identifies the user in the USM table, on  
whose behalf the SNMP messages are generated using this  
entry.  
Command mode: Global configuration  
117  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 90 SNMPv3 Target Parameters Table Configuration commands  
Command  
Description  
snmp-server target-parameters <1-16>  
level {noAuthNo-  
Priv|authNoPriv|authPriv}  
Selects the level of security to be used when generating the  
SNMP messages using this entry. The level noAuthNoPriv  
means that the SNMP message will be sent without authen-  
tication and without using a privacy protocol. The level  
authNoPrivmeans that the SNMP message will be sent with  
authentication but without using a privacy protocol. The  
authPrivmeans that the SNMP message will be sent both  
with authentication and using a privacy protocol.  
Command mode: Global configuration  
no snmp-server target-parameters  
<1-16>  
Deletes the targetParamsTableentry.  
Command mode: Global configuration  
show snmp-server target-parameters  
<1-16>  
Displays the current targetParamsTableconfiguration.  
Command mode: All  
SNMPv3 Notify Table configuration  
SNMPv3 uses Notification Originator to send out traps. A notification typically monitors a system for  
particular events or conditions, and generates Notification-Class messages based on these events or  
conditions.  
The following table describes the SNMPv3 Notify Table Configuration commands.  
Table 91 SNMPv3 Notify Table Configuration commands  
Command  
Description  
snmp-server notify <1-16> name  
<1-32 characters>  
Defines a locally arbitrary but unique identifier associated with this  
SNMP notify entry.  
Command mode: Global configuration  
snmp-server notify <1-16> tag  
<1-255 characters>  
Defines a tag of 255 characters maximum that contains a tag value  
which is used to select entries in the Target Address Table. Any entry in  
the snmpTargetAddrTable, that matches the value of this tag, is  
selected.  
Command mode: Global configuration  
no snmp-server notify <1-16>  
show snmp-server notify <1-16>  
Deletes the notify table entry.  
Command mode: Global configuration  
Displays the current notify table configuration.  
Command mode: All  
118  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
System Access configuration  
The following table describes the System Access Configuration commands.  
Table 92 System Access Configuration commands  
Command  
Description  
[no] access http enable  
Enables or disables HTTP (Web) access to the Browser-based Interface. It  
is enabled by default.  
Command mode: Global configuration  
access http port <TCP port  
number>  
Sets the switch port used for serving switch Web content. The default is  
HTTP port 80.  
Command mode: Global configuration  
[no] access snmp {read-only|  
read-write}  
Disables or provides read-only/write-read SNMP access.  
Command mode: Global configuration  
[no] access tsbbi enable  
Enables or disables BBI configuration control s for Telnet and SSH.  
Command mode: Global configuration  
access telnet port <TCP port  
number>  
Sets an optional telnet server port number for cases where the server  
listens for telnet sessions on a non-standard port.  
Command mode: Global configuration  
[no] access telnet enable  
Enables or disables Telnet access.  
Command mode: Global configuration  
access tftp-port <TFTP port  
number>  
Sets an optional telnet server port number for cases where the server  
listens for TFTP sessions on a non-standard port.  
Command mode: Global configuration  
show access  
Displays the current system access parameters.  
Command mode: All  
Management Networks configuration  
The following table describes the Management Networks Configuration commands. You can configure up  
to 10 management networks on the HP 10GbE switch .  
Table 93 Management Networks Configuration commands  
Command  
Description  
access management-network <IP  
address> <IP mask>  
Adds a defined network through which switch access is allowed  
through Telnet, SNMP, SSH, or the browser-based interface. A range  
of IP addresses is produced when used with a network mask address.  
Specify an IP address and mask address in dotted-decimal notation.  
Command mode: Global configuration  
no access management-network  
<IP address> <IP mask>  
Removes a defined network, which consists of a management network  
address and a management network mask address.  
Command mode: Global configuration  
show access management-network  
Displays the current management networks parameters.  
Command mode: All except User EXEC  
119  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 93 Management Networks Configuration commands  
Command  
Description  
clear access management-network  
Clears the management network definitions.  
Command mode: All except User EXEC  
User Access Control configuration  
The following table describes the User Access Control commands.  
Table 94 User Access Control Configuration commands  
Command  
Description  
access user <1-10>  
Configures the User ID.  
Command mode: Global configuration  
access user eject  
<username>  
Ejects the selected user from the switch.  
Command mode: Global configuration  
access user user-  
password <1-128  
characters>  
Sets the user (user) password (maximum of 128 characters). The user has no  
direct responsibility for switch management. He or she can view switch status  
information and statistics, but cannot make any configuration changes.  
Command mode: Global configuration  
access user operator-  
password <1-128  
characters>  
Sets the operator (oper) password (maximum of 128 characters). The operator  
manages all functions of the switch. He or she can view all switch information  
and statistics and can reset ports or the entire switch.  
Command mode: Global configuration  
access user  
administrator-password  
<1-128 characters>  
Sets the administrator (admin) password (maximum of 128 characters). The  
super user administrator has complete access to all information and  
configuration commands on the switch, including the ability to change both the  
user and administrator passwords.  
Command mode: Global configuration  
show access user  
Displays the current user status.  
Command mode: All  
User ID configuration  
The following table describes the User ID Configuration commands.  
Table 95 User ID Configuration commands  
Command  
Description  
access user <1-10> level  
{user|operator|administrator}  
Sets the Class-of-Service to define the user’s authority level.  
Command mode: Global configuration  
access user <1-10> name <1-8  
characters>  
Defines the user name of maximum eight characters.  
Command mode: Global configuration  
120  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 95 User ID Configuration commands  
Command  
Description  
access user <1-10> password <1-128  
characters>  
Sets the user password of up to 128 characters maximum.  
Command mode: Global configuration  
access user <1-10> enable  
no access user <1-10> enable  
no access user <1-10>  
show access user  
Enables the user ID.  
Command mode: Global configuration  
Disables the user ID.  
Command mode: Global configuration  
Deletes the user ID.  
Command mode: Global configuration  
Displays the current user ID parameters.  
Command mode: All  
121  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Commands  
HTTPS Access configuration  
The following table describes the HTTPS Access Configuration commands.  
Table 96 HTTPS Access Configuration commands  
Command  
Description  
[no] access https enable  
Enables or disables BBI access (Web access) using HTTPS. The default value is  
disabled.  
Command mode: Global configuration  
access https port <TCP  
port number>  
Defines the HTTPS Web server port number.  
Command mode: Global configuration  
access https generate-  
certificate  
Allows you to generate a certificate to connect to the SSL to be used during the  
key exchange. A default certificate is created when HTTPS is enabled for the first  
time. The user can create a new certificate defining the information that they  
want to be used in the various fields. For example:  
Country Name (2 letter code) [ ]: CA  
State or Province Name (full name) [ ]: Ontario  
Locality Name (for example, city) [ ]: Ottawa  
Organization Name (for example, company) [ ]: Hewlett-Packard  
Organizational Unit Name (for example, section) [ ]: ProLiant  
Common Name (for example, user’s name) [ ]: Mr Smith  
Email (for example, email address) [ ]: [email protected]  
You must confirm if you want to generate the certificate. It takes approximately  
30 seconds to generate the certificate. Then the switch restarts SSL agent.  
Command mode: Global configuration  
access https save-  
certificate  
Allows the client, or the Web browser, to accept the certificate and save the  
certificate to Flash to be used when the switch is rebooted.  
Command mode: Global configuration  
show access  
Displays the current SSL Web Access configuration.  
Command mode: All except User EXEC  
122  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Port configuration  
Use the port configuration commands to configure settings for individual switch ports.  
NOTE: Port 17 is reserved for switch management.  
The following table describes the Port Configuration commands. The following sections provide more  
detailed information and commands.  
Table 97 Port Configuration commands  
Command  
Description  
interface port {<port  
number>}  
Enter Interface Port configuration mode for the selected port.  
Command mode: Global configuration  
dot1p <0-7>  
Configures the port’s 802.1p priority level.  
Command mode: Interface port  
pvid {<1-4094>}  
Sets the default VLAN number which will be used to forward frames which  
are not VLAN tagged. The default number is 1.  
NOTE: VLAN 4095 is reserved for switch management.  
Command mode: Interface port  
name {<1-64 characters>}  
Sets a name for the port (maximum 64 characters). The assigned port name  
displays next to the port number on some information and statistics screens.  
Command mode: Interface port  
[no] rmon  
Enables or disables Remote Monitoring for the port. RMON must be  
enabled for any RMON configurations to function.  
Command mode: Interface port  
[no] tagging  
[no] tag-pvid  
Disables or enables VLAN tagging for this port. It is disabled by default.  
Command mode: Interface port  
Disables or enables VLAN tag persistence. When disabled, the VLAN tag is  
removed from packets whose VLAN tag matches the port PVID. The default  
value is enabled.  
Command mode: Interface port  
broadcast-threshold  
{<0-262143>}  
Limits the number of broadcast packets per second to the specified value. If  
disabled (dis), the port forwards all broadcast packets.  
Command mode: Interface port  
multicast-threshold  
{<0-262143>}  
Limits the number of multicast packets per second to the specified value. If  
disabled (dis), the port forwards all multicast packets.  
Command mode: Interface port  
dest-lookup-threshold  
{<0-262143>}  
Limits the number of unknown unicast packets per second to the specified  
value. If disabled (dis), the port forwards all unknown unicast packets.  
Command mode: Interface port  
no shutdown  
Enables the port.  
Command mode: Interface port  
123  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 97 Port Configuration commands  
Command  
Description  
shutdown  
Disables the port. To temporarily disable a port without changing its  
configuration attributes, see the “Temporarily disabling a port” section later  
in this chapter.  
Command mode: Interface port  
show interface port {<port  
number>}  
Displays current port parameters.  
Command mode: All  
Temporarily disabling a port  
To temporarily disable a port without changing its stored configuration attributes, enter the following  
command at any prompt:  
Switch# interface port <port number> shutdown  
Because this configuration sets a temporary state for the port, you do not need to perform a save  
operation. The port state reverts to its original configuration when the switch is reloaded.  
Port link configuration  
Use these commands to set port parameters for the port link.  
Link commands are described in the following table. Using these commands, you can set port parameters  
such as speed, duplex, flow control, and negotiation mode for the port link.  
The following table describes the Gigabit Link Configuration commands.  
Table 98 Gigabit Link Configuration commands  
Command  
Description  
speed {100|10000}  
Sets the link speed.  
NOTE: All downlink and uplink ports are fixed at 10000 Mbps, and cannot be  
changed. Management port 17 is fixed at 100 Mbps.  
Command mode: Interface port  
duplex  
Sets the operating mode, as follows:  
Full-duplex  
NOTE: All ports are fixed at full duplex, and cannot be changed.  
Command mode: Interface port  
flowcontrol  
{receive|send|both}  
Sets the flow control. The choices include:  
Receive (rx) flow control  
Send (tx) flow control  
Both receive and transmit flow control (default)  
No flow control  
NOTE: Management port 17 is fixed at both, and cannot be changed.  
Command mode: Interface port  
124  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
Table 98 Gigabit Link Configuration commands  
Command  
Description  
no flowcontrol  
Sets the flow control to none.  
Command mode: Interface port  
[no] auto  
Enables or disables auto-negotiation for the port.  
All downlink and uplink ports are fixed at 10000 Mbps, and cannot be  
set to auto-negotiate.  
Command mode: Interface port  
show interface port  
{<port number>}  
Displays current port parameters.  
Command mode: All  
ACL Port configuration  
The following table describes the basic Access Control List Configuration commands for the port.  
Table 99 ACL Port Configuration commands  
Command  
Description  
[no] access-control list <1-384>  
Adds or removes the specified ACL.  
Command mode: Interface port  
[no] access-control group <1-384>  
Adds or removes the specified ACL Group.  
Command mode: Interface port  
show interface port [<port number>]  
access-control  
Displays current ACL QoS parameters.  
Command mode: All  
125  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Layer 2 configuration  
The following table describes the Layer 2 Configuration commands. The following sections provide more  
detailed information and commands.  
Table 100 Layer 2 Configuration commands  
Command  
Description  
vlan {<1-4094>}  
Enter VLAN configuration mode.  
Command mode: Global configuration  
[no] spanning-tree uplinkfast  
Enables or disables Fast Uplink Convergence, which provides rapid  
Spanning Tree convergence to an upstream switch during failover.  
NOTE: When enabled, this feature increases bridge priorities to 65500  
for all STGs and path cost by 3000 for all external STP ports.  
Command mode: Global configuration  
spanning-tree uplinkfast max-  
update-rate <10-200>  
Configures the station update rate, in packets per second.  
The range is 10-200. The default value is 40.  
Command mode: Global configuration  
show layer2  
Displays current Layer 2 parameters.  
Command mode: All  
802.1x configuration  
This feature allows you to configure the HP 10GbE switch as an IEEE 802.1x Authenticator, to provide  
port-based network access control. The following table describes the 802.1x Configuration commands.  
Table 101 802.1x Configuration commands  
Command  
Description  
dot1x enable  
Globally enables 802.1x.  
Command mode: Global configuration  
no dot1x enable  
show dot1x  
Globally disables 802.1x.  
Command mode: Global configuration  
Displays current 802.1x parameters.  
Command mode: All  
126  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
802.1x Global configuration  
The global 802.1x commands allow you to configure parameters that affect all ports in the switch (except  
management port 17). The following table describes the 802.1x Global Configuration commands.  
Table 102 802.1x Global Configuration commands  
Command  
Description  
dot1x mode {[force-unauthorized|  
auto|force-authorized]}  
Sets the type of access control for all ports:  
force-unauth—the port is unauthorized unconditionally.  
auto—the port is unauthorized until it is successfully authorized  
by the RADIUS server.  
force-auth—the port is authorized unconditionally, allowing  
all traffic.  
The default value is force-auth.  
Command mode: Global configuration  
dot1x quiet-time {<0-65535>}  
Sets the time, in seconds, the authenticator waits before transmitting  
an EAP-Request/ Identity frame to the supplicant (client) after an  
authentication failure in the previous round of authentication. The  
default value is 60 seconds.  
Command mode: Global configuration  
dot1x transmit-interval  
{<1-65535>}  
Sets the time, in seconds, the authenticator waits for an EAP-  
Response/Identity frame from the supplicant (client) before  
retransmitting an EAP-Request/Identity frame. The default value is  
30 seconds.  
Command mode: Global configuration  
dot1x supplicant-timeout  
{<1-65535>}  
Sets the time, in seconds, the authenticator waits for an EAP-  
Response packet from the supplicant (client) before retransmitting  
the EAP-Request packet from the authentication server. The default  
value is 30 seconds.  
dot1x server-timeout {<1-65535>}  
dot1x max-request {<1-10>}  
Sets the time, in seconds, the authenticator waits for a response  
from the Radius server before declaring an authentication timeout.  
The default value is 30 seconds.  
Command mode: Global configuration  
Sets the maximum number of times the authenticator retransmits an  
EAP-Request packet to the supplicant (client). The default value is 2.  
Command mode: Global configuration  
dot1x re-authentication-interval  
{<1-604800>}  
Sets the time, in seconds, the authenticator waits before re-  
authenticating a supplicant (client) when periodic re-authentication  
is enabled. The default value is 3600 seconds.  
Command mode: Global configuration  
[no] dot1x re-authenticate  
default dot1x  
Sets the re-authentication status to onor off. The default value is  
off.  
Command mode: Global configuration  
Resets the global 802.1x parameters to their default values.  
Command mode: Global configuration  
127  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 102 802.1x Global Configuration commands  
Command  
Description  
show dot1x  
Displays current global 802.1x parameters.  
Command mode: All  
802.1x Port configuration  
The 802.1x port commands allow you to configure parameters that affect the selected port in the switch.  
These settings override the global 802.1x parameters.  
The following table describes the 802.1x Port Configuration commands.  
Table 103 802.1x Port Configuration commands  
Command  
Description  
dot1x mode {[force-unauthorized|  
auto|force-authorized]}  
Sets the type of access control for the port:  
force-unauth—the port is unauthorized unconditionally.  
auto—the port is unauthorized until it is successfully authorized  
by the RADIUS server.  
force-auth—the port is authorized unconditionally, allowing  
all traffic.  
The default value is force-auth.  
Command mode: Interface port  
dot1x quiet-time {<0-65535>}  
Sets the time, in seconds, the authenticator waits before transmitting  
an EAP-Request/Identity frame to the supplicant (client) after an  
authentication failure in the previous round of authentication. The  
default value is 60 seconds.  
Command mode: Interface port  
dot1x transmit-interval  
{<1-65535>}  
Sets the time, in seconds, the authenticator waits for an EAP-  
Response/Identity frame from the supplicant (client) before  
retransmitting an EAP-Request/Identity frame. The default value is  
30 seconds.  
Command mode: Interface port  
dot1x supplicant-timeout  
{<1-65535>}  
Sets the time, in seconds, the authenticator waits for an EAP-  
Response packet from the supplicant (client) before retransmitting  
the EAP-Request packet from the authentication server. The default  
value is 30 seconds.  
Command mode: Interface port  
dot1x server-timeout {<1-65535>}  
dot1x max-request {<1-10>}  
Sets the time, in seconds, the authenticator waits for a response  
from the RADIUS server before declaring an authentication timeout.  
The default value is 30 seconds.  
Command mode: Interface port  
Sets the maximum number of times the authenticator retransmits an  
EAP-Request packet to the supplicant (client). The default value is 2.  
Command mode: Interface port  
128  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 103 802.1x Port Configuration commands  
Command  
Description  
dot1x re-authentication-interval  
{<1-604800>}  
Sets the time, in seconds, the authenticator waits before re-  
authenticating a supplicant (client) when periodic re-authentication  
is enabled. The default value is 3600 seconds.  
Command mode: Interface port  
[no] dot1x re-authenticate  
Sets the re-authentication status to onor off. The default value is  
off.  
Command mode: Interface port  
default dot1x  
Resets the global 802.1x parameters to their default values.  
Command mode: Interface port  
dot1x apply-global  
Applies the global 802.1x parameters to the port.  
Command mode: Interface port  
show interface port {<1-16,  
18-21>} dot1x  
Displays current 802.1x parameters on the specified port  
Command mode: All  
Rapid Spanning Tree Protocol /  
Multiple Spanning Tree Protocol configuration  
The switch supports the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) and IEEE 802.1s Multiple  
Spanning Tree Protocol (MSTP). MSTP allows you to map many VLANs to a small number of spanning  
tree groups, each with its own topology.  
MSTP supports up to 32 Spanning Tree Groups on the switch (STG 32 is reserved for switch  
management). MRST is turned off by default.  
NOTE: When Multiple Spanning Tree is turned on, VLAN 1 is moved from Spanning Tree Group 1  
to the Common Internal Spanning Tree (CIST). When Multiple Spanning Tree is turned off, VLAN 1  
is moved back to Spanning Tree Group 1.  
The following table describes the Multiple Spanning Tree Configuration commands.  
Table 104 Multiple Spanning Tree Configuration commands  
Command  
Description  
[no] spanning-tree mstp name  
{<1-32 characters>}  
Configures a name for the MSTP region. All devices within a MSTP  
region must have the same region name.  
Command mode: Global configuration  
spanning-tree mstp version  
{<0-65535>}  
Configures the revision level for the MSTP region. The revision level  
is used as a numerical identifier for the region. All devices within a  
MSTP region must have the same revision level number. The default  
value is 1.  
Command mode: Global configuration  
129  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 104 Multiple Spanning Tree Configuration commands  
Command  
Description  
spanning-tree mstp maximum-hop  
<4-60>  
Configures the maximum number of bridge hops a packet may to  
traverse before it is dropped. The range is from 4 to 60 hops. The  
default is 20.  
Command mode: Global configuration  
spanning-tree mode  
{mst|rstp|pvst}  
Selects the spanning-tree mode, as follows:  
Rapid Spanning Tree mode (rstp)  
Multiple Spanning Tree mode (mstp)  
Per VLAN Spanning Tree (pvst)  
The default mode is pvst.  
Command mode: Global configuration  
show spanning-tree mstp mrst  
Displays the current RSTP/MSTP configuration.  
Command mode: All  
NOTE:  
IEEE 802.1w standard-based RSTP implementation runs on one STG (i.e. same as one spanning tree  
instance) only. As a result, if ‘rstp’ mode is selected, then only a single RSTP instance (default for STG 1) is  
supported for all VLANs, including the Default VLAN 1.  
If multiple spanning tree instances are required, then select ‘mstp’ mode so that multiple VLANs are handled  
by multiple spanning tree instances, as specified by IEEE 802.1s standard-based MSTP implementation.  
IEEE 802.1s MSTP supports rapid convergence using IEEE 802.1w RSTP.  
PVST+ does not support rapid convergence in current versions.  
NOTE:  
The following configurations are unsupported:  
HP PVST+ (default Spanning Tree setting) is NOT interoperable with Cisco Rapid PVST+.  
HP MSTP/RSTP (with mode set to either ‘mstp’ or ‘rstp’) is NOT interoperable with Cisco Rapid PVST+.  
The following configurations are supported:  
HP PVST+ (default Spanning Tree setting) is interoperable with Cisco PVST+.  
HP MSTP/RSTP (with mode set to ‘mstp’) is interoperable with Cisco MST/RSTP.  
130  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Commands  
Common Internal Spanning Tree configuration  
The Common Internal Spanning Tree (CIST) provides compatibility with different MSTP regions and with  
devices running different Spanning Tree instances. It is equivalent to Spanning Tree Group 0.  
The following table describes the commands used to configure CIST commands.  
Table 105 CIST Configuration commands  
Command  
Description  
spanning-tree mstp cist-add-vlan <1-4095>  
Adds VLANs to the CIST. Enter one VLAN per line, and  
press Enter to add the VLANs.  
Command mode: Global configuration  
default spanning-tree mstp cist  
show spanning-tree mstp cist  
Resets all CIST parameters to their default values.  
Command mode: Global configuration  
Displays the current CIST configuration.  
Command mode: All  
CIST bridge configuration  
CIST bridge parameters are used only when the switch is in MSTP mode. CIST parameters do not affect  
operation of STP/PVST.  
The following table describes the commands used to configure CIST Bridge Configuration commands.  
Table 106 CIST Bridge Configuration commands  
Command  
Description  
spanning-tree mstp cist-  
bridge priority {<0-65535>}  
Configures the CIST bridge priority. The bridge priority parameter  
controls which bridge on the network is the MSTP root bridge.  
To make this switch the root bridge, configure the bridge priority lower  
than all other switches and bridges on your network. The lower the value,  
the higher the bridge priority. The range is 0 to 65535, and the default  
is 32768.  
This command does not apply to RSTP. See the "Bridge Spanning Tree  
configuration" section for more information.  
Command mode: Global configuration  
spanning-tree mstp cist-  
bridge maximum-age {<6-40>}  
Configures the CIST bridge maximum age. The maximum age parameter  
specifies the maximum time the bridge waits without receiving a  
configuration bridge protocol data unit before it reconfigures the MSTP  
network. The range is 6 to 40 seconds, and the default is 20 seconds.  
This command does not apply to RSTP. See the "Bridge Spanning Tree  
configuration" section for more information.  
Command mode: Global configuration  
131  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 106 CIST Bridge Configuration commands  
Command  
Description  
spanning-tree mstp cist-  
bridge forward-delay {<4-30>}  
Configures the CIST bridge forward delay parameter. The forward delay  
parameter specifies the amount of time that a bridge port has to wait  
before it changes from the listening state to the learning state and from  
the learning state to the forwarding state. The range is 4 to 30 seconds,  
and the default is 15 seconds.  
This command does not apply to RSTP. See the "Bridge Spanning Tree  
configuration" section for more information.  
Command mode: Global configuration  
show spanning-tree mstp cist  
Displays the current CIST bridge configuration.  
Command mode: All  
CIST port configuration  
CIST port parameters are used to modify MRST operation on an individual port basis. CIST parameters do  
not affect operation of STP/PVST.  
For each port, CIST is turned on by default. Port parameters include:  
Port priority  
Port path cost  
Port Hello time  
Link type  
Edge  
On and off  
Current port configuration  
The portoption of MRST is turned on by default.  
The following table describes the commands used to configure CIST Port Configuration commands.  
Table 107 CIST Port Configuration commands  
Command  
Description  
spanning-tree mstp cist  
interface-priority {<0-240>}  
Configures the CIST port priority. The port priority helps determine  
which bridge port becomes the designated port. In a network  
topology that has multiple bridge ports connected to a single segment,  
the port with the lowest port priority becomes the designated port for  
the segment. The range is 0 to 240, in steps of 16 (0, 16, 32...), and  
the default is 128.  
Command mode: Interface port  
spanning-tree mstp cist path-  
cost {<1-200000000>}  
Configures the CIST port path cost. The port path cost is used to help  
determine the designated port for a segment. Generally speaking, the  
faster the port, the lower the path cost. The default for Gigabit ports is  
20000, and for 10Gb ports is 2000.  
Command mode: Interface port  
132  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Table 107 CIST Port Configuration commands  
Command  
Description  
spanning-tree mstp cist hello  
{<1-10>}  
Configures the CIST port Hello time. The Hello time specifies how  
often the root bridge transmits a configuration bridge protocol data  
unit (BPDU). Any bridge that is not the root bridge uses the root bridge  
Hello value. The range is 1 to 10 seconds, and the default is  
2 seconds.  
Command mode: Interface port  
spanning-tree mstp cist link-  
type {auto|p2p|shared}  
Defines the type of link connected to the port, as follows:  
auto—Configures the port to detect the link type, and  
automatically match its settings.  
p2p—Configures the port for Point-To-Point protocol.  
shared—Configures the port to connect to a shared medium  
(usually a hub).  
The default link type is auto.  
Command mode: Interface port  
[no] spanning-tree mst cist  
edge  
Enables or disables this port as an edge port. An edge port is not  
connected to a bridge, and can begin forwarding traffic as soon as  
the link is up. Configure server ports as edge ports (enabled). This  
command is disabled by default.  
Command mode: Interface port  
spanning-tree mst cist enable  
Enables CIST on the port.  
Command mode: Interface port  
no spanning-tree mst cist  
enable  
Disables CIST on the port.  
Command mode: Interface port  
show interface port {<port  
number>} spanning-tree mstp  
cist  
Displays the current CIST port configuration.  
Command mode: All  
133  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Commands  
Spanning Tree configuration  
The switch supports the IEEE 802.1d Spanning Tree Protocol (STP) and Cisco proprietary PVST and PVST+  
protocols. You can configure up to 127 spanning tree groups on the switch (STG 128 is reserved for  
switch management). Spanning Tree is turned on by default.  
NOTE: When RSTP is turned on, only STP group 1 can be configured.  
The following table describes the Spanning Tree Configuration commands.  
Table 108 Spanning Tree Configuration commands  
Command  
Description  
spanning-tree stp {<1-128>} vlan  
{<1-4094>}  
Associates a VLAN with a spanning tree and requires an external  
VLAN ID as a parameter.  
Command mode: Global configuration  
no spanning-tree stp {<1-128>}  
vlan {<1-4094>}  
Breaks the association between a VLAN and a spanning tree and  
requires an external VLAN ID as a parameter.  
Command mode: Global configuration  
no spanning-tree stp {<1-128>}  
vlan all  
Removes all VLANs from a spanning tree.  
Command mode: Global configuration  
spanning-tree stp {<1-128>}  
enable  
Globally enables Spanning Tree Protocol.  
Command mode: Global configuration  
no spanning-tree stp {<1-128>}  
enable  
Globally disables Spanning Tree Protocol.  
Command mode: Global configuration  
default spanning-tree <1-128>  
Restores a spanning tree instance to its default configuration.  
Command mode: Global configuration  
show spanning-tree stp {<1-128>}  
Displays current Spanning Tree Protocol parameters.  
Command mode: All  
134  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Bridge Spanning Tree configuration  
Spanning tree bridge parameters can be configured for each Spanning Tree Group. STP bridge  
parameters include:  
Bridge priority  
Bridge hello time  
Bridge maximum age  
Forwarding delay  
Current bridge configuration  
The following table describes the Bridge Spanning Tree Configuration commands.  
Table 109 Bridge Spanning Tree Configuration commands  
Command  
Description  
spanning-tree stp {<1-128>}  
bridge priority {<0-65535>}  
Configures the bridge priority. The bridge priority parameter controls  
which bridge on the network is the STP root bridge.  
To make this switch the root bridge, configure the bridge priority lower  
than all other switches and bridges on your network. The lower the value,  
the higher the bridge priority. The range is 0 to 65535, and the default  
is 32768.  
RSTP/MSTP: The range is 0 to 61440, in steps of 4096 (0, 4096,  
8192...), and the default is 32768.  
This command does not apply to MSTP. See the “Common Internal  
Spanning Tree configuration” section for more information.  
Command mode: Global configuration  
spanning-tree stp {<1-128>}  
bridge hello-time {<1-10>}  
Configures the bridge hello time. The hello time specifies how often the  
root bridge transmits a configuration bridge protocol data unit (BPDU).  
Any bridge that is not the root bridge uses the root bridge hello value.  
The range is 1 to 10 seconds, and the default is 2 seconds.  
This command does not apply to MSTP. See the “Common Internal  
Spanning Tree configuration” section for more information.  
Command mode: Global configuration  
spanning-tree stp {<1-128>}  
bridge maximum-age {<6-40>}  
Configures the bridge maximum age. The maximum age parameter  
specifies the maximum time the bridge waits without receiving a  
configuration bridge protocol data unit before it reconfigures the STP  
network. The range is 6 to 40 seconds, and the default is 20 seconds.  
This command does not apply to MSTP. See the “Common Internal  
Spanning Tree configuration” section for more information.  
Command mode: Global configuration  
spanning-tree stp {<1-128>}  
bridge forward-delay {<4-30>}  
Configures the bridge forward delay parameter. The forward delay  
parameter specifies the amount of time that a bridge port has to wait  
before it changes from the listening state to the learning state and from  
the learning state to the forwarding state. The range is 4 to 30 seconds,  
and the default is 15 seconds.  
This command does not apply to MSTP. See the “Common Internal  
Spanning Tree configuration” section for more information.  
Command mode: Global configuration  
show spanning-tree stp  
{<1-128>} bridge  
Displays the current bridge STP parameters.  
Command mode: All  
135  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
When configuring STP bridge parameters, the following formulas must be used:  
2*(fwd-1) mxage  
2*(hello+1) mxage  
Spanning Tree port configuration  
The default configuration for STP/PVST+ is off for downlink ports (1-16) and the management port (17),  
and on for uplink ports (18-21). The default configuration for RSTP/MSTP is Spanning Tree off for all  
downlink ports (1-16) and the management port (17), and on for all uplink ports (18-21), with downlink  
ports configured as edge ports.  
Spanning tree port parameters are used to modify STP operation on an individual port basis. STP port  
parameters include:  
Port priority  
Port path cost  
The following table describes the Spanning Tree Port Configuration commands.  
Table 110 Spanning Tree Port Configuration commands  
Command  
Description  
spanning-tree stp {<1-128>}  
priority {<0-255>}  
Configures the port priority. The port priority helps determine which  
bridge port becomes the designated port.  
In a network topology that has multiple bridge ports connected to a  
single segment, the port with the lowest port priority becomes the  
designated port for the segment.  
The range is 0 to 255, and the default is 128.  
RSTP/MSTP: The range is 0 to 240, in steps of 16 (0, 16, 32...) and the  
default is 128.  
Command mode: Interface port  
spanning-tree stp {<1-128>}  
path-cost {<1-65535>}  
Configures the port path cost. The port path cost is used to help  
determine the designated port for a segment. Generally speaking, the  
faster the port, the lower the path cost.  
The range is 1 to 65535. The default is 100 for 10Mb ports, 10 for 100  
Mb ports, 4 for Gigabit ports, and 2 for 10Gb ports.  
A value of 0 indicates that the default cost will be computed for an auto-  
negotiated link speed.  
RSTP/MSTP: The range is 1 – 200000000, and the default it 20000 for  
Gigabit ports, 2000 for 10Gb ports.  
Command mode: Interface port  
spanning-tree stp {<1-128>}  
link {auto|p2p|shared}  
Defines the type of link connected to the port, as follows:  
auto—Configures the port to detect the link type, and automatically  
match its settings.  
p2p—Configures the port for Point-To-Point protocol.  
shared—Configures the port to connect to a shared medium (usually  
a hub).  
This command only applies when RSTP is turned on. See the “Common  
Internal Spanning Tree configuration” section for more information.  
Command mode: Interface port  
136  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 110 Spanning Tree Port Configuration commands  
Command  
Description  
[no] spanning-tree stp  
{<1-128>} edge  
Enables or disables this port as an edge port. An edge port is not  
connected to a bridge, and can begin forwarding traffic as soon as the  
link is up. Configure server ports as edge ports (enabled).  
This command only applies when RSTP is turned on. See the “Common  
Internal Spanning Tree configuration” section for more information.  
Command mode: Interface port  
spanning-tree stp {<1-128>}  
fastforward  
Enables or disables Port Fast Forward on the port.  
Command mode: Interface port  
spanning-tree stp {<1-128>}  
enable  
Enables STP on the port.  
Command mode: Interface port  
no spanning-tree stp  
{<1-128>} enable  
Disables STP on the port.  
Command mode: Interface port  
show interface port {<port  
number>} spanning-tree stp  
{<1-128>}  
Displays the current STP port parameters.  
Command mode: All  
Forwarding Database configuration  
The following table describes the Forwarding Database Configuration commands.  
Table 111 FDB Configuration commands  
Command  
Description  
aging <0-65535>  
Configures the aging value for FDB entries. The default value is 300.  
Displays current FDB parameters.  
show mac-address-table  
Static FDB configuration  
The following table describes the Static FDB Configuration commands.  
Table 112 Static FDB Configuration commands  
Command  
Description  
mac-address-table static  
[<MAC address> vlan <VLAN>  
port <port>]  
Adds a static entry to the forwarding database.  
Command mode: Global configuration  
no mac-address-table static  
[<MAC address>| all]  
Deletes a static entry from the forwarding database.  
Command mode: Global configuration  
137  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 112 Static FDB Configuration commands  
Command  
Description  
mac-address-table static all  
[<interface>|<VLAN>|<port>]  
Clears specified static FDB entries from the forwarding database, as  
follows:  
Interface  
MAC address  
VLAN  
Command mode: Global configuration  
Trunk configuration  
Trunk groups can provide super-bandwidth connections between switches or other trunk capable devices.  
A trunk is a group of ports that act together, combining their bandwidth to create a single, larger port. Up  
to 12 trunk groups can be configured on the switch, with the following restrictions.  
Any physical switch port can belong to no more than one trunk group.  
Up to six ports can belong to the same trunk group.  
All ports in a trunk must have the same configuration for speed, flow control, and auto negotiation.  
Trunking from other devices must comply with Cisco® EtherChannel® technology.  
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on how to use port  
trunks.  
The following table describes the Trunk Group Configuration commands.  
Table 113 Trunk Group Configuration commands  
Command  
Description  
portchannel{<1-12>} port  
{<port number>}  
Adds a physical port to the current trunk group.  
Command mode: Global configuration  
no portchannel {<1-12>} port  
{<port number>}  
Removes a physical port from the current trunk group.  
Command mode: Global configuration  
portchannel {<1-12>} enable  
no portchannel {<1-12>} enable  
no portchannel {<1-12>}  
Enables the current trunk group.  
Command mode: Global configuration  
Disables the current trunk group.  
Command mode: Global configuration  
Removes the current trunk group configuration.  
Command mode: Global configuration  
show portchannel {<1-12>}  
Displays current trunk group parameters.  
Command mode: All  
138  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Layer 2 IP Trunk Hash configuration  
Trunk hash parameters are set globally for the HP 10GbE switch. You can enable one or two parameters,  
to configure any of the following valid combinations:  
SMAC (source MAC only)  
DMAC (destination MAC only)  
SIP (source IP only)  
DIP (destination IP only)  
SIP + DIP (source IP and destination IP)  
SMAC + DMAC (source MAC and destination MAC)  
The following table describes the IP Trunk Hash Configuration commands.  
Table 114 IP Trunk Hash Set commands  
Command  
Description  
portchannel hash source-mac-  
address  
Enable or disable trunk hashing on the source MAC.  
Command mode: Global configuration  
portchannel hash destination-mac-  
address  
Enable or disable trunk hashing on the destination MAC.  
Command mode: Global configuration  
portchannel hash source-ip-  
address  
Enable or disable trunk hashing on the source IP.  
Command mode: Global configuration  
portchannel hash destination-ip-  
address  
Enable or disable trunk hashing on the destination IP.  
Command mode: Global configuration  
portchannel hash source-  
destination-ip  
Enable trunk hashing on the source and destination IP.  
Command mode: Global configuration  
portchannel hash source-  
destination-mac  
Enable trunk hashing on the source and destination MAC address.  
Command mode: Global configuration  
show portchannel hash  
Display current trunk hash configuration.  
Command mode: All  
139  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Link Aggregation Control Protocol configuration  
The following table describes the LACP Configuration commands.  
Table 115 LACP Configuration commands  
Command  
Description  
lacp system-priority  
{<1-65535>}  
Defines the priority value (1 through 65535) for the switch. Lower numbers provide  
higher priority. The default value is 32768.  
Command mode: Global configuration  
lacp timeout  
{short|long}  
Defines the timeout period before invalidating LACP data from a remote partner.  
Choose short(3 seconds) or long(90 seconds). The default value is long.  
NOTE: HP recommends that you use a timeout value of long, to reduce LACPDU  
processing. If your switch’s CPU utilization rate remains at 100% for periods of 90  
seconds or more, consider using static trunks instead of LACP.  
Command mode: Global configuration  
show lacp  
Display current LACP configuration.  
Command mode: All  
LACP Port configuration  
The following table describes the LACP Port Configuration commands.  
Table 116 LACP Port Configuration commands  
Command  
Description  
lacp mode  
{off|active|passive}  
Set the LACP mode for this port, as follows:  
off—Turn LACP off for this port. You can use this port to manually  
configure a static trunk. The default value is off.  
active—Turn LACP on and set this port to active. Active ports initiate  
LACPDUs.  
passive—Turn LACP on and set this port to passive. Passive ports do not  
initiate LACPDUs, but respond to LACPDUs from active ports.  
Command mode: Global configuration  
lacp priority {<1-65535>}  
lacp key {<1-65535>}  
Sets the priority value for the selected port. Lower numbers provide higher  
priority. Default is 128.  
Command mode: Global configuration  
Set the admin key for this port. Only ports with the same admin key and oper  
key (operational state generated internally) can form a LACP trunk group.  
Command mode: Global configuration  
show interface port  
{<port number>} lacp  
Displays the current LACP configuration for this port.  
Command mode: All  
140  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
VLAN configuration  
The commands in this section configure VLAN attributes, change the status of the VLAN, delete the VLAN,  
and change the port membership of the VLAN.  
By default, the VLANs are disabled except VLAN 1, which is always enabled. The switch supports a  
maximum of 1,000 VLANs. VLAN 4095 is reserved for switch management.  
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information about VLANs.  
The following table describes the VLAN Configuration commands.  
Table 117 VLAN Configuration commands  
Command  
Description  
vlan {<1-4094>}  
Enter VLAN configuration mode.  
Command mode: Global configuration  
name {<1-32 characters>}  
stg {<1-127>}  
Assigns a name to the VLAN or changes the existing name. The default  
VLAN name is the first one.  
Command mode: VLAN configuration  
Assigns a VLAN to a spanning tree group. If MSTP is used, the range  
is 0-32 (0 = CIST).  
Command mode: VLAN configuration  
member {<port number>}  
no member {<port number>}  
enable  
Adds ports to the VLAN membership.  
Command mode: VLAN configuration  
Removes ports from the VLAN membership.  
Command mode: VLAN configuration  
Enables this VLAN.  
Command mode: VLAN configuration  
no enable  
Disables this VLAN without removing it from the configuration.  
Command mode: VLAN configuration  
no vlan {<1-4094>}  
show vlan [<1-4095>]  
Deletes this VLAN.  
Command mode: Global configuration  
Displays the current VLAN configuration.  
Command mode: All  
IMPORTANT: All ports must belong to at least one VLAN. Any port which is removed from a  
VLAN and which is not a member of any other VLAN is automatically added to default VLAN 1.  
You cannot remove a port from VLAN 1 if the port has no membership in any other VLAN. Also,  
you cannot add a port to more than one VLAN unless the port has VLAN tagging turned on.  
141  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Layer 3 configuration  
The following table describes basic Layer 3 Configuration commands. The following sections provide  
more detailed information and commands.  
Table 118 L3 Configuration commands  
Command  
Description  
interface ip {<1-250>}  
Enter IP Interface mode.  
Command mode: Global configuration  
route-map <1-32>  
router rip  
Enter IP Route Map mode.  
Command mode: Global configuration  
Enter Router RIP mode.  
Command mode: Global configuration  
router ospf  
Enter Router OSPF mode.  
Command mode: Global configuration  
router vrrp  
Enter VRRP configuration mode.  
Command mode: Global configuration  
ip router-id <IP address>  
show layer3  
Sets the router ID.  
Command mode: Global configuration  
Displays the current IP configuration.  
Command mode: All except User EXEC  
IP interface configuration  
The switch can be configured with up to 250 IP interfaces. Each IP interface represents the switch on an IP  
subnet on your network. The IP Interface option is disabled by default.  
The following table describes the IP Interface Configuration commands.  
Table 119 IP Interface Configuration commands  
Command  
Description  
interface ip {<1-250>}  
Enter IP interface mode.  
Command mode: Global configuration  
ip address {<IP address>}{<IP  
netmask>}  
Configures the IP address and mask of the switch interface using dotted  
decimal notation.  
Command mode: Interface IP  
vlan {<1-4094>}  
Configures the VLAN number for this interface. Each interface can  
belong to one VLAN, though any VLAN can have multiple IP interfaces  
in it.  
Command mode: Interface IP  
[no] relay  
enable  
Enables or disables the BOOTP relay on this interface. The default value  
is enabled.  
Command mode: Interface IP  
Enables this IP interface.  
Command mode: Interface IP  
142  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
Table 119 IP Interface Configuration commands  
Command  
Description  
no enable  
Disables this IP interface.  
Command mode: Interface IP  
no interface ip {<1-250>}  
show interface ip {<1-250>}  
Removes this IP interface.  
Command mode: Global configuration  
Displays the current interface settings.  
Command mode: All  
NOTE: If you enter an IP address for interface 1, you are prompted to change the BOOTP setting.  
Default Gateway configuration  
The switch supports up to four gateways, plus management gateway 254. By default, no gateways are  
configured on the switch. Enter 1, 2, 3, 4, or 254 in the command as the ip gatewayinstance,  
depending upon which gateway you want to configure.  
The following table describes the Default IP Gateway Configuration commands.  
Table 120 Default IP Gateway Configuration commands  
Command  
Description  
ip gateway {<1-4, 254>}  
address {<IP address>}  
Configures the IP address of the default IP gateway using dotted decimal  
notation.  
Command mode: Global configuration  
ip gateway {<1-4, 254>}  
interval {<0-60>}  
The switch pings the default gateway to verify that it is up. This option sets the  
time between health checks. The range is from 0 to 60 seconds. The default is  
2 seconds.  
Command mode: Global configuration  
ip gateway {<1-4, 254>}  
retry {<1-120>}  
Sets the number of failed health check attempts required before declaring this  
default gateway inoperative. The range is from 1 to 120 attempts. The default  
is 8 attempts.  
Command mode: Global configuration  
[no] ip gateway {<1-4,  
254>} arp-health-check  
Enables or disables Address Resolution Protocol (ARP) health checks. This  
command is disabled by default.  
Command mode: Global configuration  
ip gateway {<1-4, 254>}  
enable  
Enables the gateway for use.  
Command mode: Global configuration  
no ip gateway {<1-4,  
254>} enable  
Disables the gateway.  
Command mode: Global configuration  
no ip gateway {<1-4,  
254>}  
Deletes the gateway from the configuration.  
Command mode: Global configuration  
show ip gateway {<1-4,  
254>}  
Displays the current gateway settings.  
Command mode: All except User EXEC  
143  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
IP Static Route configuration  
The following table describes the Static Route Configuration commands.  
Table 121 Static Route Configuration commands  
Command  
Description  
ip route <IP subnet> <IP netmask>  
<IP nexthop> [<IP interface (1-250)>]  
Adds a static route. You will be prompted to enter a  
destination IP address, destination subnet mask, and gateway  
address. Enter all addresses using dotted decimal notation.  
Command mode: Global configuration  
no ip route {<IP subnet>}{<IP  
netmask>}  
Removes a static route. The destination address of the route to  
remove must be specified using dotted decimal notation.  
Command mode: Global configuration  
show ip route static  
Displays the current IP static route configuration.  
Command mode: All except User Exec  
Address Resolution Protocol configuration  
Address Resolution Protocol (ARP) is the TCP/IP protocol that resides within the Internet layer. ARP resolves  
a physical address from an IP address. ARP queries machines on the local network for their physical  
addresses. ARP also maintains IP to physical address pairs in its cache memory. In any IP communication,  
the ARP cache is consulted to see if the IP address of the computer or the router is present in the ARP  
cache. Then the corresponding physical address is used to send a packet.  
The following table describes the ARP Configuration commands.  
Table 122 ARP Configuration commands  
Command  
Description  
ip arp rearp <2-120>  
Defines re-ARP period in minutes. You can set this duration between 2  
and 120 minutes.  
show ip arp  
Displays the current ARP configurations.  
Command mode: All except User EXEC  
144  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Static ARP configuration  
Static ARP entries are permanent in the ARP cache and do not age out like the ARP entries that are  
learnt dynamically. Static ARP entries enable the switch to reach the hosts without sending an ARP  
broadcast request to the network. Static ARPs are also useful to communicate with devices that do  
not respond to ARP requests. Static ARPs can also be configured on some gateways as a protection  
against malicious ARP Cache corruption and possible DOS attacks.  
The following table describes the Static ARP Configuration commands.  
Table 123 Static ARP Configuration commands  
Command  
Description  
ip arp <IP address> <MAC  
address> <VLAN number> <port  
number>  
Adds a permanent ARP entry.  
Command mode: Global configuration  
no ip arp {<IP address>}  
Deletes a permanent ARP entry.  
Command mode: Global configuration  
clear ip arp-cache  
Clears static ARP entries.  
Command mode: Global configuration  
show ip arp static  
Displays current static ARP configuration.  
Command mode: All except User EXEC  
145  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
IP Forwarding configuration  
The following table describes the IP Forwarding Configuration commands.  
Table 124 IP Forwarding Configuration commands  
Command  
Description  
[no] ip routing direct-broadcasts  
Enables or disables forwarding directed broadcasts. This  
command is disabled by default.  
Command mode: Global configuration  
ip routing  
Enables IP forwarding (routing) on the switch.  
Command mode: Global configuration  
no ip routing  
Disables IP forwarding (routing) on the switch. Forwarding is  
turned off by default.  
Command mode: Global configuration  
show ip routing  
Displays the current IP forwarding settings.  
Command mode: All except User EXEC  
Network Filter configuration  
The following table describes the Network Filter Configuration commands.  
Table 125 Network Filter Configuration commands  
Command  
Description  
ip match-address <1-256> <IP address>  
<IP netmask>  
Sets the starting IP address the IP subnet mask for this filter.  
The default address is 0.0.0.0.  
This command defines the range of IP addresses that will be  
accepted by the peer when the filter is enabled.  
Command mode: Global configuration  
ip match-address <1-256> enable  
no ip match-address <1-256> enable  
no ip match-address <1-256>  
Enables the Network Filter configuration.  
Command mode: Global configuration  
Disables the Network Filter configuration.  
Command mode: Global configuration  
Deletes the Network Filter configuration.  
Command mode: Global configuration  
show ip match-address [<1-256>]  
Displays the current the Network Filter configuration.  
Command mode: All except User EXEC  
146  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Route Map configuration  
Routing maps control and modify routing information. The map number <1-32>represents the routing  
map you wish to configure.  
The following table describes the basic Route Map Configuration commands. The following sections  
provide more detailed information and commands.  
Table 126 Route Map Configuration commands  
Command  
Description  
route-map <1-32>  
Enter Route Map configuration mode.  
Command mode: Global configuration  
[no] access-list <1-8>  
Configures the Access List.  
Command mode: Route Map  
[no] metric <0-16777214>  
[no] metric-type {type1|type2}  
Sets the metric of the matched route.  
Command mode: Route Map  
Assigns the type of OSPF metric. The default is type 1.  
Type 1—External routes are calculated using both internal and  
external metrics.  
Type 2—External routes are calculated using only the external  
metrics. Type 2 routes have more cost than Type 2.  
none—Removes the OSPF metric.  
Command mode: Route Map  
precedence <1-256>  
Sets the precedence of the route map. The smaller the value, the  
higher the precedence. Default value is 10.  
Command mode: Route Map  
enable  
Enables the route map.  
Command mode: Route Map  
no enable  
Disables the route map.  
Command mode: Route Map  
no route-map <1-32>  
show route-map [<1-32>]  
Deletes the route map.  
Command mode: Route Map  
Displays the current route configuration.  
Command mode: All except User EXEC  
147  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
IP Access List configuration  
The route map number <1-32>and the access list number <1-8>represent the IP access list you wish to  
configure. The following table describes the IP Access List Configuration commands.  
Table 127 IP Access List Configuration commands  
Command  
Description  
[no] access-list <1-8> match-address <1-32>  
Sets the network filter number.  
Command mode: Route Map  
[no] access-list <1-8> metric <1-16777214>  
access-list <1-8> action {permit|deny}  
access-list <1-8> enable  
Sets the metric value in the AS-External (ASE) LSA.  
Command mode: Route Map  
Permits or denies action for the access list.  
Command mode: Route Map  
Enables the access list.  
Command mode: Route Map  
no access-list <1-8> enable  
Disables the access list.  
Command mode: Route Map  
no access-list <1-8>  
Deletes the access list.  
Command mode: Route Map  
show route-map <1-32> access-list {<1-8>}  
Displays the current Access List configuration.  
Command mode: All except User EXEC  
Routing Information Protocol configuration  
The RIP commands are used for configuring Routing Information Protocol parameters. This option is turned  
off by default.  
The following table describes the basic RIP Configuration commands. The following section provides more  
detailed information and commands.  
Table 128 RIP Configuration commands  
Command  
Description  
router rip  
Enter router RIP configuration mode.  
Command mode: Global configuration  
timers update {<1-120>}  
Configures the time interval for sending for RIP table updates, in seconds.  
The default value is 30 seconds.  
Command mode: Router RIP  
enable  
Globally turns RIP on.  
Command mode: Router RIP  
no enable  
show ip rip  
Globally turns RIP off.  
Command mode: Router RIP  
Displays the current RIP configuration.  
Command mode: All except User EXEC  
148  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
RIP Interface configuration  
The RIP commands are used for configuring Routing Information Protocol parameters. This option is turned  
off by default.  
NOTE: Do not configure RIP version 1 parameters if your routing equipment uses RIP version 2.  
The following table describes the RIP Interface Configuration commands.  
Table 129 RIP Interface Configuration commands  
Command  
Description  
ip rip version {1|2|both}  
Configures the RIP version used by this interface.  
The default value is version 2.  
Command mode: Interface IP  
[no] ip rip supply  
[no] ip rip listen  
[no] ip rip poison  
When enabled, the switch supplies routes to other routers. This  
command is enabled by default.  
Command mode: Interface IP  
When enabled, the switch learns routes from other routers. This  
command is enabled by default.  
Command mode: Interface IP  
When enabled, the switch uses split horizon with poisoned reverse.  
When disabled, the switch uses only split horizon. This command is  
disabled by default.  
Command mode: Interface IP  
[no] ip rip split-horizon  
[no] ip rip triggered  
Enables or disables split horizon. The default value is enabled.  
Enables or disables Triggered Updates. Triggered Updates are used  
to speed convergence. When enabled, Triggered Updates force a  
router to send update messages immediately, even if it is not yet time  
for the update message. The default value is disabled.  
Command mode: Interface IP  
[no] ip rip multicast-updates  
Enables or disables multicast updates of the routing table (using  
address 224.0.0.9). The default value is enabled.  
Command mode: Interface IP  
[no] ip rip default-action  
{none|listen|supply|both}  
When enabled, the switch accepts RIP default routes from other  
routers, but gives them lower priority than configured default  
gateways. When disabled, the switch rejects RIP default routes.  
The default value is disabled.  
Command mode: Interface IP  
[no] ip rip metric {<1-15>}  
Configures the route metric, which indicates the relative distance to  
the destination. The default value is 1.  
Command mode: Interface IP  
[no] ip rip authentication type  
{<password>}  
Configures the authentication type. The default is none.  
Command mode: Interface IP  
149  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 129 RIP Interface Configuration commands  
Command  
Description  
ip rip authentication key  
{<password>}  
Configures the authentication key password.  
Command mode: Interface IP  
ip rip enable  
Enables this RIP interface.  
Command mode: Interface IP  
no ip rip enable  
Disables this RIP interface.  
Command mode: Interface IP  
show interface ip [<1-250>] rip  
Displays the current RIP configuration.  
Command mode: All except User EXEC  
RIP Route Redistribution configuration  
The following table describes the RIP Route Redistribute commands.  
Table 130 RIP Redistribute commands  
Command  
Description  
redistribute  
{fixed|static|ospf|eospf} <1-32>  
Adds selected routing maps to the RIP route redistribution list. This  
option adds a route map to the route redistribution list. The routes of  
the redistribution protocol matched by the route maps in the route  
redistribution list will be redistributed.  
Command mode: Router RIP  
no redistribute  
{fixed|static|ospf|eospf} <1-32>  
Removes the route map from the RIP route redistribution list.  
Command mode: Router RIP  
redistribute  
{fixed|static|ospf|eospf} export  
metric <1-15>  
Exports the routes of this protocol in which the metric and metric type  
are specified. To remove a previous configuration and stop exporting  
the routes of the protocol, enter none.  
Command mode: Router RIP  
show ip rip redistribute  
Displays the current RIP route redistribute configuration.  
Command mode: Router RIP  
150  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Open Shortest Path First configuration  
The following table describes the basic Open Shortest Path First (OSPF) commands. The following sections  
provide more detailed information and commands.  
Table 131 OSPF Configuration commands  
Command  
Description  
router ospf  
Enter Router OSPF configuration mode.  
Command mode: Router OSPF  
area <0-2>  
Configures the OSPF area.  
Command mode: Router OSPF  
area-range <0-16>  
ip ospf <1-249)>  
area-virtual-link <1-3>  
Configures the summary range.  
Command mode: Router OSPF  
Configures the OSPF interface.  
Command mode: Interface IP  
Configures a Virtual Link.  
Command mode: Router OSPF  
message-digest-key <1-255>  
md5-key <key string>  
Assigns a string to MD5 authentication key.  
Command mode: Router OSPF  
host <1-128>  
Configures an OSPF host route. Up to 128 host routes can be configured.  
Host routes are used for advertising network device IP addresses to external  
networks to perform server load balancing within OSPF. It also makes Area  
Border Route (ABR) load sharing and ABR failover possible.  
Command mode: Router OSPF  
lsdb-limit <0-2000>  
Sets the link state database limit.  
Command mode: Router OSPF  
[no] default-information  
<1-16777214> <as-value>  
Sets one default route among multiple choices in an area.  
Command mode: Router OSPF  
enable  
Enables OSPF.  
Command mode: Router OSPF  
no enable  
show ip ospf  
Disables OSPF.  
Command mode: Router OSPF  
Displays the current OSPF configuration settings.  
Command mode: All except User EXEC  
151  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
OSFP Area Index configuration  
The following table describes the Area Index Configuration commands.  
Table 132 OSPF Area Index Configuration commands  
Command  
Description  
area <0-2> area-id <A.B.C.D>  
Defines the area ID of the OSPF area number.  
Command mode: Router OSPF  
area <0-2> type  
{transit|stub|nssa}  
Defines the type of area. For example, when a virtual link has to be  
established with the backbone, the area type must be defined as  
transit.  
transit—allows area summary information to be exchanged  
between routing devices. Any area that is not a stub area or  
NSSA is considered to be transit area.  
stub—is an area where external routing information is not  
distributed. Typically, a stub area is connected to only one  
other area.  
nssa—Not-So-Stubby Area (NSSA) is similar to stub area with  
additional capabilities. For example, routes originating from  
within the NSSA can be propagated to adjacent transit and  
backbone areas. External routes from outside the Autonomous  
System (AS) can be advertised within the NSSA but are not  
distributed into other areas.  
Command mode: Router OSPF  
area <0-2> stub-metric <1-65535>  
Configures a stub area to send a numeric metric value. All routes  
received via that stub area carry the configured metric to  
potentially influencing routing decisions.  
Metric value assigns the priority for choosing the switch for default  
route. Metric type determines the method for influencing routing  
decisions for external routes.  
Command mode: Router OSPF  
[no] area <0-2> authentication-  
type {password|md5}  
Defines the authentication method, as follows:  
no—No authentication required.  
password—Authenticates simple passwords so that only  
trusted routing devices can participate.  
md5—This parameter is used when MD5 cryptographic  
authentication is required.  
Command mode: Router OSPF  
area <0-2> spf-interval <0-255>  
Sets time interval between two successive SPF (shortest path first)  
calculations of the shortest path tree using the Dijkstra’s algorithm.  
Command mode: Router OSPF  
area <0-2> enable  
no area <0-2> enable  
no area <0-2>  
Enables the OSPF area.  
Command mode: Router OSPF  
Disables the OSPF area.  
Command mode: Router OSPF  
Deletes the OSPF area.  
Command mode: Router OSPF  
152  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 132 OSPF Area Index Configuration commands  
Command  
Description  
show ip ospf area <0-2>  
Displays the current OSPF configuration.  
Command mode: All except User EXEC  
OSPF Summary Range configuration  
The following table describes the OSPF Summary Range Configuration commands.  
Table 133 OSPF Summary Range Configuration commands  
Command  
Description  
area-range <1-16> address  
<IP address> <IP netmask>  
Configures the base IP address and IP address mask for the range.  
Command mode: Router OSPF  
area-range <1-16> area <0-2>  
[no] area-range <1-16> hide  
area-range <1-16> enable  
no area-range <1-16> enable  
no area-range <1-16>  
Configures the area index used by the switch.  
Command mode: Router OSPF  
Hides the OSPF summary range.  
Command mode: Router OSPF  
Enables the OSPF summary range.  
Command mode: Router OSPF  
Disables the OSPF summary range.  
Command mode: Router OSPF  
Deletes the OSPF summary range.  
Command mode: Router OSPF  
show ip ospf area-range <1-16>  
Displays the current OSPF summary range.  
Command mode: All except User EXEC  
153  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
OSPF Interface configuration  
The following table describes the OSPF Interface Configuration commands.  
Table 134 OSPF Interface Configuration commands  
Command  
Description  
ip ospf area <0-2>  
Configures the OSPF area index.  
Command mode: Interface IP  
ip ospf priority <0-255>  
Configures the assigned priority value to the OSPF interfaces.  
(A priority value of 255 is the highest and 1 is the lowest. A priority value of 0  
specifies that the interface cannot be used as Designated Router (DR) or Backup  
Designated Router (BDR).)  
Command mode: Interface IP  
ip ospf cost <1-65535>  
Configures cost set for the selected path—preferred or backup. Usually the cost  
is inversely proportional to the bandwidth of the interface. Low cost indicates  
high bandwidth.  
Command mode: Interface IP  
ip ospf hello-interval  
<1-65535>  
Configures the interval in seconds between the hellopackets for the interfaces.  
Command mode: Interface IP  
ip ospf dead-interval  
<1-65535>  
Configures the health parameters of a hellopacket, which is set for an interval  
of seconds before declaring a silent router to be down.  
Command mode: Interface IP  
ip ospf transit-delay  
<1-3600>  
Configures the transit delay in seconds.  
Command mode: Interface IP  
ip ospf retransmit-  
interval <1-3600>  
Configures the retransmit interval in seconds.  
Command mode: Interface IP  
[no] ip ospf key <key  
string>  
Sets the authentication key to clear the password.  
Command mode: Interface IP  
[no] ip ospf message-  
digest-key <1-255>  
Assigns an MD5 key to the interface.  
Command mode: Interface IP  
ip ospf enable  
no ip ospf enable  
no ip ospf  
Enables the OSPF interface.  
Command mode: Interface IP  
Disables the OSPF interface.  
Command mode: Interface IP  
Deletes the OSPF interface.  
Command mode: Interface IP  
show interface ip ospf  
{<1-250>}  
Displays the current settings for OSPF interface.  
Command mode: All except User EXEC  
154  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
OSPF Virtual Link configuration  
The following table describes the OSPF Virtual Link Configuration commands.  
Table 135 OSPF Virtual Link Configuration commands  
Command  
Description  
area-virtual-link <1-3> area  
<0-2>  
Configures the OSPF area index.  
Command mode: Router OSPF  
area-virtual-link <1-3>  
hello-interval <1-65535>  
Configures the authentication parameters of a hello packet, which is set to  
be in an interval of seconds.  
Command mode: Router OSPF  
area-virtual-link <1-3>  
dead-interval <1-65535>  
Configures the health parameters of a hello packet, which is set to be in an  
interval of seconds. Default is 40 seconds.  
Command mode: Router OSPF  
area-virtual-link <1-3>  
transit-delay <1-3600>  
Configures the delay in transit in seconds. Default is one second.  
Command mode: Router OSPF  
area-virtual-link <1-3>  
retransmit-interval <1-3600>  
Configures the retransmit interval in seconds. Default is five seconds.  
Command mode: Router OSPF  
area-virtual-link <1-3>  
neighbor-router <IP address>  
Configures the router ID of the virtual neighbor. Default is 0.0.0.0.  
Command mode: Router OSPF  
[no] area-virtual-link <1-3>  
key <key string>  
Configures the password (up to eight characters) for each virtual link.  
Default is none.  
Command mode: Router OSPF  
area-virtual-link <1-3>  
message-digest-key <1-255>  
Sets MD5 key ID for each virtual link. Default is none.  
Command mode: Router OSPF  
area-virtual-link <1-3>  
enable  
Enables OSPF virtual link.  
Command mode: Router OSPF  
no area-virtual-link <1-3>  
enable  
Disables OSPF virtual link.  
Command mode: Router OSPF  
no area-virtual-link <1-3>  
Deletes OSPF virtual link.  
Command mode: Router OSPF  
show ip ospf area-virtual-  
link <1-3>  
Displays the current OSPF virtual link settings.  
Command mode: All except User EXEC  
155  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
OSPF Host Entry configuration  
The following table describes the OSPF Host Entry Configuration commands.  
Table 136 OSPF Host Entry Configuration commands  
Command  
Description  
host <1-128> address <IP address>  
Configures the base IP address for the host entry.  
Command mode: Router OSPF  
host <1-128> area <0-2>  
host <1-128> cost <1-65535>  
host <1-128> enable  
Configures the area index of the host.  
Command mode: Router OSPF  
Configures the cost value of the host.  
Command mode: Router OSPF  
Enables OSPF host entry.  
Command mode: Router OSPF  
no host <1-128> enable  
no host <1-128>  
Disables OSPF host entry.  
Command mode: Router OSPF  
Deletes OSPF host entry.  
Command mode: Router OSPF  
show ip ospf host {<1-128>}  
Displays the current OSPF host entries.  
Command mode: All except User EXEC  
OSPF Route Redistribution configuration  
The following table describes the OSPF Route Redistribution Configuration commands.  
Table 137 OSPF Route Redistribution Configuration commands  
Command  
Description  
redistribute {fixed|static|rip}  
{<1-32>}  
Adds selected routing maps to the rmaplist.  
This option adds a route map to the route redistribution list. The  
routes of the redistribution protocol matched by the route maps  
in the route redistribution list will be redistributed.  
Command mode: Router OSPF  
no redistribute {fixed|static|rip}  
{<1-32>}  
Removes the route map from the route redistribution list.  
Removes routing maps from the rmaplist.  
Command mode: Router OSPF  
[no] redistribute {fixed|static|rip}  
export metric <1-16777214> metric-  
type {type1|type2}  
Exports the routes of this protocol as external OSPF AS-external  
LSAs in which the metric and metric type are specified.  
Command mode: Router OSPF  
show ip ospf redistribute  
Displays the current route map settings.  
Command mode: All except User EXEC  
156  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
OSPF MD5 Key configuration  
The following table describes the OSPF MD5 Key Configuration commands.  
Table 138 OSPF MD5 Key Configuration commands  
Command  
Description  
message-digest-key <1-255> md5-key  
<key string>  
Sets the authentication key for this OSPF packet.  
Command mode: Router OSPF  
no message-digest-key <1-255>  
Deletes the authentication key for this OSPF packet.  
Command mode: Router OSPF  
show ip ospf message-digest-key  
<1-255>  
Displays the current MD5 key configuration.  
Command mode: All except User EXEC  
IGMP configuration  
IGMP Snooping allows the switch to forward multicast traffic only to those ports that request it. IGMP  
Snooping prevents multicast traffic from being flooded to all ports. The switch learns which server hosts  
are interested in receiving multicast traffic, and forwards it only to ports connected to those servers.  
IGMP Snooping configuration  
The following table describes the IGMP Snooping Configuration commands.  
Table 139 IGMP Snooping commands  
Command  
Description  
ip igmp snoop timeout <1-255>  
Sets the Maximum Response Time (MRT) for IGMP hosts. MRT is one  
of the parameters used to determine the age out period of the IGMP  
hosts. Increasing the timeout increases the age out period.  
The range is from 1 to 255 seconds. The default is 10 seconds.  
Command mode: Global configuration  
ip igmp snoop mrouter-timeout  
<1-600>  
Configures the age-out period for the IGMP Mrouters in the Mrouter  
table. If the switch does not receive a General Query from the  
Mrouter for mrtoseconds, the switch removes the multicast router  
from its Mrouter table.  
The range is from 1 to 600 seconds. The default is 255 seconds.  
Command mode: Global configuration  
ip igmp snoop query-interval  
<1-600>  
Sets the IGMP router query interval. The range is 1-600 seconds. The  
default value is 125.  
Command mode: Global configuration  
ip igmp snoop robust <2-10>  
Configures the IGMP Robustness variable, which allows you to tune  
the switch for expected packet loss on the subnet. If the subnet is  
expected to be lossy (high rate of packet loss), then increase the  
value. The default value is 2.  
Command mode: Global configuration  
157  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
Table 139 IGMP Snooping commands  
Command  
Description  
[no] ip igmp snoop flood  
Configures the switch to flood unregistered IP multicast reports to all  
ports.  
Command mode: Global configuration  
[no] ip igmp snoop aggregate  
Enables or disables IGMP Membership Report aggregation.  
Command mode: Global configuration  
ip igmp snoop source-ip <IP  
address>  
Configures the source IP address used as a proxy for IGMP Group  
Specific Queries.  
Command mode: Global configuration  
ip igmp snoop vlan <1-4094>  
no ip igmp snoop vlan <1-4094>  
no ip igmp snoop vlan all  
Adds the VLAN to IGMP Snooping.  
Command mode: Global configuration  
Removes the VLAN from IGMP Snooping.  
Command mode: Global configuration  
Removes all VLANs from IGMP Snooping.  
Command mode: Global configuration  
[no] ip igmp snoop vlan <1-4094>  
fastleave  
Enables or disables FastLeave processing. FastLeave allows the  
switch to immediately remove a port from the IGMP port list, if the  
host sends a Leave message, and the proper conditions are met. This  
command is disabled by default.  
Command mode: Global configuration  
ip igmp snoop enable  
no ip igmp snoop enable  
show ip igmp snoop  
Enables IGMP Snooping.  
Command mode: Global configuration  
Disables IGMP Snooping.  
Command mode: Global configuration  
Displays the current IGMP Snooping parameters.  
Command mode: All except User EXEC  
IGMPv3 Snooping configuration  
The following table describes the IGMP version 3 Snooping Configuration commands.  
Table 140 IGMPv3 Snooping commands  
Command  
Description  
ip igmp snoop igmpv3 sources  
{<1-64>}  
Configures the maximum number of IGMP multicast sources to snoop  
from within the group record. Use this command to limit the number  
of IGMP sources to provide more refined control.  
Command mode: Global configuration  
[no] ip igmp snoop igmpv3 v1v2  
Enables or disables snooping on IGMP version 1 and version 2  
reports. When disabled, the switch drops IGMPv1 and IGMPv2  
reports. The default value is enabled.  
Command mode: Global configuration  
158  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 140 IGMPv3 Snooping commands  
Command  
Description  
[no] ip igmp snoop igmpv3  
exclude  
Enables or disables snooping on IGMPv3 Exclude Reports. When  
disabled, the switch ignores Exclude Reports. The default value is  
enabled.  
Command mode: Global configuration  
ip igmp snoop igmpv3 enable  
Enables IGMP version 3. The default value is disabled.  
Command mode: Global configuration  
no ip igmp snoop igmpv3 enable  
Disables IGMP version 3.  
Command mode: Global configuration  
show ip igmp  
Displays the current IGMP configuration.  
Command mode: All except User EXEC  
159  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Commands  
IGMP static multicast router configuration  
The following table describes the Static Multicast Router Configuration commands.  
NOTE: When you configure a static multicast router on a VLAN, the process of learning multicast  
routers is disabled for that VLAN.  
Table 141 IGMP Static Multicast Router commands  
Command  
Description  
ip igmp mrouter <port number>  
<1-4094> <1-3>  
Selects a port/VLAN combination on which the static multicast router  
is connected, and configures the IGMP version (1, 2, or 3) of the  
multicast router.  
Command mode: Global configuration  
no ip igmp mrouter <port  
number> <1-4094> <1-3>  
Removes a static multicast router from the selected port/VLAN  
combination.  
Command mode: Global configuration  
ip igmp mrouter portchannel  
{<trunk number (1-12)>|<LACP  
trunk (13-40>} <1-4094> <1-3>  
Selects a trunk group/VLAN combination on which the static multicast  
router is connected, and configures the IGMP version (1, 2, or 3) of  
the multicast router.  
Command mode: Global configuration  
no ip igmp mrouter portchannel  
{<trunk number (1-12)>|<LACP  
trunk (13-40>} <1-4094> <1-3>  
Selects a trunk group/VLAN combination on which the static multicast  
router is connected, and configures the IGMP version (1, 2, or 3) of  
the multicast router.  
Command mode: Global configuration  
show ip igmp mrouter  
Displays the current IGMP Static Multicast Router parameters.  
Command mode: All except User EXEC  
IGMP filtering configuration  
The following table describes the IGMP Filter Configuration commands.  
Table 142 IGMP Filtering commands  
Command  
Description  
ip igmp profile <1-16>  
Configures the IGMP filter.  
Command mode: Global configuration  
ip igmp filtering  
Enables IGMP filtering globally.  
Command mode: Global configuration  
no ip igmp filtering  
show ip igmp filtering  
Disables IGMP Filtering globally.  
Command mode: Global configuration  
Displays the current IGMP Filtering parameters.  
Command mode: All except User EXEC  
160  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
IGMP filter definition  
The following table describes the IGMP Filter Definition commands.  
Table 143 IGMP Filter Definition commands  
Command  
Description  
ip igmp profile <1-16> range <IP  
multicast address> <IP multicast  
address>  
Configures the range of IP multicast addresses for this filter.  
Enter the first IP multicast address of the ranger, followed by the  
second IP multicast address of the range.  
Command mode: Global configuration  
ip igmp profile <1-16> action  
{allow|deny}  
Allows or denies multicast traffic for the IP multicast addresses  
specified.  
Command mode: Global configuration  
ip igmp profile <1-16> enable  
no ip igmp profile <1-16> enable  
no ip igmp profile <1-16>  
Enables this IGMP filter.  
Command mode: Global configuration  
Disables this IGMP filter.  
Command mode: Global configuration  
Deletes this filter’s parameter definitions.  
Command mode: Global configuration  
show ip igmp profile <1-16>  
Displays the current IGMP filter.  
Command mode: All except User EXEC  
IGMP filtering port configuration  
The following table describes the IGMP Port Filtering Configuration commands.  
Table 144 IGMP Filtering Port commands  
Command  
Description  
[no] ip igmp filtering  
Enables or disables IGMP Filtering on this port.  
Command mode: Interface port  
ip igmp profile <1-16>  
Adds an IGMP filter to this port.  
Command mode: Interface port  
no ip igmp profile <1-16>  
Removes an IGMP filter from this port.  
Command mode: Interface port  
show interface port {<port number>}  
igmp-filtering  
Displays the current IGMP filter parameters for this port.  
Command mode: All except User EXEC  
161  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Domain Name System configuration  
The Domain Name System (DNS) Configuration commands are used for defining the primary and  
secondary DNS servers on your local network, and for setting the default domain name served by the  
switch services. DNS parameters must be configured prior to using hostname parameters with the ping,  
traceroute,and tftpcommands.  
The following table describes the Domain Name System (DNS) Configuration commands.  
Table 145 Domain Name System (DNS) Configuration commands  
Command  
Description  
[no] ip dns primary-server <IP  
address>  
Sets the IP address for your primary DNS server. Use dotted  
decimal notation.  
Command mode: Global configuration  
[no] ip dns secondary-server <IP  
address>  
Sets the IP address for your secondary DNS server. If the primary  
DNS server fails, the configured secondary will be used instead.  
Enter the IP address using dotted decimal notation.  
Command mode: Global configuration  
[no] ip domain-name <string>  
Sets the default domain name used by the switch. For example:  
mycompany.com.  
Command mode: Global configuration  
show ip dns  
Displays the current Domain Name System (DNS) settings.  
Command mode: All except User EXEC  
Bootstrap Protocol Relay configuration  
Bootstrap Protocol (BOOTP) Relay is used to allow hosts to obtain their configurations from a Dynamic  
Host Configuration Protocol (DHCP) server. The BOOTP configuration enables the switch to forward a  
client request for an IP address to two DHCP/BOOTP servers with IP addresses that have been configured  
on the HP 10GbE switch.  
BOOTP relay is turned off by default.  
The following table describes the BOOTP Configuration commands.  
Table 146 BOOTP Configuration commands  
Command  
Description  
[no] ip bootp-relay server <IP address>  
Sets the IP address of the first or second BOOTP server.  
Command mode: Global configuration  
ip bootp-relay enable  
no ip bootp-relay enable  
show ip bootp-relay  
Globally turns on BOOTP relay.  
Command mode: Global configuration  
Globally turns on BOOTP relay.  
Command mode: Global configuration  
Displays the current BOOTP relay configuration.  
Command mode: All  
162  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Virtual Router Redundancy Protocol configuration  
Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy  
between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID  
number on each participating VRRP-capable routing device. One of the virtual routers is then elected as  
the master, based on a number of priority criteria, and assumes control of the shared virtual router IP  
address. If the master fails, one of the backup virtual routers will assume routing authority and take control  
of the virtual router IP address.  
By default, VRRP is disabled. For more information on VRRP, see the “High Availability” chapter in the  
HP 10Gb Ethernet BL-c Switch Application Guide.  
The following table describes the basic VRRP Configuration commands. The following sections provide  
more detailed information and commands.  
Table 147 VRRP Configuration commands  
Command  
Description  
router vrrp  
Enter VRRP configuration mode.  
Command mode: Router VRRP  
enable  
Globally enables VRRP on this switch.  
Command mode: Router VRRP  
no enable  
show ip vrrp  
Globally disables VRRP on this switch.  
Command mode: Router VRRP  
Displays the current VRRP parameters.  
Command mode: All except User EXEC  
163  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
VRRP Virtual Router configuration  
Virtual Router commands are used for configuring virtual routers for this switch. A virtual router is defined  
by its virtual router ID and an IP address. On each VRRP-capable routing device participating in  
redundancy for this virtual router, a virtual router will be configured to share the same virtual router ID  
and IP address.  
Virtual routers are disabled by default.  
The following table describes the Virtual Router Configuration commands.  
Table 148 Virtual Router Configuration commands  
Command  
Description  
virtual-router <1-250>  
virtual-router-id <1-250>  
Defines the virtual router ID. This is used in conjunction with addr(below) to  
define a virtual router on this switch. To create a pool of VRRP-enabled  
routing devices which can provide redundancy to each other, each  
participating VRRP device must be configured with the same virtual router:  
one that shares the same virtual router IDand address  
combination.  
The vridfor standard virtual routers (where the virtual router IP address is  
not the same as any virtual server) can be any integer between 1 and 250.  
The default value is 1.  
All virtual router IDvalues must be unique within the VLAN to which  
the virtual router’s IP interface belongs.  
Command mode: Router VRRP  
[no] virtual-router <1-250>  
address <IP address>  
Defines the IP address for this virtual router using dotted decimal notation.  
This is used in conjunction with the vrid(above) to configure the same  
virtual router on each participating VRRP device. The default address is  
0.0.0.0.  
Command mode: Router VRRP  
virtual-router <1-250>  
interface <1-249>  
Selects a switch IP interface. If the IP interface has the same IP address as  
the addressoption above, this switch is considered the “owner” of the  
defined virtual router. An owner has a special priority of 255 (highest) and  
will always assume the role of master router, even if it must preempt another  
virtual router which has assumed master routing authority. This preemption  
occurs even if the preemptionoption below is disabled.  
The default value is 1.  
Command mode: Router VRRP  
virtual-router <1-250>  
priority <1-254>  
Defines the election priority bias for this virtual server. This can be any  
integer between 1 and 254. The default value is 100.  
During the master router election process, the routing device with the highest  
virtual router priority number wins. If there is a tie, the device with the  
highest IP interface address wins. If this virtual router’s IP address is the  
same as the one used by the IP interface, the priority for this virtual router  
will automatically be set to 255 (highest).  
When priority tracking is used, this base priority value can be modified  
according to a number of performance and operational criteria.  
Command mode: Router VRRP  
virtual-router <1-250>  
timers advertise <1-255>  
Defines the time interval between VRRP master advertisements. This can be  
any integer between 1 and 255 seconds. The default value is 1.  
Command mode: Router VRRP  
164  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 148 Virtual Router Configuration commands  
Command  
Description  
[no] virtual-router <1-250>  
preemption  
Enables or disables master preemption. When enabled, if this virtual router  
is in backup mode but has a higher priority than the current master, this  
virtual router will preempt the lower priority master and assume control.  
Note that even when preemptionis disabled, this virtual router will  
always preempt any other master if this switch is the owner (the IP interface  
address and virtual router addressare the same). By default, this option is  
enabled.  
virtual-router <1-250>  
enable  
Enables this virtual router.  
Command mode: Router VRRP  
no virtual-router <1-250>  
enable  
Disables this virtual router.  
Command mode: Router VRRP  
no virtual-router <1-250>  
Deletes this virtual router from the switch configuration.  
Command mode: Router VRRP  
show ip vrrp virtual-router  
<1-255>  
Displays the current configuration information for this virtual router.  
Command mode: All except User EXEC  
VRRP Virtual Router Priority Tracking configuration  
These commands are used to modify the priority system used when electing the master router from a pool  
of virtual routers. Various tracking criteria can be used to bias the election results. Each time one of the  
tracking criteria is met, the priority level for the virtual router is increased by an amount defined through  
VRRP Tracking.  
Criteria are tracked dynamically, continuously updating virtual router priority levels when enabled. If the  
virtual router preemption option is enabled, this virtual router can assume master routing authority when its  
priority level rises above that of the current master.  
Some tracking criteria (virtual routers, interfaces, and portsbelow) apply to standard virtual  
routers, otherwise called virtual interface routers. A virtual server router is defined as any virtual router  
whose IP address is the same as any configured virtual server IP address.  
The following table describes the Virtual Router Priority Tracking Configuration commands.  
Table 149 Virtual Router Priority Tracking Configuration commands  
Command  
Description  
[no] virtual-router <1-250>  
track virtual-routers  
When enabled, the priority for this virtual router will be increased for each  
virtual router in master mode on this switch. This is useful for making sure  
that traffic for any particular client/server pairing are handled by the same  
switch, increasing routing and load balancing efficiency. This command is  
disabled by default.  
Command mode: Router VRRP  
165  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 149 Virtual Router Priority Tracking Configuration commands  
Command  
Description  
[no] virtual-router <1-250>  
track interfaces  
When enabled, the priority for this virtual router will be increased for each  
other IP interface active on this switch. An IP interface is considered active  
when there is at least one active port on the same VLAN. This helps elect  
the virtual routers with the most available routes as the master. This  
command is disabled by default.  
Command mode: Router VRRP  
[no] virtual-router <1-250>  
track ports  
When enabled, the priority for this virtual router will be increased for each  
active port on the same VLAN. A port is considered active if it has a link  
and is forwarding traffic. This helps elect the virtual routers with the most  
available ports as the master. This command is disabled by default.  
Command mode: Router VRRP  
show ip vrrp virtual-router  
<1-250> track  
Displays the current configuration for priority tracking for this virtual router.  
Command mode: All except User EXEC  
VRRP Virtual Router Group configuration  
The Virtual Router Group commands are used for associating all virtual routers into a single logical virtual  
router, which forces all virtual routers on the switch to either be master or backup as a group. A virtual  
router is defined by its virtual router ID and an IP address. On each VRRP-capable routing device  
participating in redundancy for this virtual router, a virtual router will be configured to share the same  
virtual router ID and IP address.  
The following table describes the Virtual Router Group Configuration commands.  
Table 150 Virtual Router Group Configuration commands  
Command  
Description  
group virtual-router-id  
<1-250>  
Defines the virtual router ID.  
The virtual router IDfor standard virtual routers (where the virtual  
router IP address is not the same as any virtual server) can be any integer  
between 1 and 250. All virtual router IDvalues must be unique  
within the VLAN to which the virtual router’s IP interface belongs. The default  
virtual router ID is 1.  
Command mode: Router VRRP  
group interface <1-249>  
group priority <1-254>  
Selects a switch IP interface. The default switch IP interface number is 1.  
Command mode: Router VRRP  
Defines the election priority bias for this virtual router group. This can be any  
integer between 1 and 254. The default value is 100.  
During the master router election process, the routing device with the highest  
virtual router priority number wins. If there is a tie, the device with the highest  
IP interface address wins. If this virtual router’s IP address is the same as the  
one used by the IP interface, the priority for this virtual router will  
automatically be set to 255 (highest).  
When priority tracking is used, this base priority value can be modified  
according to a number of performance and operational criteria.  
Command mode: Router VRRP  
166  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 150 Virtual Router Group Configuration commands  
Command  
Description  
group advertisement  
<1-255>  
Defines the time interval between VRRP master advertisements. This can be  
any integer between 1 and 255 seconds. The default is 1.  
Command mode: Router VRRP  
[no] group preemption  
Enables or disables master preemption. When enabled, if the virtual router  
group is in backup mode but has a higher priority than the current master,  
this virtual router will preempt the lower priority master and assume control.  
Note that even when preemptionis disabled, this virtual router will always  
preempt any other master if this switch is the owner (the IP interface address  
and virtual router addressare the same). By default, this option is enabled.  
Command mode: Router VRRP  
group enable  
Enables the virtual router group.  
Command mode: Router VRRP  
no group enable  
no group  
Disables the virtual router group.  
Command mode: Router VRRP  
Deletes the virtual router group from the switch configuration.  
Command mode: Router VRRP  
show ip vrrp group  
Displays the current configuration information for the virtual router group.  
Command mode: All except User EXEC  
VRRP Virtual Router Group Priority Tracking configuration  
The following table describes the Virtual Router Group Priority Tracking Configuration commands.  
Table 151 Virtual Router Group Priority Tracking Configuration commands  
Command  
Description  
[no] group track interfaces  
When enabled, the priority for this virtual router will be increased for each  
other IP interface active on this switch. An IP interface is considered active  
when there is at least one active port on the same VLAN. This helps elect the  
virtual routers with the most available routes as the master. This command is  
disabled by default.  
Command mode: Router VRRP  
[no] group track ports  
When enabled, the priority for this virtual router will be increased for each  
active port on the same VLAN. A port is considered “active” if it has a link  
and is forwarding traffic. This helps elect the virtual routers with the most  
available ports as the master. This command is disabled by default.  
Command mode: Router VRRP  
show ip vrrp group track  
Displays the current configuration for priority tracking for this virtual router.  
Command mode: All except User EXEC  
NOTE: If Virtual Router Group Tracking is enabled, then the tracking option will be available only  
under groupoption. The tracking setting for the other individual virtual routers is ignored.  
167  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
VRRP Interface configuration  
These commands are used for configuring VRRP authentication parameters for the IP interfaces used with  
the virtual routers. The interface number represents the IP interface on which authentication parameters  
must be configured.  
The following table describes the VRRP Interface Configuration commands.  
Table 152 VRRP Interface Configuration commands  
Command  
Description  
interface <1-249>  
authentication  
{password|none}  
Defines the type of authentication that will be used: none(no authentication), or  
password(password authentication).  
Command mode: Router VRRP  
interface <1-249>  
password <password>  
Defines a plain text password up to eight characters long. This password will be  
added to each VRRP packet transmitted by this interface when password  
authentication is chosen.  
Command mode: Router VRRP  
no interface <1-249>  
Clears the authentication configuration parameters for this IP interface. The IP  
interface itself is not deleted.  
Command mode: Router VRRP  
show ip vrrp interface  
<1-249>  
Displays the current configuration for this IP interface’s authentication parameters.  
Command mode: All except User EXEC  
VRRP Tracking configuration  
These commands are used for setting weights for the various criteria used to modify priority levels during  
the master router election process. Each time one of the tracking criteria is met, the priority level for the  
virtual router is increased.  
The following table describes the VRRP Tracking Configuration commands.  
Table 153 VRRP Tracking Configuration commands  
Command  
Description  
tracking-priority-increment  
virtual-routers <0-254>  
Defines the priority increment value (0 through 254) for virtual routers in  
master mode detected on this switch. The default value is 2.  
Command mode: Router VRRP  
tracking-priority-increment  
interfaces <0-254>  
Defines the priority increment value (0 through 254) for active IP  
interfaces detected on this switch. The default value is 2.  
Command mode: Router VRRP  
tracking-priority-increment  
ports <0-254>  
Defines the priority increment value (0 through 254) for active ports on the  
virtual router’s VLAN. The default value is 2.  
Command mode: Router VRRP  
show ip vrrp tracking-  
priority-increment  
Displays the current configuration of priority tracking increment values.  
Command mode: All except User EXEC  
168  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
NOTE: These priority tracking options only define increment values. These options do not affect the  
VRRP master router election process until options under VRRP Virtual Router Priority Tracking are  
enabled.  
169  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Commands  
Quality of Service configuration  
Use the Quality of Service (QoS) commands to configure the IEEE 802.1p priority value of incoming  
packets. This allows you to differentiate between various types of traffic, and provide different priority  
levels.  
QoS 802.1p configuration  
This feature provides the HP 10GbE switch the capability to filter IP packets based on the IEEE 802.1p  
bits in the packet's VLAN header. The 802.1p bits specify the priority that you should give to the packets  
while forwarding them. The packets with a higher (non-zero) priority bits are given forwarding preference  
over packets with numerically lower priority bits value.  
The following table describes the 802.1p Configuration commands.  
Table 154 802.1p Configuration commands  
Command  
Description  
qos transmit-queue mapping  
<priority (0-7)>  
<queue (0-1)|(0-7)>  
Maps the 802.1p priority of to the Class of Service queue (COSq)  
priority. Enter the 802.1p priority value (0-7), followed by the Class of  
Service queue (0-1) that handles the matching traffic.  
Command mode: Global configuration  
qos transmit-queue weight-cos  
<queue (0-1)|(0-7)> <weight  
(0-15)>  
Configures the weight of the selected Class of Service queue (COSq).  
Enter the queue number, followed by the scheduling weight (0-15).  
Command mode: Global configuration  
qos transmit-queue  
number-cos 2|8  
Sets the number of Class of Service queues for switch ports.  
The default value is 2.  
Command mode: Global configuration  
default qos transmit-queue  
show qos transmit-queue  
Resets 802.1p configuration to default values.  
Command mode: Global configuration  
Displays the current 802.1p parameters.  
Command mode: All except User EXEC  
show qos transmit-queue  
information  
Displays the current 802.1p parameters, and the 802.1p priority level  
for each port.  
Command mode: All except User EXEC  
170  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Access Control configuration  
Use these commands to create Access Control Lists (ACLs) and ACL Groups. ACLs define matching criteria  
used for IP filtering and Quality of Service functions.  
Access Control List configuration  
These commands allow you to define filtering criteria for each Access Control List (ACL). The following  
table describes the basic ACL Configuration commands.  
Table 155 ACL Configuration commands  
Command  
Description  
[no] access-control list <1-  
384> egress-port <port  
number>  
Configures the ACL to function on egress packets.  
The egress port ACL will not match a Layer 2 broadcast or multicast  
packet. The egress port ACL will not match packets if the destination port  
is a trunk.  
Command mode: Global configuration  
access-control list <1-384>  
action {permit|deny|set-  
priority <0-7>}  
Configures a filter action for packets that match the ACL definitions. You  
can choose to permit (pass) or deny (drop) packets, or set the Class of  
Service queue that handles the packets.  
Command mode: Global configuration  
access-control list <1-384>  
statistics  
Enables or disables the statistics collection for the Access Control List.  
Command mode: Global configuration  
default access-control list  
<1-384>  
Resets the ACL parameters to their default values.  
Command mode: Global configuration  
show access-control list <1-  
384>  
Displays the current ACL parameters.  
Command mode: All except User EXEC  
ACL Ethernet Filter configuration  
These commands allow you to define Ethernet matching criteria for an ACL. The following table describes  
the Ethernet Filter Configuration commands.  
Table 156 Ethernet Filter Configuration commands  
Command  
Description  
access-control list <1-384> ethernet  
source-mac-address <MAC address>  
Defines the source MAC address and MAC mask for this ACL.  
For example:  
{<MAC mask>}  
00:60:cf:40:56:00 ff:ff:ff:ff:ff:fc  
Command mode: Global configuration  
access-control list <1-384> ethernet  
destination-mac-address <MAC address>  
Defines the destination MAC address and MAC mask for this  
ACL. For example:  
{<MAC mask>}  
00:60:cf:40:56:00 ff:ff:ff:ff:ff:fc  
Command mode: Global configuration  
access-control list <1-384> ethernet  
vlan <1-4095> <mask>  
Defines a VLAN number and mask for this ACL.  
Command mode: Global configuration  
171  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
Table 156 Ethernet Filter Configuration commands  
Command  
Description  
access-control list <1-384> ethernet  
ethernet-type {ARP|IP|IPv6|MPLS|  
RARP|any|0xXXXX}  
Defines the Ethernet type for this ACL.  
Command mode: Global configuration  
access-control list <1-384> ethernet  
priority <0-7>  
Defines the Ethernet priority value for the ACL.  
Command mode: Global configuration  
default access-control list <1-384>  
ethernet  
Resets Ethernet parameters for the ACL to their default values.  
Command mode: Global configuration  
show access-control list {<1-384>}  
ethernet  
Displays the current Ethernet parameters for the ACL.  
Command mode: All except User EXEC  
ACL IP Version 4 Filter configuration  
These commands allow you to define IPv4 matching criteria for an ACL. The following table describes the  
IP version 4 Filter Configuration commands.  
Table 157 IPv4 Filter Configuration commands  
Command  
Description  
access-control list <1-384> ipv4  
source-ip-address <IP address>  
{<IP mask>}  
Defines a source IP address for the ACL. If defined, traffic with this  
source IP address will match this ACL. Specify an IP address in  
dotted decimal notation.  
Command mode: Global configuration  
access-control list <1-384> ipv4  
destination-ip-address <IP  
address> {<IP mask>}  
Defines a destination IP address for the ACL. If defined, traffic  
with this destination IP address will match this ACL.  
Command mode: Global configuration  
access-control list <1-384> ipv4  
protocol <0-255>  
Defines an IP protocol for the ACL. If defined, traffic from the  
specified protocol matches this filter. Specify the protocol number.  
Some of the well-known protocols include:  
1—icmp  
2—igmp  
6—tcp  
17—udp  
89—ospf  
112—vrrp  
Command mode: Global configuration  
access-control list <1-384> ipv4  
type-of-service <0-255>  
Defines a Type of Service value for the ACL. For more information  
on ToS, see RFC 1340 and 1349.  
Command mode: Global configuration  
default access-control list <1-  
384> ipv4  
Resets the IPv4 parameters for the ACL to their default values.  
Command mode: Global configuration  
show access-control list <1-384>  
ipv4  
Displays the current IPV4 parameters.  
Command mode: All except User EXEC  
172  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
ACL TCP/UDP Filter configuration  
These commands allow you to define TCP/UDP matching criteria for an ACL. The following table  
describes the TCP/UDP Filter Configuration commands.  
Table 158 TCP/UDP Filter Configuration commands  
Command  
Description  
access-control list <1-384> tcp-  
udp source-port <1-65535> {<port  
mask>}  
Defines a source port for the ACL. If defined, traffic with the  
specified TCP or UDP source port will match this ACL. Specify the  
port number. Some of the well-known ports include:  
20—ftp-data  
21—ftp  
22—ssh  
23—telnet  
25—smtp  
37—time  
42—name  
43—whois  
53—domain  
69—tftp  
70—gopher  
79—finger  
80—http  
Command mode: Global configuration  
access-control list <1-384> tcp-  
udp destination-port <1-65535>  
{<port mask>}  
Defines a destination port for the ACL. If defined, traffic with the  
specified TCP or UDP destination port will match this ACL. Specify  
the port number, just as with source-port above.  
Command mode: Global configuration  
access-control list <1-384> tcp-  
udp flags <value (0x0-0x3f)>  
Defines a TCP/UDP flag for the ACL.  
Command mode: Global configuration  
default access-control list <1  
384> tcp-udp  
Resets the TCP/UDP parameters for the ACL to their default values.  
Command mode: Global configuration  
show access-control list [<1-384>]  
tcp-udp  
Displays the current TCP/UDP Filtering parameters.  
Command mode: All except User EXEC  
173  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
ACL Packet Format configuration  
The following table describes the Packet Format Configuration commands.  
Table 159 Packet Format Configuration commands  
Command  
Description  
access-control list <1-384>  
packet-format ethernet  
{ethertype2|snap|llc}  
Defines the Ethernet format for the ACL.  
Command mode: Global configuration  
[no] access-control list  
<1-384> packet-format tagged  
Defines the tagging format for the ACL.  
Command mode: Global configuration  
default access-control list  
<1-384> packet-format  
Resets Packet Format parameters for the ACL to their default values.  
Command mode: Global configuration  
show access-control list  
<1-384> packet-format  
Displays the current Packet Format parameters for the ACL.  
Command mode: All except User EXEC  
ACL Metering configuration  
The following table describes the ACL Metering Configuration commands.  
Table 160 ACL Metering Configuration commands  
Command  
Description  
access-control list <1-384>  
meter committed-rate  
<1000-10000000>  
Configures the committed rate, in Kilobits per second. The committed rate  
must be a multiple of 1,000.  
Command mode: Global configuration  
access-control list <1-384>  
meter maximum-burst-size  
<32-4096>  
Configures the maximum burst size, in Kilobits. Enter one of the following  
values for mbsize: 32, 64, 128, 256, 512, 1024, 2048, 4096  
Command mode: Global configuration  
[no] access-control list  
<1-384> meter enable  
Enables or disables Metering on the ACL.  
Command mode: Global configuration  
access-control list <1-384>  
meter action {drop|pass}  
Configures the ACL Meter to either drop or pass out-of-profile traffic.  
Command mode: Global configuration  
default access-control list  
<1-384> meter  
Reset ACL Metering parameters to their default values.  
Command mode: Global configuration  
show access-control list  
<1-384> meter  
Displays the current ACL metering parameters.  
Command mode: All except User EXEC  
174  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
ACL Re-mark configuration  
You can choose to re-mark IP header data for the selected ACL. You can configure different re-mark  
values, based on whether packets fall within the ACL Metering profile, or out of the ACL Metering profile.  
The following table describes the ACL Re-mark Configuration commands.  
Table 161 ACL Re-mark Configuration commands  
Command  
Description  
[no] access-control list <1-384>  
re-mark  
Assign an ACL for DSCP Re-marking.  
Command mode: Global configuration  
default access-control list <1-384>  
re-mark  
Reset ACL Re-mark parameters to their default values.  
Command mode: Global configuration  
show access-control list <1-384>  
re-mark  
Displays the current ACL re-mark parameters.  
Command mode: All except User EXEC  
ACL Re-mark In-Profile configuration  
The following table describes the ACL Re-mark In-Profile Configuration commands.  
Table 162 ACL Re-mark In-Profile Configuration commands  
Command  
Description  
access-control list <1-384>  
re-mark in-profile dscp <0-63>  
Sets the DiffServ Code Point (DSCP) of In-Profile packets to the  
selected value.  
Command mode: Global configuration  
default access-control list  
<1-384> re-mark  
Resets the update DSCP parameters to their default values.  
Command mode: Global configuration  
show access-control list <1-384>  
re-mark  
Displays the current ACL re-mark parameters.  
Command mode: All except User EXEC  
175  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Re-Mark Update User Priority configuration  
The following table describes the Update User Priority Configuration commands.  
Table 163 ACL Update User Priority Configuration commands  
Command  
Description  
access-control list <1-384>  
re-mark in-profile dot1p <0-7>  
Defines 802.1p value. The value is the priority bits information in  
the packet structure.  
Command mode: Global configuration  
[no] access-control list <1-384>  
re-mark in-profile use-tos-  
precedence  
Enable or disable mapping of TOS (Type of Service) priority to  
802.1p priority for In-Profile packets. When enabled, the TOS  
value is used to set the 802.1p value.  
Command mode: Global configuration  
default access-control list  
<1-384> re-mark  
Resets UP1P settings to their default values.  
Command mode: Global configuration  
show access-control list <1-384>  
re-mark  
Displays the current ACL re-mark parameters.  
Command mode: All except User EXEC  
ACL Re-mark Out-of-Profile configuration  
The following table describes the Re-mark Out-of-Profile Configuration commands.  
Table 164 ACL Re-mark Out-of-Profile Configuration commands  
Command  
Description  
access-control list <1-384>  
re-mark out-profile dscp  
<0-63>  
Sets the DiffServ Code Point (DSCP) of Out-of-Profile packets to the  
selected value. The switch sets the DSCP value on Out-of-Profile packets.  
Command mode: Global configuration  
default access-control list  
<1-384> re-mark  
Resets the update DSCP parameters for Out-of-Profile packets to their  
default values.  
Command mode: Global configuration  
show access-control list  
<1-384> re-mark  
Displays the current ACL re-mark parameters.  
Command mode: All except User EXEC  
176  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
ACL Group configuration  
These commands allow you to compile one or more ACLs into an ACL Group. Once you create an ACL  
Group, you can assign the ACL Group to one or more ports.  
The following table describes the ACL Group Configuration commands.  
Table 165 ACL Group Configuration commands  
Command  
Description  
access-control group <1-384> list <1-384>  
Adds the selected ACL to the ACL Group. You can  
add up to 96 ACLs to each ACL Group.  
Command mode: Global configuration  
no access-control group <1-384> list <1-384>  
show access-control group <1-384>  
Removes the selected ACL from the ACL Group.  
Command mode: Global configuration  
Displays the current ACL group parameters.  
Command mode: All except User EXEC  
177  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Configuration Commands  
Remote Monitoring configuration  
Remote Monitoring (RMON) allows you to monitor traffic flowing through the switch. The RMON MIB is  
described in RFC 1757.  
The following table describes the basic RMON Configuration commands. The following sections provide  
more detailed commands.  
Table 166 RMON commands  
Command  
Description  
show rmon  
Displays the current RMON configuration.  
Command mode: All  
RMON history configuration  
The following table describes the RMON History commands.  
Table 167 RMON History commands  
Command  
Description  
rmon history <1-65535>  
interface-oid <1-127  
characters>  
Configures the interface MIB Object Identifier. The IFOID must correspond  
to the standard interface OID, as follows: 1.3.6.1.2.1.2.2.1.1.x  
where xis the ifIndex (1-16, 18-21)  
The interface OID can have a maximum of 127 characters.  
Command mode: Global configuration  
rmon history <1-65535>  
requested-buckets <1-65535>  
Configures the requested number of buckets, which is the number of  
discrete time intervals over which data is to be saved.  
NOTE: The maximum number of buckets that can be granted is 50.  
The range is from 1 to 65535. The default is 30.  
Command mode: Global configuration  
rmon history <1-65535>  
polling-interval <1-3600>  
Configures the time interval over which the data is sampled for each  
bucket.  
The range is from 1 to 3600 seconds. The default value is 1800 seconds.  
Command mode: Global configuration  
rmon history <1-65535> owner  
<1-127 characters>  
Enter a text string that identifies the person or entity that uses this history  
index.  
The owner can have a maximum of 127 characters.  
Command mode: Global configuration  
no rmon history <1-65535>  
Deletes the selected history group.  
Command mode: Global configuration  
show rmon history  
Displays the current RMON History parameters.  
Command mode: All  
178  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
RMON event configuration  
The following table describes the RMON Event commands.  
Table 168 RMON Event commands  
Command  
Description  
rmon event <1-65535> description  
<1-127 characters>  
Enter a text string to describe the event.  
The description can have a maximum of 127 characters.  
Command mode: Global configuration  
rmon event <1-65535> type  
<log|trap|both>  
Selects the type of notification provided for this event. For log  
events, an entry is made in the log table and sent to the  
configured syslog host. For trap events, an SNMP trap is sent to  
the management station.  
Command mode: Global configuration  
rmon event <1-65535> owner <1-127  
characters>  
Enter a text string that identifies the person or entity that uses this  
event index.  
The owner can have a maximum of 127 characters.  
Command mode: Global configuration  
no rmon event <1-65535>  
Deletes this event index.  
Command mode: Global configuration  
show rmon event  
Displays the current RMON Event parameters.  
Command mode: All  
179  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
RMON alarm configuration  
The Alarm RMON group can track rising or falling values for a MIB object. The MIB object must be a  
counter, gauge, integer, or time interval. Each alarm index must correspond to an event index that  
triggers once the alarm threshold is crossed.  
The following table describes the RMON Alarm commands.  
Table 169 RMON Alarm commands  
Command  
Description  
rmon alarm <1-65535> alarm  
oid <1-127 characters>  
Configures an alarm MIB Object Identifier.  
The alarm OID can have a maximum of 127 characters.  
Command mode: Global configuration  
rmon alarm <1-65535> interval  
<1-65535>  
Configures the time interval over which data is sampled and compared  
with the rising and falling thresholds.  
The range is from 1 to 65535 seconds. The default is 1800 seconds.  
Command mode: Global configuration  
rmon alarm <1-65535>  
Configures the method of sampling the selected variable and calculating  
the value to be compared against the thresholds, as follows:  
sample {abs|delta}  
abs—absolute value, the value of the selected variable is compared  
directly with the thresholds at the end of the sampling interval.  
delta—delta value, the value of the selected variable at the last  
sample is subtracted from the current value, and the difference  
compared with the thresholds.  
Command mode: Global configuration  
rmon alarm <1-65535> alarm-  
type {rising|falling|either}  
Configures the alarm type as rising, falling, or either (rising or falling).  
Command mode: Global configuration  
rmon alarm <1-65535> rising-  
limit <-2147483647 to  
2147483647>  
Configures the rising threshold for the sampled statistic. When the current  
sampled value is greater than or equal to this threshold, and the value at  
the last sampling interval was less than this threshold, a single event is  
generated.  
Command mode: Global configuration  
rmon alarm <1-65535> falling-  
limit <-2147483647 to  
2147483647>  
Configures the falling threshold for the sampled statistic. When the  
current sampled value is less than or equal to this threshold, and the  
value at the last sampling interval was greater than this threshold, a  
single event is generated.  
Command mode: Global configuration  
rmon alarm <1-65535> rising-  
crossing-index <0-65535>  
Configures the rising alarm event index that is triggered when a rising  
threshold is crossed.  
The range is from 0 to 65535. The default value is 0.  
Command mode: Global configuration  
rmon alarm <1-65535> falling-  
crossing-index <0-65535>  
Configures the falling alarm event index that is triggered when a falling  
threshold is crossed.  
The range is from 0 to 65535. The default value is 0.  
Command mode: Global configuration  
180  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Table 169 RMON Alarm commands  
Command  
Description  
rmon alarm <1-65535> owner  
<1-127 characters>  
Enter a text string that identifies the person or entity that uses this alarm  
index.  
The owner can have a maximum of 127 characters.  
Command mode: Global configuration  
no rmon alarm <1-65535>  
Deletes this alarm index.  
show rmon alarm  
Displays the current RMON Alarm parameters.  
Command mode: All  
Port mirroring  
Port Mirroring is used to configure, enable, and disable the monitored port. When enabled, network  
packets being sent and/or received on a target port are duplicated and sent to a monitor port. By  
attaching a network analyzer to the monitor port, you can collect detailed information about your network  
performance and usage. Port mirroring is disabled by default.  
NOTE: See the “Troubleshooting tools” appendix in the HP 10Gb Ethernet BL-c Switch Application  
Guide for information on how to use port mirroring.  
The following table describes the Port Mirroring Configuration commands.  
Table 170 Port Mirroring Configuration commands  
Command  
Description  
[no] port-mirroring enable  
Enables or disables port mirroring.  
Command mode: Global configuration  
show port-mirroring  
Displays current settings of the mirrored and monitoring ports.  
Command mode: All except User EXEC  
181  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Port-based port mirroring  
The following table describes the port-based Port Mirroring Configuration commands.  
Table 171 Port Mirroring Configuration commands  
Command  
Description  
port-mirroring monitor-port  
<port number> mirroring-port  
<port number> {in|out|both}  
Adds the port to be mirrored. This command also allows you to enter  
the direction of the traffic. It is necessary to specify the direction  
because:  
If the source port of the frame matches the mirrored port and the  
mirrored direction is ingress or both (ingress and egress), the frame  
is sent to the mirrored port.  
If the destination port of the frame matches the mirrored port and  
the mirrored direction is egress or both, the frame is sent to the  
monitoring port.  
Command mode: Global configuration  
no port-mirroring monitor-port  
<port number> mirroring-port  
<port number>  
Removes the mirrored port.  
Command mode: Global configuration  
no port-mirroring monitor-port  
<port number>  
Deletes this monitor port.  
Command mode: Global configuration  
show port-mirroring  
Displays the current settings of the monitoring port.  
Command mode: All except User EXEC  
Uplink Failure Detection configuration  
Uplink Failure Detection (UFD) supports network fault tolerance in network adapter teams. Use these  
commands to configure a Failure Detection Pair of one Links to Monitor (LtM) group and one Links to  
Disable (LtD) group. When UFD is enabled and a Failure Detection Pair is configured, the switch  
automatically disables ports in the LtD if it detects a failure in the LtM. The failure conditions which are  
monitored in the LtM group include port link state moving to down, or port state moving to Blocking if  
Spanning Tree Protocol is enabled.  
The following table describes the Uplink Failure Detection (UFD) Configuration commands.  
Table 172 Uplink Failure Detection Configuration commands  
Command  
Description  
ufd enable  
Globally turns Uplink Failure Detection ON.  
Command mode: Global configuration  
no ufd enable  
show ufd  
Globally turns Uplink Failure Detection OFF.  
Command mode: Global configuration  
Displays the current Uplink Failure Detection configuration parameters.  
Command mode: All  
182  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Failure Detection Pair configuration  
Use these commands to configure a Failure Detection Pair, which consists of one Link to Monitor (LtM) and  
one Link to Disable (LtD). When the switch detects a failure on the LtM, it automatically disables the ports  
in the LtD.  
The following table describes the Failure Detection Pair (FDP) configuration commands.  
Table 173 Failure Detection Pair Configuration commands  
Command  
Description  
ufd fdp enable  
Enables the FDP Parameters.  
Command mode: Global configuration  
no ufd fdp enable  
Disables the FDP Parameters.  
Command mode: Global configuration  
Link to Monitor configuration  
The following table describes the Link to Monitor (LtM) commands. The LtM can consist of only one uplink  
port (ports 18-21) or a single trunk containing only uplink ports.  
Table 174 Link to Monitor commands  
Command  
Description  
ufd fdp ltm port <port  
number>  
Adds a port to the LtM. Only uplink ports (18-21) are allowed in the LtM.  
Command mode: Global configuration  
no ufd fdp ltm port <port  
number>  
Removes a port from the LtM.  
Command mode: Global configuration  
ufd fdp ltm portchannel <1-  
12>  
Adds a trunk group to the LtM. The LtM trunk group can contain only  
uplink ports (18-21).  
Command mode: Global configuration  
no ufd fdp ltm portchannel  
<1-12>  
Removes a trunk group from the LtM.  
Command mode: Global configuration  
Adds a LACP admin key to the LtM. LACP trunks formed with this admin  
key will be included in the LtM.  
ufd fdp ltm adminkey  
<1-65535>  
Command mode: Global configuration  
Removes a LACP admin key from the LtM.  
Command mode: Global configuration  
no ufd fdp ltm adminkey  
<1-65535>  
183  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Configuration Commands  
Link to Disable configuration  
The following table describes the Link to Disable (LtD) commands. The LtD can consist of any mix of  
downlink ports (ports 1-16) and trunk groups that contain only downlink ports.  
Table 175 Link to Disable commands  
Command  
Description  
ufd fdp ltd port <port number>  
Adds a port to the current LtD group. Only downlink  
ports (1-16) are allowed in the LtD.  
Command mode: Global configuration  
no ufd fdp ltd port <port number>  
ufd fdp ltd portchannel <1-12>  
Removes a port from the current LtD group.  
Command mode: Global configuration  
Adds a trunk group to the current LtD group. LtD trunk  
groups can contain only downlink ports (1-16).  
Command mode: Global configuration  
no ufd fdp ltd portchannel <1-12>  
Removes a trunk group from the current LtD group.  
Command mode: Global configuration  
Adds a LACP admin key to the LtD. LACP trunks formed  
with this admin key will be included in the LtD.  
ufd fdp ltd adminkey  
<1-65535>  
Command mode: Global configuration  
Removes a LACP admin key from the LtD.  
Command mode: Global configuration  
no ufd fdp ltd adminkey <1-65535>  
Configuration Dump  
The dump program writes the current switch configuration to the terminal screen. To start the dump  
program, at the prompt, enter:  
Switch(config)# show running-config  
The configuration is displayed with parameters that have been changed from the default values. The  
screen display can be captured, edited, and placed in a script file, which can be used to configure other  
switches. Paste the configuration commands from the script file at the command line prompt of the switch.  
The active configuration can also be saved or loaded via FTP/TFTP.  
184  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Configuration Commands  
Saving the active switch configuration  
When the copy running-global configuration {tftp|ftp}command is used, the active  
configuration commands of the switch will be uploaded to the specified script configuration file on the  
FTP/TFTP server. To start the switch configuration upload, at the prompt, enter:  
Switch(config)# copy running-config startup-config  
NOTE: The output file is formatted with line-breaks but no carriage returns. The file cannot be  
viewed with editors that require carriage returns (such as Microsoft Notepad).  
NOTE: If the FTP/TFTP server is running SunOS™ or the Solaris™ operating system, the specified  
file must exist prior to executing the copy running-config {tftp|ftp}command and must  
be writable (set with proper permission, and not locked by any application). The contents of the  
specified file will be replaced with the current configuration data.  
Restoring the active switch configuration  
When the copy {tftp|ftp} running-config command is used, the active configuration will be  
replaced with the commands found in the specified configuration file. The file can contain a full switch  
configuration or a partial configuration.  
To start the switch configuration download, at the prompt, enter:  
Switch(config)# copy {tftp|ftp} running-config  
NOTE: The switch supports three configuration files: active, backup, and factory. See the “Selecting  
a configuration block” section in the “Boot Options” chapter for information on how to set which  
configuration file to use upon boot up.  
185  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Operations Commands  
Introduction  
Operations-level commands are used for making immediate and temporary changes to switch  
configuration. Operations commands are used for bringing ports temporarily in and out of service. These  
commands are available only from an administrator and operator login.  
The following table describes basic Operations commands. The following sections provide more detailed  
information and commands.  
Table 176 Operations commands  
Command  
Description  
password  
Allows the user to change the password. You need to enter the current  
password in use for validation.  
clear logging  
ntp send  
Clears all Syslog messages.  
Command Mode: Priv EXEC  
Allows the user to send requests to the NTP server.  
Command Mode: Priv EXEC  
Operations-level port options  
Operations-level port options are used for temporarily disabling or enabling a port.  
Table 177 Operations-Level Port commands  
Command  
Description  
[no] rmon  
Enables or disables Remote Monitoring for the port. RMON must be  
enabled for any RMON configurations to function.  
Command mode: Interface port  
no interface port <port  
number> shutdown  
Temporarily enables the port. The port will be returned to its configured  
operation mode when the switch is reloaded.  
NOTE: This command does not enable a port that has been disabled by an  
ekeying mismatch error.  
Command Mode: Priv EXEC  
interface port <port  
number> shutdown  
Temporarily disables the port. The port will be returned to its configured  
operation mode when the switch is reloaded.  
Command Mode: Priv EXEC  
show interface port <port  
number> operation  
Displays the current settings for the port.  
Command Mode: Priv EXEC  
186  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Operations Commands  
Operations-level port 802.1x options  
Operations-level port 802.1x options are used to temporarily set 802.1x parameters for a port.  
Table 178 Operations-Level Port 802.1x commands  
Command  
Description  
interface port <port  
number> dot1x init  
Re-initializes the 802.1x access-control parameters for the port. The  
following actions take place,  
depending on the 802.1x port configuration:  
force unauth—the port is placed in unauthorized state, and traffic is  
blocked.  
auto—the port is placed in unauthorized state, then authentication is  
initiated.  
force auth—the port is placed in authorized state, and authentication  
is not required.  
Command Mode: Privileged EXEC  
interface port {<port  
number>} dot1x re-  
authenticate  
Re-authenticates the supplicant (client) attached to the port. This command  
only applies if the port’s 802.1x mode is configured as auto.  
Command Mode: Privileged EXEC  
Operations-level VRRP options  
Operations-level VRRP options are described in the following table.  
Table 179 Operations-Level VRRP commands  
Command  
Description  
router vrrp backup <1-256>  
Forces the specified master virtual router on this switch into backup mode.  
This is generally used for passing master control back to a preferred switch  
once the preferred switch has been returned to service after a failure. When  
this command is executed, the current master gives up control and initiates a  
new election by temporarily advertising its own priority level as 0 (lowest).  
After the new election, the virtual router forced into backup mode by this  
command will resume master control in the following cases:  
This switch owns the virtual router (the IP addresses of the virtual router  
and its IP interface are the same)  
This switch’s virtual router has a higher priority and preemption is  
enabled.  
There are no other virtual routers available to take master control.  
Command Mode: Privileged EXEC  
187  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Boot Options  
Introduction  
You must be logged in to the switch as the administrator to use the Boot Options commands.  
The Boot Options allow you to perform the following functions:  
Select a switch software image to be used when the switch is next reloaded.  
Select a configuration block to be used when the switch is next reloaded.  
Download or upload a new software image to the switch via FTP/TFTP.  
Each of the Boot Options commands is discussed in the following sections.  
Updating the switch software image  
The switch software image is the executable code running on the switch. A version of the image ships  
with the HP 10GbE switch , and comes pre-installed on the switch. As new versions of the image are  
released, you can upgrade the software running on the switch.  
To upgrade the software image on the switch:  
Load the new image onto a FTP/TFTP server on your network.  
Download the new image from the FTP/TFTP server to the switch.  
Select the new software image to be loaded into switch memory the next time the switch is reloaded.  
Downloading new software to the switch  
The switch can store up to two different software images, called image1 and image2, as well as boot  
software, called boot. When you download new software, you must specify where it should be placed:  
either into image1, image2, or boot.  
For example, if your active image is currently loaded into image1, you would probably load the new  
image software into image2. This lets you test the new software and reload the original active image  
(stored in image1), if needed.  
To download new software to the switch, you need the following:  
The image or boot software loaded on a TFTP server on your network  
The hostname or IP address of the FTP/TFTP server  
The user name and password for FTP server, if necessary  
The name of the new software image or boot file  
NOTE: The DNS parameters must be configured if specifying hostnames. See the “Domain name  
system configuration” section in the “Configuration Commands” chapter.  
188  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Boot Options  
When the above requirements are met, use the following procedure to download the new software to the  
HP 10GbE switch .  
1. In Privileged EXEC mode, enter:  
Switch# copy tftp {<image1|image2|boot-image>}  
-or-  
Switch# copy ftp {<image1|image2|boot-image>}  
2. Enter the port type to use for the file transfer:  
Port type: ["data-port"/"mgt-port"]: <port type>  
3. Enter the hostname or IP address of the FTP/TFTP server:  
Address or name of remote host: <server name or IP address>  
4. Enter the name of the new software file on the server:  
Source file name: <filename>  
5. The exact form of the name will vary by server. However, the file location is normally relative to the  
FTP or TFTP directory.  
6. Enter the user name, if you are using a FTP server:  
Enter username for FTP server or hit return for TFTP server: <userID>  
7. Enter the password for the FTP server (if prompted):  
Enter password for username on FTP server: <password>  
8. The system prompts you to confirm your request.  
9. You should next select a software image to run, as described in the “Selecting a Soft Image to Run”  
section.  
10. If you are loading an image from which you are not currently booted, the system prompts you to  
change the image.  
image2 currently contains Software Version 1.0.0  
that was downloaded at 15:46:36 Wed Mar 21, 2007.  
New download will replace image2 with file "1.0.1_OS.img"  
from TFTP server 10.168.2.4.  
Confirm download operation [y/n]: y  
Invoking TFTP over port 69...  
Starting download...  
File appears valid  
Download in  
progress....................................................  
Image download complete (1333953 bytes)  
Writing to flash...This takes about 90 seconds. Please wait  
Write complete (1333953 bytes), now verifying FLASH...  
Verification of new image2 in FLASH successful.  
image2 now contains Software Version 1.0.1  
Switch is currently set to boot software image1.  
Do you want to change that to the new image2? [y/n] y  
Next boot will use new software image2.  
189  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Boot Options  
Selecting a software image to run  
You can select which software image (image1 or image2) you want to run in switch memory for the  
next reboot.  
1. In Global Configuration mode, enter:  
Router(config)# boot image {image1|image2}  
2. Enter the name of the image you want the switch to use upon the next boot. The system informs you  
of which image is currently set to be loaded at the next reset, and prompts you to enter a new  
choice:  
Currently set to use switch software "image1" on next reset.  
Specify new image to use on next reset ["image1"/"image2"]:  
Uploading a software image from the switch  
You can upload a software image from the switch to a FTP or TFTP server.  
1. In Privileged EXEC mode, enter:  
Switch# copy {<image1|image2|boot-image>} tftp  
-or-  
Switch# copy {<image1|image2|boot-image>} ftp  
2. The system prompts you for information. Enter the desired image:  
Enter name of switch software image to be uploaded  
["image1"|"image2"|"boot"]: <image> <hostname or server-IP-addr>  
<server-filename>  
3. Enter the name or the IP address of the FTP/TFTP server:  
Address or name of remote host: <server name or IP address>  
4. Enter the name of the file into which the image will be uploaded on the FTP/TFTP server:  
Destination file name: <filename>  
5. Enter the user name, if you are using a FTP server:  
Enter username for FTP server or hit return for TFTP server: <userID>  
6. Enter the password for the FTP server (if prompted):  
Enter password for username on FTP server: <password>  
7. The system then requests confirmation of what you have entered. To have the file uploaded, enter y.  
image2 currently contains Software Version 1.0.0  
Upload will transfer image2 (1889411 bytes) to file "test"  
on TFTP server 10.1.1.1.  
Confirm upload operation [y/n]: y  
190  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Boot Options  
Selecting a configuration block  
When you make configuration changes to the switch, you must save the changes so that they are retained  
beyond the next time the switch is reset. When you execute a saveoperation (copy running-config  
startup-config), your new configuration changes are placed in the active configuration block. The  
previous configuration is copied into the backup configuration block.  
There is also a factory configuration block. This holds the default configuration set by the factory when the  
switch was manufactured. Under certain circumstances, it may be desirable to reset the switch  
configuration to the default. This can be useful when a custom-configured switch is moved to a network  
environment where it will be re-configured for a different purpose.  
Use the following procedure to set which configuration block you want the switch to load the next time it  
is reset:  
1. In Global Configuration mode, enter:  
Switch(config)# boot configuration-block {active|backup|factory}  
2. Enter the name of the configuration block you want the switch to use.  
3. The system indicates which configuration block is currently set to be loaded at the next reset, and  
prompts you to enter a new choice:  
Currently set to use active configuration block on next reset.  
Specify new block to use ["active"/"backup"/"factory"]:  
Resetting the switch  
You can reset the switch to make your software image file and configuration block changes occur.  
Resetting the switch causes the Spanning Tree Protocol to restart. This process can be lengthy, depending  
on the topology of your network.  
To reset the switch, at the prompt, enter:  
>> Switch# reload  
You are prompted to confirm your request.  
To display current boot options, enter:  
>> Switch# show boot  
Accessing the AOS CLI  
To access the AOS CLI, enter the following command from the ISCLI, and reload the switch:  
>> Switch# boot cli-mode aos  
The default command-line interface for the HP 10GbE switch is the AOS CLI. To access the ISCLI, enter the  
following command and reset the switch:  
Main# boot/mode iscli  
Users can select the CLI mode upon login, if the following command is enabled:  
boot cli-mode prompt  
Only an administrator connected through the console port can view and enable the promptcommand.  
When promptis enabled, the first user to log in can select the CLI mode. Subsequent users must use the  
selected CLI mode, until all users have logged out.  
191  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Maintenance Commands  
Introduction  
The Maintenance commands are used for debugging purposes, enabling you to generate a technical  
support dump of the critical state information in the switch, and to clear entries in the Forwarding  
Database and the Address Resolution Protocol (ARP) and routing tables. These commands are available  
only from an administrator login.  
Dump information contains internal switch state data that is written to flash memory on the switch after  
any one of the following occurs:  
The switch administrator forces a switch panic. The panic option causes the switch to dump state  
information to flash memory, and then causes the switch to reboot.  
The switch administrator enters the switch reset key combination (Ctrl-Shift-6) on a device that is  
attached to the console port.  
The switch detects a hardware or software problem that requires a reboot.  
The following sections provide detailed information and commands.  
System maintenance  
The System Maintenance commands are reserved for use by HP technical support. The options are used to  
perform system debugging.  
The following table describes the System Maintenance commands.  
Table 180 System Maintenance commands  
Command  
Usage  
debug debug-flags  
Sets the flags that are used for debugging purposes by HP technical support.  
Command mode: All except User EXEC  
192  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Maintenance Commands  
Forwarding Database maintenance  
The Forwarding Database (FDB) Manipulation commands can be used to view information and to delete  
a MAC address from the Forwarding Database or clear the entire Forwarding Database. This is helpful in  
identifying problems associated with MAC address learning and packet forwarding decisions.  
The following table describes the FDB Manipulation commands.  
Table 181 FDB Manipulation commands  
Command  
Usage  
show mac-address-table  
address {<MAC address>}  
Displays a single database entry by its MAC address. You are prompted to  
enter the MAC address of the device. Enter the MAC address using one of  
the following:  
xx:xx:xx:xx:xx:xx format (for example: 08:00:20:12:34:56)  
xxxxxxxxxxxx format (for example: 080020123456)  
Command mode: All except User EXEC  
show mac-address-table port  
{<port number>}  
Displays all FDB entries for a particular port.  
Command mode: All except User EXEC  
show mac-address-table vlan  
{<1-4095>}  
Displays all FDB entries on a single VLAN.  
Command mode: All except User EXEC  
show mac-address-table  
clear mac-address-table  
Displays all entries in the Forwarding Database.  
Command mode: All except User EXEC  
Clears the entire Forwarding Database from switch memory, then adds the  
static entries to the Forwarding Database.  
Command mode: All except User EXEC  
Debugging options  
The Miscellaneous Debug commands display trace buffer information about events that can be helpful in  
understanding switch operation. You can view the following information using Debug commands:  
Events traced by the management processor (MP)  
Events traced to a buffer area when a reset occurs  
If the switch resets for any reason, the management processor (MP) trace buffer is saved into the snap  
trace buffer area. The output from these commands can be interpreted by HP technical support.  
The following table describes the Miscellaneous Debug commands:  
Table 182 Miscellaneous Debug commands  
Command  
Usage  
debug mp-trace  
Displays the management processor trace buffer. Header information similar to the  
following is shown:  
MP trace buffer at 13:28:15 Fri May 25, 2002; mask: 0x2ffdf748  
The buffer information is displayed after the header.  
Command mode: All except User EXEC  
193  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Maintenance Commands  
Table 182 Miscellaneous Debug commands  
Command  
Usage  
debug mp-snap  
Displays the management processor snap (or post-mortem) trace buffer. This buffer  
contains information traced at the time that a reset occurred.  
Command mode: All except User EXEC  
clear flash-config  
Deletes all flash configuration blocks. The next time the switch is rebooted, it returns to  
the factory default settings.  
Command mode: All except User EXEC  
ARP cache maintenance  
The following table describes the Address Resolution Protocol commands:  
Table 183 ARP Maintenance commands  
Command  
Usage  
show ip arp find <IP  
address>  
Shows a single ARP entry by IP address.  
Command mode: All except User EXEC  
show ip arp interface  
<port number>  
Shows ARP entries on a single port.  
Command mode: All except User EXEC  
show ip arp vlan <1-4095>  
show ip arp reply  
show ip arp  
Shows ARP entries on a single VLAN.  
Command mode: All except User EXEC  
Shows the list of IP addresses that the switch will respond to for ARP requests.  
Command mode: All except User EXEC  
Shows all ARP entries.  
Command mode: All except User EXEC  
clear ip arp-cache  
Clears the entire ARP list from switch memory.  
Command mode: All except User EXEC  
NOTE: To display all ARP entries currently held in the switch, or a portion according to one of the  
commands listed above, see the “ARP information” section of the “Information Commands” chapter.  
IGMP Snooping maintenance  
The following table describes the IGMP Snooping Maintenance commands.  
Table 184 IGMP Snooping Maintenance commands  
Command  
Usage  
show ip igmp groups address <IP address>  
Shows a single IGMP Multicast group by IP address.  
Command mode: All except User EXEC  
show ip igmp groups vlan <1-4094>  
Shows IGMP Multicast groups on a single VLAN.  
Command mode: All except User EXEC  
194  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Maintenance Commands  
Table 184 IGMP Snooping Maintenance commands  
Command  
Usage  
show ip igmp groups interface <port number>  
Shows IGMP Multicast groups on a single port.  
Command mode: All except User EXEC  
show ip igmp groups  
clear ip igmp snoop  
Shows all IGMP Multicast groups.  
Command mode: All except User EXEC  
Clears IGMP Multicast data from switch memory.  
Command mode: All except User EXEC  
IGMP Mrouter maintenance  
The following table describes the IGMP Multicast Routers Maintenance commands.  
Table 185 IGMP Multicast Group Maintenance commands  
Command  
Usage  
show ip igmp mrouter vlan <1-4094>  
Shows IGMP Multicast groups on a single VLAN.  
Command mode: All except User EXEC  
show ip igmp mrouter  
clear ip igmp mrouter  
Shows all IGMP Multicast routers.  
Command mode: All except User EXEC  
Clears IGMP Multicast router data from switch memory.  
Command mode: All except User EXEC  
Uuencode flash dump  
show flash-dump-uuencode  
Command mode: All  
Using this command, dump information is presented in uuencoded format. This format makes it easy to  
capture the dump information as a file or a string of characters.  
If you want to capture dump information to a file, set your communication software on your workstation to  
capture session data prior to issuing the command. This will ensure that you do not lose any information.  
Once entered, the command will cause approximately 23,300 lines of data to be displayed on your  
screen and copied into the file.  
Using the above command, dump information can be read multiple times. The command does not cause  
the information to be updated or cleared from flash memory.  
Dump information is not cleared automatically. In order for any subsequent dump information to be  
written to flash memory, you must manually clear the dump region. For more information on clearing the  
dump region, see the “Clearing dump information” section later in this chapter.  
195  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Maintenance Commands  
To access dump information, at the prompt, enter:  
Switch# show flash-dump-uuencode  
The dump information is displayed on your screen and, if you have configured your communication  
software to do so, captured to a file. If the dump region is empty, the following displays:  
No FLASH dump available.  
FTP/TFTP system dump put  
Use this command to put (save) the system dump to a FTP/TFTP server.  
NOTE: If the FTP/TFTP server is running SunOS or the Solaris operating system, the specified  
copy flash-dump tftp(or ftp) file must exist prior to executing the copy flash-dump  
tftp command (or copy flash-dump ftp)command, and must be writable (set with proper  
permission, and not locked by any application). The contents of the specified file will be replaced  
with the current dump data.  
To save dump information via FTP/TFTP, at the prompt, enter:  
Switch# copy flash-dump tftp [mgt-port|data-port]  
-or-  
To save dump information via FTP/TFTP, at the prompt, enter:  
Switch# copy flash-dump ftp [mgt-port|data-port]  
You are prompted for the server hostname or IP address, and the file name.  
Clearing dump information  
To clear dump information from flash memory, at the prompt, enter:  
Switch# clear flash-dump  
The switch clears the dump region of flash memory and displays the following message:  
FLASH dump region cleared.  
If the flash dump region is already clear, the switch displays the following message:  
FLASH dump region is already clear.  
196  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Maintenance Commands  
Panic command  
The panic command causes the switch to dump state information immediately to flash memory and  
reboot.  
To select panic, at the prompt, enter:  
>> Switch# debug panic  
A FLASH dump already exists.  
Confirm replacing existing dump and reboot [y/n]:  
Enter yto confirm the command:  
Confirm dump and reboot [y/n]: y  
A list of messages is displayed:  
Starting system dump...done.  
Reboot at 11:54:08 Wednesday March 14, 2007...  
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  
Rebooted because of console PANIC command.  
Booting complete  
Unscheduled system dumps  
If there is an unscheduled system dump to flash memory, the following message is displayed when you  
log on to the switch:  
Note: A system dump exists in FLASH. The dump was saved  
at 13:43:22 Wednesday March 14, 2007.  
Use show flash-dump uuencode to  
extract the dump for analysis and clear flash-dump to  
clear the FLASH region. The region must be cleared  
before another dump can be saved.  
197  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Index  
IGMP Mrouter options, 195  
IGMP Snooping options, 194  
IGMPv3: configuration, 158  
802.1x information, 35  
802.1x statistics, 69  
configuration block, 191  
configuring RMON (remote  
monitoring), 178  
image: download, 188; software,  
selection, 190  
A
connecting: via console, 10; via  
Secure Shell (SSH), 11; via  
abbreviating commands, 18  
access control, user, 116  
active configuration block, 101, 191  
information dump, 66  
Information Menu, 19  
interface statistics, 74, 76  
console port, connecting, 10  
active switch configuration: gtcfg,  
STP port option, 136  
IP address: ARP information, 48;  
configuration, 143  
Address Resolution Protocol (ARP):  
D
debugging, 192  
Address Resolution Protocol (ARP)  
default gateway, interval for health  
IP interface: address configuration,  
configuration, 142  
aging: STP information, 38, 40  
disconnect idle timeout, 13  
download software, 188  
auto-negotiation: enable/disable on  
port, 125; flow control  
IP Interface Configuration Menu,  
configuration, 124  
dump: configuration, 184;  
B
L
backup configuration block, 101,  
LACP statistics, 78  
duplex mode, link status, 19, 63  
banner (system option), 102  
Boot Options Menu, 188  
F
factory configuration block, 191  
bootstrap protocol (BOOTP): obtain  
the IP address, 10  
flow control: configuration, 124;  
display setting, 19; link status, 63  
bridge maximum age parameter:  
configuration, 135; information,  
Forwarding Database (FDB):  
maintenance, 193  
Link Aggregation Control Protocol  
information, 33, 44  
Forwarding Database Information  
link status: command, 63; display  
port speed, 19, 63  
bridge priority, 38  
Bridge Protocol Data Unit (BPDU),  
Forwarding Database Manipulation  
log, syslog messages, 104  
login notice, 102  
bridge Spanning Tree parameters,  
forwarding state (FWD), 33, 38, 40,  
fwd (STP bridge option), 135  
M
C
FwdDel (forward delay), bridge port,  
Maintenance Menu, 192  
capture dump information to a file,  
management processor (MP): trace  
clear: ARP entries, 194; dump  
information, 196  
G
MD5 cryptographic authentication,  
global commands, 17  
commands: abbreviations, 18;  
global commands, 17; shortcuts,  
gtcfg (TFTP load command), 185  
media access control (MAC)  
address: ARP information, 48;  
display address, 10; FDB  
H
Common Internal Spanning Tree  
health checks: default gateway  
interval, retries, 143; retry,  
number of failed health checks,  
manipulation, 193  
configuration: default gateway  
default gateway IP address, 143;  
dump command, 184; flow  
Miscellaneous Debug Menu, 193  
monitor port, 181  
hello, STP information, 38, 40, 43  
I
N
control, 124; operating mode,  
trunking, 138; switch IP address,  
idle timeout, overview, 13  
Network Time Protocol (NTP):  
synchronization, 109  
IEEE standards, 802.1d Spanning  
null modem cable, 10  
198  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
Secure Shell (SSH): encryption and  
authentication methods, 11  
timeouts, idle connection, 13  
O
tnport, system option, 102  
online help, 17  
Secure Shell Server (SSHD) Menu,  
operating mode, configuration, 124  
traceroute command, 17  
transmit flow control, 124  
Operations-level port options, 186,  
snap traces, buffer, 193  
SNMP: set and get access, 110  
ospf: interface, 151; Not-So-Stubby  
Trivial File Transfer Protocol  
(TFTP): PUT and GET  
updating switch software image,  
SNMPv3 Access Table information,  
P
SNMPv3 Community Table  
panic: command, 197; switch, 192  
ping command, 17  
typographical conventions, 14  
SNMPv3 dump, 27  
U
port configuration, 123  
port mirroring, configuration, 181  
port number, 63  
SNMPv3 Group Table information,  
unscheduled system dump, 197  
upgrade, switch software, 188  
SNMPv3 Information Menu, 21  
port speed, 19, 63  
SNMPv3 Notify Table information,  
user access control configuration,  
port trunking configuration, 138  
SNMPv3 Target Address Table  
ports: disable (temporarily), 124;  
information, 64; membership of  
STP port priority, 136  
uuencode flash dump, 195  
SNMPv3 Target Parameters Table  
V
preemption: assuming VRRP  
master routing authority, 165  
SNMPv3 USM User Table  
virtual router: description, 164  
Virtual Router Redundancy Protocol  
(VRRP): password,  
priority (STP port option), 136  
prisrv, primary radius server, 106  
ptcfg (TFTP save command), 185  
SNMPv3 View Table information,  
authentication; VRRP  
software: image, 188  
authentication, 168; group  
options (prio); virtual router;  
priority, 166; priority election for  
the virtual router, 164  
Spanning Tree Protocol (STP):  
bridge parameters, 135;  
R
Rapid Spanning Tree and Multiple  
Spanning Tree information, 39  
bridge, 135; switch reset effect,  
191; with trunk groups, 43  
virtual routers: increasing priority  
(preem); virtual router, 167;  
master preemption (prio); virtual  
read community string (SNMP  
statistics dump, 100  
retries, radius server, 106  
Statistics Menu, 67  
retry, health checks for default  
gateway, 143  
VLAN tagging: port configuration,  
history information, 60  
VLANs: ARP entry information, 48;  
configuration, 141; information,  
44; setting default number  
VLAN number, 44  
syslog: display messages, 29  
RMON configuration: alarm, 180;  
information, 28, 66  
poisoned reverse, as used with split  
horizon: poisoned reverse, 149  
System Configuration Menu, 102  
System Information Menu, 20  
VRID (virtual router ID), 164, 166  
VRRP: master advertisements, 164  
VRRP configuration, 163  
Routing Information Protocol (RIP):  
system options: login banner, 102;  
split horizon: split horizon, 149  
VRRP information, 57  
T
S
VRRP master advertisements: time  
tab completion, 18  
Telnet: requirements, 11  
timeout, radius server, 106  
save command, 191  
secret, radius server, 106  
199  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Graco Inc Marine Heating System 332073C User Manual
Greenway Home Products Indoor Fireplace GEF282ABL User Manual
Haier Microwave Oven HMW40AEB User Manual
HANNspree Flat Panel Television F651 12A1 User Manual
Harman Kardon CD Player CDR 2 User Manual
Hotpoint Washer Dryer AQ9D 692 I User Manual
HP Hewlett Packard All in One Printer 3050 All in One User Manual
HP Hewlett Packard Switch 2900 User Manual
Hypertec Carrying Case 2703V2 User Manual
iHome MP3 Docking Station iH9 User Manual