N8406-022A 1Gb Intelligent L2 Switch
Smart Panel Reference Guide
Part number: 856-126757-406-00
First edition: July 2008
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
SmartPanel
Introduction.............................................................................................................................................................5
Additional references..............................................................................................................................................5
Typographical conventions.....................................................................................................................................5
Management Network ............................................................................................................................................6
Connecting to the switch ........................................................................................................................................6
Establishing a console connection....................................................................................................................6
Setting an IP address........................................................................................................................................7
Establishing a Telnet connection ......................................................................................................................7
Establishing an SSH connection.......................................................................................................................7
Establishing an HTTP connection.....................................................................................................................7
Accessing the switch ..............................................................................................................................................7
Browser-based interface
Introduction.............................................................................................................................................................9
Requirements .........................................................................................................................................................9
Web browser setup.................................................................................................................................................9
Starting the BBI ......................................................................................................................................................9
Port Status Area..............................................................................................................................................11
Menu Area.......................................................................................................................................................12
Configuration Area ..........................................................................................................................................12
Port Group Mapping .............................................................................................................................................13
Port Group Characteristics..............................................................................................................................13
Port Group configuration.................................................................................................................................13
Internal Port Settings............................................................................................................................................14
External Port Settings...........................................................................................................................................15
VLAN ....................................................................................................................................................................16
PVID................................................................................................................................................................16
802.1Q VLAN Tagging....................................................................................................................................16
Port VLAN ID configuration.............................................................................................................................16
Non-Default Virtual LANs................................................................................................................................17
Management.........................................................................................................................................................18
Local User Administration.....................................................................................................................................19
Remote User Administration.................................................................................................................................20
Time Services.......................................................................................................................................................21
Trunking................................................................................................................................................................22
Statistical Load Distribution.............................................................................................................................22
Built-In Fault Tolerance...................................................................................................................................22
Trunk group configuration rules ......................................................................................................................22
Link Aggregation Control Protocol ..................................................................................................................22
Trunk Group configuration ..............................................................................................................................23
Failover.................................................................................................................................................................23
Failover configuration......................................................................................................................................24
IGMP Snooping ....................................................................................................................................................24
Boot Management ................................................................................................................................................25
Command Line Interface
Introduction...........................................................................................................................................................27
Main Menu ......................................................................................................................................................27
Menu summary ...............................................................................................................................................27
Global commands ...........................................................................................................................................28
Command line history and editing...................................................................................................................29
Command line interface shortcuts...................................................................................................................30
Command stacking .........................................................................................................................................30
Command abbreviation...................................................................................................................................30
Tab completion................................................................................................................................................30
Information Menu..................................................................................................................................................31
Introduction .....................................................................................................................................................31
Menu overview................................................................................................................................................31
System Information Menu ...............................................................................................................................32
SNMPv3 Information Menu.............................................................................................................................32
System information .........................................................................................................................................37
SmartPanel
3
Download from Www.Somanuals.com. All Manuals Search And Download.
Show last 100 syslog messages.....................................................................................................................38
System user information .................................................................................................................................38
Layer 2 information .........................................................................................................................................39
FDB information menu ....................................................................................................................................40
Trunk group information..................................................................................................................................41
Layer 3 information .........................................................................................................................................41
ARP information..............................................................................................................................................42
IP information..................................................................................................................................................43
IGMP multicast group information...................................................................................................................43
IGMP multicast router port information ...........................................................................................................43
Link status information ....................................................................................................................................44
Port information...............................................................................................................................................44
Group information ...........................................................................................................................................45
Information dump ............................................................................................................................................45
Statistics Menu .....................................................................................................................................................46
Introduction .....................................................................................................................................................46
Port Statistics Menu ........................................................................................................................................47
Layer 2 statistics Menu ...................................................................................................................................51
Layer 3 statistics Menu ...................................................................................................................................52
Management Processor statistics ...................................................................................................................57
NTP statistics ..................................................................................................................................................59
Statistics dump................................................................................................................................................59
Configuration Menu ..............................................................................................................................................60
Introduction .....................................................................................................................................................60
System configuration.......................................................................................................................................62
Port configuration............................................................................................................................................78
Spare Ports Group configuration.....................................................................................................................78
Group configuration.........................................................................................................................................79
Configuration Dump ........................................................................................................................................80
Saving the active switch configuration ............................................................................................................80
Restoring the active switch configuration........................................................................................................80
Operations Menu..................................................................................................................................................81
Introduction .....................................................................................................................................................81
Menu information ............................................................................................................................................81
Boot Options Menu...............................................................................................................................................82
Introduction .....................................................................................................................................................82
Menu information ............................................................................................................................................82
Maintenance Menu...............................................................................................................................................86
Introduction .....................................................................................................................................................86
Menu information ............................................................................................................................................86
SmartPanel
4
Download from Www.Somanuals.com. All Manuals Search And Download.
SmartPanel
Introduction
The 1Gb Intelligent L2 Switch provides two switch modes: The conventional L2 switch mode, and SmartPanel
mode. The switch can store up to two different software image, called image1 and image2. Normally, the
conventional L2 switch software image is stored in image1, and the SmartPanel software is stored in image2. You
can select which software image (image1 or image2) you want to run in switch memory. By default, the switch
software is loaded from image1. To run the SmartPanel software, you need to change a software image to image2
and reboot the switch. See additional references for configuration to select a software image.
This guide explains how to configure the switch in running the SmartPanel software. The SmartPanel provides a
simple Ethernet interface option for connecting to the network infrastructure. The number and type of configuration
options on the SmartPanel are restricted to reduce the initial setup complexity and to minimize the impact on
upstream networking devices.
Additional references
Additional information about installing and configuring the switch is available in the following guides, which are
attached in this product.
•
•
•
•
•
N8406-022A 1Gb Intelligent L2 Switch User’s Guide
N8406-022A 1Gb Intelligent L2 Switch Application Guide
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (AOS)
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI)
N8406-022A 1Gb Intelligent L2 Switch Browser-based Interface Reference Guide
Typographical conventions
The following table describes the typographic styles used in this guide:
Table 1 Typographic conventions
Typeface or symbol
Meaning
Example
This type depicts onscreen computer output and
prompts.
AaBbCc123
Main#
This type displays in command examples and
shows text that must be typed in exactly as
shown.
AaBbCc123
Main# sys
This italicized type displays in command examples To establish a Telnet session, enter:
<AaBbCc123>
as a parameter placeholder. Replace the indicated
text with the appropriate real name or value when
using the command. Do not type the brackets.
This also shows guide titles, special terms, or
words to be emphasized.
host# telnet <IP address>
Read the user guide thoroughly.
Command items shown inside brackets are
optional and can be used or excluded as the
situation demands. Do not type the brackets.
[ ]
host# ls [-a]
SmartPanel
5
Download from Www.Somanuals.com. All Manuals Search And Download.
Management Network
The 1Gb Intelligent L2 Switch is a Switch Module within the Blade Enclosure. The Blade Enclosure includes an
Enclosure Manager Card which manages the modules and CPU Blades in the enclosure.
The 1Gb Intelligent L2 Switch communicates with the Enclosure Manager Card through its internal management
port (port 19). The factory default settings permit management and control access to the switch through the 10/100
Mbps Ethernet port on the Blade Enclosure, or the built-in console port.
The switch management network has the following characteristics:
•
Port 19 — Management port 19 has the following configuration:
•
•
•
•
Flow control: both
Auto-negotiation
Untagged
Port VLAN ID (PVID): 4095
•
•
VLAN 4095 — Management VLAN 4095 isolates management traffic within the switch. VLAN 4095 contains
only one member port (port 19). No other ports can be members of VLAN 4095.
Interface 256 — Management interface 256 is associated with VLAN 4095. No other interfaces can be
associated with VLAN 4095. The IP address of the management interface is assigned through Dynamic Host
Control Protocol (DHCP).
•
Gateway 4 — This gateway is the default gateway for the management interface.
Connecting to the switch
You can access the command line interface in one of the following ways:
•
•
•
•
Using a console connection via the console port
Using a Telnet connection over the network
Using a Secure Shell (SSH) connection to securely log in over a network
Using a HTTP connection over the network
Establishing a console connection
To establish a console connection with the switch, you need:
•
•
A null modem cable with a female DB-9 connector (See the User’s Guide for more information.)
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in the table
below
Table 2 Console configuration parameters
Parameter
Baud Rate
Data Bits
Parity
Value
9600
8
None
1
Stop Bits
Flow Control
None
To establish a console connection with the switch:
1.
2.
3.
4.
Connect the terminal to the console port using the null modem cable.
Power on the terminal.
Press the Enter key a few times on the terminal to establish the connection.
You will be required to enter a password for access to the switch. (For more information, see the “Accessing
the switch” section later in this chapter.)
SmartPanel
6
Download from Www.Somanuals.com. All Manuals Search And Download.
Setting an IP address
To access the switch via a Telnet, an SSH connection, or an HTTP connection, you need to have an Internet
Protocol (IP) address set for the switch. You can assign the IP address only to the management interface (interface
256), associated with port 19. The management interface requests its IP address from a Dynamic Host Control
Protocol (DHCP) server on the Enclosure Manager Card. See the User’s Guide of the Enclosure Manager Card for
configuration to assign the IP address to the switch modules.
NOTE: You can assign the IP address only on the management port 19.
Establishing a Telnet connection
A Telnet connection offers the convenience of accessing the switch from any workstation connected to the network.
Telnet provides the same options for user, operator, and administrator access as those available through the
console port. By default, Telnet is enabled on the switch. The switch supports four concurrent Telnet connections.
Once the IP parameters are configured, you can access the CLI using a Telnet connection. To establish a Telnet
connection with the switch, run the Telnet program on the workstation and enter the telnet command, followed by
the switch IP address:
telnet <1Gb Intelligent L2 Switch IP address>
You will then be prompted to enter a password. The password entered determines the access level: administrator,
operator, or user. See the “Accessing the switch” section later in this chapter for description of default passwords.
Establishing an SSH connection
Although a remote network administrator can manage the configuration of a switch via Telnet, this method does not
provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into the switch over the
network.
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over the
network is encrypted and secure. In order to use SSH, you must first configure it on the switch. See the “Secure
Shell Server configuration” section in the “Configuration Menu” chapter for information on how to configure SSH.
Establishing an HTTP connection
By default, HTTP is enabled on the switch. You can configure the switch using the Web browser. For more
information, see the “Browser-based interface” chapter.
Accessing the switch
To enable better switch management and user accountability, the switch provides different levels or classes of user
access. Levels of access to the CLI and Web management functions and screens increase as needed to perform
various switch management tasks. The three levels of access are:
•
User—User interaction with the switch is completely passive; nothing can be changed on the switch. Users
may display information that has no security or privacy implications, such as switch statistics and current
operational state information.
•
Operator—Operators can only effect temporary changes on the switch. These changes will be lost when the
switch is rebooted/reset. Operators have access to the switch management features used for daily switch
operations. Because any changes an operator makes are undone by a reset of the switch, operators cannot
severely impact switch operation, but do have access to the Maintenance menu.
•
Administrator—Only administrators can make permanent changes to the switch configuration, changes that
are persistent across a reboot/reset of the switch. Administrators can access switch functions to configure and
troubleshoot problems on the switch. Because administrators can also make temporary (operator-level)
changes as well, they must be aware of the interactions between temporary and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once you are
connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password. The
password entered determines the access level. The default user names/password for each access level is listed in
the following table. Once you are connected to the switch via HTTP, you are prompted to enter a user account and
password.
NOTE: It is recommended that you change default switch passwords after initial configuration and as
regularly as required under your network security policies. For more information, see the “Setting passwords”
section in the “First-time configuration” chapter.
SmartPanel
7
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 3 User access levels
User account
user
Description and tasks performed
The user has no direct responsibility for switch management. He or she can view all
switch status information and statistics, but cannot make any configuration changes to
the switch. The user account is enabled by default, and the default password is user.
The operator manages all functions of the switch. The operator can reset ports or the
entire switch. By default, the operator account is disabled and has no password.
The super user administrator has complete access to all menus, information, and
configuration commands on the switch, including the ability to change both the user
and administrator passwords. The admin account is enabled by default, and the
default password is admin.
oper
admin
NOTE: With the exception of the admin user, setting the password to an empty value can disable access to
each user level.
SmartPanel
8
Download from Www.Somanuals.com. All Manuals Search And Download.
Browser-based interface
Introduction
This chapter explains how to access the switch browser-based interface (BBI) for the SmartPanel and configure the
switch.
Requirements
To use the browser-based interface, you need the following:
•
•
PC or workstation with network access to the switch
Frame-capable Web-browser software, such as the following:
•
•
Netscape Navigator 4.7x or higher
Internet Explorer 6.0x or higher
•
JavaScript enabled in your Web browser
Web browser setup
Most modern Web browsers work with frames and JavaScript by default, and require no additional set up. However,
you should check your Web browser’s features and configuration to be sure frames and JavaScript are enabled.
NOTE: JavaScript is not the same as Java™. Be sure that JavaScript is enabled in your Web browser.
Starting the BBI
When the switch and browser setup is complete, follow these steps to launch the BBI:
1.
2.
Start your Web browser.
Enter the switch IP interface address in the Web browser Uniform Resource Locator (URL) field.
For example, if the switch IP interface has a network IP address of 192.168.3.70. Using Internet Explorer, you
could enter the following (for secure BBI access, use https://).
If you do not use the default TCP port number (80) for BBI access, you can include the port number when you
enter the IP address:
Browser-based interface
9
Download from Www.Somanuals.com. All Manuals Search And Download.
If the switch IP interface address has a name on your local domain name server, you can enter the name
instead. Using Internet Explorer, you can enter the following:
3.
Log in to the switch.
If your switch and browser are properly configured, you will be asked to enter a password.
Enter the account name and password for the switch.
Allow the BBI Dashboard page to load.
4.
When the proper account name and password combination is entered, the BBI Port Group Mapping page is
displayed in the browser viewing area.
NOTE: There may be a slight delay while the Port Group Mapping page is initializing. You should not stop
the browser while loading is in progress.
Browser-based interface 10
Download from Www.Somanuals.com. All Manuals Search And Download.
Port Status Area
Menu Area
Configuration Area
There are three main regions on the screen.
•
•
•
The Port Status Area is used to view port status. Click a port icon to view details.
The Menu Area is used to select particular items or features to act upon.
The Configuration Area is used to configure selected items.
Port Status Area
The Status Area contains port icons that display status information about each port. Click a port icon to display
detailed information about the port.
A color box indicates the Port Group in which each port resides.
Table 4 Link status
Color
Description
Link up
No link
Green
White
Gray
Disabled
Browser-based interface 11
Download from Www.Somanuals.com. All Manuals Search And Download.
Menu Area
The Menu Area is used for selecting a particular feature to act upon. Configuration forms for the selected item
appear in the Configuration Window.
The Menu Area contains a tree of feature folders and names.
Displays I/O
bay number
Click to expand
or contact
Click to select
Click on System Settings to open it and reveal its contents. Click it again to close it. Click on any feature to load the
configuration form in the Configuration Area.
Command Buttons
The following general commands are available at the top of the Menu Area.
Table 5 Menu Area command buttons
Command
Help
Description
Opens a new Web-browser window for displaying the basic online help information. Close
the help browser when finished.
Dump
Writes current switch configuration to the screen. Configuration information is displayed with
parameters that have been changed from default values.
Logs off the switch and exits the BBI.
Logout
Configuration Area
Use the Configuration Area to configure SmartPanel settings.
When a feature is selected from the Menu Area, a configuration form is displayed in the Configuration Area. The
exact nature of the form depends on the type of information available.
Configuration forms display information and allow you to make configuration change to SmartPanel parameters.
Command Buttons
The following general commands are available at the bottom of the Configuration Area.
Table 6 Configuration Area command buttons
Command
Apply
Description
Pending configuration changes do not take effect until you select the Apply command. Once
applied, all changes take effect on the switch immediately. If you do not save the changes,
however, they will be lost the next time the switch is rebooted.
Save
Writes applied configuration changes to non-volatile flash memory on the switch (with the
option of not overlaying the current backup).
Revert Apply
Removes pending configuration changes between save commands. Use this command to
restore configuration parameters set since last save command.
Browser-based interface 12
Download from Www.Somanuals.com. All Manuals Search And Download.
Port Group Mapping
SmartPanel ports can be combined into Port Groups. Up to five Port Groups are available in the SmartPanel. A
Spare Ports Group is available for unused ports.
VLANs and Link Aggregation Groups (trunks) are configured automatically for each Port Group. No network loops
are allowed in the configuration. All external ports in the Port Group form a trunk group (static trunk or Link
Aggregation Group).
Port Group Characteristics
SmartPanel Port Groups must have the following characteristics.
•
•
•
•
Each Port Group must contain at least one external port (20-24) and one internal server blade port (1-16).
All external ports in a Port Group must have the same configuration.
Each port in the Port Group is a member of a unique, untagged VLAN.
Tagged VLANs (1-4094) can be assigned to each Port Group. Tagged VLANs cannot be configured across
multiple Port Groups.
•
All external ports in the Port Group form a trunk group.
NOTE: Cross-connect ports (17-18) are not available in the SmartPanel.
Port Group configuration
On the BBI, choose Port Group Mapping to select the Port Group for each of the external ports and server blade
ports. Click Apply to make the changes active. Click Save to write the configuration to flash memory.
Browser-based interface 13
Download from Www.Somanuals.com. All Manuals Search And Download.
In this example, Port 1-4, 20-21 are assigned to Group1, and Port 5-8, 22-23 are assigned to Group2. The others
are assigned to Spare Ports Group.
Internal Port Settings
On the BBI, choose Internal Port Settings to enable or disable the server blade port.
Browser-based interface 14
Download from Www.Somanuals.com. All Manuals Search And Download.
External Port Settings
On the BBI, choose External Port Settings to configure the external port.
The following table describes the external port configuration.
Table 7 External Port Settings
Command
Port Name
Description
Sets a name for the port. The assigned port name appears next to the port
number on some information and statistics screens.
Enables or disables the port.
Switch Port State
Link configuration
Sets the link speed. The choices include:
•
•
•
•
Auto Negotiation Speed and Duplex (default)
1Gbps / Full Duplex
100Mbps / Full Duplex
10Mbps / Full Duplex
Flow Control
Sets the flow control. The choices include:
•
•
•
•
Rx: Receive flow control
Tx: Transmit flow control
both: Receive and transmit flow control (default)
none: No flow control
Browser-based interface 15
Download from Www.Somanuals.com. All Manuals Search And Download.
VLAN
Virtual LANs (VLANs) are commonly used to split up groups of network users into manageable broadcast domains,
to create logical segmentation of workgroups, and to enforce security policies among logical segments. This switch
supports up to 1,000 VLANs per switch. Even though the maximum number of VLANs supported at any given time
is 1,000, each can be identified with any number between 1 and 4095. VLAN 4095 is used by the management
network, which includes the management port 19. VLAN 4095 configuration cannot be modified.
PVID
Each Port Group has a configurable default VLAN number, known as its PVID (Port VLAN ID). All ports are set as
untagged members of PVID. By default, all ports except port 19 are configured as Group1. The PVID of Group1 is 1.
The unique value of PVID is assigned to the Port Group, which contains at least one external port and one internal
server blade port. For the configuration, see the “Port VLAN ID configuration” section later in this chapter.
NOTE: Spare Ports Group for unused ports is assigned a PVID.
802.1Q VLAN Tagging
802.1Q VLAN tagging provides standards-based VLAN support for Ethernet systems. This standard permits
multiple VLANs to be transmitted over a single Ethernet connection.
Tagging places the VLAN identifier in the frame header of a packet, allowing each port to belong to multiple VLANs.
For the configuration to add the VLAN ID to the Port Group, see the “Non-Default Virtual LANs” section later in this
chapter.
NOTE: The SmartPanel does not permit configuration of tagged VLANs across multiple Ports Groups.
Port VLAN ID configuration
Assign at lease one external port and one internal blade server port to the Port Group to use it and assign a unique
value of PVID. On the BBI, choose System settings > Uplink/Group to change the PVID. Edit the value of the
following Port VLAN ID. The value of unused Port Group is 0.
Browser-based interface 16
Download from Www.Somanuals.com. All Manuals Search And Download.
Non-Default Virtual LANs
On the BBI, choose Non-Default Virtual LANs to create VLANs and assign them to Port Groups. The non-default
VLAN ID is placed in the frame header of a packet in forwatding from the port.
The following describes the steps to add VLAN ID.
1.
Click Add VLAN to configure a new VLAN.
2.
Enter a VLAN number and click OK.
The following is displayed.
Browser-based interface 17
Download from Www.Somanuals.com. All Manuals Search And Download.
3.
Select the corresponding radio button to assign the VLAN to a Port Group.
4.
Click Apply to make the changes active.
Management
On the BBI, choose System Settings > Management to configure SNMP System Settings and System Log Server
Settings.
The following table describes the management configuration.
Table 8 Management
Command
Description
SNMP System Settings
System Name
Configures the name for the system. The name can have a maximum of 64
characters.
System Contact
System Location
Configures the name of the system contact. The contact can have a maximum
of 64 characters.
Configures the name of the system location. The location can have a maximum
of 64 characters.
System Log Server Settings
IP Address of Primary Server
Severity of Primary Server
Sets the IP address of the primary syslog server.
This option sets the severity level of the primary syslog server displayed. The
default is 7, which means log all the seven severity levels.
This option sets the facility level of the primary syslog server displayed. The
default is 0.
Facility of Primary Server
IP Address of Secondary Server
Severity of Secondary Server
Sets the IP address of the secondary syslog server.
This option sets the severity level of the secondary syslog server displayed.
The default is 7, which means, log all seven severity levels.
Browser-based interface 18
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 8 Management
Command
Description
Facility of Secondary Server
This option sets the facility level of the secondary syslog server displayed. The
default is 0.
Local User Administration
On the BBI, choose System Settings > Local User Administration to configure the user.
The following table describes the user configuration.
Table 9 Local User Administration
Command
Username
Password
User Type
Enabled
Description
Defines the user name of maximum eight characters.
Sets the user password of up to 128 characters maximum.
Sets the Class-of-Service to define the user’s authority level.
Enables or disables the user.
Eject user
Eject the specified user to access the switch.
Browser-based interface 19
Download from Www.Somanuals.com. All Manuals Search And Download.
Remote User Administration
On the BBI, choose System Settings > Remote User Administration to configure the RADIUS server or the
TACACS+ server.
The following table describes the configuration.
Table 10 Remote User Administration
Command
Radius
Description
Radius disable/enable
Port
Enables or disables the Radius server.
Configures the number of the UDP port to be configured, between 1500 - 3000.
The default is 1645.
Radius Primary Server
Configures the primary Radius server address.
Defines the shared secret (up to 32 characters) between the switch and the
RADIUS server(s).
Radius Secret for Primary Server
Radius Secondary Server
Configures the secondary Radius server address.
Defines the secondary shared secret (up to 32 characters) between the switch
and the Radius server(s).
Radius Secret for Secondary Server
Tacacs+
Tacacs+ disable/enable
Port
Enables or disables the Tacacs+ server.
Configures the number of the TCP port to be configured, between 1 and
65000. The default is 49.
Tacacs+ Primary Server
Configures the primary TACACS+ server address.
Configures the shared secret (up to 32 characters) between the switch and the
TACACS+ server.
Tacacs+ Secret for Primary Server
Tacacs+ Secondary Server
Configures the secondary TACACS+ server address.
Configures the secondary shared secret (up to 32 characters) between the
switch and the TACACS+ server.
Tacacs+ Secret for Secondary Server
Browser-based interface 20
Download from Www.Somanuals.com. All Manuals Search And Download.
Time Services
On the BBI, choose System Settings > Time Services to configure the NTP server.
The following table describes the configuration.
Table 11 Time Services
Command
Description
General Settings
Current Date
Configures the system date.
Current Time
Timezone Location
Configures the system time using a 24-hour clock format.
Configures the time zone where the switch resides. You are prompted to select
your location (continent, country, region) by the timezone wizard. Once a
region is selected, the switch updates the time to reflect local changes to
Daylight Savings Time, etc.
Daylight Savings
Disables or enables daylight savings time in the system clock. When enabled,
the switch will add an extra hour to the system clock so that it is consistent with
the local clock. By default, this option is disabled.
NTP Settings
Time Services
Enables or disables the NTP synchronization service.
Specifies the interval, that is, how often, in minutes (1-44640), to
re-synchronize the switch clock with the NTP server.
Configures the IP address of the primary NTP server to which you want to
synchronize the switch clock.
Update Internal (min)
Primary Server
Secondary Server
Configures the IP address of the secondary NTP server to which you want to
synchronize the switch clock.
Browser-based interface 21
Download from Www.Somanuals.com. All Manuals Search And Download.
Trunking
Trunk groups provide super-bandwidth, multi-link connections between SmartPanel or other trunk-capable devices.
A trunk group is a group of ports that act together, combining their bandwidth to create a single, larger virtual link.
SmartPanel trunk groups are static link aggregation groups that are compatible with Cisco’s EtherChannel
technology.
The SmartPanel is statically configured to place each Port Group into a separate trunk group.
NOTE: Because all ports in a Port Group belong to the same trunk group, individual external ports cannot be
used as a regular 802.3 link. Do not plug a workstation directly into one of the SmartPanel’s external ports,
unless that is the only device plugged into the ports.
When using port trunk groups between the SmartPanel and a switch, you can create a virtual link, operating at up
to 5 Gigabits per second, depending on how many physical ports are combined.
Statistical Load Distribution
Network traffic is statistically distributed between ports in a trunk group. The SmartPanel uses the source and
destination IP address information present in each transmitted IP frame to determine load distribution. If the frame
is not an IP frame, then Layer 2 MAC addresses are used.
Each packet’s particular combination of source and destination addresses results in selecting one line in the trunk
group for data transmission. If there are enough devices feeding the trunk lines, then traffic distribution becomes
relatively even.
Built-In Fault Tolerance
Since trunk groups are comprised of multiple physical links, each trunk group is inherently fault tolerant. As long as
one connection is available, the trunk remains active.
Statistical load balancing is maintained whenever a port in a trunk group is lost or returned to service.
Trunk group configuration rules
The trunking feature operates according to specific configuration rules. When working with trunks, consider the
following rules that determine how a trunk group reacts in any network topology.
•
•
•
•
All trunks must originate from one device, and lead to one destination device.
Trunking from third-party devices must comply with Cisco® EtherChannel® technology.
All external ports in a Port Group must have the same configuration.
Only external ports in a Port Group are trunked. For Port Group configuration, see the “Port Group
configuration”.
Link Aggregation Control Protocol
Link Aggregation Control Protocol (LACP) is an IEEE 802.3ad standard for grouping several physical ports into one
logical port (known as a dynamic trunk group or Link Aggregation Group) with any device that supports the
standard. Please refer to IEEE 802.3ad-2002 for a full description of the standard.
The 802.3ad standard allows standard Ethernet links to form a single Layer 2 link using the Link Aggregation
Control Protocol (LACP). Link aggregation is a method of grouping physical link segments of the same media type
and speed in full duplex, and treating them as if they were part of a single, logical link segment. If a link in a LACP
trunk group fails, traffic is reassigned dynamically to the remaining link/s of the dynamic trunk group.
Browser-based interface 22
Download from Www.Somanuals.com. All Manuals Search And Download.
Trunk Group configuration
On the BBI, choose System Settings > Uplink/Group to enable or disable the Link Aggregation Control Protocol.
When enabled, the external ports are configured as a LACP trunk group. When disabled, they are configured as a
static trunk group. The default is disabled.
Failover
The primary application for Failover is to support Network Adapter Teaming. With Network Adapter Teaming, the
NICs on each server all share the same IP address, and are configured into a team. One NIC is the primary link,
and the other is a standby link.
Failover is enabled by default. You can enable or disable Failover on a Port Group. When enabled, Failover works
as follows.
•
If some (or all) of the links fail in the failover trigger, the SmartPanel disables all internal ports of the Port
Group. When the internal ports are disabled, it causes the NIC team on the affected server blade to failover
from the primary to the backup NIC. This process is called a failover event.
•
When the appropriate links return to service, the SmartPanel enables the internal ports of the Port Group.
This causes the NIC team on the affected server blades to fail back to the primary SmartPanel (unless Auto-
Fallback is disabled on the NIC team). The backup processes traffic until the primary’s internal links come up,
which takes up to five seconds.
The failover limit lets you specify the minimum number of operational links required within the failover trigger before
the trigger initiates a failover event. For example, if the limit is four, a failover event occurs when the number of
operational links in the trigger is four or fewer. When you set the limit to all, the SmartPanel triggers a failover event
only when no links in the trigger are operational. The default is all.
Browser-based interface 23
Download from Www.Somanuals.com. All Manuals Search And Download.
Failover configuration
On the BBI, choose System Settings > Uplink/Group to configure the Switch Failover and Number of Links to
Trigger Failover.
IGMP Snooping
IGMP Snooping allows the SmartPanel to forward multicast traffic only to those ports that request it. IGMP
Snooping prevents multicast traffic from being flooded to all ports. The SmartPanel learns which server hosts are
interested in receiving multicast traffic, and forwards it only to ports connected to those servers.
On the BBI, choose System Settings > IGMP Snooping to enable IGMP Snooping. The default is disabled.
Browser-based interface 24
Download from Www.Somanuals.com. All Manuals Search And Download.
Boot Management
On the BBI, choose System Settings > Boot Management to backup or restore the switch configuration, update the
switch software image, or get dump file.
The following table describes the configuration.
Table 12 Boot Management
Command
Description
Reboot the Module button
Next boot config block
Reboots the switch.
Selects the Configuration Block file (active, backup or factory) that will run after
the next reboot.
Image to boot
Selects which software image (image1 or image2) you want to run in switch
memory for the next reboot.
Image to transfer
Current Image Information
Image 1
Selects a software image to replace with the downloaded software.
Displays information about the current Image 1 software. When NormalPanel is
displayed, the conventional Layer 2 switch software is stored in Image1.
Displays information about the current Image 2 software. When SmartPanel is
displayed, the SmartPanel software is stored in Image2.
Image 2
Boot kernel
Displays the version number of the current Boot software.
Update Image/Cfg
Method to use for transfer
Select the method to use for transfer (TFTP, FTP or HTTP). HTTP is available
only for Get Image.
Settings for using FTP or TFTP Server
Server Address
Enter the IP address of the TFTP or FTP server from which you will transfer the
file.
Remote File Name
Enter the name of the file on a TFTP or FTP server that contains the file you
want to transfer.
Button
Get Image
Starts download of the software image file indicated in Remote File Name field
from the specified TFTP or FTP server.
Put Image
Get Cfg
Starts upload of the software image file indicated in Remote File Name field
from the specified TFTP or FTP server.
Downloads a previously saved switch Configuration Block file indicated in
Remote File Name from the specified the TFTP or FTP server.
The active configuration will be replaced with the commands found in the
downloaded configuration file. The file can contain a full switch configuration or
a partial switch configuration.
The new configuration is not activated until the apply command is used. If the
apply command is found in the configuration script file loaded using this
command, the apply action is performed automatically.
Put Cfg
Uploads the switch’s active configuration to the script configuration file
specified in Remote File Name. The file is placed on the TFTP or FTP server.
Browser-based interface 25
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 12 Boot Management
Command
Description
Put TS Dump
Uploads the TS (tech support) dump file to the TFTP or FTP server specified in
Remote File Name.
Put Crash Dump
Uploads the core (PANIC) dump file to the TFTP or FTP server specified in
Remote Filename.
Clear Crash Dump
Deletes the core dump in flash memory.
IMPORTANT:
When the switch software is changed (NormalPanel or SmartPanel) and the switch is
rebooted, the switch configuration is removed and the switch runs factory configuration block. Backup the
switch configuration if needed.
Browser-based interface 26
Download from Www.Somanuals.com. All Manuals Search And Download.
Command Line Interface
Introduction
The CLI is used for viewing switch information and statistics. In addition, the administrator can use the CLI for
performing all levels of switch configuration.
To make the CLI easy to use, the various commands have been logically grouped into a series of menus and
submenus. Each menu displays a list of commands and/or submenus that are available, along with a summary of
what each command will do. Below each menu is a prompt where you can enter any command appropriate to the
current menu.
This chapter describes the Main Menu commands, and provides a list of commands and shortcuts that are
commonly available from all the menus within the CLI.
Main Menu
The Main Menu displays after a successful connection and login. The following table shows the Main Menu for the
administrator login. Some features are not available under the user login.
[Main Menu]
info
- Information Menu
stats - Statistics Menu
cfg
oper
boot
- Configuration Menu
- Operations Command Menu
- Boot Options Menu
maint - Maintenance Menu
diff
- Show pending config changes [global command]
apply - Apply pending config changes [global command]
save
revert - Revert pending or applied changes [global command]
exit - Exit [global command, always available]
- Save updated config to FLASH [global command]
Menu summary
The Main Menu displays the following submenus:
•
•
•
Information Menu
The Information Menu provides submenus for displaying information about the current status of the switch.
Statistics Menu
This menu provides submenus for displaying switch performance statistics.
Configuration Menu
This menu is available only from an administrator login. It includes submenus for configuring every aspect of
the switch. Changes to configuration are not active until explicitly applied. Changes can be saved to non-
volatile memory (NVRAM).
•
•
•
Operations Command Menu
Operations-level commands are used for making immediate and temporary changes to switch configuration.
This menu is used for bringing ports temporarily in and out of service. This menu is available only from an
administrator and operator login.
Boot Options Menu
The Boot Options Menu is available only from an administrator login. This menu is used for upgrading switch
software, selecting configuration blocks, and for resetting the switch when necessary. This menu is also used
to set the switch back to factory settings.
Maintenance Menu
This menu is used for debugging purposes, enabling you to generate a technical support dump of the critical
state information in the switch, and to clear entries in the Forwarding Database and the Address Resolution
Protocol (ARP). This menu is available only from an administrator and operator login.
Command Line Interface 27
Download from Www.Somanuals.com. All Manuals Search And Download.
Global commands
Some basic commands are recognized throughout the menu hierarchy. These commands are useful for obtaining
online Help, navigating through menus, and for applying and saving configuration changes.
For help on a specific command, type help. The following screen displays:
Global Commands: [can be issued from any menu]
help
up
verbose
apply
print
exit
save
telnet
who
pwd
quit
revert
history
lines
diff
ping
traceroute
popd
pushd
The following are used to navigate the menu structure:
. Print current menu
.. Move up one menu level
/ Top menu if first, or command separator
! Execute command from history
The following table describes the global commands.
Table 13 Global commands
Command
Action
? command or help
Provides usage information about a specific command on the current menu. When
used without the command parameter, a summary of the global commands is
displayed.
. or print
.. or up
/
Displays the current menu.
Moves up one level in the menu structure.
If placed at the beginning of a command, displays the Main Menu. Otherwise, this is
used to separate multiple commands placed on the same line.
Sets the number of lines (n) that display on the screen at one time. The default is 24
lines. When used without a value, the current setting is displayed.
Shows any pending configuration changes that have not been applied.
diff flashdisplays all pending configuration changes that have been applied but
not saved to flash memory (NVRAM), as well as those that have not been applied.
Applies pending configuration changes.
lines
diff
apply
save
Saves the active configuration to backup, and saves the current configuration as active.
save nsaves the current configuration as active, without saving the active
configuration to backup.
revert
Removes changes that have been made, but not applied.
revert applyremoves all changes that have not been saved.
Exits from the command line interface and logs out.
exit or quit
ping
Verifies station-to-station connectivity across the network. The format is:
ping <host name> | <IP address> [ <number of tries>
[ <msec delay> ]]
•
•
•
IP address is the hostname or IP address of the device.
number of tries (optional) is the number of attempts (1-32).
msec delay (optional) is the number of milliseconds between attempts.
traceroute
Identifies the route used for station-to-station connectivity across the network. The
format is:
traceroute <host name> | <IP address> [<max-hops> [ <msec
delay> ]]
•
•
•
IP address is the hostname or IP address of the target station.
max-hops (optional) is the maximum distance to trace (1-16 devices)
msec delay (optional) is the number of milliseconds to wait for the response.
pwd
Displays the command path used to reach the current menu.
verbose n
Sets the level of information displayed on the screen:
•
•
•
•
0 = Quiet: Nothing displays except errors, not even prompts.
1 = Normal: Prompts and requested output are shown, but no menus.
2 = Verbose: Everything is shown. This is the default.
When used without a value, the current setting is displayed.
telnet
This command is used to Telnet out of the switch. The format is:
telnet <hostname> | <IP address> [port]
Displays the history of the last ten commands.
history
pushd
popd
Remembers the current location in the directory of menu commands.
Returns to the last pushd location.
Command Line Interface 28
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 13 Global commands
Command
Action
who
Displays users who are logged in.
Command line history and editing
Using the command line interface, you can retrieve and modify previously entered commands with just a few
keystrokes. The following options are available globally at the command line:
Table 14 Command line history and editing options
Option
Description
history
!!
Displays a numbered list of the last ten previously entered commands.
Repeats the last entered command.
!n
Repeats the nth command shown on the history list.
<Ctrl-p> or
Up arrow key
Recalls the previous command from the history list. This can be used multiple times to work
backward through the last ten commands. The recalled command can be entered as is, or
edited using the options below.
<Ctrl-n> or
Down arrow key
Recalls the next command from the history list. This can be used multiple times to work
forward through the last ten commands. The recalled command can be entered as is, or
edited using the options below.
<Ctrl-a>
<Ctrl-e>
Moves the cursor to the beginning of the command line.
Moves cursor to the end of the command line.
<Ctrl-b> or
Left arrow key
<Ctrl-f> or
Right arrow key
Moves the cursor back one position to the left.
Moves the cursor forward one position to the right.
<Backspace> or Delete Erases one character to the left of the cursor position.
key
<Ctrl-d>
<Ctrl-k>
<Ctrl-l>
<Ctrl-u>
Other keys
.
Deletes one character at the cursor position.
Erases all characters from the cursor position to the end of the command line.
Redisplays the current line.
Clears the entire line.
Inserts new characters at the cursor position.
Prints the current level menu list.
..
Moves to the previous directory level.
Command Line Interface 29
Download from Www.Somanuals.com. All Manuals Search And Download.
Command line interface shortcuts
The following shortcuts allow you to enter commands quickly and easily.
Command stacking
As a shortcut, you can type multiple commands on a single line, separated by forward slashes (/). You can connect
as many commands as required to access the menu option that you want.
For example, the keyboard shortcut to access the Simple Network Management Protocol (SNMP) Configuration
Menu from the Main# prompt is:
Main# cfg/sys/ssnmp/name
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command from the others
in the same menu or submenu.
For example, the command shown above could also be entered as:
Main# c/sys/ssn/n
Tab completion
By entering the first letter of a command at any menu prompt and pressing the Tab key, the CLI will display all
commands or options in that menu that begin with that letter. Entering additional letters will further refine the list of
commands or options displayed.
If only one command fits the input text when the Tab key is pressed, that command will be supplied on the
command line, waiting to be entered. If the Tab key is pressed without any input on the command line, the currently
active menu displays.
Command Line Interface 30
Download from Www.Somanuals.com. All Manuals Search And Download.
Information Menu
Introduction
You can view configuration information for the switch in the user, operator, and administrator command modes.
This chapter discusses how to use the CLI to display switch information.
Menu overview
Command: /info
[Information Menu]
sys
l2
l3
link
port
group
dump
- System Information Menu
- Layer 2 Information Menu
- Layer 3 Information Menu
- Show link status
- Show port information
- Show group information
- Dump all information
The following table describes the Information Menu options.
Table 15 Information Menu options
Command
sys
Usage
Displays system information.
l2
l3
link
Displays the Layer 2 Information Menu.
Displays the Layer 3 Information Menu.
Displays configuration information about each port, including:
•
•
•
•
•
Port number
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up or down)
port
Displays port status information, including:
•
•
•
Port number
Port name
VLAN membership
group
dump
Displays the group information
Dumps all switch information available from the Information Menu (10K or more, depending on
your configuration).
If you want to capture dump data to a file, set your communication software on your workstation
to capture session data prior to issuing the dump commands.
Command Line Interface 31
Download from Www.Somanuals.com. All Manuals Search And Download.
System Information Menu
Command: /info/sys
[System Menu]
snmpv3 - SNMPv3 Information Menu
general - Show general system information
log
user
dump
- Show last 100 syslog messages
- Show current user status
- Dump all system information
The following table describes the System Information Menu options.
Table 16 System Information Menu options
Command
snmpv3
general
Usage
Displays the SNMP v3 Menu.
Displays system information, including:
•
•
•
•
•
•
•
•
System date and time
Switch model name and number
Switch name and location
MAC address of the switch management processor
IP address of IP interface
Hardware version and part number
Software image file and version number
Configuration block name
log
Displays 100 most recent syslog messages.
user
dump
Displays the User Access Information Menu.
Dumps all switch information available from the Information Menu (10K or more, depending on
your configuration).
SNMPv3 Information Menu
Command: /info/sys/snmpv3
[SNMPv3 Information Menu]
usm
view
- Show usmUser table information
- Show vacmViewTreeFamily table information
access - Show vacmAccess table information
group
comm
taddr
- Show vacmSecurityToGroup table information
- Show community table information
- Show targetAddr table information
tparam - Show targetParams table information
notify - Show notify table information
dump
- Show all SNMPv3 information
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
•
•
•
•
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276.
The following table describes the SNMPv3 Information Menu options.
Table 17 SNMPv3 Information Menu options
Command
usm
view
access
group
Usage
Displays User Security Model (USM) table information.
Displays information about view name, subtrees, mask and type of view.
Displays View-based Access Control information.
Displays information about the group that includes the security model, user name, and
group name.
comm
Displays information about the community table.
Displays the Target Address table.
taddr
tparam
notify
Displays the Target parameters table.
Displays the Notify table.
Command Line Interface 32
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 17 SNMPv3 Information Menu options
Command
Usage
dump
Displays all the SNMPv3 information.
SNMPv3 USM User Table information
Command: /info/sys/snmpv3/usm
usmUser Table:
User Name
Protocol
-------------------------------- --------------------------------
adminmd5
adminsha
v1v2only
HMAC_MD5, DES PRIVACY
HMAC_SHA, DES PRIVACY
NO AUTH, NO PRIVACY
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of
messages. This security model makes use of a defined set of user identities displayed in the USM user table. The
USM user table contains information like:
•
•
•
the user name
a security name in the form of a string whose format is independent of the Security Model
an authentication protocol, which is an indication that the messages sent on behalf of the user can be
authenticated
•
the privacy protocol
The following table describes the SNMPv3 User Table information.
Table 18 SNMPv3 User Table parameters
Field
Description
User Name
Protocol
This is a string that represents the name of the user that you can use to access the switch.
This indicates whether messages sent on behalf of this user are protected from disclosure using
a privacy protocol. switch software supports DES algorithm for privacy. The software also
supports two authentication algorithms: MD5 and HMAC-SHA.
SNMPv3 View Table information
Command: /info/sys/snmpv3/view
View Name
Subtree
Mask
Type
------------------ ---------------------------- ------------- --------
iso
1
1
included
included
excluded
excluded
excluded
v1v2only
v1v2only
v1v2only
v1v2only
1.3.6.1.6.3.15
1.3.6.1.6.3.16
1.3.6.1.6.3.18
The user can control and restrict the access allowed to a group to only a subset of the management information in
the management domain that the group can access within each context by specifying the group’s rights in terms of
a particular MIB view for security reasons.
The following table describes the SNMPv3 View Table information.
Table 19 SNMPv3 View Table parameters
Field
Description
View Name
Subtree
Displays the name of the view.
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object
instances which have a common Object Identifier prefix to their names.
Displays the bit mask.
Mask
Type
Displays whether a family of view subtrees is included or excluded from the MIB view.
Command Line Interface 33
Download from Www.Somanuals.com. All Manuals Search And Download.
SNMPv3 Access Table information
Command: /info/sys/snmpv3/access
Group Name Model Level
ReadV
WriteV NotifyV
---------- ------- ------------ --------- -------- -------
v1v2grp
admingrp
snmpv1 noAuthNoPriv iso
usm authPriv iso
iso
iso
v1v2only
iso
The access control sub system provides authorization services.
The vacmAccessTable maps a group name, security information, a context, and a message type, which could be
the read or write type of operation or notification into a MIB view.
The View-based Access Control Model defines a set of services that an application can use for checking access
rights of a group. This group’s access rights are determined by a read-view, a write-view, and a notify-view. The
read-view represents the set of object instances authorized for the group while reading the objects. The write-view
represents the set of object instances authorized for the group when writing objects. The notify-view represents the
set of object instances authorized for the group when sending a notification.
The following table describes the SNMPv3 Access Table information.
Table 20 SNMPv3 Access Table parameters
Field
Description
Group Name
Model
Level
Displays the name of group.
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Displays the minimum level of security required to gain rights of access. For example,
noAuthNoPriv, authNoPriv, or auth-Priv.
ReadV
WriteV
NotifyV
Displays the MIB view to which this entry authorizes the read access.
Displays the MIB view to which this entry authorizes the write access.
Displays the Notify view to which this entry authorizes the notify access.
SNMPv3 Group Table information
Command: /info/sys/snmpv3/group
Sec Model User Name
Group Name
---------- ----------------------------- -------------------------------
snmpv1
usm
usm
v1v2only
adminmd5
adminsha
v1v2grp
admingrp
admingrp
A group is a combination of security model and security name that defines the access rights assigned to all the
security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
Table 21 SNMPv3 Group Table parameters
Field
Description
Sec Model
User Name
Group Name
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
Displays the name for the user.
Displays the access name of the group.
SNMPv3 Community Table information
Command: /info/sys/snmpv3/comm
Index
---------- ---------- -------------------- ----------
trap1 public v1v2only v1v2trap
Name
User Name
Tag
This command displays the community table information stored in the SNMP engine.
The following table describes the SNMPv3 Community Table information.
Table 22 SNMPv3 Community Table parameters
Field
Description
Index
Displays the unique index value of a row in this table.
Command Line Interface 34
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 22 SNMPv3 Community Table parameters
Field
Description
Name
User Name
Tag
Displays the community string, which represents the configuration.
Displays the User Security Model (USM) user name.
Displays the community tag. This tag specifies a set of transport endpoints from which a
command responder application accepts management requests and to which a command
responder application sends an SNMP trap.
SNMPv3 Target Address Table information
Command: /info/sys/snmpv3/taddr
Name
---------- --------------- ---- ---------- ---------------
trap1 47.81.25.66 162 v1v2trap v1v2param
Transport Addr Port Taglist
Params
This command displays the SNMPv3 target address table information, which is stored in the SNMP engine.
The following table describes the SNMPv3 Target Address Table information.
Table 23 SNMPv3 Target Address Table parameters
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this
snmpTargetAddrEntry.
Transport Addr
Port
Displays the transport addresses.
Displays the SNMP UDP port number.
Taglist
This column contains a list of tag values which are used to select target addresses for a
particular SNMP message.
Params
The value of this object identifies an entry in the snmpTargetParamsTable. The identified
entry contains SNMP parameters to be used when generating messages to be sent to this
transport address.
SNMPv3 Target Parameters Table information
Command: /info/sys/snmpv3/tparam
Name
------------------- -------- -------------------- --------- -----------
v1v2param snmpv2c v1v2only snmpv1 noAuthNoPriv
MP Model User Name
Sec Model Sec Level
The following table describes the SNMPv3 Target Parameters Table information.
Table 24 SNMPv3 Target Parameters Table
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this
snmpTargeParamsEntry.
MP Model
User Name
Sec Model
Displays the Message Processing Model used when generating SNMP messages using
this entry.
Displays the securityName, which identifies the entry on whose behalf SNMP messages
will be generated using this entry.
Displays the security model used when generating SNMP messages using this entry. The
system may choose to return an inconsistentValue error if an attempt is made to set this
variable to a value for a security model which the system does not support.
Displays the level of security used when generating SNMP messages using this entry.
Sec Level
Command Line Interface 35
Download from Www.Somanuals.com. All Manuals Search And Download.
SNMPv3 Notify Table information
Command: /info/sys/snmpv3/notify
Name
-------------------- --------------------
v1v2trap v1v2trap
Tag
The following table describes the SNMPv3 Notify Table information.
Table 25 SNMPv3 Notify Table
Field
Name
Tag
Description
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
This represents a single tag value which is used to select entries in the
snmpTargetAddrTable. Any entry in the snmpTargetAddrTable that contains a tag value
equal to the value of this entry is selected. If this entry contains a value of zero length, no
entries are selected.
SNMPv3 dump
Command: /info/sys/snmpv3/dump
Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00
usmUser Table:
User Name
Protocol
-------------------------------- --------------------------------
admin
NO AUTH, NO PRIVACY
HMAC_MD5, DES PRIVACY
HMAC_SHA, DES PRIVACY
NO AUTH, NO PRIVACY
adminmd5
adminsha
v1v2only
vacmAccess Table:
Group Name Model Level
ReadV WriteV NotifyV
---------- ------- ------------ ------- -------- ------
admin
v1v2grp
admingrp usm
usm
snmpv1 noAuthNoPriv org
authPriv org
noAuthNoPriv org
org
org
org
org
v1v2only
org
vacmViewTreeFamily Table:
View Name Subtree
Mask
Type
-------------------- --------------- ------------ --------------
org
1.3
1.3
included
included
excluded
excluded
excluded
v1v2only
v1v2only
v1v2only
v1v2only
1.3.6.1.6.3.15
1.3.6.1.6.3.16
1.3.6.1.6.3.18
vacmSecurityToGroup Table:
Sec Model User Name
Group Name
---------- ------------------------------- -----------------------
snmpv1
usm
usm
v1v2only
admin
adminsha
v1v2grp
admin
admingrp
snmpCommunity Table:
Index Name
User Name
Tag
---------- ---------- -------------------- ----------
snmpNotify Table:
Name
Tag
-------------------- --------------------
snmpTargetAddr Table:
Name
Transport Addr Port Taglist
Params
---------- --------------- ---- ---------- ---------------
snmpTargetParams Table:
Name
MP Model User Name
Sec Model Sec Level
-------------------- -------- ------------------ --------- -------
Command Line Interface 36
Download from Www.Somanuals.com. All Manuals Search And Download.
System information
Command: /info/sys/gen
System Information at 6:56:22 Thu Jan 11, 2006
Time zone: Asia/Tokyo
Blade Network Technologies 1Gb Intelligent L2 Switch, SmartPanel
sysName:
sysLocation:
RackId: NEC01A 6X00125
RackName: Default_Rack_Name
EnclosureSerialNumber: NEC01A 6X00125
EnclosureName: Default_Chassis_Name
BayNumber: 1
Switch is up 0 days, 14 hours, 56 minutes and 22 seconds.
Last boot: power cycle
MAC address: 00:17:ef:80:7a:00
Revision:
IP (If 256) address: 10.14.4.16
Switch Serial No: MY3644052B
Spare Part No: 856-126690-001-A
Software Version 1.0.0 (FLASH image2), active configuration.
System information includes:
•
•
•
•
•
•
•
System date and time
Switch model name and number
Rack name and location
MAC address of the switch management processor
IP address of the switch
Software image file and version number
Current configuration block (active, backup, or factory default)
Command Line Interface 37
Download from Www.Somanuals.com. All Manuals Search And Download.
Show last 100 syslog messages
Command: /info/sys/log
Date Time
Severity level
Message
---- ----
-----------------
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
-------
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:42
Jul 8 17:25:42
Jul 8 17:25:42
Jul 8 17:25:42
Jul 8 17:25:42
system: link up on port 1
system: link up on port 8
system: link up on port 7
system: link up on port 12
system: link up on port 11
system: link up on port 14
system: link up on port 13
system: link up on port 16
system: link up on port 15
system: link up on port 17
system: link up on port 20
system: link up on port 22
system: link up on port 23
system: link up on port 21
system: link up on port 4
system: link up on port 3
system: link up on port 6
system: link up on port 5
system: link up on port 10
Jul 8 17:25:42
NOTICE
system: link up on port 9
Each message contains a date and time field and has a severity level associated with it. One of eight different
prefixes is used to indicate the condition:
•
•
•
•
•
•
•
•
EMERG—indicates the system is unusable
ALERT—indicates action should be taken immediately
CRIT—indicates critical conditions
ERR—indicates error conditions or eroded operations
WARNING—indicates warning conditions
NOTICE—indicates a normal but significant condition
INFO—indicates an information message
DEBUG—indicates a debug-level message
System user information
Command: /info/sys/user
Usernames:
user
oper
admin
- enabled
- disabled
- Always Enabled
Current User ID table:
1: name tech1 , ena, cos user
2: name tech2 , ena, cos user
, password valid, online
, password valid, offline
The following table describes the User Name information.
Table 26 User Name Information menu
Field
Usage
user
Displays the status of the useraccess level.
oper
admin
Current User
ID Table
Displays the status of the oper(operator) access level.
Displays the status of the admin(administrator) access level.
Displays the status of configured User ID
Command Line Interface 38
Download from Www.Somanuals.com. All Manuals Search And Download.
Layer 2 information
Command: /info/l2
[Layer 2 Menu]
fdb
trunk
dump
- Forwarding Database Information Menu
- Show Trunk Group information
- Dump all layer 2 information
The following table describes the Layer 2 Information menu options.
Table 27 Layer 2 information menu options
Command
fdb
Usage
Displays the Forwarding Database Information Menu.
trunk
dump
When trunk groups are configured, you can view the state of each port in the various trunk groups.
Dumps all switch information available from the Layer 2 menu (10K or more, depending on your
configuration).
If you want to capture dump data to a file, set your communication software on your workstation to
capture session data prior to issuing the dump commands.
Command Line Interface 39
Download from Www.Somanuals.com. All Manuals Search And Download.
FDB information menu
Command: /info/l2/fdb
[Forwarding Database Menu]
find
port
vlan
- Show a single FDB entry by MAC address
- Show FDB entries on a single port
- Show FDB entries on a single VLAN
state - Show FDB entries by state
dump - Show all FDB entries
The forwarding database (FDB) contains information that maps the media access control (MAC) address of each
known device to the switch port where the device address was learned. The FDB also shows which other ports
have seen frames destined for a particular MAC address.
NOTE: The master forwarding database supports up to 8K MAC address entries on the management
processor (MP) per switch.
Table 28 FDB information menu
Command
Usage
find <MAC address> [<VLAN>]
Displays a single database entry by its MAC address. You are
prompted to enter the MAC address of the device.
Enter the MAC address using the format: xx:xx:xx:xx:xx:xx. (For
example: 08:00:20:12:34:56)
You can also enter the MAC address using the format: xxxxxxxxxxxx.
(For example: 080020123456)
port <port number>
vlan <1-4095>
state unknown|forward|trunk
dump
Displays all FDB entries for a particular port.
Displays all FDB entries on a single VLAN. The range is 1-4095.
Displays all FDB entries that match a particular state.
Displays all entries in the Forwarding Database.
Show all FDB information
Command: /info/l2/fdb/dump
MAC address
VLAN Port Trnk State
----------------- ---- ---- ---- -----
00:02:01:00:00:00 300
1
TRK
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
00:02:01:00:00:01 300 23
00:02:01:00:00:02 300 23
00:02:01:00:00:03 300 23
00:02:01:00:00:04 300 23
00:02:01:00:00:05 300 23
00:02:01:00:00:06 300 23
00:02:01:00:00:07 300 23
00:02:01:00:00:08 300 23
00:02:01:00:00:09 300 23
00:02:01:00:00:0a 300 23
00:02:01:00:00:0b 300 23
00:02:01:00:00:0c 300 23
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the trunking
(TRK) state, the Trnk field displays the trunk group number. If the state for the port is listed as unknown (UNK), the
MAC address has not yet been learned by the switch, but has only been seen as a destination address. When an
address is in the unknown state, no outbound port is indicated.
Clearing entries from the forwarding database
To delete a static MAC address from the forwarding database (FDB), see the “Static FDB configuration” section in
the “Configuration Menu” chapter. To clear the entire forwarding database (FDB), see the “Forwarding Database
options” section in the “Maintenance Menu” chapter.
Command Line Interface 40
Download from Www.Somanuals.com. All Manuals Search And Download.
Trunk group information
Command: /info/l2/trunk
Trunk group 1, Enabled
Protocol - Static
port state:
20: forwarding
21: forwarding
22: forwarding
23: forwarding
24: forwarding
When trunk groups are configured, you can view the state of each port in the various trunk groups.
Layer 3 information
Command: /info/l3
[Layer 3 Menu]
arp
ip
- ARP Information Menu
- Show IP information
igmp
dump
- Show IGMP Snooping Multicast Group information
- Dump all layer 3 information
The following table describes the Layer 3 Information Menu options.
Table 29 Layer 3 information menu options
Command
arp
ip
Usage
Displays the Address Resolution Protocol (ARP) Information Menu.
Displays IP Information. IP information, includes:
•
IP interface information: Interface number, IP address, subnet mask, VLAN number, and
operational status.
•
Default gateway information: Metric for selecting which configured gateway to use,
gateway number, IP address, and health status
IP forwarding information: Enable status, lnet and lmask
Port status
•
•
igmp
dump
Displays IGMP Information Menu.
Dumps all switch information available from the Layer 3 Menu (10K or more, depending on
your configuration).
If you want to capture dump data to a file, set your communication software on your
workstation to capture session data prior to issuing the dump commands.
Command Line Interface 41
Download from Www.Somanuals.com. All Manuals Search And Download.
ARP information
Command: /info/arp
[Address Resolution Protocol Menu]
find
port
vlan
addr
dump
- Show a single ARP entry by IP address
- Show ARP entries on a single port
- Show ARP entries on a single VLAN
- Show ARP entries for switch's interface
- Show all ARP entries
The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry, address
status flags, VLAN, and port for the address, and port referencing information.
The following table describes the Address Resolution Protocol Menu options.
Table 30 ARP information
Command
Usage
find <IP address>
port <port number>
vlan <1-4095>
addr
Displays a single ARP entry by IP address. For example, 192.4.17.101
Displays the ARP entries on a single port.
Displays the ARP entries on a single VLAN.
Displays the ARP address list: IP address, IP mask, MAC address, and VLAN
flags.
dump
Displays all ARP entries, including:
•
•
•
IP address and MAC address of each entry
Address status flag
The VLAN and port to which the address belongs
The ports which have referenced the address (empty if no port has routed traffic
to the IP address shown)
ARP address list information
Command: /info/arp/addr
IP address
IP mask
MAC address
VLAN
--------------- --------------- ----------------- ----
205.178.18.66 255.255.255.255 00:70:cf:03:20:04 4095
Show all ARP entry information
Command: /info/arp/dump
IP address
--------------- -----
192.168.2.4
192.168.2.19
192.168.2.61
Flags
MAC address
VLAN
----
4095
4095
4095
Port
----
19
-----------------
00:50:8b:b2:32:cb
00:0e:7f:25:89:b5
00:0f:6a:ed:46:00
19
P
The Flag field provides additional information about an entry. If no flag displays, the entry is normal.
Table 31 ARP dump flag parameters
Flag
P
R
Description
Permanent entry created for switch IP interface.
Indirect route entry.
U
Unresolved ARP entry. The MAC address has not been learned.
Command Line Interface 42
Download from Www.Somanuals.com. All Manuals Search And Download.
IP information
Command: /info/l3/ip
Interface information:
1: 47.80.23.243 255.255.254.0 47.80.23.255,
vlan 1, up
Default gateway information: metric strict
4: 47.80.23.254, vlan 4095, up active
The following interface and default gateway information is displayed:
•
•
•
•
•
Interface number
IP address
IP mask
IP broadcast address
Operational status
IGMP multicast group information
Command: /info/l3/igmp
[IGMP Multicast Group Menu]
mrouter - Show IGMP Snooping Multicast Router Port information
find
vlan
port
- Show a single group by IP group address
- Show groups on a single vlan
- Show groups on a single port
trunk - Show groups on a single trunk
dump - Show all groups
The following table describes the commands used to display information about IGMP groups learned by the switch.
Table 32 IGMP Multicast Group menu options
Command
Usage
mrouter
Displays the Multicast Router Menu.
find <IP address>
vlan <1-4094>
port <port number>
trunk <1-40>
dump
Displays a single IGMP multicast group by its IP address.
Displays all IGMP multicast groups on a single VLAN.
Displays all IGMP multicast groups on a single port.
Displays all IGMP multicast groups on a single trunk group.
Displays information for all multicast groups.
IGMP multicast router port information
Command: /info/l3/igmp/mrouter
[IGMP Multicast Router Menu]
vlan - Show all multicast router ports on a single vlan
dump - Show all multicast router ports
The following table describes the commands used to display information about multicast routers learned through
IGMP Snooping.
Table 33 IGMP Multicast Router menu options
Command
Usage
vlan <1-4094>
dump
Displays information for all multicast groups on a single VLAN.
Displays information for all multicast groups learned by the switch.
Command Line Interface 43
Download from Www.Somanuals.com. All Manuals Search And Download.
Link status information
Command: /info/link
------------------------------------------------------------------
Port Speed Duplex Flow Ctrl Link
---- ----- -------- --TX-----RX-- ------
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
19
20
21
22
23
24
1000
1000
1000
1000
any
any
any
any
any
any
any
any
any
any
any
any
100
1000
1000
any
any
any
full
full
full
full
any
any
any
any
any
any
any
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
no
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
no
up
up
up
up
down
down
down
up
down
down
down
down
down
down
down
down
up
any
any
any
any
any
full
full
full
any
any
any
no
no
any
yes
yes
no
no
yes
yes
yes
up
up
down
down
down
Use this command to display link status information about each port on a switch, including:
•
•
•
•
•
Port number
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no or yes)
Link status (up or down)
Port information
Command: /info/port
Port
NAME
VLAN(s)
---- -------------- -------------------------------
1 Downlink1
2 Downlink2
3 Downlink3
4 Downlink4
5 Downlink5
6 Downlink6
7 Downlink7
8 Downlink8
9 Downlink9
10 Downlink10
11 Downlink11
12 Downlink12
13 Downlink13
14 Downlink14
15 Downlink15
16 Downlink16
19 Mgmt
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4095
1
20 Uplink1
21 Uplink2
22 Uplink3
1
1
23 Uplink4
24 Uplink5
1
1
Port information includes:
•
•
•
Port number
Port name
VLAN membership
Command Line Interface 44
Download from Www.Somanuals.com. All Manuals Search And Download.
Group information
Command: /info/group
Group 1:
Internal Ports: 1-16
External Ports: 20-24
Port VLAN ID: 1
Number of nondefault vlans in group: 0
VLANs: empty
Default Group Vlan: 1
Trunk group 13: Enabled
port state:
20: forwarding
21: forwarding
22: forwarding
23: forwarding
24: forwarding
LACP Enabled
IGMP Disabled
Failover Enabled
Failover Limit = 0
This displays the information of Port Group 1-5 and Spare Ports Group.
Information dump
Command: /info/dump
Use the dump command to dump all switch information available from the Information Menu (10K or more,
depending on your configuration). This data is useful for tuning and debugging switch performance.
If you want to capture dump data to a file, set the communication software on your workstation to capture session
data prior to issuing the dump commands.
Command Line Interface 45
Download from Www.Somanuals.com. All Manuals Search And Download.
Statistics Menu
Introduction
You can view switch performance statistics in the user, operator, and administrator command modes. This chapter
discusses how to use the CLI to display switch statistics.
Menu information
Command: /stats
[Statistics Menu]
port - Port Stats Menu
clrports – Clear stats for all ports
l2
l3
mp
ntp
dump
- Layer 2 Stats Menu
- Layer 3 Stats Menu
- MP-specific Stats Menu
- Show NTP stats
- Dump all stats
The following table describes the Statistics Menu options.
Table 34 Statistics Menu options
Command
Usage
port <port number>
Displays the Port Statistics Menu for the specified port. Use this command to display
traffic statistics on a port-by-port basis. Traffic statistics are included in SNMP
Management Information Base (MIB) objects.
clrports
Clears the statistics for all ports.
l2
l3
mp
Displays the Layer 2 Statistics Menu.
Displays the Layer 3 Statistics Menu.
Displays the Management Processor Statistics Menu. Use this command to view
information on how switch management processes and resources are currently being
allocated.
ntp <clear>
dump
Displays Network Time Protocol (NTP) Statistics.
Add the argument, clear, to clear NTP statistics
Dumps all switch statistics. Use this command to gather data for tuning and debugging
switch performance. If you want to capture dump data to a file, set your communication
software on your workstation to capture session data prior to issuing the dump
command.
Command Line Interface 46
Download from Www.Somanuals.com. All Manuals Search And Download.
Port Statistics Menu
Command: /stats/port <port number>
[Port Statistics Menu]
brg
- Show bridging ("dot1") stats
ether - Show Ethernet ("dot3") stats
if
ip
link
- Show interface ("if") stats
- Show Internet Protocol ("IP") stats
- Show link stats
clear - Clear all port stats
This menu displays traffic statistics on a port-by-port basis.
The following table describes the Port Statistics Menu options:
Table 35 Port Statistics Menu options
Command
brg
ether
if
ip
link
clear
Usage
Displays bridging (“dot1”) statistics for the port.
Displays Ethernet (“dot3”) statistics for the port.
Displays interface statistics for the port.
Displays Internet Protocol statistics for the port.
Displays link statistics for the port.
Clears all the statistics on the port.
Bridging statistics
Command: /stats/port <port number>/brg
Bridging statistics for port 1:
dot1PortInFrames:
dot1PortOutFrames:
63242584
63277826
dot1PortInDiscards:
dot1TpLearnedEntryDiscards:
dot1StpPortForwardTransitions:
0
0
0
The following table describes the bridging statistics for a selected port:
Table 36 Bridging statistics for port
Statistics
Description
dot1PortInFrames
The number of frames that have been received by this port from its
segment.
A frame received on the interface corresponding to this port is counted by
this object, if and only if, it is for a protocol being processed by the local
bridging function, including bridge management frames.
The number of frames that have been transmitted by this port to its
segment.
dot1PortOutFrames
A frame transmitted on the interface corresponding to this port is counted
by this object, if and only if, it is for a protocol being processed by the local
bridging function, including bridge management frames.
Count of valid frames received which were discarded (that is, filtered) by
the forwarding process.
dot1PortInDiscards
dot1TpLearnedEntryDiscards
The total number of Forwarding Database entries, which have been or
would have been learned, but have been discarded due to a lack of space
to store them in the Forwarding Database.
If this counter is increasing, it indicates that the Forwarding Database is
regularly becoming full (a condition which has adverse performance effects
on the sub network).
If this counter has a significant value but is not presently increasing, it
indicates that the problem has been occurring but is not persistent.
The number of times this port has transitioned from the Learning state to
the Forwarding state.
dot1StpPortForwardTransition
s
Command Line Interface 47
Download from Www.Somanuals.com. All Manuals Search And Download.
Ethernet statistics
Command: /stats/port <port number>/ether
Ethernet statistics for port 1:
dot3StatsAlignmentErrors:
dot3StatsFCSErrors:
dot3StatsSingleCollisionFrames:
dot3StatsMultipleCollisionFrames:
dot3StatsLateCollisions:
dot3StatsExcessiveCollisions:
dot3StatsInternalMacTransmitErrors:
dot3StatsFrameTooLongs:
0
0
0
0
0
0
0
0
0
dot3StatsInternalMacReceiveErrors:
The following table describes the Ethernet statistics for a selected port:
Table 37 Ethernet statistics for port
Statistics
Description
dot3StatsAlignmentErrors
A count of frames received on a particular interface that are not
an integral number of octets in length and do not pass the
Frame Check Sequence (FCS) check.
The count represented by an instance of this object is
incremented when the alignmentError status is returned by the
MAC service to the Logical Link Control (LLC) (or other MAC
user).
Received frames for which multiple error conditions obtained
are, according to the conventions of IEEE 802.3 Layer
Management, counted exclusively according to the error status
presented to the LLC.
dot3StatsFCSErrors
A count of frames received on a particular interface that are an
integral number of octets in length but do not pass the Frame
Check Sequence (FCS) check.
The count represented by an instance of this object is
incremented when the frameCheckError status is returned by
the MAC service to the LLC (or other MAC user).
Received frames for which multiple error conditions obtained
are, according to the conventions of IEEE 802.3 Layer
Management, counted exclusively according to the error status
presented to the LLC.
dot3StatsSingleCollisionFrames
dot3StatsMultipleCollisionFrames
dot3StatsLateCollisions
A count of successfully transmitted frames on a particular
interface for which transmission is inhibited by exactly one
collision.
A frame that is counted by an instance of this object is also
counted by the corresponding instance of the ifOutUcastPkts,
ifOutMulticastPkts, or ifOutBroadcastPkts, and is not counted
by the corresponding instance of the
dot3StatsMultipleCollisionFrame object.
A count of successfully transmitted frames on a particular
interface for which transmission is inhibited by more than one
collision.
A frame that is counted by an instance of this object is also
counted by the corresponding instance of either the
ifOutUcastPkts, ifOutMulticastPkts, or ifOutBroadcastPkts, and
is not counted by the corresponding instance of the
dot3StatsSingleCollisionFrames object.
The number of times that a collision is detected on a particular
interface later than 512 bit-times into the transmission of a
packet.
Five hundred and twelve bit-times corresponds to 51.2
microseconds on a 10 Mbit/s system. A (late) collision included
in a count represented by an instance of this object is also
considered as a (generic) collision for purposes of other
collision-related statistics.
dot3StatsExcessiveCollisions
A count of frames for which transmission on a particular
interface fails due to excessive collisions.
Command Line Interface 48
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 37 Ethernet statistics for port
Statistics
Description
dot3StatsInternalMacTransmitErrors
A count of frames for which transmission on a particular
interface fails due to an internal MAC sublayer transmit error.
A frame is only counted by an instance of this object if it is not
counted by the corresponding instance of either the
dot3StatsLateCollisions object, the
dot3StatsExcessiveCollisions object, or the
dot3StatsCarrierSenseErrors object.
The precise meaning of the count represented by an instance
of this object is implementation specific. In particular, an
instance of this object may represent a count of transmission
errors on a particular interface that are not otherwise counted.
A count of frames received on a particular interface that
exceeds the maximum permitted frame size.
dot3StatsFrameTooLongs
The count represented by an instance of this object is
incremented when the frameTooLong status is returned by the
MAC service to the LLC (or other MAC user).
Received frames for which multiple error conditions obtained
are, according to the conventions of IEEE 802.3 Layer
Management, counted exclusively according to the error status
presented to the LLC.
dot3StatsInternalMacReceiveErrors
A count of frames for which reception on a particular interface
fails due to an internal MAC sublayer receive error.
A frame is only counted by an instance of this object if it is not
counted by the corresponding instance of the
dot3StatsFrameTooLongs object, the dot3StatsAlignmentErrors
object, or the dot3StatsFCSErrors object.
The precise meaning of the count represented by an instance
of this object is implementation specific. In particular, an
instance of this object may represent a count of received errors
on a particular interface that are not otherwise counted.
Interface statistics
Command: /stats/port <port number>/if
Interface statistics for port 1:
ifHCIn Counters
51697080313
ifHCOut Counters
Octets:
51721056808
UcastPkts:
BroadcastPkts:
MulticastPkts:
Discards:
65356399
65385714
0
0
0
0
6516
0
0
Errors:
21187
The following table describes the interface (IF) statistics for a selected port:
Table 38 Interface statistics for port
Statistics
Description
Octets—IfHCIn
UcastPkts—IfHCIn
The total number of octets received on the interface, including framing characters.
The number of packets, delivered by this sublayer to a higher sublayer, which were
not addressed to a multicast or broadcast address at this sublayer.
BroadcastPkts—IfHCIn
MulticastPkts—IfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which were
addressed to a broadcast address at this sublayer.
The total number of packets, delivered by this sublayer. These are the packets that
higher-level protocols requested to be transmitted, and which were addressed to a
multicast address at this sublayer, including those that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses.
The number of inbound packets which were chosen to be discarded even though no
errors were detected to prevent their being delivered to a higher-layer protocol. One
possible reason for discarding such a packet could be to free up buffer space.
Discards—IfHCIn
Command Line Interface 49
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 38 Interface statistics for port
Statistics
Description
Errors—IfHCIn
For packet-oriented interfaces, the number of inbound packets that contained errors
preventing them from being delivered to a higher-layer protocol.
For character-oriented or fixed-length interfaces, the number of inbound
transmission units that contained errors preventing them from being deliverable to a
higher-layer protocol.
Octets—IfHCOut
The total number of octets transmitted out of the interface, including framing
characters.
UcastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted,
and which were not addressed to a multicast or broadcast address at this sublayer,
including those that were discarded or not sent.
BroadcastPkts—IfHCOut
MulticastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted,
and which were addressed to a broadcast address at this sublayer, including those
that were discarded or not sent. This object is a 64-bit version of
ifOutBroadcastPkts.
The total number of packets that higher-level protocols requested to be transmitted,
and which were addressed to a multicast address at this sublayer, including those
that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses. This
object is a 64-bit version of ifOutMulticastPkts.
Discards—IfHCOut
Errors—IfHCOut
The number of outbound packets that were chosen to be discarded even though no
errors had been detected to prevent their being transmitted. One possible reason for
discarding such a packet could be to free up buffer space.
For packet-oriented interfaces, the number of outbound packets that could not be
transmitted because of errors.
For character-oriented or fixed-length interfaces, the number of outbound
transmission units that could not be transmitted because of errors.
Internet Protocol (IP) statistics
Command: /stats/port <port number>/ip
GEA IP statistics for port 1:
ipInReceives :
ipInHeaderError:
ipInDiscards :
0
0
0
The following table describes the Internet Protocol (IP) statistics for a selected port:
Table 39 IP statistics for port
Statistics
Description
ipInReceives
The total number of input datagrams received from interfaces, including those received in
error.
ipInHeaderError
ipInDiscards
The number of input datagrams discarded because the IP address in their IP header's
destination field was not a valid address to be received at this entity (the switch).
The number of input IP datagrams for which no problems were encountered to prevent their
continued processing, but which were discarded (for example, for lack of buffer space).
Note that this counter does not include any datagrams discarded while awaiting re-
assembly.
Command Line Interface 50
Download from Www.Somanuals.com. All Manuals Search And Download.
Link statistics
Command: /stats/port <port number>/link
Link statistics for port 1:
linkStateChange:
2
The following table describes the link statistics for a selected port:
Table 40 Link statistics for port
Statistic
Description
linkStateChange
The total number of link state changes.
Layer 2 statistics Menu
Command: /stats/l2
[Layer 2 Statistics Menu]
fdb
lacp
- Show FDB stats
- Show LACP stats
The following table describes the Layer 2 statistics menu options.
Table 41 Layer 2 statistics menu options
Command
fdb
lacp
Usage
Displays the Forwarding Database statistics.
Displays the Link Aggregation Control Protocol statistics.
FDB statistics
Command: /stats/l2/fdb
FDB statistics:
current:
91 hiwat:
91
This menu option enables you to display statistics regarding the use of the forwarding database, including the
number of current entries and the maximum number of entries ever recorded.
The following table describes the Forwarding Database (FDB) statistics:
Table 42 Forwarding Database statistics
Statistic
Description
current
hiwat
Current number of entries in the Forwarding Database.
Highest number of entries recorded at any given time in the Forwarding Database.
LACP statistics
Command: /stats/l2/lacp <port number>
Valid LACPDUs received
Valid Marker PDUs received
- 0
- 0
Valid Marker Rsp PDUs received - 0
Unknown version/TLV type
Illegal subtype received
LACPDUs transmitted
Marker PDUs transmitted
Marker Rsp PDUs transmitted
- 0
- 0
- 0
- 0
- 0
Command Line Interface 51
Download from Www.Somanuals.com. All Manuals Search And Download.
Layer 3 statistics Menu
Command: /stats/l3
[Layer 3 Statistics Menu]
ip
route
arp
icmp
tcp
udp
- Show IP stats
- Show route stats
- Show ARP stats
- Show ICMP stats
- Show TCP stats
- Show UDP stats
- Show IGMP stats
igmp
clrigmp - Clear IGMP stats
ipclear - Clear IP stats
dump
- Dump layer 3 stats
The following table describes the Layer 3 statistics menu options. Layer 3 functionality is limited in this release.
Table 43 Layer 3 statistics menu options
Command
ip
Usage
Displays IP statistics
route
Displays route statistics
arp <clear>
Displays Address Resolution Protocol (ARP) statistics. Add the
argument, clear, to clear ARP statistics.
Displays ICMP statistics.
icmp
tcp
Displays Transmission Control Protocol (TCP) statistics. Add the
argument, clear, to clear TCP statistics.
Displays User Datagram Protocol (UDP) statistics. Add the
argument, clear, to clear UDP statistics.
Displays IGMP statistics.
udp
igmp
clrigmp <1-4095>|all
ipclear
Clears all IGMP statistics for the selected VLANs.
Clears IP statistics. Use this command with caution as it will
delete all the IP statistics.
dump
Displays all Layer 3 statistics.
IP statistics
Command: /stats/l3/ip
IP statistics:
ipInReceives:
ipInAddrErrors:
ipInUnknownProtos:
ipInDelivers:
ipOutDiscards:
ipDefaultTTL:
36475
905
0
4103
0
ipInHdrErrors:
0
ipInDiscards:
ipOutRequests:
0
30974
255
The following table describes the IP statistics:
Table 44 IP statistics
Statistics
Description
ipInReceives
The total number of input datagrams received from interfaces, including those
received in error.
ipInHdrErrors
ipInAddrErrors
The number of input datagrams discarded due to errors in their IP headers, including
bad checksums, version number mismatch, other format errors, time-to-live exceeded,
errors discovered in processing their IP options, and so on.
The number of input datagrams discarded because the IP address in their IP header
destination field was not a valid address to be received at this switch. This count
includes invalid addresses (for example, 0.0.0.0) and addresses of unsupported
classes (for example, Class E).
For entities which are not IP gateways and therefore do not forward datagrams, this
counter includes datagrams discarded because the destination address was not a
local address.
ipInUnknownProtos
The number of locally addressed datagrams received successfully but discarded
because of an unknown or unsupported protocol.
Command Line Interface 52
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 44 IP statistics
Statistics
Description
ipInDiscards
The number of input IP datagrams for which no problems were encountered to
prevent their continued processing, but which were discarded (for example, for lack of
buffer space).
This counter does not include any datagrams discarded while awaiting re-assembly.
The total number of input datagrams successfully delivered to IP user-protocols
(including ICMP).
ipInDelivers
ipOutRequests
The total number of IP datagrams that local IP user-protocols (including ICMP)
supplied to IP in requests for transmission.
This counter does not include any datagrams counted in ipForwDatagrams.
The number of output IP datagrams for which no problem was encountered to prevent
their transmission to their destination, but which were discarded (for example, for lack
of buffer space).
ipOutDiscards
ipDefaultTTL
This counter would include datagrams counted in ipForwDatagrams if any such
packets met this (discretionary) discard criterion.
The default value inserted into the Time-To-Live (TTL) field of the IP header of
datagrams originated at this switch, whenever a TTL value is not supplied by the
transport layer protocol.
Route statistics
Command: /stats/l3/route
Route statistics:
ipRoutesCur:
ipRoutesMax:
7 ipRoutesHighWater:
512
7
The following table describes the Route statistics:
Table 45 Route statistics
Statistics
Description
ipRoutesCur
ipRoutesMax
ipRoutesHighWater
The total number of outstanding routes in the route table.
The maximum number of supported routes.
The highest number of routes ever recorded in the route table.
ARP statistics
Command: /stats/l3/arp
ARP statistics:
arpEntriesCur:
2 arpEntriesHighWater:
2047
4
arpEntriesMax:
The following table describes the Address Resolution Protocol (ARP) statistics:
Table 46 ARP statistics
Statistic
Description
arpEntriesCur
arpEntriesMax
arpEntriesHighWater
The total number of outstanding ARP entries in the ARP table.
The maximum number of supported ARP entries.
The highest number of ARP entries ever recorded in the ARP table.
Command Line Interface 53
Download from Www.Somanuals.com. All Manuals Search And Download.
ICMP statistics
Command: /stats/l3/icmp
ICMP statistics:
icmpInMsgs:
245802 icmpInErrors:
41 icmpInTimeExcds:
0 icmpInSrcQuenchs:
0 icmpInEchos:
244350 icmpInTimestamps:
0 icmpInAddrMasks:
0 icmpOutMsgs:
0 icmpOutDestUnreachs:
0 icmpOutParmProbs:
0 icmpOutRedirects:
253777 icmpOutEchoReps:
0 icmpOutTimestampReps:
0 icmpOutAddrMaskReps:
1393
icmpInDestUnreachs:
icmpInParmProbs:
icmpInRedirects:
icmpInEchoReps:
icmpInTimestampReps:
icmpInAddrMaskReps:
icmpOutErrors:
icmpOutTimeExcds:
icmpOutSrcQuenchs:
icmpOutEchos:
0
0
18
0
0
253810
15
0
0
18
0
0
icmpOutTimestamps:
icmpOutAddrMasks:
The following table describes the Internet Control Messaging Protocol (ICMP) statistics:
Table 47 ICMP statistics
Statistics
Description
icmpInMsgs
The total number of ICMP messages which the switch received. Note that this
counter includes all those counted by icmpInErrors.
icmpInErrors
The number of ICMP messages which the switch received but determined as
having ICMP specific errors (for example bad ICMP checksums and bad
length).
icmpInDestUnreachs
icmpInTimeExcds
icmpInParmProbs
icmpInSrcQuenchs
The number of ICMP Destination Unreachable messages received.
The number of ICMP Time Exceeded messages received.
The number of ICMP Parameter Problem messages received.
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages received.
icmpInRedirects
icmpInEchos
The number of ICMP Redirect messages received.
The number of ICMP Echo (request) messages received.
The number of ICMP Echo Reply messages received.
The number of ICMP Timestamp (request) messages received.
The number of ICMP Timestamp Reply messages received.
The number of ICMP Address Mask Request messages received.
The number of ICMP Address Mask Reply messages received.
The total number of ICMP messages which this switch attempted to send. Note
that this counter includes all those counted by icmpOutErrors.
The number of ICMP messages that this switch did not send due to problems
discovered within ICMP such as a lack of buffer. This value should not include
errors discovered outside the ICMP layer such as the inability of IP to route the
resultant datagram. In some implementations there may be no types of errors
that contribute to this counter's value.
icmpInEchoReps
icmpInTimestamps
icmpInTimestampReps
icmpInAddrMasks
icmpInAddrMaskReps
icmpOutMsgs
icmpOutErrors
icmpOutDestUnreachs
icmpOutTimeExcds
icmpOutParmProbs
icmpOutSrcQuenchs
The number of ICMP Destination Unreachable messages sent.
The number of ICMP Time Exceeded messages sent.
The number of ICMP Parameter Problem messages sent.
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages sent.
icmpOutRedirects
icmpOutEchos
The number of ICMP Redirect messages sent.
The number of ICMP Echo (request) messages sent.
icmpOutEchoReps
icmpOutTimestamps
icmpOutTimestampReps
icmpOutAddrMasks
icmpOutAddrMaskReps
The number of ICMP Echo Reply messages sent.
The number of ICMP Timestamp (request) messages sent.
The number of ICMP Timestamp Reply messages sent.
The number of ICMP Address Mask Request messages sent.
The number of ICMP Address Mask Reply messages sent.
Command Line Interface 54
Download from Www.Somanuals.com. All Manuals Search And Download.
TCP statistics
Command: /stats/l3/tcp
TCP statistics:
tcpRtoAlgorithm:
tcpRtoMax:
tcpActiveOpens:
tcpAttemptFails:
tcpInSegs:
4 tcpRtoMin:
240000 tcpMaxConn:
252214 tcpPassiveOpens:
528 tcpEstabResets:
756401 tcpOutSegs:
0 tcpInErrs:
0
512
7
4
756655
tcpRetransSegs:
tcpCurBuff:
0
3
0 tcpCurConn:
tcpOutRsts:
417
The following table describes the Transmission Control Protocol (TCP) statistics:
Table 48 TCP statistics
Statistics
Description
tcpRtoAlgorithm
The algorithm used to determine the timeout value used for retransmitting
unacknowledged octets.
tcpRtoMin
tcpRtoMax
tcpMaxConn
The minimum value permitted by a TCP implementation for the retransmission
timeout, measured in milliseconds. More refined semantics for objects of this type
depend upon the algorithm used to determine the retransmission timeout. In
particular, when the timeout algorithm is rsre(3), an object of this type has the
semantics of the LBOUND quantity described in Request For Comments (RFC) 793.
The maximum value permitted by a TCP implementation for the retransmission
timeout, measured in milliseconds. More refined semantics for objects of this type
depend upon the algorithm used to determine the retransmission timeout. In
particular, when the timeout algorithm is rsre(3), an object of this type has the
semantics of the UBOUND quantity described in RFC 793.
The limit on the total number of TCP connections the switch can support. In entities
where the maximum number of connections is dynamic, this object should contain
the value -1.
tcpActiveOpens
tcpPassiveOpens
tcpAttemptFails
The number of times TCP connections have made a direct transition to the SYN-
SENT state from the CLOSED state.
The number of times TCP connections have made a direct transition to the SYN-
RCVD state from the LISTEN state.
The number of times TCP connections have made a direct transition to the CLOSED
state from either the SYN-SENT state or the SYN-RCVD state, plus the number of
times TCP connections have made a direct transition to the LISTEN state from the
SYN-RCVD state.
tcpEstabResets
tcpInSegs
The number of times TCP connections have made a direct transition to the CLOSED
state from either the ESTABLISHED state or the CLOSE- WAIT state.
The total number of segments received, including those received in error. This count
includes segments received on currently established connections.
The total number of segments sent, including those on current connections but
excluding those containing only retransmitted octets.
tcpOutSegs
tcpRetransSegs
The total number of segments retransmitted, that is, the number of TCP segments
transmitted containing one or more previously transmitted octets.
The total number of segments received in error (for example, bad TCP checksums).
The total number of outstanding memory allocations from heap by TCP protocol
stack.
tcpInErrs
tcpCurBuff
tcpCurConn
tcpOutRsts
The total number of outstanding TCP sessions that are currently opened.
The number of TCP segments sent containing the reset (RST) flag.
Command Line Interface 55
Download from Www.Somanuals.com. All Manuals Search And Download.
UDP statistics
Command: /stats/l3/udp
UDP statistics:
udpInDatagrams:
udpInErrors:
54 udpOutDatagrams:
0 udpNoPorts:
43
1578077
The following table describes the User Datagram Protocol (UDP) statistics:
Table 49 UDP statistics
Statistics
Description
udpInDatagrams
udpOutDatagrams
udpInErrors
The total number of UDP datagrams delivered to the switch.
The total number of UDP datagrams sent from this switch.
The number of received UDP datagrams that could not be delivered for reasons
other than the lack of an application at the destination port.
The total number of received UDP datagrams for which there was no application at
the destination port.
udpNoPorts
IGMP Multicast Group statistics
Command: /stats/l3/igmp
Enter VLAN number: (1-4094) 1
------------------------------------------------------------
IGMP Snoop vlan 1 statistics:
------------------------------------------------------------
rxIgmpValidPkts:
rxIgmpGenQueries:
rxIgmpLeaves:
txIgmpReports:
txIgmpLeaves:
0
0
0
0
0
rxIgmpInvalidPkts:
rxIgmpGrpSpecificQueries:
rxIgmpReports:
txIgmpGrpSpecificQueries:
rxIgmpV3CurrentStateRecords: 0
rxIgmpV3FilterChangeRecords: 0
0
0
0
0
rxIgmpV3SoruceListChangeRecords: 0
This menu option enables you to display statistics regarding the use of the IGMP Multicast Groups.
The following table describes the IGMP statistics:
Table 50 IGMP statistics
Statistic
Description
rxIgmpValidPkts
rxIgmpInvalidPkts
rxIgmpGenQueries
Total number of valid IGMP packets received
Total number of invalid packets received
Total number of General Membership Query packets received
rxIgmpGrpSpecificQueries Total number of Membership Query packets received from specific groups
rxIgmpLeaves
rxIgmpReports
txIgmpReports
Total number of Leave requests received
Total number of Membership Reports received
Total number of Membership reports transmitted
txIgmpGrpSpecificQueries Total number of Membership Query packets transmitted to specific groups
txIgmpLeaves Total number of Leave messages transmitted
rxIgmpV3CurrentStaateRec Total number of Current State Record
ords
rxIgmpV3SourceListChange Total number of Source List Record
Records
rxIgmpV3FilterChangeReco Total number of Filter Change Record
rds
Command Line Interface 56
Download from Www.Somanuals.com. All Manuals Search And Download.
Management Processor statistics
Command: /stats/mp
[MP-specific Statistics Menu]
i2c
pkt
tcb
ucb
cpu
- Show i2c stats
- Show Packet stats
- Show All TCP control blocks in use
- Show All UDP control blocks in use
- Show CPU utilization
The following table describes the MP-specific Statistics Menu options:
Table 51 MP-specific Statistics Menu
Command
i2c
Usage
Displays i2c statistics.
pkt
tcb
ucb
cpu
Displays packet statistics, to check for leads and load.
Displays all Transmission Control Protocol (TCP) control blocks (TCB) that are in use.
Displays all User Datagram Protocol (UDP) control blocks (UCB) that are in use.
Displays CPU utilization for periods of up to 1, 4, and 64 seconds.
Packet statistics
Command: /stats/mp/pkt
Packet counts:
allocs:
36692
frees:
36692
mediums:
jumbos:
0
0
0
0
mediums hi-watermark:
jumbos hi-watermark:
smalls hi-watermark:
3
0
2
smalls:
failures:
The following table describes the packet statistics.
Table 52 MP specific packet statistics
Description
allocs
Example statistic
Total number of packet allocations from the packet buffer pool by the TCP/IP protocol stack.
frees
Total number of times the packet buffers are freed (released) to the packet buffer pool by the
TCP/IP protocol stack.
mediums
Total number of packet allocations with size between 128 to 1536 bytes from the packet
buffer pool by the TCP/IP protocol stack.
mediums hi-watermark
jumbos
The highest number of packet allocation with size between 128 to 1536 bytes from the packet
buffer pool by the TCP/IP protocol stack.
Total number of packet allocations with more than 1536 bytes from the packet buffer pool by
the TCP/IP protocol stack.
jumbos hi-watermark
smalls
The highest number of packet allocation with more than 1536 bytes from the packet buffer
pool by the TCP/IP protocol stack.
Total number of packet allocations with size less than 128 bytes from the packet buffer pool
by the TCP/IP protocol stack.
smalls hi-watermark
failures
The highest number of packet allocation with size less than 128 bytes from the packet buffer
pool by the TCP/IP protocol stack.
Total number of packet allocation failures from the packet buffer pool by the TCP/IP protocol
stack.
Command Line Interface 57
Download from Www.Somanuals.com. All Manuals Search And Download.
TCP statistics
Command: /stats/mp/tcb
All TCP allocated control blocks:
10ad41e8: 0.0.0.0
0 <=> 0.0.0.0
80 listen
10ad5790: 47.81.27.5
1171 <=> 47.80.23.243
23 established
The following table describes the Transmission Control Protocol (TCP) control block (TCB) statistics shown in this
example:
Table 53 MP specified TCP statistics
Description
Memory
Destination IP address
Destination port
Source IP
Example statistic
10ad41e8/10ad5790
0.0.0.0/47.81.27.5
0/1171
0.0.0.0/47.80.23.243
80/23
Source port
State
listen/established
UDP statistics
Command: /stats/mp/ucb
All UDP allocated control blocks:
161: listen
The following table describes the User Datagram Protocol (UDP) control block (UCB) statistics shown in this
example:
Table 54 UDP statistics
Description
Control block
State
Example Statistic
161
listen
CPU statistics
Command: /stats/mp/cpu
CPU utilization:
cpuUtil1Second:
cpuUtil4Seconds:
cpuUtil64Seconds:
8%
9%
8%
The following table describes the management port CPU utilization statistics:
Table 55 CPU statistics
Statistics
Description
cpuUtil1Second
cpuUtil4Seconds
cpuUtil64Seconds
The utilization of MP CPU over 1 second. This is shown as a percentage.
The utilization of MP CPU over 4 seconds. This is shown as a percentage.
The utilization of MP CPU over 64 seconds. This is shown as a percentage.
Command Line Interface 58
Download from Www.Somanuals.com. All Manuals Search And Download.
NTP statistics
Command: /stats/ntp
NTP statistics:
Primary Server:
Requests Sent:
17
17
1
Responses Received:
Updates:
Secondary Server:
Requests Sent:
Responses Received:
Updates:
0
0
0
Last update based on response from primary server.
Last update time: 18:04:16 Tue Mar 13, 2006
Current system time: 18:55:49 Tue Mar 13, 2006
The switch uses NTP (Network Timing Protocol) version 3 to synchronize the switch’s internal clock with an atomic
time-calibrated NTP server. With NTP enabled, the switch can accurately update its internal clock to be consistent
with other devices on the network and generates accurate syslogs.
The following table describes the NTP statistics:
Table 56 NTP statistics
Statistics
Description
Primary Server
Requests Sent: The total number of NTP requests the switch sent to the primary
NTP server to synchronize time.
Responses Received: The total number of NTP responses received from the
primary NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the primary NTP server.
Secondary Server
Requests Sent: The total number of NTP requests the switch sent to the
secondary NTP server to synchronize time.
Responses Received: The total number of NTP responses received from the
secondary NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the secondary NTP server.
Last update of time on the switch based on either primary or secondary NTP
response received.
Last update based on
response from primary
server
Last update time
The time stamp showing the time when the switch was last updated.
Current system time
The switch system time when the command /stats/ntpwas issued.
Statistics dump
Command: /stats/dump
Use the dump command to dump all switch statistics available from the Statistics Menu (40K or more, depending
on your configuration). This data can be used to tune or debug switch performance.
If you want to capture dump data to a file, set your communication software on your workstation to capture session
data prior to issuing the dump commands.
Command Line Interface 59
Download from Www.Somanuals.com. All Manuals Search And Download.
Configuration Menu
Introduction
The Configuration Menu is only available from an administrator login. It includes submenus for configuring every
aspect of the switch. Changes to configuration are not active until explicitly applied. Changes can be saved to non-
volatile memory (NVRAM).
Menu information
Command: /cfg
[Configuration Menu]
sys
port
- System-wide Parameter Menu
- Port Menu
spgroup - Spare Ports Group Menu
group
dump
ptcfg
gtcfg
- Group Menu
- Dump current configuration to script file
- Backup current configuration to FTP/TFTP server
- Restore current configuration from FTP/TFTP server
The following table describes the Configuration Menu options.
Table 57 Configuration Menu options
Command
Usage
sys
Displays the System Menu.
port <port number>
Displays the Port Menu.
spgroup
group <group number>
Displays the Spare Ports Group Menu.
Displays the Group Menu.
dump
Dumps current configuration to a script file.
Backs up current configuration to TFTP or FTP server.
ptcfg <server IP address> <filename on
host>
gtcfg <server IP address> <filename on
Restores current configuration from TFTP or FTP server.
host>
Viewing, applying, reverting, and saving changes
As you use the configuration menus to set switch parameters, the changes you make do not take effect
immediately. All changes are considered pending until you explicitly apply them. Also, any changes are lost the
next time the switch boots unless the changes are explicitly saved.
While configuration changes are in the pending state, you can:
•
•
•
•
View the pending changes
Apply the pending changes
Revert to restore configuration parameters set with the last apply command
Save the changes to flash memory
Command Line Interface 60
Download from Www.Somanuals.com. All Manuals Search And Download.
Viewing pending changes
You can view all pending configuration changes by entering diffat any CLI prompt:
# diff
You can view all pending configuration changes that have been applied but not saved to flash memory by entering
diff flashat any CLI prompt:
# diff flash
Applying pending changes
To make your configuration changes active, you must apply them. To apply configuration changes, enter the
following command at any prompt:
# apply
NOTE: All configuration changes take effect immediately when applied.
Reverting changes
The revert command removes configuration changes that have been made, but not applied. Enter revert apply
to remove all changes that have not been saved:
# revert
Saving the configuration
In addition to applying the configuration changes, you can save them to flash memory on the switch.
IMPORTANT: If you do not save the changes, they will be lost the next time the system is rebooted.
To save the new configuration, enter the following command at any prompt:
# save
When you save configuration changes, the changes are saved to the active configuration block. The configuration
being replaced by the save is first copied to the backup configuration block. If you do not want the previous
configuration block copied to the backup configuration block, enter the following instead:
# save n
You can decide which configuration you want to run the next time you reset the switch. Your options include:
•
•
•
The active configuration block
The backup configuration block
Factory default configuration block
You can view all pending configuration changes that have been applied but not saved to flash memory using the
diff flash command. It is a global command that can be executed from any prompt.
For instructions on selecting the configuration to run at the next system reset, see the “Selecting a configuration
block” section in the “Boot Options Menu” chapter.
Command Line Interface 61
Download from Www.Somanuals.com. All Manuals Search And Download.
System configuration
Command: /cfg/sys
[System Menu]
syslog
- Syslog Menu
- SSH Server Menu
sshd
radius
- RADIUS Authentication Menu
tacacs+ - TACACS+ Authentication Menu
ntp
ssnmp
access
- NTP Server Menu
- System SNMP Menu
- System Access Menu
watchdog - Watchdog Menu
date
time
- Set system date
- Set system time
timezone - Set system timezone (daylight savings)
olddst
dlight
idle
notice
bannr
- Set system DST for US
- Set system daylight savings
- Set timeout for idle CLI sessions
- Set login notice
- Set login banner
hprompt - Enable/disable display hostname (sysName) in CLI prompt
dhcp - Enable/disable use of DHCP on Mgmt interface
rstctrl - Enable/disable System reset on panic
cur - Display current system-wide parameters
This menu provides configuration of switch management parameters such as user and administrator privilege mode
passwords, browser-based management settings, and management access list.
The following table describes the System Configuration Menu options.
Table 58 System Configuration Menu options
Command
syslog
sshd
Usage
Displays the Syslog Menu.
Displays the SSH Server Menu.
radius
tacacs+
ntp
Displays the RADIUS Authentication Menu.
Displays the TACACS+ Authentication Menu.
Displays the Network Time Protocol (NTP) Server Menu.
Displays the System SNMP Menu.
ssnmp
access
watchdog
date
Displays the System Access Menu.
Displays the Watchdog Menu.
Prompts the user for the system date.
time
timezone
Configures the system time using a 24-hour clock format.
Configures the time zone where the switch resides. You are
prompted to select your location (continent, country, region) by the
timezone wizard. Once a region is selected, the switch updates the
time to reflect local changes to Daylight Savings Time, etc.
Disables or enables daylight saving time in the system clock. When
enabled, the switch will add an extra hour to the system clock so
that it is consistent with the local clock. By default, this option is
disabled.
dlight
idle <1-60>
Sets the idle timeout for CLI sessions, from 1 to 60 minutes. The
default is 5 minutes.
This setting affects both the console port and Telnet port.
Displays login notice immediately before the “Enter password:”
prompt. This notice can contain up to 1024 characters and new
lines.
notice <1-1024 character multi-
line> <'-' to end>
bannr <1-80 characters>
Configures a login banner of up to 80 characters. When a user or
administrator logs into the switch, the login banner is displayed. It is
also displayed as part of the output from the /info/sys/gen
command.
hprompt disable|enable
dhcp
Enables or disables displaying of the host name (system
administrator’s name) in the command line interface.
Dynamic Host Control Protocol for setting the management IP
address on interface 256 is enabled.You can not configure this
option to be disabled.
rstctrl
Enables or disables reset when the panic occurs on the switch
software. The default value is enabled.
Command Line Interface 62
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 58 System Configuration Menu options
Command
Usage
cur
Displays the current system parameters.
System host log configuration
Command: /cfg/sys/syslog
[Syslog Menu]
host
host2
sever
- Set IP address of first syslog host
- Set IP address of second syslog host
- Set the severity of first syslog host
sever2 - Set the severity of second syslog host
facil - Set facility of first syslog host
facil2 - Set facility of second syslog host
console - Enable/disable console output of syslog messages
log
cur
- Enable/disable syslogging of features
- Display current syslog settings
The following table describes the Syslog Configuration Menu options.
Table 59 Syslog Configuration Menu options
Command
Description
host <IP address>
Sets the IP address of the first syslog host. For example,
100.10.1.1
host2 <IP address>
Sets the IP address of the second syslog host. For
example,
100.10.1.2
sever <1-7>
Sets the severity level of the first syslog host displayed.
The default is 7, which means log all the severity levels.
Sets the severity level of the second syslog host displayed.
The default is 7, which means log all the severity levels.
This option sets the facility level of the first syslog host
displayed. The range is 0-7. The default is 0.
This option sets the facility level of the second syslog host
displayed. The range is 0-7. The default is 0.
Enables or disables delivering syslog messages to the
console. When necessary, disabling console ensures the
switch is not affected by syslog messages. It is enabled by
default.
sever2 <1-7>
facil <1-7>
facil2 <1-7>
console disable|enable
log <feature|all> <enable|disable>
Displays a list of features for which syslog messages can
be generated. You can choose to enable/disable specific
features or enable/disable syslog on all available features.
Features include:
•
•
•
•
•
•
•
•
•
•
console
system
mgmt
cli
vlan
ssh
ntp
ip
web
cfg
cur
Displays the current syslog settings.
Command Line Interface 63
Download from Www.Somanuals.com. All Manuals Search And Download.
Secure Shell Server configuration
Command: /cfg/sys/sshd
[SSHD Menu]
interval– Set Interval for generating the RSA server key
scpadm – Set SCP-only admin password
hkeygen - Generate the RSA host key
skeygen - Generate the RSA server key
sshport - Set SSH server port number
ena
dis
on
off
cur
- Enable the SCP apply and save
- Disable the SCP apply and save
- Turn SSH server ON
- Turn SSH server OFF
- Display current SSH server configuration
Telnet traffic on the network is not secure. This menu enables Secure Shell (SSH) access from any SSH client. The
SSH program securely logs into another computer over a network and executes commands in a secure
environment. All data using SSH is encrypted.
Secure Shell can be configured on the switch using the console port only. The menu options do not display if you
access the switch using Telnet or the Browser-based Interface (BBI).
NOTE: See the Application Guide for information on SSH.
The following table describes the SSHD Configuration Menu options.
Table 60 SSHD Configuration Menu options
Command
Description
intrval <0-24>
Defines interval for auto-generating the RSA server key. The switch will
auto-generate the RSA server key at the interval defined in this
command. The value of zero (0) means the RSA server key auto-
generation is disabled. If the switch has been busy performing any other
key generation and the assigned time of interval expires, the RSA
server will skip generating the key.
scpadm
Defines the administrator password that is for Secure Copy (SCP) only.
The username for this SCP administrator is scpadmin.
Typically, SCP is used to copy files securely from one machine to
another. In the switch, SCP is used to download and upload the switch
configuration using secure channels.
hkeygen
skeygen
Generates the RSA host keys manually. The switch creates this key
automatically while configuring the switch with Secure Shell (SSH). But
you can generate the key manually by using this command if you need
to overwrite the key for security reasons. The command will take effect
immediately without executing the apply command.
Generates the RSA server key. The switch creates this key
automatically while configuring the switch with Secure Shell (SSH). You
can generate the key manually by using this command if you need to
overwrite the key for security reasons. The command will take effect
immediately without executing the apply command.
sshport <TCP port number>
Sets the SSH server port number. The default is 22.
ena
dis
on
Enables the SCP apply and save.
Disables the SCP apply and save. This is the default for SCP.
Enables the SSH server.
off
cur
Disables the SSH server. This is the default for the SSH server.
Displays the current SSH server configuration.
Command Line Interface 64
Download from Www.Somanuals.com. All Manuals Search And Download.
RADIUS server configuration
Command: /cfg/sys/radius
[RADIUS Server Menu]
prisrv
secsrv
secret
- Set primary RADIUS server address
- Set secondary RADIUS server address
- Set primary RADIUS server secret
secret2 - Set secondary RADIUS server secret
port - Set RADIUS port
retries - Set RADIUS server retries
timeout - Set RADIUS server timeout
bckdoor - Enable/disable RADIUS backdoor for telnet/ssh/http/https
secbd
on
off
cur
- Enable/disable RADIUS secure backdoor for telnet/ssh/http/https
- Turn RADIUS authentication ON
- Turn RADIUS authentication OFF
- Display current RADIUS configuration
NOTE: See the Application Guide for information on RADIUS.
The following table describes the RADIUS Server Configuration Menu options.
Table 61 RADIUS Server Configuration Menu options
Command
Description
prisrv <IP address>
secsrv <IP address>
secret <1-32 characters>
Sets the primary RADIUS server address.
Sets the secondary RADIUS server address.
This is the shared secret between the switch and the RADIUS
server(s).
secret2 <1-32 characters>
port <UDP port number>
retries <1-3>
This is the secondary shared secret between the switch and the
RADIUS server(s).
Enter the number of the User Datagram Protocol (UDP) port to be
configured, between 1500-3000. The default is 1645.
Sets the number of failed authentication requests before switching to a
different RADIUS server. The range is 1-3 requests The default is 3
requests.
timeout <1-10>
Sets the amount of time, in seconds, before a RADIUS server
authentication attempt is considered to have failed. The range is 1-10
seconds. The default is 3 seconds.
bckdoor enable|disable
secbd enable|disable
Enables or disables the RADIUS back door for telnet/SSH/
HTTP/HTTPS. The default value is disabled. This command does not
apply when secure backdoor (secbd) is enabled.
Enables or disables the RADIUS back door using secure password for
telnet/SSH/ HTTP/HTTPS. The default value is disabled. This
command does not apply when backdoor (bckdoor) is enabled.
Enables the RADIUS server.
on
off
cur
Disables the RADIUS server. This is the default.
Displays the current RADIUS server parameters.
IMPORTANT:
If RADIUS is enabled, you must login using RADIUS authentication when connecting via the
console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using
noradius and the administrator password even if the backdoor (bckdoor) or secure backdoor (secbd) are
disabled.
If backdoor is enabled (bckdoor ena), type in noradiusas a backdoor to bypass RADIUS checking, and
use the administrator password to log into the switch. The switch allows this even if RADIUS servers are
available.
If secure backdoor is enabled (secbd ena), type in noradiusas a backdoor to bypass RADIUS checking,
and use the administrator password to log into the switch. The switch allows this only if RADIUS servers are
not available.
Command Line Interface 65
Download from Www.Somanuals.com. All Manuals Search And Download.
TACACS+ server configuration
Command: /cfg/sys/tacacs+
[TACACS+ Server Menu]
prisrv - Set IP address of primary TACACS+ server
secsrv - Set IP address of secondary TACACS+ server
secret - Set secret for primary TACACS+ server
secret2 - Set secret for secondary TACACS+ server
port
- Set TACACS+ port number
retries - Set number of TACACS+ server retries
timeout - Set timeout value of TACACS+ server retries
bckdoor - Enable/disable TACACS+ backdoor for telnet/ssh/http/https
secbd - Enable/disable TACACS+ secure backdoor
cmap
- Enable/disable TACACS+ new privilege level mapping
usermap - Set user privilege mappings
on
off
cur
- Enable TACACS+ authentication
- Disable TACACS+ authentication
- Display current TACACS+ settings
TACACS+ (Terminal Access Controller Access Control System) is an authentication protocol that allows a remote
access server to forward a user's logon password to an authentication server to determine whether access can be
allowed to a given system. TACACS+ and Remote Authentication Dial-In User Service (RADIUS) protocols are
more secure than the TACACS encryption protocol. TACACS+ is described in RFC 1492.
TACACS+ protocol is more reliable than RADIUS, as TACACS+ uses the Transmission Control Protocol (TCP)
whereas RADIUS uses the User Datagram Protocol (UDP). Also, RADIUS combines authentication and
authorization in a user profile, whereas TACACS+ separates the two operations.
TACACS+ offers the following advantages over RADIUS as the authentication device:
•
•
•
TACACS+ is TCP-based, so it facilitates connection-oriented traffic.
It supports full-packet encryption, as opposed to password-only in authentication requests.
It supports decoupled authentication, authorization, and accounting.
The following table describes the TACACS+ Server Configuration Menu options.
Table 62 TACACS+ Server Configuration Menu options
Command
Description
prisrv <IP address>
secsrv <IP address>
secret <1-32 characters>
secret2 <1-32 characters>
Defines the primary TACACS+ server address.
Defines the secondary TACACS+ server address.
This is the shared secret between the switch and the TACACS+ server(s).
This is the secondary shared secret between the switch and the TACACS+
server(s).
port <TCP port number>
Enter the number of the TCP port to be configured, between 1 - 65000. The
default is 49.
retries <1-3>
Sets the number of failed authentication requests before switching to a
different TACACS+ server. The range is 1-3 requests. The default is 3
requests.
timeout <4-15>
Sets the amount of time, in seconds, before a TACACS+ server
authentication attempt is considered to have failed. The range is 4-15
seconds. The default is 5 seconds.
bckdoor enable|disable
Enables or disables the TACACS+ back door for telnet. The telnet
command also applies to SSH/SCP connections and the Browser-based
Interface (BBI). The default value is disabled. This command does not apply
when secure backdoor (secbd) is enabled.
secbd enable|disable
cmap enable|disable
Enables or disables the TACACS+ back door using secure password for
telnet/SSH/ HTTP/HTTPS. The default value is disabled. This command
does not apply when backdoor (bckdoor) is enabled.
Enables or disables TACACS+ authorization-level mapping.
The default value is disabled.
usermap <0-15>
user|oper|admin|none
Maps a TACACS+ authorization level to this switch user level. Enter a
TACACS+ authorization level (0-15), followed by the corresponding this
switch user level.
on
Enables the TACACS+ server.
off
cur
Disables the TACACS+ server. This is the default.
Displays current TACACS+ configuration parameters.
Command Line Interface 66
Download from Www.Somanuals.com. All Manuals Search And Download.
IMPORTANT:
If TACACS+ is enabled, you must login using TACACS+ authentication when connecting via
the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using
notacacsand the administrator password even if the backdoor (bckdoor) or secure backdoor (secbd) are
disabled.
If backdoor is enabled (bckdoor ena), type in notacacsas a backdoor to bypass TACACS+ checking, and
use the administrator password to log into the switch. The switch allows this even if TACACS+ servers are
available.
If secure backdoor is enabled (secbd ena), type in notacacsas a backdoor to bypass TACACS+ checking,
and use the administrator password to log into the switch. The switch allows this only if TACACS+ servers are
not available.
NTP server configuration
Command: /cfg/sys/ntp
[NTP Server Menu]
prisrv - Set primary NTP server address
secsrv - Set secondary NTP server address
intrval - Set NTP server resync interval
on
- Turn NTP service ON
off
cur
- Turn NTP service OFF
- Display current NTP configuration
This menu enables you to synchronize the switch clock to a Network Time Protocol (NTP) server. By default, this
option is disabled.
The following table describes the NTP Server Configuration Menu options.
Table 63 NTP Server Configuration Menu options
Command
Description
prisrv <IP address>
Configures the IP addresses of the primary NTP server to which you want to
synchronize the switch clock.
secsrv <IP address>
Configures the IP addresses of the secondary NTP server to which you want to
synchronize the switch clock.
intrval <1-44640>
Specifies the interval, that is, how often, in minutes (1-44640), to resynchronize
the switch clock with the NTP server. The default is 1440 minutes.
Enables the NTP synchronization service.
on
off
cur
Disables the NTP synchronization service. This is the default.
Displays the current NTP service settings.
Command Line Interface 67
Download from Www.Somanuals.com. All Manuals Search And Download.
System SNMP configuration
Command: /cfg/sys/ssnmp
[SNMP Menu]
snmpv3 - SNMPv3 Menu
name
locn
cont
- Set SNMP "sysName"
- Set SNMP "sysLocation"
- Set SNMP "sysContact"
rcomm
wcomm
- Set SNMP read community string
- Set SNMP write community string
timeout - Set timeout for the SNMP state machine
reqport - Set SNMP request port number
cur
- Display current SNMP configuration
The switch software supports SNMP-based network management. In SNMP model of network management, a
management station (client/manager) accesses a set of variables known as MIBs (Management Information Base)
provided by the managed device (agent). If you are running an SNMP network management station on your
network, you can manage the switch using the following standard SNMP MIBs:
•
•
•
MIB II (RFC 1213)
Ethernet MIB (RFC 1643)
Bridge MIB (RFC 1493)
An SNMP agent is a software process on the managed device that listens on UDP port 161 for SNMP messages.
Each SNMP message sent to the agent contains a list of management objects to retrieve or to modify.
•
•
•
•
•
•
•
SNMP parameters that can be modified include:
System name
System location
System contact
Use of the SNMP system authentication trap function
Read community string
Write community string
The following table describes the System SNMP Configuration Menu options.
Table 64 System SNMP Configuration Menu options
Command
Description
snmpv3
Displays SNMPv3 menu.
name <1-64 characters> Configures the name for the system. The name can have a maximum of 64
characters.
locn <1-64 characters> Configures the name of the system location. The location can have a maximum of 64
characters.
cont <1-64 characters> Configures the name of the system contact. The contact can have a maximum of 64
characters.
rcomm <1-32
characters>
Configures the SNMP read community string. The read community string controls
SNMP “get” access to the switch. It can have a maximum of 32 characters. The
default read community string is public.
wcomm <1-32
characters>
Configures the SNMP write community string. The write community string controls
SNMP “set” and “get” access to the switch. It can have a maximum of 32 characters.
The default write community string is private.
timeout <1-30>
Sets the timeout value for the SNMP state machine. The range is 1-30 minutes. The
default value is 5 minutes.
report <request port
Configures the request port number. The default setting is 161.
number>
cur
Displays the current SNMP configuration.
Command Line Interface 68
Download from Www.Somanuals.com. All Manuals Search And Download.
SNMPv3 configuration
Command: /cfg/sys/ssnmp/snmpv3
[SNMPv3 Menu]
usm
- usmUser Table Menu
view
- vacmViewTreeFamily Table Menu
access - vacmAccess Table Menu
group
comm
taddr
- vacmSecurityToGroup Table Menu
- community Table Menu
- targetAddr Table Menu
tparam - targetParams Table Menu
notify - notify Table Menu
v1v2
cur
- Enable/disable V1/V2 access
- Display current SNMPv3 configuration
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
•
•
•
•
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture please see RFC2271 to RFC2275.
The following table describes the SNMPv3 Configuration Menu options.
Table 65 SNMPv3 Configuration Menu options
Command
Description
usm <1-16>
Configures a user security model (USM) entry for an authorized user. You can also
configure this entry through SNMP. The range is 1-16.
view <1-128>
Configures different MIB views. The range is 1-128.
access <1-32>
Configures access rights. The View-based Access Control Model defines a set of
services that an application can use for checking access rights of the user. You need
access control when you have to process retrieval or modification request from an
SNMP entity. The range is 1-32.
group <1-16>
Configures an SNMP group. A group maps the user name to the access group names
and their access rights needed to access SNMP management objects. A group
defines the access rights assigned to all names that belong to a particular group. The
range is 1-16.
comm <1-16>
Configures a community table entry. The community table contains objects for
mapping community strings and version-independent SNMP message parameters.
The range is 1-16.
taddr <1-16>
Configures the destination address and user security levels for outgoing notifications.
This is also called the transport endpoint. The range is 1-16.
tparam <1-16>
Configures SNMP parameters, consisting of message processing model, security
model, security level, and security name information. There may be multiple transport
endpoints associated with a particular set of SNMP parameters, or a particular
transport endpoint may be associated with several sets of SNMP parameters.
Configures a notification index. A notification application typically monitors a system
for particular events or conditions, and generates Notification-Class messages based
on these events or conditions. The range is 1-16.
notify <1-16>
v1v2 disable|enable
cur
Enables or disables the access to SNMP version 1 and version 2. This command is
enabled by default.
Displays the current SNMPv3 configuration.
Command Line Interface 69
Download from Www.Somanuals.com. All Manuals Search And Download.
SNMPv3 User Security Model configuration
Command: /cfg/sys/ssnmp/snmpv3/usm <usm number>
[SNMPv3 usmUser 1 Menu]
name
auth
- Set USM user name
- Set authentication protocol
authpw - Set authentication password
priv - Set privacy protocol
privpw - Set privacy password
del
cur
- Delete usmUser entry
- Display current usmUser configuration
You can make use of a defined set of user identities using this Security Model. An SNMP engine must have the
knowledge of applicable attributes of a user.
This menu helps you create a user security model entry for an authorized user. You need to provide a security
name to create the USM entry.
The following table describes the User Security Model Configuration Menu options.
Table 66 User Security Model Configuration Menu options
Command
Description
name <1-32
characters>
Configures a string up to 32 characters long that represents the name of the user. This is
the login name that you need in order to access the switch.
auth md5|sha|none
Configures the authentication protocol between HMAC-MD5-96 or HMAC-SHA-96. The
default algorithm except usmUser 1-2 is none.
authpw
Configures your password for authentication. If you selected an authentication algorithm
using the above command, you need to provide a password; otherwise you will get an
error message during validation.
priv des|none
Configures the type of privacy protocol on the switch. The privacy protocol protects
messages from disclosure. The options are des(CBC-DES Symmetric Encryption
Protocol) or none. If you specify desas the privacy protocol, then be sure that you have
selected one of the authentication protocols (MD5 or HMAC-SHA-96). If you select none
as the authentication protocol, you will get an error message.
Configures the privacy password.
privpw
del
Deletes the USM user entries.
cur
Displays the USM user entries.
SNMPv3 View configuration
Command: /cfg/sys/ssnmp/snmpv3/view <view number>
[SNMPv3 vacmViewTreeFamily 1 Menu]
name
tree
mask
type
del
- Set view name
- Set MIB subtree(OID) which defines a family of view subtrees
- Set view mask
- Set view type
- Delete vacmViewTreeFamily entry
- Display current vacmViewTreeFamily configuration
cur
The following table describes the SNMPv3 View Configuration Menu options.
Table 67 SNMPv3 View Configuration Menu options
Command
Description
name <1-32 characters>
Defines the name for a family of view subtrees up to a maximum of 32
characters.
tree <1-64 characters>
Defines the Object Identifier (OID), a string of maximum 64 characters,
which when combined with the corresponding mask defines a family of view
subtrees.
An example of an OID is 1.3.6.1.2.1.1.1.0
Defines the bit mask, which in combination with the corresponding tree
defines a family of view subtrees. The mask can have a maximum of 32
characters.
mask <1-32 characters>
type included|excluded
Selects whether the corresponding instances of
vacmViewTreeFamilySubtree and
vacmViewTreeFamilyMaskdefine a family of view subtrees, which is
included in or excluded from the MIB view.
Command Line Interface 70
Download from Www.Somanuals.com. All Manuals Search And Download.
Table 67 SNMPv3 View Configuration Menu options
Command
del
cur
Description
Deletes the vacmViewTreeFamilygroup entry.
Displays the current vacmViewTreeFamilyconfiguration.
SNMPv3 View-based Access Control Model configuration
Command: /cfg/sys/ssnmp/snmpv3/access <access number>
[SNMPv3 vacmAccess 1 Menu]
name
model
level
rview
wview
nview
del
- Set group name
- Set security model
- Set minimum level of security
- Set read view index
- Set write view index
- Set notify view index
- Delete vacmAccess entry
- Display current vacmAccess configuration
cur
The view-based Access Control Model defines a set of services that an application can use for checking access
rights of the user. Access control is needed when the user has to process SNMP retrieval or modification request
from an SNMP entity.
The following table describes the User Access Control Configuration Menu options.
Table 68 View-based Access Control Configuration Menu options
Command
Description
name <1-32
characters>
model
Defines the name of the group, up to a maximum of 32 characters.
Selects the security model to be used.
usm|snmpv1|snmpv2
level
Defines the minimum level of security required to gain access rights. The level
noAuthNoPriv|authN noAuthNoPrivmeans that the SNMP message will be sent without authentication and
oPriv|authPriv
without using a privacy protocol. The level authNoPrivmeans that the SNMP message
will be sent with authentication but without using a privacy protocol. The authPriv
means that the SNMP message will be sent both with authentication and using a privacy
protocol.
rview <1-32
characters>
Defines a 32 character long read view name that allows you read access to a particular
MIB view. If the value is empty or if there is no active MIB view having this value then no
access is granted.
wview <1-32
characters>
Defines a 32 character long write view name that allows you write access to the MIB view.
If the value is empty or if there is no active MIB view having this value then no access is
granted.
nview <1-32
characters>
del
Defines a 32 character long notify view name that allows you notify access to the MIB
view.
Deletes the View-based Access Control entry.
cur
Displays the View-based Access Control configuration.
Command Line Interface 71
Download from Www.Somanuals.com. All Manuals Search And Download.
SNMPv3 Group configuration
Command: /cfg/sys/ssnmp/snmpv3/group <group number>
[SNMPv3 vacmSecurityToGroup 1 Menu]
model
uname
gname
del
- Set security model
- Set USM user name
- Set group name
- Delete vacmSecurityToGroup entry
- Display current vacmSecurityToGroup configuration
cur
The following table describes the SNMPv3 Group Configuration Menu options.
Table 69 SNMPv3 Group Configuration Menu options
Command
Description
model
Defines the security model.
usm|snmpv1|snmpv2
uname <1-32
characters>
gname <1-32
characters>
Sets the user name as defined in /cfg/sys/ssnmp/snmpv3/usm/name. The
user name can have a maximum of 32 characters.
Configures the name for the access group as defined in
/cfg/sys/ssnmp/snmpv3/access/name. The group name can have a
maximum of 32 characters.
del
cur
Deletes the vacmSecurityToGroupentry.
Displays the current vacmSecurityToGroupconfiguration.
SNMPv3 Community Table configuration
Command: /cfg/sys/ssnmp/snmpv3/comm <comm number>
[SNMPv3 snmpCommunityTable 1 Menu]
index
name
uname
tag
del
cur
- Set community index
- Set community string
- Set USM user name
- Set community tag
- Delete communityTable entry
- Display current communityTable configuration
This command is used for configuring the community table entry. The configured entry is stored in the community
table list in the SNMP engine. This table is used to configure community strings in the Local Configuration
Datastore (LCD) of SNMP engine.
The following table describes the SNMPv3 Community Table Configuration Menu options.
Table 70 SNMPv3 Community Table Configuration Menu options
Command
Description
index <1-32
characters>
name <1-32
characters>
uname <1-32
characters>
tag <1-255
characters>
del
Configures the unique index value of a row in this table. The index can have a maximum
of 32 characters.
Defines a readable 32 characters string that represents the corresponding value of an
SNMP community name in a security model.
Defines the name as defined in /cfg/sys/ssnmp/snmpv3/usm/name. The name
can have a maximum of 32 characters.
Configures a tag of up to 255 characters maximum. This tag specifies a set of transport
endpoints to which a command responder application sends an SNMP trap.
Deletes the community table entry.
cur
Displays the community table configuration.
Command Line Interface 72
Download from Www.Somanuals.com. All Manuals Search And Download.
SNMPv3 Target Address Table configuration
Command: /cfg/sys/ssnmp/snmpv3/taddr <taddr number>
[SNMPv3 snmpTargetAddrTable 1 Menu]
name
addr
port
- Set target address name
- Set target transport address IP
- Set target transport address port
taglist - Set tag list
pname
del
cur
- Set targetParams name
- Delete targetAddrTable entry
- Display current targetAddrTable configuration
This menu allows you to configure an entry of a transport address that transmits SNMP traps.
The following table describes the SNMPv3 Target Address Table Configuration Menu options.
Table 71 SNMPv3 Target Address Table Configuration Menu options
Command
Description
name <1-32
characters>
addr <transport
address ip>
port <transport
address port>
taglist <1-255
characters>
pname <1-32
characters>
del
Configures the locally arbitrary, but unique identifier, target address name associated with
this entry.
Configures a transport address IP that can be used in the generation of SNMP traps.
Configures a transport address port that can be used in the generation of SNMP traps.
Configures a list of tags (up to 255 characters maximum) that are used to select target
addresses for a particular operation.
Defines the name as defined in /cfg/sys/ssnmp/snmpv3/tparam/name.
Deletes the Target Address Table entry.
cur
Displays the current Target Address Table configuration.
SNMPv3 Target Parameters Table configuration
Command: /cfg/sys/ssnmp/snmpv3/tparam <tparam number>
[SNMPv3 snmpTargetParamsTable 1 Menu]
name
- Set targetParams name
mpmodel - Set message processing model
model
uname
level
del
- Set security model
- Set USM user name
- Set minimum level of security
- Delete targetParamsTable entry
- Display current targetParamsTable configuration
cur
You can configure the target parameters entry and store it in the target parameters table in the SNMP engine. This
table contains parameters that are used to generate a message. The parameters include the message processing
model (for example: SNMPv3, SNMPv2c, SNMPv1), the security model (for example: USM), the security name,
and the security level (noAuthnoPriv,authNoPriv, or authPriv).
Command Line Interface 73
Download from Www.Somanuals.com. All Manuals Search And Download.
The following table describes the SNMPv3 Target Parameters Table Configuration Menu options.
Table 72 SNMPv3 Target Parameters Table Configuration Menu options
Command
Description
name <1-32
characters>
mpmodel
snmpv1|snmpv2c|snm
pv3
Configures the locally arbitrary, but unique identifier that is associated with this entry.
Configures the message processing model that is used to generate SNMP messages.
Selects the security model to be used when generating the SNMP messages.
model
usm|snmpv1|snmpv2
uname <1-32
characters>
level
noAuthNoPriv|authN
oPriv|authPriv
Defines the name that identifies the user in the USM table, on whose behalf the SNMP
messages are generated using this entry.
Selects the level of security to be used when generating the SNMP messages using this
entry. The level noAuthNoPrivmeans that the SNMP message will be sent without
authentication and without using a privacy protocol. The level authNoPrivmeans that
the SNMP message will be sent with authentication but without using a privacy protocol.
The authPrivmeans that the SNMP message will be sent both with authentication and
using a privacy protocol.
del
cur
Deletes the targetParamsTableentry.
Displays the current targetParamsTableconfiguration.
SNMPv3 Notify Table configuration
Command: /cfg/sys/ssnmp/snmpv3/notify <notify number>
[SNMPv3 snmpNotifyTable 1 Menu]
name
tag
del
cur
- Set notify name
- Set notify tag
- Delete notifyTable entry
- Display current notifyTable configuration
SNMPv3 uses Notification Originator to send out traps. A notification typically monitors a system for particular
events or conditions, and generates Notification-Class messages based on these events or conditions.
The following table describes the SNMPv3 Notify Table Configuration menu options.
Table 73 SNMPv3 Notify Table Configuration Menu options
Command
Description
name <1-32
characters>
tag <1-255
characters>
Defines a locally arbitrary but unique identifier associated with this SNMP notify entry.
Defines a tag of 255 characters maximum that contains a tag value which is used to select
entries in the Target Address Table. Any entry in the snmpTargetAddrTable, that
matches the value of this tag, is selected.
del
cur
Deletes the notify table entry.
Displays the current notify table configuration.
Command Line Interface 74
Download from Www.Somanuals.com. All Manuals Search And Download.
System Access configuration
Command: /cfg/sys/access
[System Access Menu]
mgmt
user
http
https
wport
snmp
tnet
- Management Network Definition Menu
- User Access Control Menu (passwords)
- Enable/disable HTTP (Web) access
- HTTPS Web Access Menu
- Set HTTP (Web) server port number
- Set SNMP access control
- Enable/disable Telnet access
tnport - Set Telnet server port number
cur - Display current system access configuration
The following table describes the System Access Configuration menu options.
Table 74 System Access Configuration Menu options
Command
Description
mgmt
user
Displays the Management Configuration Menu.
Displays the User Access Control Menu.
http
disable|enable
https
Enables or disables HTTP (Web) access to the Browser-based Interface. It is enabled by
default.
Displays the HTTPS Menu.
wport <TCP port
number>
Sets the switch port used for serving switch Web content. The default is HTTP port 80.
snmp disable|read-
only|read-write
tnet
tnport <TCP port
number>
Disables or provides read-only/write-read SNMP access.
Enables or disables Telnet access to the switch. It is enabled by default.
Sets an optional telnet server port number for cases where the server listens for telnet
sessions on a non-standard port. The default is telnet port 23.
Displays the current system access parameters.
cur
Management Networks configuration
Command: /cfg/sys/access/mgmt
[Management Networks Menu]
add
rem
- Add mgmt network definition
- Remove mgmt network definition
cur
clear
- Display current mgmt network definitions
- Clear current mgmt network definitions
The following table describes the Management Networks Configuration menu options. You can configure up to 10
management networks on the switch.
Table 75 Management Networks Configuration menu options
Command
Description
add <IP address> <IP mask>
Adds a defined network through which switch access is allowed
through Telnet, SNMP, or the browser-based interface. A range
of IP addresses is produced when used with a network mask
address. Specify an IP address and mask address in dotted-
decimal notation.
rem <IP address> <IP mask>
Removes a defined network, which consists of a management
network address and a management network mask address.
Displays the current management networks parameters.
Clear the current configured management networks.
cur
clear
Command Line Interface 75
Download from Www.Somanuals.com. All Manuals Search And Download.
User Access Control configuration
Command: /cfg/sys/access/user
[User Access Control Menu]
uid
- User ID Menu
- Eject user
- Set user password (user)
- Set operator password (oper)
- Set administrator password (admin)
- Display current user status
eject
usrpw
opw
admpw
cur
The following table describes the User Access Control menu options.
Table 76 User Access Control Configuration menu options
Command
Description
uid <1-10>
Displays the User ID Menu for the selected user.
eject <user-name>
usrpw <1-128
characters>
Ejects the selected user from the switch.
Sets the user (user) password (maximum 128 characters). The user has no direct
responsibility for switch management. He or she can view switch status information
and statistics, but cannot make any configuration changes.
Sets the operator (oper) password (maximum 128 characters). The operator
manages all functions of the switch. He or she can view all switch information and
statistics and can reset ports or the entire switch.
opw <1-128 characters>
admpw <1-128
characters>
Sets the administrator (admin) password (maximum 128 characters). The super
user administrator has complete access to all menus, information, and
configuration commands on the switch, including the ability to change both the user
and administrator passwords.
cur
Displays the current user status.
User ID configuration
Command: /cfg/sys/access/user/uid <uid number>
[User ID 1 Menu]
cos
name
pswd
ena
dis
del
cur
- Set class of service
- Set user name
- Set user password
- Enable user ID
- Disable user ID
- Delete user ID
- Display current user configuration
The following table describes the User ID Configuration menu options.
Table 77 User ID Configuration menu options
Command
Description
cos
Sets the Class-of-Service to define the user’s authority level.
<user|oper|admin>
name <1-8
characters>
pswd <1-128
characters>
ena
Defines the user name.
Sets the user password of up to 128 characters maximum.
Enables the user ID.
dis
Disables the user ID.
del
Deletes the user ID.
cur
Displays the current user ID parameters.
Command Line Interface 76
Download from Www.Somanuals.com. All Manuals Search And Download.
HTTPS Access configuration
Command: /cfg/sys/access/https
[https Menu]
access - Enable/Disable HTTPS Web access
port - HTTPS WebServer port number
generate - Generate self-signed HTTPS server certificate
certSave - save HTTPS certificate
cur
- Display current SSL Web Access configuration
The following table describes the HTTPS Access Configuration menu options.
Table 78 HTTPS Access Configuration menu options
Command
Description
access enable|disable
Enables or disables BBI access (Web access) using HTTPS. The default value is
disabled.
port <TCP port number> Defines the HTTPS Web server port number. The default is 443.
generate
Allows you to generate a certificate to connect to the SSL to be used during the key
exchange. A default certificate is created when HTTPS is enabled for the first time.
The user can create a new certificate defining the information that they want to be
used in the various fields. For example:
•
•
•
•
•
•
•
Country Name (2 letter code) [ ]: JP
State or Province Name (full name) [ ]: Tokyo
Locality Name (for example, city) [ ]: Fuchu
Organization Name (for example, company) [ ]: NEC
Organizational Unit Name (for example, section) [ ]: SIGMABLADE
Common Name (for example, user’s name) [ ]: Taro
You must confirm if you want to generate the certificate. It takes approximately
30 seconds to generate the certificate. Then the switch restarts SSL agent.
Allows the client, or the Web browser, to accept the certificate and save the
certificate to Flash to be used when the switch is rebooted.
certSave
cur
Displays the current SSL Web Access configuration.
Watchdog configuration
Command: /cfg/sys/watchdog
[Watchdog Menu]
interval - Set watchdog timeout interval
enable - Enable Watchdog
disable - Disable Watchdog
cur
- Display current Watchdog configuration
The following table describes the HTTPS Access Configuration menu options.
Table 79 Watchdog Configuration menu options
Command
Description
interval <5-120>
enable
disable
Sets the watchdog timeout interval. The default is 30 seconds.
Enables watchdog. The default is enabled.
Disables watchdog.
cur
Displays the current Watchdog configuration.
Command Line Interface 77
Download from Www.Somanuals.com. All Manuals Search And Download.
Port configuration
Command: /cfg/port <port number>
[Port 1 Menu]
speed
fctl
- Set link speed and force full duplex mode
- Set flow control
- Set auto negotiation
- Set port name
auto
name
ena
dis
- Enable port
- Disable port
cur
- Display current port configuration
This menu enables you to configure settings for individual switch ports. This command is enabled by default.
NOTE: Port 19 is a port for switch management interface (interface 256). Cross-link ports (17-18) are not
available on the SmartPanel software.
The following table describes the Port Configuration Menu options.
Table 80 Port Configuration Menu options
Command
Description
speed 10|100|1000|any
Sets the link speed. Not all options are valid on all ports. The choices
include:
•
•
•
•
10 Mb/s
100 Mb/s
1000 Mb/s
“any,” for automatic detection (default)
Note: Ports 1-16 are set to 1000 Mb/s, and cannot be changed.
fctl rx|tx|both|none
auto on|off
Sets the flow control. The choices include:
•
•
•
•
Receive (rx) flow control
Transmit (tx) flow control
Both receive and transmit flow control (default)
No flow control
Enables or disables auto-negotiation for the port. The default is
enabled.
name <1-64 characters>|none
Set the port name.
ena
dis
Enables the port.
Disables the port. To temporarily disable a port without changing its
configuration attributes, see the “Operation Menu” section.
Displays current port parameters.
cur
Spare Ports Group configuration
Command: /cfg/spgroup
[Spare Ports Group Menu]
addport - Add ports to the group
cur - Display current group configuration
Use these menu options to set unused ports to Spare Ports Group. Set the ports, which Port Group 1-5 do not
contain, to Spare Ports Group.
The following table describes the Spare Ports Group Configuration menu options.
Table 81 Spare Ports Group Configuration menu options
Command
Description
add <port number>
cur
Adds the specified port to Spare Ports Group.
Displays the current Spare Ports Group configuration.
Command Line Interface 78
Download from Www.Somanuals.com. All Manuals Search And Download.
Group configuration
Command: /cfg/group <1-5>
[Group 1 Menu]
addport - Add ports to the group
remport - Remove ports from the group
addvlan - Add non-default (tagged) VLANs to the group
remvlan - Remove non-default (tagged) VLANs from the group
pvid
igmp
- Set default port VLAN id for the group
- Enable/Disable IGMP Snooping for the group
failover - Enable/Disable Failover for the group
limit
- Number of External Links to trigger failover
lacp
cur
- Enable/Disable LACP for the group
- Display current group configuration
Use these menu options to set the Port Group. There are five Port Groups. Set the ports, which Port Group 1-5 do
not contain, to Spare Ports Group.
The following table describes the Port Group Configuration menu options.
Table 82 Port Group Configuration menu options
Command
Description
addport <port number>
remport <port number>
addvlan <1-4094>
remvlan <1-4094>
pvid <1-4094>
Adds the specified port to the Port Group.
Removes the specified port from the Port Group.
Adds the non-default (tagged) VLAN to the Port Group.
Removes the non-default (tagged) VLAN from the Port Group.
Sets default port VLAN ID (PVID) to the Port Group. The default is automatically
assigned when the Group is used.
igmp disable|enable
failover
disable|enable
Enables or disables IGMP snooping for the Port Group.
Enables or disables Failover for the Port Group. The default is enabled. When it is
enabled and the number of external links is the value of the limit or fewer, the switch
disables the internal server blade port of the Port Group.
limit <0-4>
Sets the number of external links to trigger failover. The default is 0. The failover limit
lets you specify the minimum number of operational links required within the failover
trigger before the trigger initiates a failover event. For example, if the limit is four, a
failover event occurs when the number of operational links in the trigger is four or
fewer. When you set the limit to zero, the SmartPanel triggers a failover event only
when no links in the trigger are operational.
lacp disable|enable
cur
Enables or disables LACP for the Port Group. The default is disabled. When
disabled, the external ports of the Port Group are configured as a static trunk group.
When enabled, they are configured as a LACP trunk group.
Displays the current Ports Group configuration.
NOTE: A Port Group must contain at least one external port (20-24) and one internal server blade port (1-
16).
See the “Port Group Mapping” section in the “Browser-based interface” chapter for information.
Command Line Interface 79
Download from Www.Somanuals.com. All Manuals Search And Download.
Configuration Dump
Command: /cfg/dump
The dump program writes the current switch configuration to the terminal screen. To start the dump program, at the
Configuration# prompt, enter:
Configuration# dump
The configuration is displayed with parameters that have been changed from the default values. The screen display
can be captured, edited, and placed in a script file, which can be used to configure other switches. Paste the
configuration commands from the script file at the command line prompt of the switch. The active configuration can
also be saved or loaded via FTP or TFTP.
Saving the active switch configuration
Command: /cfg/ptcfg <FTP/TFTP server> <filename>
When the ptcfg command is used, the active configuration commands of the switch (as displayed using
/cfg/dump) will be uploaded to the specified script configuration file on the TFTP server. To start the switch
configuration upload, at the Configuration# prompt, enter:
Configuration# ptcfg <FTP/TFTP server> <filename>
Where <FTP/TFTP server> is the FTP/TFTP server IP address and <filename> is the name of the target script
configuration file.
NOTE: The output file is formatted with line-breaks but no carriage returns. The file cannot be viewed with
editors that require carriage returns (such as Microsoft Notepad).
NOTE: If the FTP/TFTP server is running SunOS™ or the Solaris™ operating system, the specified ptcfg file
must exist prior to executing the ptcfg command and must be writable (set with proper permission, and not
locked by any application). The contents of the specified file will be replaced with the current configuration
data.
Restoring the active switch configuration
Command: /cfg/gtcfg <FTP/TFTP server> <filename>
When the gtcfg command is used, the active configuration will be replaced with the commands found in the
specified configuration file. The file can contain a full switch configuration or a partial configuration. The
configuration loaded using gtcfg is not activated until the apply command is used. If the apply command is found in
the configuration script file loaded using this command, the apply action will be performed automatically.
To start the switch configuration download, at the Configuration# prompt, enter:
Configuration# gtcfg <FTP/TFTP server> <filename>
Where <FTP/TFTP server> is the FTP/TFTP server IP address and <filename> is the name of the target script
configuration file.
NOTE: The switch supports three configuration files: active, backup, and factory. See the “Selecting a
configuration block” section in the “Boot Options Menu” chapter for information on how to set which
configuration file to use upon boot up.
Command Line Interface 80
Download from Www.Somanuals.com. All Manuals Search And Download.
Operations Menu
Introduction
Operations-level commands are used for making immediate and temporary changes to switch configuration. The
Operations Menu is used for bringing ports temporarily in and out of service. This menu is available only from an
administrator and operator login.
Menu information
Command: /oper
[Operations Menu]
port - Operational Port Menu
passwd - Change current user password
clrlog - Clear syslog messages
tnetsshc – Close telnet/SSH connections
ntpreq - Send NTP request
The following table describes the Operations Menu options.
Table 83 Operations Menu options
Command
Description
port <port number>
Displays the Operational Port Menu.
passwd <1-128
characters>
Allows the user to change the password. You need to enter the current password in
use for validation.
clrlog
Clears all Syslog messages. This command is available only from an administrator
login.
tnetsshc
ntpreq
Closes the telnet and SSH connections.
Allows the user to send requests to the NTP server. This command is available
only from an administrator login.
Operations-level port options
Command: /oper/port <port number>
[Operations Port 1 Menu]
ena
dis
cur
- Enable port
- Disable port
- Current port state
Operations-level port options are used for temporarily disabling or enabling a port.
Table 84 Operations-Level Port Menu options
Command
Description
ena
Temporarily enables the port. The port will be returned to its configured operation mode
when the switch is reset.
NOTE: This command does not enable a port that has been disabled by an ekeying mismatch error.
dis
Temporarily disables the port. The port will be returned to its configured operation mode
when the switch is reset.
cur
Displays the current settings for the port.
Command Line Interface 81
Download from Www.Somanuals.com. All Manuals Search And Download.
Boot Options Menu
Introduction
You must be logged in to the switch as the administrator to use the Boot Options Menu.
The Boot Options Menu provides options for:
•
•
•
Selecting a switch software image to be used when the switch is next reset.
Selecting a configuration block to be used when the switch is next reset.
Downloading or uploading a new software image to the switch via FTP or TFTP.
Menu information
Command: /boot
[Boot Options Menu]
image - Select software image to use on next boot
conf - Select config block to use on next boot
gtimg - Download new software image via FTP/TFTP
ptimg - Upload selected software image via FTP/TFTP
reset - Reset switch
cur
- Display current boot options
Each of the Boot Options Menu commands is discussed in greater detail in the following sections.
Updating the switch software image
The switch software image is the executable code running on the switch. A version of the image ships with the
switch, and comes pre-installed on the device. As new versions of the image are released, you can upgrade the
software running on the switch.
Upgrading the software image on the switch requires the following:
•
•
•
Loading the new image onto a FTP or TFTP server on your network
Downloading the new image from the FTP or TFTP server to the switch
Selecting the new software image to be loaded into switch memory the next time the switch is reset
Downloading new software to the switch
The switch can store up to two different software images, called image1 and image2, as well as boot software,
called boot. When you download new software, you must specify where it should be placed: either into image1,
image2, or boot.
By default, the software for conventional Layer2 switch mode is stored in image1 and the software for SmartPanel
mode is stored in image2.
To download new software to the switch, you will need the following:
•
•
•
The image or boot software loaded on a FTP or TFTP server on your network
The IP address of the FTP or TFTP server
The name of the new software image or boot file
When the above requirements are met, use the following procedure to download the new software to the switch.
1.
At the Boot Options# prompt, enter:
Boot Options# gtimg
2.
Enter the name of the switch software to be replaced:
Enter name of switch software image to be replaced
["image1"/"image2"/"boot"]: <image>
3.
4.
Enter the IP address of the FTP or TFTP server:
Enter IP address of FTP/TFTP server: <IP address>
Enter the name of the new software file on the server:
Enter name of file on FTP/TFTP server: <filename>
Command Line Interface 82
Download from Www.Somanuals.com. All Manuals Search And Download.
The exact form of the name will vary by FTP/TFTP server. However, the file location is normally relative to the
FTP/TFTP directory.
5.
6.
Enter the username, if you are using a FTP server:
Enter username for FTP server or hit return for TFTP server: <userID>
Enter the password for the FTP server (if prompted):
Enter password for username on FTP server: <password>
7.
8.
The system prompts you to confirm your request.
You should next select a software image to run, as described in the “Selecting a Soft Image to Run” section.
If you are loading an image from which you are not currently booted, the system prompts you to change the
image.
image2 currently contains Software Version 1.0.0
that was downloaded at 15:46:36 Wed Apr 23, 2006.
New download will replace image2 with file "1.0.1_OS.img"
from TFTP server 192.168.2.4.
Confirm download operation [y/n]: y
Invoking TFTP over port 69...
Starting download...
File appears valid
Download in
progress....................................................
Image download complete (1333953 bytes)
Writing to flash...This takes about 90 seconds. Please wait
Write complete (1333953 bytes), now verifying FLASH...
Verification of new image2 in FLASH successful.
image2 now contains Software Version 1.0.1
Switch is currently set to boot software image1.
Do you want to change that to the new image2? [y/n] y
Next boot will use new software image2.
Selecting a software image to run
You can select which software image (image1 or image2) you want to run in switch memory for the next reboot.
1.
At the Boot Options# prompt, enter:
Boot Options# image
2.
Enter the name of the image you want the switch to use upon the next boot. The system informs you of which
image is currently set to be loaded at the next reset, and prompts you to enter a new choice:
Currently set to use switch software "image1" on next reset.
Specify new image to use on next reset ["image1"/"image2"]:
IMPORTANT:
When the switch software is changed (NormalPanel or SmartPanel) and the switch is
rebooted, the switch configuration is removed and the switch runs factory configuration block. Backup the
switch configuration if needed.
Command Line Interface 83
Download from Www.Somanuals.com. All Manuals Search And Download.
Uploading a software image from the switch
You can upload a software image from the switch to a FTP or TFTP server.
1.
At the Boot Options# prompt, enter:
Boot Options# ptimg
2.
The system prompts you for information. Enter the desired image:
Enter name of switch software image to be uploaded
["image1"|"image2"|"boot"]: <image>
3.
4.
5.
6.
7.
Enter the name or the IP address of the FTP or TFTP server:
Enter hostname or IP address of FTP/TFTP server: <IP address>
Enter the name of the file into which the image will be uploaded on the FTP or TFTP server:
Enter name of file on FTP/TFTP server: <filename>
Enter the user name, if you are using a FTP server:
Enter username for FTP server or hit return for TFTP server: <userID>
Enter the password for the FTP server (if prompted):
Enter password for username on FTP server: <password>
The system then requests confirmation of what you have entered. To have the file uploaded, enter y.
image2 currently contains Software Version 1.0.0
Upload will transfer image2 (1889411 bytes) to file "test"
on TFTP server 192.1.1.1.
Confirm upload operation [y/n]: y
Selecting a configuration block
When you make configuration changes to the switch, you must save the changes so that they are retained beyond
the next time the switch is reset. When you execute the save command, your new configuration changes are
placed in the active configuration block. The previous configuration is copied into the backup configuration block.
There is also a factory configuration block. This holds the default configuration set by the factory when the switch
was manufactured. Under certain circumstances, it may be desirable to reset the switch configuration to the default.
This can be useful when a custom-configured switch is moved to a network environment where it will be re-
configured for a different purpose.
Use the following procedure to set which configuration block you want the switch to load the next time it is reset:
1.
2.
At the Boot Options# prompt, enter:
Boot Options# conf
Enter the name of the configuration block you want the switch to use.
The system indicates which configuration block is currently set to be loaded at the next reset, and prompts
you to enter a new choice:
Currently set to use active configuration block on next reset.
Specify new block to use ["active"/"backup"/"factory"]:
Command Line Interface 84
Download from Www.Somanuals.com. All Manuals Search And Download.
Resetting the switch
You can reset the switch to make your software image file and configuration block changes occur.
Resetting the switch causes the Spanning Tree Protocol to restart. This process can be lengthy, depending on the
topology of your network.
To reset the switch, at the Boot Options# prompt, enter:
>> Boot Options# reset
You are prompted to confirm your request.
Current switch software information
To display the current switch software information, enter the following.
>> Boot Options# cur
Currently set to boot software image2, factory default config block.
Current FLASH software:
image1: version 1.2.0, downloaded 0:15:51 Mon Jan 2, 2006
NormalPanel
image2: version 1.0.0, downloaded 1:32:08 Sun Jan 8, 2006
SmartPanel
boot kernel: version 1.2.0
Use this command to display the image running on the switch, the Configuration block which the switch runs after
booted, and the switch software stored in image1 and image2.
When NormalPanel is displayed in the software information, the software for conventional Layer2 switch mode is
stored in the image. When SmartPanel is displayed, the software for SmartPanel mode is stored in the image.
Command Line Interface 85
Download from Www.Somanuals.com. All Manuals Search And Download.
Maintenance Menu
Introduction
The Maintenance Menu is used for debugging purposes, enabling you to generate a technical support dump of the
critical state information in the switch, and to clear entries in the Forwarding Database and the Address Resolution
Protocol (ARP). This menu is available only from an administrator and operator login.
Menu information
Command: /maint
[Maintenance Menu]
sys
fdb
- System Maintenance Menu
- Forwarding Database Manipulation Menu
debug - Debugging Menu
arp
igmp
- ARP Cache Manipulation Menu
- IGMP Multicast Group Menu
uudmp - Uuencode FLASH dump
ptdmp - tftp put FLASH dump to tftp server
cldmp - Clear FLASH dump
tsdmp - Tech support dump
pttsdmp - tftp put tech support dump to tftp server
The following table describes the Maintenance Menu options.
Table 85 Maintenance Menu options
Command
sys
fdb
debug
arp
igmp
Usage
Displays the System Maintenance Menu.
Displays the Forwarding Database Manipulation Menu.
Displays the Debug Menu.
Displays the ARP Cache Manipulation Menu.
Displays the IGMP Maintenance Menu.
uudmp
ptdmp
cldmp
tsdmp
pttsdmp
Displays dump information in uuencoded format.
Saves the system dump information via TFTP.
Clears dump information from flash memory.
Dumps all switch information, statistics, and configuration.
Redirects the technical support dump (tsdmp) to an external TFTP server.
System maintenance options
Command: /maint/sys
[System Maintenance Menu]
flags - Set NVRAM flag word
The System Maintenance Menu is reserved for use by NEC technical support. The options are used to perform
system debugging.
The following table describes the System Maintenance Menu options.
Table 86 System Maintenance Menu options
Command
Usage
flags <new NVRAM flags word as
0xXXXXXXXX>
Sets the flags that are used for debugging purposes by
NEC technical support.
Command Line Interface 86
Download from Www.Somanuals.com. All Manuals Search And Download.
Forwarding Manipulation options
Command: /maint/fdb
[FDB Manipulation Menu]
find
port
vlan
dump
add
- Show a single FDB entry by MAC address
- Show FDB entries for a single port
- Show FDB entries for a single VLAN
- Show all FDB entries
- Add a FDB entry
- Delete a FDB entry
del
clear - Clear entire FDB, then re-add static entries
The Forwarding Database (FDB) Manipulation Menu can be used to view information and to delete a MAC address
from the Forwarding Database or clear the entire Forwarding Database. This is helpful in identifying problems
associated with MAC address learning and packet forwarding decisions.
The following table describes the FDB Manipulation Menu options.
Table 87 FDB Manipulation Menu options
Command
Usage
find <MAC address> [<1-4095>]
Displays a single database entry by its MAC address. You are prompted
to enter the MAC address of the device. Enter the MAC address using
one of the following:
•
•
xx:xx:xx:xx:xx:xx format (for example: 08:00:20:12:34:56)
xxxxxxxxxxxx format (for example: 080020123456).
port <port number>
vlan <1-4095>
Displays all FDB entries for a particular port.
Displays all FDB entries on a single VLAN.
Displays all entries in the Forwarding Database.
Adds a FDB entry.
dump
add
rem
Removes a FDB entry.
clear
Clears the entire Forwarding Database from switch memory, then adds
the static entries to the Forwarding Database.
Debugging options
Command: /maint/debug
[Miscellaneous Debug Menu]
tbuf
snap
- Show MP trace buffer
- Show MP snap (or post-mortem) trace buffer
clrcfg - Clear all flash configs
The Miscellaneous Debug Menu displays trace buffer information about events that can be helpful in understanding
switch operation. You can view the following information using the Debug Menu:
•
•
Events traced by the management processor (MP)
Events traced to a buffer area when a reset occurs
If the switch resets for any reason, the management processor (MP) trace buffer is saved into the snap trace buffer
area. The output from these commands can be interpreted by NEC technical support.
The following table describes the Miscellaneous Debug Menu options:
Table 88 Miscellaneous Debug Menu options
Command
Usage
tbuf
Displays the management processor trace buffer. Header information similar to the following is
shown:
MP trace buffer at 13:28:15 Fri May 25, 2002; mask: 0x2ffdf748
The buffer information is displayed after the header.
snap
Displays the management processor snap (or post-mortem) trace buffer. This buffer contains
information traced at the time that a reset occurred.
clrcfg
Deletes all flash configuration blocks. The next time the switch is rebooted, it returns to the factory
default settings.
Command Line Interface 87
Download from Www.Somanuals.com. All Manuals Search And Download.
ARP cache options
Command: /maint/arp
[Address Resolution Protocol Menu]
find
port
vlan
addr
dump
- Show a single ARP entry by IP address
- Show ARP entries on a single port
- Show ARP entries on a single VLAN
- Show ARP entries for switch's interfaces
- Show all ARP entries
clear - Clear ARP cache
The following table describes the Address Resolution Protocol Menu options:
Table 89 Address Resolution Protocol Menu options
Command
Usage
find <IP address>
Shows a single ARP entry by IP address. For example,
192.4.17.35
port <port number>
vlan <1-4095>
addr
Shows ARP entries on a single port.
Shows ARP entries on a single VLAN.
Shows the list of IP addresses that the switch will respond
to for ARP requests.
dump
Shows all ARP entries.
clear
Clears the entire ARP list from switch memory.
IGMP Multicast Group options
Command: /maint/igmp
[IGMP Multicast Group Menu]
snoop - IGMP Snooping Menu
mrouter - IGMP Multicast Router Port Menu
clear - Clear group and mrouter tables
The following table describes the IGMP Multicast Group Maintenance Menu options.
Table 90 IGMP Multicast Group Menu options
Command
snoop
mrouter
clear
Usage
Displays the IGMP Snooping maintenance menu.
Displays the IGMP Multicast Router maintenance menu.
Clears IGMP Multicast data from switch memory.
IGMP Snooping options
Command: /maint/igmp/snoop
[IGMP Multicast Group Menu]
find
vlan
port
trunk
- Show a single group by IP group address
- Show groups on a single vlan
- Show groups on a single port
- Show groups on a single trunk
detail - Show detail of a single group by IP address
dump
- Show all groups
clear
- Clear group tables
The following table describes the IGMP Snoop Maintenance Menu options.
Table 91 IGMP Snooping Menu options
Command
Usage
find <IP address>
vlan <1-4094>
port <port number>
detail <IP address>
dump
Shows a single IGMP Multicast group by IP address.
Shows IGMP Multicast groups on a single VLAN.
Shows IGMP Multicast groups on a single port.
Shows the detail of IGMP Multicast groups by IP address.
Shows all IGMP Multicast groups.
clear
Clears IGMP Multicast data from switch memory.
Command Line Interface 88
Download from Www.Somanuals.com. All Manuals Search And Download.
IGMP Multicast Routers options
Command: /maint/igmp/mrouter
[IGMP Multicast Routers Menu]
vlan
dump
clear
- Show all multicast router ports on a single vlan
- Show all multicast router ports
- Clear multicast router port table
The following table describes the IGMP Multicast Routers Maintenance Menu options.
Table 92 IGMP Multicast Group Menu options
Command
vlan <1-4094>
dump
Usage
Shows IGMP Multicast groups on a single VLAN.
Shows all IGMP Multicast routers.
Clears IGMP Multicast router data from switch memory.
clear
Technical support dump
Command: /maint/tsdmp
Use this command to dump all switch information, statistics, and configuration.
If you want to capture dump information to a file, set your communication software on your workstation to capture
session data prior to issuing the tsdmp command.
FTP/TFTP technical support dump put
Command: /maint/pttsdmp
Use this command to put (save) the technical support dump to a FTP/TFTP server.
Uuencode flash dump
Command: /maint/uudmp
Using this command, dump information is presented in uuencoded format. This format makes it easy to capture the
dump information as a file or a string of characters.
If you want to capture dump information to a file, set your communication software on your workstation to capture
session data prior to issuing the uudmp command. This will ensure that you do not lose any information. Once
entered, the uudmp command will cause approximately 23,300 lines of data to be displayed on your screen and
copied into the file.
Using the uudmp command, dump information can be read multiple times. The command does not cause the
information to be updated or cleared from flash memory.
Dump information is not cleared automatically. In order for any subsequent dump information to be written to flash
memory, you must manually clear the dump region. For more information on clearing the dump region, see the
“Clearing dump information” section later in this chapter.
To access dump information, at the Maintenance# prompt, enter:
Maintenance# uudmp
The dump information is displayed on your screen and, if you have configured your communication software to do
so, captured to a file. If the dump region is empty, the following displays:
No FLASH dump available.
Command Line Interface 89
Download from Www.Somanuals.com. All Manuals Search And Download.
FTP/TFTP system dump put
Command: /maint/ptdmp <server> <filename>
Use this command to put (save) the system dump to a FTP or TFTP server.
NOTE: If the FTP or TFTP server is running SunOS or the Solaris operating system, the specified ptdmp file
must exist prior to executing the ptdmp command, and must be writable (set with proper permission, and not
locked by any application). The contents of the specified file will be replaced with the current dump data.
To save dump information via FTP/TFTP, at the Maintenance# prompt, enter:
Maintenance# ptdmp <server> <filename>
Type the FTP/TFTP server IP address as <server>, and the target dump file as <filename>.
Enter the user name, if you are using a FTP server:
Enter username for FTP server or hit return for TFTP server: <userID>
Enter the password for the FTP server (if prompted):
Enter password for username on FTP server: <password>
Clearing dump information
Command: /maint/cldmp
To clear dump information from flash memory, at the Maintenance# prompt, enter:
Maintenance# cldmp
The switch clears the dump region of flash memory and displays the following message:
FLASH dump region cleared.
If the flash dump region is already clear, the switch displays the following message:
FLASH dump region is already clear.
Unscheduled system dumps
If there is an unscheduled system dump to flash memory, the following message is displayed when you log on to
the switch:
Note: A system dump exists in FLASH. The dump was saved
at 13:43:22 Wednesday October 30, 2005. Use /maint/uudmp to
extract the dump for analysis and /maint/cldmp to
clear the FLASH region. The region must be cleared
before another dump can be saved.
Command Line Interface 90
Download from Www.Somanuals.com. All Manuals Search And Download.
|