ProSafe Managed Switch
Command Line Interface (CLI)
User Manual
10.0
GSM7328Sv2
GSM7352Sv2
GSM7228PS
GSM7252PS
M5300-28G3
M5300-52G3
M5300-28G-POE+
M5300-52G-POE+
M5300-28GF3
M5300-28G
M5300-52G
350 East Plumeria Drive
San Jose, CA 95134
USA
November 2012
202-11054-02
1.0
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Command Syntax. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Command Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
CLI Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Using CLI Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Accessing the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Dedicated Port Stacking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Stacking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
VLAN Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Private VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
GARP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
GVRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
GMRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
3
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
About MVR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
IP Routing Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .246
IP Helper Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
4
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Multicast Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .339
PIM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .349
IPv6 PIM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .442
AutoVOIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .508
iSCSI Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .512
About PoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .518
PoE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519
Auto Install Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .530
Logging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .550
5
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Cable Test Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
UDLD Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Access Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
6
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Index
7
Download from Www.Somanuals.com. All Manuals Search And Download.
1.
Using the Command-Line Interface
1
The command-line interface (CLI) is a text-based way to manage and monitor the system.
You can access the CLI by using a direct serial connection or by using a remote logical
connection with telnet or SSH.
This chapter describes the CLI syntax, conventions, and modes. It contains the following
sections:
•
•
•
•
•
•
•
•
•
•
•
•
•
Licensing and Command Support
As shown in the following table, some command groups or commands require a license and
some are supported on particular switch models. For those requiring a license, license keys
are available from your VAR or NETGEAR authorized e-commerce portal. License activation
is described in the Software Setup Manual.
8
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Command Group or
Command
M5300-28G-POE+ M5300-28G
M5300-52G-POE+ M5300-52G
M5300-28G3
M5300-52G3
M5300-28GF3
GSM7328Sv2
GSM7352Sv2
GSM7228PS
GSM7252PS
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Stack Firmware
Supported
Supported
Supported
Supported
Supported
Require license
Require license
Require license
Require license
Require license
Require license
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Supported
Supported
Supported
Supported
Supported
Supported
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Require license
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Require license
Require license
Require license
Require license
Require license
Internet Group Message
Require license
Require license
Require license
Require license
Supported
Supported
Supported
Supported
Require license
Require license
Require license
Require license
Require license
Require license
Supported
Supported
Supported
Supported
Require license
Require license
Using the Command-Line Interface
9
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Command Group or
Command
M5300-28G-POE+ M5300-28G
M5300-52G-POE+ M5300-52G
M5300-28G3
M5300-52G3
M5300-28GF3
GSM7328Sv2
GSM7352Sv2
GSM7228PS
GSM7252PS
Require license
Require license
Supported
Supported
Require license
Supported
Supported
Not Supported
Supported
Not Supported
Supported
Not Supported
Not Supported
Supported
Supported
Not Supported
Supported
Supported
Supported
Not Supported
Not Supported
Not Supported
Not Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
no random-detect
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Command Syntax
A command is one or more words that might be followed by one or more parameters.
Parameters can be required or optional values.
Some commands, such as show network or clear vlan,do not require parameters.
Other commands, such as network parms, require that you supply a value after the
command. You must type the parameter values in a specific order, and optional parameters
follow required parameters. The following example describes the network parms
command syntax:
Format
network parms <ipaddr> <netmask> [gateway]
• network parmsis the command name.
• <ipaddr>and <netmask> are parameters and represent required values that you must
enter after you type the command keywords.
Using the Command-Line Interface
10
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
• [gateway] is an optional parameter, so you are not required to enter a value in place of
the parameter.
The New Template User Manual lists each command by the command name and provides a
brief description of the command. Each command reference also contains the following
information:
•
•
•
Format shows the command keywords and the required and optional parameters.
Mode identifies the command mode you must be in to access the command.
Default shows the default value, if any, of a configurable setting on the device.
The showcommands also contain a description of the information that the command shows.
Command Conventions
In this document, the command name is in boldfont. Parameters are in italic font. You
must replace the parameter name with an appropriate value, which might be a name or
number. Parameters are order dependent.
The parameters for a command might include mandatory values, optional values, or keyword
types.
Table 1. Parameter Conventions
Symbol
Example
Description
<value>
<> angle brackets
Indicates that you must enter a value in place of the
brackets and text inside them.
[value]
[] square brackets
{} curly braces
| Vertical bars
Indicates an optional parameter that you can enter in
place of the brackets and text inside them.
{choice1 |
choice2}
Indicates that you must select a parameter from the list of
choices.
choice1 | choice2
Separates the mutually exclusive choices.
Indicates a choice within an optional element.
[{choice1 |
choice2}]
[{}] Braces within
square brackets
Common Parameter Values
Parameter values might be names (strings) or numbers. To use spaces as part of a name
parameter, enclose the name value in double quotes. For example, the expression “System
Using the Command-Line Interface
11
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Name with Spaces” forces the system to accept the spaces. Empty strings (““) are not valid
Table 2. Parameter Descriptions
Parameter
Description
ipaddr
This parameter is a valid IP address. You can enter the IP address in the following formats:
a (32 bits)
a.b (8.24 bits)
a.b.c (8.8.16 bits)
a.b.c.d (8.8.8.8)
In addition to these formats, the CLI accepts decimal, hexadecimal and octal formats
through the following input formats (where n is any valid hexadecimal, octal or decimal
number):
0xn (CLI assumes hexadecimal format)
0n (CLI assumes octal format with leading zeros)
n (CLI assumes decimal format)
FE80:0000:0000:0000:020F:24FF:FEBF:DBCB, or
FE80:0:0:0:20F:24FF:FEBF:DBCB, or
FE80::20F24FF:FEBF:DBCB, or
ipv6-address
FE80:0:0:0:20F:24FF:128:141:49:32
For additional information, refer to RFC 3513.
Interface or
unit/slot/port
Valid slot and port number separated by forward slashes. For example, 0/1 represents slot
number 0 and port number 1.
Logical Interface
Represents a logical slot and port number. This is applicable in the case of a port-channel
(LAG). You can use the logical unit/slot/port to configure the port-channel.
Character strings
Use double quotation marks to identify character strings, for example, “System Name with
Spaces”. An empty string (“”) is not valid.
Unit/Slot/Port Naming Convention
Managed switch software references physical entities such as cards and ports by using a
unit/slot/port naming convention. The software also uses this convention to identify certain
logical entities, such as Port-Channel interfaces.
The slot number has two uses. In the case of physical ports, it identifies the card containing
the ports. In the case of logical and CPU ports it also identifies the type of interface or port.
Table 3. Type of Slots
Slot Type
Description
Physical slot numbers
Physical slot numbers begin with zero, and are allocated up to the maximum
number of physical slots.
Logical slot numbers
CPU slot numbers
Logical slots immediately follow physical slots and identify port-channel (LAG) or
router interfaces.
The CPU slots immediately follow the logical slots.
Using the Command-Line Interface
12
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The port identifies the specific physical port or logical interface being managed on a given
slot.
Table 4. Type of Ports
Port Type
Description
Physical Ports
Logical Interfaces
The physical ports for each slot are numbered sequentially starting from zero.
Port-channel or Link Aggregation Group (LAG) interfaces are logical interfaces
that are only used for bridging functions.
VLAN routing interfaces are only used for routing functions.
Loopback interfaces are logical interfaces that are always up.
Tunnel interfaces are logical point-to-point links that carry encapsulated packets.
CPU ports
CPU ports are handled by the driver as one or more physical entities located on
physical slots.
Note: In the CLI, loopback and tunnel interfaces do not use the
unit/slot/port format. To specify a loopback interface, you use the
loopback ID. To specify a tunnel interface, you use the tunnel ID.
Using a Command’s “No” Form
The nokeyword is a specific form of an existing command and does not represent a new or
distinct command. Almost every configuration command has a noform. In general, use the
noform to reverse the action of a command or reset a value back to the default. For
example, the no shutdown configuration command reverses the shutdown of an interface.
Use the command without the keyword noto re-enable a disabled feature or to enable a
feature that is disabled by default. Only the configuration commands are available in the no
form.
Managed Switch Modules
Managed switch software consists of flexible modules that can be applied in various
combinations to develop advanced Layer 2/3/4+ products. The commands and command
modes available on your switch depend on the installed modules. Additionally, for some
showcommands, the output fields might change based on the modules included in the
software.
The software suite includes the following modules:
•
•
•
•
Switching (Layer 2)
Routing (Layer 3)
IPv6—IPv6 routing
Multicast
Using the Command-Line Interface
13
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
•
•
Quality of Service
Management (CLI, Web UI, and SNMP)
IPv6 Management—Allows management of the device through an IPv6 through an IPv6
address without requiring the IPv6 Routing package in the system. The management
address can be associated with the network port (front-panel switch ports) and a routine
interface (port or VLAN).
•
Stacking
Not all modules are available for all platforms or software releases.
Command Modes
The CLI groups commands into modes according to the command function. Each of the
command modes supports specific software commands. The commands in one mode are not
available until you switch to that particular mode, with the exception of the User EXEC mode
commands. You can execute the User EXEC mode commands in the Privileged EXEC mode.
The command prompt changes in each command mode to help you identify the current
Note: The command modes available on your switch depend on the
software modules that are installed. For example, a switch that does
not support BGPv4 does not have the Router BGPv4 Command
Mode.
Table 5. CLI Command Modes
Command Mode Prompt
Mode Description
Switch>
User EXEC
Contains a limited set of commands to view
basic system information.
Switch#
Privileged EXEC
Allows you to issue any EXECcommand, enter
the VLAN mode, or enter the Global
Configuration mode.
Switch (Config)#
Global Config
VLAN Config
Groups general setup commands and permits
you to make modifications to the running
configuration.
Switch (Vlan)#
Groups all the VLAN commands.
Using the Command-Line Interface
14
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 5. CLI Command Modes (Continued)
Command Mode Prompt
Mode Description
Interface Config
Switch (Interface <unit/slot/port>)#
Manages the operation of an interface and
provides access to the router interface
configuration commands.
Switch (Interface Loopback <id>)#
Use this mode to set up a physical port for a
specific logical connection operation.
Switch (Interface Tunnel <id>)#
Switch (line)#
Line Config
Contains commands to configure outbound
telnet settings and console interface settings.
Policy Map
Config
Switch (Config-policy-map)#
Contains the QoS Policy-Map configuration
commands.
Policy Class
Config
Switch (Config-policy-class-map)#
Consists of class creation, deletion, and
matching commands. The class match
commands specify Layer 2, Layer 3, and
general match criteria.
Class Map Config Switch (Config-class-map)#
Contains the QoS class map configuration
commands for IPv4.
Ipv6_Class-Map
Config
Switch (Config-class-map)#
Switch (Config-router)#
Switch (Config rtr)#
Contains the QoS class map configuration
commands for IPv6.
Router OSPF
Config
Contains the OSPF configuration commands.
Contains the OSPFv3 configuration commands.
Contains the RIP configuration commands.
Router OSPFv3
Config
Router RIP Config Switch (Config-router)#
MAC Access-list
Config
Switch (Config-mac-access-list)#
Allows you to create a MAC Access-List and to
enter the mode containing MAC Access-List
configuration commands.
TACACS Config
Switch (Tacacs)#
Contains commands to configure properties for
the TACACS servers.
DHCP Pool
Config
Switch (Config dhcp-pool)#
Switch (Config dhcp6-pool)#
Switch (Config stack)#
Contains the DHCP server IP address pool
configuration commands.
DHCPv6 Pool
Config
Contains the DHCPv6 server IPv6 address pool
configuration commands.
Stack Global
Config Mode
Allows you to access the Stack Global Config
Mode.
ARP Access-List
Config Mode
Switch (Config-arp-access-list)#
Contains commands to add ARP ACL rules in
an ARP Access List.
Using the Command-Line Interface
15
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 6 explains how to enter or exit each mode.
Table 6. CLI Mode Access and Exit
Command Mode Access Method
Exit or Access Previous Mode
To exit, enter logout.
User EXEC
This is the first level of access.
Privileged EXEC
From the User EXEC mode, enter To exit to the User EXEC mode, enter exit or
enable.
press Ctrl-Z.
Global Config
VLAN Config
Interface Config
From the Privileged EXEC mode,
enter configure.
To exit to the Privileged EXEC mode, enter exit,
or press Ctrl-Z.
From the Privileged EXEC mode,
enter vlan database.
To exit to the Privileged EXEC mode, enter exit,
or press Ctrl-Z.
From the Global Config mode,
enter
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
interface <unit/slot/port> Ctrl-Z.
or interface loopback <id>
or interface tunnel <id>
Line Config
From the Global Config mode,
enter
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
lineconfig.
Ctrl-Z.
Policy-Map
Config
From the Global Config mode,
enter
policy-map <name> in.
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
Policy-Class-Map From the Policy Map mode enter
To exit to the Policy Map mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
Config
class.
Class-Map
Config
From the Global Config mode,
enter
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
class-map, and specify the
optional keyword ipv4to specify
the Layer 3 protocol for this class.
more information.
Ipv6-Class-Map
Config
From the Global Config mode,
enter
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
class-map and specify the
optional keyword ipv6to specify
the Layer 3 protocol for this class.
more information.
Router OSPF
Config
From the Global Config mode,
enter
router ospf.
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
Router OSPFv3
Config
From the Global Config mode,
enter
ipv6 router ospf.
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
Using the Command-Line Interface
16
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 6. CLI Mode Access and Exit (Continued)
Command Mode Access Method
Exit or Access Previous Mode
Router RIP
Config
From the Global Config mode,
enter
router rip.
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
MAC Access-list
Config
From the Global Config mode,
enter
mac access-list extended
<name>.
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
Ctrl-Z.
TACACS Config
From the Global Config mode,
To exit to the Global Config mode, enter exit. To
enter tacacs-server host
return to the Privileged EXEC mode, enter
<ip-addr>, where <ip-addr>is Ctrl-Z.
the IP address of the TACACS
server on your network.
DHCP Pool
Config
From the Global Config mode,
enter
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
ip dhcp pool<pool-name>.
Ctrl-Z.
DHCPv6 Pool
Config
From the Global Config mode,
enter
To exit to the Global Config mode, enter exit. To
return to the Privileged EXEC mode, enter
ip dhcpv6 pool<pool-name>. Ctrl-Z.
Stack Global
Config Mode
From the Global Config mode,
enter the stack command.
To exit to the Global Config mode, enter the exit
command. To return to the Privileged EXEC
mode, enter Ctrl-Z.
ARP Access-List
Config Mode
From the Global Config mode,
enter the arp access-list exit command. To return to the Privileged
command. EXEC mode, enter Ctrl-Z.
To exit to the Global Config mode, enter the
Command Completion and Abbreviation
Command completion finishes spelling the command when you type enough letters of a
command to uniquely identify the command keyword. Once you have entered enough letters,
press the SPACEBAR or TAB key to complete the word.
Command abbreviation allows you to execute a command when you have entered there are
enough letters to uniquely identify the command. You must enter all of the required keywords
and parameters before you enter the command.
Using the Command-Line Interface
17
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
CLI Error Messages
If you enter a command and the system is unable to execute it, an error message appears.
Table 7 describes the most common CLI error messages.
Table 7. CLI Error Messages
Message Text
Description
% Invalid input detected at '^' marker.
Indicates that you entered an incorrect or unavailable command.
The carat (^) shows where the invalid text is detected. This
message also appears if any of the parameters or values are not
recognized.
Command not found / Incomplete
command. Use ? to list commands.
Indicates that you did not enter the required keywords or values.
Ambiguous command
Indicates that you did not enter enough letters to uniquely identify
the command.
CLI Line-Editing Conventions
Table 8 describes the key combinations you can use to edit commands or increase the speed
of command entry. You can access this list from the CLI by entering helpfrom the User or
Privileged EXEC modes.
Table 8. CLI Editing Conventions
Key Sequence
DEL or Backspace
Ctrl-A
Description
Delete previous character
Go to beginning of line
Go to end of line
Ctrl-E
Ctrl-F
Go forward one character
Go backward one character
Delete current character
Delete to beginning of line
Delete to end of line
Ctrl-B
Ctrl-D
Ctrl-U, X
Ctrl-K
Ctrl-W
Delete previous word
Ctrl-T
Transpose previous character
Go to previous line in history buffer
Rewrites or pastes the line
Go to next line in history buffer
Ctrl-P
Ctrl-R
Ctrl-N
Using the Command-Line Interface
18
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 8. CLI Editing Conventions (Continued)
Key Sequence
Description
Ctrl-Y
Prints last deleted character
Enables serial flow
Ctrl-Q
Ctrl-S
Disables serial flow
Ctrl-Z
Return to root command prompt
Command-line completion
Tab, <SPACE>
Exit
?
Go to next lower command prompt
List available commands, keywords, or parameters
Using CLI Help
Enter a question mark (?) at the command prompt to display the commands available in the
current mode.
(switch) >?
enable
help
logout
ping
quit
show
Enter into user privilege mode.
Display help for various special keys.
Exit this session. Any unsaved changes are lost.
Send ICMP echo packets to a specified IP address.
Exit this session. Any unsaved changes are lost.
Display Switch Options and Settings.
Telnet to a remote host.
telnet
Enter a question mark (?) after each word you enter to display available command keywords
or parameters.
(switch) #network ?
javamode
mgmt_vlan
parms
Enable/Disable.
Configure the Management VLAN ID of the switch.
Configure Network Parameters of the router.
Select DHCP, BootP, or None as the network config
protocol.
protocol
If the help output shows a parameter in angle brackets, you must replace the parameter with
a value.
(switch) #network parms ?
<ipaddr>
Enter the IP address.
If there are no additional command keywords or parameters, or if additional parameters are
optional, the following message appears in the output:
<cr>
Press Enter to execute the command
Using the Command-Line Interface
19
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
You can also enter a question mark (?) after typing one or more characters of a word to list
the available command or parameters that begin with the letters, as shown in the following
example:
(switch) #show m?
mac-addr-table
mac-address-table
monitor
Accessing the CLI
You can access the CLI by using a direct console connection or by using a telnet or SSH
connection from a remote management host.
For the initial connection, you must use a direct connection to the console port. You cannot
access the system remotely until the system has an IP address, subnet mask, and default
gateway. You can set the network configuration information manually, or you can configure
the system to accept these settings from a BOOTP or DHCP server on your network. For
Using the Command-Line Interface
20
Download from Www.Somanuals.com. All Manuals Search And Download.
2.
Stacking Commands
2
This chapter contains the following sections:
•
•
•
•
The commands in this chapter are in two functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
The Primary Management Unit is the unit that controls the stack.
Note: When configuring a stack using M5300 Series switches and
GSM7328S V2H1, GSM7352S V2H1, GSM7228PS V1H1, or
GSM7228PS V1H1switches, refer to sdm prefer (Mixed Stacking)
Dedicated Port Stacking
This section describes the commands you use to configure dedicated port stacking.
stack
This command sets the mode to Stack Global Config.
Format
Mode
stack
Global Config
member
This command configures a switch. The <unit> is the switch identifier of the switch to be
added/removed from the stack. The <switchindex> is the index into the database of the
21
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
supported switch types, indicating the type of the switch being preconfigured. The switch
index is a 32-bit integer. This command is executed on the Primary Management Unit.
Format
Mode
member <unit> <switchindex>
Stack Global Config
Note: Switch index can be obtained by executing the show supported
switchtype command in User EXEC mode.
no member
This command removes a switch from the stack. The <unit> is the switch identifier of the
switch to be removed from the stack. This command is executed on the Primary Management
Unit.
Format
Mode
no member <unit>
Stack Global Config
switch priority
This command configures the ability of a switch to become the Primary Management Unit.
The <unit> is the switch identifier. The <value> is the preference parameter that allows
the user to specify, priority of one backup switch over another. The range for priority is 1 to
15. The switch with the highest priority value will be chosen to become the Primary
Management Unit if the active Primary Management Unit fails. The switch priority defaults to
the hardware management preference value 1. Switches that do not have the hardware
capability to become the Primary Management Unit are not eligible for management.
Default
Format
Mode
enabled
switch <unit> priority <value>
Global Config
switch renumber
This command changes the switch identifier for a switch in the stack. The <oldunit> is the
current switch identifier on the switch whose identifier is to be changed. The <newunit> is
the updated value of the switch identifier. Upon execution, the switch will be configured with
the configuration information for the new switch, if any. The old switch configuration
information will be retained, however the old switch will be operationally unplugged. This
command is executed on the Primary Management Unit.
Stacking Commands
22
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: If the management unit is renumbered, then the running
configuration is no longer applied (that is, the stack acts as if the
configuration had been cleared).
Format
Mode
switch <oldunit> renumber <newunit>
Global Config
movemanagement
This command moves the Primary Management Unit functionality from one switch to another.
The <fromunit> is the switch identifier on the current Primary Management Unit. The
<tounit> is the switch identifier on the new Primary Management Unit. Upon execution,
the entire stack (including all interfaces in the stack) is unconfigured and reconfigured with
the configuration on the new Primary Management Unit. After the reload is complete, all
stack management capability must be performed on the new Primary Management Unit. To
preserve the current configuration across a stack move, execute the copy
system:running-config nvram:startup-config (in Privileged EXEC) command
before performing the stack move. A stack move causes all routes and layer 2 addresses to
be lost. This command is executed on the Primary Management Unit. The system prompts
you to confirm the management move.
Note: The movemanagementcommand does not NSF (non-stop
forwarding). To move the management unit to the backup unit, use
Format
Mode
movemanagement <fromunit> <tounit>
Stack Global Config
standby
Use this command to configure a unit as a Standby Management Unit (STBY).
Format
Mode
standby <unit number>
Stack Global Config
Stacking Commands
23
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: The Standby Management Unit cannot be the current Management
Unit. The Standby unit should be a management-capable unit.
slot
This command configures a slot in the system. The <unit/slot> is the slot identifier of the
slot. The <cardindex> is the index into the database of the supported card types,
indicating the type of the card being preconfigured in the specified slot. The card index is a
32-bit integer. If a card is currently present in the slot that is unconfigured, the configured
information will be deleted and the slot will be re-configured with default information for the
card.
Format
slot <unit/slot> <cardindex>
Mode
Global Config
Note: Card index can be obtained by executing show supported cardtype
command in User EXEC mode.
no slot
This command removes configured information from an existing slot in the system.
Format
Mode
no slot <unit/slot> <cardindex>
Global Config
Note: Card index can be obtained by executing show supported cardtype
command in User EXEC mode.
set slot disable
This command configures the administrative mode of the slot(s). If you specify [all], the
command is applied to all slots, otherwise the command is applied to the slot identified by
<unit/slot>.
If a card or other module is present in the slot, this administrative mode will effectively be
applied to the contents of the slot. If the slot is empty, this administrative mode will be applied
Stacking Commands
24
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
to any module that is inserted into the slot. If a card is disabled, all the ports on the device are
operationally disabled and shown as “unplugged” on management screens.
Format
Mode
set slot disable [<unit/slot> | all]
Global Config
no set slot disable
This command unconfigures the administrative mode of the slot(s). If you specify [all], the
command removes the configuration from all slots, otherwise the configuration is removed
from the slot identified by <unit/slot>.
If a card or other module is present in the slot, this administrative mode removes the
configuration from the contents of the slot. If the slot is empty, this administrative mode
removes the configuration from any module inserted into the slot. If a card is disabled, all the
ports on the device are operationally disabled and shown as “unplugged” on management
screens.
Format
Mode
no set slot disable [<unit/slot> | all]
Global Config
set slot power
This command configures the power mode of the slot(s) and allows power to be supplied to a
card located in the slot. If you specify [all], the command is applied to all slots, otherwise
the command is applied to the slot identified by <unit/slot>.
Use this command when installing or removing cards. If a card or other module is present in
this slot, the power mode is applied to the contents of the slot. If the slot is empty, the power
mode is applied to any card inserted into the slot.
Format
Mode
set slot power [<unit/slot> | all]
Global Config
no set slot power
This command unconfigures the power mode of the slot(s) and prohibits power from being
supplied to a card located in the slot. If you specify [all], the command prohibits power to
all slots, otherwise the command prohibits power to the slot identified by <unit/slot>.
Use this command when installing or removing cards. If a card or other module is present in
this slot, power is prohibited to the contents of the slot. If the slot is empty, power is prohibited
to any card inserted into the slot.
Format
Mode
no set slot power [<unit/slot> | all]
Global Config
Stacking Commands
25
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
reload (Stack)
This command resets the entire stack or the identified <unit>.The <unit> is the switch
identifier. The system prompts you to confirm that you want to reset the switch.
Format
reload [<unit>]
Mode
User EXEC
show slot
This command displays information about all the slots in the system or for a specific slot.
Format
show slot [<unit/slot>]
Mode
User EXEC
Term
Definition
Slot
The slot identifier in a <unit/slot> format.
The slot is empty, full, or has encountered an error
The slot administrative mode is enabled or disabled.
The slot power mode is enabled or disabled.
Slot Status
Admin State
Power State
Configured Card The model identifier of the card preconfigured in the slot. Model Identifier is a
Model Identifier
32-character field used to identify a card.
Pluggable
Cards are pluggable or non-pluggable in the slot.
Indicates whether the slot can be powered down.
Power Down
If you supply a value for <unit/slot>, the following additional information appears:
Term
Definition
Inserted Card
Model Identifier
The model identifier of the card inserted in the slot. Model Identifier is a 32-character
field used to identify a card. This field is displayed only if the slot is full.
Inserted Card
Description
The card description. This field is displayed only if the slot is full.
Configured Card The card description of the card preconfigured in the slot.
Description
Stacking Commands
26
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show supported cardtype
This commands displays information about all card types or specific card types supported in
the system.
Format
Mode
show supported cardtype [<cardindex>]
User EXEC
If you do not supply a value for <cardindex>, the following output appears:
Term
Definition
Card Index (CID)
The index into the database of the supported card types. This index is used when
preconfiguring a slot.
Card Model
Identifier
The model identifier for the supported card type.
If you supply a value for <cardindex>, the following output appears:
Term
Definition
Card Type
The 32-bit numeric card type for the supported card.
The model identifier for the supported card type.
Model Identifier
Card Description The description for the supported card type.
show switch
This command displays information about all units in the stack or a single unit when you
specify the unit value. For units that would normally be allowed to join the stack but do not
have a matching stack template ID, their switch status is shown as “STM Mismatch.”
Format
Mode
show switch [<unit>]
Privileged EXEC
Term
Definition
Switch
The unit identifier assigned to the switch.
When you do not specify a value for <unit>, the following information appears:
Term
Definition
Management
Status
Indicates whether the switch is the Primary Management Unit, a stack member, or the
status is unassigned.
Preconfigured
Model Identifier
The model identifier of a preconfigured switch ready to join the stack. The Model
Identifier is a 32-character field assigned by the device manufacturer to identify the
device.
Stacking Commands
27
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Plugged-In Model The model identifier of the switch in the stack. Model Identifier is a 32-character field
Identifier
assigned by the device manufacturer to identify the device.
Switch Status
The switch status. Possible values for this state are: OK, Unsup ported, Code
Mismatch, Config Mismatch, or Not Present.
Code Version
The detected version of code on this switch.
When you specify a value for <unit>, the following information appears:
Term
Definition
Management
Status
Indicates whether the switch is the Primary Management Unit, a stack member, or the
status is unassigned.
Hardware
Management
Preference
The hardware management preference of the switch. The hardware management
preference can be disabled or unassigned.
Admin
Management
Preference
The administrative management preference value assigned to the switch. This
preference value indicates how likely the switch is to be chosen as the Primary
Management Unit.
Switch Type
The 32-bit numeric switch type.
Model Identifier
The model identifier for this switch. Model Identifier is a 32-character field assigned by
the device manufacturer to identify the device.
Switch Status
The switch status. Possible values are OK, Unsupported, Code Mismatch, Config
Mismatch, or Not Present.
Switch
The switch description.
Description
Expected Code
Version
The expected code version.
Detected Code
Version
The version of code running on this switch. If the switch is not present and the data is
from pre-configuration, then the code version is “None”.
Detected Code in The version of code that is currently stored in FLASH memory on the switch. This code
Flash
executes after the switch is reset. If the switch is not present and the data is from
pre-configuration, then the code version is “None”.
Stack Template ID The ID of the stack template currently in use. For example: 3.
Stack Template
Description
The stack template description. For example: v1 and v2 Mix.
Up Time
The system up time.
Stacking Commands
28
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show supported switchtype
This commands displays information about all supported switch types or a specific switch
type.
Format
Modes
show supported switchtype [<switchindex>]
• User EXEC
• Privileged EXEC
If you do not supply a value for <switchindex>, the following output appears:
Term
Definition
Switch Index (SID) The index into the database of supported switch types. This index is used when
preconfiguring a member to be added to the stack.
Model Identifier
The model identifier for the supported switch type.
The management preference value of the switch type.
Management
Preference
Code Version
The code load target identifier of the switch type.
If you supply a value for <switchindex>, the following output appears:
Term
Definition
Switch Type
The 32-bit numeric switch type for the supported switch.
The model identifier for the supported switch type.
The description for the supported switch type.
Model Identifier
Switch
Description
Stacking Commands
This section describes the commands you use to view and configure stacking information.
stack-port
This command sets stacking per port to either stackor ethernetmode.
Default
Format
Mode
stack
stack-port <unit/slot/port> [{ethernet | stack}]
Stack Global Config
Stacking Commands
29
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show stack-port
This command displays summary stack-port information for all interfaces.
Format
show stack-port
Mode
Privileged EXEC
Term
Definition
QOS Mode
Stacking QOS Mode for all Interfaces.
For Each Interface:
Term
Definition
Unit
The unit number.
The slot and port numbers.
Interface
Configured Stack Stack or Ethernet.
Mode
Running Stack
Mode
Stack or Ethernet.
Link Status
Link Speed
Status of the link.
Speed (Gbps) of the stack port link.
show stack-port counters
This command displays summary data counter information for all interfaces.
Format
Mode
show stack-port counters
Privileged EXEC
Term
Definition
Unit
The unit number.
Interface
The slot and port numbers.
Tx Data Rate
Tx Error Rate
Tx Total Error
Rx Data Rate
Trashing data rate in megabits per second on the stacking port.
Platform-specific number of transmit errors per second.
Platform-specific number of total transmit errors since power-up.
Receive data rate in megabits per second on the stacking port.
Stacking Commands
30
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Rx Error Rate
Rx Total Errors
Platform-specific number of receive errors per second.
Platform-specific number of total receive errors since power-up.
show stack-port diag
This command shows stacking diagnostics for each port and is only intended for Field
Application Engineers (FAEs) and developers. An FAE will advise on the necessity to run this
command and capture this information.
Format
Mode
show stack-port diag
Privileged EXEC
Term
Definition
Unit
The unit number.
Interface
The slot and port numbers.
Diagnostic Entry1
Diagnostic Entry2
Diagnostic Entry3
80 character string used for diagnostics.
80 character string used for diagnostics.
80 character string used for diagnostics.
Non-Stop Forwarding Commands
Non-stop forwarding allows the stack units to continue to forward packets if the stack
management unit restarts because of a power failure, hardware failure, or software fault.
nsf
Use this command to enable nonstop forwarding feature on the stack. When nonstop
forwarding is enabled, if the management unit of a stack fails, the backup unit takes over as
the master without clearing the hardware tables of any of the surviving units. Data traffic
continues to be forwarded in hardware while the management functions initialize on the
backup unit. NSF is enabled by default on platforms that support it. The administrator can
disable NSF to redirect the CPU resources consumed by data checkpointing. If a unit that
does not support NSF is connected to the stack, then NSF is disabled on all stack members.
If a unit that does not support NSF is disconnected from the stack and all other units support
NSF, and NSF is administratively enabled, then NSF operation resumes.
Default
Enabled
Stacking Commands
31
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
nsf
Stack Global Config
no nsf
This command disables non-stop forwarding on the stack.
Format
no nsf
Mode
Stack Global Config
show nsf
This command displays global and per-unit information on NSF configuration on the stack.
Format
show nsf
Mode
Privileged EXEC
Term
Definition
NSF Administrative
Status
Whether nonstop forwarding is administratively enabled or disabled. Default:
Enabled
NSF Operational
Status
Indicates whether NSF is enabled on the stack.
Last Startup Reason The type of activation that caused the software to start the last time:
• “Power-On” means that the switch rebooted. This could have been caused by a
power cycle or an administrative “Reload” command.
• “Administrative Move” means that the administrator issued the
movemanagement command for the stand-by manager to take over.
• “Warm-Auto-Restart” means that the primary management card restarted due to
a failure, and the system executed a nonstop forwarding failover.
• “Cold-Auto-Restart” means that the system switched from the active manager to
the backup manager and was unable to maintain user data traffic. This is usually
caused by multiple failures occurring close together.
Time Since Last
Restart Time
The time since the current management unit became the active management unit.
Restart in progress
Whether a restart is in progress.
Warm Restart Ready Whether the system is ready to perform a nonstop forwarding failover from the
management unit to the backup unit.
Copy of Running
Configuration to
Backup Unit: Status
Whether the running configuration on the backup unit includes all changes made
on the management unit. Displays as Current or Stale.
Stacking Commands
32
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Time Since Last Copy When the running configuration was last copied from the management unit to the
backup unit.
Time Until Next Copy The number of seconds until the running configuration will be copied to the backup
unit. This line only appears when the running configuration on the backup unit is
Stale.
NSF Support (Per Unit Whether a unit supports NSF.
Status Parameters)
Example:
(Switch)#show nsf
Administrative Status.......................... Enable
Operational Status............................. Enable
Last Startup Reason............................ Warm Auto-Restart
Time Since Last Restart........................ 0 days 16 hrs 52 mins 55 secs
Restart In Progress............................ No
Warm Restart Ready............................. Yes
Copy of Running Configuration to Backup Unit:
Status...................................... Stale
Time Since Last Copy........................ 0 days 4 hrs 53 mins 22 secs
Time Until Next Copy........................ 28 seconds
Unit NSF Support
---- -----------
1 Yes
2 Yes
3 Yes
initiate failover
Use this command to force the backup unit to take over as the management unit and perform
a “warm restart” of the stack. On a warm restart, the backup unit becomes the management
unit without clearing its hardware tables (on a cold restart, hardware tables are cleared).
Applications apply checkpointed data from the former management unit. The original
management unit reboots. If the system is not ready for a warm restart, for example because
no backup unit has been elected or one or more members of the stack do not support
nonstop forwarding, the command fails with a warning message. The movemanagement
command also transfers control from the current management unit; however, the hardware is
cleared and all units reinitialize.
Note: Use this command instead of movemanagementif you expect nsf
during management unit changes.
Format
Mode
initiate failover
Stack Global Config Mode
Stacking Commands
33
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show checkpoint statistics
Use this command to display general information about the checkpoint service operation.
Format
show checkpoint statistics
Mode
Privileged EXEC
Term
Description
Messages
Checkpointed
Number of checkpoint messages transmitted to the backup unit. Range: Integer. Def
ault:0
Bytes
Number of bytes transmitted to the backup unit. Range: Integer. Default:0
Checkpointed
Time Since
Number of days, hours, minutes and seconds since the counters were reset to zero.
Counters Cleared The counters are cleared when a unit becomes manager and with a support command.
Range: Time Stamp. Default: 0d00:00:00
Checkpoint
Message Rate
Average
Number of checkpoint messages per second. The average is computed over the time
period since the counters were cleared. Range: Integer. Default:0
Last 10-second
Message Rate
Average
Number of checkpoint messages per second in the last 10-second interval. This
average is updated once every 10 seconds. Range: Integer. Default:0
Highest
10-second
Message Rate
The highest rate recorded over a 10-second interval since the counters were cleared.
Range: Integer. Default:0
Example:
(Switch)#show checkpoint statistics
Messages Checkpointed.....................6708
Bytes Checkpointed........................894305
Time Since Counters Cleared...............3d 01:05:09
Checkpoint Message Rate...................0.025 msg/sec
Last 10-second Message Rate...............0 msg/sec
Highest 10-second Message Rate............8 msg/sec
clear checkpoint statistics
This command clears the statistics for the checkpointing process.
Format
Mode
clear checkpoint statistics
Privileged EXEC
Stacking Commands
34
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Stack Firmware Synchronization Commands
Stack firmware synchronization provides an automatic mechanism to synchronize the
firmware on stack members whose firmware version differs from the version running on the
stack manager. This operation can result in either an upgrade or downgrade of firmware on
the mismatched stack member. However, this operation does not attempt to synchronize the
stack to the latest firmware in the stack.
During firmware transfer and upgrade, operations such as code download and move
management can result in undesirable behavior, such as firmware corruption on a code
mismatched stack member. As a result, you receive an error if you try to access the following
operations from the user interface during stack firmware synchronization:
•
•
•
•
•
•
Move management
Unit renumbering
Code download
Delete image
Update bootcode
Clear config
A reboot operation is allowed during stack firmware synchronization.
If the firmware is corrupted during stack firmware synchronization, manual intervention by the
administrator is required to restore the switch to working condition.
During stack firmware synchronization, traps are generated on start, completion, or failure.
•
Non-deterministic upgrade behavior
On bootup, the image that gets synchronized depends on the one that becomes the
manager. Which code version the new stack synchronizes to is fully deterministic, but
might not be obvious to the user as it depends entirely on which unit becomes the
manager. This might be decided by a MAC address comparison. If the administrator
wants a particular version to be used by the stack, he should first ensure that this
particular unit becomes stack manager.
•
Bootcode Upgrades
Bootcode upgrades are not initiated by the stack firmware synchronization.
boot auto-copy-sw
This command enables or disables stack firmware synchronization.
Default
Format
Mode
Disabled
boot auto-copy-sw
Privileged EXEC
Stacking Commands
35
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no boot auto-copy-sw
This command disables stack firmware synchronization.
Format
Mode
no boot auto-copy-sw
Privileged EXEC
boot auto-copy-sw trap
This command sends SNMP traps related to stack firmware synchronization.
Default
Format
Mode
Enabled
boot auto-copy-sw trap
Privileged EXEC
no boot auto-copy-sw trap
This command disables sending SNMP traps related to stack firmware synchronization.
Format
Mode
no boot auto-copy-sw trap
Privileged EXEC
boot auto-copy-sw allow-downgrade
This command enables downgrading the firmware version on the stack member if the
firmware version on the manager is older than the firmware version on the member.
Default
Format
Mode
Enabled
boot auto-copy-sw allow-downgrade
Privileged EXEC
no boot auto-copy-sw allow-downgrade
This command disables downgrading the image.
Format
Mode
no boot auto-copy-sw allow-downgrade
Privileged EXEC
Stacking Commands
36
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show auto-copy-sw
This command displays the stack firmware synchronization configuration status.
Format
Mode
show auto-copy-sw
Privileged EXEC
Example:
(Switch)#show auto-copy-sw
Stack Firmware Synchronization
Synchronization: Enabled
SNMP Trap status: Enabled
Allow Downgrade: Enabled
Stacking Commands
37
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
•
•
•
•
•
•
•
The commands in this chapter are in three functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
•
Clear commands clear some or all of the settings to factory defaults.
Port Configuration Commands
This section describes the commands you use to view and configure port settings.
interface
This command gives you access to the Interface Config mode, which allows you to enable or
modify the operation of an interface (port).
Format
Mode
interface <unit/slot/port>
Global Config
interface vlan
This command gives you access to the vlan virtual interface mode, which allows certain port
configurations (for example, the IP address) to be applied to the VLAN interface. Type a
question mark (?) after entering the interface configuration mode to see the available options.
Format
Mode
interface vlan <vlan id>
Global Config
interface lag
This command gives you access to the LAG (link aggregation, or port channel) virtual
interface, which allows certain port configurations to be applied to the LAG interface. Type a
question mark (?) after entering the interface configuration mode to see the available options.
Switching Commands
39
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: The IP address cannot be assigned to a LAG virtual interface. The
interface must be put under a VLAN group and an IP address
assigned to the VLAN group.
Format
Mode
interface lag <lag id>
Global Config
auto-negotiate
This command enables automatic negotiation on a port.
Default
enabled
Format
Mode
auto-negotiate
Interface Config
no auto-negotiate
This command disables automatic negotiation on a port.
Note: Automatic sensing is disabled when automatic negotiation is
disabled.
auto-negotiate all
This command enables automatic negotiation on all ports.
Default
enabled
Format
Mode
auto-negotiate all
Global Config
no auto-negotiate all
This command disables automatic negotiation on all ports.
Format
Mode
no auto-negotiate all
Global Config
Switching Commands
40
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
description
Use this command to create an alpha-numeric description of the port.
Format
description <description>
Mode
Interface Config
mtu
Use the mtucommand to set the maximum transmission unit (MTU) size, in bytes, for frames
that ingress or egress the interface. You can use the mtucommand to configure jumbo frame
support for physical and port-channel (LAG) interfaces. For the standard 7000 series
implementation, the MTU size is a valid integer between 1522 - 9216 for tagged packets and
a valid integer between 1518 - 9216 for untagged packets.
Note: To receive and process packets, the Ethernet MTU must include any
extra bytes that Layer-2 headers might require. To configure the IP
MTU size, which is the maximum size of the IP packet (IP Header +
Default
1518 (untagged)
Format
Mode
mtu <1518-9216>
Interface Config
no mtu
This command sets the default MTU size (in bytes) for the interface.
Format
no mtu
Mode
Interface Config
shutdown
This command disables a port.
Note: You can use the shutdowncommand on physical and port-channel
(LAG) interfaces, but not on VLAN routing interfaces.
Switching Commands
41
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
shutdown
Interface Config
no shutdown
This command enables a port.
Format
no shutdown
Mode
Interface Config
shutdown all
This command disables all ports.
Note: You can use the shutdown all command on physical and
port-channel (LAG) interfaces, but not on VLAN routing interfaces.
Format
Mode
shutdown all
Global Config
no shutdown all
This command enables all ports.
Format
Mode
no shutdown all
Global Config
speed
This command sets the speed and duplex setting for the interface.
Format
speed [{auto}] [{<100 | 10 | 10G> {<half-duplex | full-duplex>}}]
Mode
Interface Config
Acceptable
Values
Definition
100h
100f
10h
100BASE-T half duplex
100BASE-T full duplex
10BASE-T half duplex
Switching Commands
42
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Acceptable
Values
Definition
10f
10BASE-T full duplex
10GBase-T full duplex
10Gbase-T half duplex
10Gh
10Gf
speed all
This command sets the speed and duplex setting for all interfaces.
Format
speed all [{auto}] [{<100 | 10 | 10G> {<half-duplex | full-duplex>}}]
Mode
Global Config
Acceptable
Values
Definition
100h
100f
10h
100BASE-T half duplex
100BASE-T full duplex
10BASE-T half duplex
10BASE-T full duplex
10GBase-T full duplex
10Gbase-T half duplex
10f
10Gh
10Gf
show port
This command displays port information.
Format
Mode
show port {<unit/slot/port> | all}
Privileged EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
Type
If not blank, this field indicates that this port is a special type of port. The possible
values are:
• PC Mbr- this port is a member of a port-channel (LAG).
• Probe - this port is a probe port.
Admin Mode
The Port control administration state. The port must be enabled in order for it to be
allowed into the network. - May be enabled or disabled. The factory default is enabled.
Switching Commands
43
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Physical Mode
The desired port speed and duplex mode. If auto-negotiation support is selected, then
the duplex mode and speed is set from the auto-negotiation process. Note that the
maximum capability of the port (full duplex -100M) is advertised. Otherwise, this object
determines the port's duplex mode and transmission rate. The factory default is Auto.
Physical Status
Link Status
Link Trap
The port speed and duplex mode.
The Link is up or down.
This object determines whether or not to send a trap when link status changes. The
factory default is enabled.
LACP Mode
LACP is enabled or disabled on this port.
show port protocol
This command displays the Protocol-Based VLAN information for either the entire system, or
for the indicated group.
Format
Mode
show port protocol {<groupid> | all}
Privileged EXEC
Term
Definition
Group Name
The group name of an entry in the Protocol-based VLAN table.
The group identifier of the protocol group.
Group ID
Protocol(s)
VLAN
The type of protocol(s) for this group.
The VLAN associated with this Protocol Group.
Lists the unit/slot/port interface(s) that are associated with this Protocol Group.
Interface(s)
show port description
This command displays the port description for every port.
Format
Mode
show port description <unit/slot/port>
Privileged EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes
Shows the port description configured via the “description” command
Description
Switching Commands
44
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show port status
This command displays the Protocol-Based VLAN information for either the entire system, or
for the indicated group.
Format
show port status {<unit/slot/port> | all}
Mode
Privileged EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
“Copper” or “Fiber” for combo port.
Media Type
STP Mode
Indicate the spanning tree mode of the port.
Either “Auto” or fixed speed and duplex mode.
The actual speed and duplex mode.
Whether the link is Up or Down.
Physical Mode
Physical Status
Link Status
Loop Status
Whether the port is in loop state or not.
Whether the remote side is using flow control or not.
Partner Flow
Control
Loopback Interface Commands
The commands in this section describe how to create, delete, and manage loopback
interfaces. A loopback interface is always expected to be up. This interface can provide the
source address for sent packets and can receive both local and remote packets. The
loopback interface is typically used by routing protocols.
interface loopback
Use this command to enter the Interface Config mode for a loopback interface. The range of
the loopback ID is 0 to 7.
Format
Mode
interface loopback <loopback-id>
Global Config
Switching Commands
45
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no interface loopback
This command removes the loopback interface and associated configuration parameters for
the specified loopback interface.
Format
Mode
no interface loopback <loopback-id>
Global Config
show interface loopback
This command displays information about configured loopback interfaces.
Format
Mode
show interface loopback [<loopback-id>]
Privileged EXEC
If you do not specify a loopback ID, the following information appears for each loopback
interface on the system:
Term
Definition
Loopback ID
Interface
The loopback ID associated with the rest of the information in the row.
The interface name.
IP Address
The IPv4 address of the interface.
The number of packets received on this interface.
Received
Packets
Sent Packets
IPv6 Address
The number of packets transmitted from this interface.
The IPv6 address of this interface.
If you specify a loopback ID, the following information appears:
Term
Definition
Interface Link
Status
Shows whether the link is up or down.
IP Address
The IPv4 address of the interface.
IPv6 is enabled
(disabled)
Shows whether IPv6 is enabled on the interface.
IPv6 Prefix is
MTU size
The IPv6 address of the interface.
The maximum transmission size for packets on this interface, in bytes.
Switching Commands
46
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Spanning Tree Protocol (STP) Commands
This section describes the commands you use to configure Spanning Tree Protocol (STP).
STP helps prevent network loops, duplicate messages, and network instability.
spanning-tree
This command sets the spanning-tree operational mode to enabled.
Default
enabled
Format
Mode
spanning-tree
Global Config
no spanning-tree
This command sets the spanning-tree operational mode to disabled. While disabled, the
spanning-tree configuration is retained and can be changed, but is not activated.
Format
Mode
no spanning-tree
Global Config
spanning-tree auto-edge
This command enables auto-edge on the interface or range of interfaces. When enabled, the
interface becomes an edge port if it does not see BPDUs for edge delay time.
Default
enabled
Format
Mode
spanning-tree auto-edge
Interface Config
no spanning-tree auto-edge
This command disables auto-edge on the interface or range of interfaces.
Format
Mode
no spanning-tree auto-edge
Interface Config
spanning-tree bpdufilter
Use this command to enable BPDU Filter on an interface or range of interfaces.
Default
disabled
Format
Mode
spanning-tree bpdufilter
Interface Config
Switching Commands
47
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no spanning-tree bpdufilter
Use this command to disable BPDU Filter on the interface or range of interfaces.
Default
disabled
Format
Mode
no spanning-tree bpdufilter
Interface Config
spanning-tree bpdufilter default
Use this command to enable BPDU Filter on all the edge port interfaces.
Default
disabled
Format
Mode
spanning-tree bpdufilter
Global Config
no spanning-tree bpdufilter default
Use this command to disable BPDU Filter on all the edge port interfaces.
Default
enabled
Format
Mode
no spanning-tree bpdufilter default
Global Config
spanning-tree bpduflood
Use this command to enable BPDU Flood on the interface.
Default
disabled
Format
Mode
spanning-tree bpduflood
Interface Config
no spanning-tree bpduflood
Use this command to disable BPDU Flood on the interface.
Format
Mode
no spanning-tree bpduflood
Interface Config
Switching Commands
48
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
spanning-tree bpduguard
Use this command to enable BPDU Guard on the switch.
Default
disabled
Format
Mode
spanning-tree bpduguard
Global Config
no spanning-tree bpduguard
Use this command to disable BPDU Guard on the switch.
Format
Mode
no spanning-tree bpduguard
Global Config
spanning-tree bpdumigrationcheck
Use this command to force a transmission of rapid spanning tree (RSTP) and multiple
spanning tree (MSTP) BPDUs. Use the <unit/slot/port> parameter to transmit a BPDU
from a specified interface, or use the allkeyword to transmit BPDUs from all interfaces.
This command forces the BPDU transmission when you execute it, so the command does
not change the system configuration or have a “no” version.
Format
Mode
spanning-tree bpdumigrationcheck {<unit/slot/port> | all}
Global Config
spanning-tree configuration name
This command sets the Configuration Identifier Name for use in identifying the configuration
that this switch is currently using. The <name>is a string of up to 32 characters.
Default
base MAC address in hexadecimal notation
Format
Mode
spanning-tree configuration name<name>
Global Config
no spanning-tree configuration name
This command resets the Configuration Identifier Name to its default.
Format
Mode
no spanning-tree configuration name
Global Config
Switching Commands
49
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
spanning-tree configuration revision
This command sets the Configuration Identifier Revision Level for use in identifying the
configuration that this switch is currently using. The Configuration Identifier Revision Level is
a number in the range of 0 to 65535.
Default
0
Format
Mode
spanning-tree configuration revision<0-65535>
Global Config
no spanning-tree configuration revision
This command sets the Configuration Identifier Revision Level for use in identifying the
configuration that this switch is currently using to the default value.
Format
Mode
no spanning-tree configuration revision
Global Config
spanning-tree edgeport
This command specifies that this port is an Edge Port within the common and internal
spanning tree. This allows this port to transition to Forwarding State without delay.
Default
Format
Mode
enabled
spanning-tree edgeport
Interface Config
no spanning-tree edgeport
This command specifies that this port is not an Edge Port within the common and internal
spanning tree.
Format
Mode
no spanning-tree edgeport
Interface Config
spanning-tree forceversion
This command sets the Force Protocol Version parameter to a new value.
Default
802.1s
Format
Mode
spanning-tree forceversion<802.1d | 802.1s | 802.1w>
Global Config
•
Use 802.1d to specify that the switch transmits ST BPDUs rather than MST BPDUs (IEEE
802.1d functionality supported).
Switching Commands
50
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
•
Use 802.1s to specify that the switch transmits MST BPDUs (IEEE 802.1s functionality
supported).
Use 802.1w to specify that the switch transmits RST BPDUs rather than MST BPDUs
(IEEE 802.1w functionality supported).
no spanning-tree forceversion
This command sets the Force Protocol Version parameter to the default value.
Format
Mode
no spanning-tree forceversion
Global Config
spanning-tree forward-time
This command sets the Bridge Forward Delay parameter to a new value for the common and
internal spanning tree. The forward-time value is in seconds within a range of 4 to 30, with
the value being greater than or equal to “(Bridge Max Age / 2) + 1”.
Default
15
Format
Mode
spanning-tree forward-time<4-30>
Global Config
no spanning-tree forward-time
This command sets the Bridge Forward Delay parameter for the common and internal
spanning tree to the default value.
Format
Mode
no spanning-tree forward-time
Global Config
spanning-tree guard
This command selects whether loop guard or root guard is enabled on an interface. If neither
is enabled, then the port operates in accordance with the multiple spanning tree protocol.
Default
none
Format
Mode
spanning-tree guard { none | root | loop }
Interface Config
no spanning-tree guard
This command disables loop guard or root guard on the interface.
Format
Mode
no spanning-tree guard
Interface Config
Switching Commands
51
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
spanning-tree tcnguard
This command enables the propagation of received topology change notifications and topology
changes to other ports.
Default
disable
Format
Mode
spanning-tree tcnguard
Interface Config
no spanning-tree tcnguard
This command disables the propagation of received topology change notifications and topology
changes to other ports.
Format
Mode
no spanning-tree tcnguard
Interface Config
spanning-tree max-age
This command sets the Bridge Max Age parameter to a new value for the common and
internal spanning tree. The max-age value is in seconds within a range of 6 to 40, with the
value being less than or equal to 2 x (Bridge Forward Delay - 1).
Default
20
Format
Mode
spanning-tree max-age<6-40>
Global Config
no spanning-tree max-age
This command sets the Bridge Max Age parameter for the common and internal spanning
tree to the default value.
Format
Mode
no spanning-tree max-age
Global Config
spanning-tree max-hops
This command sets the MSTP Max Hops parameter to a new value for the common and
internal spanning tree. The max-hops value is a range from 6 to 40.
Default
20
Format
Mode
spanning-tree max-hops <1-127>
Global Config
Switching Commands
52
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no spanning-tree max-hops
This command sets the Bridge Max Hops parameter for the common and internal spanning
tree to the default value.
Format
Mode
no spanning-tree max-hops
Global Config
spanning-tree mst
This command sets the Path Cost or Port Priority for this port within the multiple spanning
tree instance or in the common and internal spanning tree. If you specify an <mstid>
parameter that corresponds to an existing multiple spanning tree instance, the configurations
are done for that multiple spanning tree instance. If you specify 0 (defined as the default CIST
ID) as the <mstid>, the configurations are done for the common and internal spanning tree
instance.
If you specify the cost option, the command sets the path cost for this port within a multiple
spanning tree instance or the common and internal spanning tree instance, depending on the
<mstid>parameter. You can set the path cost as a number in the range of 1 to 200000000
or auto. If you select auto the path cost value is set based on Link Speed.
If you specify the external-cost option, this command sets the external-path cost for MST
instance ‘0’ i.e. CIST instance. You can set the external cost as a number in the range of 1 to
200000000 or auto. If you specify auto, the external path cost value is set based on Link
Speed.
If you specify the port-priority option, this command sets the priority for this port within a
specific multiple spanning tree instance or the common and internal spanning tree instance,
depending on the <mstid>parameter. The port-priority value is a number in the range of 0
to 240 in increments of 16.
Default
• cost—auto
• external-cost—auto
• port-priority—128
Format
Mode
spanning-tree mst<mstid> {{cost <1-200000000> | auto} |
{external-cost <1-200000000> | auto} | port-priority <0-240>}
Interface Config
no spanning-tree mst
This command sets the Path Cost or Port Priority for this port within the multiple spanning
tree instance, or in the common and internal spanning tree to the respective default values. If
you specify an <mstid>parameter that corresponds to an existing multiple spanning tree
instance, you are configuring that multiple spanning tree instance. If you specify 0 (defined as
the default CIST ID) as the <mstid>, you are configuring the common and internal spanning
tree instance.
Switching Commands
53
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If the you specify cost, this command sets the path cost for this port within a multiple
spanning tree instance or the common and internal spanning tree instance, depending on the
<mstid>parameter, to the default value, i.e. a path cost value based on the Link Speed.
If you specify external-cost, this command sets the external path cost for this port for mst ‘0’
instance, to the default value, i.e. a path cost value based on the Link Speed.
If you specify port-priority, this command sets the priority for this port within a specific
multiple spanning tree instance or the common and internal spanning tree instance,
depending on the <mstid>parameter, to the default value.
Format
Mode
no spanning-tree mst <mstid> <cost | external-cost | port-priority>
Interface Config
spanning-tree mst instance
This command adds a multiple spanning tree instance to the switch. The parameter <mstid>
is a number within a range of 1 to 4094, that corresponds to the new instance ID to be added.
The maximum number of multiple instances supported by the switch is 4.
Default
none
Format
Mode
spanning-tree mst instance <mstid>
Global Config
no spanning-tree mst instance
This command removes a multiple spanning tree instance from the switch and reallocates all
VLANs allocated to the deleted instance to the common and internal spanning tree. The
parameter <mstid>is a number that corresponds to the desired existing multiple spanning
tree instance to be removed.
Format
Mode
no spanning-tree mst instance <mstid>
Global Config
spanning-tree mst priority
This command sets the bridge priority for a specific multiple spanning tree instance. The
parameter <mstid>is a number that corresponds to the desired existing multiple spanning
tree instance. The priority value is a number within a range of 0 to 61440 in increments of
4096.
If you specify 0 (defined as the default CIST ID) as the <mstid>, this command sets the
Bridge Priority parameter to a new value for the common and internal spanning tree. The
bridge priority value is a number within a range of 0 to 61440. The twelve least significant bits
Switching Commands
54
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
are masked according to the 802.1s specification. This causes the priority to be rounded
down to the next lower valid priority.
Default
32768
Format
Mode
spanning-tree mst priority<mstid> <0-61440>
Global Config
no spanning-tree mst priority
This command sets the bridge priority for a specific multiple spanning tree instance to the
default value. The parameter <mstid>is a number that corresponds to the desired existing
multiple spanning tree instance.
If 0 (defined as the default CIST ID) is passed as the <mstid>, this command sets the
Bridge Priority parameter for the common and internal spanning tree to the default value.
Format
Mode
no spanning-tree mst priority<mstid>
Global Config
spanning-tree mst vlan
This command adds an association between a multiple spanning tree instance and one or
more VLANs so that the VLAN(s) are no longer associated with the common and internal
spanning tree. The parameter <mstid>is a number that corresponds to the desired existing
multiple spanning tree instance. The vlan range can be specified as a list or as a range of
values. To specify a list of VLANs, enter a list of VLAN IDs, each separated by a comma with
no spaces in between. To specify a range of VLANs, separate the beginning and ending
VLAN ID with a dash ("-").
Format
Mode
spanning-tree mst vlan <mstid> <vlanid>
Global Config
no spanning-tree mst vlan
This command removes an association between a multiple spanning tree instance and one
or more VLANs so that the VLAN(s) are again associated with the common and internal
spanning tree.
Format
Mode
no spanning-tree mst vlan <mstid> <vlanid>
Global Config
Switching Commands
55
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
spanning-tree port mode
This command sets the Administrative Switch Port State for this port to enabled.
Default
enabled
Format
Mode
spanning-tree port mode
Interface Config
no spanning-tree port mode
This command sets the Administrative Switch Port State for this port to disabled.
Format
Mode
no spanning-tree port mode
Interface Config
spanning-tree port mode all
This command sets the Administrative Switch Port State for all ports to enabled.
Default
enabled
Format
Mode
spanning-tree port mode all
Global Config
no spanning-tree port mode all
This command sets the Administrative Switch Port State for all ports to disabled.
Format
Mode
no spanning-tree port mode all
Global Config
spanning-tree edgeport all
This command specifies that every port is an Edge Port within the common and internal
spanning tree. This allows all ports to transition to Forwarding State without delay.
Format
Mode
spanning-tree edgeport all
Global Config
no spanning-tree edgeport all
This command disables Edge Port mode for all ports within the common and internal
spanning tree.
Format
Mode
no spanning-tree edgeport all
Global Config
Switching Commands
56
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
spanning-tree bpduforwarding
Normally a switch will not forward Spanning Tree Protocol (STP) BPDU packets if STP is
disabled. However, if in some network setup, the user wishes to forward BDPU packets
received from other network devices, this command can be used to enable the forwarding.
Default
disabled
Format
Mode
spanning-tree bpduforwarding
Global Config
no spanning-tree bpduforwarding
This command will cause the STP BPDU packets received from the network to be dropped if
STP is disabled.
Format
Mode
no spanning-tree bpduforwarding
Global Config
show spanning-tree
This command displays spanning tree settings for the common and internal spanning tree.
The following details are displayed.
Format
Mode
show spanning-tree
• Privileged EXEC
• User EXEC
Term
Definition
Bridge Priority
Specifies the bridge priority for the Common and Internal Spanning tree (CST). The value
lies between 0 and 61440. It is displayed in multiples of 4096.
Bridge Identifier
The bridge identifier for the CST. It is made up using the bridge priority and the base
MAC address of the bridge.
Time Since
Topology
Change
Time in seconds.
Topology
Change Count
Number of times changed.
Topology
Change
Boolean value of the Topology Change parameter for the switch indicating if a topology
change is in progress on any port assigned to the common and internal spanning tree.
Designated
Root
The bridge identifier of the root bridge. It is made up from the bridge priority and the base
MAC address of the bridge.
Root Path Cost
Value of the Root Path Cost parameter for the common and internal spanning tree.
Switching Commands
57
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Root Port
Identifier
Identifier of the port to access the Designated Root for the CST
Root Port Max
Age
Derived value.
Derived value.
Root Port
Bridge Forward
Delay
Hello Time
Configured value of the parameter for the CST.
Bridge Hold
Time
Minimum time between transmission of Configuration Bridge Protocol Data Units
(BPDUs).
Bridge Max
Hops
Bridge max-hops count for the device.
CST Regional
Root
Bridge Identifier of the CST Regional Root. It is made up using the bridge priority and the
base MAC address of the bridge.
Regional Root
Path Cost
Path Cost to the CST Regional Root.
Associated
FIDs
List of forwarding database identifiers currently associated with this instance.
List of VLAN IDs currently associated with this instance.
Associated
VLANs
show spanning-tree brief
This command displays spanning tree settings for the bridge. The following information
appears.
Format
Mode
show spanning-tree brief
• Privileged EXEC
• User EXEC
Term
Definition
Bridge Priority
Configured value.
Bridge Identifier
The bridge identifier for the selected MST instance. It is made up using the
bridge priority and the base MAC address of the bridge.
Bridge Max Age
Configured value.
Bridge Max Hops
Bridge Hello Time
Bridge Forward Delay
Bridge Hold Time
Bridge max-hops count for the device.
Configured value.
Configured value.
Minimum time between transmission of Configuration Bridge Protocol Data
Units (BPDUs).
Switching Commands
58
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show spanning-tree interface
This command displays the settings and parameters for a specific switch port within the
common and internal spanning tree. The <unit/slot/port> is the desired switch port.
The following details are displayed on execution of the command.
Format
show spanning-tree interface<unit/slot/port>
Mode
• Privileged EXEC
• User EXEC
Term
Definition
Hello Time
Admin hello time for this port.
Enabled or disabled.
Port Mode
BPDU Guard Effect
Root Guard
Enabled or disabled.
Enabled or disabled.
Enabled or disabled.
Loop Guard
TCN Guard
Enable or disable the propagation of received topology change notifications and
topology changes to other ports.
BPDU Filter Mode
BPDU Flood Mode
Auto Edge
Enabled or disabled.
Enabled or disabled.
To enable or disable the feature that causes a port that has not seen a BPDU for
‘edge delay’ time, to become an edge port and transition to forwarding faster.
Port Up Time Since
Counters Last Cleared
Time since port was reset, displayed in days, hours, minutes, and seconds.
Spanning Tree Protocol Bridge Protocol Data Units sent.
STP BPDUs
Transmitted
STP BPDUs Received
Spanning Tree Protocol Bridge Protocol Data Units received.
Rapid Spanning Tree Protocol Bridge Protocol Data Units sent.
RSTP BPDUs
Transmitted
RSTP BPDUs Received
Rapid Spanning Tree Protocol Bridge Protocol Data Units received.
Multiple Spanning Tree Protocol Bridge Protocol Data Units sent.
MSTP BPDUs
Transmitted
MSTP BPDUs Received
Multiple Spanning Tree Protocol Bridge Protocol Data Units received.
show spanning-tree mst port detailed
This command displays the detailed settings and parameters for a specific switch port within
a particular multiple spanning tree instance. The parameter <mstid>is a number that
Switching Commands
59
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
corresponds to the desired existing multiple spanning tree instance. The
<unit/slot/port> is the desired switch port.
Format
show spanning-tree mst port detailed <mstid> <unit/slot/port>
Mode
• Privileged EXEC
• User EXEC
Term
Definition
MST Instance ID
Port Identifier
The ID of the existing MST instance.
The port identifier for the specified port within the selected MST instance. It is made up
from the port priority and the interface number of the port.
Port Priority
The priority for a particular port within the selected MST instance. The port priority is
displayed in multiples of 16.
PortForwarding
State
Current spanning tree state of this port.
Port Role
Each enabled MST Bridge Port receives a Port Role for each spanning tree. The port
role is one of the following values: Root Port, Designated Port, Alternate Port, Backup
Port, Master Port or Disabled Port
Auto-Calculate
Port Path Cost
Indicates whether auto calculation for port path cost is enabled.
Port Path Cost
Configured value of the Internal Port Path Cost parameter.
The Identifier of the designated root for this port.
Designated
Root
Root Path Cost
The path cost to get to the root bridge for this instance. The root path cost is zero if the
bridge is the root bridge for that instance.
Designated
Bridge
Bridge Identifier of the bridge with the Designated Port.
DesignatedPort
Identifier
Port on the Designated Bridge that offers the lowest cost to the LAN.
Loop
Inconsistent
State
The current loop inconsistent state of this port in this MST instance. When in loop
inconsistent state, the port has failed to receive BPDUs while configured with loop guard
enabled. Loop inconsistent state maintains the port in a "blocking" state until a
subsequent BPDU is received.
Transitions Into
Loop
The number of times this interface has transitioned into loop inconsistent state.
Inconsistent
State
Transitions Out
of Loop
The number of times this interface has transitioned out of loop inconsistent state.
Inconsistent
State
If you specify 0 (defined as the default CIST ID) as the <mstid>, this command displays the
settings and parameters for a specific switch port within the common and internal spanning
Switching Commands
60
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
tree. The <unit/slot/port> is the desired switch port. In this case, the following are
displayed.
Term
Definition
Port Identifier
Port Priority
The port identifier for this port within the CST.
The priority of the port within the CST.
The forwarding state of the port within the CST.
PortForwarding
State
Port Role
The role of the specified interface within the CST.
Auto-Calculate
Port Path Cost
Indicates whether auto calculation for port path cost is enabled or not (disabled).
Port Path Cost
The configured path cost for the specified interface.
Auto-Calculate
External Port
Path Cost
Indicates whether auto calculation for external port path cost is enabled.
External Port
Path Cost
The cost to get to the root bridge of the CIST across the boundary of the region. This
means that if the port is a boundary port for an MSTP region, then the external path cost
is used.
Designated
Root
Identifier of the designated root for this port within the CST.
Root Path Cost
The root path cost to the LAN by the port.
The bridge containing the designated port.
Designated
Bridge
DesignatedPort
Identifier
Port on the Designated Bridge that offers the lowest cost to the LAN.
Topology
Change
Acknowledgem
ent
Value of flag in next Configuration Bridge Protocol Data Unit (BPDU) transmission
indicating if a topology change is in progress for this port.
Hello Time
Edge Port
The hello time in use for this port.
The configured value indicating if this port is an edge port.
Edge Port
Status
The derived value of the edge port status. True if operating as an edge port; false
otherwise.
Point To Point
MAC Status
Derived value indicating if this port is part of a point to point link.
The regional root identifier in use for this port.
CST Regional
Root
CST Internal
Root Path Cost
The internal root path cost to the LAN by the designated external port.
Loop
Inconsistent
State
The current loop inconsistent state of this port in this MST instance. When in loop
inconsistent state, the port has failed to receive BPDUs while configured with loop guard
enabled. Loop inconsistent state maintains the port in a "blocking" state until a
subsequent BPDU is received.
Switching Commands
61
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Transitions Into
Loop
The number of times this interface has transitioned into loop inconsistent state.
Inconsistent
State
Transitions Out
of Loop
The number of times this interface has transitioned out of loop inconsistent state.
Inconsistent
State
show spanning-tree mst port summary
This command displays the settings of one or all ports within the specified multiple spanning
tree instance. The parameter <mstid>indicates a particular MST instance. The parameter
{<unit/slot/port> | all}indicates the desired switch port or all ports.
If you specify 0 (defined as the default CIST ID) as the <mstid>, the status summary
displays for one or all ports within the common and internal spanning tree.
Format
Mode
show spanning-tree mst port summary<mstid> {<unit/slot/port> | all}
• Privileged EXEC
• User EXEC
Term
Definition
MST Instance ID
Interface
STP Mode
Type
The MST instance associated with this port.
Valid slot and port number separated by forward slashes.
Indicates whether spanning tree is enabled or disabled on the port.
Currently not used.
STP State
Port Role
Desc
The forwarding state of the port in the specified spanning tree instance.
The role of the specified port within the spanning tree.
Indicates whether the port is in loop inconsistent state or not. This field is blank if the loop
guard feature is not available.
show spanning-tree mst port summary active
This command displays settings for the ports within the specified multiple spanning tree
instance that are active links.
Format
Mode
show spanning-tree mst port summary<mstid> active
• Privileged EXEC
• User EXEC
Switching Commands
62
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
mstid
Definition
The ID of the existing MST instance.
Interface
STP Mode
Type
unit/slot/port
Indicates whether spanning tree is enabled or disabled on the port.
Currently not used.
STP State
Port Role
Desc
The forwarding state of the port in the specified spanning tree instance.
The role of the specified port within the spanning tree.
Indicates whether the port is in loop inconsistent state or not. This field is blank if the loop
guard feature is not available.
show spanning-tree mst summary
This command displays summary information about all multiple spanning tree instances in
the switch. On execution, the following details are displayed.
Format
Mode
show spanning-tree mst summary
• Privileged EXEC
• User EXEC
Term
Definition
MSTInstanceID
List
List of multiple spanning trees IDs currently configured.
For each
MSTID:
• Associated
FIDs
• List of forwarding database identifiers associated with this instance.
• List of VLAN IDs associated with this instance.
• Associated
VLANs
show spanning-tree summary
This command displays spanning tree settings and parameters for the switch. The following
details are displayed on execution of the command.
Format
Mode
show spanning-tree summary
• Privileged EXEC
• User EXEC
Switching Commands
63
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Spanning Tree
Adminmode
Enabled or disabled.
Spanning Tree
Version
Version of 802.1 currently supported (IEEE 802.1s, IEEE 802.1w, or IEEE 802.1d) based
upon the Force Protocol Version parameter.
BPDU Guard
Mode
Enabled or disabled.
BPDU Filter
Mode
Enabled or disabled.
Configuration
Name
Identifier used to identify the configuration currently being used.
Identifier used to identify the configuration currently being used.
A generated Key used in the exchange of the BPDUs.
Configuration
Revision Level
Configuration
Digest Key
Configuration
Format Selector
Specifies the version of the configuration format being used in the exchange of BPDUs.
The default value is zero.
MST Instances
List of all multiple spanning tree instances configured on the switch.
show spanning-tree vlan
This command displays the association between a VLAN and a multiple spanning tree
instance. The <vlanid>corresponds to an existing VLAN ID.
Format
Mode
show spanning-tree vlan <vlanid>
• Privileged EXEC
• User EXEC
Term
Definition
VLAN Identifier
The VLANs associated with the selected MST instance.
Associated
Instance
Identifier for the associated multiple spanning tree instance or “CST” if associated with
the common and internal spanning tree.
VLAN Commands
This section describes the commands you use to configure VLAN settings.
Switching Commands
64
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
vlan database
This command gives you access to the VLAN Config mode, which allows you to configure
VLAN characteristics.
Format
Mode
vlan database
Privileged EXEC
network mgmt_vlan
This command configures the Management VLAN ID.
Default
1
Format
Mode
network mgmt_vlan <1-4093>
Privileged EXEC
no network mgmt_vlan
This command sets the Management VLAN ID to the default.
Format
Mode
no network mgmt_vlan
Privileged EXEC
vlan
This command creates a new VLAN and assigns it an ID. The ID is a valid VLAN
identification number (ID 1 is reserved for the default VLAN). The vlan-list contains VlanId's in
range <1-4093>. Separate non-consecutive IDs with ',' and no spaces and no zeros in
between the range; Use '-' for range.
Format
vlan <vlan-list>
Mode
VLAN Config
no vlan
This command deletes an existing VLAN. The ID is a valid VLAN identification number (ID 1
is reserved for the default VLAN). The vlan-list contains VlanId's in range <1-4093>.
Separate non-consecutive IDs with ',' and no spaces and no zeros in between the range; Use
'-' for range.
Format
Mode
no vlan <vlan-list>
VLAN Config
Switching Commands
65
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
vlan acceptframe
This command sets the frame acceptance mode per interface. For VLAN Only mode,
untagged frames or priority frames received on this interface are discarded. For Admit All
mode, untagged frames or priority frames received on this interface are accepted and
assigned the value of the interface VLAN ID for this port. With either option, VLAN tagged
frames are forwarded in accordance with the IEEE 802.1Q VLAN Specification.
Default
all
Format
Mode
vlan acceptframe {untaggedonly | vlanonly | all}
Interface Config
no vlan acceptframe
This command resets the frame acceptance mode for the interface to the default value.
Format
Mode
no vlan acceptframe
Interface Config
vlan ingressfilter
This command enables ingress filtering. If ingress filtering is disabled, frames received with
VLAN IDs that do not match the VLAN membership of the receiving interface are admitted
and forwarded to ports that are members of that VLAN.
Default
disabled
Format
Mode
vlan ingressfilter
Interface Config
no vlan ingressfilter
This command disables ingress filtering. If ingress filtering is disabled, frames received with
VLAN IDs that do not match the VLAN membership of the receiving interface are admitted
and forwarded to ports that are members of that VLAN.
Format
Mode
no vlan ingressfilter
Interface Config
Switching Commands
66
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
vlan makestatic
This command changes a dynamically created VLAN (one that is created by GVRP
registration) to a static VLAN (one that is permanently configured and defined). The ID is a
valid VLAN identification number. VLAN range is 2-4093.
Format
vlan makestatic <2-4093>
Mode
VLAN Config
vlan name
This command changes the name of a VLAN. The name is an alphanumeric string of up to 32
characters, and the ID is a valid VLAN identification number. ID range is 1-4093.
Default
• VLAN ID 1 - default
• other VLANS - blank string
Format
Mode
vlan name <1-4093> <name>
VLAN Config
no vlan name
This command sets the name of a VLAN to a blank string.
Format
Mode
no vlan name <1-4093>
VLAN Config
vlan participation
This command configures the degree of participation for a specific interface in a VLAN. The
ID is a valid VLAN identification number, and the interface is a valid interface number.
Format
Mode
vlan participation {exclude | include | auto} <1-4093>
Interface Config
Participation options are:
Participation
Options
Definition
include
exclude
The interface is always a member of this VLAN. This is equivalent to registration fixed.
The interface is never a member of this VLAN. This is equivalent to registration
forbidden.
auto
The interface is dynamically registered in this VLAN by GVRP. The interface will not
participate in this VLAN unless a join request is received on this interface. This is
equivalent to registration normal.
Switching Commands
67
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
vlan participation all
This command configures the degree of participation for all interfaces in a VLAN. The ID is a
valid VLAN identification number.
Format
Mode
vlan participation all {exclude | include | auto} <1-4093>
Global Config
You can use the following participation options:
Participation
Definition
Options
include
The interface is always a member of this VLAN. This is equivalent to registration fixed.
exclude
auto
The interface is never a member of this VLAN. This is equivalent to registration
forbidden.
The interface is dynamically registered in this VLAN by GVRP. The interface will not
participate in this VLAN unless a join request is received on this interface. This is
equivalent to registration normal.
vlan port acceptframe all
This command sets the frame acceptance mode for all interfaces.
Default
all
Format
Mode
vlan port acceptframe all {vlanonly | all}
Global Config
The modes defined as follows:
Mode
Definition
VLAN Only
mode
Untagged frames or priority frames received on this interface are discarded.
Admit All mode
Untagged frames or priority frames received on this interface are accepted and assigned
the value of the interface VLAN ID for this port.
With either option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q
VLAN Specification.
no vlan port acceptframe all
This command sets the frame acceptance mode for all interfaces to Admit All. For Admit All
mode, untagged frames or priority frames received on this interface are accepted and
Switching Commands
68
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
assigned the value of the interface VLAN ID for this port. With either option, VLAN tagged
frames are forwarded in accordance with the IEEE 802.1Q VLAN Specification.
Format
Mode
no vlan port acceptframe all
Global Config
vlan port ingressfilter all
This command enables ingress filtering for all ports. If ingress filtering is disabled, frames
received with VLAN IDs that do not match the VLAN membership of the receiving interface
are admitted and forwarded to ports that are members of that VLAN.
Default
disabled
Format
Mode
vlan port ingressfilter all
Global Config
no vlan port ingressfilter all
This command disables ingress filtering for all ports. If ingress filtering is disabled, frames
received with VLAN IDs that do not match the VLAN membership of the receiving interface
are admitted and forwarded to ports that are members of that VLAN.
Format
Mode
no vlan port ingressfilter all
Global Config
vlan port pvid all
This command changes the VLAN ID for all interface.
Default
1
Format
Mode
vlan port pvid all <1-4093>
Global Config
no vlan port pvid all
This command sets the VLAN ID for all interfaces to 1.
Format
Mode
no vlan port pvid all
Global Config
Switching Commands
69
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
vlan port tagging all
This command configures the tagging behavior for all interfaces in a VLAN to enabled. If
tagging is enabled, traffic is transmitted as tagged frames. If tagging is disabled, traffic is
transmitted as untagged frames. The ID is a valid VLAN identification number.
Format
Mode
vlan port tagging all <1-4093>
Global Config
no vlan port tagging all
This command configures the tagging behavior for all interfaces in a VLAN to disabled. If
tagging is disabled, traffic is transmitted as untagged frames. The ID is a valid VLAN
identification number.
Format
Mode
no vlan port tagging all
Global Config
vlan protocol group
This command adds protocol-based VLAN groups to the system. When it is created, the
protocol group will be assigned a unique number (1-128) that will be used to identify the
group in subsequent commands.
Format
Mode
vlan protocol group <1-128>
Global Config
no vlan protocol group
This command removes a protocol group.
Format
Mode
no vlan protocol group <1-128>
Global Config
vlan protocol group name
This command assigns a name to a protocol-based VLAN groups. The groupname variable
can be a character string of 0 to 16 characters.
Format
Mode
vlan protocol group name <1-128> <groupname>
Global Config
Switching Commands
70
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no vlan protocol group name
This command removes the name from a protocol-based VLAN groups.
Format
Mode
no vlan protocol group name <1-128>
Global Config
vlan protocol group add protocol
This command adds the protocol to the protocol-based VLAN identified by groupid. A group
may have more than one protocol associated with it. Each interface and protocol combination
can only be associated with one group. If adding a protocol to a group causes any conflicts
with interfaces currently associated with the group, this command fails and the protocol is not
added to the group. The possible values for protocol-list includes the keywords ip, arp, and
ipx and hexadecimal or decimal values ranging from 0x0600 (1536) to 0xFFFF (65535). The
protocol list can accept up to 16 protocols separated by a comma.
Default
none
Format
Mode
vlan protocol group add protocol <groupid> ethertype
{<protocol-list>|arp|ip|ipx}
Global Config
no vlan protocol group add protocol
This command removes the <protocol> from this protocol-based VLAN group that is
identified by this <groupid>. The possible values for protocol are ip, arp, and ipx.
Format
Mode
no vlan protocol group add protocol <groupid> ethertype
{<protocol-list>|arp|ip|ipx}
Global Config
protocol group
This command attaches a <vlanid>to the protocol-based VLAN identified by <groupid>.
A group may only be associated with one VLAN at a time, however the VLAN association can
be changed.
Default
none
Format
Mode
protocol group <groupid> <vlanid>
VLAN Config
Switching Commands
71
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no protocol group
This command removes the <vlanid> from this protocol-based VLAN group that is
identified by this <groupid>.
Format
Mode
no protocol group <groupid> <vlanid>
VLAN Config
protocol vlan group
This command adds the physical interface to the protocol-based VLAN identified by
<groupid>. You can associate multiple interfaces with a group, but you can only associate
each interface and protocol combination with one group. If adding an interface to a group
causes any conflicts with protocols currently associated with the group, this command fails
and the interface(s) are not added to the group.
Default
none
Format
Mode
protocol vlan group <groupid>
Interface Config
no protocol vlan group
This command removes the interface from this protocol-based VLAN group that is identified
by this <groupid>.
Format
Mode
no protocol vlan group <groupid>
Interface Config
protocol vlan group all
This command adds all physical interfaces to the protocol-based VLAN identified by
<groupid>. You can associate multiple interfaces with a group, but you can only associate
each interface and protocol combination with one group. If adding an interface to a group
causes any conflicts with protocols currently associated with the group, this command will fail
and the interface(s) will not be added to the group.
Default
none
Format
Mode
protocol vlan group all <groupid>
Global Config
Switching Commands
72
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no protocol vlan group all
This command removes all interfaces from this protocol-based VLAN group that is identified
by this <groupid>.
Format
no protocol vlan group all <groupid>
Mode
Global Config
vlan pvid
This command changes the VLAN ID per interface.
Default
1
Format
Mode
vlan pvid <1-4093>
Interface Config
no vlan pvid
This command sets the VLAN ID per interface to 1.
Format
Mode
no vlan pvid
Interface Config
vlan tagging
This command configures the tagging behavior for a specific interface in a VLAN to enabled.
If tagging is enabled, traffic is transmitted as tagged frames. If tagging is disabled, traffic is
transmitted as untagged frames. The vlan-list contains VlanId's in range <1-4093>. Separate
non-consecutive IDs with ',' and no spaces and no zeros in between the range; Use '-' for
range.
Format
Mode
vlan tagging <vlan-list>
Interface Config
no vlan tagging
This command configures the tagging behavior for a specific interface in a VLAN to disabled.
If tagging is disabled, traffic is transmitted as untagged frames. The vlan-list contains VlanId's
in range <1-4093>. Separate non-consecutive IDs with ',' and no spaces and no zeros in
between the range; Use '-' for range.
Format
Mode
no vlan tagging <vlan-list>
Interface Config
Switching Commands
73
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
vlan association subnet
This command associates a VLAN to a specific IP-subnet.
Format
Mode
vlan association subnet <ipaddr> <netmask> <1-4093>
VLAN Config
no vlan association subnet
This command removes association of a specific IP-subnet to a VLAN.
Format
Mode
no vlan association subnet <ipaddr> <netmask>
VLAN Config
vlan association mac
This command associates a MAC address to a VLAN.
Format
Mode
vlan association mac<macaddr> <1-4093>
VLAN database
no vlan association mac
This command removes the association of a MAC address to a VLAN.
Format
Mode
no vlan association mac<macaddr>
VLAN database
show vlan
This command displays a list of all configured VLAN.
Format
show vlan
Mode
• Privileged EXEC
• User EXEC
Term
Definition
VLAN ID
There is a VLAN Identifier (VID) associated with each VLAN. The range of the VLAN ID
is 1 to 4093.
VLAN Name
VLAN Type
A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric
characters long, including blanks. The default is blank. VLAN ID 1 always has a name of
“Default.” This field is optional.
Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and
permanently defined), or Dynamic (one that is created by GVRP registration).
Switching Commands
74
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show vlan <vlanid>
This command displays detailed information, including interface information, for a specific
VLAN. The ID is a valid VLAN identification number.
Format
show vlan <vlanid>
Mode
• Privileged EXEC
• User EXEC
Term
Definition
VLAN ID
There is a VLAN Identifier (VID) associated with each VLAN. The range of the VLAN ID
is 1 to 4093.
VLAN Name
A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric
characters long, including blanks. The default is blank. VLAN ID 1 always has a name of
“Default.” This field is optional.
VLAN Type
Interface
Current
Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and
permanently defined), or Dynamic (one that is created by GVRP registration).
Valid slot and port number separated by forward slashes. It is possible to set the
parameters for all ports by using the selectors on the top line.
The degree of participation of this port in this VLAN. The permissible values are:
• Include - This port is always a member of this VLAN. This is equivalent to registration
fixed in the IEEE 802.1Q standard.
• Exclude - This port is never a member of this VLAN. This is equivalent to registration
forbidden in the IEEE 802.1Q standard.
• Autodetect - To allow the port to be dynamically registered in this VLAN via GVRP.
The port will not participate in this VLAN unless a join request is received on this port.
This is equivalent to registration normal in the IEEE 802.1Q standard.
Configured
The configured degree of participation of this port in this VLAN. The permissible values
are:
• Include - This port is always a member of this VLAN. This is equivalent to registration
fixed in the IEEE 802.1Q standard.
• Exclude - This port is never a member of this VLAN. This is equivalent to registration
forbidden in the IEEE 802.1Q standard.
• Autodetect - To allow the port to be dynamically registered in this VLAN via GVRP.
The port will not participate in this VLAN unless a join request is received on this port.
This is equivalent to registration normal in the IEEE 802.1Q standard.
Tagging
The tagging behavior for this port in this VLAN.
• Tagged - Transmit traffic for this VLAN as tagged frames.
• Untagged - Transmit traffic for this VLAN as untagged frames.
Switching Commands
75
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show vlan brief
This command displays a list of all configured VLANs.
Format
show vlan brief
Mode
• Privileged EXEC
• User EXEC
Term
Definition
VLAN ID
There is a VLAN Identifier (vlanid) associated with each VLAN. The range of the VLAN
ID is 1 to 3965.
VLAN Name
VLAN Type
A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric
characters long, including blanks. The default is blank. VLAN ID 1 always has a name of
“Default.” This field is optional.
Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and
permanently defined), or a Dynamic (one that is created by GVRP registration).
show vlan port
This command displays VLAN port information.
Format
Mode
show vlan port {<unit/slot/port> | all}
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes. It is possible to set the
parameters for all ports by using the selectors on the top line.
Port VLAN ID
The VLAN ID that this port will assign to untagged frames or priority tagged frames
received on this port. The value must be for an existing VLAN. The factory default is 1.
Acceptable
Frame Types
The types of frames that may be received on this port. The options are 'VLAN only' and
'Admit All'. When set to 'VLAN only', untagged frames or priority tagged frames received
on this port are discarded. When set to 'Admit All', untagged frames or priority tagged
frames received on this port are accepted and assigned the value of the Port VLAN ID for
this port. With either option, VLAN tagged frames are forwarded in accordance to the
802.1Q VLAN specification.
Ingress
Filtering
May be enabled or disabled. When enabled, the frame is discarded if this port is not a
member of the VLAN with which this frame is associated. In a tagged frame, the VLAN is
identified by the VLAN ID in the tag. In an untagged frame, the VLAN is the Port VLAN ID
specified for the port that received this frame. When disabled, all frames are forwarded in
accordance with the 802.1Q VLAN bridge specification. The factory default is disabled.
GVRP
May be enabled or disabled.
Default Priority
The 802.1p priority assigned to tagged packets arriving on the port.
Switching Commands
76
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show vlan association subnet
This command displays the VLAN associated with a specific configured IP-Address and net
mask. If no IP address and net mask are specified, the VLAN associations of all the
configured IP-subnets are displayed.
Format
show vlan association subnet [<ipaddr> <netmask>]
Mode
Privileged EXEC
Term
Definition
IP Subnet
The IP address assigned to each interface.
The subnet mask.
IP Mask
VLAN ID
There is a VLAN Identifier (VID) associated with each VLAN.
show vlan association mac
This command displays the VLAN associated with a specific configured MAC address. If no
MAC address is specified, the VLAN associations of all the configured MAC addresses are
displayed.
Format
Mode
show vlan association mac [<macaddr>]
Privileged EXEC
Term
Definition
MAC Address
A MAC address for which the switch has forwarding and or filtering information. The
format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for example
01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as 8 bytes.
VLAN ID
There is a VLAN Identifier (VID) associated with each VLAN.
Double VLAN Commands
This section describes the commands you use to configure double VLAN (DVLAN). Double
VLAN tagging is a way to pass VLAN traffic from one customer domain to another through a
Metro Core in a simple and cost effective manner. The additional tag on the traffic helps
differentiate between customers in the MAN while preserving the VLAN identification of the
individual customers when they enter their own 802.1Q domain.
Switching Commands
77
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dvlan-tunnel ethertype
This command configures the ether-type for all interfaces. The ether-type may have the
values of 802.1Q, vMAN, or custom. If the ether-type has a value of custom, the optional
value of the custom ether type must be set to a value from 0 to 65535.
Default
vman
Format
Mode
dvlan-tunnel ethertype {802.1Q | vman | custom} [0-65535]
Global Config
mode dot1q-tunnel
This command is used to enable Double VLAN Tunneling on the specified interface.
Default
disabled
Format
Mode
mode dot1q-tunnel
Interface Config
no mode dot1q-tunnel
This command is used to disable Double VLAN Tunneling on the specified interface. By
default, Double VLAN Tunneling is disabled.
Format
Mode
no mode dot1q-tunnel
Interface Config
mode dvlan-tunnel
Use this command to enable Double VLAN Tunneling on the specified interface.
Note: When you use the mode dvlan-tunnelcommand on an
interface, it becomes a service provider port. Ports that do not have
double VLAN tunneling enabled are customer ports.
Default
disabled
Format
Mode
mode dvlan-tunnel
Interface Config
Switching Commands
78
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no mode dvlan-tunnel
This command is used to disable Double VLAN Tunneling on the specified interface. By
default, Double VLAN Tunneling is disabled.
Format
Mode
no mode dvlan-tunnel
Interface Config
show dot1q-tunnel
Use this command without the optional parameters to display all interfaces enabled for
Double VLAN Tunneling. Use the optional parameters to display detailed information about
Double VLAN Tunneling for the specified interface or all interfaces.
Format
Mode
show dot1q-tunnel [interface {<unit/slot/port> | all}]
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
Mode
The administrative mode through which Double VLAN Tunneling can be enabled or
disabled. The default value for this field is disabled.
EtherType
A 2-byte hex EtherType to be used as the first 16 bits of the DVLAN tunnel. There are
three different EtherType tags. The first is 802.1Q, which represents the commonly used
value of 0x8100. The second is vMAN, which represents the commonly used value of
0x88A8. If EtherType is not one of these two values, then it is a custom tunnel value,
representing any value in the range of 0 to 65535.
show dvlan-tunnel
Use this command without the optional parameters to display all interfaces enabled for
Double VLAN Tunneling. Use the optional parameters to display detailed information about
Double VLAN Tunneling for the specified interface or all interfaces.
Format
Mode
show dvlan-tunnel [interface {<unit/slot/port> | all}]
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
Switching Commands
79
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Mode
Definition
The administrative mode through which Double VLAN Tunneling can be enabled or
disabled. The default value for this field is disabled.
EtherType
A 2-byte hex EtherType to be used as the first 16 bits of the DVLAN tunnel. There are
three different EtherType tags. The first is 802.1Q, which represents the commonly used
value of 0x8100. The second is vMAN, which represents the commonly used value of
0x88A8. If EtherType is not one of these two values, then it is a custom tunnel value,
representing any value in the range of 0 to 65535.
Voice VLAN Commands
This section describes the commands you use for Voice VLAN. Voice VLAN enables switch
ports to carry voice traffic with defined priority so as to enable separation of voice and data
traffic coming onto the port. The benefits of using Voice VLAN is to ensure that the sound
quality of an IP phone could be safeguarded from deteriorating when the data traffic on the
port is high.
Also the inherent isolation provided by VLANs ensures that inter-VLAN traffic is under
management control and that network- attached clients cannot initiate a direct attack on voice
components. QoS-based on IEEE 802.1P class of service (CoS) uses classification and
scheduling to sent network traffic from the switch in a predictable manner. The system uses
the source MAC of the traffic traveling through the port to identify the IP phone data flow.
voice vlan (Global Config)
Use this command to enable the Voice VLAN capability on the switch.
Default
disabled
Format
Mode
voice vlan
Global Config
no voice vlan (Global Config)
Use this command to disable the Voice VLAN capability on the switch.
Format
Mode
no voice vlan
Global Config
voice vlan (Interface Config)
Use this command to enable the Voice VLAN capability on the interface.
Default
disabled
Switching Commands
80
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
voice vlan {<id> | dot1p <priority> | none | untagged}
Interface Config
You can configure Voice VLAN in any of the following ways:
Parameter
Description
vlan-id
Configure the IP phone to forward all voice traffic through the specified VLAN. Valid
VLAN IDs are from 1 to 4093 (the maximum supported by the platform).
dot1p
Configure the IP phone to use 802.1p priority tagging for voice traffic and to use the
default native VLAN (VLAN 0) to carry all traffic. Valid <priority>range is 0 to 7.
none
Allow the IP phone to use its own configuration to send untagged voice traffic.
Configure the phone to send untagged voice traffic.
untagged
no voice vlan (Interface Config)
Use this command to disable the Voice VLAN capability on the interface.
Format
Mode
no voice vlan
Interface Config
voice vlan data priority
Use this command to either trust or untrust the data traffic arriving on the Voice VLAN port.
Default
trust
Format
Mode
voice vlan data priority {untrust | trust}
Interface Config
show voice vlan
Format
Mode
show voice vlan [interface {<unit/slot/port> | all}]
Privileged EXEC
When the interfaceparameter is not specified, only the global mode of the Voice VLAN is
displayed.
Term
Definition
Administrative
Mode
The Global Voice VLAN mode.
Switching Commands
81
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
When the interfaceis specified:.
Term
Definition
Voice VLAN Interface Mode
The admin mode of the Voice VLAN on the interface.
The Voice VLAN ID
Voice VLAN ID
Voice VLAN Priority
Voice VLAN Untagged
Voice VLAN CoS Override
Voice VLAN Status
The do1p priority for the Voice VLAN on the port.
The tagging option for the Voice VLAN traffic.
The Override option for the voice traffic arriving on the port.
The operational status of Voice VLAN on the port.
Provisioning (IEEE 802.1p) Commands
This section describes the commands you use to configure provisioning, which allows you to
prioritize ports.
vlan port priority all
This command configures the port priority assigned for untagged packets for all ports
presently plugged into the device. The range for the priority is 0-7. Any subsequent per port
configuration will override this configuration setting.
Format
Mode
vlan port priority all <priority>
Global Config
vlan priority
This command configures the default 802.1p port priority assigned for untagged packets for a
specific interface. The range for the priority is 0–7.
Default
0
Format
Mode
vlan priority <priority>
Interface Config
Protected Ports Commands
This section describes commands you use to configure and view protected ports on a switch.
Protected ports do not forward traffic to each other, even if they are on the same VLAN.
However, protected ports can forward traffic to all unprotected ports in their group.
Unprotected ports can forward traffic to both protected and unprotected ports. Ports are
unprotected by default.
Switching Commands
82
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If an interface is configured as a protected port, and you add that interface to a Port Channel
or Link Aggregation Group (LAG), the protected port status becomes operationally disabled
on the interface, and the interface follows the configuration of the LAG port. However, the
protected port configuration for the interface remains unchanged. Once the interface is no
longer a member of a LAG, the current configuration for that interface automatically becomes
effective.
switchport protected (Global Config)
Use this command to create a protected port group. The <groupid>parameter identifies the
set of protected ports. Use the name <name>pair to assign a name to the protected port
group. The name can be up to 32 alphanumeric characters long, including blanks. The
default is blank.
Note: Port protection occurs within a single switch. Protected port
configuration does not affect traffic between ports on two different
switches. No traffic forwarding is possible between two protected
ports.
Format
Mode
switchport protected <groupid> name <name>
Global Config
no switchport protected (Global Config)
Use this command to remove a protected port group. The groupidparameter identifies the
set of protected ports. Use the namekeyword to remove the name from the group.
Format
Mode
NO switchport protected <groupid> name
Global Config
switchport protected (Interface Config)
Use this command to add an interface to a protected port group. The <groupid>parameter
identifies the set of protected ports to which this interface is assigned. You can only configure
an interface as protected in one group.
Note: Port protection occurs within a single switch. Protected port
configuration does not affect traffic between ports on two different
switches. No traffic forwarding is possible between two protected
ports.
Switching Commands
83
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Default
unprotected
Format
Mode
switchport protected <groupid>
Interface Config
no switchport protected (Interface Config)
Use this command to configure a port as unprotected. The groupidparameter identifies the
set of protected ports to which this interface is assigned.
Format
Mode
no switchport protected <groupid>
Interface Config
show switchport protected
This command displays the status of all the interfaces, including protected and unprotected
interfaces.
Format
Mode
show switchport protected <groupid>
• Privileged EXEC
• User EXEC
Term
Definition
Group ID
The number that identifies the protected port group.
Name
An optional name of the protected port group. The name can be up to 32 alphanumeric
characters long, including blanks. The default is blank.
List of Physical
Ports
List of ports, which are configured as protected for the group identified with <groupid>. If
no port is configured as protected for this group, this field is blank.
show interfaces switchport
This command displays the status of the interface (protected/unprotected) under the groupid.
Format
Mode
show interfaces switchport <unit/slot/port> <groupid>
• Privileged EXEC
• User EXEC
Term
Definition
Name
A string associated with this group as a convenience. It can be up to 32 alphanumeric
characters long, including blanks. The default is blank. This field is optional.
Protected port
Indicates whether the interface is protected or not. It shows TRUE or FALSE. If the group
is a multiple groups then it shows TRUE in Group <groupid>.
Switching Commands
84
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Private Group Commands
This section describes commands used to configure private group and view private group
configuration information.
Private group can be used to create a group of ports that can or can not share traffic to each
others in the same VLAN group. The main application is to isolate a group of users from
another without using VLAN.
switchport private-group
This command is used to assign one port or a range of ports to private group
<privategroup-name> (or <private-group-id>).
The ingress traffic from a port in private group can be forwarded to other ports either in the
same private group or anyone in the same VLAN that are not in a private group.
By default, a port does not belong to any private group. A port cannot be in more than one
private group. An error message should return when that occurred. To change a port’s private
group, first the port must be removed from its private group.
Default
port not associated with any group.
Format
switchport private-group [<privategroup-name>|<privategroup-id>]
Mode
Interface Config
no switchport private group
This command is used to remove the specified port from the given private group.
Format
no switchport private-group [<privategroup-name>|<privategroup-id>]
Mode
Interface Config
private-group name
This command is used to create a private group with name <private-group-name>. The name
string can be up to 24 bytes of non-blank characters. The total number of private groups is
192 such that the valid range for the ID is <1-192>.
The <private-group-id> field is optional. If not specified, a group id not used will be assigned
automatically.
The mode can be either “isolated” or “community”. When in “isolated” mode, the member port
in the group cannot forward its egress traffic to any other members in the same group. By
default, the mode is “community” mode that each member port can forward traffic to other
members in the same group, but not to members in other groups.
Switching Commands
85
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
private-group name <privategroup-name> [<groupid>] [mode {community|isolated}]
Global Config
no private-group name
This command is used to remove the specified private group.
Format
private-group name <privategroup-name>
Mode
Global Config
show private-group
This command displays the private groups’ information.
Format
show private-groupname [<private-group-name>|<private-group-id>|port <unit/slot/port>]
Mode
Privileged EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The VLAN ID associated with the port.
Total number of private groups is 192.
Port VLANID
Private Group
ID
Private Group
Name
The name string can be up to 24 bytes of non-blank characters
The mode can be either “isolated” or “community”.
Private Group
Private VLAN
The Private VLANs feature separates a regular VLAN domain into two or more subdomains.
Each subdomain is defined (represented) by a primary VLAN and a secondary VLAN. The
primary VLAN ID is the same for all subdomains that belong to a private VLAN. The
secondary VLAN ID differentiates subdomains from each other and provides Layer 2 isolation
between ports of the same private VLAN. The types of VLANs within a private VLAN are as
follows:
•
Primary VLAN—Forwards the traffic from the promiscuous ports to isolated ports,
community ports and other promiscuous ports in the same private VLAN. Only one
Switching Commands
86
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
primary VLAN can be configured per private VLAN. All ports within a private VLAN share
the same primary VLAN.
•
•
Isolated VLAN—A secondary VLAN that carries traffic from isolated ports to promiscuous
ports. Only one isolated VLAN can be configured per private VLAN.
Community VLAN—A secondary VLAN that forwards traffic between ports that belong to
the same community and the promiscuous ports. There can be multiple community
VLANs per private VLAN.
Three types of port designations exist within a private VLAN:
•
•
•
Promiscuous Ports—An endpoint connected to a promiscuous port is allowed to
communicate with any endpoint within the private VLAN. Multiple promiscuous ports can
be defined for a single private VLAN domain.
Isolated Ports—An endpoint connected to an isolated port is allowed to communicate with
endpoints connected to promiscuous ports only. Endpoints connected to adjacent
isolated ports cannot communicate with each other.
Community Ports—An endpoint connected to a community port is allowed to
communicate with the endpoints within a community and with any configured
promiscuous port. The endpoints that belong to one community cannot communicate with
endpoints that belong to a different community or with endpoints connected to isolated
ports.
The Private VLANs can be extended across multiple switches through inter-switch/stack links
that transport primary, community and isolated VLANs between devices.
switchport private-vlan
This command is used to define a private-VLAN association for an isolated or community
port or a mapping for a promiscuous port.
Format
switchport private-vlan {host-association <primary-vlan-id>
<secondary-vlan-id> | mapping <primary-vlan-id> {add | remove}
<secondary-vlan-list>}
Mode
Interface Config
Term
Definition
host-association
Defines VLAN association for community or host ports.
Defines the private VLAN mapping for promiscuous ports.
Primary VLAN ID of a private VLAN.
mapping
primary-vlan-id
secondary-vlan-id
add
Secondary (isolated or community) VLAN ID of a private VLAN.
Associates the secondary VLAN with the primary one.
remove
Deletes the secondary VLANs from the primary VLAN association.
A list of secondary VLANs to be mapped to a primary VLAN.
secondary-vlan-list
Switching Commands
87
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no switchport private-vlan
This command is used to remove the private-VLAN association or mapping from the port.
Format
Mode
no switchport private-vlan {host-association | mapping}
Interface Config
switchport mode private-vlan
This command is used to configure a port as a promiscuous or host private VLAN port. Note
that the properties of each mode can be configured even when the switch is not in that mode.
However, they will only be applicable once the switch is in that particular mode.
Format
Mode
switchport mode private-vlan {host | promiscuous}
Interface Config
General
Default
Term
host
Definition
Configures an interface as a private VLAN host port. It can be either isolated or
community port depending on the secondary VLAN it is associated with.
promiscuous
Configures an interface as a private VLAN promiscuous port. The promiscuous ports
are members of the primary VLAN.
no switchport mode
This command is used to remove the private-VLAN association or mapping from the port.
Format
Mode
no switchport mode private-vlan
Interface Config
private-vlan
This command is used to configure the private VLANs and to configure the association
between the primary private VLAN and secondary VLANs.
Format
private-vlan {association [add | remove] <secondary-vlan-list> |
community | isolated | primary}
Mode
VLAN Config
Term
Definition
association
Associates the primary and secondary VLAN.
secondary-vlan-list
community
A list of secondary VLANs to be mapped to a primary VLAN.
Designates a VLAN as a community VLAN.
Switching Commands
88
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
isolated
Designates a VLAN as the isolated VLAN.
Designates a VLAN as the primary VLAN.
primary
no private-vlan
This command is used to restore normal VLAN configuration.
Format
no private-vlan {association}
Mode
VLAN Config
vlan
Use this command to enter the private vlan configuration. The VLAN range is 1-4094.
Format
vlan <vlan-list>
Mode
Global Config
show vlan
This command displays information about the configured private VLANs including primary
and secondary VLAN IDs, type (community, isolated, or primary) and the ports that belong to
a private VLAN.
Format
show vlan private-vlan [type]
Mode
• Priviliged EXEC
• User EXEC
Term
Definition
Private -vlan
Displays information about the configured private VLANs
Displays only private VLAN ID and its type.
Displays primary VLAN ID
type
Primary
Secondary
Type
Displays secondary VLAN ID
Displays secondary VLAN type
Ports
Displays ports which are associated with a private VLAN
Switching Commands
89
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show interface ethernet <unit/slot/port> switchport
This command displays the private-VLAN mapping information for the switch interfaces.
Format
Mode
show interface ethernet <unit/slot/port> switchport
• Privileged EXEC
• User EXEC
Term
Definition
Private-vlan host-association
Private-vlan mapping
Displays VLAN association for the private-VLAN host ports.
Displays VLAN mapping for the private-VLAN promiscuous ports
GARP Commands
This section describes the commands you use to configure Generic Attribute Registration
Protocol (GARP) and view GARP status. The commands in this section affect both GARP
VLAN Registration Protocol (GVRP) and Garp Multicast Registration Protocol (GMRP).
GARP is a protocol that allows client stations to register with the switch for membership in
VLANS (by using GVMP) or multicast groups (by using GVMP).
set garp timer join
This command sets the GVRP join time for one port (Interface Config mode) or all (Global
Config mode) and per GARP. Join time is the interval between the transmission of GARP
Protocol Data Units (PDUs) registering (or re-registering) membership for a VLAN or
multicast group. This command has an effect only when GVRP is enabled. The time is from
10 to 100 (centiseconds). The value 20 centiseconds is 0.2 seconds.
Default
20
Format
Mode
set garp timer join <10-100>
• Interface Config
• Global Config
no set garp timer join
This command sets the GVRP join time (for one or all ports and per GARP) to the default and
only has an effect when GVRP is enabled.
Format
Mode
no set garp timer join
• Interface Config
• Global Config
Switching Commands
90
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set garp timer leave
This command sets the GVRP leave time for one port (Interface Config mode) or all ports
(Global Config mode) and only has an effect when GVRP is enabled. Leave time is the time
to wait after receiving an unregister request for a VLAN or a multicast group before deleting
the VLAN entry. This can be considered a buffer time for another station to assert registration
for the same attribute in order to maintain uninterrupted service. The leave time is 20 to 600
(centiseconds). The value 60 centiseconds is 0.6 seconds.
Default
60
Format
Mode
set garp timer leave <20-600>
• Interface Config
• Global Config
no set garp timer leave
This command sets the GVRP leave time on all ports or a single port to the default and only
has an effect when GVRP is enabled.
Format
Mode
no set garp timer leave
• Interface Config
• Global Config
set garp timer leaveall
This command sets how frequently Leave All PDUs are generated. A Leave All PDU
indicates that all registrations will be unregistered. Participants would need to rejoin in order
to maintain registration. The value applies per port and per GARP participation. The time may
range from 200 to 6000 (centiseconds). The value 1000 centiseconds is 10 seconds. You can
use this command on all ports (Global Config mode) or a single port (Interface Config mode),
and it only has an effect only when GVRP is enabled.
Default
1000
Format
Mode
set garp timer leaveall <200-6000>
• Interface Config
• Global Config
no set garp timer leaveall
This command sets how frequently Leave All PDUs are generated the default and only has
an effect when GVRP is enabled.
Format
Mode
no set garp timer leaveall
• Interface Config
• Global Config
Switching Commands
91
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show garp
This command displays GARP information.
Format
Mode
show garp
• Privileged EXEC
• User EXEC
Term
Definition
GMRP Admin Mode
The administrative mode of GARP Multicast Registration Protocol (GMRP) for the
system.
GVRP Admin Mode
The administrative mode of GARP VLAN Registration Protocol (GVRP) for the
system.
GVRP Commands
This section describes the commands you use to configure and view GARP VLAN
Registration Protocol (GVRP) information. GVRP-enabled switches exchange VLAN
configuration information, which allows GVRP to provide dynamic VLAN creation on trunk
ports and automatic VLAN pruning.
Note: If GVRP is disabled, the system does not forward GVRP messages.
set gvrp adminmode
This command enables GVRP on the system.
Default
disabled
Format
Mode
set gvrp adminmode
Privileged EXEC
no set gvrp adminmode
This command disables GVRP.
Format
Mode
no set gvrp adminmode
Privileged EXEC
Switching Commands
92
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set gvrp interfacemode
This command enables GVRP on a single port (Interface Config mode) or all ports (Global
Config mode).
Default
disabled
Format
Mode
set gvrp interfacemode
• Interface Config
• Global Config
no set gvrp interfacemode
This command disables GVRP on a single port (Interface Config mode) or all ports (Global
Config mode). If GVRP is disabled, Join Time, Leave Time and Leave All Time have no
effect.
Format
Mode
no set gvrp interfacemode
• Interface Config
• Global Config
show gvrp configuration
This command displays Generic Attributes Registration Protocol (GARP) information for one
or all interfaces.
Format
Mode
show gvrp configuration {<unit/slot/port> | all}
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
Join Timer
The interval between the transmission of GARP PDUs registering (or re-registering)
membership for an attribute. Current attributes are a VLAN or multicast group. There is
an instance of this timer on a per-Port, per-GARP participant basis. Permissible values
are 10 to 100 centiseconds (0.1 to 1.0 seconds). The factory default is 20 centiseconds
(0.2 seconds). The finest granularity of specification is one centisecond (0.01 seconds).
Leave Timer
The period of time to wait after receiving an unregister request for an attribute before
deleting the attribute. Current attributes are a VLAN or multicast group. This may be
considered a buffer time for another station to assert registration for the same attribute in
order to maintain uninterrupted service. There is an instance of this timer on a per-Port,
per-GARP participant basis. Permissible values are 20 to 600 centiseconds (0.2 to 6.0
seconds). The factory default is 60 centiseconds (0.6 seconds).
Switching Commands
93
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
LeaveAll Timer
This Leave All Time controls how frequently LeaveAll PDUs are generated. A LeaveAll
PDU indicates that all registrations will shortly be deregistered. Participants will need to
rejoin in order to maintain registration. There is an instance of this timer on a per-Port,
per-GARP participant basis. The Leave All Period Timer is set to a random value in the
range of LeaveAllTime to 1.5*LeaveAllTime. Permissible values are 200 to 6000
centiseconds (2 to 60 seconds). The factory default is 1000 centiseconds (10 seconds).
Port GVMRP
Mode
The GVRP administrative mode for the port, which is enabled or disabled (default). If this
parameter is disabled, Join Time, Leave Time and Leave All Time have no effect.
GMRP Commands
This section describes the commands you use to configure and view GARP Multicast
Registration Protocol (GMRP) information. Like IGMP snooping, GMRP helps control the
flooding of multicast packets. GMRP-enabled switches dynamically register and de-register
group membership information with the MAC networking devices attached to the same
segment. GMRP also allows group membership information to propagate across all
networking devices in the bridged LAN that support Extended Filtering Services.
Note: If GMRP is disabled, the system does not forward GMRP
messages.
set gmrp adminmode
This command enables GARP Multicast Registration Protocol (GMRP) on the system.
Default
disabled
Format
Mode
set gmrp adminmode
Privileged EXEC
no set gmrp adminmode
This command disables GARP Multicast Registration Protocol (GMRP) on the system.
Format
Mode
no set gmrp adminmode
Privileged EXEC
set gmrp interfacemode
This command enables GARP Multicast Registration Protocol on a single interface (Interface
Config mode) or all interfaces (Global Config mode). If an interface which has GARP enabled
is enabled for routing or is enlisted as a member of a port-channel (LAG), GARP functionality
Switching Commands
94
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
is disabled on that interface. GARP functionality is subsequently re-enabled if routing is
disabled and port-channel (LAG) membership is removed from an interface that has GARP
enabled.
Default
disabled
Format
Mode
set gmrp interfacemode
• Interface Config
• Global Config
no set gmrp interfacemode
This command disables GARP Multicast Registration Protocol on a single interface or all
interfaces. If an interface which has GARP enabled is enabled for routing or is enlisted as a
member of a port-channel (LAG), GARP functionality is disabled. GARP functionality is
subsequently re-enabled if routing is disabled and port-channel (LAG) membership is
removed from an interface that has GARP enabled.
Format
Mode
no set gmrp interfacemode
• Interface Config
• Global Config
show gmrp configuration
This command displays Generic Attributes Registration Protocol (GARP) information for one
or all interfaces.
Format
Mode
show gmrp configuration {<unit/slot/port> | all}
• Privileged EXEC
• User EXEC
Term
Definition
Interface
The unit/slot/port of the interface that this row in the table describes.
Join Timer
The interval between the transmission of GARP PDUs registering (or re-registering)
membership for an attribute. Current attributes are a VLAN or multicast group. There is
an instance of this timer on a per-port, per-GARP participant basis. Permissible values
are 10 to 100 centiseconds (0.1 to 1.0 seconds). The factory default is 20 centiseconds
(0.2 seconds). The finest granularity of specification is 1 centisecond (0.01 seconds).
Leave Timer
The period of time to wait after receiving an unregister request for an attribute before
deleting the attribute. Current attributes are a VLAN or multicast group. This may be
considered a buffer time for another station to assert registration for the same attribute in
order to maintain uninterrupted service. There is an instance of this timer on a per-Port,
per-GARP participant basis. Permissible values are 20 to 600 centiseconds (0.2 to 6.0
seconds). The factory default is 60 centiseconds (0.6 seconds).
Switching Commands
95
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
LeaveAll Timer
This Leave All Time controls how frequently LeaveAll PDUs are generated. A LeaveAll
PDU indicates that all registrations will shortly be deregistered. Participants will need to
rejoin in order to maintain registration. There is an instance of this timer on a per-Port,
per-GARP participant basis. The Leave All Period Timer is set to a random value in the
range of LeaveAllTime to 1.5*LeaveAllTime. Permissible values are 200 to 6000
centiseconds (2 to 60 seconds). The factory default is 1000 centiseconds (10 seconds).
Port GMRP
Mode
The GMRP administrative mode for the port. It may be enabled or disabled. If this
parameter is disabled, Join Time, Leave Time and Leave All Time have no effect.
show mac-address-table gmrp
This command displays the GMRP entries in the Multicast Forwarding Database (MFDB)
table.
Format
Mode
show mac-address-table gmrp
Privileged EXEC
Term
Definition
Mac Address
A unicast MAC address for which the switch has forwarding and or filtering information.
The format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for
example 01:23:45:67:89:AB. In an IVL system the MAC address is displayed as 8 bytes.
Type
The type of the entry. Static entries are those that are configured by the end user.
Dynamic entries are added to the table as a result of a learning process or protocol.
Description
Interfaces
The text description of this multicast table entry.
The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
Port-Based Network Access Control Commands
This section describes the commands you use to configure port-based network access
control (802.1x). Port-based network access control allows you to permit access to network
services only to and devices that are authorized and authenticated.
clear dot1x statistics
This command resets the 802.1x statistics for the specified port or for all ports.
Format
Mode
clear dot1x statistics{<unit/slot/port> | all}
Privileged EXEC
Switching Commands
96
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear radius statistics
This command is used to clear all RADIUS statistics.
Format
Mode
clear radius statistics
Privileged EXEC
dot1x guest-vlan
This command configures VLAN as guest vlan on a per port basis. The command specifies
an active VLAN as an IEEE 802.1x guest VLAN. The range is 1 to the maximum VLAN ID
supported by the platform.
Default
disabled
Format
Mode
dot1x guest-vlan <vlan-id>
Interface Config
no dot1x guest-vlan
This command disables Guest VLAN on the interface.
Default
disabled
Format
Mode
no dot1x guest-vlan
Interface Config
dot1x initialize
This command begins the initialization sequence on the specified port. This command is only
valid if the control mode for the specified port is “auto” or “mac-based”. If the control mode is
not 'auto' or “mac-based”, an error will be returned.
Format
Mode
dot1x initialize<unit/slot/port>
Privileged EXEC
dot1x mac-auth-bypass
This command enables MAC-Based Authentication Bypass (MAB) for 802.1x-unaware
clients. MAB provides 802.1x-unaware clients controlled access to the network using the
devices’ MAC address as an identifier. This requires that the known and allowable MAC
address and corresponding access rights be pre-populated in the authentication server. MAB
works only when the port control mode of the port is MAC-based.
Format
Mode
dot1x mac-auth-bypass
Interface Config
Switching Commands
97
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no dot1x mac-auth-bypass
This command disables MAB for 802.1x-unaware clients.
Format
Mode
no dot1x mac-auth-bypass
Interface Config
dot1x max-req
This command sets the maximum number of times the authenticator state machine on this
port will transmit an EAPOL EAP Request/Identity frame before timing out the supplicant. The
<count>value must be in the range 1 - 10.
Default
2
Format
Mode
dot1x max-req<count>
Interface Config
no dot1x max-req
This command sets the maximum number of times the authenticator state machine on this
port will transmit an EAPOL EAP Request/Identity frame before timing out the supplicant.
Format
Mode
no dot1x max-req
Interface Config
dot1x max-users
Use this command to set the maximum number of clients supported on the port when
MAC-based dot1x authentication is enabled on the port. The maximum users supported per
port is dependent on the product. The <count>value is in the range 1 - 48.
Default
48
Format
Mode
dot1x max-users<count>
Interface Config
no dot1x max-users
This command resets the maximum number of clients allowed per port to its default value.
Format
Mode
no dot1x max-req
Interface Config
Switching Commands
98
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dot1x port-control
This command sets the authentication mode to use on the specified port. Select
force-unauthorizedto specify that the authenticator PAE unconditionally sets the
controlled port to unauthorized. Select force-authorizedto specify that the authenticator
PAE unconditionally sets the controlled port to authorized. Select autoto specify that the
authenticator PAE sets the controlled port mode to reflect the outcome of the authentication
exchanges between the supplicant, authenticator and the authentication server. If the
mac-basedoption is specified, then MAC-based dot1x authentication is enabled on the port.
Default
auto
Format
Mode
dot1x port-control {force-unauthorized | force-authorized | auto |
mac-based}
Interface Config
no dot1x port-control
This command sets the 802.1x port control mode on the specified port to the default value.
Format
Mode
no dot1x port-control
Interface Config
dot1x port-control all
This command sets the authentication mode to use on all ports. Select
force-unauthorizedto specify that the authenticator PAE unconditionally sets the
controlled port to unauthorized. Select force-authorizedto specify that the authenticator
PAE unconditionally sets the controlled port to authorized. Select autoto specify that the
authenticator PAE sets the controlled port mode to reflect the outcome of the authentication
exchanges between the supplicant, authenticator and the authentication server. If the
mac-basedoption is specified, then MAC-based dot1x authentication is enabled on the port.
Default
auto
Format
Mode
dot1x port-control all {force-unauthorized | force-authorized | auto
| mac-based}
Global Config
no dot1x port-control all
This command sets the authentication mode on all ports to the default value.
Format
Mode
no dot1x port-control all
Global Config
Switching Commands
99
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dot1x re-authenticate
This command begins the re-authentication sequence on the specified port. This command is
only valid if the control mode for the specified port is “auto” or “mac-based”. If the control
mode is not “auto” or “mac-based”, an error will be returned.
Format
Mode
dot1x re-authenticate <unit/slot/port>
Privileged EXEC
dot1x re-authentication
This command enables re-authentication of the supplicant for the specified port.
Default
disabled
Format
Mode
dot1x re-authentication
Interface Config
no dot1x re-authentication
This command disables re-authentication of the supplicant for the specified port.
Format
Mode
no dot1x re-authentication
Interface Config
dot1x system-auth-control
Use this command to enable the dot1x authentication support on the switch. While disabled,
the dot1x configuration is retained and can be changed, but is not activated.
Default
disabled
Format
Mode
dot1x system-auth-control
Global Config
no dot1x system-auth-control
This command is used to disable the dot1x authentication support on the switch.
Format
Mode
no dot1x system-auth-control
Global Config
Switching Commands
100
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dot1x timeout
This command sets the value, in seconds, of the timer used by the authenticator state
machine on this port. Depending on the token used and the value (in seconds) passed,
various timeout configurable parameters are set. The following tokens are supported:
Tokens
Definition
guest-vlan-period
The time, in seconds, for which the authenticator waits to see if any EAPOL packets are
received on a port before authorizing the port and placing the port in the guest vlan (if
configured). The guest vlan timer is only relevant when guest vlan has been configured
on that specific port.
reauth-period
quiet-period
tx-period
The value, in seconds, of the timer used by the authenticator state machine on this port
to determine when re-authentication of the supplicant takes place. The reauth-period
must be a value in the range 1 - 65535.
The value, in seconds, of the timer used by the authenticator state machine on this port
to define periods of time in which it will not attempt to acquire a supplicant. The
quiet-period must be a value in the range 0 - 65535.
The value, in seconds, of the timer used by the authenticator state machine on this port
to determine when to send an EAPOL EAP Request/Identity frame to the supplicant. The
quiet-period must be a value in the range 1 - 65535.
supp-timeout
server-timeout
The value, in seconds, of the timer used by the authenticator state machine on this port
to timeout the supplicant. The supp-timeout must be a value in the range 1 - 65535.
The value, in seconds, of the timer used by the authenticator state machine on this port
to timeout the authentication server. The supp-timeout must be a value in the range 1 -
65535.
Default
• guest-vlan-period: 90 seconds
• reauth-period: 3600 seconds
• quiet-period: 60 seconds
• tx-period: 30 seconds
• supp-timeout: 30 seconds
• server-timeout: 30 seconds
Format
Mode
dot1x timeout {{guest-vlan-period <seconds>} |{reauth-period
<seconds>} | {quiet-period <seconds>} | {tx-period <seconds>} |
{supp-timeout <seconds>} | {server-timeout <seconds>}}
Interface Config
no dot1x timeout
This command sets the value, in seconds, of the timer used by the authenticator state
machine on this port to the default values. Depending on the token used, the corresponding
default values are set.
Format
Mode
no dot1x timeout {guest-vlan-period | reauth-period | quiet-period |
tx-period | supp-timeout | server-timeout}
Interface Config
Switching Commands
101
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dot1x unauthenticated-vlan
Use this command to configure the unauthenticated VLAN associated with that port. The
unauthenticated VLAN ID can be a valid VLAN ID from 0-Maximum supported VLAN ID
(4093 for 7000 series). The unauthenticated VLAN must be statically configured in the VLAN
database to be operational. By default, the unauthenticated VLAN is 0, i.e. invalid and not
operational.
Default
0
Format
Mode
dot1x unauthenticated-vlan <vlan id>
Interface Config
no dot1x unauthenticated-vlan
This command resets the unauthenticated-vlan associated with the port to its default value.
Format
Mode
no dot1x unauthenticated-vlan
Interface Config
dot1x user
This command adds the specified user to the list of users with access to the specified port or
all ports. The <user>parameter must be a configured user.
Format
Mode
dot1x user <user> {<unit/slot/port> | all}
Global Config
no dot1x user
This command removes the user from the list of users with access to the specified port or all
ports.
Format
Mode
no dot1x user <user> {<unit/slot/port> | all}
Global Config
clear dot1x authentication-history
This command clears the authentication history table captured during successful and
unsuccessful authentication on all interface or the specified interface.
Format
Mode
clear dot1x authentication-history [unit/slot/port]
Global Config
Switching Commands
102
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dot1x dynamic-vlan enable
Use this command to enable the switch to create VLANs dynamically when a RADIUS
assigned VLAN does not exist in the switch.
Format
dot1x dynamic-vlan enable
Global Config
Mode
Default
Disabled
no dot1x dynamic-vlan enable
Use this command to disable the switch from creating VLANs dynamically when a RADIUS
assigned VLAN does not exist in the switch.
Format
Mode
no dot1x dynamic-vlan enable
Global Config
dot1x system-auth-control monitor
Use this command to enable the 802.1X monitor mode on the switch. The purpose of Monitor
mode is to help troubleshoot port-based authentication configuration issues without
disrupting network access for hosts connected to the switch. In Monitor mode, a host is
granted network access to an 802.1X-enabled port even if it fails the authentication process.
The results of the process are logged for diagnostic purposes.
Format
Mode
dot1x system-auth-control monitor
Global Config
Disabled
Default
no dot1x system-auth-control monitor
Use this command to disable the 802.1X monitor on the switch.
Format
Mode
no dot1x system-auth-control monitor
Global Config
show dot1x authentication-history
This command displays 802.1X authentication events and information during successful and
unsuccessful Dot1x authentication process for all interfaces or the specified interface. Use
the optional keywords to display only failure authentication events in summary or in detail.
Format
Mode
show dot1x authentication-history {unit/slot/port | all}
[failedauth-only] [detail]
Privileged EXEC
Switching Commands
103
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Time Stamp
The exact time at which the event occurs.
Physical Port on which the event occurs.
The supplicant/client MAC address.
Interface
Mac-Address
VLAN assigned
The VLAN assigned to the client/port on authentication.
VLAN assigned
Reason
The type of VLAN ID assigned, which can be Guest VLAN, Unauth, Default, RADIUS
Assigned, or Monitor Mode VLAN ID.
Auth Status
Reason
The authentication status.
The actual reason behind the successful or failed authentication.
show authentication methods
This command displays information about the authentication methods.
Format
Mode
show authentication methods
Privileged EXEC
The following is an example of this command:
Login Authentication Method Lists
________________________________
Console_Default: None
Network_Default:Local
Enable Authentication Lists
_____________________
Console_Default: Enable None
Network_Default:Enable
Line Login Method List Enable Method Lists
_____________________
Console Console_Default Console_Default
Telnet Network_Default Network_Default
SSH Network_Default Network_Default
http : Local
https : Local
dot1x :
show dot1x
This command is used to show a summary of the global dot1x configuration, summary
information of the dot1x configuration for a specified port or all ports, the detailed dot1x
Switching Commands
104
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
configuration for a specified port and the dot1x statistics for a specified port - depending on
the tokens used.
Format
Mode
show dot1x[{summary {<unit/slot/port> | all} | detail
<unit/slot/port> | statistics <unit/slot/port>]
Privileged EXEC
If you do not use the optional parameters <unit/slot/port>or <vlanid>, the command
displays the global dot1x mode, the VLAN Assignment mode, and the Dynamic VLAN
Creation mode.
Term
Definition
Administrative
Mode
Indicates whether authentication control on the switch is enabled or disabled.
VLAN
Assignment
Mode
Indicates whether assignment of an authorized port to a RADIUS assigned VLAN is
allowed (enabled) or not (disabled).
Dynamic VLAN
Creation Mode
Indicates whether the switch can dynamically create a RADIUS-assigned VLAN if it does
not currently exist on the switch.
Monitor Mode
Indicates whether the Dot1x Monitor mode on the switch is enabled or disabled.
If you use the optional parameter summary {<unit/slot/port> | all}, the dot1x
configuration for the specified port or all ports are displayed.
Term
Definition
Interface
The interface whose configuration is displayed.
Control Mode
The configured control mode for this port. Possible values are force-unauthorized |
force-authorized | auto | mac-based | authorized | unauthorized.
Operating
Control Mode
The control mode under which this port is operating. Possible values are authorized |
unauthorized.
Reauthenticatio
n Enabled
Indicates whether re-authentication is enabled on this port.
Port Status
Indicates whether the port is authorized or unauthorized. Possible values are authorized
| unauthorized.
If you use the optional parameter 'detail<unit/slot/port>', the detailed dot1x
configuration for the specified port is displayed.
Term
Definition
Port
The interface whose configuration is displayed.
Protocol Version
The protocol version associated with this port. The only possible value is 1,
corresponding to the first version of the dot1x specification.
PAE Capabilities
The port access entity (PAE) functionality of this port. Possible values are Authenticator
or Supplicant.
Switching Commands
105
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Control Mode
The configured control mode for this port. Possible values are force-unauthorized |
force-authorized | auto | mac-based.
Authenticator
PAE State
Current state of the authenticator PAE state machine. Possible values are Initialize,
Disconnected, Connecting, Authenticating, Authenticated, Aborting, Held,
ForceAuthorized, and ForceUnauthorized. When MAC-based authentication is enabled
on the port, this parameter is deprecated.
Backend
Authentication
State
Current state of the backend authentication state machine. Possible values are
Request, Response, Success, Fail, Timeout, Idle, and Initialize. When MAC-based
authentication is enabled on the port, this parameter is deprecated.
Quiet Period
The timer used by the authenticator state machine on this port to define periods of time
in which it will not attempt to acquire a supplicant. The value is expressed in seconds
and will be in the range 0 and 65535.
Transmit Period
The timer used by the authenticator state machine on the specified port to determine
when to send an EAPOL EAP Request/Identity frame to the supplicant. The value is
expressed in seconds and will be in the range of 1 and 65535.
Guest-VLAN ID
The guest VLAN identifier configured on the interface.
Guest VLAN
Period
The time in seconds for which the authenticator waits before authorizing and placing the
port in the Guest VLAN, if no EAPOL packets are detected on that port.
Supplicant
Timeout
The timer used by the authenticator state machine on this port to timeout the supplicant.
The value is expressed in seconds and will be in the range of 1 and 65535.
Server Timeout
The timer used by the authenticator on this port to timeout the authentication server.
The value is expressed in seconds and will be in the range of 1 and 65535.
Maximum
Requests
The maximum number of times the authenticator state machine on this port will
retransmit an EAPOL EAP Request/Identity before timing out the supplicant. The value
will be in the range of 1 and 10.
VLAN Id
The VLAN assigned to the port by the radius server. This is only valid when the port
control mode is not Mac-based.
VLAN Assigned
Reason
The reason the VLAN identified in the VLAN Idfield has been assigned to the port.
Possible values are RADIUS, Unauthenticated VLAN, Guest VLAN, default, and Not
Assigned. When the VLAN Assigned Reason is ‘Not Assigned’, it means that the port
has not been assigned to any VLAN by dot1x. This only valid when the port control
mode is not MAC-based.
Reauthentication
Period
The timer used by the authenticator state machine on this port to determine when
reauthentication of the supplicant takes place. The value is expressed in seconds and
will be in the range of 1 and 65535.
Reauthentication
Enabled
Indicates if reauthentication is enabled on this port. Possible values are ‘True” or
“False”.
Key
Transmission
Enabled
Indicates if the key is transmitted to the supplicant for the specified port. Possible values
are True or False.
Control Direction
The control direction for the specified port or ports. Possible values are both or in.
Switching Commands
106
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Maximum Users
The maximum number of clients that can get authenticated on the port in the
MAC-based dot1x authentication mode. This value is used only when the port control
mode is not MAC-based.
Unauthenticated
VLAN ID
Indicates the unauthenticated VLAN configured for this port. This value is valid for the
port only when the port control mode is not MAC-based.
Session Timeout
Indicates the time for which the given session is valid. The time period in seconds is
returned by the RADIUS server on authentication of the port. This value is valid for the
port only when the port control mode is not MAC-based.
Session
Termination
Action
This value indicates the action to be taken once the session timeout expires. Possible
values are Default, Radius-Request. If the value is Default, the session is terminated
the port goes into unauthorized state. If the value is Radius-Request, then a
reauthentication of the client authenticated on the port is performed. This value is valid
for the port only when the port control mode is not MAC-based.
The show dot1x detail <unit/slot/port>command will display the following
MAC-based dot1x fields if the port-control mode for that specific port is MAC-based. For each
client authenticated on the port, the show dot1x detail <unit/slot/port>command will
display the following MAC-based dot1x parameters if the port-control mode for that specific
port is MAC-based.
Term
Definition
Supplicant
MAC-Address
The MAC-address of the supplicant.
Authenticator
PAE State
Current state of the authenticator PAE state machine. Possible values are Initialize,
Disconnected, Connecting, Authenticating, Authenticated, Aborting, Held,
ForceAuthorized, and ForceUnauthorized.
Backend
Authentication
State
Current state of the backend authentication state machine. Possible values are Request,
Response, Success, Fail, Timeout, Idle, and Initialize.
VLAN-Assigned
Logical Port
The VLAN assigned to the client by the radius server.
The logical port number associated with the client.
If you use the optional parameter statistics<unit/slot/port>, the following dot1x
statistics for the specified port appear.
Term
Definition
Port
The interface whose statistics are displayed.
EAPOL Frames
Received
The number of valid EAPOL frames of any type that have been received by this
authenticator.
EAPOL Frames
Transmitted
The number of EAPOL frames of any type that have been transmitted by this
authenticator.
EAPOL Start
Frames
The number of EAPOL start frames that have been received by this authenticator.
Received
Switching Commands
107
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
EAPOL Logoff
Frames
The number of EAPOL logoff frames that have been received by this authenticator.
Received
Last EAPOL
Frame Version
The protocol version number carried in the most recently received EAPOL frame.
The source MAC address carried in the most recently received EAPOL frame.
Last EAPOL
Frame Source
EAP
Response/Id
Frames
The number of EAP response/identity frames that have been received by this
authenticator.
Received
EAP Response
Frames
Received
The number of valid EAP response frames (other than resp/id frames) that have been
received by this authenticator.
EAP Request/Id
Frames
Transmitted
The number of EAP request/identity frames that have been transmitted by this
authenticator.
EAP Request
Frames
Transmitted
The number of EAP request frames (other than request/identity frames) that have been
transmitted by this authenticator.
Invalid EAPOL
Frames
Received
The number of EAPOL frames that have been received by this authenticator in which the
frame type is not recognized.
EAP Length
Error Frames
Received
The number of EAPOL frames that have been received by this authenticator in which the
frame type is not recognized.
show dot1x clients
This command displays 802.1x client information. This command also displays information
about the number of clients that are authenticated using Monitor mode and using 802.1X.
Format
Mode
show dot1x clients {<unit/slot/port> | all}
Privileged EXEC
Term
Definition
Clients
Indicates the number of the Dot1x clients authenticated using Monitor mode.
Authenticated
using Monitor
Mode
Clients
Authenticated
using Dot1x
Indicates the number of Dot1x clients authenticated using 802.1x authentication process.
Logical
Interface
The logical port number associated with a client.
Interface
The physical port to which the supplicant is associated.
Switching Commands
108
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
User Name
The user name used by the client to authenticate to the server.
The supplicant device MAC address.
SupplicantMAC
Address
Session Time
Filter ID
The time since the supplicant is logged on.
Identifies the Filter ID returned by the RADIUS server when the client was authenticated.
This is a configured DiffServ policy name on the switch.
VLAN ID
The VLAN assigned to the port.
VLAN Assigned
The reason the VLAN identified in the VLAN ID field has been assigned to the port.
Possible values are RADIUS, Unauthenticated VLAN, or Default. When the VLAN
Assigned reason is Default, it means that the VLAN was assigned to the port because
the PVID of the port was that VLAN ID.
Session
Timeout
This value indicates the time for which the given session is valid. The time period in
seconds is returned by the RADIUS server on authentication of the port. This value is
valid for the port only when the port-control mode is not MAC-based.
Session
Termination
Action
This value indicates the action to be taken once the session timeout expires. Possible
values are Default and Radius-Request. If the value is Default, the session is terminated
and client details are cleared. If the value is Radius-Request, then a reauthentication of
the client is performed.
show dot1x users
This command displays 802.1x port security user information for locally configured users.
Format
Mode
show dot1x users<unit/slot/port>
Privileged EXEC
Term
Definition
Users
Users configured locally to have access to the specified port.
802.1X Supplicant Commands
802.1X (“dot1x”) supplicant functionality is on point-to-point ports. The administrator can
configure the user name and password used in authentication and capabilities of the
supplicant port.
Switching Commands
109
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dot1x pae
Use this command to set the port’s dot1x role. The port can serve as either a supplicant or an
authenticator.
Format
Mode
dot1x pae {supplicant | authenticator}
Interface Config
dot1x supplicant port-control
Use this command to set the ports authorization state (Authorized or Unauthorized) either
manually or by setting the port to auto-authorize upon startup. By default all the ports are
authenticators. If the port’s attribute needs to be moved from <authenticator to supplicant> or
<supplicant to authenticator>, use this command.
Format
Mode
dot1x supplicant port-control {auto | force-authorized |
force_unauthorized}
Interface Config
Term
auto
Description
The port is in the Unauthorized state until it presents its user name and password
credentials to an authenticator. If the authenticator authorizes the port, then it is placed
in the Authorized state.
force-authorized
Sets the authorization state of the port to Authorized, bypassing the authentication
process.
force-
unauthorized
Sets the authorization state of the port to Unauthorized, bypassing the authentication
process.
no dot1x supplicant port-control
Use this command to set the port-control mode to the default, auto.
Default
Auto
Format
Mode
no dot1x supplicant port-control
Interface Config
dot1x supplicant max-start
Use this command to configure the number of attempts that the supplicant makes to find the
authenticator before the supplicant assumes that there is no authenticator.
Default
3
Format
Mode
dot1x supplicant max-start <1-10>
Interface Config
Switching Commands
110
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no dot1x supplicant max-start
Use this command to set the max-start value to the default.
Format
Mode
no dot1x supplicant max-start
Interface Config
dot1x supplicant timeout start-period
Use this command to configure the start period timer interval to wait for the EAP identity
request from the authenticator.
Default
30 seconds
Format
Mode
dot1x supplicant timeout start-period <1-65535 seconds>
Interface Config
no dot1x supplicant timeout start-period
Use this command to set the start-period value to the default.
Format
Mode
no dot1x supplicant timeout start-period
Interface Config
dot1x supplicant timeout held-period
Use this command to configure the held period timer interval to wait for the next
authentication on previous authentication fail.
Default
30 seconds
Format
Mode
dot1x supplicant timeout held-period <1-65535 seconds>
Interface Config
no dot1x supplicant timeout held-period
Use this command to set the held-period value to the default value.
Format
Mode
no dot1x supplicant timeout held-period
Interface Config
Switching Commands
111
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dot1x supplicant timeout auth-period
Use this command to configure the authentication period timer interval to wait for the next
EAP request challenge from the authenticator.
Default
30 seconds
Format
Mode
dot1x supplicant timeout auth-period <1-65535 seconds>
Interface Config
no dot1x supplicant timeout auth-period
Use this command to set the auth-period value to the default value.
Format
Mode
no dot1x supplicant timeout auth-period
Interface Config
dot1x supplicant user
Use this command to map the given user to the port.
Format
Mode
dot1x supplicant user
Interface Config
Storm-Control Commands
This section describes commands you use to configure storm-control and view storm-control
configuration information. A traffic storm is a condition that occurs when incoming packets
flood the LAN, which creates performance degradation in the network. The Storm-Control
feature protects against this condition.
The 7000 series provides broadcast, multicast, and unicast story recovery for individual
interfaces. Unicast Storm-Control protects against traffic whose MAC addresses are not
known by the system. For broadcast, multicast, and unicast storm-control, if the rate of traffic
ingressing on an interface increases beyond the configured threshold for that type, the traffic
is dropped.
To configure storm-control, you will enable the feature for all interfaces or for individual
interfaces, and you will set the threshold (storm-control level) beyond which the broadcast,
multicast, or unicast traffic will be dropped. The Storm-Control feature allows you to limit the
rate of specific types of packets through the switch on a per-port, per-type, basis.
Configuring a storm-control level also enables that form of storm-control. Disabling a
storm-control level (using the “no” version of the command) sets the storm-control level back
to the default value and disables that form of storm-control. Using the “no” version of the
“storm-control” command (not stating a “level”) disables that form of storm-control but
Switching Commands
112
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
maintains the configured “level” (to be active the next time that form of storm-control is
enabled.)
Note: The actual rate of ingress traffic required to activate storm-control is
based on the size of incoming packets and the hard-coded average
packet size of 512 bytes - used to calculate a packet-per-second
(pps) rate - as the forwarding-plane requires pps versus an absolute
rate kbps. For example, if the configured limit is 10%, this is
converted to ~25000 pps, and this pps limit is set in forwarding plane
(hardware). You get the approximate desired output when 512bytes
packets are used.
storm-control broadcast
Use this command to enable broadcast storm recovery mode for a specific interface. If the
mode is enabled, broadcast storm recovery is active and, if the rate of L2 broadcast traffic
ingressing on an interface increases beyond the configured threshold, the traffic will be
dropped. Therefore, the rate of broadcast traffic will be limited to the configured threshold.
Default
enabled
Format
Mode
storm-control broadcast
Interface Config
no storm-control broadcast
Use this command to disable broadcast storm recovery mode for a specific interface.
Format
Mode
no storm-control broadcast
Interface Config
storm-control broadcast level
Use this command to configure the broadcast storm recovery threshold for an interface as a
percentage of link speed and enable broadcast storm recovery. If the mode is enabled,
broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an
interface increases beyond the configured threshold, the traffic is dropped. Therefore, the
rate of broadcast traffic is limited to the configured threshold.
Default
5
Format
Mode
storm-control broadcast level<0-100>
Interface Config
Switching Commands
113
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no storm-control broadcast level
This command sets the broadcast storm recovery threshold to the default value for an
interface and disables broadcast storm recovery.
Format
Mode
no storm-control broadcast level
Interface Config
storm-control broadcast rate
Use this command to configure the broadcast storm recovery threshold for an interface in
packets per second. If the mode is enabled, broadcast storm recovery is active, and if the
rate of L2 broadcast traffic ingressing on an interface increases beyond the configured
threshold, the traffic is dropped. Therefore, the rate of broadcast traffic is limited to the
configured threshold.
Default
0
Format
Mode
storm-control broadcast rate <0-14880000>
Interface Config
no storm-control broadcast rate
This command sets the broadcast storm recovery threshold to the default value for an
interface and disables broadcast storm recovery.
Format
Mode
no storm-control broadcast rate
Interface Config
storm-control broadcast (Global)
This command enables broadcast storm recovery mode for all interfaces. If the mode is
enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing
on an interface increases beyond the configured threshold, the traffic will be dropped.
Therefore, the rate of broadcast traffic will be limited to the configured threshold.
Default
disabled
Format
Mode
storm-control broadcast
Global Config
no storm-control broadcast
This command disables broadcast storm recovery mode for all interfaces.
Format
Mode
no storm-control broadcast
Global Config
Switching Commands
114
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
storm-control broadcast level (Global)
This command configures the broadcast storm recovery threshold for all interfaces as a
percentage of link speed and enables broadcast storm recovery. If the mode is enabled,
broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an
interface increases beyond the configured threshold, the traffic will be dropped. Therefore,
the rate of broadcast traffic will be limited to the configured threshold. This command also
enables broadcast storm recovery mode for all interfaces.
Default
5
Format
Mode
storm-control broadcast level<0-100>
Global Config
no storm-control broadcast level
This command sets the broadcast storm recovery threshold to the default value for all
interfaces and disables broadcast storm recovery.
Format
Mode
no storm-control broadcast level
Global Config
storm-control broadcast rate (Global)
Use this command to configure the broadcast storm recovery threshold for all interfaces in
packets per second. If the mode is enabled, broadcast storm recovery is active, and if the
rate of L2 broadcast traffic ingressing on an interface increases beyond the configured
threshold, the traffic is dropped. Therefore, the rate of broadcast traffic is limited to the
configured threshold.
Default
0
Format
Mode
storm-control broadcast rate <0-14880000>
Global Config
no storm-control broadcast rate
This command sets the broadcast storm recovery threshold to the default value for all
interfaces and disables broadcast storm recovery.
Format
Mode
no storm-control broadcast rate
Global Config
storm-control multicast
This command enables multicast storm recovery mode for an interface. If the mode is
enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on
Switching Commands
115
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
an interface increases beyond the configured threshold, the traffic will be dropped. Therefore,
the rate of multicast traffic will be limited to the configured threshold.
Default
disabled
Format
Mode
storm-control multicast
Interface Config
no storm-control multicast
This command disables multicast storm recovery mode for an interface.
Format
Mode
no storm-control multicast
Interface Config
storm-control multicast level
This command configures the multicast storm recovery threshold for an interface as a
percentage of link speed and enables multicast storm recovery mode. If the mode is enabled,
multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an
interface increases beyond the configured threshold, the traffic will be dropped. Therefore,
the rate of multicast traffic will be limited to the configured threshold.
Default
5
Format
Mode
storm-control multicast level <0-100>
Interface Config
no storm-control multicast level
This command sets the multicast storm recovery threshold to the default value for an
interface and disables multicast storm recovery.
Format
Mode
no storm-control multicast level <0-100>
Interface Config
storm-control multicast rate
Use this command to configure the multicast storm recovery threshold for an interface in
packets per second. If the mode is enabled, multicast storm recovery is active, and if the rate
of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold,
the traffic is dropped. Therefore, the rate of multicast traffic is limited to the configured
threshold.
Default
0
Switching Commands
116
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
storm-control multicast rate <0-14880000>
Interface Config
no storm-control multicast rate
This command sets the multicast storm recovery threshold to the default value for an
interface and disables multicast storm recovery.
Format
Mode
no storm-control multicast rate
Interface Config
storm-control multicast (Global)
This command enables multicast storm recovery mode for all interfaces. If the mode is
enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on
an interface increases beyond the configured threshold, the traffic will be dropped. Therefore,
the rate of multicast traffic will be limited to the configured threshold.
Default
disabled
Format
Mode
storm-control multicast
Global Config
no storm-control multicast
This command disables multicast storm recovery mode for all interfaces.
Format
Mode
no storm-control multicast
Global Config
storm-control multicast level (Global)
This command configures the multicast storm recovery threshold for all interfaces as a
percentage of link speed and enables multicast storm recovery mode. If the mode is enabled,
multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an
interface increases beyond the configured threshold, the traffic will be dropped. Therefore,
the rate of multicast traffic will be limited to the configured threshold.
Default
5
Format
Mode
storm-control multicast level<0-100>
Global Config
Switching Commands
117
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no storm-control multicast level
This command sets the multicast storm recovery threshold to the default value for all
interfaces and disables multicast storm recovery.
Format
Mode
no storm-control multicast level
Global Config
storm-control multicast rate (Global)
Use this command to configure the multicast storm recovery threshold for all interfaces in
packets per second. If the mode is enabled, multicast storm recovery is active, and if the rate
of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold,
the traffic is dropped. Therefore, the rate of multicast traffic is limited to the configured
threshold.
Default
0
Format
Mode
storm-control multicast rate <0-14880000>
Global Config
no storm-control broadcast rate
This command sets the broadcast storm recovery threshold to the default value for all
interfaces and disables broadcast storm recovery.
Format
Mode
no storm-control broadcast rate
Global Config
storm-control unicast
This command enables unicast storm recovery mode for an interface. If the mode is enabled,
unicast storm recovery is active, and if the rate of unknown L2 unicast (destination lookup
failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic
will be dropped. Therefore, the rate of unknown unicast traffic will be limited to the configured
threshold.
Default
disabled
Format
Mode
storm-control unicast
Interface Config
Switching Commands
118
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no storm-control unicast
This command disables unicast storm recovery mode for an interface.
Format
Mode
no storm-control unicast
Interface Config
storm-control unicast level
This command configures the unicast storm recovery threshold for an interface as a
percentage of link speed, and enables unicast storm recovery. If the mode is enabled, unicast
storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure)
traffic ingressing on an interface increases beyond the configured threshold, the traffic will be
dropped. Therefore, the rate of unknown unicast traffic will be limited to the configured
threshold. This command also enables unicast storm recovery mode for an interface.
Default
5
Format
Mode
storm-control unicast level <0-100>
Interface Config
no storm-control unicast level
This command sets the unicast storm recovery threshold to the default value for an interface
and disables unicast storm recovery.
Format
Mode
no storm-control unicast level
Interface Config
storm-control unicast rate
Use this command to configure the unicast storm recovery threshold for an interface in
packets per second. If the mode is enabled, unicast storm recovery is active, and if the rate of
L2 broadcast traffic ingressing on an interface increases beyond the configured threshold,
the traffic is dropped. Therefore, the rate of unicast traffic is limited to the configured
threshold.
Default
0
Format
Mode
storm-control unicast rate <0-14880000>
Interface Config
Switching Commands
119
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no storm-control unicast rate
This command sets the unicast storm recovery threshold to the default value for an interface
and disables unicast storm recovery.
Format
Mode
no storm-control unicast rate
Interface Config
storm-control unicast (Global)
This command enables unicast storm recovery mode for all interfaces. If the mode is
enabled, unicast storm recovery is active, and if the rate of unknown L2 unicast (destination
lookup failure) traffic ingressing on an interface increases beyond the configured threshold,
the traffic will be dropped. Therefore, the rate of unknown unicast traffic will be limited to the
configured threshold.
Default
disabled
Format
Mode
storm-control unicast
Global Config
no storm-control unicast
This command disables unicast storm recovery mode for all interfaces.
Format
Mode
no storm-control unicast
Global Config
storm-control unicast level (Global)
This command configures the unicast storm recovery threshold for all interfaces as a
percentage of link speed, and enables unicast storm recovery. If the mode is enabled, unicast
storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure)
traffic ingressing on an interface increases beyond the configured threshold, the traffic will be
dropped. Therefore, the rate of unknown unicast traffic will be limited to the configured
threshold.
Default
5
Format
Mode
storm-control unicast level <0-100>
Global Config
Switching Commands
120
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no storm-control unicast level
This command sets the unicast storm recovery threshold to the default value and disables
unicast storm recovery for all interfaces.
Format
Mode
no storm-control unicast level
Global Config
storm-control unicast rate (Global)
Use this command to configure the unicast storm recovery threshold for all interfaces in
packets per second. If the mode is enabled, unicast storm recovery is active, and if the rate of
L2 broadcast traffic ingressing on an interface increases beyond the configured threshold,
the traffic is dropped. Therefore, the rate of unicast traffic is limited to the configured
threshold.
Default
0
Format
Mode
storm-control unicast rate <0-14880000>
Global Config
no storm-control unicast rate
This command sets the multicast storm recovery threshold to the default value for an
interface and disables multicast storm recovery.
Format
Mode
no storm-control unicast rate
Global Config
show storm-control
This command displays switch configuration information. If you do not use any of the optional
parameters, this command displays global storm control configuration parameters:
•
•
•
•
•
•
Broadcast Storm Control Mode may be enabled or disabled. The factory default is
disabled.
Broadcast Storm Control Level The broadcast storm control level. The factory default is
5%.
Multicast Storm Control Mode may be enabled or disabled. The factory default is
disabled.
Multicast Storm Control Level The multicast storm control level. The factory default is
5%.
Unicast Storm Control Mode may be enabled or disabled. The factory default is
disabled.
Unicast Storm Control Level The unicast storm control level. The factory default is 5%.
Switching Commands
121
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Use the allkeyword to display the per-port configuration parameters for all interfaces, or
specify the unit/slot/portto display information about a specific interface.
Format
show storm-control [all | <unit/slot/port>]
Mode
Privileged EXEC
Term
Definition
Bcast Mode
Shows whether the broadcast storm control mode is enabled or disabled. The factory
default is disabled.
Bcast Level
Mcast Mode
Mcast Level
Ucast Mode
The broadcast storm control level.
Shows whether the multicast storm control mode is enabled or disabled.
The multicast storm control level.
Shows whether the Unknown Unicast or DLF (Destination Lookup Failure) storm control
mode is enabled or disabled.
Ucast Level
The Unknown Unicast or DLF (Destination Lookup Failure) storm control level.
Flow Control Commands
In 802.3x flow control, the MAC control PAUSE operation is specified in IEEE 802.3 Annex 31
B. It allows traffic from one device to be throttled for a specified period of time and is defined
for devices that are directly connected. A device that needs to inhibit transmission of data
frames from another device on the LAN transmits a PAUSE frame as defined in the IEEE
specification.
This feature allows the user to configure the switch to use symmetric, asymmetric, or no flow
control. Asymmetric flow control allows the switch to respond to received PAUSE frames, but
the port cannot generate PAUSE frames. Symmetric flow control allows the switch to both
respond to and generate MAC control PAUSE frames.
flowcontrol {symmetric|asymmetric}
Use this command to enable or disable the symmetric or asymmetric flow control on the
switch. Use the no form of command to disable the symmetric or asymmetric flow control.
Asymmetric here means that Tx Pause can never be enabled. Only Rx Pause can be
enabled.
Default
Disabled
Format
Mode
flowcontrol {symmetric|asymmetric}
• Global Config
• Interface Config
Switching Commands
122
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no flowcontrol
Format
Mode
no flowcontrol
• Global Config
• Interface Config
show flowcontrol
Use this command to display the IEEE 802.3 Annex 31B flow control settings and status for a
specific interface or all interfaces. It also displays 802.3 Tx and Rx pause counts. Priority
Flow Control frames counts are not displayed. If the port is enabled for priority flow control,
operational flow control status is displayed as “Inactive”. Operational flow control status for
stacking ports is always displayed as “N/A”.
Format
Mode
show flowcontrol [unit/slot/port]
Privileged Exec
Examples:
(switch)#show flowcontrol
Admin Flow Control: Symmetric
Port
Flow Control
Oper
RxPause
TxPause
------ ------------
-------- ---------
0/1
0/2
Active
Inactive
310
0
611
0
(switch)#show flowcontrol interface 0/1
Admin Flow Control: Symmetric
Port
Flow Control RxPause
Oper
TxPause
--------- -------
0/1 Active
--------
310
-------
611
Port-Channel/LAG (802.3ad) Commands
This section describes the commands you use to configure port-channels, which are also
known as link aggregation groups (LAGs). Link aggregation allows you to combine multiple
full-duplex Ethernet links into a single logical link. Network devices treat the aggregation as if
it were a single link, which increases fault tolerance and provides load sharing. The LAG
feature initially load shares traffic based upon the source and destination MAC
address.Assign the port-channel (LAG) VLAN membership after you create a port-channel. If
you do not assign VLAN membership, the port-channel might become a member of the
management VLAN which can result in learning and switching issues.
Switching Commands
123
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
A port-channel (LAG) interface can be either static or dynamic, but not both. All members of a
port channel must participate in the same protocols.) A static port-channel interface does not
require a partner system to be able to aggregate its member ports.
Note: If you configure the maximum number of dynamic port-channels
(LAGs) that your platform supports, additional port-channels that you
configure are automatically static.
addport
This command adds one port to the port-channel (LAG). The interface is a logical
unit/slot/port number or a group ID of a configured port-channel.
Note: Before adding a port to a port-channel, set the physical mode of the
Format
Mode
addport {<logical unit/slot/port>|lag <lag-group-id>}
Interface Config
deleteport (Interface Config)
This command deletes the port from the port-channel (LAG). The interface is a logical
unit/slot/port number or a group ID of a configured port-channel.
Format
Mode
deleteport {<logical unit/slot/port>|lag <lag-group-id>}
Interface Config
deleteport (Global Config)
This command deletes all configured ports from the port-channel (LAG). The interface is a
logical unit/slot/port number of a configured port-channel. To clear the port channels, see
Format
Mode
deleteport <logical unit/slot/port>
Global Config
Switching Commands
124
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
lacp admin key
Use this command to configure the administrative value of the key for the port-channel. The
value range of <key> is 0 to 65535.
Default
0x8000
Format
Mode
lacp admin key <key>
Interface Config
Note: This command is only applicable to port-channel interfaces.
no lacp admin key
Use this command to configure the default administrative value of the key for the
port-channel.
Format
Mode
no lacp admin key
Interface Config
lacp collector max-delay
Use this command to configure the port-channel collector max delay. The valid range of
<delay> is 0-65535.
Default
0x8000
Format
Mode
lacp collector max-delay <delay>
Interface Config
Note: This command is only applicable to port-channel interfaces.
no lacp collector max delay
Use this command to configure the default port-channel collector max delay.
Format
Mode
no lacp collector max-delay
Interface Config
lacp actor admin
Use this command to configure the LACP actor admin parameters.
Switching Commands
125
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
lacp actor admin key
Use this command to configure the administrative value of the LACP actor admin key. The
valid range for <key> is 0-65535.
Default
Internal Interface Number of this Physical Port
Format
Mode
lacp actor admin key <key>
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp actor admin key
Use this command to configure the default administrative value of the key.
Format
Mode
no lacp actor admin key
Interface Config
lacp actor admin state individual
Use this command to set LACP actor admin state to individual.
Format
Mode
lacp actor admin state individual
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp actor admin state individual
Use this command to set the LACP actor admin state to aggregation.
Format
Mode
no lacp actor admin state individual
Interface Config
lacp actor admin state longtimeout
Use this command to set LACP actor admin state to longtimeout.
Format
Mode
lacp actor admin state longtimeout
Interface Config
Switching Commands
126
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: This command is only applicable to physical interfaces.
no lacp actor admin state longtimeout
Use this command to set the LACP actor admin state to short timeout.
Format
Mode
no lacp actor admin state longtimeout
Interface Config
Note: This command is only applicable to physical interfaces.
lacp actor admin state passive
Use this command to set the LACP actor admin state to passive.
Format
Mode
lacp actor admin state passive
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp actor admin state passive
Use this command to set the LACP actor admin state to active.
Format
Mode
no lacp actor admin state passive
Interface Config
lacp actor port priority
Use this command to configure the priority value assigned to the Aggregation Port. The valid
range for <priority> is 0 to 255.
Default
0x80
Format
Mode
lacp actor port priority <priority>
Interface Config
Note: This command is only applicable to physical interfaces.
Switching Commands
127
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no lacp actor port priority
Use this command to configure the default priority value assigned to the Aggregation Port.
Format
Mode
no lacp actor port priority
Interface Config
lacp actor system priority
Use this command to configure the priority value associated with the LACP Actor’s SystemID.
The range for <priority> is 0 to 65535.
Default
32768
Format
Mode
lacp actor system priority <priority>
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp actor system priority
Use this command to configure the priority value associated with the Actor’s SystemID.
Format
Mode
no lacp actor system priority
Interface Config
lacp partner admin key
Use this command to configure the administrative value of the Key for the protocol partner.
The valid range for <key> is 0 to 65535.
Default
0x0
Format
Mode
lacp partner admin key
Interface Config
Note: This command is only applicable to physical interfaces.
Switching Commands
128
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no lacp partner admin key
Use this command to configure the administrative value of the Key for the protocol partner.
Format
Mode
no lacp partner admin key <key>
Interface Config
lacp partner admin state individual
Use this command to set LACP partner admin state to individual.
Format
Mode
lacp partner admin state individual
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp partner admin state individual
Use this command to set the LACP partner admin state to aggregation.
Format
Mode
no lacp partner admin state individual
Interface Config
lacp partner admin state longtimeout
Use this command to set LACP partner admin state to longtimeout.
Format
Mode
lacp partner admin state longtimeout
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp partner admin state longtimeout
Use this command to set the LACP partner admin state to short timeout.
Format
Mode
no lacp partner admin state longtimeout
Interface Config
Note: This command is only applicable to physical interfaces.
Switching Commands
129
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
lacp partner admin state passive
Use this command to set the LACP partner admin state to passive.
Format
Mode
lacp partner admin state passive
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp partner admin state passive
Use this command to set the LACP partner admin state to active.
Format
Mode
no lacp partner admin state passive
Interface Config
lacp partner port id
Use this command to configure the LACP partner port id. The valid range for <port-id> is 0
to 65535.
Default
0x80
Format
Mode
lacp partner portid <port-id>
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp partner port id
Use this command to set the LACP partner port id to the default.
Format
Mode
no lacp partner portid
Interface Config
lacp partner port priority
Use this command to configure the LACP partner port priority. The valid range for
<priority> is 0 to 255.
Default
0x0
Switching Commands
130
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
lacp partner port priority <priority>
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp partner port priority
Use this command to configure the default LACP partner port priority.
Format
Mode
no lacp partner port priority
Interface Config
lacp partner system id
Use this command to configure the 6-octet MAC Address value representing the
administrative value of the Aggregation Port’s protocol Partner’s System ID. The valid range
of <system-id> is 00:00:00:00:00:00 - FF:FF:FF:FF:FF.
Default
00:00:00:00:00:00
Format
Mode
lacp partner system id <system-id>
Interface Config
Note: This command is only applicable to physical interfaces.
no lacp partner system id
Use this command to configure the default value representing the administrative value of the
Aggregation Port’s protocol Partner’s System ID.
Format
Mode
no lacp partner system id
Interface Config
lacp partner system priority
Use this command to configure the administrative value of the priority associated with the
Partner’s System ID. The valid range for <priority> is 0 to 65535.
Default
0x0
Format
Mode
lacp partner system priority <priority>
Interface Config
Switching Commands
131
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: This command is applicable only to physical interfaces.
no lacp partner system priority
Use this command to configure the default administrative value of priority associated with the
Partner’s System ID.
Format
Mode
no lacp partner system priority
Interface Config
port-channel local-preference
This command enables the local-preference mode on a port-channel (LAG) interface or
range of interfaces. By default, the local-preference mode for a port-channel is disabled. This
command can be used only on port-channel interfaces.
Default
disabled
Format
Mode
port-channel local-preference
Interface Config
no port-channel local-preference
This command disables the local-preference mode on a port-channel.
Format
Mode
no port-channel local-preference
Interface Config
port-channel static
This command enables the static mode on a port-channel (LAG) interface. By default the
static mode for a new port-channel is disabled, which means the port-channel is dynamic.
However if the maximum number of allowable dynamic port-channels are already present in
the system, the static mode for a new port-channel enabled, which means the port-channel is
static.You can only use this command on port-channel interfaces.
Default
disabled
Format
Mode
port-channel static
Interface Config
Switching Commands
132
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no port-channel static
This command sets the static mode on a particular port-channel (LAG) interface to the default
value. This command will be executed only for interfaces of type port-channel (LAG).
Format
Mode
no port-channel static
Interface Config
port lacpmode
This command enables Link Aggregation Control Protocol (LACP) on a port.
Default
enabled
Format
Mode
port lacpmode
Interface Config
no port lacpmode
This command disables Link Aggregation Control Protocol (LACP) on a port.
Format
Mode
no port lacpmode
Interface Config
port lacpmode enable all
This command enables Link Aggregation Control Protocol (LACP) on all ports.
Format
Mode
port lacpmode enable all
Global Config
no port lacpmode enable all
This command disables Link Aggregation Control Protocol (LACP) on all ports.
Format
Mode
no port lacpmode enable all
Global Config
port lacptimeout (Interface Config)
This command sets the timeout on a physical interface of a particular device type (actoror
partner) to either longor shorttimeout.
Default
long
Format
Mode
port lacptimeout {actor | partner} {long | short}
Interface Config
Switching Commands
133
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no port lacptimeout
This command sets the timeout back to its default value on a physical interface of a particular
device type (actoror partner).
Format
Mode
no port lacptimeout {actor | partner}
Interface Config
port lacptimeout (Global Config)
This command sets the timeout for all interfaces of a particular device type (actoror
partner) to either longor shorttimeout.
Default
long
Format
Mode
port lacptimeout {actor | partner} {long | short}
Global Config
no port lacptimeout
This command sets the timeout for all physical interfaces of a particular device type (actor
or partner) back to their default values.
Format
Mode
no port lacptimeout {actor | partner}
Global Config
port-channel adminmode
This command enables a port-channel (LAG). This command sets every configured
port-channel with the same administrative mode setting.
Format
Mode
port-channel adminmode all
Global Config
no port-channel adminmode
This command disables a port-channel (LAG). This command clears every configured
port-channel with the same administrative mode setting.
Format
Mode
no port-channel adminmode [all]
Global Config
Switching Commands
134
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
port-channel linktrap
This command enables link trap notifications for the port-channel (LAG). The interface is a
logical unit/slot/port for a configured port-channel. The option allenables link trap
notifications for all the configured port-channels.
Default
enabled
Format
Mode
port-channel linktrap {<unit/slot/port> | lag <lag-group-id> | all}
Global Config
no port-channel linktrap
This command disables link trap notifications for the port-channel (LAG). The interface is a
logical slot and port for a configured port-channel. The option all disables link trap
notifications for all the configured port-channels.
Format
Mode
no port-channel linktrap {<logical unit/slot/port> | all}
Global Config
port-channel load-balance
This command selects the load-balancing option used on a port-channel (LAG). Traffic is
balanced on a port-channel (LAG) by selecting one of the links in the channel over which to
transmit specific packets. The link is selected by creating a binary pattern from selected fields
in a packet, and associating that pattern with a particular link.
Load-balancing is not supported on every device. The range of options for load-balancing
can vary per device. The managed switch also supports enhanced hashing mode, which has
the following advantages:
•
MODULO-N (where N is the number of active link members in a LAG) operation based on
the number of ports in the LAG
•
Packet attributes selection based on the packet type: For L2 packets, source and
destination MAC address are used for hash computation. For L3 packets, source IP,
destination IP address, TCP/UDP ports are used.
•
•
Non-Unicast traffic and unicast traffic is hashed using a common hash algorithm
Excellent load balancing performance.
Default
Format
3
port-channel load-balance { 1 | 2 | 3 | 4 | 5 | 6 | 7}
{<unit/slot/port> |<all>}
Mode
Interface Config
Global Config
Switching Commands
135
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
1
Definition
Source MAC, VLAN, EtherType, and incoming port associated with the packet
Destination MAC, VLAN, EtherType, and incoming port associated with the packet
2
3
Source/Destination MAC, VLAN, EtherType, and incoming port associated with the
packet
4
Source IP and Source TCP/UDP fields of the packet
Destination IP and Destination TCP/UDP Port fields of the packet
Source/Destination IP and source/destination TCP/UDP Port fields of the packet
Enhanced Hashing Mode
5
6
7
<unit/slot/port>| all
Global Config Mode only: The interface is a logical unit/slot/port number of a
configured port-channel. "All" applies the command to all currently configured
port-channels.
no port-channel load-balance
This command reverts to the default load balancing configuration.
Format
Mode
no port-channel load-balance {<unit/slot/port> | <all>}
Interface Config
Global Config
Term
Definition
<unit/slot/port>| all
Global Config Mode only: The interface is a logical unit/slot/port number of a
configured port-channel. "All" applies the command to all currently configured
port-channels.
port-channel name
This command defines a name for the port-channel (LAG). The interface is a logical
unit/slot/port for a configured port-channel, and <name>is an alphanumeric string up to 15
characters.
Format
Mode
port-channel name {<logical unit/slot/port> | <name>}
Global Config
Switching Commands
136
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
port-channel system priority
Use this command to configure port-channel system priority. The valid range of <priority> is
0-65535.
Default
0x8000
Format
Mode
port-channel system priority <priority>
Global Config
no port-channel system priority
Use this command to configure the default port-channel system priority value.
Format
Mode
no port-channel system priority
Global Config
show lacp actor
Use this command to display LACP actor attributes.
Format
Mode
show lacp actor {<unit/slot/port>|all}
Global Config
The following output parameters are displayed.
Parameter
Description
System Priority
Admin Key
The system priority assigned to the Aggregation Port.
The administrative value of the Key.
Port Priority
Admin State
The priority value assigned to the Aggregation Port.
The administrative values of the actor state as transmitted by the Actor in LACPDUs.
show lacp partner
Use this command to display LACP partner attributes.
Format
Mode
show lacp partner {<unit/slot/port>|all}
Privileged EXEC
Switching Commands
137
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following output parameters are displayed.
Parameter
Description
System Priority
The administrative value of priority associated with the Partner’s System ID.
System ID
The value representing the administrative value of the Aggregation Port’s protocol
Partner’s System ID.
Admin Key
Port Priority
Port-ID
The administrative value of the Key for the protocol Partner.
The administrative value of the port priority for the protocol Partner.
The administrative value of the port number for the protocol Partner.
The administrative values of the actor state for the protocol Partner.
Admin State
show port-channel brief
This command displays the static capability of all port-channel (LAG) interfaces on the device
as well as a summary of individual port-channel interfaces.
Format
Mode
show port-channel brief
• Privileged EXEC
• User EXEC
For each port-channel the following information is displayed:
Term
Definition
Logical
Interface
The unit/slot/port of the logical interface.
Port-channel
Name
The name of port-channel (LAG) interface.
Link-State
Trap Flag
Type
Shows whether the link is up or down.
Shows whether trap flags are enabled or disabled.
Shows whether the port-channel is statically or dynamically maintained.
The members of this port-channel.
Mbr Ports
Active Ports
The ports that are actively participating in the port-channel.
show port-channel
This command displays an overview of all port-channels (LAGs) on the switch.
Format
Mode
show port-channel {<logical unit/slot/port> | all}
• Privileged EXEC
• User EXEC
Switching Commands
138
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Logical
Interface
Valid slot and port number separated by forward slashes.
Port-Channel
Name
The name of this port-channel (LAG). You may enter any string of up to 15 alphanumeric
characters.
Link State
Admin Mode
Type
Indicates whether the Link is up or down.
May be enabled or disabled. The factory default is enabled.
The status designating whether a particular port-channel (LAG) is statically or
dynamically maintained.
• Static - The port-channel is statically maintained.
• Dynamic - The port-channel is dynamically maintained.
Mbr Ports
A listing of the ports that are members of this port-channel (LAG), in unit/slot/port
notation. There can be a maximum of eight ports assigned to a given port-channel (LAG).
Device Timeout
Port Speed
For each port, lists the timeout (longor short) for Device Type (actoror partner).
Speed of the port-channel port.
Ports Active
This field lists ports that are actively participating in the port-channel (LAG).
Load Balance
Option
Local
Preference
Mode
Indicates whether the local preference mode is enabled or disabled.
show port-channel system priority
Use this command to display the port-channel system priority.
Format
Mode
show port-channel system priority
Privileged EXEC
Port Mirroring
Port mirroring, which is also known as port monitoring, selects network traffic that you can
analyze with a network analyzer, such as a SwitchProbe device or other Remote Monitoring
(RMON) probe.
monitor session
This command configures a probe port and a monitored port for monitor session (port
monitoring). Use the source interface <unit/slot/port>parameter to specify the
interface to monitor. Use rxto monitor only ingress packets, or use txto monitor only egress
packets. If you do not specify an {rx | tx}option, the destination port monitors both
ingress and egress packets. Use the destination interface <unit/slot/port>to
Switching Commands
139
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
specify the interface to receive the monitored traffic. Use the modeparameter to enabled the
administrative mode of the session. If enabled, the probe port monitors all the traffic received
and transmitted on the physical monitored port.
Format
Mode
monitor session <session-id> {source interface <unit/slot/port> [{rx
| tx}] | destination interface <unit/slot/port> | mode}
Global Config
no monitor session
Use this command without optional parameters to remove the monitor session (port
monitoring) designation from the source probe port, the destination monitored port and all
VLANs. Once the port is removed from the VLAN, you must manually add the port to any
desired VLANs. Use the source interface <unit/slot/port>parameter or
destination interface <unit/slot/port>to remove the specified interface from
the port monitoring session. Use the modeparameter to disable the administrative mode of
the session
Note: Since the current version of 7000 series software supports only one
session, if you do not supply optional parameters, the behavior of
this command is similar to the behavior of the no monitor
command.
Format
Mode
no monitor session <session-id> [{source interface <unit/slot/port>
| destination interface <unit/slot/port> | mode}]
Global Config
no monitor
This command removes all the source ports and a destination port for the and restores the
default value for mirroring session mode for all the configured sessions.
Note: This is a stand-alone “no” command. This command does not have
a “normal” form.
Default
enabled
Format
Mode
no monitor
Global Config
Switching Commands
140
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show monitor session
This command displays the Port monitoring information for a particular mirroring session.
Note: The <session-id>parameter is an integer value used to identify
the session. In the current version of the software, the
<session-id>parameter is always one (1)
Format
show monitor session<session-id>
Mode
Privileged EXEC
Term
Definition
Session ID
An integer value used to identify the session. Its value can be anything between 1 and
the maximum number of mirroring sessions allowed on the platform.
Admin Mode
Probe Port
Mirrored Port
Type
Indicates whether the Port Mirroring feature is enabled or disabled for the session
identified with <session-id>. The possible values are Enabled and Disabled.
Probe port (destination port) for the session identified with <session-id>. If probe port
is not set then this field is blank.
The port, which is configured as mirrored port (source port) for the session identified with
<session-id>. If no source port is configured for the session then this field is blank.
Direction in which source port configured for port mirroring. Types are tx for transmitted
packets and rx for receiving packets.
Static MAC Filtering
The commands in this section describe how to configure static MAC filtering. Static MAC
filtering allows you to configure destination ports for a static multicast MAC filter irrespective
of the platform.
macfilter
This command adds a static MAC filter entry for the MAC address <macaddr>on the VLAN
<vlanid>. The value of the <macaddr>parameter is a 6-byte hexadecimal number in the
format of b1:b2:b3:b4:b5:b6. The restricted MAC Addresses are: 00:00:00:00:00:00,
01:80:C2:00:00:00 to 01:80:C2:00:00:0F, 01:80:C2:00:00:20 to 01:80:C2:00:00:21, and
FF:FF:FF:FF:FF:FF. The <vlanid>parameter must identify a valid VLAN.
The number of static mac filters supported on the system is different for MAC filters where
source ports are configured and MAC filters where destination ports are configured.
•
For unicast MAC address filters and multicast MAC address filters with source port lists,
the maximum number of static MAC filters supported is 20.
Switching Commands
141
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
For multicast MAC address filters with destination ports configured, the maximum number
of static filters supported is 256.
For example, for current platforms you can configure the following combinations:
•
•
•
•
Unicast MAC and source port (max = 20)
Multicast MAC and source port (max=20)
Multicast MAC and destination port (only) (max=256)
Multicast MAC and source ports and destination ports (max=20)
Format
Mode
macfilter <macaddr> <vlanid>
Global Config
no macfilter
This command removes all filtering restrictions and the static MAC filter entry for the MAC
address <macaddr>on the VLAN <vlanid>. The <macaddr>parameter must be specified
as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6.
The <vlanid>parameter must identify a valid VLAN.
Format
Mode
no macfilter <macaddr> <vlanid>
Global Config
macfilter adddest
Use this command to add the interface to the destination filter set for the MAC filter with the
given <macaddr>and VLAN of <vlanid>. The <macaddr>parameter must be specified as
a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid>parameter
must identify a valid VLAN.
Note: Configuring a destination port list is only valid for multicast MAC
addresses.
Format
Mode
macfilter adddest <macaddr> <vlanid>
Interface Config
no macfilter adddest
This command removes a port from the destination filter set for the MAC filter with the given
<macaddr>and VLAN of <vlanid>. The <macaddr>parameter must be specified as a
Switching Commands
142
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid>parameter
must identify a valid VLAN.
Format
Mode
no macfilter adddest <macaddr> <vlanid>
Interface Config
macfilter adddest all
This command adds all interfaces to the destination filter set for the MAC filter with the given
<macaddr>and VLAN of <vlanid>. The <macaddr>parameter must be specified as a
6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid>parameter
must identify a valid VLAN.
Note: Configuring a destination port list is only valid for multicast MAC
addresses.
Format
Mode
macfilter adddest all <macaddr> <vlanid>
Global Config
no macfilter adddest all
This command removes all ports from the destination filter set for the MAC filter with the
given <macaddr>and VLAN of <vlanid>. The <macaddr>parameter must be specified
as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid>
parameter must identify a valid VLAN.
Format
Mode
no macfilter adddest all <macaddr> <vlanid>
Global Config
macfilter addsrc
This command adds the interface to the source filter set for the MAC filter with the MAC
address of <macaddr> and VLAN of <vlanid>. The <macaddr>parameter must be specified
as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid>
parameter must identify a valid VLAN.
Format
Mode
macfilter addsrc <macaddr> <vlanid>
Interface Config
no macfilter addsrc
This command removes a port from the source filter set for the MAC filter with the MAC
address of <macaddr> and VLAN of <vlanid>. The <macaddr>parameter must be
Switching Commands
143
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The
<vlanid>parameter must identify a valid VLAN.
Format
Mode
no macfilter addsrc <macaddr> <vlanid>
Interface Config
macfilter addsrc all
This command adds all interfaces to the source filter set for the MAC filter with the MAC
address of <macaddr>and <vlanid>. You must specify the <macaddr>parameter as a
6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid>parameter
must identify a valid VLAN.
Format
Mode
macfilter addsrc all <macaddr> <vlanid>
Global Config
no macfilter addsrc all
This command removes all interfaces to the source filter set for the MAC filter with the MAC
address of <macaddr>and VLAN of <vlanid>. You must specify the <macaddr>
parameter as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6.
The <vlanid>parameter must identify a valid VLAN.
Format
Mode
no macfilter addsrc all <macaddr> <vlanid>
Global Config
show mac-address-table static
This command displays the Static MAC Filtering information for all Static MAC Filters. If you
select <all>, all the Static MAC Filters in the system are displayed. If you supply a value for
<macaddr>, you must also enter a value for <vlanid>, and the system displays Static
MAC Filter information only for that MAC address and VLAN.
Format
Mode
show mac-address-table static {<macaddr> <vlanid> | all}
Privileged EXEC
Term
Definition
MAC Address
The MAC Address of the static MAC filter entry.
The VLAN ID of the static MAC filter entry.
The source port filter set's slot and port(s).
VLAN ID
Source Port(s)
Switching Commands
144
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: Only multicast address filters will have destination port lists.
show mac-address-table staticfiltering
This command displays the Static Filtering entries in the Multicast Forwarding Database
(MFDB) table.
Format
Mode
show mac-address-table staticfiltering
Privileged EXEC
Term
Definition
Mac Address
A unicast MAC address for which the switch has forwarding and or filtering information.
As the data is gleaned from the MFDB, the address will be a multicast address. The
format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for example
01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as 8 bytes.
Type
The type of the entry. Static entries are those that are configured by the end user.
Dynamic entries are added to the table as a result of a learning process or protocol.
Description
Interfaces
The text description of this multicast table entry.
The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
DHCP L2 Relay Agent Commands
You can enable the switch to operate as a DHCP Layer 2 relay agent to relay DHCP requests
from clients to a Layer 3 relay agent or server. The Circuit ID and Remote ID can be added to
DHCP requests relayed from clients to a DHCP server. This information is included in DHCP
Option 82, as specified in sections 3.1 and 3.2 of RFC3046.
dhcp l2relay
Use this command to enable the DHCP Layer 2 Relay agent for an interface, a range of
interfaces, or all interfaces. The subsequent commands mentioned in this section can be
used only when the DHCP L2 relay is enabled.
Format
Modes
dhcp l2relay
• Global Config
• Interface Config
Switching Commands
145
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no dhcp l2relay
Use this command to disable the DHCP Layer 2 relay agent for an interface or range of
interfaces.
Format
Modes
no dhcp l2relay
• Global Config
• Interface Config
dhcp l2relay circuit-id vlan
Use this parameter to set the DHCP Option-82 Circuit ID for a VLAN. When enabled, the
interface number is added as the Circuit ID in DHCP option 82. Vlan-list range is 1–4093.
Separate non-consecutive IDs with a comma (,), and do not insert spaces or zeros in
between the range. Use a dash (–) for the range.
Format
Mode
dhcp l2relay circuit-id vlan <vlan-list>
Global Config
no dhcp l2relay circuit-id vlan
Use this parameter to clear the DHCP Option-82 Circuit ID for a VLAN.
Format
Mode
no dhcp l2relay circuit-id vlan <vlan-list>
Global Config
dhcp l2relay remote-id vlan
Use this parameter to set the DHCP Option-82 Remote ID for a VLAN and subscribed service
(based on subscription-name). The vlan–list range is 1–4093. Separate non-consecutive IDs
with a comma (,), and do not insert spaces or zeros between the range. Use a dash (–) for
the range.
Format
Mode
dhcp l2relay remote-id <remote-id-string> vlan <vlan-list>
Global Config
no dhcp l2relay remote-id vlan
Use this parameter to clear the DHCP Option-82 Remote ID for a VLAN and subscribed
service (based on subscription-name).
Format
Mode
no dhcp l2relay remote-id vlan vlan-list
Global Config
Switching Commands
146
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dhcp l2relay vlan
Use this command to enable the DHCP L2 Relay agent for a set of VLANs. All DHCP packets
which arrive on interfaces in the configured VLAN are subject to L2 Relay processing.
vlan–list range is 1–4093. Separate non-consecutive IDs with a comma (,), and do not insert
spaces or zeros between the range. Use a dash (–) for the range.
Default
disabled
Format
Mode
dhcp l2relay vlan <vlan-list>
Global Config
no dhcp l2relay vlan
Use this command to disable the DHCP L2 Relay agent for a set of VLANs.
Format
Mode
no dhcp l2relay vlan <vlan-list>
Global Config
dhcp l2relay trust
Use this command to configure an interface or range of interfaces as trusted for Option-82
reception.
Default
untrusted
Format
Mode
dhcp l2relay trust
Interface Config
no dhcp l2relay trust
Use this command to configure an interface to the default untrusted for Option-82 reception.
Format
Mode
no dhcp l2relay trust
Interface Config
show dhcp l2relay all
Use this command to display the summary of DHCP L2 Relay configuration.
Format
Mode
show dhcp l2relay all
Privileged EXEC
Example: The following shows example CLI display output for the command.
(switch) #show dhcp l2relay all
DHCP L2 Relay is Enabled.
Interface
----------
L2RelayMode
-----------
TrustMode
--------------
Switching Commands
147
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
0/2
0/4
Enabled
Disabled
untrusted
trusted
VLAN Id
---------
3
5
6
7
8
9
L2 Relay
CircuitId
-----------
Enabled
Enabled
Enabled
Disabled
Disabled
Disabled
Disabled
RemoteId
----------
Disabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
------------
--NULL—
--NULL—
netgear
--NULL—
--NULL—
--NULL—
--NULL—
10
show dhcp l2relay interface
Use this command to display DHCP L2 relay configuration specific to interfaces.
Format
Mode
show dhcp l2relay interface {all | interface-num}
Privileged EXEC
Example: The following shows example CLI display output for the command.
(switch) #show dhcp l2relay interface all
DHCP L2 Relay is Enabled.
Interface
----------
1/0/2
L2RelayMode
-----------
Enabled
TrustMode
--------------
untrusted
trusted
1/0/4
Disabled
show dhcp l2relay stats interface
Use this command to display statistics specific to DHCP L2 Relay configured interface.
Format
Mode
show dhcp l2relay stats interface {all | interface-num}
Privileged EXEC
Example: The following shows example CLI display output for the command.
(switch) #show dhcp l2relay stats interface all DHCP L2 Relay is Enabled.
Interface UntrustedServer UntrustedClient TrustedServer
MsgsWithOpt82 MsgsWithOpt82 MsgsWithoutOpt82 MsgsWithoutOpt82
--------- --------------- ----------------- ----------------- --------------
TrustedClient
0/1
0/2
0/3
0/4
0/5
0/6
0/7
0/8
0/9
0
0
0
0
0
3
0
0
0
0
0
0
12
0
0
0
0
0
0
3
0
0
0
0
0
0
0
0
7
0
0
0
0
0
0
0
Switching Commands
148
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show dhcp l2relay agent-option vlan
Use this command to display the DHCP L2 Relay Option-82 configuration specific to VLAN.
Format
Mode
show dhcp l2relay agent-option vlan vlan-range
Privileged EXEC
Example: The following shows example CLI display output for the command.
(switch) #show dhcp l2relay agent-option vlan 5-10
DHCP L2 Relay is Enabled.
VLAN Id
---------
5
6
7
8
9
10
L2 Relay
----------
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
CircuitId
-----------
Enabled
RemoteId
------------
--NULL—
Enabled
netgear
--NULL—
--NULL—
--NULL—
Disabled
Disabled
Disabled
Disabled
--NULL--
DHCP Client Commands
DHCP Client can include vendor and configuration information in DHCP client requests
relayed to a DHCP server. This information is included in DHCP Option 60, Vendor Class
Identifier. The information is a string of 128 octets.
dhcp client vendor-id-option
Use this command to enable the inclusion of DHCP Option-60, Vendor Class Identifier
included in the requests transmitted to the DHCP server by the DHCP client operating in the
switch.
Format
Mode
dhcp client vendor-id-option
Global Config
no dhcp client vendor-id-option
Use this command to disable the inclusion of DHCP Option-60, Vendor Class Identifier
included in the requests transmitted to the DHCP server by the DHCP client operating in the
switch.
Format
Mode
no dhcp client vendor-id-option
Global Config
Switching Commands
149
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dhcp client vendor-id-option-string
Use this command to set the DHCP Vendor Option-60 string to be included in requests
transmitted to the DHCP server by the DHCP client operating in the switch.
Format
Mode
dhcp client vendor-id-option-string <string>
Global Config
no dhcp client vendor-id-option-string
Use this command to clear the DHCP Vendor Option-60 string.
Format
Mode
no dhcp client vendor-id-option-string
Global Config
show dhcp client vendor-id-option
Use this command to display the configured administration mode of the vendor-id-option and
the vendor-id string to be included in Option-43 in DHCP requests.
Format
Mode
show dhcp client vendor-id-option
Privileged EXEC
Example: The following shows example CLI display output for the command.
(switch) #show dhcp client vendor-id-option
DHCP Client Vendor Identifier Option ........... Enabled
DHCP Client Vendor Identifier Option string .... Client.
DHCP Snooping Configuration Commands
This section describes commands you use to configure DHCP Snooping.
ip dhcp snooping
Use this command to enable DHCP Snooping globally.
Default
disabled
Format
Mode
ip dhcp snooping
Global Config
Switching Commands
150
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip dhcp snooping
Use this command to disable DHCP Snooping globally.
Format
Mode
no ip dhcp snooping
Global Config
ip dhcp snooping vlan
Use this command to enable DHCP Snooping on a list of comma-separated VLAN ranges.
Default
disabled
Format
Mode
ip dhcp snooping vlan <vlan-list>
Global Config
no ip dhcp snooping vlan
Use this command to disable DHCP Snooping on VLANs.
Format
Mode
no ip dhcp snooping vlan <vlan-list>
Global Config
ip dhcp snooping verify mac-address
Use this command to enable verification of the source MAC address with the client hardware
address in the received DCHP message.
Default
enabled
Format
Mode
ip dhcp snooping verify mac-address
Global Config
no ip dhcp snooping verify mac-address
Use this command to disable verification of the source MAC address with the client hardware
address.
Format
Mode
no ip dhcp snooping verify mac-address
Global Config
Switching Commands
151
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip dhcp snooping database
Use this command to configure the persistent location of the DHCP Snooping database. This
can be local or a remote file on a given IP machine.
Default
local
Format
Mode
ip dhcp snooping database {local|tftp://hostIP/filename}
Global Config
ip dhcp snooping database write-delay
Use this command to configure the interval in seconds at which the DHCP Snooping
database will be persisted. The interval value ranges from 15 to 86400 seconds.
Default
300 seconds
Format
Mode
ip dhcp snooping database write-delay <in seconds>
Global Config
no ip dhcp snooping database write-delay
Use this command to set the write delay value to the default value.
Format
Mode
no ip dhcp snooping database write-delay
Global Config
ip dhcp snooping binding
Use this command to configure static DHCP Snooping binding.
Format
Mode
ip dhcp snooping binding <mac-address> vlan <vlan id> <ip address>
interface <interface id>
Global Config
no ip dhcp snooping binding <mac-address>
Use this command to remove the DHCP static entry from the DHCP Snooping database.
Format
Mode
no ip dhcp snooping binding <mac-address>
Global Config
Switching Commands
152
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip verify binding
Use this command to configure static IP source guard (IPSG) entries.
Format
Mode
ip verify binding <mac-address> vlan <vlan id> <ip address> interface
<interface id>
Global Config
no ip verify binding
Use this command to remove the IPSG static entry from the IPSG database.
Format
Mode
no ip verify binding <mac-address> vlan <vlan id> <ip address>
interface <interface id>
Global Config
ip dhcp snooping limit
Use this command to control the rate at which the DHCP Snooping messages come. The
default rate is 15 pps with a range from 0 to 30 pps. The default burst level is 1 second with a
range of 1 to 15 seconds.
Default
15 pps for rate limiting and 1 sec for burst interval
Format
Mode
ip dhcp snooping limit {rate pps [burst interval seconds]}
Interface Config
no ip dhcp snooping limit
Use this command to set the rate at which the DHCP Snooping messages come, and the
burst level, to the defaults.
Format
Mode
no ip dhcp snooping limit
Interface Config
ip dhcp snooping log-invalid
Use this command to control the logging DHCP messages filtration by the DHCP Snooping
application.
Default
disabled
Format
Mode
ip dhcp snooping log-invalid
Interface Config
Switching Commands
153
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip dhcp snooping log-invalid
Use this command to disable the logging DHCP messages filtration by the DHCP Snooping
application.
Format
Mode
no ip dhcp snooping log-invalid
Interface Config
ip dhcp snooping trust
Use this command to configure the port as trusted.
Default
disabled
Format
Mode
ip dhcp snooping trust
Interface Config
no ip dhcp snooping trust
Use this command to configure the port as untrusted.
Format
Mode
no ip dhcp snooping trust
Interface Config
ip verify source
Use this command to configure the IPSG source ID attribute to filter the data traffic in the
hardware. Source ID is the combination of IP address and MAC address. Normal command
allows data traffic filtration based on the IP address. With the “port-security” option, the data
traffic will be filtered based on the IP and MAC addresses.
Default
Format
Mode
the source ID is the IP address
ip verify source {port-security}
Interface Config
no ip verify source
Use this command to disable the IPSG configuration in the hardware. You cannot disable
port-security alone if it is configured.
Format
Mode
no ip verify source
Interface Config
Switching Commands
154
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip dhcp snooping
Use this command to display the DHCP Snooping global configurations and per port
configurations.
Format
show ip dhcp snooping
Mode
• Privileged EXEC
• User EXEC
Term
Definition
Interface
The interface for which data is displayed.
Trusted
If it is enabled, DHCP snooping considers the port as trusted. The factory default is
disabled.
Log Invalid Pkts
If it is enabled, DHCP snooping application logs invalid packets on the specified
interface.
Example: The following shows example CLI display output for the command.
(switch) #show ip dhcp snooping
DHCP snooping is Disabled
DHCP snooping source MAC verification is enabled
DHCP snooping is enabled on the following VLANs:
11 - 30, 40
Interface Trusted
Log Invalid Pkts
--------- -------- ----------------
0/1
0/2
0/3
0/4
0/6
Yes
No
No
No
No
No
Yes
Yes
No
No
show ip dhcp snooping binding
Use this command to display the DHCP Snooping binding entries. To restrict the output, use
the following options:
•
•
•
•
Dynamic: Restrict the output based on DCHP snooping.
Interface: Restrict the output based on a specific interface.
Static: Restrict the output based on static entries.
VLAN: Restrict the output based on VLAN.
Format
Mode
show ip dhcp snooping binding [{static/dynamic}] [interface
unit/slot/port] [vlan id]
• Privileged EXEC
• User EXEC
Switching Commands
155
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
MAC Address
Displays the MAC address for the binding that was added. The MAC address is the key
to the binding database.
IP Address
VLAN
Displays the valid IP address for the binding rule.
The VLAN for the binding rule.
Interface
Type
The interface to add a binding into the DHCP snooping interface.
Binding type; statically configured from the CLI or dynamically learned.
The remaining lease time for the entry.
Lease (sec)
Example: The following shows example CLI display output for the command.
(switch) #show ip dhcp snooping binding
Total number of bindings: 2
MAC Address
IP Address VLAN Interface Type Lease (Secs)
------------------ ------------ ---- --------- ---- -------------
00:02:B3:06:60:80 210.1.1.3
00:0F:FE:00:13:04 210.1.1.4
10 0/1
10 0/1
86400
86400
show ip dhcp snooping database
Use this command to display the DHCP Snooping configuration related to the database
persistency.
Format
show ip dhcp snooping database
Mode
• Privileged EXEC
• User EXEC
Term
Definition
Agent URL
Bindings database agent URL.
Write Delay
The maximum write time to write the database into local or remote.
Example: The following shows example CLI display output for the command.
(switch) #show ip dhcp snooping database
agent url: /10.131.13.79:/sai1.txt
write-delay: 5000
Switching Commands
156
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip dhcp snooping interfaces
Use this command to show the DHCP Snooping status of the interfaces.
Format
Mode
show ip dhcp snooping interfaces
Privileged EXEC
show ip dhcp snooping statistics
Use this command to list statistics for DHCP Snooping security violations on untrusted ports.
Format
Mode
show ip dhcp snooping statistics
• Privileged EXEC
• User EXEC
Term
Definition
Interface
The IP address of the interface in unit/slot/port format.
MAC Verify
Failures
Represents the number of DHCP messages that were filtered on an untrusted interface
because of source MAC address and client HW address mismatch.
Client Ifc
Mismatch
Represents the number of DHCP release and Deny messages received on the different
ports than learned previously.
DHCP Server
Msgs Rec’d
Represents the number of DHCP server messages received on Untrusted ports.
Example: The following shows example CLI display output for the command.
(switch) #show ip dhcp snooping statistics
Interface
MAC Verify Client Ifc DHCP Server
Failures Mismatch Msgs Rec'd
----------- ---------- ---------- -----------
1/0/2
1/0/3
1/0/4
1/0/5
1/0/6
1/0/7
1/0/8
1/0/9
1/0/10
1/0/11
1/0/12
1/0/13
1/0/14
1/0/15
1/0/16
1/0/17
1/0/18
1/0/19
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Switching Commands
157
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
1/0/20
0
0
0
clear ip dhcp snooping binding
Use this command to clear all DHCP Snooping bindings on all interfaces or on a specific
interface.
Format
Mode
clear ip dhcp snooping binding [interface <unit/slot/port>]
• Privileged EXEC
• User EXEC
clear ip dhcp snooping statistics
Use this command to clear all DHCP Snooping statistics.
Format
Mode
clear ip dhcp snooping statistics
• Privileged EXEC
• User EXEC
show ip verify source
Use this command to display the IPSG configurations on all ports.
Format
Mode
show ip verify source
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Interface address in unit/slot/port format.
Filter Type
Is one of two values:
• ip-mac: User has configured MAC address filtering on this interface.
• ip: Only IP address filtering on this interface.
IP Address
IP address of the interface
MAC Address
If MAC address filtering is not configured on the interface, the MAC Address field is
empty. If port security is disabled on the interface, then the MAC Address field displays
“permit-all.”
VLAN
The VLAN for the binding rule.
Example: The following shows example CLI display output for the command.
(switch) #show ip verify source
Interface Filter Type
IP Address
MAC Address
Vlan
--------- ----------- --------------- ----------------- -----
Switching Commands
158
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
0/1
0/1
ip-mac
ip-mac
210.1.1.3
210.1.1.4
00:02:B3:06:60:80
00:0F:FE:00:13:04
10
10
show ip source binding
This command displays the IPSG bindings.
Format
Mode
show ip source binding [{static/dynamic}] [interface unit/slot/port]
[vlan id]
• Privileged EXEC
• User EXEC
Term
Definition
MAC Address
The MAC address for the entry that is added.
The IP address of the entry that is added.
Entry type; statically configured from CLI or dynamically learned from DHCP Snooping.
VLAN for the entry.
IP Address
Type
VLAN
Interface
IP address of the interface in unit/slot/port format.
The following shows sample CLI display output for the command.
(switch) #show ip source binding
MAC Address
IP Address
Type
Vlan
Interface
----------------- --------------- ------------- ----- -------------
00:00:00:00:00:08 1.2.3.4
00:00:00:00:00:09 1.2.3.4
00:00:00:00:00:0A 1.2.3.4
dhcp-snooping
dhcp-snooping
dhcp-snooping
2
3
4
1/0/1
1/0/1
1/0/1
Dynamic ARP Inspection Commands
Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP
packets. DAI prevents a class of man-in-the-middle attacks, where an unfriendly station
intercepts traffic for other stations by poisoning the ARP caches of its unsuspecting
neighbors. The miscreant sends ARP requests or responses mapping another station’s IP
address to its own MAC address.
DAI relies on DHCP snooping. DHCP snooping listens to DHCP message exchanges and
builds a binding database of valid {MAC address, IP address, VLAN, and interface} tuples.
When DAI is enabled, the switch drops ARP packets whose sender MAC address and
sender IP address do not match an entry in the DHCP snooping bindings database. You can
optionally configure additional ARP packet validation.
Switching Commands
159
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip arp inspection vlan
Use this command to enable Dynamic ARP Inspection on a list of comma-separated VLAN
ranges.
Default
disabled
Format
Mode
ip arp inspection vlan vlan-list
Global Config
no ip arp inspection vlan
Use this command to disable Dynamic ARP Inspection on a list of comma-separated VLAN
ranges.
Format
Mode
no ip arp inspection vlan vlan-list
Global Config
ip arp inspection validate
Use this command to enable additional validation checks like source-mac validation,
destination-mac validation, and ip address validation on the received ARP packets. Each
command overrides the configuration of the previous command. For example, if a command
enables src-mac and dst-mac validations, and a second command enables IP validation only,
the src-mac and dst-mac validations are disabled as a result of the second command.
Default
Format
Mode
disabled
ip arp inspection validate {[src-mac] [dst-mac] [ip]}
Global Config
no ip arp inspection validate
Use this command to disable the additional validation checks on the received ARP packets.
Format
Mode
no ip arp inspection validate {[src-mac] [dst-mac] [ip]}
Global Config
ip arp inspection vlan logging
Use this command to enable logging of invalid ARP packets on a list of comma-separated
VLAN ranges.
Default
Format
Mode
enabled
ip arp inspection vlan vlan-list logging
Global Config
Switching Commands
160
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip arp inspection vlan logging
Use this command to disable logging of invalid ARP packets on a list of comma-separated
VLAN ranges.
Format
Mode
no ip arp inspection vlan vlan-list logging
Global Config
ip arp inspection trust
Use this command to configure an interface as trusted for Dynamic ARP Inspection.
Default
Format
Mode
enabled
ip arp inspection trust
Interface Config
no ip arp inspection trust
Use this command to configure an interface as untrusted for Dynamic ARP Inspection.
Format
Mode
no ip arp inspection trust
Interface Config
ip arp inspection limit
Use this command to configure the rate limit and burst interval values for an interface.
Configuring none for the limit means the interface is not rate limited for Dynamic ARP
Inspections.
Note: The user interface will accept a rate limit for a trusted interface, but
the limit will not be enforced unless the interface is configured to be
untrusted.
Default
Format
Mode
15 pps for rate and 1 second for burst-interval
ip arp inspection limit {rate pps [burst interval seconds] | none}
Interface Config
Switching Commands
161
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip arp inspection limit
Use this command to set the rate limit and burst interval values for an interface to the default
values of 15 pps and 1 second, respectively.
Format
Mode
no ip arp inspection limit
Interface Config
ip arp inspection filter
Use this command to configure the ARP ACL used to filter invalid ARP packets on a list of
comma-separated VLAN ranges. If the static keyword is given, packets that do not match a
permit statement are dropped without consulting the DHCP snooping bindings.
Default
Format
Mode
No ARP ACL is configured on a VLAN
ip arp inspection filter acl-name vlan vlan-list [static]
Global Config
no ip arp inspection filter
Use this command to unconfigure the ARP ACL used to filter invalid ARP packets on a list of
comma-separated VLAN ranges.
Format
Mode
no ip arp inspection filter acl-name vlan vlan-list [static]
Global Config
arp access-list
Use this command to create an ARP ACL.
Format
Mode
arp access-list acl-name
Global Config
no arp access-list
Use this command to delete a configured ARP ACL.
Format
Mode
no arp access-list acl-name
Global Config
Switching Commands
162
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
permit ip host mac host
Use this command to configure a rule for a valid IP address and MAC address combination
used in ARP packet validation.
Format
Mode
permit ip host sender-ip mac host sender-mac
ARP Access-list Config
no permit ip host mac host
Use this command to delete a rule for a valid IP and MAC combination.
Format
Mode
no permit ip host sender-ip mac host sender-mac
ARP Access-list Config
show ip arp inspection
Use this command to display the Dynamic ARP Inspection global configuration and
configuration on all the VLANs. With the vlan-list argument (i.e. comma separated VLAN
ranges), the command displays the global configuration and configuration on all the VLANs in
the given VLAN list. The global configuration includes the source mac validation,
destination mac validation and invalid IP validation information.
Format
Mode
show ip arp inspection [vlan <vlan-list>]
• Privileged EXEC
• User EXEC
Term
Definition
Source MAC
Validation
Displays whether Source MAC Validation of ARP frame is enabled or disabled.
Destination
MAC Validation
Displays whether Destination MAC Validation is enabled or disabled.
IP Address
Validation
Displays whether IP Address Validation is enabled or disabled.
VLAN
The VLAN ID for each displayed row.
Configuration
Log Invalid
ACL Name
Static Flag
Displays whether DAI is enabled or disabled on the VLAN.
Displays whether logging of invalid ARP packets is enabled on the VLAN.
The ARP ACL Name, if configured on the VLAN.
If the ARP ACL is configured static on the VLAN.
Example: The following shows example CLI display output for the command.
(Switch) #show ip arp inspection vlan 10-12
Switching Commands
163
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Source Mac Validation
Destination Mac Validation : Disabled
IP Address Validation : Disabled
: Disabled
Vlan
----
10
Configuration
-------------
Enabled
Log Invalid ACL Name Static flag
----------- --------- ----------
Enabled H2
Enabled
Enabled
11
12
Disabled
Enabled
Disabled
show ip arp inspection statistics
Use this command to display the statistics of the ARP packets processed by Dynamic ARP
Inspection. Give the vlan-list argument and the command displays the statistics on all
DAI-enabled VLANs in that list. Give the single vlan argument and the command displays the
statistics on that VLAN. If no argument is included, the command lists a summary of the
forwarded and dropped ARP packets.
Format
show ip arp inspection statistics [vlan vlan-list]
Mode
• Privileged EXEC
• User EXEC
Term
Definition
VLAN
The VLAN ID for each displayed row.
Forwarded
The total number of valid ARP packets forwarded in this VLAN.
The total number of not valid ARP packets dropped in this VLAN.
The number of packets dropped due to DHCP snooping binding database match failure.
The number of packets dropped due to ARP ACL rule match failure.
The number of packets permitted due to DHCP snooping binding database match.
The number of packets permitted due to ARP ACL rule match.
The number of packets dropped due to Source MAC validation failure.
The number of packets dropped due to Destination MAC validation failure.
The number of packets dropped due to invalid IP checks.
Dropped
DHCP Drops
ACL Drops
DHCP Permits
ACL Permits
Bad Src MAC
Bad Dest MAC
Invalid IP
Example: The following shows example CLI display output for the command show ip arp inspection statistics
which lists the summary of forwarded and dropped ARP packets on all DAI-enabled VLANs.
VLAN Forwarded Dropped
---- --------- -------
10
20
90
10
14
3
Example: The following shows example CLI display output for the command show ip arp inspection statistics vlan
<vlan-list>.
Switching Commands
164
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
VLAN
DHCP
Drops
ACL
Drops
DHCP
Permits
ACL
Permits
Bad Src Bad Dest Invalid
MAC MAC IP
----- -------- --------- ----------- --------- ---------- ----------- ---------
10
20
11
1
1
0
65
8
25
2
1
0
1
1
0
1
clear ip arp inspection statistics
Use this command to reset the statistics for Dynamic ARP Inspection on all VLANs.
Default
none
Format
Mode
clear ip arp inspection statistics
Privileged EXEC
show ip arp inspection interfaces
Use this command to display the Dynamic ARP Inspection configuration on all the
DAI-enabled interfaces. An interface is said to be enabled for DAI if at least one VLAN, that
the interface is a member of, is enabled for DAI. Given a unit/slot/port interface argument, the
command displays the values for that interface whether the interface is enabled for DAI or
not.
Format
Mode
show ip arp inspection interfaces [unit/slot/port]
• Privileged EXEC
• User EXEC
Term
Definition
Interface
The interface ID for each displayed row.
Whether the interface is trusted or untrusted for DAI.
The configured rate limit value in packets per second.
The configured burst interval value in seconds.
Trust State
Rate Limit
Burst Interval
Example: The following shows example CLI display output for the command.
(Switch) #show ip arp inspection interfaces
Interface
Trust State Rate Limit Burst Interval
(pps) (seconds)
--------------- ----------- ---------- ---------------
0/1
0/2
Untrusted
Untrusted
15
10
1
10
Switching Commands
165
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show arp access-list
Use this command to display the configured ARP ACLs with the rules. Giving an ARP ACL
name as the argument will display only the rules in that ARP ACL.
Format
Mode
show arp access-list [acl-name]
• Privileged EXEC
• User EXEC
Example: The following shows example CLI display output for the command.
(Switch) #show arp access-list
ARP access list H2
permit ip host 1.1.1.1 mac host 00:01:02:03:04:05
permit ip host 1.1.1.2 mac host 00:03:04:05:06:07
ARP access list H3
ARP access list H4
permit ip host 2.1.1.2 mac host 00:03:04:05:06:08
IGMP Snooping Configuration Commands
This section describes the commands you use to configure IGMP snooping. The software
supports IGMP Versions 1, 2, and 3. The IGMP snooping feature can help conserve
bandwidth because it allows the switch to forward IP multicast traffic only to connected hosts
that request multicast traffic. IGMPv3 adds source filtering capabilities to IGMP versions 1
and 2.
set igmp
This command enables IGMP Snooping on the system (Global Config Mode) or an interface
(Interface Config Mode). This command also enables IGMP snooping on a particular VLAN
(VLAN Config Mode) and can enable IGMP snooping on all interfaces participating in a
VLAN.
If an interface has IGMP Snooping enabled and you enable this interface for routing or enlist
it as a member of a port-channel (LAG), IGMP Snooping functionality is disabled on that
interface. IGMP Snooping functionality is re-enabled if you disable routing or remove
port-channel (LAG) membership from an interface that has IGMP Snooping enabled.
The IGMP application supports the following activities:
•
Validation of the IP header checksum (as well as the IGMP header checksum) and
discarding of the frame upon checksum error.
•
Maintenance of the forwarding table entries based on the MAC address versus the IP
address.
Switching Commands
166
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
Flooding of unregistered multicast data packets to all ports in the VLAN.
Default
disabled
Format
Mode
set igmp
• Global Config
• Interface Config
Format
Mode
set igmp<vlanid>
VLAN Config
no set igmp
This command disables IGMP Snooping on the system, an interface or a VLAN.
Format
Mode
no set igmp
• Global Config
• Interface Config
Format
Mode
no set igmp <vlanid>
VLAN Config
set igmp interfacemode
This command enables IGMP Snooping on all interfaces. If an interface has IGMP Snooping
enabled and you enable this interface for routing or enlist it as a member of a port-channel
(LAG), IGMP Snooping functionality is disabled on that interface. IGMP Snooping
functionality is re-enabled if you disable routing or remove port-channel (LAG) membership
from an interface that has IGMP Snooping enabled.
Default
disabled
Format
Mode
set igmp interfacemode
Global Config
no set igmp interfacemode
This command disables IGMP Snooping on all interfaces.
Format
Mode
no set igmp interfacemode
Global Config
set igmp fast-leave
This command enables or disables IGMP Snooping fast-leave admin mode on a selected
interface or VLAN. Enabling fast-leave allows the switch to immediately remove the layer 2
Switching Commands
167
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
LAN interface from its forwarding table entry upon receiving an IGMP leave message for that
multicast group without first sending out MAC-based general queries to the interface.
You should enable fast-leave admin mode only on VLANs where only one host is connected
to each layer 2 LAN port. This prevents the inadvertent dropping of the other hosts that were
connected to the same layer 2 LAN port but were still interested in receiving multicast traffic
directed to that group. Also, fast-leave processing is supported only with IGMP version 2
hosts.
Default
disabled
Format
Mode
set igmp fast-leave
Interface Config
Format
Mode
set igmp fast-leave<vlan_id>
VLAN Config
no set igmp fast-leave
This command disables IGMP Snooping fast-leave admin mode on a selected interface.
Format
Mode
no set igmp fast-leave
Interface Config
Format
Mode
no set igmp fast-leave<vlan_id>
VLAN Config
set igmp groupmembership-interval
This command sets the IGMP Group Membership Interval time on a VLAN, one interface or
all interfaces. The Group Membership Interval time is the amount of time in seconds that a
switch waits for a report from a particular group on a particular interface before deleting the
interface from the entry. This value must be greater than the IGMPv3 Maximum Response
time value. The range is 2 to 3600 seconds.
Default
260 seconds
Format
Mode
set igmp groupmembership-interval <2-3600>
• Interface Config
• Global Config
Format
Mode
set igmp groupmembership-interval <vlan_id> <2-3600>
VLAN Config
Switching Commands
168
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no set igmp groupmembership-interval
This command sets the IGMPv3 Group Membership Interval time to the default value.
Format
no set igmp groupmembership-interval
Mode
• Interface Config
• Global Config
Format
Mode
no set igmp groupmembership-interval <vlan_id>
VLAN Config
set igmp maxresponse
This command sets the IGMP Maximum Response time for the system, or on a particular
interface or VLAN. The Maximum Response time is the amount of time in seconds that a
switch will wait after sending a query on an interface because it did not receive a report for a
particular group in that interface. This value must be less than the IGMP Query Interval time
value. The range is 1 to 25 seconds.
Default
10 seconds
Format
Mode
set igmp maxresponse <1-25>
• Global Config
• Interface Config
Format
Mode
set igmp maxresponse <vlan_id> <1-25>
VLAN Config
no set igmp maxresponse
This command sets the max response time (on the interface or VLAN) to the default value.
Format
Mode
no set igmp maxresponse
• Global Config
• Interface Config
Format
Mode
no set igmp maxresponse <vlan_id>
VLAN Config
set igmp mcrtrexpiretime
This command sets the Multicast Router Present Expiration time. The time is set for the
system, on a particular interface or VLAN. This is the amount of time in seconds that a switch
waits for a query to be received on an interface before the interface is removed from the list of
Switching Commands
169
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
interfaces with multicast routers attached. The range is 0 to 3600 seconds. A value of 0
indicates an infinite time-out, i.e. no expiration.
Default
0
Format
Mode
set igmp mcrtrexpiretime <0-3600>
• Global Config
• Interface Config
Format
Mode
set igmp mcrtrexpiretime <vlan_id> <0-3600>
VLAN Config
no set igmp mcrtrexpiretime
This command sets the Multicast Router Present Expiration time to 0. The time is set for the
system, on a particular interface or a VLAN.
Format
Mode
no set igmp mcrtrexpiretime
• Global Config
• Interface Config
Format
Mode
no set igmp mcrtrexpiretime <vlan_id>
VLAN Config
set igmp mrouter
This command configures the VLAN ID (<vlanId>) that has the multicast router mode
enabled.
Format
Mode
set igmp mrouter <vlan_id>
Interface Config
no set igmp mrouter
This command disables multicast router mode for a particular VLAN ID (<vlan_id>).
Format
Mode
no set igmp mrouter <vlan_id>
Interface Config
Switching Commands
170
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set igmp mrouter interface
This command configures the interface as a multicast router interface. When configured as a
multicast router interface, the interface is treated as a multicast router interface in all VLANs.
Default
disabled
Format
Mode
set igmp mrouter interface
Interface Config
no set igmp mrouter interface
This command disables the status of the interface as a statically configured multicast router
interface.
Format
Mode
no set igmp mrouter interface
Interface Config
set igmp report-suppression
Use this command to suppress the IGMP reports on a given VLAN ID. In order to optimize
the number of reports traversing the network with no added benefits, a Report Suppression
mechanism is implemented. When more than one client responds to an MGMD query for the
same Multicast Group address within the max-response-time, only the first response is
forwarded to the query and others are suppressed at the switch.
Default
Disabled
Format
set igmp report-suppression <1-4093>
Mode
VLAN Config
no set igmp report-suppression
Use this command to restore the system default.
Format
no set igmp report-suppression
Mode
VLAN Config
set igmp header-validation
This command enables the validation of 3 igmp header fields TTL (Time To Live), ToS (Type of
Service), and Router Alert options. The fields validated depend on the IGMP version being used.
IGMPv1 - Only the TTL field is validated.
IGMPv2 - TTL and Router Alert fields are validated.
Switching Commands
171
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
IGMPv3 - TTL, ToS, and Router Alert fields are validated
Default
Enabled
Format
Mode
set igmp header-validation
Global Config
no set igmp header-validation
This command disables the header validation for IGMP packets.
Format
Mode
no set igmp header-validation
Global Config
mac address-table multicast forbidden-unregistered vlan
Use this command to forbid forwarding unregistered multicast addresses (in other words,
unknown multicast traffic) on a given VLAN ID.
Default
Disabled
Format
mac address-table multicast forbidden-unregistered vlan
<1-4093>
Mode
Global Config
no mac address-table multicast forbidden-unregistered vlan
Use this command to restore the default.
Format
no mac address-table multicast forbidden-unregistered
vlan
Mode
Global Config
mac address-table multicast forward-unregistered vlan
Use this command to enable forwarding unregistered multicast address (in other words,
unknown multicast traffic) on a given VLAN ID.
Format
mac address-table multicast forward-unregistered vlan
<1-4093>
Mode
Global Config
Switching Commands
172
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
mac address-table multicast forward-all vlan
Use this command to enable forwarding of all multicast packets on a given VLAN ID.
Format
Mode
mac address-table multicast forward-all vlan <1-4093>
Global Config
no mac address-table multicast forward-all vlan
This command to restores the system default.
Format
no mac address-table multicast forward-all vlan
Mode
Global Config
Switching Commands
173
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show igmpsnooping
This command displays IGMP Snooping information. Configured information is displayed
whether or not IGMP Snooping is enabled.
Format
Mode
show igmpsnooping [<unit/slot/port> | <vlan_id>]
Privileged EXEC
When the optional arguments <unit/slot/port>or <vlan_id>are not used, the
command displays the following information:
Term
Definition
Admin Mode
Indicates whether or not IGMP Snooping is active on the switch.
The number of multicast control frames that are processed by the CPU.
Multicast
Control Frame
Count
Interface
Enabled for
IGMP Snooping
The list of interfaces on which IGMP Snooping is enabled.
The list of VLANS on which IGMP Snooping is enabled.
VLANS Enabled
for IGMP
Snooping
When you specify the <unit/slot/port> values, the following information appears:
Term
Definition
IGMP Snooping
Admin Mode
Indicates whether IGMP Snooping is active on the interface.
Fast Leave
Mode
Indicates whether IGMP Snooping Fast-leave is active on the interface.
Group
Membership
Interval
The amount of time in seconds that a switch will wait for a report from a particular group
on a particular interface before deleting the interface from the entry.This value may be
configured.
Maximum
Response Time
The amount of time the switch waits after it sends a query on an interface because it did
not receive a report for a particular group on that interface. This value may be configured.
Multicast
Router Expiry
Time
The amount of time to wait before removing an interface from the list of interfaces with
multicast routers attached. The interface is removed if a query is not received. This value
may be configured.
Switching Commands
174
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
When you specify a value for <vlan_id>, the following information appears:
Term
Definition
VLAN ID
The VLAN ID.
IGMP Snooping
Admin Mode
Indicates whether IGMP Snooping is active on the VLAN.
Fast Leave
Mode
Indicates whether IGMP Snooping Fast-leave is active on the VLAN.
Group
Membership
Interval
The amount of time in seconds that a switch will wait for a report from a particular group
on a particular interface, which is participating in the VLAN, before deleting the interface
from the entry.This value may be configured.
Maximum
Response Time
The amount of time the switch waits after it sends a query on an interface, participating in
the VLAN, because it did not receive a report for a particular group on that interface. This
value may be configured.
Multicast
Router Expiry
Time
The amount of time to wait before removing an interface that is participating in the VLAN
from the list of interfaces with multicast routers attached. The interface is removed if a
query is not received. This value may be configured.
show igmpsnooping mrouter interface
This command displays information about statically configured ports.
Format
Mode
show igmpsnooping mrouter interface <unit/slot/port>
Privileged EXEC
Term
Definition
Interface
The port on which multicast router information is being displayed.
Indicates whether multicast router is statically enabled on the interface.
Multicast
Router
Attached
VLAN ID
The list of VLANs of which the interface is a member.
show igmpsnooping mrouter vlan
This command displays information about statically configured ports.
Format
Mode
show igmpsnooping mrouter vlan <unit/slot/port>
Privileged EXEC
Term
Definition
Interface
The port on which multicast router information is being displayed.
The list of VLANs of which the interface is a member.
VLAN ID
Switching Commands
175
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show mac-address-table igmpsnooping
This command displays the IGMP Snooping entries in the MFDB table.
Format
show mac-address-table igmpsnooping
Mode
Privileged EXEC
Term
Definition
MAC Address
A multicast MAC address for which the switch has forwarding or filtering information. The
format is two-digit hexadecimal numbers that are separated by colons, for example
01:23:45:67:89:AB. In an IVL system the MAC address is displayed as a MAC address
and VLAN ID combination of 8 bytes.
Type
The type of the entry, which is either static (added by the user) or dynamic (added to the
table as a result of a learning process or protocol).
Description
Interfaces
The text description of this multicast table entry.
The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
show mac address-table multicast filtering
Use this command to display the multicast filtering details for a given VLAN.
Format
show mac address-table multicast filtering
Mode
Privileged EXEC
Parameter
vlan-id
Description
A valid VLAN ID
The filtering mode
mode
The following shows example CLI display output for the command.
(netgear switch) #show mac address-table multicast filtering 1
VLAN-ID....... 1
Mode.......... Forward-Forbidden-Unregistered
Switching Commands
176
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
IGMP Snooping Querier Commands
IGMP Snooping requires that one central switch or router periodically query all end-devices
on the network to announce their multicast memberships. This central device is the “IGMP
Querier”. The IGMP query responses, known as IGMP reports, keep the switch updated with
the current multicast group membership on a port-by-port basis. If the switch does not
receive updated membership information in a timely fashion, it will stop forwarding multicasts
to the port where the end device is located.
This section describes commands used to configure and display information on IGMP
Snooping Queriers on the network and, separately, on VLANs.
set igmp querier
Use this command to enable IGMP Snooping Querier on the system, using Global Config
mode, or on a VLAN. Using this command, you can specify the IP Address that the Snooping
Querier switch should use as the source address while generating periodic queries.
If a VLAN has IGMP Snooping Querier enabled and IGMP Snooping is operationally disabled
on it, IGMP Snooping Querier functionality is disabled on that VLAN. IGMP Snooping
functionality is re-enabled if IGMP Snooping is operational on the VLAN.
Note: The Querier IP Address assigned for a VLAN takes preference over
global configuration.
The IGMP Snooping Querier application supports sending periodic general queries on the
VLAN to solicit membership reports.
Default
disabled
Format
Mode
set igmp querier [<vlan-id>] [address ipv4_address]
• Global Config
• VLAN Mode
no set igmp querier
Use this command to disable IGMP Snooping Querier on the system. Use the optional
addressparameter to reset the querier address to 0.0.0.0.
Format
Mode
no set igmp querier [<vlan-id>] [address]
• Global Config
• VLAN Mode
Switching Commands
177
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set igmp querier query-interval
Use this command to set the IGMP Querier Query Interval time. It is the amount of time in
seconds that the switch waits before sending another general query.
Default
disabled
Format
Mode
set igmp querier query-interval <1-18000>
Global Config
no set igmp querier query-interval
Use this command to set the IGMP Querier Query Interval time to its default value.
Format
Mode
no set igmp querier query-interval
Global Config
set igmp querier timer expiry
Use this command to set the IGMP Querier timer expiration period. It is the time period that
the switch remains in Non-Querier mode once it has discovered that there is a Multicast
Querier in the network.
Default
60 seconds
Format
Mode
set igmp querier timer expiry <60-300>
Global Config
no set igmp querier timer expiry
Use this command to set the IGMP Querier timer expiration period to its default value.
Format
Mode
no set igmp querier timer expiry
Global Config
set igmp querier version
Use this command to set the IGMP version of the query that the snooping switch is going to
send periodically.
Default
1
Format
Mode
set igmp querier version <1-2>
Global Config
Switching Commands
178
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no set igmp querier version
Use this command to set the IGMP Querier version to its default value.
Format
Mode
no set igmp querier version
Global Config
set igmp querier election participate
Use this command to enable the Snooping Querier to participate in the Querier Election
process when it discovers the presence of another Querier in the VLAN. When this mode is
enabled, if the Snooping Querier finds that the other Querier’s source address is better (less)
than the Snooping Querier’s address, it stops sending periodic queries. If the Snooping
Querier wins the election, then it will continue sending periodic queries.
Default
disabled
Format
Mode
set igmp querier election participate
VLAN Config
no set igmp querier election participate
Use this command to set the Snooping Querier not to participate in querier election but go
into non-querier mode as soon as it discovers the presence of another querier in the same
VLAN.
Format
Mode
no set igmp querier election participate
VLAN Config
show igmpsnooping querier
Use this command to display IGMP Snooping Querier information. Configured information is
displayed whether or not IGMP Snooping Querier is enabled.
Format
Mode
show igmpsnooping querier [{detail | vlan <vlanid>}]
Privileged EXEC
When the optional argument <vlanid> is not used, the command displays the following
information.
Field
Description
Admin Mode
Indicates whether or not IGMP Snooping Querier is active on the switch.
The version of IGMP that will be used while sending out the queries.
Admin Version
Querier
Address
The IP Address which will be used in the IPv4 header while sending out IGMP queries. It
can be configured using the appropriate command.
Switching Commands
179
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Field
Description
Query Interval
The amount of time in seconds that a Snooping Querier waits before sending out the
periodic general query.
Querier Timeout
The amount of time to wait in the Non-Querier operational state before moving to a
Querier state.
When you specify a value for <vlanid>, the following additional information appears.
Field
Description
VLAN Admin
Mode
Indicates whether iGMP Snooping Querier is active on the VLAN.
VLAN
Operational
State
Indicates whether IGMP Snooping Querier is in “Querier” or “Non-Querier” state. When
the switch is in Querierstate, it will send out periodic general queries. When in
Non-Querierstate, it will wait for moving to Querier state and does not send out any
queries.
VLAN
Indicates the time to wait before removing a Leave from a host upon receiving a Leave
request. This value is calculated dynamically from the Queries received from the
network. If the Snooping Switch is in Querier state, then it is equal to the configured
value.
Operational
Max Response
Time
QuerierElection
Participation
Indicates whether the IGMP Snooping Querier participates in querier election if it
discovers the presence of a querier in the VLAN.
Querier VLAN
Address
The IP address will be used in the IPv4 header while sending out IGMP queries on this
VLAN. It can be configured using the appropriate command.
Operational
Version
The version of IPv4 will be used while sending out IGMP queries on this VLAN.
Indicates the IP address of the most recent Querier from which a Query was received.
Last Querier
Address
Last Querier
Version
Indicates the IGMP version of the most recent Querier from which a Query was received
on this VLAN.
When the optional argument detailis used, the command shows the global information
and the information for all Querier-enabled VLANs.
MLD Snooping Commands
This section describes commands used for MLD Snooping. In IPv4, Layer 2 switches can use
IGMP Snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2
interfaces so that multicast traffic is forwarded only to those interfaces associated with IP
multicast addresses. In IPv6, MLD Snooping performs a similar function. With MLD
Snooping, IPv6 multicast data is selectively forwarded to a list of ports that want to receive
the data, instead of being flooded to all ports in a VLAN. This list is constructed by snooping
IPv6 multicast control packets.
Switching Commands
180
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set mld
Use this command to enable MLD Snooping on the system (Global Config Mode) or an
Interface (Interface Config Mode). This command also enables MLD Snooping on a particular
VLAN and enables MLD Snooping on all interfaces participating in a VLAN.
If an interface has MLD Snooping enabled and you enable this interface for routing or enlist it
as a member of a port-channel (LAG), MLD Snooping functionality is disabled on that
interface. MLD Snooping functionality is re-enabled if you disable routing or remove port
channel (LAG) membership from an interface that has MLD Snooping enabled.
MLD Snooping supports the following activities:
•
Validation of address version, payload length consistencies and discarding of the frame
upon error.
•
Maintenance of the forwarding table entries based on the MAC address versus the IPv6
address.
•
Flooding of unregistered multicast data packets to all ports in the VLAN.
Default
disabled
Format
Mode
set mld vlanid
• Global Config
• Interface Config
• VLAN Mode
no set mld
Use this command to disable MLD Snooping on the system.
Format
Mode
set mld vlanid
• Global Config
• Interface Config
• VLAN Mode
set mld interfacemode
Use this command to enable MLD Snooping on all interfaces. If an interface has MLD
Snooping enabled and you enable this interface for routing or enlist it as a member of a
port-channel (LAG), MLD Snooping functionality is disabled on that interface. MLD Snooping
functionality is re-enabled if you disable routing or remove port-channel (LAG) membership
from an interface that has MLD Snooping enabled.
Default
disabled
Format
Mode
set mld interfacemode
Global Config
Switching Commands
181
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no set mld interfacemode
Use this command to disable MLD Snooping on all interfaces.
Format
Mode
no set mld interfacemode
Global Config
set mld fast-leave
Use this command to enable MLD Snooping fast-leave admin mode on a selected interface
or VLAN. Enabling fast-leave allows the switch to immediately remove the Layer 2 LAN
interface from its forwarding table entry upon receiving and MLD done message for that
multicast group without first sending out MAC-based general queries to the interface.
Note: You should enable fast-leave admin mode only on VLANs where
only one host is connected to each Layer 2 LAN port. This prevents
the inadvertent dropping of the other hosts that were connected to
the same layer 2 LAN port but were still interested in receiving
multicast traffic directed to that group.
Note: Fast-leave processing is supported only with MLD version 1 hosts.
Default
disabled
Format
Mode
set mld fast-leave vlanid
• Interface Config
• VLAN Mode
no set mld fast-leave
Use this command to disable MLD Snooping fast-leave admin mode on a selected interface.
Format
Mode
no set mld fast-leave vlanid
• Interface Config
• VLAN Mode
set mld groupmembership-interval
Use this command to set the MLD Group Membership Interval time on a VLAN, one interface
or all interfaces. The Group Membership Interval time is the amount of time in seconds that a
switch waits for a report from a particular group on a particular interface before deleting the
Switching Commands
182
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
interface from the entry. This value must be greater than the MLDv2 Maximum Response
time value. The range is 2 to 3600 seconds.
Default
260 seconds
Format
Mode
set mld groupmembership-interval vlanid 2-3600
• Interface Config
• Global Config
• VLAN Mode
no set groupmembership-interval
Use this command to set the MLDv2 Group Membership Interval time to the default value.
Format
Mode
no set mld groupmembership-interval
• Interface Config
• Global Config
• VLAN Mode
set mld maxresponse
Use this command to set the MLD Maximum Response time for the system, on a particular
interface or VLAN. The Maximum Response time is the amount of time in seconds that a
switch will wait after sending a query on an interface because it did not receive a report for a
particular group in that interface. This value must be less than the MLD Query Interval time
value. The range is 1 to 65 seconds.
Default
10 seconds
Format
Mode
set mld maxresponse 1-65
• Global Config
• Interface Config
• VLAN Mode
no set mld maxresponse
Use this command to set the max response time (on the interface or VLAN) to the default
value.
Format
Mode
no set mld maxresponse
• Global Config
• Interface Config
• VLAN Mode
set mld mcrtexpiretime
Use this command to set the Multicast Router Present Expiration time. The time is set for the
system, on a particular interface or VLAN. This is the amount of time in seconds that a switch
Switching Commands
183
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
waits for a query to be received on an interface before the interface is removed from the list of
interfaces with multicast routers attached. The range is 0 to 3600 seconds. A value of 0
indicates an infinite timeout, that is, no expiration.
Default
0
Format
Mode
set mld mcrtexpiretime vlanid 0-3600
• Global Config
• Interface Config
no set mld mcrtexpiretime
Use this command to set the Multicast Router Present Expiration time to 0. The time is set for
the system, on a particular interface or a VLAN.
Format
Mode
no set mld mcrtexpiretime vlanid
• Global Config
• Interface Config
set mld mrouter
Use this command to configure the VLAN ID for the VLAN that has the multicast router
attached mode enabled.
Format
Mode
set mld mrouter vlanid
Interface Config
no set mld mrouter
Use this command to disable multicast router attached mode for a VLAN with a particular
VLAN ID.
Format
Mode
no set mld mrouter vlanid
Interface Config
set mld mrouter interface
Use this command to configure the interface as a multicast router-attached interface. When
configured as a multicast router interface, the interface is treated as a multicast
router-attached interface in all VLANs.
Default
disabled
Format
Mode
set mld mrouter interface
Interface Config
Switching Commands
184
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no set mld mrouter interface
Use this command to disable the status of the interface as a statically configured multicast
router-attached interface.
Format
Mode
no set mld mrouter interface
Interface Config
show mldsnooping
Use this command to display MLD Snooping information. Configured information is displayed
whether or not MLD Snooping is enabled.
Format
Mode
show mldsnooping [unit/slot/port | vlanid]
Privileged EXEC
When the optional arguments unit/slot/portor vlanidare not used, the command
displays the following information.
Term
Definition
Admin Mode
Indicates whether or not MLD Snooping is active on the switch.
Interfaces on which MLD Snooping is enabled.
Interfaces
Enabled for
MLD Snooping
MLD Control
Frame Count
Displays the number of MLD Control frames that are processed by the CPU.
VLANs on which MLD Snooping is enabled.
VLANs Enabled
for MLD
Snooping
When you specify the unit/slot/portvalues, the following information displays.
Term
Definition
MLD Snooping
Admin Mode
Indicates whether MLD Snooping is active on the interface.
Fast Leave
Mode
Indicates whether MLD Snooping Fast Leave is active on the VLAN.
Group
Membership
Interval
Shows the amount of time in seconds that a switch will wait for a report from a particular
group on a particular interface, which is participating in the VLAN, before deleting the
interface from the entry. This value may be configured.
Max Response
Time
Displays the amount of time the switch waits after it sends a query on an interface,
participating in the VLAN, because it did not receive a report for a particular group on that
interface. This value may be configured.
Multicast
Router Present
Expiration Time
Displays the amount of time to wait before removing an interface that is participating in
the VLAN from the list of interfaces with multicast routers attached. The interface is
removed if a query is not received. This value may be configured.
Switching Commands
185
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
When you specify a value for vlanid, the following information appears.
Term
Definition
VLAN Admin
Mode
Indicates whether MLD Snooping is active on the VLAN.
show mldsnooping mrouter interface
Use this command to display information about statically configured multicast router attached
interfaces.
Format
Mode
show mldsnooping mrouter interface unit/slot/port
Privileged EXEC
Term
Definition
Interface
Shows the interface on which multicast router information is being displayed.
Indicates whether multicast router is statically enabled on the interface.
Multicast
Router
Attached
VLAN ID
Displays the list of VLANs of which the interface is a member.
show mldsnooping mrouter vlan
Use this command to display information about statically configured multicast router-attached
interfaces.
Format
Mode
show mldsnooping mrouter vlan unit/slot/port
Privileged EXEC
Term
Definition
Interface
Shows the interface on which multicast router information is being displayed.
Displays the list of VLANs of which the interface is a member.
VLAN ID
show mac-address-table mldsnooping
Use this command to display the MLD Snooping entries in the Multicast Forwarding
Database (MFDB) table.
Format
Mode
show mac-address-table mldsnooping
Privileged EXEC
Switching Commands
186
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
VLAN ID
The VLAN in which the MAC address is learned.
MAC Address
Type
A multicast MAC address for which the switch has forwarding or filtering information. The
format is 6 two-digit hexadecimal numbers that are separated by colons, for example
01:23:45:67:89:AB.
The type of entry, which is either static (added by the user) or dynamic (added to the
table as a result of a learning process or protocol.)
Description
Interfaces
The text description of this multicast table entry.
The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
MLD Snooping Querier Commands
In an IPv6 environment, MLD Snooping requires that one central switch or router periodically
query all end-devices on the network to announce their multicast memberships. This central
device is the MLD Querier. The MLD query responses, known as MLD reports, keep the
switch updated with the current multicast group membership on a port-by-port basis. If the
switch does not receive updated membership information in a timely fashion, it will stop
forwarding multicasts to the port where the end device is located.
This section describes the commands you use to configure and display information on MLD
Snooping queries on the network and, separately, on VLANs.
set mld querier
Use this command to enable MLD Snooping Querier on the system (Global Config Mode) or
on a VLAN. Using this command, you can specify the IP address that the snooping querier
switch should use as a source address while generating periodic queries.
If a VLAN has MLD Snooping Querier enabled and MLD Snooping is operationally disabled
on it, MLD Snooping Querier functionality is disabled on that VLAN. MLD Snooping
functionality is re-enabled if MLD Snooping is operational on the VLAN.
The MLD Snooping Querier sends periodic general queries on the VLAN to solicit
membership reports.
Default
Format
Mode
disabled
set mld querier [vlan-id] [address ipv6_address]
• Global Config
• VLAN Mode
Switching Commands
187
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no set mld querier
Use this command to disable MLD Snooping Querier on the system. Use the optional
parameter addressto reset the querier address.
no set mld querier [vlan-id][address]
Format
Mode
• Global Config
• VLAN Mode
set mld querier query_interval
Use this command to set the MLD Querier Query Interval time. This is the amount of time in
seconds that the switch waits before sending another general query.
Default
Format
Mode
disabled
set mld querier query_interval <1-18000>
Global Config
no set mld querier query_interval
Use this command to set the MLD Querier Query Interval time to its default value.
Format
Mode
no set mld querier query_interval
Global Config
set mld querier timer expiry
Use this command to set the MLD Querier timer expiration period. This is the time period that
the switch remains in Non-Querier mode once it discovers that there is a Multicast Querier in
the network.
Default
Format
Mode
60 seconds
set mld querier timer expiry <60-300>
Global Config
no set mld querier timer expiry
Use this command to set the MLD Querier timer expiration period to its default value.
Format
Mode
no set mld querier timer expiry
Global Config
Switching Commands
188
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set mld querier election participate
Use this command to enable the Snooping Querier to participate in the Querier Election
process when it discovers the presence of another Querier in the VLAN. When this mode is
enabled, if the Snooping Querier finds that the other Querier’s source address is better (less)
than the Snooping Querier’s address, it stops sending periodic queries. If the Snooping
Querier wins the election, then it will continue sending periodic queries.
Default
disabled
Format
Mode
set mld querier election participate
VLAN Config
no set mld querier election participate
Use this command to set the snooping querier not to participate in querier election, but go
into a non-querier mode as soon as it discovers the presence of another querier in the same
VLAN.
Format
Mode
no set mld querier election participate
VLAN Config
show mldsnooping querier
Use this command to display MLD Snooping Querier information. Configured information is
displayed whether or not MLD Snooping Querier is enabled.
Format
Mode
show mldsnooping querier [{detail | vlan <vlanid>}]
Privileged EXEC
When the optional arguments vlandidare not used, the command displays the following
information.
Field
Description
Admin Mode
Indicates whether or not MLD Snooping Querier is active on the switch.
Admin Version
Indicates the version of MLD that will be used while sending out the queries. This is
defaulted to MLD v1 and it cannot be changed.
Querier Address
Query Interval
Shows the IP address which will be used in the IPv6 header while sending out MLD
queries. It can be configured using the appropriate command.
Shows the amount of time in seconds that a Snooping Querier waits before sending
out the periodic general query.
Querier Timeout
Displays the amount of time to wait in the Non-Querier operational state before moving
to a Querier state.
Switching Commands
189
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
When you specify a value for vlanid, the following information appears.
Field
Description
VLAN Admin
Mode
Indicates whether MLD Snooping Querier is active on the VLAN.
VLAN Operational Indicates whether MLD Snooping Querier is in “Querier” or “Non-Querier” state. When
State
the switch is in Querier state, it will send out periodic general queries. When in
Non-Querier state, it will wait for moving to Querier state and does not send out any
queries.
Operational Max
Response Time
Indicates the time to wait before removing a Leave from a host upon receiving a Leave
request. This value is calculated dynamically from the Queries received from the
network. If the Snooping Switch is in Querier state, then it is equal to the configured
value.
Querier Election
Participate
Indicates whether the MLD Snooping Querier participates in querier election if it
discovers the presence of a querier in the VLAN.
Querier VLAN
Address
The IP address will be used in the IPv6 header while sending out MLD queries on this
VLAN. It can be configured using the appropriate command.
Operational
Version
This version of IPv6 will be used while sending out MLD queriers on this VLAN.
Last Querier
Address
Indicates the IP address of the most recent Querier from which a Query was received.
Last Querier
Version
Indicates the MLD version of the most recent Querier from which a Query was received
on this VLAN.
When the optional argument detailis used, the command shows the global information
and the information for all Querier-enabled VLANs.
Port Security Commands
This section describes the commands you use to configure Port Security on the switch. Port
security, which is also known as port MAC locking, allows you to secure the network by
locking allowable MAC addresses on a port. Packets with a matching source MAC address
are forwarded normally, and all other packets are discarded.
Switching Commands
190
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
port-security
This command enables port locking at the system level (Global Config) or port level
(Interface Config).
Default
disabled
Format
Mode
port-security
• Global Config
• Interface Config
no port-security
This command disables port locking for one (Interface Config) or all (Global Config) ports.
Format
Mode
no port-security
• Global Config
• Interface Config
port-security max-dynamic
This command sets the maximum number of dynamically locked MAC addresses allowed on
a specific port.
Default
600
Format
Mode
port-security max-dynamic<maxvalue>
Interface Config
no port-security max-dynamic
This command resets the maximum number of dynamically locked MAC addresses allowed
on a specific port to its default value.
Format
Mode
no port-security max-dynamic
Interface Config
port-security max-static
This command sets the maximum number of statically locked MAC addresses allowed on a
port
.
Default
20
Format
Mode
port-security max-static<maxvalue>
Interface Config
Switching Commands
191
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no port-security max-static
This command sets maximum number of statically locked MAC addresses to the default
value.
Format
Mode
no port-security max-static
Interface Config
port-security mac-address
This command adds a MAC address to the list of statically locked MAC addresses. The
<vid>is the VLAN ID.
Format
Mode
port-security mac-address <mac-address> <vid>
Interface Config
no port-security mac-address
This command removes a MAC address from the list of statically locked MAC addresses.
Format
Mode
no port-security mac-address <mac-address> <vid>
Interface Config
port-security mac-address move
This command converts dynamically locked MAC addresses to statically locked addresses.
Format
Mode
port-security mac-address move
Interface Config
port-security mac-address sticky
This command enables sticky mode Port MAC Locking on a port. If accompanied by a MAC
address and a VLAN id (for interface config mode only), it adds a sticky MAC address to the
list of statically locked MAC addresses. These sticky addresses are converted back to
dynamically locked addresses if sticky mode is disabled on the port. The <vid>is the VLAN
ID. The Global command applies the sticky mode to all valid interfaces (physical and LAG).
There is no global sticky mode as such.
Sticky addresses that are dynamically learned will appear in show running config as
port-security mac-address sticky <mac> <vid>entries. This distinguishes them
from static entries.
Format
port-security mac-address sticky [<mac-address> <vid>]
Modes
• Global Config
• Interface Config
Switching Commands
192
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no port-security mac-address sticky
The no form removes the sticky mode. The sticky MAC address can be deleted by using the
command no port-security mac-address <mac-address> <vid>.
Format
no port-security mac-address sticky [<mac-address>
<vid>]
Modes
• Global Config
• Interface Config
show port-security
This command displays the port-security settings. If you do not use a parameter, the
command displays the settings for the entire system. Use the optional parameters to display
the settings on a specific interface or on all interfaces.
Format
Mode
show port-security [{<unit/slot/port> | all}]
Privileged EXEC
Term
Definition
Admin Mode
Port Locking mode for the entire system. This field displays if you do not supply any
parameters.
For each interface, or for the interface you specify, the following information appears:
Term
Definition
Admin Mode
Dynamic Limit
Static Limit
Port Locking mode for the Interface.
Maximum dynamically allocated MAC Addresses.
Maximum statically allocated MAC Addresses.
Whether violation traps are enabled.
Violation Trap
Mode
show port-security dynamic
This command displays the dynamically locked MAC addresses for the port.
Format
Mode
show port-security dynamic[lag <lag-intf-num> | <unit/slot/port>]
Privileged EXEC
Term
Definition
MAC Address
MAC Address of dynamically locked MAC.
Switching Commands
193
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show port-security static
This command displays the statically locked MAC addresses for port.
Format
show port-security static [lag <lag-intf-num> | <unit/slot/port>]
Mode
Privileged EXEC
Term
Definition
MAC Address
MAC Address of statically locked MAC.
show port-security violation
This command displays the source MAC address of the last packet discarded on a locked
port.
Format
Mode
show port-security violation[lag <lag-intf-num> | <unit/slot/port>]
Privileged EXEC
Term
Definition
MAC Address
MAC Address of discarded packet on locked port.
LLDP (802.1AB) Commands
This section describes the command you use to configure Link Layer Discovery Protocol
(LLDP), which is defined in the IEEE 802.1AB specification. LLDP allows stations on an 802
LAN to advertise major capabilities and physical descriptions. The advertisements allow a
network management system (NMS) to access and display this information.
lldp transmit
Use this command to enable the LLDP advertise capability.
Default
enabled
Format
Mode
lldp transmit
Interface Config
no lldp transmit
Use this command to return the local data transmission capability to the default.
Format
Mode
no lldp transmit
Interface Config
Switching Commands
194
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
lldp receive
Use this command to enable the LLDP receive capability.
Default
enabled
Format
Mode
lldp receive
Interface Config
no lldp receive
Use this command to return the reception of LLDPDUs to the default value.
Format
Mode
no lldp receive
Interface Config
lldp timers
Use this command to set the timing parameters for local data transmission on ports enabled
for LLDP. The <interval-seconds>determines the number of seconds to wait between
transmitting local data LLDPDUs. The range is 1-32768 seconds. The <hold-value>is the
multiplier on the transmit interval that sets the TTL in local data LLDPDUs. The multiplier
range is 2-10. The <reinit-seconds>is the delay before re-initialization, and the range is
1-0 seconds.
Default
• interval—30 seconds
• hold—4
• reinit—2 seconds
Format
Mode
lldp timers [interval <interval-seconds>] [hold <hold-value>] [reinit
<reinit-seconds>]
Global Config
no lldp timers
Use this command to return any or all timing parameters for local data transmission on ports
enabled for LLDP to the default values.
Format
Mode
no lldp timers [interval] [hold] [reinit]
Global Config
lldp transmit-tlv
Use this command to specify which optional type length values (TLVs) in the 802.1AB basic
management set are transmitted in the LLDPDUs. Use sys-name to transmit the system
transmit the system description TLV. Use sys-capto transmit the system capabilities TLV.
Switching Commands
195
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Use port-descto transmit the port description TLV. To configure the port description, see
Default
all optional TLVs are included
Format
Mode
lldp transmit-tlv [sys-desc] [sys-name] [sys-cap] [port-desc]
Interface Config
no lldp transmit-tlv
Use this command to remove an optional TLV from the LLDPDUs. Use the command without
parameters to remove all optional TLVs from the LLDPDU.
Format
Mode
no lldp transmit-tlv [sys-desc] [sys-name] [sys-cap] [port-desc]
Interface Config
lldp transmit-mgmt
Use this command to include transmission of the local system management address
information in the LLDPDUs.
Default
enabled
Format
Mode
lldp transmit-mgmt
Interface Config
no lldp transmit-mgmt
Use this command to include transmission of the local system management address
information in the LLDPDUs. Use this command to cancel inclusion of the management
information in LLDPDUs.
Format
Mode
no lldp transmit-mgmt
Interface Config
lldp notification
Use this command to enable remote data change notifications.
Default
disabled
Format
Mode
lldp notification
Interface Config
Switching Commands
196
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no lldp notification
Use this command to disable notifications.
Default
disabled
Format
Mode
no lldp notification
Interface Config
lldp notification-interval
Use this command to configure how frequently the system sends remote data change
notifications. The <interval>parameter is the number of seconds to wait between sending
notifications. The valid interval range is 5-3600 seconds.
Default
5
Format
Mode
lldp notification-interval <interval>
Global Config
no lldp notification-interval
Use this command to return the notification interval to the default value.
Format
Mode
no lldp notification-interval
Global Config
clear lldp statistics
Use this command to reset all LLDP statistics, including MED-related information.
Format
Mode
clear lldp statistics
Privileged Exec
clear lldp remote-data
Use this command to delete all information from the LLDP remote data table, including
MED-related information.
Format
Mode
clear lldp remote-data
Global Config
Switching Commands
197
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show lldp
Use this command to display a summary of the current LLDP configuration.
Format
show lldp
Mode
Privileged Exec
Term
Definition
Transmit
Interval
How frequently the system transmits local data LLDPDUs, in seconds.
Transmit Hold
Multiplier
The multiplier on the transmit interval that sets the TTL in local data LLDPDUs.
Re-initialization
Delay
The delay before re-initialization, in seconds.
Notification
Interval
How frequently the system sends remote data change notifications, in seconds.
show lldp interface
Use this command to display a summary of the current LLDP configuration for a specific
interface or for all interfaces.
Format
Mode
show lldp interface {<unit/slot/port> | all}
Privileged Exec
Term
Definition
Interface
The interface in a unit/slot/port format.
Link
Shows whether the link is up or down.
Transmit
Receive
Notify
TLVs
Shows whether the interface transmits LLDPDUs.
Shows whether the interface receives LLDPDUs.
Shows whether the interface sends remote data change notifications.
Shows whether the interface sends optional TLVs in the LLDPDUs. The TLV codes can
be 0 (Port Description), 1 (System Name), 2 (System Description), or 3 (System
Capability).
Mgmt
Shows whether the interface transmits system management address information in the
LLDPDUs.
Switching Commands
198
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show lldp statistics
Use this command to display the current LLDP traffic and remote table statistics for a specific
interface or for all interfaces.
Format
show lldp statistics{<unit/slot/port> | all}
Mode
Privileged Exec
Term
Definition
Last Update
The amount of time since the last update to the remote table in days, hours, minutes, and
seconds.
Total Inserts
Total Deletes
Total Drops
Total number of inserts to the remote data table.
Total number of deletes from the remote data table.
Total number of times the complete remote data received was not inserted due to
insufficient resources.
Total Ageouts
Total number of times a complete remote data entry was deleted because the Time to
Live interval expired.
The table contains the following column headings:
Term
Definition
Interface
The interface in unit/slot/port format.
Transmit Total
Receive Total
Discards
Total number of LLDP packets transmitted on the port.
Total number of LLDP packets received on the port.
Total number of LLDP frames discarded on the port for any reason.
The number of invalid LLDP frames received on the port.
Errors
Ageouts
Total number of times a complete remote data entry was deleted for the port because the
Time to Live interval expired.
TLV Discards
The number of TLVs discarded.
TLV Unknowns
Total number of LLDP TLVs received on the port where the type value is in the reserved
range, and not recognized.
TLV MED
TVL802.1
TVL802.3
Total number of LLDP MED TLVs received on the local ports.
Total number of 802.1 LLDP TLVs received on the local ports.
Total number of 802.3 LLDP TLVs received on the local ports.
Switching Commands
199
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show lldp remote-device
Use this command to display summary information about remote devices that transmit
current LLDP data to the system. You can show information about LLDP remote data
received on all ports or on a specific port.
Format
show lldp remote-device {<unit/slot/port> | all}
Mode
Privileged EXEC
Term
Definition
Local Interface
The interface that received the LLDPDU from the remote device.
An internal identifier to the switch to mark each remote device to the system.
RemID
Chassis ID
The ID that is sent by a remote device as part of the LLDP message, it is usually a MAC
address of the device.
Port ID
The port number that transmitted the LLDPDU.
The system name of the remote device.
System Name
Example: The following shows example CLI display output for the command.
(switch) #show lldp remote-device all
LLDP Remote Device Summary
Local
Interface RemID
Chassis ID
Port ID
System Name
------- ------- -------------------- ------------------ ------------------
0/1
0/2
0/3
0/4
0/5
0/6
0/7
0/7
0/7
0/7
0/7
0/7
0/8
0/9
0/10
0/11
0/12
2
3
4
5
1
6
00:FC:E3:90:01:0F
00:FC:E3:90:01:0F
00:FC:E3:90:01:0F
00:FC:E3:90:01:0F
00:FC:E3:90:01:0F
00:FC:E3:90:01:0F
00:FC:E3:90:01:11
00:FC:E3:90:01:12
00:FC:E3:90:01:13
00:FC:E3:90:01:14
00:FC:E3:90:03:11
00:FC:E3:90:04:11
--More-- or (q)uit
Switching Commands
200
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show lldp remote-device detail
Use this command to display detailed information about remote devices that transmit current
LLDP data to an interface on the system.
Format
show lldp remote-device detail <unit/slot/port>
Mode
Privileged EXEC
Term
Definition
Local Interface
The interface that received the LLDPDU from the remote device.
An internal identifier to the switch to mark each remote device to the system.
Remote
Identifier
Chassis ID
Subtype
The type of identification used in the Chassis ID field.
The chassis of the remote device.
Chassis ID
Port ID Subtype
Port ID
The type of port on the remote device.
The port number that transmitted the LLDPDU.
The system name of the remote device.
System Name
System
Description
Describes the remote system by identifying the system name and versions of hardware,
operating system, and networking software supported in the device.
Port
Description
Describes the port in an alpha-numeric format. The port description is configurable.
Indicates the primary function(s) of the device.
System
Capabilities
Supported
System
Capabilities
Enabled
Shows which of the supported system capabilities are enabled.
Management
Address
For each interface on the remote device with an LLDP agent, lists the type of address the
remote LLDP agent uses and specifies the address used to obtain information related to
the device.
Time To Live
The amount of time (in seconds) the remote device's information received in the
LLDPDU should be treated as valid information.
Example: The following shows example CLI display output for the command.
(Switch) #show lldp remote-device detail 0/7
LLDP Remote Device Detail
Local Interface: 0/7
Remote Identifier: 2
Chassis ID Subtype: MAC Address
Chassis ID: 00:FC:E3:90:01:0F
Port ID Subtype: MAC Address
Switching Commands
201
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Port ID: 00:FC:E3:90:01:11
System Name:
System Description:
Port Description:
System Capabilities Supported:
System Capabilities Enabled:
Time to Live: 24 seconds
show lldp local-device
Use this command to display summary information about the advertised LLDP local data.
This command can display summary information or detail for each interface.
Format
show lldp local-device {<unit/slot/port> | all}
Mode
Privileged EXEC
Term
Definition
Interface
The interface in a unit/slot/port format.
The port ID associated with this interface.
The port description associated with the interface.
Port ID
Port
Description
show lldp local-device detail
Use this command to display detailed information about the LLDP data a specific interface
transmits.
Format
Mode
show lldp local-device detail <unit/slot/port>
Privileged EXEC
Term
Definition
Interface
The interface that sends the LLDPDU.
The type of identification used in the Chassis ID field.
Chassis ID
Subtype
Chassis ID
The chassis of the local device.
Port ID Subtype
Port ID
The type of port on the local device.
The port number that transmitted the LLDPDU.
The system name of the local device.
System Name
System
Description
Describes the local system by identifying the system name and versions of hardware,
operating system, and networking software supported in the device.
Port
Description
Describes the port in an alpha-numeric format.
Switching Commands
202
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
System
Capabilities
Supported
Indicates the primary function(s) of the device.
System
Capabilities
Enabled
Shows which of the supported system capabilities are enabled.
Management
Address
The type of address and the specific address the local LLDP agent uses to send and
receive information.
LLDP-MED Commands
Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED) (ANSI-TIA-1057)
provides an extension to the LLDP standard. Specifically, LLDP-MED provides extensions for
network configuration and policy, device location, Power over Ethernet (PoE) management
and inventory management.
lldp med
Use this command to enable MED. By enabling MED, you will be effectively enabling the
transmit and receive function of LLDP.
Default
enabled
Format
Mode
lldp med
Interface Config
no lldp med
Use this command to disable MED.
Format
Mode
no lldp med
Interface Config
lldp med confignotification
Use this command to configure all the ports to send the topology change notification.
Default
enabled
Format
Mode
lldp med confignotification
Interface Config
Switching Commands
203
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ldp med confignotification
Use this command to disable notifications.
Format
Mode
no lldp med confignotification
Interface Config
lldp med transmit-tlv
Use this command to specify which optional Type Length Values (TLVs) in the LLDP MED set
will be transmitted in the Link Layer Discovery Protocol Data Units (LLDPDUs).
Default
By default, the capabilities and network policy TLVs are included.
Format
Mode
lldp med transmit-tlv [capabilities] [ex-pd] [ex-pse] [inventory]
[location] [network-policy]
Interface Config
Term
Definition
capabilities
Transmit the LLDP capabilities TLV.
Transmit the LLDP extended PD TLV.
Transmit the LLDP extended PSE TLV.
Transmit the LLDP inventory TLV.
Transmit the LLDP location TLV.
Transmit the LLDP network policy TLV.
ex-pd
ex-pse
inventory
location
network-policy
Note: The current implementation supports one network policy: the voice
VLAN as defined by the voice vlancommands.
no lldp med transmit-tlv
Use this command to remove a TLV.
Format
Mode
no lldp med transmit-tlv [capabilities] [network-policy] [ex-pse]
[ex-pd] [location] [inventory]
Interface Config
Switching Commands
204
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
lldp med all
Use this command to configure LLDP-MED on all the ports
Format
Mode
lldp med all
Global Config
no lldp med all
Use this command to remove LLDP-MD on all ports.
Format
Mode
no lldp med all
Global Config
lldp med confignotification all
Use this command to configure all the ports to send the topology change notification.
Format
Mode
lldp med confignotification all
Global Config
no lldp med confignotification all
Use this command to disable all the ports to send the topology change notification.
Format
Mode
no lldp med confignotification all
Global Config
lldp med faststartrepeatcount
Use this command to set the value of the fast start repeat count. [count]is the number of
LLDP PDUs that will be transmitted when the product is enabled. The range is 1 to 10.
Default
3
Format
Mode
lldp med faststartrepeatcount [count]
Global Config
no lldp med faststartrepeatcount
Use this command to return to the factory default value.
Format
Mode
no lldp med faststartrepeatcount
Global Config
Switching Commands
205
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
lldp med transmit-tlv all
Use this command to specify which optional Type Length Values (TLVs) in the LLDP MED set
will be transmitted in the Link Layer Discovery Protocol Data Units (LLDPDUs).
Default
By default, the capabilities and network policy TLVs are included.
Format
Mode
lldp med transmit-tlv all [capabilities] [ex-pd] [ex-pse] [inventory]
[location] [network-policy]
Global Config
Term
Definition
capabilities
Transmit the LLDP capabilities TLV.
Transmit the LLDP extended PD TLV.
Transmit the LLDP extended PSE TLV.
Transmit the LLDP inventory TLV.
Transmit the LLDP location TLV.
Transmit the LLDP network policy TLV.
ex-pd
ex-pse
inventory
location
network-policy
no lldp med transmit-tlv
Use this command to remove a TLV.
Format
Mode
no lldp med transmit-tlv all [capabilities] [network-policy] [ex-pse]
[ex-pd] [location] [inventory]
Global Config
show lldp med
Use this command to display a summary of the current LLDP MED configuration.
Format
Mode
show lldp med
Privileged Exec
Term
Definition
Fast Start
Repeat Count
The number of LLDP PDUs that will be transmitted when the protocol is enabled.
Device Class
The local device’s MED Classification. There are four different kinds of devices, three of
them represent the actual end points (classified as Class I Generic[IP Communication
Controller etc.], Class II Media Conference Bridge etc.], Class III Communication [IP
Telephone etc.]. Class IV Network Connectivity Device, which is typically a LAN Switch,
Router, IEEE 802.11 Wireless Access Point, etc.
Switching Commands
206
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Example: The following shows example CLI display output for the command.
(switch) #show lldp med
LLDP MED Global Configuration
Fast Start Repeat Count: 3
Device Class: Network Connectivity
(switch) #
show lldp med interface
Use this command to display a summary of the current LLDP MED configuration for a
specific interface. <unit/slot/port>indicates a specific physical interface. allindicates
all valid LLDP interfaces.
Format
Mode
show lldp med interface {<unit/slot/port> | all}
Privileged Exec
Term
Definition
Interface
The interface in a unit/slot/port format.
Link
Shows whether the link is up or down.
ConfigMED
OperMED
ConfigNotify
TLVsTx
Shows if the LLPD-MED mode is enabled or disabled on this interface
Shows if the LLPD-MED TLVs are transmitted or not on this interface.
Shows if the LLPD-MED topology notification mode of this interface.
Shows whether the interface sends optional TLVs in the LLDPDUs. The TLV codes
can be 0 (Capabilities), 1 (Network Policy), 2 (Location), 3 (Extended PSE), 4
(Extended Pd), or 5 (Inventory).
Example: The following shows example CLI display output for the command.
(Switch) #show lldp med interface all
Interface Link
configMED operMED ConfigNotify TLVsTx
--------- ------ --------- -------- ------------ -----------
1/0/1
1/0/2
1/0/3
1/0/4
1/0/5
1/0/6
1/0/7
1/0/8
1/0/9
1/0/10
1/0/11
1/0/12
1/0/13
Down
Up
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
Disabled Disabled Disabled
0,1
0,1
0,1
0,1
0,1
0,1
0,1
0,1
0,1
0,1
0,1
0,1
0,1
Down
Down
Down
Down
Down
Down
Down
Down
Down
Down
Down
Switching Commands
207
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
1/0/14
Down
Disabled Disabled Disabled
0,1
TLV Codes: 0- Capabilities,
2- Location,
1- Network Policy
3- Extended PSE
5- Inventory
4- Extended Pd,
--More-- or (q)uit
(Switch) #show lldp med interface 1/0/2
Interface Link
configMED operMED ConfigNotify TLVsTx
--------- ------ --------- -------- ------------ -----------
1/0/2
Up
Disabled Disabled Disabled
0,1
TLV Codes: 0- Capabilities,
2- Location,
1- Network Policy
3- Extended PSE
5- Inventory
4- Extended Pd,
(Routing) #
show lldp med local-device detail
This command displays detailed information about the LLDP data a specific interface
transmits.
Format
show lldp med local-device detail <unit/slot/port>
Mode
Privileged EXEC
Term
Definition
Media Application
Type
Shows the application type. Types are unknown, voice, voicesignaling, guestvoice,
guestvoicesignaling, sfotphonevoice, videoconferencing, streamingvideo,
videosignaling.
Vlan ID
Priority
DSCP
Shows the VLAN id associated with a particular policy type
Shows the priority associated with a particular policy type.
Shows the DSCP associated with a particular policy type.
Unknown
Indicates if the policy type is unknown. In this case, the VLAN ID, Priority and DSCP
are ignored.
Tagged
Indicates if the policy type is using tagged or untagged VLAN.
Shows the local hardware version.
Shows the local firmware version.
Shows the local software version.
Shows the local serial number.
Hardware Rev
Firmware Rev
Software Rev
Serial Num
Mfg Name
Shows the manufacture name.
Model Name
Shows the model name.
Example: The following shows example CLI display output for the command.
Switching Commands
208
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
(Switch) #show lldp med local-device detail 1/0/8
LLDP MED Local Device Detail
Interface: 1/0/8
Network Policies
Media Policy Application Type : voice
Vlan ID: 10
Priority: 5
DSCP: 1
Unknown: False
Tagged: True
Media Policy Application Type : streamingvideo
Vlan ID: 20
Priority: 1
DSCP: 2
Unknown: False
Tagged: True
Inventory
Hardware Rev: xxx xxx xxx
Firmware Rev: xxx xxx xxx
Software Rev: xxx xxx xxx
Serial Num: xxx xxx xxx
Mfg Name: xxx xxx xxx
Model Name: xxx xxx xxx
Asset ID: xxx xxx xxx
Location
Subtype: elin
Info: xxx xxx xxx
Extended POE
Device Type: pseDevice
Extended POE PSE
Available: 0.3 Watts
Source: primary
Priority: critical
Extended POE PD
Required: 0.2 Watts
Source: local
Priority: low
Switching Commands
209
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show lldp med remote-device
This command displays summary information about remote devices that transmit current
LLDP MED data to the system. You can show information about LLDP remote data received
on all ports or on a specific port.
Format
show lldp med remote-device {<unit/slot/port> | all}
Mode
Privileged EXEC
Term
Definition
Interface
The interface in a unit/slot/port format.
Device Class
The Remote device’s MED Classification. There are four different kinds of devices, three
of them represent the actual end points (classified as Class I Generic [IP Communication
Controller etc.], Class II Media [Conference Bridge etc.], Class III Communication [IP
Telephone etc]). The fourth device is Network Connectivity Device, which is typically a
LAN Switch/Router, IEEE 802.1 Bridge, IEEE 802.11 Wireless Access Point etc.
Example: The following shows example CLI display output for the command.
(Switch) #show lldp med remote-device all
LLDP MED Remote Device Summary
Local
Interface Remote ID Device Class
--------- --------- ------------
1/0/8
1/0/9
1/0/10
1/0/11
1/0/12
1
2
3
4
5
Class I
Not Defined
Class II
Class III
Network Con
show lldp med remote-device detail
Use this command to display detailed information about remote devices that transmit current
LLDP MED data to an interface on the system.
Format
Mode
show lldp med remote-device detail <unit/slot/port>
Privileged EXEC
Term
Definition
Supported
Capabilities
Shows the supported capabilities that were received in MED TLV on this port.
Enabled
capabilities
Shows the enabled capabilities that were enabled in MED TLV on this port.
Switching Commands
210
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Device Class
Shows the device class as advertized by the device remotely connected to the port.
Shows if network policy TLV is received in the LLDP frames on this port.
Network Policy
Information
Media
Application
Type
Shows the application type. Types of applications are unknown, voice, voicesignaling,
guestvoice, guestvoicesignaling, sfotphonevoice, videoconferencing, streamingvideo,
videosignaling.
VLAN Id
Priority
DSCP
Shows the VLAN id associated with a particular policy type.
Shows the priority associated with a particular policy type.
Shows the DSCP associated with a particular policy type.
Unknown
Indicates if the policy type is unknown. In this case, the VLAN id, Priority and DSCP are
ignored.
Tagged
Indicates if the policy type is using tagged or untagged VLAN.
Shows the hardware version of the remote device.
Hardware
Revision
Firmware
Revision
Shows the firmware version of the remote device.
Shows the software version of the remote device.
Software
Revision
Serial Number
Shows the serial number of the remote device.
Manufacturer
Name
Shows the manufacture name of the remote device.
Model Name
Asset ID
Shows the model name of the remote device.
Shows the asset id of the remote device.
Sub Type
Shows the type of location information.
Location
Information
Shows the location information as a string for a given type of location id
Device Type
Available
Source
Shows the remote device’s PoE device type connected to this port.
Shows the remote port’s PSE power value in tenths of a watt.
Shows the remote port’s PSE power source.
Priority
Shows the remote port’s PSE priority.
Required
Source
Shows the remote port’s PD power requirement.
Shows the remote port’s PD power source.
Priority
Shows the remote port’s PD power priority.
Example: The following shows example CLI display output for the command.
(Switch) #show lldp med remote-device detail 1/0/8
LLDP MED Remote Device Detail
Switching Commands
211
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Local Interface: 1/0/8
Remote Identifier: 18
Capabilities
MED Capabilities Supported: capabilities, networkpolicy, location, extendedpse
MED Capabilities Enabled: capabilities, networkpolicy
Device Class: Endpoint Class I
Network Policies
Media Policy Application Type : voice
Vlan ID: 10
Priority: 5
DSCP: 1
Unknown: False
Tagged: True
Media Policy Application Type : streamingvideo
Vlan ID: 20
Priority: 1
DSCP: 2
Unknown: False
Tagged: True
Inventory
Hardware Rev: xxx xxx xxx
Firmware Rev: xxx xxx xxx
Software Rev: xxx xxx xxx
Serial Num: xxx xxx xxx
Mfg Name: xxx xxx xxx
Model Name: xxx xxx xxx
Asset ID: xxx xxx xxx
Location
Subtype: elin
Info: xxx xxx xxx
Extended POE
Device Type: pseDevice
Extended POE PSE
Available: 0.3 Watts
Source: primary
Priority: critical
Extended POE PD
Required: 0.2 Watts
Source: local
Priority: low
Denial of Service Commands
Switching Commands
212
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
This section describes the commands you use to configure Denial of Service (DoS) Control.
The software provides support for classifying and blocking specific types of Denial of Service
attacks. You can configure your system to monitor and block these types of attacks:
•
•
•
•
SIP=DIP: Source IP address = Destination IP address.
First Fragment: TCP Header size smaller then configured value.
TCP Fragment: IP Fragment Offset = 1.
TCP Flag: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP
Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence
Number = 0 or TCP Flags SYN and FIN set.
•
•
•
•
•
•
L4 Port: Source TCP/UDP Port = Destination TCP/UDP Port.
ICMP: Limiting the size of ICMP Ping packets.
SMAC = DMAC: Source MAC address = Destination MAC address.
TCP Port: Source TCP Port = Destination TCP Port.
UDP Port: Source UDP Port = Destination UDP Port.
TCP Flag & Sequence: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags
= 0 and TCP Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP
Sequence Number = 0 or TCP Flags SYN and FIN set.
•
•
•
•
TCP Offset: TCP Header Offset = 1.
TCP SYN: TCP Flag SYN set.
TCP SYN & FIN: TCP Flags SYN and FIN set.
TCP FIN & URG & PSH: TCP Flags FIN and URG and PSH set and TCP Sequence
Number = 0.
•
•
ICMP V6: Limiting the size of ICMPv6 Ping packets.
ICMP Fragment: Checks for fragmented ICMP packets.
dos-control all
This command enables Denial of Service protection checks globally.
Default
disabled
Format
Mode
dos-control all
Global Config
no dos-control all
This command disables Denial of Service prevention checks globally.
Format
Mode
no dos-control all
Global Config
Switching Commands
213
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dos-control sipdip
This command enables Source IP address = Destination IP address (SIP=DIP) Denial of
Service protection. If the mode is enabled, Denial of Service prevention is active for this type
of attack. If packets ingress with SIP=DIP, the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control sipdip
Global Config
no dos-control sipdip
This command disables Source IP address = Destination IP address (SIP=DIP) Denial of
Service prevention.
Format
Mode
no dos-control sipdip
Global Config
dos-control firstfrag
This command enables Minimum TCP Header Size Denial of Service protection. If the mode
is enabled, Denial of Service prevention is active for this type of attack. If packets ingress
having a TCP Header Size smaller then the configured value, the packets will be dropped if
the mode is enabled.The default is disabled.If you enable dos-control firstfrag, but do not
provide a Minimum TCP Header Size, the system sets that value to 20.
Default
disabled <20>
Format
Mode
dos-control firstfrag [<0-255>]
Global Config
no dos-control firstfrag
This command sets Minimum TCP Header Size Denial of Service protection to the default
value of disabled.
Format
Mode
no dos-control firstfrag
Global Config
Switching Commands
214
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dos-control tcpfrag
This command enables TCP Fragment Denial of Service protection. If the mode is enabled,
Denial of Service prevention is active for this type of attack. If packets ingress having IP
Fragment Offset equal to one (1), the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpfrag
Global Config
no dos-control tcpfrag
This command disabled TCP Fragment Denial of Service protection.
Format
Mode
no dos-control tcpfrag
Global Config
dos-control tcpflag
This command enables TCP Flag Denial of Service protections. If the mode is enabled,
Denial of Service prevention is active for this type of attacks. If packets ingress having TCP
Flag SYN set and a source port less than 1024 or having TCP Control Flags set to 0 and TCP
Sequence Number set to 0 or having TCP Flags FIN, URG, and PSH set and TCP Sequence
Number set to 0 or having TCP Flags SYN and FIN both set, the packets will be dropped if
the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpflag
Global Config
no dos-control tcpflag
This command sets disables TCP Flag Denial of Service protections.
Format
Mode
no dos-control tcpflag
Global Config
dos-control l4port
This command enables L4 Port Denial of Service protections. If the mode is enabled, Denial
of Service prevention is active for this type of attack. If packets ingress having Source
TCP/UDP Port Number equal to Destination TCP/UDP Port Number, the packets will be
dropped if the mode is enabled.
Switching Commands
215
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: Some applications mirror source and destination L4 ports - RIP for
example uses 520 for both. If you enable dos-control l4port,
applications such as RIP may experience packet loss which would
render the application inoperable.
Default
disabled
Format
Mode
dos-control l4port
Global Config
no dos-control l4port
This command disables L4 Port Denial of Service protections.
Format
Mode
no dos-control l4port
Global Config
dos-control icmp
This command enables Maximum ICMP Packet Size Denial of Service protections. If the
mode is enabled, Denial of Service prevention is active for this type of attack. If ICMP Echo
Request (PING) packets ingress having a size greater than the configured value, the packets
will be dropped if the mode is enabled.
Default
disabled <512>
Format
Mode
dos-control icmp [<0-1023>]
Global Config
no dos-control icmp
This command disables Maximum ICMP Packet Size Denial of Service protections.
Format
Mode
no dos-control icmp
Global Config
dos-control smacdmac
This command enables Source MAC address = Destination MAC address (SMAC=DMAC)
Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for
Switching Commands
216
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
this type of attack. If packets ingress with SMAC=DMAC, the packets will be dropped if the
mode is enabled.
Default
disabled
Format
Mode
dos-control smacdmac
Global Config
no dos-control smacdmac
This command disables Source MAC address = Destination MAC address (SMAC=DMAC)
Denial of Service protection.
Format
Mode
no dos-control smacdmac
Global Config
dos-control tcpport
This command enables TCP L4 source = destination port number (Source TCP Port =
Destination TCP Port) Denial of Service protection. If the mode is enabled, Denial of Service
prevention is active for this type of attack. If packets ingress with Source TCP Port =
Destination TCP Port, the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpport
Global Config
no dos-control tcpport
This command disables TCP L4 source = destination port number (Source TCP Port =
Destination TCP Port) Denial of Service protection.
Format
Mode
no dos-control smacdmac
Global Config
dos-control udpport
This command enables UDP L4 source = destination port number (Source UDP Port =
Destination UDP Port) Denial of Service protection. If the mode is enabled, Denial of Service
prevention is active for this type of attack. If packets ingress with Source UDP Port =
Destination UDP Port, the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control udppport
Global Config
Switching Commands
217
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no dos-control udpport
This command disables UDP L4 source = destination port number (Source UDP Port =
Destination UDP Port) Denial of Service protection.
Format
Mode
no dos-control udppport
Global Config
dos-control tcpflagseq
This command enables TCP Flag and Sequence Denial of Service protections. If the mode is
enabled, Denial of Service prevention is active for this type of attack. If packets ingress
having TCP Flag SYN set and a source port less than 1024 or having TCP Control Flags set
to 0 and TCP Sequence Number set to 0 or having TCP Flags FIN, URG, and PSH set and
TCP Sequence Number set to 0 or having TCP Flags SYN and FIN both set, the packets will
be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpflagseq
Global Config
no dos-control tcpflagseq
This command sets disables TCP Flag and Sequence Denial of Service protection.
Format
Mode
no dos-control tcpflagseq
Global Config
dos-control tcpoffset
This command enables TCP Offset Denial of Service protection. If the mode is enabled,
Denial of Service prevention is active for this type of attack. If packets ingress having TCP
Header Offset equal to one (1), the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpoffset
Global Config
no dos-control tcpoffset
This command disabled TCP Offset Denial of Service protection.
Format
Mode
no dos-control tcpoffset
Global Config
Switching Commands
218
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dos-control tcpsyn
This command enables TCP SYN and L4 source = 0-1023 Denial of Service protection. If the
mode is enabled, Denial of Service prevention is active for this type of attack. If packets
ingress having TCP flag SYN set and an L4 source port from 0 to 1023, the packets will be
dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpsyn
Global Config
no dos-control tcpsyn
This command sets disables TCP SYN and L4 source = 0-1023 Denial of Service protection.
Format
Mode
no dos-control tcpsyn
Global Config
dos-control tcpsynfin
This command enables TCP SYN and FIN Denial of Service protection. If the mode is
enabled, Denial of Service prevention is active for this type of attack. If packets ingress
having TCP flags SYN and FIN set, the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpsynfin
Global Config
no dos-control tcpsynfin
This command sets disables TCP SYN & FIN Denial of Service protection.
Format
Mode
no dos-control tcpsynfin
Global Config
dos-control tcpfinurgpsh
This command enables TCP FIN and URG and PSH and SEQ=0 checking Denial of Service
protections. If the mode is enabled, Denial of Service prevention is active for this type of
attack. If packets ingress having TCP FIN, URG, and PSH all set and TCP Sequence Number
set to 0, the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control tcpfinurgpsh
Global Config
Switching Commands
219
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no dos-control tcpfinurgpsh
This command sets disables TCP FIN and URG and PSH and SEQ=0 checking Denial of
Service protections.
Format
Mode
no dos-control tcpfinurgpsh
Global Config
dos-control icmpv4
This command enables Maximum ICMPv4 Packet Size Denial of Service protections. If the
mode is enabled, Denial of Service prevention is active for this type of attack. If ICMPv4 Echo
Request (PING) packets ingress having a size greater than the configured value, the packets
will be dropped if the mode is enabled.
Default
disabled <512>
Format
Mode
dos-control icmpv4 <0-16384>
Global Config
no dos-control icmpv4
This command disables Maximum ICMP Packet Size Denial of Service protections.
Format
Mode
no dos-control icmpv4
Global Config
dos-control icmpv6
This command enables Maximum ICMPv6 Packet Size Denial of Service protections. If the
mode is enabled, Denial of Service prevention is active for this type of attack. If ICMPv6 Echo
Request (PING) packets ingress having a size greater than the configured value, the packets
will be dropped if the mode is enabled.
Default
disabled <512>
Format
Mode
dos-control icmpv6 <0-16384>
Global Config
no dos-control icmpv6
This command disables Maximum ICMP Packet Size Denial of Service protections.
Format
Mode
no dos-control icmpv6
Global Config
Switching Commands
220
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dos-control icmpfrag
This command enables ICMP Fragment Denial of Service protection. If the mode is enabled,
Denial of Service prevention is active for this type of attack. If packets ingress having
fragmented ICMP packets, the packets will be dropped if the mode is enabled.
Default
disabled
Format
Mode
dos-control icmpfrag
Global Config
no dos-control icmpfrag
This command disabled ICMP Fragment Denial of Service protection.
Format
Mode
no dos-control icmpfrag
Global Config
show dos-control
This command displays Denial of Service configuration information.
Format
Mode
show dos-control
Privileged EXEC
Note: Not all messages below are available in all 7000series managed
switches.
Term
Definition
First Fragment
Mode
May be enabled or disabled. The factory default is disabled.
The factory default is 20.
Min TCP Hdr
Size <0-255>
ICMP Mode
May be enabled or disabled. The factory default is disabled.
The range is 0-1023. The factory default is 512.
Max ICMPv4 Pkt
Size
Max ICMPv6 Pkt
Size
The range is 0-16384. The factory default is 512.
ICMP Fragment
Mode
May be enabled or disabled. The factory default is disabled.
L4 Port Mode
May be enabled or disabled. The factory default is disabled.
May be enabled or disabled. The factory default is disabled.
TCP Port Mode
Switching Commands
221
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
UDP Port Mode
May be enabled or disabled. The factory default is disabled.
May be enabled or disabled. The factory default is disabled.
May be enabled or disabled. The factory default is disabled.
SIPDIP Mode
SMACDMAC
Mode
TCP Flag Mode
May be enabled or disabled. The factory default is disabled.
May be enabled or disabled. The factory default is disabled.
TCP FIN&URG&
PSH Mode
TCP Flag &
Sequence Mode
May be enabled or disabled. The factory default is disabled.
TCP SYN Mode
May be enabled or disabled. The factory default is disabled.
May be enabled or disabled. The factory default is disabled.
TCP SYN & FIN
Mode
TCP Fragment
Mode
May be enabled or disabled. The factory default is disabled.
May be enabled or disabled. The factory default is disabled.
TCP Offset
Mode
MAC Database Commands
This section describes the commands you use to configure and view information about the
MAC databases.
bridge aging-time
This command configures the forwarding database address aging timeout in seconds. The
<seconds>parameter must be within the range of 10 to 1,000,000 seconds.
Default
300
Format
Mode
bridge aging-time <10-1,000,000>
Global Config
no bridge aging-time
This command sets the forwarding database address aging timeout to the default value.
Format
Mode
no bridge aging-time
Global Config
Switching Commands
222
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show forwardingdb agetime
This command displays the timeout for address aging.
Default
300s
Format
Mode
show forwardingdb agetime
Privileged EXEC
Term
Definition
Address Aging
Timeout
This parameter displays the address aging timeout for the associated forwarding
database.
show mac-address-table multicast
This command displays the Multicast Forwarding Database (MFDB) information. If you enter
the command with no parameter, the entire table is displayed. You can display the table entry
for one MAC Address by specifying the MAC address as an optional parameter.
Format
Mode
show mac-address-table multicast <macaddr>
Privileged EXEC
Term
Definition
MAC Address
A multicast MAC address for which the switch has forwarding and or filtering information.
The format is two-digit hexadecimal numbers separated by colons, for example
01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as a MAC
address and VLAN ID combination of 8 bytes.
Type
The type of the entry. Static entries are those that are configured by the end user.
Dynamic entries are added to the table as a result of a learning process or protocol.
Component
The component that is responsible for this entry in the Multicast Forwarding Database.
Possible values are IGMP Snooping, GMRP, and Static Filtering.
Description
Interfaces
The text description of this multicast table entry.
The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
Forwarding
Interfaces
The resultant forwarding list is derived from combining all the component’s forwarding
interfaces and removing the interfaces that are listed as the static filtering interfaces.
show mac-address-table stats
This command displays the Multicast Forwarding Database (MFDB) statistics.
Format
Mode
show mac-address-table stats
Privileged EXEC
Switching Commands
223
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Max MFDB
Table Entries
The total number of entries that can possibly be in the Multicast Forwarding Database
table.
Most MFDB
Entries Since
Last Reset
The largest number of entries that have been present in the Multicast Forwarding
Database table. This value is also known as the MFDB high-water mark.
Current Entries
The current number of entries in the MFDB.
ISDP Commands
This section describes the commands you use to configure the industry standard Discovery
Protocol (ISDP).
isdp run
This command enables ISDP on the switch.
Default
Enabled
Format
Mode
isdp run
Global Config
no isdp run
This command disables ISDP on the switch.
Format
Mode
no isdp run
Global Config
isdp holdtime
This command configures the hold time for ISDP packets that the switch transmits. The hold
time specifies how long a receiving device should store information sent in the ISDP packet
before discarding it. The range is given in seconds.
Default
180 seconds
Format
Mode
isdp holdtime <10-255>
Global Config
Switching Commands
224
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
isdp timer
This command sets the period of time between sending new ISDP packets. The range is
given in seconds.
Default
30 seconds
Format
Mode
isdp timer <5-254>
Global Config
isdp advertise-v2
This command enables the sending of ISDP version 2 packets from the device.
Default
Enabled
Format
Mode
isdp advertise-v2
Global Config
no isdp advertise-v2
This command disables the sending of ISDP version 2 packets from the device.
Format
Mode
no isdp advertise-v2
Global Config
isdp enable
This command enables ISDP on the interface.
Default
Enabled
Format
Mode
isdp enable
Interface Config
no isdp enable
This command disables ISDP on the interface.
Format
Mode
no isdp enable
Interface Config
Switching Commands
225
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear isdp counters
This command clears ISDP counters.
Format
Mode
clear isdp counters
Privileged EXEC
clear isdp table
This command clears entries in the ISDP table.
Format
Mode
clear isdp table
Privileged EXEC
show isdp
This command displays global ISDP settings.
Format
show isdp
Mode
Privileged EXEC
Term
Definition
Timer
The frequency with which this device sends ISDP packets. This value is given in
seconds.
Hold Time
Version 2
The length of time the receiving device should save information sent by this device. This
value is given in seconds.
The setting for sending ISDPv2 packets. If disabled, version 1 packets are transmitted.
Advertisements
Device ID
The Device ID advertised by this device. The format of this Device ID is characterized by
the value of the Device ID Format object.
Device ID
Format
Capability
Indicates the Device ID format capability of the device.
• serialNumber indicates that the device uses a serial number as the format for its
Device ID.
• macAddressindicates that the device uses a Layer 2 MAC address as the format for
its Device ID.
• otherindicates that the device uses its platform-specific format as the format for its
Device ID.
Device ID
Format
Indicates the Device ID format of the device.
• serialNumberindicates that the value is in the form of an ASCII string containing the
device serial number.
• macAddress indicates that the value is in the form of a Layer 2 MAC address.
• other indicates that the value is in the form of a platform specific ASCII string
containing info that identifies the device. For example, ASCII string contains
serialNumber appended/prepended with system name.
Switching Commands
226
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show isdp interface
This command displays ISDP settings for the specified interface.
Format
show isdp interface {all | <unit/slot/port>}
Mode
Privileged EXEC
Term
Mode
Definition
ISDP mode enabled/disabled status for the interface(s).
show isdp entry
This command displays ISDP entries. If the device id is specified, then only entries for that
device are shown.
Format
Mode
show isdp entry {all | deviceid}
Privileged EXEC
Term
Definition
Device ID
The device ID associated with the neighbor which advertised the information.
The IP address(es) associated with the neighbor.
IP Addresses
Platform
Interface
Port ID
The hardware platform advertised by the neighbor.
The interface (slot/port) on which the neighbor's advertisement was received.
The port ID of the interface from which the neighbor sent the advertisement.
The hold time advertised by the neighbor.
Hold Time
Version
The software version that the neighbor is running.
Advertisement
Version
The version of the advertisement packet received from the neighbor.
Capability
ISDP Functional Capabilities advertised by the neighbor.
show isdp neighbors
This command displays the list of neighboring devices.
Format
Mode
show isdp neighbors [ {<unit/slot/port> | detail} ]
Privileged EXEC
Switching Commands
227
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Device ID
The device ID associated with the neighbor which advertised the information.
The IP addresses associated with the neighbor.
IP Addresses
Capability
Platform
ISDP functional capabilities advertised by the neighbor.
The hardware platform advertised by the neighbor.
Interface
Port ID
The interface (unit/slot/port) on which the neighbor's advertisement was received.
The port ID of the interface from which the neighbor sent the advertisement.
The hold time advertised by the neighbor.
Hold Time
Advertisement
Version
The version of the advertisement packet received from the neighbor.
Entry Last
Changed Time
Displays when the entry was last modified.
Version
The software version that the neighbor is running.
Example: The following shows example CLI display output for the command.
(Switch) #show isdp neighbors detail
Device ID
0001f45f1bc0
Address(es):
IP Address:
10.27.7.57
Capability
Router Trans Bridge Switch IGMP
Platform
SecureStack C2
Interface
0/48
Port ID
ge.3.14
Holdtime
131
Advertisement Version
Entry last changed time
Version :
2
0 days 00:01:59
05.00.56
show isdp traffic
This command displays ISDP statistics.
Format
show isdp traffic
Mode
Privileged EXEC
Term
Definition
ISDP Packets Received
ISDP Packets Transmitted
ISDPv1 Packets Received
Total number of ISDP packets received
Total number of ISDP packets transmitted
Total number of ISDPv1 packets received
Switching Commands
228
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
ISDPv1 Packets
Transmitted
Total number of ISDPv1 packets transmitted
ISDPv2 Packets Received
Total number of ISDPv2 packets received
Total number of ISDPv2 packets transmitted
ISDPv2 Packets
Transmitted
ISDP Bad Header
Number of packets received with a bad header
Number of packets received with a checksum error
Number of packets which failed to transmit
Number of invalid packets received
ISDP Checksum Error
ISDP Transmission Failure
ISDP Invalid Format
ISDP Table Full
Number of times a neighbor entry was not added to the table due to a full
database
ISDP IP Address Table Full
Displays the number of times a neighbor entry was added to the table
without an IP address.
debug isdp packet
This command enables tracing of ISDP packets processed by the switch. ISDP must be
enabled on both the device and the interface in order to monitor packets for a particular
interface.
Format
Mode
debug isdp packet [{receive | transmit}]
Privileged EXEC
no debug isdp packet
This command disables tracing of ISDP packets on the receive or the transmit sides or on
both sides.
Format
Mode
no debug isdp packet [{receive | transmit}]
Privileged EXEC
Priority-Based Flow Control Commands
Ordinarily, when flow control is enabled on a physical link, it applies to all traffic on the link.
When congestion occurs, the hardware sends pause frames that temporarily suspend traffic
flow. Pausing traffic helps prevent buffer overflow and dropped frames.
Priority-based flow control provides a way to distinguish which traffic on physical link is
paused when congestion occurs, based on the priority of the traffic. An interface can be
configured to pause only high priority (i.e., loss-sensitive) traffic when necessary to prevent
dropped frames, while allowing traffic that has greater loss tolerance to continue to flow on
the interface.
Switching Commands
229
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Priorities are differentiated by the priority field of the IEEE 802.1Q VLAN header, which
identifies an IEEE 802.1p priority value. In NETGEAR Managed Switch, these priority values
must be mapped to internal class-of-service (CoS) values.
To enable priority-based flow control for a particular CoS value on an interface:
•
Ensure that VLAN tagging is enabled on the interface so that the 802.1p priority values
are carried through the network.
•
•
Ensure that 802.1p priority values are mapped to IEEE 802.1Q CoS values.
Use the datacenter-bridging priority-flow-control mode on command to enable
priority-based flow control on the interface.
•
Use the datacenter-bridging priority-flow-control priority command to specify the CoS
values that should be paused ("no-drop") due to greater loss sensitivity. Unless
configured as "no-drop," all CoS priorities are considered nonpausable ("drop") when
priority-based flow control is enabled.
When priority-flow-control is disabled, the interface defaults to the IEEE 802.3x flow control
setting for the interface. When priority-based flow control is enabled, the interface will not
pause any CoS unless there is at least one no-drop priority.
datacenter-bridging
Use this command to go into datacenter-bridging mode.
Format
Mode
datacenter-bridging
Interface Config
priority-flow-control mode
Use this command to enable or disable priority-based flow control on an interface.
Format
Mode
priority-flow-control mode [on | off]
Datacenter-Bridging Config
Default
Disabled
priority-flow-control priority
Use this command to specify the priority group(s) that should be paused when necessary to
prevent dropped frames; i.e., the group to receive priority flow control. This configuration has
no effect on interfaces not enabled for priority flow control.
VLAN tagging must be enabled to carry the 802.1p value through the network. The number of
lossless priorities supported is 2. Additionally, the mapping of class-of-service levels to
802.1p priority values to must be set to one-to-one.
Format
priority-flow-control priority priority-list {drop | no-drop}
Switching Commands
230
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Mode
Interface Config
drop
Default
show interface priority-flow-control
This command displays a summary of the priority flow control configuration for a specified
interface or all interfaces.
Format
Mode
show interface priority-flow-control [interface
<unit/slot/port>]
Privileged EXEC
(Switch) #show interface priority-flow-control
Port
Drop
Priorities
No-Drop
Priorities
Operational
Status
------
0/1
0/2
--------------- --------------- -----------
0-7
0-7
Inactive
Inactive
Switching Commands
231
Download from Www.Somanuals.com. All Manuals Search And Download.
4.
Multicast VLAN Registration (MVR)
4
This chapter contains the following sections:
•
•
About MVR
Internet Group Management Protocol (IGMP) Layer 3 is widely used for IPv4 network
multicasting. In Layer 2 networks, IGMP uses resources inefficiently. For example, a Layer 2
switch multicasts traffic to all ports, even if there are receivers connected to only a few ports.
To address this problem, the IGMP Snooping protocol was developed. The problem still
appears, though, when receivers are in different VLANs.
MVR is intended to solve the problem of receivers in different VLANs. It uses a dedicated
manually configured VLAN, called the multicast VLAN, to forward multicast traffic over a
Layer 2 network in conjunction with IGMP snooping.
MVR Commands
mvr
This command enables MVR.
Format
Mode
mvr
Global Config
Interface Config
Default
Disabled
232
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no mvr
This command disables MVR.
Format
Mode
no mvr
Global Config
Interface Config
mvr group
This command adds an MVR membership group. <A.B.C.D> is the IP multicast group being
added.
The count is the number of incremental multicast groups being added (the first multicast group is
A.B.C.D). If a count is not specified, then only one multicast group is added.
Format
Mode
mvr group <A.B.C.D> [count]
Global Config
no mvr group
This command removes the MVR membership group.
Format
Mode
no mvr group <A.B.C.D> [count]
Global Config
mvr mode
This command changes the MVR mode type. If the mode is set to compatible, then the switch
does not learn multicast groups; they need to be configured by the operator as the protocol does
not forward joins from the hosts to the router. To operate in this mode, the IGMP router needs to
be statically configured to transmit all required multicast streams to the MVR switch. If the mode
is set to dynamic, then the switch learns existing multicast groups by snooping the IGMP queries
from router on source ports and forwarding the IGMP joins from the hosts to the IGMP router on
the multicast VLAN (with appropriate translation of the VLAN ID).
Format
Mode
mvr mode { compatible |dynamic }
Global Config
Default
compatible
Multicast VLAN Registration (MVR)
233
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no mvr mode
This command sets the mode type to the default value.
Format
Mode
no mvr mode
Global Config
mvr querytime
This command sets the MVR query response time.
Format
Mode
mvr querytime<1-100>
Global Config
5
Default
no mvr querytime
This command sets the MVR query response time to the default value.
Format
Mode
no mvr querytime
Global Config
mvr vlan
This command sets the MVR multicast VLAN.
Format
Mode
mvr vlan <1-4094>
Global Config
1
Default
no mvr vlan
This command sets the MVR multicast VLAN to the default value.
Format
Mode
no mvr vlan
Global Config
mvr immediate
This command enables MVR immediate leave mode. MVR has two modes of operating with the
IGMP Leave messages: normal leave and immediate leave:
•
In normal leave mode, when a leave is received, the general IGMP query is sent from a
Layer 2 switch to the receiver port, where the leave was received. Then reports are
Multicast VLAN Registration (MVR)
234
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
received from other interested hosts that are also connected to that port, for example,
using hub.
•
In immediate leave mode, when a leave is received, the switch is immediately
reconfigured not to forward a specific multicast stream to the port where a message is
received. This mode is used only for ports where only one client might be connected.
Format
Mode
mvr immediate
Interface Config
Disabled
Default
no mvr immediate
This command sets the MVR multicast VLAN to the default value.
Format
Mode
no mvr immediate
Interface Config
mvr type
This command sets the MVR port type. When a port is set as source, it is the port to which the
multicast traffic flows using the multicast VLAN. When a port is set to receiver, it is the port where
a listening host is connected to the switch.
Format
Mode
mvr type { receiver|source }
Interface Config
none
Default
no mvr type
Use this command to set the MVR port type to none.
Format
Mode
no mvr type
Interface Config
mvr vlan group
Use this command to include the port in the specific MVR group. <mVLAN> is the multicast
VLAN, and <A.B.C.D> is the IP multicast group
Format
Mode
mvr vlan <mVLAN> group <A.B.C.D>
Interface Config
Multicast VLAN Registration (MVR)
235
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no mvr vlan
Use this command to exclude the port from the specific MVR group.
Format
Mode
no mvr vlan <mVLAN> group <A.B.C.D>
Interface Config
show mvr
This command displays global MVR settings.
Format
Mode
show mvr
Privileged EXEC
The following table explains the output parameters.
Term
Definition
MVR Running
MVR multicast VLAN
MVR running state. It can be enabled or disabled.
Current MVR multicast VLAN. It can be in the range from 1 to
4094.
MVR Max Multicast Groups
MVR Current multicast groups
MVR Query response time
MVR Mode
The maximum number of multicast groups supported by MVR.
The current number of MVR groups allocated.
The current MVR query response time.
The current MVR mode. It can be compatible or dynamic.
Example:
(Switch)#show mvr
MVR Running…........................... TRUE
MVR multicast VLAN….................... 1200
MVR Max Multicast Groups….............. 256
MVR Current multicast groups….......... 1
MVR Global query response time…........ 10 (tenths of sec)
MVR Mode….............................. compatible
show mvr members
This command displays the MVR membership groups allocated. <A.B.C.D> is a valid multicast
address in IPv4 dotted notation.
Format
Mode
show mvr members [<A.B.C.D>]
Privileged EXEC
Multicast VLAN Registration (MVR)
236
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following table describes the output parameters.
Term
Definition
MVR Group IP
Status
MVR group multicast IP address.
The status of the specific MVR group. It can be active or inactive.
The list of ports that participates in the specified MVR group.
Members
Example:
(switch)#show mvr members
MVR Group IP
------------------
224.1.1.1
Status
---------------
INACTIVE
Members
---------------------
1/0/1, 1/0/2, 1/0/3
(switch)#show mvr members 224.1.1.1
MVR Group IP
------------------
224.1.1.1
Status
Members
---------------
INACTIVE
---------------------
1/0/1, 1/0/2, 1/0/3
show mvr interface
This command displays the MVR-enabled interfaces configuration.
Format
Mode
show mvr interface [<interface-id > [members [vlan <vid>]] ]
Privileged EXEC
The following table explains the output parameters.
Parameter
Port
Description
Interface number
Type
The MVR port type. It can be none, receiver, or source type.
Status
The interface status. It consists of two characteristics:
•
•
active or inactive indicates whether the port is forwarding.
inVLAN or notInVLAN indicates whether the port is part of any VLAN.
Immediate Leave
The state of immediate mode. It can be enabled or disabled.
Example:
(switch)#show mvr interface
Port Type
--------- --------------- --------------------- --------------------
1/0/9 RECEIVER ACTIVE/inVLAN DISABLED
Status
Immediate Leave
Multicast VLAN Registration (MVR)
237
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
(switch)#show mvr interface 1/0/9
Type: RECEIVER Status: ACTIVE Immediate Leave: DISABLED
(switch)#show mvr interface Fa1/0/23 members
235.0.0.1 STATIC ACTIVE
(switch)#show mvr interface Fa1/0/23 members vlan 12
235.0.0.1 STATIC ACTIVE
235.1.1.1 STATIC ACTIVE
show mvr traffic
This command displays global MVR statistics.
Format
Mode
show mvr traffic
Privileged EXEC
The following table explains the output parameters.
Term
Definition
IGMP Query Received
Number of received IGMP queries
Number of received IGMP reports V1
Number of received IGMP reports V2
Number of received IGMP leaves
IGMP Report V1 Received
IGMP Report V2 Received
IGMP Leave Received
IGMP Query Transmitted
IGMP Report V1 Transmitted
IGMP Report V2 Transmitted
IGMP Leave Transmitted
IGMP Packet Receive Failures
IGMP Packet Transmit Failures
Number of transmitted IGMP queries
Number of transmitted IGMP reports V1
Number of transmitted IGMP reports V2
Number of transmitted IGMP leaves
Number of failures on receiving the IGMP packets
Number of failures on transmitting the IGMP packets
Example:
(switch)#show mvr traffic
IGMP Query Received…........................................ 2
IGMP Report V1 Received….................................... 0
IGMP Report V2 Received….................................... 3
IGMP Leave Received…........................................ 0
IGMP Query Transmitted…..................................... 2
Multicast VLAN Registration (MVR)
238
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
IGMP Report V1 Transmitted…................................. 0
IGMP Report V2 Transmitted…................................. 3
IGMP Leave Transmitted…..................................... 1
IGMP Packet Receive Failures…............................... 0
IGMP Packet Transmit Failures….............................. 0
Multicast VLAN Registration (MVR)
239
Download from Www.Somanuals.com. All Manuals Search And Download.
5.
Routing Commands
5
This chapter describes the routing commands available in the 7000 series CLI.
Note: Some commands described in this chapter require a license. For
This chapter contains the following sections:
•
•
•
•
•
•
•
•
•
•
•
The commands in this chapter are in three functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
•
Clear commands clear some or all of the settings to factory defaults.
Address Resolution Protocol (ARP) Commands
This section describes the commands you use to configure ARP and to view ARP
information on the switch. ARP associates IP addresses with MAC addresses and stores the
information as ARP entries in the ARP cache.
240
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
arp
This command creates an ARP entry. The value for <ipaddress> is the IP address of a
device on a subnet attached to an existing routing interface. <macaddr>is a unicast MAC
address for that device.
The format of the MAC address is 6 two-digit hexadecimal numbers that are separated by
colons, for example 00:06:29:32:81:40.
Format
arp <ipaddress> <macaddr>
Mode
Global Config
no arp
This command deletes an ARP entry. The value for <arpentry>is the IP address of the
interface. The value for <ipaddress>is the IP address of a device on a subnet attached to
an existing routing interface. <macaddr>is a unicast MAC address for that device.
Format
Mode
no arp <ipaddress> <macaddr>
Global Config
ip local-proxy-arp
This command enables local-proxy-arp on interface or range of interfaces. The switch only
responds if all next hops in its route to the destination are through interfaces other than the
interface that received the ARP request. Enabling local proxy ARP removes this restriction..
Default
disabled
Format
Mode
ip local-proxy-arp
Interface Config
no ip local-proxy-arp
This command disables local-proxy-arp on the interface or a range of interfaces.
Format
Mode
no ip local-proxy-arp
Interface Config
ip proxy-arp
This command enables proxy ARP on a router interface. Without proxy ARP, a device only
responds to an ARP request if the target IP address is an address configured on the interface
where the ARP request arrived. With proxy ARP, the device may also respond if the target IP
Routing Commands
241
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
address is reachable. The device only responds if all next hops in its route to the destination
are through interfaces other than the interface that received the ARP request.
Default
enabled
Format
Mode
ip proxy-arp
Interface Config
no ip proxy-arp
This command disables proxy ARP on a router interface.
Format
Mode
no ip proxy-arp
Interface Config
arp cachesize
This command configures the ARP cache size. The ARP cache size value is a platform
specific integer value. The default size also varies depending on the platform.
Format
Mode
arp cachesize <platform specific integer value>
Global Config
no arp cachesize
This command configures the default ARP cache size.
Format
Mode
no arp cachesize
Global Config
arp dynamicrenew
This command enables the ARP component to automatically renew dynamic ARP entries
when they age out.
Default
enabled
Format
Mode
arp dynamicrenew
Privileged EXEC
no arp dynamicrenew
This command prevents dynamic ARP entries from renewing when they age out.
Format
Mode
no arp dynamicrenew
Privileged EXEC
Routing Commands
242
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
arp purge
This command causes the specified IP address to be removed from the ARP cache. Only
entries of type dynamic or gateway are affected by this command.
Format
Mode
arp purge <ipaddr>
Privileged EXEC
arp resptime
This command configures the ARP request response timeout.
The value for <seconds>is a valid positive integer, which represents the IP ARP entry
response timeout time in seconds. The range for <seconds> is between 1-10 seconds.
Default
1
Format
Mode
arp resptime <1-10>
Global Config
no arp resptime
This command configures the default ARP request response timeout.
Format
Mode
no arp resptime
Global Config
arp retries
This command configures the ARP count of maximum request for retries.
The value for <retries>is an integer, which represents the maximum number of request
for retries. The range for <retries>is an integer between 0-10 retries.
Default
4
Format
Mode
arp retries <0-10>
Global Config
no arp retries
This command configures the default ARP count of maximum request for retries.
Format
Mode
no arp retries
Global Config
Routing Commands
243
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
arp timeout
This command configures the ARP entry ageout time.
The value for <seconds>is a valid positive integer, which represents the IP ARP entry
ageout time in seconds. The range for <seconds>is between 15-21600 seconds.
Default
1200
Format
Mode
arp timeout <15-21600>
Global Config
no arp timeout
This command configures the default ARP entry ageout time.
Format
Mode
no arp timeout
Global Config
clear arp-cache
This command causes all ARP entries of type dynamic to be removed from the ARP cache. If
the gateway keyword is specified, the dynamic entries of type gateway are purged as well.
Format
Mode
clear arp-cache [gateway]
Privileged EXEC
clear arp-switch
Use this command to clear the contents of the switch’s Address Resolution Protocol (ARP)
table that contains entries learned through the Management port. To observe whether this
command is successful, pingfrom the remote system to the DUT. Issue the show arp
switchcommand to see the ARP entries. Then issue the clear arp-switchcommand
and check the show arp switchentries. There will be no more arp entries.
Format
Mode
clear arp-switch
Privileged EXEC
show arp
This command displays the Address Resolution Protocol (ARP) cache. The displayed results
are not the total ARP entries. To view the total ARP entries, the operator should view the
show arp results in conjunction with the show arp switchresults.
Format
Mode
show arp
Privileged EXEC
Routing Commands
244
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Age Time
(seconds)
The time it takes for an ARP entry to age out. This is configurable. Age time is
measured in seconds.
Response Time
(seconds)
The time it takes for an ARP request timeout. This value is configurable. Response
time is measured in seconds.
Retries
The maximum number of times an ARP request is retried. This value is configurable.
The maximum number of entries in the ARP table. This value is configurable.
Cache Size
Dynamic Renew
Mode
Displays whether the ARP component automatically attempts to renew dynamic ARP
entries when they age out.
Total Entry Count
Current / Peak
The total entries in the ARP table and the peak entry count in the ARP table.
Static Entry Count
Configured/Active
/ Max
The static entry count in the ARP table, the active entry count in the ARP table, the
active entry count in the ARP table, and maximum static entry count in the ARP table.
The following are displayed for each ARP entry:
Term
Definition
IP Address
MAC Address
Interface
Type
The IP address of a device on a subnet attached to an existing routing interface.
The hardware MAC address of that device.
The routing unit/slot/port associated with the device ARP entry.
The type that is configurable. The possible values are Local, Gateway, Dynamic and
Static.
Age
The current age of the ARP entry since last refresh (in hh:mm:ss format )
show arp brief
This command displays the brief Address Resolution Protocol (ARP) table information.
Format
Mode
show arp brief
Privileged EXEC
Term
Definition
Age Time
(seconds)
The time it takes for an ARP entry to age out. This value is configurable. Age time is
measured in seconds.
Response Time
(seconds)
The time it takes for an ARP request timeout. This value is configurable. Response time
is measured in seconds.
Retries
The maximum number of times an ARP request is retried. This value is configurable.
The maximum number of entries in the ARP table. This value is configurable.
Cache Size
Routing Commands
245
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
DynamicRenew
Mode
Displays whether the ARP component automatically attempts to renew dynamic ARP
entries when they age out.
Total Entry
Count Current /
Peak
The total entries in the ARP table and the peak entry count in the ARP table.
Static Entry
Count Current /
Max
The static entry count in the ARP table and maximum static entry count in the ARP table.
show arp switch
This command displays the contents of the switch’s Address Resolution Protocol (ARP)
table.
Format
Mode
show arp switch
Privileged EXEC
Term
Definition
IP Address
The IP address of a device on a subnet attached to the switch.
The hardware MAC address of that device.
The routing unit/slot/port associated with the device’s ARP entry.
MAC Address
Interface
IP Routing Commands
This section describes the commands you use to enable and configure IP routing on the
switch.
routing
This command enables IPv4 and IPv6 routing for an interface. You can view the current value
for this function with the show ip briefcommand. The value is labeled as “Routing
Mode.”
Default
disabled
Format
Mode
routing
Interface Config
no routing
This command disables routing for an interface.
Routing Commands
246
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
You can view the current value for this function with the show ip briefcommand. The
value is labeled as “Routing Mode.”
Format
no routing
Mode
Interface Config
ip routing
This command enables the IP Router Admin Mode for the master switch.
Format
Mode
ip routing
Global Config
no ip routing
This command disables the IP Router Admin Mode for the master switch.
Format
Mode
no ip routing
Global Config
ip address
This command configures an IP address on an interface. You can also use this command to
configure one or more secondary IP addresses on the interface.The value for <ipaddr>is
the IP address of the interface. The value for <subnetmask>is a 4-digit dotted-decimal
number which represents the subnet mask of the interface. The subnet mask must have
contiguous ones and be no longer than 30 bits, for example 255.255.255.0. This command
adds the label IP address in show ip interface.
Format
ip address <ipaddr> <subnetmask> [secondary]
Mode
Interface Config
Parameter
ipaddr
Description
The IP address of the interface.
subnetmask
masklen
A four-digit dotted-decimal number that represents the subnet mask of the interface
Implements RFC 3021. Using the / notation of the subnet mask, this is an integer that
indicates the length of the subnet mask. Range is 5 to 32 bits.
no ip address
This command deletes an IP address from an interface. The value for <ipaddr>is the IP
address of the interface in a.b.c.d format where the range for a, b, c, and d is 1-255. The
value for <subnetmask>is a 4-digit dotted-decimal number which represents the Subnet
Routing Commands
247
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Mask of the interface. To remove all of the IP addresses (primary and secondary) configured
on the interface, enter the command no ip address.
Format
Mode
no ip address [{<ipaddr> <subnetmask> [secondary]}]
Interface Config
ip address dhcp
Use this command to enable the DHCPv4 client on an in-band interface so that it can acquire
network information, such as the IP address, subnet mask, and default gateway from a
network DHCP server. When DHCP is enabled on the interface, the system automatically
deletes all manually configured IPv4 addresses on the interface.
Default
disabled
Format
Mode
ip address dhcp
Interface Config
no ip address dhcp
Use this command to release a leased address and disable DHCPv4 on an interface.
Format
Mode
no ip address dhcp
Interface Config
ip default-gateway
Use this command to manually configure a default gateway for the switch. Only one default
gateway can be configured. If you use this command multiple times, each command replaces
the previous value.
Format
Mode
ip default-gateway <ipaddr>
Global Config
no ip default-gateway
Use this command to remove the default gateway address from the configuration.
Format
Mode
no ip default-gateway <ipaddr>
Interface Config
Routing Commands
248
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
release dhcp
Use this command to force the DHCPv4 client to release the leased address from the
specified interface.
Format
Mode
release dhcp <unit/slot/port>
Privileged EXEC
renew dhcp
Use this command to force the DHCPv4 client to immediately renew an IPv4 address lease
on the specified interface.
Format
Mode
renew dhcp {<unit/slot/port>|network-port}
Privileged EXEC
Note: This command can be used on in-band ports as well as network
(out-of-band) port.
show dhcp lease
Use this command to display a list of IPv4 addresses currently leased from a DHCP server
on a specific in-band interface or all in-band interfaces. This command does not apply to
service or network ports.
Format
Mode
show dhcp lease [interface <unit/slot/port>]
Privileged EXEC
Term
Definition
IP address,
Subnet mask
The IP address and network mask leased from the DHCP server.
DHCP Lease
server
The IPv4 address of the DHCP server that leased the address.
State of the DHCPv4 Client on this interface.
State
DHCP transaction
ID
The transaction ID of the DHCPv4 Client.
Lease
The time (in seconds) that the IP address was leased by the server.
Renewal
The time (in seconds) when the next DHCP renew Request is sent by DHCPv4 Client
to renew the leased IP address.
Rebind
The time (in seconds) when the DHCP Rebind process starts.
Retry count
Number of times the DHCPv4 client sends a DHCP REQUEST message before the
server responds.
Routing Commands
249
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip route
This command configures a static route. The <ipaddr>parameter is a valid IP address,
and <subnetmask> is a valid subnet mask. The <nexthopip>parameter is a valid IP
address of the next hop router. Specifying Null0as nexthop parameter adds a static reject
route. The optional <preference>parameter is an integer (value from 1 to 255) that allows
you to specify the preference value (sometimes called “administrative distance”) of an
individual static route. Among routes to the same destination, the route with the lowest
preference value is the route entered into the forwarding database. By specifying the
preference of a static route, you control whether a static route is more or less preferred than
routes from dynamic routing protocols. The preference also controls whether a static route is
more or less preferred than other static routes to the same destination. A route with a
preference of 255 cannot be used to forward traffic.
For the static routes to be visible, you must perform the following steps:
•
•
•
Enable ip routing globally.
Enable ip routing for the interface.
Confirm that the associated link is also up.
Default
preference—1
Format
Mode
ip route <ipaddr> <subnetmask> [<nexthopip> | Null0] [<preference>]
Global Config
no ip route
This command deletes a single next hop to a destination static route. If you use the
<nexthopip>parameter, the next hop is deleted. If you use the <preference>value, the
preference value of the static route is reset to its default.
Format
Mode
no ip route <ipaddr> <subnetmask> [{<nexthopip> [<preference>] |
Null0}]
Global Config
ip route default
This command configures the default route. The value for <nexthopip>is a valid IP
address of the next hop router. The <preference>is an integer value from 1 to 255. A route
with a preference of 255 cannot be used to forward traffic.
Default
preference—1
Format
Mode
ip route default <nexthopip> [<preference>]
Global Config
Routing Commands
250
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip route default
This command deletes all configured default routes. If the optional <nexthopip>parameter
is designated, the specific next hop is deleted from the configured default route and if the
optional preference value is designated, the preference of the configured default route is
reset to its default.
Format
Mode
no ip route default [{<nexthopip> | <preference>}]
Global Config
ip route distance
This command sets the default distance (preference) for static routes. Lower route distance
values are preferred when determining the best route. The ip routeand ip route
defaultcommands allow you to optionally set the distance (preference) of an individual
static route. The default distance is used when no distance is specified in these commands.
Changing the default distance does not update the distance of existing static routes, even if
they were assigned the original default distance. The new default distance will only be
applied to static routes created after invoking the ip route distancecommand.
Default
1
Format
Mode
ip route distance <1-255>
Global Config
no ip route distance
This command sets the default static route preference value in the router. Lower route
preference values are preferred when determining the best route.
Format
Mode
no ip route distance
Global Config
ip netdirbcast
This command enables the forwarding of network-directed broadcasts. When enabled,
network directed broadcasts are forwarded. When disabled they are dropped.
Default
disabled
Format
Mode
ip netdirbcast
Interface Config
Routing Commands
251
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip netdirbcast
This command disables the forwarding of network-directed broadcasts. When disabled,
network directed broadcasts are dropped.
Format
no ip netdirbcast
Mode
Interface Config
ip mtu
This command sets the IP Maximum Transmission Unit (MTU) on a routing interface. The IP
MTU is the size of the largest IP packet that can be transmitted on the interface without
fragmentation. The software currently does not fragment IP packets.
•
•
Packets forwarded in hardware ignore the IP MTU.
Packets forwarded in software are dropped if they exceed the IP MTU of the outgoing
interface.
Packets originated on the router, such as OSPF packets, may be fragmented by the IP stack.
The IP stack uses its default IP MTU and ignores the value set using the ip mtu command.
OSPF advertises the IP MTU in the Database Description packets it sends to its neighbors
during database exchange. If two OSPF neighbors advertise different IP MTUs, they will not
form an adjacency. (unless OSPF has been instructed to ignore differences in IP MTU with
the ip ospf mtu-ignorecommand.)
Note: The IP MTU size refers to the maximum size of the IP packet (IP
Header + IP payload). It does not include any extra bytes that may
be required for Layer-2 headers. To receive and process packets,
size of the Ethernet header.
Default
1500 bytes
Format
Mode
ip mtu <68-9198>
Interface Config
no ip mtu
This command resets the ip mtu to the default value.
Format
Mode
no ip mtu <mtu>
Interface Config
Routing Commands
252
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
encapsulation
This command configures the link layer encapsulation type for the packet. The encapsulation
type can be ethernetor snap.
Default
ethernet
Format
Mode
encapsulation {ethernet | snap}
Interface Config
Note: Routed frames are always ethernet encapsulated when a frame is
routed to a VLAN.
clear ip route all
This command removes all the route entries learned over the network.
Format
Mode
clear ip route all
Privileged EXEC
Protocol
Tells which protocol added the specified route. The possibilities are: local, static, OSPF, or
RIP.
Total
Number of
Routes
The total number of routes.
clear ip route counters
This command resets to zero the IPv4 routing table counters reported in show ip route
summary. The command resets only the event counters. Counters that report the current
state of the routing table, such as the number of routes of each type, are not reset.
Format
Mode
clear ip route counters
Privileged EXEC
show ip brief
This command displays all the summary information of the IP, including the ICMP rate limit
configuration and the global ICMP Redirect configuration.
Format
Modes
show ip brief
• Privileged EXEC
• User EXEC
Routing Commands
253
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Default Time to Live
The computed TTL (Time to Live) of forwarding a packet from the local router to the
final destination.
Routing Mode
Shows whether the routing mode is enabled or disabled.
The maximum number of next hops the packet can travel.
The maximum number of routes the packet can travel.
Maximum Next Hops
Maximum Routes
ICMP Rate Limit
Interval
Shows how often the token bucket is initialized with burst-size tokens.
Burst-interval is from 0 to 2147483647 milliseconds. The default burst-interval is
1000 msec.
ICMP Rate Limit
Burst Size
Shows the number of ICMPv4 error messages that can be sent during one
burst-interval. The range is from 1 to 200 messages. The default value is 100
messages.
ICMP Echo Replies
ICMP Redirects
Shows whether ICMP Echo Replies are enabled or disabled.
Shows whether ICMP Redirects are enabled or disabled.
The following shows example CLI display output for the command.
(Switch) #show ip brief
Default Time to Live........................... 64
Routing Mode................................... Disabled
Maximum Next Hops.............................. 4
Maximum Routes................................. 6000
ICMP Rate Limit Interval....................... 1000 msec
ICMP Rate Limit Burst Size..................... 100 messages
ICMP Echo Replies.............................. Enabled
ICMP Redirects................................. Enabled
show ip interface
This command displays all pertinent information about the IP interface.
Format
Modes
show ip interface {<unit/slot/port> | vlan <1-4093> | loopback <0-7>}
• Privileged EXEC
• User EXEC
Term
Definition
Routing
Interface Status
Determine the operational status of IPv4 routing Interface. The possible values are Up or
Down.
Primary IP
Address
The primary IP address and subnet masks for the interface. This value appears only if
you configure it.
Secondary IP
Address
One or more secondary IP addresses and subnet masks for the interface. This value
appears only if you configure it.
Routing Commands
254
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Method
Shows whether the IP address was configured manually or acquired from a DHCP
server.
Routing Mode
The administrative mode of router interface participation. The possible values are enable
or disable. This value is configurable.
Administrative
Mode
The administrative mode of the specified interface. The possible values of this field are
enable or disable. This value is configurable.
Forward Net
Directed
Broadcasts
Displays whether forwarding of network-directed broadcasts is enabled or disabled. This
value is configurable.
Proxy ARP
Displays whether Proxy ARP is enabled or disabled on the system.
Local Proxy
ARP
Displays whether Local Proxy ARP is enabled or disabled on the interface.
Active State
Displays whether the interface is active or inactive. An interface is considered active if its
link is up and it is in forwarding state.
LinkSpeedData
Rate
An integer representing the physical link data rate of the specified interface. This is
measured in Megabits per second (Mbps).
MAC Address
The burned in physical address of the specified interface. The format is 6 two-digit
hexadecimal numbers that are separated by colons.
Encapsulation
Type
The encapsulation type for the specified interface. The types are: Ethernet or SNAP.
IP MTU
The maximum transmission unit (MTU) size of a frame, in bytes.
Shows the bandwidth of the interface.
Bandwidth
Destination
Unreachables
Displays whether ICMP Destination Unreachables may be sent (enabled or disabled).
ICMP Redirects
Displays whether ICMP Redirects may be sent (enabled or disabled).
The following shows example CLI display output for the command.
(Switch) >show ip interface 1/0/2
Routing Interface Status....................... Down
Method......................................... None
Routing Mode................................... Disable
Administrative Mode............................ Enable
Forward Net Directed Broadcasts................ Disable
Proxy ARP...................................... Enable
Local Proxy ARP................................ Disable
Active State................................... Inactive
Link Speed Data Rate........................... Inactive
MAC address.................................... 02:14:6C:FF:00:DE
Encapsulation Type............................. Ethernet
IP MTU......................................... 1500
Bandwidth...................................... 100000 kbps
Destination Unreachables....................... Enabled
ICMP Redirects................................. Disabled
Routing Commands
255
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip interface brief
This command displays summary information about IP configuration settings for all ports in
the router.
Format
show ip interface brief
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
Routing operational state of the interface.
State
IP Address
IP Mask
The IP address of the routing interface in 32-bit dotted decimal format.
The IP mask of the routing interface in 32-bit dotted decimal format.
Netdir Bcast
Indicates if IP forwards net-directed broadcasts on this interface. Possible values are
Enable or Disable.
MultiCast Fwd
Method
The multicast forwarding administrative mode on the interface. Possible values are
Enable or Disable.
Shows whether the IP address was configured manually or acquired from a DHCP
server.
show ip protocols
This command lists a summary of the configuration and status for each unicast routing
protocol. The command lists routing protocols that are configured and enabled. If a protocol is
selected on the command line, the display is limited to that protocol.
Format
show ip protocols [ospf | rip]
Mode
Privileged EXEC
Parameter
OSPFv2
Description
Router ID
The router ID configured for OSPFv2
OSPF Admin Mode Whether OSPF is enabled or disabled globally
Maximum Paths
The maximum number of next hops in an OSPF route
Routing for
Networks
The address ranges configured with an OSPF network command
Distance
The administrative distance (or route preference) for intra-area, inter-area, and external routes
Whether OSPF is configured to originate a default route
Default Route
Advertise
Routing Commands
256
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Always
Description
Whether default advertisement depends on having a default route in the common routing
table
Metric
The metric configured to be advertised with the default route
The metric type for the default route
Metric Type
Redist Source
Metric
A type of routes that OSPF is redistributing
The metric to advertise for redistributed routes of this type
The metric type to advertise for redistributed routes of this type
Whether OSPF redistributes subnets of classful addresses, or only classful prefixes
Metric Type
Subnets
Dist List
A distribute list used to filter routes of this type. Only routes that pass the distribute list are
redistributed
Number of Active
Areas
The number of OSPF areas with at least one interface running on this router. Also broken
down by area type
ABR Status
ASBR Status
RIP
Whether the router is currently an area border router. A router is an area border router if it has
interfaces that are up in more than one area
Whether the router is an autonomous system boundary router. The router is an ASBR if it is
redistributing any routes or originating a default route
Split Horizon Mode Whether RIP advertises routes on the interface where they were received
Default Metric
The metric assigned to redistributed routes
Default Route
Advertise
Whether this router is originating a default route
Distance
The administrative distance for RIP routes
Redistribution
A table showing information for each source protocol (connected, static, bgp, and ospf). For
each of these source the distribution list and metric are shown. Fields which are not
configured are left blank. For ospf, configured ospf match parameters are also shown
Interface
The interfaces where RIP is enabled and the version sent and accepted on each interface
show ip route
This command displays the routing table. The <ip-address>specifies the network for
which the route is to be displayed and displays the best matching best-route for the address.
The <mask>specifies the subnet mask for the given <ip-address>. When you use the
longer-prefixeskeyword, the <ip-address>and <mask>pair becomes the prefix, and
the command displays the routes to the addresses that match that prefix. Use the
<protocol>parameter to specify the protocol that installed the routes. The value for
<protocol>can be connected, ospf, rip, or static. Use the allparameter to display
all routes including best and non-best routes. If you do not use the allparameter, the
command only displays the best route.
Routing Commands
257
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
A “T” flag appended to a route indicates that it is an ECMP route, but only one of its next hops
has been installed in the forwarding table. The forwarding table might limit the number of
ECMP routes or the number of ECMP groups. When an ECMP route cannot be installed
because such a limit is reached, the route is installed with a single next hop. Such truncated
routes can be identified by a “T” after the interface name.
Note: If you use the connectedkeyword for <protocol>, the all
option is not available because there are no best or non-best
connected routes.
Format
show ip route[{<ip-address> [<protocol>] | {<ip-address> <mask>
[longer-prefixes] [<protocol>] | <protocol>} [all] | all}]
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Route Codes
The key for the routing protocol codes that might appear in the routing table output.
The show ip routecommand displays the routing tables in the following format:
Code IP-Address/Mask [Preference/Metric] via Next-Hop, Route-Timestamp, Interface
The columns for the routing table display the following information:
Term
Code
Definition
The codes for the routing protocols that created the routes.
The IP-Address and mask of the destination network corresponding to this route.
IP-Address/Mask
Preference
The administrative distance associated with this route. Routes with low values are
preferred over routes with higher values.
Metric
The cost associated with this route.
via Next-Hop
The outgoing router IP address to use when forwarding traffic to the next router (if any)
in the path toward the destination.
Route-Timestamp
Interface
The last updated time for dynamic routes. The format of Route-Timestamp will be
• Days:Hours:Minutes if days > = 1
• Hours:Minutes:Seconds if days < 1
The outgoing router interface to use when forwarding traffic to the next destination. For
reject routes, the next hop interface would be Null0 interface.
To administratively control the traffic destined to a particular network and prevent it from
being forwarded through the router, you can configure a static reject route on the router. Such
traffic would be discarded and the ICMP destination unreachable message is sent back to the
Routing Commands
258
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
source. This is typically used for preventing routing loops. The reject route added in the RTO
is of the type OSPF Inter-Area. Reject routes (routes of REJECT type installed by any
protocol) are not redistributed by OSPF/RIP. Reject routes are supported in both OSPFv2
and OSPFv3.
The following shows example CLI display output for the command.
(Switch) #show ip route
Route Codes: R - RIP Derived, O - OSPF Derived, C - Connected, S - Static
B - BGP Derived, IA - OSPF Inter Area
E1 - OSPF External Type 1, E2 - OSPF External Type 2
N1 - OSPF NSSA External Type 1, N2 - OSPF NSSA External Type 2
C 1.1.1.0/24 [0/1] directly connected, 0/11
C 2.2.2.0/24 [0/1] directly connected, 0/1
C 5.5.5.0/24 [0/1] directly connected, 0/5
S 7.0.0.0/8 [1/0] directly connected, Null0
OIA 10.10.10.0/24 [110/6] via 5.5.5.2, 00h:00m:01s, 0/5
C 11.11.11.0/24 [0/1] directly connected, 0/11
S 12.0.0.0/8 [5/0] directly connected, Null0
S 23.0.0.0/8 [3/0] directly connected, Null0
show ip route ecmp-groups
This command reports all current ECMP groups in the IPv4 routing table. An ECMP group is
a set of two or more next hops used in one or more routes. The groups are numbered
arbitrarily from 1 to n. The output indicates the number of next hops in the group and the
number of routes that use the set of next hops. The output lists the IPv4 address and
outgoing interface of each next hop in each group.
Format
Mode
show ip route ecmp-groups
Privileged EXEC
Example
(switch) #show ip route ecmp-groups
ECMP Group 1 with 2 next hops (used by 1 route)
172.20.33.100 on interface 2/33
172.20.34.100 on interface 2/34
ECMP Group 2 with 3 next hops (used by 1 route)
172.20.32.100 on interface 2/32
172.20.33.100 on interface 2/33
172.20.34.100 on interface 2/34
ECMP Group 3 with 4 next hops (used by 1 route)
172.20.31.100 on interface 2/31
172.20.32.100 on interface 2/32
172.20.33.100 on interface 2/33
172.20.34.100 on interface 2/34
Routing Commands
259
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip route summary
Use this command to display the routing table summary. Use the optional allparameter to
show the number of all routes, including best and non-best routes. To include only the
number of best routes, do not use the optional parameter.
When the optional keyword allis given, some statistics, such as the number of routes from
each source, include counts for alternate routes. An alternate route is a route that is not the
most preferred route to its destination and therefore is not installed in the forwarding table.
When this keyword is not given, the output reports only for the best routes.
Format
show ip route summary [all]
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Connected
Routes
The total number of connected routes in the routing table.
Static Routes
RIP Routes
Total number of static routes in the routing table.
Total number of routes installed by RIP protocol.
Total number of routes installed by OSPF protocol.
Total number of reject routes installed by all protocols.
Total number of routes in the routing table.
OSPF Routes
Reject Routes
Total Routes
Best Routes
The number of best routes currently in the routing table. This number counts only the
best route to each destination.
Alternate
Routes
The number of alternate routes currently in the routing table. An alternate route is one
that was not selected as the best route to its destination.
Route Adds
The number of routes added to the routing table.
Route Modifies
Route Deletes
The number of routes that changed after they were initially added to the routing table.
The number of routes that deleted from the routing table.
Unresolved
Route Adds
The number of route adds that failed because none of the route’s next hops were on a
local subnet. Note that static routes can fail to be added to the routing table at startup
because the routing interfaces are not up yet. This counter gets incremented in this case.
The static routes are added to the routing table when the routing interfaces come up.
Invalid Route
Adds
The number of routes that failed to be added to the routing table because the route was
invalid. A log message is written for each of these failures.
Failed Route
Adds
The number of routes that failed to be added to the routing table because of a resource
limitation in the routing table.
Reserved
Locals
The number of routing table entries reserved for a local subnet on a routing interface that
is down. Space for local routes is always reserved so that local routes can be installed
when a routing interface bounces.
Routing Commands
260
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Unique Next
Hops
The number of distinct next hops used among all routes currently in the routing table.
These include local interfaces for local routes and neighbors for indirect routes.
Unique Next
Hops High
Water
The highest count of unique next hops since the counters were last cleared.
Next Hop
Groups
The current number of next hop groups in use by one or more routes. Each next hop
group includes one or more next hops.
Next Hop
Groups High
Water
The highest count of next hop groups since the counters were last cleared.
ECMP Groups
ECMP Routes
The number of next hop groups with multiple next hops.
The number of routes with multiple next hops currently in the routing table.
Truncated
ECMP Routes
The number of ECMP routes that are currently installed in the forwarding table with just
one next hop. The forwarding table might limit the number of ECMP routes or the number
of ECMP groups. When an ECMP route cannot be installed because the limit is reached,
the route is installed with a single next hop.
ECMP Retries
The number of ECMP routes that have been installed in the forwarding table after initially
being installed with a single next hop.
Routes with n
Next Hops
The current number of routes with each number of next hops.
The following shows example CLI display output for the command.
(router) #show ip route summary
Connected Routes............................... 7
Static Routes.................................. 1
RIP Routes..................................... 20
OSPF Routes.................................... 1004
Intra Area Routes............................ 4
Inter Area Routes............................ 1000
External Type-1 Routes....................... 0
External Type-2 Routes....................... 0
Reject Routes.................................. 0
Total routes................................... 1032
Best Routes (High)............................. 1032 (1032)
Alternate Routes............................... 0
Route Adds..................................... 1010
Route Modifies................................. 1
Route Deletes.................................. 10
Unresolved Route Adds.......................... 0
Invalid Route Adds............................. 0
Failed Route Adds.............................. 0
Reserved Locals................................ 0
Unique Next Hops (High)........................ 13 (13)
Next Hop Groups (High)......................... 13 (14)
ECMP Groups (High)............................. 2 (3)
ECMP Routes.................................... 1001
Truncated ECMP Routes.......................... 0
ECMP Retries................................... 0
Routes with 1 Next Hop......................... 31
Routing Commands
261
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Routes with 2 Next Hops........................ 1
Routes with 4 Next Hops........................ 1000
show ip route preferences
This command displays detailed information about the route preferences. Route preferences
are used in determining the best route. Lower router preference values are preferred over
higher router preference values. A route with a preference of 255 cannot be used to forward
traffic.
Format
Modes
show ip route preferences
• Privileged EXEC
• User EXEC
Term
Local
Definition
The local route preference value.
The static route preference value.
The OSPF Intra route preference value.
The OSPF Inter route preference value.
The OSPF External route preference value.
The RIP route preference value.
Static
OSPF Intra
OSPF Inter
OSPF External
RIP
show ip stats
This command displays IP statistical information. Refer to RFC 1213 for more information
about the fields that are displayed.
Format
Modes
show ip stats
• Privileged EXEC
• User EXEC
show routing heap summary
This command displays a summary of the memory allocation from the routing heap. The
routing heap is a chunk of memory set aside when the system boots for use by the routing
applications.
Format
show routing heap summary
Mode
Privileged EXEC
Routing Commands
262
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Description
Heap Size
The amount of memory, in bytes, allocated at startup for the routing heap.
The number of bytes currently allocated.
Memory In Use
Memory on Free
List
The number of bytes currently on the free list. When a chunk of memory from the routing heap
is freed, it is placed on a free list for future reuse.
Memory Available
in Heap
The number of bytes in the original heap that have never been allocated.
In Use High Water
Mark
The maximum memory in use since the system last rebooted.
The following shows example CLI display output for the command.
(netgear switch) #show routing heap summary
Heap Size....................... 92594000 bytes
Memory In Use................... 149598 bytes (0%)
Memory on Free List............. 78721 bytes (0%)
Memory Available in Heap........ 92365249 bytes (99%)
In Use High Water Mark.......... 210788 bytes (0%)
Router Discovery Protocol Commands
This section describes the commands you use to view and configure Router Discovery
Protocol settings on the switch. The Router Discovery Protocol enables a host to discover the
IP address of routers on the subnet.
ip irdp
This command enables Router Discovery on an interface.
Default
disabled
Format
Mode
ip irdp
Interface Config
no ip irdp
This command disables Router Discovery on an interface.
Format
Mode
no ip irdp
Interface Config
Routing Commands
263
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip irdp multicast
This command configures the address that the interface uses to send the router discovery
advertisements. The address is 224.0.0.1, which is the all-hosts IP multicast address.
Default
224.0.0.1
Format
Mode
ip irdp multicast
Interface Config
no ip irdp multicast
This command configures the address used to advertise the router to the Broadcast address
(255.255.255.155)..
Format
Mode
no ip irdp multicast
Interface Config
ip irdp holdtime
This command configures the value, in seconds, of the holdtime field of the router
advertisement sent from this interface. The holdtime range is the value of
<maxadvertinterval>to 9000 seconds.
Default
3 * maxinterval
Format
Mode
ip irdp holdtime <maxadvertinterval-9000>
Interface Config
no ip irdp holdtime
This command configures the default value, in seconds, of the holdtime field of the router
advertisement sent from this interface.
Format
Mode
no ip irdp holdtime
Interface Config
ip irdp maxadvertinterval
This command configures the maximum time, in seconds, allowed between sending router
advertisements from the interface. The range for maxadvertinterval is 4 to 1800 seconds.
Default
600
Format
Mode
ip irdp maxadvertinterval <4-1800>
Interface Config
Routing Commands
264
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip irdp maxadvertinterval
This command configures the default maximum time, in seconds.
Format
Mode
no ip irdp maxadvertinterval
Interface Config
ip irdp minadvertinterval
This command configures the minimum time, in seconds, allowed between sending router
advertisements from the interface. The range for minadvertinterval is three to the value of
maxadvertinterval.
Default
0.75 * maxadvertinterval
Format
Mode
ip irdp minadvertinterval <3-maxadvertinterval>
Interface Config
no ip irdp minadvertinterval
This command sets the default minimum time to the default.
Format
Mode
no ip irdp minadvertinterval
Interface Config
ip irdp preference
This command configures the preferability of the address as a default router address, relative
to other router addresses on the same subnet.
Default
0
Format
Mode
ip irdp preference <-2147483648 to 2147483647>
Interface Config
no ip irdp preference
This command configures the default preferability of the address as a default router address,
relative to other router addresses on the same subnet.
Format
Mode
no ip irdp preference
Interface Config
Routing Commands
265
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip irdp
This command displays the router discovery information for all interfaces, or a specified
interface.
Format
show ip irdp {<unit/slot/port> | all}
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Interface
The <unit/slot/port>that matches the rest of the information in the row.
Ad Mode
The advertise mode, which indicates whether router discovery is enabled or disabled on
this interface.
Advertise
Address
The IP address to which the interface sends the advertisement.
Max Int
The maximum advertise interval, which is the maximum time, in seconds, allowed
between sending router advertisements from the interface.
Min Int
The minimum advertise interval, which is the minimum time, in seconds, allowed
between sending router advertisements from the interface.
Hold Time
Preference
The amount of time, in seconds, that a system should keep the router advertisement
before discarding it.
The preference of the address as a default router address, relative to other router
addresses on the same subnet.
Virtual LAN Routing Commands
This section describes the commands you use to view and configure VLAN routing and to
view VLAN routing status information.
vlan routing
This command enables routing on a VLAN. The vlanid value has a range from 1 to 4093. The
[interface ID] value has a range from 1 to 128. Typically, you will not supply the interface ID
argument, and the system automatically selects the interface ID. However, if you specify an
interface ID that is already in use, the CLI displays an error message and does not create the
VLAN interface.
Format
Mode
vlan routing <vlanid> [interface ID]
VLAN Config
Routing Commands
266
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no vlan routing
This command deletes routing on a VLAN. The <vlanid>value has a range from 1 to 4093.
Format
Mode
no vlan routing <vlanid>
VLAN Config
show ip vlan
This command displays the VLAN routing information for all VLANs with routing enabled.
Format
Modes
show ip vlan
• Privileged EXEC
• User EXEC
Term
Definition
MAC Address
used by
Routing VLANs
The MAC Address associated with the internal bridge-router interface (IBRI). The same
MAC Address is used by all VLAN routing interfaces. It will be displayed above the
per-VLAN information.
VLAN ID
The identifier of the VLAN.
Logical
Interface
The logical unit/slot/port associated with the VLAN routing interface.
IP Address
The IP address associated with this VLAN.
Subnet Mask
The subnet mask that is associated with this VLAN.
Virtual Router Redundancy Protocol Commands
This section describes the commands you use to view and configure Virtual Router
Redundancy Protocol (VRRP) and to view VRRP status information. VRRP helps provide
failover and load balancing when you configure two devices as a VRRP pair.
ip vrrp (Global Config)
Use this command in Global Config mode to enable the administrative mode of VRRP on the
router.
Default
none
Format
Mode
ip vrrp
Global Config
Routing Commands
267
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip vrrp
Use this command in Global Config mode to disable the default administrative mode of
VRRP on the router.
Format
Mode
no ip vrrp
Global Config
ip vrrp (Interface Config)
Use this command in Interface Config mode to create a virtual router associated with the
interface. The parameter <vrid>is the virtual router ID, which has an integer value range
from 1 to 255.
Format
Mode
ip vrrp <vrid>
Interface Config
no ip vrrp
Use this command in Interface Config mode to delete the virtual router associated with the
interface. The virtual Router ID, <vrid>, is an integer value that ranges from 1 to 255.
Format
Mode
no ip vrrp <vrid>
Interface Config
ip vrrp mode
This command enables the virtual router configured on the specified interface. Enabling the
status field starts a virtual router. The parameter <vrid>is the virtual router ID which has an
integer value ranging from 1 to 255.
Default
disabled
Format
Mode
ip vrrp <vrid> mode
Interface Config
no ip vrrp mode
This command disables the virtual router configured on the specified interface. Disabling the
status field stops a virtual router.
Format
Mode
no ip vrrp <vrid> mode
Interface Config
Routing Commands
268
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip vrrp ip
This command sets the virtual router IP address value for an interface. The value for
<ipaddr>is the IP address which is to be configured on that interface for VRRP. The
parameter <vrid>is the virtual router ID which has an integer value range from 1 to 255.
You can use the optional [secondary]parameter to designate the IP address as a
secondary IP address.
Default
none
Format
Mode
ip vrrp <vrid> ip <ipaddr> [secondary]
Interface Config
no ip vrrp ip
Use this command in Interface Config mode to delete a secondary IP address value from the
interface. To delete the primary IP address, you must delete the virtual router on the
interface.
Format
Mode
no ip vrrp <vrid> <ipaddress> secondary
Interface Config
ip vrrp authentication
This command sets the authorization details value for the virtual router configured on a
specified interface. The parameter {none | simple}specifies the authorization type for
virtual router configured on the specified interface. The parameter [key]is optional, it is only
required when authorization type is simple text password. The parameter <vrid>is the
virtual router ID which has an integer value ranges from 1 to 255.
Default
no authorization
Format
Mode
ip vrrp <vrid> authentication {none | simple <key>}
Interface Config
no ip vrrp authentication
This command sets the default authorization details value for the virtual router configured on
a specified interface.
Format
Mode
no ip vrrp <vrid> authentication
Interface Config
Routing Commands
269
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip vrrp preempt
This command sets the preemption mode value for the virtual router configured on a
specified interface. The parameter <vrid>is the virtual router ID, which is an integer from 1
to 255.
Default
enabled
Format
Mode
ip vrrp <vrid> preempt
Interface Config
no ip vrrp preempt
This command sets the default preemption mode value for the virtual router configured on a
specified interface.
Format
Mode
no ip vrrp <vrid> preempt
Interface Config
ip vrrp priority
This command sets the priority of a router within a VRRP group. Higher values equal higher
priority. The range is from 1 to 254. The parameter <vrid>is the virtual router ID, whose
range is from 1 to 255.
The router with the highest priority is elected master. If a router is configured with the address
used as the address of the virtual router, the router is called the “address owner.” The priority
of the address owner is always 255 so that the address owner is always master. If the master
has a priority less than 255 (it is not the address owner) and you configure the priority of
another router in the group higher than the master’s priority, the router will take over as
master only if preempt mode is enabled.
Default
100 unless the router is the address owner, in which case its priority is automatically set to
255.
Format
Mode
ip vrrp <vrid> priority <1-254>
Interface Config
no ip vrrp priority
This command sets the default priority value for the virtual router configured on a specified
interface.
Format
Mode
no ip vrrp <vrid> priority
Interface Config
Routing Commands
270
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip vrrp timers advertise
This command sets the frequency, in seconds, that an interface on the specified virtual router
sends a virtual router advertisement.
Default
1
Format
Mode
ip vrrp <vrid> timers advertise <1-255>
Interface Config
no ip vrrp timers advertise
This command sets the default virtual router advertisement value for an interface.
Format
Mode
no ip vrrp <vrid> timers advertise
Interface Config
ip vrrp track interface
Use this command to alter the priority of the VRRP router based on the availability of its
interfaces. This command is useful for tracking interfaces that are not configured for VRRP.
Only IP interfaces are tracked. A tracked interface is up if the IP on that interface is up.
Otherwise, the tracked interface is down.
When the tracked interface is down or the interface has been removed from the router, the
priority of the VRRP router will be decremented by the value specified in the <priority>
argument. When the interface is up for IP protocol, the priority will be incremented by the
<priority> value.
A VRRP configured interface can track more than one interface. When a tracked interface
goes down, then the priority of the router will be decreased by 10 (the default priority
decrement) for each downed interface. The default priority decrement is changed using the
<priority> argument. The default priority of the virtual router is 100, and the default
decrement priority is 10. By default, no interfaces are tracked. If you specify just the interface
to be tracked, without giving the optional priority, then the default priority will be set. The
default priority decrement is 10.
Default
priority: 10
Format
Mode
ip vrrp <vrid> track interface <unit/slot/port> [decrement
<priority>]
Interface Config
Routing Commands
271
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip vrrp track interface
Use this command to remove the interface from the tracked list or to restore the priority
decrement to its default.
Format
Mode
no ip vrrp <vrid> track interface <unit/slot/port> [decrement]
Interface Config
ip vrrp track ip route
Use this command to track the route reachability. When the tracked route is deleted, the
priority of the VRRP router will be decremented by the value specified in the <priority>
argument. When the tracked route is added, the priority will be incremented by the same.
A VRRP configured interface can track more than one route. When a tracked route goes
down, then the priority of the router will be decreased by 10 (the default priority decrement)
for each downed route. By default no routes are tracked. If you specify just the route to be
tracked, without giving the optional priority, then the default priority will be set. The default
priority decrement is 10. The default priority decrement is changed using the <priority>
argument.
Default
priority: 10
Format
Mode
ip vrrp <vrid> track ip route <ip-address/prefix-length> [decrement
<priority>]
Interface Config
no ip vrrp track ip route
Use this command to remove the route from the tracked list or to restore the priority
decrement to its default. When removing a tracked IP route from the tracked list, the priority
should be incremented by the decrement value if the route is not reachable.
Format
Mode
no ip vrrp <vrid> track ip route <ip-address/prefix-length>
[decrement]
Interface Config
ip vrrp <vrid> accept-mode
This command is used to allow a router to respond to ICMP Echo Requests sent to an
address on a VRRP virtual router. VRRP supports responding to pings, but does not allow the
VRRP Master to accept other types of packets. A new configuration option controls whether
the router responds to Echo Requests sent to a VRRP IP address.
The VRRP Master responds to both fragmented and un-fragmented ICMP Echo Request
packets. The VRRP Master responds to Echo Requests sent to the virtual router's primary
address or any of its secondary addresses.
Routing Commands
272
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Ping to a VRRP IP address only works from the host side (where the VRRP router is
configured). There is no value in pinging to the VRRP IP from another interface because
packet flow from the network to the host doesn't involve VRRP. This is used only to
troubleshoot a connectivity problem for traffic originating on the VRRP protected LAN.
Members of the virtual router who are in backup state discard ping packets destined to VRRP
address(es), just as they discard any Ethernet frame sent to a VRRP MAC address. When
the VRRP master responds with an Echo Reply, the source IPv4 address is the VRRP
address and source MAC address is the virtual router's MAC address.
There is a separate command "ip icmp echo-reply" that controls whether the router responds
to ICMP Echo Requests. When Echo Replies are disabled using that command, the VRRP
master does not respond to Echo Requests, even if this new option is enabled.
Default
disabled
Format
Mode
ip vrrp <vrid> accept-mode
Interface Config
no ip vrrp vrid accept-mode
This command is used to allow a router to respond to ICMP Echo Requests sent to an
address on a VRRP virtual router.
Format
Mode
no ip vrrp <vrid> accept-mode
Interface Config
show ip vrrp interface stats
This command displays the statistical information about each virtual router configured on the
switch.
Format
Modes
show ip vrrp interface stats <unit/slot/port> <vrid>
• Privileged EXEC
• User EXEC
Term
Definition
Uptime
The time that the virtual router has been up, in days, hours, minutes and seconds.
The protocol configured on the interface.
Protocol
State
Transitioned to
Master
The total number of times virtual router state has changed to MASTER.
Advertisement
Received
The total number of VRRP advertisements received by this virtual router.
Advertisement
Interval Errors
The total number of VRRP advertisements received for which advertisement interval is
different than the configured value for this virtual router.
Routing Commands
273
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Authentication
Failure
The total number of VRRP packets received that don't pass the authentication check.
IP TTL errors
The total number of VRRP packets received by the virtual router with IP TTL (time to live)
not equal to 255.
Zero Priority
Packets
The total number of VRRP packets received by virtual router with a priority of '0'.
Received
Zero Priority
Packets Sent
The total number of VRRP packets sent by the virtual router with a priority of '0'.
The total number of VRRP packets received by the virtual router with invalid 'type' field.
Invalid Type
Packets
Received
Address List
Errors
The total number of VRRP packets received for which address list does not match the
locally configured list for the virtual router.
Invalid
Authentication
Type
The total number of VRRP packets received with unknown authentication type.
Authentication
Type Mismatch
The total number of VRRP advertisements received for which 'auth type' not equal to
locally configured one for this virtual router.
Packet Length
Errors
The total number of VRRP packets received with packet length less than length of VRRP
header.
show ip vrrp
This command displays whether VRRP functionality is enabled or disabled on the switch. It
also displays some global parameters which are required for monitoring. This command
takes no options.
Format
show ip vrrp
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Admin Mode
The administrative mode for VRRP functionality on the switch.
The total number of VRRP packets received with an invalid VRRP checksum value.
Router
Checksum
Errors
Router Version
Errors
The total number of VRRP packets received with Unknown or unsupported version
number.
Router VRID
Errors
The total number of VRRP packets received with invalid VRID for this virtual router.
Routing Commands
274
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip vrrp interface
This command displays all configuration information and VRRP router statistics of a virtual
router configured on a specific interface. Use the output of the command to verify the track
interface and track IP route configurations.
Format
show ip vrrp interface {<interface-name> <vrid> }
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Primary IP
Address
The configured IP address for the Virtual router.
VMAC address
The VMAC address of the specified router.
Authentication
type
The authentication type for the specific virtual router.
Priority
The priority value for the specific virtual router, taking into account any priority
decrements for tracked interfaces or routes.
Configured
Priority
The priority configured through the ip vrrp <vrid> priority <1-254> command.
Advertisement
interval
The advertisement interval in seconds for the specific virtual router.
Pre-Empt Mode
The preemption mode configured on the specified virtual router.
The status (Enable or Disable) of the specific router.
Administrative
Mode
State
The state (Master/backup) of the virtual router.
The following shows example CLI display output for the command.
(Switch)#show ip vrrp interface 1/0/1 1
Primary IP Address............................. 1.1.1.5
VMAC Address................................... 00:00:5e:00:01:01
Authentication Type............................ None
Priority....................................... 100
Configured priority.......................... 100
Advertisement Interval (secs).................. 1
Pre-empt Mode.................................. Enable
Administrative Mode............................ Disable
Accept Mode.................................... Enable
State.......................................... Initialized
Track Interface
---------------
State
------
DecrementPriority
------------------
<1/0/1>
down
10
TrackRoute (pfx/len)
------------------------ ------
10.10.10.1/255.255.255.0 down
State
DecrementPriority
------------------
10
Routing Commands
275
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip vrrp interface brief
This command displays information about each virtual router configured on the switch. This
command takes no options. It displays information about each virtual router.
Format
show ip vrrp interface brief
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The router ID of the virtual router.
VRID
IP Address
Mode
The virtual router IP address.
Indicates whether the virtual router is enabled or disabled.
The state (Master/backup) of the virtual router.
State
DHCP and BOOTP Relay Commands
This section describes the commands you use to configure BootP/DHCP Relay on the
switch. A DHCP relay agent operates at Layer 3 and forwards DHCP requests and replies
between clients and servers when they are not on the same physical subnet.
bootpdhcprelay cidoptmode
This command enables the circuit ID option mode for BootP/DHCP Relay on the system.
Default
disabled
Format
Mode
bootpdhcprelay cidoptmode
Global Config
no bootpdhcprelay cidoptmode
This command disables the circuit ID option mode for BootP/DHCP Relay on the system.
Format
Mode
no bootpdhcprelay cidoptmode
Global Config
Routing Commands
276
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
bootpdhcprelay maxhopcount
This command configures the maximum allowable relay agent hops for BootP/DHCP Relay
on the system. The <hops>parameter has a range of 1 to 16.
Default
4
Format
Mode
bootpdhcprelay maxhopcount <1-16>
Global Config
no bootpdhcprelay maxhopcount
This command configures the default maximum allowable relay agent hops for BootP/DHCP
Relay on the system.
Format
Mode
no bootpdhcprelay maxhopcount
Global Config
bootpdhcprelay minwaittime
This command configures the minimum wait time in seconds for BootP/DHCP Relay on the
system. When the BOOTP relay agent receives a BOOTREQUEST message, it MAY use the
seconds-since-client-began-booting field of the request as a factor in deciding whether to
relay the request or not. The parameter has a range of 0 to 100 seconds.
Default
0
Format
Mode
bootpdhcprelay minwaittime <0-100>
Global Config
no bootpdhcprelay minwaittime
This command configures the default minimum wait time in seconds for BootP/DHCP Relay
on the system.
Format
Mode
no bootpdhcprelay minwaittime
Global Config
show bootpdhcprelay
This command displays the BootP/DHCP Relay information.
Format
Modes
show bootpdhcprelay
• Privileged EXEC
• User EXEC
Routing Commands
277
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Maximum Hop
Count
The maximum allowable relay agent hops.
The minimum wait time.
Minimum Wait
Time (Seconds)
Admin Mode
Indicates whether relaying of requests is enabled or disabled.
The IP address for the BootP/DHCP Relay server.
Server IP
Address
Circuit Id
Option Mode
The DHCP circuit Id option which may be enabled or disabled.
The number or requests received.
Requests
Received
Requests
Relayed
The number of requests relayed.
Packets
Discarded
The number of packets discarded.
IP Helper Commands
This section describes the commands to configure a DHCP relay agent with multiple DHCP
server addresses per routing interface, and to use different server addresses for client
packets arriving on different interfaces on the relay agent.
clear ip helper statistics
Use this command to reset the statistics displayed in the show ip helper statistics
command to zero.
Format
Mode
clear ip helper statistics
Privileged EXEC
ip helper-address (Global Config)
Use the Global Configuration ip helper-address command to have the switch forward User
Datagram Protocol (UDP) broadcasts received on an interface. To disable the forwarding of
broadcast packets to specific addresses, use the no form of this command.
The ip helper-address command forwards specific UDP broadcast from one interface to
another. You can define many helper addresses but the total number of address-port pairs is
limited to 128 for the whole device. The setting of a helper address for a specific interface has
precedence over a setting of a helper address for all interfaces.
Ip-address: Destination broadcast or host address to be used when forwarding UDP
broadcasts. You can specify 0.0.0.0 to indicate not to forward the UDP packet to any host and
use "255.255.255.255" to broadcast the UDP packets to all hosts on the target subnet.
Routing Commands
278
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
udp-port-list: The broadcast packet destination UDP port number to forward. If not specified,
packets for the default services are forwarded to the helper address. Valid range, 0-65535.
Default
Disabled
Format
ip helper-address <ip-address>
{<1-65535>|dhcp|domain|isakmp|mobile-ip|nameserver|
netbios-dgm|netbios-ns|ntp|pim-auto-rip|rip|tacacs|tftp|time}
Mode
Global Config
no ip helper-address (Global Config)
Use this command to remove the IP address from the previously configured list. The no
command without an <ip-address> argument removes the entire list of helper addresses
on that interface.
Format
no ip helper-address {<ip-address>}
{<1-65535>|dhcp|domain|isakmp|mobile-ip|nameserver|
netbios-dgm|netbios-ns|ntp|pim-auto-rip|rip|tacacs|tftp|time}
Mode
GlobalConfig
ip helper enable
Use this command to enable relay of UDP packets. This command can be used to
temporarily disable IP helper without deleting all IP helper addresses. This command
replaces the bootpdhcprelay enablecommand, but affects not only relay of DHCP
packets, but also relay of any other protocols for which an IP helper address has been
configured.
Default
disabled
Format
Mode
ip helper enable
Global Config
no ip helper enable
Use this command to disable relay of all UDP packets.
Format
Mode
no ip helper enable
Global Config
ip helper-address
Use this command to add a unicast helper address to the list of helper addresses on an
interface. This is the address of a DHCP server. This command can be applied multiple times
Routing Commands
279
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
on the routing interface to form the helper addresses list until the list reaches the maximum
supported helper addresses.
Format
ip helper-address <ip-address>
{<1-65535>|dhcp|domain|isakmp|mobile-ip|nameserver|
netbios-dgm|netbios-ns|ntp|pim-auto-rip|rip|tacacs|tftp|time}
Mode
Interface Config
no ip helper-address
Use this command to remove the IP address from the previously configured list. The no
command without an <ip-address> argument removes the entire list of helper addresses
on that interface.
Format
no ip helper-address {<ip-address>}
{<1-65535>|dhcp|domain|isakmp|mobile-ip|nameserver|
netbios-dgm|netbios-ns|ntp|pim-auto-rip|rip|tacacs|tftp|time}
Mode
Interface Config
ip helper-address discard
Use this command to drop matching packets.
Format
Mode
ip helper-address discard
{<1-65535>|dhcp|domain|isakmp|mobile-ip|nameserver|
netbios-dgm|netbios-ns|ntp|pim-auto-rip|rip|tacacs|tftp|time}
Interface Config
no ip helper-address discard
Use this command to permit the matching packets.
Format
no ip helper-address discard
{<1-65535>|dhcp|domain|isakmp|mobile-ip|nameserver|
netbios-dgm|netbios-ns|ntp|pim-auto-rip|rip|tacacs|tftp|time}
Mode
Interface Config
show ip helper-address
Use this command to display the configured helper addresses on the given interface.
Format
Mode
show ip helper-address <interface>
• Privileged EXEC
• User EXEC
The following shows example CLI display output for the command.
(switch) #show ip helper-address 1/0/1
Routing Commands
280
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Helper IP Address.............................. 1.2.3.4
............................................... 1.2.3.5
show ip helper statistics
Use this command to display the number of DHCP and other UDP packets processed and
relayed by the UDP relay agent.
Format
Mode
show ip helper statistics
Privileged EXEC
Term
Definition
DHCP client
messages received
The number of valid messages received from a DHCP client. The count is
incremented only if IP helper is enabled globally, the ingress routing interface is up,
and the packet passes a number of validity checks, such as having a TTL>1 and
having valid source and destination IP addresses.
DHCP client
messages relayed
The number of DHCP client messages relayed to a server. If a message is relayed
to multiple servers, the count is incremented once for each server.
DHCP server
messages received
The number of DHCP responses received from the DHCP server. This count
includes only messages that the DHCP server unicasts to the relay agent for relay
to the client.
DHCP server
messages relayed
The number of DHCP server messages relayed to a client.
UDP clients
messages received
The number of valid UDP packets received. This count includes DHCP messages
and all other protocols relayed. Conditions are similar to those for the first statistic in
this table.
UDP clients
messages relayed
The number of UDP packets relayed. This count includes DHCP messages relayed
as well as all other protocols. The count is incremented for each server to which a
packet is sent.
DHCP message hop
count exceeded max
The number of DHCP client messages received whose hop count is larger than the
maximum allowed. The maximum hop count is a configurable value listed in show
bootpdhcprelay. A log message is written for each such failure. The DHCP relay
agent does not relay these packets.
DHCP message with
secs field below min
The number of DHCP client messages received whose secs field is less than the
minimum value. The minimum secs value is a configurable value and is displayed in
show bootpdhcprelay. A log message is written for each such failure. The DHCP
relay agent does not relay these packets.
DHCP message with
giaddr set to local
address
The number of DHCP client messages received whose gateway address, giaddr, is
already set to an IP address configured on one of the relay agent’s own IP
addresses. In this case, another device is attempting to spoof the relay agent’s
address. The relay agent does not relay such packets. A log message gives details
for each occurrence.
Routing Commands
281
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Packets with expired
TTL
The number of packets received with TTL of 0 or 1 that might otherwise have been
relayed.
Packets that
matched a discard
entry
The number of packets ignored by the relay agent because they match a discard
relay entry.
Open Shortest Path First (OSPF) Commands
This section describes the commands you use to view and configure OSPF, which is a
link-state routing protocol that you use to route traffic within a network.
router ospf
Use this command to enter Router OSPF mode.
Format
Mode
router ospf
Global Config
enable (OSPF)
This command resets the default administrative mode of OSPF in the router (active).
Default
enabled
Format
Mode
enable
Router OSPF Config
no enable (OSPF)
This command sets the administrative mode of OSPF in the router to inactive.
Format
Mode
no enable
Router OSPF Config
network area (OSPF)
Use this command to enable OSPFv2 on an interface and set its area ID if the IP address of
an interface is covered by this network command.
Default
disabled
Format
Mode
network <ip-address> <wildcard-mask> area <area-id>
Router OSPF Config
Routing Commands
282
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no network area (OSPF)
Use this command to disable the OSPFv2 on a interface if the IP address of an interface was
earlier covered by this network command.
Format
Mode
no network <ip-address> <wildcard-mask> area <area-id>
Router OSPF Config
ip ospf area
Use this command to enable OSPFv2 and set the area ID of an interface. The <area-id> is
an IP address formatted as a 4-digit dotted-decimal number or a decimal value in the range
of <0-4294967295>. This command supersedes the effects of the network area
command. It can also be used to configure the advertiseability of the secondary addresses
on this interface into the OSPFv2 domain.
Default
disabled
Format
Mode
ip ospf area <area-id> [secondaries none]
Interface Config
no ip ospf area
Use this command to disable OSPF on an interface.
Format
Mode
no ip ospf area [secondaries none]
Interface Config
1583compatibility
This command enables OSPF 1583 compatibility.
Note: 1583 compatibility mode is enabled by default. If all OSPF routers in
the routing domain are capable of operating according to RFC 2328,
OSPF 1583 compatibility mode should be disabled.
Default
enabled
Format
Mode
1583compatibility
Router OSPF Config
Routing Commands
283
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no 1583compatibility
This command disables OSPF 1583 compatibility.
Format
Mode
no 1583compatibility
Router OSPF Config
area default-cost (OSPF)
This command configures the default cost for the stub area. You must specify the area ID and
an integer value between 1-16777215.
Format
Mode
area <areaid> default-cost <1-16777215>
Router OSPF Config
area nssa (OSPF)
This command configures the specified areaid to function as an NSSA.
Format
Mode
area <areaid> nssa
Router OSPF Config
no area nssa
This command disables nssa from the specified area id.
Format
Mode
no area <areaid> nssa
Router OSPF Config
area nssa default-info-originate (OSPF)
This command configures the metric value and type for the default route advertised into the
NSSA. The optional metric parameter specifies the metric of the default route and is to be in
a range of 1-16777214. If no metric is specified, the default value is 10. The metric type can
be comparable (nssa-external 1) or non-comparable (nssa-external 2).
Format
Mode
area <areaid> nssa default-info-originate [<metric>] [{comparable |
non-comparable}]
Router OSPF Config
Routing Commands
284
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no area nssa default-info-originate (OSPF)
This command disables the default route advertised into the NSSA.
Format
Mode
no area <areaid> nssa default-info-originate [<metric>] [{comparable
| non-comparable}]
Router OSPF Config
area nssa no-redistribute (OSPF)
This command configures the NSSA Area Border router (ABR) so that learned external
routes will not be redistributed to the NSSA.
Format
Mode
area <areaid> nssa no-redistribute
Router OSPF Config
no area nssa no-redistribute (OSPF)
This command disables the NSSA ABR so that learned external routes are redistributed to
the NSSA.
Format
Mode
no area <areaid> nssa no-redistribute
Router OSPF Config
area nssa no-summary (OSPF)
This command configures the NSSA so that summary LSAs are not advertised into the
NSSA.
Format
Mode
area <areaid> nssa no-summary
Router OSPF Config
no area nssa no-summary (OSPF)
This command disables nssa from the summary LSAs.
Format
Mode
no area <areaid> nssa no-summary
Router OSPF Config
area nssa translator-role (OSPF)
This command configures the translator role of the NSSA. A value of alwayscauses the
router to assume the role of the translator the instant it becomes a border router and a value
Routing Commands
285
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
of candidatecauses the router to participate in the translator election process when it
attains border router status.
Format
Mode
area <areaid> nssa translator-role {always | candidate}
Router OSPF Config
no area nssa translator-role (OSPF)
This command disables the nssa translator role from the specified area id.
Format
Mode
no area <areaid> nssa translator-role {always | candidate}
Router OSPF Config
area nssa translator-stab-intv (OSPF)
This command configures the translator <stabilityinterval>of the NSSA. The
<stabilityinterval>is the period of time that an elected translator continues to perform
its duties after it determines that its translator status has been deposed by another router.
Format
Mode
area <areaid> nssa translator-stab-intv <stabilityinterval>
Router OSPF Config
no area nssa translator-stab-intv (OSPF)
This command disables the nssa translator’s <stabilityinterval>from the specified
area id.
Format
Mode
no area <areaid> nssa translator-stab-intv <stabilityinterval>
Router OSPF Config
area range (OSPF)
Use this command in Router Configuration mode to configure a summary prefix that an area
border router advertises for a specific area.
Default
No area ranges are configured by default. No cost is configured by default.
Format
area areaid range prefix netmask {summarylink |
nssaexternallink} [advertise | not-advertise] [cost cost]
Mode
OSPFv2 Router Configuration
Parameter
area-id
Description
The area identifier for the area whose networks are to be summarized.
prefix netmask
The summary prefix to be advertised when the ABR computes a route to one or more
networks within this prefix in this area.
Routing Commands
286
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Description
summarylink
When this keyword is given, the area range is used when summarizing prefixes advertised in
type 3 summary LSAs.
nssaexternallink
advertise
When this keyword is given, the area range is used when translating type 7 LSAs to type 5
LSAs.
[Optional] When this keyword is given, the summary prefix is advertised when the area range
is active. This is the default.
not-advertise
[Optional] When this keyword is given, neither the summary prefix nor the contained prefixes
are advertised when the area range is active. When the not-advertise option is given, any
static cost previously configured is removed from the system configuration.
cost
[Optional] If an optional cost is given, OSPF sets the metric field in the summary LSA to the
configured value rather than setting the metric to the largest cost among the networks
covered by the area range. A static cost may only be configured if the area range is
configured to advertise the summary. The range is 0 to 16,777,215. If the cost is set to
16,777,215 for type 3 summarization, a type 3 summary LSA is not advertised, but contained
networks are suppressed. This behavior is equivalent to specifying the not-advertise option. If
the range is configured for type 7 to type 5 translation, a type 5 LSA is sent if the metric is set
to 16,777,215; however, other routers will not compute a route from a type 5 LSA with this
metric.
no area range
The no form of this command deletes a specified area range or reverts an option to its
default.
Format
no area areaid range prefix netmask {summarylink |
nssaexternallink} [advertise | not-advertise] [cost]
Mode
OSPFv2 Router Configuration
area stub (OSPF)
This command creates a stub area for the specified area ID. A stub area is characterized by
the fact that AS External LSAs are not propagated into the area. Removing AS External LSAs
and Summary LSAs can significantly reduce the link state database of routers within the stub
area.
Format
Mode
area <areaid> stub
Router OSPF Config
no area stub
This command deletes a stub area for the specified area ID.
Format
Mode
no area <areaid> stub
Router OSPF Config
Routing Commands
287
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
area stub no-summary (OSPF)
This command configures the Summary LSA mode for the stub area identified by <areaid>.
Use this command to prevent LSA Summaries from being sent.
Default
disabled
Format
Mode
area <areaid> stub no-summary
Router OSPF Config
no area stub no-summary
This command configures the default Summary LSA mode for the stub area identified by
<areaid>.
Format
Mode
no area <areaid> stub no-summary
Router OSPF Config
area virtual-link (OSPF)
This command creates the OSPF virtual interface for the specified <areaid> and
<neighbor>. The <neighbor>parameter is the Router ID of the neighbor.
Format
Mode
area <areaid> virtual-link <neighbor>
Router OSPF Config
no area virtual-link
This command deletes the OSPF virtual interface from the given interface, identified by
<areaid> and <neighbor>. The <neighbor>parameter is the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor>
Router OSPF Config
area virtual-link authentication
This command configures the authentication type and key for the OSPF virtual interface
identified by <areaid>and <neighbor>. The <neighbor> parameter is the Router ID of
the neighbor. The value for <type> is either none, simple, or encrypt. The [key] is
composed of standard displayable, non-control keystrokes from a Standard 101/102-key
keyboard. The authentication key must be 8 bytes or less if the authentication type is simple.
If the type is encrypt, the key may be up to 16 bytes. Unauthenticated interfaces do not need
an authentication key. If the type is encrypt, a key id in the range of 0 and 255 must be
Routing Commands
288
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
specified. The default value for authentication type is none. Neither the default password key
nor the default key id are configured.
Default
none
Format
Mode
area <areaid> virtual-link <neighbor> authentication {none | {simple
<key>} | {encrypt <key> <keyid>}}
Router OSPF Config
no area virtual-link authentication
This command configures the default authentication type for the OSPF virtual interface
identified by <areaid>and <neighbor>. The <neighbor>parameter is the Router ID of
the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> authentication
Router OSPF Config
area virtual-link dead-interval (OSPF)
This command configures the dead interval for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>.The <neighbor>parameter is the
Router ID of the neighbor. The range for seconds is 1 to 65535.
Default
40
Format
Mode
area <areaid> virtual-link <neighbor> dead-interval <seconds>
Router OSPF Config
no area virtual-link dead-interval
This command configures the default dead interval for the OSPF virtual interface on the
virtual interface identified by <areaid>and <neighbor>. The <neighbor> parameter is
the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> dead-interval
Router OSPF Config
area virtual-link hello-interval (OSPF)
This command configures the hello interval for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>. The <neighbor>parameter is the
Router ID of the neighbor. The range for <seconds>is 1 to 65535.
Default
10
Format
Mode
area <areaid> virtual-link <neighbor> hello-interval <1-65535>
Router OSPF Config
Routing Commands
289
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no area virtual-link hello-interval
This command configures the default hello interval for the OSPF virtual interface on the
virtual interface identified by <areaid>and <neighbor>. The <neighbor>parameter is
the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> hello-interval
Router OSPF Config
area virtual-link retransmit-interval (OSPF)
This command configures the retransmit interval for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>. The <neighbor>parameter is the
Router ID of the neighbor. The range for seconds is 0 to 3600.
Default
5
Format
Mode
area <areaid> virtual-link <neighbor> retransmit-interval <seconds>
Router OSPF Config
no area virtual-link retransmit-interval
This command configures the default retransmit interval for the OSPF virtual interface on the
virtual interface identified by <areaid>and <neighbor>. The <neighbor> parameter is
the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> retransmit-interval
Router OSPF Config
area virtual-link transmit-delay (OSPF)
This command configures the transmit delay for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>. The <neighbor>parameter is the
Router ID of the neighbor. The range for seconds is 0 to 3600 (1 hour).
Default
1
Format
Mode
area <areaid> virtual-link <neighbor> transmit-delay <seconds>
Router OSPF Config
no area virtual-link transmit-delay
This command resets the default transmit delay for the OSPF virtual interface to the default
value.
Format
Mode
no area <areaid> virtual-link <neighbor> transmit-delay
Router OSPF Config
Routing Commands
290
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
auto-cost (OSPF)
By default, OSPF computes the link cost of each interface from the interface bandwidth.
Faster links have lower metrics, making them more attractive in route selection. The
configuration parameters in the auto-cost reference bandwidthand bandwidth
commands give you control over the default link cost. You can configure for OSPF an
interface bandwidth that is independent of the actual link speed. A second configuration
parameter allows you to control the ratio of interface bandwidth to link cost. The link cost is
computed as the ratio of a reference bandwidth to the interface bandwidth (ref_bw / interface
bandwidth), where interface bandwidth is defined by the bandwidthcommand. Because the
default reference bandwidth is 100 Mbps, OSPF uses the same default link cost for all
interfaces whose bandwidth is 100 Mbps or greater. Use the auto-costcommand to
change the reference bandwidth, specifying the reference bandwidth in megabits per second
(Mbps). The reference bandwidth range is 1-4294967 Mbps. The different reference
bandwidth can be independently configured for OSPFv2 and OSPFv3.
Default
100Mbps
Format
Mode
auto-cost reference-bandwidth <1 to 4294967>
Router OSPF Config
no auto-cost reference-bandwidth (OSPF)
Use this command to set the reference bandwidth to the default value.
Format
Mode
no auto-cost reference-bandwidth
Router OSPF Config
bandwidth
By default, OSPF computes the link cost of an interface as the ratio of the reference
bandwidth to the interface bandwidth. Reference bandwidth is specified with the auto-cost
command. For the purpose of the OSPF link cost calculation, use the bandwidth command to
specify the interface bandwidth. The bandwidth is specified in kilobits per second. If no
bandwidth is configured, the bandwidth defaults to the actual interface bandwidth for
port-based routing interfaces and to 10 Mbps for VLAN routing interfaces. This command
does not affect the actual speed of an interface.
Default
actual interface bandwidth
Format
Mode
bandwidth <1-10000000>
Interface Config
Routing Commands
291
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no bandwidth
Use this command to set the interface bandwidth to its default value.
Format
Mode
no bandwidth
Interface Config
capability opaque
Use this command to enable Opaque Capability on the Router. The information contained in
Opaque LSAs may be used directly by OSPF or indirectly by an application wishing to
distribute information throughout the OSPF domain. The 7000 series supports the storing and
flooding of Opaque LSAs of different scopes.
Default
disabled
Format
Mode
capability opaque
Router OSPF Config
no capability opaque
Use this command to disable opaque capability on the router.
Format
Mode
no capability opaque
Router OSPF Config
clear ip ospf
Use this command to disable and re-enable OSPF.
Format
Mode
clear ip ospf
Privileged EXEC
clear ip ospf configuration
Use this command to reset the OSPF configuration to factory defaults.
Format
Mode
clear ip ospf configuration
Privileged EXEC
clear ip ospf counters
Use this command to reset global and interface statistics.
Format
Mode
clear ip ospf counters
Privileged EXEC
Routing Commands
292
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear ip ospf neighbor
Use this command to drop the adjacency with all OSPF neighbors. On each neighbor’s
interface, send a one-way hello. Adjacencies may then be re-established. To drop all
adjacencies with a specific router ID, specify the neighbor’s Router ID using the optional
parameter [neighbor-id].
Format
Mode
clear ip ospf neighbor [neighbor-id]
Privileged EXEC
clear ip ospf neighbor interface
To drop adjacency with all neighbors on a specific interface, use the optional parameter
[unit/slot/port]. To drop adjacency with a specific router ID on a specific interface, use the
optional parameter [neighbor-id].
Format
Mode
clear ip ospf neighbor interface [unit/slot/port] [neighbor-id]
Privileged EXEC
clear ip ospf redistribution
Use this command to flush all self-originated external LSAs. Reapply the redistribution
configuration and re-originate prefixes as necessary.
Format
Mode
clear ip ospf redistribution
Privileged EXEC
clear ip ospf stub-router
OSPF can enter stub router mode due to resource exhaustion (too many LSA's, too many
routes, memory allocation failures etc). When this happens, the user can get out of this mode
by issuing the command after the cause of the overload has been resolved.
Format
Mode
clear ip ospf stub-router
Privileged EXEC
default-information originate (OSPF)
This command is used to control the advertisement of default routes.
Default
• metric—unspecified
• type—2
Format
Mode
default-information originate [always] [metric <0-16777214>]
[metric-type {1 | 2}]
Router OSPF Config
Routing Commands
293
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no default-information originate (OSPF)
This command is used to control the advertisement of default routes.
Format
Mode
no default-information originate [metric] [metric-type]
Router OSPF Config
default-metric (OSPF)
This command is used to set a default for the metric of distributed routes.
Format
Mode
default-metric <1-16777214>
Router OSPF Config
no default-metric (OSPF)
This command is used to set a default for the metric of distributed routes.
Format
Mode
no default-metric
Router OSPF Config
distance ospf (OSPF)
This command sets the route preference value of OSPF in the router. Lower route preference
values are preferred when determining the best route. The type of OSPF route can be
intra, inter, or external. All the external type routes are given the same preference
value. The range of <preference> value is 1 to 255.
Default
110
Format
Mode
distance ospf {intra-area <1-255> | inter-area <1-255> | external
<1-255>}
Router OSPF Config
no distance ospf
This command sets the default route preference value of OSPF routes in the router. The type
of OSPF can be intra, inter, or external. All the external type routes are given the same
preference value.
Format
Mode
no distance ospf {intra-area | inter-area | external}
Router OSPF Config
Routing Commands
294
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
distribute-list out (OSPF)
Use this command to specify the access list to filter routes received from the source protocol.
Format
Mode
distribute-list <1-199> out {rip | static | connected}
Router OSPF Config
no distribute-list out
Use this command to specify the access list to filter routes received from the source protocol.
Format
Mode
no distribute-list <1-199> out {rip | static | connected}
Router OSPF Config
exit-overflow-interval (OSPF)
This command configures the exit overflow interval for OSPF. It describes the number of
seconds after entering overflow state that a router will wait before attempting to leave the
overflow state. This allows the router to again originate non-default AS-external-LSAs. When
set to 0, the router will not leave overflow state until restarted. The range for seconds is 0 to
2147483647 seconds.
Default
0
Format
Mode
exit-overflow-interval <seconds>
Router OSPF Config
no exit-overflow-interval
This command configures the default exit overflow interval for OSPF.
Format
Mode
no exit-overflow-interval
Router OSPF Config
external-lsdb-limit (OSPF)
This command configures the external LSDB limit for OSPF. If the value is -1, then there is no
limit. When the number of non-default AS-external-LSAs in a router's link-state database
reaches the external LSDB limit, the router enters overflow state. The router never holds
more than the external LSDB limit non-default AS-external-LSAs in it database. The external
LSDB limit MUST be set identically in all routers attached to the OSPF backbone and/or any
regular OSPF area. The range for limit is -1 to 2147483647.
Default
-1
Format
Mode
external-lsdb-limit <limit>
Router OSPF Config
Routing Commands
295
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no external-lsdb-limit
This command configures the default external LSDB limit for OSPF.
Format
Mode
no external-lsdb-limit
Router OSPF Config
log-adjacency-changes
To enable logging of OSPFv2 neighbor state changes, use this command in router
configuration mode. State changes are logged with INFORMATIONAL severity.
Default
Adjacency state changes are logged, but without the detail option.
Format
log-adjacency-changes [detail]
Mode
OSPFv2 Router Configuration
Parameter
detail
Description
(Optional) When this keyword is specified, all adjacency state changes are logged. Otherwise,
OSPF only logs transitions to FULL state and when a backwards transition occurs.
no log-adjacency-changes
Use the no form of the command to disable state change logging.
Format
no log-adjacency-changes [detail]
Mode
OSPFv2 Router Configuration
ip ospf authentication
This command sets the OSPF Authentication Type and Key for the specified interface. The
value of <type>is either none, simple or encrypt. The <key> is composed of standard
displayable, non-control keystrokes from a Standard 101/102-key keyboard. The
authentication key must be 8 bytes or less if the authentication type is simple. If the type is
encrypt, the key may be up to 16 bytes. If the type is encrypt a <keyid>in the range of 0 and
255 must be specified. Unauthenticated interfaces do not need an authentication key or
authentication key ID. There is no default value for this command.
Format
Mode
ip ospf authentication {none | {simple <key>} | {encrypt <key>
<keyid>}}
Interface Config
Routing Commands
296
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip ospf authentication
This command sets the default OSPF Authentication Type for the specified interface.
Format
no ip ospf authentication
Mode
Interface Config
ip ospf cost
This command configures the cost on an OSPF interface. The <cost>parameter has a
range of 1 to 65535.
Default
10
Format
Mode
ip ospf cost <1-65535>
Interface Config
no ip ospf cost
This command configures the default cost on an OSPF interface.
Format
Mode
no ip ospf cost
Interface Config
ip ospf database-filter all out
Use this command in Interface Configuration mode to disable OSPFv2 LSA flooding on an
interface.
Default
Disabled
Format
ip ospf database-filter all out
Mode
Interface Configuration
no ip ospf database-filter all out
Use this command in Interface Configuration mode to enable OSPFv2 LSA flooding on an
interface.
Default
Disabled
Format
no ip ospf database-filter all out
Mode
Interface Configuration
Routing Commands
297
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip ospf dead-interval
This command sets the OSPF dead interval for the specified interface. The value for
<seconds>is a valid positive integer, which represents the length of time in seconds that a
router's Hello packets have not been seen before its neighbor routers declare that the router
is down. The value for the length of time must be the same for all routers attached to a
common network. This value should be some multiple of the Hello Interval (i.e. 4). Valid
values range in seconds from 1 to 2147483647.
Default
40
Format
Mode
ip ospf dead-interval <seconds>
Interface Config
no ip ospf dead-interval
This command sets the default OSPF dead interval for the specified interface.
Format
Mode
no ip ospf dead-interval
Interface Config
ip ospf hello-interval
This command sets the OSPF hello interval for the specified interface. The value for seconds
is a valid positive integer, which represents the length of time in seconds. The value for the
length of time must be the same for all routers attached to a network. Valid values range from
1 to 65535.
Default
10
Format
Mode
ip ospf hello-interval <seconds>
Interface Config
no ip ospf hello-interval
This command sets the default OSPF hello interval for the specified interface.
Format
Mode
no ip ospf hello-interval
Interface Config
ip ospf network
Use this command to configure OSPF to treat an interface as a point-to-point rather than
broadcast interface. The broadcastoption sets the OSPF network type to broadcast. The
point-to-point option sets the OSPF network type to point-to-point. OSPF treats
interfaces as broadcast interfaces by default. (Loopback interfaces have a special loopback
network type, which cannot be changed.) When there are only two routers on the network,
Routing Commands
298
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
OSPF can operate more efficiently by treating the network as a point-to-point network. For
point-to-point networks, OSPF does not elect a designated router or generate a network link
state advertisement (LSA). Both endpoints of the link must be configured to operate in
point-to-point mode.
Default
broadcast
Format
Mode
ip ospf network {broadcast|point-to-point}
Interface Config
no ip ospf network
Use this command to return the OSPF network type to the default.
Format
Mode
no ip ospf network
Interface Config
ip ospf priority
This command sets the OSPF priority for the specified router interface. The priority of the
interface is a priority integer from 0 to 255. A value of 0 indicates that the router is not eligible
to become the designated router on this network.
Default
1, which is the highest router priority
Format
Mode
ip ospf priority <0-255>
Interface Config
no ip ospf priority
This command sets the default OSPF priority for the specified router interface.
Format
Mode
no ip ospf priority
Interface Config
ip ospf retransmit-interval
This command sets the OSPF retransmit Interval for the specified interface. The retransmit
interval is specified in seconds. The value for <seconds>is the number of seconds between
link-state advertisement retransmissions for adjacencies belonging to this router interface.
This value is also used when retransmitting database description and link-state request
packets. Valid values range from 0 to 3600 (1 hour).
Default
5
Format
Mode
ip ospf retransmit-interval <0-3600>
Interface Config
Routing Commands
299
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip ospf retransmit-interval
This command sets the default OSPF retransmit Interval for the specified interface.
Format
Mode
no ip ospf retransmit-interval
Interface Config
ip ospf transmit-delay
This command sets the OSPF Transit Delay for the specified interface. The transmit delay is
specified in seconds. In addition, it sets the estimated number of seconds it takes to transmit
a link state update packet over this interface. Valid values for <seconds>range from 1 to
3600 (1 hour).
Default
1
Format
Mode
ip ospf transmit-delay <1-3600>
Interface Config
no ip ospf transmit-delay
This command sets the default OSPF Transit Delay for the specified interface.
Format
Mode
no ip ospf transmit-delay
Interface Config
ip ospf mtu-ignore
This command disables OSPF maximum transmission unit (MTU) mismatch detection. OSPF
Database Description packets specify the size of the largest IP packet that can be sent
without fragmentation on the interface. When a router receives a Database Description
packet, it examines the MTU advertised by the neighbor. By default, if the MTU is larger than
the router can accept, the Database Description packet is rejected and the OSPF adjacency
is not established.
Default
enabled
Format
Mode
ip ospf mtu-ignore
Interface Config
no ip ospf mtu-ignore
This command enables the OSPF MTU mismatch detection.
Format
Mode
no ip ospf mtu-ignore
Interface Config
Routing Commands
300
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
router-id (OSPF)
This command sets a 4-digit dotted-decimal number uniquely identifying the router ospf id.
The <ipaddress>is a configured value.
Format
Mode
router-id <ipaddress>
Router OSPF Config
redistribute (OSPF)
This command configures OSPF protocol to allow redistribution of routes from the specified
source protocol/routers.
Default
• metric—unspecified
• type—2
• tag—0
Format
Mode
redistribute {rip | static | connected} [metric <0-16777214>]
[metric-type {1 | 2}] [tag <0-4294967295>] [subnets]
Router OSPF Config
no redistribute
This command configures OSPF protocol to prohibit redistribution of routes from the
specified source protocol/routers.
Format
Mode
no redistribute {rip | static | connected} [metric] [metric-type]
[tag] [subnets]
Router OSPF Config
maximum-paths (OSPF)
This command sets the number of paths that OSPF can report for a given destination where
maxpathsis platform dependent.
Default
4
Format
Mode
maximum-paths <maxpaths>
Router OSPF Config
no maximum-paths
This command resets the number of paths that OSPF can report for a given destination back
to its default value.
Format
Mode
no maximum-paths
Router OSPF Config
Routing Commands
301
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
passive-interface default (OSPF)
Use this command to enable global passive mode by default for all interfaces. It overrides
any interface level passive mode. OSPF will not form adjacencies over a passive interface.
Default
disabled
Format
Mode
passive-interface default
Router OSPF Config
no passive-interface default
Use this command to disable the global passive mode by default for all interfaces. Any
interface previously configured to be passive reverts to non-passive mode.
Format
Mode
no passive-interface default
Router OSPF Config
passive-interface (OSPF)
Use this command to set the interface or tunnel as passive. It overrides the global passive
mode that is currently effective on the interface or tunnel.
Default
disabled
Format
Mode
passive-interface {<unit/slot/port>}
Router OSPF Config
no passive-interface
Use this command to set the interface or tunnel as non-passive. It overrides the global
passive mode that is currently effective on the interface or tunnel.
Format
Mode
no passive-interface {<unit/slot/port>}
Router OSPF Config
timers pacing flood
To adjust the rate at which OSPFv2 sends LS Update packets, use this command in router
OSPFv2 global configuration mode. OSPF distributes routing information in Link State
Advertisements (LSAs), which are bundled into Link State Update (LS Update) packets. To
reduce the likelihood of sending a neighbor more packets than it can buffer, OSPF rate limits
the transmission of LS Update packets. By default, OSPF sends up to 30 updates per second
on each interface (1/the pacing interval). Use this command to adjust this packet rate.
Default
33 milliseconds
Routing Commands
302
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
timers pacing flood milliseconds
OSPFv2 Router Configuration
Parameter
Description
milliseconds
The average time between transmission of LS Update packets. The range is from 5 ms to 100
ms. The default is 33 ms.
no timers pacing flood
To revert LSA transmit pacing to the default rate, use the no timers pacing flood command.
Format
no timers pacing flood
Mode
OSPFv2 Router Configuration
timers pacing lsa-group
To adjust how OSPF groups LSAs for periodic refresh, use this command in OSPFv2 Router
Configuration mode. OSPF refreshes self-originated LSAs approximately once every 30
minutes. When OSPF refreshes LSAs, it considers all self-originated LSAs whose age is
from 1800 to 1800 plus the pacing group size. Grouping LSAs for refresh allows OSPF to
combine refreshed LSAs into a minimal number of LS Update packets. Minimizing the
number of Update packets makes LSA distribution more efficient. When OSPF originates a
new or changed LSA, it selects a random refresh delay for the LSA. When the refresh delay
expires, OSPF refreshes the LSA. By selecting a random refresh delay, OSPF avoids
refreshing a large number of LSAs at one time, even if a large number of LSAs are originated
at one time.
Default
60 seconds
Format
timers pacing lsa-group seconds
Mode
OSPFv2 Router Configuration
Parameter
seconds
Description
Width of the window in which LSAs are refreshed. The range for the pacing group window is
from 10 to 1800 seconds.
timers spf
Use this command to configure the SPF delay time and hold time. The valid range for both
parameters is 0-65535 seconds.
Default
• delay-time—5
• hold-time—10
Routing Commands
303
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
timers spf <delay-time> <hold-time>
Router OSPF Config
trapflags (OSPF)
Use this command to enable individual OSPF traps, enable a group of trap flags at a time, or
enable all the trap flags at a time. The different groups of trapflags, and each group’s specific
Table 1. Trapflags Groups
Group
errors
Flags
• authentication-failure
• bad-packet
• config-error
• virt-authentication-failure
• virt-bad-packet
• virt-config-error
if-rx
lsa
ir-rx-packet
• lsa-maxage
• lsa-originate
overflow
• lsdb-overflow
• lsdb-approaching-overflow
retransmit
• packets
• virt-packets
rtb
• rtb-entry-info
state-change
• if-state-change
• neighbor-state-change
• virtif-state-change
• virtneighbor-state-change
•
•
•
To enable the individual flag, enter the group namefollowed by that particular flag.
To enable all the flags in that group, give the group name followed by all.
To enable all the flags, give the command as trapflags all.
Routing Commands
304
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Default
Format
disabled
trapflags {
all |
errors {all | authentication-failure | bad-packet | config-error |
virt-
authentication-failure | virt-bad-packet | virt-config-error} |
if-rx {all | if-rx-packet} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
rtb {all, rtb-entry-info} |
state-change {all | if-state-change | neighbor-state-change |
virtif-state-
change | virtneighbor-state-change}
}
Mode
Router OSPF Config
no trapflags
Use this command to revert to the default reference bandwidth.
•
•
•
To disable the individual flag, enter the group namefollowed by that particular flag.
To disable all the flags in that group, give the group name followed by all.
To disable all the flags, give the command as trapflags all.
Format
no trapflags {
all |
errors {all | authentication-failure | bad-packet | config-error |
virt-
authentication-failure | virt-bad-packet | virt-config-error} |
if-rx {all | if-rx-packet} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
rtb {all, rtb-entry-info} |
state-change {all | if-state-change | neighbor-state-change |
virtif-state-
change | virtneighbor-state-change}
}
Mode
Router OSPF Config
Routing Commands
305
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip ospf
This command displays information relevant to the OSPF router.
Format
show ip ospf
Mode
Privileged EXEC
Note: Some of the information below displays only if you enable OSPF
and configure certain features.
Term
Definition
Router ID
A 32-bit integer in dotted decimal format identifying the router, about which information is
displayed. This is a configured value.
OSPF Admin
Mode
Shows whether the administrative mode of OSPF in the router is enabled or disabled.
This is a configured value.
ASBR Mode
Indicates whether the ASBR mode is enabled or disabled. Enable implies that the router
is an autonomous system border router. Router automatically becomes an ASBR when it
is configured to redistribute routes learnt from other protocol. The possible values for the
ASBR status is enabled (if the router is configured to re-distribute routes learned by other
protocols) or disabled (if the router is not configured for the same).
RFC 1583
Compatibility
Indicates whether 1583 compatibility is enabled or disabled. This is a configured value.
External LSDB
Limit
The maximum number of non-default AS-external-LSA (link state advertisement) entries
that can be stored in the link-state database.
Exit Overflow
Interval
The number of seconds that, after entering overflow state, a router will attempt to leave
overflow state.
Spf Delay Time
The number of seconds between two subsequent changes of LSAs, during which time
the routing table calculation is delayed.
Spf Hold Time
The number of seconds between two consecutive spf calculations.
Flood Pacing
Interval
The average time, in milliseconds, between LS Update packet transmissions on an
LSA Refresh
Group Pacing
Time
The size, in seconds, of the LSA refresh group window. This is the value configured with
Opaque
Capability
Shows whether the router is capable of sending Opaque LSAs. This is a configured
value.
Autocost Ref
BW
Shows the value of auto-cost reference bandwidth configured on the router.
Shows whether the router is an OSPF Area Border Router.
ABR Status
Routing Commands
306
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
ASBR Status
Reflects whether the ASBR mode is enabled or disabled. Enable implies that the router is
an autonomous system border router. The router automatically becomes an ASBR when
it is configured to redistribute routes learnt from other protocols. The possible values for
the ASBR status is enabled (if the router is configured to redistribute routes learned by
other protocols) or disabled (if the router is not configured for the same).
Stub Router
When OSPF runs out of resources to store the entire link state database, or any other
state information, OSPF goes into stub router mode. As a stub router, OSPF
re-originates its own router LSAs, setting the cost of all non-stub interfaces to infinity. To
restore OSPF to normal operation, disable and re-enable OSPF.
Exit Overflow
Interval
The number of seconds that, after entering overflow state, a router will attempt to leave
overflow state.
External LSDB
Overflow
When the number of non-default external LSAs exceeds the configured limit, External
LSDB Limit, OSPF goes into LSDB overflow state. In this state, OSPF withdraws all of its
self-originated non-default external LSAs. After the Exit Overflow Interval, OSPF leaves
the overflow state, if the number of external LSAs has been reduced.
External LSA
Count
The number of external (LS type 5) link-state advertisements in the link-state database.
External LSA
Checksum
The sum of the LS checksums of external link-state advertisements contained in the
link-state database.
AS_OPAQUE
LSA Count
Shows the number of AS Opaque LSAs in the link-state database.
AS_OPAQUE
LSA Checksum
Shows the sum of the LS Checksums of AS Opaque LSAs contained in the link-state
database.
New LSAs
Originated
The number of new link-state advertisements that have been originated.
LSAs Received
LSA Count
The number of link-state advertisements received determined to be new instantiations.
The total number of link state advertisements currently in the link state database.
The maximum number of LSAs that OSPF can store.
Maximum
Number of
LSAs
LSA High Water
Mark
The maximum size of the link state database since the system started.
Retransmit List
Entries
The total number of LSAs waiting to be acknowledged by all neighbors. An LSA may be
pending acknowledgment from more than one neighbor.
Maximum
Number of
Retransmit
Entries
The maximum number of LSAs that can be waiting for acknowledgment at any given
time.
Retransmit
Entries High
Water Mark
The highest number of LSAs that have been waiting for acknowledgment.
External LSDB
Limit
The maximum number of non-default AS-external-LSAs entries that can be stored in the
link-state database.
Default Metric
Default value for redistributed routes.
Routing Commands
307
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Default Passive
Setting
Shows whether the interfaces are passive by default.
Default Route
Advertise
Indicates whether the default routes received from other source protocols are advertised
or not.
Always
Metric
Shows whether default routes are always advertised.
The metric of the routes being redistributed. If the metric is not configured, this field is
blank.
Metric Type
Shows whether the routes are External Type 1 or External Type 2.
Number of
Active Areas
The number of active OSPF areas. An “active” OSPF area is an area with at least one
interface up.
AutoCost Ref
BW
Shows the value of auto-cost reference bandwidth configured on the router.
The maximum number of paths that OSPF can report for a given destination.
Maximum Paths
Redistributing
This field is a heading and appears only if you configure the system to take routes
learned from a non-OSPF source and advertise them to its peers.
Source
The source protocol/routes that are being redistributed. Possible values are static,
connected, or RIP.
Tag
The decimal value attached to each external route.
Subnets
Distribute-List
For redistributing routes into OSPF, the scope of redistribution for the specified protocol.
The access list used to filter redistributed routes.
The following shows example CLI display output for the command.
(Switch) #show ip ospf
Router ID.....................................2.2.2.2
OSPF Admin Mode...............................Disable
RFC 1583 Compatibility........................Enable
External LSDB Limit...........................No Limit
Exit Overflow Interval........................0
Spf Delay Time................................5
Spf Hold Time.................................10
Opaque Capability.............................Disable
AutoCost Ref BW...............................100 Mbps
Default Passive Setting.......................Disabled
Maximum Paths.................................4
Default Metric................................Not configured
Default Route Advertise.......................Disabled
Always........................................FALSE
Metric........................................Not configured
Metric Type...................................External Type 2
Routing Commands
308
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Number of Active Areas......................... 3 (3 normal, 0 stub, 0 nssa)
ABR Status....................................Disable
ASBR Status...................................Disable
Stub Router...................................FALSE
External LSDB Overflow........................FALSE
External LSA Count............................0
External LSA Checksum.........................0
AS_OPAQUE LSA Count...........................0
AS_OPAQUE LSA Checksum........................0
LSAs Originated...............................0
LSAs Received.................................0
LSA Count.....................................0
Maximum Number of LSAs........................18200
LSA High Water Mark...........................0
Retransmit List Entries........................ 9078
Maximum Number of Retransmit Entries........... 72800
Retransmit Entries High Water Mark............. 72849
show ip ospf abr
This command displays the internal OSPF routing table entries to Area Border Routers
(ABR). This command takes no options.
Format
Mode
show ip ospf abr
• Privileged EXEC
• User EXEC
Term
Type
Definition
The type of the route to the destination. It can be either:
• intra — Intra-area route
• inter — Inter-area route
Router ID
Cost
Router ID of the destination.
Cost of using this route.
Area ID
The area ID of the area from which this route is learned.
Next hop toward the destination.
Next Hop
Next Hop Intf
The outgoing router interface to use when forwarding traffic to the next hop.
show ip ospf area
This command displays information about the area. The <areaid>identifies the OSPF area
that is being displayed.
Format
Modes
show ip ospf area <areaid>
• Privileged EXEC
• User EXEC
Routing Commands
309
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
AreaID
The area id of the requested OSPF area.
External
Routing
A number representing the external routing capabilities for this area.
Spf Runs
The number of times that the intra-area route table has been calculated using this area's
link-state database.
Area Border
Router Count
The total number of area border routers reachable within this area.
Area LSA Count
Total number of link-state advertisements in this area's link-state database, excluding AS
External LSA's.
Area LSA
Checksum
A number representing the Area LSA Checksum for the specified AreaID excluding the
external (LS type 5) link-state advertisements.
Import
Summary LSAs
Shows whether to import summary LSAs.
OSPF Stub
Metric Value
The metric value of the stub area. This field displays only if the area is a configured as a
stub area.
The following OSPF NSSA specific information displays only if the area is configured as an
NSSA:
Term
Definition
Import
Summary LSAs
Shows whether to import summary LSAs into the NSSA.
Redistribute
into NSSA
Shows whether to redistribute information into the NSSA.
Shows whether to advertise a default route into the NSSA.
Default
Information
Originate
Default Metric
The metric value for the default route advertised into the NSSA.
The metric type for the default route advertised into the NSSA.
Default Metric
Type
Translator Role
The NSSA translator role of the ABR, which is always or candidate.
Translator
Stability Interval
The amount of time that an elected translator continues to perform its duties after it
determines that its translator status has been deposed by another router.
Translator State
Shows whether the ABR translator state is disabled, always, or elected.
Routing Commands
310
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip ospf asbr
This command displays the internal OSPF routing table entries to Autonomous System
Boundary Routers (ASBR). This command takes no options.
Format
show ip ospf asbr
Mode
• Privileged EXEC
• User EXEC
Term
Type
Definition
The type of the route to the destination. It can be one of the following values:
intra — Intra-area route
inter — Inter-area route
Router ID
Cost
Router ID of the destination.
Cost of using this route.
Area ID
The area ID of the area from which this route is learned.
Next hop toward the destination.
Next Hop
Next Hop Intf
The outgoing router interface to use when forwarding traffic to the next hop.
show ip ospf database
This command displays information about the link state database when OSPF is enabled. If
you do not enter any parameters, the command displays the LSA headers for all areas. Use
the optional <areaid>parameter to display database information about a specific area. Use
the optional parameters to specify the type of link state advertisements to display.
Parameter
Description
asbr-summary
Use asbr-summaryto show the autonomous system boundary router (ASBR) summary
LSAs.
external
Use externalto display the external LSAs.
Use networkto display the network LSAs.
network
nssa-external
opaque-area
opaque-as
opaque-link
router
Use nssa-externalto display NSSA external LSAs.
Use opaque-areato display area opaque LSAs.
Use opaque-asto display AS opaque LSAs.
Use opaque-linkto display link opaque LSAs.
Use routerto display router LSAs.
summary
Use summaryto show the LSA database summary information.
Routing Commands
311
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
adv-router
Description
Use adv-routerto show the LSAs that are restricted by the advertising router.
self-originate
Use self-originateto display the LSAs in that are self originated. The information
below is only displayed if OSPF is enabled
The information below is only displayed if OSPF is enabled.
Format
show ip ospf [<areaid>] database [{database-summary | [{asbr-summary
| external | network | nssa-external | opaque-area | opaque-as |
opaque-link | router | summary}] [{adv-router [<ipaddr>] |
self-originate}]}]
Mode
• Privileged EXEC
• User EXEC
For each link-type and area, the following information is displayed:
Term
Definition
Adv Router
The Advertising Router. Is a 32 bit dotted decimal number representing the LSDB
interface.
Age
A number representing the age of the link state advertisement in seconds.
A number that represents which LSA is more recent.
The total number LSA checksum.
Sequence
Checksum
Options
This is an integer. It indicates that the LSA receives special handling during routing
calculations.
Rtr Opt
Router Options are valid for router links only.
show ip ospf database database-summary
Use this command to display the number of each type of LSA in the database for each area
and for the router. The command also displays the total number of LSAs in the database.
Format
Modes
show ip ospf database database-summary
• Privileged EXEC
• User EXEC
Term
Definition
Router
Total number of router LSAs in the OSPF link state database.
Total number of network LSAs in the OSPF link state database.
Total number of summary network LSAs in the database.
Network
Summary Net
Summary ASBR
Number of summary ASBR LSAs in the database.
Routing Commands
312
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Type-7 Ext
Total number of Type-7 external LSAs in the database.
Self-Originated
Type-7
Total number of self originated AS external LSAs in the OSPFv3 link state database.
Opaque Link
Opaque Area
Subtotal
Number of opaque link LSAs in the database.
Number of opaque area LSAs in the database.
Number of entries for the identified area.
Number of opaque AS LSAs in the database.
Number of entries for all areas.
Opaque AS
Total
show ip ospf interface
This command displays the information for the IFO object or virtual interface tables.
Format
Mode
show ip ospf interface {<unit/slot/port> | loopback <loopback-id> |
vlan <1-4093>}
• Privileged EXEC
• User EXEC
Term
Definition
IP Address
The IP address for the specified interface.
Subnet Mask
A mask of the network and host portion of the IP address for the OSPF interface.
The secondary IP addresses if any are configured on the interface.
Secondary IP
Address(es)
OSPF Admin
Mode
States whether OSPF is enabled or disabled on a router interface.
OSPF Area ID
The OSPF Area ID for the specified interface.
OSPF Network
Type
The type of network on this interface that the OSPF is running on.
Router Priority
A number representing the OSPF Priority for the specified interface.
Retransmit
Interval
A number representing the OSPF Retransmit Interval for the specified interface.
Hello Interval
Dead Interval
A number representing the OSPF Hello Interval for the specified interface.
A number representing the OSPF Dead Interval for the specified interface.
LSA Ack
Interval
A number representing the OSPF LSA Acknowledgment Interval for the specified
interface.
Transit Delay
Interval
A number representing the OSPF Transit Delay for the specified interface.
Authentication
Type
The OSPF Authentication Type for the specified interface are: none, simple, and encrypt.
Routing Commands
313
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Metric Cost
The cost of the OSPF interface.
Passive Status
Shows whether the interface is passive or not.
OSPF
MTU-ignore
Indicates whether to ignore MTU mismatches in database descriptor packets sent from
neighboring routers.
The information below will only be displayed if OSPF is enabled.
Term
Definition
OSPF Interface
Type
Broadcast LANs, such as Ethernet and IEEE 802.5, take the value broadcast. The
OSPF Interface Type will be 'broadcast'.
State
The OSPF Interface States are: down, loopback, waiting, point-to-point, designated
router, and backup designated router.
Designated
Router
The router ID representing the designated router.
Backup
Designated
Router
The router ID representing the backup designated router.
Number of Link
Events
The number of link events.
Local Link LSAs
The number of Link Local Opaque LSAs in the link-state database.
Local Link LSA
Checksum
The sum of LS Checksums of Link Local Opaque LSAs in the link-state database.
show ip ospf interface brief
This command displays brief information for the IFO object or virtual interface tables.
Format
Mode
show ip ospf interface brief
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
States whether OSPF is enabled or disabled on a router interface.
OSPF Admin
Mode
OSPF Area ID
Router Priority
Hello Interval
Dead Interval
The OSPF Area Id for the specified interface.
A number representing the OSPF Priority for the specified interface.
A number representing the OSPF Hello Interval for the specified interface.
A number representing the OSPF Dead Interval for the specified interface.
Routing Commands
314
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Retransmit
Interval
A number representing the OSPF Retransmit Interval for the specified interface.
A number representing the OSPF Transit Delay for the specified interface.
Retransmit
Delay Interval
LSA Ack
Interval
A number representing the OSPF LSA Acknowledgment Interval for the specified
interface.
show ip ospf interface stats
This command displays the statistics for a specific interface. The information below will only
be displayed if OSPF is enabled.
Format
Modes
show ip ospf interface stats <unit/slot/port>
• Privileged EXEC
• User EXEC
Term
Definition
OSPF Area ID
The area id of this OSPF interface.
Area Border
Router Count
The total number of area border routers reachable within this area. This is initially zero,
and is calculated in each SPF pass.
AS Border
Router Count
The total number of Autonomous System border routers reachable within this area.
Area LSA Count
The total number of link-state advertisements in this area's link-state database, excluding
AS External LSAs.
IP Address
The IP address associated with this OSPF interface.
OSPF Interface
Events
The number of times the specified OSPF interface has changed its state, or an error has
occurred.
Virtual Events
The number of state changes or errors that occurred on this virtual link.
Neighbor
Events
The number of times this neighbor relationship has changed state, or an error has
occurred.
External LSA
Count
The number of external (LS type 5) link-state advertisements in the link-state database.
Sent Packets
The number of OSPF packets transmitted on the interface.
The number of valid OSPF packets received on the interface.
Received
Packets
Discards
The number of received OSPF packets discarded because of an error in the packet or an
error in processing the packet.
Bad Version
The number of received OSPF packets whose version field in the OSPF header does not
match the version of the OSPF process handling the packet.
Routing Commands
315
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Source Not On
Local Subnet
The number of received packets discarded because the source IP address is not within a
subnet configured on a local interface.
Note: This field only applies to OSPFv2.
Virtual Link Not
Found
The number of received OSPF packets discarded where the ingress interface is in a
non-backbone area and the OSPF header identifies the packet as belonging to the
backbone, but OSPF does not have a virtual link to the packet’s sender.
Area Mismatch
The number of OSPF packets discarded because the area ID in the OSPF header is not
the area ID configured on the ingress interface.
Invalid
Destination
Address
The number of OSPF packets discarded because the packet’s destination IP address is
not the address of the ingress interface and is not the AllDrRouters or AllSpfRouters
multicast addresses.
Wrong
Authentication
Type
The number of packets discarded because the authentication type specified in the OSPF
header does not match the authentication type configured on the ingress interface.
Note: This field only applies to OSPFv2.
Authentication
Failure
The number of OSPF packets dropped because the sender is not an existing neighbor or
the sender’s IP address does not match the previously recorded IP address for that
neighbor.
Note: This field only applies to OSPFv2.
No Neighbor at
Source Address
The number of OSPF packets dropped because the sender is not an existing neighbor or
the sender’s IP address does not match the previously recorded IP address for that
neighbor.
Note: Does not apply to Hellos.
Invalid OSPF
Packet Type
The number of OSPF packets discarded because the packet type field in the OSPF
header is not a known type.
Hellos Ignored
The number of received Hello packets that were ignored by this router from the new
neighbors after the limit has been reached for the number of neighbors on an interface or
on the system as a whole.
The command lists the number of OSPF packets of each type sent and received on the
interface.
Packet Type
Hello
Sent
6960
3
Received
6960
3
Database Description
LS Request
1
1
LS Update
141
40
42
135
LS Acknowledgment
Routing Commands
316
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip ospf neighbor
This command displays information about OSPF neighbors. If you do not specify a neighbor
IP address, the output displays summary information in a table. If you specify an interface or
tunnel, only the information for that interface or tunnel displays. The <ip-address>is the IP
address of the neighbor, and when you specify this, detailed information about the neighbor
displays. The information below only displays if OSPF is enabled and the interface has a
neighbor.
Format
Modes
show ip ospf neighbor [interface <unit/slot/port>] [<ip-address>]
• Privileged EXEC
• User EXEC
If you do not specify an IP address, a table with the following columns displays for all
neighbors or the neighbor associated with the interface that you specify:
Term
Definition
Router ID
Priority
The 4-digit dotted-decimal number of the neighbor router.
The OSPF priority for the specified interface. The priority of an interface is a priority
integer from 0 to 255. A value of '0' indicates that the router is not eligible to become the
designated router on this network.
IP Address
The IP address of the neighbor.
Neighbor
Interface
The interface of the local router in unit/slot/port format.
State
The state of the neighboring routers. Possible values are:
• Down - initial state of the neighbor conversation - no recent information has been
received from the neighbor.
• Attempt - no recent information has been received from the neighbor but a more
concerted effort should be made to contact the neighbor.
• Init - an Hello packet has recently been seen from the neighbor, but bidirectional
communication has not yet been established.
• 2 way - communication between the two routers is bidirectional.
• Exchange start - the first step in creating an adjacency between the two neighboring
routers, the goal is to decide which router is the master and to decide upon the initial
DD sequence number.
• Exchange - the router is describing its entire link state database by sending Database
Description packets to the neighbor.
• Loading - Link State Request packets are sent to the neighbor asking for the more
recent LSAs that have been discovered (but not yet received) in the Exchange state.
• Full - the neighboring routers are fully adjacent and they will now appear in
router-LSAs and network-LSAs.
Dead Time
The amount of time, in seconds, to wait before the router assumes the neighbor is
unreachable.
Routing Commands
317
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If you specify an IP address for the neighbor router, the following fields display:
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The IP address of the neighbor router.
Neighbor IP
Address
Interface Index
Area ID
The interface ID of the neighbor router.
The area ID of the OSPF area associated with the interface.
Options
An integer value that indicates the optional OSPF capabilities supported by the neighbor.
The neighbor's optional OSPF capabilities are also listed in its Hello packets. This
enables received Hello Packets to be rejected (i.e., neighbor relationships will not even
start to form) if there is a mismatch in certain crucial OSPF capabilities.
Router Priority
Dead Timer Due
The OSPF priority for the specified interface. The priority of an interface is a priority
integer from 0 to 255. A value of '0' indicates that the router is not eligible to become the
designated router on this network.
The amount of time, in seconds, to wait before the router assumes the neighbor is
unreachable.
Up Time
State
Neighbor uptime; how long since the adjacency last reached the Full state.
The state of the neighboring routers.
Events
The number of times this neighbor relationship has changed state, or an error has
occurred.
Retransmission
Queue Length
An integer representing the current length of the retransmission queue of the specified
neighbor router Id of the specified interface.
The following shows example CLI display output for the command.
(Switch) #show ip ospf neighbor 170.1.1.50
Interface.....................................0/17
Neighbor IP Address...........................170.1.1.50
Interface Index...............................17
Area Id.......................................0.0.0.2
Options.......................................0x2
Router Priority...............................1
Dead timer due in (secs)......................15
Up Time.......................................0 days 2 hrs 8 mins 46 secs
State.........................................Full/BACKUP-DR
Events........................................4
Retransmission Queue Length...................0
Routing Commands
318
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip ospf range
This command displays information about the area ranges for the specified <areaid>. The
<areaid>identifies the OSPF area whose ranges are being displayed.
Format
show ip ospf range <areaid>
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
The area id of the requested OSPF area.
An IP address which represents this area range.
A valid subnet mask for this area range.
The type of link advertisement associated with this area range.
IP Address
Subnet Mask
Lsdb Type
Advertisement
The status of the advertisement. Advertisement has two possible settings: enabled or
disabled.
show ip ospf statistics
This command displays information about recent Shortest Path First (SPF) calculations. The
SPF is the OSPF routing table calculation. The output lists the number of times the SPF has
run for each OSPF area. A table follows this information. For each of the 15 most recent SPF
runs, the table lists how long ago the SPF ran, how long the SPF took, and the reasons why
the SPF was scheduled.
Format
Modes
show ip ospf statistics
• Privileged EXEC
• User EXEC
Term
Definition
Delta T
How long ago the SPF ran. The time is in the format hh:mm:ss, giving the hours,
minutes, and seconds since the SPF run.
SPF Duration
Reason
How long the SPF took in milliseconds.
The reason the SPF was scheduled. Reason codes are as follows:
• R - a router LSA has changed
• N - a network LSA has changed
• SN - a type 3 network summary LSA has changed
• SA - a type 4 ASBR summary LSA has changed
• X - a type 5 or type 7 external LSA has changed
Routing Commands
319
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip ospf stub table
This command displays the OSPF stub table. The information below will only be displayed if
OSPF is initialized on the switch.
Format
show ip ospf stub table
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
A 32-bit identifier for the created stub area.
Type of Service
The type of service associated with the stub metric. Switch CLI only supports Normal
TOS.
Metric Val
The metric value is applied based on the TOS. It defaults to the least metric of the type of
service among the interfaces to other areas. The OSPF cost for a route is a function of
the metric value.
Import
Summary LSA
Controls the import of summary LSAs into stub areas.
show ip ospf traffic
This command displays OSPFv2 packet and LSA statistics and OSPFv2 message queue
statistics. Packet statistics count the packets and LSAs since OSPFv2 counters were last
cleared (using the command clear ip ospf counters).
Note: The clear ip ospf counterscommand does not clear the
message queue high water marks.
Format
show ip ospf traffic
Mode
Privileged EXEC
Parameter
Description
OSPFv2 Packet
Statistics
The number of packets of each type sent and received since OSPF counters were last
cleared.
LSAs
The number of LSAs retransmitted by this router since OSPF counters were last cleared.
Retransmitted
LS Update Max
Receive Rate
The maximum rate of LS Update packets received during any 5-second interval since OSPF
counters were last cleared. The rate is in packets per second.
LS Update Max
Send Rate
The maximum rate of LS Update packets transmitted during any 5-second interval since
OSPF counters were last cleared. The rate is in packets per second.
Routing Commands
320
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Description
Number of LSAs
Received
The number of LSAs of each type received since OSPF counters were last cleared.
OSPFv2 Queue
Statistics
For each OSPFv2 message queue, the current count, the high water mark, the number of
packets that failed to be enqueued, and the queue limit. The high water marks are not cleared
when OSPF counters are cleared.
The following shows example CLI display output for the command.
(netgear switch) #show ip ospf traffic
Time Since Counters Cleared: 4000 seconds
OSPFv2 Packet Statistics
Hello Database Desc LS Request LS Update LS ACK Total
Recd: 500
Sent: 400
10
8
20
16
50
40
20
16
600
480
LSAs Retransmitted................0
LS Update Max Receive Rate........20 pps
LS Update Max Send Rate...........10 pps
Number of LSAs Received
T1 (Router).......................10
T2 (Network)......................0
T3 (Net Summary)..................300
T4 (ASBR Summary).................15
T5 (External).....................20
T7 (NSSA External)................0
T9 (Link Opaque)..................0
T10 (Area Opaque).................0
T11 (AS Opaque)...................0
Total.............................345
OSPFv2 Queue Statistics
Current
0
2
24
1
Max
10
12
47
8
Drops
Limit
500
1680
500
Hello
ACK
Data
Event
0
0
0
0
1000
show ip ospf virtual-link
This command displays the OSPF Virtual Interface information for a specific area and
neighbor. The <areaid>parameter identifies the area and the <neighbor>parameter
identifies the neighbor's Router ID.
Format
show ip ospf virtual-link <areaid> <neighbor>
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
The area id of the requested OSPF area.
The input neighbor Router ID.
Neighbor
Router ID
Routing Commands
321
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Hello Interval
The configured hello interval for the OSPF virtual interface.
The configured dead interval for the OSPF virtual interface.
The configured transit delay for the OSPF virtual interface.
Dead Interval
Iftransit Delay
Interval
Retransmit
Interval
The configured retransmit interval for the OSPF virtual interface.
The configured authentication type of the OSPF virtual interface.
Authentication
Type
State
The OSPF Interface States are: down, loopback, waiting, point-to-point, designated
router, and backup designated router. This is the state of the OSPF interface.
Neighbor State
The neighbor state.
show ip ospf virtual-link brief
This command displays the OSPF Virtual Interface information for all areas in the system.
Format
Modes
show ip ospf virtual-link brief
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
The area id of the requested OSPF area.
Neighbor
The neighbor interface of the OSPF virtual interface.
The configured hello interval for the OSPF virtual interface.
The configured dead interval for the OSPF virtual interface.
The configured retransmit interval for the OSPF virtual interface.
Hello Interval
Dead Interval
Retransmit
Interval
Transit Delay
The configured transit delay for the OSPF virtual interface.
OSPF Graceful Restart Commands
The OSPF protocol can be configured to participate in the checkpointing service, so that
these protocols can execute a graceful restart when the management unit fails. In a graceful
restart, the hardware to continues forwarding IPv4 packets using OSPF routes, while a
backup switch takes over management unit responsibility.
Graceful restart uses the concept of “helpful neighbors.” A fully adjacent router enters helper
mode when it receives a link state announcement (LSA) from the restarting management unit
indicating its intention of performing a graceful restart. In helper mode, a switch continues to
advertise to the rest of the network that they have full adjacencies with the restarting router,
Routing Commands
322
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
thereby avoiding announcement of a topology change and the potential for flooding of LSAs
and shortest-path-first (SPF) runs, which determine OSPF routes. Helpful neighbors continue
to forward packets through the restarting router. The restarting router relearns the network
topology from its helpful neighbors.
Graceful restart can be enabled for planned or unplanned restarts, or both. A planned restart
is initiated by the operator through the management command initiate failover. The operator
may initiate a failover to take the management unit out of service (for example, to address a
partial hardware failure), to correct faulty system behavior that cannot be corrected through
less severe management actions, or other reasons. An unplanned restart is an unexpected
failover, caused by a fatal hardware failure of the management unit or a software hang or
crash on the management unit.
nsf
Use this command to enable the OSPF graceful restart functionality on an interface. To
disable graceful restart, use the no form of the command.
Default
Disabled
Format
Modes
nsf [ietf] [planned-only]
OSPF Router Configuration
Parameter
ietf
Description
This keyword is accepted but not required.
planned-only
This optional keyword indicates that OSPF should perform only a graceful restart when
the restart is planned (that is, when the restart is a result of the initiate failover
command).
no nsf
Use this command to disable graceful restart for all restarts.
Format
Modes
no nsf
OSPF Router Configuration
nsf restart-interval
Use this command to configure the number of seconds that the restarting router asks its
neighbors to wait before exiting helper mode. This is called the “grace period.” The restarting
router includes the grace period in its grace LSAs. For planned restarts (using the initiate
failover command), the grace LSAs are sent prior to restarting the management unit,
whereas for unplanned restarts, they are sent after reboot begins. The grace period must be
Routing Commands
323
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set long enough to allow the restarting router to reestablish all of its adjacencies and
complete a full database exchange with each of those neighbors.
Default
120 seconds
Format
Modes
nsf [ietf] restart-interval <1-1800>
OSPF Router Configuration
Parameter
ietf
Description
This keyword is accepted but not required.
seconds
The number of seconds that the restarting router asks its neighbors to wait before
exiting helper mode. The range is from 1 to 1800 seconds.
no nsfrestart-interval
Use this command to revert the grace period to its default value.
Format
Modes
no [ietf] nsf restart-interval
OSPF Router Configuration
nsf helper
Use this command to enable helpful neighbor functionality for the OSPF protocol. You can
enable this functionality for planned or unplanned restarts, or both.
Default
OSPF may act as a helpful neighbor for both planned and unplanned restarts
nsf [ietf] helper [planned-only]
Format
Modes
OSPF Router Configuration
Parameter
ietf
Description
This keyword is accepted but not required.
planned-only
This optional keyword indicates that OSPF should only help a restarting router
performing a planned restart.
no nsf helper
Use this command to disable helpful neighbor functionality for OSPF.
Format
Modes
no nsf [ietf] helper
OSPF Router Configuration
Routing Commands
324
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
nsf helper disable
Use this command to disable helpful neighbor functionality for OSPF.
Note: The commands no nsf helperand nsf ietf helperdisable
are functionally equivalent. The command nsf ietf helper
disableis supported solely for compatibility with other network
software CLI.
Format
nsf [ietf] helper disable
Modes
OSPF Router Configuration
Parameter
ietf
Description
This keyword is accepted but not required.
nsf [ietf] helper strict-lsa-checking
The restarting router is unable to react to topology changes. In particular, the restarting router
will not immediately update its forwarding table; therefore, a topology change may introduce
forwarding loops or black holes that persist until the graceful restart completes. By exiting the
graceful restart on a topology change, a router tries to eliminate the loops or black holes as
quickly as possible by routing around the restarting router. A helpful neighbor considers a link
down with the restarting router to be a topology change, regardless of the strict LSA checking
configuration. Use this command to require that an OSPF helpful neighbor exit helper mode
whenever a topology change occurs.
Default
Format
Modes
Enabled
nsf [ietf] helper strict-lsa-checking
OSPF Router Configuration
Parameter
ietf
Description
This keyword is accepted but not required.
no nsf [ietf] helper strict-lsa-checking
Use this command to allow OSPF to continue as a helpful neighbor in spite of topology
changes.
Default
Enabled
Routing Commands
325
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Modes
nsf [ietf] helper strict-lsa-checking
OSPF Router Configuration
max-metric router-lsa
To configure OSPF to enter stub router mode, use this command in Router OSPF Global
Configuration mode. When OSPF is in stub router mode, as defined by RFC 3137, OSPF
sets the metric in the non-stub links in its router LSA to LsInfinity. Other routers therefore
compute very long paths through the stub router, and prefer any alternate path. Doing so
eliminates all transit traffic through the stub router, when alternate routes are available. Stub
router mode is useful when adding or removing a router from a network or to avoid transient
routes when a router reloads. You can administratively force OSPF into stub router mode.
OSPF remains in stub router mode until you take OSPF out of stub router mode.
Alternatively, you can configure OSPF to start in stub router mode for a configurable period of
time after the router boots up.
If you set the summary LSA metric to 16,777,215, other routers skip the summary LSA when
they compute routes.
If you have configured the router to enter stub router mode on startup (max-metric
router-lsa on-startup), and then enter max-metric router lsa, there is no
change. If OSPF is administratively in stub router mode (the max-metric router-lsa
command has been given), and you configure OSPF to enter stub router mode on startup
(max-metric router-lsa on-startup), OSPF exits stub router mode (assuming the
startup period has expired) and the configuration is updated.
Default
OSPF is not in stub router mode by default
Format
max-metric router-lsa [on-startup seconds] [summary-lsa
{metric}]
Mode
OSPFv2 Router Configuration
Parameter
on-startup
seconds
Description
(Optional) OSPF starts in stub router mode after a reboot.
(Required if on-startup) The number of seconds that OSPF remains in stub router
mode after a reboot. The range is 5 to 86,400 seconds. There is no default value.
summary-lsa
metric
(Optional) Set the metric in type 3 and type 4 summary LSAs to LsInfinity (0xFFFFFF).
(Optional) Metric to send in summary LSAs when in stub router mode. The range is 1
to 16,777,215. The default is 16,711,680 (0xFF0000).
no max-metric router-lsa
Use this command in OSPFv2 Router Configuration mode to disable stub router mode. The
command clears either type of stub router mode (always or on-startup) and resets the
summary-lsaoption. If OSPF is configured to enter global configuration mode on startup,
and during normal operation you want to immediately place OSPF in stub router mode, issue
Routing Commands
326
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
the command no max-metric router-lsa on-startup. The command no
max-metric router-lsa summary-lsacauses OSPF to send summary LSAs with
metrics computed using normal procedures defined in RFC 2328.
Format
Mode
no max-metric router-lsa [on-startup] [summary-lsa]
OSPFv2 Router Configuration
OSPF Interface Flap Dampening Commands
Dampening
Use this command to enable IP event dampening on a routing interface.
Format
dampening [half-life period] [reuse-threshold suppress-threshold
max-suppress-time [restart restart-penalty]]
Mode
Interface Config
Parameter
Description
Half-life period
The number of seconds it takes for the penalty to reduce by half. The configurable range is
1-30 seconds. Default value is 5 seconds.
Reuse Threshold
The value of the penalty at which the dampened interface is restored. The configurable range
is 1-20,000. Default value is 1000.
Suppress
Threshold
The value of the penalty at which the interface is dampened. The configurable range is 1-
20,000. Default value is 2000.
Max Suppress Time The maximum amount of time (in seconds) an interface can be in suppressed state after it
stops flapping. The configurable range is 1-255 seconds. The default value is four times of
half-life period. If half-period value is allowed to default, the maximum suppress time defaults
to 20 seconds.
Restart Penalty
Penalty applied to the interface after the device reloads. The configurable range is 1- 20,000.
Default value is 2000.
no dampening
This command disables IP event dampening on a routing interface.
Format
Mode
no dampening
Interface Config
Routing Commands
327
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show dampening interface
This command summarizes the number of interfaces configured with dampening and the
number of interfaces being suppressed.
Format
Mode
show dampening interface
Privileged EXEC
The following shows example CLI display output for the command.
(netgear switch)# show dampening interface
2 interfaces are configured with dampening.
1 interface is being suppressed.
show interface dampening
This command displays the status and configured parameters of the interfaces configured
with dampening.
Format
show interface dampening
Mode
Privileged EXEC
Parameter
Flaps
Description
The number times the link state of an interface changed from UP to DOWN.
Accumulated Penalty.
Penalty
Supp
Indicates whether the interface is suppressed or not.
Number of seconds until the interface is allowed to come up again.
Configured half-life period.
ReuseTm
HalfL
ReuseV
SuppV
Configured reuse-threshold.
Configured suppress threshold.
MaxSTm
MaxPenalty
Restart
Configured maximum suppress time in seconds.
Maximum possible penalty.
Configured restart penalty.
Note: The CLI command clear countersresets the flap count to zero.
The interface CLI command no shutdownresets the suppressed
state to False.
Routing Commands
328
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Any change in the dampening configuration resets the current
penalty, reuse time, and suppressed state to their default values,
meaning 0, 0, and FALSE respectively.
The following shows example CLI display output for the command.
(netgear switch)# show interface dampening
Interface 0/2
Flaps Penalty Supp ReuseTm HalfL ReuseV SuppV MaxSTm MaxP Restart
0
0
FALSE
0
5
1000
2000
20
16000
0
Interface 0/3
Flaps Penalty Supp ReuseTm HalfL ReuseV SuppV MaxSTm MaxP Restart
1865 TRUE 18 20 1000 2001 30 2828 1500
6
Routing Information Protocol (RIP) Commands
This section describes the commands you use to view and configure RIP, which is a
distance-vector routing protocol that you use to route traffic within a small network.
router rip
Use this command to enter Router RIP mode.
Format
Mode
router rip
Global Config
enable (RIP)
This command resets the default administrative mode of RIP in the router (active).
Default
enabled
Format
Mode
enable
Router RIP Config
no enable (RIP)
This command sets the administrative mode of RIP in the router to inactive.
Format
Mode
no enable
Router RIP Config
Routing Commands
329
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip rip
This command enables RIP on a router interface.
Default
disabled
Format
Mode
ip rip
Interface Config
no ip rip
This command disables RIP on a router interface.
Format
Mode
no ip rip
Interface Config
auto-summary
This command enables the RIP auto-summarization mode.
Default
disabled
Format
Mode
auto-summary
Router RIP Config
no auto-summary
This command disables the RIP auto-summarization mode.
Format
Mode
no auto-summary
Router RIP Config
default-information originate (RIP)
This command is used to control the advertisement of default routes.
Format
Mode
default-information originate
Router RIP Config
no default-information originate (RIP)
This command is used to control the advertisement of default routes.
Format
Mode
no default-information originate
Router RIP Config
Routing Commands
330
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
default-metric (RIP)
This command is used to set a default for the metric of distributed routes.
Format
Mode
default-metric <0-15>
Router RIP Config
no default-metric (RIP)
This command is used to reset the default metric of distributed routes to its default value.
Format
Mode
no default-metric
Router RIP Config
distance rip
This command sets the route preference value of RIP in the router. Lower route preference
values are preferred when determining the best route. A route with a preference of 255
cannot be used to forward traffic.
Default
15
Format
Mode
distance rip <1-255>
Router RIP Config
no distance rip
This command sets the default route preference value of RIP in the router.
Format
Mode
no distance rip
Router RIP Config
distribute-list out (RIP)
This command is used to specify the access list to filter routes received from the source
protocol.
Default
0
Format
Mode
distribute-list <1-199> out {ospf | static | connected}
Router RIP Config
Routing Commands
331
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no distribute-list out
This command is used to specify the access list to filter routes received from the source
protocol.
Format
Mode
no distribute-list <1-199> out {ospf | static | connected}
Router RIP Config
ip rip authentication
This command sets the RIP Version 2 Authentication Type and Key for the specified
interface. The value of <type>is either none, simple, or encrypt. The value for
authentication key [key] must be 16 bytes or less. The [key] is composed of standard
displayable, non-control keystrokes from a Standard 101/102-key keyboard. If the value of
<type>is encrypt, a keyid in the range of 0 and 255 must be specified. Unauthenticated
interfaces do not need an authentication key or authentication key ID.
Default
none
Format
Mode
ip rip authentication {none | {simple <key>} | {encrypt <key>
<keyid>}}
Interface Config
no ip rip authentication
This command sets the default RIP Version 2 Authentication Type for an interface.
Format
Mode
no ip rip authentication
Interface Config
ip rip receive version
This command configures the interface to allow RIP control packets of the specified
version(s) to be received.
The value for <mode>is one of: rip1to receive only RIP version 1 formatted packets, rip2
for RIP version 2, bothto receive packets from either format, or noneto not allow any RIP
control packets to be received.
Default
both
Format
Mode
ip rip receive version {rip1 | rip2 | both | none}
Interface Config
Routing Commands
332
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip rip receive version
This command configures the interface to allow RIP control packets of the default version(s)
to be received.
Format
Mode
no ip rip receive version
Interface Config
ip rip send version
This command configures the interface to allow RIP control packets of the specified version
to be sent. The value for <mode>is one of: rip1 to broadcast RIP version 1 formatted
packets, rip1c (RIP version 1 compatibility mode) which sends RIP version 2 formatted
packets via broadcast, rip2 for sending RIP version 2 using multicast, or noneto not allow
any RIP control packets to be sent.
Default
ripi2
Format
Mode
ip rip send version {rip1 | rip1c | rip2 | none}
Interface Config
no ip rip send version
This command configures the interface to allow RIP control packets of the default version to
be sent.
Format
Mode
no ip rip send version
Interface Config
hostroutesaccept
This command enables the RIP hostroutesaccept mode.
Default
enabled
Format
Mode
hostroutesaccept
Router RIP Config
no hostroutesaccept
This command disables the RIP hostroutesaccept mode.
Format
Mode
no hostroutesaccept
Router RIP Config
Routing Commands
333
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
split-horizon
This command sets the RIP split horizon mode. Split horizon is a technique for avoiding
problems caused by including routes in updates sent to the router from which the route was
originally learned. The options are: None - no special processing for this case. Simple - a
route will not be included in updates sent to the router from which it was learned. Poisoned
reverse - a route will be included in updates sent to the router from which it was learned, but
the metric will be set to infinity.
Default
simple
Format
Mode
split-horizon {none | simple | poison}
Router RIP Config
no split-horizon
This command sets the default RIP split horizon mode.
Format
Mode
no split-horizon
Router RIP Config
redistribute (RIP)
This command configures RIP protocol to redistribute routes from the specified source
protocol/routers. There are five possible match options. When you submit the command
redistribute ospf match <match-type>the match-type or types specified are added to any
match types presently being redistributed. Internal routes are redistributed by default.
Default
• metric—not-configured
• match—internal
Format for redistribute ospf [metric <0-15>] [match [internal] [external 1]
OSPF as
source
[external 2] [nssa-external 1] [nssa-external-2]]
protocol
Format for redistribute {static | connected} [metric <0-15>]
othersource
protocol
Mode
Router RIP Config
no redistribute
This command de-configures RIP protocol to redistribute routes from the specified source
protocol/routers.
Format
no redistribute {ospf | static | connected} [metric] [match
[internal] [external 1] [external 2] [nssa-external 1]
[nssa-external-2]]
Mode
Router RIP Config
Routing Commands
334
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip rip
This command displays information relevant to the RIP router.
Format
show ip rip
Modes
• Privileged EXEC
• User EXEC
Term
Definition
RIP Admin
Mode
Enable or disable.
Split Horizon
Mode
None, simple or poison reverse.
Auto Summary
Mode
Enable or disable. If enabled, groups of adjacent routes are summarized into single
entries, in order to reduce the total number of entries The default is enable.
Host Routes
Accept Mode
Enable or disable. If enabled the router accepts host routes. The default is enable.
Global Route
Changes
The number of route changes made to the IP Route Database by RIP. This does not
include the refresh of a route's age.
Global queries
Default Metric
The number of responses sent to RIP queries from other systems.
The default metric of redistributed routes if one has already been set, or blank if not
configured earlier. The valid values are 1 to 15.
Default Route
Advertise
The default route.
show ip rip interface brief
This command displays general information for each RIP interface. For this command to
display successful results routing must be enabled per interface (i.e., ip rip).
Format
Modes
show ip rip interface brief
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The IP source address used by the specified RIP interface.
IP Address
Send Version
The RIP version(s) used when sending updates on the specified interface. The types are
none, RIP-1, RIP-1c, RIP-2
Receive Version
The RIP version(s) allowed when receiving updates from the specified interface. The
types are none, RIP-1, RIP-2, Both
Routing Commands
335
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
RIP Mode
The administrative mode of router RIP operation (enabled or disabled).
The mode of the interface (up or down).
Link State
show ip rip interface
This command displays information related to a particular RIP interface.
Format
Modes
show ip rip interface {<unit/slot/port> | vlan <1-4093>}
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes. This is a configured value.
The IP source address used by the specified RIP interface. This is a configured value.
IP Address
Send Version
The RIP version(s) used when sending updates on the specified interface. The types are
none, RIP-1, RIP-1c, RIP-2. This is a configured value.
Receive Version
The RIP version(s) allowed when receiving updates from the specified interface. The
types are none, RIP-1, RIP-2, Both. This is a configured value.
RIP Admin
Mode
RIP administrative mode of router RIP operation; enable activates, disable de-activates
it. This is a configured value.
Link State
Indicates whether the RIP interface is up or down. This is a configured value.
Authentication
Type
The RIP Authentication Type for the specified interface. The types are none, simple, and
encrypt. This is a configured value.
Default Metric
A number which represents the metric used for default routes in RIP updates originated
on the specified interface. This is a configured value.
The following information will be invalid if the link state is down.
Term
Definition
Bad Packets
Received
The number of RIP response packets received by the RIP process which were
subsequently discarded for any reason.
Bad Routes
Received
The number of routes contained in valid RIP packets that were ignored for any reason.
The number of triggered RIP updates actually sent on this interface.
Updates Sent
ICMP Throttling Commands
This section describes the commands you use to configure options for the transmission of
various types of ICMP messages.
Routing Commands
336
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip unreachables
Use this command to enable the generation of ICMP Destination Unreachable messages. By
default, the generation of ICMP Destination Unreachable messages is enabled.
Default
enable
Format
Mode
ip unreachables
Interface Config
no ip unreachables
Use this command to prevent the generation of ICMP Destination Unreachable messages.
Format
Mode
no ip unreachables
Interface Config
ip redirects
Use this command to enable the generation of ICMP Redirect messages by the router. By
default, the generation of ICMP Redirect messages is disabled.
Default
disabled
Format
Mode
ip redirects
• Global Config
• Interface Config
no ip redirects
Use this command to prevent the generation of ICMP Redirect messages by the router.
Format
Mode
no ip redirects
• Global Config
• Interface Config
ip icmp echo-reply
Use this command to enable the generation of ICMP Echo Reply messages by the router. By
default, the generation of ICMP Echo Reply messages is enabled.
Default
enabled
Format
Mode
ip icmp echo-reply
Global Config
Routing Commands
337
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip icmp echo-reply
Use this command to prevent the generation of ICMP Echo Reply messages by the router.
Format
Mode
no ip icmp echo-reply
Global Config
ip icmp error-interval
Use this command to limit the rate at which IPv4 ICMP error messages are sent. The rate
limit is configured as a token bucket, with two configurable parameters, burst-size and
burst-interval.
The burst-interval specifies how often the token bucket is initialized with burst-size tokens.
burst-interval is from 0 to 2147483647 milliseconds (msec).
The burst-size is the number of ICMP error messages that can be sent during one
burst-interval. The range is from 1 to 200 messages.
To disable ICMP rate limiting, set burst-interval to zero (0).
Default
• burst-interval of 1000 msec.
• burst-size of 100 messages
Format
Mode
ip icmp error-interval <burst-interval> [<burst-size>]
Global Config
no ip icmp error-interval
Use the no form of the command to return burst-interval and burst-size to their default values.
Format
Mode
no ip icmp error-interval
Global Config
Routing Commands
338
Download from Www.Somanuals.com. All Manuals Search And Download.
6.
IP Multicast Commands
6
This chapter describes the IP Multicast commands available in the managed switch CLI.
Note: Some commands described in this chapter require a license. For
This chapter contains the following sections:
•
•
•
•
•
The commands in this chapter are in two functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
Multicast Commands
This section describes the commands you use to configure IP Multicast and to view IP
Multicast settings and statistics.
ip mcast boundary
This command adds an administrative scope multicast boundary specified by
<groupipaddr>and <mask>for which this multicast administrative boundary is applicable.
<groupipaddr>is a group IP address and <mask>is a group IP mask.
Format
ip mcast boundary <groupipaddr> <mask>
Mode
Interface Config
339
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip mcast boundary
This command deletes an administrative scope multicast boundary specified by
<groupipaddr>and <mask>for which this multicast administrative boundary is applicable.
<groupipaddr>is a group IP address and <mask>is a group IP mask.
Format
no ip mcast boundary <groupipaddr> <mask>
Mode
Interface Config
ip multicast
This command sets the administrative mode of the IP multicast forwarder in the router to
active.
Default
disabled
Format
Mode
ip multicast
Global Config
no ip multicast
This command sets the administrative mode of the IP multicast forwarder in the router to
inactive.
Format
Mode
no ip multicast
Global Config
ip multicast ttl-threshold
This command is specific to IPv4. Use this command to apply the given Time-to-Live
threshold value <ttlthreshold>to a routing interface. The <ttlthreshold>is the TTL
threshold which is to be applied to the multicast Data packets which are to be forwarded from
the interface. This command sets the Time-to-Live threshold value such that any data
packets forwarded over the interface having TTL value below the configured value are
dropped. The value for <ttlthreshold>ranges from 0 to 255.
Default
1
Format
Mode
ip multicast ttl-threshold <ttlvalue>
Interface Config
IP Multicast Commands
340
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip multicast ttl-threshold
This command applies the default <ttlthreshold>to a routing interface. The
<ttlthreshold>is the TTL threshold which is to be applied to the multicast Data packets
which are to be forwarded from the interface.
Format
no ip multicast ttl-threshold
Mode
Interface Config
ip mroute
This command configures an IPv4 Multicast Static Route for a Source.
src-addris Source IP address of a multicast source or source IP route prefix.
src-maskis Mask associated with the source IP address or source IP route prefix.
rpf-addris IP address to be used as the RPF address. The interface associated with this
IP address, thus, is used as the incoming interface for the mroute.
preferenceis Administrative distance for the mroute. The lower values have better
preference. If the static mroutehas the same distance as the other RPF sources, the static
mroutewill take precedence. The range is from 0 to 255. The default is 0 .
Default
No MRoute is configured on the system
Format
Mode
ip mroute <src-addr> <src-mask> <rpf-addr> <preference>
Global Config
no ip mroute
This command removes the configured IP Multicast Static Route.
Format
Mode
noip mroute <src-addr>
Global Config
show ip mcast
This command displays the system-wide multicast information.
Format
Modes
show ip mcast
• Privileged EXEC
• User EXEC
Term
Definition
Admin Mode
The administrative status of multicast. Possible values are enabled or disabled.
Protocol State
The current state of the multicast protocol. Possible values are Operational or
Non-Operational.
IP Multicast Commands
341
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Table Max Size
The maximum number of entries allowed in the multicast table.
Protocol
The multicast protocol running on the router. Possible values are PIM-DM, PIM-SM, or
DVMRP.
Multicast
Forwarding
Cache Entry
Count
The number of entries in the multicast forwarding cache.
show ip mcast boundary
This command displays all the configured administrative scoped multicast boundaries.
Format
Modes
show ip mcast boundary {<unit/slot/port> | all}
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The group IP address.
Group Ip
Mask
The group IP mask.
show ip mcast interface
This command displays the multicast information for the specified interface.
Format
Modes
show ip mcast interface <unit/slot/port>
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The time-to-live value for this interface.
TTL
show ip mcast mroute
This command displays a summary or all the details of the multicast table.
Format
Modes
show ip mcast mroute {detail | summary}
• Privileged EXEC
• User EXEC
IP Multicast Commands
342
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If you use the detail parameter, the command displays the following fields:
Term
Definition
Source IP
Group IP
Expiry Time
Up Time
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The time of expiry of this entry in seconds.
The time elapsed since the entry was created in seconds.
The IP address of the RPF neighbor.
RPF Neighbor
Flags
The flags associated with this entry.
If you use the summaryparameter, the command displays the following fields:
Term
Definition
Source IP
Group IP
Protocol
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The multicast routing protocol by which the entry was created.
Incoming
Interface
The interface on which the packet for the source/group
arrives.
Outgoing
Interface List
The list of outgoing interfaces on which the packet
is forwarded.
show ip mcast mroute group
This command displays the multicast configuration settings such as flags, timer settings,
incoming and outgoing interfaces, RPF neighboring routers, and expiration times of all the
entries in the multicast mroute table containing the given <groupipaddr>.
Format
Modes
show ip mcast mroute group <groupipaddr> {detail |summary}
• Privileged EXEC
• User EXEC
Term
Definition
Source IP
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The multicast routing protocol by which this entry was created.
The interface on which the packet for this group arrives.
Group IP
Protocol
Incoming
Interface
Outgoing
Interface List
The list of outgoing interfaces on which this packet is forwarded.
IP Multicast Commands
343
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip mcast mroute source
This command displays the multicast configuration settings such as flags, timer settings,
incoming and outgoing interfaces, RPF neighboring routers, and expiration times of all the
entries in the multicast mroute table containing the given source IP address or source IP
address and group IP address pair.
Format
Modes
show ip mcast mroute source <sourceipaddr> {summary | detail}
• Privileged EXEC
• User EXEC
If you use the detail parameter, the command displays the following column headings in
the output table:
Term
Definition
Source IP
Group IP
Expiry Time
Up Time
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The time of expiry of this entry in seconds.
The time elapsed since the entry was created in seconds.
The IP address of the RPF neighbor.
RPF Neighbor
Flags
The flags associated with this entry.
If you use the summaryparameter, the command displays the following column headings in
the output table:
Term
Definition
Source IP
Group IP
Protocol
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The multicast routing protocol by which this entry was created.
The interface on which the packet for this source arrives.
Incoming
Interface
Outgoing
Interface List
The list of outgoing interfaces on which this packet is forwarded.
DVMRP Commands
This section provides a detailed explanation of the Distance Vector Multicast Routing
Protocol (DVMRP) commands.
IP Multicast Commands
344
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip dvmrp(Global Config)
This command sets administrative mode of DVMRP in the router to active.
Default
disabled
Format
Mode
ip dvmrp
Global Config
no ip dvmrp(Global Config)
This command sets administrative mode of DVMRP in the router to inactive.
Format
Mode
no ip dvmrp
Global Config
ip dvmrp metric
This command configures the metric for an interface. This value is used in the DVMRP
messages as the cost to reach this network. This field has a range of 1 to 31.
Default
1
Format
Mode
ip dvmrp metric <metric>
Interface Config
no ip dvmrp metric
This command resets the metric for an interface to the default value. This value is used in the
DVMRP messages as the cost to reach this network.
Format
Mode
no ip dvmrp metric
Interface Config
ip dvmrp trapflags
This command enables the DVMRP trap mode.
Default
disabled
Format
Mode
ip dvmrp trapflags
Global Config
IP Multicast Commands
345
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip dvmrp trapflags
This command disables the DVMRP trap mode.
Format
no ip dvmrp trapflags
Mode
Global Config
ip dvmrp
This command sets the administrative mode of DVMRP on an interface to active.
Default
disabled
Format
Mode
ip dvmrp
Interface Config
no ip dvmrp
This command sets the administrative mode of DVMRP on an interface to inactive.
Format
Mode
no ip dvmrp
Interface Config
show ip dvmrp
This command displays the system-wide information for DVMRP.
Format
Modes
show ip dvmrp
• Privileged EXEC
• User EXEC
Term
Definition
Admin Mode
Indicates whether DVMRP is enabled or disabled.
The version of DVMRP being used.
Version
Total Number of
Routes
The number of routes in the DVMRP routing table.
Reachable
Routes
The number of entries in the routing table with non-infinite metrics.
The following fields are displayed for each interface.
Term
Interface
Definition
Valid slot and port number separated by forward slashes.
IP Multicast Commands
346
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Interface-Mode
The mode of this interface. Possible values are Enabled and Disabled.
Operational-stat
us
The current state of DVMRP on this interface. Possible values are Operational or
Non-Operational.
show ip dvmrp interface
This command displays the interface information for DVMRP on the specified interface.
Format
Modes
show ip dvmrp interface <unit/slot/port>
• Privileged EXEC
• User EXEC
Term
Definition
Interface Mode
Indicates whether DVMRP is enabled or disabled on the specified interface.
The metric of this interface. This is a configured value.
The IP address of the interface.
Metric
Local Address
The following field is displayed only when DVMRP is operational on the interface.
Term
Generation ID
Definition
The Generation ID value for the interface. This is used by the neighboring routers to
detect that the DVMRP table should be resent.
The following fields are displayed only if DVMRP is enabled on this interface.
Term
Definition
Received Bad
Packets
The number of invalid packets received.
Received Bad
Routes
The number of invalid routes received.
Sent Routes
The number of routes that have been sent on this interface.
show ip dvmrp neighbor
This command displays the neighbor information for DVMRP.
Format
Modes
show ip dvmrp neighbor
• Privileged EXEC
• User EXEC
IP Multicast Commands
347
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
IfIndex
The value of the interface used to reach the neighbor.
Nbr IP Addr
State
The IP address of the DVMRP neighbor for which this entry contains information.
The state of the neighboring router. The possible value for this field are ACTIVE or
DOWN.
Up Time
The time since this neighboring router was learned.
Expiry Time
The time remaining for the neighbor to age out. This field is not applicable if the State is
DOWN.
Generation ID
Major Version
Minor Version
Capabilities
The Generation ID value for the neighbor.
The major version of DVMRP protocol of neighbor.
The minor version of DVMRP protocol of neighbor.
The capabilities of neighbor.
Received
Routes
The number of routes received from the neighbor.
Rcvd Bad Pkts
The number of invalid packets received from this neighbor.
The number of correct packets received with invalid routes.
Rcvd Bad
Routes
show ip dvmrp nexthop
This command displays the next hop information on outgoing interfaces for routing multicast
datagrams.
Format
Modes
show ip dvmrp nexthop
• Privileged EXEC
• User EXEC
Term
Definition
Source IP
The sources for which this entry specifies a next hop on an outgoing interface.
Source Mask
The IP Mask for the sources for which this entry specifies a next hop on an outgoing
interface.
Next Hop
Interface
The interface in unit/slot/port format for the outgoing interface for this next hop.
The network is a LEAF or a BRANCH.
Type
IP Multicast Commands
348
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip dvmrp prune
This command displays the table listing the router’s upstream prune information.
Format
show ip dvmrp prune
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Group IP
The multicast Address that is pruned.
The IP address of the source that has pruned.
Source IP
Source Mask
The network Mask for the prune source. It should be all 1s or both the prune source and
prune mask must match.
Expiry Time
(secs)
The expiry time in seconds. This is the time remaining for this prune to age out.
show ip dvmrp route
This command displays the multicast routing information for DVMRP.
Format
Modes
show ip dvmrp route
• Privileged EXEC
• User EXEC
Term
Definition
Source Address
Source Mask
The multicast address of the source group.
The IP Mask for the source group.
Upstream
Neighbor
The IP address of the neighbor which is the source for the packets for a specified
multicast address.
Interface
Metric
The interface used to receive the packets sent by the sources.
The distance in hops to the source subnet. This field has a different meaning than the
Interface Metric field.
Expiry Time
(secs)
The expiry time in seconds, which is the time left for this route to age out.
The time when a specified route was learnt, in seconds.
Up Time (secs)
PIM Commands
This section describes the commands you use to configure Protocol Independent Multicast
(PIM). PIM is a multicast routing protocol that provides scalable inter-domain multicast
IP Multicast Commands
349
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
routing across the Internet, independent of the mechanisms provided by any particular
unicast routing protocol.
ip pim dense (Global Config)
This command enables the administrative mode of PIM-DM in the router.
Default
Disabled
Format
Mode
ip pim dense
Global Config
no ip pim dense (Global Config)
This command disables the administrative mode of PIM-DM in the router.
Format
Mode
no ip pim dense
Global Config
ip pim (Interface Config)
This command sets administrative mode of PIM on an interface to enabled.
Default
disabled
Format
Mode
ip pim
Interface Config
no ip pim (Interface Config)
This command sets administrative mode of PIM on an interface to disabled.
Format
Mode
no ip pim
Interface Config
ip pim hello-interval
This command configures the transmission frequency of PIM Hello messages between PIM
enabled neighbors. This field has a range of 0 to 18000 seconds.
Default
30
Format
Mode
ip pim hello-interval <0-18000>
Interface Config
IP Multicast Commands
350
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip pim hello-interval
This command resets the transmission frequency of hello messages between PIM enabled
neighbors to its default value.
Format
Mode
no ip pim hello-interval
Interface Config
show ip pim interface
This command displays the PIM Interface status parameters. If the interface number is not
specified, this command displays the status parameters of all the PIM enabled interfaces.
Format
Modes
show ip pim interface <unit/slot/port>
Privileged EXEC
Term
Mode
Definition
Active PIM protocol
Interface number.
Interface
Hello Interval
Hello interval value. The frequency at which PIM hello messages are transmitted on this
interface. By default, the value is 30 seconds.
Join-prune
Interval
Join-prune interval value.
DR Priority
DR Priority configured on this Interface. This is not applicable if the interface mode is
Dense
BSR Border
Is this interface configured as a BSR Border?
Neighbor Count
Number of PIM Neighbors learnt on this interface. This field is displayed only when the
interface is operational.
Designated
-Router
IP Address of the elected DR on the Interface. This field is displayed only when the
interface is Operational.
Example 1:
(Switch) #show ip pim interface
Interface 1/0/1
Mode Sparse
Hello Interval (secs) 30
Join Prune Interval (secs) 60
DR Priority 1
BSR Border Disabled
Neighbor Count 1
Designated Router 192.168.10.1
Example 2:
(Switch) #show ip pim interface
Interface 1/0/1
Mode Dense
Hello Interval (secs) 30
IP Multicast Commands
351
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Join Prune Interval (secs) 60
DR Priority NA
BSR Border Disabled
Neighbor Count 1
Designated Router NA
show ip pim neighbor
This command displays the neighbor information for PIM on the specified interface.
Format
show ip pim neighbor <unit/slot/port>
Modes
Privileged EXEC
Term
Definition
Neighbor
Address
The IP address of the PIM neighbor.
Interface
Interface number. Valid slot and port number separated by forward slashes.
The time since this neighbor has become active on this interface.
Time remaining for the neighbor to expire.
UpTime
Expiry Time
DR Priority
DR Priority configured on this Interface [ PIM -SM only ].
(Switch) #show ip pim neighbor 1/0/1
Neighbor Addr Interface Uptime Expiry Time DR
(hh:mm:ss) (hh:mm:ss) Priority
--------------- --------- ----------- ----------- --------
192.168.10.2 1/0/1 00:02:55 00:01:15 NA
(Switch) #show ip pim neighbor
Neighbor Addr Interface Uptime Expiry Time DR
(hh:mm:ss) (hh:mm:ss) Priority
--------------- --------- ----------- ----------- --------
192.168.10.2 1/0/1 00:02:55 00:01:15 1
192.168.20.2 1/0/2 00:03:50 00:02:10 1
ip pim sparse(Global Config)
This command is used to administratively enable PIM Sparse Mode (PIM-SM) multicast
routing mode on the router.
Default
disabled
Format
Mode
ip pim sparse
Global Config
IP Multicast Commands
352
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip pim sparse(Global Config)
This command is used to administratively disable PIM-SM multicast routing mode on the
router.
Format
Mode
no ip pim sparse
Global Config
ip pim bsr-border
Use this command to prevent bootstrap router (BSR) messages from being sent or received
through an interface.
Default
disabled
Format
Mode
ip pim bsr-border
Interface Config
no ip pim bsr-border
Use this command to disable the interface from being the BSR border.
Format
Mode
no ip pim bsr-border
Interface Config
ip pim bsr-candidate
This command is used to configure the router to announce its candidacy as a bootstrap
router (BSR).
Format
Mode
ip pim bsr-candidate interface [vlan | <unit/slot/port>] <hash-mask
length> <bsr-priority> [interval <interval>]
Global Config
Parameters
Description
hash-mask
length
Length of a mask (32 bits maximum) that is to be ANDed with the group address before
the hash function is called. All groups with the same seed hash correspond to the same
RP. For example, if this value was 24, only the first 24 bits of the group addresses matter.
This allows you to get one RP for multiple groups.
bar-priority
interval
Priority of the candidate BSR. The range is an integer from 0 to 255. The BSR with the
larger priority is preferred. If the priority values are the same, the router with the larger IP
address is the BSR. The default value is 0.
The C-BSR advertisement interval. If the interval values are reduced from the default
value of 60 seconds, there could be issues in the network (especially BSR) due to
flooding of these packets. However, it will provide RP fast failover.
IP Multicast Commands
353
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip pim bsr-candidate
This command is used to disable the router to announce its candidacy as a bootstrap router
(BSR).
Format
Mode
no ip pim bsr-candidate interface [vlan | <unit/slot/port>]
Global Config
ip pim dr-priority
Use this command to set the priority value for which a router is elected as the designated
router (DR).
Default
1
Format
Mode
ip pim dr-priority <0-2147483647>
Interface Config
no ip pim dr-priority
Use this command to disable the interface from being the BSR border.
Format
Mode
no ip pim dr-priority
Interface Config
ip pim join-prune-interval
This command is used to configure the interface join/prune interval for the PIM router. The
join/prune interval is specified in seconds. This parameter can be configured to a value from
0 to 18000.
Default
60
Format
Mode
ip pim join-prune-interval <0-18000>
Interface Config
no ip pim join-prune-interval
Use this command to set the join/prune interval to the default value.
Format
Mode
no ip pim join-prune-interval
Interface Config
ip pim rp-address
This command is used to statically configure the RP address for one or more multicast
groups. The parameter <rp-address>is the IP address of the RP. The parameter
IP Multicast Commands
354
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
<groupaddress>is the group address supported by the RP. The parameter <groupmask>
is the group mask for the group address. The optional keyword overrideindicates that if
there is a conflict, the RP configured with this command prevails over the RP learned by
BSR.
Default
disabled
Format
Mode
ip pim rp-address <rp-address> <group-address> <group-mask>
[override]
Global Config
no ip pim rp-address
This command is used to statically remove the RP address for one or more multicast groups.
Format
Mode
no ip pim rp-address <rp-address> <group-address> <group-mask>
[override]
Global Config
ip pim rp-candidate
This command is used to configure the router to advertise itself as a PIM candidate
rendezvous point (RP) to the bootstrap router (BSR).
Format
Mode
ip pim rp-candidate interface <interface-num> <group-address>
<group-mask> {interval <interval>}
Global Config
Parameter
Description
interface-num
The IP address associated with this interface type and number is advertised as a
candidate RP address. This interface must be enabled with PIM.
group-address,
group-mask
The multicast group address and prefix that are advertised in association with the RP
address.
interval
(Optional) Indicates the RP candidate advertisement interval. The range is from 1 to
16383 seconds. The default is 60 seconds.
no ip pim rp-candidate
This command is used to disable the router to advertise itself as a PIM candidate rendezvous
point (RP) to the bootstrap router (BSR).
Format
Mode
no ip pim rp-candidate interface <interface-num>
Global Config
IP Multicast Commands
355
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip pim ssm
Use this command to define the Source Specific Multicast (SSM) range of IP multicast
addresses.
Default
disabled
Format
Mode
ip pim ssm {default | <group-address> <group-mask>}
Global Config
Parameter
Description
default-range
Defines the SSM range access list to 232/8.
no ip pim ssm
This command is used to disable the Source Specific Multicast (SSM) range.
Format
Mode
no ip pim ssm {default | <group-address> <group-mask>}
Global Config
ip pim-trapflags
This command enables the PIM trap mode for both Sparse Mode (SM) and Dense Mode.
(DM).
Default
disabled
Format
Mode
ip pim-trapflags
Global Config
no ip pim-trapflags
This command sets the PIM trap mode to the default.
Format
Mode
no ip pim-trapflags
Global Config
show ip pim
This command displays the system-wide information for PIM (global configuration mode and
interface status).
Format
Modes
show ip pim
Privileged EXEC
IP Multicast Commands
356
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
PIM Mode
Configured mode of PIM protocol (enabled or disabled).
Interface number.
Interface
Interface-Mode
Enable status of the interface.
Operational-Sta
tus
Operational Status of the Interface.
Example 1:
(Switch) #show ip pim
PIM Mode Dense
Interface Interface-Mode Operational-Status
--------- -------------- ------------------
1/0/1
1/0/3
Enabled
Disabled
Operational
Non-Operational
Example 2:
(Switch) #show ip pim
PIM Mode Sparse
Interface Interface-Mode Operational-Status
--------- -------------- ------------------
1/0/1
1/0/3
Enabled
Disabled
Operational
Non-Operational
show ip pim ssm
This command shows the configured source specific IP multicast addresses.
Format
show ip pim ssm
Mode
Privileged EXEC
Term
Definition
Group Address
Prefix Length
The address of the SSM Group.
Prefix Length of the SSM Group.
(Switch) #show ip pim ssm
Group Address/Prefix Length
----------------------------
232.0.0.0/8
IP Multicast Commands
357
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip pim bsr-router
This command displays the bootstrap router (BSR) information. The output includes elected
BSR information and information about the locally configured candidate rendezvous point
(RP) advertisement.
Format
show ip pim bsr-router [candidate | elected]
Mode
• Privileged EXEC
• User EXEC
Term
Definition
BSR Address
IP address of the BSR.
BSR Priority
For candidate it is the configured priority and for elected BSR it is the learned priority..
BSR Hash Mask
Length
Configured or learned hash mask length of the BSR.
Next Bootstrap
message
Time (in hours, minutes, and seconds) in which to send the next bootstrap message
from this BSR.
Next Candidate RP
Advertisement in
Time (in hours, minutes, and seconds) in which the next CRP advertisement will be
sent. This field is applicable only for the elected RP.
(Switch) #show ip pim bsr-router candidate
BSR Address 192.168.10.1
BSR Priority 0
BSR Hash Mask Length 32
Next Bootstrap message (hh:mm:ss) NA
Next Candidate RP Advertisement (hh:mm:ss)NA
(Switch) #show ip pim bsr-router elected
BSR Address 192.168.10.1
BSR Priority 0
BSR Hash Mask Length 32
Next Bootstrap message (hh:mm:ss) 00:00:05
Next Candidate RP Advertisement (hh:mm:ss)00:00:02
show ip pim rp-hash
This command displays the rendezvous point selected for the specified group address..
Format
Modes
show ip pim rp-hash <group-address>
Privileged EXEC
Term
Definition
RP Address
Address of the RP for the group specified.
Origin from where this group mapping is learned.
Type
(Switch) # show ip pim rp-hash 224.1.2.0
RP Address 192.168.10.1
Type Static
IP Multicast Commands
358
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip pim rp mapping
This command displays the mappings for the PIM group to the active rendezvous points..
Format
show ip pim rp mapping [<rp address> | candidate | static]
Modes
Privileged EXEC
Term
Definition
RP Address
The IP address of the RP for the group specified.
Group Address
Group Mask
Origin
Address of the multicast group
Mask for the group address.
Origin from where this group mapping is learned.
Expiry time of the elected RP.
Expiry Time
Example 1:
(Switch) #show ip pim rp mapping 192.168.10.1
RP Address 192.168.10.1
Group Address 224.1.2.1
Group Mask 255.255.255.0
Origin Static
Expiry Time (hh:mm:ss) NA
Example 2:
(Switch) #show ip pim rp mapping
RP Address 192.168.10.1
Group Address 224.1.2.1
Group Mask 255.255.255.0
Origin Static
Expiry Time (hh:mm:ss) NA
RP Address 192.168.20.1
Group Address 229.2.0.0
Group Mask 255.255.0.0
Origin Static
Expiry Time (hh:mm:ss) NA
Example 3:
(Switch) #show ip pim rp mapping candidate
RP Address 192.168.10.1
Group Address 224.1.2.1
Group Mask 255.255.255.0
Origin BSR
Expiry Time (hh:mm:ss) 00:00:08
Example 4:
(Switch) #show ip pim rp mapping static
RP Address 192.168.20.1
Group Address 229.2.0.0
IP Multicast Commands
359
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Group Mask 255.255.0.0
Origin Static
Expiry Time (hh:mm:ss) NA
Internet Group Message Protocol (IGMP) Commands
This section describes the commands you use to view and configure IGMP settings.
ip igmp
This command sets the administrative mode of IGMP in the system to active.
Default
disabled
Format
Modes
ip igmp
• Global Config
• Interface Config
no ip igmp
This command sets the administrative mode of IGMP in the system to inactive.
Format
Modes
no ip igmp
• Global Config
• Interface Config
ip igmp version
This command configures the version of IGMP for an interface. The value for <version>is
either 1, 2 or 3.
Default
3
Format
Modes
ip igmp version <version>
Interface Config
no ip igmp version
This command resets the version of IGMP to the default value.
Format
Modes
no ip igmp version
Interface Config
IP Multicast Commands
360
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip igmp last-member-query-count
This command sets the number of Group-Specific Queries sent before the router assumes
that there are no local members on the interface. The range for <count> is 1 to 20.
Format
Modes
ip igmp last-member-query-count <count>
Interface Config
no ip igmp last-member-query-count
This command resets the number of Group-Specific Queries to the default value.
Format
Modes
noip igmp last-member-query-count
Interface Config
ip igmp last-member-query-interval
This command configures the Maximum Response Time inserted in Group-Specific Queries
which are sent in response to Leave Group messages. The range for <seconds> is 0 to 255
tenths of a second.
Default
10 tenths of a second (1 second)
Format
Modes
ip igmp last-member-query-interval <seconds>
Interface Config
no ip igmp last-member-query-interval
This command resets the Maximum Response Time to the default value.
Format
Modes
no ip igmp last-member-query-interval
Interface Config
ip igmp query-interval
This command configures the query interval for the specified interface. The query interval
determines how fast IGMP Host-Query packets are transmitted on this interface. The range
for <queryinterval> is 1 to 3600 seconds.
Default
125 seconds
Format
Modes
ip igmp query-interval <seconds>
Interface Config
IP Multicast Commands
361
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip igmp query-interval
This command resets the query interval for the specified interface to the default value. This is
the frequency at which IGMP Host-Query packets are transmitted on this interface.
Format
Modes
no ip igmp query-interval
Interface Config
ip igmp query-max-response-time
This command configures the maximum response time interval for the specified interface,
which is the maximum query response time advertised in IGMPv2 queries on this interface.
The time interval is specified in tenths of a second. The range for <maxresptime> is 0 to
255 tenths of a second.
Default
100
Format
Mode
ip igmp query-max-response-time <seconds>
Interface Config
no ip igmp query-max-response-time
This command resets the maximum response time interval for the specified interface, which
is the maximum query response time advertised in IGMPv2 queries on this interface to the
default value. The maximum response time interval is reset to the default time.
Format
Mode
no ip igmp query-max-response-time
Interface Config
ip igmp robustness
This command configures the robustness that allows tuning of the interface. The robustness
is the tuning for the expected packet loss on a subnet. If a subnet is expected to have a lot of
loss, the Robustness variable may be increased for the interface. The range for
<robustness> is 1 to 255.
Default
2
Format
Mode
ip igmp robustness <robustness>
Interface Config
no ip igmp robustness
This command sets the robustness value to default.
Format
Mode
no ip igmp robustness
Interface Config
IP Multicast Commands
362
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip igmp startup-query-count
This command sets the number of Queries sent out on startup, separated by the Startup
Query Interval on the interface. The range for <count> is 1 to 20.
Default
2
Format
Mode
ip igmp startup-query-count <count>
Interface Config
no ip igmp startup-query-count
This command resets the number of Queries sent out on startup, separated by the Startup
Query Interval on the interface to the default value.
Format
Mode
no ip igmp startup-query-count
Interface Config
ip igmp startup-query-interval
This command sets the interval between General Queries sent on startup on the interface.
The time interval value is in seconds. The range for <interval> is 1 to 300 seconds.
Default
31
Format
Mode
ip igmp startup-query-interval <interval>
Interface Config
no ip igmp startup-query-interval
This command resets the interval between General Queries sent on startup on the interface
to the default value.
Format
Mode
no ip igmp startup-query-interval
Interface Config
show ip igmp
This command displays the system-wide IGMP information.
Format
Modes
show ip igmp
• Privileged EXEC
• User EXEC
IP Multicast Commands
363
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
IGMP Admin
Mode
The administrative status of IGMP. This is a configured value.
Valid slot and port number separated by forward slashes.
Interface
Interface-Mode
Indicates whether IGMP is enabled or disabled on the interface. This is a configured
value.
Operational-Sta
tus
The current state of IGMP on this interface. Possible values are Operational or
Non-Operational.
show ip igmp groups
This command displays the registered multicast groups on the interface. If [detail]is
specified this command displays the registered multicast groups on the interface in detail.
Format
Mode
show ip igmp groups <unit/slot/port> [detail]
Privileged EXEC
If you do not use the detailkeyword, the following fields appear:
Term
Definition
IP Address
The IP address of the interface participating in the multicast group.
The subnet mask of the interface participating in the multicast group.
This displays whether IGMP is enabled or disabled on this interface.
Subnet Mask
Interface Mode
The following fields are not displayed if the interface is not enabled:
Term
Definition
Querier Status
Groups
This displays whether the interface has IGMP in Querier mode or Non-Querier mode.
The list of multicast groups that are registered on this interface.
If you use the detailkeyword, the following fields appear:
Term
Definition
Multicast IP
Address
The IP address of the registered multicast group on this interface.
Last Reporter
The IP address of the source of the last membership report received for the specified
multicast group address on this interface.
Up Time
The time elapsed since the entry was created for the specified multicast group address
on this interface.
Expiry Time
The amount of time remaining to remove this entry before it is aged out.
IP Multicast Commands
364
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Version1 Host
Timer
The time remaining until the local router assumes that there are no longer any IGMP
version 1 multicast members on the IP subnet attached to this interface. This could be an
integer value or “-----” if there is no Version 1 host present.
Version2 Host
Timer
The time remaining until the local router assumes that there are no longer any IGMP
version 2 multicast members on the IP subnet attached to this interface. This could be an
integer value or “-----” if there is no Version 2 host present.
Group
Compatibility
Mode
The group compatibility mode (v1, v2 or v3) for this group on the specified interface.
show ip igmp interface
This command displays the IGMP information for the interface.
Format
Modes
show ip igmp interface <unit/slot/port>
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The administrative status of IGMP.
IGMP Admin
Mode
Interface Mode
IGMP Version
Indicates whether IGMP is enabled or disabled on the interface.
The version of IGMP running on the interface. This value can be configured to create a
router capable of running either IGMP version 1 or 2.
Query Interval
Query Max
The frequency at which IGMP Host-Query packets are transmitted on this interface.
The maximum query response time advertised in IGMPv2 queries on this interface.
Response Time
Robustness
The tuning for the expected packet loss on a subnet. If a subnet is expected to be have a
lot of loss, the Robustness variable may be increased for that interface.
Startup Query
Interval
The interval between General Queries sent by a Querier on startup.
Startup Query
Count
The number of Queries sent out on startup, separated by the Startup Query Interval.
Last Member
Query Interval
The Maximum Response Time inserted into Group-Specific Queries sent in response to
Leave Group messages.
Last Member
Query Count
The number of Group-Specific Queries sent before the router assumes that there are no
local members.
IP Multicast Commands
365
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip igmp interface membership
This command displays the list of interfaces that have registered in the multicast group.
Format
show ip igmp interface membership <multiipaddr> [detail]
Mode
Privileged EXEC
Term
Definition
Interface
Valid unit, slot and port number separated by forward slashes.
The IP address of the interface participating in the multicast group.
The interface that has IGMP in Querier mode or Non-Querier mode.
The group compatibility mode (v1, v2 or v3) for the specified group on this interface.
Interface IP
State
Group
Compatibility
Mode
Source Filter
Mode
The source filter mode (Include/Exclude) for the specified group on this interface. This is
“-----” for IGMPv1 and IGMPv2 Membership Reports.
If you use the detailkeyword, the following fields appear:
Term
Definition
Interface
Valid unit, slot and port number separated by forward slashes.
The group compatibility mode (v1, v2 or v3) for the specified group on this interface.
Group
Compatibility
Mode
Source Filter
Mode
The source filter mode (Include/Exclude) for the specified group on this interface. This is
“-----” for IGMPv1 and IGMPv2 Membership Reports.
Source Hosts
The list of unicast source IP addresses in the group record of the IGMPv3 Membership
Report with the specified multicast group IP address. This is “-----” for IGMPv1 and
IGMPv2 Membership Reports.
Expiry Time
The amount of time remaining to remove this entry before it is aged out. This is “-----” for
IGMPv1 and IGMPv2 Membership Reports.
show ip igmp interface stats
This command displays the IGMP statistical information for the interface. The statistics are
only displayed when the interface is enabled for IGMP.
Format
Modes
show ip igmp interface stats <unit/slot/port>
• Privileged EXEC
• User EXEC
IP Multicast Commands
366
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Querier Status
The status of the IGMP router, whether it is running in Querier mode or Non-Querier
mode.
Querier IP
Address
The IP address of the IGMP Querier on the IP subnet to which this interface is attached.
The time since the interface Querier was last changed.
Querier Up Time
Querier Expiry
Time
The amount of time remaining before the Other Querier Present Timer expires. If the
local system is the querier, the value of this object is zero.
Wrong Version
Queries
The number of queries received whose IGMP version does not match the IGMP version
of the interface.
Number of
Joins
The number of times a group membership has been added on this interface.
The current number of membership entries for this interface.
Number of
Groups
IGMP Proxy Commands
The IGMP Proxy is used by IGMP Router (IPv4 system) to enable the system to issue IGMP
host messages on behalf of hosts that the system discovered through standard IGMP router
interfaces. With IGMP Proxy enabled, the system acts as proxy to all the hosts residing on its
router interfaces.
ip igmp-proxy
This command enables the IGMP Proxy on the router. To enable the IGMP Proxy on the
router, you must enable multicast forwarding. Also, make sure that there are no multicast
routing protocols enabled on the router.
Format
Mode
ip igmp-proxy
Interface Config
no ip igmp-proxy
This command disables the IGMP Proxy on the router.
Format
Mode
no ip igmp-proxy
Interface Config
IP Multicast Commands
367
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip igmp-proxy unsolicit-rprt-interval
This command sets the unsolicited report interval for the IGMP Proxy router. This command
is valid only when you enable IGMP Proxy on the interface. The value of <interval>can
be 1-260 seconds.
Default
1
Format
Mode
ip igmp-proxy unsolicit-rprt-interval <interval>
Interface Config
no ip igmp-proxy unsolicit-rprt-interval
This command resets the unsolicited report interval of the IGMP Proxy router to the default
value.
Format
Mode
no ip igmp-proxy unsolicit-rprt-interval
Interface Config
ip igmp-proxy reset-status
This command resets the host interface status parameters of the IGMP Proxy router. This
command is valid only when you enable IGMP Proxy on the interface.
Format
Mode
ip igmp-proxy reset-status
Interface Config
show ip igmp-proxy
This command displays a summary of the host interface status parameters. It displays the
following parameters only when you enable IGMP Proxy.
Format
Modes
show ip igmp-proxy
• Privileged EXEC
• User EXEC
Term
Definition
Interface index
The interface number of the IGMP Proxy.
States whether the IGMP Proxy is enabled or not. This is a configured value.
Admin Mode
Operational
Mode
States whether the IGMP Proxy is operationally enabled or not. This is a status
parameter.
Version
The present IGMP host version that is operational on the proxy interface.
IP Multicast Commands
368
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Number of
Multicast
Groups
The number of multicast groups that are associated with the IGMP Proxy interface.
Unsolicited
Report Interval
The time interval at which the IGMP Proxy interface sends unsolicited group membership
report.
Querier IP
Address on
Proxy Interface
The IP address of the Querier, if any, in the network attached to the upstream interface
(IGMP-Proxy interface).
Older Version 1
Querier Timeout
The interval used to timeout the older version 1 queriers.
The interval used to timeout the older version 2 queriers.
The number of times the IGMP Proxy has been stopped and started.
Older Version 2
Querier Timeout
Proxy Start
Frequency
Example: The following example shows CLI display output for the command.
(Switch) #show ip igmp-proxy
Interface Index............................................. 1/0/1
Admin Mode................................................ Enable
Operational Mode......................................... Enable
Version......................................................... 3
Num of Multicast Groups............................. 0
Unsolicited Report Interval.......................... 1
Querier IP Address on Proxy Interface........ 5.5.5.50
Older Version 1 Querier Timeout................ 0
Older Version 2 Querier Timeout................ 00::00:00
Proxy Start Frequency................................. 1
show ip igmp-proxy interface
This command displays a detailed list of the host interface status parameters. It displays the
following parameters only when you enable IGMP Proxy.
Format
Modes
show ip igmp-proxy interface
• Privileged EXEC
• User EXEC
Term
Definition
Interface Index
The unit/slot/port of the IGMP proxy.
The column headings of the table associated with the interface are as follows:
IP Multicast Commands
369
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Ver
Definition
The IGMP version.
Query Rcvd
Report Rcvd
Report Sent
Leaves Rcvd
Leaves Sent
Number of IGMP queries received.
Number of IGMP reports received.
Number of IGMP reports sent.
Number of IGMP leaves received. Valid for version 2 only.
Number of IGMP leaves sent on the Proxy interface. Valid for version 2 only.
Example: The following shows example CLI display output for the command.
(Switch) #show ip igmp-proxy interface
Interface Index................................ 1/0/1
Ver Query Rcvd Report Rcvd Report Sent Leave Rcvd Leave Sent
------------------------------------------------------------------
1
2
3
0
0
0
0
0
0
0
0
0
-----
0
-----
-----
0
-----
show ip igmp-proxy groups
This command displays information about the subscribed multicast groups that IGMP Proxy
reported. It displays a table of entries with the following as the fields of each column.
Format
show ip igmp-proxy groups
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Interface
The interface number of the IGMP Proxy.
Group Address
Last Reporter
The IP address of the multicast group.
The IP address of host that last sent a membership report for the current group on the
network attached to the IGMP Proxy interface (upstream interface).
Up Time (in
secs)
The time elapsed since last created.
Member State
The status of the entry. Possible values are IDLE_MEMBER or DELAY_MEMBER.
• IDLE_MEMBER - interface has responded to the latest group membership query for
this group.
• DELAY_MEMBER - interface is going to send a group membership report to respond
to a group membership query for this group.
IP Multicast Commands
370
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Filter Mode
Possible values are Include or Exclude.
Sources
The number of sources attached to the multicast group.
Example: The following shows example CLI display output for the command.
(Switch) #show ip igmp-proxy groups
Interface Index................................ 1/0/1
Group Address
-------------
225.4.4.4
Last Reporter
Up Time Member State Filter Mode Sources
-------------- ---------- ------------- ------------- -------
5.5.5.48
5.5.5.48
5.5.5.48
5.5.5.48
00:02:21 DELAY_MEMBER
00:02:21 DELAY_MEMBER
00:02:21 DELAY_MEMBER
00:02:21 DELAY_MEMBER
Include
Include
Exclude
Include
3
3
0
3
226.4.4.4
227.4.4.4
228.4.4.4
show ip igmp-proxy groups detail
This command displays complete information about multicast groups that IGMP Proxy
reported. It displays a table of entries with the following as the fields of each column.
Format
show ip igmp-proxy groups detail
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Interface
The interface number of the IGMP Proxy.
Group Address
Last Reporter
The IP address of the multicast group.
The IP address of host that last sent a membership report for the current group, on the
network attached to the IGMP-Proxy interface (upstream interface).
Up Time (in
secs)
The time elapsed since last created.
Member State
The status of the entry. Possible values are IDLE_MEMBER or DELAY_MEMBER.
• IDLE_MEMBER - interface has responded to the latest group membership query for
this group.
• DELAY_MEMBER - interface is going to send a group membership report to respond
to a group membership query for this group.
Filter Mode
Sources
Possible values are Include or Exclude.
The number of sources attached to the multicast group.
IP Multicast Commands
371
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Group Source
List
The list of IP addresses of the sources attached to the multicast group.
Time left before a source is deleted.
Expiry Time
Example: The following shows example CLI display output for the command.
(Switch) #show ip igmp-proxy groups
Interface Index................................ 1/0/1
Group Address
-------------
225.4.4.4
Last Reporter
Up Time Member State Filter Mode Sources
-------------- ----------- ------------ ------------ ---------
5.5.5.48
00:02:21 DELAY_MEMBER
Expiry Time
Include
3
Group Source List
-----------------
5.1.2.3
-----------------
00:02:21
6.1.2.3
00:02:21
7.1.2.3
00:02:21
226.4.4.4
5.5.5.48
00:02:21 DELAY_MEMBER
Include
3
Group Source List
------------------
2.1.2.3
Expiry Time
---------------
00:02:21
6.1.2.3
00:01:44
8.1.2.3
00:01:44
227.4.4.4
5.5.5.48
00:02:21 DELAY_MEMBER
Exclude
Include
0
228.4.4.4
5.5.5.48
00:03:21 DELAY_MEMBER
Expiry Time
3
Group Source List
------------------
9.1.2.3
---------------
00:03:21
6.1.2.3
00:03:21
7.1.2.3
00:03:21
IP Multicast Commands
372
Download from Www.Somanuals.com. All Manuals Search And Download.
7.
IPv6 Commands
7
This chapter describes the IPv6 commands available in the managed switch CLI.
Note: Some commands described in this chapter require a license. For
This chapter contains the following sections:
•
•
•
•
•
The commands in this chapter are in three functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
•
Clear commands clear some or all of the settings to factory defaults.
Tunnel Interface Commands
The commands in this section describe how to create, delete, and manage tunnel interfaces.
Several different types of tunnels provide functionality to facilitate the transition of IPv4
networks to IPv6 networks. These tunnels are divided into two classes: configured and
automatic. The distinction is that configured tunnels are explicitly configured with a
destination or endpoint of the tunnel. Automatic tunnels, in contrast, infer the endpoint of the
373
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
tunnel from the destination address of packets routed into the tunnel. To assign an IP address
interface tunnel
Use this command to enter the Interface Config mode for a tunnel interface. The
<tunnel-id>range is 0 to 7.
Format
Mode
interface tunnel <tunnel-id>
Global Config
no interface tunnel
This command removes the tunnel interface and associated configuration parameters for the
specified tunnel interface.
Format
Mode
no interface tunnel <tunnel-id>
Global Config
tunnel source
This command specifies the source transport address of the tunnel, either explicitly or by
reference to an interface.
Format
Mode
tunnel source {<ipv4-address> | ethernet <unit/slot/port>}
Interface Config
tunnel destination
This command specifies the destination transport address of the tunnel.
Format
Mode
tunnel destination {<ipv4-address>}
Interface Config
tunnel mode ipv6ip
This command specifies the mode of the tunnel. With the optional 6to4 argument, the tunnel
mode is set to 6to4 automatic. Without the optional 6to4 argument, the tunnel mode is
configured.
Format
Mode
tunnel mode ipv6ip [6to4]
Interface Config
IPv6 Commands
374
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show interface tunnel
This command displays the parameters related to tunnel such as tunnel mode, tunnel source
address and tunnel destination address.
Format
Mode
show interface tunnel [<tunnel-id>]
Privileged EXEC
If you do not specify a tunnel ID, the command shows the following information for each
configured tunnel:
Term
Definition
Tunnel ID
The tunnel identification number.
The name of the tunnel interface.
The tunnel mode.
Interface
Tunnel Mode
Source Address
The source transport address of the tunnel.
The destination transport address of the tunnel.
Destination
Address
If you specify a tunnel ID, the command shows the following information for the tunnel:
Term
Definition
Interface Link
Status
Shows whether the link is up or down.
MTU Size
The maximum transmission unit for packets on the interface.
IPv6 Prefix is
If you enable IPv6 on the interface and assign an address, the IPv6 address and prefix
display.
IPv6 Routing Commands
This section describes the IPv6 commands you use to configure IPv6 on the system and on
the interfaces. This section also describes IPv6 management commands and show
commands.
ipv6 hop-limit
This command defines the unicast hop count used in ipv6 packets originated by the node.
The value is also included in router advertisements. Valid values for <hops>are 1-255
inclusive. The default “not configured” means that a value of zero is sent in router
IPv6 Commands
375
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
advertisements and a value of 64 is sent in packets originated by the node. Note that this is
not the same as configuring a value of 64.
Default
not configured
Format
Mode
ipv6 hop-limit <hops>
Global Config
no ipv6 hop-limit
This command returns the unicast hop count to the default.
Format
Mode
no ipv6 hop-limit
Global Config
ipv6 unicast-routing
Use this command to enable the forwarding of IPv6 unicast datagrams.
Default
disabled
Format
Mode
ipv6 unicast-routing
Global Config
no ipv6 unicast-routing
Use this command to disable the forwarding of IPv6 unicast datagrams.
Format
Mode
no ipv6 unicast-routing
Global Config
ipv6 enable
Use this command to enable IPv6 routing on an interface, including tunnel and loopback
interfaces, that has not been configured with an explicit IPv6 address. When you use this
command, the interface is automatically configured with a link-local address. You do not need
to use this command if you configured an IPv6 global address on the interface.
Default
disabled
Format
Mode
ipv6 enable
Interface Config
IPv6 Commands
376
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 enable
Use this command to disable IPv6 routing on an interface.
Format
Mode
no ipv6 enable
Interface Config
ipv6 address
Use this command to configure an IPv6 address on an interface, including tunnel and
loopback interfaces, and to enable IPv6 processing on this interface. You can assign multiple
globally reachable addresses to an interface by using this command. You do not need to
assign a link-local address by using this command since one is automatically created. The
<prefix>field consists of the bits of the address to be configured. The <prefix_length>
designates how many of the high-order contiguous bits of the address make up the prefix.
You can express IPv6 addresses in eight blocks. Also of note is that instead of a period, a
colon now separates each block. For simplification, leading zeros of each 16 bit block can be
omitted. One sequence of 16 bit blocks containing only zeros can be replaced with a double
colon “::”, but not more than one at a time (otherwise it is no longer a unique representation).
•
•
•
Dropping zeros: 3ffe:ffff:100:f101:0:0:0:1 becomes 3ffe:ffff:100:f101::1
Local host: 0000:0000:0000:0000:0000:0000:0000:0001becomes ::1
Any host: 0000:0000:0000:0000:0000:0000:0000:0000becomes ::
The hexadecimal letters in the IPv6 addresses are not case-sensitive. An example of an IPv6
prefix and prefix length is 3ffe:1::1234/64.
The optional [eui-64] field designates that IPv6 processing on the interfaces was enabled
using an EUI-64 interface ID in the low order 64 bits of the address. If you use this option, the
value of <prefix_length> must be 64 bits.
Format
Mode
ipv6 address<prefix>/<prefix_length> [eui64]
Interface Config
no ipv6 address
Use this command to remove all IPv6 addresses on an interface or specified IPv6 address.
The <prefix>parameter consists of the bits of the address to be configured. The
<prefix_length>designates how many of the high-order contiguous bits of the address
comprise the prefix. The optional [eui-64]field designates that IPv6 processing on the
interfaces was enabled using an EUI-64 interface ID in the low order 64 bits of the address.
If you do not supply any parameters, the command deletes all the IPv6 addresses on an
interface.
Format
Mode
no ipv6 address[<prefix>/<prefix_length>] [eui64]
Interface Config
IPv6 Commands
377
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 address autoconfig
This command is used to enable stateless address autoconfiguration capability.
Note: When unicast-routing is enabled, autoconfig mode doesn’t work.
Format
Mode
ipv6 address autoconfig
Interface Config
ipv6 address autoconfig
This command disables the stateless autoconfiguration.
Format
Mode
no ipv6 addressautoconfig
Interface Config
ipv6 address dhcp
This command is used to enable DHCPv6 client capability.
Format
Mode
ipv6 address autoconfig
Interface Config
no pv6 address dhcp
The "no" form of this command disables the DHCPv6 client capability.
Format
Mode
no ipv6 address autoconfig
Interface Config
ipv6 route
Use this command to configure an IPv6 static route. The <ipv6-prefix>is the IPv6
network that is the destination of the static route. The <prefix_length>is the length of the
IPv6 prefix — a decimal value (usually 0-64) that shows how many of the high-order
contiguous bits of the address comprise the prefix (the network portion of the address). A
slash mark must precede the <prefix_length>. The <next-hop-address>is the IPv6
address of the next hop that can be used to reach the specified network. Specifying Null0
as nexthop parameter adds a static reject route. The <preference>parameter is a value
the router uses to compare this route with routes from other route sources that have the same
destination. The range for <preference> is 1 - 255, and the default value is 1. You can
specify a <unit/slot/port>or tunnel <tunnel_id>interface to identify direct static
routes from point-to-point and broadcast interfaces. The interface must be specified when
IPv6 Commands
378
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
using a link-local address as the next hop. A route with a preference of 255 cannot be used to
forward traffic.
Default
disabled
Format
ipv6 route <ipv6-prefix>/<prefix_length> {<next-hop-address> | Null0
| interface {<unit/slot/port> | tunnel <tunnel_id>}
<next-hop-address>} [<preference>]
Mode
Global Config
no ipv6 route
Use this command to delete an IPv6 static route. Use the command without the optional
parameters to delete all static routes to the specified destination. Use the <preference>
parameter to revert the preference of a route to the default preference.
Format
no ipv6 route <ipv6-prefix>/<prefix_length> [{<next-hop-address> |
Null0 | interface {<unit/slot/port> | tunnel <tunnel_id>}
<next-hop-address> | <preference>}]
Mode
Global Config
ipv6 route distance
This command sets the default distance (preference) for IPv6 static routes. Lower route
distance values are preferred when determining the best route. The ipv6 routecommand
allows you to optionally set the distance (preference) of an individual static route. The default
distance is used when no distance is specified in this command.
Changing the default distance does not update the distance of existing static routes, even if
they were assigned the original default distance. The new default distance will only be
applied to static routes created after invoking the ipv6 route distancecommand.
Default
1
Format
Mode
ipv6 route distance <1-255>
Global Config
no ipv6 route distance
This command resets the default static route preference value in the router to the original
default preference. Lower route preference values are preferred when determining the best
route.
Format
Mode
no ipv6 route distance
Global Config
IPv6 Commands
379
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 mtu
This command sets the maximum transmission unit (MTU) size, in bytes, of IPv6 packets on
an interface. This command replaces the default or link MTU with a new MTU value.
Note: The default MTU value for a tunnel interface is 1480. You cannot
change this value
.
Default
0 or link speed (MTU value (1500))
Format
Mode
ipv6 mtu <1280-1500>
Interface Config
no ipv6 mtu
This command resets maximum transmission unit value to default value.
Format
Mode
no ipv6 mtu
Interface Config
ipv6 nd dad attempts
This command sets the number of duplicate address detection probes transmitted. Duplicate
address detection verifies that an IPv6 address on an interface is unique.
Default
1
Format
Mode
ipv6 nd dad attempts <0 - 600>
Interface Config
no ipv6 nd dad attempts
This command resets to number of duplicate address detection value to default value.
Format
Mode
no ipv6 nd dad attempts
Interface Config
IPv6 Commands
380
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 nd managed-config-flag
This command sets the “managed address configuration” flag in router advertisements.
When the value is true, end nodes use DHCPv6. When the value is false, end nodes
automatically configure addresses.
Default
false
Format
Mode
ipv6 nd managed-config-flag
Interface Config
no ipv6 nd managed-config-flag
This command resets the “managed address configuration” flag in router advertisements to
the default value.
Format
Mode
no ipv6 nd managed-config-flag
Interface Config
ipv6 nd ns-interval
This command sets the interval between router advertisements for advertised neighbor
solicitations, in milliseconds. An advertised value of 0 means the interval is unspecified.
Default
0
Format
Mode
ipv6 nd ns-interval {<1000-4294967295> | 0}
Interface Config
no ipv6 nd ns-interval
This command resets the neighbor solicit retransmission interval of the specified interface to
the default value.
Format
Mode
no ipv6 nd ns-interval
Interface Config
ipv6 nd other-config-flag
This command sets the “other stateful configuration” flag in router advertisements sent from
the interface.
Default
false
Format
Mode
ipv6 nd other-config-flag
Interface Config
IPv6 Commands
381
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 nd other-config-flag
This command resets the “other stateful configuration” flag back to its default value in router
advertisements sent from the interface.
Format
Mode
no ipv6 nd other-config-flag
Interface Config
ipv6 nd ra-interval
This command sets the transmission interval between router advertisements.
Default
600
Format
Mode
ipv6 nd ra-interval-max <4- 1800>
Interface Config
no ipv6 nd ra-interval
This command sets router advertisement interval to the default.
Format
Mode
no ipv6 nd ra-interval-max
Interface Config
ipv6 nd ra-lifetime
This command sets the value, in seconds, that is placed in the Router Lifetime field of the
router advertisements sent from the interface. The <lifetime>value must be zero, or it
must be an integer between the value of the router advertisement transmission interval and
9000. A value of zero means this router is not to be used as the default router.
Default
1800
Format
Mode
ipv6 nd ra-lifetime <lifetime>
Interface Config
no ipv6 nd ra-lifetime
This command resets router lifetime to the default value.
Format
Mode
no ipv6 nd ra-lifetime
Interface Config
IPv6 Commands
382
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 nd reachable-time
This command sets the router advertisement time to consider a neighbor reachable after
neighbor discovery confirmation. Reachable time is specified in milliseconds. A value of zero
means the time is unspecified by the router.
Default
0
Format
Mode
ipv6 nd reachable-time <0–3600000>
Interface Config
no ipv6 nd reachable-time
This command means reachable time is unspecified for the router.
Format
Mode
no ipv6 nd reachable-time
Interface Config
ipv6 nd suppress-ra
This command suppresses router advertisement transmission on an interface.
Default
disabled
Format
Mode
ipv6 nd suppress-ra
Interface Config
no ipv6 nd suppress-ra
This command enables router transmission on an interface.
Format
Mode
no ipv6 nd suppress-ra
Interface Config
ipv6 nd router-preference
This is used to configure router preference value in IPv6 router advertisements on an
interface. This will indicate whether or not to prefer this router over other default routers.
Default
Format
Mode
Medium
ipv6 nd router-preference <high/low/medium>
Interface Config
IPv6 Commands
383
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 nd router-preference
This command will set the router preference to default.
Format
Mode
no ipv6 router-preference
Interface Config
ipv6 unreachables
Use this command to enable the generation of ICMPv6 Destination Unreachable messages.
By default, the generation of ICMPv6 Destination Unreachable messages is enabled.
Default
enable
Format
Mode
ipv6 unreachables
Interface Config
no ipv6 unreachables
Use this command to prevent the generation of ICMPv6 Destination Unreachable messages.
Format
Mode
no ipv6 unreachables
Interface Config
ipv6 icmp error-interval
Use this command to limit the rate at which ICMPv6 error messages are sent. The rate limit is
configured as a token bucket, with two configurable parameters, burst-size and burst-interval.
The burst-interval specifies how often the token bucket is initialized with burst-size tokens.
burst-interval is from 0 to 2147483647 milliseconds (msec).
The burst-size is the number of ICMPv6 error messages that can be sent during one
burst-interval. The range is from 1 to 200 messages.
To disable ICMP rate limiting, set burst-interval to zero (0).
Default
• burst-interval of 1000 msec.
• burst-size of 100 messages
Format
Mode
ipv6 icmp error-interval <burst-interval> [<burst-size>]
Global Config
IPv6 Commands
384
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 icmp error-interval
Use the no form of the command to return burst-interval and burst-size to their default
values.
Format
Mode
no ipv6 icmp error-interval
Global Config
show ipv6 brief
Use this command to display the IPv6 status of forwarding mode and IPv6 unicast routing
mode.
Format
Mode
show ipv6 brief
Privileged EXEC
Term
Definition
IPv6
Forwarding
Mode
Shows whether the IPv6 forwarding mode is enabled.
IPv6 Unicast
Routing Mode
Shows whether the IPv6 unicast routing mode is enabled.
IPv6 Hop Limit
Shows the unicast hop count used in IPv6 packets originated by the node. For more
ICMPv6 Rate
Limit Error
Interval
Shows how often the token bucket is initialized with burst-size tokens. For more
ICMPv6 Rate
Limit Burst Size
Shows the number of ICMPv6 error messages that can be sent during one burst-interval.
Maximum
Routes
Shows the maximum IPv6 route table size.
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 brief
IPv6 Forwarding Mode........................... Enable
IPv6 Unicast Routing Mode...................... Enable
IPv6 Hop Limit................................. 0
ICMPv6 Rate Limit Error Interval............... 1000 msec
ICMPv6 Rate Limit Burst Size................... 100 messages
Maximum Routes................................. 3000
IPv6 Commands
385
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 interface
Use this command to show the usability status of IPv6 interfaces and whether ICMPv6
Destination Unreachable messages may be sent.
Format
Mode
show ipv6 interface {brief | <unit/slot/port> |tunnel <0-7> |
loopback <0-7>}
Privileged EXEC
If you use the briefparameter, the following information displays for all configured IPv6
interfaces:
Term
Definition
Interface
The interface in unit/slot/port format.
Shows whether the mode is enabled or disabled.
IPv6 Routing
Operational
Mode
IPv6
Address/Length
Shows the IPv6 address and length on interfaces with IPv6 enabled.
If you specify an interface, the following information also appears.
Term
Definition
IPv6 is enabled
Routing Mode
Appears if IPv6 is enabled on the interface.
Shows whether IPv6 routing is enabled or disabled.
Shows whether the interface administrative mode is enabled or disabled.
Administrative
Mode
Bandwidth
Shows bandwidth of the interface.
The MTU size, in bytes.
Interface
Maximum
Transmission
Unit
Router
The number of consecutive duplicate address detection probes to transmit.
Duplicate
Address
Detection
Transmits
Router
Advertisement
NS Interval
The interval, in milliseconds, between router advertisements for advertised neighbor
solicitations.
Router
Advertisement
Lifetime
Shows the router lifetime value of the interface in router advertisements.
Router
Advertisement
Reachable Time
The amount of time, in milliseconds, to consider a neighbor reachable after neighbor
discovery confirmation.
IPv6 Commands
386
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Router
Advertisement
Interval
The frequency, in seconds, that router advertisements are sent.
Router
Advertisement
Managed
Shows whether the managed configuration flag is set (enabled) for router advertisements
on this interface.
Config Flag
Router
Shows whether the other configuration flag is set (enabled) for router advertisements on
this interface.
Advertisement
Other Config
Flag
Router
Advertisement
Suppress Flag
Shows whether router advertisements are suppressed (enabled) or sent (disabled).
IPv6
Destination
Unreachables
Shows whether ICMPv6 Destination Unreachable messages may be sent (enabled) or
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 interface 1/0/1
Routing Mode................................... Disabled
Administrative Mode............................ Enabled
IPv6 Routing Operational Mode.................. Disabled
Bandwidth...................................... 100000 kbps
Interface Maximum Transmit Unit................ 1500
Router Duplicate Address Detection Transmits... 1
Router Advertisement NS Interval............... 0
Router Advertisement Lifetime.................. 1800
Router Advertisement Reachable Time............ 0
Router Advertisement Interval.................. 600
Router Advertisement Managed Config Flag....... Disabled
Router Advertisement Other Config Flag......... Disabled
Router Advertisement Suppress Flag............. Disabled
IPv6 Destination Unreachables.................. Enabled
No IPv6 prefixes configured.
If an IPv6 prefix is configured on the interface, the following information also appears.
Term
Definition
IFPv6 Prefix is
The IPv6 prefix for the specified interface.
The amount of time the advertised prefix is a preferred prefix.
Preferred
Lifetime
Valid Lifetime
Onlink Flag
The amount of time the advertised prefix is valid.
Shows whether the onlink flag is set (enabled) in the prefix.
Autonomous
Flag
Shows whether the autonomous address-configuration flag (autoconfig) is set (enabled)
in the prefix.
IPv6 Commands
387
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 neighbor
Use this command to display information about the IPv6 neighbors.
Format
show ipv6 neighbor
Mode
Privileged EXEC
Term
Definition
Interface
The interface in unit/slot/port format.
IPV6 address of neighbor or interface.
Link-layer Address.
IPv6 Address
MAC Address
IsRtr
Shows whether the neighbor is a router. If the value is TRUE, the neighbor is known to
be a router, and FALSE otherwise. A value of FALSE might not mean Note that routers
are not always known to be routers.
Neighbor State
Last Updated
State of neighbor cache entry. Possible values are Incomplete, Reachable, Stale, Delay,
Probe, and Unknown.
The time in seconds that has elapsed since an entry was added to the cache.
clear ipv6 neighbors
Use this command to clear all entries IPv6 neighbor table or an entry on a specific interface.
Use the <unit/slot/port>parameter to specify the interface.
Format
Mode
clear ipv6 neighbors [<unit/slot/port>]
Privileged EXEC
show ipv6 route
This command displays the IPv6 routing table The <ipv6-address>specifies a specific
IPv6 address for which the best-matching route would be displayed. The
<ipv6-prefix/ipv6-prefix-length> specifies a specific IPv6 network for which the
matching route would be displayed. The <interface>specifies that the routes with
next-hops on the <interface>be displayed. The <protocol>specifies the protocol that
installed the routes. The <protocol>is one of the following keywords: connected, ospf,
static. The allspecifies that all routes including best and non-best routes are displayed.
Otherwise, only the best routes are displayed.
A “T” flag appended to an IPv6 route indicates that it is an ECMP route, but only one of its
next hops has been installed in the forwarding table. The forwarding table might limit the
number of ECMP routes or the number of ECMP groups. When an ECMP route cannot be
installed because the limit is reached, the route is installed with a single next hop. Such
truncated routes can be identified by a “T” after the interface name.
IPv6 Commands
388
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: If you use the connected keyword for <protocol>, the all option is not
available because there are no best or non-best connected routes.
Format
Modes
show ipv6 route [{<ipv6-address> [<protocol>] |
{{<ipv6-prefix/ipv6-prefix-length> | <unit/slot/port>} [<protocol>]
| <protocol> | summary} [all] | all}]
• Privileged EXEC
• User EXEC
Term
Definition
Route Codes
The key for the routing protocol codes that might appear in the routing table output.
The show ipv6 routecommand displays the routing tables in the following format:
Codes: C - connected, S - static
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF Ext 1, OE2 - OSPF Ext 2
ON1 - OSPF NSSA Ext Type 1, ON2 - OSPF NSSA Ext Type 2
The columns for the routing table display the following information:
Term
Code
Definition
The code for the routing protocol that created this routing entry.
IPv6-Prefix/IPv6-
Prefix-Length
The IPv6-Prefix and prefix-length of the destination IPv6 network corresponding to this
route.
Preference/Metric
The administrative distance (preference) and cost (metric) associated with this route. An
example of this output is [1/0], where 1 is the preference and 0 is the metric.
Tag
The decimal value of the tag associated with a redistributed route, if it is not 0.
Next-Hop
The outgoing router IPv6 address to use when forwarding traffic to the next router (if any)
in the path toward the destination.
Route-Timestamp
Interface
The last updated time for dynamic routes. The format of Route-Timestamp will be
• Days:Hours:Minutes if days > = 1
• Hours:Minutes:Seconds if days < 1
The outgoing router interface to use when forwarding traffic to the next destination. For
reject routes, the next hop interface would be Null0interface.
To administratively control the traffic destined to a particular network and prevent it from
being forwarded through the router, you can configure a static reject route on the router. Such
traffic would be discarded and the ICMP destination unreachable message is sent back to the
source. This is typically used for preventing routing loops. The reject route added in the RTO
is of the type OSPF Inter-Area. Reject routes (routes of REJECT type installed by any
protocol) are not redistributed by OSPF/RIP. Reject routes are supported in both OSPFv2
and OSPFv3.
IPv6 Commands
389
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 route
IPv6 Routing Table - 3 entries
Codes: C - connected, S - static
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF Ext 1, OE2 - OSPF Ext 2
ON1 - OSPF NSSA Ext Type 1, ON2 - OSPF NSSA Ext Type 2
S
C
2001::/64 [10/0] directly connected, Null0
2003::/64 [0/0]
via ::, 0/11
S
2005::/64 [1/0]
via 2003::2, 0/11
C 5001::/64 [0/0]
via ::, 0/5
OE1 6001::/64 [110/1]
via fe80::200:42ff:fe7d:2f19, 00h:00m:23s, 0/5
OI 7000::/64 [110/6]
via fe80::200:4fff:fe35:c8bb, 00h:01m:47s, 0/11
show ipv6 route ecmp-groups
This command reports all current ECMP groups in the IPv6 routing table. An ECMP group is
a set of next hops used in one or more routes. The groups are numbered arbitrarily from 1 to
n. The output indicates the number of next hops in the group and the number of routes that
use the set of next hops. The output lists the IPv6 address and outgoing interface of each
next hop in each group.
Format
Mode
show ipv6 route ecmp-groups
Privileged EXEC
Example
(switch) #show ipv6 route ecmp-groups
ECMP Group 1 with 2 next hops (used by 1 route)
2001:DB8:1::1 on interface 2/1
2001:DB8:2::14 on interface 2/2
ECMP Group 2 with 3 next hops (used by 1 route)
2001:DB8:4::15 on interface 2/32
2001:DB8:7::12 on interface 2/33
2001:DB8:9::45 on interface 2/34
IPv6 Commands
390
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 route preferences
Use this command to show the preference value associated with the type of route. Lower
numbers have a greater preference. A route with a preference of 255 cannot be used to
forward traffic.
Format
show ipv6 route preferences
Mode
Privileged EXEC
Term
Local
Definition
Preference of directly-connected routes.
Preference of static routes.
Static
OSPF Intra
OSPF Inter
OSPF External
Preference of routes within the OSPF area.
Preference of routes to other OSPF routes that are outside of the area.
Preference of OSPF external routes.
show ipv6 route summary
This command displays the summary of the routing table. Use allto display the count
summary for all routes, including best and non-best routes. Use the command without
parameters to display the count summary for only the best routes.
When the optional keyword allis given, some statistics, such as the number of routes from
each source, include counts for alternate routes. An alternate route is a route that is not the
most preferred route to its destination and therefore is not installed in the forwarding table.
When this keyword is not given, the output reports for only the best routes.
Format
Modes
show ipv6 route summary [all]
• Privileged EXEC
• User EXEC
Term
Definition
Connected
Routes
Total number of connected routes in the routing table.
Static Routes
OSPF Routes
Reject Routes
Total number of static routes in the routing table.
Total number of routes installed by OSPFv3 protocol.
Total number of reject routes installed by all protocols.
Summarizes the number of routes with prefixes of different lengths.
Number of
Prefixes
Total Routes
Best Routes
The total number of routes in the routing table.
The number of best routes currently in the routing table. This number counts only the
best route to each destination.
IPv6 Commands
391
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Alternate
Routes
The number of alternate routes currently in the routing table. An alternate route is a route
that was not selected as the best route to its destination.
Route Adds
The number of routes added to the routing table.
Route Modifies
Route Deletes
The number of routes that changed after they were initially added to the routing table.
The number of routes deleted from the routing table.
Unresolved
Route Adds
The number of route adds that failed because none of the route's next hops were on a
local subnet. Note that static routes can fail to be added to the routing table at startup
because the routing interfaces are not up yet. This counter gets incremented in this case.
The static routes are added to the routing table when the routing interfaces come up.
Invalid Route
Adds
The number of routes that failed to be added to the routing table because the route was
invalid. A log message is written for each of these failures.
Failed Route
Adds
The number of routes that failed to be added to the routing table because of a resource
limitation in the routing table.
Reserved
Locals
The number of routing table entries reserved for a local subnet on a routing interface that
is down. Space for local routes is always reserved so that local routes can be installed
when a routing interface bounces.
Unique Next
Hops
The number of distinct next hops used among all routes currently in the routing table.
These include local interfaces for local routes and neighbors for indirect routes.
Unique Next
Hops High
Water
The highest count of unique next hops since counters were last cleared.
Next Hop
Groups
The current number of next hop groups in use by one or more routes. Each next hop
group includes one or more next hops.
Next Hop
Groups High
Water
The highest count of next hop groups since counters were last cleared.
ECMP Groups
ECMP Routes
The number of next hop groups with multiple next hops.
The number of routes with multiple next hops currently in the routing table.
Truncated
ECMP Routes
The number of ECMP routes that are currently installed in the forwarding table with just
one next hop. The forwarding table might limit the number of ECMP routes or the number
of ECMP groups. When an ECMP route cannot be installed because such a limit is
reached, the route is installed with a single next hop.
ECMP Retries
The number of ECMP routes that have been installed in the forwarding table after initially
being installed with a single next hop.
Routes with n
Next Hops
The current number of routes with each number of next hops.
The following example shows CLI display output for the command.
(switch) #show ipv6 route summary
Connected Routes............................... 4
Static Routes.................................. 0
6To4 Routes.................................... 0
IPv6 Commands
392
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
OSPF Routes.................................... 13
Intra Area Routes............................ 0
Inter Area Routes............................ 13
External Type-1 Routes....................... 0
External Type-2 Routes....................... 0
Reject Routes.................................. 0
Total routes................................... 17
Best Routes (High)............................. 17 (17)
Alternate Routes............................... 0
Route Adds..................................... 44
Route Deletes.................................. 27
Unresolved Route Adds.......................... 0
Invalid Route Adds............................. 0
Failed Route Adds.............................. 0
Reserved Locals................................ 0
Unique Next Hops (High)........................ 8 (8)
Next Hop Groups (High)......................... 8 (8)
ECMP Groups (High)............................. 3 (3)
ECMP Routes.................................... 12
Truncated ECMP Routes.......................... 0
ECMP Retries................................... 0
Routes with 1 Next Hop......................... 5
Routes with 2 Next Hops........................ 1
Routes with 3 Next Hops........................ 1
Routes with 4 Next Hops........................ 10
Number of Prefixes:
/64: 17
show ipv6 vlan
This command displays IPv6 VLAN routing interface addresses.
Format
Modes
show ipv6 vlan
• Privileged EXEC
• User EXEC
Term
Definition
MAC Address
used by
Shows the MAC address.
Routing VLANs
The rest of the output for this command is displayed in a table with the following column
headings:
Column
Definition
Headings
VLAN ID
The VLAN ID of a configured VLAN.
IPv6 Commands
393
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Column
Definition
Headings
Logical
Interface
The interface in unit/slot/port format that is associated with the VLAN ID.
The IPv6 prefix and prefix length associated with the VLAN ID.
IPv6
Address/Prefix
Length
show ipv6 traffic
Use this command to show traffic and statistics for IPv6 and ICMPv6. Specify a logical,
loopback, or tunnel interface to view information about traffic on a specific interface. If you do
not specify an interface, the command displays information about traffic on all interfaces.
Format
Mode
show ipv6 traffic [{<unit/slot/port> | loopback <loopback-id> |
tunnel <tunnel-id>}]
Privileged EXEC
Term
Definition
Total Datagrams
Received
Total number of input datagrams received by the interface, including those
received in error.
Received Datagrams
Locally Delivered
Total number of datagrams successfully delivered to IPv6 user-protocols
(including ICMP). This counter increments at the interface to which these
datagrams were addressed, which might not necessarily be the input interface
for some of the datagrams.
Received Datagrams
Discarded Due To
Header Errors
Number of input datagrams discarded due to errors in their IPv6 headers,
including version number mismatch, other format errors, hop count exceeded,
errors discovered in processing their IPv6 options, etc.
Received Datagrams
Discarded Due To MTU
Number of input datagrams that could not be forwarded because their size
exceeded the link MTU of outgoing interface.
Received Datagrams
Discarded Due To No
Route
Number of input datagrams discarded because no route could be found to
transmit them to their destination.
Received Datagrams
With Unknown Protocol
Number of locally-addressed datagrams received successfully but discarded
because of an unknown or unsupported protocol. This counter increments at
the interface to which these datagrams were addressed, which might not be
necessarily the input interface for some of the datagrams.
Received Datagrams
DiscardedDueToInvalid
Address
Number of input datagrams discarded because the IPv6 address in their IPv6
header's destination field was not a valid address to be received at this entity.
This count includes invalid addresses (for example, ::0) and unsupported
addresses (for example, addresses with unallocated prefixes). Forentities
which are not IPv6 routers and therefore do not forward datagrams, this
counter includes datagrams discarded because the destination address was
not a local address.
Received Datagrams
Discarded Due To
Truncated Data
Number of input datagrams discarded because datagram frame didn't carry
enough data.
IPv6 Commands
394
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Received Datagrams
Discarded Other
Number of input IPv6 datagrams for which no problems were encountered to
prevent their continue processing, but which were discarded (e.g., for lack of
buffer space). Note that this counter does not include datagrams discarded
while awaiting re-assembly.
Received Datagrams
Reassembly Required
Number of IPv6 fragments received which needed to be reassembled at this
interface. Note that this counter increments at the interface to which these
fragments were addressed, which might not be necessarily the input interface
for some of the fragments.
Datagrams Successfully
Reassembled
Number of IPv6 datagrams successfully reassembled. Note that this counter
increments at the interface to which these datagrams were addressed, which
might not be necessarily the input interface for some of the fragments.
Datagrams Failed To
Reassemble
Number of failures detected by the IPv6 reassembly algorithm (for whatever
reason: timed out, errors, etc.). Note that this is not necessarily a count of
discarded IPv6 fragments since some algorithms (notably the algorithm in by
combining them as they are received. This counter increments at the interface
to which these fragments were addressed, which might not be necessarily the
input interface for some of the fragments.
Datagrams Forwarded
Number of output datagrams which this entity received and forwarded to their
final destinations. In entities which do not act as IPv6 routers, this counter will
include only those packets which were Source-Routed via this entity, and the
Source-Route processing was successful. Note that for a successfully
forwarded datagram the counter of the outgoing interface increments.
Datagrams Locally
Transmitted
Total number of IPv6 datagrams which local IPv6 user-protocols (including
ICMP) supplied to IPv6 in requests for transmission. Note that this counter does
not include any datagrams counted in ipv6IfStatsOutForwDatagrams.
Datagrams Transmit
Failed
Number of output IPv6 datagrams for which no problem was encountered to
prevent their transmission to their destination, but which were discarded (e.g.,
for lack of buffer space). Note that this counter would include datagrams
counted in ipv6IfStatsOutForwDatagrams if any such packets met this
(discretionary) discard criterion.
Fragments Created
Number of output datagram fragments that have been generated as a result of
fragmentation at this output interface.
Datagrams Successfully
Fragmented
Number of IPv6 datagrams that have been successfully fragmented at this
output interface.
Datagrams Failed To
Fragment
Number of IPv6 datagrams that have been discarded because they needed to
be fragmented at this output interface but could not be.
Multicast Datagrams
Received
Number of multicast packets received by the interface.
Number of multicast packets transmitted by the interface.
Multicast Datagrams
Transmitted
Total ICMPv6 messages
received
Total number of ICMP messages received by the interface which includes all
those counted by ipv6IfIcmpInErrors. Note that this interface is the interface to
which the ICMP messages were addressed which may not be necessarily the
input interface for the messages.
IPv6 Commands
395
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
ICMPv6 Messages with
errors
Number of ICMP messages which the interface received but determined as
having ICMP-specific errors (bad ICMP checksums, bad length, etc.).
ICMPv6 Destination
Unreachable Messages
Number of ICMP Destination Unreachable messages received by the interface.
ICMPv6 Messages
Prohibited
Administratively
Number of ICMP destination unreachable/communication administratively
prohibited messages received by the interface.
ICMPv6 Time Exceeded
Messages
Number of ICMP Time Exceeded messages received by the interface.
Number of ICMP Parameter Problem messages received by the interface.
Number of ICMP Packet Too Big messages received by the interface.
Number of ICMP Echo (request) messages received by the interface.
Number of ICMP Echo Reply messages received by the interface.
Number of ICMP Router Solicit messages received by the interface.
Number of ICMP Router Advertisement messages received by the interface.
ICMPv6 Parameter
Problem Messages
ICMPv6 messages with
too big packets
ICMPv6 Echo Request
Messages Received
ICMPv6 Echo Reply
Messages Received
ICMPv6 Router Solicit
Messages Received
ICMPv6 Router
Advertisement
Messages Received
ICMPv6 Neighbor Solicit
Messages Received
Number of ICMP Neighbor Solicit messages received by the interface.
ICMPv6 Neighbor
Advertisement
Number of ICMP Neighbor Advertisement messages received by the interface.
Messages Received
ICMPv6 Redirect
Messages Received
Number of Redirect messages received by the interface.
Transmitted
Number of ICMPv6 Group Membership Query messages received by the
interface.
Total ICMPv6 Messages
Transmitted
Total number of ICMP messages which this interface attempted to send. Note
that this counter includes all those counted by icmpOutErrors.
ICMPv6 Messages Not
Transmitted Due To
Error
Number of ICMP messages which this interface did not send due to problems
discovered within ICMP such as a lack of buffers. This value should not include
errors discovered outside the ICMP layer such as the inability of IPv6 to route
the resultant datagram. In some implementations there may be no types of
error which contribute to this counter's value.
ICMPv6 Destination
Unreachable Messages
Transmitted
Number of ICMP Destination Unreachable messages sent by the interface.
ICMPv6 Messages
Prohibited
Administratively
Transmitted
Number of ICMP destination unreachable/communication administratively
prohibited messages sent.
IPv6 Commands
396
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
ICMPv6 Time Exceeded
Messages Transmitted
Number of ICMP Time Exceeded messages sent by the interface.
Number of ICMP Parameter Problem messages sent by the interface.
ICMPv6 Parameter
Problem Messages
Transmitted
ICMPv6 Packet Too Big
Messages Transmitted
Number of ICMP Packet Too Big messages sent by the interface.
ICMPv6 Echo Request
Messages Transmitted
Number of ICMP Echo (request) messages sent by the interface.ICMP echo
messages sent.
ICMPv6 Echo Reply
Messages Transmitted
Number of ICMP Echo Reply messages sent by the interface.
Number of ICMP Router Solicitation messages sent by the interface.
Number of ICMP Router Advertisement messages sent by the interface.
ICMPv6 Router Solicit
Messages Transmitted
ICMPv6 Router
Advertisement
Messages Transmitted
ICMPv6 Neighbor Solicit
Messages Transmitted
Number of ICMP Neighbor Solicitation messages sent by the interface.
Number of ICMP Neighbor Advertisement messages sent by the interface.
ICMPv6 Neighbor
Advertisement
Messages Transmitted
ICMPv6 Redirect
Messages Received
Number of Redirect messages sent. For a host, this object will always be zero,
since hosts do not send redirects.
ICMPv6 Group
Membership Query
Messages Received
Number of ICMPv6 Group Membership Query messages sent.
Number of ICMPv6 Group Membership Response messages sent.
Number of ICMPv6 Group Membership Reduction messages sent.
Number of duplicate addresses detected by the interface.
ICMPv6 Group
Membership Response
Messages Received
ICMPv6 Group
Membership Reduction
Messages Received
ICMPv6 Duplicate
Address Detects
clear ipv6 route counters
This command resets to zero the IPv6 routing table counters reported in show ipv6 route
summary. The command resets only the event counters. Counters that report the current
state of the routing table, such as the number of routes of each type, are not reset.
Format
Mode
clear ipv6 route counters
Privileged EXEC
IPv6 Commands
397
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear ipv6 statistics
Use this command to clear IPv6 statistics for all interfaces or for a specific interface, including
loopback and tunnel interfaces. IPv6 statistics display in the output of the show ipv6
traffic command. If you do not specify an interface, the counters for all IPv6 traffic
statistics reset to zero.
Format
Mode
clear ipv6 statistics [{<unit/slot/port> | loopback <loopback-id> |
tunnel <tunnel-id>}]
Privileged EXEC
OSPFv3 Commands
This section describes the commands you use to configure OSPFv3, which is a link-state
routing protocol that you use to route traffic within a network.
ipv6 ospf
This command enables OSPF on a router interface or loopback interface.
Default
disabled
Format
Mode
ipv6 ospf
Interface Config
no ipv6 ospf
This command disables OSPF on a router interface or loopback interface.
Format
Mode
no ipv6 ospf
Interface Config
ipv6 ospf area
This command sets the OSPF area to which the specified router interface belongs. The
<areaid>is an IPv6 address, formatted as a 4-digit dotted-decimal number or a decimal
value in the range of <0-4294967295>. The <areaid>uniquely identifies the area to which
the interface connects. Assigning an area id, which does not exist on an interface, causes the
area to be created with default values.
Format
Mode
ipv6 ospf area <areaid>
Interface Config
IPv6 Commands
398
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 ospf cost
This command configures the cost on an OSPF interface. The <cost>parameter has a
range of 1 to 65535.
Default
10
Format
Mode
ipv6 ospf cost <1-65535>
Interface Config
no ipv6 ospf cost
This command configures the default cost on an OSPF interface.
Format
Mode
no ipv6 ospf cost
Interface Config
ipv6 ospf dead-interval
This command sets the OSPF dead interval for the specified interface. The value for
<seconds>is a valid positive integer, which represents the length of time in seconds that a
router's Hello packets have not been seen before its neighbor routers declare that the router
is down. The value for the length of time must be the same for all routers attached to a
common network. This value should be some multiple of the Hello Interval (i.e., 4). Valid
values range for <seconds>is from 1 to 2147483647.
Default
40
Format
Mode
ipv6 ospf dead-interval <seconds>
Interface Config
no ipv6 ospf dead-interval
This command sets the default OSPF dead interval for the specified interface.
Format
Mode
no ipv6 ospf dead-interval
Interface Config
ipv6 ospf hello-interval
This command sets the OSPF hello interval for the specified interface. The value for
<seconds>is a valid positive integer, which represents the length of time in seconds. The
value for the length of time must be the same for all routers attached to a network. Valid
values for <seconds>range from 1 to 65535.
Default
10
IPv6 Commands
399
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
ipv6 ospf hello-interval <seconds>
Interface Config
no ipv6 ospf hello-interval
This command sets the default OSPF hello interval for the specified interface.
Format
Mode
no ipv6 ospf hello-interval
Interface Config
ipv6 ospf mtu-ignore
This command disables OSPF maximum transmission unit (MTU) mismatch detection. OSPF
Database Description packets specify the size of the largest IP packet that can be sent
without fragmentation on the interface. When a router receives a Database Description
packet, it examines the MTU advertised by the neighbor. By default, if the MTU is larger than
the router can accept, the Database Description packet is rejected and the OSPF adjacency
is not established.
Default
enabled
Format
Mode
ipv6 ospf mtu-ignore
Interface Config
no ipv6 ospf mtu-ignore
This command enables the OSPF MTU mismatch detection.
Format
Mode
no ipv6 ospf mtu-ignore
Interface Config
ipv6 ospf network
This command changes the default OSPF network type for the interface. Normally, the
network type is determined from the physical IP network type. By default all Ethernet
networks are OSPF type broadcast. Similarly, tunnel interfaces default to point-to-point.
When an Ethernet port is used as a single large bandwidth IP network between two routers,
the network type can be point-to-point since there are only two routers. Using point-to-point
as the network type eliminates the overhead of the OSPF designated router election. It is
normally not useful to set a tunnel to OSPF network type broadcast.
Default
broadcast
Format
Mode
ipv6 ospf network {broadcast | point-to-point}
Interface Config
IPv6 Commands
400
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 ospf network
This command sets the interface type to the default value.
Format
Mode
no ipv6 ospf network {broadcast | point-to-point}
Interface Config
ipv6 ospf priority
This command sets the OSPF priority for the specified router interface. The priority of the
interface is a priority integer from 0 to 255. A value of 0 indicates that the router is not eligible
to become the designated router on this network.
Default
1, which is the highest router priority
Format
Mode
ipv6 ospf priority <0-255>
Interface Config
no ipv6 ospf priority
This command sets the default OSPF priority for the specified router interface.
Format
Mode
no ipv6 ospf priority
Interface Config
ipv6 ospf retransmit-interval
This command sets the OSPF retransmit Interval for the specified interface. The retransmit
interval is specified in seconds. The value for <seconds>is the number of seconds between
link-state advertisement retransmissions for adjacencies belonging to this router interface.
This value is also used when retransmitting database description and link-state request
packets. Valid values range from 0 to 3600 (1 hour).
Default
5
Format
Mode
ipv6 ospf retransmit-interval <seconds>
Interface Config
no ipv6 ospf retransmit-interval
This command sets the default OSPF retransmit Interval for the specified interface.
Format
Mode
no ipv6 ospf retransmit-interval
Interface Config
IPv6 Commands
401
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 ospf transmit-delay
This command sets the OSPF Transit Delay for the specified interface. The transmit delay is
specified in seconds. In addition, it sets the estimated number of seconds it takes to transmit
a link state update packet over this interface. Valid values for <seconds>range from 1 to
3600 (1 hour).
Default
1
Format
Mode
ipv6 ospf transmit-delay <seconds>
Interface Config
no ipv6 ospf transmit-delay
This command sets the default OSPF Transit Delay for the specified interface.
Format
Mode
no ipv6 ospf transmit-delay
Interface Config
ipv6 router ospf
Use this command to enter Router OSPFv3 Config mode.
Format
Mode
ipv6 router ospf
Global Config
area default-cost (OSPFv3)
This command configures the monetary default cost for the stub area. The operator must
specify the area id and an integer value between 1–16777215.
Format
Mode
area <areaid> default-cost <1-16777215>
Router OSPFv3 Config
area nssa (OSPFv3)
This command configures the specified areaid to function as an NSSA.
Format
Mode
area <areaid> nssa
Router OSPFv3 Config
IPv6 Commands
402
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no area nssa(OSPFv3)
This command disables nssa from the specified area id.
Format
Mode
no area <areaid> nssa
Router OSPFv3 Config
area nssa default-info-originate (OSPFv3)
This command configures the metric value and type for the default route advertised into the
NSSA. The optional metric parameter specifies the metric of the default route and is to be in
a range of 1-16777214. If no metric is specified, the default value is 10. The metric type can
be comparable (nssa-external 1) or non-comparable (nssa-external 2).
Format
Mode
area <areaid> nssa default-info-originate [<metric>] [{comparable |
non-comparable}]
Router OSPFv3 Config
no area nssa default-info-originate (OSPFv3)
This command disables the default route advertised into the NSSA.
Format
Mode
no area <areaid> nssa default-info-originate [<metric>] [{comparable
| non-comparable}]
Router OSPF Config
area nssa no-redistribute (OSPFv3)
This command configures the NSSA ABR so that learned external routes will not be
redistributed to the NSSA.
Format
Mode
area <areaid> nssa no-redistribute
Router OSPFv3 Config
no area nssa no-redistribute (OSPFv3)
This command disables the NSSA ABR so that learned external routes are redistributed to
the NSSA.
Format
Mode
no area <areaid> nssa no-redistribute
Router OSPF Config
IPv6 Commands
403
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
area nssa no-summary (OSPFv3)
This command configures the NSSA so that summary LSAs are not advertised into the
NSSA.
Format
Mode
area <areaid> nssa no-summary
Router OSPFv3 Config
no area nssa no-summary (OSPFv3)
This command disables nssa from the summary LSAs.
Format
Mode
no area <areaid> nssa no-summary
Router OSPF Config
area nssa translator-role (OSPFv3)
This command configures the translator role of the NSSA. A value of alwayscauses the
router to assume the role of the translator the instant it becomes a border router and a value
of candidatecauses the router to participate in the translator election process when it
attains border router status.
Format
Mode
area <areaid> nssa translator-role {always | candidate}
Router OSPFv3 Config
no area nssa translator-role (OSPFv3)
This command disables the nssa translator role from the specified area id.
Format
Mode
no area <areaid> nssa translator-role {always | candidate}
Router OSPF Config
area nssa translator-stab-intv (OSPFv3)
This command configures the translator <stabilityinterval>of the NSSA. The
<stabilityinterval>is the period of time that an elected translator continues to perform
its duties after it determines that its translator status has been deposed by another router.
Format
Mode
area <areaid> nssa translator-stab-intv <stabilityinterval>
Router OSPFv3 Config
IPv6 Commands
404
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no area nssa translator-stab-intv (OSPFv3)
This command disables the nssa translator’s <stabilityinterval>from the specified
area id.
Format
Mode
no area <areaid> nssa translator-stab-intv <stabilityinterval>
Router OSPF Config
area range (OSPFv3)
This command creates a specified area range for a specified NSSA. The <ipaddr>is a valid
IP address. The <subnetmask>is a valid subnet mask. The LSDB type must be specified
by either summarylinkor nssaexternallink, and the advertising of the area range can
be allowed or suppressed.
Format
Mode
area <areaid>range <ipv6-prefix> <prefix-length> {summarylink |
nssaexternallink} [advertise | not-advertise]
Router OSPFv3 Config
no area range(OSPFv3)
This command deletes a specified area range. The <ipaddr>is a valid IP address. The
<subnetmask> is a valid subnet mask.
Format
Mode
no area <areaid>range<ipv6-prefix> <prefix-length>
Router OSPFv3 Config
area stub (OSPFv3)
This command creates a stub area for the specified area ID. A stub area is characterized by
the fact that AS External LSAs are not propagated into the area. Removing AS External LSAs
and Summary LSAs can significantly reduce the link state database of routers within the stub
area.
Format
Mode
area <areaid> stub
Router OSPFv3 Config
no area stub(OSPFv3)
This command deletes a stub area for the specified area ID.
Format
Mode
no area <areaid> stub
Router OSPFv3 Config
IPv6 Commands
405
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
area stub no-summary (OSPFv3)
This command disables the import of Summary LSAs for the stub area identified by
<areaid>.
Default
enabled
Format
Mode
area <areaid> stub no-summary
Router OSPFv3 Config
no area stub no-summary(OSPFv3)
This command sets the Summary LSA import mode to the default for the stub area identified
by <areaid>.
Format
Mode
no area <areaid> stub summarylsa
Router OSPFv3 Config
area virtual-link (OSPFv3)
This command creates the OSPF virtual interface for the specified <areaid> and
<neighbor>. The <neighbor>parameter is the Router ID of the neighbor.
Format
Mode
area <areaid> virtual-link <neighbor>
Router OSPFv3 Config
no area virtual-link(OSPFv3)
This command deletes the OSPF virtual interface from the given interface, identified by
<areaid> and <neighbor>. The <neighbor>parameter is the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor>
Router OSPFv3 Config
area virtual-link dead-interval (OSPFv3)
This command configures the dead interval for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>.The <neighbor>parameter is the
Router ID of the neighbor. The range for <seconds>is 1 to 65535.
Default
40
Format
Mode
area <areaid> virtual-link <neighbor> dead-interval <seconds>
Router OSPFv3 Config
IPv6 Commands
406
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no area virtual-link dead-interval(OSPFv3)
This command configures the default dead interval for the OSPF virtual interface on the
virtual interface identified by <areaid>and <neighbor>. The <neighbor> parameter is
the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> dead-interval
Router OSPFv3 Config
area virtual-link hello-interval (OSPFv3)
This command configures the hello interval for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>. The <neighbor>parameter is the
Router ID of the neighbor. The range for <seconds>is 1 to 65535.
Default
10
Format
Mode
area <areaid> virtual-link <neighbor> hello-interval <seconds>
Router OSPFv3 Config
no area virtual-link hello-interval(OSPFv3)
This command configures the default hello interval for the OSPF virtual interface on the
virtual interface identified by <areaid>and <neighbor>. The <neighbor>parameter is
the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> hello-interval
Router OSPFv3 Config
area virtual-link retransmit-interval (OSPFv3)
This command configures the retransmit interval for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>. The <neighbor>parameter is the
Router ID of the neighbor. The range for <seconds>is 0 to 3600.
Default
5
Format
Mode
area <areaid> virtual-link <neighbor> retransmit-interval <seconds>
Router OSPFv3 Config
IPv6 Commands
407
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no area virtual-link retransmit-interval(OSPFv3)
This command configures the default retransmit interval for the OSPF virtual interface on the
virtual interface identified by <areaid>and <neighbor>. The <neighbor> parameter is
the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> retransmit-interval
Router OSPFv3 Config
area virtual-link transmit-delay (OSPFv3)
This command configures the transmit delay for the OSPF virtual interface on the virtual
interface identified by <areaid>and <neighbor>. The <neighbor>parameter is the
Router ID of the neighbor. The range for <seconds>is 0 to 3600 (1 hour).
Default
1
Format
Mode
area <areaid> virtual-link <neighbor> transmit-delay <seconds>
Router OSPFv3 Config
no area virtual-link transmit-delay(OSPFv3)
This command configures the default transmit delay for the OSPF virtual interface on the
virtual interface identified by <areaid>and <neighbor>. The <neighbor>parameter is
the Router ID of the neighbor.
Format
Mode
no area <areaid> virtual-link <neighbor> transmit-delay
Router OSPFv3 Config
auto-cost (OSPFv3)
By default, OSPF computes the link cost of each interface from the interface bandwidth.
Faster links have lower metrics, making them more attractive in route selection. The
configuration parameters in the auto-cost reference bandwidthand bandwidth
commands give you control over the default link cost. You can configure for OSPF an
interface bandwidth that is independent of the actual link speed. A second configuration
parameter allows you to control the ratio of interface bandwidth to link cost. The link cost is
computed as the ratio of a reference bandwidth to the interface bandwidth (ref_bw / interface
bandwidth), where interface bandwidth is defined by the bandwidthcommand. Because the
default reference bandwidth is 100 Mbps, OSPF uses the same default link cost for all
interfaces whose bandwidth is 100 Mbps or greater. Use the auto-costcommand to
change the reference bandwidth, specifying the reference bandwidth in megabits per second
(Mbps). The reference bandwidth range is 1–4294967 Mbps. The different reference
bandwidth can be independently configured for OSPFv2 and OSPFv3.
Default
100Mbps
IPv6 Commands
408
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
auto-cost reference-bandwidth <1 to 4294967>
Router OSPFv3 Config
no auto-cost reference-bandwidth (OSPFv3)
Use this command to set the reference bandwidth to the default value.
Format
Mode
no auto-cost reference-bandwidth
Router OSPFv3 Config
clear ipv6 ospf
Use this command to disable and re-enable OSPF.
Format
Mode
clear ipv6 ospf
Privileged EXEC
clear ipv6 ospf configuration
Use this command to reset the OSPF configuration to factory defaults.
Format
Mode
clear ipv6 ospf configuration
Privileged EXEC
clear ipv6 ospf counters
Use this command to reset global and interface statistics.
Format
Mode
clear ipv6 ospf counters
Privileged EXEC
clear ipv6 ospf neighbor
Use this command to drop the adjacency with all OSPF neighbors. On each neighbor’s
interface, send a one-way hello. Adjacencies may then be re-established. To drop all
adjacencies with a specific router ID, specify the neighbor’s Router ID using the optional
parameter [neighbor-id].
Format
Mode
clear ipv6 ospf neighbor [neighbor-id]
Privileged EXEC
IPv6 Commands
409
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear ipv6 ospf neighbor interface
To drop adjacency with all neighbors on a specific interface, use the optional parameter
[unit/slot/port]. To drop adjacency with a specific router ID on a specific interface, use the
optional parameter [neighbor-id].
Format
Mode
clear ipv6 ospf neighbor interface [unit/slot/port] [neighbor-id]
Privileged EXEC
clear ipv6 ospf redistribution
Use this command to flush all self-originated external LSAs. Reapply the redistribution
configuration and re-originate prefixes as necessary.
Format
Mode
clear ipv6 ospf redistribution
Privileged EXEC
default-information originate (OSPFv3)
This command is used to control the advertisement of default routes.
Default
• metric—unspecified
• type—2
Format
Mode
default-information originate [always] [metric <1-16777214>]
[metric-type {1 | 2}]
Router OSPFv3 Config
no default-information originate (OSPFv3)
This command is used to control the advertisement of default routes.
Format
Mode
no default-information originate [metric] [metric-type]
Router OSPFv3 Config
default-metric (OSPFv3)
This command is used to set a default for the metric of distributed routes.
Format
Mode
default-metric <1-16777214>
Router OSPFv3 Config
IPv6 Commands
410
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no default-metric (OSPFv3)
This command is used to set a default for the metric of distributed routes.
Format
Mode
no default-metric
Router OSPFv3 Config
distance ospf (OSPFv3)
This command sets the route preference value of OSPF route types in the router. Lower
route preference values are preferred when determining the best route. The type of OSPF
route can be intra, inter, or external. All the external type routes are given the same
preference value. The range of <preference>value is 1 to 255.
Default
110
Format
Mode
distance ospf {intra-area <1-255> | inter-area <1-255> | external
<1-255>}
Router OSPFv3 Config
no distance ospf(OSPFv3)
This command sets the default route preference value of OSPF routes in the router. The type
of OSPF route can be intra, inter, or external. All the external type routes are given the same
preference value.
Format
Mode
no distance ospf {intra-area | inter-area | external}
Router OSPFv3 Config
enable (OSPFv3)
This command resets the default administrative mode of OSPF in the router (active).
Default
enabled
Format
Mode
enable
Router OSPFv3 Config
no enable (OSPFv3)
This command sets the administrative mode of OSPF in the router to inactive.
Format
Mode
no enable
Router OSPFv3 Config
IPv6 Commands
411
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
exit-overflow-interval (OSPFv3)
This command configures the exit overflow interval for OSPF. It describes the number of
seconds after entering Overflow state that a router will wait before attempting to leave the
overflow state. This allows the router to again originate non-default AS-external-LSAs. When
set to 0, the router will not leave overflow state until restarted. The range for <seconds>is 0
to 2147483647 seconds.
Default
0
Format
Mode
exit-overflow-interval <seconds>
Router OSPFv3 Config
no exit-overflow-interval(OSPFv3)
This command configures the default exit overflow interval for OSPF.
Format
Mode
no exit-overflow-interval
Router OSPFv3 Config
external-lsdb-limit (OSPFv3)
This command configures the external LSDB limit for OSPF. If the value is –1, then there is
no limit. When the number of non-default AS-external-LSAs in a router’s link-state database
reaches the external LSDB limit, the router enters overflow state. The router never holds
more than the external LSDB limit non-default AS-external-LSAs in it database. The external
LSDB limit MUST be set identically in all routers attached to the OSPF backbone and/or any
regular OSPF area. The range for <limit>is –1 to 2147483647.
Default
-1
Format
Mode
external-lsdb-limit <limit>
Router OSPFv3 Config
no external-lsdb-limit
This command configures the default external LSDB limit for OSPF.
Format
Mode
no external-lsdb-limit
Router OSPFv3 Config
IPv6 Commands
412
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
maximum-paths (OSPFv3)
This command sets the number of paths that OSPF can report for a given destination where
maxpathsis platform dependent.
Default
4
Format
Mode
maximum-paths <maxpaths>
Router OSPFv3 Config
no maximum-paths
This command resets the number of paths that OSPF can report for a given destination back
to its default value.
Format
Mode
no maximum-paths
Router OSPFv3 Config
passive-interface default (OSPFv3)
Use this command to enable global passive mode by default for all interfaces. It overrides
any interface level passive mode. OSPF shall not form adjacencies over a passive interface.
Default
disabled
Format
Mode
passive-interface default
Router OSPFv3 Config
no passive-interface default(OSPFv3)
Use this command to disable the global passive mode by default for all interfaces. Any
interface previously configured to be passive reverts to non-passive mode.
Format
Mode
no passive-interface default
Router OSPFv3 Config
passive-interface (OSPFv3)
Use this command to set the interface or tunnel as passive. It overrides the global passive
mode that is currently effective on the interface or tunnel.
Default
disabled
Format
Mode
passive-interface {<unit/slot/port> | tunnel <tunnel-id>}
Router OSPFv3 Config
IPv6 Commands
413
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no passive-interface(OSPFv3)
Use this command to set the interface or tunnel as non-passive. It overrides the global
passive mode that is currently effective on the interface or tunnel.
Format
Mode
no passive-interface {<unit/slot/port> | tunnel <tunnel-id>}
Router OSPFv3 Config
redistribute (OSPFv3)
This command configures the OSPFv3 protocol to allow redistribution of routes from the
specified source protocol/routers.
Default
• metric—unspecified
• type—2
• tag—0
Format
Mode
redistribute {static | connected} [metric <0-16777214>] [metric-type
{1 | 2}] [tag <0-4294967295>]
Router OSPFv3 Config
no redistribute(OSPFv3)
This command configures OSPF protocol to prohibit redistribution of routes from the
specified source protocol/routers.
Format
Mode
no redistribute {static | connected} [metric] [metric-type] [tag]
Router OSPFv3 Config
router-id (OSPFv3)
This command sets a 4-digit dotted-decimal number uniquely identifying the router ospf id.
The <ipaddress>is a configured value.
Format
Mode
router-id <ipaddress>
Router OSPFv3 Config
IPv6 Commands
414
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
trapflags (OSPFv3)
Use this command to enable individual OSPF traps, enable a group of trap flags at a time, or
enable all the trap flags at a time. The different groups of trapflags, and each group’s specific
Table 2. Trapflag Groups (OSPFv3)
Group
errors
Flags
• authentication-failure
• bad-packet
• config-error
• virt-authentication-failure
• virt-bad-packet
• virt-config-error
if-rx
lsa
ir-rx-packet
• lsa-maxage
• lsa-originate
overflow
• lsdb-overflow
• lsdb-approaching-overflow
retransmit
• packets
• virt-packets
rtb
• rtb-entry-info
state-change
• if-state-change
• neighbor-state-change
• virtif-state-change
• virtneighbor-state-change
•
•
To enable the individual flag, enter the group namefollowed by that particular flag.
To enable all the flags in that group, give the group name followed by all.
IPv6 Commands
415
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
To enable all the flags, give the command as trapflags all.
Default
Format
disabled
trapflags {
all |
errors {all | authentication-failure | bad-packet | config-error |
virt-
authentication-failure | virt-bad-packet | virt-config-error} |
if-rx {all | if-rx-packet} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
rtb {all, rtb-entry-info} |
state-change {all | if-state-change | neighbor-state-change |
virtif-state-
change | virtneighbor-state-change}
}
Mode
Router OSPFv3 Config
no trapflags(OSPFv3)
Use this command to revert to the default reference bandwidth.
•
•
•
To disable the individual flag, enter the group namefollowed by that particular flag.
To disable all the flags in that group, give the group name followed by all.
To disable all the flags, give the command as trapflags all.
Format
no trapflags {
all |
errors {all | authentication-failure | bad-packet | config-error |
virt-
authentication-failure | virt-bad-packet | virt-config-error} |
if-rx {all | if-rx-packet} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
rtb {all, rtb-entry-info} |
state-change {all | if-state-change | neighbor-state-change |
virtif-state-
change | virtneighbor-state-change}
}
Mode
Router OSPFv3 Config
show ipv6 ospf
This command displays information relevant to the OSPF router.
Format
Mode
show ipv6 ospf
Privileged EXEC
IPv6 Commands
416
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: Some of the information below displays only if you enable OSPF
and configure certain features.
Term
Definition
Router ID
A 32 bit integer in dotted decimal format identifying the router, about which information is
displayed. This is a configured value.
OSPF Admin
Mode
Shows whether the administrative mode of OSPF in the router is enabled or disabled.
This is a configured value.
ABR Status
Shows whether the router is an OSPF Area Border Router.
ASBR Status
Reflects whether the ASBR mode is enabled or disabled. Enable implies that the router is
an autonomous system border router. Router automatically becomes an ASBR when it is
configured to redistribute routes learnt from other protocol. The possible values for the
ASBR status is enabled (if the router is configured to re-distribute routes learned by other
protocols) or disabled (if the router is not configured for the same).
Stub Router
When OSPF runs out of resources to store the entire link state database, or any other
state information, OSPF goes into stub router mode. As a stub router, OSPF
re-originates its own router LSAs, setting the cost of all non-stub interfaces to infinity. To
restore OSPF to normal operation, disable and re-enable OSPF.
Exit Overflow
Interval
The number of seconds that, after entering overflow state, a router will attempt to leave
overflow state.
External LSDB
Overflow
When the number of non-default external LSAs exceeds the configured limit, External
LSDB Limit, OSPF goes into LSDB overflow state. In this state, OSPF withdraws all of its
self-originated non-default external LSAs. After the Exit Overflow Interval, OSPF leaves
the overflow state, if the number of external LSAs has been reduced.
External LSA
Count
The number of external (LS type 5) link-state advertisements in the link-state database.
External LSA
Checksum
The sum of the LS checksums of external link-state advertisements contained in the
link-state database.
New LSAs
Originated
The number of new link-state advertisements that have been originated.
LSAs Received
LSA Count
The number of link-state advertisements received determined to be new instantiations.
The total number of link state advertisements currently in the link state database.
The maximum number of LSAs that OSPF can store.
Maximum
Number of
LSAs
LSA High Water
Mark
The maximum size of the link state database since the system started.
Retransmit List
Entries
The total number of LSAs waiting to be acknowledged by all neighbors. An LSA may be
pending acknowledgment from more than one neighbor.
IPv6 Commands
417
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Maximum
Number of
Retransmit
Entries
The maximum number of LSAs that can be waiting for acknowledgment at any given
time.
Retransmit
Entries High
Water Mark
The highest number of LSAs that have been waiting for acknowledgment.
External LSDB
Limit
The maximum number of non-default AS-external-LSAs entries that can be stored in the
link-state database.
Default Metric
Default value for redistributed routes.
Default Passive
Setting
Shows whether the interfaces are passive by default.
Default Route
Advertise
Indicates whether the default routes received from other source protocols are advertised
or not.
Always
Metric
Shows whether default routes are always advertised.
The metric for the advertised default routes. If the metric is not configured, this field is
blank.
Metric Type
Shows whether the routes are External Type 1 or External Type 2.
Number of
Active Areas
The number of active OSPF areas. An “active” OSPF area is an area with at least one
interface up.
AutoCost Ref
BW
Shows the value of the auto-cost reference bandwidth configured on the router.
The maximum number of paths that OSPF can report for a given destination.
Maximum Paths
Redistributing
This field is a heading and appears only if you configure the system to take routes
learned from a non-OSPF source and advertise them to its peers.
Source
Shows source protocol/routes that are being redistributed. Possible values are static,
connected, BGP, or RIP.
Metric
The metric of the routes being redistributed.
Metric Type
Tag
Shows whether the routes are External Type 1 or External Type 2.
The decimal value attached to each external route.
Subnets
Distribute-List
For redistributing routes into OSPF, the scope of redistribution for the specified protocol.
The access list used to filter redistributed routes.
IPv6 Commands
418
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 ospf abr
This command displays the internal OSPFv3 routes to reach Area Border Routers (ABR).
This command takes no options.
Format
show ipv6 ospf abr
Modes
• Privileged EXEC
• User EXEC
Term
Type
Definition
The type of the route to the destination. It can be either:
• intra — Intra-area route
• inter — Inter-area route
Router ID
Cost
Router ID of the destination.
Cost of using this route.
Area ID
The area ID of the area from which this route is learned.
Next hop toward the destination.
Next Hop
Next Hop Intf
The outgoing router interface to use when forwarding traffic to the next hop.
show ipv6 ospf area
This command displays information about the area. The <areaid>identifies the OSPF area
that is being displayed.
Format
Modes
show ipv6 ospf area <areaid>
• Privileged EXEC
• User EXEC
Term
Definition
AreaID
The area id of the requested OSPF area.
A number representing the external routing capabilities for this area.
External
Routing
Spf Runs
The number of times that the intra-area route table has been calculated using this area's
link-state database.
Area Border
Router Count
The total number of area border routers reachable within this area.
Area LSA Count
Total number of link-state advertisements in this area's link-state database, excluding AS
External LSAs.
Area LSA
Checksum
A number representing the Area LSA Checksum for the specified AreaID excluding the
external (LS type 5) link-state advertisements.
IPv6 Commands
419
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Stub Mode
Represents whether the specified Area is a stub area or not. The possible values are
enabled and disabled. This is a configured value.
Import
Summary LSAs
Shows whether to import summary LSAs (enabled).
OSPF Stub
Metric Value
The metric value of the stub area. This field displays only if the area is a configured as a
stub area.
The following OSPF NSSA specific information displays only if the area is configured as an
NSSA.
Term
Definition
Import
Summary LSAs
Shows whether to import summary LSAs into the NSSA.
Redistribute
into NSSA
Shows whether to redistribute information into the NSSA.
Shows whether to advertise a default route into the NSSA.
Default
Information
Originate
Default Metric
The metric value for the default route advertised into the NSSA.
The metric type for the default route advertised into the NSSA.
Default Metric
Type
Translator Role
The NSSA translator role of the ABR, which is always or candidate.
Translator
Stability Interval
The amount of time that an elected translator continues to perform its duties after it
determines that its translator status has been deposed by another router.
Translator State
Shows whether the ABR translator state is disabled, always, or elected.
show ipv6 ospf asbr
This command displays the internal OSPFv3 routes to reach Autonomous System Boundary
Routers (ASBR). This command takes no options.
Format
Modes
show ipv6 ospf asbr
• Privileged EXEC
• User EXEC
Term
Type
Definition
The type of the route to the destination. It can be either:
• intra — Intra-area route
• inter — Inter-area route
Router ID
Router ID of the destination.
IPv6 Commands
420
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Cost
Definition
Cost of using this route.
Area ID
The area ID of the area from which this route is learned.
Next hop toward the destination.
Next Hop
Next Hop Intf
The outgoing router interface to use when forwarding traffic to the next hop.
show ipv6 ospf database
This command displays information about the link state database when OSPFv3 is enabled.
If you do not enter any parameters, the command displays the LSA headers for all areas. Use
the optional <areaid>parameter to display database information about a specific area. Use
the other optional parameters to specify the type of link state advertisements to display. Use
externalto display the external LSAs. Use inter-areato display the inter-area LSAs.
Use link to display the link LSAs. Use networkto display the network LSAs. Use
nssa-external to display NSSA external LSAs. Use prefixto display intra-area Prefix LSAs.
Use routerto display router LSAs. Use unknown area, unknown as, or unknown link
to display unknown area, AS or link-scope LSAs, respectively. Use <lsid>to specify the link
state ID (LSID). Use adv-routerto show the LSAs that are restricted by the advertising
router. Use self-originateto display the LSAs in that are self originated. The information
below is only displayed if OSPF is enabled.
Format
show ipv6 ospf [<areaid>] database [{external | inter-area {prefix |
router} | link | network | nssa-external | prefix | router | unknown
{area | as | link}}] [<lsid>] [{adv-router [<rtrid>] |
self-originate}]
Modes
• Privileged EXEC
• User EXEC
For each link-type and area, the following information is displayed.
Term
Definition
Link Id
A number that uniquely identifies an LSA that a router originates from all other self
originated LSAs of the same LS type.
Adv Router
The Advertising Router. Is a 32 bit dotted decimal number representing the LSDB
interface.
Age
A number representing the age of the link state advertisement in seconds.
A number that represents which LSA is more recent.
Sequence
Checksum
Options
Rtr Opt
The total number LSA checksum.
An integer indicating that the LSA receives special handling during routing calculations.
Router Options are valid for router links only.
IPv6 Commands
421
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 ospf database database-summary
Use this command to display the number of each type of LSA in the database and the total
number of LSAs in the database.
Format
show ipv6 ospf database database-summary
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Router
Total number of router LSAs in the OSPFv3 link state database.
Total number of network LSAs in the OSPFv3 link state database.
Network
Inter-area Prefix
Total number of inter-area prefix LSAs in the OSPFv3 link state database.
Total number of inter-area router LSAs in the OSPFv3 link state database.
Inter-area
Router
Type-7 Ext
Total number of NSSA external LSAs in the OSPFv3 link state database.
Total number of link LSAs in the OSPFv3 link state database.
Link
Intra-area Prefix
Link Unknown
Area Unknown
AS Unknown
Type-5 Ext
Total number of intra-area prefix LSAs in the OSPFv3 link state database.
Total number of link-source unknown LSAs in the OSPFv3 link state database.
Total number of area unknown LSAs in the OSPFv3 link state database.
Total number of as unknown LSAs in the OSPFv3 link state database.
Total number of AS external LSAs in the OSPFv3 link state database.
Total number of self originated AS external LSAs in the OSPFv3 link state database.
Self-Originated
Type-5
Total
Total number of router LSAs in the OSPFv3 link state database.
show ipv6 ospf interface
This command displays the information for the IFO object or virtual interface tables.
Format
Modes
show ipv6 ospf interface {<unit/slot/port> | loopback <loopback-id>
| tunnel <tunnel-id>}
• Privileged EXEC
• User EXEC
Term
Definition
IPv6 Address
The IPv6 address of the interface.
ifIndex
The interface index number associated with the interface.
Shows whether the admin mode is enabled or disabled.
OSPF Admin
Mode
IPv6 Commands
422
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
OSPF Area ID
The area ID associated with this interface.
Router Priority
The router priority. The router priority determines which router is the designated router.
The frequency, in seconds, at which the interface sends LSA.
Retransmit
Interval
Hello Interval
Dead Interval
The frequency, in seconds, at which the interface sends Hello packets.
The amount of time, in seconds, the interface waits before assuming a neighbor is down.
LSA Ack
Interval
The amount of time, in seconds, the interface waits before sending an LSA
acknowledgement after receiving an LSA.
Iftransit Delay
Interval
The number of seconds the interface adds to the age of LSA packets before
transmission.
Authentication
Type
The type of authentication the interface performs on LSAs it receives.
Metric Cost
The priority of the path. Low costs have a higher priority than high costs.
Shows whether the interface is passive or not.
Passive Status
OSPF
MTU-ignore
Shows whether to ignore MTU mismatches in database descriptor packets sent from
neighboring routers.
The following information only displays if OSPF is initialized on the interface:
Term
Definition
OSPF Interface
Type
Broadcast LANs, such as Ethernet and IEEE 802.5, take the value broadcast. The OSPF
Interface Type will be 'broadcast'.
State
The OSPF Interface States are: down, loopback, waiting, point-to-point, designated
router, and backup designated router.
Designated
Router
The router ID representing the designated router.
Backup
Designated
Router
The router ID representing the backup designated router.
Number of Link
Events
The number of link events.
Metric Cost
The cost of the OSPF interface.
show ipv6 ospf interface brief
This command displays brief information for the IFO object or virtual interface tables.
Format
Modes
show ipv6 ospf interface brief
• Privileged EXEC
• User EXEC
IPv6 Commands
423
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
Admin Mode
Area ID
States whether OSPF is enabled or disabled on a router interface.
The OSPF Area ID for the specified interface.
Router Priority
Hello Interval
Dead Interval
The router priority. The router priority determines which router is the designated router.
The frequency, in seconds, at which the interface sends Hello packets.
The amount of time, in seconds, the interface waits before assuming a neighbor is down.
The frequency, in seconds, at which the interface sends LSA.
Retransmit
Interval
Retransmit
Delay Interval
The number of seconds the interface adds to the age of LSA packets before
transmission.
LSA Ack
Interval
The amount of time, in seconds, the interface waits before sending an LSA
acknowledgement after receiving an LSA.
show ipv6 ospf interface stats
This command displays the statistics for a specific interface. The command only displays
information if OSPF is enabled.
Format
Modes
show ipv6 ospf interface stats <unit/slot/port>
• Privileged EXEC
• User EXEC
Term
Definition
OSPFv3 Area ID
IPv6 Address
The area id of this OSPF interface.
The IP address associated with this OSPF interface.
OSPFv3
Interface Events
The number of times the specified OSPF interface has changed its state, or an error has
occurred.
Virtual Events
The number of state changes or errors that occurred on this virtual link.
Neighbor
Events
The number of times this neighbor relationship has changed state, or an error has
occurred.
Packets
Received
The number of OSPFv3 packets received on the interface.
The number of OSPFv3 packets sent on the interface.
The total number of LSAs flooded on the interface.
Packets
Transmitted
LSAs Sent
IPv6 Commands
424
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
LSA Acks
Received
The total number of LSA acknowledged from this interface.
LSA Acks Sent
Sent Packets
The total number of LSAs acknowledged to this interface.
The number of OSPF packets transmitted on the interface.
The number of valid OSPF packets received on the interface.
Received
Packets
Discards
The number of received OSPF packets discarded because of an error in the packet or an
error in processing the packet.
Bad Version
The number of received OSPF packets whose version field in the OSPF header does not
match the version of the OSPF process handling the packet.
Virtual Link Not
Found
The number of received OSPF packets discarded where the ingress interface is in a
non-backbone area and the OSPF header identifies the packet as belonging to the
backbone, but OSPF does not have a virtual link to the packet’s sender.
Area Mismatch
The number of OSPF packets discarded because the area ID in the OSPF header is not
the area ID configured on the ingress interface.
Invalid
Destination
Address
The number of OSPF packets discarded because the packet’s destination IP address is
not the address of the ingress interface and is not the AllDrRouters or AllSpfRouters
multicast addresses.
No Neighbor at
Source Address
The number of OSPF packets dropped because the sender is not an existing neighbor or
the sender’s IP address does not match the previously recorded IP address for that
neighbor. NOTE: Does not apply to Hellos.
Invalid OSPF
Packet Type
The number of OSPF packets discarded because the packet type field in the OSPF
header is not a known type.
Hellos Ignored
The number of received Hello packets that were ignored by this router from the new
neighbors after the limit has been reached for the number of neighbors on an interface or
on the system as a whole.
packets of each type sent and received on the interface.
show ipv6 ospf neighbor
This command displays information about OSPF neighbors. If you do not specify a neighbor
IP address, the output displays summary information in a table. If you specify an interface or
tunnel, only the information for that interface or tunnel displays. The <ip-address>is the IP
address of the neighbor, and when you specify this, detailed information about the neighbor
displays. The information below only displays if OSPF is enabled and the interface has a
neighbor.
Format
Modes
show ipv6 ospf neighbor [interface {<unit/slot/port> | tunnel
<tunnel_id>}][<ip-address>]
• Privileged EXEC
• User EXEC
IPv6 Commands
425
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If you do not specify an IP address, a table with the following columns displays for all
neighbors or the neighbor associated with the interface that you specify:
Term
Definition
Router ID
Priority
The 4-digit dotted-decimal number of the neighbor router.
The OSPF priority for the specified interface. The priority of an interface is a priority
integer from 0 to 255. A value of '0' indicates that the router is not eligible to become the
designated router on this network.
Intf ID
The interface ID of the neighbor.
Interface
State
The interface of the local router in unit/slot/port format.
The state of the neighboring routers. Possible values are:
• Down- initial state of the neighbor conversation - no recent information has been
received from the neighbor.
• Attempt - no recent information has been received from the neighbor but a more
concerted effort should be made to contact the neighbor.
• Init - an Hello packet has recently been seen from the neighbor, but bidirectional
communication has not yet been established.
• 2 way - communication between the two routers is bidirectional.
• Exchange start - the first step in creating an adjacency between the two neighboring
routers, the goal is to decide which router is the master and to decide upon the initial
DD sequence number.
• Exchange - the router is describing its entire link state database by sending Database
Description packets to the neighbor.
• Full - the neighboring routers are fully adjacent and they will now appear in
router-LSAs and network-LSAs.
Dead Time
The amount of time, in seconds, to wait before the router assumes the neighbor is
unreachable.
If you specify an IP address for the neighbor router, the following fields display:
Term
Definition
Interface
Area ID
Options
The interface of the local router in unit/slot/port format.
The area ID associated with the interface.
An integer value that indicates the optional OSPF capabilities supported by the neighbor.
These are listed in its Hello packets. This enables received Hello Packets to be rejected
(i.e., neighbor relationships will not even start to form) if there is a mismatch in certain
crucial OSPF capabilities.
Router Priority
Dead Timer Due
The router priority for the specified interface.
The amount of time, in seconds, to wait before the router assumes the neighbor is
unreachable.
State
The state of the neighboring routers.
IPv6 Commands
426
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Events
Number of times this neighbor relationship has changed state, or an error has occurred.
Retransmission
Queue Length
An integer representing the current length of the retransmission queue of the specified
neighbor router Id of the specified interface.
show ipv6 ospf range
This command displays information about the area ranges for the specified <areaid>. The
<areaid>identifies the OSPF area whose ranges are being displayed.
Format
Modes
show ipv6 ospf range <areaid>
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
The area id of the requested OSPF area.
An IP address which represents this area range.
The type of link advertisement associated with this area range.
The status of the advertisement: enabled or disabled.
IP Address
Lsdb Type
Advertisement
show ipv6 ospf stub table
This command displays the OSPF stub table. The information below will only be displayed if
OSPF is initialized on the switch.
Format
Modes
show ipv6 ospf stub table
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
A 32-bit identifier for the created stub area.
Type of Service
Type of service associated with the stub metric. For this release, Normal TOS is the only
supported type.
Metric Val
The metric value is applied based on the TOS. It defaults to the least metric of the type of
service among the interfaces to other areas. The OSPF cost for a route is a function of
the metric value.
Import
Summary LSA
Controls the import of summary LSAs into stub areas.
IPv6 Commands
427
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 ospf virtual-link
This command displays the OSPF Virtual Interface information for a specific area and
neighbor. The <areaid>parameter identifies the area and the <neighbor>parameter
identifies the neighbor’s Router ID.
Format
show ipv6 ospf virtual-link <areaid> <neighbor>
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
The area id of the requested OSPF area.
The input neighbor Router ID.
Neighbor
Router ID
Hello Interval
Dead Interval
The configured hello interval for the OSPF virtual interface.
The configured dead interval for the OSPF virtual interface.
The configured transit delay for the OSPF virtual interface.
Iftransit Delay
Interval
Retransmit
Interval
The configured retransmit interval for the OSPF virtual interface.
The type of authentication the interface performs on LSAs it receives.
Authentication
Type
State
The OSPF Interface States are: down, loopback, waiting, point-to-point, designated
router, and backup designated router. This is the state of the OSPF interface.
Neighbor State
The neighbor state.
show ipv6 ospf virtual-link brief
This command displays the OSPFV3 Virtual Interface information for all areas in the system.
Format
Modes
show ipv6 ospf virtual-link brief
• Privileged EXEC
• User EXEC
Term
Definition
Area ID
The area id of the requested OSPFV3 area.
The neighbor interface of the OSPFV3 virtual interface.
The configured hello interval for the OSPFV3 virtual interface.
The configured dead interval for the OSPFV3 virtual interface.
Neighbor
Hello Interval
Dead Interval
IPv6 Commands
428
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Retransmit
Interval
The configured retransmit interval for the OSPFV3 virtual interface.
The configured transit delay for the OSPFV3 virtual interface.
Transit Delay
OSPFv3 Graceful Restart Commands
The managed switch implementation of OSPFv3 supports graceful restart as specified in
RFC 5187 and RFC 3623. Graceful restart works together with managed switch non-stop
forwarding (nsf) to enable the hardware to continue forwarding IPv6 packets using OSPFv3
routes while a backup unit takes over management unit responsibility. When OSPF executes
a graceful restart, it informs its neighbors that the OSPF control plane is restarting but will be
back shortly. Helpful neighbors continue to advertise to the network that they have full
adjacencies with the restarting router, avoiding announcement of a topology change and
related events (for example, flooding of LSAs and SPF runs). Helpful neighbors continue to
forward packets through the restarting router. The restarting router relearns the network
topology from its helpful neighbors.
Graceful restart implements both the restarting router and helpful neighbor features
described in RFC 3623.
nsf (OSPFv3)
This command enables OSPF graceful restart. The ietfparameter is used to distinguish the
IETF standard implementation of graceful restart from other implementations. Since the IETF
implementation is not the only one supported, this parameter is optional. The planned-only
parameter indicates that OSPF performs a graceful restart only when the restart is planned
(that is, when the restart results from the initiate failovercommand).
Default
disabled
Format
Mode
nsf [ ietf ] [ planned-only ]
OSPFv3 Router Configuration mode
no nsf [ietf] (OSPFv3)
This command disables OSPF graceful restart.
Format
Mode
no nsf [ ietf ]
OSPFv3 Router Configuration mode
nsf helper (OSPFv3)
This command allows OSPF to act as a helpful neighbor for a restarting router. The
planned-onlyparameter indicates that OSPF should only help a restarting router
performing a planned restart.
IPv6 Commands
429
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The grace LSA announcing the graceful restart includes the reason for the restart. Reasons 1
(software restart) and 2 (software reload/upgrade) are considered planned restarts. Reasons
0 (unknown) and 3 (switch to redundant control processor) are considered unplanned
restarts.
Default
OSPF acts as a helpful neighbor for both planned and unplanned restarts
Format
Mode
nsf helper [ planned-only ]
OSPFv3 Router Configuration mode
nsf ietf helper disable (OSPFv3)
This command is functionally equivalent to no nsf helperand is supported solely for IS-CLI
compatibility.
Format
Mode
nsf ietf helper disable
OSPFv3 Router Configuration mode
no nsf helper (OSPFv3)
This command prevents OSPF from acting as a helpful neighbor.
Format
Mode
no nsf helper
OSPFv3 Router Configuration mode
nsf helper strict-lsa-checking (OSPFv3)
This command requires that an OSPF helpful neighbor exit helper mode when a topology
change occurs. The restarting router is unable to react to topology changes. In particular, the
restarting router will not immediately update its forwarding table. Therefore, a topology
change might introduce forwarding loops or black holes that persist until the graceful restart is
completed. By exiting graceful restart when a topology change occurs, a router tries to
eliminate the loops or black holes as quickly as possible by routing around the restarting
router.
The ietfparameter is used to distinguish the IETF standard implementation of graceful
restart from other implementations. Since the IETF implementation is not the only one
supported, this parameter is optional.
A helpful neighbor considers a link down with the restarting router to be a topology change,
regardless of the strict LSA checking configuration.
Default
A helpful neighbor exits helper mode when a topology change occurs.
Format
Mode
nsf [ietf] helper strict-lsa-checking
OSPFv3 Router Configuration mode
IPv6 Commands
430
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no nsf [ietf] helper strict-lsa-checking (OSPFv3)
This command allows OSPF to continue as a helpful neighbor in spite of topology changes.
nsf restart-interval (OSPFv3)
This command configures the length of the grace period on the restarting router. The grace
period must be set long enough to allow the restarting router to reestablish all of its
adjacencies and complete a full database exchange with each of its neighbors.
The ietfparameter is used to distinguish the IETF standard implementation of graceful
restart from other implementations. Since the IETF implementation is not the only one
supported, this parameter is optional. The secondsparameter represents the number of
seconds that the restarting router asks its neighbors to wait before exiting helper mode. The
restarting router includes the restart interval in its grace LSAs (range 1–1800 seconds).
Default
120s
Format
Mode
nsf [ietf] restart-interval seconds
OSPFv3 Router Configuration mode
no [ietf] nsf restart-interval (OSPFv3)
This command reverts the grace period to its default.
DHCPv6 Commands
This section describes the command you use to configure the DHCPv6 server on the system
and to view DHCPv6 information.
service dhcpv6
This command enables DHCPv6 configuration on the router.
Default
disabled
Format
Mode
service dhcpv6
Global Config
no service dhcpv6
This command disables DHCPv6 configuration on router.
Format
Mode
no service dhcpv6
Global Config
IPv6 Commands
431
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 dhcp server
Use this command to configure DHCPv6 server functionality on an interface. The
<pool-name>is the DHCPv6 pool containing stateless and/or prefix delegation parameters,
rapid-commitis an option that allows for an abbreviated exchange between the client and
server, and <pref-value>is a value used by clients to determine preference between
multiple DHCPv6 servers. For a particular interface DHCPv6 server and DHCPv6 relay
functions are mutually exclusive.
Format
Mode
ipv6 dhcp server <pool-name> [rapid-commit] [preference <pref-value>]
Interface Config
ipv6 dhcp relay destination
Use this command to configure an interface for DHCPv6 relay functionality. Use the
destinationkeyword to set the relay server IPv6 address. The <relay-address>
parameter is an IPv6 address of a DHCPv6 relay server. Use the interfacekeyword to set
the relay server interface. The <relay-interface>parameter is an interface
(unit/slot/port) to reach a relay server. The optional remote-idis the Relay Agent
Information Option “remote ID” sub-option to be added to relayed messages. This can either
be the special keyword duid-ifid, which causes the “remote ID” to be derived from the
DHCPv6 server DUID and the relay interface number, or it can be specified as a user-defined
string.
Note: If <relay-address> is an IPv6 global address, then <relay-interface>
is not required. If <relay-address> is a link-local or multicast
address, then <relay-interface> is required. Finally, if you do not
specify a value for <relay-address>, then you must specify a value
for <relay-interface> and the DHCPV6-ALL-AGENTS multicast
address (i.e. FF02::1:2)is used to relay DHCPv6 messages to the
relay server.
Format
Mode
ipv6 dhcp relay {destination [<relay-address>] interface
[<relay-interface>]| interface [<relay-interface>]} [remote-id
(duid-ifid | <user-defined-string>)]
Interface Config
ipv6 dhcp pool
Use this command from Global Config mode to enter IPv6 DHCP Pool Config mode. Use the
exitcommand to return to Global Config mode. To return to the User EXEC mode, enter
CTRL+Z. The <pool-name>should be less than 31 alpha-numeric characters. DHCPv6
pools are used to specify information for DHCPv6 server to distribute to DHCPv6 clients.
IPv6 Commands
432
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
These pools are shared between multiple interfaces over which DHCPv6 server capabilities
are configured.
Format
Mode
ipv6 dhcp pool <pool-name>
Global Config
no ipv6 dhcp pool
This command removes the specified DHCPv6 pool.
Format
Mode
no ipv6 dhcp pool <pool-name>
Global Config
domain-name (IPv6)
This command sets the DNS domain name provided to the DHCPv6 client by the DHCPv6
server. The DNS domain name is configured for stateless server support and consists of no
more than 31 alpha-numeric characters. The DHCPv6 pool can have up to eight domain
names.
Format
Mode
domain-name <dns-domain-name>
IPv6 DHCP Pool Config
no domain-name
This command removes the DHCPv6 domain name from the DHCPv6 pool.
Format
Mode
no domain-name <dns-domain-name>
IPv6 DHCP Pool Config
dns-server (IPv6)
This command sets the ipv6 DNS server address, which is provided to dhcpv6 client by
dhcpv6 server. DNS server address is configured for stateless server support. DHCPv6 pool
can have multiple number of domain names with maximum of 8.
Format
Mode
dns-server <dns-server-address>
IPv6 DHCP Pool Config
no dns-server
This command will remove DHCPv6 server address from DHCPv6 server.
Format
Mode
no dns-server <dns-server-address>
IPv6 DHCP Pool Config
IPv6 Commands
433
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
prefix-delegation (IPv6)
Multiple IPv6 prefixes can be defined within a pool for distributing to specific DHCPv6 Prefix
delegation clients. Prefix is the delegated IPv6 prefix. DUID is the client’s unique DUID value
(Example: 00:01:00:09:f8:79:4e:00:04:76:73:43:76'). Name is 31 characters textual client’s
name, which is useful for logging or tracing only. Valid lifetime is the valid lifetime for the
delegated prefix in seconds and preferred lifetime is the preferred lifetime for the delegated
prefix in seconds.
Default
• valid-lifetime—2592000
• preferred-lifetime—604800
Format
Mode
prefix-delegation<prefix/prefixlength> <DUID> [name <hostname>]
[valid-lifetime <0-4294967295>][preferred-lifetime < 0-4294967295>]
IPv6 DHCP Pool Config
no prefix-delegation
This command deletes a specific prefix-delegation client.
Format
Mode
no prefix-delegation<prefix/prefix-delegation> <DUID>
IPv6 DHCP Pool Config
show ipv6 dhcp
This command displays the DHCPv6 server name and status.
Format
Mode
show ipv6 dhcp
Privileged EXEC
Term
Definition
DHCPv6 is
Enabled
The status of the DHCPv6 server.
(Disabled)
Server DUID
If configured, shows the DHCPv6 unique identifier.
show ipv6 dhcp statistics
This command displays the IPv6 DHCP statistics for all interfaces.
Format
Mode
show ipv6 dhcp statistics
Privileged EXEC
IPv6 Commands
434
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
DHCPv6 Solicit Packets
Received
Number of solicit received statistics.
Number of request received statistics.
Number of confirm received statistics.
Number of renew received statistics.
Number of rebind received statistics.
Number of release received statistics.
Number of decline received statistics.
Number of inform received statistics.
Number of relay forward received statistics.
Number of relay-reply received statistics.
Number of malformed packets statistics.
Number of DHCP discarded statistics.
Total number of DHCPv6 received statistics
Number of advertise sent statistics.
Number of reply sent statistics.
DHCPv6 Request Packets
Received
DHCPv6 Confirm Packets
Received
DHCPv6 Renew Packets
Received
DHCPv6 Rebind Packets
Received
DHCPv6 Release Packets
Received
DHCPv6 Decline Packets
Received
DHCPv6 Inform Packets
Received
DHCPv6 Relay-forward
Packets Received
DHCPv6Relay-replyPackets
Received
DHCPv6 Malformed Packets
Received
Received DHCPv6 Packets
Discarded
Total DHCPv6 Packets
Received
DHCPv6 Advertisement
Packets Transmitted
DHCPv6 Reply Packets
Transmitted
DHCPv6 Reconfig Packets
Transmitted
Number of reconfigure sent statistics.
Number of relay-reply sent statistics.
Number of relay-forward sent statistics.
Total number of DHCPv6 sent statistics.
DHCPv6Relay-replyPackets
Transmitted
DHCPv6 Relay-forward
Packets Transmitted
Total DHCPv6 Packets
Transmitted
IPv6 Commands
435
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 dhcp interface
This command displays DHCPv6 information for all relevant interfaces or the specified
interface. If you specify an interface, you can use the optional statisticsparameter to
view statistics for the specified interface.
Format
show ipv6 dhcp interface <unit/slot/port> [statistics]
Mode
Privileged EXEC
Term
Definition
IPv6 Interface
The interface name in <unit/slot/port> format.
Shows whether the interface is a IPv6 DHCP relay or server.
Mode
If the interface mode is server, the following information displays.
Term
Definition
Pool Name
The pool name specifying information for DHCPv6 server distribution to DHCPv6 clients.
The preference of the server.
Server
Preference
Option Flags
Shows whether rapid commit is enabled.
If the interface mode is relay, the following information displays.
Term
Definition
Relay Address
The IPv6 address of the relay server.
The relay server interface in <unit/slot/port> format.
Relay Interface
Number
Relay Remote
ID
If configured, shows the name of the relay remote.
Shows whether rapid commit is configured.
Option Flags
If you use the statistics parameter, the command displays the IPv6 DHCP statistics for the
output.
clear ipv6 dhcp
Use this command to clear DHCPv6 statistics for all interfaces or for a specific interface. Use
the <unit/slot/port>parameter to specify the interface.
Format
Mode
clear ipv6 dhcp {statistics | interface <unit/slot/port> statistics}
Privileged EXEC
IPv6 Commands
436
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 dhcp pool
This command displays configured DHCP pool.
Format
show ipv6 dhcp pool<pool-name>
Mode
Privileged EXEC
Term
Definition
DHCP Pool
Name
Unique pool name configuration.
Client DUID
Client’s DHCP unique identifier. DUID is generated using the combination of the local
system burned-in MAC address and a timestamp value.
Host
Name of the client.
Prefix/Prefix
Length
IPv6 address and mask length for delegated prefix.
Preferred
Lifetime
Preferred lifetime in seconds for delegated prefix.
Valid Lifetime
Valid lifetime in seconds for delegated prefix.
Address of DNS server address.
DNS Server
Address
Domain Name
DNS domain name.
show ipv6 dhcp binding
This command displays configured DHCP pool.
Format
Mode
show ipv6 dhcp binding[<ipv6-address>]
Privileged EXEC
Term
Definition
DHCP Client
Address
Address of DHCP Client.
DUID
IAID
String that represents the Client DUID.
Identity Association ID.
Prefix/Prefix
Length
IPv6 address and mask length for delegated prefix.
Prefix Type
IPV6 Prefix type (IAPD, IANA, or IATA).
Address of DHCP Client.
Client Address
Client Interface
Expiration
IPv6 Address of DHCP Client.
Address of DNS server address.
IPv6 Commands
437
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Valid Lifetime
Valid lifetime in seconds for delegated prefix.
Preferred lifetime in seconds for delegated prefix.
Preferred
Lifetime
IPv6 Commands
438
Download from Www.Somanuals.com. All Manuals Search And Download.
8.
IPv6 Multicast Commands
8
This chapter describes the IPv6 multicast commands available in the managed switch CLI.
Note: Some commands described in this chapter require a license. For
This chapter contains the following sections:
•
•
•
•
The commands in this chapter are in three functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
•
Clear commands clear some or all of the settings to factory defaults.
Note: There is no specific IP multicast enable for IPv6. Enabling of
multicast at global config is common for both IPv4 and IPv6.
IPv6 Multicast Forwarder Commands
Note: There is no specific IP multicast enable for IPv6. Enabling of
multicast at global config is common for both IPv4 and IPv6.
439
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 mroute
Use this command to show the mroute entries specific for IPv6. (This command is the IPv6
equivalent of the IPv4 show ip mcaste mroutecommand.)
Format
Modes
show ipv6 mroute {detail | summary}
• Privileged EXEC
• User EXEC
If you use the detail parameter, the command displays the following Multicast Route Table
fields:
Term
Definition
Source IP
Group IP
Expiry Time
Up Time
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The time of expiry of this entry in seconds.
The time elapsed since the entry was created in seconds.
The IP address of the RPF neighbor.
RPF Neighbor
Flags
The flags associated with this entry.
If you use the summaryparameter, the command displays the following fields:
Term
Definition
Source IP
Group IP
Protocol
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The multicast routing protocol by which the entry was created.
The interface on which the packet for the source/group arrives.
Incoming
Interface
Outgoing
Interface List
The list of outgoing interfaces on which the packet is forwarded.
show ipv6 mroute group
This command displays the multicast configuration settings specific to IPv6 such as flags,
timer settings, incoming and outgoing interfaces, RPF neighboring routers, and expiration
times of all the entries in the multicast mroute table containing the given group IPv6 address
<group-address>.
Format
Modes
show ipv6 mroute group <group-address> {detail | summary}
• Privileged EXEC
• User EXEC
IPv6 Multicast Commands
440
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Source IP
The IP address of the multicast data source.
Group IP
Protocol
The IP address of the destination of the multicast packet.
The multicast routing protocol by which this entry was created.
The interface on which the packet for this group arrives.
Incoming
Interface
Outgoing
Interface List
The list of outgoing interfaces on which this packet is forwarded.
show ipv6 mroute source
This command displays the multicast configuration settings specific to IPv6 such as flags,
timer settings, incoming and outgoing interfaces, RPF neighboring routers, and expiration
times of all the entries in the multicast mroute table containing the given source IP address or
source IP address and group IP address pair.
Format
Modes
show ipv6 mroute source <source-address> {detail | summary}
• Privileged EXEC
• User EXEC
If you use the detail parameter, the command displays the following column headings in
the output table:
Term
Definition
Source IP
Group IP
Expiry Time
Up Time
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The time of expiry of this entry in seconds.
The time elapsed since the entry was created in seconds.
The IP address of the RPF neighbor.
RPF Neighbor
Flags
The flags associated with this entry.
If you use the summaryparameter, the command displays the following column headings in
the output table:
Term
Definition
Source IP
Group IP
Protocol
The IP address of the multicast data source.
The IP address of the destination of the multicast packet.
The multicast routing protocol by which this entry was created.
IPv6 Multicast Commands
441
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Incoming
Interface
The interface on which the packet for this source arrives.
Outgoing
Interface List
The list of outgoing interfaces on which this packet is forwarded.
IPv6 PIM Commands
This section describes the Protocol Independent Multicast (PIM) commands that support the
PIM version of IPv6.
ipv6 pim dense(Global Config)
Use this command to administratively enable PIM-DM Multicast Routing Mode across the
router (Global Config).
Default
disabled
Format
Mode
ipv6 pim dense
• Global Config
• Interface Config
no ipv6 pim dense (Global Config)
Use this command to administratively disable PIM-DM Multicast Routing Mode either across
the router (Global Config) or on a particular router (Interface Config).
Format
Mode
no ipv6 pim dense
Global Config
ipv6 pim (Interface Config)
Use this command to set the administrative mode of PIM on an interface to enabled.
Default
disabled
Format
Mode
ipv6 pim
Interface Config
no ipv6 pim (Interface Config)
Use this command to set the administrative mode of PIM on an interface to disabled.
Format
Mode
no ipv6 pim
Interface Config
IPv6 Multicast Commands
442
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 pim hello-interval
Use this command to configure the PIM hello interval for the specified router interface. The
hello-interval is specified in seconds and is in the range 10–18000.
Default
30
Format
Mode
ipv6 pim hello-interval <10-18000>
Interface Config
no ipv6 pim hello-interval
Use this command to set the PIM hello interval to the default value.
Format
Mode
no ipv6 pim hello-interval
Interface Config
show ipv6 pim
Use this command to display PIM Global Configuration parameters and PIM interface status.
Format
Mode
show ipv6 pim
• Privileged EXEC
• User EXEC
Term
Definition
PIM Mode
Configured mode of PIM protocol
Data Threshold Rate
Register Rate-limit
Interface
Rate (in kbps) of SPT Threshold
Rate (in kbps) of Register Threshold
Valid unit, slot, and port number separated by forward slashes
Indicates whether PIM-DM is enabled or disabled on this interface
Interface-Mode
Operational-Status
The current state of PIM-DM on this interface. Possible values are Operational or
Non-Operational.
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 pim
PIM Mode..................................... Dense
Data Threshold Rate (Kbps)................... 0
Register Rate-limit (Kbps)................... 0
Interface Interface Mode Operational-Status
--------- -------------- ----------------
1/0/1
Enabled
Non-Operational
IPv6 Multicast Commands
443
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 pim neighbor
Use this command to display the PIM neighbor information for all interfaces or for the
specified interface.
Format
show ipv6 pim neighbor [<unit/slot/port>|vlan]
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The IP address of the neighbor on an interface.
Neighbor
Address
Up Time
The time since this neighbor has become active on this interface.
The expiry time of the neighbor on this interface.
Expiry Time
DR Priority
DR Priority configured on this interface (PM-SM only).
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 pim neighbor 0/1
Interface Neighbor
Address
Up Time
(hh:mm:ss)
Expiry Time
(hh:mm:ss)
show ipv6 pim interface
Use this command to display PIM configuration information for all interfaces or for the
specified interface. If no interface is specified, configuration of all interfaces is displayed.
Format
show ipv6 pim interface [<unit/slot/port>|vlan]
Modes
• Privileged EXEC
• User EXEC
Term
Mode
Definition
Active PIM protocol.
Interface number.
Interface
Hello Interval
Hello interval value. The frequency at which PIM hello messages are transmitted on
this interface. By default, the value is 30 seconds.
Join-prune Interval
DR Priority
Join-prune interval value.
DR priority configured on this interface. This is not applicable if the interface mode is
Dense.
BSR Border
Indicates whether the interface is configured as a BSR border.
IPv6 Multicast Commands
444
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Neighbor Count
Number of PIM neighbors discovered on the interface. This field is displayed only
when the interface is operational.
Designated-Router
IP address of the elected DR on the interface. This field is displayed only when the
interface is operational.
(Switch) #show ipv6 pim interface 1/0/1
Interface...................................... 1/0/1
Mode........................................... Dense
Hello Interval (secs).......................... 30
Join Prune Interval (secs)..................... 60
DR Priority.................................... 1
BSR Border..................................... Disabled
ipv6 pim bsr-border
Use this command to prevent bootstrap router (BSR) messages from being sent or received
through an interface.
Default
disabled
Format
Mode
ipv6 pim bsr-border
Interface Config
no ipv6 pim bsr-border
Use this command to disable the interface from being the BSR border.
Format
Mode
no ipv6 pim bsr-border
Interface Config
ipv6 pim bsr-candidate
Use this command to configure the router to announce its candidacy as a bootstrap router
(BSR).
Default
None
Format
Mode
ipv6 pim bsr-candidate interface [<unit/slot/port> | vlan <1-4093>]
[hash-mask-length] [priority] [interval interval]
Global Config
IPv6 Multicast Commands
445
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameters
Description
hash-mask-length
Length of a mask (32 bits maximum) that is to be ANDed with the group address before
the hash function is called. All groups with the same seed hash correspond to the same
RP. For example, if this value was 24, only the first 24 bits of the group addresses
matter. This allows you to get one RP for multiple groups.
priority
interval
Priority of the candidate BSR. The range is an integer from 0 to 255. The BSR with the
larger priority is preferred. If the priority values are the same, the router with the larger
IP address is the BSR. The default value is 0.
(Optional) Indicates the BSR candidate advertisement interval. The range is from 1 to
16383 seconds. The default value is 60 seconds.
no ipv6 pim bsr-candidate
Use this command to disable the router to announce its candidacy as a bootstrap router
(BSR).
Format
Mode
no ipv6 pim bsr-candidate interface [<unit/slot/port> | vlan
<1-4093>] [hash-mask-length] [priority]
Global Config
ipv6 pim dr-priority
Use this command to set the priority value for which a router is elected as the designated
router (DR).
Default
1
Format
Mode
ipv6 pim dr-priority <0-2147483647>
Interface Config
no ipv6 pim dr-priority
Use this command to disable the interface from being the BSR border.
Format
Mode
no ipv6 pim dr-priority
Interface Config
ipv6 pim join-prune-interval
Use this command to configure the interface join/prune interval for the PIM-SM router. The
join/prune interval is specified in seconds. This parameter can be configured to a value from
0 to 18000.
Default
60
IPv6 Multicast Commands
446
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
ipv6 pim join-prune-interval <0-18000>
Interface Config
no ipv6 pim join-prune-interval
Use this command to set the join/prune interval to the default value.
Format
Mode
no ipv6 pim join-prune-interval
Interface Config
ipv6 pim rp-address
Use this command to statically configure the RP address for one or more multicast groups.
The parameter <rp-address>is the IP address of the RP. The parameter
<groupaddress>is the group address supported by the RP. The parameter <groupmask>
is the group mask for the group address. The optional keyword overrideindicates that if
there is a conflict, the RP configured with this command prevails over the RP learned by
BSR.
Default
0
Format
Mode
ipv6 pim rp-address <rp-address> <group-address> <group-mask>
[override]
Global Config
no ipv6 pim rp-address
Use this command to statically remove the RP address for one or more multicast groups.
Format
Mode
no ipv6 pim rp-address <rp-address> <group-address> <group-mask>
Global Config
ipv6 pim rp-candidate
Use this command to configure the router to advertise itself as a PIM candidate rendezvous
point (RP) to the bootstrap router (BSR).
Default
None
Format
Mode
ipv6 pim rp-candidate interface <unit/slot/port> <group-address>
<group-mask>
Global Config
IPv6 Multicast Commands
447
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 pim rp-candidate
Use this command to disable the router to advertise itself as a PIM candidate rendezvous
point (RP) to the bootstrap router (BSR).
Format
Mode
no ipv6 pim rp-candidate interface <unit/slot/port> <group-address>
<group-mask>
Global Config
ipv6 pim ssm
Use this command to define the Source Specific Multicast (SSM) range of IP multicast
addresses.
Default
disabled
Format
Mode
ipv6 pim ssm {default | <group-address/prefixlength> <group-mask>}
Global Config
Parameter
default
Description
Defines the SSM range access list to 232/8.
no ipv6 pim ssm
Use this command to disable the Source Specific Multicast (SSM) range.
Format
Mode
no ipv6 pim ssm
Global Config
show ipv6 pim bsr-router
Use command to display the bootstrap router (BSR) information. The output includes elected
BSR information and information about the locally configured candidate rendezvous point
(RP) advertisement.
Format
Mode
show ipv6 pim bsr-router [candidate | elected]
• Privileged EXEC
• User EXEC
Term
Definition
BSR Address
IP address of the BSR.
Uptime
Length of time that this router has been up (in hours, minutes, and seconds).
Priority as configured in the ip pim bsr-candidatecommand.
BSR Priority
IPv6 Multicast Commands
448
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Hash Mask
Length
Length of a mask (maximum 32 bits) that is to be ANDed with the group address
before the hash function is called. This value is configured in the ip pim
bsr-candidatecommand.
Next Bootstrap
Message In
Time (in hours, minutes, and seconds) in which the next bootstrap message is due
from this BSR.
Next Candidate
RP advertisement
in
Time (in hours, minutes, and seconds) in which the next candidate RP advertisement
will be sent.
show ipv6 pim rp-hash
Use this command to display which rendezvous point (RP) is being used for a specified
group.
Format
Modes
show ipv6 pim rp-hash <group-address>
• Privileged EXEC
• User EXEC
Term
RP
Definition
The IP address of the RP for the group specified.
Indicates the mechanism (BSR or static) by which the RP was selected.
Origin
show ipv6 pim rp mapping
Use this command to display all group-to-RP mappings of which the router is aware (either
configured or learned from the bootstrap router (BSR)). If no RP is specified, all active RPs
are displayed.
Format
Modes
show ipv6 pim rp mapping [rp address]
• Privileged EXEC
• User EXEC
IPv6 MLD Commands
IGMP/MLD Snooping is Layer 2 functionality but IGMP/MLD are Layer 3 multicast protocols.
It requires that in a network setup there should be a multicast router (which can act as a
querier) to be present to solicit the multicast group registrations. However some network
setup does not need a multicast router as multicast traffic is destined to hosts within the same
network. In this situation, the 7000 series has an IGMP/MLD Snooping Querier running on
one of the switches and Snooping enabled on all the switches. For more information, see
IPv6 Multicast Commands
449
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 mld router
Use this command, in the administrative mode of the router, to enable MLD in the router.
Default
Disabled
Format
Mode
ipv6 mld router
• Global Config
• Interface Config
no ipv6 mld router
Use this command, in the administrative mode of the router, to disable MLD in the router.
Default
Disabled
Format
Mode
no ipv6 mld router
• Global Config
• Interface Config
ipv6 mld query-interval
Use this command to set the MLD router’s query interval for the interface. The query-interval
is the amount of time between the general queries sent when the router is the querier on that
interface. The range for <query-interval> is 1 to 3600 seconds.
Default
125
Format
Mode
ipv6 mld query-interval <query-interval>
Interface Config
no ipv6 mld query-interval
Use this command to reset the MLD query interval to the default value for that interface.
Format
Mode
no ipv6 mld query-interval
Interface Config
ipv6 mld query-max-response-time
Use this command to set the MLD querier’s maximum response time for the interface and this
value is used in assigning the maximum response time in the query messages that are sent
on that interface. The range for <query-max-response-time>is 0 to 65535 milliseconds.
Default
10000 milliseconds
Format
Mode
ipv6 mld query-max-response-time <query-max-response-time>
Interface Config
IPv6 Multicast Commands
450
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 mld query-max-response-time
This command resets the MLD query max response time for the interface to the default
value.
Format
Mode
no ipv6 mld query-max-response-time
Interface Config
ipv6 mld last-member-query-interval
Use this command to set the last member query interval for the MLD interface, which is the
value of the maximum response time parameter in the group specific queries sent out of this
interface. The range for <last-member-query-interval>is 1 to 65535 milliseconds.
Default
1000 milliseconds
Format
Mode
ipv6 mld last-member-query-interval <last-member-query-interval>
Interface Config
no ipv6 mld last-member-query-interval
Use this command to reset the <last-member-query-interval> parameter of the
interface to the default value.
Format
Mode
no ipv6 mld last-member-query-interval
Interface Config
ipv6 mld last-member-query-count
Use this command to set the number of listener-specific queries sent before the router
assumes that there are no local members on the interface. The range for
<last-member-query-count>is 1 to 20.
Default
2
Format
Mode
ipv6 mld last-member-query-count <last-member-query-count>
Interface Config
no ipv6 mld last-member-query-count
Use this command to reset the <last-member-query-count> parameter of the interface
to the default value.
Format
Mode
no ipv6 mld last-member-query-count
Interface Config
IPv6 Multicast Commands
451
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 mld groups
Use this command to display information about multicast groups that MLD reported. The
information is displayed only when MLD is enabled on at least one interface. If MLD was not
enabled on even one interface, there is no group information to be displayed.
Format
Mode
show ipv6 mld groups {<unit/slot/port> | <group-address>}
• Privileged EXEC
• User EXEC
The following fields are displayed as a table when <unit/slot/port> is specified.
Field
Description
Group Address
Interface
The address of the multicast group.
Interface through which the multicast group is reachable.
Time elapsed in hours, minutes, and seconds since the multicast group has been known.
Up Time
Expiry Time
Time left in hours, minutes, and seconds before the entry is removed from the MLD
membership table.
When <group-address> is specified, the following fields are displayed for each multicast
group and each interface.
Field
Description
Interface
Interface through which the multicast group is reachable.
The address of the multicast group.
Group Address
Last Reporter
The IP Address of the source of the last membership report received for this multicast
group address on that interface.
Filter Mode
The filter mode of the multicast group on this interface. The values it can take are
includeand exclude.
Version 1 Host
Timer
The time remaining until the router assumes there are no longer any MLD version-1
Hosts on the specified interface.
Group Compat
Mode
The compatibility mode of the multicast group on this interface. The values it can take are
MLDv1and MLDv2.
The following table is displayed to indicate all the sources associated with this group.
Field
Description
Source Address
Uptime
The IP address of the source.
Time elapsed in hours, minutes, and seconds since the source has been known.
Time left in hours, minutes, and seconds before the entry is removed.
Expiry Time
IPv6 Multicast Commands
452
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Example: The following shows examples of CLI display output for the commands.
(Switch) #show ipv6 mld groups ?
<group-address>
<unit/slot/port>
Enter Group Address Info.
Enter interface in unit/slot/port format.
(Switch) #show ipv6 mld groups 1/0/1
Group Address.................................. FF43::3
Interface...................................... 1/0/1
Up Time (hh:mm:ss)............................. 00:03:04
Expiry Time (hh:mm:ss)......................... ------
(Switch) #show ipv6 mld groups ff43::3
Interface...................................... 1/0/1
Group Address.................................. FF43::3
Last Reporter.................................. FE80::200:FF:FE00:3
Up Time (hh:mm:ss)............................. 00:02:53
Expiry Time (hh:mm:ss)......................... ------
Filter Mode.................................... Include
Version1 Host Timer............................ ------
Group compat mode.............................. v2
Source Address
ExpiryTime
----------------- -----------
2003::10
2003::20
00:04:17
00:04:17
show ipv6 mld interface
Use this command to display MLD-related information for the interface.
Format
Mode
show ipv6 mld interface [<unit/slot/port>]
• Privileged EXEC
• User EXEC
The following information is displayed for each of the interfaces or for only the specified
interface.
Field
Description
Interface
The interface number in unit/slot/port format.
Displays the configured administrative status of MLD.
MLD Global
Mode
MLD
Operational
Mode
The operational status of MLD on the interface.
MLD Version
Indicates the version of MLD configured on the interface.
Indicates the configured query interval for the interface.
Query Interval
IPv6 Multicast Commands
453
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Field
Description
Query Max
Response Time
Indicates the configured maximum query response time (in seconds) advertised in MLD
queries on this interface.
Robustness
Displays the configured value for the tuning for the expected packet loss on a subnet
attached to the interface.
Startup Query
interval
This valued indicates the configured interval between General Queries sent by a Querier
on startup.
Startup Query
Count
This value indicates the configured number of Queries sent out on startup, separated by
the Startup Query Interval.
Last Member
Query Interval
This value indicates the configured Maximum Response Time inserted into
Group-Specific Queries sent in response to Leave Group messages.
Last Member
Query Count
This value indicates the configured number of Group-Specific Queries sent before the
router assumes that there are no local members.
The following information is displayed if the operational mode of the MLD interface is
enabled.
Field
Description
Querier Status
This value indicates whether the interface is an MLD querier or non-querier on the
subnet it is associated with.
Querier
Address
The IP address of the MLD querier on the subnet the interface is associated with.
Querier Up Time
Time elapsed in seconds since the querier state has been updated.
Time left in seconds before the Querier loses its title as querier.
Querier Expiry
Time
Wrong Version
Queries
Indicates the number of queries received whose MLD version does not match the MLD
version of the interface.
Number of
Joins
The number of times a group membership has been added on this interface.
The number of times a group membership has been removed on this interface.
The current number of membership entries for this interface.
Number of
Leaves
Number of
Groups
show ipv6 mld traffic
Use this command to display MLD statistical information for the router.
Format
Mode
show ipv6 mld traffic
• Privileged EXEC
• User EXEC
IPv6 Multicast Commands
454
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Field
Description
Valid MLD Packets Received
The number of valid MLD packets received by the router.
The number of valid MLD packets sent by the router.
The number of valid MLD queries received by the router.
The number of valid MLD queries sent by the router.
The number of valid MLD reports received by the router.
The number of valid MLD reports sent by the router.
The number of valid MLD leaves received by the router.
The number of valid MLD leaves sent by the router.
The number of bad checksum MLD packets received by the router.
The number of malformed MLD packets received by the router.
Valid MLD Packets Sent
Queries Received
Queries Sent
Reports Received
Reports Sent
Leaves Received
Leaves Sent
Bad Checksum MLD Packets
Malformed MLD Packets
IPv6 MLD-Proxy Commands
MLD-Proxy is the IPv6 equivalent of IGMP-Proxy. MLD-Proxy commands allow you to
configure the network device as well as to view device settings and statistics using either
serial interface or telnet session. The operation of MLD-Proxy commands is the same as for
IGMP-Proxy: MLD is for IPv6 and IGMP is for IPv4.MGMD is a term used to refer to both
IGMP and MLD.
ipv6 mld-proxy
Use this command to enable MLD-Proxy on the router. To enable MLD-Proxy on the router,
you must enable multicast forwarding. Also, make sure that there are no other multicast
routing protocols enabled n the router.
Format
Mode
ipv6 mld-proxy
Interface Config
no ipv6 mld-proxy
Use this command to disable MLD-Proxy on the router.
Format
Mode
no ipv6 mld-proxy
Interface Config
IPv6 Multicast Commands
455
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 mld-proxy unsolicit-rprt-interval
Use this command to set the unsolicited report interval for the MLD-Proxy router. This
command is only valid when you enable MLD-Proxy on the interface. The value of <interval>
is 1-260 seconds.
Default
1
Format
Mode
ipv6 mld-proxy unsolicit-rprt-interval <interval>
Interface Config
no ipv6 mld-proxy unsolicited-report-interval
Use this command to reset the MLD-Proxy router’s unsolicited report interval to the default
value.
Format
Mode
no ipv6 mld-proxy unsolicit-rprt-interval
Interface Config
ipv6 mld-proxy reset-status
Use this command to reset the host interface status parameters of the MLD-Proxy router.
This command is only valid when you enable MLD-Proxy on the interface.
Format
Mode
ipv6 mld-proxy reset-status
Interface Config
show ipv6 mld-proxy
Use this command to display a summary of the host interface status parameters.
Format
Mode
show ipv6 mld-proxy
• Privileged EXEC
• User EXEC
The command displays the following parameters only when you enable MLD-Proxy.
Field
Description
Interface Index
Admin Mode
The interface number of the MLD-Proxy.
Indicates whether MLD-Proxy is enabled or disabled. This is a configured
value.
Operational Mode
Version
Indicates whether MLD-Proxy is operationally enabled or disabled. This is a
status parameter.
The present MLD host version that is operational on the proxy interface.
IPv6 Multicast Commands
456
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Field
Description
Number of Multicast Groups
The number of multicast groups that are associated with the MLD-Proxy
interface.
Unsolicited Report Interval
The time interval at which the MLD-Proxy interface sends unsolicited group
membership report.
Querier IP Address on Proxy
Interface
The IP address of the Querier, if any, in the network attached to the
upstream interface (MLD-Proxy interface).
Older Version 1 Querier
Timeout
The interval used to timeout the older version 1 queriers.
Proxy Start Frequency
The number of times the MLD-Proxy has been stopped and started.
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 mld-proxy
Interface Index............................................. 1/0/3
Admin Mode................................................ Enable
Operational Mode......................................... Enable
Version......................................................... 3
Num of Multicast Groups............................. 0
Unsolicited Report Interval.......................... 1
Querier IP Address on Proxy Interface........ fe80::1:2:5
Older Version 1 Querier Timeout................ 00:00:00
Proxy Start Frequency.................................
show ipv6 mld-proxy interface
This command displays a detailed list of the host interface status parameters. It displays the
following parameters only when you enable MLD-Proxy.
Format
Modes
show ipv6 mld-proxy interface
• Privileged EXEC
• User EXEC
Term
Definition
Interface Index
The unit/slot/port of the MLD-proxy.
The column headings of the table associated with the interface are as follows:
Term
Definition
Ver
The MLD version.
Query Rcvd
Report Rcvd
Report Sent
Number of MLD queries received.
Number of MLD reports received.
Number of MLD reports sent.
IPv6 Multicast Commands
457
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Leaves Rcvd
Number of MLD leaves received. Valid for version 2 only.
Leaves Sent
Number of MLD leaves sent on the Proxy interface. Valid for version 2 only.
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 mld-proxy interface
Interface Index................................ 1/0/1
Ver Query Rcvd Report Rcvd Report Sent Leave Rcvd Leave Sent
------------------------------------------------------------------
1
2
2
3
0
0
0
4
0
2
-----
-----
show ipv6 mld-proxy groups
Use this command to display information about multicast groups that the MLD-Proxy
reported.
Format
show ipv6 mld-proxy groups
Mode
• Privileged EXEC
• User EXEC
Field
Description
Interface
The interface number of the MLD-Proxy.
Group Address
Last Reporter
The IP address of the multicast group.
The IP address of the host that last sent a membership report for the current group,
on the network attached to the MLD-Proxy interface (upstream interface).
Up Time (in secs)
Member State
The time elapsed in seconds since last created.
Possible values are:
• Idle_Member. The interface has responded to the latest group membership query
for this group.
• Delay_Member. The interface is going to send a group membership report to
respond to a group membership query for this group.
Filter Mode
Sources
Possible values are Include or Exclude.
The number of sources attached to the multicast group.
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 mld-proxy groups
Interface Index................................ 1/0/3
Group Address
Last Reporter
Up Time Member State
Filter Mode Sources
IPv6 Multicast Commands
458
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
-------------
FF1E::1
-------------- ---------- ----------------- -------------- -------
FE80::100:2.3
FE80::100:2.3
FE80::100:2.3
FE80::100:2.3
00:01:40 DELAY_MEMBER
00:02:40 DELAY_MEMBER
00:01:40 DELAY_MEMBER
00:02:44 DELAY_MEMBER
Exclude
Include
Exclude
Include
2
1
0
4
FF1E::2
FF1E::3
FF1E::4
show ipv6 mld-proxy groups detail
Use this command to display information about multicast groups that MLD-Proxy reported.
Format
show ipv6 mld-proxy groups detail
Mode
• Privileged EXEC
• User EXEC
Field
Description
Interface
The interface number of the MLD-Proxy.
Group Address
Last Reporter
The IP address of the multicast group.
The IP address of the host that last sent a membership report for the current group,
on the network attached to the MLD-Proxy interface (upstream interface).
Up Time (in secs)
Member State
The time elapsed in seconds since last created.
Possible values are:
• Idle_Member. The interface has responded to the latest group membership query
for this group.
• Delay_Member. The interface is going to send a group membership report to
respond to a group membership query for this group.
Filter Mode
Possible values are Include or Exclude.
Sources
The number of sources attached to the multicast group.
The list of IP addresses of the sources attached to the multicast group.
The time left for a source to get deleted.
Group Source List
Expiry Time
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 igmp-proxy groups
Interface Index................................ 1/0/3
Group Address
Last Reporter
Up Time Member State
Filter Mode Sources
------------- ---------------- ----------- ----------------- ------------- -------
FF1E::1
FE80::100:2.3
244
DELAY_MEMBER
Exclude
2
Group Source List
------------------
2001::1
Expiry Time
---------------
00:02:40
IPv6 Multicast Commands
459
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
2001::2
--------
FF1E::2
FE80::100:2.3
243
DELAY_MEMBER Include
1
Group Source List
------------------
3001::1
Expiry Time
---------------
00:03:32
3002::2
00:03:32
FF1E::3
FE80::100:2.3
FE80::100:2.3
328
DELAY_MEMBER Exclude
DELAY_MEMBER Include
0
FF1E::4
255
4
Group Source List
------------------
4001::1
Expiry Time
---------------
00:03:40
5002::2
4001::2
5002::2
00:03:40
00:03:40
00:03:40
IPv6 Multicast Commands
460
Download from Www.Somanuals.com. All Manuals Search And Download.
9.
Quality of Service (QoS) Commands
9
This chapter describes the Quality of Service (QoS) commands available in the managed
switch CLI.
This chapter contains the following sections:
•
•
•
•
•
•
•
•
•
•
•
•
The commands in this chapter are in two functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
Class of Service (CoS) Commands
This section describes the commands you use to configure and view Class of Service (CoS)
settings for the switch. The commands in this section allow you to control the priority and
transmission rate of traffic.
461
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: Commands you issue in the Interface Config mode only affect a
single interface. Commands you issue in the Global Config mode
affect all interfaces.
classofservice dot1p-mapping
This command maps an 802.1p priority to an internal traffic class. The <userpriority>
values can range from 0-7. The <trafficclass>values range from 0-6, although the
actual number of available traffic classes depends on the platform. For more information
Format
Modes
classofservice dot1p-mapping <userpriority> <trafficclass>
• Global Config
• Interface Config
no classofservice dot1p-mapping
This command maps each 802.1p priority to its default internal traffic class value.
Format
Modes
no classofservice dot1p-mapping
• Global Config
• Interface Config
classofservice ip-dscp-mapping
This command maps an IP DSCP value to an internal traffic class. The <ipdscp> value is
specified as either an integer from 0 to 63, or symbolically through one of the following
keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1,
cs2, cs3, cs4, cs5, cs6, cs7, ef.
The <trafficclass>values can range from 0-6, although the actual number of available
traffic classes depends on the platform.
Format
Modes
classofservice ip-dscp-mapping <ipdscp> <trafficclass>
Global Config
no classofservice ip-dscp-mapping
This command maps each IP DSCP value to its default internal traffic class value.
Format
Modes
no classofservice ip-dscp-mapping
Global Config
Quality of Service (QoS) Commands
462
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
classofservice trust
This command sets the class of service trust mode of an interface. You can set the mode to
trust one of the Dot1p (802.1p), IP DSCP, or IP Precedence packet markings. You can also
set the interface mode to untrusted. If you configure an interface to use Dot1p, the mode
does not appear in the output of the show running configcommand because Dot1p is
the default.
Note: The classofservice trust dot1p command will not be supported in
future releases of the software because Dot1p is the default value.
Use the no classofservice trust command to set the mode to the
default value.
Default
dot1p
Format
Modes
classofservice trust {dot1p | ip-dscp | ip-precedence | untrusted}
• Global Config
• Interface Config
no classofservice trust
This command sets the interface mode to the default value.
Format
Modes
no classofservice trust
• Global Config
• Interface Config
cos-queue min-bandwidth
This command specifies the minimum transmission bandwidth guarantee for each interface
queue. The total number of queues supported per interface is platform specific. A value from
0-100 (percentage of link rate) must be specified for each supported queue, with 0 indicating
no guaranteed minimum bandwidth. The sum of all values entered must not exceed 100.
Format
Modes
cos-queue min-bandwidth <bw-0> <bw-1> … <bw-n>
• Global Config
• Interface Config
Quality of Service (QoS) Commands
463
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no cos-queue min-bandwidth
This command restores the default for each queue's minimum bandwidth value.
Format
Modes
no cos-queue min-bandwidth
• Global Config
• Interface Config
cos-queue strict
This command activates the strict priority scheduler mode for each specified queue.
Format
Modes
cos-queue strict <queue-id-1> [<queue-id-2> … <queue-id-n>]
• Global Config
• Interface Config
no cos-queue strict
This command restores the default weighted scheduler mode for each specified queue.
Format
Modes
no cos-queue strict <queue-id-1> [<queue-id-2> … <queue-id-n>]
• Global Config
• Interface Config
cos-queue random-detect
This command activates weighted random early discard (WRED) for each specified queue on
the interface. Specific WRED parameters are configured using the randomdetect
queue-parms and the random-detect exponential-weighting-constant commands. When
specified in Interface Config' mode, this command affects a single interface only, whereas in
Global Config mode, it applies to all interfaces. At least one, but no more than n, queue-id
values are specified with this command.
Duplicate queue-id values are ignored. Each queue-id value ranges from 0 to (n-1), where n
is the total number of queues supported per interface. The number n is platform dependant
and corresponds to the number of supported queues (traffic classes).
Format
Modes
cos-queue random-detect queue-id-1 [queue-id-2 … queue-id-n]
• Global Config
• Interface Config
Quality of Service (QoS) Commands
464
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no cos-queue random-detect
Use this command to disable WRED and restore the default tail drop operation for the
specified queues on all interfaces or one interface.
Format
Modes
cos-queue random-detect queue-id-1 [queue-id-2 … queue-id-n]
• Global Config
• Interface Config
random-detect exponential weighting-constant
Use this command to configure the WRED decay exponent for a CoS queue interface.
Format
Modes
random-detect exponential-weighting-constant 0-15
• Global Config
• Interface Config
Default
9
no random-detect exponential weighting-constant
Use this command to reset the WRED decay exponent to the default value on all interfaces
or one interface.
Format
Modes
no random-detect exponential-weighting-constant 0-15
• Global Config
• Interface Config
random-detect queue-parms
Use this command to configure WRED parameters for each drop precedence level supported
by a queue. Use it only when per-COS queue configuration is enabled (using the cos-queue
random-detect command).
min-thresh is the minimum threshold the queue depth (as a percentage) where WRED starts
marking and dropping traffic.
max-thresh is the maximum threshold is the queue depth (as a percentage) above which
WRED marks / drops all traffic.
drop-probability is the percentage probability that WRED will mark/drop a packet, when the
queue depth is at the maximum threshold. (The drop probability increases linearly from 0 just
before the minimum threshold, to this value at the maximum threshold, then goes to 100% for
larger queue depths). Each parameter is specified for each possible drop precedence ("color"
of TCP traffic).
Quality of Service (QoS) Commands
465
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The last precedence applies to all non-TCP traffic. For example, in a 3-color system, four of
each parameter specified: green TCP, yellow TCP, red TCP, and non-TCP, respectively.
Format
random-detect queue-parms queue-id-1 [queue-id-2 … queue-id-n]
minthresh thresh-prec-1 … thresh-prec-n max-thresh thresh-prec-1 …
threshprec-n drop-probability prob-prec-1 … prob-prec-n
Modes
• Global Config
• Interface Config
no random-detect queue-parms
Use this command to set the WRED configuration back to the default.
Format
Modes
no random-detect queue-parms queue-id-1 [queue-id-2 … queue-id-n]
• Global Config
• Interface Config
traffic-shape
This command specifies the maximum transmission bandwidth limit for the interface as a
whole. Also known as rate shaping, traffic shaping has the effect of smoothing temporary
traffic bursts over time so that the transmitted traffic rate is bounded.
Format
Modes
traffic-shape <bw>
• Global Config
• Interface Config
no traffic-shape
This command restores the interface shaping rate to the default value.
Format
Modes
no traffic-shape
• Global Config
• Interface Config
show classofservice dot1p-mapping
This command displays the current Dot1p (802.1p) priority mapping to internal traffic classes
for a specific interface. The <unit/slot/port>parameter is optional and is only valid on
platforms that support independent per-port class of service mappings. If specified, the
802.1p mapping table of the interface is displayed. If omitted, the most recent global
Format
Mode
show classofservice dot1p-mapping [<unit/slot/port>]
Privileged EXEC
Quality of Service (QoS) Commands
466
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following information is repeated for each user priority.
Term
Definition
User Priority
Traffic Class
The 802.1p user priority value.
The traffic class internal queue identifier to which the user priority value is mapped.
show classofservice ip-precedence-mapping
This command displays the current IP Precedence mapping to internal traffic classes for a
specific interface. The unit/slot/port parameter is optional and is only valid on platforms that
support independent per-port class of service mappings. If specified, the IP Precedence
mapping table of the interface is displayed. If omitted, the most recent global configuration
settings are displayed.
Format
Mode
show classofservice ip-precedence-mapping [<unit/slot/port>]
Privileged EXEC
The following information is repeated for each user priority.
Term
Definition
IP Precedence
Traffic Class
The IP Precedence value.
The traffic class internal queue identifier to which the IP Precedence value is mapped.
show classofservice ip-dscp-mapping
This command displays the current IP DSCP mapping to internal traffic classes for the global
configuration settings.
Format
Mode
show classofservice ip-dscp-mapping
Privileged EXEC
The following information is repeated for each user priority.
Term
Definition
IP DSCP
The IP DSCP value.
Traffic Class
The traffic class internal queue identifier to which the IP DSCP value is mapped.
show classofservice trust
This command displays the current trust mode setting for a specific interface. The
<unit/slot/port>parameter is optional and is only valid on platforms that support
independent per-port class of service mappings. If you specify an interface, the command
Quality of Service (QoS) Commands
467
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
displays the port trust mode of the interface. If you do not specify an interface, the command
displays the most recent global configuration settings.
Format
show classofservice trust [<unit/slot/port>]
Mode
Privileged EXEC
Term
Definition
Non-IP Traffic
Class
The traffic class used for non-IP traffic. This is only displayed when the COS trust mode
is set to trust IP Precedence or IP DSCP (on platforms that support IP DSCP).
Untrusted
Traffic Class
The traffic class used for all untrusted traffic. This is only displayed when the COS trust
mode is set to 'untrusted'.
show interfaces cos-queue
This command displays the class-of-service queue configuration for the specified interface.
The unit/slot/port parameter is optional and is only valid on platforms that support
independent per-port class of service mappings. If specified, the class-of-service queue
configuration of the interface is displayed. If omitted, the most recent global configuration
settings are displayed.
Format
Mode
show interfaces cos-queue [<unit/slot/port>]
Privileged EXEC
Term
Definition
Queue Id
An interface supports n queues numbered 0 to (n-1). The specific n value is platform
dependent.
Minimum
Bandwidth
The minimum transmission bandwidth guarantee for the queue, expressed as a
percentage. A value of 0 means bandwidth is not guaranteed and the queue operates
using best-effort. This is a configured value.
Scheduler Type
Indicates whether this queue is scheduled for transmission using a strict priority or a
weighted scheme. This is a configured value.
Queue
Management
Type
The queue depth management technique used for this queue (tail drop).
If you specify the interface, the command also displays the following information.
Term
Definition
Interface
The unit/slot/port of the interface. If displaying the global configuration, this output line is
replaced with a Global Config indication.
Interface
Shaping Rate
The maximum transmission bandwidth limit for the interface as a whole. It is independent
of any per-queue maximum bandwidth value(s) in effect for the interface. This is a
configured value.
Quality of Service (QoS) Commands
468
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Differentiated Services (DiffServ) Commands
This section describes the commands you use to configure QOS Differentiated Services
(DiffServ).
You configure DiffServ in several stages by specifying three DiffServ components:
1. Class
a. Creating and deleting classes.
b. Defining match criteria for a class.
2. Policy
a. Creating and deleting policies
b. Associating classes with a policy
c. Defining policy statements for a policy/class combination
3. Service
a. Adding and removing a policy to/from an inbound or outbound interface
The DiffServ class defines the packet filtering criteria. The attributes of a DiffServ policy
define the way the switch processes packets. You can define policy attributes on a per-class
instance basis. The switch applies these attributes when a match occurs.
Packet processing begins when the switch tests the match criteria for a packet. The switch
applies a policy to a packet when it finds a class match within that policy.
The following rules apply when you create a DiffServ class:
•
•
Each class can contain a maximum of one referenced (nested) class
Class definitions do not support hierarchical service policies
A given class definition can contain a maximum of one reference to another class. You can
combine the reference with other match criteria. The referenced class is truly a reference and
not a copy since additions to a referenced class affect all classes that reference it. Changes
to any class definition currently referenced by any other class must result in valid class
definitions for all derived classes, otherwise the switch rejects the change. You can remove a
class reference from a class definition.
The only way to remove an individual match criterion from an existing class definition is to
delete the class and re-create it.
Note: The mark possibilities for policing include CoS, IP DSCP, and IP
Precedence. While the latter two are only meaningful for IP packet
types, CoS marking is allowed for both IP and non-IP packets, since
it updates the 802.1p user priority field contained in the VLAN tag of
the layer 2 packet header.
Quality of Service (QoS) Commands
469
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
diffserv
This command sets the DiffServ operational mode to active. While disabled, the DiffServ
configuration is retained and can be changed, but it is not activated. When enabled, DiffServ
services are activated.
Format
diffserv
Mode
Global Config
no diffserv
This command sets the DiffServ operational mode to inactive. While disabled, the DiffServ
configuration is retained and can be changed, but it is not activated. When enabled, DiffServ
services are activated.
Format
Mode
no diffserv
Global Config
DiffServ Class Commands
Use the DiffServ class commands to define traffic classification. To classify traffic, you specify
Behavior Aggregate (BA), based on DSCP and Multi-Field (MF) classes of traffic (name,
match criteria)
This set of commands consists of class creation/deletion and matching, with the class match
commands specifying Layer 3, Layer 2, and general match criteria. The class match criteria
are also known as class rules, with a class definition consisting of one or more rules to
identify the traffic that belongs to the class.
Note: Once you create a class match criterion for a class, you cannot
change or delete the criterion. To change or delete a class match
criterion, you must delete and re-create the entire class.
The CLI command root is class-map.
class-map
This command defines a DiffServ class of type match-all. When used without any match
condition, this command enters the class-map mode. The <class-map-name>is a case
sensitive alphanumeric string from 1 to 31 characters uniquely identifying an existing DiffServ
class.
Quality of Service (QoS) Commands
470
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: The class-map-name defaultis reserved and must not be used.
The class type of match-all indicates all of the individual match conditions must be true for
a packet to be considered a member of the class. This command may be used without
specifying a class type to enter the Class-Map Config mode for an existing DiffServ class.
Note: The optional keywords [{ipv4 | ipv6}] specify the Layer 3
protocol for this class. If not specified, this parameter defaults to
ipv4. This maintains backward compatibility for configurations
defined on systems before IPv6 match items were supported.
Note: The CLI mode is changed to Class-Map Config or Ipv6-Class-Map
Config when this command is successfully executed depending on
the [{ipv4 | ipv6}] keyword specified.
Format
Mode
class-map match-all <class-map-name> [{ipv4 | ipv6}]
Global Config
no class-map
This command eliminates an existing DiffServ class. The <class-map-name>is the name
of an existing DiffServ class. (The class name ‘default’ is reserved and is not allowed here.)
This command may be issued at any time; if the class is currently referenced by one or more
policies or by any other class, the delete action fails.
Format
Mode
no class-map <class-map-name>
Global Config
class-map rename
This command changes the name of a DiffServ class. The <class-map-name> is the
name of an existing DiffServ class. The <new-class-map-name> parameter is a
case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the class.
Default
none
Format
Mode
class-map rename <class-map-name> <new-class-map-name>
Global Config
Quality of Service (QoS) Commands
471
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
match ethertype
This command adds to the specified class definition a match condition based on the value of
the ethertype. The <ethertype>value is specified as one of the following keywords:
appletalk, arp, ibmsna, ipv4, ipv6, ipx, mplsmcast, mplsucast, netbios,
novell, pppoe, rarpor as a custom ethertype value in the range of 0x0600-0xFFFF.
Format
match ethertype {<keyword> | custom <0x0600-0xFFFF>}
Mode
Class-Map Config
Ipv6-Class-Map Config
match any
This command adds to the specified class definition a match condition whereby all packets
are considered to belong to the class.
Default
none
Format
Mode
match any
Class-Map Config
Ipv6-Class-Map Config
match class-map
This command adds to the specified class definition the set of match conditions defined for
another class. The <refclassname>is the name of an existing DiffServ class whose match
conditions are being referenced by the specified class definition.
Default
Format
Mode
none
match class-map <refclassname>
Class-Map Config
Ipv6-Class-Map Config
Note the following:
•
•
•
The parameters <refclassname> and <class-map-name> can not be the same.
Only one other class may be referenced by a class.
Any attempts to delete the <refclassname> class while the class is still referenced by any
<class-map-name> fails.
•
•
•
The combined match criteria of <class-map-name> and <refclassname> must be an
allowed combination based on the class type.
Any subsequent changes to the <refclassname> class match criteria must maintain this
validity, or the change attempt fails.
The total number of class rules formed by the complete reference class chain (including
both predecessor and successor classes) must not exceed a platform-specific maximum.
Quality of Service (QoS) Commands
472
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
In some cases, each removal of a refclass rule reduces the maximum number of
available rules in the class definition by one.
no match class-map
This command removes from the specified class definition the set of match conditions
defined for another class. The <refclassname>is the name of an existing DiffServ class
whose match conditions are being referenced by the specified class definition.
Format
no match class-map <refclassname>
Mode
Class-Map Config
Ipv6-Class-Map Config
match cos
This command adds to the specified class definition a match condition for the Class of
Service value (the only tag in a single tagged packet or the first or outer 802.1Q tag of a
double VLAN tagged packet). The value may be from 0 to 7.
Default
none
Format
Mode
match cos <0-7>
Class-Map Config
Ipv6-Class-Map Config
match secondary cos
This command adds to the specified class definition a match condition for the secondary
Class of Service value (the only tag in a single tagged packet or the first or outer 802.1Q tag
of a double VLAN tagged packet). The value may be from 0 to 7.
Default
none
Format
Mode
match secondary-cos <0-7>
Class-Map Config
match ip6flowlbl
This command adds to the specified class definition a match condition based on the
IP6flowlbl of a packet. The labelis the value to match in the Flow Label field of the IPv6
header (range 0-1048575).
Format
Mode
match ip6flowlbl <label>
Ipv6-Class-Map Configuration mode
Quality of Service (QoS) Commands
473
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
match destination-address mac
This command adds to the specified class definition a match condition based on the
destination MAC address of a packet. The <macaddr>parameter is any layer 2 MAC
address formatted as six, two-digit hexadecimal numbers separated by colons (e.g.,
00:11:22:dd:ee:ff). The <macmask>parameter is a layer 2 MAC address bit mask, which
need not be contiguous, and is formatted as six, two-digit hexadecimal numbers separated
by colons (e.g., ff:07:23:ff:fe:dc).
Default
none
Format
Mode
match destination-address mac <macaddr> <macmask>
Class-Map Config
Ipv6-Class-Map Config
match dstip
This command adds to the specified class definition a match condition based on the
destination IP address of a packet. The <ipaddr>parameter specifies an IP address. The
<ipmask>parameter specifies an IP address bit mask and must consist of a contiguous set
of leading 1 bits.
Default
none
Format
Mode
match dstip <ipaddr> <ipmask>
Class-Map Config
match dstip6
This command adds to the specified class definition a match condition based on the
destination IPv6 address of a packet.
Default
none
Format
Mode
match dstip6 <destination-ipv6-prefix/prefix-length>
Ipv6-Class-Map Config
match dstl4port
This command adds to the specified class definition a match condition based on the
destination layer 4 port of a packet using a single keyword or numeric notation. To specify the
match condition as a single keyword, the value for <portkey> is one of the supported port
name keywords. The currently supported <portkey>values are: domain, echo, ftp, ftpdata,
http, smtp, snmp, telnet, tftp, www. Each of these translates into its equivalent port number.
Quality of Service (QoS) Commands
474
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
To specify the match condition using a numeric notation, one layer 4 port number is required.
The port number is an integer from 0 to 65535.
Default
none
Format
Mode
match dstl4port {<portkey> | <0-65535>}
Class-Map Config
Ipv6-Class-Map Config
match ip dscp
This command adds to the specified class definition a match condition based on the value of
the IP DiffServ Code Point (DSCP) field in a packet, which is defined as the high-order six
bits of the Service Type octet in the IP header (the low-order two bits are not checked).
The <dscpval>value is specified as either an integer from 0 to 63, or symbolically through
one of the following keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42,
af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef.
Note: The ip dscp, ip precedence, and ip tos match conditions are
alternative ways to specify a match criterion for the same Service
Type field in the IP header, but with a slightly different user notation.
Default
none
Format
Mode
match ip dscp <dscpval>
Class-Map Config
Ipv6-Class-Map Config
match ip precedence
This command adds to the specified class definition a match condition based on the value of
the IP Precedence field in a packet, which is defined as the high-order three bits of the
Service Type octet in the IP header (the low-order five bits are not checked). The precedence
value is an integer from 0 to 7.
Note: The IP DSCP, IP Precedence, and IP ToS match conditions are
alternative ways to specify a match criterion for the same Service
Type field in the IP header, but with a slightly different user notation.
Quality of Service (QoS) Commands
475
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Default
none
Format
Mode
match ip precedence <0-7>
Class-Map Config
match ip tos
This command adds to the specified class definition a match condition based on the value of
the IP TOS field in a packet, which is defined as all eight bits of the Service Type octet in the
IP header. The value of <tosbits>is a two-digit hexadecimal number from 00 to ff. The
value of <tosmask>is a two-digit hexadecimal number from 00 to ff. The <tosmask>
denotes the bit positions in <tosbits>that are used for comparison against the IP TOS field
in a packet. For example, to check for an IP TOS value having bits 7 and 5 set and bit 1 clear,
where bit 7 is most significant, use a <tosbits>value of a0 (hex) and a <tosmask>of a2
(hex).
Note: The IP DSCP, IP Precedence, and IP ToS match conditions are
alternative ways to specify a match criterion for the same Service
Type field in the IP header, but with a slightly different user notation.
Note: This “free form” version of the IP DSCP/Precedence/TOS match
specification gives the user complete control when specifying which
bits of the IP Service Type field are checked.
Default
none
Format
Mode
match ip tos <tosbits> <tosmask>
Class-Map Config
match protocol
This command adds to the specified class definition a match condition based on the value of
the IP Protocol field in a packet using a single keyword notation or a numeric value notation.
To specify the match condition using a single keyword notation, the value for
<protocol-name>is one of the supported protocol name keywords. The currently
supported values are: icmp, igmp, ip, tcp, udp. A value of ipmatches all protocol number
values.
To specify the match condition using a numeric value notation, the protocol number is a
standard value assigned by IANA and is interpreted as an integer from 0 to 255.
Quality of Service (QoS) Commands
476
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: This command does not validate the protocol number value against
the current list defined by IANA.
Default
none
Format
Mode
match protocol {<protocol-name> | <0-255>}
Class-Map Config
Ipv6-Class-Map Config
match source-address mac
This command adds to the specified class definition a match condition based on the source
MAC address of a packet. The <address>parameter is any layer 2 MAC address formatted
as six, two-digit hexadecimal numbers separated by colons (e.g., 00:11:22:dd:ee:ff). The
<macmask> parameter is a layer 2 MAC address bit mask, which may not be contiguous,
and is formatted as six, two-digit hexadecimal numbers separated by colons (e.g.,
ff:07:23:ff:fe:dc).
Default
none
Format
Mode
match source-address mac <address> <macmask>
Class-Map Config
Ipv6-Class-Map Config
match srcip
This command adds to the specified class definition a match condition based on the source
IP address of a packet. The <ipaddr>parameter specifies an IP address. The <ipmask>
parameter specifies an IP address bit mask and must consist of a contiguous set of leading 1
bits.
Default
none
Format
Mode
match srcip <ipaddr> <ipmask>
Class-Map Config
match srcip6
This command adds to the specified class definition a match condition based on the source
IP address of a packet.
Default
none
Quality of Service (QoS) Commands
477
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
match srcip6 <source-ipv6-prefix/prefix-length>
Ipv6-Class-Map Config
match srcl4port
This command adds to the specified class definition a match condition based on the source
layer 4 port of a packet using a single keyword or numeric notation. To specify the match
condition as a single keyword notation, the value for <portkey>is one of the supported port
name keywords (listed below). The currently supported <portkey>values are: domain,
echo, ftp, ftpdata, http, smtp, snmp, telnet, tftp, www. Each of these translates into its
equivalent port number, which is used as both the start and end of a port range.
To specify the match condition as a numeric value, one layer 4 port number is required. The
port number is an integer from 0 to 65535.
Default
none
Format
Mode
match srcl4port {<portkey> | <0-65535>}
Class-Map Config
Ipv6-Class-Map Config
match vlan
This command adds to the specified class definition a match condition based on the value of
the layer 2 VLAN Identifier field (the 802.1Q tag of a VLAN tagged packet). The VLAN is an
integer from 0 to 4095.
Default
none
Format
Mode
match vlan {<0-4095>}
Class-Map Config
Ipv6-Class-Map Config
match secondary-vlan
This command adds to the specified class definition a match condition based on the value of
the layer 2 secondary VLAN Identifier field (the 802.1Q tag of a double VLAN tagged packet).
The VLAN is an integer from 0 to 4095.
Default
none
Format
Mode
match secondary-vlan {<0-4095>}
Class-Map Config
Ipv6-Class-Map Config
Quality of Service (QoS) Commands
478
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
DiffServ Policy Commands
Use the DiffServ policy commands to specify traffic conditioning actions, such as policing and
marking, to apply to traffic classes
Use the policy commands to associate a traffic class that you define by using the class
command set with one or more QoS policy attributes. Assign the class/policy association to
an interface to form a service. Specify the policy name when you create the policy.
Each traffic class defines a particular treatment for packets that match the class definition.
You can associate multiple traffic classes with a single policy. When a packet satisfies the
conditions of more than one class, preference is based on the order in which you add the
classes to the policy. The first class you add has the highest precedence.
This set of commands consists of policy creation/deletion, class addition/removal, and
individual policy attributes.
Note: The only way to remove an individual policy attribute from a class
instance within a policy is to remove the class instance and re-add it
to the policy. The values associated with an existing policy attribute
can be changed without removing the class instance.
The CLI command root is policy-map.
assign-queue
This command modifies the queue id to which the associated traffic stream is assigned. The
queueidis an integer from 0 to n-1, where nis the number of egress queues supported by
the device.
Format
Mode
assign-queue <queueid>
Policy-Class-Map Config
Drop
Incompatibilities
drop
This command specifies that all packets for the associated traffic stream are to be dropped at
ingress.
Format
drop
Mode
Policy-Class-Map Config
Incompatibilities
Assign Queue, Mark (all forms), Mirror, Police, Redirect
Quality of Service (QoS) Commands
479
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
mirror
This command specifies that all incoming packets for the associated traffic stream are copied
to a specific egress interface (physical port or LAG).
Format
mirror <unit/slot/port>
Policy-Class-Map Config
Drop, Redirect
Mode
Incompatibilities
redirect
This command specifies that all incoming packets for the associated traffic stream are
redirected to a specific egress interface (physical port or port-channel).
Format
redirect<unit/slot/port>
Policy-Class-Map Config
Drop, Mirror
Mode
Incompatibilities
conform-color
Use this command to enable color-aware traffic policing and define the conform-color class
map. Used in conjunction with the police command where the fields for the conform level are
specified. The <class-map-name>parameter is the name of an existing DiffServ class
map.
Note: This command may only be used after specifying a police command
for the policy-class instance.
Format
conform-color <class-map-name>
Mode
Policy-Class-Map Config
class
This command creates an instance of a class definition within the specified policy for the
purpose of defining treatment of the traffic class through subsequent policy attribute
statements. The <classname>is the name of an existing DiffServ class.
Note: This command causes the specified policy to create a reference to
the class definition.
Quality of Service (QoS) Commands
480
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: The CLI mode is changed to Policy-Class-Map Config when this
command is successfully executed.
Format
Mode
class <classname>
Policy-Map Config
no class
This command deletes the instance of a particular class and its defined treatment from the
specified policy. <classname>is the names of an existing DiffServ class.
Note: This command removes the reference to the class definition for the
specified policy.
Format
no class <classname>
Mode
Policy-Map Config
mark cos
This command marks all packets for the associated traffic stream with the specified class of
service value in the priority field of the 802.1p header (the only tag in a single tagged packet
or the first or outer 802.1Q tag of a double VLAN tagged packet). If the packet does not
already contain this header, one is inserted. The CoS value is an integer from 0 to 7.
Default
1
Format
Mode
mark-cos <0-7>
Policy-Class-Map Config
Incompatibilities
Drop, Mark IP DSCP, IP Precedence, Police
mark cos-as-sec-cos
This command marks outer VLAN tag priority bits of all packets as the inner VLAN tag
priority, marking CoS as Secondary CoS. This essentially means that the inner VLAN tag
CoS is copied to the outer VLAN tag CoS.
Format
mark-cos-as-sec-cos
Quality of Service (QoS) Commands
481
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Mode
Policy-Class-Map Config
Drop, Mark IP DSCP, IP Precedence, Police
Incompatibilities
mark ip-dscp
This command marks all packets for the associated traffic stream with the specified IP DSCP
value.
The <dscpval> value is specified as either an integer from 0 to 63, or symbolically through
one of the following keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42,
af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef.
Format
mark ip-dscp <dscpval>
Mode
Policy-Class-Map Config
Incompatibilities
Drop, Mark CoS, Mark IP Precedence, Police
mark ip-precedence
This command marks all packets for the associated traffic stream with the specified IP
Precedence value. The IP Precedence value is an integer from 0 to 7.
Note: This command may not be used on IPv6 classes. IPv6 does not
have a precedence field.
Format
Mode
mark ip-precedence <0-7>
Policy-Class-Map Config
Incompatibilitie
s
Drop, Mark CoS, Mark IP Precedence, Police
Policy Type
In
police-simple
This command is used to establish the traffic policing style for the specified class. The simple
form of the police command uses a single data rate and burst size, resulting in two outcomes:
conform and violate. The conforming data rate is specified in kilobits-per-second (Kbps) and
is an integer from 1 to 4294967295. The conforming burst size is specified in kilobytes (KB)
and is an integer from 1 to 128.
For each outcome, the only possible actions are drop, set-cos-transmit, set-dscp-transmit,
set-prec-transmit, or transmit. In this simple form of the police command, the conform action
defaults to transmit and the violate action defaults to drop.
Quality of Service (QoS) Commands
482
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
For set-dscp-transmit, a <dscpval>value is required and is specified as either an integer
from 0 to 63, or symbolically through one of the following keywords: af11, af12, af13, af21,
af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef.
For set-prec-transmit, an IP Precedence value is required and is specified as an integer from
0-7.
For set-cos-transmit an 802.1p priority value is required and is specified as an integer from
0-7.
Format
police-simple {<1-4294967295> <1-128> conform-action {drop |
set-prec-transmit <0-7> | set-dscp-transmit <0-63> |
set-cos-transmit <0-7> | transmit} [violate-action {drop |
set-prec-transmit <0-7> | set-dscp-transmit <0-63> |
set-cos-transmit <0-7> | transmit}]}
Mode
Policy-Class-Map Config
Drop, Mark (all forms)
Incompatibilities
police-two-rate
This command is the two-rate form of the policecommand and is used to establish the
traffic policing style for the specified class. For each outcome, the only possible actions are
drop, set-cos-as-sec-cos, set-cos-transmit, set-sec-cos-transmit, set-dscp-transmit,
set-prec-transmit, or transmit. In this two-rate form of the policecommand, the conform
action defaults to send, the exceed action defaults to drop, and the violate action defaults to
drop. These actions can be set with this command once the style has been configured.
Format
police-two-rate {<1-4294967295> <1-128> <1-4294967295> <1-128>
conform-action {drop | set-cos-as-sec-cos | set-cos-transmit <0-7>
| set-sec-cos-transmit <0-7> | set-prec-transmit <0-7> |
set-dscp-transmit <0-63> | transmit} exceed-action {drop |
set-cos-as-sec-cos | set-cos-transmit <0-7> | set-sec-cos-transmit
<0-7> | set-prec-transmit <0-7> | set-dscp-transmit <0-63> |
transmit} violate-action {drop | set-cos-as-sec-cos |
set-cos-transmit <0-7> | set-sec-cos-transmit <0-7> |
set-prec-transmit <0-7> | set-dscp-transmit <0-63> | transmit}}
Mode
Policy-Class-Map Config
policy-map
This command establishes a new DiffServ policy. The <policyname>parameter is a
case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the policy.
The type of policy is specific to the inbound traffic direction as indicated by the in parameter
Note: The CLI mode is changed to Policy-Map Config when this command
is successfully executed.
Quality of Service (QoS) Commands
483
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
policy-map <policyname> [in|out]
Global Config
no policy-map
This command eliminates an existing DiffServ policy. The <policyname>parameter is the
name of an existing DiffServ policy. This command may be issued at any time. If the policy is
currently referenced by one or more interface service attachments, this delete attempt fails.
Format
Mode
no policy-map <policyname>
Global Config
policy-map rename
This command changes the name of a DiffServ policy. The <policyname> is the name of
an existing DiffServ class. The <newpolicyname> parameter is a case-sensitive
alphanumeric string from 1 to 31 characters uniquely identifying the policy.
Format
Mode
policy-map rename <policyname> <newpolicyname>
Global Config
DiffServ Service Commands
Use the DiffServ service commands to assign a DiffServ traffic conditioning policy, which you
specified by using the policy commands, to an interface in the incoming direction
The service commands attach a defined policy to a directional interface. You can assign only
one policy at any one time to an interface in the inbound direction. DiffServ is not used in the
outbound direction.
This set of commands consists of service addition/removal.
The CLI command root is service-policy.
service-policy
This command attaches a policy to an interface in the inbound direction. The <policyname>
parameter is the name of an existing DiffServ policy. This command causes a service to
create a reference to the policy.
Note: This command effectively enables DiffServ on an interface in the
inbound direction. There is no separate interface administrative
'mode' command for DiffServ.
Quality of Service (QoS) Commands
484
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: This command fails if any attributes within the policy definition
exceed the capabilities of the interface. Once a policy is successfully
attached to an interface, any attempt to change the policy definition,
that would result in a violation of the interface capabilities, causes
the policy change attempt to fail.
Format
Modes
service-policy {in|out} <policymapname>
• Global Config
• Interface Config
Note: Each interface can have one policy attached.
no service-policy
This command detaches a policy from an interface in the inbound direction. The
<policyname>parameter is the name of an existing DiffServ policy.
Note: This command causes a service to remove its reference to the
policy. This command effectively disables DiffServ on an interface in
the inbound direction. There is no separate interface administrative
'mode' command for DiffServ.
Format
Modes
no service-policy in <policymapname>
• Global Config
• Interface Config
DiffServ Show Commands
Use the DiffServ show commands to display configuration and status information for classes,
policies, and services. You can display DiffServ information in summary or detailed formats.
The status information is only shown when the DiffServ administrative mode is enabled.
Quality of Service (QoS) Commands
485
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show class-map
This command displays all configuration information for the specified class. The
<class-name> is the name of an existing DiffServ class.
Format
Modes
show class-map <class-name>
• Privileged EXEC
• User EXEC
If the class-name is specified the following fields are displayed:
Term
Definition
Class Name
Class Type
The name of this class.
A class type of ‘all’ means every match criterion defined for the class is evaluated
simultaneously and must all be true to indicate a class match.
Class Layer3
Protocol
The Layer 3 protocol for this class. Possible values are IPv4 and IPv6.
Match Criteria
The Match Criteria fields are only displayed if they have been configured. Not all
platforms support all match criteria values. They are displayed in the order entered by the
user. The fields are evaluated in accordance with the class type. The possible Match
Criteria fields are: Destination IP Address, Destination Layer 4 Port, Destination MAC
Address, Ethertype, Source MAC Address, VLAN, Class of Service, Every, IP DSCP, IP
Precedence, IP TOS, Protocol Keyword, Reference Class, Source IP Address, and
Source Layer 4 Port.
Values
The values of the Match Criteria.
If you do not specify the Class Name, this command displays a list of all defined DiffServ
classes. The following fields are displayed:
Term
Definition
Class Name
The name of this class. (Note that the order in which classes are displayed is not
necessarily the same order in which they were created.)
Class Type
A class type of ‘all’ means every match criterion defined for the class is evaluated
simultaneously and must all be true to indicate a class match.
Reference
Class Name
The name of an existing DiffServ class whose match conditions are being referenced by
the specified class definition.
show diffserv
This command displays the DiffServ General Status Group information, which includes the
current administrative mode setting as well as the current and maximum number of rows in
each of the main DiffServ private MIB tables. This command takes no options.
Format
Mode
show diffserv
Privileged EXEC
Quality of Service (QoS) Commands
486
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
DiffServ Admin mode
The current value of the DiffServ administrative mode.
Class Table Size
Current /Max
The current number of entries (rows) and the maximum allowed entries (rows) in
the Class Table.
Class Rule Table Size
Current /Max
The current number of entries (rows) and the maximum allowed entries (rows) in
the Class Rule Table.
Policy Table Size
Current /Max
The current number of entries (rows) and the maximum allowed entries (rows) in
the Policy Table.
Policy Instance Table
Size Current /Max
Current number of entries (rows)
the Policy Instance Table.
in
Policy Attribute Table
Size Current /Max
Current number of entries (rows) and the maximum allowed entries (rows) in the
Policy Attribute Table.
Service Table Size
Current /Max
The current number of entries (rows) i and the maximum allowed entries (rows) in
the Service Table.
show policy-map
This command displays all configuration information for the specified policy. The
<policyname>is the name of an existing DiffServ policy.
Format
Mode
show policy-map [policyname]
Privileged EXEC
If the Policy Name is specified the following fields are displayed:
Term
Definition
Policy Name
Policy Type
The name of this policy.
The policy type (Only inbound policy definitions are supported for this platform.)
The following information is repeated for each class associated with this policy (only those
policy attributes actually configured are displayed):
Term
Definition
Assign Queue
Directs traffic stream to the specified QoS queue. This allows a traffic classifier to specify
which one of the supported hardware queues are used for handling packets belonging to
the class.
Class Name
The name of this class.
Committed
Burst Size (KB)
The committed burst size, used in simple policing.
CommittedRate
(Kbps)
The committed rate, used in simple policing,
Quality of Service (QoS) Commands
487
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Conform Action
The current setting for the action taken on a packet considered to conform to the policing
parameters. This is not displayed if policing is not in use for the class under this policy.
Conform COS
The CoS mark value if the conform action is set-cos-transmit.
The DSCP mark value if the conform action is set-dscp-transmit.
Conform DSCP
Value
Conform IP
Precedence
Value
The IP Precedence mark value if the conform action is set-prec-transmit.
Drop
Drop a packet upon arrival. This is useful for emulating access control list operation using
DiffServ, especially when DiffServ and ACL cannot co-exist on the same interface.
Mark CoS
Mark IP DSCP
The class of service value that is set in the 802.1p header of inbound packets. This is not
displayed if the mark cos was not specified.
The mark/re-mark value used as the DSCP for traffic matching this class. This is not
displayed if mark ip description is not specified.
Mark IP
Precedence
The mark/re-mark value used as the IP Precedence for traffic matching this class. This is
not displayed if mark ip precedence is not specified.
Mirror
Copies a classified traffic stream to a specified egress port (physical port or LAG). This
can occur in addition to any marking or policing action. It may also be specified along
with a QoS queue assignment.
Non-Conform
Action
The current setting for the action taken on a packet considered to not conform to the
policing parameters. This is not displayed if policing not in use for the class under this
policy.
Non-Conform
COS
The CoS mark value if the non-conform action is set-cos-transmit.
The DSCP mark value if the non-conform action is set-dscp-transmit.
The IP Precedence mark value if the non-conform action is set-prec-transmit.
Non-Conform
DSCP Value
Non-ConformIP
Precedence
Value
Policing Style
Redirect
The style of policing, if any, used (simple).
Forces a classified traffic stream to a specified egress port (physical port or LAG). This
can occur in addition to any marking or policing action. It may also be specified along
with a QoS queue assignment.
If the Policy Name is not specified this command displays a list of all defined DiffServ policies.
The following fields are displayed:
Term
Policy Name
Definition
The name of this policy. (The order in which the policies are displayed is not necessarily
the same order in which they were created.)
Quality of Service (QoS) Commands
488
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Policy Type
The policy type (Only inbound is supported).
Class Members
List of all class names associated with this policy.
show diffserv service
This command displays policy service information for the specified interface and direction.
The <unit/slot/port> parameter specifies a valid unit/slot/port number for the system.
Format
Mode
show diffserv service <unit/slot/port> [in | out]
Privileged EXEC
Term
Definition
DiffServ Admin
Mode
The current setting of the DiffServ administrative mode. An attached policy is only in
effect on an interface while DiffServ is in an enabled mode.
Interface
Direction
Valid slot and port number separated by forward slashes.
The traffic direction of this interface service.
Operational
Status
The current operational status of this DiffServ service interface.
Policy Name
Policy Details
The name of the policy attached to the interface in the indicated direction.
Attached policy details, whose content is identical to that described for the show
policy-map <policymapname> command (content not repeated here for brevity).
show diffserv service brief
This command displays all interfaces in the system to which a DiffServ policy has been
attached. The inbound direction parameter is optional.
Format
Mode
show diffserv service brief [in | out]
Privileged EXEC
Term
Definition
DiffServ Admin
Mode
The current setting of the DiffServ administrative mode. An attached policy is only active
on an interface while DiffServ is in an enabled mode.
The following information is repeated for interface and direction (only those interfaces
configured with an attached policy are shown):
Term
Definition
Interface
Direction
Valid slot and port number separated by forward slashes.
The traffic direction of this interface service.
Quality of Service (QoS) Commands
489
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
OperStatus
The current operational status of this DiffServ service interface.
Policy Name
The name of the policy attached to the interface in the indicated direction.
show policy-map interface
This command displays policy-oriented statistics information for the specified interface and
direction. The <unit/slot/port> parameter specifies a valid interface for the system.
Note: This command is only allowed while the DiffServ administrative
mode is enabled.
Format
Mode
show policy-map interface <unit/slot/port> [in | out]
Privileged EXEC
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The traffic direction of this interface service.
The current operational status of this DiffServ service interface.
Direction
Operational
Status
Policy Name
The name of the policy attached to the interface in the indicated direction.
The following information is repeated for each class instance within this policy:
Term
Definition
Class Name
The name of this class instance.
In Discarded
Packets
A count of the packets discarded for this class instance for any reason due to DiffServ
treatment of the traffic class.
show service-policy
This command displays a summary of policy-oriented statistics information for all interfaces in
the specified direction.
Format
Mode
show service-policy {in|out}
Privileged EXEC
Quality of Service (QoS) Commands
490
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following information is repeated for each interface and direction (only those interfaces
configured with an attached policy are shown):
Term
Definition
Interface
Valid slot and port number separated by forward slashes.
The current operational status of this DiffServ service interface.
Operational
Status
Policy Name
The name of the policy attached to the interface.
MAC Access Control List (ACL) Commands
This section describes the commands you use to configure MAC ACL settings. MAC ACLs
ensure that only authorized users have access to specific resources and block any
unwarranted attempts to reach network resources.
The following rules apply to MAC ACLs:
•
The maximum number of ACLs you can create is hardware dependent. The limit applies
to all ACLs, regardless of type.
•
•
The system supports only Ethernet II frame types.
The maximum number of rules per MAC ACL is hardware dependent.
mac access-list extended
This command creates a MAC Access Control List (ACL) identified by <name>, consisting of
classification fields defined for the Layer 2 header of an Ethernet frame. The <name>
parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely
identifying the MAC access list.
If a MAC ACL by this name already exists, this command enters Mac-Access-List config
mode to allow updating the existing MAC ACL.
Note: The CLI mode changes to Mac-Access-List Config mode when you
successfully execute this command.
Format
Mode
mac access-list extended <name>
Global Config
Quality of Service (QoS) Commands
491
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no mac access-list extended
This command deletes a MAC ACL identified by <name>from the system.
Format
Mode
no mac access-list extended <name>
Global Config
mac access-list extended rename
This command changes the name of a MAC Access Control List (ACL). The <name>
parameter is the name of an existing MAC ACL. The <newname>parameter is a
case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the MAC
access list.
This command fails if a MAC ACL by the name <newname>already exists.
Format
Mode
mac access-list extended rename <name> <newname>
Global Config
{deny | permit} (MAC ACL)
This command creates a new rule for the current MAC access list. Each rule is appended to
the list of configured rules for the list.
Note: The 'no' form of this command is not supported, since the rules
within a MAC ACL cannot be deleted individually. Rather, the entire
MAC ACL must be deleted and re-specified.
Note: An implicit 'deny all' MAC rule always terminates the access list.
A rule may either deny or permit traffic according to the specified classification fields. At a
minimum, the source and destination MAC value must be specified, each of which may be
substituted using the keyword any to indicate a match on any value in that field. The
remaining command parameters are all optional, but the most frequently used parameters
appear in the same relative order as shown in the command format.
The Ethertype may be specified as either a keyword or a four-digit hexadecimal value from
0x0600-0xFFFF. The currently supported <ethertypekey>values are: appletalk, arp,
ibmsna, ipv4, ipv6, ipx, mplsmcast, mplsucast, netbios, novell, pppoe, rarp. Each of these
translates into its equivalent Ethertype value(s).
The time-range parameter allows imposing time limitation on the MAC ACL rule
asdefined by the parameter <time-range-name>. If a time range with the specified namedoes
not exist and the MAC ACL containing this ACL rule is applied to an interface orbound to a
Quality of Service (QoS) Commands
492
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
VLAN, then the ACL rule is applied immediately. If a time range withspecified name exists
and the MAC ACL containing this ACL rule is applied to aninterface or bound to a VLAN, then
the ACL rule is applied when the time-range withspecified name becomes active. The ACL
rule is removed when the time-range withspecified name becomes inactive.
Ethertype Keyword
appletalk
arp
Corresponding Value
0x809B
0x0806
ibmsna
ipv4
0x80D5
0x0800
ipv6
0x86DD
ipx
0x8037
mplsmcast
mplsucast
netbios
novell
0x8848
0x8847
0x8191
0x8137, 0x8138
0x8863, 0x8864
0x8035
pppoe
rarp
The vlan and cos parameters refer to the VLAN identifier and 802.1p user priority fields,
respectively, of the VLAN tag. For packets containing a double VLAN tag, this is the first (or
outer) tag.
The assign-queue parameter allows specification of a particular hardware queue for handling
traffic that matches this rule. The allowed <queue-id>value is 0-(n-1), where n is the
number of user configurable queues available for the hardware platform. The
assign-queueparameter is valid only for a permitrule.
Note: The special command form {deny | permit} any any is used to match
all Ethernet layer 2 packets, and is the equivalent of the IP access
list “match every” rule.
Format
{deny|permit} {<srcmac> | any} {<dstmac> | any} [<ethertypekey> |
<0x0600-0xFFFF>] [vlan {eq <0-4095>}] [cos <0-7>] [[log] [time-range
<time-range-name>][assign-queue <queue-id>]] [{mirror | redirect}
<unit/slot/port>]
Mode
Mac-Access-List Config
Quality of Service (QoS) Commands
493
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
mac access-group
This command either attaches a specific MAC Access Control List (ACL) identified by
<name>to an interface, or associates it with a VLAN ID, in a given direction. The <name>
parameter must be the name of an existing MAC ACL.
An optional sequence number may be specified to indicate the order of this mac access list
relative to other mac access lists already assigned to this interface and direction. A lower
number indicates higher precedence order. If a sequence number is already in use for this
interface and direction, the specified mac access list replaces the currently attached mac
access list using that sequence number. If the sequence number is not specified for this
command, a sequence number that is one greater than the highest sequence number
currently in use for this interface and direction is used.
This command specified in Interface Config mode only affects a single interface, whereas the
Global Config mode setting is applied to all interfaces. The VLAN keyword is only valid in the
Global Config mode. The Interface Config mode command is available only on platforms that
support independent per-port class of service queue configuration.
An optional control-plane is specified to apply the MAC ACL on the CPU port. The control
packets, like BPDU, are also dropped because of the implicit deny all rule added to the end of
the list. To overcome this, permit rules must be added to allow the control packets.
Note: The <out> option might or might not be available, depending on the
platform.
The control-plane keyword is available only in Global Config mode.
Format
Modes
mac access-group <name> {{control-plane|in|out} vlan vlan-id
{in|out}} [sequence <1-4294967295>]
• Global Config
• Interface Config
no mac access-group
This command removes a MAC ACL identified by <name>from the interface in a given
direction.
Format
Modes
no mac access-group <name> {{control-plane|in|out} vlan vlan-id
{in|out}}
• Global Config
• Interface Config
Quality of Service (QoS) Commands
494
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show mac access-lists
This command displays a MAC access list and all of the rules that are defined for the MAC
ACL. Use the [name]parameter to identify a specific MAC ACL to display.
Format
show mac access-lists [name]
Mode
Privileged EXEC
Term
Definition
Rule Number
The ordered rule number identifier defined within the MAC ACL.
The action associated with each rule. The possible values are Permit or Deny.
The source MAC address for this rule.
Action
Source MAC
Address
Destination
MAC Address
The destination MAC address for this rule.
Ethertype
VLAN ID
COS
The Ethertype keyword or custom value for this rule.
The VLAN identifier value or range for this rule.
The COS (802.1p) value for this rule.
Log
Displays when you enable logging for the rule.
The queue identifier to which packets matching this rule are assigned.
Assign Queue
Mirror Interface
The unit/slot/port to which packets matching this rule are copied.
The unit/slot/port to which packets matching this rule are forwarded.
Redirect
Interface
Time Range
name
Displays the name of the time-range if the MAC ACL rule has referenced a time range.
Status (Active/Inactive) of the MAC ACL rule
Rule Status
IP Access Control List (ACL) Commands
This section describes the commands you use to configure IP ACL settings. IP ACLs ensure
that only authorized users have access to specific resources and block any unwarranted
attempts to reach network resources.
The following rules apply to IP ACLs:
•
•
Managed switch software does not support IP ACL configuration for IP packet fragments.
The maximum number of ACLs you can create is hardware dependent. The limit applies
to all ACLs, regardless of type.
•
•
The maximum number of rules per IP ACL is hardware dependent.
Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is
in essence the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in
the bit positions that are used for the network address, and has zeros (0's) for the bit
Quality of Service (QoS) Commands
495
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that
must be checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit
can be ignored.
access-list
This command creates an IP Access Control List (ACL) that is identified by the access list
number, which is 1-99 for standard ACLs or 100-199 for extended ACLs.
IP Standard ACL:
Format
access-list<1-99> {deny | permit} {every | <srcip> <srcmask>} [log]
[rate-limit <1-4294967295> <1-128>][assign-queue <queue-id>]
[{mirror | redirect} <unit/slot/port>]
Mode
Global Config
IP Extended ACL:
Format
access-list <100-199> {deny | permit} {every | {{icmp | igmp | ip |
tcp | udp | <number>} <srcip> <srcmask>[{eq {<portkey> | <0-65535>}
<dstip> <dstmask> [{eq {<portkey>| <0-65535>}] [precedence
<precedence> | tos <tos> <tosmask> | dscp <dscp>] [log] [rate-limit
<1-4294967295> <1-128>] [assign-queue <queue-id>] [{mirror |
redirect} <unit/slot/port>]
Mode
Global Config
Parameter
Description
<1-99> or <100-199>
Range 1 to 99 is the access list number for an IP standard ACL.
Range 100 to 199 is the access list number for an IP extended ACL.
{deny | permit}
every
Specifies whether the IP ACL rule permits or denies an action.
Match every packet
{icmp | igmp | ip | tcp | udp
| <number>}
Specifies the protocol to filter for an extended IP ACL rule.
<srcip> <srcmask>
Specifies a source IP address and source netmask for match
condition of the IP ACL rule.
[{eq {<portkey> |
<0-65535>}]
Specifies the source layer 4 port match condition for the IP ACL rule.
You can use the port number, which ranges from 0-65535, or you
specify the <portkey>, which can be one of the following
keywords: domain, echo, ftp, ftpdata, http, smtp,
snmp, telnet, tftp, and www-http. Each of these keywords
translates into its equivalent port number, which is used as both the
start and end of a port range.
<dstip> <dstmask>
Specifies a destination IP address and netmask for match condition
of the IP ACL rule.
Quality of Service (QoS) Commands
496
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Description
[precedence <precedence> |
tos <tos> <tosmask> | dscp
<dscp>]
Specifies the TOS for an IP ACL rule depending on a match of
precedence or DSCP values using the parameters dscp,
precedence, tos/tosmask.
[log]
Specifies that this rule is to be logged.
rate-limit
The user can specify a simple rate limiter for packets matching an
ACL “permit” rule. The user needs to specify the burst size in kbytes
and allowed rate of traffic in kbps. The conforming traffic is allowed
to transmit, and non-conforming traffic is dropped. This action is
ignored for any “deny” rule, since by definition matching packets are
dropped.
[assign-queue <queue-id>]
Specifies the assign-queue, which is the queue identifier to which
packets matching this rule are assigned.
[{mirror | redirect}
<unit/slot/port>]
Specifies the mirror or redirect interface which is the unit/slot/port to
which packets matching this rule are copied or forwarded,
respectively.
no access-list
This command deletes an IP ACL that is identified by the parameter <accesslistnumber>
from the system. The range for <accesslistnumber>1-99 for standard access lists and
100-199 for extended access lists.
Format
Mode
no access-list <accesslistnumber>
Global Config
ip access-list
This command creates an extended IP Access Control List (ACL) identified by <name>,
consisting of classification fields defined for the IP header of an IPv4 frame. The <name>
parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely
identifying the IP access list.
If an IP ACL by this name already exists, this command enters IPv4-Access_List config mode
to allow updating the existing IP ACL.
Note: The CLI mode changes to IPv4-Access-List Config mode when you
successfully execute this command.
Format
Mode
ip access-list <name>
Global Config
Quality of Service (QoS) Commands
497
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip access-list
This command deletes the IP ACL identified by <name> from the system.
Format
Mode
no ip access-list <name>
Global Config
ip access-list rename
This command changes the name of an IP Access Control List (ACL). The <name>
parameter is the names of an existing IP ACL. The <newname> parameter is a
case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the IP access
list.
This command fails is an IP ACL by the name <newname> already exists.
Format
Mode
ip access-list rename <name> <newname>
Global Config
{deny | permit} (IP ACL)
This command creates a new rule for the current IP access list. Each rule is appended to the
list of configured rules for the list.
Note: The “no” form of this command is not supported, since the rules
within an IP ACL cannot be deleted individually. Rather, the entire IP
ACL must be deleted and re-specified.
Note: An implicit “deny all” IP rule always terminates the access list.
Note: The mirrorparameter allows traffic matching this rule to be copied
to the specified <unit/slot/port>, while the redirect parameter
allows traffic matching this rule to be forwarded to the specified
<unit/slot/port>. The assign-queueand redirect
parameters are valid only for a permitrule.
A rule might either deny or permit traffic according to the specified classification fields. At a
minimum, either the every keyword or the protocol, source address, and destination address
values must be specified. The source and destination IP address fields might be specified
using the keyword ‘any’ to indicate a match on any value in that field. The remaining
Quality of Service (QoS) Commands
498
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
command parameters are all optional, but the most frequently used parameters appear in the
same relative order as shown in the command format.
The assign-queue parameter allows specification of a particular hardware queue for handling
traffic that matches this rule. The allowed <queue-id>value is 0-(n-1), where n is the
number of user configurable queues available for the hardware platform. The
assign-queueparameter is valid only for a permitrule.
The time-range parameter allows imposing time limitation on the IP ACL rule as defined by
the parameter <time-range-name>. If a time range with the specified name does not exist
and the IP ACL containing this ACL rule is applied to an interface or bound to a VLAN, then
the ACL rule is applied immediately. If a time range with specified name exists and the IP
ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule
is applied when the time-range with specified name becomes active. The ACL rule is
removed when the time-range with specified name becomes inactive.
The user can specify a simple rate limiter for packets matching an ACL “permit” rule. The
user needs to specify the burst size in kbytes and allowed rate of traffic in kbps. The
conforming traffic is allowed to transmit, and non-conforming traffic is dropped. This action is
ignored for any “deny” rule, since by definition matching packets are dropped.
Format
{deny | permit} {every | {{icmp | igmp | ip | tcp | udp | <number>}
<srcip> <srcmask>[{eq {<portkey> | <0-65535>} <dstip> <dstmask> [{eq
{<portkey>| <0-65535>}] [precedence <precedence> | tos <tos>
<tosmask> | dscp <dscp>] [log] [rate-limit <1-4294967295> <1-128>]
[timerange <time-range-name>] [assign-queue <queue-id>] [{mirror |
redirect}
[lag <lag number> |<unit/slot/port>]]
Mode
Ipv4-Access-List Config
ip access-group
This command either attaches a specific IP ACL identified by <accesslistnumber>to an
interface or associates with a VLAN ID in a given direction. The parameter <name>is the
name of the Access Control List.
An optional sequence number may be specified to indicate the order of this IP access list
relative to other IP access lists already assigned to this interface and direction. A lower
number indicates higher precedence order. If a sequence number is already in use for this
interface and direction, the specified access list replaces the currently attached IP access list
using that sequence number. If the sequence number is not specified for this command, a
sequence number that is one greater than the highest sequence number currently in use for
this interface and direction is used.
Note: The <out> option might not be available, depending on the platform.
Quality of Service (QoS) Commands
499
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Default
Format
none
ip access-group {<accesslistnumber>|<name>}
{{control-plane|in|out}|vlan <vlan-id> {in|out}}[sequence
<1-4294967295>]
Modes
• Interface Config
• Global Config
no ip access-group
This command removes a specified IP ACL from an interface.
Default
none
Format
Mode
no ip access-group <accesslistnumber> {{control-plane|in|out}|vlan
<vlan-id> {in|out}}
• Interface Config
• Global Config
acl-trapflags
This command enables the ACL trap mode.
Default
disabled
Format
Mode
acl-trapflags
Global Config
no acl-trapflags
This command disables the ACL trap mode.
Format
Mode
no acl-trapflags
Global Config
show ip access-lists
This command displays an IP ACL <accesslistnumber>is the number used to identify
the IP ACL.
Format
Mode
show ip access-lists <accesslistnumber>
Privileged EXEC
Note: Only the access list fields that you configure are displayed.
Quality of Service (QoS) Commands
500
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Rule Number
The number identifier for each rule that is defined for the IP ACL.
Action
The action associated with each rule. The possible values are Permit or Deny.
Match All
Indicates whether this access list applies to every packet. Possible values are True or
False.
Protocol
The protocol to filter for this rule.
The source IP address for this rule.
Source IP
Address
Source IP Mask
The source IP Mask for this rule.
The source port for this rule.
Source L4 Port
Keyword
Destination IP
Address
The destination IP address for this rule.
The destination IP Mask for this rule.
The destination port for this rule.
Destination IP
Mask
Destination L4
Port Keyword
IP DSCP
The value specified for IP DSCP.
IP Precedence
IP TOS
The value specified IP Precedence.
The value specified for IP TOS.
Log
Displays when you enable logging for the rule.
The queue identifier to which packets matching this rule are assigned.
The unit/slot/port to which packets matching this rule are copied.
The unit/slot/port to which packets matching this rule are forwarded.
Assign Queue
Mirror Interface
Redirect
Interface
Time Range
Name
Displays the name of the time-range if the ACL rule has referenced a time range.
Status (Active/Inactive) of the ACL rule.
Rule Status
show access-lists
This command displays IP ACLs, IPv6 ACLs, and MAC access control lists information for a
designated interface and direction.
Format
Mode
show access-lists interface <unit/slot/port> [in|out]
Privileged EXEC
Quality of Service (QoS) Commands
501
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
ACL Type
Type of access list (IP, IPv6, or MAC).
ACL ID
Access List name for a MAC or IPv6 access list or the numeric identifier for an IP access
list.
Sequence
Number
An optional sequence number may be specified to indicate the order of this access list
relative to other access lists already assigned to this interface and direction. A lower
number indicates higher precedence order. If a sequence number is already in use for
this interface and direction, the specified access list replaces the currently attached
access list using that sequence number. If the sequence number is not specified by the
user, a sequence number that is one greater than the highest sequence number currently
in use for this interface and direction is used. Valid range is (1 to 4294967295).
IPv6 Access Control List (ACL) Commands
This section describes the commands you use to configure IPv6 ACL settings. IPv6 ACLs
ensure that only authorized users have access to specific resources and block any
unwarranted attempts to reach network resources.
The following rules apply to IPv6 ACLs:
•
•
•
The maximum number of ACLs you create is 100, regardless of type.
The system supports only Ethernet II frame types.
The maximum number of rules per IPv6 ACL is hardware dependent.
ipv6 access-list
This command creates an IPv6 Access Control List (ACL) identified by <name>, consisting of
classification fields defined for the IP header of an IPv6 frame. The <name>parameter is a
case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the IPv6
access list.
If an IPv6 ACL by this name already exists, this command enters IPv6-Access-List config
mode to allow updating the existing IPv6 ACL.
Note: The CLI mode changes to IPv6-Access-List Config mode when you
successfully execute this command.
Format
Mode
ipv6 access-list <name>
Global Config
Quality of Service (QoS) Commands
502
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 access-list
This command deletes the IPv6 ACL identified by <name>from the system.
Format
Mode
no ipv6 access-list <name>
Global Config
ipv6 access-list rename
This command changes the name of an IPv6 ACL. The <name>parameter is the name of an
existing IPv6 ACL. The <newname>parameter is a case-sensitive alphanumeric string from 1
to 31 characters uniquely identifying the IPv6 access list.
This command fails is an IPv6 ACL by the name <newname>already exists.
Format
Mode
ipv6 access-list rename <name> <newname>
Global Config
{deny | permit} (IPv6)
This command creates a new rule for the current IPv6 access list. Each rule is appended to
the list of configured rules for the list.
Note: The ‘no’ form of this command is not supported, since the rules
within an IPv6 ACL cannot be deleted individually. Rather, the entire
IPv6 ACL must be deleted and respecified.
Note: An implicit ‘deny all’ IPv6 rule always terminates the access list.
A rule may either deny or permit traffic according to the specified classification fields. At a
minimum, either the ‘every’keyword or the protocol, source address, and destination
address values must be specified. The source and destination IPv6 address fields may be
specified using the keyword ‘any’to indicate a match on any value in that field. The
remaining command parameters are all optional, but the most frequently used parameters
appear in the same relative order as shown in the command format.
The assign-queue parameter allows specification of a particular hardware queue for handling
traffic that matches this rule. The allowed <queue-id>value is 0-(n-1), where nis the
number of user configurable queues available for the hardware platform. The
assign-queueparameter is valid only for a permit rule.
The mirrorparameter allows the traffic matching this rule to be copied to the specified
<unit/slot/port>, while the redirect parameter allows the traffic matching this rule to be
Quality of Service (QoS) Commands
503
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
forwarded to the specified <unit/slot/port>. The assign-queueand redirect
parameters are only valid for a permitrule.
The time-range parameter allows imposing time limitation on the IPv6 ACL rule as defined by
the parameter <time-range-name>. If a time range with the specified name does not exist and
the IPv6 ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the
ACL rule is applied immediately. If a time range with specified name exists and the IPv6 ACL
containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is
applied when the time-range with specified name becomes active. The ACL rule is removed
when the time-range with specified name becomes inactive.
Format
{deny | permit} {every | {{icmp | igmp | ipv6 | tcp | udp |
<number>}[log] [timerange
<time-range-name>] [assign-queue <queue-id>] [{mirror | redirect}
<unit/slot/port>]
Mode
IPv6-Access-List Config
ipv6 traffic-filter
This command either attaches a specific IPv6 ACL identified by <name>to an interface or
associates with a VLAN ID in a given direction. The <name> parameter must be the name of
an existing IPv6 ACL.
An optional sequence number may be specified to indicate the order of this mac access list
relative to other IPv6 access lists already assigned to this interface and direction. A lower
number indicates higher precedence order. If a sequence number is already in use for this
interface and direction, the specifiedIPv6 access list replaces the currently attached IPv6
access list using that sequence number. If the sequence number is not specified for this
command, a sequence number that is one greater than the highest sequence number
currently in use for this interface and direction is used.
This command specified in Interface Config mode only affects a single interface, whereas the
Global Config mode setting is applied to all interfaces. The vlankeyword is only valid in the
Global Config mode. The Interface Config mode command is only available on platforms that
support independent per-port class of service queue configuration.
Note: You should be aware that the <out> option may or may not be
available, depending on the platform.
Format
Modes
ipv6 traffic-filter <name> {{control-plane|in|out}|vlan <vlan-id>
{in|out}} [sequence <1-4294967295>]
• Global Config
• Interface Config
Quality of Service (QoS) Commands
504
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ipv6 traffic-filter
This command removes an IPv6 ACL identified by <name>from the interface(s) in a given
direction.
Format
Modes
no ipv6 traffic-filter <name> {{control-plane|in|out}|vlan <vlan-id>
{in|out}}
• Global Config
• Interface Config
show ipv6 access-lists
This command displays an IPv6 access list and all of the rules that are defined for the IPv6
ACL. Use the [name]parameter to identify a specific IPv6 ACL to display.
Format
Mode
show ipv6 access-lists [name]
Privileged EXEC
Term
Definition
Rule Number
The ordered rule number identifier defined within the IPv6 ACL.
The action associated with each rule. The possible values are Permit or Deny.
Action
Match All
Indicates whether this access list applies to every packet. Possible values are True or
False.
Protocol
The protocol to filter for this rule.
The source IP address for this rule.
Source IP
Address
Source L4 Port
Keyword
The source port for this rule.
Destination IP
Address
The destination IP address for this rule.
The destination port for this rule.
Destination L4
Port Keyword
IP DSCP
The value specified for IP DSCP.
Flow Label
Log
The value specified for IPv6 Flow Label.
Displays when you enable logging for the rule.
The queue identifier to which packets matching this rule are assigned.
Assign Queue
Mirror Interface
The unit/slot/port to which packets matching this rule are copied.
The unit/slot/port to which packets matching this rule are forwarded.
Redirect
Interface
Time Range
Name
Displays the name of the time-range if the IPv6 ACL rule has referenced a time range.
Status(Active/Inactive) of the IPv6 ACL rule.
Rule Status
Quality of Service (QoS) Commands
505
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Time Range Commands for Time-Based ACLs
Time-based ACLs allow one or more rules within an ACL to be based on time. Each ACL rule
within an ACL, except for the implicit deny allrule, can be configured to be active and
operational only during a specific time period. The time range commands allow you to define
specific times of the day and week to implement time-based ACLs. The time range is
identified by a name and can then be referenced by an ACL rule defined with in an ACL.
time-range
Use this command to create a time range identified by name, consisting of one absolute time
entry and/or one or more periodic time entries. The nameparameter is a case-sensitive,
alphanumeric string from 1 to 31 characters that uniquely identifies the time range. An
alpha-numeric string is defined as consisting of only alphabetic, numeric, dash, underscore,
or space characters. If a time range by this name already exists, this command enters
Time-Range config mode to allow updating the time range entries
Note: When you successfully execute this command, the CLI mode
changes to Time-Range Config mode.
Format
Mode
time-range <name>
Global Config
no time-range
Use this command to delete a time-range identified by name.
Format
Mode
no time-range <name>
Global Config
absolute
Use this command to add an absolute time entry to a time range. Only one absolute time
entry is allowed per time-range. The timeparameter is based on the currently configured
time zone. The [start time date]parameters indicate the time and date at which the
configuration that referenced the time range starts going into effect. The time is expressed in
a 24-hour clock, in the form of hours:minutes. For example, 8:00 is 8:00 am and 20:00 is 8:00
pm. The date is expressed in the format day month year. If no start time and date are
specified, the configuration statement is in effect immediately. The [end time date]
parameters indicate the time and date at which the configuration that referenced the time
Quality of Service (QoS) Commands
506
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
range is no longer in effect. The end time and date must be after the start time and date. If no
end time and date are specified, the configuration statement is in effect indefinitely.
Format
absolute {[start time date] [end time date]}
Mode
Time-Range Config
no absolute
Use this command to delete the absolute time entry in the time range.
Format
no absolute
Mode
Time-Range Config
periodic
Use this command to add a periodic time entry to a time range. The timeparameter is based
off of the currently configured time zone. The first occurrence of the days-of-the-week
argument is the starting day(s) from which the configuration that referenced the time range
starts going into effect. The second occurrence is the ending day or days from which the
configuration that referenced the time range is no longer in effect. If the end days-of-the-week
are the same as the start, they can be omitted This argument can be any single day or
combinations of days: Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday.
Other possible values are:
•
•
•
daily—Monday through Sunday
weekdays—Monday through Friday
weekend—Saturday and Sunday
If the ending days of the week are the same as the starting days of the week, they can be
omitted. The first occurrence of the time argument is the starting hours:minutes which the
configuration that referenced the time range starts going into effect. The second occurrence
is the ending hours:minutes at which the configuration that referenced the time range is no
longer in effect. The hours:minutes are expressed in a 24-hour clock. For example, 8:00 is
8:00 am and 20:00 is 8:00 pm
The frequency is how often this periodic entry will become active. If the value is set to 0 ,
timer schedule will be threated as absolute..
Format
periodic <frequency> {days-of-the-week time} to {[days-of-the-week] time}
Mode
Time-Range Config
no periodic
Use this command to delete a periodic time entry from a time range.
Format
Mode
no periodic <frequency>{days-of-the-week time} to {[days-of-the-week] time}
Time-Range Config
Quality of Service (QoS) Commands
507
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
periodic {start|end} time
Use this command to configure the start/end time for the time-range.
Format
Mode
periodic {start|end} time
Time-Range Config
show time-range
Use this command to display a time range and all the absolute/periodic time entries that are
defined for the time range. Use the name parameter to identify a specific time range to
display. When name is not specified, all the time ranges defined in the system are displayed.
Format
Mode
show time-range
Privileged EXEC
Term
Definition
Number of Time
Ranges
Number of time ranges configured in the system.
Time Range Name
Time Range Status
Absolute start
Absolute end
Name of the time range.
Status of the time range (active/inactive).
Start time and day for absolute time entry.
End time and day for absolute time entry.
Number of periodic entries in a time-range.
Start time and day for periodic entry.
End time and day for periodic entry.
Periodic Entries
Periodic start
Periodic end
AutoVOIP
AutoVoIP detects the VoIP streams and put the VoIP streams in the specific VLAN (auto-voip
VLAN) and provides higher class of service to the VoIP streams automatically (both data and
signaling). It detects the VoIP streams in two modes.
Protocol-based Auto VoIP
In a VoIP system, various signaling protocols are used to establish the connection between
two VoIP devices. The supported signaling protocols are SIP, H.323, and SCCP.
OUI-based Auto VoIP
The OUI-based Auto VoIP feature prioritizes VoIP packets based on the OUI bytes in the
source MAC address. A default list of OUIs is maintained. User is also allowed to configure
OUIs that need prioritization apart from the default OUI list. Up to 128 OUIs are allowed on
the device or system, including the default OUIs.
Quality of Service (QoS) Commands
508
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: If voice VLAN and Auto-VoIP are enabled at the same time, then
one of them is operational. If the connected phone is LLDP-MED
capable, then voice VLAN has precedence over the Auto VoIP and
Auto VoIP is operational if the phone does not support LLDP-MED.
auto-voip {protocol-based | oui-based}
This command is used to configure auto VoIP mode. The supported modes are
protocol-based and oui-based. Protocol based auto VoIP prioritizes the voice data based on
the layer 4 port used for the voice session. OUI based auto VOIP prioritizes the phone traffic
based on the known OUI of the phone.
Format
Mode
auto-voip {protocol-based | oui-based}
• Global Config
• Interface Config
Default
oui-based
no auto-voip {protocol-based | oui-based}
This command is used to set default mode.
Format
Mode
no auto-voip {protocol-based | oui-based}
• Global Config
• Interface Config
auto-voip oui
This command is used to configure an OUI for Auto VoIP. The traffic from the configured OUI
will get the highest priority over the other traffic.
Format
Mode
auto-voip oui <oui-prefix> oui-desc <string>
Global Config
Default
A list of known OUIs is present
no auto-voip oui
This command is to delete already configured OUI.
Format
Mode
no auto-voip oui <oui-prefix>
Global Config
Quality of Service (QoS) Commands
509
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
auto-voip vlan
This command is used to configure the global Auto VoIP VLAN id. The VLAN behavior is
depend on the configured auto VoIP mode.
Format
auto-voip vlan <vlanid>
Global Config
Mode
Default
None
no auto-voip vlan
This command is used to set the auto-voip VLAN to the default 2.
Format
Mode
no auto-voip vlan
Global Config
auto-voip oui-based priority
This command is used to configure the global OUI based auto VoIP priority. If the phone OUI
is matches one of the configured OUI, then the priority of traffic from the phone is changed to
OUI priority configured through this command.
Format
Mode
auto-voip oui-based priority <priority-value>
Global Config
Default
Highest available priority
no auto-voip oui-based priority
This command is used to set the priority to the default value.
Format
Mode
no auto-voip oui-based priority <priority-value>
Global Config
auto-voip protocol-based {remark | traffic-class}
This command is used to configure the global protocol based auto-VoIP remarking
priority/traffic-class. If the remark priority is configured, the voice data of the session is
remarked with the priority configured through this command.
Quality of Service (QoS) Commands
510
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: The administrator has to enable tagging on auto-VoIP-enabled ports
to remark the voice data when it is egressed.
Format
Mode
auto-voip protocol-based {remark <remark-priority> | traffic-class
<tc>}
• Global Config
• Interface Config
Default
Traffic-class 7
no auto-voip protocol-based {remark | traffic-class}
This command is used to set the traffic-class to the default value.
Format
Mode
no auto-voip protocol-based {remark <remark- priority> |
traffic-class <tc>}
• Global Config
• Interface Config
show auto-voip interface
This command shows the configuration of the auto-voip per port.
Format
Mode
show auto-voip interface [oui-based|protocol-based]
{<unit/slot/port> | all}
• Privileged EXEC
• User EXEC
Example 1: If the configured auto-VoIP mode is protocol-based and the traffic-class is
configured.
Auto VoIP VLAN: 2
Interface
Mode
Admin
Mode
Auto VoIP
Traffic Class
------------ ------------- ------------------- -------------
0/1 Enabled protocol-based
7
Example 2: If the configured auto-VoIP mode is OUI-based.
Auto VoIP VLAN: 2
Auto VoIP OUI Priority: 7
Interface
Mode
Admin
Mode
Auto VoIP
------------ ------------- ------------
0/1
Enabled
oui-based
Quality of Service (QoS) Commands
511
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show auto-voip oui-table
This command lists all of the configured OUIs.
Format
show auto-voip oui-table
Mode
• Privileged EXEC
• User EXEC
Term
OUI
Definition
OUI of the source MAC address
Default or Configured entry.
Description of the OUI
Status
OUI Description
Example: show auto-voip oui-table
OUI
Status
Description
---------
00:01:E3
00:03:6B
00:01:01
----------
Default
Default
---------
SIEMENS
CISCO1
Configured
VoIP phone
iSCSI Commands
The tasks involved in providing automated QoS preferential treatment of iSCSI flows can be
divided into the following categories:
•
Detecting the establishment and termination of iSCSI sessions and connections by
snooping packets used in the iSCSI protocol.
•
Maintaining a database of currently active iSCSI sessions and connections to store data
about the participants. This allows the formulation of classifier rules giving the data
packets for the session the desired QoS treatment.
•
•
Installing and removing classifier rule sets as needed for the iSCSI session traffic.
Monitoring activity in the iSCSI sessions to allow for aging out session entries if the
session termination packets are not received.
The means of detecting the establishment and termination of iSCSI sessions is accomplished
by installing classifier rules to trap iSCSI protocol packets to the CPU for examination. This
protocol uses well-known TCP ports for initiators to contact targets with 3260 and 860.
Additional port numbers or “port number/target IP address” can also be configured for
monitoring if an installation uses ports other than the well-known ports. The well-known ports
are configured as part of the default configuration of the component and can be removed if
desired by the user.
Quality of Service (QoS) Commands
512
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
iscsi enable
The iscsi enable Global Configuration mode command globally enables iSCSI awareness.
Format
iscsi enable
Global Config
Disabled
Mode
Default
no iscsi enable
This command is to disable iSCSI awareness use the no form of this command. When User
uses this command, iSCSI resources will be released.
Format
Mode
no iscsi enable
Global Config
Disabled
Default
iscsi target port
This command configures iSCSI port/s, target addresses and names.
Note: When working with private iSCSI ports (not IANA assigned iSCSI
ports 3260/860), it is recommended to specify the target IP address
as well, so the switch will only snoop frames with which the TCP
destination port is one of the configured TCP ports, AND there
destination IP is the target’s IP address. This way the CPU is not be
falsely loaded by non-iSCSI flows (if by chance other applications
also choose to use these {un-reserved} ports).
When a port is already defined and not bound to an IP, and the User
wants to bind it to an IP, the User should first remove it by using the
no form of the command and then add it again, this time together
with the relevant IP.
Target names are only for display when using show iscsi command.
These names are not use to match (or for doing any sanity check)
Quality of Service (QoS) Commands
513
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
with the iSCSI session information acquired by snooping.
Maximum of 16 TCP ports can be configured either bound to IP or
not.
Format
iscsi target port tcp-port-1 [tcp-port-2.… tcp-port-8] [address
ip-address] [name targetname]
Mode
Global Config
Default
3260 and 860, but they can be removed as any other configured target
Term
Definition
tcp-port
TCP port number or list of TCP port numbers on which iSCSI target/s listen to
requests. Up to 16 TCP ports can be defined in the system in one command or by
using multiple commands.
ip-address
targetname
IP address of the iSCSI target. When the no form is used, and the tcp port to be
deleted is one bound to a specific IP address, the address field must be present.
iSCSI name of the iSCSI target. The name can be statically configured; however, it can
be obtained from iSNS or from sendTargets response. The initiator MUST present both
its iSCSI Initiator Name and the iSCSI Target Name to which it wishes to connect in the
first login request of a new session or connection.
no iscsi target port
This command is to delete iSCSI port/s, target, use the no form of this command.
Format
Mode
no iscsi target port tcp-port-1 [tcp-port-2.… tcp-port-8] [address
ip-address]
Global Config
iscsi cos
The iscsi cos Global Configuration mode command sets the quality of service profile that will
be applied to iSCSI flows.
Note: SCSI flows are assigned by default to the highest VPT/DSCP
mapped to the highest queue not used for stack management or
voice VLAN. The user should also take care of configuring the
relevant Class of Service parameters for the queue in order to
complete the setting.
Setting the VPT/DSCP sets the QoS profile which determines the
egress queue to which the frame is mapped. The switch default
Quality of Service (QoS) Commands
514
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
setting for egress queues scheduling is Weighted Round Robin
(WRR).
The user may complete the QoS setting by configuring the relevant
ports to work in other scheduling and queue management modes via
the Class of Service settings. Depending on the platform, these
choices may include strict priority for the queue used for iSCSI
traffic. The downside of strict priority is that, in certain circumstances
(under heavy high priority traffic), other lower priority traffic may get
starved. In WRR the queue to which the flow is assigned to can be
set to get the required percentage.
Format
Mode
iscsi cos traffic-class {vpt <vpt> | dscp <dscp>} [remark]
Global Config
Term
Definition
traffic-class
The traffic class used for assigning iSCSI traffic to a queue.
The VLAN Priority Tag or DSCP to assign iSCSI session packets.
Mark the iSCSI frames with the configured VPT/DSCP when egressing the switch.
vpt/dscp
remark
no iscsi cos
This command is to set the quality of service profile of SCSI flows to default.
Format
Mode
no iscsi cos
Global Config
iscsi aging time
The iscsi aging time Global Configuration mode command sets aging time for iSCSI
sessions.
Behavior when changing aging time:
•
When aging time is increased - Current sessions will be timed out according to the new
value.
•
When aging time is decreased - Any sessions that have been dormant for a time
exceeding the new setting will be immediately deleted from the table. All other sessions
will continue to be monitored against the new time out value.
Format
Mode
iscsi aging time <time>
Global Config
Default
5 minutes
Quality of Service (QoS) Commands
515
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
The number in minutes a session is not active prior to it's removal. (Range: 1-43,200)
time
no iscsi aging time
This command is to reset the aging time to the default.
Format
Mode
no iscsi aging time
Global Config
show iscsi
This command displays the iSCSI settings.
Format
Mode
show iscsi
• Privileged EXEC
• User EXEC
Example:
The following example displays the iSCSI settings.
Console # show iscsi
iSCSI enabled
iSCSI vpt is 5, remark
Session aging time: 60 min
Maximum number of sessions is 256
-----------------------------------------------------------
iSCSI targets and TCP ports:
---------------------------
TCP Port Target IP Address Name
860
3260
5000
30001
30033
30033
172.16.1.1
172.16.1.10
172.16.1.25
iqn.1993-11.com.disk-vendor:diskarrays.sn.45678.tape:sys1.xyz
show iscsi sessions
The show iscsi sessions Privileged EXEC mode command displays the iSCSI sessions.
Format
show iscsi sessions [detailed]
Mode
• Privileged EXEC
• User EXEC
Default
If not specified, sessions are displayed in short mode (not detailed)
Quality of Service (QoS) Commands
516
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Displayed list is detailed when this option is used.
detailed
Example:
The following example displays the iSCSI sessions.
Console # show iscsi sessions
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
-----------------------------------------------------------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
ISID: 11
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
ISID: 222
-----------------------------------------------------------
Target: iqn.103-1.com.storage-vendor:sn.43338.
storage.tape:sys1.xyz
Session 3:
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
Session 4:
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
-----------------------------------------------------------
Console# show iscsi sessions detailed
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
-----------------------------------------------------------
Session 1:
Initiator: iqn.1992-04.com.os
vendor.plan9:cdrom.12.storage:sys1.xyz
-----------------------------------------------------------
Time started: 17-Jul-2008 10:04:50
Time for aging out: 10 min
ISID: 11
Initiator
IP address
172.16.1.3
172.16.1.4
172.16.1.5
Session 2:
Initiator
TCP port
49154
49155
49156
Target
IP address
172.16.1.20 30001
172.16.1.21 30001
172.16.1.22 30001
Target
IP port
-----------------------------------------------------------
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
Time started: 17-Aug-2008 21:04:50
Time for aging out: 2 min
ISID: 22
Initiator
IP address
Initiator
TCP port
Target
IP address
Target
IP port
172.16.1.30 49200
172.16.1.30 49201
172.16.1.20 30001
172.16.1.21 30001
Quality of Service (QoS) Commands
517
Download from Www.Somanuals.com. All Manuals Search And Download.
10.
Power over Ethernet (PoE) Commands
10
This chapter contains the following sections:
•
•
About PoE
Power over Ethernet describes a technology to pass electrical power safely along with data
on existing Ethernet cabling. The PSE or power supply equipment is the device or switch that
delivers electrical power, and the PD or powered device is the end device that powers up
through the power delivered along the Ethernet cable.
This technology is governed by two standards:
•
IEEE 802.3af-2003. This is the original standard, also known as the low power standard,
which mandates delivery of up to 15.4 watts by the PSE. Because of power dissipation,
only 12.95 watts is assured to be available at the powered device (PD). The PD needs to
be designed so that it can accept power over Ethernet cabling. Category 3 cables can be
used to deliver power to the PD. However, with the advent of 802.11n, the newer wireless
APs required more power. To account for this, a newer standard was developed in 2009,
known as 802.3at.
•
IEEE 802.3at-2009. This is the newer standard, also known as PoE+. This is also known
as the high-power standard, which mandates delivery of up to 34.2 watts by the PSE.
Because of power dissipation, PoE+ provides only a maximum of 25.5 watts at the
powered device. Some PSEs can provide up to 51 watts. Before this standard became
available in 2009, the industry started using different implementations to allow for more
power. All these needed to be brought under the purview of the newer 802.3at standard.
518
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
PoE Commands
poe
Use this command to enable the Power over Ethernet (PoE) functionality on a global basis or per
interface.
Format
Mode
poe
Global Config
Interface Config
Default
enabled
no poe
Use this command to disable the Power over Ethernet (PoE) functionality on a global basis or per
interface.
Format
Mode
no poe
Global Config
Interface Config
poe detection
Use this command to configure the detection type on a global basis or per interface. It is used to
configure which types of PDs will be detected and powered by the switch. There are three
options:
• ieee—Detect resistive-type devices (IEEE standard)
• pre-ieee—Legacy capacitive detection only (non-standard)
• auto—Perform resistive detection first (IEEE standard), and then capacitive detection
(pre-IEEE standard)
Format
Mode
poe detection { ieee | pre-ieee | auto}
Global Config
Interface Config
Default
auto
Power over Ethernet (PoE) Commands
519
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no poe detection
Use this command to set the detection mode to the default on a global basis or per interface.
Format
Mode
no poe detection
Global Config
Interface Config
poe high-power
Use this command to switch a port from 802.3af mode to high-power mode. This mode is used to
power up devices that require more power than the current IEEE 802.3af power (more than
12.95 watts at the PD). There are three options:
• legacy—Use this mode if the device can power up (more than 12.95 watts) with higher
current and it cannot identify itself as a Class 4 device.
• Pre-dot3at—Use this mode if the device cannot identify itself as a Class 4 device and it
does not have LLDP support.
• Dot3at—Use this mode if the device is a Class 4 device capable of figuring out power
requirements through 2-event classification or LLDP.
Format
Mode
poe high-power {legacy | pre-dot3at | dot3at}
Interface Config
dot3at
Default
no poe high-power
Use this command to disable the high-power mode. The port will support only IEEE 902.3af
devices.
This command works on a global basis or per interface.
Format
Mode
no poe high-power
Interface Config
poe power limit
Use this command to configure the type of power limit for a port. If the power limit type is
“user-defined,” the command also allows you to configure a maximum power limit.
There are three options:
• class-based—Allows the port to draw up to the maximum power based on the
classification of the device connected.
• none—Allows the port to draw up to Class 0 maximum power if it is in low-power mode
and up to Class 4 maximum power if it is in high-power mode.
Power over Ethernet (PoE) Commands
520
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
• user-defined—Allows you to define the maximum power to the port. This can be a
value between 3 and 32 watts.
Format
poe power limit { class-based | none | user-defined [<3000 - 32000>] }
Mode
Global Config
Interface Config
Default
User-defined, with a maximum of 30 watts
no poe power limit
Use this command to set the power limit type to the default. It also sets the maximum power limit
to the default if the power limit type is user-defined.
Format
Mode
no poe power limit [user-defined]
Global Config
Interface Config
poe power management
Use this command to configure the power management mode based on each individual PoE unit
or on all PoE units.
Both the power management modes mentioned here will power up a device based on first come,
first served. When the available power is less than the power limit defined on a port, no more
power will be delivered.
Static and dynamic modes differ in how the available power is calculated, as follows:
Static Power Management
Available power = power limit of the source - total allocated power
Where total allocated power is calculated as the power limit configured on the port.
Dynamic Power Management
Available power = power limit of the source - total allocated power
Where total allocated power is calculated as the amount of power consumed by the port.
For example:
Assume that the power limit of the source is 300 watts. One port is powered up and is drawing 3
watts of power. The power limit defined on the port is user-defined as 15 watts. In this case, the
available power for static and dynamic would be as follows:
Static Power Management
Available power = 300 watts - 15 watts = 285 watts
Power over Ethernet (PoE) Commands
521
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Dynamic Power Management
Available power = 300 watts - 3 watts = 297 watts
Format
Mode
poe power management {<unit>|all} {dynamic | static}
Global Config
dynamic
Default
no poe power management
Use this command to set the power management mode to the default.
Format
Mode
no poe power management {<unit>|all}
Global Config
poe priority
Use this command to configure the priority on a specific port. This is used for power management
purposes. The switch might not be able to supply power to all connected devices, so the port
priority is used to determine which ports will supply power if adequate power capacity is not
available for all enabled ports. For ports that have the same priority level, the lower numbered
port will have higher priority. There are three options:
•
•
•
Crit—Critical priority
High—High priority
Low—Low priority
Format
Mode
poe priority { Crit | High | Low }
Global Config
Interface Config
Default
low
no poe priority
Use this command to set the priority to the default.
Format
Mode
no poe priority
Global Config
Interface Config
poe reset
Use this command to reset the PoE state of every port (in global mode) or a specific port (in
interface mode). When the PoE port status is shown to be in an error state, this command can be
Power over Ethernet (PoE) Commands
522
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
used to reset the PoE port. The command can also reset the power-delivering ports. Note that
this command takes effect only once after it is executed and cannot be saved across power
cycles.
Format
Mode
poe reset
Global Config
Interface Config
poe timer schedule name
Use this command to allow you to attach a timer schedule to a PoE port.
You can define a time schedule using the existing time range commands. This schedule has start
and stop times. When this timer schedule is applied to a PoE-enabled port, the capability of the
port to deliver power is affected. At the scheduled start time, the PoE port is disabled such that it
cannot deliver any power. At the scheduled stop time, the PoE port is reenabled so that it can
deliver power.
Format
Mode
poe timer schedule <name>
Interface Config
Power over Ethernet (PoE) Commands
523
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no poe timer schedule name
Use this command to detach the schedule from the port.
Format
Mode
no poe timer schedule
Interface Config
poe usagethreshold
Use this command to set a threshold (as a percentage) for the total amount of power that can be
delivered by the switch. For example, if the switch can deliver up to a maximum of 300 watts, a
usage threshold of 90% ensures that only 270 watts are used for delivering power to devices.
This ensures that more power is not drawn than the switch can provide.
When the usage threshold is set, all the PDs are brought down and then brought back up. If the
consumed power is less than the threshold power (in the preceding case, 270 watts), then the
devices continue to power up. If the consumed power is 269 watts or less, the next device is
powered up. The moment consumed power exceeds the threshold power (270 watts), no other
devices can power up.
This command allows you to set the usage threshold based on each individual PoE unit or all
PoE units.
Format
Mode
poe usagethreshold {<unit>|all} <1-99>
Global Config
90
Default
no poe usagethreshold
Use this command to set the usage threshold to a default value.
Format
Mode
no poe usagethreshold {<unit>|all}
Global Config
poe traps
Use this command to enable logging of specific PoE-related events, such as a PoE port powering
a device, the threshold being exceeded, and so on.
Format
Mode
poe traps
Global Config
Enable
Default
Power over Ethernet (PoE) Commands
524
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no poe traps
Use this command to disable logging the PoE traps.
Format
Mode
no poe traps
Global Config
show poe
Use this command to get global information regarding the PoE status.
Format
Mode
show poe
Privileged EXEC
User EXEC
Term
Definition
Firmware Version This is the firmware version of the PoE controller on the switch.
PSE Main
This indicates the status of the PoE controller:
Operational Status
•
•
•
ON—Indicates that the PoE controller is actively delivering power.
OFF—Indicates that the PoE controller is not delivering power.
FAULTY—Indicates that the PoE controller is not functioning.
Total Power (Main This indicates the maximum amount of power that can be delivered by this PoE unit
AC) when on system power.
Total Power (RPS) This indicates the maximum amount of power that can be delivered by this PoE unit
when on RPS.
Total Power (PD)
Power Source
This indicates the maximum amount of power that can be delivered by this PoE unit
when on the PD source. This field is applicable only for the GSM5212P.
This indicates the power source being used: main AC, RPS, or PD. If PD is used as a
source, then “PD <portNo>” is displayed.
Threshold Power System can power up one port, if consumed power is less than this power. That is,
the consumed power can be between the total power and threshold power values.
The threshold power value is effected by changing the system usage threshold.
Total Power
Consumed
This indicates the total amount of power being delivered to all the devices plugged
into the switch.
Usage Threshold This indicates the usage threshold level.
Power
This indicates the management mode used by the PoE controller.
Management
Mode
Auto Reset Mode This indicates whether the PoE ports will be automatically reset in case of an error on
a port.
Traps
This configures the traps.
Power over Ethernet (PoE) Commands
525
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Example:
(switch) #show poe
Firmware Version............................... 1.0.0.2
PSE Main Operational Status.................... ON
Total Power (Main AC).......................... 380
Total Power (RPS).............................. 300
Total Power (PD) .............................. 25
Power Source................................... Main AC
Threshold Power................................ 342
Total Power Consumed........................... 7
Usage Threshold................................ 90
Power Management Mode.......................... Dynamic
Configure port Auto Reset Mode................. Disable
Traps.......................................... Enable
show poe port configuration
Use this command to see how the PoE ports are configured. You can display information based
on each individual port or all the ports collectively.
Format
Mode
show poe port configuration [<port> |All]
Privileged EXEC
User EXEC
(Switch) #show poe port configuration all
Admin
Mode Priority Limit
(W)
------ ------- -------- ------ -------------- ------------- ---------------------
Power
Power Limit
High Power
Detection
Intf
Type
Mode
Type
1/0/1 Enable
1/0/2 Enable
Low
Low
15.400 User Defined
15.400 User Defined
Disable
Disable
Auto
Auto
(Switch) #show poe port configuration 1/0/2
Admin
Power Power Limit
Limit Type
(W)
------ ------- -------- ------ -------------- ------------- ---------------------
High Power
Detection
Intf
Mode Priority
Mode
Type
1/0/2 Enable
Low
15.400 User Defined Disable
Auto
Power over Ethernet (PoE) Commands
526
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show poe port info
Use this command to get information about the status of the PoE ports. You can display
information based on each individual port or all the ports collectively. The command displays only
PSE-capable ports.
Format
Mode
show poe port info [<port> |all]
Privileged EXEC
User EXEC
Term
Intf
Definition
Interface on which PoE is configured.
Class
Class of the powered device according to the IEEE802.3af and IEEE802.3at definition.
Class Usage Max Power (watts)
0 Default 0.44-12.95
1 Optional 0.44-3.84
2 Optional 3.84-6.49
3 Optional 6.49-12.95
4 Optional 12.95-25.5
Power
The power supplied to the powered device (in watts).
The current supplied to the powered device (in mA).
Output
Current (mA)
Output
The voltage supplied to the powered device (in volts).
Voltage (volts)
Status
The Status field reports the state of power supplied to the port. Possible values are:
•
•
•
•
•
•
Disabled—The PoE function is disabled on this port.
Searching—The port is detecting the PoE device.
Delivering Power—The port is providing power to the PoE device.
Fault—The POE device is not IEEE compliant; no power is provided.
Test—The port is in testing state.
Other Fault—The port has experienced problems other than compliance issues.
When a port begins to deliver power, there is a trap indicating so. When a port stops
delivering power, there is a trap indicating so.
Example:
(switch) #show poe port info all
High
Max
Power
(W)
Output
Current
(mA)
Output
Voltage
(volt)
-------
00.00
Intf
Power
Class
Power
(W)
Status
Fault
Status
------ ------- ----- ------- ------ -------
------------------ ---------------
Searching No Error
1/0/1
(Switch) #show poe port info 1/0/33
High Max
Yes
32.0
Unknown
00.000
0
Output
Output
Power over Ethernet (PoE) Commands
527
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Intf
Power
Power
(W)
Class
Power
(W)
Current
(mA)
Voltage
(volt)
-------
53.3
Status
Fault
Status
------ ------- -----
1/0/33 No 18.0
------- ------ -------
04.400 84
------------------ ---------------
Delivering Power No Error
2
show poe pd
Use this command to get information about the PD ports. You can display information based on
each individual port or all the PD ports collectively.
Note: Only the GSM5212P supports this command.
Format
Mode
show poe pd [<port> | all]
Privileged EXEC
User EXEC
Term
Definition
Intf
Show the PD device interface number, only 0/1 or 0/2 on the GSM5212P.
In other devices, the table is empty. If <port-id> is not specified, all PD
ports are displayed.
Mode
Displays the port POE role and is always PD.
Class
Displays the POE class.
Detection Mode
PD detection mode when getting power from the PSE:
• 1-event—PSE detects the PD in 1-event mode (802.1f)
• 2-event—PSE detects the PD in 2-event mode (802.1at)
• LLDP—PSE detects the PD in LLDP mode (802.1at)
Status
Shows whether the port 0/1 or 0/2 is providing power:
• Powered—Receiving power from PSE
• Off—No power from the PSE (when main AC is in used)
Example:
(switch) #show poe pd all
Intf
----
0/1
Mode
-----
PD
Class
Detection Mode
Status
--------- ----------------
----------
powered
powered
class 4
class 4
2-event
LLDP
0/2
PD
Power over Ethernet (PoE) Commands
528
Download from Www.Somanuals.com. All Manuals Search And Download.
11.
Utility Commands
11
This chapter describes the utility commands available in the CLI.
This chapter contains the following sections:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
The commands in this chapter are in four functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
•
•
Copy commands transfer or save configuration and informational files to and from the
switch.
Clear commands clear some or all of the settings to factory defaults.
529
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Auto Install Commands
This section describes the Auto Install Commands. Auto Install is a software feature which
provides for the configuration of a switch automatically when the device is initialized and no
configuration file is found on the switch. The Auto Install process requires DHCP to be
enabled by default in order for it to be completed. The downloaded config file is not
automatically saved to startup-config. An administrator must explicitly issue a save request in
order to save the configuration. The Auto Install process depends upon the configuration of
other devices in the network, including a DHCP or BOOTP server, a TFTP server and, if
necessary, a DNS server.
There are three steps to Auto Install:
1. Configuration or assignment of an IP address for the device.
2. Assignment of a TFTP server.
3. Obtain a configuration file for the device from the TFTP server.
show autoinstall
This command displays the current status of the Auto Config process.
Format
Mode
show autoinstall
Privileged EXEC
Term
Definition
AutoInstall
Mode
The administrator mode is enabled or disabled.
AutoSave
Modet
If this option is enabled, the downloaded config file will be saved. Otherwise,
administrator must explicitly issue a "copy running-config startup-config" command in
order to save the configuration.
AutoInstall
Retry Count
the number of attempts to download a configuration.
The status of the AutoInstall.
AutoInstall
State
Example
(switch) #show autoinstall
AutoInstall Mode............................... Stopped
AutoSave Mode.................................. Disabled
AutoInstall Persistant Mode.................... Enabled
AutoInstall Retry Count........................ 3
AutoInstall State.............................. Waiting for boot options
Utility Commands
530
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
boot host auto-save
This command is used to enable automatically saving the downloaded configuration on the
switch.
Default
Disabled
Format
Mode
boot host auto-save
Privileged EXEC
no boot host auto-save
This command is used to disable automatically saving the downloaded configuration on the
switch.
Format
Mode
no boot host auto-save
Privileged EXEC
boot autoinstall start
The command is used to start Auto Install on the switch. Auto Install tries to download a
config file from a TFTP server.
Format
Mode
boot autoinstall start
Privileged EXEC
boot autoinstall stop
The command is used to A user may terminate the Auto Install process at any time prior to
the downloading of the config file. This is most optimally done when the switch is
disconnected from the network, or if the requisite configuration files have not been configured
on TFTP servers. Termination of the Auto Install process ends further periodic requests for a
host-specific file.
Format
Mode
boot autoinstall stop
Privileged EXEC
boot host retry-count
This command is used to set the number of attempts to download a configuration. The valid
range is from 1 to 6.
Default
3
Format
Mode
boot host retry-count <count>
Privileged EXEC
Utility Commands
531
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no boot host retry-count
This command is used to reset the number to the default. The default number is 3.
Format
Mode
no boot host retry-count
Privileged EXEC
boot host dhcp
This command is used to enable AutoInstall on the switch for the next reboot cycle. The
command does not change the current behavior of AutroInstall and saves the command to
NVRAM.
Default
Enabled3
Format
Mode
boot host dhcp
Privileged EXEC
no boot host dhcp
This command is used to disable AutoInstall on the switch for the next reboot cycle. The
command does not change the current behavior of AutroInstall and saves the command to
NVRAM
Format
Mode
no boot host dhcp
Privileged EXEC
erase startup-config
Use this command to erase the text-based configuration file stored in non-volatile memory. If
the switch boots and no startup-config file is found, the AutoInstall process automatically
begins.
Format
Mode
erase startup-config
Privileged EXEC
Dual Image Commands
The software supports a dual image feature that allows the switch to have two software
images in the permanent storage. You can specify which image is the active image to be
loaded in subsequent reboots. This feature allows reduced down-time when you upgrade or
downgrade the software.
Utility Commands
532
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
delete
This command deletes the supplied image file from the permanent storage. The image to be
deleted must be a backup image. If this image is the active image, or if this image is
activated, an error message displays. The optional <unit>parameter is valid only on
Stacks. Error will be returned, if this parameter is provided, on Standalone systems. In a
stack, the <unit>parameter identifies the node on which this command must be executed.
When this parameter is not supplied, the command is executed on all nodes in a Stack.
Format
Mode
delete [<unit>] {image1 | image2}
Privileged EXEC
boot system
This command activates the specified image. It will be the active-image for subsequent
reboots and will be loaded by the boot loader. The current active-image is marked as the
backup-image for subsequent reboots. The optional <unit>parameter is valid only in
Stacking, where the unit parameter identifies the node on which this command must be
executed. When this parameter is not supplied, the command is executed on all nodes in a
Stack.
Format
Mode
boot system[<unit>] <image-file-name>
Privileged EXEC
show bootvar
This command displays the version information and the activation status for the current
active and backup images on the supplied unit (node) of the Stack. If you do not specify a unit
number, the command displays image details for all nodes on the Stack. The command also
displays any text description associated with an image. This command, when used on a
Standalone system, displays the switch activation status. For a standalone system, the unit
parameter is not valid.
Format
Mode
show bootvar [<unit>]
Privileged EXEC
filedescr
This command associates a given text description with an image. Any existing description will
be replaced. For stacking, the [<unit>]parameter identifies the node on which this
command must be executed. When this parameter is not supplied, the command is executed
on all nodes in a Stack.
Format
Mode
filedescr [<unit>] {image1 | image2} <text-description>
Privileged EXEC
Utility Commands
533
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
update bootcode
This command updates the bootcode (boot loader) on the switch. The bootcode is read from
the active-image for subsequent reboots. The optional <unit>parameter is valid only on
Stacks. Error will be returned, if this parameter is provided, on Standalone systems. For
Stacking, the <unit>parameter identifies the node on which this command must be
executed. When this parameter is not supplied, the command is executed on all nodes in a
Stack.
Format
Mode
update bootcode [<unit>]
Privileged EXEC
System Information and Statistics Commands
This section describes the commands you use to view information about system features,
components, and configurations.
show arp switch
This command displays the contents of the IP stack’s Address Resolution Protocol (ARP)
table. The IP stack only learns ARP entries associated with the management interfaces -
network or service ports. ARP entries associated with routing interfaces are not listed.
Format
Mode
show arp switch
Privileged EXEC
Term
Definition
IP Address
IP address of the management interface or another device on the management network.
Hardware MAC address of that device.
MAC Address
Interface
For a service port the output is Management. For a network port, the output is the
unit/slot/port of the physical interface.
show eventlog
This command displays the event log, which contains error messages from the system. The
event log is not cleared on a system reset. The <unit> is the switch identifier.
Format
Mode
show eventlog [<unit>]
Privileged EXEC
Utility Commands
534
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
File
Definition
The file in which the event originated.
The line number of the event.
The task ID of the event.
The event code.
Line
Task Id
Code
Time
Unit
The time this event occurred.
The unit for the event.
Note: Event log information is retained across a switch reset.
show hardware
This command displays inventory information for the switch.
Note: The show version command and the show hardware command
display the same information. In future releases of the software, the
show hardware command will not be available. For a description of
Format
Mode
show hardware
Privileged EXEC
show version
This command displays inventory information for the switch.
Note: The show version command will replace the show hardware
command in future releases of the software.
Format
Mode
show version
Privileged EXEC
Utility Commands
535
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Switch
Description
Text used to identify the product name of this switch.
Machine Type
Machine Model
Serial Number
FRU Number
Manufacturer
The machine model as defined by the Vital Product Data.
The machine model as defined by the Vital Product Data
The unique box serial number for this switch.
The field replaceable unit number.
Manufacturer descriptor field.
Burned in MAC
Address
Universally assigned network address.
Software
Version
The release.version.revision number of the code currently running on the switch.
The additional packages incorporated into this system.
Additional
Packages
show interface
This command displays a summary of statistics for a specific interface or a count of all CPU
traffic based upon the argument.
Format
Mode
show interface {<unit/slot/port> | switchport}
Privileged EXEC
The display parameters, when the argument is <unit/slot/port>, are as follows:
Parameters
Definition
Packets
Received
Without Error
The total number of packets (including broadcast packets and multicast packets)
received by the processor.
Packets
Received With
Error
The number of inbound packets that contained errors preventing them from being
deliverable to a higher-layer protocol.
Broadcast
Packets
Received
The total number of packets received that were directed to the broadcast address. Note
that this does not include multicast packets.
Packets
Transmitted
Without Error
The total number of packets transmitted out of the interface.
Transmit
Packets Errors
The number of outbound packets that could not be transmitted because of errors.
The best estimate of the total number of collisions on this Ethernet segment.
Collisions
Frames
Time Since
Counters Last
Cleared
The elapsed time, in days, hours, minutes, and seconds since the statistics for this port
were last cleared.
Utility Commands
536
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The display parameters, when the argument is “switchport” are as follows:
Term
Definition
Packets
Received
Without Error
The total number of packets (including broadcast packets and multicast packets)
received by the processor.
Broadcast
Packets
Received
The total number of packets received that were directed to the broadcast address. Note
that this does not include multicast packets.
Packets
Received With
Error
The number of inbound packets that contained errors preventing them from being
deliverable to a higher-layer protocol.
Packets
Transmitted
Without Error
The total number of packets transmitted out of the interface.
Broadcast
Packets
Transmitted
The total number of packets that higher-level protocols requested to be transmitted to the
Broadcast address, including those that were discarded or not sent.
TransmitPacket
Errors
The number of outbound packets that could not be transmitted because of errors.
AddressEntries
Currently In Use
The total number of Forwarding Database Address Table entries now active on the
switch, including learned and static entries.
VLAN Entries
Currently In Use
The number of VLAN entries presently occupying the VLAN table.
Time Since
Counters Last
Cleared
The elapsed time, in days, hours, minutes, and seconds since the statistics for this switch
were last cleared.
show interface counters
This command reports key summary statistics for all ports (physical, CPU, and port-channel).
Format
show interface counters
Mode
Privileged EXEC
The following shows example CLI display output for the command.
(Routing) #show interface counters
Port
InOctets
InUcastPkts
InMcastPkts
InBcastPkts
--------- ---------------- ---------------- ---------------- ----------------
0/1
0/2
0/3
0/4
0/5
0/6
0/7
0/8
0/9
0/10
0/11
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
31
0
0
0
0
0
0
0
0
0
0
39
0
0
0
0
0
0
0
0
15098
0
0
0
0
0
0
0
0
Utility Commands
537
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show interface ethernet
This command displays detailed statistics for a specific interface or for all CPU traffic based
upon the argument.
Format
Mode
show interface ethernet{unit/slot/port | switchport}
Privileged EXEC
When you specify a value for unit/slot/port, the command displays the following
information.
Term
Packets Received
Definition
•
Total Packets Received (Octets) - The total number of octets of data (including those in
bad packets) received on the network (excluding framing bits but including Frame Check
Sequence (FCS) octets). This object can be used as a reasonable estimate of Ethernet
utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects
should be sampled before and after a common interval. The result of this equation is the
value Utilization which is the percent utilization of the Ethernet segment on a scale of 0 to
100 percent.
•
•
Packets Received 64 Octets - The total number of packets (including bad packets)
received that were 64 octets in length (excluding framing bits but including FCS octets).
Packets Received 65–127 Octets - The total number of packets (including bad packets)
received that were between 65 and 127 octets in length inclusive (excluding framing bits
but including FCS octets).
•
•
•
•
•
•
Packets Received 128–255 Octets - The total number of packets (including bad packets)
received that were between 128 and 255 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Received 256–511 Octets - The total number of packets (including bad packets)
received that were between 256 and 511 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Received 512–1023 Octets - The total number of packets (including bad packets)
received that were between 512 and 1023 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Received 1024–1518 Octets - The total number of packets (including bad
packets) received that were between 1024 and 1518 octets in length inclusive (excluding
framing bits but including FCS octets).
Packets Received > 1518 Octets - The total number of packets received that were longer
than 1522 octets (excluding framing bits, but including FCS octets) and were otherwise well
formed.
Packets RX and TX 64 Octets - The total number of packets (including bad packets)
received and transmitted that were 64 octets in length (excluding framing bits but including
FCS octets).
Utility Commands
538
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
(cont)
•
•
•
•
•
•
•
•
•
Packets RX and TX 65–127 Octets - The total number of packets (including bad packets)
received and transmitted that were between 65 and 127 octets in length inclusive
(excluding framing bits but including FCS octets).
Packets RX and TX 128–255 Octets - The total number of packets (including bad packets)
received and transmitted that were between 128 and 255 octets in length inclusive
(excluding framing bits but including FCS octets).
Packets RX and TX 256–511 Octets - The total number of packets (including bad packets)
received and transmitted that were between 256 and 511 octets in length inclusive
(excluding framing bits but including FCS octets).
Packets RX and TX 512–1023 Octets - The total number of packets (including bad
packets) received and transmitted that were between 512 and 1023 octets in length
inclusive (excluding framing bits but including FCS octets).
Packets RX and TX 1024–1518 Octets - The total number of packets (including bad
packets) received and transmitted that were between 1024 and 1518 octets in length
inclusive (excluding framing bits but including FCS octets).
Packets RX and TX 1519–1522 Octets - The total number of packets (including bad
packets) received and transmitted that were between 1519 and 1522 octets in length
inclusive (excluding framing bits but including FCS octets).
Packets RX and TX 1523–2047 Octets - The total number of packets received and
transmitted that were between 1523 and 2047 octets in length inclusive (excluding framing
bits, but including FCS octets) and were otherwise well formed.
Packets RX and TX 2048–4095 Octets - The total number of packets received that were
between 2048 and 4095 octets in length inclusive (excluding framing bits, but including
FCS octets) and were otherwise well formed.
Packets RX and TX 4096–9216 Octets - The total number of packets received that were
between 4096 and 9216 octets in length inclusive (excluding framing bits, but including
FCS octets) and were otherwise well formed.
Packets Received
Successfully
•
•
•
Total Packets Received Without Error - The total number of packets received that were
without errors.
Unicast Packets Received - The number of subnetwork-unicast packets delivered to a
higher-layer protocol.
Multicast Packets Received - The total number of good packets received that were
directed to a multicast address. Note that this number does not include packets directed to
the broadcast address.
•
Broadcast Packets Received - The total number of good packets received that were
directed to the broadcast address. Note that this does not include multicast packets.
Receive Packets
Discarded
The number of inbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. One possible reason
for discarding such a packet could be to free up buffer space.
Utility Commands
539
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Packets Received
with MAC Errors
•
•
Total Packets Received with MAC Errors - The total number of inbound packets that
contained errors preventing them from being deliverable to a higher-layer protocol.
Jabbers Received - The total number of packets received that were longer than 1518
octets (excluding framing bits, but including FCS octets), and had either a bad Frame
Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a
non-integral number of octets (Alignment Error). Note that this definition of jabber is
different than the definition in IEEE-802.3 section 8.2.1.5 (10BASE5) and section 10.3.1.4
(10BASE2). These documents define jabber as the condition where any packet exceeds 20
ms. The allowed range to detect jabber is between 20 ms and 150 ms.
•
•
Fragments/Undersize Received - The total number of packets received that were less
than 64 octets in length (excluding framing bits but including FCS octets).
Alignment Errors - The total number of packets received that had a length (excluding
framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had a
bad Frame Check Sequence (FCS) with a non-integral number of octets.
•
•
Rx FCS Errors - The total number of packets received that had a length (excluding framing
bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad
Frame Check Sequence (FCS) with an integral number of octets.
Overruns - The total number of frames discarded as this port was overloaded with
incoming packets, and could not keep up with the inflow.
Received Packets
Not Forwarded
•
•
•
Total Received Packets Not Forwarded - A count of valid frames received which were
discarded (in other words, filtered) by the forwarding process
Local Traffic Frames - The total number of frames dropped in the forwarding process
because the destination address was located off of this port.
802.3x Pause Frames Received - A count of MAC Control frames received on this
interface with an opcode indicating the PAUSE operation. This counter does not increment
when the interface is operating in half-duplex mode.
•
•
•
•
•
•
Unacceptable Frame Type - The number of frames discarded from this port due to being
an unacceptable frame type.
Multicast Tree Viable Discards - The number of frames discarded when a lookup in the
multicast tree for a VLAN occurs while that tree is being modified.
Reserved Address Discards - The number of frames discarded that are destined to an
IEEE 802.1 reserved address and are not supported by the system.
Broadcast Storm Recovery - The number of frames discarded that are destined for
FF:FF:FF:FF:FF:FF when Broadcast Storm Recovery is enabled.
CFI Discards - The number of frames discarded that have CFI bit set and the addresses in
RIF are in non-canonical format.
Upstream Threshold - The number of frames discarded due to lack of cell descriptors
available for that packet's priority level.
Utility Commands
540
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Packets
Transmitted
Octets
•
Total Packets Transmitted (Octets) - The total number of octets of data (including those in
bad packets) received on the network (excluding framing bits but including FCS octets).
This object can be used as a reasonable estimate of Ethernet utilization. If greater
precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled
before and after a common interval. -----
•
•
Packets Transmitted 64 Octets - The total number of packets (including bad packets)
received that were 64 octets in length (excluding framing bits but including FCS octets).
Packets Transmitted 65-127 Octets - The total number of packets (including bad packets)
received that were between 65 and 127 octets in length inclusive (excluding framing bits
but including FCS octets).
•
•
•
•
•
•
Packets Transmitted 128-255 Octets - The total number of packets (including bad
packets) received that were between 128 and 255 octets in length inclusive (excluding
framing bits but including FCS octets).
Packets Transmitted 256-511 Octets - The total number of packets (including bad
packets) received that were between 256 and 511 octets in length inclusive (excluding
framing bits but including FCS octets).
Packets Transmitted 512-1023 Octets - The total number of packets (including bad
packets) received that were between 512 and 1023 octets in length inclusive (excluding
framing bits but including FCS octets).
Packets Transmitted 1024-1518 Octets - The total number of packets (including bad
packets) received that were between 1024 and 1518 octets in length inclusive (excluding
framing bits but including FCS octets).
Packets Transmitted > 1518 Octets - The total number of packets transmitted that were
longer than 1518 octets (excluding framing bits, but including FCS octets) and were
otherwise well formed.
Max Frame Size - The maximum size of the Info (non-MAC) field that this port will receive
or transmit.
Packets
Transmitted
Successfully
•
•
Total Packets Transmitted Successfully- The number of frames that have been
transmitted by this port to its segment.
Unicast Packets Transmitted - The total number of packets that higher-level protocols
requested be transmitted to a subnetwork-unicast address, including those that were
discarded or not sent.
•
•
Multicast Packets Transmitted - The total number of packets that higher-level protocols
requested be transmitted to a Multicast address, including those that were discarded or not
sent.
Broadcast Packets Transmitted - The total number of packets that higher-level protocols
requested be transmitted to the Broadcast address, including those that were discarded or
not sent.
Transmit Packets The number of outbound packets which were chosen to be discarded even though no errors
Discarded
had been detected to prevent their being deliverable to a higher-layer protocol. A possible
reason for discarding a packet could be to free up buffer space.
Transmit Errors
•
•
Total Transmit Errors - The sum of Single, Multiple, and Excessive Collisions.
Tx FCS Errors - The total number of packets transmitted that had a length (excluding
framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had a
bad Frame Check Sequence (FCS) with an integral number of octets.
•
•
Oversized - The total number of frames that exceeded the max permitted frame size. This
counter has a max increment rate of 815 counts per sec. at 10 Mb/s.
Underrun Errors - The total number of frames discarded because the transmit FIFO buffer
became empty during frame transmission.
Utility Commands
541
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Transmit Discards • Total Transmit Packets Discards - The sum of single collision frames discarded, multiple
collision frames discarded, and excessive frames discarded.
•
•
•
•
Single Collision Frames - A count of the number of successfully transmitted frames on a
particular interface for which transmission is inhibited by exactly one collision.
Multiple Collision Frames - A count of the number of successfully transmitted frames on
a particular interface for which transmission is inhibited by more than one collision.
Excessive Collisions - A count of frames for which transmission on a particular interface
fails due to excessive collisions.
Port Membership Discards - The number of frames discarded on egress for this port due
to egress filtering being enabled.
Protocol Statistics • 802.3x Pause Frames Transmitted - A count of MAC Control frames transmitted on this
interface with an opcode indicating the PAUSE operation. This counter does not increment
when the interface is operating in half-duplex mode.
•
•
•
GVRP PDUs Received - The count of GVRP PDUs received in the GARP layer.
GVRP PDUs Transmitted - The count of GVRP PDUs transmitted from the GARP layer.
GVRP Failed Registrations - The number of times attempted GVRP registrations could
not be completed.
•
•
•
GMRP PDUs Received - The count of GMRP PDUs received in the GARP layer.
GMRP PDUs Transmitted - The count of GMRP PDUs transmitted from the GARP layer.
GMRP Failed Registrations - The number of times attempted GMRP registrations could
not be completed.
•
•
•
•
STP BPDUs Transmitted - Spanning Tree Protocol Bridge Protocol Data Units sent.
STP BPDUs Received - Spanning Tree Protocol Bridge Protocol Data Units received.
RST BPDUs Transmitted - Rapid Spanning Tree Protocol Bridge Protocol Data Units sent.
RSTP BPDUs Received - Rapid Spanning Tree Protocol Bridge Protocol Data Units
received.
•
•
MSTP BPDUs Transmitted - Multiple Spanning Tree Protocol Bridge Protocol Data Units
sent.
MSTP BPDUs Received - Multiple Spanning Tree Protocol Bridge Protocol Data Units
received.
Dot1x Statistics
•
•
EAPOL Frames Transmitted - The number of EAPOL frames of any type that have been
transmitted by this authenticator.
EAPOL Frames Received - The number of valid EAPOL frames of any type that have
been received by this authenticator.
Time Since
Counters Last
Cleared
The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were
last cleared.
If you use the switchportkeyword, the following information appears.
Term
Definition
Octets Received
The total number of octets of data received by the processor (excluding framing bits but
including FCS octets).
Total Packets
The total number of packets (including broadcast packets and multicast packets) received by
Received Without the processor.
Error
Utility Commands
542
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
The number of subnetwork-unicast packets delivered to a higher-layer protocol.
Unicast Packets
Received
Multicast Packets The total number of packets received that were directed to a multicast address. Note that this
Received
number does not include packets directed to the broadcast address.
Broadcast
The total number of packets received that were directed to the broadcast address. Note that
Packets Received this does not include multicast packets.
Receive Packets
Discarded
The number of inbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. A possible reason
for discarding a packet could be to free up buffer space.
Octets
The total number of octets transmitted out of the interface, including framing characters.
Transmitted
Packets
The total number of packets transmitted out of the interface.
Transmitted
without Errors
Unicast Packets
Transmitted
The total number of packets that higher-level protocols requested be transmitted to a
subnetwork-unicast address, including those that were discarded or not sent.
Multicast Packets The total number of packets that higher-level protocols requested be transmitted to a Multicast
Transmitted
address, including those that were discarded or not sent.
Broadcast
Packets
The total number of packets that higher-level protocols requested be transmitted to the
Broadcast address, including those that were discarded or not sent.
Transmitted
Most Address
The highest number of Forwarding Database Address Table entries that have been learned by
Entries Ever Used this switch since the most recent reboot.
Address Entries
in Use
The number of Learned and static entries in the Forwarding Database Address Table for this
switch.
Maximum VLAN
Entries
The maximum number of Virtual LANs (VLANs) allowed on this switch.
Most VLAN
Entries Ever Used
The largest number of VLANs that have been active on this switch since the last reboot.
The number of presently active VLAN entries on this switch that have been created statically.
Static VLAN
Entries
Dynamic VLAN
Entries
The number of presently active VLAN entries on this switch that have been created by GVRP
registration.
VLAN Deletes
The number of VLANs on this switch that have been created and then deleted since the last
reboot.
Time Since
Counters Last
Cleared
The elapsed time, in days, hours, minutes, and seconds, since the statistics for this switch were
last cleared.
Utility Commands
543
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show mac-addr-table
This command displays the forwarding database entries. These entries are used by the
transparent bridging function to determine how to forward a received frame.
Enter allor no parameter to display the entire table. Enter a MAC Address and VLAN ID to
display the table entry for the requested MAC address on the specified VLAN. Enter the
countparameter to view summary information about the forwarding database table. Use the
interface <unit/slot/port> parameter to view MAC addresses on a specific
interface. Use the vlan <vlan_id>parameter to display information about MAC addresses
on a specified VLAN.
Format
Mode
show mac-addr-table [{<macaddr> <vlan_id> | all | count | interface
<unit/slot/port> | vlan <vlan_id>}]
Privileged EXEC
The following information displays if you do not enter a parameter, the keyword all, or the
MAC address and VLAN ID. If you enter vlan <vlan_id>, only the Mac Address, Interface,
and Status fields appear.
Term
Definition
Mac Address
A unicast MAC address for which the switch has forwarding and or filtering information.
The format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for
example 01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as
8 bytes.
Interface
The port through which this address was learned.
Interface Index
Status
This object indicates the ifIndex of the interface table entry associated with this port.
The status of this entry. The meanings of the values are:
• Static—The value of the corresponding instance was added by the system or a user
when a static MAC filter was defined. It cannot be relearned.
• Learned—The value of the corresponding instance was learned by observing the
source MAC addresses of incoming traffic, and is currently in use.
• Management—The value of the corresponding instance (system MAC address) is also
the value of an existing instance of dot1dStaticAddress. It is identified with interface
0/1. and is currently used when enabling VLANs for routing.
• Self—The value of the corresponding instance is the address of one of the switch’s
physical interfaces (the system’s own MAC address).
• GMRP Learned—The value of the corresponding was learned via GMRP and applies
to Multicast.
• Other—The value of the corresponding instance does not fall into one of the other
categories.
If you enter the interface <unit/slot/port> parameter, in addition to the MAC
Address and Status fields, the following field appears:
Term
VLAN ID
Definition
The VLAN on which the MAC address was learned.
Utility Commands
544
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following information displays if you enter the countparameter:
Term
Definition
Dynamic
Address count
Number of MAC addresses in the forwarding database that were automatically learned.
Static Address
(User-defined)
count
Number of MAC addresses in the forwarding database that were manually entered by a
user.
Total MAC
Addresses in
use
Number of MAC addresses currently in the forwarding database.
Number of MAC addresses the forwarding database can handle.
Total MAC
Addresses
available
process cpu threshold
Use this command to configure the CPU utilization thresholds. The Rising and Falling
thresholds are specified as a percentage of CPU resources. The utilization monitoring time
period can be configured from 5 seconds to 86400 seconds in multiples of 5 seconds. The
CPU utilization threshold configuration is saved across a switch reboot. Configuring the
falling utilization threshold is optional. If the falling CPU utilization parameters are not
configured, then they take the same value as the rising CPU utilization parameters.
Format
process cpu threshold type total rising <1-100> interval
<5-86400> {rising <1-100> interval <5-86400>}
Mode
Global Config
Parameter
Description
rising threshold
The percentage of CPU resources that, when exceeded for the configured rising interval,
triggers a notification. The range is 1 to 100. The default is 0 (disabled).
rising interval
The duration of the CPU rising threshold violation, in seconds, that must be met to trigger a
notification. The range is 5 to 86400. The default is 0 (disabled).
falling threshold
The percentage of CPU resources that, when usage falls below this level for the configured
interval, triggers a notification. The range is 1 to 100. The default is 0 (disabled). A notification
is triggered when the total CPU utilization falls below this level for a configured period of time.
The falling utilization threshold notification is made only if a rising threshold notification was
previously done. The falling utilization threshold must always be equal or less than the rising
threshold value. The CLI does not allow setting the falling threshold to be greater than the
rising threshold.
falling interval
The duration of the CPU falling threshold, in seconds, that must be met to trigger a
notification. The range is 5 to 86400. The default is 0 (disabled).
show process cpu
This command provides the percentage utilization of the CPU by different tasks.
Utility Commands
545
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: It is not necessarily the traffic to the CPU, but different tasks that
keep the CPU busy.
Format
Mode
show process cpu
Privileged EXEC
The following shows example CLI display output.
(Switch) #show process cpu
Memory Utilization Report
status
bytes
------ ----------
free 192980480
alloc 53409968
Task Utilization Report
Task
Utilization
----------------------- -----------
bcmL2X.0
bcmCNTR.0
bcmLINK.0
DHCP snoop
Dynamic ARP Inspection
dot1s_timer_task
dhcpsPingTask
0.75%
0.20%
0.35%
0.10%
0.10%
0.10%
0.20%
show mbuf total
This command shows the total system buffer pools status.
Format
Mode
show mbuf total
Privileged EXEC
The following shows an example of CLI display output for the command.
(switch) #show mbuf total
mbufSize
9284 (0x2444)
Current Time
MbufsFree
MbufsRxUsed
0x1897fa
150
0
Total Rx Norm Alloc Attempts 26212
Total Rx Mid2 Alloc Attempts 4087
Total Rx Mid1 Alloc Attempts 188943
Total Rx High Alloc Attempts 384555
Total Tx Alloc Attempts
2478536
Total Rx Norm Alloc Failures 0
Total Rx Mid2 Alloc Failures 0
Utility Commands
546
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Total Rx Mid1 Alloc Failures 0
Total Rx High Alloc Failures 0
Total Tx Alloc Failures
0
show running-config
Use this command to display or capture the current setting of different protocol packages
supported on the switch. This command displays or captures commands with settings and
configurations that differ from the default value. To display or capture the commands with
settings and configurations that are equal to the default value, include the [all] option.
Note: Show running-config does not display the User Password, even if
you set one different from the default.
The output is displayed in script format, which can be used to configure another switch with
the same configuration. If the optional <scriptname>is provided with a file name extension
of “.scr”, the output is redirected to a script file.
Note: If you issue the show running-config command from a serial
connection, access to the switch through remote connections (such
as Telnet) is suspended while the output is being generated and
displayed.
Note: If you use a text-based configuration file, the show
running-configcommand will only display configured physical
interfaces, i.e. if any interface only contains the default configuration,
that interface will be skipped from the show running-config
command output. This is true for any configuration mode that
contains nothing but default configuration. That is, the command to
enter a particular config mode, followed immediately by its ‘exit’
command, are both omitted from the show running-config
command output (and hence from the startup-config file when the
system configuration is saved.)
If all the flags in a particular group are enabled, then the command displays trapflags
<group name> all.
Utility Commands
547
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If some, but not all, of the flags in that group are enabled, the command displays trapflags
<groupname> <flag-name>.
Format
Mode
show running-config [all | <scriptname>]
Privileged EXEC
show running-config interface
This command shows the current configuration on a particular interface. The interface could
be a physical port or a virtual port—like a LAG or VLAN. The output captures how the
configuration differs from the factory default value.
Format
show running-config interface {<unit/slot/port>} | VLAN <id> | LAG <id>}
Mode
Interface Config
show sysinfo
This command displays switch information.
Format
Mode
show sysinfo
Privileged EXEC
Term
Definition
Switch
Description
Text used to identify this switch.
System Name
Name used to identify the switch. The factory default is blank. To configure the system
System
Location
Text used to identify the location of the switch. The factory default is blank. To configure
System Contact
Text used to identify a contact person for this switch. The factory default is blank. To
System Object
ID
The base object ID for the switch’s enterprise MIB.
System Up Time
MIBs Supported
The time in days, hours and minutes since the last switch reboot.
A list of MIBs supported by this agent.
show tech-support
Use this command to display system and configuration information when you contact
technical support. The output of this command combines the output of the following
commands:
•
•
show version
show sysinfo
Utility Commands
548
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
•
•
•
•
•
show port all
show isdp neighbors
show logging
show event log
show logging buffered
show trap log
Format
Mode
show tech-support
Privileged EXEC
show tech-support techsupport
This command without the techsupportparameter displays system and configuration
information on the console. To generate the information in a file, specify the techsupport
parameter.
Format
show tech-support techsupport
Mode
Privileged EXEC
length
Use this command to set the pagination length to value number of lines for the sessions
specified by configuring on different Line Config modes (telnet, ssh, and console) and is
persistent.
Default
24
Format
Mode
length <0|5-48>
Line Config
no length value
Use this command to set the pagination length to the default value number of lines.
Format
no length
Mode
Line Config
terminal length
Use this command to set the number of lines of output to be displayed on the screen, i.e.
pagination, for the show running-configand show running-config allcommands.
The terminal length size is either zero or a number in the range of 5 to 48. After the
user-configured number of lines is displayed in one page, the system prompts the user
“--More-- or (q)uit.” Press q or Q to quit, or press any key to display the next set
Utility Commands
549
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
of <5-48> lines. The command terminal length 0 disables pagination and, as a result,
the output of the show running-config command is displayed immediately.
Default
24 lines per page
Format
Mode
terminal length <0|5-48>
Privileged EXEC
no terminal length
Use this command to set the terminal length to the default value.
Format
Mode
no terminal length
Privileged EXEC
show terminal length
Use this command to display the value of the user-configured terminal length size.
Format
Mode
show terminal length
Privileged EXEC
memory free low-watermark processor
Use this command to get notifications when the CPU free memory falls below the configured
threshold. A notification is generated when the free memory falls below the threshold.
Another notification is generated once the available free memory rises to 10 percent above
the specified threshold. To prevent generation of excessive notifications when the CPU free
memory fluctuates around the configured threshold, only one Rising or Falling memory
notification is generated over a period of 60 seconds. The threshold is specified in kilobytes.
The CPU free memory threshold configuration is saved across a switch reboot.
Format
memory free low-watermark processor <1-1034956>
Mode
Global Config
Parameter
Description
low-watermark
When CPU free memory falls below this threshold, a notification message is triggered.
The range is 1 to the maximum available memory on the switch. The default is 0
(disabled).
Logging Commands
This section describes the commands you use to configure system logging, and to view logs
and the logging settings.
Utility Commands
550
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
logging buffered
This command enables logging to an in-memory log that keeps up to 128 logs.
Default
disabled; critical when enabled
Format
Mode
logging buffered
Global Config
no logging buffered
This command disables logging to in-memory log.
Format
Mode
no logging buffered
Global Config
logging buffered wrap
This command enables wrapping of in-memory logging when the log file reaches full
capacity. Otherwise when the log file reaches full capacity, logging stops.
Default
enabled
Format
Mode
logging buffered wrap
Privileged EXEC
no logging buffered wrap
This command disables wrapping of in-memory logging and configures logging to stop when
the log file capacity is full.
Format
Mode
no logging buffered wrap
Privileged EXEC
logging cli-command
This command enables the CLI command logging feature, which enables the 7000 series
software to log all CLI commands issued on the system.
Default
enabled
Format
Mode
logging cli-command
Global Config
Utility Commands
551
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no logging cli-command
This command disables the CLI command Logging feature.
Format
Mode
no logging cli-command
Global Config
logging console
This command enables logging to the console. You can specify the <severitylevel>
value as either an integer from 0 to 7 or symbolically through one of the following keywords:
emergency(0), alert(1), critical(2), error(3), warning(4), notice(5), info(6),
or debug(7).
Default
disabled; critical when enabled
Format
Mode
logging console [severitylevel]
Global Config
no logging console
This command disables logging to the console.
Format
Mode
no logging console
Global Config
logging host
This command enables logging to a host. You can configure up to eight hosts. The
<ipaddr|hostname>is the IP address of the logging host. The <addresstype>indicates
the type of address ipv4 or ipv6 or dns being passed. The <port>value is a port number
from 1 to 65535. You can specify the <severitylevel>value as either an integer from 0 to
7 or symbolically through one of the following keywords: emergency(0), alert(1),
critical(2), error(3), warning(4), notice(5), info(6), or debug(7).
The end user can configure either an IPv4 or IPv6 address or a host name for a Syslog
collector among the list of servers.
Default
• port—514
• level—critical (2)
Format
Mode
logging host <ipaddr|hostname> <addresstype>
[<port>][<severitylevel>]
Global Config
Utility Commands
552
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
logging host remove
indexes.
Format
Mode
logging host remove <hostindex>
Global Config
logging syslog
This command enables syslog logging. The <portid>parameter is an integer with a range
of 1-65535.
Default
disabled
Format
Mode
logging syslog [port <portid>]
Global Config
no logging syslog
This command disables syslog logging.
Format
Mode
no logging syslog
Global Config
logging syslog source-interface
This command configures the syslog source-interface.
Format
Mode
logging syslog source-interface {<u/s/p> | {loopback <loopback-id>}
| {tunnel <tunnel-id>}}
Global Config
show logging
This command displays logging configuration information.
Format
Mode
show logging
Privileged EXEC
Term
Definition
Logging Client
Local Port
Port on the collector/relay to which syslog messages are sent.
CLI Command
Logging
Shows whether CLI Command logging is enabled.
Shows whether console logging is enabled.
Console
Logging
Utility Commands
553
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Console
Logging
Severity Filter
The minimum severity to log to the console log. Messages with an equal or lower
numerical severity are logged.
Buffered
Logging
Shows whether buffered logging is enabled.
Shows whether syslog logging is enabled.
Syslog Logging
Log Messages
Received
Number of messages received by the log process. This includes messages that are
dropped or ignored.
Log Messages
Dropped
Number of messages that could not be processed due to error or lack of resources.
Number of messages sent to the collector/relay.
Log Messages
Relayed
show logging buffered
This command displays buffered logging (system startup and system operation logs).
Format
Mode
show logging buffered
Privileged EXEC
Term
Definition
Buffered
(In-Memory)
Logging
Shows whether the In-Memory log is enabled or disabled.
Buffered
Logging
Wrapping
Behavior
The behavior of the In Memory log when faced with a log full situation.
The count of valid entries in the buffered log.
Buffered Log
Count
show logging hosts
This command displays all configured logging hosts.
Format
Mode
show logging hosts
Privileged EXEC
Term
Definition
Host Index
(Used for deleting hosts.)
IP address or hostname of the logging host.
IP Address /
Hostname
Utility Commands
554
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Severity Level
The minimum severity to log to the specified address. The possible values are
emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug
(7).
Port
The server port number, which is the port on the local host from which syslog messages
are sent.
Host Status
The state of logging to configured syslog hosts. If the status is disable, no logging occurs.
show logging traplogs
This command displays SNMP trap events and statistics.
Format
Mode
show logging traplogs
Privileged EXEC
Term
Definition
Number of
Traps Since
Last Reset
The number of traps since the last boot.
Trap Log
Capacity
The number of traps the system can retain.
Number of
TrapsSinceLog
Last Viewed
The number of new traps since the command was last executed.
Log
The log number.
System Time Up
Trap
How long the system had been running at the time the trap was sent.
The text of the trap message.
logging persistent
Use this command to configure the Persistent logging for the switch. The severity level of
logging messages is specified at severity level. Possible values for severity level are
(emergency|0, alert|1, critical|2, error|3, warning|4, notice|5,
info|6, debug|7).
Default
Disable
Format
Mode
logging persistent <severity level>
Global Config
Utility Commands
555
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no logging persistent
Use this command to disable the persistent logging in the switch.
Format
Mode
no logging persistent
Global Config
Email Alerting and Mail Server Commands
logging email
This command enables email alerting and sets the lowest severity level for which log
messages are emailed. If you specify a severity level, log messages at or above this severity
level, but below the urgent severity level, are emailed in a non-urgent manner by collecting
them together until the log time expires. You can specify the severitylevel value as either an
integer from 0 to 7 or symbolically through one of the following keywords: emergency(0),
alert(1), critical(2), error(3), warning(4), notice(5), info(6), or debug(7).
Default
Disabled; when enabled, log messages at or above severity Warning (4) are emailed
Format
Mode
logging email [<severitylevel>]
Global Config
no logging email
This command disables email alerting.
Format
Mode
no logging email
Global Config
logging email urgent
This command sets the lowest severity level at which log messages are emailed immediately
in a single email message. Specify the severitylevel value as either an integer from 0 to 7 or
symbolically through one of the following keywords: emergency(0), alert(1), critical
(2), error(3), warning(4), notice(5), info(6), or debug(7). Specify noneto indicate
that log messages are collected and sent in a batch email at a specified interval.
Default
Alert (1) and emergency (0) messages are sent immediately
Format
Mode
logging email urgent {<severitylevel> | none }
Global Config
Utility Commands
556
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no logging email urgent
This command resets the urgent severity level to the default value.
Format
Mode
no logging email urgent
Global Config
logging email message-type to-addr
This command configures the email address to which messages are sent. The message
types supported are urgent, non-urgent, and both. For each supported severity level,
multiple email addresses can be configured. The to-email-addr variable is a standard email
Format
Mode
logging email message-type {urgent |non-urgent |both}
to-addr <to-email-addr>
Global Config
no logging email message-type to-addr
This command removes the configured to-addr field of email.
Format
Mode
no logging email message-type {urgent |non-urgent |both}
to-addr <to-email-addr>
Global Config
logging email from-addr
This command configures the email address of the sender (the switch).
Default
Format
Mode
logging email from-addr <from-email-addr>
Global Config
no logging email from-addr
This command removes the configured email source address.
Format
Mode
no logging email from-addr <from-email-addr>
Global Config
Utility Commands
557
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
logging email message-type subject
This command configures the subject line of the email for the specified type.
Default
For urgent messages: Urgent Log Messages
For non-urgent messages: Non Urgent Log Messages
Format
Mode
logging email message-type {urgent |non-urgent |both} subject
<subject>
Global Config
no logging email message-type subject
This command removes the configured email subject for the specified message type and
restores it to the default email subject.
Format
Mode
no logging email message-type {urgent |non-urgent |both} subject
Global Config
logging email logtime
This command configures how frequently non-urgent email messages are sent. Non-urgent
messages are collected and sent in a batch email at the specified interval. The valid range is
every 30- 1440 minutes.
Default
30 minutes
Format
Mode
logging email logtime <minutes>
Global Config
no logging email logtime
This command resets the non-urgent log time to the default value.
Format
Mode
no logging email logtime
Global Config
logging traps
This command sets the severity at which SNMP traps are logged and sent in an email.
Specify the severitylevel value as either an integer from 0 to 7 or symbolically through one of
the following keywords: emergency(0), alert(1), critical(2), error(3), warning(4),
notice(5), info(6), or debug(7).
Default
Info (6) messages and higher are logged.
Format
Mode
logging traps <severitylevel>
Global Config
Utility Commands
558
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no logging traps
This command resets the SNMP trap logging severity level to the default value.
Format
Mode
no logging traps
Global Config
logging email test message-type
This command sends an email to the SMTP server to test the email alerting function.
Format
Mode
logging email test message-type {urgent |non-urgent |both}
message-body <message-body>
Global Config
show logging email config
This command displays information about the email alert configuration.
Format
Mode
show logging email config
Privileged EXEC
Term
Definition
Email Alert Logging
The administrative status of the feature: enabled or disabled
The email address of the sender (the switch).
Email Alert From
Address
Email Alert Urgent
Severity Level
The lowest severity level that is considered urgent. Messages of this type are
sent immediately.
Email Alert Non Urgent
Severity Level
The lowest severity level that is considered non-urgent. Messages of this type,
up to the urgent level, are collected and sent in a batch email. Log messages
that are less severe are not sent in an email message at all.
Email Alert Trap Severity
Level
The lowest severity level at which traps are logged.
The amount of time to wait between non-urgent messages.
The configured email recipients.
Email Alert Notification
Period
Email Alert To Address
Table
Email Alert Subject Table
The subject lines included in urgent (Type 1) and non-urgent (Type 2)
messages.
For Msg Type urgent,
subject is
The configured email subject for sending urgent messages.
The configured email subject for sending non-urgent messages.
For Msg Type
non-urgent, subject is
Utility Commands
559
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show logging email statistics
This command displays email alerting statistics.
Format
show logging email statistics
Mode
Privileged EXEC
Term
Definition
Email Alert Operation
Status
The operational status of the email alerting feature.
No of Email Failures
The number of email messages that have attempted to be sent but were
unsuccessful.
No of Email Sent
The number of email messages that were sent from the switch since the
counter was cleared.
Time Since Last Email
Sent
The amount of time that has passed since the last email was sent from the
switch.
clear logging email statistics
This command resets the email alerting statistics.
Format
Mode
clear logging email statistics
Privileged EXEC
mail-server
Use this command to configure the SMTP server to which the switch sends email alert
messages and change the mode to Mail Server Configuration mode. The server address can
be in the IPv4, IPv6, or DNS name format.
Format
Mode
mail-server {ip-address | ipv6-address | hostname}
Global Config
no mail-server
Use this command to remove the specified SMTP server from the configuration.
Format
Mode
no mail-server {ip-address | ipv6-address | hostname}
Global Config
Utility Commands
560
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
security
Use this command to set the email alerting security protocol by enabling the switch to use
TLS authentication with the SMTP Server. If the TLS mode is enabled on the switch but the
SMTP sever does not support TLS mode, no email is sent to the SMTP server.
Default
none
Format
Mode
security {tlsv1 | none}
Mail Server Config
port
Use this command to configure the TCP port to use for communication with the SMTP server.
The recommended port for TLSv1 is 465, and for no security (i.e. none) it is 25. However, any
nonstandard port in the range 1 to 65535 is also allowed.
Default
25
Format
Mode
port {465 | 25 | 1–65535}
Mail Server Config
username
Use this command to configure the login ID that the switch uses to authenticate with the
SMTP server.
Default
admin
Format
Mode
username name
Mail Server Config
password
Use this command to configure the password that the switch uses to authenticate with the
SMTP server.
Format
Mode
password password
Mail Server Config
show mail-server config
Use this command to display information about the email alert configuration.
Format
Mode
show mail-server {ip-address | hostname | all } config
Privileged EXEC
Utility Commands
561
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
No of mail
servers
The number of SMTP servers configured on the switch.
configured
Email Alert Mail
Server Address
The IPv4/IPv6 address or DNS hostname of the configured SMTP server.
The TCP port the switch uses to send email to the SMTP server.
Email Alert Mail
Server Port
Email Alert
Security
Protocol
The security protocol (TLS or none) the switch uses to authenticate with the SMTP
server.
Email Alert
Username
The username the switch uses to authenticate with the SMTP server.
The password the switch uses to authenticate with the SMTP server.
Email Alert
Password
System Utility and Clear Commands
This section describes the commands you use to help troubleshoot connectivity issues and to
restore various configurations to their factory defaults.
traceroute
Use the traceroutecommand to discover the routes that packets actually take when
traveling to their destination through the network on a hop-by-hop basis. Traceroute
continues to provide a synchronous response when initiated from the CLI.
Default
• count: 3 probes
• interval: 3 seconds
• size: 0 bytes
• port: 33434
• maxTtl: 30 hops
• maxFail: 5 probes
• initTtl: 1 hop
Format
Mode
traceroute <ipaddr|hostname> [initTtl <initTtl>] [maxTtl <maxTtl>]
[maxFail <maxFail>] [interval <interval>] [count <count>]
[port <port>] [size <size>] [source{ip-address|<unit/slot/port> |
loopback <0-7>}]
Privileged EXEC
Utility Commands
562
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Using the options described below, you can specify the initial and maximum time-to-live
(TTL) in probe packets, the maximum number of failures before termination, the number of
probes sent for each TTL, and the size of each probe.
Parameter
Description
ipaddr|hostname
The ipaddr value should be a valid IP address. The hostname value should
be a valid hostname.
initTtl
Use initTtlto specify the initial time-to-live (TTL), the maximum number of router
hops between the local and remote system. Range is 0 to 255.
maxTtl
Use maxTtleto specify the maximum TTL. Range is 1 to 255.
maxFail
Use maxFailto terminate the traceroute after failing to receive a response for this
number of consecutive probes. Range is 0 to 255.
interval
count
port
Use intervalto specify the time between probes, in seconds. Range is 1 to 60
seconds.
Use the optional countparameter to specify the number of probes to send for each
TTL value. Range is 1 to 10 probes.
Use the optional portparameter to specify destination UDP port of the probe. This
should be an unused port on the remote destination system. Range is 1 to 65535.
size
Use the optional sizeparameter to specify the size, in bytes, of the payload of the
Echo Requests sent. Range is 0 to 65507 bytes.
source
Use the optional sourceparameter to specify the source IP address or interface for
the traceroute.
The following are examples of the CLI command.
traceroute Success:
(Switch) # traceroute 10.240.10.115 initTtl 1 maxTtl 4 maxFail 0 interval 1 count 3 port
33434 size 43
Traceroute to 10.240.10.115 ,4 hops max 43 byte packets:
1 10.240.4.1 708 msec
2 10.240.10.115 0 msec
41 msec
0 msec
11 msec
0 msec
Hop Count = 1 Last TTL = 2 Test attempt = 6 Test Success = 6
traceroute Failure:
(Switch) # traceroute 10.40.1.1 initTtl 1 maxFail 0 interval 1 count 3
port 33434 size 43
Traceroute to 10.40.1.1 ,30 hops max 43 byte packets:
1 10.240.4.1 19 msec
2 10.240.1.252 0 msec
3 172.31.0.9 277 msec
4 10.254.1.1 289 msec
5 10.254.21.2 287 msec
6 192.168.76.2 290 msec
7 0.0.0.0 0 msec *
18 msec
0 msec
276 msec
327 msec
293 msec
291 msec
9 msec
1 msec
277 msec
282 msec
296 msec
289 msec
Utility Commands
563
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Hop Count = 6 Last TTL = 7 Test attempt = 19 Test Success = 18
traceroute ipv6
Use the traceroutecommand to discover the routes that packets actually take when
traveling to their destination through the network on a hop-by-hop basis. The
<ipv6-address|hostname> parameter must be a valid IPv6 address or hostname. The
optional <port> parameter is the UDP port used as the destination of packets sent as part
of the traceroute. This port should be an unused port on the destination system. The range
for <port> is zero (0) to 65535. The default value is 33434.
Default
port: 33434
Format
Mode
traceroute ipv6 <ipv6-address|hostname> [port <port>]
Privileged EXEC
clear config
This command resets the configuration to the factory defaults without powering off the switch.
When you issue this command, a prompt appears to confirm that the reset should proceed.
When you enter y, you automatically reset the current configuration on the switch to the
default values. It does not reset the switch.
Format
Mode
clear config
Privileged EXEC
clear eventlog
This command clears all event messages maintained in the switch.
Format
Mode
clear eventlog
Privileged EXEC
clear mac-addr-table
This command clears the dynamically learned MAC addresses of the switch.
Format
Mode
clear mac-addr-table
Privileged EXEC
clear logging buffered
This command clears the messages maintained in the system log.
Format
Mode
clear logging buffered
Privileged EXEC
Utility Commands
564
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear counters
This command clears the statistics for a specified <unit/slot/port>, for all the ports, or
for the entire switch based upon the argument.
Format
Mode
clear counters {<unit/slot/port> | all}
Privileged EXEC
clear igmpsnooping
This command clears the tables managed by the IGMP Snooping function and attempts to
delete these entries from the Multicast Forwarding Database.
Format
Mode
clear igmpsnooping
Privileged EXEC
clear pass
This command resets all user passwords to the factory defaults without powering off the
switch. You are prompted to confirm that the password reset should proceed.
Format
Mode
clear pass
Privileged EXEC
clear port-channel
This command clears all port-channels (LAGs).
Format
Mode
clear port-channel
Privileged EXEC
clear traplog
This command clears the trap log.
Format
Mode
clear traplog
Privileged EXEC
clear vlan
This command resets VLAN configuration parameters to the factory defaults.
Format
Mode
clear vlan
Privileged EXEC
Utility Commands
565
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
enable password
This command prompts you to change the Privileged EXEC password. Passwords are a
maximum of 64 alphanumeric characters. The password is case sensitive. The option
[encrypted] allows the administrator to transfer the enable password between devices without
having to know the password. In this case, the <password> parameter must be exactly 128
hexadecimal characters.
Format
enable password <password> [encrypted]
Mode
Privileged EXEC
logout
This command closes the current telnet connection or resets the current serial connection.
Note: Save configuration changes before logging out.
Format
logout
Modes
• Privileged EXEC
• User EXEC
ping
Use this command to determine whether another computer is on the network. Ping provides
a synchronous response when initiated from the CLI and Web interfaces.
Default
• The default count is 1.
• The default interval is 3 seconds.
• The default size is 0 bytes.
Format
Modes
ping <ipaddress|hostname> [count <count>] [interval <interval>] [size
<size>]
• Privileged EXEC
• User EXEC
Utility Commands
566
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Using the options described below, you can specify the number and size of Echo Requests
and the interval between Echo Requests.
Parameter
Description
count
Use the countparameter to specify the number of ping packets (ICMP Echo requests)
that are sent to the destination address specified by the <ip-address> field. The
range for <count>is 1 to 15 requests.
interval
size
Use the interval parameter to specify the time between Echo Requests, in seconds.
Range is 1 to 60 seconds.
Use the sizeparameter to specify the size, in bytes, of the payload of the Echo
Requests sent. Range is 0 to 65507 bytes.
The following are examples of the CLI command.
ping success:
(Switch) #ping 10.254.2.160 count 3 interval 1 size 255
Pinging 10.254.2.160 with 255 bytes of data:
Received response for icmp_seq = 0. time= 275268 usec
Received response for icmp_seq = 1. time= 274009 usec
Received response for icmp_seq = 2. time= 279459 usec
----10.254.2.160 PING statistics----
3 packets transmitted, 3 packets received, 0% packet loss
round-trip (msec) min/avg/max = 274/279/276
ping failure:
In Case of Unreachable Destination:
(Switch) # ping 192.168.254.222 count 3 interval 1 size 255
Pinging 192.168.254.222 with 255 bytes of data:
Received Response: Unreachable Destination
Received Response :Unreachable Destination
Received Response :Unreachable Destination
----192.168.254.222 PING statistics----
3 packets transmitted,3 packets received, 0% packet loss
round-trip (msec) min/avg/max = 0/0/0
In Case Of Request TimedOut:
(Switch) # ping 1.1.1.1 count 1 interval 3
Pinging 1.1.1.1 with 0 bytes of data:
----1.1.1.1 PING statistics----
1 packets transmitted,0 packets received, 100% packet loss
round-trip (msec) min/avg/max = 0/0/0
ping ipv6
Use this command to determine whether another computer is on the network. Ping provides
a synchronous response when initiated from the CLI and Web interfaces. To use the
Utility Commands
567
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
command, configure the switch for network (in-band) connection. The source and target
devices must have the ping utility enabled and running on top of TCP/IP. The switch can be
pinged from any IP workstation with which the switch is connected through the default VLAN
(VLAN 1), as long as there is a physical path between the switch and the workstation. The
terminal interface sends three pings to the target station. Use the ipv6-address|hostname
parameter to ping an interface by using the global IPv6 address of the interface. Use the
optional sizekeyword to specify the size of the ping packet. You can utilize the ping or
traceroute facilities over the service/network ports when using an IPv6 global address
ipv6-global-address|hostname. Any IPv6 global address or gateway assignments to
these interfaces will cause IPv6 routes to be installed within the IP stack such that the ping or
traceroute request is routed out the service/network port properly. When referencing an IPv6
link-local address, you must also specify the network port interface by using the network
parameter.
Defaults
• The default count is 1.
• The default interval is 3 seconds.
• The default size is 0 bytes.
ping ipv6 {<ipv6-global-address|<hostname>} [size <datagram-size>]
Format
Modes
• Privileged EXEC
• User EXEC
ping ipv6 interface
Use this command to determine whether another computer is on the network. To use the
command, configure the switch for network (in-band) connection. The source and target
devices must have the ping utility enabled and running on top of TCP/IP. The switch can be
pinged from any IP workstation with which the switch is connected through the default VLAN
(VLAN 1), as long as there is a physical path between the switch and the workstation. The
terminal interface sends three pings to the target station. Use the interfacekeyword to ping
an interface by using the link-local address or the global IPv6 address of the interface. You
can use a loopback, network port, or physical interface as the source. Use the optional size
keyword to specify the size of the ping packet. The ipv6-addressis the link local IPv6
address of the device you want to query.
ping ipv6 interface {<unit/slot/port> | loopback <loopback-id>
|network} <link-local-address> [size <datagram-size>]
Format
Modes
• Privileged EXEC
• User EXEC
Utility Commands
568
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
quit
This command closes the current telnet connection or resets the current serial connection.
The system asks you whether to save configuration changes before quitting.
Format
quit
Modes
• Privileged EXEC
• User EXEC
reload
This command resets the switch without powering it off. Reset means that all network
connections are terminated and the boot code executes. The switch uses the stored
configuration to initialize the switch. You are prompted to confirm that the reset should
proceed. The LEDs on the switch indicate a successful reset.
Format
reload
Mode
Privileged EXEC
save
This command makes the current configuration changes permanent by writing the
configuration changes to system NVRAM.
Format
save
Mode
Privileged EXEC
copy
The copy command uploads and downloads files to and from the switch. You can also use
the copy command to manage the dual images (image1 and image2) on the file system.
Upload and download files from a server by using TFTP or Xmodem. SFTP and SCP are
available as additional transfer methods if the software package supports secure
management.
Format
Mode
copy<source> <destination>
Privileged EXEC
Replace the <source>and <destination>parameters with the options in table below.
For the <url>source or destination, use one of the following values:
{xmodem | tftp://<ipaddr|hostname>|<ip6address|hostname>/<filepath>/<filename> [noval]
| sftp|scp://<username>@<ipaddr>|<ipv6address>|<filepath>|<filename>}
For TFTP, SFTP and SCP, the <ipaddr|hostname>parameter is the IP address or host
name of the server, <filepath>is the path to the file, and <filename> is the name of the
file you want to upload or download. For SFTP and SCP, the <username> parameter is the
username for logging into the remote server via SSH.
Utility Commands
569
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: <ip6address>is also a valid parameter for routing packages that
support IPv6.
For switches that support a USB device, the copy command can be used to transfer files from
and to the USB device. The syntax for the USB file is: usb://<filename>. The USB device
can be either a source or destination in the copycommand. It cannot be used as both source
and destination in a given copycommand.
Note: Remember to upload the existing Switch CLI.cfg file off the switch
prior to loading a new release image in order to make a backup.
Parameters for the copycommand are listed in the following table:
Source
Destination
Description
nvram:backup-config
nvram:startup-config
Copies the backup configuration to the startup
configuration.
nvram:clibanner
nvram:errorlog
nvram:log
<url>
<url>
<url>
<url>
Copies the CLI banner to a server.
Copies the error log file to a server.
Copies the log file to a server.
nvram:script
Copies a specified configuration script file to a server.
<scriptname>
nvram:startup-config
nvram:backup-config
Copies the startup configuration to the backup
configuration.
nvram:startup-config
nvram:traplog
system:running-config
<url>
<url>
Copies the startup configuration to a server.
Copies the trap log file to a server.
<url>
nvram:startup-config
nvram:clibanner
Saves the running configuration to nvram.
Downloads the CLI banner to the system.
<url>
nvram:script
<destfilename>
Downloads a configuration script file to the system.
During the download of a configuration script, the copy
command validates the script. In case of any error, the
command lists all the lines at the end of the validation
process and prompts you to confirm before copying
the script file.
Utility Commands
570
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Source
Destination
Description
<url>
nvram:script
<destfilename> noval
When you use this option, the copy command will not
validate the downloaded script file. An example of the
CLI command follows:
(NETGEAR Switch) #copy tftp://1.1.1.1/file.scr
nvram:script file.scr
<url>
nvram:sshkey-dsa
Downloads an SSH key file. For more information, see
<url>
<url>
<url>
<url>
<url>
nvram:sshkey-rsa1
nvram:sshkey-rsa2
Downloads an SSH key file.
Downloads an SSH key file.
nvram:sslpem-dhweak Downloads an HTTP secure-server certificate.
nvram:sslpem-dhstrong Downloads an HTTP secure-server certificate.
nvram:sslpem-root
Downloads an HTTP secure-server certificate. For
more information, see Hypertext Transfer Protocol
<url>
<url>
<url>
<url>
<url>
<url>
nvram:sslpem-server
nvram:startup-config
nvram:system-image
nvram:license-key
ias-users
Downloads an HTTP secure-server certificate.
Downloads the startup configuration file to the system.
Downloads a code image to the system.
Download the license date to the system.
Downloads IAS users file by sftp, scp or tftp
{image1 | image2}
Download an image from the remote server to either
image. In a stacking environment, the downloaded
image is distributed to the stack nodes.
{image1 | image2}
image1
<url>
Upload either image to the remote server.
Copy image1to image2.
image2
image1
image2
Copy image2to image1.
{image1 | image2}
unit://<unit>/{image1 |
image2}
Copy an image from the management node to a given
node in a Stack. Use the unit parameter to specify the
node to which the image should be copied.
{image1 | image2}
unit://*/{image1 |
image2}
Copy an image from the management node to all of
the nodes in a Stack.
Utility Commands
571
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
write memory
Use this command to save running configuration changes to NVRAM so that the changes
you make will persist across a reboot. This command is the same as copy
system:running config nvram:startup-config.
Format
Mode
write memory
Privileged EXEC
Simple Network Time Protocol (SNTP) Commands
This section describes the commands you use to automatically configure the system time
and date by using SNTP.
sntp broadcast client poll-interval
This command sets the poll interval for SNTP broadcast clients in seconds as a power of two
where <poll-interval> can be a value from 6 to 10.
Default
6
Format
Mode
sntp broadcast client poll-interval <poll-interval>
Global Config
no sntp broadcast client poll-interval
This command resets the poll interval for SNTP broadcast client back to the default value.
Format
Mode
no sntp broadcast client poll-interval
Global Config
sntp client mode
This command enables Simple Network Time Protocol (SNTP) client mode and may set the
mode to either broadcast or unicast.
Default
disabled
Format
Mode
sntp client mode [broadcast | unicast]
Global Config
Utility Commands
572
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no sntp client mode
This command disables Simple Network Time Protocol (SNTP) client mode.
Format
Mode
no sntp client mode
Global Config
sntp client port
This command sets the SNTP client port id to a value from 1-65535.
Default
123
Format
Mode
sntp client port <portid>
Global Config
no sntp client port
This command resets the SNTP client port back to its default value.
Format
Mode
no sntp client port
Global Config
sntp unicast client poll-interval
This command sets the poll interval for SNTP unicast clients in seconds as a power of two
where <poll-interval>can be a value from 6 to 10.
Default
6
Format
Mode
sntp unicast client poll-interval <poll-interval>
Global Config
no sntp unicast client poll-interval
This command resets the poll interval for SNTP unicast clients to its default value.
Format
Mode
no sntp unicast client poll-interval
Global Config
sntp unicast client poll-timeout
This command will set the poll timeout for SNTP unicast clients in seconds to a value from
1-30.
Default
5
Utility Commands
573
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
sntp unicast client poll-timeout <poll-timeout>
Global Config
no sntp unicast client poll-timeout
This command will reset the poll timeout for SNTP unicast clients to its default value.
Format
Mode
no sntp unicast client poll-timeout
Global Config
sntp unicast client poll-retry
This command will set the poll retry for SNTP unicast clients to a value from 0 to 10.
Default
1
Format
Mode
sntp unicast client poll-retry <poll-retry>
Global Config
no sntp unicast client poll-retry
This command will reset the poll retry for SNTP unicast clients to its default value.
Format
Mode
no sntp unicast client poll-retry
Global Config
sntp server
This command configures an SNTP server (a maximum of three). The optional priority can be
a value of 1-3, the version a value of 1-4, and the port id a value of 1-65535.
Format
Mode
sntp server <ipaddress|ipv6address| hostname> [<priority> [<version>
[<portid>]]]
Global Config
no sntp server
This command deletes an server from the configured SNTP servers.
Format
Mode
no sntp server remove <ipaddress|ipv6address| hostname>
Global Config
clock timezone
When using SNTP/NTP time servers to update the switch’s clock, the time data received from
the server is based on Coordinated Universal Time (UTC) which is the same as Greenwich
Utility Commands
574
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Mean Time (GMT). This may not be the time zone in which the switch is located. Use the
clock timezone command to configure a time zone specifying the number of hours and
optionally the number of minutes difference from UTC. To set the switch clock to UTC, use
the no form of the command.
Format
clock timezone zone-name +/-hours-offset [+/-minutes-offset]
Mode
Global Config
Default
no clock timezone
Term
Definition
zone-name
A name to associate with the time zone
Number of hours difference with UTC
Number of minutes difference with UTC
hours-offset
minutes-offset
no clock timezone
This command sets the switch to UTC time.
Format
Mode
no clock timezone
Global Config
clock set
This command sets the system time and date.
Format
Mode
clock set <hh:mm:ss>
clock set <mm/dd/yyyy>
Global Config
clock summer-time recurring
Use the clock summer-time recurring command to set the summertime offset to UTC
recursively every year. If the optional parameters are not specified, they are read as either '0'
or '\0', as appropriate.
Use the following parameters to configure the summer-time.
•
USA—the US Daylight saving time setting is used (Start --- March, 2nd sunday 02:00 AM,
End --- Nov, 1st sunday, 2:00 AM)
•
EU—the European Union Daylight savings time is used (Start --- March, 5th Sunday
02:00 AM, End --- October, 5th Sunday, 3:00 AM)
•
•
•
week—Week of the month. (Range: 1-5, first, last)
day—Day of the week. (Range: The first three letters by name; sun, for example.)
month—Month. (Range: The first three letters by name; jan, for example.)
Utility Commands
575
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
•
•
hh:mm—Time in 24-hour format in hours and minutes. (Range: hh:0-23, mm: 0-59)
offset—Number of minutes to add during the summertime. (Range:1-1440)
acronym—The acronym for the time zone to be displayed when summertime is in effect.
(Range: Up to four characters)
Format
Mode
clock summer-time recurring {USA | EU | {week day month hh:mm week
day month hh:mm}} [offset offset ] [zone acronym]
Global Config
For example:
(Switch)(Config)# clock summer-time recurring 1 sun jan
00:10 2 mon mar 10:00 offset 1 zone ABC
clock summer-time date
Use the clock summer-time date command to set the summertime offset to UTC. If the
optional parameters are not specified, they are read as either '0' or '\0', as appropriate.
•
•
•
•
•
•
date—Day of the month. (Range: 1-31)
month—Month. (Range: The first three letters by name; jan, for example.)
year—Year. (Range: 2000-2097)
hh:mm—Time in 24-hour format in hours and minutes. (Range: hh: 0-23, mm: 0-59)
offset—Number of minutes to add during the summertime. (Range:1-1440)
acronym—The acronym for the time zone to be displayed whensummertime is in effect.
(Range: Up to four characters)
Format
clock summer-time date {date | month} {month | date} year hh:mm
{date| month} {month | date} year hh:mm [offset offset ] [zone
acronym]
Mode
Global Config
For example:
(Switch)(config)# clock summer-time date 1 Apr 2007
02:00 28 Oct 2007 offset 90 zone EST
or
(Switch) (config)# clock summer-time date Apr 1 2007
02:00 Oct 28 2007 offset 90 zone EST
Utility Commands
576
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no clock summer-time
Use the no clock summer-time command to reset the summertime offset.
Format
Mode
no clock summer-time
Global Config
For example:
console(config)#no clock summer-time
show sntp
This command is used to display SNTP settings and status.
Format
Mode
show sntp
Privileged EXEC
Term
Definition
Last Update
Time
Time of last clock update.
Last Unicast
Attempt Time
Time of last transmit query (in unicast mode).
Last Attempt
Status
Status of the last SNTP request (in unicast mode) or unsolicited message (in broadcast
mode).
Broadcast
Count
Current number of unsolicited broadcast messages that have been received and
processed by the SNTP client since last reboot.
Multicast Count
Current number of unsolicited multicast messages that have been received and
processed by the SNTP client since last reboot.
show sntp client
This command is used to display SNTP client settings.
Format
Mode
show sntp client
Privileged EXEC
Term
Definition
Client
Supported
Modes
Supported SNTP Modes (Broadcast, Unicast, or Multicast).
SNTP Version
Port
The highest SNTP version the client supports.
SNTP Client Port.
Client Mode
Configured SNTP Client Mode.
Utility Commands
577
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show sntp server
This command is used to display SNTP server settings and configured servers.
Format
show sntp server
Mode
Privileged EXEC
Term
Definition
Server Host
Address
IP address or hostname of configured SNTP Server.
Server Type
Address Type of Server.
Server Stratum
Claimed stratum of the server for the last received valid packet.
Server
Reference ID
Reference clock identifier of the server for the last received valid packet.
Server Mode
SNTP Server mode.
Server
Maximum
Entries
Total number of SNTP Servers allowed.
Server Current
Entries
Total number of SNTP configured.
For each configured server:
Term
Definition
Host Address
Address Type
Priority
IP address or hostname of configured SNTP Server.
Address Type of configured SNTP server.
IP priority type of the configured server.
Version
SNTP Version number of the server. The protocol version used to query the server in
unicast mode.
Port
Server Port Number.
Last Attempt
Time
Last server attempt time for the specified server.
Last Update
Status
Last server attempt status for the server.
Number of requests to the server.
Total Unicast
Requests
Failed Unicast
Requests
Number of failed requests from server.
Utility Commands
578
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show clock
Use the show clock command in Privileged EXEC or User EXEC mode to display the time
and date from the system clock. Use the show clock detail command to show the time zone
and summertime configuration.
Format
show clock [detail]
Mode
User EXEC
Privileged EXEC
Term
Time
Definition
The time provided by the time source.
The time source type.
Time Source
If option detail is specified, these terms are displayed
Time Zone
The time zone configured.
Summer Time
Indicate if the summer time is enabled.
DHCP Server Commands
This section describes the commands you to configure the DHCP server settings for the
switch. DHCP uses UDP as its transport protocol and supports a number of features that
facilitate in administration address allocations.
ip dhcp pool
This command configures a DHCP address pool name on a DHCP server and enters DHCP
pool configuration mode.
Default
none
Format
Mode
ip dhcp pool <name>
Global Config
no ip dhcp pool
This command removes the DHCP address pool. The name should be previously configured
pool name.
Format
Mode
no ip dhcp pool <name>
Global Config
Utility Commands
579
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
client-identifier
This command specifies the unique identifier for a DHCP client. Unique-identifier is a valid
notation in hexadecimal format. In some systems, such as Microsoft DHCP clients, the client
identifier is required instead of hardware addresses. The unique-identifier is a concatenation
of the media type and the MAC address. For example, the Microsoft client identifier for
Ethernet address c819.2488.f177 is 01c8.1924.88f1.77 where 01 represents the Ethernet
media type. For more information, refer to the “Address Resolution Protocol Parameters”
section of RFC 1700, Assigned Numbers for a list of media type codes.
Default
none
Format
Mode
client-identifier <uniqueidentifier>
DHCP Pool Config
no client-identifier
This command deletes the client identifier.
Format
Mode
no client-identifier
DHCP Pool Config
client-name
This command specifies the name for a DHCP client. Name is a string consisting of standard
ASCII characters.
Default
none
Format
Mode
client-name <name>
DHCP Pool Config
no client-name
This command removes the client name.
Format
Mode
no client-name
DHCP Pool Config
default-router
This command specifies the default router list for a DHCP client. {address1, address2…
address8} are valid IP addresses, each made up of four decimal bytes ranging from 0 to
255. IP address 0.0.0.0 is invalid.
Default
none
Utility Commands
580
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
default-router <address1> [<address2>....<address8>]
DHCP Pool Config
no default-router
This command removes the default router list.
Format
Mode
no default-router
DHCP Pool Config
dns-server
This command specifies the IP servers available to a DHCP client. Address parameters are
valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address
0.0.0.0 is invalid.
Default
none
Format
Mode
dns-server <address1> [<address2>....<address8>]
DHCP Pool Config
no dns-server
This command removes the DNS Server list.
Format
Mode
no dns-server
DHCP Pool Config
hardware-address
This command specifies the hardware address of a DHCP client. Hardware-address is the
MAC address of the hardware platform of the client consisting of 6 bytes in dotted
hexadecimal format. Type indicates the protocol of the hardware platform. It is 1 for 10 MB
Ethernet and 6 for IEEE 802.
Default
ethernet
Format
Mode
hardware-address <hardwareaddress> <type>
DHCP Pool Config
no hardware-address
This command removes the hardware address of the DHCP client.
Format
Mode
no hardware-address
DHCP Pool Config
Utility Commands
581
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
host
This command specifies the IP address and network mask for a manual binding to a DHCP
client. Address and Mask are valid IP addresses; each made up of four decimal bytes ranging
from 0 to 255. IP address 0.0.0.0 is invalid. The prefix-length is an integer from 0 to 32.
Default
none
Format
Mode
host <address> [{<mask> | <prefix-length>}]
DHCP Pool Config
no host
This command removes the IP address of the DHCP client.
Format
no host
Mode
DHCP Pool Config
lease
This command configures the duration of the lease for an IP address that is assigned from a
DHCP server to a DHCP client. The overall lease time should be between 1-86400 minutes.
If you specify infinite, the lease is set for 60 days. You can also specify a lease duration.
Daysis an integer from 0 to 59. Hoursis an integer from 0 to 23. Minutesis an integer from
0 to 59.
Default
1 (day)
Format
Mode
lease [{<days> [<hours>] [<minutes>] | infinite}]
DHCP Pool Config
no lease
This command restores the default value of the lease time for DHCP Server.
Format
Mode
no lease
DHCP Pool Config
network (DHCP Pool Config)
Use this command to configure the subnet number and mask for a DHCP address pool on
the server. Network-number is a valid IP address, made up of four decimal bytes ranging
from 0 to 255. IP address 0.0.0.0 is invalid. Mask is the IP subnet mask for the specified
address pool. The prefix-length is an integer from 0 to 32.
Default
none
Utility Commands
582
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
network <networknumber> [{<mask> | <prefixlength>}]
DHCP Pool Config
no network
This command removes the subnet number and mask.
Format
no network
Mode
DHCP Pool Config
bootfile
The command specifies the name of the default boot image for a DHCP client. The
<filename>specifies the boot image file.
Format
bootfile <filename>
Mode
DHCP Pool Config
no bootfile
This command deletes the boot image name.
Format
Mode
no bootfile
DHCP Pool Config
domain-name
This command specifies the domain name for a DHCP client. The <domain>specifies the
domain name string of the client.
Default
none
Format
Mode
domain-name <domain>
DHCP Pool Config
no domain-name
This command removes the domain name.
Format
Mode
no domain-name
DHCP Pool Config
netbios-name-server
This command configures NetBIOS Windows Internet Naming Service (WINS) name servers
that are available to DHCP clients.
Utility Commands
583
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
One IP address is required, although one can specify up to eight addresses in one command
line. Servers are listed in order of preference (address1 is the most preferred server,
address2 is the next most preferred server, and so on).
Default
none
Format
Mode
netbios-name-server <address> [<address2>...<address8>]
DHCP Pool Config
no netbios-name-server
This command removes the NetBIOS name server list.
Format
Mode
no netbios-name-server
DHCP Pool Config
netbios-node-type
The command configures the NetBIOS node type for Microsoft Dynamic Host Configuration
Protocol (DHCP) clients. type specifies the NetBIOS node type. Valid types are:
•
•
•
•
b-node—Broadcast
p-node—Peer-to-peer
m-node—Mixed
h-node—Hybrid (recommended)
Default
none
Format
Mode
netbios-node-type <type>
DHCP Pool Config
no netbios-node-type
This command removes the NetBIOS node Type.
Format
Mode
no netbios-node-type
DHCP Pool Config
next-server
This command configures the next server in the boot process of a DHCP client.The
<address>parameter is the IP address of the next server in the boot process, which is
typically a TFTP server.
Default
inbound interface helper addresses
Utility Commands
584
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
next-server <address>
DHCP Pool Config
no next-server
This command removes the boot server list.
Format
no next-server
Mode
DHCP Pool Config
option
The optioncommand configures DHCP Server options. The <code>parameter specifies
the DHCP option code and ranges from 1-254. The <ascii string>parameter specifies
an NVT ASCII character string. ASCII character strings that contain white space must be
delimited by quotation marks. The hex <string>parameter specifies hexadecimal data. In
hexadecimal, character strings are two hexadecimal digits. You can separate each byte by a
period (for example, a3.4f.22.0c), colon (for example, a3:4f:22:0c), or white space (for
example, a3 4f 22 0c).
Default
none
Format
Mode
option <code> {ascii string | hex <string1> [<string2>...<string8>]
| ip <address1> [<address2>...<address8>]}
DHCP Pool Config
no option
This command removes the DHCP Server options. The <code>parameter specifies the
DHCP option code.
Format
Mode
no option <code>
DHCP Pool Config
ip dhcp excluded-address
This command specifies the IP addresses that a DHCP server should not assign to DHCP
clients. Low-address and high-address are valid IP addresses; each made up of four decimal
bytes ranging from 0 to 255. IP address 0.0.0.0is invalid.
Default
none
Format
Mode
ip dhcp excluded-address <lowaddress> [highaddress]
Global Config
Utility Commands
585
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip dhcp excluded-address
This command removes the excluded IP addresses for a DHCP client. Low-address and
high-address are valid IP addresses; each made up of four decimal bytes ranging from 0 to
255. IP address 0.0.0.0 is invalid.
Format
Mode
no ip dhcp excluded-address <lowaddress> [highaddress]
Global Config
ip dhcp ping packets
Use this command to specify the number, in a range from 2-10, of packets a DHCP server
sends to a pool address as part of a ping operation. By default the number of packets sent to
a pool address is 2, which is the smallest allowed number when sending packets. Setting the
number of packets to 0 disables this command.
Default
2
Format
Mode
ip dhcp ping packets <0,2-10>
Global Config
no ip dhcp ping packets
This command prevents the server from pinging pool addresses and sets the number of
packets to 0.
Default
0
Format
Mode
no ip dhcp ping packets
Global Config
service dhcp
This command enables the DHCP server.
Default
disabled
Format
Mode
service dhcp
Global Config
no service dhcp
This command disables the DHCP server.
Format
Mode
no service dhcp
Global Config
Utility Commands
586
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip dhcp bootp automatic
This command enables the allocation of the addresses to the bootp client. The addresses are
from the automatic address pool.
Default
disabled
Format
Mode
ip dhcp bootp automatic
Global Config
no ip dhcp bootp automatic
This command disables the allocation of the addresses to the bootp client. The address are
from the automatic address pool.
Format
Mode
no ip dhcp bootp automatic
Global Config
ip dhcp conflict logging
This command enables conflict logging on DHCP server.
Default
enabled
Format
Mode
ip dhcp conflict logging
Global Config
no ip dhcp conflict logging
This command disables conflict logging on DHCP server.
Format
Mode
no ip dhcp conflict logging
Global Config
clear ip dhcp binding
This command deletes an automatic address binding from the DHCP server database. If “*”
is specified, the bindings corresponding to all the addresses are deleted. <address>is a
valid IP address made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0
is invalid.
Format
Mode
clear ip dhcp binding {<address> | *}
Privileged EXEC
Utility Commands
587
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear ip dhcp server statistics
This command clears DHCP server statistics counters.
Format
Mode
clear ip dhcp server statistics
Privileged EXEC
clear ip dhcp conflict
The command is used to clear an address conflict from the DHCP Server database. The
server detects conflicts using a ping. DHCP server clears all conflicts If the asterisk (*)
character is used as the address parameter.
Default
none
Format
Mode
clear ip dhcp conflict {<address> | *}
Privileged EXEC
show ip dhcp binding
This command displays address bindings for the specific IP address on the DHCP server. If
no IP address is specified, the bindings corresponding to all the addresses are displayed.
Format
Modes
show ip dhcp binding [<address>]
• Privileged EXEC
• User EXEC
Term
Definition
IP address
The IP address of the client.
The MAC Address or the client identifier.
Hardware
Address
Lease
expiration
The lease expiration time of the IP address assigned to the client.
The manner in which IP address was assigned to the client.
Type
show ip dhcp global configuration
This command displays address bindings for the specific IP address on the DHCP server. If
no IP address is specified, the bindings corresponding to all the addresses are displayed.
Format
Modes
show ip dhcp global configuration
• Privileged EXEC
• User EXEC
Utility Commands
588
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Service DHCP
The field to display the status of dhcp protocol.
Number of Ping
Packets
The maximum number of Ping Packets that will be sent to verify that an ip address id not
already assigned.
Conflict
Logging
Shows whether conflict logging is enabled or disabled.
BootP
Automatic
Shows whether BootP for dynamic pools is enabled or disabled.
show ip dhcp pool configuration
This command displays pool configuration. If allis specified, configuration for all the pools
is displayed.
Format
Modes
show ip dhcp pool configuration {<name> | all}
• Privileged EXEC
• User EXEC
Field
Definition
Pool Name
The name of the configured pool.
The pool type.
Pool Type
Lease Time
DNS Servers
The lease expiration time of the IP address assigned to the client.
The list of DNS servers available to the DHCP client .
Default Routers
The list of the default routers available to the DHCP client
The following additional field is displayed for Dynamic pool type:
Field
Network
Definition
The network number and the mask for the DHCP address pool.
The following additional fields are displayed for Manual pool type:
Field
Definition
Client Name
The name of a DHCP client.
The unique identifier of a DHCP client.
The hardware address of a DHCP client.
Client Identifier
Hardware
Address
Hardware
Address Type
The protocol of the hardware platform.
Host
The IP address and the mask for a manual binding to a DHCP client.
Utility Commands
589
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip dhcp server statistics
This command displays DHCP server statistics.
Format
show ip dhcp server statistics
Modes
• Privileged EXEC
• User EXEC
Field
Definition
Automatic
Bindings
The number of IP addresses that have been automatically mapped to the MAC
addresses of hosts that are found in the DHCP database.
Expired
Bindings
The number of expired leases.
Malformed
Bindings
The number of truncated or corrupted messages that were received by the DHCP server.
Message Received:
Message
Definition
DHCP
DISCOVER
The number of DHCPDISCOVER messages the server has received.
DHCP
REQUEST
The number of DHCPREQUEST messages the server has received.
DHCP DECLINE
The number of DHCPDECLINE messages the server has received.
The number of DHCPRELEASE messages the server has received.
DHCP
RELEASE
DHCP INFORM
The number of DHCPINFORM messages the server has received.
Message Sent:
Message
Definition
DHCP OFFER
DHCP ACK
The number of DHCPOFFER messages the server sent.
The number of DHCPACK messages the server sent.
The number of DHCPNACK messages the server sent.
DHCP NACK
show ip dhcp conflict
This command displays address conflicts logged by the DHCP Server. If no IP address is
specified, all the conflicting addresses are displayed.
Format
Modes
show ip dhcp conflict [<ip-address>]
• Privileged EXEC
• User EXEC
Utility Commands
590
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
IP address
The IP address of the host as recorded on the DHCP server.
The hardware address of the host that reported the conflict.
Reporting Host
Hardware
Address
Detection
Method
The manner in which the IP address of the hosts were found on the DHCP Server.
The time when the conflict was found.
Detection time
DNS Client Commands
These commands are used in the Domain Name System (DNS), an Internet directory
service. DNS is how domain names are translated into IP addresses. When enabled, the
DNS client provides a hostname lookup service to other components.
ip domain lookup
Use this command to enable the DNS client.
Default
enabled
Format
Mode
ip domain lookup
Global Config
no ip domain lookup
Use this command to disable the DNS client.
Format
Mode
no ip domain lookup
Global Config
ip domain name
Use this command to define a default domain name that the software uses to complete
unqualified host names (names with a domain name). By default, no default domain name is
configured in the system. <name> may not be longer than 255 characters and should not
include an initial period. This <name> should be used only when the default domain name
list, configured using the ip domain listcommand, is empty.
Default
none
Format
Mode
ip domain name <name>
Global Config
Example: The CLI command ip domain name yahoo.comwill configure yahoo.com as a default domain name.
For an unqualified hostname xxx, a DNS query is made to find the IP address corresponding to xxx.yahoo.com.
Utility Commands
591
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip domain name
Use this command to remove the default domain name configured using the ip domain
namecommand.
Format
Mode
no ip domain name
Global Config
ip domain list
Use this command to define a list of default domain names to complete unqualified names.
By default, the list is empty. Each name must be no more than 256 characters, and should
not include an initial period. The default domain name, configured using the ip domain
namecommand, is used only when the default domain name list is empty. A maximum of 32
names can be entered in to this list.
Default
none
Format
Mode
ip domain list <name>
Global Config
no ip domain list
Use this command to delete a name from a list.
Format
Mode
no ip domain list <name>
Global Config
ip name server
Use this command to configure the available name servers. Up to eight servers can be
defined in one command or by using multiple commands. The parameter
<server-address>is a valid IPv4 or IPv6 address of the server. The preference of the
servers is determined by the order they were entered.
Format
Mode
ip name-server <server-address1> [server-address2...server-address8]
Global Config
no ip name server
Use this command to remove a name server.
Format
Mode
no ip name-server [server-address1...server-address8]
Global Config
Utility Commands
592
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip host
Use this command to define static host name-to-address mapping in the host cache. <name>
is host name. <ip address> is the IP address of the host.
Default
none
Format
Mode
ip host <name> <ipaddress>
Global Config
no ip host
Use this command to remove the name-to-address mapping.
Format
no ip host <name>
Mode
Global Config
ipv6 host
Use this command to define static host name-to-IPv6 address mapping in the host cache.
<name> is host name. <v6 address> is the IPv6 address of the host.
Default
none
Format
Mode
ipv6 host <name> <v6 address>
Global Config
no ipv6 host
Use this command to remove the static host name-to-IPv6 address mapping in the host
cache.
Format
Mode
no ipv6 host <name>
Global Config
ip domain retry
Use this command to specify the number of times to retry sending Domain Name System
(DNS) queries. The parameter <number> indicates the number of times to retry sending a
DNS query to the DNS server. This number ranges from 0 to 100.
Default
2
Format
Mode
ip domain retry <number>
Global Config
Utility Commands
593
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip domain retry
Use this command to return to the default.
Format
Mode
no ip domain retry <number>
Global Config
ip domain timeout
Use this command to specify the amount of time to wait for a response to a DNS query. The
parameter <seconds> specifies the time, in seconds, to wait for a response to a DNS query.
<seconds> ranges from 0 to 3600.
Default
3
Format
Mode
ip domain timeout <seconds>
Global Config
no ip domain timeout
Use this command to return to the default setting.
Format
Mode
no ip domain timeout <seconds>
Global Config
clear host
Use this command to delete entries from the host name-to-address cache. This command
clears the entries from the DNS cache maintained by the software. This command clears
both IPv4 and IPv6 entries.
Format
clear host {<name> | all}
Mode
Privileged EXEC
Field
Description
name
A particular host entry to remove. <name> ranges from 1-255 characters.
all
Removes all entries.
Utility Commands
594
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show hosts
Use this command to display the default domain name, a list of name server hosts, the static
and the cached list of host names and addresses <name> ranges from 1-255 characters.
This command displays both IPv4 and IPv6 entries.
Format
show hosts [name]
Mode
User EXEC
Field
Description
Host Name
Domain host name.
Default Domain
Default domain name.
Default domain list.
Default Domain
List
Domain Name
Lookup
DNS client enabled/disabled.
Number of
Retries
Number of time to retry sending Domain Name System (DNS) queries.
Amount of time to wait for a response to a DNS query.
Configured name servers.
Retry Timeout
Period
Name Servers
Example: The following shows example CLI display output for the command.
<Switch> show hosts
Host name......................... Device
Default domain.................... gm.com
Default domain list............... yahoo.com, Stanford.edu, rediff.com
Domain Name lookup................ Enabled
Number of retries................. 5
Retry timeout period.............. 1500
Name servers (Preference order)... 176.16.1.18 176.16.1.19
Configured host name-to-address mapping:
Host
Addresses
------------------------------ ------------------------------
accounting.gm.com
Host
--------------- -------- ------
www.stanford.edu 72
176.16.8.8
Total Elapsed
Type
--------
IP
Addresses
--------------
171.64.14.203
3
Packet Capture Commands
Packet capture commands assist in troubleshooting protocol-related problems with the
management CPU. The packets to and from the management CPU can be captured in an
Utility Commands
595
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
internally allocated buffer area for export to a PC host for protocol analysis. Public domain
packet analysis tools like Ethereal can be used to decode and review the packets in detail.
Capturing can be performed in a variety of modes, either transmit-side only, receive-side only,
or both. The number of packets captured will depend on the size of the captured packets.
capture {start|stop}
Use the command capture startto manually start capturing CPU packets for packet
trace. Capturing packets is stopped automatically when 128 packets are captured and have
not yet been displayed during a capture session. It is guaranteed that packets not displayed
and not saved will not be lost when capturing is in progress. Use the command capture
stopto manually stop capturing CPU packets for packet trace before the moment when 128
packets are captured and capturing packets is stopped automatically.The packet capture
operates in three modes:
•
•
•
Capture file
Remote capture
Capture line
The command is not persistent across a reboot cycle.
Format
Mode
capture {start|stop} {transmit|receive|all}
Privileged EXEC
capture {file|remote|line}
Use this command to configure file capture options. The command is persistent across a
reboot cycle.
Default
Remote
Format
Mode
capture {file|remote|line}
Global Config
Utility Commands
596
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
file
Description
In capture file mode, the captured packets are stored in a file on NVRAM. The maximum file
size defaults to 524288 bytes. The switch can transfer the file to a TFTP server via TFTP, SFTP,
SCP via CLI, Web and SNMP. The file is formatted in pcap format, is named
cpuPktCapture.pcap, and can be examined using network analyzer tools such as
Wireshark® by Ethereal®. Starting a file capture automatically terminates any remote capture
sessions and line capturing. After the packet capture is activated, the capture proceeds until the
capture file reaches its maximum size, or until the capture is stopped manually using the CLI
command capture stop.
remote
In remote capture mode, the captured packets are redirected in real time to an external PC
running the Wireshark tool for Microsoft® Windows®. A packet capture server runs on the switch
side and sends the captured packets via a TCP connection to the Wireshark tool. The remote
capture can be enabled or disabled using the CLI. There should be a Windows PC with the
Wireshark tool to display the captured file. When using the remote capture mode, the switch
does not store any captured data locally on its file system. You can configure the IP port
number for connecting Wireshark to the switch. The default port number is 2002. If a firewall is
installed between the Wireshark PC and the switch, then these ports must be allowed to pass
through the firewall. You must configure the firewall to allow the Wireshark PC to initiate TCP
connections to the switch. If the socket connection to Wireshark has been established, then the
captured CPU packets are written to the data socket. Wireshark receives the packets and
processes it to display. This continues until the session is terminated by either end. Starting a
remote capture session automatically terminates the file capture and line capturing.
line
In capture line mode, the captured packets are saved in real time mode into the RAM and can
be displayed on the CLI. Starting a line capture automatically terminates any remote capture
session and capturing into a file.
no capture
Use this command to reset the capture mode to remote mode.
Format
Mode
no capture
Global Config
capture remote port
Use this command to configure file capture options. The command is persistent across a
reboot cycle.
Default
2002
Format
Mode
capture remote port <port-id>
Global Config
no capture remote port
Use this command to reset the remote port to the default (2002).
Format
Mode
no capture report port
Global Config
Utility Commands
597
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
capture file size
Use this command to configure file capture options. The command is persistent across a
reboot cycle. The range is from 2 to 512 Kbytes.
Default
512Kbytes
Format
Mode
capture file size <file-size>
Global Config
no capture file size
Use this command to reset the file size to the default (512Kbytes).
Format
Mode
no capture file size
Global Config
capture line wrap
There are two methods to configure capturing CPU packets into RAM: capture line
wrapand no capture line wrap. Use the capture line wrapcommand to stop
automatically capturing packets when 128 packets are saved and have not yet been
displayed during the capturing session. When capturing is in progress, unsaved,
not-yet-displayed packets will not be lost.
Default
Disabled
Format
Mode
capture line wrap
Global Config
no capture line wrap
Use this command to disable the capture line wrap mode.
Format
Mode
no capture line wrap
Global Config
Serviceability Packet Tracing Commands
These commands improve the capability of network engineers to diagnose conditions
affecting their managed switch product.
CAUTION:
The output of the debugcommands can be long and may adversely affect
system performance.
Utility Commands
598
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
debug arp
Use this command to enable ARP debug protocol messages.
Default
disabled
Format
Mode
debug arp
Privileged EXEC
no debug arp
Use this command to disable ARP debug protocol messages.
Format
Mode
no debug arp
Privileged EXEC
debug auto-voip
Use this command to enable Auto VOIP debug messages. Use the optional parameters to
trace H323, SCCP, or SIP packets respectively.
Default
disabled
Format
Mode
debug auto-voip [H323|SCCP|SIP]
Privileged EXEC
no debug auto-voip
Use this command to disable Auto VOIP debug messages.
Format
Mode
no debug auto-voip
Privileged EXEC
debug clear
This command disables all previously enabled “debug” traces.
Default
disabled
Format
Mode
debug clear
Privileged EXEC
debug console
This command enables the display of “debug” trace output on the login session in which it is
executed. Debug console display must be enabled in order to view any trace output. The
output of debug trace commands will appear on all login sessions for which debug console
Utility Commands
599
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
has been enabled. The configuration of this command remains in effect for the life of the login
session. The effect of this command is not persistent across resets.
Default
disabled
Format
Mode
debug console
Privileged EXEC
no debug console
This command disables the display of “debug” trace output on the login session in which it is
executed.
Format
Mode
no debug console
Privileged EXEC
debug dhcp packet
Use this command to display “debug” information about DHCPv4 client activities and trace
DHCPv4 packets to and from the local DHCPv4 client.
Default
disabled
Format
Mode
debug dhcp packet [transmit | receive]
Privileged EXEC
no debug dhcp
Use this command to disable the display of “debug” trace output for DHCPv4 client activity.
Format
Mode
no debug dhcp packet [transmit | receive]
Privileged EXEC
debug dot1x packet
Use this command to enable dot1x packet debug trace.
Default
disabled
Format
Mode
debug dot1x
Privileged EXEC
Utility Commands
600
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no debug dot1x packet
Use this command to disable dot1x packet debug trace.
Format
Mode
no debug dot1x
Privileged EXEC
debug igmpsnooping packet
This command enables tracing of IGMP Snooping packets received and transmitted by the
switch.
Default
disabled
Format
Mode
debug igmpsnooping packet
Privileged EXEC
no debug igmpsnooping packet
This command disables tracing of IGMP Snooping packets.
Format
Mode
no debug igmpsnooping packet
Privileged EXEC
debug igmpsnooping packet transmit
This command enables tracing of IGMP Snooping packets transmitted by the switch.
Snooping should be enabled on the device and the interface in order to monitor packets for a
particular interface.
Default
disabled
Format
Mode
debug igmpsnooping packet transmit
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]: igmp_snooping_debug.c(116)
908 % Pkt TX - Intf: 1/0/20(20), Vlan_Id:1 Src_Mac: 00:03:0e:00:00:00 Dest_Mac:
01:00:5e:00:00:01 Src_IP: 9.1.1.1 Dest_IP: 225.0.0.1 Type: V2_Membership_Report Group:
225.0.0.1
The following parameters are displayed in the trace message:
Parameter
TX
Definition
A packet transmitted by the device.
Intf
The interface that the packet went out on. Format used is unit/slot/port (internal interface
number). Unit is always shown as 1 for interfaces on a non-stacking device.
Utility Commands
601
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Src_Mac
Definition
Source MAC address of the packet.
Dest_Mac
Src_IP
Destination multicast MAC address of the packet.
The source IP address in the IP header in the packet.
The destination multicast IP address in the packet.
Dest_IP
Type
The type of IGMP packet. Type can be one of the following:
• Membership Query – IGMP Membership Query
• V1_Membership_Report – IGMP Version 1 Membership Report
• V2_Membership_Report – IGMP Version 2 Membership Report
• V3_Membership_Report – IGMP Version 3 Membership Report
• V2_Leave_Group – IGMP Version 2 Leave Group
Group
Multicast group address in the IGMP header.
no debug igmpsnooping transmit
This command disables tracing of transmitted IGMP snooping packets.
Format
Mode
no debug igmpsnooping transmit
Privileged EXEC
debug igmpsnooping packet receive
This command enables tracing of IGMP Snooping packets received by the switch. Snooping
should be enabled on the device and the interface in order to monitor packets for a particular
interface.
Default
disabled
Format
Mode
debug igmpsnooping packet receive
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]: igmp_snooping_debug.c(116)
908 % Pkt RX - Intf: 1/0/20(20), Vlan_Id:1 Src_Mac: 00:03:0e:00:00:10 Dest_Mac:
01:00:5e:00:00:05 Src_IP: 11.1.1.1 Dest_IP: 225.0.0.5 Type: Membership_Query Group:
225.0.0.5
The following parameters are displayed in the trace message:
Parameter
RX
Definition
A packet received by the device.
Intf
The interface that the packet went out on. Format used is unit/slot/port (internal interface
number). Unit is always shown as 1 for interfaces on a non-stacking device.
Utility Commands
602
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Src_Mac
Definition
Source MAC address of the packet.
Dest_Mac
Src_IP
Destination multicast MAC address of the packet.
The source IP address in the ip header in the packet.
The destination multicast ip address in the packet.
Dest_IP
Type
The type of IGMP packet. Type can be one of the following:
• Membership_Query – IGMP Membership Query
• V1_Membership_Report – IGMP Version 1 Membership Report
• V2_Membership_Report – IGMP Version 2 Membership Report
• V3_Membership_Report – IGMP Version 3 Membership Report
• V2_Leave_Group – IGMP Version 2 Leave Group
Group
Multicast group address in the IGMP header.
no debug igmpsnooping receive
This command disables tracing of received IGMP Snooping packets.
Format
Mode
no debug igmpsnooping receive
Privileged EXEC
debug ip acl
Use this command to enable debug of IP Protocol packets matching the ACL criteria.
Default
disabled
Format
Mode
debug ip acl <acl Number>
Privileged EXEC
no debug ip acl
Use this command to disable debug of IP Protocol packets matching the ACL criteria.
Format
Mode
no debug ip acl <acl Number>
Privileged EXEC
debug ip dvmrp packet
Use this command to trace DVMRP packet reception and transmission. receive traces only
received DVMRP packets and transmit traces only transmitted DVMRP packets. When
neither keyword is used in the command, then all DVMRP packet traces are dumped. Vital
Utility Commands
603
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
information such as source address, destination address, control packet type, packet length,
and the interface on which the packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ip dvmrp packet [receive|transmit]
Privileged EXEC
no debug ip dvmrp packet
Use this command to disable debug tracing of DVMRP packet reception and transmission.
Format
Mode
no debug ip dvmrp packet [receive|transmit]
Privileged EXEC
debug ip igmp packet
Use this command to trace IGMP packet reception and transmission. receive traces only
received IGMP packets and transmit traces only transmitted IGMP packets. When neither
keyword is used in the command, then all IGMP packet traces are dumped. Vital information
such as source address, destination address, control packet type, packet length, and the
interface on which the packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ip igmp packet [receive|transmit]
Privileged EXEC
no debug ip igmp packet
Use this command to disable debug tracing of IGMP packet reception and transmission.
Format
Mode
no debug ip igmp packet [receive|transmit]
Privileged EXEC
debug ip mcache packet
Use this command for tracing MDATA packet reception and transmission. receive traces only
received data packets and transmit traces only transmitted data packets. When neither
keyword is used in the command, then all data packet traces are dumped. Vital information
such as source address, destination address, packet length, and the interface on which the
packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ip mcache packet [receive|transmit]
Privileged EXEC
Utility Commands
604
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no debug ip mcache packet
Use this command to disable debug tracing of MDATA packet reception and transmission.
Format
Mode
no debug ip mcache packet [receive|transmit]
Privileged EXEC
debug ip pimdm packet
Use this command to trace PIMDM packet reception and transmission. receive traces only
received PIMDM packets and transmit traces only transmitted PIMDM packets. When
neither keyword is used in the command, then all PIMDM packet traces are dumped. Vital
information such as source address, destination address, control packet type, packet length,
and the interface on which the packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ip pimdm packet [receive|transmit]
Privileged EXEC
no debug ip pimdm packet
Use this command to disable debug tracing of PIMDM packet reception and transmission.
Format
Mode
no debug ip pimdm packet [receive|transmit]
Privileged EXEC
debug ip pimsm packet
Use this command to trace PIMSM packet reception and transmission. receive traces only
received PIMSM packets and transmit traces only transmitted PIMSM packets. When
neither keyword is used in the command, then all PIMSM packet traces are dumped. Vital
information such as source address, destination address, control packet type, packet length,
and the interface on which the packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ip pimsm packet [receive|transmit]
Privileged EXEC
no debug ip pimsm packet
Use this command to disable debug tracing of PIMSM packet reception and transmission.
Format
Mode
no debug ip pimsm packet [receive|transmit]
Privileged EXEC
Utility Commands
605
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
debug ip vrrp
Use this command to enable VRRP debug protocol messages.
Default
disabled
Format
Mode
debug ip vrrp
Privileged EXEC
no debug ip vrrp
Use this command to disable VRRP debug protocol messages.
Format
Mode
no debug ip vrrp
Privileged EXEC
debug ipv6 dhcp
Use this command to display “debug” information about DHCPv6 client activities and trace
DHCPv6 packets to and from the local DHCPv6 client.
Default
disabled
Format
Mode
debug ipv6 dhcp
Privileged EXEC
no ipv6 debug dhcp
Use this command to disable the display of “debug” trace output for DHCPv6 client activity.
Format
Mode
no debug ipv6 dhcp
Privileged EXEC
debug ipv6 mcache packet
Use this command for tracing MDATAv6 packet reception and transmission. receive traces
only received data packets and transmit traces only transmitted data packets. When neither
keyword is used in the command, then all data packet traces are dumped. Vital information
such as source address, destination address, packet length, and the interface on which the
packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ipv6 mcache packet [receive|transmit]
Privileged EXEC
Utility Commands
606
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no debug ipv6 mcache packet
Use this command to disable debug tracing of MDATAv6 packet reception and transmission.
Format
Mode
no debug ipv6 mcache packet [receive|transmit]
Privileged EXEC
debug ipv6 mld packet
Use this command to trace MLDv6 packet reception and transmission. receive traces only
received MLDv6 packets and transmit traces only transmitted MLDv6 packets. When neither
keyword is used in the command, then all MLDv6 packet traces are dumped. Vital
information such as source address, destination address, control packet type, packet length,
and the interface on which the packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ipv6 mld packet [receive|transmit]
Privileged EXEC
no debug ipv6 mld packet
Use this command to disable debug tracing of MLDv6 packet reception and transmission.
Format
Mode
no debug ipv6 mld packet [receive|transmit]
Privileged EXEC
debug ipv6 pimdm packet
Use this command to trace PIMDMv6 packet reception and transmission. receive traces only
received PIMDMv6 packets and transmit traces only transmitted PIMDMv6 packets. When
neither keyword is used in the command, then all PIMDMv6 packet traces are dumped. Vital
information such as source address, destination address, control packet type, packet length,
and the interface on which the packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ipv6 pimdm packet [receive|transmit]
Privileged EXEC
no debug ipv6 pimdm packet
Use this command to disable debug tracing of PIMDMv6 packet reception and transmission.
debug ipv6 pimsm packet
Use this command to trace PIMSMv6 packet reception and transmission. receive traces only
received PIMSMv6 packets and transmit traces only transmitted PIMSMv6 packets. When
Utility Commands
607
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
neither keyword is used in the command, then all PIMSMv6 packet traces are dumped. Vital
information such as source address, destination address, control packet type, packet length,
and the interface on which the packet is received or transmitted is displayed on the console.
Default
disabled
Format
Mode
debug ipv6 pimsm packet [receive|transmit]
Privileged EXEC
no debug ipv6 pimsm packet
Use this command to disable debug tracing of PIMSMv6 packet reception and transmission.
Format
Mode
no debug ipv6 pimsm packet [receive|transmit]
Privileged EXEC
debug lacp packet
This command enables tracing of LACP packets received and transmitted by the switch.
Default
disabled
Format
Mode
debug lacp packet
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 14:04:51 10.254.24.31-1 DOT3AD[183697744]: dot3ad_debug.c(385) 58 %%
Pkt TX - Intf: 1/0/1(1), Type: LACP, Sys: 00:11:88:14:62:e1, State: 0x47, Key:
0x36
no debug lacp packet
This command disables tracing of LACP packets.
Format
Mode
no debug lacp packet
Privileged EXEC
debug mldsnooping packet
Use this command to trace MLD snooping packet reception and transmission. receive traces
only received MLD snooping packets and transmit traces only transmitted MLD snooping
packets. When neither keyword is used in the command, then all MLD snooping packet
traces are dumped. Vital information such as source address, destination address, control
Utility Commands
608
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
packet type, packet length, and the interface on which the packet is received or transmitted is
displayed on the console.
Default
disabled
Format
Mode
debug mldsnooping packet [receive|transmit]
Privileged EXEC
no debug mldsnooping packet
Use this command to disable debug tracing of MLD snooping packet reception and
transmission.
debug ospf packet
This command enables tracing of OSPF packets received and transmitted by the switch.
Default
disabled
Format
Mode
debug ospf packet
Privileged EXEC
Sample outputs of the trace messages are shown below.
<15> JAN 02 11:03:31 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25430 % Pkt RX -
Intf:2/0/48 Src
Ip:192.168.50.2 DestIp:224.0.0.5 AreaId:0.0.0.0 Type:HELLO NetMask:255.255.255.0
DesigRouter:0.0.0.0 Backup:0.0.0.0
<15> JAN 02 11:03:35 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25431 % Pkt TX -
Intf:2/0/48 Src
Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:DB_DSCR Mtu:1500 Options:E
Flags: I/M/MS Seq:126166
<15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25434 % Pkt RX -
Intf:2/0/48 Src
Ip:192.168.50.2 DestIp:192.168.50.1 AreaId:0.0.0.0 Type:LS_REQ Length: 1500
<15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25435 % Pkt TX -
Intf:2/0/48 Src
Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:LS_UPD Length: 1500
<15> JAN 02 11:03:37 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25441 % Pkt TX -
Intf:2/0/48 Src
Ip:10.50.50.1 DestIp:224.0.0.6 AreaId:0.0.0.0 Type:LS_ACK Length: 1500
Utility Commands
609
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following parameters are displayed in the trace message:
Parameter
Definition
TX/RX
TX refers to a packet transmitted by the device. RX refers to packets received by the
device.
Intf
The interface that the packet came in or went out on. Format used is unit/slot/port
(internal interface number).
SrcIp
DestIp
AreaId
Type
The source IP address in the IP header of the packet.
The destination IP address in the IP header of the packet.
The area ID in the OSPF header of the packet.
Could be one of the following:
HELLO– Hello packet
DB_DSCR– Database descriptor
LS_REQ– LS Request
LS_UPD– LS Update
LS_ACK– LS Acknowledge
The remaining fields in the trace are specific to the type of OSPF Packet.
HELLO packet field definitions:
Parameter
Definition
Netmask
The netmask in the hello packet.
Designated Router IP address.
Backup router IP address.
DesignRouter
Backup
DB_DSCR packet field definitions:
Field
Definition
MTU
MTU
Options
Flags
Options in the OSPF packet.
Could be one or more of the following:
• I – Init
• M – More
• MS – Master/Slave
Seq
Sequence Number of the DD packet.
Utility Commands
610
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
LS_REQ packet field definitions.
Field
Length
Definition
Length of packet
LS_UPD packet field definitions.
Field
Length
Definition
Length of packet
LS_ACK packet field definitions.
Field
Length
Definition
Length of packet
no debug ospf packet
This command disables tracing of OSPF packets.
Format
Mode
no debug ospf packet
Privileged EXEC
debug ipv6 ospfv3 packet
Use this command to enable OSPFv3 packet debug trace.
Default
disabled
Format
Mode
debug ipv6 ospfv3 packet
Privileged EXEC
no debug ipv6 ospfv3 packet
Use this command to disable tracing of OSPFv3 packets.
Format
Mode
no debug ipv6 ospfv3 packet
Privileged EXEC
debug ping packet
This command enables tracing of ICMP echo requests and responses. The command traces
pings on the network port/ serviceport for switching packages. For routing packages, pings
are traced on the routing ports as well.
Default
disabled
Utility Commands
611
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
debug ping packet
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 00:21:22 192.168.17.29-1 SIM[181040176]: sim_debug.c(128) 20 % Pkt TX - Intf:
1/0/1(1),
SRC_IP:10.50.50.2, DEST_IP:10.50.50.1, Type:ECHO_REQUEST
<15> JAN 01 00:21:22 192.168.17.29-1 SIM[182813968]: sim_debug.c(82) 21 % Pkt RX - Intf:
1/0/1(1), S
RC_IP:10.50.50.1, DEST_IP:10.50.50.2, Type:ECHO_REPLY
The following parameters are displayed in the trace message:
Parameter
TX/RX
Definition
TX refers to a packet transmitted by the device. RX refers to packets received by the
device.
Intf
The interface that the packet came in or went out on. Format used is unit/slot/port
(internal interface number). Unit is always shown as 1 for interfaces on a non-stacking
device.
SRC_IP
DEST_IP
Type
The source IP address in the IP header in the packet.
The destination IP address in the IP header in the packet.
Type determines whether or not the ICMP message is a REQUEST or a RESPONSE.
no debug ping packet
This command disables tracing of ICMP echo requests and responses.
Format
Mode
no debug ping packet
Privileged EXEC
debug rip packet
This command turns on tracing of RIP requests and responses. This command takes no
options. The output is directed to the log file.
Default
disabled
Format
Mode
debug rip packet
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 00:35:15 192.168.17.29-1 RIP[181783160]: rip_map_debug.c(96) 775 %
Pkt RX on Intf: 1/0/1(1), Src_IP:43.1.1.1 Dest_IP:43.1.1.2
Utility Commands
612
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Rip_Version: RIPv2 Packet_Type:RIP_RESPONSE
ROUTE 1): Network: 10.1.1.0 Mask: 255.255.255.0 Metric: 1
ROUTE 2): Network: 40.1.0.0 Mask: 255.255.0.0 Metric: 1
ROUTE 3): Network: 10.50.50.0 Mask: 255.255.255.0 Metric: 1
ROUTE 4): Network: 41.1.0.0 Mask: 255.255.0.0 Metric: 1
ROUTE 5): Network:42.0.0.0 Mask:255.0.0.0 Metric:1
Another 6 routes present in packet not displayed.
The following parameters are displayed in the trace message:
Parameter
TX/RX
Definition
TX refers to a packet transmitted by the device. RX refers to packets received by the
device.
Intf
The interface that the packet came in or went out on. Format used is unit/slot/port
(internal interface number). Unit is always shown as 1 for interfaces on a non-stacking
device.
Src_IP
The source IP address in the IP header of the packet.
The destination IP address in the IP header of the packet.
RIP version used <RIPv1 or RIPv2>.
Dest_IP
Rip_Version
Packet_Type
Routes
Type of RIP packet. <RIP_REQUEST or RIP_RESPONSE>.
Up to 5 routes in the packet are displayed in the following format:
Network: <a.b.c.d> Mask <a.b.c.d> Next_Hop <a.b.c.d> Metric <a>
The next hop is only displayed if it is different from 0.0.0.0.
For RIPv1 packets, Mask is always 0.0.0.0.
Number of
routes not
printed
Only the first five routes present in the packet are included in the trace. There is another
notification of the number of additional routes present in the packet that were not
included in the trace.
no debug rip packet
This command disables tracing of RIP requests and responses.
Format
Mode
no debug rip packet
Privileged EXEC
debug sflow packet
Use this command to enable sFlow debug packet trace.
Default
disabled
Format
Mode
debug sflow packet
Privileged EXEC
Utility Commands
613
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no debug sflow packet
Use this command to disable sFlow debug packet trace.
Format
Mode
no debug sflow packet
Privileged EXEC
debug spanning-tree bpdu
This command enables tracing of spanning tree BPDUs received and transmitted by the
switch.
Default
disabled
Format
Mode
debug spanning-tree bpdu
Privileged EXEC
no debug spanning-tree bpdu
This command disables tracing of spanning tree BPDUs.
Format
Mode
no debug spanning-tree bpdu
Privileged EXEC
debug spanning-tree bpdu receive
This command enables tracing of spanning tree BPDUs received by the switch. Spanning
tree should be enabled on the device and on the interface in order to monitor packets for a
particular interface.
Default
disabled
Format
Mode
debug spanning-tree bpdu receive
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt RX
- Intf: 1/0/9(9), Source_Mac: 00:11:88:4e:c2:10 Version: 3, Root Mac: 00:11:88:4e:c2:00,
Root Priority: 0x8000 Path Cost: 0
The following parameters are displayed in the trace message:
Parameter
RX
Definition
A packet received by the device.
Intf
The interface that the packet came in on. Format used is unit/port/slot (internal interface
number). Unit is always shown as 1 for interfaces on a non-stacking device.
Utility Commands
614
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Definition
Source_Mac
Source MAC address of the packet.
Version
Spanning tree protocol version (0-3). 0 refers to STP, 2 RSTP and 3 MSTP.
MAC address of the CIST root bridge.
Root_Mac
Root_Priority
Priority of the CIST root bridge. The value is between 0 and 61440. It is displayed in hex
in multiples of 4096.
Path_Cost
External root path cost component of the BPDU.
no debug spanning-tree bpdu receive
This command disables tracing of received spanning tree BPDUs.
Format
Mode
no debug spanning-tree bpdu receive
Privileged EXEC
debug spanning-tree bpdu transmit
This command enables tracing of spanning tree BPDUs transmitted by the switch. Spanning
tree should be enabled on the device and on the interface in order to monitor packets on a
particular interface.
Default
disabled
Format
Mode
debug spanning-tree bpdu transmit
Privileged EXEC
A sample output of the trace message is shown below.
<15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt TX
- Intf: 1/0/7(7), Source_Mac: 00:11:88:4e:c2:00 Version: 3, Root_Mac: 00:11:88:4e:c2:00,
Root_Priority: 0x8000 Path_Cost: 0
The following parameters are displayed in the trace message:
Parameter
TX
Definition
A packet transmitted by the device.
Intf
The interface that the packet went out on. Format used is unit/port/slot (internal interface
number). Unit is always shown as 1 for interfaces on a non-stacking device.
Source_Mac
Version
Source MAC address of the packet.
Spanning tree protocol version (0-3). 0 refers to STP, 2 RSTP and 3 MSTP.
MAC address of the CIST root bridge.
Root_Mac
Utility Commands
615
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Definition
Root_Priority
Priority of the CIST root bridge. The value is between 0 and 61440. It is displayed in hex
in multiples of 4096.
Path_Cost
External root path cost component of the BPDU.
no debug spanning-tree bpdu transmit
This command disables tracing of transmitted spanning tree BPDUs.
Format
Mode
no debug spanning-tree bpdu transmit
Privileged EXEC
debug aaa accounting
This command is useful for debugging accounting configuration and functionality in User
Manager.
Format
Mode
debug aaa accounting
Privileged EXEC
no debug aaa accounting
Use this command to turn off debugging of User Manager accounting functionality.
Format
Mode
no debug aaa accounting
Privileged EXEC
debug aaa authorization
This command is useful for debugging authorization configuration and functionality in User
Manager.
Format
Mode
debug aaa authorization [commands|exec]
Privileged EXEC
no debug aaa authorization
Use this command to turn off debugging of User Manager authorization functionality.
Format
Mode
no debug aaa authorization
Privileged EXEC
Utility Commands
616
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Cable Test Command
The cable test feature enables you to determine the cable connection status on a selected
port.
Note: The cable test feature is supported only for copper cable. It is not
supported for optical fiber cable. If the port has an active link while
the cable test is run, the link can go down for the duration of the test.
cablestatus
This command returns the status of the specified port.
Format
cablestatus <unit/slot/port>
Mode
Privileged EXEC
Field
Description
Cable Status
One of the following statuses is returned:
• Normal: The cable is working correctly.
• Open: The cable is disconnected or there is a faulty connector.
• Short: There is an electrical short in the cable.
• Cable Test Failed: The cable status could not be determined. The cable may in fact
be working.
Cable Length
If this feature is supported by the PHY for the current link speed, the cable length is
displayed as a range between the shortest estimated length and the longest estimated
length. Note that if the link is down and a cable is attached to a 10/100 Ethernet adapter,
then the cable status may display as Open or Short because some Ethernet adapters
leave unused wire pairs unterminated or grounded. Unknown is displayed if the cable
length could not be determined.
sFlow Commands
®
sFlow is the standard for monitoring high-speed switched and routed networks. sFlow
technology is built into network equipment and gives complete visibility into network activity,
enabling effective management and control of network resources.
Utility Commands
617
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
sflow receiver
Use this command to configure the sFlow collector parameters (owner string, receiver
timeout, max datagram size, IP address, and port).
Format
sflow receiver <rcvr_idx> owner <owner-string> [timeout
<rcvr_timeout> | notimeout] max datagram <size> ip/ipv6 <ip> port
<port>
Mode
Global Config
Field
Description
Receiver Owner
The identity string for the receiver, the entity making use of this sFlowRcvrTable entry.
The range is 127 characters. The default is a null string. The empty string indicates that
the entry is currently unclaimed and the receiver configuration is reset to the default
values. An entity wishing to claim an sFlowRcvrTable entry must ensure that the entry is
unclaimed before trying to claim it. The entry is claimed by setting the owner string to a
non-null value. The entry must be claimed before assigning a receiver to a sampler or
poller.
Receiver
Timeout
The time, in seconds, remaining before the sampler or poller is released and stops
sending samples to receiver. A management entity wanting to maintain control of the
sampler is responsible for setting a new value before the old one expires. The allowed
range is 0-4294967295 seconds. The default is zero (0).
Receiver Max
Datagram Size
The maximum number of data bytes that can be sent in a single sample datagram. The
management entity should set this value to avoid fragmentation of the sFlow datagrams.
The allowed range is 200 to 9116). The default is 1400.
Receiver IP
The sFlow receiver IP address. If set to 0.0.0.0, no sFlow datagrams will be sent. The
default is 0.0.0.0.
Receiver Port
The destination Layer4 UDP port for sFlow datagrams. The range is 1-65535. The
default is 6343.
no sflow receiver
Use this command to set the sFlow collector parameters back to the defaults.
Format
Mode
no sflow receiver <indx> {ip <ip-address> | maxdatagram <size> | owner
<string> timeout <interval> | port <14-port>}
Global Config
Utility Commands
618
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
sflow sampler
A data source configured to collect flow samples is called a poller. Use this command to
configure a new sFlow sampler instance for this data source if <rcvr_idx> is valid.
Format
sflow sampler {<rcvr-indx> | rate <sampling-rate> | maxheadersize
<size>}
Mode
Interface Config
Field
Description
Receiver Index
The sFlow Receiver for this sFlow sampler to which flow samples are to be sent. A value
of zero (0) means that no receiver is configured, no packets will be sampled. Only active
receivers can be set. If a receiver expires, then all samplers associated with the receiver
will also expire. Possible values are 1-8. The default is 0.
Maxheadersize
Sampling Rate
The maximum number of bytes that should be copied from the sampler packet. The
range is 20-256. The default is 128. When set to zero (0), all the sampler parameters are
set to their corresponding default value.
The statistical sampling rate for packet sampling from this source. A sampling rate of 1
counts all packets. A value of zero (0) disables sampling. A value of N means that out of
N incoming packets, 1 packet will be sampled. The range is 1024-65536 and 0. The
default is 0.
no sflow sampler
Use this command to reset the sFlow sampler instance to the default settings.
Format
Mode
no sflow sampler {<rcvr-indx> | rate <sampling-rate> | maxheadersize
<size>}
Interface Config
sflow poller
A data source configured to collect counter samples is called a poller. Use this command to
enable a new sFlow poller instance for this data source if <rcvr_idx> is valid.
Format
Mode
sflow poller {<rcvr-indx> | interval <poll-interval>}
Interface Config
Utility Commands
619
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Field
Description
Receiver Index
Enter the sFlow Receiver associated with the sampler/poller. A value of zero (0) means
that no receiver is configured. The range is 1-8. The default is 0.
Poll Interval
Enter the sFlow instance polling interval. A poll interval of zero (0) disables counter
sampling. When set to zero (0), all the poller parameters are set to their corresponding
default value. The range is 0-86400. The default is 0. A value of N means once in N
seconds a counter sample is generated.
no sflow poller
Use this command to reset the sFlow poller instance to the default settings.
Format
Mode
no sflow poller {<rcvr-indx> | interval <poll-interval>}
Interface Config
show sflow agent
The sFlow agent collects time-based sampling of network interface statistics and flow-based
samples. These are sent to the configured sFlow receivers. Use this command to display the
sFlow agent information.
Format
Mode
show sflow agent
Privileged EXEC
Field
Description
sFlow Version
Uniquely identifies the version and implementation of this MIB. The version string must
have the following structure: MIB Version; Organization; Software Revision where:
• MIB Version: ‘1.3’, the version of this MIB.
• Organization: Netgear.
• Revision: 1.0
IP Address
The IP address associated with this agent.
Example: The following shows example CLI display output for the command.
(switch) #show sflow agent
sFlow Version.................................. 1.3;Netgear;1.0
IP Address..................................... 10.131.12.66
Utility Commands
620
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show sflow pollers
Use this command to display the sFlow polling instances created on the switch. Use “-” for
range.
Format
show sflow pollers
Mode
Privileged EXEC
Field
Description
Poller Data
Source
The sFlowDataSource (slot/port) for this sFlow sampler. This agent will support Physical
ports only.
Receiver Index
Poller Interval
The sFlowReceiver associated with this sFlow counter poller.
The number of seconds between successive samples of the counters associated with
this data source.
show sflow receivers
Use this command to display configuration information related to the sFlow receivers.
Format
Mode
show sflow receivers [<index>]
Privileged EXEC
Field
Description
Receiver Index
The sFlow Receiver associated with the sampler/poller.
The identity string for receiver, the entity making use of this sFlowRcvrTable entry.
Owner String
Time Out
The time (in seconds) remaining before the receiver is released and stops sending
samples to sFlow receiver.
Max Datagram
Size
The maximum number of bytes that can be sent in a single sFlow datagram.
Port
The destination Layer4 UDP port for sFlow datagrams.
The sFlow receiver IP address.
IP Address
Address Type
The sFlow receiver IP address type. For an IPv4 address, the value is 1 and for an IPv6
address, the value is 2.
Datagram
Version
The sFlow protocol version to be used while sending samples to sFlow receiver.
Example: The following shows example CLI display output for the command.
(switch) #show sflow receivers 1
Receiver Index................................. 1
Owner String...................................
Time out....................................... 0
Utility Commands
621
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
IP Address:.................................... 0.0.0.0
Address Type................................... 1
Port........................................... 6343
Datagram Version............................... 5
Maximum Datagram Size.......................... 1400
show sflow samplers
Use this command to display the sFlow sampling instances created on the switch.
Format
Mode
show sflow samplers
Privileged EXEC
Field
Description
Sampler Data
Source
The sFlowDataSource (slot/port) for this sFlow sampler. This agent will support Physical
ports only.
Receiver Index
The sFlowReceiver configured for this sFlow sampler.
Packet
Sampling Rate
The statistical sampling rate for packet sampling from this source.
Max Header
Size
The maximum number of bytes that should be copied from a sampled packet to form a
flow sample.
Software License Commands
License commands allow you to configure advanced features on some layer2 managed
switches. The following table lists the software license matrix for the layer2 managed
Switch
IPv4 Routing
IPv6 Routing
IP Multicast
Managed Switches
Licensed
Licensed
Licensed
Note: The software license allows the user to download a license file only
on the Master unit. The file cannot be downloaded on a Slave unit.
There are two options to download the license file to the switch:
•
•
Use the Copy command to download the license file through the CLI.
Go to the Maintenance > Download page to download the licence file through the GUI.
Utility Commands
622
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show license
This command displays the license status.
License Date indicates the date of the license. License Status indicates whether license is
active or inactive.
Format
Mode
show license
Privileged EXEC
Example: The following shows example CLI display output for the command.
(Managed Switches) #show license
License date : Apr-9-2010
License copy : 1
License Status: Active
Description : License key is active.
(Managed Switches) #
show license features
This command displays the features that are licensed on the switch
Format
Mode
show license features
Privileged EXEC
Example: The following shows example CLI display output for the command.
(Managed Switches) #show license features
IGMP
MCAST
PIMDM
DVMRP
PIMSM
OSPFV3
IPV6
IP Address Conflict Commands
ip address-conflict-detect run
This command triggers the switch to run active address conflict detection by sending
gratuitous ARP packets for IPv4 addresses on the switch.
Utility Commands
623
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: This command takes effect only once after it is executed and cannot
be saved across power cycles.
Format
Mode
ip address-conflict-detect run
Global Config
show ip address-conflict
This command displays the status information corresponding to the last detected address
conflict.
Term
Definition
Address
Conflict
Detection
Status
Identifies whether the switch has detected an address conflict on any IP address.
Last Conflicting
IP Address
The IP Address that was last detected as conflicting on any interface.
Last Conflicting
MAC Address
The MAC Address of the conflicting host that was last detected on any interface.
Time Since
Conflict
Detected
The time in days, hours, minutes and seconds since the last address conflict was
detected.
clear ip address-conflict-detect
This command clears the detected address conflict status information.
Format
Mode
clear ip address-conflict-detect
Privileged EXEC
Link Local Protocol Filtering Commands
Link Local Protocol Filtering (LLPF) allows the switch to filter out multiple proprietary protocol
PDUs, such as Port Aggregation Protocol (PAgP), if the problems occur with proprietary
protocols running on standards-based switches. If certain protocol PDUs cause unexpected
results, LLPF can be enabled to prevent those protocol PDUs from being processed by the
switch.
llpf blockall
Use this command to block LLPF protocol(s) on a port. Use blockallto filter all PDUs with a
DMAC of 01:00:00:0C:CC:CX on the interface. Use blockisdpto filter the ISDP packets on
the interface. Use blockvtpto filter the VTP packets on the interface. Use blockdtpto filter
Utility Commands
624
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
the DTP packets on the interface. Use blockudldto filter the UDLD packets on the interface.
Use blockpagpto filter the PAGP packets on the interface. Use blocksstpto filter the SSTP
packets on the interface.
Format
llpf {blockisdp | blockvtp | blockdtp | blockudld | blockpagp
| blocksstp | blockall }
Mode
Interface Config
Disable
Default
no llpf
Use this command to unblock LLPF protocol(s) on a port.
show llpf interface all
Use this command to display the status of LLPF rules configured on a particular port or on all
ports.
Format
Mode
show llpf interface [all | unit/slot/port]
Privileged EXEC
Term
Definition
Block ISDP
Shows whether the port blocks ISDP PDUs.
Shows whether the port blocks VTP PDUs.
Shows whether the port blocks DTP PDUs.
Shows whether the port blocks UDLD PDUs.
Shows whether the port blocks PAGP PDUs.
Shows whether the port blocks SSTP PDUs.
Shows whether the port blocks all proprietary PDUs available for the LLDP feature.
Block VTP
Block DTP
Block UDLD
Block PAGP
Block SSTP
Block All
RMON Stats and History Commands
The various MIBs within RFC 2819, 3273, and 3434 are arranged into groups. The managed
switch supports some of the groups in these RFCs but not all. The managed switch complies
with MODULE-COMPLIANCE and OBJECT-GROUP definitions within these RFCs for
supporting individual groups.
The managed switch supports the following groups:
Utility Commands
625
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
RFC 2819
•
Group 1 - Statistics
Contains cumulative traffic and error statistics.
•
Group 2 - History
Generates reports from periodic traffic sampling that are useful for analyzing trends. This
group includes History Control Group and Ethernet History Group.
•
•
Group 3 - Alarm
Enables the definition and setting of thresholds for various counters. Thresholds can be
passed in either a rising or falling direction on existing MIB objects, primarily those in the
Statistics group. An alarm is triggered when a threshold is crossed and the alarm is
passed to the Event group. The Alarm requires the Event Group.
Group 9 - Event
Controls the actions that are taken when an event occurs. RMON events occur when:
•
•
A threshold (alarm) is exceeded
There is a match on certain filters.
RFC 3273
•
•
•
Group 1 - Media Independent Group
Contains media-independent statistics that provide information for full and/or half-duplex
links as well as high capacity links.
Group 2 - Ether Stats High Capacity Group
Contains the High Capacity RMON extensions to RMON-1 etherStatsTable (RFC 2819
Group 1).
Group 3 - Ether History High Capacity Group
Contains the High Capacity RMON extensions to RMON-1 etherHistoryTable (RFC 2819
Group 2).
RFC 3434
•
•
•
Group 1 - High Capacity Alarm Control Group
Controls the configuration of alarms for high capacity MIB object instances.
Group 2 - High Capacity Alarm Capabilities Group
Describes the high capacity alarm capabilities provided by the agent.
Group 3 - High Capacity Alarm Notifications Group
Provides new rising and falling threshold notifications for high capacity objects.
Utility Commands
626
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
rmon alarm
This command sets the RMON alarm entry in the RMON alarm MIB group.
Format
rmon alarm alarm number variable sample interval sampling type
rising-threshold value falling-threshold value startup
rising/falling/rising-falling owner string
Mode
Global Config
Parameter
Description
Alarm Number
Alarm Variable
The Alarm number which identifies an Alarm.
The object identifier of the particular variable to be sampled. Only variables that resolve to an
ASN.1 primitive type of integer.
Sample Interval
The interval in seconds over which the data is sampled and compared with the rising and
falling thresholds. The range is 0 to 2147483647. The default is 0.
Alarm Sample Type The alarm sample type. The method of sampling the selected variable and calculating the
value to be compared against thresholds. Possible types are Absolute or Delta.
Alarm Rising
The alarm rising threshold for the sample statistics.
Threshold Value
Alarm Falling
The alarm falling threshold for the sample statistics.
Threshold Value
Alarm Startup
Alarm
The alarm that may be sent. Possible values are Rising Alarm, Falling Alarm or both.
Alarm Owner string The alarm owner. The owner string associated with the alarm entry.
no rmon alarm
This command deletes the rmon alarm entry.
Format
Mode
no rmon alarm <alarm number>
Global Config
rmon hcalarm
This command sets the rmon hcalarm entry in the High Capacity RMON alarm mib group.
Format
rmon hcalarm <alarm number> <variable> <sample interval>
<sampling type> rising-threshold high <value> low
<value> falling-threshold high <value> low <value>
startup <rising/falling/rising-falling> owner <string>
Mode
Global Config
Utility Commands
627
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Description
hcalarm alarm
number
The identifier of the hcalarm instance.
High Capacity
Alarm Variable
The object identifier of the particular variable to be sampled. Only variables that resolve to an
ASN.1 primitive type of integer.
High Capacity
Alarm interval
The interval in seconds over which the data is sampled and compared with the rising and
falling thresholds. The range is 1to 2147483647.
High Capacity
The method of sampling the selected variable and calculating the value to be compared
Alarm Sample Type against thresholds. Possible types are Absolute or Delta.
Rising-Threshold
High Value
High capacity alarm rising threshold absolute value high. The upper 32 bits of the absolute
value for threshold for the sampled statistics.
Rising-Threshold
Low Value
High capacity alarm rising threshold absolute value low. The lower 32 bits of the absolute
value for threshold for the sampled statistics.
Falling-Threshold
High Value
High capacity alarm falling threshold absolute value high. The upper 32 bits of the absolute
value for threshold for the sampled statistic.
Falling-Threshold
Low Value
High capacity alarm falling threshold absolute value high. The upper 32 bits of the absolute
value for threshold for the sampled statistic.
Rising/Falling/
Rising-Falling
High capacity alarm startup alarm that may be sent. Possible values are Rising Alarm, Falling
Alarm or both.
Owner String
High capacity alarm owner. The owner string associated with the entry.
no rmon hcalarm
This command deletes the rmon hcalarm entry.
Format
no rmon hcalarm <alarm number>
Mode
Global Config
rmon event
This command sets the rmon event entry in the RMON event mib group.
Format
Mode
rmon event <event number> [description|log|owner|trap]
Global Config
Utility Commands
628
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Description
Event Number
Event Type
Event identifier
The type of notification that the probe will make about the event. Possible values are:
•
•
•
•
None
Log
SNMP Trap
Log and SNMP Trap
no rmon event
This command deletes the rmon event entry.
Format
Mode
no rmon event <event number>
Global Config
rmon collection history
This command sets the history control parameters of the RMON historyControl mib group.
Format
Mode
rmon collection history <index number> [buckets <1-65535> | interval
<1-3600> |owner <owner>]
Interface Config
no rmon collection history
This command deletes the history control group entry with the specified index number.
Format
Mode
no rmon collection history <index number>
Interface Config
show rmon
This command displays the entries in the RMON alarm table.
Format
Mode
show rmon {alarms | alarm <alarm-index>}
Privileged Exec
show rmon collection history
This command displays the entries in the RMON history control table.
Format
Mode
show rmon collection history
Privileged Exec
Utility Commands
629
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show rmon events
This command displays the entries in the RMON event table.
Format
Mode
show rmon events
Privileged Exec
Example:
(Switch) # show rmon events
Index Description
-------------------------------------------------------------------------------
test log public MIB 0 days 0 h:0 m:0 s
Type
Community Owner
Last time sent
1
show rmon history
This command displays the specified entry in the RMON history table.
Format
Mode
show rmon history <index> {errors|other|throughput}
Privileged Exec
Example:
(Swtich) # show rmon history 1 throughput
Sample set: 1
Maximum table size: 270
Time
Octets
Packets Broadcast Multicast Util
-------------------- ---------- --------- --------- ---------- --------
show rmon log
This command displays the entries in the RMON log table.
Format
Mode
show rmon log
Privileged Exec
Example:
(Switch) # show rmon log
Maximum table size: 100
Event Description
Time
------------------------------------------------
Utility Commands
630
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show rmon statistics interface
This command displays the RMON statistics for the given interface.
Format
Mode
show rmon statistics interface <unit/slot/port>
Privileged Exec
Example:
(switch) # show rmon statistics interface 1/0/1
Interface: 1/0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 - 127 Octets: 0
128 - 255 Octets: 0 256 - 511 Octets: 0
512 - 1023 Octets: 0 1024 - 1518 Octets: 0
show rmon {hcalarms | hcalarm <alarm index>}
This command displays the entries in the RMON hcAlarmTable.
Format
Mode
show rmon {hcalarms | hcalarm <alarm index>}
Privileged Exec
UDLD Commands
The UDLD feature detects unidirectional links physical ports. A unidirectional link is a
forwarding anomaly in a Layer 2 communication channel in which a bi-directional link stops
passing traffic in one direction. UDLD must be enabled on both sides of the link in order to
detect a unidirectional link. The UDLD protocol operates by exchanging packets containing
information about neighboring devices.
udld enable
This command enables UDLD globally on the switch.
Default
disabled
Format
Mode
udld enable
Global Config
Utility Commands
631
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no udld enable
This command disables udld globally on the switch.
Format
Mode
no udld enable
Global Config
udld message time
This command configures the interval between UDLD probe messages on ports that are in
the advertisement phase. The range is from 7 to 90 seconds.
Default
15
Format
Mode
udld message time <interval>
Global Config
udld timeout interval
This command configures the time interval after which UDLD link is considered to be
unidirectional. The range is from 5 to 60 seconds.
Default
5
Format
Mode
udld timeout interval <interval>
Global Config
udld enable
This command enables UDLD on the specified interface.
Default
disabled
Format
Mode
udld enable
Interface Config
no udld enable
This command disables udld on the specified interface.
Format
Mode
no udld enable
Interface Config
Utility Commands
632
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
udld port
This command selects the UDLD mode operating on this interface. If the keyword
“aggressive” is not entered, the port operates in normal mode.
Default
normal
Format
Mode
udld port [aggressive]
Interface Config
udld reset
This command resets all interfaces that have been shutdown by UDLD.
Format
udld reset
Mode
Privileged EXEC
show udld
This command displays the global settings of UDLD.
Format
show udld
Mode
Privileged EXEC
Term
Definition
Admin Mode
The global administrative mode of UDLD.
The time period (in seconds) between the transmission of UDLD probe packets.
Message
Interval
Timeout Interval
The time period (in seconds) before making decision that link is unidirectional.
show udld <slot/port>
This command displays the UDLD settings for the specified <slot/port>. If the “all” keyword is
entered, it displays information for all ports.
Format
Mode
show udld {< unit/slot/port> | all }
•
•
Privileged EXEC
User EXEC
Term
Definition
Unit/Slot/Port
The identifying <unit/slot/port> of the interface.
Admin Mode
The administrative mode of UDLD configured on this interface. This is either “Enabled” or
“Disabled”.
Utility Commands
633
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
UDLD Mode
The UDLD mode configured on this interface. This is either “Normal” or “Aggressive.”.
The status of the link as determined by UDLD. The options are:
UDLD Status
•
“Undetermined” - UDLD has not collected enough information to determine the state
of the port
•
•
“Not applicable” - UDLD is disabled, either globally or on the port
“Shutdown” - UDLD has detected a unidirectional link and shutdown the port, That
is, the port is in an errDisabled state.
•
•
“Bidirectional” - UDLD has detected a bidirectional link.
“Undetermined(Link Down)” - The port would transition into this state when the port
link physically goes down due to any reasons other than the port been put into
D-Disable mode by UDLD protocol on the switch.
Utility Commands
634
Download from Www.Somanuals.com. All Manuals Search And Download.
12.
Management Commands
12
This chapter describes the management commands available in the managed switch CLI.
This chapter contains the following sections:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
The commands in this chapter are in three functional groups:
•
•
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every
configuration command, there is a show command that displays the configuration setting.
•
Clear commands clear some or all of the settings to factory defaults.
635
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Configuring the Switch Management CPU
To manage the switch via the web GUI or telnet, an IP address needs to be assigned to the
switch management CPU. Whereas there are CLI commands that can be used to do this,
ezconfig simplifies the task. The tool is applicable to all NETGEAR 7000-series managed
switches, and allows you to configure the following parameters:
1. The administrator’s user password and administrator-enable password
2. Management CPU IP address and network mask
3. System name and location information
The tool is interactive and uses questions to guide you through the steps required to perform
its task. At the end of the session, it will ask you if you want to save the changed information.
To see exactly what has been changed by ezconfig at the end of the session, use the show
running-config command.
To perform any switch configuration other than the items listed above, use other CLI
commands or the Web GUI.
ezconfig
This command sets the IP address, subnet mask and gateway of the device. The IP address
and the gateway must be on the same subnet.
Format
Mode
ezconfig
Privileged EXEC
Management Commands
636
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following is an example of an ezconfig session.
NETGEAR EZ Configuration Utility
--------------------------------
Hello and Welcome!
This utility will walk you thru assigning the IP address for the switch
management CPU. It will allow you to save the changes at the end. After
the session, simply use the newly assigned IP address to access the Web
GUI using any public domain Web browser.
Admin password not defined. Do you want to change the password?
(Y/N/Q) y
Enter new password:********
Confirm new password:********
Password Changed!
The 'enable' password required for switch configuration via the command
line interface is currently not configured. Do you wish to change it
(Y/N/Q)? y
Enter new password:********
Confirm new password:********
Password Changed!
Assigning an IP address to your switch management
Current IP Address Configuration
--------------------------------
IP address: 0.0.0.0
Subnet mask: 0.0.0.0
Gateway address: 0.0.0.0
Would you like to assign an IP address now (Y/N/Q)? y
IP Address: 10.10.10.1
Subnet mask: 255.255.255.0
Gateway address: 10.10.10.10
Do you want to assign switch name and location information (Y/N/Q)? y
System Name: testunit1
System Location: testlab
System Contact: Bud Lightyear
There are changes detected, do you wish to save the changes permanently
(Y/N)? y
The configuration changes have been saved successfully. Please enter
'show running-config' to see the final configuration.
Thanks for using EzConfig!
Management Commands
637
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Network Interface Commands
This section describes the commands you use to configure a logical interface for
enable (Privileged EXEC access)
Use this command to access the Privileged EXEC mode. From the Privileged EXEC mode,
you can configure the network interface.
Format
Mode
enable
User EXEC
network parms
Use this command to set the IP address, subnet mask and gateway of the device. The IP
address and the gateway must be on the same subnet.
Format
Mode
network parms <ipaddr> <netmask> [<gateway>]
Privileged EXEC
network protocol
Use this command to specify the network configuration protocol to be used. If you modify this
value, change is effective immediately. If you use the bootp parameter, the switch
periodically sends requests to a BootP server until a response is received. If you use the
dhcpparameter, the switch periodically sends requests to a DHCP server until a response is
received. If you use the noneparameter, you must configure the network information for the
switch manually.
Default
none
Format
Mode
network protocol {none | bootp | dhcp}
Privileged EXEC
network mac-address
Use this command to set locally administered MAC addresses. The following rules apply:
•
•
•
Bit 6 of byte 0 (called the U/L bit) indicates whether the address is universally
administered (b'0') or locally administered (b'1').
Bit 7 of byte 0 (called the I/G bit) indicates whether the destination address is an individual
address (b'0') or a group address (b'1').
The second character, of the twelve character macaddr, must be 2, 6, A or E.
Management Commands
638
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
A locally administered address must have bit 6 On (b'1') and bit 7 Off (b'0').
Format
Mode
network mac-address <macaddr>
Privileged EXEC
network mac-type
Use this command to specify whether the switch uses the burned in MAC address or the
locally-administered MAC address.
Default
burnedin
Format
Mode
network mac-type {local | burnedin}
Privileged EXEC
no network mac-type
Use this command to reset the value of MAC address to its default.
Format
Mode
no network mac-type
Privileged EXEC
network javamode
Use this command to specify whether or not the switch should allow access to the Java
applet in the header frame of the Web interface. When access is enabled, the Java applet
can be viewed from the Web interface. When access is disabled, the user cannot view the
Java applet.
Default
enabled
Format
Mode
network javamode
Privileged EXEC
no network javamode
Use this command to disallow access to the Java applet in the header frame of the Web
interface. When access is disabled, the user cannot view the Java applet.
Format
Mode
no network javamode
Privileged EXEC
show network
Use this command to display configuration settings associated with the switch’s network
interface. The network interface is the logical interface used for in-band connectivity with the
switch via any of the switch's front panel ports. The configuration parameters associated with
Management Commands
639
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
the switch's network interface do not affect the configuration of the front panel ports through
which traffic is switched or routed. The network interface is always considered to be up,
whether or not any member ports are up; therefore, the show network command will always
show “Interface Status” as “Up”.
Format
show network
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Interface Status
IP Address
The network interface status; it is always considered to be “up”.
The IP address of the interface. The factory default value is 0.0.0.0.
The IP subnet mask for this interface. The factory default value is 0.0.0.0.
The default gateway for this IP interface. The factory default value is 0.0.0.0.
Subnet Mask
Default
Gateway
IPv6
Administrative
Mode
Whether enabled or disabled.
IPv6
Address/Length
The IPv6 address and length.
IPv6 Default
Router
The IPv6 default router address.
Burned In MAC
Address
The burned in MAC address used for in-band connectivity.
Locally
Administered
MAC Address
If desired, a locally administered MAC address can be configured for in-band
connectivity. To take effect, 'MAC Address Type' must be set to 'Locally Administered'.
Enter the address as twelve hexadecimal digits (6 bytes) with a colon between each
byte. Bit 1 of byte 0 must be set to a 1 and bit 0 to a 0, i.e. byte 0 should have the
following mask 'xxxx xx10'. The MAC address used by this bridge when it must be
referred to in a unique fashion. It is recommended that this be the numerically smallest
MAC address of all ports that belong to this bridge. However it is only required to be
unique. When concatenated with dot1dStpPriority a unique BridgeIdentifier is formed
which is used in the Spanning Tree Protocol.
MAC Address
Type
The MAC address which should be used for in-band connectivity. The choices are the
burned in or the Locally Administered address. The factory default is to use the burned in
MAC address.
The following shows example CLI display output for the network port.
(Netgear Switch) #show network
Interface Status............................... Always Up
IP Address..................................... 10.250.3.1
Subnet Mask.................................... 255.255.255.0
Default Gateway................................ 10.250.3.3
IPv6 Administrative Mode....................... Enabled
IPv6 Address/Length is ........................ FE80::210:18FF:FE82:337/64
IPv6 Address/Length is ........................ 3099::1/64
Management Commands
640
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
IPv6 Address/Length is ........................ 3099::210:18FF:FE82:337/64
IPv6 Default Router is ........................ FE80::204:76FF:FE73:423A
Burned In MAC Address.......................... 00:10:18:82:03:37
Locally Administered MAC Address............... 00:00:00:00:00:00
MAC Address Type............................... Burned In
Network Configuration Protocol Current......... None
Management VLAN ID............................. 1
Web Mode....................................... Enable
Java Mode...................................... Enable
Console Port Access Commands
This section describes the commands you use to configure the console port. You can use a
serial cable to connect a management host directly to the console port of the switch.
configuration
Use this command to access Global Config mode. From Global Config mode, you can
configure a variety of system settings, including user accounts. You can also enter other
command modes, including Line Config mode.
Format
Mode
configuration
Privileged EXEC
line
Use this command to access Line Config mode, which allows you to configure various Telnet
settings, ssh settings, and the console port.
Format
Mode
line {console | telnet | ssh}
Global Config
serial baudrate
Use this command to specify the communication rate of the terminal interface. The supported
rates are 1200, 2400, 4800, 9600, 19200, 38400, 57600, 115200.
Default
115200
Format
Mode
serial baudrate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600 |
115200}
Line Config
Management Commands
641
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no serial baudrate
Use this command to set the communication rate of the terminal interface.
Format
Mode
no serial baudrate
Line Config
serial timeout
Use this command to specify the maximum connect time (in minutes) without console activity.
A value of 0 indicates that a console can be connected indefinitely. The time range is 0 to
160.
Default
5
Format
Mode
serial timeout <0-160>
Line Config
no serial timeout
Use this command to set the maximum connect time (in minutes) without console activity.
Format
Mode
no serial timeout
Line Config
login authentication
Use this command in line configuration mode to specify a login authentication method list for
remote telnet or console.
Format
Mode
login authentication {default | list-name}
Line Config
no login authentication
Use this command to return to the default specified by the login authentication
command.
Format
Mode
no login authentication {default | list-name}
Line Config
Management Commands
642
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
enable authentication
Use this command in line configuration mode to specify an authentication method list when
the user accesses a higher privilege level in remote telnet or console.
Format
Mode
enable authentication {default | list-name}
Line Config
no enable authentication
Use this command to return to the default specified by the enable authentication
command.
Format
Mode
no enable authentication {default | list-name}
Line Config
show serial
Use this command to display serial communication settings for the switch.
Format
show serial
Modes
• Privileged EXEC
• User EXEC
Term
Definition
Serial Port
Login Timeout
(minutes)
The time, in minutes, of inactivity on a Serial port connection, after which the Switch will
close the connection. Any numeric value between 0 and 160 is allowed, the factory
default is 5. A value of 0 disables the timeout.
Baud Rate (bps)
The default baud rate at which the serial port will try to connect. The available values are
1200, 2400, 4800, 9600, 19200, 38400,57600, and 115200 baud. The factory default is
9600 baud.
Character Size
(bits)
The number of bits in a character. The number of bits is always 8.
Flow Control
Whether Hardware Flow-Control is enabled or disabled. Hardware Flow Control is
always disabled.
Stop Bits
The number of Stop bits per character. The number of Stop bits is always 1.
The Parity Method used on the Serial Port. The Parity Method is always None.
Parity Type
Telnet Commands
This section describes the commands you use to configure and view Telnet settings. You can
use Telnet to manage the device from a remote management host.
Management Commands
643
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip telnet server enable
Use this command to enable Telnet connections to the system and to enable the Telnet
Server Admin Mode. This command opens the Telnet listening port.
Default
enabled
Format
Mode
ip telnet server enable
Privileged EXEC
no ip telnet server enable
Use this command to disable Telnet access to the system and to disable the Telnet Server
Admin Mode. This command closes the Telnet listening port and disconnects all open Telnet
sessions.
Format
Mode
no ip telnet server enable
Privileged EXEC
telnet
Use this command to establish a new outbound Telnet connection to a remote host. The host
value must be a valid IP address or host name. Valid values for port should be a valid decimal
integer in the range of 0 to 65535, where the default value is 23. If [debug] is used, the
current Telnet options enabled is displayed. The optional line parameter sets the outbound
Telnet operational mode as ‘linemode’ where, by default, the operational mode is ‘character
mode’. The noecho option disables local echo.
Format
Modes
telnet <ip-address|hostname> <port> [debug] [line] [noecho]
• Privileged EXEC
• User EXEC
transport input telnet
Use this command to regulate new Telnet sessions. If enabled, new Telnet sessions can be
established until there are no more sessions available. An established session remains active
until the session is ended or an abnormal network error ends the session.
Note: If the Telnet Server Admin Mode is disabled, Telnet sessions cannot
be established. Use the ip telnet server enablecommand to
enable Telnet Server Admin Mode.
Management Commands
644
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Default
enabled
Format
Mode
transport input telnet
Line Config
no transport input telnet
Use this command to prevent new Telnet sessions from being established.
Format
Mode
no transport input telnet
Line Config
transport output telnet
Use this command to regulate new outbound Telnet connections. If enabled, new outbound
Telnet sessions can be established until the system reaches the maximum number of
simultaneous outbound Telnet sessions allowed. An established session remains active until
the session is ended or an abnormal network error ends it.
Default
enabled
Format
Mode
transport output telnet
Line Config
no transport output telnet
Use this command to prevent new outbound Telnet connection from being established.
Format
Mode
no transport output telnet
Line Config
session-limit
Use this command to specify the maximum number of simultaneous outbound Telnet
sessions. A value of 0 indicates that no outbound Telnet session can be established.
Default
5
Format
Mode
session-limit <0-5>
Line Config
Management Commands
645
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no session-limit
Use this command to set the maximum number of simultaneous outbound Telnet sessions to
the default value.
Format
Mode
no session-limit
Line Config
session-timeout
Use this command to set the Telnet session timeout value.The timeout value unit of time is
minutes.
Default
5
Format
Mode
session-timeout <1-160>
Line Config
no session-timeout
Use this command to set the Telnet session timeout value to the default. The timeout value
unit of time is minutes.
Format
Mode
no session-timeout
Line Config
telnetcon maxsessions
Use this command to specify the maximum number of Telnet connection sessions that can be
established. A value of 0 indicates that no Telnet connection can be established. The range is
0-5.
Default
4
Format
Mode
telnetcon maxsessions <0-4>
Privileged EXEC
no telnetcon maxsessions
Use this command to set the maximum number of Telnet connection sessions that can be
established to the default value.
Format
Mode
no telnetcon maxsessions
Privileged EXEC
Management Commands
646
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
telnetcon timeout
Use this command to set the Telnet connection session timeout value, in minutes. A session
is active as long as the session has not been idle for the value set. The time is a decimal
value from 1 to 160.
Note: When you change the timeout value, the new value is applied to all
active and inactive sessions immediately. Any sessions that have
been idle longer than the new timeout value are disconnected
immediately.
Default
5
Format
Mode
telnetcon timeout <1-160>
Privileged EXEC
no telnetcon timeout
Use this command to set the Telnet connection session timeout value to the default.
Note: Changing the timeout value for active sessions does not become
effective until the session is reaccessed. Also, any keystroke
activates the new timeout duration.
Format
Mode
no telnetcon timeout
Privileged EXEC
show telnet
Use this command to display the current outbound Telnet settings. In other words, these
settings apply to Telnet connections initiated from the switch to a remote system.
Format
Modes
show telnet
• Privileged EXEC
• User EXEC
Management Commands
647
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Outbound
Telnet Login
Timeout
The number of minutes an outbound Telnet session is allowed to remain inactive before
being logged off.
Maximum
Number of
The number of simultaneous outbound Telnet connections allowed.
Outbound
Telnet Sessions
Allow New
Outbound
Indicates whether outbound Telnet sessions will be allowed.
Telnet Sessions
show telnetcon
Use this command to display the current inbound Telnet settings. In other words, these
settings apply to Telnet connections initiated from a remote system to the switch.
Format
Modes
show telnetcon
• Privileged EXEC
• User EXEC
Term
Definition
Remote
This object indicates the number of minutes a remote connection session is allowed to
remain inactive before being logged off. May be specified as a number from 1 to 160.
The factory default is 5.
Connection
Login Timeout
(minutes)
Maximum
Number of
Remote
This object indicates the number of simultaneous remote connection sessions allowed.
The factory default is 5.
Connection
Sessions
Allow New
Telnet Sessions
New Telnet sessions will not be allowed when this field is set to no. The factory default
value is yes.
Secure Shell (SSH) Commands
This section describes the commands you use to configure SSH access to the switch. Use
SSH to access the switch from a remote management host.
Note: The system allows a maximum of 5 SSH sessions.
Management Commands
648
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip ssh
Use this command to enable SSH access to the system. (This command is the short form of
the ip ssh server enablecommand.)
Default
disabled
Format
Mode
ip ssh
Privileged EXEC
ip ssh protocol
Use this command to set or remove protocol levels (or versions) for SSH. Either SSH1 (1),
SSH2 (2), or both SSH 1 and SSH 2 (1 and 2) can be set.
Default
1 and 2
Format
Mode
ip ssh protocol [1] [2]
Privileged EXEC
ip ssh server enable
Use this command to enable the IP secure shell server.
Default
disabled
Format
Mode
ip ssh server enable
Privileged EXEC
no ip ssh server enable
Use this command to disable the IP secure shell server.
Format
Mode
no ip ssh server enable
Privileged EXEC
sshcon maxsessions
Use this command to specify the maximum number of SSH connection sessions that can be
established. A value of 0 indicates that no ssh connection can be established. The range is 0
to 5.
Default
5
Format
Mode
sshcon maxsessions <0-5>
Privileged EXEC
Management Commands
649
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no sshcon maxsessions
Use this command to set the maximum number of allowed SSH connection sessions to the
default value.
Format
Mode
no sshcon maxsessions
Privileged EXEC
sshcon timeout
Use this command to set the SSH connection session timeout value, in minutes. A session is
active as long as the session has been idle for the value set. The time is a decimal value from
1 to 160.
Changing the timeout value for active sessions does not become effective until the session is
re accessed. Also, any keystroke activates the new timeout duration.
Default
5
Format
Mode
sshcon timeout <1-160>
Privileged EXEC
no sshcon timeout
Use this command to set the SSH connection session timeout value, in minutes, to the
default.
Changing the timeout value for active sessions does not become effective until the session is
re accessed. Also, any keystroke activates the new timeout duration.
Format
Mode
no sshcon timeout
Privileged EXEC
show ip ssh
Use this command to display the ssh settings.
Format
show ip ssh
Mode
Privileged EXEC
Term
Definition
Administrative
Mode
This field indicates whether the administrative mode of SSH is enabled or disabled.
Protocol Level
The protocol level may have the values of version 1, version 2 or both versions 1 and
version 2.
SSH Sessions
Currently Active
The number of SSH sessions currently active.
Management Commands
650
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Max SSH
Sessions
Allowed
The maximum number of SSH sessions allowed.
SSH Timeout
Keys Present
The SSH timeout value in minutes.
Indicates whether the SSH RSA and DSA key files are present on the device.
Indicates whether RSA or DSA key files generation is currently in progress.
Key Generation
in Progress
Management Security Commands
This section describes commands you use to generate keys and certificates, which you can
do in addition to loading them as before.
crypto certificate generate
Use this command to generate self-signed certificate for HTTPS. The generate RSA key for
SSL has a length of 1024 bits. The resulting certificate is generated with a common name
equal to the lowest IP address of the device and a duration of 365 days.
Format
Mode
crypto certificate generate
Global Config
no crypto certificate generate
Use this command to delete the HTTPS certificate files from the device, regardless of
whether they are self-signed or downloaded from an outside source.
Format
Mode
no crypto certificate generate
Global Config
crypto key generate rsa
Use this command to generate an RSA key pair for SSH. The new key files will overwrite any
existing generated or downloaded RSA key files.
Format
Mode
crypto key generate rsa
Global Config
Management Commands
651
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no crypto key generate rsa
Use this command to delete the RSA key files from the device.
Format
Mode
no crypto key generate rsa
Global Config
crypto key generate dsa
Use this command to generate a DSA key pair for SSH. The new key files will overwrite any
existing generated or downloaded DSA key files.
Format
Mode
crypto key generate dsa
Global Config
no crypto key generate dsa
Use this command to delete the DSA key files from the device.
Format
Mode
no crypto key generate dsa
Global Config
Hypertext Transfer Protocol (HTTP) Commands
This section describes the commands you use to configure HTTP and secure HTTP access
to the switch. Access to the switch by using a Web browser is enabled by default. Everything
you can view and configure by using the CLI is also available by using the Web.
ip http server
Use this command to enable access to the switch through the Web interface. When access is
enabled, the user can login to the switch from the Web interface. When access is disabled,
the user cannot login to the switch's Web server. Disabling the Web interface takes effect
immediately. All interfaces are affected.
Default
enabled
Format
Mode
ip http server
Privileged EXEC
Management Commands
652
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip http server
Use this command to disable access to the switch through the Web interface. When access
is disabled, the user cannot login to the switch's Web server.
Format
Mode
no ip http server
Privileged EXEC
ip http secure-server
Use this command to enable the secure socket layer for secure HTTP.
Default
disabled
Format
Mode
ip http secure-server
Privileged EXEC
no ip http secure-server
Use this command to disable the secure socket layer for secure HTTP.
Format
Mode
no ip http secure-server
Privileged EXEC
ip http java
Use this command to enable the Web Java mode. The Java mode applies to both secure and
un-secure Web connections.
Default
Enabled
Format
Mode
ip http java
Privileged EXEC
no ip http java
Use this command to disable the Web Java mode. The Java mode applies to both secure
and un-secure Web connections.
Format
Mode
no ip http java
Privileged EXEC
ip http session hard-timeout
Use this command to configure the hard timeout for un-secure HTTP sessions in hours.
Configuring this value to zero will give an infinite hard-timeout. When this timeout expires, the
Management Commands
653
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
user will be forced to re-authenticate. This timer begins on initiation of the web session and is
unaffected by the activity level of the connection.
Default
24
Format
Mode
ip http session hard-timeout <0-168>
Privileged EXEC
no ip http session hard-timeout
Use this command to restore the hard timeout for un-secure HTTP sessions to the default
value.
Format
Mode
no ip http session hard-timeout
Privileged EXEC
ip http authentication
Use this command to specify the authentication methods for http server users. The additional
methods of authentication are used only if the previous method returns an error, not if it fails.
To ensure that the authentication succeeds even if all methods return an error, specify none
as the final method in the command line. For example If none specified as an authentication
method after radius, no authentication is used if the radius server is down.
Format
Mode
ip http authentication method1 [method2 ...]
Global ConfigC
Term
Local
Definition
Uses the local username database for authentication.
Uses the list of all RADIUS servers for authentication.
Uses the list of all TACACS servers for authentication.
Uses no authentication.
Radius
Tacacs
None
no ip http authentication
Use this command to restore the authentication methods to the default.
Format
Mode
no ip http authentication method1 [method2 ...]
Global Config
Management Commands
654
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip http session maxsessions
Use this command to limit the number of allowable un-secure HTTP sessions. Zero is the
configurable minimum.
Default
16
Format
Mode
ip http session maxsessions <0-16>
Privileged EXEC
no ip http session maxsessions
Use this command to restore the number of allowable un-secure HTTP sessions to the
default value.
Format
Mode
no ip http session maxsessions
Privileged EXEC
ip http session soft-timeout
Use this command to configure the soft timeout for un-secure HTTP sessions in minutes.
Configuring this value to zero will give an infinite soft-timeout. When this timeout expires the
user will be forced to re-authenticate. This timer begins on initiation of the Web session and is
re-started with each access to the switch.
Default
Format
Mode
5
ip http session soft-timeout <0-60>
Privileged EXEC
no ip http session soft-timeout
Use this command to reset the soft timeout for un-secure HTTP sessions to the default value.
Format
Mode
no ip http session soft-timeout
Privileged EXEC
ip http secure-session maxsessions
Use this command to limit the number of secure HTTP sessions. Zero is the configurable
minimum.
Default
Format
Mode
16
ip http secure-session maxsessions <0-16>
Privileged EXEC
Management Commands
655
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no ip http secure-session maxsessions
Use this command to restore the number of allowable secure HTTP sessions to the default
value.
Format
Mode
no ip http secure-session maxsessions
Privileged EXEC
ip http secure-session soft-timeout
Use this command to configure the soft timeout for secure HTTP sessions in minutes.
Configuring this value to zero will give an infinite soft-timeout. When this timeout expires, you
are forced to re-authenticate. This timer begins on initiation of the Web session and is
re-started with each access to the switch. The secure-session soft-timeout can not be set to
zero (infinite).
Default
5
Format
Mode
ip http secure-session soft-timeout <1-60>
Privileged EXEC
no ip http secure-session soft-timeout
Use this command to restore the soft timeout for secure HTTP sessions to the default value.
Format
Mode
no ip http secure-session soft-timeout
Privileged EXEC
ip http secure-session hard-timeout
Use this command to configure the hard timeout for secure HTTP sessions in hours. When
the timeout expires, the user is forced to re-authenticate. This timer begins on initiation of the
Web session and is unaffected by the activity level of the connection. The secure-session
hard-timeout can not be set to zero (infinite).
Default
Format
Mode
24
ip http secure-session hard-timeout <1-168>
Privileged EXEC
no ip http secure-session hard-timeout
Use this command to reset the hard timeout for secure HTTP sessions to the default value.
Format
Mode
no ip http secure-session hard-timeout
Privileged EXEC
Management Commands
656
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip https authentication
Use this command to specify the authentication methods for http server users. The additional
methods of authentication are used only if the previous method returns an error, not if it fails.
To ensure that the authentication succeeds even if all methods return an error, specify none
as the final method in the command line. If noneis specified as an authentication method
after radius, no authentication is used if the radius server is down.
Format
ip https authentication method1 [method2 ...]
Mode
Global ConfigC
Term
Local
Definition
Uses the local username database for authentication.
Uses the list of all RADIUS servers for authentication.
Uses the list of all TACACS servers for authentication.
Uses no authentication.
Radius
Tacacs
None
no ip https authentication
Use this command to restore the authentication methods to the default for http server users.
Format
Mode
no ip https authentication method1 [method2 ...]
Global Config
ip http secure-port
Use this command to set the SSL port where port can be 1-65535 and the default is port 443.
Default
443
Format
Mode
ip http secure-port <portid>
Privileged EXEC
no ip http secure-port
Use this command to reset the SSL port to the default value.
Format
Mode
no ip http secure-port
Privileged EXEC
Management Commands
657
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip http secure-protocol
Use this command to set protocol levels (versions). The protocol level can be set to TLS1,
SSL3 or to both TLS1 and SSL3.
Default
SSL3 and TLS1
Format
Mode
ip http secure-protocol [SSL3] [TLS1]
Privileged EXEC
show ip http
Use this command to display the http settings for the switch.
Format
Mode
show ip http
Privileged EXEC
Term
Definition
HTTP Mode (Unsecure)
Java Mode
The unsecure HTTP server administrative mode.
The java applet administrative mode which applies to both secure and
un-secure web connections.
Maximum Allowable HTTP
Sessions
The number of allowable un-secure http sessions.
The hard timeout for un-secure http sessions in hours.
The soft timeout for un-secure http sessions in minutes.
HTTP Session Hard
Timeout
HTTP Session Soft
Timeout
HTTP Mode (Secure)
Secure Port
The secure HTTP server administrative mode.
The secure HTTP server port number.
Secure Protocol Level(s)
The protocol level may have the values of SSL3, TSL1, or both SSL3 and
TSL1.
Maximum Allowable
HTTPS Sessions
The number of allowable secure http sessions.
The hard timeout for secure http sessions in hours.
The soft timeout for secure http sessions in minutes.
HTTPS Session Hard
Timeout
HTTPS Session Soft
Timeout
Certificate Present
Indicates whether the secure-server certificate files are present on the device.
Indicates whether certificate generation is currently in progress.
Certificate Generation in
Progress
Management Commands
658
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Access Commands
Use the commands in this section to close remote connections or to view information about
connections to the system.
disconnect
Use the disconnectcommand to close HTTP, HTTPS, Telnet or SSH sessions. Use allto
close all active sessions, or use <session-id>to specify the session ID to close. To view
the possible values for <session-id>, use the show loginsessioncommand.
Format
Mode
disconnect {<session_id> | all}
Privileged EXEC
show loginsession
Use this command to display current Telnet and serial port connections to the switch.
Format
Mode
show loginsession
Privileged EXEC
Term
ID
Definition
Login Session ID.
User Name
The name the user entered to log on to the system.
IP address of the remote client machine or EIA-232 for the serial port connection.
Connection
From
Idle Time
Time this session has been idle.
Session Time
Session Type
Total time this session has been connected.
Shows the type of session, which can be HTTP, HTTPS, telnet, serial, or SSH.
User Account Commands
This section describes the commands you use to add, manage, and delete system users.
The 7000 series software has two default users: admin and guest. The admin user can view
and configure system settings, and the guest user can view settings.
Note: You cannot delete the admin user. There is only one user allowed
with read/write privileges. You can configure up to five read-only
users on the system.
Management Commands
659
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
username
Use this command to add a new user to the local user database. The default privilege level is
1. Using the encrypted keyword allows the administrator to transfer local user passwords
between devices without having to know the passwords. When the password parameter is
used along with encrypted parameter, the password must be exactly 128 hexadecimal
characters in length. If the password strength feature is enabled, this command checks for
password strength and returns an appropriate error if it fails to meet the password strength
criteria. Giving the optional parameter override-complexity-check disables the validation of
the password strength.
Format
username name {password password [encrypted
[override-complexity-check] | level level [encrypted
[override-complexity-check]] | override-complexity-check]} |
{level level [override-complexity-check] password}
Mode
Global Config
Term
Definition
Name
The name of the user, up to 32 characters.
Password
level
The password for the users 8-64 characters. This value can be zero if the no passwords
min-length command has been executed. The special characters allowed in the
password include: ! # $ % & ' ( ) * + , - . / : ; < = > @ [ \ ] ^ _ ` { | } ~.
Specifies the user level. If not specified, the privilege level is 1. Level 0 can be assigned
by a level 15 user to another user to suspend that user’s access. Range 0-15. Enter
access level 1 for Read Access or 15 for Read/Write Access.
encrypted
Encrypted password you enter, copied from another device configuration.
override-compl
exity-check
Disables the validation of the password strength.
no username
Use this command to remove a user account.
Format
Mode
no username <username>
Global Config
Note: You cannot delete the “admin” user account.
Management Commands
660
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
username name nopassword
Use this command to remove an existing user’s password (NULL password).
Format
username name nopassword [Level Level]
Mode
Global Config
Parameter
name
Description
The name of the user. Range: 1-32 characters.
The authentication password for the user. Range 8-64 characters.
password
level
The user level. Level 0 can be assigned by a level 15 user to another user to suspend
that user's access. Range 0-15.
username <username> unlock
Use this command to unlock a user’s account. Only a user with read/write access can
re-activate a locked user account.
Format
Mode
username <username> unlock
Global Config
username snmpv3 accessmode
Use this command to specify the snmpv3 access privileges for the specified login user. The
valid accessmode values are readonlyor readwrite. The <username> is the login user
name for which the specified access mode applies. The default is readwritefor the
“admin” user and readonlyfor all other users. You must enter the <username>in the same
case you used when you added the user. To see the case of the <username>, enter the
show userscommand.
Defaults
• admin - readwrite
• other - readonly
Format
Mode
username snmpv3 accessmode <username> {readonly | readwrite}
Global Config
no username snmpv3 accessmode
Use this command to set the snmpv3 access privileges for the specified user as readwrite
for the “admin” user and readonly for all other users. The <username>value is the user
name for which the specified access mode will apply.
Format
Mode
no username snmpv3 accessmode <username>
Global Config
Management Commands
661
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
username snmpv3 authentication
Use this command to specify the authentication protocol to be used for the specified user.
The valid authentication protocols are none, md5or sha. If you specify md5or sha, the login
password is also used as the snmpv3 authentication password and therefore must be at least
eight characters in length. The <username> is the user name associated with the
authentication protocol. You must enter the <username>in the same case you used when
you added the user. To see the case of the <username>, enter the show userscommand.
Default
no authentication
Format
Mode
username snmpv3 authentication <username> {none | md5 | sha}
Global Config
no username snmpv3 authentication
Use this command to set the authentication protocol to be used for the specified user to
none. The <username>is the user name for which the specified authentication protocol is
used.
Format
Mode
no username snmpv3 authentication <username>
Global Config
username snmpv3 encryption
Use this command to specify the encryption protocol used for the specified user. The valid
encryption protocols are desor none.
If you select des, you can specify the required key on the command line. The encryption key
must be 8 to 64 characters long. If you select the desprotocol but do not provide a key, the
user is prompted for the key. When you use the desprotocol, the login password is also used
as the snmpv3 encryption password, so it must be a minimum of eight characters. If you
select none, you do not need to provide a key.
The <username>value is the login user name associated with the specified encryption. You
must enter the <username>in the same case you used when you added the user. To see
the case of the <username>, enter the show userscommand.
Default
no encryption
Format
Mode
username snmpv3 encryption <username> {none | des[key]}
Global Config
Management Commands
662
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no username snmpv3 encryption
Use this command to set the encryption protocol to none. The <username>is the login user
name for which the specified encryption protocol will be used.
Format
no username snmpv3 encryption <username>
Mode
Global Config
show users
Use this command to display the configured user names and their settings. This command is
only available for users with Read/Write privileges. The SNMPv3 fields will only be displayed
if SNMP is available on the system.
Format
show users
Mode
Privileged EXEC
Term
Definition
User Name
The name the user enters to login using the serial port, Telnet or Web.
Access Mode
Shows whether the user is able to change parameters on the switch (Read/Write) or is
only able to view them (Read Only). As a factory default, the “admin” user has
Read/Write access and the “guest” has Read Only access. There can only be one
Read/Write user and up to five Read Only users.
SNMPv3
Access Mode
The SNMPv3 Access Mode. If the value is set to ReadWrite, the SNMPv3 user is able
to set and retrieve parameters on the system. If the value is set to ReadOnly, the
SNMPv3 user is only able to retrieve parameter information. The SNMPv3 access mode
may be different than the CLI and Web access mode.
SNMPv3
Authentication
The authentication protocol to be used for the specified login user.
The encryption protocol to be used for the specified login user.
SNMPv3
Encryption
show users accounts
Use this command to display the local user status with respect to user account lockout and
password aging.
Format
Mode
show users accounts
Privileged EXEC
Term
Definition
User Name
The local user account’s user name.
The user’s privilege level (1-15).
Privilege
Password aging
The password aging time for the local users.
Management Commands
663
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Lockout Status
Indicates whether the user account is locked out (true or false).
The current password expiration date in date format.
Password
Expiration Date
show users accounts detail
This command displays the local user status with respect to user account lockout and
password aging. It also includes information about Password strength and complexity.
Format
Mode
show users accounts detail
Privileged EXEC
(Switch) #show users accounts detail
UserName....................................... admin
Privilege...................................... 15
Password Aging................................. ---
Password Expiry................................ ---
Lockout........................................ False
Override Complexity Check...................... Disable
Password Strength.............................. ---
UserName....................................... guest
Privilege...................................... 1
Password Aging................................. ---
Password Expiry................................ ---
Lockout........................................ False
Override Complexity Check...................... Disable
Password Strength.............................. ---
show users long
Use this command to display the user’s full name.
Format
Mode
show users long
Privileged EXEC
Term
Definition
User Name
The full name of the user.
show users login-history
Use this command to display the users who have logged in previously.
Format
Mode
show users login-history [{user name}]
Privileged EXEC
Management Commands
664
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Login Time
The time at which the user logged in.
The user name used to login.
Username
Protocol
Location
The protocol that the user used to login.
The location of the user.
passwords min-length
Use this command to enforce a minimum password length for local users. The value also
applies to the enable password. The valid range is 0-64.
Default
8
Format
Mode
passwords min-length <0-64>
Global Config
no passwords min-length
Use this command to set the minimum password length to the default value.
Format
Mode
no passwords min-length
Global Config
passwords history
Use this command to set the number of previous passwords that shall be stored for each
user account. When a local user changes his or her password, the user will not be able to
reuse any password stored in password history. This ensures that users don’t reuse their
passwords often. The valid range is 0-10.
Default
0
Format
Mode
passwords history <0-10>
Global Config
no passwords history
Use this command to set the password history to the default value.
Format
Mode
no passwords history
Global Config
Management Commands
665
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
passwords aging
Use this command to implement aging on passwords for local users. When a user’s
password expires, the user will be prompted to change it before logging in again. The valid
range is 1-365. The default is 0, or no aging.
Default
0
Format
Mode
passwords aging <1-365>
Global Config
no passwords aging
Use this command to set the password aging to the default value.
Format
Mode
no passwords aging
Global Config
passwords lock-out
Use this command to strengthen the security of the switch by locking user accounts that have
failed login due to wrong passwords. When a lockout count is configured, a user that is
logged in must enter the correct password within that count. Otherwise the user will be locked
out from further switch access. Only a user with read/write access can re-activate a locked
user account. Password lockout does not apply to logins from the serial console. The valid
range is 1-5. The default is 0, or no lockout count enforced.
Format
Mode
passwords lock-out <1-5>
Global Config
0
Default
no passwords lock-out
Use this command to set the password lock-out count to the default value.
Format
Mode
no passwords lock-out
Global Config
passwords strength-check
Use this command to enable the password strength feature. It is used to verify the strength of
a password during configuration.
Format
passwords strength-check
Management Commands
666
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Mode
Global Config
Disable
Default
no passwords strength-check
Use this command to disable the password strength-check.
Format
Mode
no passwords strength-check
Global Config
passwords strength minimum uppercase-letters
Use this command to enforce a minimum number of uppercase letters that a password
should contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction
on that set of characters.
Format
Mode
passwords strength minimum uppercase-letters
Global Config
2
Default
no passwords strength minimum uppercase-letters
Use this command to reset the minimum number of uppercase letters to the default value.
Format
Mode
no passwords strength minimum uppercase-characters
Global Config
passwords strength minimum lowercase-letters
Use this command to enforce a minimum number of lowercase letters that a password should
contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction on that
set of characters.
Format
Mode
passwords strength minimum lowercase-letters
Global Config
2
Default
no passwords strength minimum lowercase-letters
Use this command to reset the minimum number of lowercase letters to the default value.
Format
Mode
no passwords strength minimum lowercase-characters
Global Config
Management Commands
667
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
passwords strength minimum numeric-characters
Use this command to enforce a minimum number of numeric characters that a password
should contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction
on that set of characters.
Format
Mode
passwords strength minimum numeric-letters
Global Config
2
Default
no passwords strength minimum numeric-characters
Use this command to reset the minimum number of numeric characters to the default value.
Format
Mode
no passwords strength minimum numeric-characters
Global Config
passwords strength minimum special-characters
Use this command to enforce a minimum number of special characters that a password
should contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction
on that set of characters.
Format
Mode
passwords strength minimum special-letters
Global Config
2
Default
no passwords strength minimum special-letters
Use this command to reset the minimum number of special letters to the default value.
Format
Mode
no passwords strength minimum special-letters
Global Config
passwords strength maximum consecutive-characters
Use this command to enforce a maximum number of consecutive characters that a password
should contain. An example of consecutive characters is abcd. The valid range is 0-16. If a
password has consecutive characters more than the configured limit, it fails to configure. The
default is 0. A maximum of 0 means no restriction on that set of characters.
Format
Mode
passwords strength maximum consecutive-characters
Global Config
0
Default
Management Commands
668
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no passwords strength maximum consecutive-characters
Use this command to reset the maximum number of consecutive characters to the default
value.
Format
Mode
no passwords strength maximum consecutive-characters
Global Config
passwords strength maximum repeated-characters
Use this command to enforce a maximum number of repeated characters that a password
should contain. An example of repeated characters is aaaa. The valid range is 0-16. If a
password has a repetition of characters more than the configured limit, it fails to configure.
The default is 0. A maximum of 0 means no restriction on that set of characters.
Format
Mode
passwords strength maximum repeated-characters
Global Config
0
Default
no passwords strength maximum repeated-characters
Use this command to reset the maximum number of repeated-characters to the default value.
Format
Mode
no passwords strength maximum repeated-characters
Global Config
passwords strength minimum character-classes
Use this command to enforce a minimum number of characters classes that a password
should contain. Character classes are uppercase letters, lowercase letters, numeric
characters and special characters. The valid range is 0-4. The default is 4.
Format
Mode
passwords strength minimum character-classes
Global Config
4
Default
no passwords strength minimum character-classes
Use this command to reset the minimum number of character classes to the default value.
Format
Mode
no passwords strength minimum character-classes
Global Config
Management Commands
669
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
passwords strength exclude-keyword
Use this command to exclude the specified keyword while configuring the password. The
password does not accept the keyword in any form (in between the string, case insensitive
and reverse) as a substring. User can configure up to a maximum of 3 keywords.
Format
Mode
passwords strength exclude-keyword keyword
Global Config
no passwords strength exclude-keyword
Use this command to remove the exclude-keyword.
Format
Mode
no passwords strength exclude-keyword
Global Config
show passwords configuration
Use this command to display the configured password management settings.
Format
Mode
show passwords configuration
Privileged EXEC
Termd
Definition
Minimum Password
Length
Minimum number of characters required when changing passwords.
Password History
Password Aging
Lockout Attempts
Number of passwords to store for reuse prevention.
Length in days that a password is valid.
Number of failed password login attempts before lockout.
Minimum number of uppercase characters required when configuring passwords.
Minimum Password
Uppercase Letters
Minimum Password
Lowercase Letters
Minimum number of lowercase characters required when configuring passwords.
Minimum number of numeric characters required when configuring passwords.
Minimum Password
Numeric Characters
Maximum Password
Consecutive
Characters
Maximum number of consecutive characters required that the password should
contain when configuring passwords.
Maximum Password
Repeated Characters
Maximum number of repetition of characters that the password should contain
when configuring passwords.
Management Commands
670
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Termd
Definition
Minimum Password
Character Classes
Minimum number of character classes (uppercase, lowercase, numeric and
special) required when configuring passwords.
Password Exclude-
Keywords
The set of keywords to be excluded from the configured password when strength
checking is enabled.
show passwords result
Use this command to display the last password set result information.
Format
Mode
show passwords result
Privileged EXEC
Term
Definition
Last User Whose
Password Is Set
Shows the name of the user with the most recently set password.
Shows whether password strength checking is enabled.
Password Strength
Check
Last Password Set
Result
Shows whether the attempt to set a password was successful. If the attempt
failed, the reason for the failure is included.
aaa authentication login
Use this command to set authentication at login. The default and optional list names that you
create with the aaa authentication logincommand are used with the login
authenticationcommand. Create a list by entering the aaa authentication login
list-name methodcommand for a particular protocol, where list-nameis any character
string used to name this list. The methodargument identifies the list of methods that the
authentication algorithm tries, in the given sequence. The additional methods of
authentication are used only if the previous method returns an error, not if it fails.
An example of a method that returns an error is if a RADIUS server is not present, and an
example of a method failing is when a RADIUS server cannot authenticate the client. If ‘local’
method is listed first, since local authentication is always available, it only has the fail
condition, not error. As such, if ‘local’ method is the first in the list, no other method will be
tried.
To ensure that the authentication succeeds even if all methods return an error, specify none
as the final method in the command line. For example if noneis specified as an
authentication method after radius, no authentication is used if the radius server is down.
Format
Mode
aaa authentication login {default | list-name} method1 [method2...]
Global Config
Default Uses the listed authentication methods that follow this argument as the default list of
methods when a user logs in.
Management Commands
671
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
list-name Character string used to name the list of authentication methods activated when a
user logs in. Up to 12 characters.
method1 [method2…] At least one from the following table:
Keyword
Description
enable
line
Uses the enable password for authentication.
Uses the line password for authentication.
Uses the local username database for authentication.
Uses no authentication.
local
none
radius
tacacs
Uses the list of all RADIUS servers for authentication.
Uses the list of all TACACS servers for authentication.
Note: The local user database is checked. This has the same effect
as the following command: aaa authentication login local
no aaa authentication login
Use this command to remove authentication at login.
Format
Mode
no aaa authentication login {default | list-name}
Global Config
aaa authentication enable
Use this command to set authentication when the user access higher privilege level, use the
aaa authentication enable defaultcommand in global configuration mode. The default
and optional list names that you create with the aaa authentication enablecommand are
used with the enable authenticationcommand.
Create a list by entering the aaa authentication enable list-name methodcommand
where list-nameis any character string used to name this list. The methodargument
identifies the list of methods that the authentication algorithm tries, in the given sequence.
The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify noneas the final method in the command line. For example, if noneis specified
as an authentication method after radius, no authentication is used if the radius server is
down. All aaa authentication enable defaultrequests sent by the switch to a RADIUS
or TACACS server include the username "$enabx$.", where xis the requested privilege level.
Format
Mode
aaa authentication enable {default | list-name} method1 [method2...]
Global Config
Management Commands
672
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Default Uses the listed authentication methods that follow this argument as the default list of
methods when a user accesses a higher privilege level.
list-name Character string used to name the list of authentication methods activated when a
user accesses a higher privilege level. Up to 12 characters.
method1 [method2…] At least one from the following table:
Keyword
Description
deny
enable
line
Use to deny access.
Uses the enable password for authentication.
Uses the line password for authentication.
Uses no authentication.
none
radius
Uses the list of all RADIUS servers for authentication. Uses username
"$enabx$."where x is the privilege level.
tacacs
Uses the list of all TACACS servers for authentication. Uses username
"$enabx$." where x is the privilege level.
Note: If the default list is not set, only the enable password is checked.
This has the same effect as the following command:
aaa authentication enable default enable
On the console, the enable password is used if it exists. If no
password is set, the process will succeed anyway. This has the
same effect as the following command:
aaa authentication enable default enable none
no aaa authentication enable
Use this command to remove the authentication method.
Format
Mode
no aaa authentication enable {default | list-name} method1
[method2...]
Global Config
aaa authentication dot1x
Use this command to set authentication for dot1x users. The method argument identifies the
list of methods that the authentication algorithm tries, in the given sequence. The additional
methods of authentication are used only if the previous method returns an error, not if there is
an authentication failure. To ensure that the authentication succeeds even if all methods
return an error, specify noneas the final method in the command line. For example if noneis
Management Commands
673
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
specified as an authentication method after radius, no authentication is used if the radius
server is down.
Format
Mode
aaa authentication dot1x default method1
Global Config
method1: At least one from the following table:
Keyword
Description
local
none
radius
ias
Uses the local username database for authentication.
Uses no authentication.
Uses the list of all RADIUS servers for authentication.
Uses the internal authentication server users database for authentication.
no aaa authentication dot1x
Use this command to remove the authentication at login.
Format
Mode
no aaa authentication dot1x default
Global Config
aaa accounting
The command creates an accounting method list. This list is identified by “default” or a
user-specified “list_name.” Accounting records, when enabled for a line-mode, can be sent at
both the beginning and at the end (start-stop), or only at the end (stop-only). If “none” is
specified, then accounting is disabled for the specified list. If “tacacs” is specified as the
Accounting method, Accounting records are notified to a TACACS+ server. If “radius” is the
specified Accounting method, Accounting records are notified to a RADIUS server.
For the same set of accounting type and list name, the administrator can change the record
type or the methods list without having to first delete the previous configuration.
Note the following:
•
A maximum of 5 Accounting Method Lists can be created for each exec and commands
type.
•
•
The same list-name can be used for both exec and commands Accounting type.
AAA Accounting for commands with RADIUS as the Accounting method is not supported.
Format
Mode
aaa accounting {exec | commands } {default | list_name} {start-stop
| stop-only |none} method1 [method2…]
Global Config
Management Commands
674
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
exec
Definition
Provides accounting for an user EXEC terminal sessions.
Provides accounting for all user-executed commands.
The default list of methods for accounting services.
Character string used to name the list of accounting methods.
commands
default
list-name
start-stop
Sends a start accounting notice at the beginning of a process and a stop
accounting notice at the end of a process.
stop-only
none
Sends a stop accounting notice at the end of the requested user process.
Disables accounting services on this line.
method
(method1/method2…)
Use either tacacs or radius server for accounting purpose.
no aaa accounting
This command deletes the accounting method list.
Format
Mode
no aaa accounting {exec | commands} {list_name default}
Global Config
accounting (Console/Telnet/SSH)
This command applies the accounting method list to a line config (console/telnet/ssh). Apply
this command in Line Config mode.
Format
Mode
accounting {exec | commands} [default | list_name]
Line Config
Term
exec
Definition
This causes accounting for an EXEC session.
This causes accounting for each command execution attempt.
commands
If a user is enabling accounting for exec mode for the current line-configuration
type, he will be logged out.
no accounting (Console/Telnet/SSH)
This command is used to remove accounting from a line config mode.
Format
Mode
no accounting { exec | commands }
Line Config
Management Commands
675
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip http/https accounting
This command applies user exec accounting list to the line methods HTTP and HTTPs
methods.
Format
ip {http| https} accounting exec {default| <listname>}
Mode
Global Config
Term
Definition
HTTP/HTTPS
Line method for which the list needs to be applied.
The default list of methods for authorization services.
Alphanumeric character string used to name the list of authorization methods.
default
list-name
no ip http/https accounting exec
This command deletes the authorization method list.
Format
Mode
no ip {http| https} accounting exec {default| <listname>}
Global Config
show accounting methods
This command displays the configured accounting method lists.
Format
Mode
show accounting methods
Privileged EXEC
Example:
(switch) #
(switch) #show accounting methods
Acct Type
Method Name
Record Type
Method Type
---------- ------------
------------ ------------
Exec
Commands
Commands
dfltExecList
dfltCmdsList
UserCmdAudit
start-stop
stop-only
start-stop
TACACS
TACACS
TACACS
Line
EXEC Method List
Command Method List
--------- -------------------- --------------------
Console none
none
none
none
none
none
Telnet
SSH
none
none
none
none
HTTPS
HTTP
Management Commands
676
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
aaa authorization
This command creates an authorization method list. This list is identified by “default” or a
user-specified “list_name.” If “tacacs” is specified as the Authorization method, Authorization
commands are notified to a TACACS+ server. If “none” is specified as the Authorization
method, command authorization is not applicable. A maximum of 5 Authorization Method
Lists can be created for “commands” type.
Note: Local method is not supported for command Authorization. Also
note that command authorization with RADIUS works if and only if
the applied authentication method is also radius.
Format
aaa authorization {commands | exec } {default | <list_name>}
method1[method2]
Mode
Global Config
Term
Definition
commands
Alphanumeric character string used to name the list of authorization methods.
The default list of methods for authorization services.
The default list of methods for authorization services.
Alphanumeric character string used to name the list of authorization methods.
TACACS+/RADIUS/Local and none are supported.
Exec
default
list-name
method
no aaa authorization
This command deletes the authorization method list.
Format
Mode
no aaa authorization {commands | exec } {default | <list_name>}
method1[method2]
Global Config
authorization(console/telnet/ssh)
To apply the command authorization method list to an access method (console/telnet/ssh).
Apply this command in the line configuration mode.
Format
Mode
authorization {commands | exec }[default |<list_name>]
• Line console
• Line telnet
• Line SSH
Management Commands
677
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no authorization(console/telnet/ssh)
This command is used to remove command authorization from a line config mode.
Format
Mode
no authorization {commands| exec}
• Line console
• Line telnet
• Line SSH
show authorization methods
This command displays the configured authorization method lists.
Format
Mode
show authorization methods
Privileged EXEC
Example:
(Switch) #show authorization methods
Command Authorization List
----------------------------
dfltCmdAuthList
Method
------------------------------
none
undefined undefined undefined
Line
Command Method List
---------
Console
Telnet
SSH
---------------------
dfltCmdAuthList
dfltCmdAuthList
dfltCmdAuthList
Exec Authorization List
----------------------------
dfltExecAuthList
Method
------------------------------
none
undefined undefined undefined
Line
Exec Method List
---------------------
dfltExecAuthList
dfltExecAuthList
dfltExecAuthList
---------
Console
Telnet
SSH
domain-name
Managed switch supports authentication based on domain name in addition to the username
and password. This command allows the switch to be configured in a domain. Users can
enable or disable domain functionality.
Following are the two cases
•
Domain enabled: In this case, when the user enters only the username, then the
managed switch sends the username as the domain-name (configured on
switch)\username to the RADIUS server. If the user enters the domain name and
Management Commands
678
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
username, then the managed switch sends the username input as the domain-name(as
entered by the user)\username to the RADIUS server.
•
Domain disabled: In this case, the domain name is not included when the user-name is
sent to the RADIUS server.
Note: If the user domain is already provided by the user/supplicant, the
domain name is assumed to reach the managed switch along with
the username in the following format:
"Domainname \username"
Format
Mode
domain-name <name>
Global Config
no domain-name
This command is used to disable the domain-name in the managed switch.
Format
Mode
no domain-name
Global Config
domain-name enable
This command enables the domain name functionality.
Format
Mode
domain-name enable
Global Config
no domain-name enable
This command disables the domain name functionality.
Format
Mode
no domain-name enable
Global Config
mac address-table multicast forbidden-unregistered vlan
Use this command to forbid forwarding unregistered multicast addresses (in other words,
unknown multicast traffic) on a given VLAN ID.
Default
Disabled
Management Commands
679
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
mac address-table multicast forbidden-unregistered vlan
<1-4093>
Global Config
no mac address-table multicast forbidden-unregistered vlan
Use this command to restore the default.
Format
no mac address-table multicast forbidden-unregistered
vlan
Mode
Global Config
mac address-table multicast forward-unregistered vlan
Use this command to enable forwarding unregistered multicast address (in other words,
unknown multicast traffic) on a given VLAN ID.
Format
mac address-table multicast forward-unregistered vlan
<1-4093>
Mode
Global Config
mac address-table multicast forward-all vlan
Use this command to enable forwarding of all multicast packets on a given VLAN ID.
Format
mac address-table multicast forward-all vlan <1-4093>
Mode
Global Config
no mac address-table multicast forward-all vlan
Use this command to restore the system default.
Format
no mac address-table multicast forward-all vlan
Mode
Global Config
set igmp report-suppression
Use this command to suppress the IGMP reports on a given VLAN ID. In order to optimize
the number of reports traversing the network with no added benefits, a Report Suppression
mechanism is implemented. When more than one client responds to an MGMD query for the
Management Commands
680
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
same Multicast Group address within the max-response-time, only the first response is
forwarded to the query and others are suppressed at the switch.
Default
Disabled
Format
Mode
set igmp report-suppression <1-4093>
VLAN Config
no set igmp report-suppression
Use this command to restore the system default.
Format
no set igmp report-suppression
Mode
VLAN Config
show mac address-table multicast filtering
Use this command to display the multicast filtering details for a given VLAN.
Format
show mac address-table multicast filtering
Mode
Privileged EXEC
Parameter
vlan-id
Description
A valid VLAN ID
The filtering mode
mode
The following shows example CLI display output for the command.
(netgear switch) #show mac address-table multicast filtering 1
VLAN-ID....... 1
Mode.......... Forward-Forbidden-Unregistered
show domain-name
This command displays the configured domain-name.
Format
Mode
show domain-name
Privileged EXEC
Example:
(switch) #
(switch) #show domain-name
Domain
Domain-name
: Enable
:abc
Management Commands
681
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
aaa ias-user username
The Internal Authentication Server (IAS) database is a dedicated internal database used for
local authentication of users for network access through the IEEE 802.1X feature. Use this
command to add the specified user to the internal user database. This command also
changes the mode to AAA User Config mode.
Format
Mode
aaa ias-username <user>
Global Config
no aaa ias-user username
Use this command to remove an ias user.
Format
Mode
no aaa ias-username <user>
Global Config
aaa session-id
This global aaa command specifies whether the same session-id is used for Authentication,
Authorization, and Accounting service type within a session.
Default
Format
Mode
common
aaa session-id [common | unique]
Global Config
Parameter
common
Definition
Use the same session-id for all AAA Service types.
Use a unique session-id for AAA Service types.
unique
no aaa session-id
This command resets the aaa session-idbehavior to default.
Format
Mode
no aaa session-id [unique]
Global Config
password (AAA IAS User Configuration)
Use this command to specify a password for a user in the IAS database.
Format
Mode
password <password> [encrypted]
AAA IAS User Config
Management Commands
682
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
password
Definition
Password for this level. Range: 8-64 characters.
encrypted
Encrypted password to be entered, copied from another switch configuration.
no password(AAA IAS User Configuration)
Use this command to remove a password for a user in the IAS database.
Format
Mode
no password
AAA IAS User Config
clear aaa ias-users
Use this command to remove all users from the IAS database.
Format
Mode
clear aaa ias-users
Privileged EXEC
show aaa ias-users
Use this command to display configured IAS users and their attributes. Passwords
configured are not shown in the show command output.
Format
Mode
show aaa ias-users
Privileged EXEC
SNMP Commands
This section describes the commands you use to configure Simple Network Management
Protocol (SNMP) on the switch. You can configure the switch to act as an SNMP agent so
that it can communicate with SNMP managers on your network.
snmp-server
Use this command to set the name and the physical location of the switch and the
organization responsible for the network. The range for <name>, <loc>and <con>is from 1
to 31 alphanumeric characters.
Default
none
Format
Mode
snmp-server {sysname <name> | location <loc> | contact <con>}
Global Config
Management Commands
683
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
snmp-server community
Use this command to add (and name) a new SNMP community. A community <name>is a
name associated with the switch and with a set of SNMP managers that manage it with a
specified privileged level. The length of <name>can be up to 16 case-sensitive characters.
Note: Community names in the SNMP Community Table must be unique.
When making multiple entries using the same community name, the
first entry is kept and processed and all duplicate entries are
ignored.
Default
• Public and private, which you can rename.
• Default values for the remaining four community names are blank.
Format
Mode
snmp-server community <name>
Global Config
no snmp-server community
Use this command to remove this community name from the table. The <name>is the
community name to be deleted.
Format
Mode
no snmp-server community <name>
Global Config
snmp-server community ipaddr
Use this command to set a client IP address for an SNMP community. The address is the
associated community SNMP packet sending address and is used along with the client IP
mask value to denote a range of IP addresses from which SNMP clients may use that
community to access the device. A value of 0.0.0.0 allows access from any IP address.
Otherwise, this value is ANDed with the mask to determine the range of allowed client IP
addresses. The name is the applicable community name.
Default
0.0.0.0
Format
Mode
snmp-server community ipaddr <ipaddr> <name>
Global Config
Management Commands
684
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no snmp-server community ipaddr
Use this command to set a client IP address for an SNMP community to 0.0.0.0. The name is
the applicable community name.
Format
Mode
no snmp-server community ipaddr <name>
Global Config
snmp-server community ipmask
Use this command to set a client IP mask for an SNMP community. The address is the
associated community SNMP packet sending address and is used along with the client IP
address value to denote a range of IP addresses from which SNMP clients may use that
community to access the device. A value of 255.255.255.255 will allow access from only one
station, and will use that machine's IP address for the client IP address. A value of 0.0.0.0 will
allow access from any IP address. The name is the applicable community name.
Default
0.0.0.0
Format
Mode
snmp-server community ipmask <ipmask> <name>
Global Config
no snmp-server community ipmask
Use this command to set a client IP mask for an SNMP community to 0.0.0.0. The name is
the applicable community name. The community name may be up to 16 alphanumeric
characters.
Format
Mode
no snmp-server community ipmask <name>
Global Config
snmp-server community mode
Use this command to activate an SNMP community. If a community is enabled, an SNMP
manager associated with this community manages the switch according to its access right. If
the community is disabled, no SNMP requests using this community are accepted. In this
case the SNMP manager associated with this community cannot manage the switch until the
Status is changed back to Enable.
Default
• private and public communities - enabled
• other four - disabled
Format
Mode
snmp-server community mode <name>
Global Config
Management Commands
685
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no snmp-server community mode
Use this command to deactivate an SNMP community. If the community is disabled, no
SNMP requests using this community are accepted. In this case the SNMP manager
associated with this community cannot manage the switch until the Status is changed back to
Enable.
Format
Mode
no snmp-server community mode <name>
Global Config
snmp-server community ro
Use this command to restrict access to switch information. The access mode is read-only
(also called public).
Format
Mode
snmp-server community ro <name>
Global Config
snmp-server community rw
Use this command to restrict access to switch information. The access mode is read/write
(also called private).
Format
Mode
snmp-server community rw <name>
Global Config
snmp-server enable traps violation
Use this command to enable sending new violation traps designating when a packet with a
disallowed MAC address is received on a locked port.
Default
disabled
Format
Mode
snmp-server enable traps violation
Interface Config
Management Commands
686
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no snmp-server enable traps violation
Use this command to disable sending new violation traps.
Format
Mode
no snmp-server enable traps violation
Interface Config
snmp-server enable traps
Use this command to enable the Authentication Flag.
Default
enabled
Format
Mode
snmp-server enable traps
Global Config
no snmp-server enable traps
Use this command to disable the Authentication Flag.
Format
Mode
no snmp-server enable traps
Global Config
Note: This command may not be available on all platforms.
snmp-server enable traps linkmode
Use this command to enable Link Up/Down traps for the entire switch. When enabled, link
traps are sent only if the Link Trap flag setting associated with the port is enabled. For more
Default
enabled
Format
Mode
snmp-server enable traps linkmode
Global Config
no snmp-server enable traps linkmode
Use this command to disable Link Up/Down traps for the entire switch.
Format
Mode
no snmp-server enable traps linkmode
Global Config
Management Commands
687
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
snmp-server enable traps multiusers
Use this command to enable Multiple User traps. When the traps are enabled, a Multiple
User Trap is sent when a user logs in to the terminal interface (EIA 232 or Telnet) and there is
an existing terminal interface session.
Default
enabled
Format
Mode
snmp-server enable traps multiusers
Global Config
no snmp-server enable traps multiusers
Use this command to disable Multiple User traps.
Format
Mode
no snmp-server enable traps multiusers
Global Config
snmp-server enable traps stpmode
Use this command to enable sending new root traps and topology change notification traps.
Default
enabled
Format
Mode
snmp-server enable traps stpmode
Global Config
no snmp-server enable traps stpmode
Use this command to disable sending new root traps and topology change notification traps.
Format
Mode
no snmp-server enable traps stpmode
Global Config
snmptrap
Use this command to add an SNMP trap receiver. The maximum length of <name>is 16
case-sensitive alphanumeric characters. The <snmpversion>is the version of SNMP. The
version parameter options are snmpv1 or snmpv2. The SNMP trap address can be set using
both an IPv4 address format as well as an IPv6 global address format.
The following shows an example of the CLI command.
(Netgear Switch)# snmptrap mytrap ip6addr 3099::2
Management Commands
688
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: The <name> parameter does not need to be unique, however; the
<name> and <ipaddr | hostname> pair must be unique. Multiple
entries can exist with the same <name>, as long as they are
associated with a different <ipaddr | hostname>. The reverse
scenario is also acceptable. The <name> is the community name
used when sending the trap to the receiver, but the <name> is not
directly associated with the SNMP Community Table, See
“snmp-server community” on page39.”
Default
Format
snmpv2
snmptrap <name> {ipaddr <ipaddr|hostname> | ip6addr <ip6addr|
hostname>} [snmpversion <snmpversion>]
Mode
Global Config
no snmptrap
Use this command to delete trap receivers for a community.
Format
Mode
no snmptrap <name> {ipaddr <ipaddr|hostname> | ip6addr <ip6addr|
hostname>}
Global Config
snmptrap snmpversion
Use this command to modify the SNMP version of a trap. The maximum length of <name>is
16 case-sensitive alphanumeric characters. The <snmpversion>parameter options are
snmpv1 or snmpv2.
Note: This command does not support a “no” form.
Default
snmpv2
Format
Mode
snmptrap snmpversion <name> {<ipaddr | hostname> |<ip6addr|hostname>}
{snmpv1|snmpv2}
Global Config
Management Commands
689
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
snmptrap ipaddr
Use this command to assign an IP address to a specified community name. The maximum
length of name is 16 case-sensitive alphanumeric characters.
Note: IP addresses in the SNMP trap receiver table must be unique. If you
make multiple entries using the same IP address, the first entry is
retained and processed. All duplicate entries are ignored.
Format
Mode
snmptrap ipaddr <name> <ipaddrold> <ipaddrnew | hostnamenew>
Global Config
snmptrap mode
Use this command to activate or deactivate an SNMP trap. Enabled trap receivers are active
(able to receive traps). Disabled trap receivers are inactive (not able to receive traps).
Format
Mode
snmptrap mode <name> { <ipaddr | hostname> |<ip6addr |hostname>}
Global Config
no snmptrap mode
Use this command to deactivate an SNMP trap. Disabled trap receivers are unable to receive
traps.
Format
Mode
no snmptrap mode <name> { <ipaddr | hostname> |<ip6addr |hostname>}
Global Config
snmp trap link-status
Use this command to enable link status traps by interface.
Note: This command is valid only when the Link Up/Down Flag is enabled.
Format
Mode
snmp trap link-status
Interface Config
Management Commands
690
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no snmp trap link-status
Use this command to disable link status traps by interface.
Note: This command is valid only when the Link Up/Down Flag is enabled.
Format
Mode
no snmp trap link-status
Interface Config
snmp trap link-status all
Use this command to enable link status traps for all interfaces.
Note: This command is valid only when the Link Up/Down Flag is enabled.
Format
Mode
snmp trap link-status all
Global Config
no snmp trap link-status all
Use this command to disable link status traps for all interfaces.
Note: This command is valid only when the Link Up/Down Flag is enabled.
Format
Mode
no snmp trap link-status all
Global Config
show snmpcommunity
Use this command to display SNMP community information. Six communities are supported.
You can add, change, or delete communities. The switch does not have to be reset for
changes to take effect.
Management Commands
691
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The SNMP agent of the switch complies with SNMP Versions 1, 2 or 3. For more information
about the SNMP specification, see the SNMP RFCs. The SNMP agent sends traps through
TCP/IP to an external SNMP manager based on the SNMP configuration (the trap receiver
and other SNMP community parameters).
Format
show snmpcommunity
Mode
Privileged EXEC
Term
Definition
SNMP
Community
Name
The community string to which this entry grants access. A valid entry is a case-sensitive
alphanumeric string of up to 16 characters. Each row of this table must contain a unique
community name.
Client IP
Address
An IP address (or portion thereof) from which this device will accept SNMP packets with
the associated community. The requesting entity's IP address is ANDed with the Subnet
Mask before being compared to the IP address. Note: If the Subnet Mask is set to
0.0.0.0, an IP address of 0.0.0.0 matches all IP addresses. The default value is 0.0.0.0.
Client IP Mask
A mask to be ANDed with the requesting entity's IP address before comparison with IP
address. If the result matches with IP address then the address is an authenticated IP
address. For example, if the IP address = 9.47.128.0 and the corresponding Subnet
Mask = 255.255.255.0 a range of incoming IP addresses would match, i.e. the incoming
IP address could equal 9.47.128.0 - 9.47.128.255. The default value is 0.0.0.0.
Access Mode
Status
The access level for this community string.
The status of this community access entry.
show snmptrap
Use this command to display SNMP trap receivers. Trap messages are sent across a
network to an SNMP Network Manager. These messages alert the manager to events
occurring within the switch or on the network. Six trap receivers are simultaneously
supported.
Format
Mode
show snmptrap
Privileged EXEC
Term
Definition
SNMP Trap
Name
The community string of the SNMP trap packet sent to the trap manager. The string is
case sensitive and can be up to 16 alphanumeric characters.
IP Address
IPv6 Address
SNMP Version
Status
The IPv4 address to receive SNMP traps from this device.
The IPv6 address to receive SNMP traps from this device.
SNMPv2
The receiver's status (enabled or disabled).
The following shows an example of the CLI command.
Management Commands
692
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
(Netgear Switch)#show snmptrap
Community Name IpAddress
IPv6 Address
2001::1
Snmp Version
SNMPv2
Mode
Mytrap
0.0.0.0
Enable show trapflags
show trapflags
Use this command to display trap conditions. The command’s display shows all the enabled
OSPFv2 and OSPFv3 trapflags. Configure which traps the switch should generate by
enabling or disabling the trap condition. If a trap condition is enabled and the condition is
detected, the SNMP agent on the switch sends the trap to all enabled trap receivers. You do
not have to reset the switch to implement the changes. Cold and warm start traps are always
generated and cannot be disabled.
Format
show trapflags
Mode
Privileged EXEC
Term
Definition
Authentication
Flag
Can be enabled or disabled. The factory default is enabled. Indicates whether
authentication failure traps will be sent.
Link Up/Down
Flag
Can be enabled or disabled. The factory default is enabled. Indicates whether link status
traps will be sent.
Multiple Users
Flag
Can be enabled or disabled. The factory default is enabled. Indicates whether a trap will
be sent when the same user ID is logged into the switch more than once at the same
time (either through Telnet or the serial port).
Spanning Tree
Flag
Can be enabled or disabled. The factory default is enabled. Indicates whether spanning
tree traps are sent.
ACL Traps
May be enabled or disabled. The factory default is disabled. Indicates whether ACL traps
are sent.
DVMRP Traps
OSPFv2 Traps
Can be enabled or disabled. The factory default is disabled. Indicates whether DVMRP
traps are sent.
Can be enabled or disabled. The factory default is disabled. Indicates whether OSPF
traps are sent. If any of the OSPF trap flags are not enabled, then the command displays
disabled. Otherwise, the command shows all the enabled OSPF traps’ information.
OSPFv3 Traps
PIM Traps
Can be enabled or disabled. The factory default is disabled. Indicates whether OSPF
traps are sent. If any of the OSPFv3 trap flags are not enabled, then the command
displays disabled. Otherwise, the command shows all the enabled OSPFv3 traps’
information.
Can be enabled or disabled. The factory default is disabled. Indicates whether PIM traps
are sent.
Management Commands
693
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
RADIUS Commands
This section describes the commands you use to configure the switch to use a Remote
Authentication Dial-In User Service (RADIUS) server on your network for authentication and
accounting.
authorization network radius
Use this command to enable the switch to accept VLAN assignment by the radius server.
Default
disable
Format
Mode
authorization network radius
Global Config
no authorization network radius
Use this command to disable the switch to accept VLAN assignment by the radius server.
Format
Mode
no authorization network radius
Global Config
radius accounting mode
Use this command to enable the RADIUS accounting function.
Default
disabled
Format
Mode
radius accounting mode
Global Config
no radius accounting mode
Use this command to set the RADIUS accounting function to the default value (disabled).
Format
Mode
no radius accounting mode
Global Config
radius server attribute
Use this command to specify the RADIUS client to use the NAS-IP Address attribute in the
RADIUS requests. If the specific IP address is configured while enabling this attribute, the
Management Commands
694
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
RADIUS client uses that IP address while sending NAS-IP-Address attribute in RADIUS
communication.
Format
radius server attribute <4> [<ipaddr>]
Mode
Global Config
Term
4
Definition
NAS-IP-Address attribute to be used in RADIUS requests.
The IP address of the server.
ipaddr
no radius server attribute
Use the noversion of this command to disable the NAS-IP-Address attribute global
parameter for RADIUS client. When this parameter is disabled, the RADIUS client does not
send the NAS-IP-Address attribute in RADIUS requests.
Format
Mode
no radius server attribute <4> [<ipaddr>]
Global Config
The following shows an example of the command.
(Switch) (Config) #radius server attribute 4 192.168.37.60
(Switch) (Config) #radius server attribute 4
radius server host
Use this command to configure the IP address or DNS name to use for communicating with
the RADIUS server of a selected server type. While configuring the IP address or DNS name
for the authenticating or accounting servers, you can also configure the port number and
server name. If the authenticating and accounting servers are configured without a name, the
command uses the ‘Default_RADIUS_Auth_Server’ and ‘Default_RADIUS_Acct_Server’ as
the default names, respectively. The same name can be configured for more than one
authenticating servers and the name should be unique for accounting servers. The RADIUS
client allows the configuration of a maximum 32 authenticating and accounting servers.
If you use the <auth>parameter, the command configures the IP address or hostname to
use to connect to a RADIUS authentication server. You can configure up to 3 servers per
RADIUS client. If the maximum number of configured servers is reached, the command fails
until you remove one of the servers by issuing the “no” form of the command. If you use the
optional <port>parameter, the command configures the UDP port number to use when
connecting to the configured RADIUS server. The <port>number range is 1 - 65535, with
1812 being the default value.
Management Commands
695
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Note: To re-configure a RADIUS authentication server to use the default
UDP <port>, set the <port> parameter to 1812.
If you use the <acct>token, the command configures the IP address or hostname to use for
the RADIUS accounting server. You can only configure one accounting server. If an
accounting server is currently configured, use the “no” form of the command to remove it from
the configuration. The IP address or hostname you specify must match that of a previously
configured accounting server. If you use the optional <port>parameter, the command
configures the UDP port to use when connecting to the RADIUS accounting server. If a
<port>is already configured for the accounting server, the new <port>replaces the
previously configured <port>. The <port>must be a value in the range 0 - 65535, with
1813 being the default.
Note: To re-configure a RADIUS accounting server to use the default UDP
<port>, set the <port> parameter to 1813.
Format
radius server host{auth | acct} {<ipaddr|dnsname>} [name
<servername>] [port <0-65535>][server-type]
Mode
Global Config
Field
Description
ipaddr
The IP address of the server.
dnsname
0-65535
The DNS name of the server.
The port number to use to connect to the specified RADIUS server.
The alias name to identify the server.
servername
no radius server host
Use the noversion of this command to delete the configured server entry from the list of
configured RADIUS servers. If the RADIUS authenticating server being removed is the active
server in the servers that are identified by the same server name, then the RADIUS client
selects another server for making RADIUS transactions. If the 'auth' token is used, the
previously configured RADIUS authentication server is removed from the configuration.
Similarly, if the 'acct' token is used, the previously configured RADIUS accounting server is
removed from the configuration. The <ipaddr|dnsname>parameter must match the IP
Management Commands
696
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
address or dns name of the previously configured RADIUS authentication / accounting
server.
Format
Mode
no radius server host {auth | acct} {<ipaddr|dnsname>}
Global Config
The following shows an example of the command.
(Switch) (Config) #radius server host acct 192.168.37.60
(Switch) (Config) #radius server host acct 192.168.37.60 port 1813
(Switch) (Config) #radius server host auth 192.168.37.60 name
Network1_RADIUS_Auth_Server port 1813
(Switch) (Config) #radius server host acct 192.168.37.60 name
Network2_RADIUS_Auth_Server
(Switch) (Config) #no radius server host acct 192.168.37.60
radius server key
Use this command to configure the key to be used in RADIUS client communication with the
specified server. Depending on whether the 'auth' or 'acct' token is used, the shared secret is
configured for the RADIUS authentication or RADIUS accounting server. The IP address or
hostname provided must match a previously configured server. When this command is
executed, the secret is prompted.
Text-based configuration supports Radius server’s secrets in encrypted and non-encrypted
format. When you save the configuration, these secret keys are stored in encrypted format
only. If you want to enter the key in encrypted format, enter the key along with the encrypted
keyword. In the show running config command’s display, these secret keys are displayed in
encrypted format. You cannot show these keys in plain text format.
Note: The secret must be an alphanumeric value not exceeding 16
characters.
Format
Mode
radius server key {auth | acct} {<ipaddr|dnsname>} encrypted
<password>
Global Config
Field
Description
ipaddr
The IP address of the server.
The DNS name of the server.
The password in encrypted format.
dnsname
password
Management Commands
697
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
The following shows an example of the CLI command.
radius server key acct 10.240.4.10 encrypted <encrypt-string>
radius server msgauth
Use this command to enable the message authenticator attribute to be used for the specified
RADIUS Authenticating server.
Format
Mode
radius server msgauth <ipaddr|dnsname>
Global Config
Field
Description
ip addr
The IP address of the server.
The DNS name of the server.
dnsname
no radius server msgauth
Use the noversion of this command to disable the message authenticator attribute to be
used for the specified RADIUS Authenticating server.
Format
Mode
no radius server msgauth <ipaddr|dnsname>
Global Config
radius server primary
Use this command to designate a configured server as the primary server in the group of
servers that have the same server name. Multiple primary servers can be configured for each
number of servers that have the same name. When the RADIUS client has to perform
transactions with an authenticating RADIUS server of specified name, the client uses the
primary server that has the specified server name by default. If the RADIUS client fails to
communicate with the primary server for any reason, the client uses the backup servers
configured with the same server name. These backup servers are identified as the
‘Secondary’ type.
Format
Mode
radius server primary {<ipaddr|dnsname>}
Global Config
Field
Description
ip addr
The IP address of the RADIUS Authenticating server.
The DNS name of the server.
dnsname
Management Commands
698
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
radius server retransmit
Use this command to configure the global parameter for the RADIUS client that specifies the
number of transmissions of the messages to be made before attempting the fall back server
upon unsuccessful communication with the current RADIUS authenticating server. When the
maximum number of retries are exhausted for the RADIUS accounting server and no
response is received, the client does not communicate with any other server.
Default
4
Format
Mode
radius server retransmit <retries>
Global Config
Field
Description
retries
The maximum number of transmission attempts in the range of 1 to 15.
no radius server retransmit
Use this command to set the value of this global parameter to the default value.
Format
Mode
no radius server retransmit
Global Config
radius server timeout
Use this command to configure the global parameter for the RADIUS client that specifies the
timeout value (in seconds) after which a request must be retransmitted to the RADIUS server
if no response is received. The timeout value is an integer in the range of 1 to 30.
Default
5
Format
Mode
radius server timeout <seconds>
Global Config
Field
Description
retries
Maximum number of transmission attempts in the range <1-30>.
no radius server timeout
Use this command to set the timeout global parameter to the default value.
Format
Mode
no radius server timeout
Global Config
Management Commands
699
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show radius
Use this command to display the values configured for the global parameters of the RADIUS
client.
Format
show radius
Mode
Privileged EXEC
Term
Definition
Number of Configured
Authentication Servers
The number of RADIUS Authentication servers that have been configured.
Number of Configured
Accounting Servers
The number of RADIUS Accounting servers that have been configured.
The number of configured named RADIUS server groups.
Number of Named
Authentication Server
Groups
Number of Named
Accounting Server
Groups
The number of configured named RADIUS server groups.
Number of Retransmits
The configured value of the maximum number of times a request packet is
retransmitted.
Time Duration
The configured timeout value, in seconds, for request re-transmissions.
RADIUS Accounting
Mode
A global parameter to indicate whether the accounting mode for all the servers
is enabled or not.
RADIUS Attribute 4 Mode
RADIUS Attribute 4 Value
A global parameter to indicate whether the NAS-IP-Address attribute has been
enabled to use in RADIUS requests.
A global parameter that specifies the IP address to be used in the
NAS-IP-Address attribute to be used in RADIUS requests.
The following shows example CLI display output for the command.
(Switch)#show radius
Number of Configured Authentication Servers............. 32
Number of Configured Accounting Servers................. 32
Number of Named Authentication Server Groups............ 15
Number of Named Accounting Server Groups................ 3
Number of Retransmits................................... 4
Time Duration........................................... 10
RADIUS Accounting Mode.................................. Disable
RADIUS Attribute 4 Mode................................. Enable
RADIUS Attribute 4 Value ............................... 192.168.37.60
Management Commands
700
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show radius servers
Use this command to display the summary and details of RADIUS authenticating servers
configured for the RADIUS client.
Format
show radius servers [ { <ipaddr | dnsname> | name [<servername> ] } ]
Mode
Privileged EXEC
Field
Description
ipaddr
The IP address of the authenticating server.
The DNS name of the authenticating server.
The alias name to identify the server.
dnsname
servername
Current
The ‘*’ symbol preceeding the server host address specifies that the server is
currently active.
Host Address
Server Name
Port
The IP address of the host.
The name of the authenticating server.
The port used for communication with the authenticating server.
Specifies whether this server is a primary or secondary type.
Type
Current Host Address
Secret Configured
The IP address of the currently active authenticating server.
Yes or No Boolean value that indicates whether this server is configured with a
secret.
Number of
Retransmits
The configured value of the maximum number of times a request packet is
retransmitted.
Message
Authenticator
A global parameter to indicate whether the Message Authenticator attribute is
enabled or disabled.
Time Duration
The configured timeout value, in seconds, for request retransmissions.
RADIUS Accounting
Mode
A global parameter to indicate whether the accounting mode for all the servers is
enabled or not.
RADIUS Attribute 4
Mode
A global parameter to indicate whether the NAS-IP-Address attribute has been
enabled to use in RADIUS requests.
RADIUS Attribute 4
Value
A global parameter that specifies the IP address to be used in NAS-IP-Address
attribute used in RADIUS requests.
The following shows example CLI display output for the command.
(Switch) #show radius servers
Cur Host Address
rent
Server Name
Port Type
---- ------------------------ --------------------------------- ----- ----------
* 192.168.37.200
Network1_RADIUS_Server
1813 Primary
Management Commands
701
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
192.168.37.201
192.168.37.202
192.168.37.203
Network2_RADIUS_Server
Network3_RADIUS_Server
Network4_RADIUS_Server
1813 Secondary
1813 Primary
1813 Secondary
(Switch) #show radius servers name
Current Host Address
Server Name
Type
-------------------------------------------------------------------192.168.37.200
Network1_RADIUS_Server
192.168.37.201
192.168.37.202
Secondary
Network2_RADIUS_Server
Network3_RADIUS_Server
Network4_RADIUS_Server
Primary
Secondary
Primary
192.168.37.203
(Switch) #show radius servers name Default_RADIUS_Server
Server Name............................ Default_RADIUS_Server
Host Address........................... 192.168.37.58
Secret Configured...................... No
Message Authenticator ................. Enable
Number of Retransmits.................. 4
Time Duration.......................... 10
RADIUS Accounting Mode................. Disable
RADIUS Attribute 4 Mode................ Enable
RADIUS Attribute 4 Value .............. 192.168.37.60
(Switch) #show radius servers 192.168.37.58
Server Name............................ Default_RADIUS_Server
Host Address........................... 192.168.37.58
Secret Configured...................... No
Message Authenticator ................. Enable
Number of Retransmits.................. 4
Time Duration.......................... 10
RADIUS Accounting Mode................. Disable
RADIUS Attribute 4 Mode................ Enable
RADIUS Attribute 4 Value .............. 192.168.37.60
show radius accounting
Use this command to display a summary of configured RADIUS accounting servers.
Format
Mode
show radius accounting name [<servername>]
Privileged EXEC
Field
Description
servername
An alias name to identify the server.
RADIUS Accounting
Mode
A global parameter to indicate whether the accounting mode for all the servers is
enabled or not.
If you do not specify any parameters, then only the accounting mode and the RADIUS
accounting server details are displayed.
Management Commands
702
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Host Address
The IP address of the host.
Server Name
Port
The name of the accounting server.
The port used for communication with the accounting server.
Secret Configured
Yes or No Boolean value indicating whether this server is configured with a
secret.
The following shows example CLI display output for the command.
(Switch) #show radius accounting name
Host Address
Server Name
Port
Secret
Configured
----------------------- --------------------------------- -------- -----------
192.168.37.200
192.168.37.201
192.168.37.202
192.168.37.203
Network1_RADIUS_Server
Network2_RADIUS_Server
Network3_RADIUS_Server
Network4_RADIUS_Server
1813
1813
1813
1813
Yes
No
Yes
No
(Switch) #show radius accounting name Default_RADIUS_Server
Server Name............................ Default_RADIUS_Server
Host Address........................... 192.168.37.200
RADIUS Accounting Mode................. Disable
Port .................................. 1813
Secret Configured ..................... Yes
show radius accounting statistics
Use this command to display a summary of statistics for the configured RADIUS accounting
servers.
Format
show radius accounting statistics {<ipaddr|dnsname> | name
<servername>}
Mode
Privileged EXEC
Term
Definition
ipaddr
The IP address of the server.
The DNS name of the server.
The alias name to identify the server.
The name of the accounting server.
dnsname
servername
RADIUS
Accounting Server
Name
Management Commands
703
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Server Host
Address
The IP address of the host.
Round Trip Time
The time interval, in hundredths of a second, between the most recent
Accounting-Response and the Accounting-Request that matched it from this
RADIUS accounting server.
Requests
The number of RADIUS Accounting-Request packets sent to this server. This
number does not include retransmissions.
Retransmission
Responses
The number of RADIUS Accounting-Request packets retransmitted to this RADIUS
accounting server.
The number of RADIUS packets received on the accounting port from this server.
Malformed
Responses
The number of malformed RADIUS Accounting-Response packets received from this
server. Malformed packets include packets with an invalid length. Bad authenticators
or signature attributes or unknown types are not included as malformed accounting
responses.
Bad Authenticators
Pending Requests
The number of RADIUS Accounting-Response packets containing invalid
authenticators received from this accounting server.
The number of RADIUS Accounting-Request packets sent to this server that have
not yet timed out or received a response.
Timeouts
The number of accounting timeouts to this server.
Unknown Types
The number of RADIUS packets of unknown types, which were received from this
server on the accounting port.
Packets Dropped
The number of RADIUS packets received from this server on the accounting port and
dropped for some other reason.
The following shows example CLI display output for the command.
(Switch) #show radius accounting statistics 192.168.37.200
RADIUS Accounting Server Name................. Default_RADIUS_Server
Host Address.................................. 192.168.37.200
Round Trip Time............................... 0.00
Requests...................................... 0
Retransmissions............................... 0
Responses..................................... 0
Malformed Responses........................... 0
Bad Authenticators............................ 0
Pending Requests.............................. 0
Timeouts...................................... 0
Unknown Types................................. 0
Packets Dropped............................... 0
(Switch) #show radius accounting statistics name Default_RADIUS_Server
RADIUS Accounting Server Name................. Default_RADIUS_Server
Host Address.................................. 192.168.37.200
Round Trip Time............................... 0.00
Management Commands
704
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Requests...................................... 0
Retransmissions............................... 0
Responses..................................... 0
Malformed Responses........................... 0
Bad Authenticators............................ 0
Pending Requests.............................. 0
Timeouts...................................... 0
Unknown Types................................. 0
Packets Dropped............................... 0
show radius statistics
Use this command to display the summary statistics of configured RADIUS Authenticating
servers.
Format
Mode
show radius statistics {<ipaddr|dnsname> | name <servername>}
Privileged EXEC
Term
Definition
ipaddr
The IP address of the server.
The DNS name of the server.
The alias name to identify the server.
dnsname
servername
RADIUS Server Name
Server Host Address
Access Requests
The name of the authenticating server.
The IP address of the host.
The number of RADIUS Access-Request packets sent to this server. This number
does not include retransmissions.
Access
Retransmissions
The number of RADIUS Access-Request packets retransmitted to this RADIUS
authentication server.
Access Accepts
Access Rejects
Access Challenges
The number of RADIUS Access-Accept packets, including both valid and invalid
packets, that were received from this server.
The number of RADIUS Access-Reject packets, including both valid and invalid
packets, that were received from this server.
The number of RADIUS Access-Challenge packets, including both valid and
invalid packets, that were received from this server.
Malformed Access
Responses
The number of malformed RADIUS Access-Response packets received from this
server. Malformed packets include packets with an invalid length. Bad
authenticators or signature attributes or unknown types are not included as
malformed access responses.
Bad Authenticators
Pending Requests
The number of RADIUS Access-Response packets containing invalid
authenticators or signature attributes received from this server.
The number of RADIUS Access-Request packets destined for this server that have
not yet timed out or received a response.
Management Commands
705
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Timeouts
The number of authentication timeouts to this server.
Unknown Types
The number of packets of unknown type that were received from this server on the
authentication port.
Packets Dropped
The number of RADIUS packets received from this server on the authentication
port and dropped for some other reason.
The following shows example CLI display output for the command.
(Switch) #show radius statistics 192.168.37.200
RADIUS Server Name............................ Default_RADIUS_Server
Server Host Address........................... 192.168.37.200
Access Requests............................... 0.00
Access Retransmissions........................ 0
Access Accepts................................ 0
Access Rejects................................ 0
Access Challenges............................. 0
Malformed Access Responses.................... 0
Bad Authenticators............................ 0
Pending Requests.............................. 0
Timeouts...................................... 0
Unknown Types................................. 0
Packets Dropped............................... 0
(Switch) #show radius statistics name Default_RADIUS_Server
RADIUS Server Name............................ Default_RADIUS_Server
Server Host Address........................... 192.168.37.200
Access Requests............................... 0.00
Access Retransmissions........................ 0
Access Accepts................................ 0
Access Rejects................................ 0
Access Challenges............................. 0
Malformed Access Responses.................... 0
Bad Authenticators............................ 0
Pending Requests.............................. 0
Timeouts...................................... 0
Unknown Types................................. 0
Packets Dropped............................... 0
TACACS+ Commands
TACACS+ provides access control for networked devices via one or more centralized
servers. Similar to RADIUS, this protocol simplifies authentication by making use of a single
database that can be shared by many clients on a large network. TACACS+ is based on the
TACACS protocol (described in RFC1492) but additionally provides for separate
authentication, authorization, and accounting services. The original protocol was UDP based
with messages passed in clear text over the network; TACACS+ uses TCP to ensure reliable
Management Commands
706
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
delivery and a shared key configured on the client and daemon server to encrypt all
messages.
debug tacacs packet
Use the debug tacacs packetcommand to turn on TACACS+ packet debug.
Default
Disabled
Format
Mode
debug tacacs packet [receive | transmit]
Global Config
no debug tacacs packet
Use this command to turn off TACACS+ packet debug.
Format
Mode
no debug tacacs packet
Global Config
tacacs-server host
Use the tacacs-server hostcommand in Global Configuration mode to configure a
TACACS+ server. This command enters into the TACACS+ configuration mode. The
<ip-address|hostname>parameter is the IP address or hostname of the TACACS+
server. To specify multiple hosts, multiple tacacs-server hostcommands can be used.
Format
Mode
tacacs-server host <ip-address|hostname>
Global Config
no tacacs-server host
Use the no tacacs-server hostcommand to delete the specified hostname or IP
address. The <ip-address|hostname>parameter is the IP address of the TACACS+
server.
Format
Mode
no tacacs-server host <ip-address|hostname>
Global Config
tacacs-server key
Use the tacacs-server keycommand to set the authentication and encryption key for all
TACACS+ communications between the switch and the TACACS+ daemon. The
<key-string>parameter has a range of 0 - 128 characters and specifies the
authentication and encryption key for all TACACS communications between the switch and
the TACACS+ server. This key must match the key used on the TACACS+ daemon.
Text-based configuration supports TACACS server’s secrets in encrypted and non-encrypted
format. When you save the configuration, these secret keys are stored in encrypted format
Management Commands
707
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
only. If you want to enter the key in encrypted format, enter the key along with the encrypted
keyword. In the show running config command’s display, these secret keys are displayed in
encrypted format. You cannot show these keys in plain text format.
Format
Mode
tacacs-server key[<key-string> | encrypted <key-string>]
Global Config
no tacacs-server key
Use the no tacacs-server keycommand to disable the authentication and encryption
key for all TACACS+ communications between the switch and the TACACS+ daemon. The
<key-string>parameter has a range of 0 - 128 characters This key must match the key
used on the TACACS+ daemon.
Format
Mode
no tacacs-server key<key-string>
Global Config
tacacs-server keystring
Use this command to set the global authentication encryption key used for all TACACS+
communications between the TACACS+ server and the client.
Format
tacacs-server keystring
Mode
Global Config
tacacs-server source interface
Use this command in Global Configuration mode to configure the global source interface
(Source IP selection) for all TACACS+ communications between the TACACS+ client and the
server.
Format
tacacs-server source-interface {<unit/slot/port> | loopback
<loopback-id> | VLAN <vlan-id>}
Mode
Global Config
Parameter
unit/slot/port
loopback-id
vlan-id
Description
The unit identifier assigned to the switch.
The loopback interface. The range of the loopback ID is 0 to 7.
The vlan id. The rang of the vlan ID is 1 to 4093.
Management Commands
708
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no tacacs-server source interface
Use this command in Global Configuration mode to remove the global source interface
(Source IP selection) for all TACACS+ communications between the TACACS+ client and the
server.
Format
Mode
no tacacs-server source-interface
Privileged Exec
tacacs-server timeout
Use the tacacs-server timeoutcommand to set the timeout value for communication
with the TACACS+ servers. The <timeout>parameter has a range of 1-30 and is the
timeout value in seconds.
Default
5
Format
Mode
tacacs-server timeout <timeout>
Global Config
no tacacs-server timeout
Use the no tacacs-server timeoutcommand to restore the default timeout value for all
TACACS servers.
Format
Mode
no tacacs-server timeout
Global Config
key
Use the keycommand in TACACS Configuration mode to specify the authentication and
encryption key for all TACACS communications between the device and the TACACS server.
This key must match the key used on the TACACS daemon. The <key-string>parameter
specifies the key name. For an empty string use “ ”. (Range: 0 - 128 characters).
Text-based configuration supports TACACS server’s secrets in encrypted and non-encrypted
format. When you save the configuration, these secret keys are stored in encrypted format
only. If you want to enter the key in encrypted format, enter the key along with the encrypted
keyword. In the show running config command’s display, these secret keys are displayed in
encrypted format. You cannot show these keys in plain text format.
Format
Mode
key[<key-string> | encrypted <key-string>]
TACACS Config
Management Commands
709
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
port
Use the portcommand in TACACS Configuration mode to specify a server port number.
The server <port-number>range is 0 - 65535.
Default
49
Format
Mode
port<port-number>
TACACS Config
priority
Use the prioritycommand in TACACS Configuration mode to specify the order in which
servers are used, where 0 (zero) is the highest priority. The <priority>parameter
specifies the priority for servers. The highest priority is 0 (zero), and the range is 0 - 65535.
Default
0
Format
Mode
priority <priority>
TACACS Config
timeout
Use the timeoutcommand in TACACS Configuration mode to specify the timeout value in
seconds. If no timeout value is specified, the global value is used. The <timeout>
parameter has a range of 1-30 and is the timeout value in seconds.
Format
Mode
timeout<timeout>
TACACS Config
show tacacs
Use the show tacacscommand to display the configuration and statistics of a TACACS+
server.
Format
show tacacs [<ip-address|hostname>]
Mode
Privileged EXEC
Term
Definition
Host Address
The IP address or hostname of the configured TACACS+ server.
Port
The configured TACACS+ server port number.
TimeOut
Priority
The timeout in seconds for establishing a TCP connection.
The preference order in which TACACS+ servers are contacted. If a server
connection fails, the next highest priority server is contacted.
Management Commands
710
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Configuration Scripting Commands
Configuration Scripting allows you to generate text-formatted script files representing the
current configuration of a system. You can upload these configuration script files to a PC or
UNIX system and edit them. Then, you can download the edited files to the system and apply
the new configuration. You can apply configuration scripts to one or more switches with no or
minor modifications.
page 569) to transfer the configuration script to or from the switch.
You should use scripts on systems with default configuration; however, you are not prevented
from applying scripts on systems with non-default configurations.
Scripts must conform to the following rules:
•
Script files are not distributed across the stack, and only live in the unit that is the master
unit at the time of the file download.
•
•
•
•
The file extension must be “.scr”.
A maximum of ten scripts are allowed on the switch.
The combined size of all script files on the switch shall not exceed 2048 KB.
The maximum number of configuration file command lines is 2000.
You can type single-line annotations at the command prompt to use when you write test or
configuration scripts to improve script readability. The exclamation point (!) character flags
the beginning of a comment. The comment flag character can begin a word anywhere on the
command line, and all input following this character is ignored. Any command line that begins
with the “!” character is recognized as a comment line and ignored by the parser.
The following lines show an example of a script:
! Script file for displaying management access
show telnet !Displays the information about remote connections
! Display information about direct connections
show serial
! End of the script file!
Note: To specify a blank password for a user in the configuration script,
you must specify it as a space within quotes. For example, to
change the password for user janefrom a blank password to
hello, the script entry is as follows:
users passwd jane
" "
Management Commands
711
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
hello
hello
script apply
Use this command to apply the commands in the script to the switch. The <scriptname>
parameter is the name of the script to apply.
Format
Mode
script apply<scriptname>
Privileged EXEC
script delete
Use this command to delete a specified script, where the <scriptname>parameter is the
name of the script to delete. The <all>option deletes all the scripts present on the switch.
Format
script delete{<scriptname> | all}
Mode
Privileged EXEC
script list
Use this command to list all scripts present on the switch as well as the remaining available
space.
Format
script list
Mode
Global Config
Term
Definition
Configuration Script
Size
Name of the script.
Privileged EXEC
script show
Use this command to display the contents of a script file, which is named <scriptname>.
Format
script show<scriptname>
Mode
Privileged EXEC
Term
Definition
Output Format
line<number>: <line contents>
Management Commands
712
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
script validate
Use this command to validate a script file by parsing each line in the script file, where
<scriptname>is the name of the script to validate.The validate option is intended to be
used as a tool for script development. Validation identifies potential problems. It might not
identify all problems with a given script on any given device.
Format
Mode
script validate<scriptname>
Privileged EXEC
Pre-Login Banner and System Prompt Commands
This section describes the commands you use to configure the pre-login banner and the
system prompt. The pre-login banner is the text that displays before you login at the User:
prompt.
copy (pre-login banner)
Use a copycommand option to upload or download the CLI Banner to or from the switch.
You can specify local URLs by using TFTP, Xmodem, Ymodem, or Zmodem.
Note: <ip6address> is also a valid parameter for routing packages that
support IPv6.
Format
Mode
copy <url> nvram:clibanner
copy nvram:clibanner <url>
Privileged EXEC
set prompt
Use this command to change the name of the prompt. The length of name may be up to 64
alphanumeric characters.
Format
Mode
set prompt <prompt_string>
Privileged EXEC
Management Commands
713
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set clibanner
Use this command to add the CLI Banner. The banner message supports up to 2000
characters.
Format
Mode
set clibanner <line>
Global Config
no set clibanner
Use this command to remove the CLI Banner downloaded through TFTP.
Format
Mode
no set clibanner
Global Config
Switch Database Management (SDM) Templates
You can use SDM templates to configure system resources in the switch and optimize
support for specific features depending on how the switch is used in the network. You can
select a template to provide the maximum system usage for a specific function. For example,
you could use a routing template to optimize resources for IPv4 routing if the network
environment does not use IPv6 routing.
Note the following:
•
If you configure an SDM template, you must reload the switch for the configuration to take
effect.
•
If you try to configure IPv6 routing without first selecting the dual IPv4-IPv6 routing
template, a warning message appears.
sdm prefer
Use this command to specify the SDM template to use on the switch.
Note: This command is not supported on the following legacy switches:
GSM7328S V2H1,GSM7352 V2H1,GSM7228PS V1H1, and
GSM7228PS V1H1.
Default
Format
ipv4-routing for IPv4 only builds, dual-ipv4-ipv6 for IPv6 builds
sdm prefer {ipv4-routing {data-center {enterprise|plus-enterprise} |
enterprise} | dual-ipv4-and-ipv6 {data-center-enterprise |
enterprise}}
Mode
Global Config
Management Commands
714
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Parameter
Description
ipv4-routing
Supports IPv4 routing only.
-data-center enterprise: Support more ECMP next hops in IPv4 routes.
-data-center plus-enterprise: Same as data-center except with more IPv4
routes and ARP entries in enterprise mode.
-enterprise: Support more IPv4 routes and ARP entries with less ECMP next hops.
dual-ipv4-and-ipv6
Supports both IPv4 and IPv6 routing.
This option is visible only when the switch supports IPv6 and IPv4 routing.
-data-center-enterprise:Support both IPv4 and IPv6 with more ECMP next hops.
-enterprise: Support both IPv4 and IPv6 routing.
no sdm prefer
Use this command to return to the default template.
Format
Mode
no sdm prefer
Global Config
sdm prefer (Mixed Stacking)
Use this command to specify the SDM template to stack with the following switches.
GSM7328S V2H1,GSM7352S V2H1,GSM7228PS V1H1,GSM7228PS V1H1.
Format
Mode
sdm prefer {ipv4-routing smb | dual-ipv4-and-ipv6 { smb |
data-center-smb}
Global Config
Parameter
Description
ipv4-routing
Supports IPv4 routing only.
-smb: Reduces all IPv4 table sizes for compatibility with the legacy switches.
dual-ipv4-and-ipv6
Supports both IPv4 and IPv6 routing.
This option is visible only when the switch supports IPv6 and IPv4 routing.
-smb: Reduces all IPv4 and IPv6 table sizes for compatibility with the legacy switches.
show sdm prefer
Use this command to view the currently active SDM template and its scaling parameters, or
to view the scaling parameters for an inactive template. When used with no optional
keywords, this command lists the currently active template and the template that will become
active on the next reboot, if it is different from the currently active template. If the system
boots with a non-default template and you clear the template configuration either using no
sdm preferor by deleting the startup configuration, show sdm preferlists the default
template as the next active template.
Management Commands
715
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Use the optional keywords to list the scaling parameters of a specific template.
Format
show sdm prefer [dual-ipv4-and-ipv6 default |
ipv4-routing {default | data-center} ]
Mode
Privileged EXEC
Term
Description
ARP Entries
The maximum number of entries in the IPv4 Address Resolution Protocol (ARP) cache
for routing interfaces.
IPv4 Unicast
Routes
The maximum number of IPv4 unicast forwarding table entries.
IPv6 NDP Entries
The maximum number of IPv6 Neighbor Discovery Protocol (NDP) cache entries.
The maximum number of IPv6 unicast forwarding table entries.
IPv6 Unicast
Routes
ECMP Next Hops
The maximum number of next hops that can be installed in the IPv4 and IPv6 unicast
forwarding tables.
IPv4 Multicast
Routes
The maximum number of IPv4 multicast forwarding table entries.
The maximum number of IPv6 multicast forwarding table entries.
IPv6 Multicast
Routes
Example:
#show sdm prefer
Current template: Dual IPv4 and IPv6
ARP Entries.................................... 4096
IPv4 Unicast Routes............................ 6112
IPv6 NDP Entries............................... 2048
IPv6 Unicast Routes............................ 3072
ECMP Next Hops................................. 4 I
Pv4 Multicast Routes........................... 256
IPv6 Multicast Routes.......................... 256
IPv6 Management Commands
IPv6 Management commands allow a device to be managed via an IPv6 address in a switch
or IPv4 routing (that is, independent from the IPv6 Routing package). For Routing/IPv6 builds
of Switch CLI dual IPv4/IPv6 operation over the service port is enabled. Switch CLI has
capabilities such as:
•
•
•
Static assignment of IPv6 addresses and gateways for the network ports.
The ability to ping an IPv6 link-local address over the network port.
Using IPv6 Management commands, you can send SNMP traps and queries via the
network port.
•
The user can manage a device via the network port (in addition to a routing interface).
Management Commands
716
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
network ipv6 enable
Use this command to enable IPv6 operation on the network port.
Default
enabled
Format
Mode
network ipv6 enable
Privileged EXEC
no network ipv6 enable
Use this command to disable IPv6 operation on the network port.
Format
Mode
no network ipv6 enable
Privileged EXEC
network ipv6 address
Use this command to configure an IPv6 global address, enable or disable stateless global
address autoconfiguration, and enable or disable dhcpv6 client protocol information for the
network port. You can configure multiple IPv6 addresses on the network port.
Format
Mode
network ipv6 address {address/prefix-length [eui64] | autoconfig |
dhcp}
Privileged EXEC
Term
Definition
address
IPv6 prefix in IPv6 global address format.
IPv6 prefix length value.
prefix-length
eui64
Formulate IPv6 address in eui64 format.
Configure stateless global address autoconfiguration capability.
Configure dhcpv6 client protocol.
autoconfig
dhcp
no network ipv6 address
Use this command to:
•
Remove the manually configured IPv6 global address on the network port interface (with
the addressoption).
•
Disable the stateless global address autoconfiguration on the network port (with the
autoconfigoption).
Management Commands
717
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
•
Disable the dhcpv6 client protocol on the network port (with the dhcpoption).
Format
no network ipv6 address {address/prefix-length[eui64] | autoconfig
| dhcp}
Mode
Privileged EXEC
network ipv6 gateway
Use this command to configure IPv6 gateway (default routers) information for the network
port. The gateway address is in IPv6 global or link-local address format.
Format
Mode
network ipv6 gateway <gateway-address>
Privileged EXEC
no network ipv6 gateway
Use this command to remove IPv6 gateways on the network port interface.
Format
Mode
no network ipv6 gateway
Privileged EXEC
show network ndp
Use this command to display NDP cache information for the network port.
Default
enabled
Format
Mode
show network ndp
• Privileged EXEC
• User EXEC
Term
Definition
IPv6 Address
The IPv6 address of the interface.
MAC Address
isRtr
The MAC Address used.
Specifies the router flag.
Neighbor
State
The state of the neighbor cache entry. Possible values are: Reachable, Delay.
Age Updated
The time in seconds that has elapsed since an entry was added to the cache.
The following shows sample CLI display output for the command:
(switch) #show network ndp
Neighbor
State
--------
Reachable
Age
IPv6 Address
--------------------------
3017::204:76FF:FE73:423A
MAC Address
-----------------
00:04:76:73:42:3a
isRtr
-----
Updated
-------
447535
Management Commands
718
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
FE80::204:76FF:FE73:423A
00:04:76:73:42:3a
Delay
447540
show network ipv6 dhcp statistics
Use this command to display the statistics of the DHCPv6 client running on the network
management interface.
Format
show network ipv6 dhcp statistics
Mode
• Privileged EXEC
• User EXEC
Term
Description
DHCPv6 Advertisement
Packets Received
The number of DHCPv6 Advertisement packets received on the network
interface.
DHCPv6 Reply Packets
Received
The number of DHCPv6 Reply packets received on the network interface.
Received DHCPv6
Advertisement Packets
Discarded
The number of DHCPv6 Advertisement packets discarded on the network
interface.
Received DHCPv6 Reply
Packets Discarded
The number of DHCPv6 Reply packets discarded on the network interface.
DHCPv6 Malformed
Packets Received
The number of DHCPv6 packets that are received malformed on the network
interface.
Total DHCPv6 Packets
Received
The total number of DHCPv6 packets received on the network interface.
The number of DHCPv6 Solicit packets transmitted on the network interface.
The number of DHCPv6 Request packets transmitted on the network interface.
The number of DHCPv6 Renew packets transmitted on the network interface.
The number of DHCPv6 Rebind packets transmitted on the network interface.
The number of DHCPv6 Release packets transmitted on the network interface.
The total number of DHCPv6 packets transmitted on the network interface.
DHCPv6 Solicit Packets
Transmitted
DHCPv6 Request
Packets Transmitted
DHCPv6 Renew Packets
Transmitted
DHCPv6 Rebind Packets
Transmitted
DHCPv6 Release
Packets Transmitted
Total DHCPv6 Packets
Transmitted
The following example shows CLI display output for the command:
(switch)#show network ipv6 dhcp statistics
DHCPv6 Client Statistics
-------------------------
DHCPv6 Advertisement Packets Received................. 0
DHCPv6 Reply Packets Received......................... 0
Received DHCPv6 Advertisement Packets Discarded....... 0
Received DHCPv6 Reply Packets Discarded............... 0
DHCPv6 Malformed Packets Received..................... 0
Management Commands
719
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Total DHCPv6 Packets Received......................... 0
DHCPv6 Solicit Packets Transmitted.................... 0
DHCPv6 Request Packets Transmitted.................... 0
DHCPv6 Renew Packets Transmitted...................... 0
DHCPv6 Rebind Packets Transmitted..................... 0
DHCPv6 Release Packets Transmitted.................... 0
Total DHCPv6 Packets Transmitted...................... 0
clear network ipv6 dhcp statistics
Use this command to clear the DHCPv6 statistics on the network management interface.
Format
Mode
clear network ipv6 dhcp statistics
Privileged EXEC
Management Commands
720
Download from Www.Somanuals.com. All Manuals Search And Download.
13.
Log Messages
13
This chapter lists common log messages, along with information regarding the cause of each
message. There is no specific action that can be taken per message. When there is a
problem being diagnosed, a set of these messages in the event log, along with an
understanding of the system configuration and details of the problem will assist NETGEAR,
Inc. in determining the root cause of such a problem.
Note: This chapter does not contain a complete list of all syslog
messages.
This chapter contains the following sections:
•
•
•
•
•
•
•
•
•
•
721
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Core
Table 3. BSP Log Messages
Component
Message
Cause
BSP
BSP
Event(0xaaaaaaaa)
Starting code...
Switch has restarted.
BSP initialization complete, starting 7000
series application.
Table 4. NIM Log Messages
Component
NIM
Message
Cause
NIM: L7_ATTACH out of order for
intIfNum(x) unit x slot x port x
Interface creation out of order
NIM
NIM
NIM
NIM
NIM: Failed to find interface at unit x slot x There is no mapping between the USP and
port x for event(x)
Interface number
NIM: L7_DETACH out of order for
intIfNum(x) unit x slot x port x
Interface creation out of order
NIM: L7_DELETE out of order for
intIfNum(x) unit x slot x port x
Interface creation out of order
NIM: event(x),intf(x),component(x), in
wrong phase
An event was issued to NIM during the
wrong configuration phase (probably Phase
1, 2, or WMU)
NIM
NIM
NIM
NIM
NIM
NIM
NIM
NIM: Failed to notify users of interface
change
Event was not propagated to the system
NIM message queue full or non-existent
Interface not created
NIM: failed to send message to NIM
message Queue.
NIM: Failed to notify the components of
L7_CREATE event
A component issued an interface event
during the wrong initialization phase
NIM: Attempted event (x), on USP x.x.x
before phase 3
NIM: incorrect phase for operation
An API call was made during the wrong
initialization phase
NIM: Component(x) failed on event(x) for
intIfNum(x)
A component responded with a fail
indication for an interface event
NIM: Timeout event(x), intIfNum(x)
remainingMask = “xxxx”
A component did not respond before the
NIM timeout occurred
Log Messages
722
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 5. System Log Messages
Component
SYSTEM
Message
Cause
Configuration file Switch CLI.cfg size is 0
(zero) bytes
The configuration file could not be read.
This message may occur on a system for
which no configuration has ever been
saved or for which configuration has been
erased.
SYSTEM
could not separate
SYSAPI_CONFIG_FILENAME
The configuration file could not be read.
This message may occur on a system for
which no configuration has ever been
saved or for which configuration has been
erased.
SYSTEM
SYSTEM
Building defaults for file <file name> version Configuration did not exist or could not be
<version num>
read for the specified feature or file.
Default configuration values will be used.
The file name and version are indicated.
File <filename>: same version (version
num) but the sizes (<version
size>-><expected version size) differ
The configuration file which was loaded
was of a different size than expected for the
version number. This message indicates
the configuration file needed to be migrated
to the version number appropriate for the
code image. This message may appear
after upgrading the code image to a more
current release.
SYSTEM
Migrating config file <filename> from
version <version num> to <version num>
The configuration file identified was
migrated from a previous version number.
Both the old and new version number are
specified. This message may appear after
upgrading the code image to a more
current release.
SYSTEM
SYSTEM
Building Defaults
Configuration did not exist or could not be
read for the specified feature. Default
configuration values will be used.
sysapiCfgFileGet failed size = <expected
Configuration did not exist or could not be
size of file> version = <expected version> read for the specified feature. This
message is usually followed by a message
indicating that default configuration values
will be used.
Log Messages
723
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Utilities
Table 6. Trap Mgr Log Message
Component
Trap Mgr
Message
Link Up/Down: unit/slot/port
Cause
An interface changed link state.
Table 7. DHCP Filtering Log Messages
Component
Message
Cause
DHCP Filtering
Unable to create r/w lock for DHCP
Filtering
Unable to create semaphore used for dhcp
filtering configuration structure .
DHCP Filtering
DHCP Filtering
DHCP Filtering
Failed to register with nv Store.
Unable to register save and restore
functions for configuration save
Failed to register with NIM
Unable to register with NIM for interface
callback functions
Error on call to sysapiCfgFileWrite file
Error on trying to save configuration .
Table 8. NVStore Log Messages
Component
NVStore
Message
Cause
Building defaults for file XXX
A component’s configuration file does not
exist or the file’s checksum is incorrect so
the component’s default configuration file is
built.
NVStore
NVStore
NVStore
Error on call to osapiFsWrite routine on file Either the file cannot be opened or the OS’s
XXX
file I/O returned an error trying to write to
the file.
File XXX corrupted from file system.
Checksum mismatch.
The calculated checksum of a component’s
configuration file in the file system did not
match the checksum of the file in memory.
Migrating config file XXX from version Y to A configuration file version mismatch was
Z
detected so a configuration file migration
has started.
Log Messages
724
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 9. RADIUS Log Messages
Component
RADIUS
Message
Cause
RADIUS: Invalid data length - xxx
The RADIUS Client received an invalid
message from the server.
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS: Failed to send the request
RADIUS: Failed to send all of the request
A problem communicating with the
RADIUS server.
A problem communicating with the
RADIUS server during transmit.
RADIUS: Could not get the Task Sync
semaphore!
Resource issue with RADIUS Client
service.
RADIUS: Buffer is too small for response
processing
RADIUS Client attempted to build a
response larger than resources allow.
RADIUS: Could not allocate accounting
requestInfo
Resource issue with RADIUS Client
service.
RADIUS: Could not allocate requestInfo
Resource issue with RADIUS Client
service.
RADIUS: osapiSocketRecvFrom returned Error while attempting to read data from the
error
RADIUS server.
RADIUS: Accounting-Response failed to
validate, id=xxx
The RADIUS Client received an invalid
message from the server.
RADIUS: User (xxx) needs to respond for An unexpected challenge was received for
challenge a configured user.
RADIUS: Could not allocate a buffer for the Resource issue with RADIUS Client
packet
service.
RADIUS: Access-Challenge failed to
validate, id=xxx
The RADIUS Client received an invalid
message from the server.
RADIUS: Failed to validate
Message-Authenticator, id=xxx
The RADIUS Client received an invalid
message from the server.
RADIUS: Access-Accpet failed to validate, The RADIUS Client received an invalid
id=xxx
message from the server.
RADIUS: Invalid packet length – xxx
The RADIUS Client received an invalid
message from the server.
RADIUS: Response is missing
Message-Authenticator, id=xxx
The RADIUS Client received an invalid
message from the server.
RADIUS: Server address doesn't match
configured server
RADIUS Client received a server response
from an unconfigured server.
Log Messages
725
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 10. TACACS+ Log Messages
Component
TACACS+
Message
Cause
TACACS+: authentication error, no server TACACS+ request needed, but no servers
to contact
are configured.
TACACS+
TACACS+
TACACS+
TACACS+
TACACS+
TACACS+: connection failed to server
x.x.x.x
TACACS+ request sent to server x.x.x.x but
no response was received.
TACACS+: no key configured to encrypt
packet for server x.x.x.x
No key configured for the specified server.
Received packet type that is not supported.
Major version mismatch.
TACACS+: received invalid packet type
from server.
TACACS+: invalid major version in
received packet.
TACACS+: invalid minor version in
received packet.
Minor version mismatch.
Table 11. LLDP Log Message
Component
LLDP
Message
Cause
lldpTask(): invalid message type:xx.
xxxxxx:xx
Unsupported LLDP packet received.
Table 12. SNTP Log Message
Component
SNTP
Message
Cause
SNTP: system clock synchronized on %s
UTC
Indicates that SNTP has successfully
synchronized the time of the box with the
server.
Management
Table 13. SNMP Log Message
Component
SNMP
Message
Cause
EDB Callback: Unit Join: x.
A new unit has joined the stack.
Log Messages
726
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 14. EmWeb Log Messages
Component
EmWeb
Message
Cause
EMWEB (Telnet): Max number of Telnet
login sessions exceeded
A user attempted to connect via telnet
when the maximum number of telnet
sessions were already active.
EmWeb
EmWeb
EMWEB (SSH): Max number of SSH login A user attempted to connect via SSH when
sessions exceeded
the maximum number of SSH sessions
were already active.
Handle table overflow
All the available EmWeb connection
handles are being used and the connection
could not be made.
EmWeb
EmWeb
EmWeb
EmWeb
EmWeb
EmWeb
EmWeb
ConnectionType EmWeb socket accept()
failed: errno
Socket accept failure for the specified
connection type.
ewsNetHTTPReceive failure in
NetReceiveLoop() - closing connection.
Socket receive failure.
EmWeb: connection allocation failed
Memory allocation failure for the new
connection.
EMWEB TransmitPending :
EWOULDBLOCK error sending data
Socket error on send.
ewaNetHTTPEnd: internal error - handle
not in Handle table
EmWeb handle index not valid.
ewsNetHTTPReceive:recvBufCnt exceeds The receive buffer limit has been reached.
MAX_QUEUED_RECV_BUFS!
Bad request or DoS attack.
EmWeb accept: XXXX
Accept function for new SSH connection
failed. XXXX indicates the error info.
Table 15. CLI_UTIL Log Messages
Component
CLI_UTIL
Message
Cause
Telnet Send Failed errno = 0x%x
Failed to send text string to the
telnet client.
CLI_UTIL
osapiFsDir failed
Failed to obtain the directory
information from a volume's
directory.
Log Messages
727
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 16. WEB Log Messages
Component
WEB
Message
Cause
Max clients exceeded
This message is shown when the maximum
allowed java client connections to the
switch is exceeded.
WEB
WEB
Error on send to sockfd XXXX, closing
connection
Failed to send data to the java clients
through the socket.
# (XXXX) Form Submission Failed. No
Action Taken.
The form submission failed and no action is
taken. XXXX indicates the file under
consideration.
WEB
ewaFormServe_file_download() - WEB
Unknown return code from tftp download
result
Unknown error returned while downloading
file using TFTP from web interface
WEB
WEB
ewaFormServe_file_upload() - Unknown
return code from tftp upload result
Unknown error returned while uploading file
using TFTP from web interface.
Web UI Screen with unspecified access
attempted to be brought up
Failed to get application-specific
authorization handle provided to
EmWeb/Server by the application in
ewsAuthRegister(). The specified web
page will be served in read-only mode.
Table 17. CLI_WEB_MGR Log Messages
Component
Message
Cause
CLI_WEB_MGR
File size is greater than 2K
The banner file size is greater than 2K
bytes.
CLI_WEB_MGR
No. of rows greater than allowed maximum When the number of rows exceeds the
of XXXX
maximum allowed rows
Table 18. SSHD Log Messages
Component
SSHD
Message
Cause
SSHD: Unable to create the global (data)
semaphore
Failed to create semaphore for global data
protection.
SSHD
SSHD: Msg Queue is full, event = XXXX
Failed to send the message to the SSHD
message queue as message queue is full.
XXXX indicates the event to be sent
Log Messages
728
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 18. SSHD Log Messages
Component
SSHD
Message
Cause
SSHD: Unknown UI event in message,
event=XXXX
Failed to dispatch the UI event to the
appropriate SSHD function as it’s an invalid
event. XXXX indicates the event to be
dispatched.
SSHD
sshdApiCnfgrCommand: Failed calling
sshdIssueCmd.
Failed to send the message to the SSHD
message queue
Table 19. SSLT Log Messages
Component
SSLT
Message
Cause
SSLT: Exceeded maximum,
ssltConnectionTask
Exceeded maximum allowed SSLT
connections.
SSLT
SSLT
SSLT: Error creating Secure server socket6 Failed to create secure server socket for
IPV6.
SSLT: Can't connect to unsecure server at Failed to open connection to unsecure
XXXX, result = YYYY, errno = ZZZZ
server. XXXX is the unsecure server socket
address. YYYY is the result returned from
connect function and ZZZZ is the error
code.
SSLT
SSLT
SSLT: Msg Queue is full, event=XXXX
Failed to send the received message to the
SSLT message queue as message queue
is full. XXXX indicates the event to be sent.
SSLT: Unknown UI event in message,
event=XXXX
Failed to dispatch the received UI event to
the appropriate SSLT function as it’s an
invalid event. XXXX indicates the event to
be dispatched.
SSLT
SSLT
ssltApiCnfgrCommand: Failed calling
ssltIssueCmd.
Failed to send the message to the SSLT
message queue.
SSLT: Error loading certificate from file
XXXX
Failed while loading the SSLcertificate from
specified file. XXXX indicates the file from
where the certificate is being read.
SSLT
SSLT
SSLT
SSLT: Error loading private key from file
Failed while loading private key for SSL
connection.
SSLT: Error setting cipher list (no valid
ciphers)
Failed while setting cipher list.
SSLT: Could not delete the SSL
semaphores
Failed to delete SSL semaphores during
cleanup.of all resources associated with
the OpenSSL Locking semaphores.
Log Messages
729
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 20. User_Manager Log Messages
Component
Message
Cause
User_Manager
User Login Failed for XXXX
Failed to authenticate user login. XXXX
indicates the username to be
authenticated.
User_Manager
User_Manager
Access level for user XXXX could not be
determined. Setting to READ_ONLY.
Invalid access level specified for the user.
The access level is set to READ_ONLY.
XXXX indicates the username.
Could not migrate config file XXXX from
version YYYY to ZZZZ. Using defaults.
Failed to migrate the config file. XXXX is
the config file name. YYYY is the old
version number and ZZZZ is the new
version number.
Switching
Table 21. Protected Ports Log Messages
Component
Message
Cause
Protected Ports
Protected Port: failed to save configuration This appears when the protected port
configuration cannot be saved
Protected Ports
Protected Ports
protectedPortCnfgrInitPhase1Process:
Unable to create r/w lock for protectedPort protectedPortCfgRWLock Fails
This appears when
protectedPortCnfgrInitPhase2Process:
Unable to register for VLAN change
callback
This appears when nimRegisterIntfChange
with VLAN fails
Protected Ports
Protected Ports
Protected Ports
Protected Ports
Protected Ports
Cannot add intIfNum xxx to group yyy
This appears when an interface could not
be added to a particular group.
Unable to set protected port group
This appears when a dtl call fails to add
interface mask at the driver level
Cannot delete intIfNum xxx from group yyy This appears when a dtl call to delete an
interface from a group fails
Cannot update group YYY after deleting
interface XXX
This message appears when an update
group for a interface deletion fails
Received an interface change callback
while not ready to receive it
This appears when an interface change call
back has come before the protected port
component is ready.
Log Messages
730
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 22. IP Subnet VLANS Log Messages
Component
Message
Cause
IPsubnet vlans
ERROR vlanIpSubnetSubnetValid :Invalid This occurs when an invalid pair of subnet
subnet
and netmask has come from the CLI
IPsubnet vlans
IPsubnet vlans
IPsubnet vlans
IP Subnet Vlans: failed to save
configuration
This message appears when save
configuration of subnet vlans failed
vlanIpSubnetCnfgrInitPhase1Process:
Unable to create r/w lock for vlanIpSubnet creations fails
This appears when a read/write lock
vlanIpSubnetCnfgrInitPhase2Process:
Unable to register for VLAN change
callback
This appears when this component unable
to register for vlan change notifications
IPsubnet vlans
IPsubnet vlans
IPsubnet vlans
IPsubnet vlans
IPsubnet vlans
vlanIpSubnetCnfgrFiniPhase1Process:
could not delete avl semaphore
This appears when a semaphore deletion
of this component fails.
vlanIpSubnetDtlVlanCreate: Failed
This appears when a dtl call fails to add an
entry into the table
vlanIpSubnetSubnetDeleteApply: Failed
This appears when a dtl fails to delete an
entry from the table
vlanIpSubnetVlanChangeCallback: Failed This appears when a dtl fails to add an
to add an Entry entry for a vlan add notify event.
vlanIpSubnetVlanChangeCallback: Failed This appears when a dtl fails to delete an
to delete an Entry
entry for an vlan delete notify event.
Table 23. Mac-based VLANs Log Messages
Component
Message
Cause
Mac based
VLANS
MAC VLANs: Failed to save configuration This message appears when save
configuration of Mac vlans failed
Mac based
VLANS
vlanMacCnfgrInitPhase1Process: Unable
to create r/w lock for vlanMac
This appears when a read/write lock
creations fails
Mac based
VLANS
Unable to register for VLAN change
callback
This appears when this component unable
to register for vlan change notifications
Mac based
VLANS
vlanMacCnfgrFiniPhase1Process: could
not delete avl semaphore
This appears when a semaphore deletion
of this component fails.
Mac based
VLANS
vlanMacAddApply: Failed to add an entry
This appears when a dtl call fails to add an
entry into the table
Mac based
VLANS
vlanMacDeleteApply: Unable to delete an This appears when a dtl fails to delete an
Entry entry from the table
Log Messages
731
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 23. Mac-based VLANs Log Messages
Component
Message
Cause
Mac based
VLANS
vlanMacVlanChangeCallback: Failed to
add an entry
This appears when a dtl fails to add an
entry for a vlan add notify event.
Mac based
VLANS
vlanMacVlanChangeCallback: Failed to
delete an entry
This appears when a dtl fails to delete an
entry for an vlan delete notify event.
Table 24. 802.1x Log Messages
Component
802.1X
Message
Cause
function: Failed calling dot1xIssueCmd
802.1X message queue is full
802.1X
802.1X
802.1X
802.1X
802.1X
802.1X
802.1X
function: EAP message not received from RADIUS server did not send required EAP
server
message
function: Out of System buffers
802.1X cannot process/transmit message
due to lack of internal buffers
function: could not set state to
<authorized/unauthorized>, intf xxx
DTL call failed setting authorization state of
the port
dot1xApplyConfigData: Unable to
<enable/disable> dot1x in driver
DTL call failed enabling/disabling 802.1X
dot1xSendRespToServer:
Failed sending message to RADIUS server
dot1xRadiusAccessRequestSend failed
dot1xRadiusAcceptProcess: error calling
radiusAccountingStart, ifIndex=xxx
Failed sending accounting start to RADIUS
server
function: failed sending terminate cause,
intf xxx
Failed sending accounting stop to RADIUS
server
Table 25. IGMP Snooping Log Messages
Component
Message
Cause
IGMP Snooping
function: osapiMessageSend failed
IGMP Snooping message queue is full
IGMP Snooping
IGMP Snooping
IGMP Snooping
Failed to set global igmp snooping mode to Failed to set global IGMP Snooping mode
xxx
due to message queue being full
Failed to set igmp snooping mode xxx for
interface yyy
Failed to set interface IGMP Snooping
mode due to message queue being full
Failed to set igmp mrouter mode xxx for
interface yyy
Failed to set interface multicast router
mode due to IGMP Snooping message
queue being full
IGMP Snooping
Failed to set igmp snooping mode xxx for
vlan yyy
Failed to set VLAN IGM Snooping mode
due to message queue being full
Log Messages
732
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 25. IGMP Snooping Log Messages
Component
Message
Cause
IGMP Snooping
Failed to set igmp mrouter mode %d for
interface xxx on Vlan yyy
Failed to set VLAN multicast router mode
due to IGMP Snooping message queue
being full
IGMP Snooping
IGMP Snooping
snoopCnfgrInitPhase1Process: Error
allocating small buffers
Could not allocate buffers for small IGMP
packets
snoopCnfgrInitPhase1Process: Error
allocating large buffers
Could not allocate buffers for large IGMP
packets
Table 26. GARP/GVRP/GMRP Log Messages
Component
Message
Cause
GARP/GVRP/
GMRP
garpSpanState, garpIfStateChange,
GarpIssueCmd,
The garpQueue is full, logs specifics of the
message content like internal interface
number, type of message etc.
garpDot1sChangeCallBack,
garpApiCnfgrCommand,
garpLeaveAllTimerCallback,
garpTimerCallback: QUEUE SEND
FAILURE:
GARP/GVRP/
GMRP
GarpSendPDU: QUEUE SEND FAILURE The garpPduQueue is full, logs specific of
the GPDU, internal interface number, vlan
id, buffer handle etc.
GARP/GVRP/
GMRP
garpMapIntfIsConfigurable,
gmrpMapIntfIsConfigurable: Error
accessing GARP/GMRP config data for
A default configuration does not exist for
this interface. Typically a case when a new
interface is created and has no
interface %d in garpMapIntfIsConfigurable. pre-configuration.
GARP/GVRP/
GMRP
garpTraceMsgQueueUsage: garpQueue
usage has exceeded fifty/eighty/ninety
percent
Traces the build up of message queue.
Helpful in determining the load on GARP.
GARP/GVRP/
GMRP
gid_destroy_port: Error Removing port %d Mismatch between the gmd (gmrp
registration for vlan-mac %d -
database) and MFDB.
%02X:%02X:%02X:%02X:%02X:%02X
GARP/GVRP/
GMRP
gmd_create_entry: GMRP failure adding
MFDB entry: vlan %d and address %s
MFDB table is full.
Log Messages
733
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 27. 802.3ad Log Messages
Component
802.3ad
Message
Cause
dot3adReceiveMachine: received default
event %x
Received a LAG PDU and the RX state
machine is ignoring this LAGPDU
802.3ad
dot3adNimEventCompletionCallback,
The event sent to NIM was not completed
dot3adNimEventCreateCompletionCallbac successfully
k: DOT3AD: notification failed for
event(%d), intf(%d), reason(%d)
Table 28. FDB Log Message
Component
FDB
Message
Cause
fdbSetAddressAgingTimeOut: Failure
Unable to set the age time in the hardware
setting fid %d address aging timeout to %d
Table 29. Double VLAN Tag Log Message
Component
Message
Cause
Double Vlan
Tag
dvlantagIntfIsConfigurable: Error accessing A default configuration does not exist for
dvlantag config data for interface %d
this interface. Typically a case when a new
interface is created and has no
pre-configuration.
Table 30. IPv6 Provisioning Log Message
Component
Message
Cause
IPV6
Provisioning
ipv6ProvIntfIsConfigurable:Erroraccessing A default configuration does not exist for
IPv6 Provisioning config data for interface this interface. Typically a case when a new
%d
interface is created and has no
pre-configuration.
Table 31. MFDB Log Message
Component
MFDB
Message
Cause
mfdbTreeEntryUpdate: entry does not exist Trying to update a non existing entry
Log Messages
734
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 32. 802.1Q Log Messages
Component
802.1Q
Message
Cause
dot1qIssueCmd: Unable to send message dot1qMsgQueue is full.
%d to dot1qMsgQueue for vlan %d - %d
msgs in queue
802.1Q
802.1Q
dot1qVlanCreateProcess: Attempt to
create a vlan with an invalid vlan id %d ;
This accommodates for reserved vlan ids.
i.e. 4094 - x
VLAN %d not in range,
dot1qMapIntfIsConfigurable: Error
accessing DOT1Q config data for
interface %d in
A default configuration does not exist for
this interface. Typically a case when a new
interface is created and has no
pre-configuration.
dot1qMapIntfIsConfigurable.
802.1Q
802.1Q
dot1qVlanDeleteProcess: Deleting the
default VLAN
Typically encountered during clear Vlan
and clear config
dot1qVlanMemberSetModify,
If this vlan is a learnt via GVRP then we
cannot modify it’s member set via
management.
dot1qVlanTaggedMemberSetModify:
Dynamic entry %d can only be modified
after it is converted to static
Table 33. 802.1S Log Messages
Component
802.1S
Message
Cause
dot1sIssueCmd: Dot1s Msg Queue is
full!!!!Event: %u, on interface: %u, for
instance: %u
The message Queue is full.
802.1S
802.1S
dot1sStateMachineRxBpdu(): Rcvd BPDU The current conditions, like port is not
Discarded
enabled or we are currently not finished
processing another BPDU on the same
interface, does not allow us to process this
BPDU
dot1sBpduTransmit(): could not get a buffer Out of system buffers
Table 34. Port Mac Locking Log Message
Component
Message
Cause
Port Mac
Locking
pmlMapIntfIsConfigurable: Error accessing A default configuration does not exist for
PML config data for interface %d in
pmlMapIntfIsConfigurable.
this interface. Typically a case when a new
interface is created and has no
pre-configuration.
Log Messages
735
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 35. Protocol-based VLANs Log Messages
Component
Message
Cause
Protocol Based
VLANs
pbVlanCnfgrInitPhase2Process: Unable to Appears when nimRegisterIntfChange fails
register NIM callback to register pbVlan for link state changes.
Protocol Based
VLANs
pbVlanCnfgrInitPhase2Process: Unable to Appears when vlanRegisterForChange
register pbVlan callback with vlans fails to register pbVlan for vlan changes.
Protocol Based
VLANs
pbVlanCnfgrInitPhase2Process: Unable to Appears when nvStoreRegister fails to
register pbVlan callback with nvStore
register save and restore functions for
configuration save.
QoS
Table 36. ACL Log Messages
Component
ACL
Message
Cause
Total number of ACL rules (x) exceeds max The combination of all ACLs applied to an
(y) on intf i.
interface has resulted in requiring more
rules than the platform supports.
ACL
ACL name, rule x: This rule is not being
logged
The ACL configuration has resulted in a
requirement for more logging rules than the
platform supports. The specified rule is
functioning normally except for the logging
action.
ACL
ACL
aclLogTask: error logging ACL rule trap for The system was unable to send an SNMP
correlator number
trap for this ACL rule which contains a
logging attribute.
IP ACL number: Forced truncation of one While processing the saved configuration,
or more rules during config migration
the system encountered an ACL with more
rules than is supported by the current
version. This may happen when code is
updated to a version supporting fewer rules
per ACL than the previous version.
Table 37. CoS Log Message
Component
COS
Message
Cause
cosCnfgrInitPhase3Process: Unable to
The COS component was unable to apply
apply saved config -- using factory defaults the saved configuration and has initialized
to the factory default settings.
Log Messages
736
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 38. DiffServ Log Messages
Component
DiffServ
Message
Cause
diffserv.c 165: diffServRestore Failed to
reset DiffServ. Recommend resetting
device
While attempting to clear the running
configuration an error was encountered in
removing the current settings. This may
lead to an inconsistent state in the system
and resetting is advised.
DiffServ
Policy invalid for service intf: "policy name, The DiffServ policy definition is not
intIfNum x, direction y
compatible with the capabilities of the
interface specified. Check the platform
release notes for information on
configuration limitations.
Routing/IPv6 Routing
Table 39. DHCP Relay Log Messages
Component
DHCP relay
Message
Cause
REQUEST hops field more than config
value
The DHCP relay agent has processed a
DHCP request whose HOPS field is larger
than the maximum value allowed. The relay
agent will not forward a message with a
hop count greater than 4.
DHCP relay
DHCP relay
Request's seconds field less than the
config value
The DHCP relay agent has processed a
DHCP request whose SECS field is larger
than the configured minimum wait time
allowed.
processDhcpPacket: invalid DHCP packet The DHCP relay agent has processed an
type: %u\n
invalid DHCP packet. Such packets are
discarded by the relay agent.
Table 40. OSPFv2 Log Messages
Component
OSPFv2
Message
Cause
Best route client deregistration failed for
OSPF Redist
OSPFv2 registers with the IPv4 routing
table manager (“RTO”) to be notified of best
route changes. There are cases where
OSPFv2 deregisters more than once,
causing the second deregistration to fail.
The failure is harmless.
OSPFv2
XX_Call() failure in _checkTimers for
thread 0x869bcc0
An OSPFv2 timer has fired but the
message queue that holds the event has
filled up. This is normally a fatal error.
Log Messages
737
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 40. OSPFv2 Log Messages (Continued)
Component
OSPFv2
Message
Cause
Warning: OSPF LSDB is 90% full (22648
LSAs).
OSPFv2 limits the number of Link State
Advertisements (LSAs) that can be stored
in the link state database (LSDB). When
the database becomes 90 or 95 percent
full, OSPFv2 logs this warning. The
warning includes the current size of the
database.
OSPFv2
The number of LSAs, 25165, in the OSPF When the OSPFv2 LSDB becomes full,
LSDB has exceeded the LSDB memory
allocation.
OSPFv2 logs this message. OSPFv2
reoriginates its router LSAs with the metric
of all non-stub links set to the maximum
value to encourage other routers to not
compute routes through the overloaded
router.
OSPFv2
OSPFv2
Dropping the DD packet because of MTU
mismatch
OSPFv2 ignored a Database Description
packet whose MTU is greater than the IP
MTU on the interface where the DD was
received.
LSA Checksum error in LsUpdate,
OSPFv2 ignored a received link state
dropping LSID 1.2.3.4 checksum 0x1234. advertisement (LSA) whose checksum was
incorrect.
Table 41. OSPFv3 Log Messages
Component
OSPFv3
Message
Cause
Best route client deregistration failed for
OSPFv3 Redist
OSPFv3 registers with the IPv6 routing
table manager (“RTO6”) to be notified of
best route changes. There are cases where
OSPFv3 deregisters more than once,
causing the second deregistration to fail.
The failure is harmless.
OSPFv3
Warning: OSPF LSDB is 90% full (15292
LSAs).
OSPFv3 limits the number of Link State
Advertisements (LSAs) that can be stored
in the link state database (LSDB). When
the database becomes 90 or 95 percent
full, OSPFv3 logs this warning. The
warning includes the current size of the
database.
OSPFv3
OSPFv3
The number of LSAs, 16992, in the OSPF When the OSPFv3 LSDB becomes full,
LSDB has exceeded the LSDB memory
allocation.
OSPFv3 logs this message. OSPFv3
reoriginates its router LSAs with the R-bit
clear indicating that OSPFv3 is overloaded.
LSA Checksum error detected for LSID
1.2.3.4 checksum 0x34f5. OSPFv3
Database may be corrupted.
OSPFv3 periodically verifies the checksum
of each LSA in memory. OSPFv3 logs this
Log Messages
738
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 42. Routing Table Manager Log Messages
Component
Message
Cause
Routing Table
Manager
RTO is full. Routing table contains 8000
best routes, 8000 total routes.
The routing table manager, also called
“RTO,” stores a limited number of best
routes, based on hardware capacity. When
the routing table becomes full, RTO logs
this alert. The count of total routes includes
alternate routes, which are not installed in
hardware.
Routing Table
Manager
RTO no longer full. Bad adds: 10. Routing When the number of best routes drops
table contains 7999 best routes, 7999 total below full capacity, RTO logs this notice.
routes.
The number of bad adds may give an
indication of the number of route adds that
failed while RTO was full, but a full routing
table is only one reason why this count is
incremented.
Table 43. VRRP Log Messages
Component
VRRP
Message
Cause
Changing priority to 255 for virtual router
with VRID 1 on interface 1/0/1
When the router is configured with the
address being used as the virtual router ID,
the router’s priority is automatically set to
the maximum value to ensure that the
address owner becomes the VRRP master.
VRRP
VRRP
Changing priority to 100 for virtual router
with VRID 1 on interface 1/0/1
When the router is no longer the address
owner, Switch CLI reverts the router’s
priority to the default.
vrrpPacketValidate: Invalid TTL
VRRP ignored an incoming message
whose time to live (TTL) in the IP header
was not 255.
Table 44. ARP Log Message
Component
ARP
Message
Cause
ARP received mapping for IP address xxx When we receive an ARP response with
to MAC address yyy. This IP address may different MAC address from another station
be configured on two stations.
with the same IP address as ours. This
might be a case of misconfiguration.
Log Messages
739
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 45. RIP Log Message
Component
RIP
Message
Cause
RIP : discard response from xxx via
unexpected interface
When RIP response is received with a
source address not matching the incoming
interface’s subnet.
Table 46. DHCP6 Log Message
Component
DHCP6
Message
Cause
relay_to_server: Cannot relay to relay
server intf xxx: not IPv6 enabled
Relay is enabled but neither the outgoing
interface nor the server IP address is
specified.
Multicast
Table 47. Cache Log Messages
Component
Cache
Message
Cause
Out of memory when creating entry.
When we run out of memory while creating
a new cache (MFC) entry
Cache
Out of memory when creating cache.
When we run out of memory while creating
the cache itself
Table 48. IGMP Log Messages
Component
IGMP
Message
Cause
Error creating IGMP pipe
Error opening IGMP pipe
When we fail to create / open IGMP pipe for
Mcast control messages
IGMP
IGMP
Error creating IGMP data pipe
Error opening IGMP data pipe
When we fail to create / open IGMP data
pipe for Mcast data messages
Error getting memory for source record
When we are unable to allocate memory for
a source record in the received IGMP V3
report
IGMP
Failed getting memory for new group
When we are unable to allocate memory for
a group record in the received IGMP
V3/V2/V1 report
Log Messages
740
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 49. IGMP-Proxy Log Messages
Component
IGMP-Proxy
Message
Cause
Error getting memory for igmp host group
record
When we are unable to allocate memory for
the IGMP group record in the Host (Proxy)
table
IGMP-Proxy
Error getting memory for source record
When we are unable to allocate memory for
the IGMP source record in the Host (Proxy)
table
Table 50. PIM-SM Log Messages
Component
PIM-SM
Message
Cause
PIM-SM not initialized
This message arises when trying to
activate pimsm interfaces or receiving
pimsm packets when pimsm component is
not initialized.
PIM-SM
Unable to take xxx semaphore
This message is logged when failed to
acquire semaphore to access source list or
group list or candidate Rp list or virtual
interface list. The xxx specifies the list for
which the access is denied.
PIM-SM
PIM-SM
PIM_SM
Warning : Could not send packet type xxx this warning is logged when failed to send a
(pimsm packet type) on rtrIfNum
pimsm control packet on the specified
router interface.
add_kernel_cache : memory allocation
failed
This message is logged when there is
insufficient memory to add an mroute entry
into cache.
Config error. Trying to add static RP.
Dynamic RP with same ip addr exists
Router learns RP-group mapping through
Bootstrap messages received.This
message pops when the static RP is
configured which conflicts the mapping
learnt dynamically through Bootstrap
messages.
PIM-SM
Inner xxx(source/group) address of register This log message appears when a register
message is invalid
message is received with invalid inner ip
source or group address.
Log Messages
741
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 51. PIM-DM Log Messages
Component
PIM-DM
Message
Cause
Out of memory when creating xxx
This message is logged when there is
insufficient memory to accommodate a new
neighbor/(S,G) Entry, Prune, Graft, Join
etc.
PIM-DM
PIM-DM
PIM-DM
PIM-DM
Error entry->ll_xxx LL creation error
This message is logged when the SLL
creation is Failed.
pim_interface_set: Could not give
taskSema
This message is logged when Task
synchronization Semaphore release fails.
Error initializing CACHE
This message is logged when the PIM-DM
(S,G) entry Cache table initialization fails.
Error creating PIM-DM pipe
This message is logged when the PIM-DM
Pipe (that receives control messages)
creation fails.
Table 52. DVMRP Log Messages
Component
DVMRP
Message
Cause
dvmrp_send_graft: failed getting memory
for graft
Failed to allocate memory while sending a
graft
DVMRP
DVMRP
DVMRP
DVMRP
dvmrp_register_neighbor: failed getting
memory for nbr
Failed to allocate memory while registering
a neighbor
dvmrp_recv_prune: failed getting memory Failed to allocate memory while receiving a
for prune
prune
dvmrp_new_route: failed getting memory
for route
Failed to get memory for a new route entry
dvmrp_prepare_routes: failed getting
memory for dvmrp_ann_rt
Failed to get memory while announcing a
new route entry
Stacking
Table 53. EDB Log Message
Component
EDB
Message
Cause
EDB Callback: Unit Join: <num>.
Unit <num> has joined the stack.
Log Messages
742
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Technologies
Table 54. System General Error Messages
Component
OS
Message
Cause
Invalid USP unit = x, slot = x, port =x
A port was not able to be translated
correctly during the receive.
OS
OS
In hapiBroadSystemMacAddress call to
'bcm_l2_addr_add' - FAILED : x
Failed to add an L2 address to the MAC
table. This should only happen when a
hash collision occurs or the table is full.
Failed installing mirror action - rest of the
policy applied successfully
A previously configured probe port is not
being used in the policy. The release notes
state that only a single probe port can be
configured
OS
Policy x does not contain rule x
The rule was not added to the policy due to
a discrepancy in the rule count for this
specific policy . Additionally, the message
can be displayed when an old rule is being
modified, but the old rule is not in the policy
OS
ERROR: policy x, tmpPolicy x, size x, data An issue installing the policy due to a
x x x x x x x x
possible duplicate hash
OS
OS
OS
ACL x not found in internal table
ACL internal table overflow
Attempting to delete a non-existent ACL
Attempting to add an ACL to a full table
In hapiBroadQosCosQueueConfig, Failed Attempting to configure the bandwidth
to configure minimum bandwidth. Available beyond it’s capabilities
bandwidth x
OS
USL: failed to put sync response on queue A response to a sync request was not
enqueued. This could indicate that a
previous sync request was received after it
was timed out
OS
OS
OS
OS
USL: failed to sync ipmc table on unit=x
Either the transport failed or the message
was dropped
usl_task_ipmc_msg_send(): failed to send Either the transport failed or the message
with x was dropped
USL: No available entries in the STG table The Spanning Tree Group table is full in
USL
USL: failed to sync stg table on unit=x
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
OS
USL: A Trunk doesn't exist in USL
Attempting to modify a Trunk that doesn’t
exist
Log Messages
743
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 54. System General Error Messages
Component
OS
Message
Cause
USL: A Trunk being created by bcmx
already existed in USL
Possible synchronization issue between
the application, hardware, and sync layer
OS
OS
OS
USL: A Trunk being destroyed doesn't exist Possible synchronization issue between
in USL the application, hardware, and sync layer.
USL: A Trunk being set doesn't exist in USL Possible synchronization issue between
the application, hardware, and sync layer.
USL: failed to sync trunk table on unit=x
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
OS
OS
OS
USL: Mcast entry not found on a join
USL: Mcast entry not found on a leave
USL: failed to sync dvlan data on unit=x
Possible synchronization issue between
the application, hardware, and sync layer
Possible synchronization issue between
the application, hardware, and sync layer
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
OS
OS
USL: failed to sync policy table on unit=x
USL: failed to sync VLAN table on unit=x
Invalid LAG id x
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
OS
OS
OS
OS
Possible synchronization issue between
the BCM driver and HAPI
Invalid uport calculated from the BCM uport Uport not valid from BCM driver.
bcmx_l2_addr->lport = x
Invalid USP calculated from the BCM
uport\nbcmx_l2_addr->lport = x
USP not able to be calculated from the
learn event for BCM driver.
Unable to insert route R/P
Route ‘R’ with prefix ‘P’ could not be
inserted in the hardware route table. A retry
will be issued.
OS
OS
Unable to Insert host H
Host ‘H’ could not be inserted in hardware
host table. A retry will be issued.
USL: failed to sync L3 Intf table on unit=x
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
OS
USL: failed to sync L3 Host table on unit=x Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
Log Messages
744
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 54. System General Error Messages
Component
OS
Message
Cause
USL: failed to sync L3 Route table on unit= Could not synchronize unit x due to a
x
transport failure or API issue on remote
unit. A synchronization retry will be issued
OS
OS
OS
USL: failed to sync initiator table on unit=x Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
USL: failed to sync terminator table on
unit=x
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
USL: failed to sync ip-multicast table on
unit=x
Could not synchronize unit x due to a
transport failure or API issue on remote
unit. A synchronization retry will be issued
O/S Support
Table 55. OSAPI Log Messages
Component
OSAPI
Message
Cause
ftruncate failed – File resides on a
read-only file system.
ftruncate is called to correctly set the file’s
size in the file system after a write. The file
system is R/W so this msg indicates the file
system may be corrupted.
OSAPI
OSAPI
OSAPI
ftruncate failed – File is open for reading
only.
ftruncate is called to correctly set the file’s
size in the file system after a write. The file
is opened for R/W so this msg indicates the
file system may be corrupted.
ftruncate failed – File descriptor refers to a ftruncate is called to correctly set the file’s
file on which this operation is impossible.
size in the file system after a write. This
msg indicates the file system may be
corrupted.
ftruncate failed – Returned an unknown
code in errno.
ftruncate is called to correctly set the file’s
size in the file system after a write. This
msg indicates the file system may be
corrupted.
OSAPI
OSAPI
ping: bad host!
The address requested to ping can not be
converted to an Internet address.
osapiTaskDelete: Failed for (XX) error YYY The requested task can not be deleted
because: the requested deletion is called
from an ISR, the task is already deleted, or
the task ID is invalid.
Log Messages
745
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Table 55. OSAPI Log Messages (Continued)
Component
OSAPI
Message
Cause
osapiCleanupIf: NetIPGet
osapiCleanupIf: NetMaskGet
osapiCleanupIf: NetIpDel
osapiSemaTake failed
During the call to remove the interface from
the route table, the attempt to get an ipv4
interface address from the stack failed.
OSAPI
OSAPI
OSAPI
During the call to remove the interface from
the route table ,the attempt to get the ipv4
interface mask from the stack failed.
During the call to remove the interface from
the route table, the attempt to delete the
primary ipv4 address from the stack failed.
The requested semaphore can not be
taken because: the call is made from an
ISR or the semaphore ID is invalid.
Log Messages
746
Download from Www.Somanuals.com. All Manuals Search And Download.
14.
Captive Portal Commands
14
The Captive Portal feature is a software implementation that blocks clients from accessing
the network until user verification has been established. Verification can be configured to
allow access for both guest and authenticated users. Authenticated users must be validated
against a database of authorized Captive Portal users before access is granted.
The Authentication server supports both HTTP and HTTPS web connections. In addition,
Captive Portal can be configured to use an optional HTTP port (in support of HTTP Proxy
networks). If configured, this additional port is then used exclusively by Captive Portal. Note
that this optional port is in addition to the standard HTTP port 80 which is currently being
used for all other web traffic.
This chapter contains the following sections:
•
•
•
•
•
•
•
Captive Portal Global Commands
The commands in this section are related to Captive Portal Global configurations.
captive-portal
Use this command to enter the captive portal configuration mode.
Format
Mode
captive-portal
Global Configuration mode
747
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
enable
Use this command to globally enable captive portal.
Default
disabled
enable
Format
Mode
Captive Portal Configuration mode
no enable
Use this command to globally disable captive portal.
Default
disabled
Format
Mode
no enable
Captive Portal Configuration mode
http port
Use this command to configure an additional HTTP port for captive portal to monitor. The
valid range is from 0 to 65535.
Default
80
Format
Mode
http port <0-65535>
Captive Portal Configuration mode
no http port
Use this command to reset the HTTP port to the default number 80.
Format
no http port
Mode
Captive Portal Configuration mode
https port
Use this command to configure an additional HTTPS port for captive portal to monitor. The
valid range is from 0 to 65535.
Default
443
Format
Mode
https port <0-65535>
Captive Portal Configuration mode
Captive Portal Commands
748
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no https port
Use this command to reset the HTTPs port to the default HTTPS port 443.
Format
Mode
no https port
Captive Portal Configuration mode
authentication timeout
Use this command to configure the authentication timeout. If the user does not enter valid
credentials within this time limit, the authentication page needs to be served again in order for
the client to gain access to the network.
Default
Format
Mode
300
authentication timeout <60-600>
Captive Portal Configuration mode
no authentication timeout
Use this command to reset the authentication timeout to the default.
Default
Format
Mode
300
no authentication timeout
Captive Portal Configuration mode
show captive-portal
Use this command to display the status of the captive portal feature.
Format
Mode
show captive-portal
Privileged EXEC mode
Term
Definition
Administrative
Mode
The administrative mode is enabled or disabled.
Operational
Status
The Operational status is enabled or disabled.
Disable Reason
If the operational status is disabled. This field shows the reason why the operational is
disabled.
CP IP Address
It is the captive portal server IP address.
Example
(switch)#show captive-portal
Administrative Mode....................... Disabled
Captive Portal Commands
749
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Operational Status........................ Disabled
Disable Reason............................ Administrator Disabled
CP IP Address................. 1.2.3.4
show captive-portal status
Use this command to report the status of all captive portal instances in the system.
Format
Mode
show captive-portal status
Privileged EXEC mode
Term
Definition
Additional HTTP
Port
The additional HTTP port for captive portal to monitor. Captive portal only monitors port
80 by default.
Additional HTTP
Secure Port
The additional HTTPs port for captive portal to monitor. Captive portal only monitors
port 443 by default.
Peer Switch Statistics Reporting Interval
Authentication
The timeout for the authentication page to be served again.
Timeout
Supported
Captive Portals
The maximum number of captive portal instances supported by switch. It supports up
to 10 instances.
Configured
Captive Portals
The number of created captive portal instances.
The number of active captive portal instances.
The maximum number of user can be authenticated.
The maximum number of local user can be created.
The number of the authenticated users.
Active Captive
Portals
System
Supported Users
Local Supported
Users
Authenticated
Users
Example
(switch)#show captive-portal status
Additional HTTP Port........................... 0
Additional HTTP Secure Port.................... 0
Peer Switch Statistics Reporting Interval...... 120
Authentication Timeout......................... 300
Supported Captive Portals...................... 10
Configured Captive Portals..................... 1
Active Captive Portals......................... 0
System Supported Users......................... 1024
Local Supported Users.......................... 128
Authenticated Users............................ 0
Captive Portal Commands
750
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Captive Portal Configuration Commands
The commands in this section are related to captive portal configurations.
configuration (Captive Portal)
Use this command to enter the captive portal instance mode. The captive portal configuration
identified by CP ID 1 is the default CP configuration. The system supports a total of ten CP
configurations.
Format
Mode
configuration <1-10>
Captive Portal Configuration mode
no configuration
Use this command to delete a CP configuration. The default configuration cannot be deleted.
Format
Mode
no configuration <1-10>
Captive Portal Configuration mode
enable (Instance)
Use this command to enable a captive portal configuration.
Default
enable
Format
Mode
enable
Captive Portal Instance mode
no enable
Use this command to disable a configuration.
Default
enable
Format
Mode
no enable
Captive Portal Instance mode
name
Use this command to configure the name for a captive portal configuration. The cp-name can
be up to 32 alphanumeric characters in length.
Default
Configuration 1 has the name “Default” by default. All other configurations have no name
by default.
Captive Portal Commands
751
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Format
Mode
name <cp-name>
Captive Portal Instance mode
no name
Use this command to remove a configuration name.
Format
no name
Mode
Captive Portal Instance mode
protocol
Use this command to configure the protocol mode for a captive portal configuration. The
default protocol is http.
Default
http
Format
Mode
protocol { http | https }
Captive Portal Instance mode
verification
Use this command to configure the verification mode for a captive portal configuration. User
verification can be configured to allow access for guest users; users that do not have
assigned user names and passwords. User verification can also be configured to allow
access for authenticated users. Authenticated users are required to enter a valid user name
and password that must first be validated against the local database or a RADIUS server.
Network access is granted once user verification has been confirmed.
Default
guest
Format
Mode
verification { guest | local | radius }
Captive Portal Instance mode
group
Use this command to configure a group ID for this captive portal configuration. If a group
number is configured, the user entry (Local or RADIUS) must be configured with the same
name and the group to authenticate to this captive portal instance. The group ID must be
default group ID is 1 for a captive portal configuration.
Default
1
Format
Mode
group <1-10>
Captive Portal Instance mode
Captive Portal Commands
752
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no group
Use this command to reset the group number to the default.
Default
1
Format
Mode
no group <1-10>
Captive Portal Instance mode
redirect (Captive Portal)
Use this command to enable the redirect mode for a captive portal configuration. Use the “no”
form of this command to disable redirect mode.
Default
Format
Mode
disable
redirect
Captive Portal Instance mode
no redirect
Use this command to disable redirect mode.
Format
no redirect
Mode
Captive Portal Instance mode
redirect-url
Use this command to configure the redirect URL for a captive portal configuration. The url is
the URL for redirection which can be up to 512 characters in length.
Format
Mode
redirect-url url
Captive Portal Instance mode
max-bandwidth-down
Use this command configures the maximum rate at which a client can receive data from the
network. The rate is in bits per seconds. 0 indicates limit not enforced.
Default
Format
Mode
0
max-bandwidth-down <0-536870911>
Captive Portal Instance mode
Captive Portal Commands
753
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no max-bandwidth-down
Use this command to reset the maximum rate to the default.
Format
Mode
no max-bandwidth-down
Captive Portal Instance mode
max-bandwidth-up
Use this command to configure the maximum rate at which a client can send data into the
network. The rate is in bits per seconds. 0 indicates limit not enforced.
Default
Format
Mode
0
max-bandwidth-up <0-536870911>
Captive Portal Instance mode
no max-bandwidth-up
Use this command to reset the maximum rate to the default.
Format
Mode
no max-bandwidth-up
Captive Portal Instance mode
max-input-octets
Use this command to configure the maximum number of octets the user is allowed to
transmit. After this limit has been reached the user will be disconnected. The number of
octets is in bytes. 0 indicates limit not enforced.
Default
Format
Mode
0
max-input-octets <0-4294967295>
Captive Portal Instance mode
no max-input-octets
Use this command to reset the limit to the default.
Format
Mode
no max-input-octets
Captive Portal Instance mode
Captive Portal Commands
754
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
max-output-octets
Use this command to configure the maximum number of octets the user is allowed to receive.
After this limit has been reached the user will be disconnected. The number of octets is in
bytes. 0 indicates limit not enforced Use the “no”.
Default
0
Format
Mode
max-output-octets <0-4294967295>
Captive Portal Instance mode
no max-output-octets
Use this command to reset the limit to the default.
Format
Mode
no max-output-octets
Captive Portal Instance mode
max-total-octets
Use this command to configure the maximum number of octets the user is allowed to
transfer; that is, the sum of octets transmitted and received. After this limit has been reached
the user will be disconnected. The number of total octets is in bytes. 0 indicates limit not
enforced. Use the “no” form of this command to reset the limit to the default.
Default
Format
Mode
0
max-total-octets <0-4294967295>
Captive Portal Instance mode
no max-total-octets
Use this command to reset the limit to the default.
Default
Format
Mode
0
max-total-octets <0-4294967295>
Captive Portal Instance mode
session-timeout (Captive Portal)
Use this command to configure the session timeout for a captive portal configuration. After
this limit has been reached, the user will be disconnected. Timeout is time in seconds. 0
indicates timeout not enforced.
Default
Format
Mode
0
session-timeout <0-86400>
Captive Portal Instance mode
Captive Portal Commands
755
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no session-timeout
Use this command to reset the session timeout to the default.
Format
session-timeout <0-86400>
Mode
Captive Portal Instance mode
idle-timeout
Use this command to configure the idle timeout for a captive portal configuration. 0 indicates
timeout not enforced. After an idle session has been reached this, the user will be
disconnected.
Default
0
Format
Mode
idle-timeout <0-900>
Captive Portal Instance mode
no idle-timeout
Use this command to reset the idle timeout to the default.
Format
Mode
no idle-timeout
Captive Portal Instance mode
locale
This command is not intended to be a user command. The administrator must use the WEB
UI to create and customize captive portal web content. This command is primarily used by
the show running-config command and process as it provides the ability to save and restore
configurations using a text based format.
Default
1
Format
Mode
locale <1-5>
Captive Portal Instance mode
no locale
This command is intended to delete a locale. The default locale cannot be deleted.
Format
Mode
no locale <1-5>
Captive Portal Instance mode
Captive Portal Commands
756
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
interface (Captive Portal)
Use this command to associate an interface with a captive portal configuration.
Format
interface <unit/slot/port>
Mode
Captive Portal Instance Config mode
no interface
Use this command to remove an association with a captive portal configuration.
Format
no interface <unit/slot/port>
Mode
Captive Portal Instance Config mode
block
Use this command to block all traffic for a captive portal configuration. The administrator can
block access to a captive portal configuration. When an instance is blocked no client traffic is
allowed through any interfaces associated with that captive portal configuration. Blocking a
captive portal instance is a temporary command executed by the administrator and not saved
in the configuration.
Default
no block
block
Format
Mode
Captive Portal Instance mode
no block
Use this command to unblock traffic.
Format
Mode
no block
Captive Portal Instance mode
Captive Portal Status Commands
This section describes commands that return captive portal status.
show captive-portal configuration
Use this command to display the operational status of each captive portal configuration.
Format
Mode
show captive-portal configuration <1-10>
Privileged EXEC mode
Captive Portal Commands
757
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
CP ID
Definition
The captive portal ID
CP Name
The captive portal instance name
Operational
Status
The operational status is enabled or disabled.
Disable Reason
Blocked Status
If the operational status is disabled, this field shows the reason.
Blocked status shows if this captive portal instance block all traffic.
The authenticated users by this captive portal instance.
Authenticated
Users
Example
(switch)#show captive-portal configuration 1
CP ID..................................... 1
CP Name................................... cp1
Operational Status........................ Disabled
Disable Reason............................ Administrator Disabled
Blocked Status............................ Not Blocked
Authenticated Users....................... 0
show captive-portal configuration interface
Use this command to display information about all interfaces assigned to a captive portal
configuration or about a specific interface assigned to a captive portal configuration. The
<1-10> is the captive portal ID. If you do not specify an interface number, all the interfaces
assigned to the captive portal configuration will be displayed.
Format
Mode
show captive-portal configuration <1-10> interface [
<unit/slot/port> ]
Privileged EXEC mode
Term
CP ID
Definition
The captive portal ID.
CP Name
Interface
The captive portal name.
The interface associated with the CP ID
The interface description
Interface
Description
Operational
Status
The operational status is enabled or disabled.
Disable Reason
Block Status
The reason if the operational status is disabled.
It shows this captive portal instance block all traffic or not.
Captive Portal Commands
758
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If the interface is specified. The following term will be displayed.
Term
Definition
Authenticated
users
The number of authenticated users associated with the CP ID.
Example
(Switch)#show captive-portal configuration 1 interface
CP ID..................................... 1
CP Name................................... cp1
Operational
Block
Interface
---------
Unit:1Slot:0Port:1
Interface Description
---------------------
Status
----------------
Blocked
Status
----------1/0/1
Disabled
(Switch)#show captive-portal configuration 1 interface 1/0/1
CP ID..................................... 1
CP Name................................... cp1
Interface................................. 1/0/1
Interface Description..................... Unit: 1 Slot: 0 Port: 1 Gigab
Operational Status........................ Disabled
Disable Reason............................ Interface Not Attached
Block Status.............................. Not Blocked
Authenticated Users....................... 0
show captive-portal configuration status
Use this command to display information about all configured captive portal configurations or
about a specific captive portal configuration. The <1-10> is captive portal ID. If <1-10> is not
entered, all the configurations are displayed.
Format
Mode
show captive-portal configuration [ <1-10> ] status
Privileged EXEC mode
Term
CP ID
Definition
The captive portal instance ID
The captive portal instance name
The operational mode is enabled or disabled.
The protocol mode is https or http.
CP Name
Mode
Protocol Mode
Verification Mode
The user verification mode has three modes: guest, local and radius. The default is
guest mode.
Captive Portal Commands
759
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If the interface is specified, the following terms are displayed.
Term
Definition
Group Name
The name of the group associated with this captive portal instance.
The redirect mode for this captive portal instance
Redirect URL
Mode
Redirect URL
Session Timeout
Idle Timeout
The redirect URL is up to 512 characters.
Logout once session timeout is reached (seconds).
Logout once idle timeout is reached (seconds).
Max Bandwidth
Up
Maximum client transmit rate (b/s). Limits the bandwidth at which the client can send
data into the network.
Max Bandwidth
Down
Maximum client receive rate (b/s). Limits the bandwidth at which the client can receive
data from the network.
Max Input Octets
Maximum number of octets the
user is allowed to transmit.After this limit has been reached the user will be
disconnected.
Max Output
Octets
Maximum number of octets the user is allowed to receive. After this limit has been
reached the user will be disconnected.
Max Total Octets
Maximum number of octets the user is allowed to transfer (sum of octets transmitted
and received). After this limit has been reached the user will be disconnected.
Example
(switch)#show captive-portal configuration status
CP ID
-----
1
2
3
CP Name
----------
cp1
Mode
Protocol
Verification
------------
Guest
Local
Guest
-------- --------
Enable
Enable
Disable
https
http
https
cp2
cp3
(switch)#show captive-portal configuration 1 status
CP ID.......................................... 1
CP Name........................................ cp1
Mode........................................... Enabled
Protocol Mode.................................. https
Verification Mode.............................. Guest
Group Name..................................... group123
Redirect URL Mode.............................. Enabled
Redirect URL................................... www.cnn.com
Session Timeout (seconds)...................... 86400
Idle Timeout (seconds)......................... 600
Max Bandwidth Up (bytes/sec)................... 0
Max Bandwidth Down (bytes/sec)................. 0
Max Input Octets (bytes)....................... 0
Max Output Octets (bytes)...................... 0
Max Total Octets (bytes)....................... 0
Captive Portal Commands
760
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show captive-portal configuration locales
Use this command to display locales associated with a specific captive portal configuration.
<1-10> is captive port ID.
Format
Mode
show captive-portal configuration <1-10> locales
Privileged EXEC mode
Example
(switch)#show captive-portal configuration 1 locales
Locale Code
---------------
En
show captive-portal trapflags
Use this command to display which captive portal traps are enabled.
Format
Mode
show captive-portal trapflags
Privileged EXEC mode
Example
(switch)#show captive-portal trapflags
Client Authentication Failure Traps............ Disable
Client Connection Traps........................ Disable
Client Database Full Traps..................... Disable
Client Disconnection Traps..................... Disable
Captive Portal Client Connection Commands
This section describes captive portal client connection commands.
show captive-portal client status
Use this command to display client connection details or a connection summary for
connected captive portal users. macaddr is Client MAC address. If no macaddr is entered, all
the client status will be displayed.
Format
Mode
show captive-portal client [ macaddr ] status
Privileged EXEC mode
Captive Portal Commands
761
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Client MAC
Address
The MAC address of the authenticated user
Client IP Address
Protocol
The IP address of the authenticated user
The protocol the user is using to access the network.
The verification mode for this client.
Verification
Session Time
The current session time since the client is authenticated.
If the macaddr is specified, the following terms are displayed.
Term
Definition
CP ID
The captive portal ID associated with the client
The captive portal name associated with the client
The interface on which the client authenticated.
The interface description
CP Name
Interface
Interface
Description
User Name
The name of the client who is authenticated.
Example
(switch)#show captive-portal client status
Client MAC Address Client IP Address Protocol Verification Session
Time
----------------- ---------------- -------- ------------ -----
0002.BC00.1290
0002.BC00.1291
0002.BC00.1292
10.254.96.47
10.254.96.48
10.254.96.49
https
https
https
Local
Local
Radius
0d:00:01:20
0d:00:05:20
0d:00:00:20
(switch)#show captive-portal client 0002.BC00.1290 status
Client MAC Address........................ 0002.BC00.1290
Client IP Address......................... 10.254.96.47
Protocol Mode............................. https
Verification Mode......................... Local
CP ID..................................... 1
CP Name................................... cp1
Interface................................. 1/0/1
Interface Description..................... Unit: 1 Slot: 0 Port: 1 Gigabit - Level
User Name................................. user123
Session Time.............................. 0d:00:00:13
Captive Portal Commands
762
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show captive-portal client statistics
Use this command to display the statistics for a specific captive portal client. The macaddr is
client MAC address.
Format
show captive-portal client <macaddr> statistics
Mode
Privileged EXEC mode
Term
Definition
Client MAC
address
The MAC address of the authenticated client
Bytes Received
The number of bytes received from the client
Bytes Transmitted
Packets Received
The number of bytes transmitted to the client
The number of packets received from the client
The number of packets transmitted from the client
Packets
Transmitted
Example
(switch)#show captive-portal client 0102.0304.0506 statistics
Client MAC Address........................ 0002.bc00.1290
Bytes Received............................ 0
Bytes Transmitted......................... 0
Packets Received.......................... 0
Packets Transmitted....................... 0
show captive-portal interface client status
Use this command to display information about clients authenticated on all interfaces or a
specific interface
Format
Mode
show captive-portal interface [<unit/slot/port>] client status
Privileged EXEC mode
Term
Definition
Client Intf
Interface on which the clients are authenticated.
The interface description
Client Intf
Description
MAC Address
IP Address
The MAC address of the authenticated user.
The IP address of the authenticated user.
Captive Portal Commands
763
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If the interface is specified, the following terms are displayed.
Term
Definition
CP ID
The ID of the captive portal associated with the client
The name of the captive portal associated with the client
The protocol the client is using
CP Name
Protocol
Verification
The user verification mode
Example
(switch)#show captive-portal interface client status
Client
Client
Intf
Intf Description
MAC Address
IP Address
------
-----------------------------------
-----------------
---------------
1/0/1
1/0/2
1/0/3
Unit: 1 Slot: 0 Port: 1 Gigabit
Unit: 1 Slot: 0 Port: 2 Gigabit
Unit: 1 Slot: 0 Port: 3 Gigabit
0002.BC00.1290
0002.BC00.1292
0002.BC00.1293
10.254.96.47
10.254.96.49
10.254.96.50
(switch)#show captive-portal interface 1/0/1 client status
Interface................................. 1/0/1
Interface Description..................... Unit: 1 Slot: 0 Port: 1 Gigabit
Client Client
MAC Address
-----------------
------------
IP Address
CP ID
CP Name
-----
Protocol
--------------
Verification
--------
---------------
0002.BC00.1290
0002.BC00.1291
10.254.96.47 1
10.254.96.48 2
cp1
cp2
http
http
local
local
show captive-portal configuration client status
Use this command to display the clients authenticated to all captive portal configurations or a
to specific configuration. <1-10> is the captive portal ID.
Format
show captive-portal configuration [ <1-10> ] client status
Mode
Privileged EXEC mode
Term
CP ID
Definition
The captive portal ID
CP Name
The captive portal name
Client MAC
Address
The MAC address of the client associated with the captive portal instance.
Client IP Address
Interface
The IP address of the client associated with the captive portal instance
The interface on which the client is authenticated.
Captive Portal Commands
764
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
If the CP ID is specified, the following terms are displayed.
Term
Definition
Interface
Description
The description of the interface
Example
(switch)#show captive-portal configuration client status
CP ID CP Name Client MAC Address
----- ------- ------------------
Client IP Address Interface
----------------- ---------
1
2
3
cp1
cp2
cp3
0002.BC00.1290
0002.BC00.1292
0002.BC00.1293
10.254.96.47
10.254.96.49
10.254.96.50
1/0/1
1/0/3
1/0/4
(switch)#show captive-portal configuration 1 client status
CP ID..................................... 1
CP Name................................... cp1
Client
Client
MAC Address
-------------- ------------- ---------
IP Address
Interface
Interface Description
----------------------
0002.BC00.1290 10.254.96.47
0002.BC00.1291 10.254.96.48
1/0/1 Unit:1 Slot:0 Port:1 Gigabit
1/0/2 Unit:1 Slot:0 Port:2 Gigabit
captive-portal client deauthenticate
Use this command to deauthenticate a specific captive portal client. The macaddr is
the Client MAC address.
Format
Mode
captive-portal client deauthenticate [<macaddr>|<1-10>]
Privileged EXEC mode
Captive Portal Interface Commands
The following section describes captive portal interface commands.
show captive-portal interface configuration status
Use this command to display the interface to configuration assignments for all captive portal
configurations or for a specific configuration. <1-10> is the captive portal ID.
Format
Mode
show captive-portal interface configuration [ <1-10>] status
Privileged EXEC mode
Term
CP ID
Definition
The captive portal ID
The captive portal name
CP Name
Captive Portal Commands
765
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Interface
The interface associated with the CP ID.
The description of the interface
Interface
Description
Type
The type of the interface
Example
(switch)#show captive-portal interface configuration status
CP ID CP Name Interface Interface Description
----- ------------ --------- ----------------------------
Default 1/0/1 Unit: 1 Slot: 0 Port: 1 Gigabit
Type
--------
Physical
1
(switch)#show captive-portal interface configuration 1 status
CP ID..................................... 1
CP Name................................... cp1
Interface
---------
1/0/1
Interface Description
--------------------------------- --------
Unit: 1 Slot: 0 Port: 1 Gigabit Physical
Type
Captive Portal Local User Commands
The following section describes captive portal local user commands.
user password
Use this command to create a local user or change the password for an existing user. The
user-id is user ID in the range of 1-128. The password is the user password in the range of
8-64 characters. You can also enter encrypted password using the parameter encrypted.
Format
user user-id password { password | encrypted enc-password }
Mode
Captive Portal Configuration mode
no user
Use this command to delete a user from the local user database. If the user has an existing
session, it is disconnected.
Format
Mode
no user user-id <1-128>
Captive Portal Configuration mode
Captive Portal Commands
766
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
user name
Use this command to modify the user name for a local captive portal user. <1-128> is the
user ID and the name is the user name in the range of 1-32 characters. The local user must
exist before you use this command. You can create the local user using user password first.
Format
user <1-128> name name
Mode
Captive Portal Configuration mode
user group
Use this command to associate a group with a captive portal user. A user must be associated
with at least one group so the last group cannot be dis-associated. <1-128> is the user ID
and <1-10> is the group ID.
Default
1
Format
Mode
user <1-128> group <1-10>
Captive Portal Configuration mode
no user group
Use this command to dis-associate a group and user.
Format
Mode
no user <1-128> group <1-10>
Captive Portal Configuration mode
user session-timeout
Use this command to set the session timeout value for a captive portal user. Use the “no”
form of this command to reset the session timeout to the default. The range of session
timeout is 0-86400. 0 indicates use global configuration.t
Default
Format
Mode
0
user <1-128> session-timeout timeout
Captive Portal Configuration mode
no user session-timeout
Use this command to reset the session timeout to the default.
Format
Mode
no user <1-128> session-timeout
Captive Portal Configuration mode
Captive Portal Commands
767
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
user idle-timeout
Use this command to set the session idle timeout value for a captive portal user.
<1-128> is the user ID. The range of idle timeout is 0-900 seconds. 0 indicates use global
configuration.
Default
0
Format
Mode
user <1-128> idle-timeout timeout
Captive Portal Configuration mode
no user idle-timeout
Use this command to reset the idle timeout to the default value.
Format
Mode
no user <1-128> idle-timeout timeout
Captive Portal Configuration mode
user max-bandwidth-down
Use this command to configure the bandwidth at which the client can receive data from the
network. <1-128> is the user ID. The range of bps is <0-536870911> bps. 0 indicates use
global configuration.
Default
0
Format
Mode
user <1-128> max-bandwidth-down bps
Captive Portal Configuration mode
no user max-bandwidth-down
Use this command to reset the limit to the default.
Format
Mode
no user <1-128> max-bandwidth-down
Captive Portal Configuration mode
user max-bandwidth-up
Use this command to configure the bandwidth at which the client can send data into the
Network. <1-128> is the user ID. The range of bps is <0-536870911> bps. 0 indicates use
global configuration.
Default
Format
Mode
0
user <1-128> max-bandwidth-up bps
Captive Portal Configuration mode
Captive Portal Commands
768
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no user max-bandwidth-up
Use this command to reset the limit to the default.
Format
Mode
no user <1-128> max-bandwidth-up
Captive Portal Configuration mode
user max-input-octets
Use this command to limit the number of octets the user is allowed to transmit. After this limit
has been reached the user will be disconnected. <1-128> is the user ID. The range of octets
is 0-4294967295. 0 indicates to use the global limit.
Default
Format
Mode
0
user <1-128> max-input-octets octets
Captive Portal Configuration mode
no user max-input-octets
Use this command to reset the limit to the default.
Format
Mode
no user <1-128> max-input-octets
Captive Portal Configuration mode
user max-output-octets
Use this command to limit the number of octets the user is allowed to receive. After this limit
has been reached the user will be disconnected. The <1-128> is the user ID. The range of
the octets is 0 – 4294967295. 0 indicates to use the global limit.
Default
Format
Mode
0
user <1-128> max-output-octets octets
Captive Portal Configuration mode
no user max-output-octets
Use this command to reset the limit to the default.
Default
Format
Mode
0
no user <1-128> max-output-octets
Captive Portal Configuration mode
user max-total-octets
Use this command to limit the number of bytes the user is allowed to transmit and receive.
The maximum number of octets is the sum of octets transmitted and received. After this limit
Captive Portal Commands
769
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
has been reached the user will be disconnected. <1-128> is the user ID. The range of octets
is 0-4294967295. 0 indicates to use the global limit. Use the “no” form of this command to
reset the limit to the default.
Default
0
Format
Mode
user <1-128> max-total-octets octets
Captive Portal Configuration mode
no user max-total-octets
Use this command to reset the limit to the default.
Format
Mode
no user <1-128> max-total-octets
Captive Portal Configuration mode
show captive-portal user
Use this command to display all configured users or a specific user in the captive portal local
user database.
Format
Mode
show captive-portal user [ <1-128> ]
Privileged EXEC mode
Term
Definition
User ID
The user ID
The user name
User Name
Session Timeout
Logout once session timeout is reached (seconds). If the value is 0 then use the value
configured for the captive portal.
Idle Timeout
Logout once idle timeout is reached (seconds). If the attribute is 0 then use the value
configured for the captive portal.
Group ID
The group ID associated with the user
The group name
Group Name
If the user ID is specified, the following terms are displayed.
Term
Definition
Password
Configured
If the password is configured.
Max Bandwidth
Up (bytes/sec)
Maximum client transmit rate (b/s). Limits the bandwidth at which the client can send
data into the network. If the value is 0 then use the value configured for the captive
portal.
Captive Portal Commands
770
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Term
Definition
Max Bandwidth
Down (bytes/sec)
Maximum client receive rate (b/s). Limits the bandwidth at which the client can receive
data from the network. If the value is 0 or then use the value configured for the captive
portal.
Max Input Octets
(bytes)
Maximum number of octets the user is allowed to transmit.After this limit has been
reached the user will be disconnected. If the value is 0 then use the value configured
for the captive portal.
Max Output
Octets (bytes)
Maximum number of octets the user is allowed to receive. After this limit has been
reached the user will be disconnected. If the attribute is 0 then use the value
configured for the captive portal.
Max Total Octets
(bytes)
Maximum number of octets the user is allowed to transfer (sum of octets transmitted
and received). After this limit has been reached the user will be disconnected. If the
value is 0 then use the value configured for the captive portal.
Example
(switch)#show captive-portal user
Session
Idle
Timeout
User ID User Name
Timeout
Group ID
--------
Group Name
-----------
Default
------- --------------
--------
--------
1
2
user123
user234
10
0
13
0
1
1
Default
(switch)#show captive-portal user 1
User ID........................................ 1
User Name...................................... user123
Password Configured............................ Yes
Session Timeout................................ 0
Idle Timeout................................... 0
Max Bandwidth Up (bytes/sec)................... 0
Max Bandwidth Down (bytes/sec)................. 0
Max Input Octets (bytes)....................... 0
Max Output Octets (bytes)...................... 0
Max Total Octets (bytes)....................... 0
Group ID
Group Name
-------- --------------------------------
1
2
Default
group2
clear captive-portal users
Use this command to delete all captive portal user entries.
Format
Mode
clear captive-portal users
Privileged EXEC mode
Captive Portal Commands
771
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
Captive Portal User Group Commands
The following section describes captive portal user group commands.
user group (Create)
Use this command to create a user group. User group 1 is created by default and cannot be
deleted.
Default
1
Format
Mode
user group <1-10>
Captive Portal Configuration mode
no user group
Use this command to delete a user group. The default user group (1) cannot be deleted.
Format
Mode
user group <1-10>
Captive Portal Configuration mode
user group name
Use this command to configure a group name. <1-10> is the user group ID. The name can be
a string up to 32 characters.
Format
Mode
user group <1-10> name name
Captive Portal Configuration mode
user group rename
Use this command to change a group's ID to a different group ID.
Format
Mode
user group group-id rename new-group-id
Captive Portal Configuration mode
Captive Portal Commands
772
Download from Www.Somanuals.com. All Manuals Search And Download.
15.
Command List
15
{deny | permit} (IP ACL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
{deny | permit} (IPv6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
{deny | permit} (MAC ACL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
1583compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
aaa accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
aaa authentication login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
aaa authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
absolute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
accounting (Console/Telnet/SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
acl-trapflags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
addport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
area default-cost (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
area default-cost (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
area nssa default-info-originate (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
area nssa no-summary (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
area nssa no-summary (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
area nssa translator-role (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
area nssa translator-role (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
area nssa translator-stab-intv (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
area nssa translator-stab-intv (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
area range (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
area range (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
area stub (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
area stub (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
area virtual-link (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
area virtual-link (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
area virtual-link authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
773
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
area virtual-link dead-interval (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
area virtual-link dead-interval (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
area virtual-link retransmit-interval (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
area virtual-link retransmit-interval (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
area virtual-link transmit-delay (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
arp access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
arp cachesize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
arp dynamicrenew . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
arp purge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
arp resptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
arp retries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
arp timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
assign-queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
authentication timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
authorization(console/telnet/ssh) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
auto-cost (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
auto-cost (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
auto-negotiate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
auto-negotiate all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
auto-summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
auto-voip oui-based priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
auto-voip protocol-based {remark | traffic-class} . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
boot auto-copy-sw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
boot auto-copy-sw allow-downgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
boot autoinstall start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
boot autoinstall stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
boot host auto-save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
boot host dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
boot host retry-count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
boot system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
bootfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
bootpdhcprelay cidoptmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
bootpdhcprelay maxhopcount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
bridge aging-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
cablestatus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
capability opaque . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
captive-portal client deauthenticate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
captive-portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
capture {start|stop} . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Command List
774
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
capture line wrap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
capture remote port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
class-map rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
classofservice dot1p-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
classofservice ip-dscp-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
clear aaa ias-users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
clear arp-switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
clear captive-portal users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
clear config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
clear dot1x statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
clear eventlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
clear host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
clear igmpsnooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
clear ip arp inspection statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
clear ip dhcp server statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
clear ip helper statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
clear ip ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
clear ip ospf counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
clear ip ospf neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
clear ip ospf neighbor interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
clear ip ospf stub-router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
clear ip route all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
clear ip route counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
clear ipv6 dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
clear ipv6 neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
clear ipv6 ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
clear ipv6 ospf counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
clear ipv6 ospf neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
clear ipv6 route counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
clear ipv6 statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
clear isdp counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
clear isdp table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
clear lldp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Command List
775
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
clear radius statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
clear traplog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
clear vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
client-identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
clock set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
clock summer-time date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
clock summer-time recurring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
clock timezone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
conform-color . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
copy (pre-login banner) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
cos-queue min-bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
cos-queue random-detect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
cos-queue strict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
crypto certificate generate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
crypto key generate rsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
datacenter-bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
debug aaa accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
debug arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
debug auto-voip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
debug console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
debug dot1x packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600
debug igmpsnooping packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
debug igmpsnooping packet receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
debug ip acl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
debug ip igmp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
debug ip mcache packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
debug ip pimdm packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
debug ip pimsm packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
debug ip vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
debug ipv6 mld packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
debug ipv6 pimdm packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Command List
776
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
debug isdp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
debug lacp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
debug ospf packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
debug ping packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
debug spanning-tree bpdu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
debug spanning-tree bpdu transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
default-information originate (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
default-information originate (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
default-information originate (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
default-metric (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
default-router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
deleteport (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
dhcp client vendor-id-option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
dhcp client vendor-id-option-string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
dhcp l2relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
dhcp l2relay circuit-id vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
dhcp l2relay remote-id vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
dhcp l2relay trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
diffserv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
disconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
distance ospf (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
distance ospf (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
distance rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
distribute-list out (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
distribute-list out (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
dns-server (IPv6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
domain-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
domain-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
domain-name enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
dos-control all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
dos-control icmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
dos-control icmpv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
dos-control icmpv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
dos-control l4port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
dos-control sipdip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
dos-control smacdmac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
dos-control tcpfinurgpsh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Command List
777
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
dos-control tcpflag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
dos-control tcpflagseq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
dos-control tcpfrag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
dos-control tcpport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
dos-control tcpsyn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
dos-control tcpsynfin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
dos-control udpport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
dot1x mac-auth-bypass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
dot1x max-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
dot1x pae . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
dot1x port-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
dot1x re-authenticate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
dot1x supplicant max-start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
dot1x supplicant port-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
dot1x supplicant timeout auth-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
dot1x supplicant timeout held-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
dot1x supplicant timeout start-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
dot1x supplicant user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
dot1x system-auth-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
dot1x system-auth-control monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
dot1x timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
dot1x unauthenticated-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
drop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
dvlan-tunnel ethertype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
enable (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
enable (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
enable (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
enable authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
enable password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
enable (Instance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
erase startup-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
exit-overflow-interval (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
exit-overflow-interval (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
external-lsdb-limit (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
external-lsdb-limit (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
ezconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
filedescr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
flowcontrol {symmetric|asymmetric} . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752
hardware-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
Command List
778
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
hostroutesaccept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
http port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 748
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
interface lag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
interface loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
interface vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
interface (Captive Portal) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
ip access-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
ip access-list rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
ip address dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
ip address-conflict-detect run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
ip arp inspection filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
ip arp inspection limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
ip arp inspection trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
ip arp inspection validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
ip arp inspection vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
ip arp inspection vlan logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
ip default-gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
ip dhcp bootp automatic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
ip dhcp conflict logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
ip dhcp pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
ip dhcp snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
ip dhcp snooping database write-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
ip dhcp snooping log-invalid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
ip dhcp snooping trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
ip domain lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
ip domain name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
ip domain retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
ip domain timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
ip dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
ip dvmrp(Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
ip helper enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
ip helper-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
ip helper-address discard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Command List
779
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip http authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
ip http java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
ip http secure-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
ip http secure-protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658
ip http secure-session hard-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
ip http session hard-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
ip http/https accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
ip https authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
ip icmp echo-reply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
ip igmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
ip igmp last-member-query-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
ip igmp query-max-response-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
ip igmp robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
ip igmp startup-query-count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
ip igmp version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
ip igmp-proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
ip igmp-proxy reset-status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
ip irdp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
ip irdp maxadvertinterval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
ip irdp minadvertinterval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
ip irdp multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
ip irdp preference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
ip local-proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
ip mcast boundary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
ip mroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
ip mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
ip multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
ip multicast ttl-threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
ip name server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
ip netdirbcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
ip ospf authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
ip ospf cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
ip ospf database-filter all out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
ip ospf hello-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
ip ospf network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
ip ospf retransmit-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Command List
780
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ip ospf transmit-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
ip pim (Interface Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
ip pim bsr-border . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
ip pim bsr-candidate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
ip pim dense (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
ip pim dr-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
ip pim join-prune-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
ip pim rp-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
ip pim sparse(Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
ip pim ssm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
ip redirects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
ip rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
ip rip authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
ip rip send version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
ip route default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
ip route distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
ip ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
ip ssh protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
ip ssh server enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
ip telnet server enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644
ip unreachables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
ip verify source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
ip vrrp (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
ip vrrp authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
ip vrrp ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
ip vrrp mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
ip vrrp preempt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
ip vrrp priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
ip vrrp timers advertise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
ip vrrp track interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
ip vrrp track ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
ipv6 access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
ipv6 access-list rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
ipv6 address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
ipv6 address autoconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
ipv6 address dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
ipv6 dhcp pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
ipv6 dhcp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
ipv6 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
ipv6 hop-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
ipv6 host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Command List
781
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
ipv6 mld last-member-query-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
ipv6 mld query-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
ipv6 mld query-max-response-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
ipv6 mld router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
ipv6 mld-proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
ipv6 mld-proxy reset-status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
ipv6 mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
ipv6 nd dad attempts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
ipv6 nd managed-config-flag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
ipv6 nd ns-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
ipv6 nd suppress-ra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
ipv6 ospf cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
ipv6 ospf dead-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
ipv6 ospf hello-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
ipv6 ospf network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
ipv6 ospf priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
ipv6 ospf retransmit-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
ipv6 ospf transmit-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
ipv6 pim (Interface Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
ipv6 pim bsr-candidate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
ipv6 pim dense(Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
ipv6 pim dr-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
ipv6 pim join-prune-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
ipv6 pim rp-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
ipv6 pim ssm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
ipv6 route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
ipv6 route distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
ipv6 traffic-filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
ipv6 unicast-routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
ipv6 unreachables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
iscsi cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
isdp advertise-v2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
isdp holdtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Command List
782
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
isdp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
lacp actor admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
lacp actor admin state individual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
lacp actor admin state passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
lacp actor system priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
lacp admin key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
lacp partner admin key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
lacp partner admin state longtimeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
lacp partner admin state passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
lacp partner port id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
lacp partner port priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
lacp partner system id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
lacp partner system priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
lldp med . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
lldp med all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
lldp med confignotification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
lldp med confignotification all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
lldp med faststartrepeatcount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
lldp med transmit-tlv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
lldp notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
lldp receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
lldp timers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
lldp transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
lldp transmit-mgmt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
lldp transmit-tlv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
llpf blockall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
locale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
logging buffered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
logging email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
logging email from-addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
logging email logtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
logging email message-type subject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
logging email message-type to-addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
logging email test message-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
logging email urgent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
logging host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
Command List
783
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
logging persistent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
logging syslog source-interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
login authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
logout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
mac access-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
mac access-list extended . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
mac access-list extended rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
mac address-table multicast forbidden-unregistered vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
mac address-table multicast forbidden-unregistered vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
mac address-table multicast forward-all vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
mac address-table multicast forward-all vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
macfilter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
macfilter adddest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
macfilter adddest all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
macfilter addsrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
macfilter addsrc all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
mail-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
mark cos-as-sec-cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
mark ip-precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
match class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
match destination-address mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
match ethertype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
match ip dscp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
match ip precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
match ip tos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
match ip6flowlbl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
match protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
match secondary cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
match secondary-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
match source-address mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
match vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
max-bandwidth-down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
max-bandwidth-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
max-metric router-lsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Command List
784
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
max-total-octets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
memory free low-watermark processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
mode dot1q-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
mode dvlan-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
monitor session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
movemanagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
mvr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
mvr group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
mvr immediate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
mvr mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
mvr type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
mvr vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
mvr vlan group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
network (DHCP Pool Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
network area (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
network ipv6 address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
network ipv6 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
network javamode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
network mac-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
network mac-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
network mgmt_vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
network parms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
network protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
next-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584
no boot auto-copy-sw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
no boot auto-copy-sw trap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
no clock summer-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
no cos-queue random-detect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
no ip vrrp vrid accept-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
no llpf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
no nsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
no nsf [ietf] helper strict-lsa-checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
no nsf [ietf] helper strict-lsa-checking (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
no nsf helper (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
no set mld querier election participate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Command List
785
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
no set mld querier query_interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
no set mld querier timer expiry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
nsf (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
nsf restart-interval (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
passive-interface (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
passive-interface (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
passive-interface default (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
passive-interface default (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
password (AAA IAS User Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
passwords aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
passwords strength exclude-keyword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
passwords strength maximum consecutive-characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
passwords strength minimum character-classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
passwords strength minimum uppercase-letters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
passwords strength-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
periodic {start|end} time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
permit ip host mac host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
ping ipv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
ping ipv6 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
poe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
poe detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
poe power limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
poe priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
poe reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
poe traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
poe usagethreshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
police-simple . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
police-two-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
policy-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
port lacpmode enable all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Command List
786
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
port lacptimeout (Interface Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
port-channel adminmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
port-channel load-balance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
port-channel name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
port-channel static . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
port-channel system priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
port-security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
port-security mac-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
port-security mac-address move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
port-security mac-address sticky . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
port-security max-dynamic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
port-security max-static . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
prefix-delegation (IPv6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
priority-flow-control mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
priority-flow-control priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
private-group name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
process cpu threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
protocol vlan group all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
quit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
radius accounting mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
radius server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
radius server msgauth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
radius server primary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
radius server retransmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
radius server timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
random-detect exponential weighting-constant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
random-detect queue-parms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
redirect (Captive Portal) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
redirect-url . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
redistribute (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
reload (Stack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
RFC 2819 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
RFC 3273 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
RFC 3434 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
rmon alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
rmon collection history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Command List
787
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
rmon event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
rmon hcalarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
router ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
router-id (OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
script apply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
script delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
script list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
script show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
script validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
sdm prefer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
serial baudrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
serial timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
service dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
service dhcpv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
service-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
session-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
session-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
session-timeout (Captive Portal) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
set garp timer leave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
set garp timer leaveall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
set gmrp adminmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
set gmrp interfacemode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
set igmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
set igmp fast-leave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
set igmp groupmembership-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
set igmp header-validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
set igmp interfacemode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
set igmp maxresponse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
set igmp mcrtrexpiretime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
set igmp mrouter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
set igmp mrouter interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
set igmp querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
set igmp querier timer expiry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
set mld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
set mld fast-leave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
set mld groupmembership-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
set mld interfacemode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Command List
788
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
set mld maxresponse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
set mld mcrtexpiretime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
set mld mrouter interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
set slot disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
set slot power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
sflow poller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
sflow receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
sflow sampler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
show access-lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
show accounting methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
show arp access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
show arp switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
show arp switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
show autoinstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
show bootpdhcprelay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
show bootvar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
show captive-portal client statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
show captive-portal configuration interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
show captive-portal configuration status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
show captive-portal interface client status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
show captive-portal interface configuration status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
show captive-portal status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
show captive-portal trapflags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
show checkpoint statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
show class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
show classofservice ip-dscp-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
show classofservice trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
show clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
show dampening interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
show dhcp client vendor-id-option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
show dhcp l2relay agent-option vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
show dhcp l2relay all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
show dhcp l2relay interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
show dhcp l2relay stats interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Command List
789
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show diffserv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
show diffserv service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
show diffserv service brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
show domain-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
show dos-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
show dot1q-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
show dot1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
show dot1x authentication-history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
show dot1x clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
show dot1x users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
show dvlan-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
show eventlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
show forwardingdb agetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
show gmrp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
show gvrp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
show hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
show igmpsnooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
show igmpsnooping mrouter interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
show igmpsnooping querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
show interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
show interface counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
show interface dampening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
show interface ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
show interface ethernet <unit/slot/port> switchport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
show interface tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
show interfaces switchport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
show ip access-lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
show ip arp inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
show ip arp inspection interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
show ip arp inspection statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
show ip brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
show ip dhcp binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
show ip dhcp conflict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590
show ip dhcp global configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
show ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
show ip dhcp snooping interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
show ip dhcp snooping statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
show ip dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
show ip dvmrp interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Command List
790
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip dvmrp neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
show ip dvmrp prune . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
show ip dvmrp route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
show ip helper statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
show ip helper-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
show ip http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658
show ip igmp interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
show ip igmp interface stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
show ip igmp-proxy interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
show ip irdp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
show ip mcast interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
show ip mcast mroute group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
show ip ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
show ip ospf abr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
show ip ospf area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
show ip ospf asbr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
show ip ospf database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
show ip ospf database database-summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
show ip ospf interface stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
show ip ospf range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
show ip ospf traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
show ip ospf virtual-link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
show ip ospf virtual-link brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
show ip pim bsr-router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
show ip pim interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
show ip pim neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
show ip pim rp mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
show ip pim rp-hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
show ip protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
show ip rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
show ip rip interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
show ip rip interface brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Command List
791
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
show ip route ecmp-groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
show ip route preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
show ip route summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
show ip verify source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
show ip vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
show ip vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
show ip vrrp interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
show ip vrrp interface brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
show ipv6 access-lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
show ipv6 brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
show ipv6 dhcp binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
show ipv6 dhcp interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
show ipv6 dhcp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
show ipv6 mld interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
show ipv6 mld-proxy groups detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
show ipv6 mld-proxy interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
show ipv6 mroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
show ipv6 mroute source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
show ipv6 neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
show ipv6 ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
show ipv6 ospf abr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
show ipv6 ospf area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
show ipv6 ospf asbr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
show ipv6 ospf database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
show ipv6 ospf database database-summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
show ipv6 ospf interface stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
show ipv6 ospf range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
show ipv6 pim bsr-router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
show ipv6 pim interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
show ipv6 pim neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
show ipv6 pim rp mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
show ipv6 pim rp-hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Command List
792
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show ipv6 route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
show ipv6 route ecmp-groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
show ipv6 route preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
show ipv6 traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
show ipv6 vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
show iscsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
show iscsi sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
show isdp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
show isdp traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
show lacp partner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
show lldp interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
show lldp med interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
show lldp med remote-device detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
show lldp remote-device detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
show lldp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
show llpf interface all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
show logging buffered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
show logging email config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
show logging email statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
show loginsession . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
show mac access-lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
show mac-address-table gmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
show mac-address-table multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
show mac-address-table staticfiltering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
show mac-address-table stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
show mac-addr-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
show mail-server config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
show mbuf total . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
show mldsnooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
show mldsnooping mrouter interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Command List
793
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show mvr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
show mvr interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
show mvr members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
show mvr traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
show network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
show network ipv6 dhcp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
show network ndp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
show nsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
show passwords configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
show poe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
show poe port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
show poe port info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
show policy-map interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
show port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
show port description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
show port protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
show port status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
show port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
show port-channel brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
show port-channel system priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
show port-security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
show port-security dynamic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
show port-security violation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
show radius . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
show radius accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
show radius accounting statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
show radius servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
show radius statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
show rmon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
show rmon {hcalarms | hcalarm <alarm index>} . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
show rmon collection history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
show rmon events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
show rmon history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
show rmon log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
show rmon statistics interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
show routing heap summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
show running-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
show serial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
show service-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
show sflow agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
show sflow pollers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
show sflow receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Command List
794
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
show sflow samplers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
show snmpcommunity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
show snmptrap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
show sntp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
show sntp client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
show sntp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
show spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
show spanning-tree brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
show spanning-tree interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
show spanning-tree mst port summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
show spanning-tree mst port summary active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
show spanning-tree mst summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
show spanning-tree summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
show stack-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
show stack-port counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
show storm-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
show supported cardtype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
show supported switchtype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
show switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
show switchport protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
show tacacs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
show tech-support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
show tech-support techsupport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
show telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
show telnetcon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
show trapflags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
show udld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
show udld <slot/port> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
show users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
show users accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
show users accounts detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
show users long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
show vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
show vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
show vlan brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
show vlan port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
show voice vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
shutdown all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Command List
795
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
snmp trap link-status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
snmp trap link-status all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
snmp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
snmp-server community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
snmp-server community ipaddr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
snmp-server community mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
snmp-server community rw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
snmp-server enable traps linkmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
snmp-server enable traps multiusers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
snmp-server enable traps stpmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
snmptrap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
snmptrap ipaddr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
snmptrap mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
sntp broadcast client poll-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
sntp client mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
sntp client port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
sntp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
sntp unicast client poll-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
sntp unicast client poll-retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
sntp unicast client poll-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
spanning-tree auto-edge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
spanning-tree bpdufilter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
spanning-tree bpdufilter default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
spanning-tree bpduforwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
spanning-tree bpduguard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
spanning-tree bpdumigrationcheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
spanning-tree configuration name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
spanning-tree edgeport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
spanning-tree edgeport all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
spanning-tree guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
spanning-tree max-age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
spanning-tree mst instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
spanning-tree port mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
spanning-tree port mode all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
spanning-tree tcnguard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
split-horizon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Command List
796
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
sshcon maxsessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
sshcon timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
stack-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
storm-control broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
storm-control broadcast (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
storm-control broadcast level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
storm-control broadcast level (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
storm-control multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
storm-control multicast (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
storm-control multicast level (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
storm-control multicast rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
storm-control multicast rate (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
storm-control unicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
storm-control unicast (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
storm-control unicast level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
storm-control unicast level (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
storm-control unicast rate (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
switch priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
switch renumber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
switchport mode private-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
switchport private-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
switchport private-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
switchport protected (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
tacacs-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
tacacs-server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
tacacs-server source interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
tacacs-server timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
telnetcon maxsessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
telnetcon timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
terminal length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
time-range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
timers pacing flood . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
timers pacing lsa-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
timers spf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
traceroute ipv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
traffic-shape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
tunnel destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Command List
797
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
tunnel mode ipv6ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
tunnel source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
udld message time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
udld port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
udld reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
udld timeout interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
user group (Create) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
user group name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
user group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
user max-bandwidth-down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
user max-bandwidth-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
user max-total-octets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
user name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
user password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766
user session-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
username snmpv3 encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752
vlan acceptframe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
vlan association mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
vlan association subnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
vlan ingressfilter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
vlan participation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
vlan participation all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
vlan port acceptframe all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
vlan port ingressfilter all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
vlan port priority all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
vlan port pvid all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
vlan port tagging all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
vlan protocol group add protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
vlan pvid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Command List
798
Download from Www.Somanuals.com. All Manuals Search And Download.
ProSafe Managed Switch
vlan tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
voice vlan (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
voice vlan data priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
write memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Command List
799
Download from Www.Somanuals.com. All Manuals Search And Download.
|