EdgeSwitch CLI Command Reference UG
EdgeSwitch CLI Command Reference UG
Table of Contents
Telnet Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
ip telnet server enable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
transport input telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
telnetcon maxsessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
telnetcon timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
show telnetcon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Secure Shell Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
ip ssh. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
ip ssh protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
ip ssh server enable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
sshcon maxsessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
sshcon timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
show ip ssh. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Management Security Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
crypto certificate generate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
crypto key generate rsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
crypto key generate dsa. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Hypertext Transfer Protocol Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
ip http accounting exec, ip https accounting exec. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
ip http authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
ip https authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
ip http server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
ip http secure-server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
ip http session hard-timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
ip http session maxsessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
ip http session soft-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
ip http secure-session hard-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
ip http secure-session maxsessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
ip http secure-session soft-timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
ip http secure-port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
ip http secure-protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
show ip http. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Access Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
disconnect. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
show loginsession. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
show loginsession long. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
User Account Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
aaa authentication login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
aaa authentication enable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
aaa authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
show authorization methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
enable authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
username (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
tacacs-server source-interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
tacacs-server timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
keystring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
priority (TACACS Config). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
show tacacs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
show tacacs source-interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Configuration Scripting Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
script apply. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
script delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
script list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
script show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
script validate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Prelogin Banner, System Prompt, and Host Name Commands. . . . . . . . . . . . . . . . . . . . . . . . 99
copy (pre-login banner). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
set prompt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
hostname. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
show clibanner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
set clibanner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Document Organization
This guide contains the following sections:
Chapter 1: Using the Command Line Interface on page 28
Chapter 2: Management Commands on page 37
Chapter 3: Utility Commands on page 101
Chapter 4: Switching Commands on page 196
Chapter 5: Routing Commands on page 315
Chapter 6: IPv6 Management Commands on page 357
Chapter 7: Quality of Service Commands on page 361
Chapter 8: Power over Ethernet (PoE) Commands on page 410
Appendix A: Log Messages on page 413
Appendix B: Contact Information on page 431
Related Documents
Related documents for EdgeSwitch products include the following:
EdgeSwitch Administration Guide
EdgeSwitch ES-24 Quick Start Guide
EdgeSwitch ES-48 Quick Start Guide
To download EdgeSwitch documents:
1. Go to the Downloads page on the Ubiquiti website: http://www.ubnt.com/download/
2. Select EdgeMAX from the Platform drop-down box.
3. Select EdgeSwitch from the Product Group drop-down box.
4. Select your EdgeSwitch model from the Model drop-down box.
5. Scroll down to Documentation PDFs and click the document to download.
For additional information, refer to the EdgeSwitch community web site: community.ubnt.com/edgemax
Typographical Conventions
Table 2 lists typographical conventions used throughout this document.
Table 2. Typographical Conventions
Convention Indicates Example
Bold User selection Select VLAN 2 from the VLAN ID list; Click Submit
User-entered text enter 3 to assign VLAN 3 as the default VLAN
Italic Name of a field delete the existing name in the Username field
Name of UI page, dialog box, window, etc. Use the IP Address Conflict Detection page
> Order of navigation selections to access a page To access the Session page, click System > Users > Session
Courier font CLI commands and their output show network
Command Syntax
A command is one or more words that might be followed by one or more parameters. Parameters can be
required or optional values.
Some commands, such as show network or clear vlan, do not require parameters. Other commands, such as
network parms, require that you supply a value after the command. You must type the parameter values in
a specific order, and optional parameters follow required parameters. The following example describes the
network parms command syntax:
network parms ipaddr netmask [gateway]
network parms is the command name.
ipaddr and netmask are parameters and represent required values that you must enter after you
type the command keywords.
[gateway] is an optional parameter; you are not required to enter a value in place of the parameter.
The CLI Command Reference lists each command by the command name and provides a brief description of
the command. Each command reference also contains the following information:
Format shows the command keywords and the required and optional parameters.
Mode identifies the command mode you must be in to access the command.
Default shows the default value, if any, of a configurable setting on the device.
The show commands also contain a description of the information that the command shows.
Command Conventions
The parameters for a command might include mandatory values, optional values, or keyword choices.
Parameters are order-dependent. Table 3 describes the conventions this document uses to distinguish
between value types.
Table 3. Parameter Conventions
Symbol Example Description
[ ] square brackets [value] Indicates an optional parameter
italic font value or [value] Indicates a variable value. Specify an appropriate value (name or number).
{ } curly braces {choice1 | choice2} Indicates that you must select a parameter from the list of choices
| vertical bar choice1 | choice2 Separates mutually exclusive choices
[ { } ] braces within [{choice1 | choice2}] Indicates a choice within an optional element
square brackets
The port identifies the specific physical port or logical interface being managed on a given slot.
Table 6. Types of Ports
Parameter Description
Physical Ports The physical ports for each slot are numbered sequentially starting from one.
For example, port 1 on slot 0 (an internal port) for a standalone switch is 0/1, port 2 is 0/2, port 3 is 0/3, etc.
Logical Interfaces Port-channel or Link Aggregation Group (LAG) interfaces are logical interfaces only used for bridging functions.
VLAN routing interfaces are only used for routing functions.
CPU ports CPU ports are handled by the driver as one or more physical entities located on physical slots.
Note: Although some EdgeSwitch show commands already support pagination, the implementation
is unique per command and not generic to all commands.
Output Filtering
Grep-like control for modifying the displayed output to only show the user-desired content.
Filter-displayed output to only include lines containing a specified string match.
Filter-displayed output to exclude lines containing a specified string match.
Filter-displayed output to only include lines including and following a specified string match.
Filter-displayed output to only include a specified section of the content (e.g. interface 0/1) with a
configurable end-of-section delimiter.
String matching should be case-insensitive.
Pagination, when enabled, also applies to filtered output.
Example: The following shows an example of the extensions made to the CLI show commands for the Output
Filtering feature.
(UBNT EdgeSwitch) #show running-config ?
<cr> Press enter to execute the command.
| Output filter options.
<scriptname> Script file name for writing active configuration.
all Show all the running configuration on the switch.
interface Display the running configuration for specificed interface on the
switch.
(UBNT EdgeSwitch) #show running-config | ?
begin Begin with the line that matches
exclude Exclude lines that matches
include Include lines that matches
section Display portion of lines
EdgeSwitch Modules
The EdgeSwitch software consists of flexible modules that can be applied in various combinations to
develop advanced products for Layer 2 and above. The commands and command modes available on your
switch depend on the installed modules. Additionally, for some show commands, the output fields might
change based on the modules included in the EdgeSwitch software.
The EdgeSwitch software suite includes the following modules:
Switching (Layer 2)
Routing (Layer 3)
Note: Only static routing is available. Dynamic routing protocols are not available in the EdgeSwitch
software.
Quality of Service
Management (CLI, browser-based UI, and SNMP)
IPv6 ManagementAllows management of the EdgeSwitch device through an IPv6 through an IPv6
address without requiring the IPv6 Routing package in the system. The management address can be
associated with the network port (front-panel switch ports), a routine interface (port or VLAN) and the
Service port.
Secure Management
Not all modules are available for all platforms or software releases.
Command Modes
The CLI groups commands into modes according to the command function. Each of the command modes
supports specific EdgeSwitch software commands. The commands in one mode are not available until you
switch to that particular mode, with the exception of the User EXEC mode commands. You can execute the
User EXEC mode commands in the Privileged EXEC mode.
The command prompt changes in each command mode to help you identify the current mode. Table 7
describes the command modes and the prompts visible in that mode.
Note: The command modes available on your switch depend on the software modules that are
installed.
Enter a question mark (?) after each word you enter to display available command keywords or parameters.
(UBNT EdgeSwitch) #network ?
If the help output shows a parameter in angle brackets, you must replace the parameter with a value.
(UBNT EdgeSwitch) #network parms ?
If there are no additional command keywords or parameters, or if additional parameters are optional, the
following message appears in the output:
<cr> Press Enter to execute the command
You can also enter a question mark (?) after typing one or more characters of a word to list the available
command or parameters that begin with the letters, as shown in the following example:
(UBNT EdgeSwitch) #show m?
This section describes the commands you use to configure a logical interface for management access. To
configure the management VLAN, see network mgmt_vlan on page 217.
enable (Privileged EXEC access)
This command gives you access to the Privileged EXEC mode. From the Privileged EXEC mode, you can configure
the network interface.
Format enable
Mode User EXEC
Example: The following is an example of the do command that executes the Privileged Exec command script
list in Global Config Mode.
(UBNT EdgeSwitch) #configure
(UBNT EdgeSwitch)(config)#do script list
Configuration Script Name Size(Bytes)
-------------------------------- -----------
backup-config 2105
running-config 4483
startup-config 445
3 configuration script(s) found.
2041 Kbytes free.
Routing(config)#
network parms
This command sets the devices IP address, subnet mask, and gateway. The IP address and gateway must be
on the same subnet. If you specify the none option, the IP address and subnet mask are set to the factory
defaults.
Format network parms {ipaddr netmask [gateway] | none}
Mode Privileged EXEC
network protocol
This command specifies the network configuration protocol to be used. If you modify this value, change is
effective immediately. If you use the bootp parameter, the switch periodically sends requests to a BootP
server until a response is received. If you use the dhcp parameter, the switch periodically sends requests to
a DHCP server until a response is received. If you use the none parameter, you must configure the network
information for the switch manually.
Default none
Format network protocol {none | bootp | dhcp}
Mode Privileged EXEC
There is no support for the no form of the command network protocol dhcp client-id. To remove
the client-id option from the DHCP client messages, issue the command network protocol dhcp
without the client-id option. The command network protocol none can be used to disable the
DHCP client and client-id option on the interface.
Example: The following shows an example of the command.
(UBNT EdgeSwitch) # network protocol dhcp client-id
network mac-address
This command sets locally administered MAC addresses. The following rules apply:
Bit 6 of byte 0 (called the U/L bit) indicates whether the address is universally administered (b0) or locally
administered (b1).
Bit 7 of byte 0 (called the I/G bit) indicates whether the destination address is an individual address (b0) or a
group address (b1).
The second character, of the twelve character macaddr, must be 2, 6, A or E.
A locally administered address must have bit 6 On (b1) and bit 7 Off (b0).
Format network mac-address macaddr
Mode Privileged EXEC
network mac-type
This command specifies whether the switch uses the burned-in or the locally administered MAC address.
Default burnedin
Format network mac-type {local | burnedin}
Mode Privileged EXEC
no network mac-type
This command resets the value of MAC address to its default.
Format no network mac-type
Mode Privileged EXEC
network javamode
This command specifies whether or not the switch should allow access to the Java applet in the header frame of
the web interface. When access is enabled, the Java applet can be viewed from the web interface. When access is
disabled, the user cannot view the Java applet.
Default enabled
Format network javamode
Mode Privileged EXEC
no network javamode
This command disallows access to the Java applet in the header frame of the web interface. When access is
disabled, the user cannot view the Java applet.
Format no network javamode
Mode Privileged EXEC
show network
This command displays configuration settings associated with the switchs network interface. The network
interface is the logical interface used for in-band connectivity with the switch via any of the switchs front
panel ports. The configuration parameters associated with the switchs network interface do not affect the
configuration of the front panel ports through which traffic is switched or routed. The network interface is always
considered to be up, whether or not any member ports are up; therefore, the show network command will
always show Interface Status as Up.
Format show network
Modes Privileged EXEC
User EXEC
Term Definition
Interface Status The network interface status; it is always considered to be Up.
IP Address The IP address of the interface. The factory default value is 0.0.0.0.
Subnet Mask The IP subnet mask for this interface. The factory default value is 0.0.0.0.
Default Gateway The default gateway for this IP interface. The factory default value is 0.0.0.0.
IPv6 Administrative Mode Whether enabled or disabled.
IPv6 Address/Length The IPv6 address and length.
IPv6 Default Router The IPv6 default router address.
Burned In MAC Address The burned in MAC address used for in-band connectivity.
Locally Administered MAC If desired, a locally administered MAC address can be configured for in-band connectivity. To take
Address effect, MAC Address Type must be set to Locally Administered. Enter the address as 12 hexadecimal
digits (6 bytes) with a colon between each byte. Bit 1 of byte 0 must be set to a 1 and bit 0 to a 0,
i.e. byte 0 should have the mask xxxx xx10. The MAC address used by this bridge when it must be
referred to in a unique fashion. It is recommended that this be the numerically smallest MAC address
of all ports that belong to this bridge. However it is only required to be unique. When concatenated
with dot1dStpPriority a unique Bridge Identifier is formed which is used in the Spanning Tree Protocol.
MAC Address Type The MAC address which should be used for in-band connectivity. The choices are the burned in or the
Locally Administered address. The factory default is to use the burned in MAC address.
Configured IPv4 Protocol The IPv4 network protocol being used. The options are bootp | dhcp | none.
Configured IPv6 Protocol The IPv6 network protocol being used. The options are dhcp | none.
DHCPv6 Client DUID The DHCPv6 clients unique client identifier. This row is displayed only when the configured IPv6
protocol is dhcp.
IPv6 Autoconfig Mode Whether IPv6 Stateless address autoconfiguration is enabled or disabled.
DHCP Client Identifier The client identifier is displayed in the output of the command only if DHCP is enabled with the client-
id option on the network port. See network protocol dhcp on page 39.
Example: The following shows example CLI display output for the network port.
(admin) #show network
Interface Status............................... Always Up
IP Address..................................... 10.250.3.1
Subnet Mask.................................... 255.255.255.0
Default Gateway................................ 10.250.3.3
IPv6 Administrative Mode....................... Enabled
IPv6 Prefix is ................................ fe80::210:18ff:fe82:64c/64
IPv6 Prefix is ................................ 2003::1/128
line
This command gives you access to the Line Console mode, which allows you to configure various Telnet settings
and the console port, as well as to configure console login/enable authentication.
Format line {console | telnet | ssh}
Mode Global Config
Term Definition
console Console terminal line.
telnet Virtual terminal for remote console access (Telnet).
ssh Virtual terminal for secured remote console access (SSH).
serial baudrate
This command specifies the communication rate of the terminal interface. The supported rates are 1200, 2400,
4800, 9600, 19200, 38400, 57600, 115200.
Default 9600
Format serial baudrate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600 | 115200}
Mode Line Config
no serial baudrate
This command sets the communication rate of the terminal interface.
Format no serial baudrate
Mode Line Config
serial timeout
This command specifies the maximum connect time (in minutes) without console activity. A value of 0 indicates
that a console can be connected indefinitely. The time range is 0 to 160.
Default 5
Format serial timeout 0-160
Mode Line Config
no serial timeout
This command sets the maximum connect time (in minutes) without console activity.
Format no serial timeout
Mode Line Config
show serial
This command displays serial communication settings for the switch.
Format show serial
Modes Privileged EXEC
User EXEC
Term Definition
Serial Port Login Timeout The time, in minutes, of inactivity on a Serial port connection, after which the Switch will close the
(minutes) connection. Any numeric value between 0 and 160 is allowed, the factory default is 5. A value of 0
disables the timeout.
Baud Rate (bps) The default baud rate at which the serial port will try to connect. The available values are 1200, 2400,
4800, 9600, 19200, 38400,57600, and 115200 baud. The factory default is 9600 baud.
Character Size (bits) The number of bits in a character. The number of bits is always 8.
Flow Control Whether Hardware Flow-Control is enabled or disabled. Hardware Flow Control is always disabled.
Stop Bits The number of Stop bits per character. The number of Stop bits is always 1.
Parity Type The Parity Method used on the Serial Port. The Parity Method is always None.
Telnet Commands
This section describes the commands you use to configure and view Telnet settings. You can use Telnet to
manage the device from a remote management host.
ip telnet server enable
Use this command to enable Telnet connections to the system and to enable the Telnet Server Admin Mode. This
command opens the Telnet listening port.
Default enabled
Format ip telnet server enable
Mode Privileged EXEC
Note: If the Telnet Server Admin Mode is disabled, Telnet sessions cannot be established. Use the ip
telnet server enable command to enable Telnet Server Admin Mode.
Default enabled
Format transport input telnet
Mode Line Config
telnetcon maxsessions
This command specifies the maximum number of Telnet connection sessions that can be established. A value of
0 indicates that no Telnet connection can be established. The range is 05.
Default 5
Format telnetcon maxsessions 0-5
Mode Privileged EXEC
no telnetcon maxsessions
This command sets the maximum number of Telnet connection sessions that can be established to the default
value.
Format no telnetcon maxsessions
Mode Privileged EXEC
telnetcon timeout
This command sets the Telnet connection session timeout value, in minutes. A session is active as long as the
session has not been idle for the value set. The time is a decimal value from 1 to 160.
Note: When you change the timeout value, the new value is applied to all active and inactive sessions
immediately. Any sessions that have been idle longer than the new timeout value are disconnected
immediately.
Default 5
Format telnetcon timeout 1-160
Mode Privileged EXEC
no telnetcon timeout
This command sets the Telnet connection session timeout value to the default.
Note: Changing the timeout value for active sessions does not become effective until the session is
accessed again. Also, any keystroke activates the new timeout duration.
Format no telnetcon timeout
Mode Privileged EXEC
show telnetcon
This command displays the current inbound Telnet settings. In other words, these settings apply to Telnet
connections initiated from a remote system to the switch.
Format show telnetcon
Mode Privileged EXEC
User EXEC
Term Definition
Remote Connection Login This object indicates the number of minutes a remote connection session is allowed to remain inactive
Timeout (minutes) before being logged off. May be specified as a number from 1 to 160. The factory default is 5.
Maximum Number of This object indicates the number of simultaneous remote connection sessions allowed. The factory
Remote Connection Sessions default is 5.
Allow New Telnet Sessions New Telnet sessions will not be allowed when this field is set to no. The factory default value is yes.
ip ssh
Use this command to enable SSH access to the system. (This command is the short form of the ip ssh
server enable command.)
Default disabled
Format ip ssh
Mode Privileged EXEC
ip ssh protocol
This command is used to set or remove protocol levels (or versions) for SSH. Either SSH1 (1), SSH2 (2), or both
SSH 1 and SSH 2 (1 and 2) can be set.
Default 2
Format ip ssh protocol [1] [2]
Mode Privileged EXEC
sshcon maxsessions
This command specifies the maximum number of SSH connection sessions that can be established. A value of 0
indicates that no SSH connection can be established. The range is 0 to 5.
Default 5
Format sshcon maxsessions 0-5
Mode Privileged EXEC
no sshcon maxsessions
This command sets the maximum number of allowed SSH connection sessions to the default value.
Format no sshcon maxsessions
Mode Privileged EXEC
sshcon timeout
This command sets the SSH connection session timeout value, in minutes. A session is active as long as the
session has been idle for the value set. The time is a decimal value from 1 to 160.
Changing the timeout value for active sessions does not become effective until the session is re accessed. Also,
any keystroke activates the new timeout duration.
Default 5
Format sshcon timeout 1-160
Mode Privileged EXEC
no sshcon timeout
This command sets the SSH connection session timeout value, in minutes, to the default.
Changing the timeout value for active sessions does not become effective until the session is re-accessed. Also,
any keystroke activates the new timeout duration.
Format no sshcon timeout
Mode Privileged EXEC
show ip ssh
This command displays the SSH settings.
Format show ip ssh
Mode Privileged EXEC
Term Definition
Administrative Mode This field indicates whether the administrative mode of SSH is enabled or disabled.
Protocol Level The protocol level may have the values of version 1, version 2 or both versions 1 and version 2.
SSH Sessions Currently The number of SSH sessions currently active.
Active
Max SSH Sessions Allowed The maximum number of SSH sessions allowed.
SSH Timeout The SSH timeout value in minutes.
Keys Present Indicates whether the SSH RSA and DSA key files are present on the device.
Key Generation in Progress Indicates whether RSA or DSA key files generation is currently in progress.
Parameter Description
http/https The line method for which the list needs to be applied.
default The default list of methods for authorization services.
listname An alphanumeric character string used to name the list of accounting methods.
ip http authentication
Use this command to specify authentication methods for http server users. The default configuration is the
local user database is checked. This action has the same effect as the command ip http authentication
local. The additional methods of authentication are used only if the previous method returns an error, not if
it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final
method in the command line. For example, if none is specified as an authentication method after RADIUS, no
authentication is used if the RADIUS server is down.
Default local
Format ip http authentication method1 [method2...]
Mode Global Config
The following table lists the possible values for the method parameter.
Parameter Value Description
local Uses the local username database for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS+ servers for authentication.
no ip http authentication
Use this command to return to the default.
Format no ip http authentication
Mode Global Config
ip https authentication
Use this command to specify authentication methods for https server users. The default configuration is the local
user database is checked. This action has the same effect as the command ip https authentication
local. The additional methods of authentication are used only if the previous method returns an error, not if
it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final
method in the command line. For example, if none is specified as an authentication method after RADIUS, no
authentication is used if the RADIUS server is down.
Default local
Format ip https authentication method1 [method2...]
Mode Global Config
The following table lists the possible values for the method parameter.
Parameter Value Description
local Uses the local username database for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS+ servers for authentication.
no ip https authentication
Use this command to return to the default.
Format no ip https authentication
Mode Global Config
ip http server
This command enables access to the switch through the web interface. When access is enabled, the user can
login to the switch from the web interface. When access is disabled, the user cannot login to the switchs web
server. Disabling the web interface takes effect immediately. All interfaces are affected.
Default enabled
Format ip http server
Mode Privileged EXEC
no ip http server
This command disables access to the switch through the web interface. When access is disabled, the user cannot
login to the switchs web server.
Format no ip http server
Mode Privileged EXEC
ip http secure-server
This command is used to enable the secure socket layer for secure HTTP.
Default disabled
Format ip http secure-server
Mode Privileged EXEC
no ip http secure-server
This command is used to disable the secure socket layer for secure HTTP.
Format no ip http secure-server
Mode Privileged EXEC
ip http secure-port
This command is used to set the SSL port where port can be 1025-65535 and the default is port 443.
Default 443
Format ip http secure-port portid
Mode Privileged EXEC
no ip http secure-port
This command is used to reset the SSL port to the default value.
Format no ip http secure-port
Mode Privileged EXEC
ip http secure-protocol
This command is used to set protocol levels (versions). The protocol level can be set to TLS1, SSL3 or to both TLS1
and SSL3.
Default SSL3 and TLS1
Format ip http secure-protocol [SSL3] [TLS1]
Mode Privileged EXEC
show ip http
This command displays the http settings for the switch.
Format show ip http
Mode Privileged EXEC
Term Definition
HTTP Mode (Unsecure) The unsecure HTTP server administrative mode.
Java Mode The java applet administrative mode which applies to both secure and un-secure web connections.
Maximum Allowable HTTP The number of allowable un-secure http sessions.
Sessions
HTTP Session Hard Timeout The hard timeout for un-secure http sessions in hours.
HTTP Session Soft Timeout The soft timeout for un-secure http sessions in minutes.
HTTP Mode (Secure) The secure HTTP server administrative mode.
Secure Port The secure HTTP server port number.
Secure Protocol Level(s) The protocol level may have the values of SSL3, TSL1, or both SSL3 and TSL1.
Maximum Allowable HTTPS The number of allowable secure http sessions.
Sessions
HTTPS Session Hard Timeout The hard timeout for secure http sessions in hours.
HTTPS Session Soft Timeout The soft timeout for secure http sessions in minutes.
Certificate Present Indicates whether the secure-server certificate files are present on the device.
Certificate Generation in Indicates whether certificate generation is currently in progress.
Progress
Access Commands
Use the commands in this section to close remote connections or to view information about connections to
thesystem.
disconnect
Use the disconnect command to close HTTP, HTTPS, Telnet or SSH sessions. Use all to close all active sessions, or
use session-id to specify the session ID to close. To view the possible values for session-id, use the
show loginsession command.
Format disconnect {session_id | all}
Mode Privileged EXEC
show loginsession
This command displays current Telnet, SSH and serial port connections to the switch. This command displays
truncated user names. Use the show loginsession long command to display the complete usernames.
Format show loginsession
Mode Privileged EXEC
Term Definition
ID Login Session ID.
User Name The name the user entered to log on to the system.
Connection From IP address of the remote client machine or EIA-232 for the serial port connection.
Idle Time Time this session has been idle.
Session Time Total time this session has been connected.
Session Type Shows the type of session, which can be HTTP, HTTPS, telnet, serial, or SSH.
Note: You cannot delete the default read/write user account (ubnt). You can configure up to five additional
user accounts on the system. Additional user accounts can be read-only or read/write.
Parameter Definition
default Uses the listed authentication methods that follow this argument as the default list of methods when a
user logs in.
list-name Character string of up to 15 characters used to name the list of authentication methods activated
when a user logs in.
method1 At least one from the following:
[method2...] enable Uses the enable password for authentication.
local Uses the local username database for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS servers for authentication.
The user will only be prompted for an enable password if one is required. The following authentication methods
do not require passwords:
none
deny
enable (if no enable password is configured)
line (if no line password is configured)
Example: See the examples below.
a. aaa authentication enable default enable none
b. aaa authentication enable default line none
c. aaa authentication enable default enable radius none
d. aaa authentication enable default line tacacs none
Examples a and b do not prompt for a password, however because examples c and d contain the RADIUS and
TACACS methods, the password prompt is displayed.
If the login methods include only enable, and there is no enable password configured, then the EdgeSwitch
software does not prompt for a username. In such cases, the EdgeSwitch software only prompts for a password.
the EdgeSwitch software supports configuring methods after the local method in authentication and
authorization lists. If the user is not present in the local database, then the next configured method is tried.
The additional methods of authentication are used only if the previous method returns an error, not if it fails. To
ensure that the authentication succeeds even if all methods return an error, specify none as the final method
in the command line.
Use the command show authorization methods on page 57 to display information about the
authentication methods.
Note: Requests sent by the switch to a RADIUS server include the username $enabx$, where x is the
requested privilege level. For enable to be authenticated on RADIUS servers, add $enabx$ users to
them. The login user ID is now sent to TACACS+ servers for enable authentication.
Default default
Format aaa authentication enable {default | list-name} method1 [method2...]
Mode Global Config
Parameter Definition
default Uses the listed authentication methods that follow this argument as the default list of methods, when
using higher privilege levels.
list-name Character string (15 characters max.) used to name the list of authentication methods activated when a
user logs in.
method1 Specify at least one from the following:
[method2...] deny Used to deny access.
enable Uses the enable password for authentication.
line Uses the line password for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS servers for authentication.
Example: The following example sets authentication when accessing higher privilege levels.
(UBNT EdgeSwitch)(config)# aaa authentication enable default enable
aaa authorization
Use this command to configure command and exec authorization method lists. This list is identified by default
or a user-specified list-name. If tacacs is specified as the authorization method, authorization commands
are notified to a TACACS+ server. If none is specified as the authorization method, command authorization is
not applicable. A maximum of five authorization method lists can be created for the commands type.
Note: Local method is not supported for command authorization. Command authorization with RADIUS
will work if, and only if, the applied authentication method is also RADIUS.
Format aaa authorization {commands|exec} {default|list-name} method1[method2]
Mode Global Config
Parameter Description
commands Provides authorization for all user-executed commands.
exec Provides exec authorization.
default The default list of methods for authorization services.
list-name Alphanumeric character string used to name the list of authorization methods.
method1 TACACS+/RADIUS/Local and none are supported.
[method2...]
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show authorization methods
enable authentication
Use this command to specify the authentication method list when accessing a higher privilege level from a
remote telnet.
Format enable authentication {default | list-name}
Mode Line Config
Parameter Description
default Uses the default list created with the aaa authentication enable command.
list-name Uses the indicated list created with the aaa authentication enable command.
Example: The following example specifies the default authentication method when accessing a higher privilege
level telnet.
(UBNT EdgeSwitch) (config)#line telnet
(UBNT EdgeSwitch) (config-telnet)#enable authentication default
no enable authentication
Use this command to return to the default specified by the enable authentication command.
Format no enable authentication
Mode Line Config
Parameter Description
name The name of the user. Range: 1-64 characters.
password The authentication password for the user. Range 8-64 characters. This value can be zero if the no
passwords min-length command has been executed. The special characters allowed in the
password include: ! # $ % & ( ) * + , - . / : ; < = > @ [ \ ] ^ _ ` { | } ~.
level The user level. Level 0 can be assigned by a level 15 user to another user to suspend that users access.
Range 0-15. Enter access level 1 for Read Access or 15 for Read/Write Access. If not specified where it is
optional, the privilege level is 1.
encrypted Encrypted password entered, copied from another switch configuration.
override-complexity- Disables the validation of the password strength.
check
Example: The following example configures user bob with password xxxyyymmmm and user level 15.
(UBNT EdgeSwitch)(config)# username bob password xxxyyymmmm level 15
Example: The following example configures user test with password testPassword and assigns a user level of 1
(read-only). The password strength will not be validated.
(UBNT EdgeSwitch)(config)# username test password testPassword level 1 override-complexity-check
no username
Use this command to remove a user name.
Format no username name
Mode Global Config
Parameter Description
name The name of the user. Range: 1-32 characters.
password The authentication password for the user. Range 8-64 characters.
level The user level. Level 0 can be assigned by a level 15 user to another user to suspend that users access.
Range 0-15.
show users
This command displays the configured user names and their settings. The show users command displays
truncated user names. Use the show users long command to display the complete user names. The
show users command is only available for users with Read/Write privileges. The SNMPv3 fields will only be
displayed if SNMP is available on the system.
Format show users
Mode Privileged EXEC
Term Definition
User Name The name the user enters to login using the serial port, telnet or web.
Access Mode Shows whether the user is able to change parameters on the switch (Read/Write) or is only able to
view them (Read Only). As a factory default, the ubnt user has Read/Write access.
SNMPv3 Access Mode The SNMPv3 Access Mode. If the value is set to ReadWrite, the SNMPv3 user is able to set and retrieve
parameters on the system. If the value is set to ReadOnly, the SNMPv3 user is only able to retrieve
parameter information. The SNMPv3 access mode may be different than the CLI and web access mode.
SNMPv3 Authentication The authentication protocol to be used for the specified login user.
SNMPv3 Encryption The encryption protocol to be used for the specified login user.
Term Definition
User Name The local user accounts user name.
Access Level The users access level (1 for read-only or 15 for read/write).
Password Aging Number of days, since the password was configured, until the password expires.
Password Expiry Date The current password expiration date in date format.
Lockout Indicates whether the user account is locked out (true or false).
If the detail keyword is included, the following additional fields are displayed.
Term Definition
Override Complexity Check Displays the users Password override complexity check status. By default it is disabled.
Password Strength Displays the user passwords strength (Strong or Weak). This field is displayed only if the Password
Strength feature is enabled.
Example: The following example displays information about the local user database.
(UBNT EdgeSwitch)#show users accounts
UserName Privilege Password Password Lockout
Aging Expiry date
------------------- --------- -------- ------------ -------
ubnt 15 --- --- False
(UBNT EdgeSwitch) #show users accounts detail
UserName....................................... admin
Privilege...................................... 15
Password Aging................................. ---
Password Expiry................................ ---
Lockout........................................ False
Override Complexity Check...................... Disable
Password Strength.............................. ---
Parameter Description
name Name of the user. Range: 1-20 characters.
login authentication
Use this command to specify the login authentication method list for a line (console, telnet or SSH). The default
configuration uses the default set with the command aaa authentication login.
Format login authentication {default | list-name}
Mode Line Configuration
Parameter Definition
default Uses the default list created with the aaa authentication login command.
list-name Uses the indicated list created with the aaa authentication login command.
Example: The following example specifies the default authentication method for telnet.
(UBNT EdgeSwitch) (config)#line telnet
(UBNT EdgeSwitch) (config-telnet)#login authentication default
no login authentication
Use this command to return to the default specified by the authentication login command.
password
This command allows the currently logged in user to change his or her password without having read/write
privileges.
Format password
Mode User EXEC
Parameter Definition
password Password for this level. Range: 8-64 characters
encrypted Encrypted password to be entered, copied from another switch configuration. The encrypted password
should be 128 characters long because the assumption is that this password is already encrypted with AES.
Example: The following example shows the prompt sequence for executing the password command.
(UBNT EdgeSwitch)>password
Enter old password:********
Enter new password:********
Confirm new password:********
Example: The following is an example of adding a MAB Client to the Internal user database.
(UBNT EdgeSwitch) #
(UBNT EdgeSwitch) #configure
(UBNT EdgeSwitch) (Config)#aaa ias-user username 1f3ccb1157
(UBNT EdgeSwitch) (Config-aaa-ias-User)#password 1f3ccb1157
(UBNT EdgeSwitch) (Config-aaa-ias-User)#exit
(UBNT EdgeSwitch) (Config)#
Parameter Definition
password Password string. Range: 8-64 characters.
encrypted Encrypted password you entered, copied from another switch configuration. The encrypted password
should be 128 characters long because the assumption is that this password is already encrypted with AES.
passwords min-length
Use this command to enforce a minimum password length for local users. The value also applies to the enable
password. The valid range is 8-64.
Default 8
Format passwords min-length 8-64
Mode Global Config
no passwords min-length
Use this command to set the minimum password length to the default value.
Format no passwords min-length
Mode Global Config
passwords history
Use this command to set the number of previous passwords that shall be stored for each user account. When
a local user changes his or her password, the user will not be able to reuse any password stored in password
history. This ensures that users dont reuse their passwords often. The valid range is 0-10.
Default 0
Format passwords history 0-10
Mode Global Config
no passwords history
Use this command to set the password history to the default value.
Format no passwords history
Mode Global Config
passwords aging
Use this command to implement aging on passwords for local users. When a users password expires, the user is
prompted to change it before logging in again. The valid range is 1-365. The default is 0, or no aging.
Default 0
Format passwords aging 1-365
Mode Global Config
no passwords aging
Use this command to set the password aging to the default value.
Format no passwords aging
Mode Global Config
passwords lock-out
Use this command to strengthen the security of the switch by locking user accounts that have failed login due to
wrong passwords. When a lockout count is configured, a user that is logged in must enter the correct password
within that count. Otherwise the user will be locked out from further switch access. Only a user with read/write
access can reactivate a locked user account. Password lockout does not apply to logins from the serial console.
The valid range is 1-5. The default is 0, or no lockout count enforced.
Default 0
Format passwords lock-out 1-5
Mode Global Config
no passwords lock-out
Use this command to set the password lock-out count to the default value.
Format no passwords lock-out
Mode Global Config
passwords strength-check
Use this command to enable the password strength feature. It is used to verify the strength of a password during
configuration.
Default Disable
Format passwords strength-check
Mode Global Config
no passwords strength-check
Use this command to set the password strength checking to the default value.
Format no passwords strength-check
Mode Global Config
Term Definition
Minimum Password Length Minimum number of characters required when changing passwords.
Password History Number of passwords to store for reuse prevention.
Password Aging Length in days that a password is valid.
Lockout Attempts Number of failed password login attempts before lockout.
Minimum Password Minimum number of uppercase characters required in a password.
Uppercase Letters
Minimum Password Minimum number of lowercase characters required in a password.
Lowercase Letters
Minimum Password Numeric Minimum number of numeric characters required in a password.
Characters
Maximum Password Maximum number of consecutive characters allowed in a password.
Consecutive Characters
Maximum Password Maximum number of repeated characters allowed in a password.
Repeated Characters
Minimum Password Minimum number of character classes (uppercase, lowercase, numeric and special) required when
Character Classes configuring passwords.
Password Exclude-Keywords The set of keywords to be excluded from the configured password when strength checking is enabled.
Term Definition
Last User Whose Password Shows the name of the user with the most recently set password.
Is Set
Password Strength Check Shows whether password strength checking is enabled.
Last Password Set Result Shows if the attempt to set a password succeeded; if not, the reason for the failure is included.
write memory
Use this command to save running configuration changes to NVRAM so that changes will persist across a reboot.
This command is the same as copy system:running-config nvram:startup-config. Use the
confirm keyword to directly save the configuration to NVRAM without prompting for confirmation.
Format write memory [confirm]
Mode Privileged EXEC
aaa session-id
Use this command in Global Config mode to specify if the same session-id is used for Authentication,
Authorization and Accounting service type within a session.
Default common
Format aaa session-id [common | unique]
Mode Global Config
Parameter Definition
common Use the same session-id for all AAA Service types.
unique Use a unique session-id for all AAA Service types.
no aaa session-id
Use this command in Global Config mode to reset the aaa session-id behavior to the default.
Format no aaa session-id [unique]
Mode Global Config
aaa accounting
Use this command in Global Config mode to create an accounting method list for user EXEC sessions, user-
executed commands, or 802.1X. This list is identified by default or a user-specified list_name.
Accounting records, when enabled for a line-mode, can be sent at both the beginning and at the end (start-
stop) or only at the end (stop-only). If none is specified, then accounting is disabled for the specified list.
If tacacs is specified as the accounting method, accounting records are notified to a TACACS+ server.
If radius is the specified accounting method, accounting records are notified to a RADIUS server.
Note: Please note the following:
A maximum of five Accounting Method lists can be created for each exec and commands type.
Only the default Accounting Method list can be created for 802.1X. There is no provision to create more.
The same list-name can be used for both exec and commands accounting type
AAA Accounting for commands with RADIUS as the accounting method is not supported.
Start-stop or None are the only supported record types for 802.1X accounting. Start-stop enables
accounting and None disables accounting.
RADIUS is the only accounting method type supported for 802.1X accounting.
Format aaa accounting {exec | commands | dot1x} {default | list_name}
{start-stop | stop-only |none} method1 [method2...]
Mode Global Config
Parameter Definition
exec Provides accounting for a user EXEC terminal sessions.
commands Provides accounting for all user executed commands.
dot1x Provides accounting for 802.1X user commands.
default The default list of methods for accounting services.
list-name Character string used to name the list of accounting methods.
start-stop Sends a start accounting notice at the beginning of a process and a stop accounting notice at the
beginning of a process and a stop accounting notice at the end of a process.
stop-only Sends a stop accounting notice at the end of the requested user process.
none Disables accounting services on this line.
method Use either tacacs or radius server for accounting purposes.
For the same set of accounting type and list name, the administrator can change the record type, or the methods
list, without having to first delete the previous configuration.
(UBNT EdgeSwitch) #
(UBNT EdgeSwitch) #configure
(UBNT EdgeSwitch) #aaa accounting exec ExecList stop-only tacacs
(UBNT EdgeSwitch) #aaa accounting exec ExecList start-stop tacacs
(UBNT EdgeSwitch) #aaa accounting exec ExecList start-stop tacacs radius
The first aaa command creates a method list for exec sessions with the name ExecList, with record-
type as stop-only and the method as tacacs (TACACS+). The second command changes the
record-type to start-stop from stop-only for the same method list. The third command, for the
same list changes the methods list to {tacacs, radius} from {tacacs}.
no aaa accounting
This command deletes the accounting method list.
Default none
Format no aaa accounting {exec | commands | dot1x} {default | list_name default}
Mode Global Config
Parameter Definition
password Password for this level. Range: 8-64 characters
encrypted Encrypted password to be entered, copied from another switch configuration.
Example: The following is an example of adding a MAB Client to the Internal user database.
(UBNT EdgeSwitch) #
(UBNT EdgeSwitch) #configure
(UBNT EdgeSwitch) (Config)#aaa ias-user username 1f3ccb1157
(UBNT EdgeSwitch) (Config-aaa-ias-User)#password 1f3ccb1157
(UBNT EdgeSwitch) (Config-aaa-ias-User)#exit
UserName
-------------------
Client-1
Client-2
Example: Following are the IAS configuration commands shown in the output of show running-config
command. Passwords shown in the command output are always encrypted.
aaa ias-user username client-1
password a45c74fdf50a558a2b5cf05573cd633bac2c6c598d54497ad4c46104918f2c encrypted
exit
accounting
Use this command in Line Configuration mode to apply the accounting method list to a line config (telnet/ssh).
Format accounting {exec | commands } {default | listname}
Mode Line Configuration
Parameter Definition
exec Causes accounting for an EXEC session.
commands This causes accounting for each command execution attempt. If a user is enabling accounting for exec
mode for the current line-configuration type, the user will be logged out.
default The default Accounting List.
listname Enter a string of not more than 15 characters.
no accounting
Use this command to remove accounting from a Line Configuration mode.
Format no accounting {exec|commands]
Mode Line Configuration
show accounting
Use this command to display ordered methods for accounting lists.
Format show accounting
Mode Privileged EXEC
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show accounting
Number of Accounting Notifications sent at beginning of an EXEC session: 0
Errors when sending Accounting Notifications beginning of an EXEC session: 0
Number of Accounting Notifications at end of an EXEC session: 0
Errors when sending Accounting Notifications at end of an EXEC session: 0
Number of Accounting Notifications sent at beginning of a command execution: 0
Errors when sending Accounting Notifications at beginning of a command execution: 0
Number of Accounting Notifications sent at end of a command execution: 0
Errors when sending Accounting Notifications at end of a command execution: 0
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #
(UBNT EdgeSwitch) #show accounting methods
Acct Type Method Name Record Type Method Type
---------- ------------ ------------ ------------
Exec dfltExecList start-stop TACACS
Commands dfltCmdsList stop-only TACACS
Commands UserCmd Audit start-stop TACACS
DOT1X dfltDot1xList start-stop radius
Line EXEC Method List Command Method List
------ ---------------------------------------
Telnet dfltExecList dfltCmdsList
SSH dfltExecList UserCmdAudit
SNMP Commands
This section describes the commands you use to configure Simple Network Management Protocol (SNMP) on the
switch. You can configure the switch to act as an SNMP agent so that it can communicate with SNMP managers
on your network.
snmp-server
This command sets the name and the physical location of the switch, and the organization responsible for the
network. The parameters name, loc, and con can be up to 255 characters in length.
Default none
Format snmp-server {sysname name | location loc | contact con}
Mode Global Config
snmp-server community
This command adds (and names) a new SNMP community, and optionally sets the access mode, allowed IP
address, and create a view for the community.
Note: Community names in the SNMP Community Table must be unique. When making multiple entries
using the same community name, the first entry is kept and processed and all duplicate entries are ignored.
Default Public and private, which you can rename.
Default values for the remaining four community names are blank.
Format snmp-server community community-name [{ro | rw |su }] [ipaddress ip-address]
[viewview-name]
Mode Global Config
Parameter Definition
community-name A name associated with the switch and with a set of SNMP managers that manage it with a specified
privileged level. The length of community-name can be up to 16 case-sensitive characters.
ro | rw | su The access mode of the SNMP community, which can be public (Read-Only/RO), private (Read-Write/
RW), or Super User (SU).
ip-address The associated community SNMP packet sending address and is used along with the client IP mask
value to denote a range of IP addresses from which SNMP clients may use that community to access
the device. A value of 0.0.0.0 allows access from any IP address. Otherwise, this value is ANDed with the
mask to determine the range of allowed client IP addresses.
view-name The name of the view to create or update.
no snmp-server community
This command removes this community name from the table. The name is the community name to be deleted.
Format no snmp-server community community-name
Mode Global Config
snmp-server community-group
This command configures a community access string to permit access via the SNMPv1 and SNMPv2 protocols.
Format snmp-server community-group community-string group-name [ipaddress ipaddress]
Mode Global Config
Parameter Definition
community-string The community which is created and then associated with the group. The range is 1 to 20 characters.
group-name The name of the group that the community is associated with. The range is 1 to 30 characters.
ipaddress Optionally, the IPv4 address that the community may be accessed from.
Note: This command is valid only when the Link Up/Down Flag is enabled.
Note: This command is valid only when the Link Up/Down Flag is enabled.
Note: This command is valid only when the Link Up/Down Flag is enabled.
Note: This command is valid only when the Link Up/Down Flag is enabled.
This command enables Link Up/Down traps for the entire switch. When enabled, link traps are sent only if the
Link Trap flag setting associated with the port is enabled. See show snmp on page 80.
Default enabled
Format snmp-server enable traps linkmode
Mode Global Config
Parameter Definition
engineid-string A hexadecimal string identifying the engine ID, used for localizing configuration. The engine ID must
be an even length in the range of 6 to 32 hexadecimal characters.
default Sets the engine ID to the default string, based on the device MAC address.
CAUTION: Changing the engine ID will invalidate all SNMP configuration that exists on the box.
snmp-server filter
This command creates a filter entry for use in limiting which traps will be sent to a host.
Default No filters are created by default.
Format snmp-server filter filtername oid-tree {included|excluded}
Mode Global Config
Parameter Definition
filtername The label for the filter being created. The range is 1 to 30 characters.
oid-tree The OID subtree to include or exclude from the filter. Subtrees may be specified numerically (1.3.6.2.4)
or by keywords (system), and asterisks may be used to specify a subtree family (1.3.*.4).
included The tree is included in the filter.
excluded The tree is excluded from the filter.
no snmp-server filter
This command removes the specified filter.
Default No filters are created by default.
Format snmp-server filter filtername [oid-tree]
Mode Global Config
snmp-server group
This command creates an SNMP access group.
Default Generic groups are created for all versions and privileges using the default views.
Format snmp-server group group-name {v1 | v2 | v3 {noauth | auth | priv}} [context
context-name] [read read-view] [write write-view] [notify notify-view]
Mode Global Config
Parameter Definition
group-name The group name to be used when configuring communities or users. The range is 1 to 30 characters.
v1 This group can only access via SNMPv1.
v2 This group can only access via SNMPv2.
v3 This group can only access via SNMPv3.
noauth This group can be accessed only when not using Authentication or Encryption. Applicable only if
SNMPv3 is selected.
auth This group can be accessed only when using Authentication but not Encryption. Applicable only if
SNMPv3 is selected.
priv This group can be accessed only when using both Authentication and Encryption. Applicable only if
SNMPv3 is selected.
context-name The SNMPv3 context used during access. Applicable only if SNMPv3 is selected.
read-view The view this group will use during GET requests. The range is 1 to 30 characters.
write-view The view this group will use during SET requests. The range is 1 to 30 characters.
notify-view The view this group will use when sending out traps. The range is 1 to 30 characters.
no snmp-server group
This command removes the specified group.
Format no snmp-server group group-name {v1|v2 | 3 {noauth|auth|priv}} [context context-name]
Mode Global Config
snmp-server host
This command configures traps to be sent to the specified host.
Default No default hosts are configured.
Format snmp-server host host-addr {informs [timeout seconds] [retries retries] |
traps version {1|2}} community-string [udp-port port] [filter filter-name]
Mode Global Config
Parameter Definition
host-addr The IPv4 or IPv6 address of the host to send the trap or inform to.
informs Send SNMPv2 informs to the host.
seconds The number of seconds to wait for an acknowledgement before resending the Inform. The default is
15 seconds. The range is 1 to 300 seconds.
retries The number of times to resend an Inform. The default is 3 attempts. The range is 0 to 255 retries.
traps Send SNMP traps to the host. This option is selected by default.
version 1 Sends SNMPv1 traps. This option is not available if informs is selected.
version 2 Sends SNMPv2 traps. This option is not available if informs is selected. This option is selected by default.
community-string Community string sent as part of the notification. The range is 1 to 20 characters.
port The SNMP Trap receiver port. The default is port 162.
filter-name The filter name to associate with this host. Filters can be used to specify which traps are sent to this
host. The range is 1 to 30 characters.
no snmp-server host
This command removes the specified host entry.
Format no snmp-server host host-addr [traps|informs]
Mode Global Config
snmp-server user
This command creates an SNMPv3 user for access to the system.
Default No default users are created.
Format snmp-server user username groupname [remote engineid-string] [ {auth-md5
password | auth-sha password | auth-md5-key md5-key | auth-sha-key sha-key}
[priv-des password | priv-des-key des-key]
Mode Global Config
Parameter Definition
username The username the SNMPv3 user will connect to the switch as. The range is 1 to 30 characters.
groupname The name of the group the user belongs to. The range is 1 to 30 characters.
engineid-string The engine-id of the remote management station that this user will be connecting from. The range is
5 to 32 characters.
password The password the user will use for the authentication or encryption mechanism. The range is 1 to 32
characters.
md5-key A pregenerated MD5 authentication key. The length is 32 characters.
sha-key A pregenerated SHA authentication key. The length is 48 characters.
des-key A pregenerated DES encryption key. The length is 32 characters if MD5 is selected, 48 characters if SHA
is selected.
no snmp-server user
This command removes the specified SNMPv3 user.
Format no snmp-server user username
Mode Global Config
snmp-server view
This command creates or modifies an existing view entry that is used by groups to determine which objects can
be accessed by a community or user.
Default Views are created by default to provide access to the default groups.
Format snmp-server viewname oid-tree {included|excluded}
Mode Global Config
Parameter Definition
viewname The label for the view being created. The range is 1 to 30 characters.
oid-tree The OID subtree to include or exclude from the view. Subtrees may be specified numerically (1.3.6.2.4)
or by keywords (system), and asterisks may be used to specify a subtree family (1.3.*.4).
included The tree is included in the view.
excluded The tree is excluded from the view.
no snmp-server view
This command removes the specified view.
Format no snmp-server view viewname [oid-tree]
Mode Global Config
snmp-server v3-host
This command configures traps to be sent to the specified host.
Default No default hosts are configured.
Format snmp-server v3-host host-addr username [traps | informs [timeout seconds]
[retries retries]] [auth | noauth | priv] [udpport port] [filter filter-name]
Mode Global Config
Parameter Definition
host-addr The IPv4 or IPv6 address of the host to send the trap or inform to.
username User used to send a Trap or Inform message. This user must be associated with a group that supports
the version and access method. The range is 1 to 30 characters.
traps Send SNMP traps to the host. This is the default option.
informs Send SNMP informs to the host.
seconds Number of seconds to wait for an acknowledgement before resending the Inform. The default is 15
seconds. The range is 1 to 300 seconds.
retries Number of times to resend an Inform. The default is 3 attempts. The range is 0 to 255 retries.
auth Enables authentication but not encryption.
noauth No authentication or encryption. This is the default.
priv Enables authentication and encryption.
port The SNMP Trap receiver port. This value defaults to port 162.
filter-name The filter name to associate with this host. Filters can be used to specify which traps are sent to this
host. The range is 1 to 30 characters.
snmptrap source-interface
Use this command in Global Configuration mode to configure the global source-interface (Source IP address) for
all SNMP communication between the SNMP client and the server.
Format snmptrap source-interface {slot/port | vlan vlan-id}
Mode Global Configuration
Parameter Definition
slot/port The unit identifier assigned to the switch.
vlan-id Configures the VLAN interface to use as the source IP address. The range of the VLAN ID is 1 to 4093.
no snmptrap source-interface
Use this command in Global Configuration mode to remove the global source-interface (Source IP selection) for
all SNMP communication between the SNMP client and the server.
Format no snmptrap source-interface
Mode Global Configuration
show snmp
This command displays the current SNMP configuration.
Format show snmp
Mode Privileged EXEC
Term Definition
Community Table:
Community-String The community string for the entry. This is used by SNMPv1 and SNMPv2 protocols to access the
switch.
Community-Access The type of access the community has:
Read only
Read write
su
View Name The view this community has access to.
IP Address Access to this community is limited to this IP address.
Community Group Table:
Community-String The community this maping configures
Group Name The group this community is assigned to.
IP Address The IP address this community is limited to.
Host Table:
Target Address The address of the host that traps will be sent to.
Type The type of message that will be sent, either traps or informs.
Community The community traps will be sent to.
Version The version of SNMP the trap will be sent as.
UDP Port The UDP port the trap or inform will be sent to.
Filter name The filter the traps will be limited by for this host.
TO Sec The number of seconds before informs will time out when sending to this host.
Retries The number of times informs will be sent after timing out.
Term Definition
Local SNMP EnginID The current configuration of the displayed SNMP engineID.
Term Definition
Name The filter name for this entry.
OID Tree The OID tree this entry will include or exclude.
Type Indicates if this entry includes or excludes the OID Tree.
Term Definition
Name The name of the group.
Security Model Indicates which protocol can access the system via this group.
Security Level Indicates the security level allowed for this group.
Read View The view this group provides read access to.
Write View The view this group provides write access to.
Notify View The view this group provides trap access to.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)# show snmp source-interface
SNMP trap Client Source Interface.............. (not configured)
Term Definition
Name The name of the user.
Group Name The group that defines the SNMPv3 access parameters.
Auth Method The authentication algorithm configured for this user.
Privilege Method The encryption algorithm configured for this user.
Remote Engine ID The engineID for the user defined on the client machine.
Parameter Definition
Name The view name for this entry.
OID Tree The OID tree that this entry will include or exclude.
Type Indicates if this entry includes or excludes the OID tree.
show trapflags
This command displays trap conditions. The commands display shows all the enabled OSPFv2 and OSPFv3
trapflags. Configure which traps the switch should generate by enabling or disabling the trap condition. If a trap
condition is enabled and the condition is detected, the SNMP agent on the switch sends the trap to all enabled
trap receivers. You do not have to reset the switch to implement the changes. Cold and warm start traps are
always generated and cannot be disabled.
Format show trapflags
Mode Privileged EXEC
Term Definition
Authentication Flag Can be enabled or disabled. The factory default is enabled. Indicates whether authentication failure
traps will be sent.
Link Up/Down Flag Can be enabled or disabled. The factory default is enabled. Indicates whether link status traps will
besent.
Multiple Users Flag Can be enabled or disabled. The factory default is enabled. Indicates whether a trap will be sent when
the same user ID is logged into the switch more than once at the same time (either through Telnet or
the serial port).
Spanning Tree Flag Can be enabled or disabled. The factory default is enabled. Indicates whether spanning tree traps
aresent.
RADIUS Commands
This section describes the commands you use to configure the switch to use a Remote Authentication Dial-In
User Service (RADIUS) server on your network for authentication and accounting.
radius accounting mode
This command is used to enable the RADIUS accounting function.
Default disable
Format radius accounting mode
Mode Global Config
Parameter Definition
4 NAS-IP-Address attribute to be used in RADIUS requests.
ipaddr The IP address of the server.
Note: To reconfigure a RADIUS authentication server to use the default UDP port, set the port
parameter to 1812.
If you use the acct parameter, the command configures the IP address or hostname to use for the RADIUS
accounting server. You can only configure one accounting server. If an accounting server is currently configured,
use thenoform of the command to remove it from the configuration. The IP address or hostname you specify
must match that of a previously configured accounting server. If you use the optional port parameter, the
command configures the UDP port to use when connecting to the RADIUS accounting server. If a port is already
configured for the accounting server, the new port replaces the previously configured port. The port value
must be in the range 0-65535, with a default of 1813.
Note: To reconfigure a RADIUS accounting server to use the default UDP port, set the port parameter
to1813.
Format radius server host {auth | acct} {ipaddr|dnsname} [name servername] [port 0-65535]
Mode Global Config
Parameter Definition
ipaddr The IP address of the server.
dnsname The DNS name of the server.
0-65535 The port number to use to connect to the specified RADIUS server.
servername The alias name to identify the server.
Parameter Definition
ipaddr The IP address of the server.
dnsname The DNS name of the server.
password The password in encrypted format.
Parameter Definition
ip addr The IP address of the server.
dnsname The DNS name of the server.
Parameter Definition
ip addr The IP address of the RADIUS Authenticating server.
dnsname The DNS name of the server.
Parameter Definition
retries The maximum number of transmission attempts in the range of 1 to 15.
radius source-interface
Use this command to specify the physical or logical interface to use as the RADIUS client source interface (source
IP address). If configured, the address of source-interface is used for all RADIUS communications
between the RADIUS server and the RADIUS client. The selected source-interface IP address is used for
filling the IP header of RADIUS management protocol packets. This allows security devices (firewalls) to identify
the source packets coming from the specific switch.
If a source-interface is not specified, the primary IP address of the originating (outbound) interface is
used as the source address. If the configured interface is down, the RADIUS client falls back to its default behavior.
Format radius source-interface {slot/port | vlanvlan-id}
Mode Global Config
Parameter Definition
slot/port The unit identifier assigned to the switch.
vlan-id Configures the VLAN interface to use as the source IP address. The range of the VLAN ID is 1 to 4093.
no radius source-interface
Use this command to reset the RADIUS source interface to the default settings.
Format no radius source-interface
Mode Global Config
Parameter Definition
seconds Timeout value in seconds in the range 130.
show radius
This command displays the values configured for the global parameters of the RADIUS client.
Format show radius
Mode Privileged EXEC
Term Definition
Number of Configured The number of RADIUS Authentication servers that have been configured.
Authentication Servers
Number of Configured The number of RADIUS Accounting servers that have been configured.
Accounting Servers
Number of Named The number of configured named RADIUS server groups.
Authentication Server
Groups
Number of Named The number of configured named RADIUS server groups.
Accounting Server Groups
Number of Retransmits The configured value of the maximum number of times a request packet is retransmitted.
Time Duration The configured timeout value, in seconds, for request retransmissions.
RADIUS Accounting Mode A global parameter to indicate whether the accounting mode for all the servers is enabled or not.
RADIUS Attribute 4 Mode A global parameter to indicate whether the NAS-IP-Address attribute has been enabled to use in
RADIUS requests.
RADIUS Attribute 4 Value A global parameter that specifies the IP address to be used in the NAS-IP-Address attribute to be used
in RADIUS requests.
The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show radius
Number of Configured Authentication Servers............. 32
Number of Configured Accounting Servers................. 32
Number of Named Authentication Server Groups............ 15
Number of Named Accounting Server Groups................ 3
Number of Retransmits................................... 4
Time Duration........................................... 10
RADIUS Accounting Mode.................................. Disable
RADIUS Attribute 4 Mode................................. Enable
RADIUS Attribute 4 Value ............................... 192.168.37.60
Parameter Definition
ipaddr The IP address of the authenticating server.
dnsname The DNS name of the authenticating server.
servername The alias name to identify the server.
Term Definition
Current The * symbol preceding the server host address specifies that the server is currently active.
Host Address The IP address of the host.
Server Name The name of the authenticating server.
Port The port used for communication with the authenticating server.
Type Specifies whether this server is a primary or secondary type.
Current Host Address The IP address of the currently active authenticating server.
Secret Configured Yes or No Boolean value that indicates whether this server is configured with a secret.
Number of Retransmits The configured value of the maximum number of times a request packet is retransmitted.
Message Authenticator Global parameter that indicates whether the Message Authenticator attribute is enabled or disabled.
Time Duration The configured timeout value, in seconds, for request retransmissions.
RADIUS Accounting Mode Global parameter that indicates whether the accounting mode for all the servers is enabled or not.
RADIUS Attribute 4 Mode Global parameter that indicates whether the NAS-IP-Address attribute has been enabled to use in
RADIUS requests.
RADIUS Attribute 4 Value Global parameter that specifies the IP address to use in NAS-IP-Address attribute used in RADIUS requests.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show radius servers
Parameter/Term Definition
servername An alias name to identify the server.
If you do not specify any parameters, then only the accounting mode and the RADIUS accounting server details
are displayed.
Term Definition
Host Address The IP address of the host.
Server Name The name of the accounting server.
RADIUS Accounting Mode A global parameter to indicate whether the accounting mode for all the servers is enabled or not.
Port The port used for communication with the accounting server.
Secret Configured Yes or No Boolean value indicating whether this server is configured with a secret.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show radius accounting name
Parameter Definition
ipaddr The IP address of the server.
dnsname The DNS name of the server.
servername The alias name to identify the server.
Term Definition
RADIUS Accounting Server The name of the accounting server.
Name
Host Address The IP address of the host.
Round Trip Time The time interval, in hundredths of a second, between the most recent Accounting-Response and the
Accounting-Request that matched it from this RADIUS accounting server.
Requests The number of RADIUS Accounting-Request packets sent to this server. This number does not include
retransmissions.
Retransmission The number of RADIUS Accounting-Request packets retransmitted to this RADIUS accounting server.
Responses The number of RADIUS packets received on the accounting port from this server.
Malformed Responses The number of malformed RADIUS Accounting-Response packets received from this server.
Malformed packets include packets with an invalid length. Bad authenticators or signature attributes
or unknown types are not included as malformed accounting responses.
Bad Authenticators The number of RADIUS Accounting-Response packets containing invalid authenticators received from
this accounting server.
Pending Requests The number of RADIUS Accounting-Request packets sent to this server that have not yet timed out or
received a response.
Timeouts The number of accounting timeouts to this server.
Unknown Types The number of RADIUS packets of unknown types, which were received from this server on the
accounting port.
Packets Dropped The number of RADIUS packets received from this server on the accounting port and dropped for
some other reason.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show radius accounting statistics 192.168.37.200
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)# show radius source-interface
RADIUS Client Source Interface.............. (not configured)
Parameter Definition
ipaddr The IP address of the server.
dnsname The DNS name of the server.
servername The alias name to identify the server.
Term Definition
RADIUS Server Name The name of the authenticating server.
Server Host Address The IP address of the host.
Access Requests The number of RADIUS Access-Request packets sent to this server. This number does not include
retransmissions.
Access Retransmissions The number of RADIUS Access-Request packets retransmitted to this RADIUS authentication server.
Access Accepts The number of RADIUS Access-Accept packets, including both valid and invalid packets, that were
received from this server.
Access Rejects The number of RADIUS Access-Reject packets, including both valid and invalid packets, that were
received from this server.
Access Challenges The number of RADIUS Access-Challenge packets, including both valid and invalid packets, that were
received from this server.
Malformed Access The number of malformed RADIUS Access-Response packets received from this server. Malformed
Responses packets include packets with an invalid length. Bad authenticators or signature attributes or unknown
types are not included as malformed access responses.
Bad Authenticators The number of RADIUS Access-Response packets containing invalid authenticators or signature
attributes received from this server.
Pending Requests The number of RADIUS Access-Request packets destined for this server that have not yet timed out or
received a response.
Timeouts The number of authentication timeouts to this server.
Unknown Types The number of packets of unknown type that were received from this server on the authentication
port.
Packets Dropped The number of RADIUS packets received from this server on the authentication port and dropped for
some other reason.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show radius statistics 192.168.37.200
TACACS+ Commands
TACACS+ provides access control for networked devices via one or more centralized servers. Similar to RADIUS,
this protocol simplifies authentication by making use of a single database that can be shared by many clients
on a large network. TACACS+ is based on the TACACS protocol (described in RFC1492) but additionally provides
for separate authentication, authorization, and accounting services. The original protocol was UDP based with
messages passed in clear text over the network; TACACS+ uses TCP to ensure reliable delivery and a shared key
configured on the client and daemon server to encrypt all messages.
tacacs-server host
Use the tacacs-server host command in Global Configuration mode to configure a TACACS+ server.
This command enters into the TACACS+ configuration mode. The ip-address|hostname parameter is the
IP address or hostname of the TACACS+ server. To specify multiple hosts, multiple tacacs-server host
commands can be used.
Format tacacs-server host ip-address|hostname
Mode Global Config
no tacacs-server host
Use the no tacacs-server host command to delete the specified hostname or IP address.
Theipaddress|hostname parameter is the IP address of the TACACS+ server.
Format no tacacs-server host ip-address|hostname
Mode Global Config
tacacs-server key
Use the tacacs-server key command to set the authentication and encryption key for all TACACS+
communications between the switch and the TACACS+ daemon. The key-string parameter has a range of
0-128 characters and specifies the authentication and encryption key for all TACACS communications between
the switch and the TACACS+ server. This key must match the key used on the TACACS+ daemon.
Text-based configuration supports TACACS servers secrets in encrypted and non-encrypted format. When you
save the configuration, these secret keys are stored in encrypted format only. If you want to enter the key in
encrypted format, enter the key along with the encrypted keyword. The show running-config command
displays these secret keys in encrypted format. You cannot show these keys in plain text format.
Format tacacs-server key [key-string | encrypted key-string]
Mode Global Config
no tacacs-server key
Use the no tacacs-server key command to disable the authentication and encryption key for all
TACACS+ communications between the switch and the TACACS+ daemon. The key-string parameter has a
range of 0-128 characters. This key must match the key used on the TACACS+ daemon.
Format no tacacs-server key key-string
Mode Global Config
tacacs-server keystring
Use the tacacs-server keystring command to set the global authentication encryption key used for
all TACACS+ communications between the TACACS+ server and the client.
Format tacacs-server keystring
Mode Global Config
tacacs-server source-interface
Use this command in Global Configuration mode to configure the source interface (Source IP address) for
TACACS+ server configuration. The selected source-interface IP address is used for filling the IP header of
management protocol packets. This allows security devices (firewalls) to identify the source packets coming from
the specific switch.
If a source-interface is not specified, the primary IP address of the originating (outbound) interface is used as the
source address.
Format tacacs-server source-interface {slot/port | vlan vlan-id}
Mode Global Config
Parameter Definition
slot/port The unit identifier assigned to the switch, in slot/port format.
vlan-id Configures the VLAN interface to use as the source IP address. The range of the VLAN ID is 1 to 4093.
no tacacs-server source-interface
Use this command in Global Configuration mode to remove the global source interface (Source IP selection) for
all TACACS+ communications between the TACACS+ client and the server.
Format no tacacs-server source-interface
Mode Global Config
tacacs-server timeout
Use the tacacs-server timeout command to set the timeout value for communication with the
TACACS+ servers. The timeout parameter has a range of 1-30 and is the timeout value in seconds.
Default 5
Format tacacs-server timeout timeout
Mode Global Config
no tacacs-server timeout
Use the no tacacs-server timeout command to restore the default timeout value for all TACACS
servers.
Format no tacacs-server timeout
Mode Global Config
key
Use the key command in TACACS Configuration mode to specify the authentication and encryption key for all
TACACS communications between the device and the TACACS server. This key must match the key used on the
TACACS daemon. The key-string parameter specifies the key name. For an empty string use . The range is
0-128 characters.
Text-based configuration supports TACACS servers secrets in encrypted and non-encrypted format. When you
save the configuration, these secret keys are stored in encrypted format only. If you want to enter the key in
encrypted format, enter the key along with the encrypted keyword. In the show running-config commands
display, these secret keys are displayed in encrypted format. You cannot show these keys in plain text format.
Format key [key-string | encrypted key-string]
Mode TACACS Config
keystring
Use the keystring command in TACACS Server Configuration mode to set the TACACS+ server-specific
authentication encryption key used for all TACACS+ communications between the TACACS+ server and the client.
Format keystring
Mode TACACS Server Config
port
Use the port command in TACACS Configuration mode to specify a server port number. The server
portnumber range is 0 - 65535.
Default 49
Format port port-number
Mode TACACS Config
timeout
Use the timeout command in TACACS Configuration mode to specify the timeout value in seconds. If no
timeout value is specified, the global value is used. The timeout parameter has a range of 1-30 and is the
timeout value in seconds.
Format timeout timeout
Mode TACACS Config
show tacacs
Use the show tacacs command to display the configuration, statistics, and source interface details of the
TACACS+ client.
Format show tacacs [ip-address|hostname|client|server]
Mode Privileged EXEC
Parameter/Term Definition
Host address The IP address or hostname of the configured TACACS+ server.
Port The configured TACACS+ server port number.
TimeOut The timeout in seconds for establishing a TCP conection.
Priority The preference order in which TACACS+ servers are contacted. If a server connection fails, the next
highest priority server is contacted.
client Display SNTP client information.
server Display SNTP server information.
Example: The following shows example CLI display output for the command.
(Config)# show tacacs source-interface
show serial
Note: To specify a blank password for a user in the configuration script, you must specify it as a space
within quotes. For example, to change the password for user jane from a blank password to hello, the
script entry is as follows:
users passwd jane
hello
hello
script apply
This command applies the commands in the script to the switch. The scriptname parameter is the name of
the script to apply.
Format script apply scriptname
Mode Privileged EXEC
script delete
This command deletes a specified script where the scriptname parameter is the name of the script to
delete. The all option deletes all the scripts present on the switch.
Format script delete {scriptname | all}
Mode Privileged EXEC
script list
This command lists all scripts present on the switch as well as the remaining available space.
Format script list
Mode Privileged EXEC
Term Definition
Configuration Script Name of the script.
Size Privileged EXEC
script show
This command displays the contents of a script file, which is named scriptname.
Format script show scriptname
Mode Privileged EXEC
Term Definition
Output Format line number: line contents
script validate
This command validates a script file by parsing each line in the script file where scriptname is the name
of the script to validate.The validate option is intended to be used as a tool for script development. Validation
identifies potential problems. It might not identify all problems with a given script on any given device.
Format script validate scriptname
Mode Privileged EXEC
Note: The parameter ipaddr is either an IPv4 address, or an IPv6 address for routing packages that
support IPv6.
Default none
Format Copy banner to the switch:
copy tftp://ipaddr/filepath/filename nvram:clibanner
Copy banner from the switch:
copy nvram:clibanner tftp://ipaddr/filepath/filename
Mode Privileged EXEC
set prompt
This command changes the name of the prompt. The length of name may be up to 64 alphanumeric characters.
Format set prompt prompt_string
Mode Privileged EXEC
hostname
This command sets the system hostname. It also changes the prompt. The length of name may be up to 64
alphanumeric, case-sensitive characters.
Format hostname hostname
Mode Privileged EXEC
show clibanner
Use this command to display the configured prelogin CLI banner. The prelogin banner is the text that displays
before displaying the CLI prompt.
Default No contents to display before displaying the login prompt.
Format show clibanner
Mode Privileged Exec
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show clibanner
--------------------------
TEST
--------------------------
set clibanner
Use this command to configure the prelogin CLI banner before displaying the login prompt.
Format set clibanner line
Mode Global Config
Parameter Definition
line Banner text where (double quote) is a delimiting character. The banner message can be up to 2000
characters.
no set clibanner
Use this command to unconfigure the prelogin CLI banner.
Format no set clibanner
Mode Global Config
AutoInstall Commands
The AutoInstall feature enables the automatic update of the image and configuration of the switch. This feature
enables touchless or low-touch provisioning to simplify switch configuration and imaging.
AutoInstall includes the following support:
Downloading an image from TFTP server using DHCP option 125. The image update can result in a
downgrade or upgrade of the firmware on the switch.
Automatically downloading a configuration file from a TFTP server when the switch is booted with no saved
configuration file.
Automatically downloading an image from a TFTP server in the following situations:
When the switch is booted with no saved configuration found.
When the switch is booted with a saved configuration that has AutoInstall enabled.
When the switch boots and no configuration file is found, it attempts to obtain an IP address from a network
DHCP server. The response from the DHCP server includes the IP address of the TFTP server where the image and
configuration flies are located.
After acquiring an IP address and the additional relevant information from the DHCP server, the switch
downloads the image file or configuration file from the TFTP server. A downloaded image is automatically
installed. A downloaded configuration file is saved to non-volatile memory.
Note: AutoInstall from a TFTP server can run on any IP interface, including the network port, service
port, and in-band routing interfaces (if supported). To support AutoInstall, the DHCP client is enabled
operationally on the service port, if it exists, or the network port, if there is no service port.
boot autoinstall
Use this command to operationally start or stop the AutoInstall process on the switch. The command is non-
persistent and is not saved in the startup or running configuration file.
Default stopped
Format boot autoinstall {start | stop}
Mode Privileged EXEC
erase startup-config
Use this command to erase the text-based configuration file stored in non-volatile memory. If the switch boots
and no startup-config file is found, the AutoInstall process automatically begins.
Format erase startup-config
Mode Privileged EXEC
erase factory-defaults
Use this command to erase the text-based factory-defaults file stored in non-volatile memory.
Default Disable
Format erase factory-defaults
Mode Global Config
show autoinstall
This command displays the current status of the AutoInstall process.
Format show autoinstall
Mode Privileged EXEC
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show autoinstall
spanning-tree bpduguard
spanning-tree bpdufilter default
spanning-tree forceversion 802.1w
(UBNT EdgeSwitch) #
interface 0/1
no spanning-tree port mode
exit
boot system
This command activates the specified image. It will be the active-image for subsequent reboots and will be
loaded by the boot loader. The current active-image is marked as the backup-image for subsequent reboots. If
the specified image doesnt exist on the system, this command returns an error message.
Format boot system {active | backup}
Mode Privileged EXEC
show bootvar
This command displays the version information and the activation status for the current active and backup
images. The command also displays any text description associated with an image. This command displays the
switch activation status.
Format show bootvar
Mode Privileged EXEC
filedescr
This command associates a given text description with an image. Any existing description will be replaced.
Format filedescr {active | backup} text-description
Mode Privileged EXEC
update bootcode
This command updates the bootcode (boot loader) on the switch. The bootcode is read from the active-image
for subsequent reboots.
Format update bootcode
Mode Privileged EXEC
Term Definition
IP Address IP address of the management interface or another device on the management network.
MAC Address Hardware MAC address of that device.
Interface For a service port the output is Management. For a network port, the output is the slot/port of the
physical interface.
show eventlog
This command displays the event log, which contains error messages from the system. The event log is not
cleared on a system reset. The unit is the switch identifier.
Format show eventlog [unit]
Mode Privileged EXEC
Term Definition
File The file in which the event originated.
Line The line number of the event.
Task Id The task ID of the event.
Code The event code.
Time The time this event occurred.
Unit The unit for the event.
show hardware
This command displays inventory information for the switch.
Note:The show version command and the show hardware command display the same
information. In future releases of the software, the show hardware command will not be available. For
a description of the command output, see the command show version on page 109.
Format show hardware
Mode Privileged EXEC
show version
This command displays inventory information for the switch.
Note:The show version command will replace the show hardware command in future releases
of the software.
Term Definition
System Description Text used to identify the product name of this switch.
Machine Type The machine model as defined by the Vital Product Data.
Machine Model The machine model as defined by the Vital Product Data
Serial Number The unique box serial number for this switch.
Burned in MAC Address Universally assigned network address.
Software Version The release.version.revision number of the code currently running on the switch.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show platform vpd
show interface
This command displays a summary of statistics for a specific interface or a count of all CPU traffic based upon the
argument.
Format show interface {slot/port | switchport}
Mode Privileged EXEC
Term Definition
Receive Packets Discarded The number of inbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for
discarding such a packet could be to free up buffered space.
Packets Transmitted Without The total number of packets transmitted out of the interface.
Error
Transmit Packets Discarded The number of outbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. A possible reason for
discarding a packet could be to free up buffer space.
Transmit Packets Errors The number of outbound packets that could not be transmitted because of errors.
Collisions Frames The best estimate of the total number of collisions on this Ethernet segment.
Time Since Counters Last The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last
Cleared cleared.
Term Definition
Packets Received Successfully:
Port Interface (slot/port), port-channel number, or CPU.
InOctets Total Packets Received Without Error - The total number of packets received that were without errors.
InUcastPkts Unicast Packets Received - The number of subnetwork-unicast packets delivered to a higher-layer protocol.
InMcastPkts Multicast Packets Received - The total number of good packets received that were directed to a
multicast address. Note that this number does not include packets directed to the broadcast address.
InBcastPkts Broadcast Packets Received - The total number of good packets received that were directed to the
broadcast address. Note that this does not include multicast packets.
Packets Transmitted Successfully:
Port Interface (slot/port), port-channel number, or CPU.
OutOctets Total Packets Transmitted Successfully - The number of frames that have been transmitted by this port
to its segment.
OutUcastPkts Unicast Packets Transmitted - The total number of packets that higher-level protocols requested be
transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
OutMcastPkts Multicast Packets Transmitted - The total number of packets that higher-level protocols requested be
transmitted to a Multicast address, including those that were discarded or not sent.
OutBcastPkts Broadcast Packets Transmitted - The total number of packets that higher-level protocols requested be
transmitted to the Broadcast address, including those that were discarded or not sent.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show interface counters
Port InOctets InUcastPkts InMcastPkts InBcastPkts
--------- ---------------- ---------------- ---------------- ----------------
0/1 0 0 0 0
0/2 0 0 0 0
0/3 15098 0 31 39
0/4 0 0 0 0
0/5 0 0 0 0
...
...
ch1 0 0 0 0
ch2 0 0 0 0
...
ch64 0 0 0 0
CPU 359533 0 3044 217
When you specify a value for slot/port, the command displays the following information.
Term Definition
Packets Received Total Packets Received (Octets) - The total number of octets of data (including those in bad
packets) received on the network (excluding framing bits but including Frame Check Sequence (FCS)
octets). This object can be used as a reasonable estimate of Ethernet utilization. If greater precision
is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a
common interval. The result of this equation is the value Utilization which is the percent utilization of
the Ethernet segment on a scale of 0 to 100 percent.
Packets Received 64 Octets - The total number of packets (including bad packets) received that
were 64 octets in length (excluding framing bits but including FCS octets).
Packets Received 65127 Octets - The total number of packets (including bad packets) received
that were from 65 to 127 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received 128255 Octets - The total number of packets (including bad packets) received
that were from 128 to 255 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received 256511 Octets - The total number of packets (including bad packets) received
that were from 256 to 511 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received 5121023 Octets - The total number of packets (including bad packets) received
that were from 512 to 1023 octets in length inclusive (excluding framing bits but including FCS
octets).
Packets Received 10241518 Octets - The total number of packets (including bad packets) received
that were from 1024 to 1518 octets in length inclusive (excluding framing bits but including FCS
octets).
Packets Received > 1518 Octets - The total number of packets received that were longer than 1522
octets (excluding framing bits, but including FCS octets) and were otherwise well formed.
Packets RX and TX 64 Octets - The total number of packets (including bad packets) received and
transmitted that were 64 octets in length (excluding framing bits but including FCS octets).
Packets RX and TX 65127 Octets - The total number of packets (including bad packets) received
and transmitted that were from 65 to 127 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets RX and TX 128255 Octets - The total number of packets (including bad packets) received
and transmitted that were from 128 to 255 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets RX and TX 256511 Octets - The total number of packets (including bad packets) received
and transmitted that were from 256 to 511 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets RX and TX 5121023 Octets - The total number of packets (including bad packets) received
and transmitted that were from 512 to 1023 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets RX and TX 10241518 Octets - The total number of packets (including bad packets)
received and transmitted that were from 1024 to 1518 octets in length inclusive (excluding framing
bits but including FCS octets).
Packets RX and TX 15192047 Octets - The total number of packets received and transmitted that
were from 1519 to 2047 octets in length inclusive (excluding framing bits, but including FCS octets)
and were otherwise well formed.
Packets RX and TX 20484095 Octets - The total number of packets received that were from
2048 to 4095 octets in length inclusive (excluding framing bits, but including FCS octets) and were
otherwise well formed.
Packets RX and TX 40969216 Octets - The total number of packets received that were from
4096 to 9216 octets in length inclusive (excluding framing bits, but including FCS octets) and were
otherwise well formed.
Packets Received Total Packets Received Without Error - The total number of packets received that were without errors.
Successfully Unicast Packets Received - The number of subnetwork-unicast packets delivered to a higher-layer
protocol.
Multicast Packets Received - The total number of good packets received that were directed to a
multicast address. Note that this number does not include packets directed to the broadcast address.
Broadcast Packets Received - The total number of good packets received that were directed to the
broadcast address. Note that this does not include multicast packets.
Term Definition
Receive Packets Discarded The number of inbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for
discarding such a packet could be to free up buffer space.
Packets Received with MAC Total Packets Received with MAC Errors - The total number of inbound packets that contained
Errors errors preventing them from being deliverable to a higher-layer protocol.
Jabbers Received - The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS)
with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets
(Alignment Error). Note that this definition of jabber is different than the definition in IEEE-802.3
section 8.2.1.5 (10BASE5) and section 10.3.1.4 (10BASE2). These documents define jabber as the
condition where any packet exceeds 20 ms. The allowed range to detect jabber is between 20 ms
and 150 ms.
Fragments/Undersize Received - The total number of packets received that were less than 64 octets
in length (excluding framing bits but including FCS octets).
Alignment Errors - The total number of packets received that had a length (excluding framing bits,
but including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check
Sequence (FCS) with a non-integral number of octets.
FCS Errors - The total number of packets received that had a length (excluding framing bits, but
including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check Sequence
(FCS) with an integral number of octets.
Overruns - The total number of frames discarded as this port was overloaded with incoming packets,
and could not keep up with the inflow.
Received Packets Not Total Received Packets Not Forwarded - A count of valid frames received which were discarded (in
Forwarded other words, filtered) by the forwarding process
802.3x Pause Frames Received - A count of MAC Control frames received on this interface with
an opcode indicating the PAUSE operation. This counter does not increment when the interface is
operating in half-duplex mode.
Unacceptable Frame Type - The number of frames discarded from this port due to being an
unacceptable frame type.
Packets Transmitted Octets Total Packets Transmitted (Octets) - The total number of octets of data (including those in bad
packets) received on the network (excluding framing bits but including FCS octets). This object
can be used as a reasonable estimate of Ethernet utilization. If greater precision is desired, the
etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval.
Packets Transmitted 64 Octets - The total number of packets (including bad packets) received that
were 64 octets in length (excluding framing bits but including FCS octets).
Packets Transmitted 65-127 Octets - The total number of packets (including bad packets) received
that were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS
octets).
Packets Transmitted 128-255 Octets - The total number of packets (including bad packets) received
that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS
octets).
Packets Transmitted 256-511 Octets - The total number of packets (including bad packets) received
that were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS
octets).
Packets Transmitted 512-1023 Octets - The total number of packets (including bad packets)
received that were between 512 and 1023 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Transmitted 1024-1518 Octets - The total number of packets (including bad packets)
received that were between 1024 and 1518 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Transmitted > 1518 Octets - The total number of packets transmitted that were longer than
1518 octets (excluding framing bits, but including FCS octets) and were otherwise well formed.
Max Frame Size - The maximum size of the Info (non-MAC) field that this port will receive or
transmit.
Packets Transmitted Total Packets Transmitted Successfully - The number of frames that have been transmitted by this
Successfully port to its segment.
Unicast Packets Transmitted - The total number of packets that higher-level protocols requested be
transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
Multicast Packets Transmitted - The total number of packets that higher-level protocols requested
be transmitted to a Multicast address, including those that were discarded or not sent.
Broadcast Packets Transmitted - The total number of packets that higher-level protocols requested
be transmitted to the Broadcast address, including those that were discarded or not sent.
Term Definition
Transmit Packets Discarded The number of outbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. A possible reason for
discarding a packet could be to free up buffer space.
Transmit Errors Total Transmit Errors - The sum of Single, Multiple, and Excessive Collisions.
Transmit Discards Total Transmit Packets Discards - The sum of single collision frames discarded, multiple collision
frames discarded, and excessive frames discarded.
Single Collision Frames - A count of the number of successfully transmitted frames on a particular
interface for which transmission is inhibited by exactly one collision.
Multiple Collision Frames - A count of the number of successfully transmitted frames on a particular
interface for which transmission is inhibited by more than one collision.
Excessive Collisions - A count of frames for which transmission on a particular interface fails due to
excessive collisions.
Protocol Statistics 802.3x Pause Frames Transmitted - A count of MAC Control frames transmitted on this interface
with an opcode indicating the PAUSE operation. This counter does not increment when the interface
is operating in half-duplex mode.
GVRP PDUs Received - The count of GVRP PDUs received in the GARP layer.
GVRP PDUs Transmitted - The count of GVRP PDUs transmitted from the GARP layer.
GVRP Failed Registrations - The number of times attempted GVRP registrations could not be
completed.
GMRP PDUs Received - The count of GMRP PDUs received in the GARP layer.
GMRP PDUs Transmitted - The count of GMRP PDUs transmitted from the GARP layer.
GMRP Failed Registrations - The number of times attempted GMRP registrations could not be
completed.
STP BPDUs Transmitted - Spanning Tree Protocol Bridge Protocol Data Units sent.
STP BPDUs Received - Spanning Tree Protocol Bridge Protocol Data Units received.
RST BPDUs Transmitted - Rapid Spanning Tree Protocol Bridge Protocol Data Units sent.
RSTP BPDUs Received - Rapid Spanning Tree Protocol Bridge Protocol Data Units received.
MSTP BPDUs Transmitted - Multiple Spanning Tree Protocol Bridge Protocol Data Units sent.
MSTP BPDUs Received - Multiple Spanning Tree Protocol Bridge Protocol Data Units received.
Dot1x Statistics EAPOL Frames Transmitted - The number of EAPOL frames of any type that have been transmitted
by this authenticator.
EAPOL Frames Received - The number of valid EAPOL frames of any type that have been received
by this authenticator.
Time Since Counters Last The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last
Cleared cleared.
If you use the all keyword, the following information appears for all interfaces on the switch.
Term Definition
Port The Interface ID.
Bytes Tx The total number of bytes transmitted by the interface.
Bytes Rx The total number of bytes transmitted by the interface.
Packets Tx The total number of packets transmitted by the interface.
Packets Rx The total number of packets transmitted by the interface.
Parameter Definition
interface-id The slot/port of the switch.
Term Description
Temp Internally measured transceiver temperature.
Voltage Internally measured supply voltage.
Current Measured TX bias current.
Output Power Measured optical output power relative to 1mW.
Input Power Measured optical power received relative to 1mW.
TX Fault Transmitter fault.
LOS Loss of signal.
Output Input
Port Temp Voltage Current Power Power TX LOS
[C] [Volt] [mA] [dBm] [dBm] Fault
-------- ---- ------- ------- ------- ------- ----- ---
0/49 39.3 3.256 5.0 -2.234 -2.465 No No
0/50 33.9 3.260 5.3 -2.374 -40.000 No Yes
0/51 32.2 3.256 5.6 -2.300 -2.897 No No
Term Description
Port The interface (slot/port).
Vendor Name The vendor name is a 16-character field that contains ASCII characters, left-aligned and padded on
the right with ASCII spaces (20h). The vendor name is the full name of the corporation, a commonly
accepted abbreviation of the name of the corporation, the SCSI company code for the corporation, or
the stock exchange code for the corporation.
Link Length (50um, OM2) This value specifies link length that is supported by the transceiver while operating in compliance with
applicable standards using 50 micron multimode OM2 [500MHz*km at 850nm] fiber. A value of zero
means that the transceiver does not support 50 micron multimode fiber or that the length information
must be determined from the transceiver technology.
Link Length (62.5um, OM1) This value specifies link length that is supported by the transceiver while operating in compliance
with applicable standards using 62.5 micron multimode OM1 [200 MHz*km at 850nm, 500 MHz*km
at 1310nm] fiber. A value of zero means that the transceiver does not support 62.5 micron multimode
fiber or that the length information must determined from the transceiver technology
Serial Number The vendor serial number (vendor SN) is a 16 character field that contains ASCII characters, left-
aligned and padded on the right with ASCII spaces (20h), defining the vendors serial number for the
transceiver. A value of all zero in the 16-byte field indicates that the vendor SN is unspecified.
Part Number The vendor part number (vendor PN) is a 16-byte field that contains ASCII characters, left aligned and
added on the right with ASCII spaces (20h), defining the vendor part number or product name. A value
of all zero in the 16-byte field indicates that the vendor PN is unspecified.
Nominal Bit Rate (Mbps) The nominal bit (signaling) rate (BR, nominal) is specified in units of 100 MBd, rounded off to the
nearest 100 MBd. The bit rate includes those bits necessary to encode and delimit the signal as well as
those bits carrying data information. A value of 0 indicates that the bit rate is not specified and must
be determined from the transceiver technology. The actual information transfer rate will depend on
the encoding of the data, as defined by the encoding value.
Rev The vendor revision number (vendor rev) contains ASCII characters, left aligned and padded on the
right with ASCII spaces (20h), defining the vendors product revision number. A value of all zero in this
field indicates that the vendor revision is unspecified.
show mac-addr-table
This command displays the forwarding database entries. These entries are used by the transparent bridging
function to determine how to forward a received frame.
Enter all or no parameter to display the entire table. Enter a MAC Address and VLAN ID to display the table
entry for the requested MAC address on the specified VLAN. Enter the count parameter to view summary
information about the forwarding database table. Use the interface slot/port parameter to view MAC
addresses on a specific interface.
Instead of slot/port, lag lag-intf-num can be used as an alternate way to specify the LAG interface,
where lag-intf-num is the LAG port number. Use the vlan vlan_id parameter to display information
about MAC addresses on a specified VLAN.
Format show mac-addr-table [{macaddr vlan_id | all | count | interface slot/port |
vlanvlan_id}]
Mode Privileged EXEC
The following information is displayed if you do not enter a parameter, if you enter the keyword all, or if you
enter the MAC address and VLAN ID.
Term Definition
VLAN ID The VLAN in which the MAC address is learned.
MAC Address A unicast MAC address for which the switch has forwarding and or filtering information. The format is
six 2-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Interface The port through which this address was learned.
Interface Index This object indicates the ifIndex of the interface table entry associated with this port.
Status The status of this entry. The meanings of the values are:
Static The value of the corresponding instance was added by the system or a user when a static MAC
filter was defined. It cannot be relearned.
Learned The value of the corresponding instance was learned by observing the source MAC
addresses of incoming traffic, and is currently in use.
Management The value of the corresponding instance (system MAC address) is also the value of an
existing instance of dot1dStaticAddress. It is identified with interface 0/1. and is currently used when
enabling VLANs for routing.
Self The value of the corresponding instance is the address of one of the switchs physical interfaces
(the systems own MAC address).
GMRP Learned The value of the corresponding was learned via GMRP and applies to Multicast.
Other The value of the corresponding instance does not fall into one of the other categories.
If you enter vlan vlan_id, only the MAC Address, Interface, and Status fields appear. If you enter the
interface slot/port parameter, in addition to the MAC Address and Status fields, the VLAN ID field also
appears.
The following information displays if you enter the count parameter:
Term Definition
Dynamic Address count Number of MAC addresses in the forwarding database that were automatically learned.
Static Address (User-defined) Number of MAC addresses in the forwarding database that were manually entered by a user.
count
Total MAC Addresses in use Number of MAC addresses currently in the forwarding database.
Total MAC Addresses Number of MAC addresses the forwarding database can handle.
available
Parameter Description
rising threshold The percentage of CPU resources that, when exceeded for the configured rising interval, triggers a
notification. The range is 1 to 100. The default is 0 (disabled).
rising interval The duration of the CPU rising threshold violation, in seconds, that must be met to trigger a
notification. The range is 5 to 86400. The default is 0 (disabled).
falling threshold The percentage of CPU resources that, when usage falls below this level for the configured interval,
triggers a notification. The range is 1 to 100. The default is 0 (disabled).
A notification is triggered when the total CPU utilization falls below this level for a configured period
of time. The falling utilization threshold notification is made only if a rising threshold notification was
previously done. The falling utilization threshold must always be equal or less than the rising threshold
value. The CLI does not allow setting the falling threshold to be greater than the rising threshold.
falling interval The duration of the CPU falling threshold, in seconds, that must be met to trigger a notification. The
range is 5 to 86400. The default is 0 (disabled).
Example: The following shows example CLI display output for the command.
Admin Auto Running
ID Name PID Status Restart Status
---- ---------------- ----- --------- --------- -------
1 dataplane 15309 Enabled Disabled Running
2 switchdrvr 15310 Enabled Disabled Running
3 syncdb 15314 Enabled Disabled Running
4 lighttpd 18718 Enabled Enabled Running
5 syncdb-test 0 Disabled Disabled Stopped
6 proctest 0 Disabled Enabled Stopped
7 user.start 0 Enabled Disabled Stopped
Note:
It is not necessarily the traffic to the CPU, but different tasks that keep the CPU busy.
This command is available in Linux 2.6 only.
Example: The following shows example CLI display output for the command using Linux.
(UBNT EdgeSwitch) #show process cpu
CPU Utilization:
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show process proc-list
show running-config
Use this command to display or capture the current setting of different protocol packages supported on the
switch. This command displays or captures commands with settings and configurations that differ from the
default value. To display or capture the commands with settings and configurations that are equal to the default
value, include the all option.
Note:The show running-config command does not display the User Password, even if you set one
different from the default.
The output is displayed in script format, which can be used to configure another switch with the same
configuration. If the optional scriptname is provided with a file name extension of .scr, the output is
redirected to a script file.
Note: If you issue the show running-config command from a serial connection, remote access to
the switch through remote connections (such as Telnet) is suspended while the output is being generated
and displayed.
Note: If you use a text-based configuration file, the show running-config command only displays
configured physical interfaces (i.e., if any interface only contains the default configuration, that interface
will be skipped from the show running-config command output). This is true for any configuration mode
that contains nothing but default configuration. That is, the command to enter a particular config mode,
followed immediately by its exit command, are both omitted from the show running-config
command output (and hence from the startup-config file when the system configuration is saved.)
Note that --More-- or (q)uit is displayed at the bottom of the output screen until you reach the end of
the output.
Format show running-config [all | scriptname]
Mode Privileged EXEC
Parameter Description
interface Running configuration for the specified interface.
lag-intf-num Running configuration for the LAG interface.
vlan-id Running configuration for the VLAN routing interface.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show running-config interface 0/1
!Current Configuration:
!
interface 0/1
addport 3/1
exit
(UBNT EdgeSwitch) #
show
This command displays the content of text-based configuration files from the CLI. The text-based configuration
files (startup-config, backup-config and factory-defaults) are saved compressed in flash. With this command, the
files are decompressed while displaying their content.
Format show { startup-config | backup-config | factory-defaults }
Mode Privileged EXEC
Parameter Description
startup-config Display the content of the startup-config file.
backup-config Display the content of the backup-config file.
factory-defaults Display the content of the factory-defaults file.
Example: The following shows an example of the output from the command when the startup-config
parameter is specified.
(UBNT EdgeSwitch) #show startup-config
!Current Configuration:
!
!System Description EdgeSwitch 24-Port 500W, 0.8.0.4712594, Linux 3.6.5-f4a26ed5
!System Software Version 0.8.0.4712594
!System Up Time 1 days 4 hrs 22 mins 0 secs
!Additional Packages QOS,IPv6 Management,Routing
!Current SNTP Synchronized Time: SNTP Last Attempt Status Is Not Successful
!
vlan database
exit
configure
stack
member 2 4
exit
slot 2/0 5
set slot power 2/0
no set slot disable 2/0
line console
exit
line telnet
exit
--More-- or (q)uit
line ssh
exit
!
exit
(UBNT EdgeSwitch) #
Example: The following shows an example of output from the command when the backup-config
parameter is specified.
(UBNT EdgeSwitch) #show backup-config
!Current Configuration:
!
!System Description EdgeSwitch 24-Port 500W, 0.8.0.4712594, Linux 3.6.5-f4a26ed5
!System Software Version 0.8.0.4712594
!System Up Time 1 days 4 hrs 22 mins 0 secs
!Additional Packages QOS,IPv6 Management,Routing
!Current SNTP Synchronized Time: SNTP Last Attempt Status Is Not Successful
!
vlan database
exit
configure
stack
member 2 4
exit
slot 2/0 5
set slot power 2/0
no set slot disable 2/0
line console
exit
line telnet
exit
line ssh
exit
!
exit
(UBNT EdgeSwitch) #
Example: The following shows an example of output from the command when the factory-defaults
parameter is specified.
(UBNT EdgeSwitch) #show factory-defaults
!Current Configuration:
!
!System Description EdgeSwitch 24-Port 500W, 0.8.0.4712594, Linux 3.6.5-f4a26ed5
!System Software Version 0.8.0.4712594
!System Up Time 1 days 4 hrs 22 mins 0 secs
!Additional Packages QOS,IPv6 Management,Routing
!Current SNTP Synchronized Time: SNTP Last Attempt Status Is Not Successful
!
vlan database
exit
configure
stack
member 2 4
exit
slot 2/0 5
set slot power 2/0
no set slot disable 2/0
line console
exit
line telnet
exit
--More-- or (q)uit
line ssh
exit
!
exit
(UBNT EdgeSwitch) #
dir
Use this command to list the files in the directory /mnt/fastpath in flash from the CLI.
Format dir
Mode Privileged EXEC
Example: The following show an example of the output from the dir command:
(UBNT EdgeSwitch) #dir
show sysinfo
This command displays switch information.
Format show sysinfo
Mode Privileged EXEC
Term Description
Switch Description Text used to identify this switch.
System Name Name used to identify the switch.The factory default is blank. To configure the system name, see
snmp-server on page 73.
System Location Text used to identify the location of the switch. The factory default is blank. To configure the system
location, see snmp-server on page 73.
System Contact Text used to identify a contact person for this switch. The factory default is blank. To configure the
system location, see snmp-server on page 73.
System ObjectID The base object ID for the switchs enterprise MIB.
System Up Time The time in days, hours and minutes since the last switch reboot.
Current SNTP Synchronized The system time acquired from a network SNTP server.
Time
MIBs Supported A list of MIBs supported by this agent.
show tech-support
Use the show tech-support command to display system and configuration information when you contact
technical support. The output of the show tech-support command combines the output of the following
commands and includes log history files from previous runs:
show version
show sysinfo
show port all
show isdp neighbors
show logging
show event log
show logging buffered
show trap log
show running-config
Format show tech-support
Mode Privileged EXEC
length
Use this command to set the pagination length to value number of lines for the sessions specified by
configuring on different Line Config modes (telnet/ssh) and is persistent.
Example: The length command in Line Console mode applies for Serial Console session.
Default 24
Format length value
Mode Line Config
no length
Use this command to set the pagination length to the default value number of lines.
Format no length value
Mode Line Config
terminal length
Use this command to set the pagination length to value number of lines for the current session. This
command configuration takes an immediate effect on the current session and is nonpersistent.
Default 24 lines per page
Format terminal length value
Mode Privileged EXEC
no terminal length
Use this command to set the value to the length value configured on Line Config mode depending on the
type of session.
Format no terminal length value
Mode Privileged EXEC
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show terminal length
Terminal Length:
----------------------
For Current Session.. 24
For Serial Console.. 24
For Telnet Sessions... 24
For SSH Sessions.. 24
Parameter Description
1-256392 The CPU free memory threshold value. When CPU free memory falls below this threshold, a
notification message is triggered. The range is 1 to 256392. The default is 0 (disabled).
Logging Commands
This section describes the commands used to configure system logging, and to view logs and logging settings.
logging buffered
This command enables logging to an in-memory log that keeps up to 128 logs.
Default disabled; critical when enabled
Format logging buffered
Mode Global Config
no logging buffered
This command disables logging to in-memory log.
Format no logging buffered
Mode Global Config
logging cli-command
This command enables the CLI command logging feature, which enables the EdgeSwitch software to log all CLI
commands issued on the system.
Default enabled
Format logging cli-command
Mode Global Config
no logging cli-command
This command disables the CLI command Logging feature.
Format no logging cli-command
Mode Global Config
logging console
This command enables logging to the console. You can specify the severitylevel value as either an
integer from 0 to 7 or symbolically through one of the following keywords: emergency (0), alert (1),
critical (2), error (3), warning (4), notice (5), info (6), or debug (7).
Default disabled; critical when enabled
Format logging console [severitylevel]
Mode Global Config
no logging console
This command disables logging to the console.
Format no logging console
Mode Global Config
logging host
This command configures the logging host parameters. You can configure up to eight hosts.
Default port: 514
severitylevel: critical (2)
Format logging host {hostaddress|hostname} addresstype {port severitylevel}
Mode Global Config
Parameter Description
hostaddress The IP address of the logging host.
hostname The hostname of the logging host.
addresstype Indicates the type of address ipv4 or ipv6 or dns being passed.
port A port number from 1 to 65535.
severitylevel Specify this value as either an integer from 0 to 7, or symbolically through one of the following keywords:
emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6),
or debug (7).
logging port
This command sets the local port number of the LOG client for logging messages. The portid can be in the
range from 1 to 65535.
Default 514
Format logging port portid
Mode Global Config
no logging port
This command resets the local logging port to the default.
Format no logging port
Mode Global Config
logging syslog
This command enables syslog logging.
Format logging syslog
Mode Global Config
no logging syslog
This command disables syslog logging.
Format no logging syslog
Mode Global Config
Parameter Description
slot/port VLAN or port-based routing interface.
vlan-id Configures the VLAN interface to use as the source IP address. The range of the VLAN ID is 1 to 4093.
show logging
This command displays logging configuration information.
Format show logging
Mode Privileged EXEC
Term Description
Logging Client Local Port Port on the collector/relay to which syslog messages are sent.
Logging Client Source Shows the configured syslog source-interface (source IP address).
Interface
CLI Command Logging Shows whether CLI Command logging is enabled.
Console Logging Shows whether console logging is enabled.
Console Logging Severity The minimum severity to log to the console log. Messages with an equal or lower numerical severity
Filter are logged.
Buffered Logging Shows whether buffered logging is enabled.
Persistent Logging Shows whether persistent logging is enabled.
Persistent Logging Severity The minimum severity at which the logging entries are retained after a system reboot.
Filter
Syslog Logging Shows whether syslog logging is enabled.
Log Messages Received Number of messages received by the log process. This includes messages that are dropped or ignored.
Log Messages Dropped Number of messages that could not be processed due to error or lack of resources.
Log Messages Relayed Number of messages sent to the collector/relay.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show logging
Term Description
Buffered (In-Memory) Shows whether the In-Memory log is enabled or disabled.
Logging
Buffered Logging Wrapping The behavior of the In-Memory log when faced with a log full situation.
Behavior
Buffered Log Count The count of valid entries in the buffered log.
Term Description
Index Used for deleting hosts.
IP Address / Hostname IP address or hostname of the logging host.
Severity The minimum severity to log to the specified address. The possible values are emergency (0),
alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7).
Port The server port number, which is the port on the local host from which syslog messages are sent.
Status The state of logging to configured syslog hosts. If the status is disable, no logging occurs.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show logging hosts ?
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show logging persistent
Term Definition
Number of Traps Since Last The number of traps since the last boot.
Reset
Trap Log Capacity The number of traps the system can retain.
Number of Traps Since Log The number of new traps since the command was last executed.
Last Viewed
Log The log number.
System Time Up How long the system had been running at the time the trap was sent.
Trap The text of the trap message.
no logging email
This command disables email alerting.
Format no logging email
Mode Global Config
logging traps
This command sets the severity at which SNMP traps are logged and sent in an email. Specify the
severitylevel value as either an integer from 0 to 7 or symbolically through one of the following
keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5),
info(6), or debug (7).
Default Info (6) messages and higher are logged.
Format logging traps severitylevel
Mode Global Config
no logging traps
This command resets the SNMP trap logging severity level to the default value.
Format no logging traps
Mode Global Config
Term Definition
Email Alert Logging The administrative status of the feature: enabled or disabled
Email Alert From Address The email address of the sender (the switch).
Email Alert Urgent Severity The lowest severity level that is considered urgent. Messages of this type are sent immediately.
Level
Email Alert Non Urgent The lowest severity level that is considered non-urgent. Messages of this type, up to the urgent level,
Severity Level are collected and sent in a batch email. Log messages that are less severe are not sent in an email
message at all.
Email Alert Trap Severity The lowest severity level at which traps are logged.
Level
Email Alert Notification The amount of time to wait between non-urgent messages.
Period
Email Alert To Address Table The configured email recipients.
Email Alert Subject Table The subject lines included in urgent (Type 1) and non-urgent (Type 2) messages.
For Msg Type urgent, subject is: The configured email subject for sending urgent messages.
For Msg Type non-urgent, subject is: The configured email subject for sending non-urgent messages.
Term Definition
Email Alert Operation Status The operational status of the email alerting feature.
No of Email Failures The number of email messages that have attempted to be sent but were unsuccessful.
No of Email Sent The number of email messages that were sent from the switch since the counter was cleared.
Time Since Last Email Sent The amount of time that has passed since the last email was sent from the switch.
mail-server
This command configures the SMTP server to which the switch sends email alert messages and changes the
mode to Mail Server Configuration mode. The server address can be in the IPv4, IPv6, or DNS name format.
Format mail-server {ip-address | ipv6-address | hostname}
Mode Global Config
no mail-server
This command removes the specified SMTP server from the configuration.
Format no mail-server {ip-address | ipv6-address | hostname}
Mode Global Config
security
This command sets the email alerting security protocol by enabling the switch to use TLS authentication with the
SMTP Server. If the TLS mode is enabled on the switch but the SMTP sever does not support TLS mode, no email
is sent to the SMTP server.
Default none
Format security {tlsv1 | none}
Mode Mail Server Config
port
This command configures the TCP port to use for communication with the SMTP server. The recommended port
for TLSv1 is 465, and for no security (i.e. none) it is 25. However, any nonstandard port in the range 1 to 65535 is
also allowed.
Default 25
Format port {465 | 25 | 165535}
Mode Mail Server Config
password
This command configures the password the switch uses to authenticate with the SMTP server.
Default admin
Format password password
Mode Mail Server Config
Term Definition
No of mail servers The number of SMTP servers configured on the switch.
configured
Email Alert Mail Server The IPv4/IPv6 address or DNS hostname of the configured SMTP server.
Address
Email Alert Mail Server Port The TCP port the switch uses to send email to the SMTP server
Email Alert Security Protocol The security protocol (TLS or none) the switch uses to authenticate with the SMTP server.
Email Alert Username The username the switch uses to authenticate with the SMTP server.
Email Alert Password The password the switch uses to authenticate with the SMTP server.
Using the options described below, you can specify the initial and maximum time-to-live (TTL) in probe packets,
the maximum number of failures before termination, the number of probes sent for each TTL, and the size of
each probe.
Parameter Description
ip-address The IP address value should be a valid IP address.
ipv6-address The IPv6 address value should be a valid IPv6 address.
hostname The hostname value should be a valid hostname.
ipv6 The optional ipv6 keyword can be used before ipv6-address or hostname. Giving the ipv6
keyword before the hostname tries it to resolve to an IPv6 address.
Parameter Description
initTtl Use initTtl to specify the initial time-to-live (TTL), the maximum number of router hops between
the local and remote system. Range is 1 to 255.
maxTtl Use maxTtle to specify the maximum TTL. Range is 1 to 255.
maxFail Use maxFail to terminate the traceroute after failing to receive a response for this number of
consecutive probes. Range is 1 to 255.
interval Use the optional interval parameter to specify the time between probes, in seconds. If a response
is not received within this interval, then traceroute considers that probe a failure (printing *) and sends
the next probe. If traceroute does receive a response to a probe within this interval, then it sends the
next probe immediately. Range is 1 to 60 seconds.
count Use the optional count parameter to specify the number of probes to send for each TTL value.
Range is 1 to 10 probes.
port Use the optional port parameter to specify destination UDP port of the probe. This should be an
unused port on the remote destination system. Range is 1 to 65535.
size Use the optional size parameter to specify the size, in bytes, of the payload of the Echo Requests
sent. Range is 0 to 65507 bytes.
source Use the optional source parameter to specify the source IP address or interface for the traceroute.
The above command can also be execute with the optional ipv6 parameter as follows:
(UBNT EdgeSwitch) # traceroute ipv6 2001::2 initTtl 1 maxTtl 4 maxFail 0 interval 1 count 3 port
33434 size 43
clear config
This command resets the configuration to the factory defaults without powering off the switch. When you
issue this command, a prompt appears to confirm that the reset should proceed. When you enter y, you
automatically reset the current configuration on the switch to the default values. It does not reset the switch.
Format clear config
Mode Privileged EXEC
clear counters
This command clears the statistics for a specified slot/port, for all ports, or for the entire switch (if no
parameter is specified).
Format clear counters [slot/port | all]
Mode Privileged EXEC
clear igmpsnooping
This command clears the tables managed by the IGMP Snooping function and attempts to delete these entries
from the Multicast Forwarding Database.
Format clear igmpsnooping
Mode Privileged EXEC
clear pass
This command resets all user passwords to the factory defaults without powering off the switch. You are
prompted to confirm that the password reset should proceed.
Format clear pass
Mode Privileged EXEC
clear traplog
This command clears the trap log.
Format clear traplog
Mode Privileged EXEC
clear vlan
This command resets VLAN configuration parameters to the factory defaults. When the VLAN configuration is
reset to the factory defaults, there are some scenarios regarding GVRP and MVRP that happen due to this:
1. Static VLANs are deleted.
2. GVRP is restored to the factory default as a result of handling the VLAN RESTORE NOTIFY event. Since GVRP is
disabled by default, this means that GVRP should be disabled and all of its dynamic VLANs should be deleted.
Format clear vlan
Mode Privileged EXEC
logout
This command closes the current telnet connection or resets the current serial connection.
Format logout
Modes Privileged EXEC
User EXEC
ping
Use this command to determine whether another computer is on the network. Ping provides a synchronous
response when initiated from the CLI and web interfaces.
Default The default count is 1.
The default interval is 3 seconds.
The default size is 0 bytes.
Format ping {address | hostname | {ipv6 {interface {slot/port | vlan 1-4093 | network}
link-local-address} | ipv6-address | hostname} [count count] [interval 1-60]
[size size] [source ip-address | ipv6-address | {slot/port | vlan 1-4093 |
network}]
Modes Privileged EXEC, User EXEC
Using the options described below, you can specify the number and size of Echo Requests and the interval
between Echo Requests.
Parameter Description
address The IPv4 or IPv6 address to ping.
hostname The hostname of the host to ping.
ipv6 The optional keyword ipv6 can be used before the ipv6-address or hostname argument.
Using the ipv6 optional keyword before hostname tries to resolve it directly to the IPv6 address. Also
used for pinging a link-local IPv6 address.
count Use the count parameter to specify the number of ping packets (ICMP Echo Requests) that are sent to
the destination address specified by the address field. The range for count is 1 to 15 requests.
interval Use the interval parameter to specify the time between Echo Requests, in seconds. Range is 1 to 60
seconds.
size Use the size parameter to specify the size, in bytes, of the payload of the Echo Requests sent. Range is
0 to 65507 bytes.
source Use the source keyword to specify the source IP/IPv6 address or interface to use when sending the
Echo Request packets.
interface Use the interface keyword to ping a link-local IPv6 address over an interface.
link-local-address The link-local IPv6 address to ping over an interface.
quit
This command closes the current telnet connection or resets the current serial connection. The system asks you
whether to save configuration changes before quitting.
Format quit
Modes Privileged EXEC
User EXEC
reload
This command resets the switch without powering it off. Reset means that all network connections are
terminated and the boot code executes. The switch uses the stored configuration to initialize the switch. You are
prompted to confirm that the reset should proceed. The LEDs on the switch indicate a successful reset.
Format reload
Mode Privileged EXEC
copy
The copy command uploads and downloads files to and from the switch. You can also use the copy
command to manage the dual images (active and backup) on the file system. To upload and download files from
a server you can use FTP, TFTP, Xmodem, Ymodem, or Zmodem. SFTP and SCP are available as additional transfer
methods if the software package supports secure management. If FTP is used, a password is required.
Format copy source destination {verify | noverify}
Mode Privileged EXEC
Replace the source and destination parameters with the options in Table 11. Copy Parameters on
page 141. For the url source or destination, use one of the following values:
{xmodem | tftp://ipaddr|hostname | ip6address|hostname/filepath/filename
[noval] | ftp://user@ipaddress | hostname/filepath/filename}
The verify | noverify parameters are only available if the image/configuration verify options feature is
enabled (see file verify on page 143). The verify parameter specifies that digital signature verification
will be performed for the specified downloaded image or configuration file. The noverify parameter
specifies that no verification will be performed.
The keyword ias-users supports the downloading of the IAS user database file. When the IAS users file
is downloaded, the switch IAS users database is replaced with the users and its attributes available in the
downloaded file. In the command copy url ias-users, for url one of the following is used for the IAS
usersfile:
{ { tftp://ipaddr|hostname | ipv6address|hostname/filepath/filename } |
{ sftp | scp://username@ipaddress/filepath/filename} }
Note: The maximum length for the file path is 160 characters, and the maximum length for the file name is
31 characters.
For FTP, TFTP, SFTP, and SCP, the ipaddr|hostname parameter is the IP address or host name of the server,
filepath is the path to the file, and filename is the name of the file you want to upload or download.
ForSFTP and SCP, the username parameter is the username for logging into the remote server via SSH.
Note: ip6address is also a valid parameter for routing packages that support IPv6.
CAUTION: Remember to upload the existing fastpath.cfg file off the switch prior to loading a new release
image in order to make a backup.
url nvram:sshkey-dsa Downloads an SSH key file. For more information, see Secure Shell
Commands on page 46.
url nvram:sshkey-rsa1 Downloads an SSH key file.
url nvram:sshkey-rsa2 Downloads an SSH key file.
url nvram:sslpem-dhweak Downloads an HTTP secure-server certificate.
url nvram:sslpem- Downloads an HTTP secure-server certificate.
dhstrong
url nvram:sslpem-root Downloads an HTTP secure-server certificate. For more information,
see Hypertext Transfer Protocol Commands on page 49.
url nvram:sslpem-server Downloads an HTTP secure-server certificate.
url nvram:startup-config Downloads the startup configuration file to the system.
url ias-users Downloads an IAS users database file to the system. When the IAS
users file is downloaded, the switch IAS users database is replaced
with the users and their attributes available in the downloaded file.
url {active | backup} Download an image from the remote server to either image.
{active | backup} url Upload either image to the remote server.
active backup Copy the active image to the backup image.
backup active Copy the backup image to the active image.
Example: The following shows an example of downloading and applying the IAS users file.
(UBNT EdgeSwitch) #copy tftp://10.131.17.104/aaa_users.txt ias-users
Mode........................................... TFTP
Set Server IP.................................. 10.131.17.104
Path........................................... ./
Filename....................................... aaa_users.txt
Data Type...................................... IAS Users
Management access will be blocked for the duration of the transfer
Are you sure you want to start? (y/n) y
File transfer operation completed successfully.
Validating and updating the users to the IAS users database.
Updated IAS users database successfully.
(UBNT EdgeSwitch) #
file verify
This command enables digital signature verification while an image and/or configuration file is downloaded to
the switch.
Format file verify {all | image | none | script}
Mode Global Config
Parameter Description
all Verifies the digital signature of both image and configuration files.
image Verifies the digital signature of image files only.
none Disables digital signature verification for both images and configuration files.
script Verifies the digital signature of configuration files.
no file verify
Resets the configured digital signature verification value to the factory default value.
Format no file verify
Mode Global Config
sntp server
This command configures an SNTP server (a maximum of three). The server address can be either an IPv4 address
or an IPv6 address. The optional priority can be a value of 1-3, the version a value of 1-4, and the
port-id a value of 1-65535.
Format sntp server {ipaddress | ipv6address | hostname} [priority [version [port-id]]]
Mode Global Config
no sntp server
This command deletes an server from the configured SNTP servers.
Format no sntp server remove {ipaddress | ipv6address | hostname}
Mode Global Config
sntp source-interface
Use this command to specify the physical or logical interface to use as the source interface (source IP address)
for SNTP unicast server configuration. If configured, the address of source Interface is used for all SNTP
communications between the SNTP server and the SNTP client. The selected source-interface IP address is used
for filling the IP header of management protocol packets. This allows security devices (firewalls) to identify the
source packets coming from the specific switch. If a source-interface is not specified, the primary IP address of
the originating (outbound) interface is used as the source address. If the configured interface is down, the SNTP
client falls back to its default behavior.
Format sntp source-interface {slot/port | vlan vlan-id}
Mode Global Config
Parameter Description
slot/port The unit identifier assigned to the switch.
vlan-id Configures the VLAN interface to use as the source IP address. The range of the VLAN ID is 1 to 4093.
no sntp source-interface
Use this command to reset the SNTP source interface to the default settings.
Format no sntp source-interface
Mode Global Config
show sntp
This command is used to display SNTP settings and status.
Format show sntp
Mode Privileged EXEC
Term Definition
Last Update Time Time of last clock update.
Last Attempt Time Time of last transmit query (in unicast mode).
Last Attempt Status Status of the last SNTP request (in unicast mode) or unsolicited message (in broadcast mode).
Broadcast Count Current number of unsolicited broadcast messages that have been received and processed by the
SNTP client since last reboot.
Multicast Count Current number of unsolicited multicast messages that have been received and processed by the
SNTP client since last reboot.
Term Definition
Client Supported Modes Supported SNTP Modes (Broadcast, Unicast, or Multicast).
SNTP Version The highest SNTP version the client supports.
Port SNTP Client Port. The field displays the value 0 if it is default value. When the client port value is 0, if
the client is in broadcast mode, it binds to port 123; if the client is in unicast mode, it binds to the port
assigned by the underlying OS.
Client Mode Configured SNTP Client Mode.
Term Definition
Server IP Address / IP address or hostname of configured SNTP Server.
Hostname
Server Type Address type of server (IPv4, IPv6, or DNS).
Server Stratum Claimed stratum of the server for the last received valid packet.
Server Reference ID Reference clock identifier of the server for the last received valid packet.
Server Mode SNTP Server mode.
Server Maximum Entries Total number of SNTP Servers allowed.
Server Current Entries Total number of SNTP configured.
Term Description
SNTP Client Source Interface The interface ID of the physical or logical interface configured as the SNTP client source interface.
SNTP Client Source IPv4 The IP address of the interface configured as the SNTP client source interface.
Address
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show sntp source-interface
(UBNT EdgeSwitch) #
Parameter Description
hh:mm:ss Enter the current system time in 24-hour format in hours (0-23), minutes (0-59), and seconds (0-59).
mm/dd/yyyy Enter the current system date the format month, day, year:
The range for month is 1 to 12.
The range for the day of the month is 1 to 31.
The range for year is 2010 to 2079.
Parameter Description
date Day of the month. Range is 1 to 31.
month Month. Range is the first three letters by name; for example, jan for January.
year Year. The range is 2010 to 2079.
hh:mm Time in 24-hour format in hours and minutes:
The range for hours is 0 to 23.
The range for minutes is 0 to 59.
offset The number of minutes to add during the summertime. The range is 1 to 1440.
acronym The time zone acronym to display when summer-time is in effect. Up to four characters are allowed.
Parameter Description
week Week of the month. The range is 1 to 5, first, last.
day Day of the week. The range is the first three letters by name; sun, for example.
month Month. The range is the first three letters by name; jan, for example.
hh:mm Time in 24-hour format in hours and minutes. The range is hours: 0 to 23, minutes: 0 to 59.
offset The number of minutes to add during summer-time. The range is 1 to 1440.
acronym The time zone acronym to display when summer-time is in effect. Up to four characters are allowed.
no clock summer-time
This command disables the summer-time settings.
Format no clock summer-time
Mode Global Config
clock timezone
Use this command to set the offset to Coordinated Universal Time (UTC). If the optional parameters are not
specified, they will be read as either 0 or \0 as appropriate.
Format clock timezone {hours} [minutes minutes] [zone acronym]
Mode Global Config
Parameter Description
hours Hours difference from UTC. The range is -12 to 13.
minutes Minutes difference from UTC. The range is 0 to 59.
acronym The acronym for the time zone. Up to four characters are allowed.
no clock timezone
Use this command to reset the time zone settings.
Format no clock timezone
Mode Global Config
show clock
Use this command to display the time and date from the system clock.
Format show clock
Mode Privileged Exec
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) # show clock
15:02:09 (UTC+0:00) Nov 1 2011
No time source
Example: The following shows example CLI display output for the command.
With the above configuration the output appears as below:
(UBNT EdgeSwitch) # show clock
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) # show clock detail
Time zone:
Acronym not configured
Offset is UTC+0:00
Summertime:
Summer-time is disabled
Example: The following shows example CLI display output for the command.
With the above configuration the output appears as below:
(UBNT EdgeSwitch) # show clock detail
Time zone:
Acronym is INDA
Offset is UTC+5:30
Summertime:
Acronym is INDA
Recurring every year
Begins on second Sunday of Nov at 03:18
Ends on second Monday of Nov at 03:18
Offset is 120 minutes
Summer-time is in effect.
no ip dhcp pool
This command removes the DHCP address pool. The name should be a previously configured pool name.
Format no ip dhcp pool name
Mode Global Config
client-identifier
This command specifies the unique identifier for a DHCP client. The unique-identifier is a valid notation
in hexadecimal format. Some systems, such as Microsoft DHCP clients, require the client identifier instead of
hardware addresses. The unique-identifier is a concatenation of the media type and the MAC address.
For example, the Microsoft client identifier for Ethernet address c819.2488.f177 is 01c8.1924.88f1.77 where 01
represents the Ethernet media type. For more information, refer to the Address Resolution Protocol Parameters
section of RFC 1700, Assigned Numbers for a list of media type codes.
Default none
Format client-identifier unique-identifier
Mode DHCP Pool Config
no client-identifier
This command deletes the client identifier.
Format no client-identifier
Mode DHCP Pool Config
client-name
This command specifies the name for a DHCP client. Name is a string consisting of standard ASCII characters.
Default none
Format client-name name
Mode DHCP Pool Config
no client-name
This command removes the client name.
Format no client-name
Mode DHCP Pool Config
default-router
This command specifies the default router list for a DHCP client. The address1 address2...address8
parameters are valid IP addresses, each containing four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is
invalid.
Default none
Format default-router address1 [address2....address8]
Mode DHCP Pool Config
no default-router
This command removes the default router list.
Format no default-router
Mode DHCP Pool Config
dns-server
This command specifies the IP servers available to a DHCP client. Address parameters are valid IP addresses; each
made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid.
Default none
Format dns-server address1 [address2....address8]
Mode DHCP Pool Config
no dns-server
This command removes the DNS Server list.
Format no dns-server
Mode DHCP Pool Config
hardware-address
This command specifies the hardware address of a DHCP client. Hardware-address is the MAC address of the
hardware platform of the client consisting of 6 bytes in dotted hexadecimal format. Type indicates the protocol
of the hardware platform. It is 1 for 10 MB Ethernet and 6 for IEEE 802.
Default ethernet
Format hardware-address hardwareaddress type
Mode DHCP Pool Config
no hardware-address
This command removes the hardware address of the DHCP client.
Format no hardware-address
Mode DHCP Pool Config
host
This command specifies the IP address and network mask for a manual binding to a DHCP client. Address and
Mask are valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is
invalid. The prefix-length is an integer from 0 to 32.
Default none
Format host address [{mask | prefix-length}]
Mode DHCP Pool Config
no host
This command removes the IP address of the DHCP client.
Format no host
Mode DHCP Pool Config
lease
This command configures the duration of the lease for an IP address that is assigned from a DHCP server to a
DHCP client. The overall lease time should be between 1-86400 minutes. If you specify infinite, the lease is
set for 60 days. You can also specify a lease duration in days (0-59), hours (0-23), and minutes (0-59).
Default 1 (day)
Format lease [{days [hours] [minutes] | infinite}]
Mode DHCP Pool Config
no lease
This command restores the default value of the lease time for DHCP Server.
Format no lease
Mode DHCP Pool Config
no network
This command removes the subnet number and mask.
Format no network
Mode DHCP Pool Config
bootfile
This command specifies the name (filename parameter) of the default boot image for a DHCP client.
Format bootfile filename
Mode DHCP Pool Config
no bootfile
This command deletes the boot image name.
Format no bootfile
Mode DHCP Pool Config
domain-name
This command specifies the domain name (domain parameter) for a DHCP client.
Default none
Format domain-name domain
Mode DHCP Pool Config
no domain-name
This command removes the domain name.
Format no domain-name
Mode DHCP Pool Config
domain-name enable
This command enables the domain name functionality.
Format domain-name enable [name name]
Mode Global Config
no domain-name enable
This command disables the domain name functionality.
Format no domain-name enable
Mode Global Config
netbios-name-server
This command configures NetBIOS Windows Internet Naming Service (WINS) name servers that are available to
DHCP clients. One IP address is required; you can specify up to eight addresses in one command line. Servers are
listed in order of preference (address1 is the most preferred server, address2 the next most preferred, etc.).
Default none
Format netbios-name-server address [address2...address8]
Mode DHCP Pool Config
no netbios-name-server
This command removes the NetBIOS name server list.
Format no netbios-name-server
Mode DHCP Pool Config
netbios-node-type
The command configures the NetBIOS node type for Microsoft Dynamic Host Configuration Protocol (DHCP)
clients. The type specifies the NetBIOS node type. Valid types are:
b-node Broadcast
p-node Peer-to-peer
m-node Mixed
h-node Hybrid (recommended)
Default none
Format netbios-node-type type
Mode DHCP Pool Config
no netbios-node-type
This command removes the NetBIOS node Type.
Format no netbios-node-type
Mode DHCP Pool Config
next-server
This command configures the next server in the boot process of a DHCP client.The address parameter is the
IP address of the next server in the boot process, which is typically a TFTP server.
Default inbound interface helper addresses
Format next-server address
Mode DHCP Pool Config
no next-server
This command removes the boot server list.
Format no next-server
Mode DHCP Pool Config
option
The option command configures DHCP Server options. The code parameter specifies the DHCP option code
and ranges from 1-254. The ascii string parameter specifies an NVT ASCII character string. ASCII character
strings that contain white space must be delimited by quotation marks. The hex string parameter specifies
hexadecimal data. In hexadecimal, character strings are two hexadecimal digits. You can separate each byte by a
period (for example, a3.4f.22.0c), colon (for example, a3:4f:22:0c), or white space (for example, a3 4f 22 0c).
Default none
Format option code {ascii string | hex string1 [string2...string8] |
ip address1 [address2...address8]}
Mode DHCP Pool Config
no option
This command removes the DHCP Server options. The code parameter specifies the DHCP option code.
Format no option code
Mode DHCP Pool Config
ip dhcp excluded-address
This command specifies the IP addresses that a DHCP server should not assign to DHCP clients. The parameters
low-address and high-address are valid IP addresses; each made up of four decimal bytes ranging
from 0 to 255. IP address 0.0.0.0 is invalid.
Default none
Format ip dhcp excluded-address low-address [high-address]
Mode Global Config
no ip dhcp excluded-address
This command removes the excluded IP addresses for a DHCP client. The parameters low-address and
high-address are valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address
0.0.0.0 is invalid.
Format no ip dhcp excluded-address low-address [high-address]
Mode Global Config
service dhcp
This command enables the DHCP server.
Default disabled
Format service dhcp
Mode Global Config
no service dhcp
This command disables the DHCP server.
Format no service dhcp
Mode Global Config
Term Definition
IP address The IP address of the client.
Hardware Address The MAC Address or the client identifier.
Lease expiration The lease expiration time of the IP address assigned to the client.
Type The manner in which IP address was assigned to the client.
Term Definition
Service DHCP The field to display the status of dhcp protocol.
Number of Ping Packets The maximum number of Ping Packets that will be sent to verify that an ip address id not already
assigned.
Conflict Logging Shows whether conflict logging is enabled or disabled.
BootP Automatic Shows whether BootP for dynamic pools is enabled or disabled.
Field Definition
Pool Name The name of the configured pool.
Pool Type The pool type.
Lease Time The lease expiration time of the IP address assigned to the client.
DNS Servers The list of DNS servers available to the DHCP client.
Default Routers The list of the default routers available to the DHCP client
The following additional fields are displayed for Manual pool type:
Field Definition
Client Name The name of a DHCP client.
Client Identifier The unique identifier of a DHCP client.
Hardware Address The hardware address of a DHCP client.
Hardware Address Type The protocol of the hardware platform.
Host The IP address and the mask for a manual binding to a DHCP client.
Field Definition
Automatic Bindings The number of IP addresses that have been automatically mapped to the MAC addresses of hosts that
are found in the DHCP database.
Expired Bindings The number of expired leases.
Malformed Bindings The number of truncated or corrupted messages that were received by the DHCP server.
Message Definition
Message Received:
DHCP DISCOVER The number of DHCPDISCOVER messages the server has received.
DHCP REQUEST The number of DHCPREQUEST messages the server has received.
DHCP DECLINE The number of DHCPDECLINE messages the server has received.
DHCP RELEASE The number of DHCPRELEASE messages the server has received.
DHCP INFORM The number of DHCPINFORM messages the server has received.
Message Sent:
DHCP OFFER The number of DHCPOFFER messages the server sent.
DHCP ACK The number of DHCPACK messages the server sent.
DHCP NACK The number of DHCPNACK messages the server sent.
Term Definition
IP address The IP address of the host as recorded on the DHCP server.
Detection Method The manner in which the IP address of the hosts were found on the DHCP Server.
Detection time The time when the conflict was found.
no ip domain lookup
Use this command to disable the DNS client.
Format no ip domain lookup
Mode Global Config
ip domain name
Use this command to define a default domain name that EdgeSwitch software uses to complete unqualified host
names (names with a domain name). By default, no default domain name is configured in the system. The name
may not be longer than 255 characters and should not include an initial period. This name should be used only
when the default domain name list, configured using the ip domain list command, is empty.
Default none
Format ip domain name name
Mode Global Config
Example: The CLI command ip domain name yahoo.com will configure yahoo.com as a default domain
name. For an unqualified hostname xxx, a DNS query is made to find the IP address corresponding to xxx.yahoo.com.
no ip domain name
Use this command to remove the default domain name configured using the ip domain name command.
Format no ip domain name
Mode Global Config
ip domain list
Use this command to define a list of default domain names to complete unqualified names. By default, the list
is empty. Each name must be no more than 256 characters, and should not include an initial period. The default
domain name, configured using the ip domain name command, is used only when the default domain
name list is empty. A maximum of 32 names can be entered in to this list.
Default none
Format ip domain list name
Mode Global Config
no ip domain list
Use this command to delete a name from a list.
Format no ip domain list name
Mode Global Config
ip name-server
Use this command to configure the available name servers. Up to eight servers can be defined in one command
or by using multiple commands. The parameter server-address is a valid IPv4 or IPv6 address of the
server. The preference of the servers is determined by the order they are entered.
Format ip name-server server-address1 [server-address2...server-address8]
Mode Global Config
no ip name-server
Use this command to remove a name server.
Format no ip name-server [server-address1...server-address8]
Mode Global Config
ip name source-interface
Use this command to specify the physical or logical interface to use as the DNS client (IP name) source interface
(source IP address) for DNS client management application. If configured, the source interface address is used for
all DNS communications between the DNS server and the DNS client. The selected source-interface IP
address is used for filling the IP header of management protocol packets. This allows security devices (firewalls)
to identify the source packets coming from the specific switch. If a source interface is not specified, the primary
IP address of the originating (outbound) interface is used as the source address. If the configured interface is
down, the DNS client falls back to its default behavior.
Format ip name source-interface {slot/port | vlanvlan-id}
Mode Global Config
no ip name source-interface
Use this command to reset the DNS source interface to the default settings.
Format no ip name source-interface
Mode Global Config
ip host
Use this command to define static host name-to-address mapping in the host cache. The parameter name is
the host name and ipaddress is the IP address of the host. The host name can include 1-158 alphanumeric
characters, periods, hyphens, underscores, and non-consecutive spaces. Hostnames that include one or more
space must be enclosed in quotation marks, for example lab-pc 45.
Default none
Format ip host name ipaddress
Mode Global Config
no ip host
Use this command to remove the name-to-address mapping.
Format no ip host name
Mode Global Config
ipv6 host
Use this command to define static host name-to-IPv6 address mapping in the host cache. The name is the
host name and v6address is the IPv6 address of the host. The hostname can include 1-158 alphanumeric
characters, periods, hyphens, and spaces. Hostnames that include one or more space must be enclosed in
quotation marks, for example lab-pc 45.
Default none
Format ipv6 host name v6address
Mode Global Config
no ipv6 host
Use this command to remove the static host name-to-IPv6 address mapping in the host cache.
Format no ipv6 host name
Mode Global Config
ip domain retry
Use this command to specify the number of times to retry sending Domain Name System (DNS) queries. The
number indicates the number of times to retry sending a DNS query to the DNS server, and ranges from 0-100.
Default 2
Format ip domain retry number
Mode Global Config
no ip domain retry
Use this command to return to the default.
Format no ip domain retry number
Mode Global Config
ip domain timeout
Use this command to specify the amount of time to wait for a response to a DNS query. The seconds specifies
the time, in seconds, to wait for a response to a DNS query, and ranges from 0-3600.
Default 3
Format ip domain timeout seconds
Mode Global Config
no ip domain timeout
Use this command to return to the default setting.
Format no ip domain timeout seconds
Mode Global Config
clear host
Use this command to delete entries from the host name-to-address cache. This command clears the entries from
the DNS cache maintained by the software. This command clears both IPv4 and IPv6 entries.
Format clear host {name | all}
Mode Privileged EXEC
Parameter Description
name A particular host entry to remove. The parameter name ranges from 1-255 characters.
all Removes all entries.
show hosts
Use this command to display the default domain name, a list of name server hosts, the static and the cached list
of host names and addresses. The parameter name ranges from 1-255 characters. This command displays both
IPv4 and IPv6 entries.
Format show hosts [name]
Mode User EXEC
Term Description
Host name Domain host name.
Default domain Default domain name.
Default domain list Default domain list.
Domain Name lookup DNS client enabled/disabled.
Number of retries Number of time to retry sending Domain Name System (DNS) queries.
Retry timeout period Amount of time to wait for a response to a DNS query.
Name servers Configured name servers.
DNS Client Source Interface Shows the configured source interface (source IP address) used for a DNS client. The IP address of the
selected interface is used as source IP for all communications with the server.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) # show hosts
Host Addresses
------------------------------ ------------------------------
accounting.gm.com 176.16.8.8
show ip address-conflict
This command displays the status information corresponding to the last detected address conflict.
Format show ip address-conflict
Modes Privileged EXEC
User EXEC
Term Description
Address Conflict Detection Identifies whether the switch has detected an address conflict on any IP address.
Status
Last Conflicting IP Address The IP Address that was last detected as conflicting on any interface.
Last Conflicting MAC The MAC Address of the conflicting host that was last detected on any interface.
Address
Time Since Conflict Detected The time in days, hours, minutes and seconds since the last address conflict was detected.
clear ip address-conflict-detect
This command clears the detected address conflict status information.
Format clear ip address-conflict-detect
Modes Privileged EXEC
User EXEC
CAUTION: The output of debug commands can be long and may adversely affect system performance.
capture start
Use the command capture start to manually start capturing CPU packets for packet trace. The packet capture
operates in three modes: capture file, remote capture, and capture line.
The command is not persistent across a reboot cycle.
Format capture start [{all|receive|transmit}]
Mode Privileged EXEC
Parameter Description
all Capture all traffic.
receive Capture only received traffic.
transmit Capture only transmitted traffic.
capture stop
Use the command capture stop to manually stop capturing CPU packets for packet trace.
Format capture stop
Mode Privileged EXEC
capture file|remote|line
Use this command to configure file capture options. The command is persistent across a reboot cycle.
Format capture {file|remote|line}
Mode Global Config
Parameter Description
file In the capture file mode, the captured packets are stored in a file on NVRAM. The maximum file size
defaults to 524288 bytes. The switch can transfer the file to a TFTP server via TFTP, SFTP, SCP via CLI,
and SNMP.
The file is formatted in pcap format, is named cpuPktCapture.pcap, and can be examined using
network analyzer tools such as Wireshark or Ethereal. Starting a file capture automatically
terminates any remote capture sessions and line capturing. After the packet capture is activated,
the capture proceeds until the capture file reaches its maximum size, or until the capture is stopped
manually using the CLI command capture stop.
remote In the remote capture mode, the captured packets are redirected in real time to an external PC
running the Wireshark tool for Microsoft Windows. A packet capture server runs on the switch side
and sends the captured packets via a TCP connection to the Wireshark tool.
The remote capture can be enabled or disabled using the CLI. There should be a Windows PC with the
Wireshark tool to display the captured file. When using the remote capture mode, the switch does not
store any captured data locally on its file system.
You can configure the IP port number for connecting Wireshark to the switch. The default port number
is 2002. If a firewall is installed between the Wireshark PC and the switch, then these ports must be
allowed to pass through the firewall. You must configure the firewall to allow the Wireshark PC to
initiate TCP connections to the switch.
If the client successfully connects to the switch, the CPU packets are sent to the client PC, then
Wireshark receives the packets and displays them. This continues until the session is terminated by
either end.
Starting a remote capture session automatically terminates the file capture and line capturing.
line In the capture line mode, the captured packets are saved into the RAM and can be displayed on the
CLI. Starting a line capture automatically terminates any remote capture session and capturing into
a file. There is a maximum 128 packets of maximum 128 bytes that can be captured and displayed in
line mode.
(UBNT EdgeSwitch) #
debug arp
Use this command to enable ARP debug protocol messages.
Default disabled
Format debug arp
Mode Privileged EXEC
no debug arp
Use this command to disable ARP debug protocol messages.
Format no debug arp
Mode Privileged EXEC
debug authentication
This command displays either the debug trace for either a single event or all events for an interface
Default none
Format debug authentication packet {all | event} interface
Mode Privileged EXEC
debug auto-voip
Use this command to enable Auto VOIP debug messages. Use the optional parameters to trace H323, SCCP, or SIP
packets respectively.
Default disabled
Format debug auto-voip [H323|SCCP|SIP|oui]
Mode Privileged EXEC
no debug auto-voip
Use this command to disable Auto VOIP debug messages.
Format no debug auto-voip
Mode Privileged EXEC
debug clear
This command disables all previously enabled debug traces.
Default disabled
Format debug clear
Mode Privileged EXEC
debug console
This command enables the display of debug trace output on the login session in which it is executed. Debug
console display must be enabled in order to view any trace output. The output of debug trace commands will
appear on all login sessions for which debug console has been enabled. The configuration of this command
remains in effect for the life of the login session. The effect of this command is not persistent across resets.
Default disabled
Format debug console
Mode Privileged EXEC
no debug console
This command disables the display of debug trace output on the login session in which it is executed.
Format no debug console
Mode Privileged EXEC
debug crashlog
Use this command to view information contained in the crash log file that the system maintains when it
experiences an unexpected reset. The crash log file contains the following information:
Call stack information in both primitive and verbose forms
Log Status
Buffered logging
Event logging
Persistent logging
System Information (output of sysapiMbufDump)
Message Queue Debug Information
Memory Debug Information
Memory Debug Status
OS Information (output of osapiShowTasks)
/proc information (meminfo, cpuinfo, interrupts, version and net/sockstat)
Default disabled
Format debug crashlog {[kernel] crashlog-number [upload url] | proc | verbose | deleteall}
Mode Privileged EXEC
Parameter Description
kernel View the crash log file for the kernel
crashlog-number Specifies the file number to view. The system maintains up to four copies, and the valid range is 14.
upload url To upload the crash log to a TFTP server, use the upload keyword and specify the required TFTP
server information.
proc View the application process crashlog.
verbose Enable the verbose crashlog.
deleteall Delete all crash log files on the system.
debug debug-config
Use this command to download or upload the debug-config.ini file. The debug-config. ini file executes CLI
commands (including devshell and drivshell commands) on specific predefined events. The debug config file is
created manually and downloaded to the switch.
Default disabled
Format debug debug-config {download url | upload url}
Mode Privileged EXEC
no debug dhcp
This command disables the display of debug trace output for DHCPv4 client activity.
Format no debug dhcp packet [transmit | receive]
Mode Privileged EXEC
Term Description
Src_IP The source IP address in the ip header in the packet.
Dest_IP The destination multicast ip address in the packet.
Type The type of IGMP packet. Type can be one of the following:
Membership_Query IGMP Membership Query
V1_Membership_Report IGMP Version 1 Membership Report
V2_Membership_Report IGMP Version 2 Membership Report
V3_Membership_Report IGMP Version 3 Membership Report
V2_Leave_Group IGMP Version 2 Leave Group
Group Multicast group address in the IGMP header.
debug ip acl
Use this command to enable debug of IP Protocol packets matching the ACL criteria.
Default disabled
Format debug ip acl acl-number
Mode Privileged EXEC
no debug ip acl
Use this command to disable debug of IP Protocol packets matching the ACL criteria.
Format no debug ip acl acl-number
Mode Privileged EXEC
debug tacacs
Use the debug tacacs packet command to turn on TACACS+ debugging.
Format debug tacacs {packet {receive | transmit}} | accounting | authentication
Mode Global Config
Parameter Description
packet receive Turn on TACACS+ receive packet debugs.
packet transmit Turn on TACACS+ transmit packet debugs.
accounting Turn on TACACS+ authentication debugging.
authentication Turn on TACACS+ authorization debugging.
debug transfer
This command enables debugging for file transfers.
Format debug transfer
Mode Privileged EXEC
no debug transfer
This command disables debugging for file transfers.
Format no debug transfer
Mode Privileged EXEC
show debugging
Use the show debugging command to display enabled packet tracing configurations.
Format show debugging
Mode Privileged EXEC
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)# debug arp
Arp packet tracing enabled.
(UBNT EdgeSwitch)# show debugging
Arp packet tracing enabled.
no show debugging
Use the no show debugging command to disable packet tracing configurations.
Format no show debugging
Mode Privileged EXEC
exception protocol
Use this command to specify the protocol used to store the core dump file.
Default None
Format exception protocol {nfs | tftp | none}
Mode Global Config
no exception protocol
Use this command to reset the exception protocol configuration to its factory default value.
Default None
Format no exception protocol
Mode Global Config
exception core-file
Use this command to configure a prefix for a core-file name. The core file name is generated with the prefix as follows:
If hostname is selected: file-name-prefix_hostname_Time_Stamp.bin
If hostname is not selected: file-name-prefix_MAC_Address_Time_Stamp.bin
If hostname is configured the core file name takes the hostname, otherwise the core-file names uses the
MAC address when generating a core dump file. The prefix length is 15 characters.
Default Core
Format exception core-file {file-name-prefix | [hostname] | [time-stamp]}
Mode Global Config
no exception core-file
Use this command to reset the exception core file prefix configuration to its factory default value. The hostname
and time-stamp are disabled.
Default Core
Format no exception core-file
Mode Global Config
exception switch-chip-register
This command enables or disables the switch-chip-register dump in case of an exception. The switch-chip-
register dump is taken only for a master unit and not for member units
Default Disable
Format exception switch-chip-register {enable | disable}
Mode Global Config
write core
Use the write core command to generate a core dump file on demand. The write core test
command is helpful when testing the core dump setup. For example, if the TFTP protocol is configured, write
core test communicates with the TFTP server and informs the user if the TFTP server can be contacted.
Similarly, if protocol is configured as nfs, this command mounts and unmounts the file system and informs the
user of the status.
Note: write core reloads the switch which is useful when the device malfunctions, but has not
crashed.
For write core test, the destination file name is used for the TFTP test. Optionally, you can specify the
destination file name when the protocol is configured as TFTP.
Default None
Format write core [test [dest_file_name]]
Mode Privileged EXEC
show exception
Use this command to display the configuration parameters for generating a core dump file.
Default None
Format show exception
Mode Privileged EXEC
logging persistent
Use this command to configure persistent logging for the switch. The severity level of logging messages is
specified by severity-level.
Possible values for severity level are emergency|0, alert|1, critical|2, error|3,
warning|4, notice|5, info|6, and debug|7.
Default Disable
Format logging persistent severity-level
Mode Global Config
no logging persistent
Use this command to disable the persistent logging in the switch.
Format no logging persistent
Mode Global Config
mbuf
Use this command to configure memory buffer (MBUF) threshold limits and generate notifications when MBUF
limits have been reached.
Format mbuf {falling-threshold | rising-threshold | severity}
Mode Global Config
Parameter Description
falling-threshold The percentage of memory buffer resources that, when usage falls below this level for the configured
interval, triggers a notification. The range is 1 to 100. The default is 0 (disabled).
rising-threshold The percentage of the memory buffer resources that, when exceeded for the configured rising
interval, triggers a notification. The range is 1 to 100. The default is 0 (disabled).
severity The severity level at which Mbuf logs messages. The range is 1-7; default is 5 (L7_LOG_SEVERITY_NOTICE).
show mbuf
Use this command to display the memory buffer (MBUF) Utilization Monitoring parameters.
Format show mbuf
Mode Privileged EXEC
Term Description
Rising Threshold The percentage of the memory buffer resources that, when exceeded for the configured rising
interval, triggers a notification. The range is 1 to 100. The default is 0 (disabled).
Falling Threshold The percentage of memory buffer resources that, when usage falls below this level for the configured
interval, triggers a notification. The range is 1 to 100. The default is 0 (disabled).
Severity The severity level.
Field Description
Mbufs Total Total number of message buffers in the system.
Mbufs Free Number of message buffers currently available.
Mbufs Rx Used Number of message buffers currently in use.
Total Rx Norm Alloc Number of times the system tried to allocate a message buffer allocation of class RX Norm.
Attempts
Total Rx Mid2 Alloc Number of times the system tried to allocate a message buffer allocation of class RX Mid2.
Attempts
Total Rx Mid1 Alloc Number of times the system tried to allocate a message buffer allocation of class RX Mid1.
Attempts
Total Rx Mid0 Alloc Number of times the system tried to allocate a message buffer allocation of class RX Mid0.
Attempts
Total Rx High Alloc Number of times the system tried to allocate a message buffer allocation of class RX High.
Attempts
Total Tx Alloc Number of times the system tried to allocate a message buffer allocation of class TX.
Attempts
Total Rx Norm Alloc Number of message buffer allocation failures for RX Norm class of message buffer.
Failures
Total Rx Mid2 Alloc Number of message buffer allocation failures for RX Mid2 class of message buffer.
Failures
Total Rx Mid1 Alloc Number of message buffer allocation failures for RX Mid1 class of message buffer.
Failures
Total Rx Mid0 Alloc Number of message buffer allocation failures for RX Mid0 class of message buffer.
Failures
Total Rx High Alloc Number of message buffer allocation failures for RX High class of message buffer.
Failures
Total Tx Alloc Number of message buffer allocation failures for TX class of message buffer.
Failures
Note: The cable test feature is supported only for copper cable. It is not supported for optical fiber cable.
If the port has an active link while the cable test is run, the link can go down for the duration of the test.
cablestatus
This command returns the status of the specified port.
Format cablestatus slot/port
Mode Privileged EXEC
Term Description
Cable Status One of the following statuses is returned:
Normal The cable is working correctly.
Open The cable is disconnected or there is a faulty connector.
Short There is an electrical short in the cable.
Cable Test Failed The cable status could not be determined. The cable may in fact be working.
Cable Length If this feature is supported by the PHY for the current link speed, the cable length is displayed as a
range between the shortest estimated length and the longest estimated length. Note that if the link
is down and a cable is attached to a 10/100 Ethernet adapter, then the cable status may display as
Open or Short because some Ethernet adapters leave unused wire pairs unterminated or grounded.
Unknown is displayed if the cable length could not be determined.
Note: There is no configuration command for ether stats and high capacity ether stats. The data source for
ether stats and high capacity ether stats are configured during initialization.
rmon alarm
This command sets the RMON alarm entry in the RMON alarm MIB group.
Format rmon alarm alarm-number variable sample-interval {absolute|delta}
rising-threshold value [rising-event-index] falling-threshold value
[falling-event-index] [startup {rising|falling|rising-falling}] [owner string]
Mode Global Config
Parameter Description
alarm-number An index that uniquely identifies an entry in the alarm table. Each entry defines a diagnostic sample at
a particular interval for an object on the device. The range is 1 to 65535.
variable The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1
primitive type of integer.
sample-interval The interval in seconds over which the data is sampled and compared with the rising and falling
thresholds. The range is 1 to 2147483647. The default is 3600.
Alarm Absolute Value The value of the statistic during the last sampling period. This object is a read-only, 32-bit signed value.
rising-threshold The rising threshold for the sample statistics. The range is -2147483648 to 2147483647. The default is 1.
value
rising-event-index The index of the eventEntry that is used when a rising threshold is crossed. The range is 1 to 65535.
The default is 1.
falling-threshold The falling threshold for the sample statistics. The range is -2147483648 to 2147483647. The default is 1.
value
falling-event-index The index of the eventEntry that is used when a falling threshold is crossed. The range is 1 to 65535.
The default is 2.
startup The alarm that may be sent. Possible values are rising, falling, or both rising-falling. The
default is rising-falling.
owner string The owner string associated with the alarm entry. The default is monitorAlarm.
no rmon alarm
This command deletes the RMON alarm entry.
Format no rmon alarm alarm-number
Mode Global Config
rmon hcalarm
This command sets the RMON hcalarm entry in the High Capacity RMON alarm MIB group.
Format rmon hcalarm alarm-number variable sample-interval {absolute|delta}
rising-threshold high value low value status {positive|negative} [rising-event-index]
falling-threshold high value low value status {positive|negative} [falling-event-index]
[startup {rising|falling|rising-falling}] [owner string]
Mode Global Config
Parameter Description
High Capacity Alarm An arbitrary integer index value used to uniquely identify the high capacity alarm entry. The range is 1
Index to 65535.
High Capacity Alarm The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1
Variable primitive type of integer.
High Capacity Alarm The interval in seconds over which the data is sampled and compared with the rising and falling
Interval thresholds. The range is 1 to 2147483647. The default is 1.
High Capacity Alarm The method of sampling the selected variable and calculating the value to be compared against the
Sample Type thresholds. Possible types are Absolute Value or Delta Value. The default is Absolute Value.
High Capacity Alarm The absolute value (that is, the unsigned value) of the hcAlarmVariable statistic during the last
Absolute Value sampling period. The value during the current sampling period is not made available until the period
is complete. This object is a 64-bit unsigned value that is Read-Only.
High Capacity Alarm This object indicates the validity and sign of the data for the high capacity alarm absolute value object
Absolute Alarm (hcAlarmAbsValueobject). Possible status types are valueNotAvailable, valuePositive, or valueNegative.
Status The default is valueNotAvailable.
High Capacity Alarm High capacity alarm startup alarm that may be sent. Possible values are rising, falling, or rising-falling.
Startup Alarm The default is rising-falling.
High Capacity Alarm The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Rising-Threshold 4294967295. The default is 1.
Absolute Value Low
High Capacity Alarm The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Rising-Threshold 4294967295. The default is 0.
Absolute Value High
High Capacity Alarm This object indicates the sign of the data for the rising threshold, as defined by the objects
Rising-Threshold hcAlarmRisingThresAbsValueLow and hcAlarmRisingThresAbsValueHigh. Possible values are
Value Status valueNotAvailable, valuePositive, or valueNegative. The default is valuePositive.
High Capacity Alarm The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Falling-Threshold 4294967295. The default is 1.
Absolute Value Low
High Capacity Alarm The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Falling-Threshold 4294967295. The default is 0.
Absolute Value High
High Capacity Alarm This object indicates the sign of the data for the falling threshold, as defined by the objects
Falling-Threshold hcAlarmFallingThresAbsValueLow and hcAlarmFallingThresAbsValueHigh. Possible values are
Value Status valueNotAvailable, valuePositive, or valueNegative. The default is valuePositive.
High Capacity Alarm The index of the eventEntry that is used when a rising threshold is crossed. The range is 1 to 65535.
Rising Event Index The default is 1.
High Capacity Alarm The index of the eventEntry that is used when a falling threshold is crossed. The range is 1 to 65535.
Falling Event Index The default is 2.
High Capacity Alarm The number of times the associated hcAlarmVariable instance was polled on behalf of the hcAlarmEntry
Failed Attempts (while in the active state) and the value was not available. This object is a read-only 32-bit counter value.
High Capacity Alarm The owner string associated with the alarm entry. The default is monitorHCAlarm.
Owner
High Capacity Alarm The type of non-volatile storage configured for this entry. This object is read-only. The default is
Storage Type volatile.
no rmon hcalarm
This command deletes the rmon hcalarm entry.
Format no rmon hcalarm alarm-number
Mode Global Config
rmon event
This command sets the RMON event entry in the RMON event MIB group.
Format rmon event event-number [description string|log|owner string|trap community]
Mode Global Config
Parameter Description
Event Index An index that uniquely identifies an entry in the event table. Each such entry defines one event that is
to be generated when the appropriate conditions occur. The range is 1 to 65535.
Event Description A comment describing the event entry. The default is alarmEvent.
Event Type The type of notification that the probe makes about the event. Possible values are None, Log, SNMP
Trap, Log and SNMP Trap. The default is None.
Event Owner Owner string associated with the entry. The default is monitorEvent.
Event Community The SNMP community specific by this octet string which is used to send an SNMP trap. The default is
public.
no rmon event
This command deletes the rmon event entry.
Format no rmon event event-number
Mode Global Config
Note: This command is not supported on interface range. Each RMON history control collection entry can
be configured on only one interface. If you try to configure on multiple interfaces, DUT displays an error.
Parameter Description
History Control An index that uniquely identifies an entry in the historyControl table. Each such entry defines a set of
Index samples at a particular interval for an interface on the device. The range is 1 to 65535.
History Control Data The source interface for which historical data is collected.
Source
History Control The requested number of discrete time intervals over which data is to be saved. The range is 1 to
Buckets Requested 65535. The default is 50.
History Control The number of discrete sampling intervals over which data shall be saved. This object is read-only. The
Buckets Granted default is 10.
History Control The interval in seconds over which the data is sampled. The range is 1 to 3600. The default is 1800.
Interval
History Control The owner string associated with the history control entry. The default is monitorHistoryControl.
Owner
show rmon
This command displays the entries in the RMON alarm table.
Format show rmon {alarms | alarm alarm-index}
Mode Privileged Exec
Parameter Description
Alarm Index An index that uniquely identifies an entry in the alarm table. Each entry defines a diagnostic sample at
a particular interval for an object on the device. The range is 1 to 65535.
Alarm Variable The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1
primitive type of integer.
Alarm Interval The interval in seconds over which the data is sampled and compared with the rising and falling
thresholds. The range is 1 to 2147483647. The default is 1.
Alarm Absolute Value The value of the statistic during the last sampling period. This object is a read-only, 32-bit signed value.
Alarm Rising The rising threshold for the sample statistics. The range is 2147483648 to 2147483647. The default is 1.
Threshold
Alarm Rising Event The index of the eventEntry that is used when a rising threshold is crossed. The range is 1 to 65535.
Index The default is 1.
Alarm Falling The falling threshold for the sample statistics. The range is 2147483648 to 2147483647. The default
Threshold is1.
Alarm Falling Event The index of the eventEntry that is used when a falling threshold is crossed. The range is 1 to 65535.
Index The default is 2.
Alarm Startup Alarm The alarm that may be sent. Possible values are rising, falling or both rising-falling. The default is rising-
falling.
Alarm Owner The owner string associated with the alarm entry. The default is monitorAlarm.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon alarms
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon alarm 1
Alarm 1
----------
OID: alarmInterval.1
Last Sample Value: 1
Interval: 1
Sample Type: absolute
Startup Alarm: rising-falling
Rising Threshold: 1
Falling Threshold: 1
Rising Event: 1
Falling Event: 2
Owner: MibBrowser
Parameter Description
History Control Index An index that uniquely identifies an entry in the historyControl table. Each such entry defines a set of
samples at a particular interval for an interface on the device. The range is 1 to 65535.
History Control Data The source interface for which historical data is collected.
Source
History Control The requested number of discrete time intervals over which data is to be saved. The range is 1 to
Buckets Requested 65535. The default is 50.
History Control The number of discrete sampling intervals over which data shall be saved. This object is read-only. The
Buckets Granted default is 10.
History Control The interval in seconds over which the data is sampled. The range is 1 to 3600. The default is 1800.
Interval
History Control Owner The owner string associated with the history control entry. The default is monitorHistoryControl.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon collection history
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon collection history interfaces 0/1
Parameter Description
Event Index An index that uniquely identifies an entry in the event table. Each such entry defines one event that is
to be generated when the appropriate conditions occur. The range is 1 to 65535.
Event Description A comment describing the event entry. The default is alarmEvent.
Event Type The type of notification that the probe makes about the event. Possible values are None, Log, SNMP
Trap, Log and SNMP Trap. The default is None.
Event Owner Owner string associated with the entry. The default is monitorEvent.
Event Community The SNMP community specific by this octet string which is used to send an SNMP trap. The default is
public.
Owner Event owner. The owner string associated with the entry.
Last time sent The last time over which a log or a SNMP trap message is generated.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) # show rmon events
Parameter Description
History Control An index that uniquely identifies an entry in the historyControl table. Each such entry defines a set of
Index samples at a particular interval for an interface on the device. The range is 1 to 65535.
History Control Data The source interface for which historical data is collected.
Source
History Control The requested number of discrete time intervals over which data is to be saved. The range is 1 to
Buckets Requested 65535. The default is 50.
History Control The number of discrete sampling intervals over which data shall be saved. This object is read-only. The
Buckets Granted default is 10.
History Control The interval in seconds over which the data is sampled. The range is 1 to 3600. The default is 1800.
Interval
History Control The owner string associated with the history control entry. The default is monitorHistoryControl.
Owner
Maximum Table Size Maximum number of entries that the history table can hold.
Parameter Description
Time Time at which the sample is collected, displayed as period seconds.
CRC Align Number of CRC align errors.
Undersize Packets Total number of undersize packets. Packets are less than 64 octets long (excluding framing bits,
including FCS octets).
Oversize Packets Total number of oversize packets. Packets are longer than 1518 octets (excluding framing bits,
including FCS octets).
Fragments Total number of fragment packets. Packets are not an integral number of octets in length or had a bad
Frame Check Sequence (FCS), and are less than 64 octets in length (excluding framing bits, including
FCS octets).
Jabbers Total number of jabber packets. Packets are longer than 1518 octets (excluding framing bits, including
FCS octets), and are not an integral number of octets in length or had a bad Frame Check Sequence
(FCS).
Octets Total number of octets received on the interface.
Packets Total number of packets received (including error packets) on the interface.
Broadcast Total number of good Broadcast packets received on the interface.
Multicast Total number of good Multicast packets received on the interface.
Util Port utilization of the interface associated with the history index specified.
Dropped Collisions Total number of dropped collisions.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon history 1 errors
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon history 1 throughput
Parameter Description
Maximum table size Maximum number of entries that the log table can hold.
Event Event index for which the log is generated.
Description A comment describing the event entry for which the log is generated.
Time Time at which the event is generated.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon log
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon log 1
Parameter Description
Port slot/port
Dropped Total number of dropped events on the interface.
Octets Total number of octets received on the interface.
Packets Total number of packets received (including error packets) on the interface.
Broadcast Total number of good broadcast packets received on the interface.
Multicast Total number of good multicast packets received on the interface.
CRC Align Errors Total number of packets received have a length (excluding framing bits, including FCS octets) of
between 64 and 1518 octets inclusive.
Collisions Total number of collisions on the interface.
Undersize Pkts Total number of undersize packets. Packets are less than 64 octets long (excluding framing bits,
including FCS octets).
Oversize Pkts Total number of oversize packets. Packets are longer than 1518 octets (excluding framing bits,
including FCS octets).
Fragments Total number of fragment packets. Packets are not an integral number of octets in length or had a bad
Frame Check Sequence (FCS), and are less than 64 octets in length (excluding framing bits, including
FCS octets).
Jabbers Total number of jabber packets. Packets are longer than 1518 octets (excluding framing bits, including
FCS octets), and are not an integral number of octets in length or had a bad Frame Check Sequence
(FCS).
64 Octets Total number of packets which are 64 octets in length (excluding framing bits, including FCS octets).
65-127 Octets Total number of packets which are between 65 and 127 octets in length (excluding framing bits,
including FCS octets).
128-255 Octets Total number of packets which are between 128 and 255 octets in length (excluding framing bits,
including FCS octets).
256-511 Octets Total number of packets which are between 256 and 511 octets in length (excluding framing bits,
including FCS octets).
512-1023 Octets Total number of packets which are between 512 and 1023 octets in length (excluding framing bits,
including FCS octets).
1024-1518 Octets Total number of packets which are between 1024 and 1518 octets in length (excluding framing bits,
including FCS octets).
HC Overflow Pkts Total number of HC overflow packets.
HC Overflow Octets Total number of HC overflow octets.
HC Overflow Pkts 64 Total number of HC overflow packets which are 64 octets in length
Octets
HC Overflow Pkts 65 Total number of HC overflow packets which are between 65 and 127 octets in length.
- 127 Octets
HC Overflow Pkts 128 Total number of HC overflow packets which are between 128 and 255 octets in length.
- 255 Octets
HC Overflow Pkts 256 Total number of HC overflow packets which are between 256 and 511 octets in length.
- 511 Octets
HC Overflow Pkts 512 Total number of HC overflow packets which are between 512 and 1023 octets in length.
- 1023 Octets
HC Overflow Pkts Total number of HC overflow packets which are between 1024 and 1518 octets in length.
1024 - 1518 Octets
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) # show rmon statistics interfaces 0/1
Port: 0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 - 127 Octets: 0
128 - 255 Octets: 0 256 - 511 Octets: 0
512 - 1023 Octets: 0 1024 - 1518 Octets: 0
HC Overflow Pkts: 0 HC Pkts: 0
HC Overflow Octets: 0 HC Octets: 0
HC Overflow Pkts 64 Octets: 0 HC Pkts 64 Octets: 0
HC Overflow Pkts 65 - 127 Octets: 0 HC Pkts 65 - 127 Octets: 0
HC Overflow Pkts 128 - 255 Octets: 0 HC Pkts 128 - 255 Octets: 0
HC Overflow Pkts 256 - 511 Octets: 0 HC Pkts 256 - 511 Octets: 0
HC Overflow Pkts 512 - 1023 Octets: 0 HC Pkts 512 - 1023 Octets: 0
HC Overflow Pkts 1024 - 1518 Octets: 0 HC Pkts 1024 - 1518 Octets: 0
Parameter Description
High Capacity Alarm An arbitrary integer index value used to uniquely identify the high capacity alarm entry. The range is 1
Index to 65535.
High Capacity Alarm The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1
Variable primitive type of integer.
High Capacity Alarm The interval in seconds over which the data is sampled and compared with the rising and falling
Interval thresholds. The range is 1 to 2147483647. The default is 1.
High Capacity Alarm The method of sampling the selected variable and calculating the value to be compared against the
Sample Type thresholds. Possible types are Absolute Value or Delta Value. The default is Absolute Value.
High Capacity Alarm The absolute value (that is, the unsigned value) of the hcAlarmVariable statistic during the last
Absolute Value sampling period. The value during the current sampling period is not made available until the period
is complete. This object is a 64-bit unsigned value that is Read-Only.
High Capacity Alarm This object indicates the validity and sign of the data for the high capacity alarm absolute value object
Absolute Alarm (hcAlarmAbsValueobject). Possible status types are valueNotAvailable, valuePositive, or valueNegative.
Status The default is valueNotAvailable.
High Capacity Alarm High capacity alarm startup alarm that may be sent. Possible values are rising, falling, or rising-falling.
Startup Alarm The default is rising-falling.
High Capacity Alarm The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Rising-Threshold 4294967295. The default is 1.
Absolute Value Low
High Capacity Alarm The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Rising-Threshold 4294967295. The default is 0.
Absolute Value High
High Capacity Alarm This object indicates the sign of the data for the rising threshold, as defined by the objects
Rising-Threshold hcAlarmRisingThresAbsValueLow and hcAlarmRisingThresAbsValueHigh. Possible values are
Value Status valueNotAvailable, valuePositive, or valueNegative. The default is valuePositive.
High Capacity Alarm The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Falling-Threshold 4294967295. The default is 1.
Absolute Value Low
Parameter Description
High Capacity Alarm The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Falling-Threshold 4294967295. The default is 0.
Absolute Value High
High Capacity Alarm This object indicates the sign of the data for the falling threshold, as defined by the objects
Falling-Threshold hcAlarmFallingThresAbsValueLow and hcAlarmFallingThresAbsValueHigh. Possible values are
Value Status valueNotAvailable, valuePositive, or valueNegative. The default is valuePositive.
High Capacity Alarm The index of the eventEntry that is used when a rising threshold is crossed. The range is 1 to 65535.
Rising Event Index The default is 1.
High Capacity Alarm The index of the eventEntry that is used when a falling threshold is crossed. The range is 1 to 65535.
Falling Event Index The default is 2.
High Capacity Alarm The number of times the associated hcAlarmVariable instance was polled on behalf of thie
Failed Attempts hcAlarmEntry (while in the active state) and the value was not available. This object is a 32-bit counter
value that is read-only.
High Capacity Alarm The owner string associated with the alarm entry. The default is monitorHCAlarm.
Owner
High Capacity Alarm The type of non-volatile storage configured for this entry. This object is read-only. The default is
Storage Type volatile.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show rmon hcalarms
Alarm 1
----------
OID: alarmInterval.1
Last Sample Value: 1
Interval: 1
Sample Type: absolute
Startup Alarm: rising-falling
Rising Threshold High: 0
Rising Threshold Low: 1
Rising Threshold Status: Positive
Falling Threshold High: 0
Falling Threshold Low: 1
Falling Threshold Status: Positive
Rising Event: 1
Falling Event: 2
Startup Alarm: Rising-Falling
Owner: MibBrowser
Parameter Description
group-id|name Name of the group of statistics or its identifier to apply on the interface. The range is:
1. received
2. received-errors
3. transmitted
4. transmitted-errors
5. received-transmitted
6. port-utilization
7. congestion
The default is None.
time-range-name Name of the time range for the group or the flow-based rule. The range is 1 to 31 alphanumeric
characters. The default is None.
list-of-reporting- Report the statistics to the configured method. The range is:
methods 0. none
1. console
2. syslog
3. e-mail
The default is None.
no stats group
This command deletes the configured group.
Format no stats group group id|name
Mode Global Config
stats flow-based
This command configures flow based statistics rules for the given parameters over the specified time range. Only
an IPv4 address is allowed as source and destination IP address.
Format stats flow-based rule-id timerange time-range-name [{srcipip-address}
{dstipip-address} {srcmacmac-address} {dstmacmac-address} {srctcpportportid}
{dsttcpportportid} {srcudpportportid} {dstudpportportid}]
Mode Global Config
Parameter Description
rule-id The flow-based rule ID. The range is 1 to 16. The default is None.
time-range-name Name of the time range for the group or the flow-based rule. The range is 1 to 31 alphanumeric
characters. The default is None.
srcip ip-address The source IP address.
dstip ip-address The destination IP address.
srcmac mac-address The source MAC address.
dstmac mac-address The destination MAC address.
srctcpport portid The source TCP port number.
dsttcpport portid The destination TCP port number.
srcudpport portid The source UDP port number.
dstudpport portid The destination UDP port number.
(UBNT EdgeSwitch) (Config)#stats flow-based 2 timerange test srcip 1.1.1.1 dstip 2.2.2.2
srctcpport 123 dsttcpport 123 srcudpport 123 dstudpport 123
no stats flow-based
This command deletes flow-based statistics.
Format stats flow-based rule-id
Mode Global Config
stats group
This command applies the group specified on an interface or interface-range.
Format stats group group-id|name
Mode Interface Config
Parameter Description
group-id The unique identifier for the group.
name The name of the group.
no stats group
This command deletes the interface or interface-range from the group specified.
Format no stats group group-id|name
Mode Interface Config
stats flow-based
This command applies the flow-based rule specified by the ID on an interface or interface-range.
Format stats flow-based rule-id
Mode Interface Config
Parameter Description
rule-id The unique identifier for the flow-based rule.
no stats flow-based
This command deletes the interface or interface-range from the flow-based rule specified.
Format no stats flow-based rule-id
Mode Interface Config
Parameter Description
group-id The unique identifier for the group.
name The name of the group.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show stats group received
Group: received
Time Range: test
Interface List
-----------------
0/2, 0/4, lag 1
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show stats group port-utilization
Group: port-utilization
Time Range: test
Interface List
--------------
0/2, 0/4, lag 1
Interface Utilization (%)
--------- ---------------
0/2 0
0/4 0
lag 1 0
Parameter Description
rule-id The unique identifier for the flow-based rule.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show stats flow-based all
Interface List
--------------
0/1 - 0/2
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show stats flow-based 2
Note: The commands in this chapter are in one of three functional groups:
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration
command, there is a show command that displays the configuration setting.
Clear commands clear some or all of the settings to factory defaults.
Example: The following example enters Interface Config mode for port 0/1:
(UBNT EdgeSwitch) #configure
(UBNT EdgeSwitch) (config)#interface 0/1
(UBNT EdgeSwitch) (interface 0/1)#
Example: The following example enters Interface Config mode for ports 0/1 through 0/4:
(UBNT EdgeSwitch) #configure
(UBNT EdgeSwitch) (config)#interface 0/1-0/4
(UBNT EdgeSwitch) (interface 0/1-0/4)#
auto-negotiate
This command enables automatic negotiation on a port or range of ports.
Default enabled
Format auto-negotiate
Mode Interface Config
no auto-negotiate
This command disables automatic negotiation on a port.
Format no auto-negotiate
Mode Interface Config
auto-negotiate all
This command enables automatic negotiation on all ports.
Default enabled
Format auto-negotiate all
Mode Global Config
no auto-negotiate all
This command disables automatic negotiation on all ports.
Format no auto-negotiate all
Mode Global Config
description
Use this command to create an alphanumeric description of an interface or range of interfaces.
Format description description
Mode Interface Config
media-type
Use this command to change between fiber and copper mode on the Combo port.
Combo Port: A port or an interface that can operate in either copper or in fiber mode.
Copper and Fiber port: A port that uses copper a medium for communication (for example, RJ45 ports). A
fiber port uses the fiber optics as a medium for communication (for example, example SFP ports).
Default Auto-select, SFP preferred
Format media-type {auto-select | rj45 | sfp }
Mode Interface Config
mtu
Use the mtu command to set the maximum transmission unit (MTU) size, in bytes, for frames that ingress or
egress the interface. You can use the mtu command to configure jumbo frame support for physical and port-
channel (LAG) interfaces. For the standard EdgeSwitch implementation, the MTU size is a valid integer between
15229216 for tagged packets and a valid integer between 15189216 for untagged packets.
Note: To receive and process packets, the Ethernet MTU must include any extra bytes that Layer-2 headers
might require. To configure the IP MTU size, which is the maximum size of the IP packet (IP Header + IP
payload), see ip mtu on page 324.
Default 1518 (untagged)
Format mtu 1518-12288
Mode Interface Config
no mtu
This command sets the default MTU size (in bytes) for the interface.
Format no mtu
Mode Interface Config
shutdown
This command disables a port or range of ports.
Note: You can use the shutdown command on physical and port-channel (LAG) interfaces, but not on
VLAN routing interfaces.
Default enabled
Format shutdown
Mode Interface Config
no shutdown
This command enables a port.
Format no shutdown
Mode Interface Config
shutdown all
This command disables all ports.
Note: You can use the shutdown all command on physical and port-channel (LAG) interfaces, but
not on VLAN routing interfaces.
Default enabled
Format shutdown all
Mode Global Config
no shutdown all
This command enables all ports.
Format no shutdown all
Mode Global Config
speed
Use this command to enable or disable auto-negotiation and set the speed that will be advertised by that port.
The half-duplex and full-duplex parameters allow you to set the advertised speed for half-duplex
and full-duplex modes.
Use the auto keyword to enable auto-negotiation on the port. Use the command without the auto
keyword to ensure auto-negotiation is disabled and to set the port speed and mode according to the command
values. If auto-negotiation is disabled, the speed and duplex mode must be set.
Default Auto-negotiation is enabled.
Format speed {auto {40G|10G|1000|100|10} [40G|10G|1000|100|10]
[halfduplex|full-duplex] | {40G|10G|1000|100|10}
{halfduplex|fullduplex}}
Mode Interface Config
speed all
This command sets the speed and duplex setting for all interfaces.
Format speed all {100 | 10} {half-duplex | full-duplex}
Mode Global Config
show port
This command displays port information.
Format show port {intf-range | all}
Mode Privileged EXEC
Term Definition
Intf Interface in slot/port format
Type If not blank, this field indicates that this port is a special type of port. The possible values are:
Mirror This port is a monitoring port. For more information, see Port Mirroring Commands on
page 269.
PC Mbr This port is a member of a port-channel (LAG).
Probe This port is a probe port.
Admin Mode The Port control administration state. The port must be enabled in order for it to be allowed into the
network. May be enabled or disabled. The factory default is enabled.
Physical Mode The desired port speed and duplex mode. If auto-negotiation support is selected, then the duplex
mode and speed is set from the auto-negotiation process. Note that the maximum capability of the
port (full duplex -100M) is advertised. Otherwise, this object determines the ports duplex mode and
transmission rate. The factory default is Auto.
Physical Status The port speed and duplex mode.
Link Status The Link is up or down.
Link Trap This object determines whether or not to send a trap when link status changes. The factory default is
enabled.
LACP Mode LACP is enabled or disabled on this port.
Example: The following command shows an example of the command output for all ports.
(UBNT EdgeSwitch) #show port all
Example: The following command shows an example of the command output for a range of ports.
(UBNT EdgeSwitch) #show port 0/1-1/6
Example: The following commands show the command output with and without the optional parameter:
(UBNT EdgeSwitch) #show port advertise 0/1
Port: 0/1
Type: Gigabit - Level
Link State: Down
Auto Negotiation: Enabled
Clock: Auto
1000f 1000h 100f 100h 10f 10h
----- ----- ---- ---- --- ---
Admin Local Link Advertisement no no yes no yes no
Oper Local Link Advertisement no no yes no yes no
Oper Peer Advertisement no no yes yes yes yes
Priority Resolution - - yes - - -
Term Definition
Interface Interface in slot/port format.
ifIndex The interface index number associated with the port.
Description The alpha-numeric description of the interface created by the command description on page 197.
MAC address The MAC address of the port. The format is six 2-digit hexadecimal numbers that are separated by
colons, for example 01:23:45:67:89:AB.
Bit Offset Val The bit offset value.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show port description 0/1
Interface...........0/1
ifIndex.............1
Description.........
MAC address.........00:10:18:82:0C:10
Bit Offset Val......1
Notes:
STP is enabled on the switch and on all ports and LAGs by default.
If STP is disabled, the system does not forward BPDU messages.
spanning-tree
This command sets the spanning-tree operational mode to enabled.
Default enabled
Format spanning-tree
Mode Global Config
no spanning-tree
This command sets the spanning-tree operational mode to disabled. While disabled, the spanning-tree
configuration is retained and can be changed, but is not activated.
Format no spanning-tree
Mode Global Config
spanning-tree auto-edge
Use this command to allow the interface to become an edge port if it does not receive any BPDUs within a given
amount of time.
Default Enabled
Format spanning-tree auto-edge
Mode Interface Config
no spanning-tree auto-edge
This command resets the auto-edge status of the port to the default value.
Format no spanning-tree auto-edge
Mode Interface Config
spanning-tree bpdumigrationcheck
Use this command to force a transmission of rapid spanning tree (RSTP) and multiple spanning tree
(MSTP) BPDUs. Use the slot/port parameter to transmit a BPDU from a specified interface, or use the
all keyword to transmit RST or MST BPDUs from all interfaces. Because this command forces the BPDU
transmission when executed, the command does not change the system configuration, and does not have a
correspondingnoform.
Format spanning-tree bpdumigrationcheck {slot/port | all}
Mode Global Config
spanning-tree cost
Use this command to configure the external path cost for port used by a MST instance. When the auto
keyword is used, the path cost from the port to the root bridge is automatically determined by the speed of the
interface. To configure the cost manually, specify a cost value from 1200000000.
Default auto
Format spanning-tree cost {cost | auto}
Mode Interface Config
no spanning-tree cost
This command resets the auto-edge status of the port to the default value.
Format no spanning-tree cost
Mode Interface Config
spanning-tree edgeport
This command specifies that an interface (or range of interfaces) is an Edge Port within the common and internal
spanning tree. This allows this port to transition to Forwarding State without delay.
Format spanning-tree edgeport
Mode Interface Config
no spanning-tree edgeport
This command specifies that this port is not an edge port within the common and internal spanning tree.
Format no spanning-tree edgeport
Mode Interface Config
spanning-tree forceversion
This command sets the Force Protocol Version parameter to a new value.
Default 802.1s
Format spanning-tree forceversion {802.1d | 802.1s | 802.1w}
Mode Global Config
Use 802.1d to specify that the switch transmits ST BPDUs rather than MST BPDUs (IEEE 802.1d functionality
supported).
Use 802.1s to specify that the switch transmits MST BPDUs (IEEE 802.1s functionality supported).
Use 802.1w to specify that the switch transmits RST BPDUs rather than MST BPDUs (IEEE 802.1w functionality
supported).
no spanning-tree forceversion
This command sets the Force Protocol Version parameter to the default value.
Format no spanning-tree forceversion
Mode Global Config
spanning-tree forward-time
This command sets the Bridge Forward Delay parameter to a new value for the common and internal spanning
tree. The value in seconds ranges from 4 to 30, with the value being greater than or equal to (Bridge Max Age / 2) + 1.
Default 15
Format spanning-tree forward-time 4-30
Mode Global Config
no spanning-tree forward-time
This command sets the Bridge Forward Delay parameter for the common and internal spanning tree to the
default value.
Format no spanning-tree forward-time
Mode Global Config
spanning-tree max-age
This command sets the Bridge Max Age parameter to a new value for the common and internal spanning tree.
Thevalue is in seconds range from 6 to 40, with the value being less than or equal to 2 x (Bridge Forward Delay - 1).
Default 20
Format spanning-tree max-age 6-40
Mode Global Config
no spanning-tree max-age
This command sets the Bridge Max Age parameter for the common and internal spanning tree to the defaultvalue.
Format no spanning-tree max-age
Mode Global Config
spanning-tree max-hops
This command sets the Bridge Max Hops parameter to a new value for the common and internal spanning tree.
Default 20
Format spanning-tree max-hops 6-40
Mode Global Config
no spanning-tree max-hops
This command sets the Bridge Max Hops parameter for the common and internal spanning tree to the
defaultvalue.
Format no spanning-tree max-hops
Mode Global Config
spanning-tree mst
This command sets the Path Cost or Port Priority for this port within the multiple spanning tree instance or in
the common and internal spanning tree. If you specify an mstid parameter that corresponds to an existing
multiple spanning tree instance, the configurations are done for that multiple spanning tree instance. If you
specify 0 (defined as the default CIST ID) as the mstid, the configurations are done for the common and
internal spanning tree instance.
If you specify the cost option, the command sets the path cost for this port within a multiple spanning tree
instance or the common and internal spanning tree instance, depending on the mstid parameter. You can set the
path cost as a number in the range of 1 to 200000000 or auto. If you select auto the path cost value is set
based on Link Speed.
If you specify the port-priority option, this command sets the priority for this port within a specific
multiple spanning tree instance or the common and internal spanning tree instance, depending on the mstid
parameter. The port-priority value is a number in the range of 0 to 240 in increments of 16.
Default cost: auto
port-priority: 128
Format spanning-tree mst mstid {{cost 1-200000000 | auto} | port-priority 0-240}
Mode Interface Config
no spanning-tree mst
This command sets the Path Cost or Port Priority for this port within the multiple spanning tree instance, or in
the common and internal spanning tree to the respective default values. If you specify an mstid parameter
that corresponds to an existing multiple spanning tree instance, you are configuring that multiple spanning tree
instance. If you specify 0 (defined as the default CIST ID) as the mstid, you are configuring the common and
internal spanning tree instance.
If you specify cost, this command sets the path cost for this port within a multiple spanning tree instance or
the common and internal spanning tree instance, depending on the mstid parameter, to the default value,
i.e., a path cost value based on the Link Speed.
If you specify port-priority, this command sets the priority for this port within a specific multiple spanning
tree instance or the common and internal spanning tree instance, depending on the mstid parameter, to the
default value.
Format no spanning-tree mst mstid {cost | port-priority}
Mode Interface Config
spanning-tree tcnguard
Use this command to enable TCN guard on the interface. When enabled, TCN Guard restricts the interface from
propagating any topology change information received through that interface.
Default Enabled
Format spanning-tree tcnguard
Mode Interface Config
no spanning-tree tcnguard
This command resets the TCN guard status of the port to the default value.
Format no spanning-tree tcnguard
Mode Interface Config
spanning-tree transmit
This command sets the Bridge Transmit Hold Count parameter.
Default 6
Format spanning-tree transmit hold-count
Mode Global Config
Parameter Description
hold-count The Bridge Tx hold-count parameter. The value is an integer between 1 and 10.
show spanning-tree
This command displays spanning tree settings for the common and internal spanning tree. The following details
are displayed.
Format show spanning-tree
Mode Privileged EXEC
User EXEC
Term Definition
Bridge Priority Specifies the bridge priority for the Common and Internal Spanning tree (CST). The value lies between
0 and 61440. It is displayed in multiples of 4096.
Bridge Identifier The bridge identifier for the CST. It consists of the bridge priority and the bridges base MAC address.
Time Since Topology Change Time in seconds.
Topology Change Count Number of times changed.
Topology Change in Boolean value of the Topology Change parameter for the switch indicating if a topology change is in
Progress progress on any port assigned to the common and internal spanning tree.
Designated Root The bridge identifier of the root bridge, consisting of the bridge priority and the bridges base MAC address.
Root Path Cost Value of the Root Path Cost parameter for the common and internal spanning tree.
Root Port Identifier Identifier of the port to access the Designated Root for the CST.
Bridge Max Age Derived value.
Bridge Max Hops Bridge max-hops count for the device.
Bridge Forwarding Delay Derived value.
Hello Time Configured value of the parameter for the CST.
Bridge Hold Time Minimum time between transmission of Configuration Bridge Protocol Data Units (BPDUs).
CST Regional Root Bridge Identifier of the CST Regional Root, consisting of the bridge priority and the bridges base MAC address.
Regional Root Path Cost Path Cost to the CST Regional Root.
Associated FIDs List of forwarding database identifiers currently associated with this instance.
Associated VLANs List of VLAN IDs currently associated with this instance.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show spanning-tree
(UBNT EdgeSwitch) #
Term Definition
Bridge Priority Configured value.
Bridge Identifier The bridge identifier for the selected MST instance. It consists of the bridge priority and the base MAC
address of the bridge.
Bridge Max Age Configured value.
Bridge Max Hops Bridge max-hops count for the device.
Bridge Hello Time Configured value.
Bridge Forward Delay Configured value.
Bridge Hold Time Minimum time between transmission of Configuration Bridge Protocol Data Units (BPDUs).
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show spanning-tree brief
Bridge Priority................................ 32768
Bridge Identifier.............................. 80:00:00:10:18:48:FC:07
Bridge Max Age................................. 20
Bridge Max Hops................................ 20
Bridge Hello Time.............................. 2
Bridge Forward Delay........................... 15
Bridge Hold Time............................... 6
(UBNT EdgeSwitch) #
Term Definition
Hello Time Admin hello time for this port.
Port Mode Enabled or disabled.
TCN Guard Enable or disable the propagation of received topology change notifications and topology changes to
other ports.
Auto Edge To enable or disable the feature that causes a port that has not seen a BPDU for edge delay time, to
become an edge port and transition to forwarding faster.
Port Up Time Since Counters Time since port was reset, displayed in days, hours, minutes, and seconds.
Last Cleared
STP BPDUs Transmitted Spanning Tree Protocol Bridge Protocol Data Units sent.
STP BPDUs Received Spanning Tree Protocol Bridge Protocol Data Units received.
RSTP BPDUs Transmitted Rapid Spanning Tree Protocol Bridge Protocol Data Units sent.
RSTP BPDUs Received Rapid Spanning Tree Protocol Bridge Protocol Data Units received.
MSTP BPDUs Transmitted Multiple Spanning Tree Protocol Bridge Protocol Data Units sent.
MSTP BPDUs Received Multiple Spanning Tree Protocol Bridge Protocol Data Units received.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) >show spanning-tree interface 0/1
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) >show spanning-tree interface lag 1
Parameter Description
mstid A multiple spanning tree instance identifier. The value is 04094.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) >show spanning-tree mst detailed 0
Term Definition
MST Instance ID The ID of the existing multiple spanning tree (MST) instance identifier. The value is 0-4094.
Port Identifier The port identifier for the specified port within the selected MST instance. It is made up from the port
priority and the interface number of the port.
Port Priority The priority for a particular port within the selected MST instance. The port priority is displayed in
multiples of 16.
Port Forwarding State Current spanning tree state of this port.
Port Role Each enabled MST Bridge Port receives a Port Role for each spanning tree. The port role is one of the
following values: Root Port, Designated Port, Alternate Port, Backup Port, Master Port or Disabled Port
Auto-Calculate Port Path Cost Indicates whether auto calculation for port path cost is enabled.
Port Path Cost Configured value of the Internal Port Path Cost parameter.
Designated Root The Identifier of the designated root for this port.
Root Path Cost The path cost to get to the root bridge for this instance. The root path cost is zero if the bridge is the
root bridge for that instance.
Designated Bridge Bridge Identifier of the bridge with the Designated Port.
Designated Port Identifier Port on the Designated Bridge that offers the lowest cost to the LAN.
If you specify 0 (defined as the default CIST ID) as the mstid, this command displays the settings and
parameters for a specific switch port within the common and internal spanning tree. The slot/port is the
desired switch port. In this case, the following are displayed.
Term Definition
Port Identifier The port identifier for this port within the CST.
Port Priority The priority of the port within the CST.
Port Forwarding State The forwarding state of the port within the CST.
Port Role The role of the specified interface within the CST.
Term Definition
Auto-Calculate Port Path Indicates whether auto calculation for port path cost is enabled or not (disabled).
Cost
Port Path Cost The configured path cost for the specified interface.
Auto-Calculate External Port Indicates whether auto calculation for external port path cost is enabled.
Path Cost
External Port Path Cost The cost to get to the root bridge of the CIST across the boundary of the region. This means that if the
port is a boundary port for an MSTP region, then the external path cost is used.
Designated Root Identifier of the designated root for this port within the CST.
Root Path Cost The root path cost to the LAN by the port.
Designated Bridge The bridge containing the designated port.
Designated Port Identifier Port on the Designated Bridge that offers the lowest cost to the LAN.
Topology Change Value of flag in next Configuration Bridge Protocol Data Unit (BPDU) transmission indicating if a
Acknowledgement topology change is in progress for this port.
Hello Time The hello time in use for this port.
Edge Port The configured value indicating if this port is an edge port.
Edge Port Status The derived value of the edge port status. True if operating as an edge port; false otherwise.
Point To Point MAC Status Derived value indicating if this port is part of a point to point link.
CST Regional Root The regional root identifier in use for this port.
CST Internal Root Path Cost The internal root path cost to the LAN by the designated external port.
Example: The following shows example CLI display output for the command in slot/port format.
(UBNT EdgeSwitch) >show spanning-tree mst port detailed 0 0/1
Example: The following shows example CLI display output for the command using a LAG interface number.
(UBNT EdgeSwitch) >show spanning-tree mst port detailed 0 lag 1
Term Definition
MST Instance ID The MST instance associated with this port.
Interface The interface in slot/port format.
STP Mode Indicates whether spanning tree is enabled or disabled on the port.
Type Currently not used.
STP State The forwarding state of the port in the specified spanning tree instance.
Port Role The role of the specified port within the spanning tree.
Desc Indicates whether the port is in loop inconsistent state or not. This field is blank if the loop guard
feature is not available.
Example: The following shows example CLI display output for the command in slot/port format.
(UBNT EdgeSwitch) >show spanning-tree mst port summary 0 0/1
Example: The following shows example CLI display output for the command using a LAG interface number.
(UBNT EdgeSwitch) >show spanning-tree mst port summary 0 lag 1
Term Definition
MST Instance ID The ID of the existing MST instance.
Interface The interface in slot/port format.
STP Mode Indicates whether spanning tree is enabled or disabled on the port.
Type Currently not used.
STP State The forwarding state of the port in the specified spanning tree instance.
Port Role The role of the specified port within the spanning tree.
Desc Indicates whether the port is in loop inconsistent state or not. This field is blank if the loop guard
feature is not available.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) >show spanning-tree mst port summary 0 active
Term Definition
MST Instance ID List List of multiple spanning trees IDs currently configured.
For each MSTID:
Associated FIDs List of forwarding database identifiers associated with this instance.
Associated VLANs List of VLAN IDs associated with this instance.
Term Definition
Spanning Tree Adminmode Enabled or disabled.
Spanning Tree Version Version of 802.1 currently supported (IEEE 802.1s, IEEE 802.1w, or IEEE 802.1d) based upon the Force
Protocol Version parameter.
BPDU Guard Mode Enabled or disabled.
BPDU Filter Mode Enabled or disabled.
Configuration Name Identifier used to identify the configuration currently being used.
Configuration Revision Level Identifier used to identify the configuration currently being used.
Configuration Digest Key A generated Key used in the exchange of the BPDUs.
Configuration Format Specifies the version of the configuration format being used in the exchange of BPDUs. The default
Selector value is zero.
MST Instances List of all multiple spanning tree instances configured on the switch.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) >show spanning-tree summary
Term Definition
VLAN Identifier The VLANs associated with the selected MST instance.
Associated Instance Identifier for the associated multiple spanning tree instance or CST if associated with the common
and internal spanning tree.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) >show spanning-tree vlan 1
VLAN Identifier................................ 1
Associated Instance............................ CST
VLAN Commands
This section describes the commands you use to configure VLAN settings.
vlan database
This command gives you access to the VLAN Config mode, which allows you to configure VLAN characteristics.
Format vlan database
Mode Privileged EXEC
network mgmt_vlan
This command configures the Management VLAN ID.
Default 1
Format network mgmt_vlan 1-4093
Mode Privileged EXEC
no network mgmt_vlan
This command sets the Management VLAN ID to the default.
Format no network mgmt_vlan
Mode Privileged EXEC
vlan
This command creates a new VLAN and assigns it an ID. The ID is a valid VLAN identification number (ID 1 is
reserved for the default VLAN). VLAN range is 2-4093.
Format vlan 2-4093
Mode VLAN Config
no vlan
This command deletes an existing VLAN. The ID is a valid VLAN identification number (ID 1 is reserved for the
default VLAN). The VLAN range is 2-4093.
Format no vlan 2-4093
Mode VLAN Config
vlan acceptframe
This command sets the frame acceptance mode on an interface or range of interfaces. For VLAN Only mode,
untagged frames or priority frames received on this interface are discarded. For Admit All mode, untagged
frames or priority frames received on this interface are accepted and assigned the value of the interface VLAN
ID for this port. For Admit Untagged Only mode, only untagged frames are accepted on this interface; tagged
frames are discarded. With any option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q
VLAN Specification.
Default all
Format vlan acceptframe {admituntaggedonly | vlanonly | all}
Mode Interface Config
no vlan acceptframe
This command resets the frame acceptance mode for the interface or range of interfaces to the default value.
Format no vlan acceptframe
Mode Interface Config
vlan ingressfilter
This command enables ingress filtering on an interface or range of interfaces. If ingress filtering is disabled,
frames received with VLAN IDs that do not match the VLAN membership of the receiving interface are admitted
and forwarded to ports that are members of that VLAN.
Default disabled
Format vlan ingressfilter
Mode Interface Config
no vlan ingressfilter
This command disables ingress filtering. If ingress filtering is disabled, frames received with VLAN IDs that do not
match the VLAN membership of the receiving interface are admitted and forwarded to ports that are members
of that VLAN.
Format no vlan ingressfilter
Mode Interface Config
Parameter Description
base vlan-id The first VLAN ID to be assigned to a port-based routing interface.
policy ascending VLAN IDs assigned to port-based routing interfaces start at the base and increase in value
policy descending VLAN IDs assigned to port-based routing interfaces start at the base and decrease in value
vlan makestatic
This command changes a dynamically created VLAN (created by GVRP registration) to a static VLAN (one that is
permanently configured and defined). The ID is a valid VLAN identification number. VLAN range is 2-4093.
Format vlan makestatic 2-4093
Mode VLAN Config
vlan name
This command changes the name of a VLAN. The name is an alphanumeric string of up to 32 characters, and the
ID is a valid VLAN identification number. ID range is 1-4093.
Default VLAN ID 1 - default
other VLANS - blank string
Format vlan name 1-4093 name
Mode VLAN Config
no vlan name
This command sets the name of a VLAN to a blank string.
Format no vlan name 1-4093
Mode VLAN Config
vlan participation
This command configures the degree of participation for a specific interface or range of interfaces in a VLAN. The
ID is a valid VLAN identification number, and the interface is a valid interface number.
Format vlan participation {exclude | include | auto} 1-4093
Mode Interface Config
With either option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q VLAN Specification.
no vlan port acceptframe all
This command sets the frame acceptance mode for all interfaces to Admit All. For Admit All mode, untagged
frames or priority frames received on this interface are accepted and assigned the value of the interface VLAN
ID for this port. With either option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q VLAN
specification.
Format no vlan port acceptframe all
Mode Global Config
vlan pvid
This command changes the VLAN ID on an interface or range of interfaces.
Default 1
Format vlan pvid 1-4093
Mode Interface Config
Interface Range Config
no vlan pvid
This command sets the VLAN ID on an interface or range of interfaces to 1.
Format no vlan pvid
Mode Interface Config
vlan tagging
This command configures the tagging behavior for a specific interface or range of interfaces in a VLAN to
enabled. If tagging is enabled, traffic is transmitted as tagged frames. If tagging is disabled, traffic is transmitted
as untagged frames. The ID is a valid VLAN identification number.
Format vlan tagging 1-4093
Mode Interface Config
no vlan tagging
This command configures the tagging behavior for a specific interface or range of interfaces in a VLAN to disabled.
If tagging is disabled, traffic is transmitted as untagged frames. The ID is a valid VLAN identification number.
Format no vlan tagging 1-4093
Mode Interface Config
show vlan
This command displays information about the configured private VLANs, including primary and secondary VLAN
IDs, type (community, isolated, or primary) and the ports which belong to a private VLAN.
Format show vlan {vlanid|private-vlan [type]}
Mode Privileged EXEC
User EXEC
Term Definition
Primary Primary VLAN identifier. The range of the VLAN ID is 1 to 4093.
Secondary Secondary VLAN identifier.
Type Secondary VLAN type (community, isolated, or primary).
Ports Ports which are associated with a private VLAN.
VLAN ID The VLAN identifier (VID) associated with each VLAN. The range of the VLAN ID is 1 to 4093.
VLAN Name A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric characters long,
including blanks. The default is blank. VLAN ID 1 always has the name Default. This field is optional.
VLAN Type Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and permanently
defined), or Dynamic. A dynamic VLAN can be created by GVRP registration or during the 802.1X
authentication process (DOT1X) if a RADIUS-assigned VLAN does not exist on the switch.
Interface Interface in slot/port format. It is possible to set the parameters for all ports by using the selectors on
the top line.
Term Definition
Current The degree of participation of this port in this VLAN. The permissible values are:
Include This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE
802.1Q standard.
Exclude This port is never a member of this VLAN. This is equivalent to registration forbidden in the
IEEE 802.1Q standard.
Autodetect To allow the port to be dynamically registered in this VLAN via GVRP. The port will not
participate in this VLAN unless a join request is received on this port. This is equivalent to registration
normal in the IEEE 802.1Q standard.
Configured The configured degree of participation of this port in this VLAN. The permissible values are:
Include This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE
802.1Q standard.
Exclude This port is never a member of this VLAN. This is equivalent to registration forbidden in the
IEEE 802.1Q standard.
Autodetect To allow the port to be dynamically registered in this VLAN via GVRP. The port will not
participate in this VLAN unless a join request is received on this port. This is equivalent to registration
normal in the IEEE 802.1Q standard.
Tagging The tagging behavior for this port in this VLAN.
Tagged Transmit traffic for this VLAN as tagged frames.
Untagged Transmit traffic for this VLAN as untagged frames.
Term Definition
Base VLAN ID Identifies the base VLAN ID for Internal allocation of VLANs to the routing interface.
Allocation policy Identifies whether the system allocates VLAN IDs in ascending or descending order.
Term Definition
VLAN ID There is a VLAN Identifier (vlanid) associated with each VLAN. The range of the VLAN ID is 1 to 4093.
VLAN Name A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric characters long,
including blanks. The default is blank. VLAN ID 1 always has the name Default. This field is optional.
VLAN Type Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and permanently
defined), or a Dynamic (one that is created by GVRP registration).
Term Definition
Interface The interface in slot/port format. It is possible to set the parameters for all ports by using the selectors
on the top line.
Port VLAN ID The VLAN ID that this port will assign to untagged frames or priority tagged frames received on this
port. The value must be for an existing VLAN. The factory default is 1.
Acceptable Frame Types The types of frames that may be received on this port. The options are VLAN only and Admit
All. When set to VLAN only, untagged frames or priority tagged frames received on this port are
discarded. When set to Admit All, untagged frames or priority tagged frames received on this port are
accepted and assigned the value of the Port VLAN ID for this port. With either option, VLAN tagged
frames are forwarded in accordance to the 802.1Q VLAN specification.
Ingress Filtering May be enabled or disabled. When enabled, the frame is discarded if this port is not a member of
the VLAN with which this frame is associated. In a tagged frame, the VLAN is identified by the VLAN
ID in the tag. In an untagged frame, the VLAN is the Port VLAN ID specified for the port that received
this frame. When disabled, all frames are forwarded in accordance with the 802.1Q VLAN bridge
specification. The factory default is disabled.
GVRP May be enabled or disabled.
Default Priority The 802.1p priority assigned to tagged packets arriving on the port.
Parameter Description
host-association Defines the VLAN association for community or host ports.
primary-vlan-id Primary VLAN ID of a private VLAN.
secondary-vlan-id Secondary (isolated or community) VLAN ID of a private VLAN.
mapping Defines the private VLAN mapping for promiscuous ports.
add Associates the secondary VLAN with the primary one.
remove Deletes the secondary VLANs from the primary VLAN association.
secondary-vlan-list A list of secondary VLANs to be mapped to a primary VLAN.
no switchport private-vlan
This command removes the private-VLAN association or mapping from the port.
Format no switchport private-vlan {host-association|mapping}
Mode Interface Config
Term Definition
host Configures an interface as a private VLAN host port. It can be either isolated or community port
depending on the secondary VLAN it is associated with.
promiscuous Configures an interface as a private VLAN promiscuous port. The promiscuous ports are members of
the primary VLAN.
private-vlan
This command configures the private VLANs and configures the association between the primary private VLAN
and secondary VLANs.
Format private-vlan {association [add|remove] community | isolated | primary}
Mode VLAN Config
Parameter Description
association Associates the primary and secondary VLAN.
community Designates a VLAN as a community VLAN.
isolated Designates a VLAN as the isolated VLAN.
primary Designates a VLAN as the primary VLAN.
no private-vlan
This command restores normal VLAN configuration.
Format no private-vlan {association}
Mode VLAN Config
When the interface parameter is not specified, only the global mode of the Voice VLAN is displayed.
Term Definition
Administrative Mode The Global Voice VLAN mode.
vlan priority
This command configures the default 802.1p port priority assigned for untagged packets for a specific interface.
The range for the priority is 07.
Default 0
Format vlan priority priority
Mode Interface Config
Note: Port protection occurs within a single switch. Protected port configuration does not affect traffic
between ports on two different switches. No traffic forwarding is possible between two protected ports.
Default unprotected
Format switchport protected groupid name name
Mode Global Config
Note: Port protection occurs within a single switch. Protected port configuration does not affect traffic
between ports on two different switches. No traffic forwarding is possible between two protected ports.
Default unprotected
Format switchport protected groupid
Mode Interface Config
Term Definition
Group ID The number that identifies the protected port group.
Name An optional name of the protected port group. The name can be up to 32 alphanumeric characters
long, including blanks. The default is blank.
List of Physical Ports List of ports, which are configured as protected for the group identified with groupid. If no port is
configured as protected for this group, this field is blank.
Term Definition
Name A string associated with this group as a convenience. It can be up to 32 alphanumeric characters long,
including blanks. The default is blank. This field is optional.
Protected Indicates whether the interface is protected or not (TRUE or FALSE). If the group is multiple groups
then it shows TRUE in Group groupid.
GARP Commands
This section describes the commands you use to configure Generic Attribute Registration Protocol (GARP) and
view GARP status. The commands in this section affect both GARP VLAN Registration Protocol (GVRP) and GARP
Multicast Registration Protocol (GMRP). GARP is a protocol that allows client stations to register with the switch
for membership in VLANS (by using GVMP) or multicast groups (by using GVMP).
set garp timer join
This command sets the GVRP join time per GARP for one interface, a range of interfaces, or all interfaces. Join
time is the interval between the transmission of GARP Protocol Data Units (PDUs) registering (or reregistering)
membership for a VLAN or multicast group. This command has an effect only when GVRP is enabled. The time is
from 10 to 100 (centiseconds). The value 20 centiseconds is 0.2 seconds.
Default 20
Format set garp timer join 10-100
Mode Interface Config
Global Config
Default 1000
Format set garp timer leaveall 200-6000
Mode Interface Config
Global Config
show garp
This command displays GARP information.
Format show garp
Mode Privileged EXEC
User EXEC
Term Definition
GMRP Admin Mode The administrative mode of GARP Multicast Registration Protocol (GMRP) for the system.
GVRP Admin Mode The administrative mode of GARP VLAN Registration Protocol (GVRP) for the system.
GVRP Commands
This section describes the commands you use to configure and view GARP VLAN Registration Protocol (GVRP)
information. GVRP-enabled switches exchange VLAN configuration information, which allows GVRP to provide
dynamic VLAN creation on trunk ports and automatic VLAN pruning.
Note: If GVRP is disabled, the system does not forward GVRP messages.
Term Definition
Interface Interface in slot/port format.
Join Timer The interval between the transmission of GARP PDUs registering (or reregistering) membership for an
attribute. Current attributes are a VLAN or multicast group. There is an instance of this timer on a per-
Port, per-GARP participant basis. Permissible values are 10 to 100 centiseconds (0.1 to 1.0 seconds).
The factory default is 20 centiseconds (0.2 seconds). The finest granularity of specification is one
centisecond (0.01 seconds).
Term Definition
Leave Timer The period of time to wait after receiving an unregister request for an attribute before deleting the
attribute. Current attributes are a VLAN or multicast group. This may be considered a buffer time for
another station to assert registration for the same attribute in order to maintain uninterrupted service.
There is an instance of this timer on a per-Port, per-GARP participant basis. Permissible values are 20 to
600 centiseconds (0.2 to 6.0 seconds). The factory default is 60 centiseconds (0.6 seconds).
LeaveAll Timer This Leave All Time controls how frequently LeaveAll PDUs are generated. A LeaveAll PDU indicates
that all registrations will shortly be deregistered. Participants will need to rejoin in order to maintain
registration. There is an instance of this timer on a per-Port, per-GARP participant basis. The Leave All
Period Timer is set to a random value in the range of LeaveAllTime to 1.5*LeaveAllTime. Permissible
values are 200 to 6000 centiseconds (2 to 60 seconds). The factory default is 1000 centiseconds (10
seconds).
Port GMRP Mode The GMRP administrative mode for the port, which is enabled or disabled (default). If this parameter is
disabled, Join Time, Leave Time and Leave All Time have no effect.
GMRP Commands
This section describes the commands you use to configure and view GARP Multicast Registration Protocol
(GMRP) information. Like IGMP Snooping, GMRP helps control the flooding of multicast packets. GMRP-enabled
switches dynamically register and deregister group membership information with the MAC networking devices
attached to the same segment. GMRP also allows group membership information to propagate across all
networking devices in the bridged LAN that support Extended Filtering Services.
Note: If GMRP is disabled, the system does not forward GMRP messages.
Term Definition
Interface The slot/port of the interface that this row in the table describes.
Join Timer The interval between the transmission of GARP PDUs registering (or reregistering) membership
for an attribute. Current attributes are a VLAN or multicast group. There is an instance of this timer
on a per-port, per-GARP participant basis. Permissible values are 10 to 100 centiseconds (0.1 to 1.0
seconds). The factory default is 20 centiseconds (0.2 seconds). The finest granularity of specification is
1 centisecond (0.01 seconds).
Leave Timer The period of time to wait after receiving an unregister request for an attribute before deleting the
attribute. Current attributes are a VLAN or multicast group. This may be considered a buffer time for
another station to assert registration for the same attribute in order to maintain uninterrupted service.
There is an instance of this timer on a per-Port, per-GARP participant basis. Permissible values are 20 to
600 centiseconds (0.2 to 6.0 seconds). The factory default is 60 centiseconds (0.6 seconds).
LeaveAll Timer This Leave All Time controls how frequently LeaveAll PDUs are generated. A LeaveAll PDU indicates
that all registrations will shortly be deregistered. Participants will need to rejoin in order to maintain
registration. There is an instance of this timer on a per-Port, per-GARP participant basis. The Leave All
Period Timer is set to a random value in the range of LeaveAllTime to 1.5*LeaveAllTime. Permissible
values are 200 to 6000 centiseconds (2 to 60 seconds). The factory default is 1000 centiseconds (10
seconds).
Port GMRP Mode The GMRP administrative mode for the port. It may be enabled or disabled. If this parameter is
disabled, Join Time, Leave Time and Leave All Time have no effect.
Term Definition
VLAN ID The VLAN in which the MAC Address is learned.
MAC Address A unicast MAC address for which the switch has forwarding and or filtering information. The format is
six 2-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are
added to the table as a result of a learning process or protocol.
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
dot1x eapolflood
Use this command to enable EAPOL flood support on the switch.
Default disabled
Format dot1x eapolflood
Mode Global Config
no dot1x eapolflood
This command disables EAPOL flooding on the switch.
Format no dot1x eapolflood
Mode Global Config
dot1x guest-vlan
This command configures VLAN as guest vlan on an interface or a range of interfaces. The command specifies an
active VLAN as an IEEE 802.1X guest VLAN. The range is 1 to the maximum VLAN ID supported by the platform.
Default disabled
Format dot1x guest-vlan vlan-id
Mode Interface Config
no dot1x guest-vlan
This command disables Guest VLAN on the interface.
Default disabled
Format no dot1x guest-vlan
Mode Interface Config
dot1x initialize
This command begins the initialization sequence on the specified port. This command is only valid if the control
mode for the specified port is auto or MAC-based. If the control mode is not auto or MAC-based, an error will be
returned.
Format dot1x initialize slot/port
Mode Privileged EXEC
dot1x max-req
This command sets the maximum number of times the authenticator state machine on an interface or range
of interfaces will transmit an EAPOL EAP Request/Identity frame before timing out the supplicant. The count
value must be in the range 110.
Default 2
Format dot1x max-req count
Mode Interface Config
no dot1x max-req
This command sets the maximum number of times the authenticator state machine on this port will transmit an
EAPOL EAP Request/Identity frame before timing out the supplicant.
Format no dot1x max-req
Mode Interface Config
dot1x max-users
Use this command to set the maximum number of clients supported on an interface or range of interfaces when
MAC-based 802.1X authentication is enabled on the port. The maximum users supported per port is dependent
on the product. The count value is in the range 148.
Default 16
Format dot1x max-users count
Mode Interface Config
no dot1x max-users
This command resets the maximum number of clients allowed per port to its default value.
Format no dot1x max-users
Mode Interface Config
dot1x port-control
This command sets the authentication mode to use on the specified interface or range of interfaces. Use
the force-unauthorized parameter to specify that the authenticator PAE unconditionally sets the
controlled port to unauthorized. Use the force-authorized parameter to specify that the authenticator
PAE unconditionally sets the controlled port to authorized. Use the auto parameter to specify that the
authenticator PAE sets the controlled port mode to reflect the outcome of the authentication exchanges
between the supplicant, authenticator and the authentication server. If the mac-based option is specified,
then MAC-based 802.1X authentication is enabled on the port.
Default auto
Format dot1x port-control {force-unauthorized | force-authorized | auto | mac-based}
Mode Interface Config
no dot1x port-control
This command sets the 802.1X port control mode on the specified port to the default value.
Format no dot1x port-control
Mode Interface Config
dot1x mac-auth-bypass
If the 802.1X mode on the interface is mac-based, you can optionally use this command to enable MAC
Authentication Bypass (MAB) on an interface. MAB is a supplemental authentication mechanism that allows
802.1X unaware clients such as printers, fax machines, and some IP phones to authenticate to the network
using the client MAC address as an identifier.
Default disabled
Format dot1x mac-auth-bypass
Mode Interface Config
no dot1x mac-auth-bypass
This command sets the MAB mode on the ports to the default value.
Format no dot1x mac-auth-bypass
Mode Interface Config
dot1x re-authenticate
This command begins the reauthentication sequence on the specified port. This command is only valid if
the control mode for the specified port is auto or mac-based. If the control mode is not auto or
macbased, an error will be returned.
Format dot1x re-authenticate slot/port
Mode Privileged EXEC
dot1x re-authentication
This command enables reauthentication of the supplicant for the specified interface or range of interfaces.
Default disabled
Format dot1x re-authentication
Mode Interface Config
no dot1x re-authentication
This command disables reauthentication of the supplicant for the specified port.
Format no dot1x re-authentication
Mode Interface Config
dot1x system-auth-control
Use this command to enable the 802.1X authentication support on the switch. While disabled, the 802.1X
configuration is retained and can be changed, but is not activated.
Default disabled
Format dot1x system-auth-control
Mode Global Config
no dot1x system-auth-control
This command is used to disable the 802.1X authentication support on the switch.
Format no dot1x system-auth-control
Mode Global Config
dot1x timeout
This command sets the value, in seconds, of the timer used by the authenticator state machine on an interface
or range of interfaces. Depending on the parameter used and the value (in seconds) passed, various timeout
configurable parameters are set. The following tokens are supported:
Parameter Definition
guest-vlan-period The time, in seconds, for which the authenticator waits to see if any EAPOL packets are received on a
port before authorizing the port and placing the port in the guest vlan (if configured). The guest vlan
timer is only relevant when guest vlan has been configured on that specific port.
reauth-period The value, in seconds, of the timer used by the authenticator state machine on this port to determine
when reauthentication of the supplicant takes place. The reauth-period valid range is 165535.
quiet-period The value, in seconds, of the timer used by the authenticator state machine on this port to define
periods of time in which it will not attempt to acquire a supplicant. The valid range is 065535.
tx-period The value, in seconds, of the timer used by the authenticator state machine on this port to determine
when to send an EAPOL EAP Request/Identity frame to the supplicant. The quiet-period valid
range is 165535.
supp-timeout The value, in seconds, of the timer used by the authenticator state machine on this port to timeout the
supplicant. The supp-timeout valid range is 165535.
server-timeout The value, in seconds, of the timer used by the authenticator state machine on this port to timeout the
authentication server. The server-timeout valid range is 165535.
no dot1x timeout
This command sets the value, in seconds, of the timer used by the authenticator state machine on this port to
the default values. Depending on the token used, the corresponding default values are set.
Format no dot1x timeout {guest-vlan-period | reauth-period | quiet-period | tx-period |
supp-timeout | server-timeout}
Mode Interface Config
dot1x unauthenticated-vlan
Use this command to configure the unauthenticated VLAN associated with the specified interface or range of
interfaces. The unauthenticated VLAN ID can be a valid VLAN ID from 0 to the maximum supported VLAN ID
(4093 for EdgeSwitch). The unauthenticated VLAN must be statically configured in the VLAN database to be
operational. By default, the unauthenticated VLAN is 0; i.e., invalid and not operational.
Default 0
Format dot1x unauthenticated-vlan vlan-id
Mode Interface Config
no dot1x unauthenticated-vlan
This command resets the unauthenticated VLAN associated with the port to its default value.
Format no dot1x unauthenticated-vlan
Mode Interface Config
dot1x user
This command adds the specified user to the list of users with access to the specified port or all ports. The user
parameter must be a configured user.
Format dot1x user user {slot/port | all}
Mode Global Config
no dot1x user
This command removes the user from the list of users with access to the specified port or all ports.
Format no dot1x user user {slot/port | all}
Mode Global Config
Term Definition
Authentication Login List The authentication login listname.
Method 1 The first method in the specified authentication login list, if any.
Method 2 The second method in the specified authentication login list, if any.
Method 3 The third method in the specified authentication login list, if any.
HTTPS :local
HTTP :local
DOT1X :
show dot1x
This command is used to show a summary of the global 802.1X configuration, summary information of the
802.1X configuration for a specified port or all ports, the detailed 802.1X configuration for a specified port and
the 802.1X statistics for a specified port, depending on the tokens used.
Format show dot1x [{summary {slot/port | all} | detail slot/port | statistics slot/port]
Mode Privileged EXEC
If you do not use the optional parameters slot/port or vlanid, the command displays the global 802.1X
mode, the VLAN Assignment mode, and the Dynamic VLAN Creation mode.
Term Definition
Administrative Mode Indicates whether authentication control on the switch is enabled or disabled.
VLAN Assignment Mode Indicates whether assignment of an authorized port to a RADIUS-assigned VLAN is allowed (enabled)
or not (disabled).
Dynamic VLAN Creation Indicates whether the switch can dynamically create a RADIUS-assigned VLAN if it does not currently
Mode exist on the switch.
Monitor Mode Indicates whether the 802.1X Monitor mode on the switch is enabled or disabled.
If you use the optional parameter summary {slot/port | all}, the 802.1X configuration for the
specified port or all ports are displayed.
Term Definition
Interface The interface whose configuration is displayed.
Control Mode The configured control mode for this port. Possible values are force-unauthorized | force-authorized |
auto | mac-based | authorized | unauthorized.
Operating Control Mode The control mode under which this port is operating. Possible values are authorized | unauthorized.
Reauthentication Enabled Indicates whether reauthentication is enabled on this port.
Port Status Indicates whether the port is authorized or unauthorized. Possible values are authorized |
unauthorized.
Example: The following shows example CLI display output for the command show dot1x summary 0/1.
Operating
Interface Control Mode Control Mode Port Status
--------- ------------ ------------ ------------
0/1 auto auto Authorized
If you use the optional parameter detail slot/port, the detailed 802.1X configuration for the specified
port is displayed.
Term Definition
Port The interface whose configuration is displayed.
Protocol Version The protocol version associated with this port. The only possible value is 1, corresponding to the first
version of the 802.1X specification.
PAE Capabilities The port access entity (PAE) functionality of this port. Possible values are Authenticator or Supplicant.
Control Mode The configured control mode for this port. Possible values are force-unauthorized, force-authorized,
auto, and mac-based.
Authenticator PAE State Current state of the authenticator PAE state machine. Possible values are Initialize, Disconnected,
Connecting, Authenticating, Authenticated, Aborting, Held, ForceAuthorized, and ForceUnauthorized.
When MAC-based authentication is enabled on the port, this parameter is deprecated.
Backend Authentication Current state of the backend authentication state machine. Possible values are Request, Response,
State Success, Fail, Timeout, Idle, and Initialize. When MAC-based authentication is enabled on the port, this
parameter is deprecated.
Quiet Period The timer used by the authenticator state machine on this port to define periods of time in which it
will not attempt to acquire a supplicant. The value is expressed in seconds and will be in the range 0
and 65535.
Term Definition
Transmit Period The timer used by the authenticator state machine on the specified port to determine when to send
an EAPOL EAP Request/Identity frame to the supplicant. The value is expressed in seconds and will be
in the range of 1 and 65535.
Guest-VLAN ID The guest VLAN identifier configured on the interface.
Guest VLAN Period The time in seconds for which the authenticator waits before authorizing and placing the port in the
Guest VLAN, if no EAPOL packets are detected on that port.
Supplicant Timeout The timer used by the authenticator state machine on this port to timeout the supplicant. The value is
expressed in seconds and will be in the range of 1 and 65535.
Server Timeout The timer used by the authenticator on this port to timeout the authentication server. The value is
expressed in seconds and will be in the range of 1 and 65535.
Maximum Requests The maximum number of times the authenticator state machine on this port will retransmit an EAPOL
EAP Request/Identity before timing out the supplicant. The value will be in the range of 1 and 10.
Configured MAB Mode The administrative mode of the MAC authentication bypass feature on the switch.
Operational MAB Mode The operational mode of the MAC authentication bypass feature on the switch. MAB might be
administratively enabled but not operational if the control mode is not MAC based.
Vlan-ID The VLAN assigned to the port by the RADIUS server. This is only valid when the port control mode is
not Mac-based.
VLAN Assigned Reason The reason the VLAN identified in the VLAN-assigned field has been assigned to the port. Possible
values are RADIUS, Unauthenticated VLAN, Guest VLAN, default, and Not Assigned. When the VLAN
Assigned Reason is Not Assigned, it means that the port has not been assigned to any VLAN by 802.1X.
This only valid when the port control mode is not MAC-based.
Reauthentication Period The timer used by the authenticator state machine on this port to determine when reauthentication of
the supplicant takes place. The value is expressed in seconds and will be in the range of 1 and 65535.
Reauthentication Enabled Indicates if reauthentication is enabled on this port. Possible values are True or False.
Key Transmission Enabled Indicates if the key is transmitted to the supplicant for the specified port. Possible values are True or
False.
EAPOL Flood Mode Enabled Indicates whether the EAPOL flood support is enabled on the switch. Possible values are True or False.
Control Direction The control direction for the specified port or ports. Possible values are both or in.
Maximum Users The maximum number of clients that can get authenticated on the port in the MAC-based 802.1X
authentication mode. This value is used only when the port control mode is not MAC-based.
Unauthenticated VLAN ID Indicates the unauthenticated VLAN configured for this port. This value is valid for the port only when
the port control mode is not MAC-based.
Session Timeout Indicates the time for which the given session is valid. The time period in seconds is returned by the
RADIUS server on authentication of the port. This value is valid for the port only when the port control
mode is not MAC-based.
Session Termination Action This value indicates the action to be taken once the session timeout expires. Possible values
are Default, Radius-Request. If the value is Default, the session is terminated the port goes into
unauthorized state. If the value is Radius-Request, then a reauthentication of the client authenticated
on the port is performed. This value is valid for the port only when the port control mode is not MAC-
based.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show dot1x detail 0/3
Port........................................... 0/1
Protocol Version............................... 1
PAE Capabilities............................... Authenticator
Control Mode................................... auto
Authenticator PAE State........................ Initialize
Backend Authentication State................... Initialize
Quiet Period (secs)............................ 60
Transmit Period (secs)......................... 30
Guest VLAN ID.................................. 0
Guest VLAN Period (secs)....................... 90
Supplicant Timeout (secs)...................... 30
For each client authenticated on the port, the show dot1x detail slot/port command will display
the following MAC-based 802.1X parameters if the port-control mode for that specific port is MAC-based.
Term Definition
Supplicant MAC-Address The MAC-address of the supplicant.
Authenticator PAE State Current state of the authenticator PAE state machine. Possible values are Initialize, Disconnected,
Connecting, Authenticating, Authenticated, Aborting, Held, ForceAuthorized, and ForceUnauthorized.
Backend Authentication Current state of the backend authentication state machine. Possible values are Request, Response,
State Success, Fail, Timeout, Idle, and Initialize.
VLAN-Assigned The VLAN assigned to the client by the RADIUS server.
Logical Port The logical port number associated with the client.
If you use the optional parameter statistics slot/port, the following 802.1X statistics for the specified
port appear.
Term Definition
Port The interface whose statistics are displayed.
EAPOL Frames Received The number of valid EAPOL frames of any type that have been received by this authenticator.
EAPOL Frames Transmitted The number of EAPOL frames of any type that have been transmitted by this authenticator.
EAPOL Start Frames The number of EAPOL start frames that have been received by this authenticator.
Received
EAPOL Logoff Frames The number of EAPOL logoff frames that have been received by this authenticator.
Received
Last EAPOL Frame Version The protocol version number carried in the most recently received EAPOL frame.
Last EAPOL Frame Source The source MAC address carried in the most recently received EAPOL frame.
EAP Response/Id Frames The number of EAP response/identity frames that have been received by this authenticator.
Received
EAP Response Frames The number of valid EAP response frames (other than resp/id frames) that have been received by this
Received authenticator.
EAP Request/Id Frames The number of EAP request/identity frames that have been transmitted by this authenticator.
Transmitted
EAP Request Frames The number of EAP request frames (other than request/identity frames) that have been transmitted by
Transmitted this authenticator.
Invalid EAPOL Frames The number of EAPOL frames that have been received by this authenticator in which the frame type is
Received not recognized.
EAP Length Error Frames The number of EAPOL frames that have been received by this authenticator in which the frame type is
Received not recognized.
Term Definition
Time Stamp The exact time at which the event occurs.
Interface Physical Port on which the event occurs.
Mac-Address The supplicant/client MAC address.
VLAN assigned The VLAN assigned to the client/port on authentication.
VLAN assigned Reason The type of VLAN ID assigned, which can be Guest VLAN, Unauth, Default, RADIUS Assigned, or
Montior Mode VLAN ID.
Auth Status The authentication status.
Reason The actual reason behind the successful or failed authentication.
Term Definition
Clients Authenticated using Indicates the number of the 802.1X clients authenticated using Monitor mode.
Monitor Mode
Clients Authenticated using Indicates the number of 802.1X clients authenticated using 802.1x authentication process.
Dot1x
Logical Interface The logical port number associated with a client.
Interface The physical port to which the supplicant is associated.
User Name The user name used by the client to authenticate to the server.
Supplicant MAC Address The supplicant device MAC address.
Session Time The time since the supplicant is logged on.
Filter ID Identifies the Filter ID returned by the RADIUS server when the client was authenticated. This is a
configured DiffServ policy name on the switch.
VLAN ID The VLAN assigned to the port.
VLAN Assigned The reason the VLAN identified in the VLAN ID field has been assigned to the port. Possible values are
RADIUS, Unauthenticated VLAN, Monitor Mode, or Default. When the VLAN Assigned reason is Default,
it means that the VLAN was assigned to the port because the P-VID of the port was that VLAN ID.
Session Timeout This value indicates the time for which the given session is valid. The time period in seconds is
returned by the RADIUS server on authentication of the port. This value is valid for the port only when
the port-control mode is not MAC-based.
Session Termination Action This value indicates the action to be taken once the session timeout expires. Possible values are
Default and Radius-Request. If the value is Default, the session is terminated and client details are
cleared. If the value is Radius-Request, then a reauthentication of the client is performed.
Term Definition
Users Users configured locally to have access to the specified port.
Parameter Description
auto The port is in the Unauthorized state until it presents its user name and password credentials to an
authenticator. If the authenticator authorizes the port, then it is placed in the Authorized state.
force-authorized Sets the authorization state of the port to Authorized, bypassing the authentication process.
force-unauthorized Sets the authorization state of the port to Unauthorized, bypassing the authentication process.
Term Definition
EAPOL Frames Received Displays the number of valid EAPOL frames received on the port.
EAPOL Frames Transmitted Displays the number of EAPOL frames transmitted via the port.
EAPOL Start Frames Displays the number of EAPOL Start frames transmitted via the port.
Transmitted
EAPOL Logoff Frames Displays the number of EAPOL Log off frames that have been received on the port.
Received
Term Definition
EAP Resp/ID Frames Displays the number of EAP Respond ID frames that have been received on the port.
Received
EAP Response Frames Displays the number of valid EAP Respond frames received on the port.
Received
EAP Req/ID Frames Displays the number of EAP Requested ID frames transmitted via the port.
Transmitted
EAP Req Frames Transmitted Displays the number of EAP Request frames transmitted via the port.
Invalid EAPOL Frames Displays the number of unrecognized EAPOL frames received on this port.
Received
EAP Length Error Frames Displays the number of EAPOL frames with an invalid Packet Body Length received on this port.
Received
Last EAPOL Frames Version Displays the protocol version number attached to the most recently received EAPOL frame.
Last EAPOL Frames Source Displays the source MAC Address attached to the most recently received EAPOL frame.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show dot1x statistics 0/1
Port........................................... 0/1
EAPOL Frames Received.......................... 0
EAPOL Frames Transmitted....................... 0
EAPOL Start Frames Transmitted................. 3
EAPOL Logoff Frames Received................... 0
EAP Resp/Id frames transmitted................. 0
EAP Response frames transmitted................ 0
EAP Req/Id frames transmitted.................. 0
EAP Req frames transmitted..................... 0
Invalid EAPOL frames received.................. 0
EAP length error frames received............... 0
Last EAPOL Frame Version....................... 0
Last EAPOL Frame Source........................ 00:00:00:00:02:01
Storm-Control Commands
This section describes commands you use to configure storm-control and view storm-control configuration
information. A traffic storm is a condition that occurs when incoming packets flood the LAN, which creates
performance degradation in the network. The Storm-Control feature protects against this condition.
The EdgeSwitch provides broadcast, multicast, and unicast story recovery for individual interfaces. Unicast
Storm-Control protects against traffic whose MAC addresses are not known by the system. For broadcast,
multicast, and unicast storm-control, if the rate of traffic ingressing on an interface increases beyond the
configured threshold for that type, the traffic is dropped.
To configure storm-control, you will enable the feature for all interfaces or for individual interfaces, and you will
set the threshold (storm-control level) beyond which the broadcast, multicast, or unicast traffic will be dropped.
The Storm-Control feature allows you to limit the rate of specific types of packets through the switch on a per-
port, per-type, basis.
Configuring a storm-control level also enables that form of storm-control. Disabling a storm-control level (using
thenoform of the command) sets the storm-control level back to the default value and disables that form of storm-
control. Using theno form of the storm-control command (not stating a level) disables that form of storm-control
but maintains the configured level (to be active the next time that form of storm-control is enabled.)
Note: The actual rate of ingress traffic required to activate storm-control is based on the size of incoming
packets and the hard-coded average packet size of 512 bytes used to calculate a packet-per-second (pps)
rate as the forwarding-plane requires pps versus an absolute rate kbps. For example, if the configured
limit is 10%, this is converted to ~25000 pps, and this pps limit is set in forwarding plane (hardware). You
get the approximate desired output when 512-byte packets are used.
storm-control broadcast
Use this command to enable broadcast storm recovery mode for all interfaces (Global Config mode) or one or
more interfaces (Interface Config mode). If the mode is enabled, broadcast storm recovery is active and, if the
rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic will
be dropped. Therefore, the rate of broadcast traffic will be limited to the configured threshold.
Default disabled
Format storm-control broadcast
Mode Global Config
Interface Config
no storm-control broadcast
Use this command to disable broadcast storm recovery mode for all interfaces (Global Config mode) or one or
more interfaces (Interface Config mode).
Format no storm-control broadcast
Mode Global Config
Interface Config
storm-control multicast
This command enables multicast storm recovery mode for all interfaces (Global Config mode) or one or more
interfaces (Interface Config mode). If the mode is enabled, multicast storm recovery is active, and if the rate
of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be
dropped. Therefore, the rate of multicast traffic will be limited to the configured threshold.
Default disabled
Format storm-control multicast
Mode Global Config
Interface Config
no storm-control multicast
This command disables multicast storm recovery mode for all interfaces (Global Config mode) or one or more
interfaces (Interface Config mode).
Format no storm-control multicast
Mode Global Config
Interface Config
storm-control unicast
This command enables unicast storm recovery mode for all interfaces (Global Config mode) or one or more
interfaces (Interface Config mode). If the mode is enabled, unicast storm recovery is active, and if the rate
of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the
configured threshold, the traffic will be dropped. Therefore, the rate of unknown unicast traffic will be limited to
the configured threshold.
Default disabled
Format storm-control unicast
Mode Global Config
Interface Config
no storm-control unicast
This command disables unicast storm recovery mode for all interfaces (Global Config mode) or one or more
interfaces (Interface Config mode).
Format no storm-control unicast
Mode Global Config
Interface Config
show storm-control
This command displays switch configuration information. If you do not use any of the optional parameters, this
command displays global storm control configuration parameters:
Broadcast Storm Recovery Mode may be enabled or disabled. The factory default is disabled.
802.3x Flow Control Mode may be enabled or disabled. The factory default is disabled.
Use the all keyword to display the per-port configuration parameters for all interfaces, or specify the
slot/port to display information about a specific interface.
Format show storm-control [all | slot/port]
Mode Privileged EXEC
Term Definition
Broadcast Storm Control Shows whether the broadcast storm control mode is enabled or disabled. The factory default is
Mode / Bcast Mode disabled.
Broadcast Storm Control The broadcast storm control level.
Level / Bcast Level
Multicast Storm Control Shows whether the multicast storm control mode is enabled or disabled.
Mode / Mcast Mode
Multicast Storm Control The multicast storm control level.
Level / Mcast Level
Unicast Storm Control Mode Shows whether the Unknown Unicast or DLF (Destination Lookup Failure) storm control mode is
/ Ucast Mode enabled or disabled.
Unicast Storm Control The Unknown Unicast or DLF (Destination Lookup Failure) storm control level.
Level / Ucast Level
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show storm-control
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show storm-control 0/1
Example: The following shows an example of part of the CLI display output for the command.
(UBNT EdgeSwitch) #show storm-control all
Note: If you configure the maximum number of dynamic port-channels (LAGs) that your platform
supports, additional port-channels that you configure are automatically static.
port-channel
This command configures a new port-channel (LAG) and generates a logical slot/port number for the port-
channel. The name field is a character string which can contain alphanumeric characters and - (dash
character). Use the show port channel command to display the slot/port number for the logical interface.
Instead of slot/port, lag lag-intf-num can be used as an alternate way to specify the LAG interface
where lag-intf-num is the LAG port number.
Note: Before you include a port in a port-channel, set the port physical mode. For more information, see
speed on page 199.
addport
This command adds one port to the port-channel (LAG). The first interface is a logical slot/port number of a
configured port-channel. You can add a range of ports by specifying the port range when you enter Interface
Config mode (for example: interface 0/1-0/4. Instead of slot/port, lag lag-intf-num can be used as
an alternate way to specify the LAG interface, where lag-intf-num is the LAG port number.
Note: Before adding a port to a port-channel, set the physical mode of the port. For more information, see
speed on page 199.
Note: Both the no portlacptimeout and the no lacp actor admin state commands set
the values back to default, regardless of the command used to configure the ports. Consequently, both
commands will display in show running-config.
interface lag
Use this command to enter Interface configuration mode for the specified LAG.
Format interface lag lag-interface-number
Mode Global Config
port-channel static
This command enables the static mode on a port-channel (LAG) interface or range of interfaces. By default the
static mode for a new port-channel is enabled, which means the port-channel is static. If the maximum number
of allowable dynamic port-channels are already present in the system, the static mode for a new port-channel is
enabled, which means the port-channel is static. You can only use this command on port-channel interfaces.
Default enabled
Format port-channel static
Mode Interface Config
no port-channel static
This command sets the static mode on a particular port-channel (LAG) interface to the default value. This
command will be executed only for interfaces of type port-channel (LAG).
Format no port-channel static
Mode Interface Config
port lacpmode
This command enables Link Aggregation Control Protocol (LACP) on a port or range of ports.
Default enabled
Format port lacpmode
Mode Interface Config
no port lacpmode
This command disables Link Aggregation Control Protocol (LACP) on a port.
Format no port lacpmode
Mode Interface Config
no port lacptimeout
This command sets the timeout back to its default value on a physical interface of a particular device type (actor
or partner).
Format no port lacptimeout {actor | partner}
Mode Interface Config
Note: Both the no portlacptimeout and the no lacp actor admin state commands set
the values back to default, regardless of the command used to configure the ports. Consequently, both
commands will display in show running-config.
no port lacptimeout
This command sets the timeout for all physical interfaces of a particular device type (actor or partner) back to
their default values.
Format no port lacptimeout {actor | partner}
Mode Global Config
Note: Both the no portlacptimeout and the no lacp actor admin state commands set
the values back to the default, regardless of the command used to configure the ports. Consequently, both
commands will display in show running-config.
port-channel adminmode
This command enables all configured port-channels with the same administrative mode setting.
Format port-channel adminmode all
Mode Global Config
no port-channel adminmode
This command disables all configured port-channels with the same administrative mode setting.
Format no port-channel adminmode all
Mode Global Config
port-channel linktrap
This command enables link trap notifications for the port-channel (LAG). The interface is a logical slot/port
for a configured port-channel. The option all sets every configured port-channel to the same administrative
mode setting. Instead of slot/port, lag lag-intf-num can also be used to specify the LAG interface,
where lag-intf-num is the LAG port number.
Default enabled
Format port-channel linktrap {logical slot/port | all}
Mode Global Config
no port-channel linktrap
This command disables link trap notifications for the port-channel (LAG). The interface is a logical slot and
port for a configured port-channel. The option all sets every configured port-channel with the same
administrative mode setting.
Format no port-channel linktrap {logical slot/port | all}
Mode Global Config
port-channel load-balance
This command selects the load-balancing option used on a port-channel (LAG). Traffic is balanced on a port-channel
(LAG) by selecting one of the links in the channel over which to transmit specific packets. The link is selected by
creating a binary pattern from selected fields in a packet, and associating that pattern with a particular link. Load-
balancing is not supported on every device. The range of options for load-balancing may vary per device.
This command can be configured for a single interface, a range of interfaces, or all interfaces. Instead of
slot/port, lag lag-intf-num can also be used to specify the LAG interface, where lag-intf-num
is the LAG port number.
Default 3
Format port-channel load-balance {1 | 2 | 3 | 4 | 5 | 6 | 7} {slot/port | all}
Mode Interface Config, Global Config
Parameter Definition
1 Source MAC, VLAN, EtherType, and incoming port associated with the packet
2 Destination MAC, VLAN, EtherType, and incoming port associated with the packet
3 Source/Destination MAC, VLAN, EtherType, and incoming port associated with the packet
4 Source IP and Source TCP/UDP fields of the packet
5 Destination IP and Destination TCP/UDP Port fields of the packet
6 Source/Destination IP and source/destination TCP/UDP Port fields of the packet
7 Enhanced hashing mode
slot/port | all Global Config Mode only: The interface is a logical slot/port number of a configured port-channel;
all applies the command to all currently configured port-channels.
no port-channel load-balance
This command reverts to the default load balancing configuration.
Format no port-channel load-balance {slot/port | all}
Mode Interface Config
Global Config
Term Definition
slot/port | all Global Config Mode only: The interface is a logical slot/port number of a configured port-channel;
all applies the command to all currently configured port-channels.
port-channel local-preference
This command enables the local-preference mode on a port-channel (LAG) interface or range of interfaces.
By default, the local-preference mode for a port-channel is disabled. This command can be used only on port-
channel interfaces.
Default disable
Format port-channel local-preference
Mode Interface Config
no port-channel local-preference
This command disables the local-preference mode on a port-channel.
Format no port-channel local-preference
Mode Interface Config
port-channel min-links
This command configures the port-channels minimum links for lag interfaces.
Default 1
Format port-channel min-links 1-8
Mode Interface Config
port-channel name
This command defines a name for the port-channel (LAG). The interface is a logical slot/port for a
configured port-channel, and name is an alphanumeric string up to 15 characters. Instead of slot/port,
lag lag-intf-num can also be used to specify the LAG interface, where lag-intf-num is the LAG port
number.
Format port-channel name {logical slot/port} name
Mode Global Config
show port-channel
This command displays an overview of all port-channels (LAGs) on the switch. Instead of slot/port,
laglag-intf-num can also be used to specify the LAG interface, where lag-intf-num is the LAG port
number.
Format show port-channel {slot/port | lag lag-intf-num}
Mode Privileged EXEC
Term Definition
Local Interface The valid slot/port number.
Channel Name The name of this port-channel (LAG). You may enter any string of up to 15 alphanumeric characters.
Link State Indicates whether the Link is up or down.
Admin Mode May be enabled or disabled. The factory default is enabled.
Type The status designating whether a particular port-channel (LAG) is statically or dynamically maintained.
Static The port-channel is statically maintained.
Dynamic The port-channel is dynamically maintained.
Load Balance Option The load balance option associated with this LAG. See port-channel load-balance on page 264.
Local Preference Mode Indicates whether the local preference mode is enabled or disabled.
Mbr Ports A listing of the ports that are members of this port-channel (LAG), in slot/port notation. There can be a
maximum of eight ports assigned to a given port-channel (LAG).
Device/Timeout For each port, lists the timeout (long or short) for Device Type (actor or partner).
Port Speed Speed of the port-channel port.
Port Active This field indicates if the port is actively participating in the port-channel (LAG).
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show port-channel 3/1
Term Definition
Local Interface The valid slot/port number.
Channel Name The name of this port-channel (LAG).
Link State Indicates whether the Link is up or down.
Admin Mode May be enabled or disabled. The factory default is enabled.
Port Channel Flap Count The number of times the port-channel was inactive.
Mbr Ports The slot/port for the port member.
Mbr Flap Counters The number of times a port member is inactive, either because the link is down, or the admin state is
disabled.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show port-channel 3/1 counters
Note: The source and destination cannot be configured as remote on the same device.
The reflector-port is configured at the source switch. The reflector-port forwards the mirrored
traffic towards the destination switch.
An IP/MAC ACL can be attached to a session by giving the access list number/name.
Use destination interface slot/port to specify the interface to receive the monitored traffic.
Use the mode parameter to enable the administrative mode of the session. If enabled, the probe port monitors
all the traffic received and transmitted on the physical monitored port.
Use the filter parameter to filter a specified access group either by IP address or MAC address.
Format monitor session session-id {
source {interface slot/port | vlan vlan-id | remote vlan vlan-id} [rx|tx] |
destination {interface slot/port | remote vlan vlan-id reflector-port slot/port} |
mode | filter {ip access-group {acl-id|acl-name} | mac access-group acl-name} }
Mode Global Config
no monitor session
Use this command without optional parameters to remove the monitor session (port monitoring) designation
from the source probe port, the destination monitored port and all VLANs. Once the port is removed from the
VLAN, you must manually add the port to any desired VLANs. Use the source interface slot/port
parameter or destination interface to remove the specified interface from the port monitoring
session. Use the mode parameter to disable the administrative mode of the session.
Note: Since the current version of the software only supports one session, if you do not supply optional
parameters, the behavior of this command is similar to the behavior of the no monitor command.
no monitor
This command removes all the source ports and a destination port for the {} and restores the default value for
mirroring session mode for all the configured sessions.
This is a standalonenocommand; i.e., there is no corresponding monitor command.
Default enabled
Format no monitor
Mode Global Config
Term Definition
Session ID An integer value used to identify the session. Its value can be anything between 1 and the maximum
number of mirroring sessions allowed on the platform.
Monitor Session Mode Indicates whether the Port Mirroring feature is enabled or disabled for the session identified with
session-id. The possible values are Enabled and Disabled.
Probe Port Probe port (destination port) for the session identified with session-id. If probe port is not set
then this field is blank.
Source Port The port which is configured as mirrored port (source port) for the session identified with session-id.
If no source port is configured for the session then this field is blank.
Type Direction in which source port configured for port mirroring. Types are tx for transmitted packets
and rx for received packets.
no macfilter
This command removes all filtering restrictions and the static MAC filter entry for the MAC address macaddr
on the VLAN vlanid. The macaddr parameter must be specified as a 6-byte hexadecimal number in the
format of b1:b2:b3:b4:b5:b6.
The vlanid parameter must identify a valid VLAN.
Format no macfilter macaddr vlanid
Mode Global Config
macfilter adddest
Use this command to add the interface or range of interfaces to the destination filter set for the MAC filter
with the given macaddr and VLAN of vlanid. The macaddr parameter must be specified as a 6-byte
hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The vlanid parameter must identify a valid VLAN.
Note: Configuring a destination port list is only valid for multicast MAC addresses.
no macfilter adddest
This command removes a port from the destination filter set for the MAC filter with the given macaddr and
VLAN of vlanid. The macaddr parameter must be specified as a 6-byte hexadecimal number in the format
of b1:b2:b3:b4:b5:b6. The vlanid parameter must identify a valid VLAN.
Format no macfilter adddest macaddr
Mode Interface Config
Note: Configuring a destination port list is only valid for multicast MAC addresses.
macfilter addsrc
This command adds the interface or range of interfaces to the source filter set for the MAC filter with the
MAC address of macaddr and VLAN of vlanid. The macaddr parameter must be specified as a 6-byte
hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The vlanid parameter must identify a valid VLAN.
Format macfilter addsrc macaddr vlanid
Mode Interface Config
no macfilter addsrc
This command removes a port from the source filter set for the MAC filter with the MAC address of macaddr
and VLAN of vlanid. The macaddr parameter must be specified as a 6-byte hexadecimal number in the
format of b1:b2:b3:b4:b5:b6. The vlanid parameter must identify a valid VLAN.
Format no macfilter addsrc macaddr vlanid
Mode Interface Config
Term Definition
MAC Address The MAC Address of the static MAC filter entry.
VLAN ID The VLAN ID of the static MAC filter entry.
Source Port(s) The source port filter sets slot and port(s).
Note: Only multicast address filters will have destination port lists.
Term Definition
VLAN ID The VLAN in which the MAC Address is learned.
MAC Address A unicast MAC address for which the switch has forwarding and or filtering information. As the data is
gleaned from the MFDB, the address will be a multicast address. The format is six 2-digit hexadecimal
numbers that are separated by colons, for example 01:23:45:67:89:AB.
Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are
added to the table as a result of a learning process or protocol.
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show dhcp client vendor-id-option
no ip dhcp snooping
Use this command to disable DHCP Snooping globally.
Format no ip dhcp snooping
Mode Global Config
Term Definition
Interface The interface for which data is displayed.
Trusted If it is enabled, DHCP snooping considers the port as trusted. The factory default is disabled.
Log Invalid Pkts If it is enabled, DHCP snooping application logs invalid packets on the specified interface.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip dhcp snooping
Term Definition
MAC Address Displays the MAC address for the binding that was added. The MAC address is the key to the binding
database.
IP Address Displays the valid IP address for the binding rule.
VLAN The VLAN for the binding rule.
Interface The interface to add a binding into the DHCP snooping interface.
Type Binding type; statically configured from the CLI or dynamically learned.
Lease Time (sec) The remaining lease time for the entry.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip dhcp snooping binding
Term Definition
Agent URL Bindings database agent URL.
Write Delay The maximum write time to write the database into local or remote.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip dhcp snooping database
write-delay: 5000
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip dhcp snooping interfaces
Term Definition
Interface The IP address of the interface in slot/port format.
MAC Verify Failures Represents the number of DHCP messages that were filtered on an untrusted interface because of
source MAC address and client HW address mismatch.
Client Ifc Mismatch Represents the number of DHCP release and Deny messages received on the different ports than
learned previously.
DHCP Server Msgs Recd Represents the number of DHCP server messages received on Untrusted ports.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip dhcp snooping statistics
Note: This note clarifies the prioritization of MGMD Snooping Configurations. Many of the IGMP/MLD
Snooping commands are available both in the Interface and VLAN modes. Operationally the system
chooses or prefers the VLAN configured values over the Interface configured values for most configurations
when the interface participates in the VLAN.
set igmp
This command enables IGMP Snooping on the system (Global Config Mode), an interface, or a range of
interfaces. This command also enables IGMP Snooping on a particular VLAN (VLAN Config Mode) and can enable
IGMP Snooping on all interfaces participating in a VLAN.
If IGMP Snooping is enabled on an interface, enabling routing on the interface or giving the interface port-
channel (LAG) membership disables the interfaces IGMP Snooping functionality. IGMP Snooping functionality is
restored if routing is disabled or if port-channel (LAG) membership is removed from the interface.
The IGMP application supports the following activities:
Validation of the IP header checksum (as well as the IGMP header checksum) and discarding of the frame
upon checksum error.
Maintenance of the forwarding table entries based on the MAC address versus the IP address.
Flooding of unregistered multicast data packets to all ports in the VLAN.
The optional vlan_id parameter is supported only in VLAN Config mode.
Default disabled
Format set igmp [vlan_id]
Mode Global Config, Interface Config, VLAN Config
no set igmp
This command disables IGMP Snooping on the system, an interface, a range of interfaces, or a VLAN. The optional
vlan_id parameter is supported only in VLAN Config mode.
Format no set igmp [vlan_id]
Mode Global Config, Interface Config, VLAN Config
Parameter Description
vlan-id A valid VLAN ID. Range is 1 to 4093.
show igmpsnooping
This command displays IGMP Snooping information for a given slot/port or VLAN. Configured information
is displayed whether or not IGMP Snooping is enabled.
Format show igmpsnooping [slot/port | vlan_id]
Mode Privileged EXEC
When the optional arguments slot/port or vlan_id are not used, the command displays the following:
Term Definition
Admin Mode Indicates whether or not IGMP Snooping is active on the switch.
Multicast Control Frame Count The number of multicast control frames that are processed by the CPU.
Interface Enabled for IGMP The list of interfaces on which IGMP Snooping is enabled.
Snooping
VLANS Enabled for IGMP The list of VLANS on which IGMP Snooping is enabled.
Snooping
When you specify the slot/port values, the following information appears:
Term Definition
IGMP Snooping Admin Mode Indicates whether IGMP Snooping is active on the interface.
Fast Leave Mode Indicates whether IGMP Snooping Fast-leave is active on the interface.
Group Membership Interval The amount of time in seconds that a switch will wait for a report from a particular group on a
particular interface before deleting the interface from the entry.This value may be configured.
Maximum Response Time The amount of time the switch waits after it sends a query on an interface because it did not receive a
report for a particular group on that interface. This value may be configured.
Multicast Router Expiry Time The amount of time to wait before removing an interface from the list of interfaces with multicast
routers attached. The interface is removed if a query is not received. This value may be configured.
When you specify a value for vlan_id, the following information appears:
Term Definition
VLAN ID The VLAN ID.
IGMP Snooping Admin Indicates whether IGMP Snooping is active on the VLAN.
Mode
Fast Leave Mode Indicates whether IGMP Snooping Fast-leave is active on the VLAN.
Group Membership Interval The amount of time in seconds that a switch will wait for a report from a particular group on a
(secs) particular interface, which is participating in the VLAN, before deleting the interface from the entry.
This value may be configured.
Maximum Response Time The amount of time the switch waits after it sends a query on an interface, participating in the
(secs) VLAN, because it did not receive a report for a particular group on that interface. This value may be
configured.
Multicast Router Expiry Time The amount of time to wait before removing an interface that is participating in the VLAN from the list
(secs) of interfaces with multicast routers attached. The interface is removed if a query is not received. This
value may be configured.
Report Suppression Mode Indicates whether IGMP reports (set by the command set igmp report-suppression on page 284)
is enabled or not.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show igmpsnooping 1
VLAN ID........................................ 1
IGMP Snooping Admin Mode....................... Disabled
Fast Leave Mode................................ Disabled
Group Membership Interval (secs)............... 260
Max Response Time (secs)....................... 10
Multicast Router Expiry Time (secs)............ 0
Report Suppression Mode........................ Enabled
Term Definition
Interface The port on which multicast router information is being displayed.
Multicast Router Attached Indicates whether multicast router is statically enabled on the interface.
VLAN ID The list of VLANs of which the interface is a member.
Term Definition
Interface The port on which multicast router information is being displayed.
VLAN ID The list of VLANs of which the interface is a member.
Term Definition
VLAN ID The VLAN in which the MAC address is learned.
MAC Address A multicast MAC address for which the switch has forwarding or filtering information. The format is six
2-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Type The type of the entry, which is either static (added by the user) or dynamic (added to the table as a
result of a learning process or protocol).
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
Note: This note clarifies the prioritization of MGMD Snooping Configurations. Many of the IGMP/MLD
Snooping commands are available both in the Interface and VLAN modes. Operationally the system
chooses or prefers the VLAN configured values over the Interface configured values for most configurations
when the interface participates in the VLAN.
Note: The Querier IP Address assigned for a VLAN takes precedence over global configuration.
The IGMP Snooping Querier application supports sending periodic general queries on the VLAN to solicit
membership reports.
Default disabled
Format set igmp querier [vlan-id] [address ipv4_address]
Mode Global Config VLAN Mode
When the optional argument vlanid is not used, the command displays the following information.
Field Description
Admin Mode Indicates whether or not IGMP Snooping Querier is active on the switch.
Admin Version The version of IGMP that will be used while sending out the queries.
Querier Address The IP Address which will be used in the IPv4 header while sending out IGMP queries. It can be
configured using the appropriate command.
Query Interval The amount of time in seconds that a Snooping Querier waits before sending out the periodic general
query.
Querier Timeout The amount of time to wait in the Non-Querier operational state before moving to a Querier state.
When you specify a value for vlanid, the following additional information appears.
Field Description
VLAN Admin Mode Indicates whether iGMP Snooping Querier is active on the VLAN.
VLAN Operational State Indicates whether IGMP Snooping Querier is in Querier or Non-Querier state. When the switch is
in Querier state, it will send out periodic general queries. When in Non-Querier state, it will wait for
moving to Querier state and does not send out any queries.
VLAN Operational Max Indicates the time to wait before removing a Leave from a host upon receiving a Leave request. This
Response Time value is calculated dynamically from the Queries received from the network. If the Snooping Switch is
in Querier state, then it is equal to the configured value.
Querier Election Indicates whether the IGMP Snooping Querier participates in querier election if it discovers the
Participation presence of a querier in the VLAN.
Querier VLAN Address The IP address will be used in the IPv4 header while sending out IGMP queries on this VLAN. It can be
configured using the appropriate command.
Operational Version The version of IPv4 will be used while sending out IGMP queries on this VLAN.
Last Querier Address Indicates the IP address of the most recent Querier from which a Query was received.
Last Querier Version Indicates the IGMP version of the most recent Querier from which a Query was received on this VLAN.
When the optional argument detail is used, the command shows the global information and the
information for all Querier-enabled VLANs.
Note: To enable the SNMP trap specific to port security, see snmp-server enable traps violation on
page 74.
port-security
This command enables port locking on an interface, a range of interfaces, or at the system level.
Default disabled
Format port-security
Mode Global Config (to enable port locking globally)
Interface Config (to enable port locking on an interface or range of interfaces)
no port-security
This command disables port locking for one (Interface Config) or all (Global Config) ports.
Format no port-security
Mode Global Config
Interface Config
port-security max-dynamic
This command sets the maximum number of dynamically locked MAC addresses allowed on a specific port. The
valid range is 0600.
Default 600
Format port-security max-dynamic maxvalue
Mode Interface Config
no port-security max-dynamic
This command resets the maximum number of dynamically locked MAC addresses allowed on a specific port to
its default value.
Format no port-security max-dynamic
Mode Interface Config
port-security max-static
This command sets the maximum number of statically locked MAC addresses allowed on a port. The valid range
is 020.
Default 1
Format port-security max-static maxvalue
Mode Interface Config
no port-security max-static
This command sets maximum number of statically locked MAC addresses to the default value.
Format no port-security max-static
Mode Interface Config
port-security mac-address
This command adds a MAC address to the list of statically locked MAC addresses for an interface or range of
interfaces. The vid parameter is the VLAN ID.
Format port-security mac-address mac-address vid
Mode Interface Config
no port-security mac-address
This command removes a MAC address from the list of statically locked MAC addresses.
Format no port-security mac-address mac-address vid
Mode Interface Config
show port-security
This command displays the port-security settings for the port(s). If you do not use a parameter, the command
displays the Port Security Administrative mode. Use the optional parameters to display the settings on a specific
interface or on all interfaces. Instead of slot/port, lag lag-intf-num can also be used to specify the
LAG interface where lag-intf-num is the LAG port number.
Format show port-security [{slot/port | all}]
Mode Privileged EXEC
Term Definition
Admin Mode Port Locking mode for the entire system. This field displays if you do not supply any parameters.
For each interface, or for the interface you specify, the following information appears:
Term Definition
Admin Mode Port Locking mode for the Interface.
Dynamic Limit Maximum dynamically allocated MAC Addresses.
Static Limit Maximum statically allocated MAC Addresses.
Violation Trap Mode Whether violation traps are enabled.
Sticky Mode The administrative mode of the port security Sticky Mode feature on the interface.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show port-security 0/1
Term Definition
MAC Address MAC Address of dynamically locked MAC.
Term Definition
MAC Address MAC Address of statically locked MAC.
Example: The following shows example CLI display output for the command.
(EdgeSwitch) #show port-security static 0/1
Term Definition
MAC Address MAC Address of discarded packet on locked port.
no lldp transmit
Use this command to return the local data transmission capability to the default.
Format no lldp transmit
Mode Interface Config
lldp receive
Use this command to enable the LLDP receive capability on an interface or a range of interfaces.
Default disabled
Format lldp receive
Mode Interface Config
no lldp receive
Use this command to return the reception of LLDPDUs to the default value.
Format no lldp receive
Mode Interface Config
lldp timers
Use this command to set the timing parameters for local data transmission on ports enabled for LLDP. The
interval-seconds determines the number of seconds to wait between transmitting local data LLDPDUs.
The range is 1-32768 seconds. The hold-value is the multiplier on the transmit interval that sets the TTL in
local data LLDPDUs. The multiplier range is 2-10. The reinit-seconds is the delay before reinitialization,
and the range is 1-10 seconds.
Default interval: 30 seconds
hold: 4
reinit: 2 seconds
Format lldp timers [interval interval-seconds] [hold hold-value] [reinit reinit-seconds]
Mode Global Config
no lldp timers
Use this command to return any or all timing parameters for local data transmission on ports enabled for LLDP to
the default values.
Format no lldp timers [interval] [hold] [reinit]
Mode Global Config
lldp transmit-tlv
Use this command to specify which optional type length values (TLVs) in the 802.1AB basic management set are
transmitted in the LLDPDUs from an interface or range of interfaces. Use sys-name to transmit the system
name TLV. To configure the system name, see snmp-server on page 73. Use sys-desc to transmit the
system description TLV. Use sys-cap to transmit the system capabilities TLV. Use port-desc to transmit
the port description TLV. To configure the port description, see description on page 197.
Default no optional TLVs are included
Format lldp transmit-tlv [sys-desc] [sys-name] [sys-cap] [port-desc]
Mode Interface Config
no lldp transmit-tlv
Use this command to remove an optional TLV from the LLDPDUs. Use the command without parameters to
remove all optional TLVs from the LLDPDU.
Format no lldp transmit-tlv [sys-desc] [sys-name] [sys-cap] [port-desc]
Mode Interface Config
lldp transmit-mgmt
Use this command to include transmission of the local system management address information in the LLDPDUs.
This command can be used to configure a single interface or a range of interfaces.
Format lldp transmit-mgmt
Mode Interface Config
no lldp transmit-mgmt
Use this command to include transmission of the local system management address information in the LLDPDUs.
Use this command to cancel inclusion of the management information in LLDPDUs.
Format no lldp transmit-mgmt
Mode Interface Config
lldp notification
Use this command to enable remote data change notifications on an interface or a range of interfaces.
Default disabled
Format lldp notification
Mode Interface Config
no lldp notification
Use this command to disable notifications.
Default disabled
Format no lldp notification
Mode Interface Config
lldp notification-interval
Use this command to configure how frequently the system sends remote data change notifications. The
interval parameter is the number of seconds to wait between sending notifications. The valid interval range
is 5-3600 seconds.
Default 5
Format lldp notification-interval interval
Mode Global Config
no lldp notification-interval
Use this command to return the notification interval to the default value.
Format no lldp notification-interval
Mode Global Config
show lldp
Use this command to display a summary of the current LLDP configuration.
Format show lldp
Mode Privileged Exec
Term Definition
Transmit Interval How frequently the system transmits local data LLDPDUs, in seconds.
Transmit Hold Multiplier The multiplier on the transmit interval that sets the TTL in local data LLDPDUs.
Re-initialization Delay The delay before reinitialization, in seconds.
Notification Interval How frequently the system sends remote data change notifications, in seconds.
Term Definition
Interface The interface in a slot/port format.
Link Shows whether the link is up or down.
Transmit Shows whether the interface transmits LLDPDUs.
Receive Shows whether the interface receives LLDPDUs.
Notify Shows whether the interface sends remote data change notifications.
TLVs Shows whether the interface sends optional TLVs in the LLDPDUs. The TLV codes can be 0 (Port
Description), 1 (System Name), 2 (System Description), or 3 (System Capability).
Mgmt Shows whether the interface transmits system management address information in the LLDPDUs.
Term Definition
Last Update The amount of time since the last update to the remote table in days, hours, minutes, and seconds.
Total Inserts Total number of inserts to the remote data table.
Total Deletes Total number of deletes from the remote data table.
Total Drops Total number of times the complete remote data received was not inserted due to insufficient
resources.
Total Ageouts Total number of times a complete remote data entry was deleted because the Time to Live interval
expired.
Term Definition
Local Interface The interface that received the LLDPDU from the remote device.
RemID An internal identifier to the switch to mark each remote device to the system.
Chassis ID The ID that is sent by a remote device as part of the LLDP message, it is usually a MAC address of the
device.
Port ID The port number that transmitted the LLDPDU.
System Name The system name of the remote device.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show lldp remote-device all
Local
Interface RemID Chassis ID Port ID System Name
------- ------- -------------------- ------------------ ------------------
0/1
0/2
0/3
0/4
0/5
0/6
0/7 2 00:FC:E3:90:01:0F 00:FC:E3:90:01:11
0/7 3 00:FC:E3:90:01:0F 00:FC:E3:90:01:12
0/7 4 00:FC:E3:90:01:0F 00:FC:E3:90:01:13
0/7 5 00:FC:E3:90:01:0F 00:FC:E3:90:01:14
0/7 1 00:FC:E3:90:01:0F 00:FC:E3:90:03:11
0/7 6 00:FC:E3:90:01:0F 00:FC:E3:90:04:11
0/8
0/9
0/10
0/11
0/12
--More-- or (q)uit
Term Definition
Local Interface The interface that received the LLDPDU from the remote device.
Remote Identifier An internal identifier to the switch to mark each remote device to the system.
Chassis ID Subtype The type of identification used in the Chassis ID field.
Chassis ID The chassis of the remote device.
Port ID Subtype The type of port on the remote device.
Port ID The port number that transmitted the LLDPDU.
System Name The system name of the remote device.
System Description Describes the remote system by identifying the system name and versions of hardware, operating
system, and networking software supported in the device.
Port Description Describes the port in an alpha-numeric format. The port description is configurable.
System Capabilities Indicates the primary function(s) of the device.
Supported
System Capabilities Enabled Shows which of the supported system capabilities are enabled.
Management Address For each interface on the remote device with an LLDP agent, lists the type of address the remote LLDP
agent uses and specifies the address used to obtain information related to the device.
Time To Live The amount of time (in seconds) the remote devices information received in the LLDPDU should be
treated as valid information.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show lldp remote-device detail 0/7
Remote Identifier: 2
Chassis ID Subtype: MAC Address
Chassis ID: 00:FC:E3:90:01:0F
Port ID Subtype: MAC Address
Port ID: 00:FC:E3:90:01:11
System Name:
System Description:
Port Description:
System Capabilities Supported:
System Capabilities Enabled:
Time to Live: 24 seconds
Term Definition
Interface The interface in a unit/slot/port format.
Port ID The port ID associated with this interface.
Port Description The port description associated with the interface.
Term Definition
Interface The interface that sends the LLDPDU.
Chassis ID Subtype The type of identification used in the Chassis ID field.
Chassis ID The chassis of the local device.
Port ID Subtype The type of port on the local device.
Port ID The port number that transmitted the LLDPDU.
System Name The system name of the local device.
System Description Describes the local system by identifying the system name and versions of hardware, operating
system, and networking software supported in the device.
Port Description Describes the port in an alpha-numeric format.
System Capabilities Indicates the primary function(s) of the device.
Supported
System Capabilities Enabled Shows which of the supported system capabilities are enabled.
Management Address The type of address and the specific address the local LLDP agent uses to send and receive
information.
LLDP-MED Commands
Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED) (ANSI-TIA-1057) provides an extension
to the LLDP standard. Specifically, LLDP-MED provides extensions for network configuration and policy, device
location, Power over Ethernet (PoE) management and inventory management.
lldp med
Use this command to enable MED on an interface or a range of interfaces. By enabling MED, you will be
effectively enabling the transmit and receive function of LLDP.
Default disabled
Format lldp med
Mode Interface Config
no lldp med
Use this command to disable MED.
Format no lldp med
Mode Interface Config
Parameter Definition
capabilities Transmit the LLDP capabilities TLV.
ex-pd Transmit the LLDP extended PD TLV.
ex-pse Transmit the LLDP extended PSE TLV.
inventory Transmit the LLDP inventory TLV.
location Transmit the LLDP location TLV.
network-policy Transmit the LLDP network policy TLV.
Term Definition
capabilities Transmit the LLDP capabilities TLV.
ex-pd Transmit the LLDP extended PD TLV.
ex-pse Transmit the LLDP extended PSE TLV.
inventory Transmit the LLDP inventory TLV.
location Transmit the LLDP location TLV.
network-policy Transmit the LLDP network policy TLV.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch ) #show lldp med
LLDP MED Global Configuration
Fast Start Repeat Count: 3
Device Class: Network Connectivity
(UBNT EdgeSwitch) #
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show lldp med interface all
Interface Link configMED operMED ConfigNotify TLVsTx
--------- ------ --------- -------- ------------ -----------
0/1 Down Disabled Disabled Disabled 0,1
0/2 Up Disabled Disabled Disabled 0,1
0/3 Down Disabled Disabled Disabled 0,1
0/4 Down Disabled Disabled Disabled 0,1
0/5 Down Disabled Disabled Disabled 0,1
0/6 Down Disabled Disabled Disabled 0,1
0/7 Down Disabled Disabled Disabled 0,1
0/8 Down Disabled Disabled Disabled 0,1
0/9 Down Disabled Disabled Disabled 0,1
0/10 Down Disabled Disabled Disabled 0,1
0/11 Down Disabled Disabled Disabled 0,1
0/12 Down Disabled Disabled Disabled 0,1
0/13 Down Disabled Disabled Disabled 0,1
0/14 Down Disabled Disabled Disabled 0,1
TLV Codes: 0- Capabilities, 1- Network Policy
2- Location, 3- Extended PSE
4- Extended Pd, 5- Inventory
--More-- or (q)uit
(UBNT EdgeSwitch) #show lldp med interface 0/2
Interface Link configMED operMED ConfigNotify TLVsTx
--------- ------ --------- -------- ------------ -----------
0/2 Up Disabled Disabled Disabled 0,1
TLV Codes: 0- Capabilities, 1- Network Policy
2- Location, 3- Extended PSE
4- Extended Pd, 5- Inventory
(UBNT EdgeSwitch) #
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show lldp med local-device detail 0/8
Interface: 0/8
Network Policies
Media Policy Application Type : voice
Vlan ID: 10
Priority: 5
DSCP: 1
Unknown: False
Tagged: True
Inventory
Hardware Rev: xxx xxx xxx
Firmware Rev: xxx xxx xxx
Software Rev: xxx xxx xxx
Serial Num: xxx xxx xxx
Mfg Name: xxx xxx xxx
Model Name: xxx xxx xxx
Asset ID: xxx xxx xxx
Location
Subtype: elin
Info: xxx xxx xxx
Extended POE
Device Type: pseDevice
Extended POE PD
Term Definition
Local Interface The interface that received the LLDPDU from the remote device.
Remote ID An internal identifier to the switch to mark each remote device to the system.
Device Class Device classification of the remote device.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show lldp med remote-device all
Local
Interface Remote ID Device Class
--------- --------- ------------
0/8 1 Class I
0/9 2 Not Defined
0/10 3 Class II
0/11 4 Class III
0/12 5 Network Con
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show lldp med remote-device detail 0/8
Network Policies
Media Policy Application Type : voice
Vlan ID: 10
Priority: 5
DSCP: 1
Unknown: False
Tagged: True
DSCP: 2
Unknown: False
Tagged: True
Inventory
Hardware Rev: xxx xxx xxx
Firmware Rev: xxx xxx xxx
Software Rev: xxx xxx xxx
Serial Num: xxx xxx xxx
Mfg Name: xxx xxx xxx
Model Name: xxx xxx xxx
Asset ID: xxx xxx xxx
Location
Subtype: elin
Info: xxx xxx xxx
Extended POE
Device Type: pseDevice
Extended POE PD
This section describes the commands you use to configure Denial of Service (DoS) Control. The EdgeSwitch
software provides support for classifying and blocking specific types of Denial of Service attacks. You can
configure your system to monitor and block these types of attacks:
SIP = DIP: Source IP address = Destination IP address.
First Fragment: TCP Header size smaller then configured value.
TCP Fragment: IP Fragment Offset = 1.
TCP Flag: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or
TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set.
L4 Port: Source TCP/UDP Port = Destination TCP/UDP Port.
ICMP: Limiting the size of ICMP Ping packets.
SMAC = DMAC: Source MAC address = Destination MAC address.
TCP Port: Source TCP Port = Destination TCP Port.
UDP Port: Source UDP Port = Destination UDP Port.
TCP Flag & Sequence: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence
Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set.
TCP Offset: TCP Header Offset = 1.
TCP SYN: TCP Flag SYN set.
TCP SYN & FIN: TCP Flags SYN and FIN set.
TCP FIN & URG & PSH: TCP Flags FIN and URG and PSH set and TCP Sequence Number = 0.
ICMP V6: Limiting the size of ICMPv6 Ping packets.
ICMP Fragment: Checks for fragmented ICMP packets.
dos-control all
This command enables Denial of Service protection checks globally.
Default disabled
Format dos-control all
Mode Global Config
no dos-control all
This command disables Denial of Service prevention checks globally.
Format no dos-control all
Mode Global Config
dos-control sipdip
This command enables Source IP address = Destination IP address (SIP = DIP) Denial of Service protection. If the
mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with SIP = DIP, the
packets will be dropped if the mode is enabled.
Default disabled
Format dos-control sipdip
Mode Global Config
no dos-control sipdip
This command disables Source IP address = Destination IP address (SIP = DIP) Denial of Service prevention.
Format no dos-control sipdip
Mode Global Config
dos-control firstfrag
This command enables Minimum TCP Header Size Denial of Service protection. If the mode is enabled, Denial
of Service prevention is active for this type of attack. If packets ingress having a TCP Header Size smaller then
the configured value, the packets will be dropped if the mode is enabled. The default is disabled. If you enable
dos-control firstfrag, but do not provide a Minimum TCP Header Size, the system sets that value to 20.
Default disabled (20)
Format dos-control firstfrag [0-255]
Mode Global Config
no dos-control firstfrag
This command sets Minimum TCP Header Size Denial of Service protection to the default value of disabled.
Format no dos-control firstfrag
Mode Global Config
dos-control tcpfrag
This command enables TCP Fragment Denial of Service protection. If the mode is enabled, Denial of Service
prevention is active for this type of attack. If packets ingress having IP Fragment Offset equal to one (1), the
packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpfrag
Mode Global Config
no dos-control tcpfrag
This command disabled TCP Fragment Denial of Service protection.
Format no dos-control tcpfrag
Mode Global Config
dos-control tcpflag
This command enables TCP Flag Denial of Service protections. If the mode is enabled, Denial of Service
prevention is active for this type of attacks. If packets ingress having TCP Flag SYN set and a source port less
than 1024 or having TCP Control Flags set to 0 and TCP Sequence Number set to 0 or having TCP Flags FIN, URG,
and PSH set and TCP Sequence Number set to 0 or having TCP Flags SYN and FIN both set, the packets will be
dropped if the mode is enabled.
Default disabled
Format dos-control tcpflag
Mode Global Config
no dos-control tcpflag
This command sets disables TCP Flag Denial of Service protections.
Format no dos-control tcpflag
Mode Global Config
dos-control l4port
This command enables L4 Port Denial of Service protections. If the mode is enabled, Denial of Service prevention
is active for this type of attack. If packets ingress having Source TCP/UDP Port Number equal to Destination TCP/
UDP Port Number, the packets will be dropped if the mode is enabled.
Note: Some applications mirror source and destination L4 ports RIP for example uses 520 for both. If
you enable dos-control l4port, applications such as RIP may experience packet loss which would
render the application inoperable.
Default disabled
Format dos-control l4port
Mode Global Config
no dos-control l4port
This command disables L4 Port Denial of Service protections.
Format no dos-control l4port
Mode Global Config
dos-control smacdmac
This command enables Source MAC address = Destination MAC address (SMAC = DMAC) Denial of Service
protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress
with SMAC = DMAC, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control smacdmac
Mode Global Config
no dos-control smacdmac
This command disables Source MAC address = Destination MAC address (SMAC = DMAC) DoS protection.
Format no dos-control smacdmac
Mode Global Config
dos-control tcpport
This command enables TCP L4 source = destination port number (Source TCP Port = Destination TCP Port) Denial
of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If
packets ingress with Source TCP Port = Destination TCP Port, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpport
Mode Global Config
no dos-control tcpport
This command disables TCP L4 source = destination port number (Source TCP Port = Destination TCP Port) Denial
of Service protection.
Format no dos-control tcpport
Mode Global Config
dos-control udpport
This command enables UDP L4 source = destination port number (Source UDP Port = Destination UDP Port) DoS
protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress
with Source UDP Port = Destination UDP Port, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control udpport
Mode Global Config
no dos-control udpport
This command disables UDP L4 source = destination port number (Source UDP Port = Destination UDP Port)
Denial of Service protection.
Format no dos-control udpport
Mode Global Config
dos-control tcpflagseq
This command enables TCP Flag and Sequence Denial of Service protections. If the mode is enabled, Denial of
Service prevention is active for this type of attack. If packets ingress having TCP Flag SYN set and a source port
less than 1024 or having TCP Control Flags set to 0 and TCP Sequence Number set to 0 or having TCP Flags FIN,
URG, and PSH set and TCP Sequence Number set to 0 or having TCP Flags SYN and FIN both set, the packets will
be dropped if the mode is enabled.
Default disabled
Format dos-control tcpflagseq
Mode Global Config
no dos-control tcpflagseq
This command sets disables TCP Flag and Sequence Denial of Service protection.
Format no dos-control tcpflagseq
Mode Global Config
dos-control tcpoffset
This command enables TCP Offset Denial of Service protection. If the mode is enabled, Denial of Service
prevention is active for this type of attack. If packets ingress having TCP Header Offset equal to one (1), the
packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpoffset
Mode Global Config
no dos-control tcpoffset
This command disabled TCP Offset Denial of Service protection.
Format no dos-control tcpoffset
Mode Global Config
dos-control tcpsyn
This command enables TCP SYN and L4 source = 0-1023 Denial of Service protection. If the mode is enabled,
Denial of Service prevention is active for this type of attack. If packets ingress having TCP flag SYN set and an L4
source port from 0 to 1023, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpsyn
Mode Global Config
no dos-control tcpsyn
This command sets disables TCP SYN and L4 source = 0-1023 Denial of Service protection.
Format no dos-control tcpsyn
Mode Global Config
dos-control tcpsynfin
This command enables TCP SYN and FIN Denial of Service protection. If the mode is enabled, Denial of Service
prevention is active for this type of attack. If packets ingress having TCP flags SYN and FIN set, the packets will be
dropped if the mode is enabled.
Default disabled
Format dos-control tcpsynfin
Mode Global Config
no dos-control tcpsynfin
This command sets disables TCP SYN & FIN Denial of Service protection.
Format no dos-control tcpsynfin
Mode Global Config
dos-control tcpfinurgpsh
This command enables TCP FIN and URG and PSH and SEQ = 0 checking Denial of Service protections. If the
mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP FIN,
URG, and PSH all set and TCP Sequence Number set to 0, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpfinurgpsh
Mode Global Config
no dos-control tcpfinurgpsh
This command sets disables TCP FIN and URG and PSH and SEQ = 0 checking Denial of Service protections.
Format no dos-control tcpfinurgpsh
Mode Global Config
dos-control icmpv4
This command enables Maximum ICMPv4 Packet Size Denial of Service protections. If the mode is enabled,
Denial of Service prevention is active for this type of attack. If ICMPv4 Echo Request (PING) packets ingress
having a size greater than the configured value, the packets will be dropped if the mode is enabled.
Default disabled (512)
Format dos-control icmpv4 [0-16376]
Mode Global Config
no dos-control icmpv4
This command disables Maximum ICMP Packet Size Denial of Service protections.
Format no dos-control icmpv4
Mode Global Config
dos-control icmpv6
This command enables Maximum ICMPv6 Packet Size Denial of Service protections. If the mode is enabled,
Denial of Service prevention is active for this type of attack. If ICMPv6 Echo Request (PING) packets ingress
having a size greater than the configured value, the packets will be dropped if the mode is enabled.
Default disabled (512)
Format dos-control icmpv6 0-16376
Mode Global Config
no dos-control icmpv6
This command disables Maximum ICMP Packet Size Denial of Service protections.
Format no dos-control icmpv6
Mode Global Config
dos-control icmpfrag
This command enables ICMP Fragment Denial of Service protection. If the mode is enabled, Denial of Service
prevention is active for this type of attack. If packets ingress having fragmented ICMP packets, the packets will be
dropped if the mode is enabled.
Default disabled
Format dos-control icmpfrag
Mode Global Config
no dos-control icmpfrag
This command disabled ICMP Fragment Denial of Service protection.
Format no dos-control icmpfrag
Mode Global Config
show dos-control
This command displays Denial of Service configuration information.
Format show dos-control
Mode Privileged EXEC
Note: Some of the information below is displayed only if you are using the BCM56224 and BCM5621x
platforms.
Term Definition
First Fragment Mode The administrative mode of First Fragment DoS prevention. When enabled, this causes the switch to
drop packets that have a TCP header smaller then the configured Min TCP Hdr Size.
Min TCP Hdr Size The minimum TCP header size the switch will accept if First Fragment DoS prevention is enabled.
ICMPv4 Mode The administrative mode of ICMPv4 DoS prevention. When enabled, this causes the switch to drop
ICMP packets that have a type set to ECHO_REQ (ping) and a size greater than the configured ICMPv4
Payload Size.
Max ICMPv4 Payload Size The maximum ICMPv4 payload size to accept when ICMPv4 DoS protection is enabled.
Term Definition
ICMPv6 Mode The administrative mode of ICMPv6 DoS prevention. When enabled, this causes the switch to drop
ICMP packets that have a type set to ECHO_REQ (ping) and a size greater than the configured ICMPv6
Payload Size.
Max ICMPv6 Payload Size The maximum ICMPv6 payload size to accept when ICMPv6 DoS protection is enabled.
ICMPv4 Fragment Mode The administrative mode of ICMPv4 Fragment DoS prevention. When enabled, this causes the switch
to drop fragmented ICMPv4 packets.
TCP Port Mode The administrative mode of TCP Port DoS prevention. When enabled, this causes the switch to drop
packets that have the TCP source port equal to the TCP destination port.
UDP Port Mode The administrative mode of UDP Port DoS prevention. When enabled, this causes the switch to drop
packets that have the UDP source port equal to the UDP destination port.
SIPDIP Mode The administrative mode of SIP=DIP DoS prevention. Enabling this causes the switch to drop packets
that have a source IP address equal to the destination IP address. The factory default is disabled.
SMACDMAC Mode The administrative mode of SMAC=DMAC DoS prevention. Enabling this causes the switch to drop
packets that have a source MAC address equal to the destination MAC address.
TCP FIN&URG& PSH Mode The administrative mode of TCP FIN & URG & PSH DoS prevention. Enabling this causes the switch to
drop packets that have TCP flags FIN, URG, and PSH set and TCP Sequence Number = 0.
TCP Flag & Sequence Mode The administrative mode of TCP Flag DoS prevention. Enabling this causes the switch to drop packets
that have TCP control flags set to 0 and TCP sequence number set to 0.
TCP SYN Mode The administrative mode of TCP SYN DoS prevention. Enabling this causes the switch to drop packets
that have TCP Flags SYN set.
TCP SYN & FIN Mode The administrative mode of TCP SYN & FIN DoS prevention. Enabling this causes the switch to drop
packets that have TCP Flags SYN and FIN set.
TCP Fragment Mode The administrative mode of TCP Fragment DoS prevention. Enabling this causes the switch to drop
packets that have an IP fragment offset equal to 1.
TCP Offset Mode The administrative mode of TCP Offset DoS prevention. Enabling this causes the switch to drop
packets that have a TCP header Offset equal to 1.
no bridge aging-time
This command sets the forwarding database address aging timeout to the default value.
Format no bridge aging-time
Mode Global Config
Term Definition
Forwarding DB ID Fdbid (Forwarding database ID) indicates the forwarding database whose aging timeout is to be
shown. The all option is used to display the aging timeouts associated with all forwarding databases.
This field displays the forwarding database ID in an IVL system. This field will not be displayed in an
SVL system.
Agetime In an IVL system, this parameter displays the address aging timeout for the associated forwarding
database.
In an SVL system, this will display the systems address aging timeout value in seconds.
Term Definition
VLAN ID The VLAN in which the MAC address is learned.
MAC Address A multicast MAC address for which the switch has forwarding or filtering information. The format is six
2-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are
added to the table as a result of a learning process or protocol.
Component The component that is responsible for this entry in the Multicast Forwarding Database. Possible values
are IGMP Snooping, GMRP, and Static Filtering.
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
Forwarding Interfaces The resultant forwarding list is derived from combining all the components forwarding interfaces and
removing the interfaces that are listed as the static filtering interfaces.
Term Definition
Total Entries The total number of entries that can possibly be in the Multicast Forwarding Database table.
Most MFDB Entries Ever The largest number of entries that have been present in the Multicast Forwarding Database table. This
Used value is also known as the MFDB high-water mark.
Current Entries The current number of entries in the MFDB.
no arp
This command deletes an ARP entry. The value for ipaddress is the IP address of a device on a subnet
attached to an existing routing interface.
Format no arp ipaddress
Mode Global Config
arp cachesize
This command configures the ARP cache size. The ARP cache size value is a platform-specific integer value. The
default size also varies depending on the platform.
Format arp cachesize platform_specific_integer_value
Mode Global Config
no arp cachesize
This command sets the ARP cache size to the default (platform-dependent) value.
Format no arp cachesize
Mode Global Config
arp dynamicrenew
This command enables the ARP component to automatically renew dynamic ARP entries when they age out.
When an ARP entry reaches its maximum age, the system must decide whether to retain or delete the entry. If the
entry has recently been used to forward data packets, the system will renew the entry by sending an ARP request
to the neighbor. If the neighbor responds, the age of the ARP cache entry is reset to 0 without removing the entry
from the hardware. Traffic to the host continues to be forwarded in hardware without interruption. If the entry is
not being used to forward data packets, then the entry is deleted from the ARP cache, unless the dynamic renew
option is enabled. If the dynamic renew option is enabled, the system sends an ARP request to renew the entry.
When an entry is not renewed, it is removed from the hardware and subsequent data packets to the host trigger
an ARP request. Traffic to the host may be lost until the router receives an ARP reply from the host. Gateway
entries, entries for a neighbor router, are always renewed. The dynamic renew option applies only to host entries.
The disadvantage of enabling dynamic renew is that once an ARP cache entry is created, that cache entry
continues to take space in the ARP cache as long as the neighbor continues to respond to ARP requests, even if
no traffic is being forwarded to the neighbor. In a network where the number of potential neighbors is greater
than the ARP cache capacity, enabling dynamic renew could prevent some neighbors from communicating
because the ARP cache is full.
Default disabled
Format arp dynamicrenew
Mode Privileged EXEC
no arp dynamicrenew
This command prevents dynamic ARP entries from renewing when they age out.
Format no arp dynamicrenew
Mode Privileged EXEC
arp purge
This command causes the specified IP address to be removed from the ARP cache. Only entries of type dynamic
or gateway are affected by this command.
Format arp purge ipaddr
Mode Privileged EXEC
arp resptime
This command configures the ARP request response timeout.
The value for seconds is a valid positive integer, which represents the IP ARP entry response timeout time in
seconds. The range for seconds is between 1-10 seconds.
Default 1
Format arp resptime 1-10
Mode Global Config
no arp resptime
This command sets the ARP request response timeout to the default.
Format no arp resptime
Mode Global Config
arp retries
This command configures the ARP count of maximum request for retries.
The value for retries is an integer, which represents the maximum number of request for retries. The range for
retries is an integer between 0-10 retries.
Default 4
Format arp retries 0-10
Mode Global Config
no arp retries
This command sets the ARP count of maximum request for retries to the default.
Format no arp retries
Mode Global Config
arp timeout
This command configures the ARP entry ageout time.
The value for seconds is a valid positive integer, which represents the IP ARP entry ageout time in seconds. The
range for seconds is between 15-21600 seconds.
Default 1200
Format arp timeout 15-21600
Mode Global Config
no arp timeout
This command sets the ARP entry ageout time to the default.
Format no arp timeout
Mode Global Config
clear arp-cache
This command causes all ARP entries of type dynamic to be removed from the ARP cache. If the gateway
keyword is specified, the dynamic entries of type gateway are purged as well.
Format clear arp-cache [gateway]
Mode Privileged EXEC
clear arp-switch
Use this command to clear the contents of the switchs Address Resolution Protocol (ARP) table that contains
entries learned through the Management port. To observe whether this command is successful, ping from the
remote system to the DUT, issue the show arp switch command to see the ARP entries, and then issue the
clear arp-switch command and check the show arp switch entries. There will be no more ARP
entries.
Format clear arp-switch
Mode Privileged EXEC
show arp
This command displays the Address Resolution Protocol (ARP) cache. The displayed results are not the total ARP
entries. To view the total ARP entries, the operator should view the show arp results in conjunction with the
show arp switch results.
Format show arp
Mode Privileged EXEC
Term Definition
Age Time (seconds) The time (in seconds) it takes for an ARP entry to age out. This value is configurable.
Response Time (seconds) The time (in seconds) it takes for an ARP request timeout. This value is configurable.
Retries The maximum number of times an ARP request is retried. This value is configurable.
Cache Size The maximum number of entries in the ARP table. This value is configurable.
Dynamic Renew Mode Displays whether the ARP component automatically attempts to renew dynamic ARP entries when
they age out.
Total Entry Count Current/Peak The total entries in the ARP table and the peak entry count in the ARP table.
Static Entry Count Current/Max The static entry count in the ARP table and maximum static entry count in the ARP table.
Term Definition
Age Time (seconds) The time (in seconds) it takes for an ARP entry to age out. This value is configurable.
Response Time (seconds) The time (in seconds) it takes for an ARP request timeout. This value is configurable.
Retries The maximum number of times an ARP request is retried. This value is configurable.
Cache Size The maximum number of entries in the ARP table. This value is configurable.
Dynamic Renew Mode Displays whether the ARP component automatically attempts to renew dynamic ARP entries when
they age out.
Total Entry Count Current/ The total entries in the ARP table and the peak entry count in the ARP table.
Peak
Static Entry Count Current/ The static entry count in the ARP table and maximum static entry count in the ARP table.
Max
Term Definition
IP Address The IP address of a device on a subnet attached to the switch.
MAC Address The hardware MAC address of that device.
Interface The routing slot/port associated with the devices ARP entry.
IP Routing Commands
This section describes the commands you use to enable and configure IP routing on the switch.
routing
This command enables IPv4 and IPv6 routing for an interface or range of interfaces. You can view the current
value for this function with the show ip brief command. The value is labeled as Routing Mode.
Default disabled
Format routing
Mode Interface Config
no routing
This command disables routing for an interface. You can view the current value for this function with the show
ip brief command. The value is labeled as Routing Mode.
Format no routing
Mode Interface Config
ip routing
This command enables the IP Router Admin Mode for the master switch.
Format ip routing
Mode Global Config
no ip routing
This command disables the IP Router Admin Mode for the master switch.
Format no ip routing
Mode Global Config
ip address
This command configures an IP address on an interface or range of interfaces. You can also use this command
to configure one or more secondary IP addresses on the interface by specifying the secondary option. The
command supports RFC 3021 and accepts using 31-bit prefixes on IPv4 point-to-point links. This command adds
the label IP address in the command "show ip interface" on page 326.
Note: The 31-bit subnet mask is only supported on routing interfaces. The feature is not supported on
network port and service port interfaces because the EdgeSwitch acts as a host, not a router, on these
management interfaces.
Format ip address ipaddr {subnetmask | /masklen} [secondary]
Mode Interface Config
Parameter Description
ipaddr The IP address of the interface.
subnetmask A 4-digit dotted-decimal number which represents the subnet mask of the interface.
masklen Implements RFC 3021. Using the "/" notation of the subnet mask, this is an integer that indicates the
length of the subnet mask. Range is 5 to 32 bits.
Example: The following example of the command shows the configuration of the subnet mask with an IP address
in the dotted decimal format on interface 4/1.
(UBNT EdgeSwitch) #config
(UBNT EdgeSwitch) (Config)#interface 4/1
(UBNT EdgeSwitch) (Interface 4/1)#ip address 192.168.10.1 255.255.255.254
Example: The following example shows the configuration of the subnet mask with an IP address in the
"/"notation on interface 4/1.
(UBNT EdgeSwitch) #config
(UBNT EdgeSwitch) (Config)#interface 4/1
(UBNT EdgeSwitch) (Interface 4/1)#ip address 192.168.10.1 /31
no ip address
This command deletes an IP address from an interface. The value for ipaddr is the IP address of the interface
in a.b.c.d format where the range for a, b, c, and d is 1-255. The value for subnetmask is a 4-digit dotted-
decimal number which represents the subnet mask of the interface. To remove all of the IP addresses (primary
and secondary) configured on the interface, enter the command no ip address.
Format no ip address [{ipaddr subnetmask [secondary]}]
Mode Interface Config
ip address dhcp
This command enables the DHCPv4 client on an in-band interface so that it can acquire network information,
such as the IP address, subnet mask, and default gateway, from a network DHCP server. When DHCP is enabled
on the interface, the system automatically deletes all manually configured IPv4 addresses on the interface.
To enable the DHCPv4 client on an in-band interface and send DHCP client messages with the client identifier
option, use the ip address dhcp client-id configuration command in interface configuration
mode.
Default disabled
Format ip address dhcp [client-id]
Mode Interface Config
no ip address dhcp
This command releases a leased address and disables DHCPv4 on an interface. The no form of the
ipaddress dhcp client-id command removes the client-id option and also disables the DHCP
client on the in-band interface.
Format no ip address dhcp [client-id]
Mode Interface Config
ip default-gateway
This command manually configures a default gateway for the switch. Only one default gateway can be
configured. If you invoke this command multiple times, each command replaces the previous value.
When the system does not have a more specific route to a packets destination, it sends the packet to the default
gateway. The system installs a default IPv4 route with the gateway address as the next hop address. The route
preference is 253. A default gateway configured with this command is more preferred than a default gateway
learned from a DHCP server.
Format ip default-gateway ipaddr
Mode Global Config
Parameter Description
ipaddr The IPv4 address of an attached router.
no ip default-gateway
This command removes the default gateway address from the configuration.
Format no ip default-gateway ipaddr
Mode Interface Config
release dhcp
Use this command to force the DHCPv4 client to release the leased address from the specified interface. The
DHCP client sends a DHCP Release message telling the DHCP server that it no longer needs the IP address, and
that the IP address can be reassigned to another.
Format release dhcp slot/port
Mode Privileged EXEC
renew dhcp
Use this command to force the DHCPv4 client to immediately renew an IPv4 address lease on the specified interface.
Note: This command can be used on in-band ports as well as the service or network (out-of-band) port.
ip route
This command configures a static route. The ipaddr parameter is a valid IP address, and subnetmask is a
valid subnet mask. The nexthopip parameter is a valid IP address of the next hop router. Specifying Null0
for the nexthopip parameter adds a static reject route.
The optional preference parameter is an integer value (from 1 to 255) that allows you to specify the
preference value (sometimes called administrative distance) of an individual static route. Among routes to the
same destination, the route with the lowest preference value is the route entered into the forwarding database.
By specifying the preference of a static route, you control whether a static route is more or less preferred than
routes from dynamic routing protocols. The preference also controls whether a static route is more or less
preferred than other static routes to the same destination. A route with a preference of 255 cannot be used to
forward traffic.
For the static routes to be visible, you must perform the following steps:
Enable IP routing globally.
Enable IP routing for the interface.
Confirm that the associated link is also up.
Default preference 1
Format ip route ipaddr subnetmask [nexthopip | Null0] [preference]
Mode Global Config
no ip route
This command deletes a single next hop to a destination static route. If you use the nexthopip parameter, the
next hop is deleted. If you use the preference value, the preference value of the static route is reset to its default.
Format no ip route ipaddr subnetmask [{nexthopip [preference] | Null0}]
Mode Global Config
ip route default
This command configures the default route. The value for nexthopip is a valid IP address of the next hop router.
The preference is an integer value from 1-255. A route with a preference of 255 cannot be used to forward traffic.
Default preference 1
Format ip route default nexthopip [preference]
Mode Global Config
no ip route default
This command deletes all configured default routes. If the optional nexthopip parameter is designated,
the specific next hop is deleted from the configured default route and if the optional preference value is
designated, the preference of the configured default route is reset to its default.
Format no ip route default [{nexthopip | preference}]
Mode Global Config
ip route distance
This command sets the default distance (preference) for static routes. Lower route distance values are preferred
when determining the best route. The ip route and ip route default commands allow you to
optionally set the distance (preference) of an individual static route. The default distance is used when no
distance is specified in these commands. Changing the default distance does not update the distance of existing
static routes, even if they were assigned the original default distance. The new default distance will only be
applied to static routes created after invoking the ip route distance command.
Default 1
Format ip route distance 1-255
Mode Global Config
no ip route distance
This command sets the static route preference value in the router to the default. Lower route preference values
are preferred when determining the best route.
Format no ip route distance
Mode Global Config
ip netdirbcast
This command enables the forwarding of network-directed broadcasts on an interface or range of interfaces.
When enabled, network directed broadcasts are forwarded. When disabled, they are dropped.
Default disabled
Format ip netdirbcast
Mode Interface Config
no ip netdirbcast
This command disables the forwarding of network-directed broadcasts. When disabled, network-directed
broadcasts are dropped.
Format no ip netdirbcast
Mode Interface Config
ip mtu
This command sets the IP Maximum Transmission Unit (MTU) on a routing interface or range of interfaces.
The IP MTU is the size of the largest IP packet that can be transmitted on the interface without fragmentation.
Forwarded packets are dropped if they exceed the IP MTU of the outgoing interface. Packets originated on the
router, such as OSPF packets, may be fragmented by the IP stack.
OSPF advertises the IP MTU in the Database Description packets it sends to its neighbors during database
exchange. If two OSPF neighbors advertise different IP MTUs, they will not form an adjacency (unless OSPF has
been instructed to ignore differences in IP MTU with the ip ospf mtu-ignore command).
Note: The IP MTU size refers to the maximum size of the IP packet (IP header + IP payload). It does not
include any extra bytes that may be required for Layer-2 headers. To receive and process packets, the
Ethernet MTU (see "mtu" on page 198) must take into account the size of the Ethernet header.
Default 1500 bytes
Format ip mtu 68-9198
Mode Interface Config
no ip mtu
This command resets the IP MTU to the default value.
Format no ip mtu
Mode Interface Config
encapsulation
This command configures the link layer encapsulation type for the packet on an interface or range of interfaces.
The encapsulation type can be ethernet or snap.
Default ethernet
Format encapsulation {ethernet | snap}
Mode Interface Config
Note: Routed frames are always Ethernet-encapsulated when a frame is routed to a VLAN.
Term Definition
IP address, Subnet mask The IP address and network mask leased from the DHCP server.
DHCP Lease server The IPv4 address of the DHCP server that leased the address.
State State of the DHCPv4 Client on this interface.
DHCP transaction ID The transaction ID of the DHCPv4 Client.
Lease The time (in seconds) that the IP address was leased by the server.
Renewal The time (in seconds) when the next DHCP renew Request is sent by DHCPv4 Client to renew the
leased IP address.
Rebind The time (in seconds) when the DHCP Rebind process starts.
Retry count Number of times the DHCPv4 client sends a DHCP REQUEST message before the server responds.
show ip brief
This command displays all the summary information of the IP, including the ICMP rate limit configuration and the
global ICMP Redirect configuration.
Format show ip brief
Modes Privileged EXEC
User EXEC
Term Definition
Default Time to Live The computed TTL (Time to Live) of forwarding a packet from the local router to the final destination.
Routing Mode Shows whether the routing mode is enabled or disabled.
Maximum Next Hops The maximum number of next hops the packet can travel.
Maximum Routes The maximum number of routes the packet can travel.
ICMP Rate Limit Interval Shows how often the token bucket is initialized with burst-size tokens. Burst-interval is from 0 to
2147483647 milliseconds. The default burst-interval is 1000 msec.
ICMP Rate Limit Burst Size Shows the number of ICMPv4 error messages that can be sent during one burst-interval. The range is
from 1 to 200 messages. The default value is 100 messages.
ICMP Echo Replies Shows whether ICMP Echo Replies are enabled or disabled.
ICMP Redirects Shows whether ICMP Redirects are enabled or disabled.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip brief
show ip interface
This command displays all pertinent information about the IP interface. The parameter slot/port
corresponds to a physical routing interface or VLAN routing interface. The keyword vlan is used to specify the
VLAN ID of the routing VLAN directly instead of in a slot/port format.
Format show ip interface {slot/port | vlan 1-4093}
Modes Privileged EXEC, User EXEC
Term Definition
Routing Interface Status Determine the operational status of IPv4 routing Interface. The possible values are Up or Down.
Primary IP Address The primary IP address and subnet masks for the interface. This value appears only if you configure it.
Method Shows whether the IP address was configured manually or acquired from a DHCP server.
Routing Mode The administrative mode of router interface participation. The possible values are Enable or
Disable. This value is configurable.
Administrative Mode The administrative mode of the specified interface. The possible values of this field are Enable or
Disable. This value is configurable.
Forward Net Directed Displays whether forwarding of network-directed broadcasts is enabled (Enable) or disabled
Broadcasts (Disable). This value is configurable.
Active State Displays whether the interface is Active or Inactive. An interface is considered active if its link
is up and it is in forwarding state.
Link Speed Data Rate An integer representing the physical link data rate of the specified interface. This is measured in
Megabits per second (Mbps).
MAC Address The burned-in physical address of the specified interface. The format is six 2-digit hexadecimal
numbers that are separated by colons.
Encapsulation Type The encapsulation type for the specified interface. The types are: Ethernet or SNAP.
IP MTU The maximum transmission unit (MTU) size of a frame, in bytes.
Bandwidth Shows the bandwidth of the interface.
Destination Unreachables Displays whether ICMP Destination Unreachables may be sent (Enabled or Disabled).
ICMP Redirects Displays whether ICMP Redirects may be sent (Enabled or Disabled).
DHCP Client Identifier The client identifier is displayed in the output of the command only if DHCP is enabled with the client-
id option on the in-band interface. See "ip address dhcp" on page 321.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)#show ip interface 0/2
Example: In the following example the DHCP client is enabled on a VLAN routing interface.
(UBNT EdgeSwitch) #show ip interface vlan 10
Term Definition
Interface Valid slot and port number separated by a forward slash.
State Routing operational state of the interface.
IP Address The IP address of the routing interface in 32-bit dotted decimal format.
IP Mask The IP mask of the routing interface in 32-bit dotted decimal format.
Method Indicates how each IP address was assigned. The field contains one of the following values:
DHCP The address is leased from a DHCP server.
Manual The address is manually configured.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip interface brief
show ip route
This command displays the routing table. The ip-address specifies the network for which the route is to be
displayed and displays the best matching best-route for the address. The mask specifies the subnet mask for
the given ip-address. When you use the longer-prefixes keyword, the ip-address and mask
pair becomes the prefix, and the command displays the routes to the addresses that match that prefix. Use
the protocol parameter to specify the protocol that installed the routes. The value for protocol can be
connected or static. Use the all parameter to display all routes including best and nonbest routes. If
you do not use the all parameter, the command displays only the best route.
Note: If you use the connected keyword for protocol, the all option is not available because
there are no best or nonbest connected routes.
Note: If you use the static keyword for protocol, the description option is also available,
for example: show ip route ip-address static description. This command shows the
description configured with the specified static route(s).
Format show ip route [{ip-address [protocol] | {ip-address mask [longer-prefixes]
[protocol] | protocol} [all] | all}]
Modes Privileged EXEC
User EXEC
Term Definition
Route Codes The key for the routing protocol codes that might appear in the routing table output.
The show ip route command displays the routing tables in the following format:
Code IP-Address/Mask [Preference/Metric] via Next-Hop, Route-Timestamp, Interface,
Truncated
The columns for the routing table display the following information:
Term Definition
Code The codes for the routing protocols that created the routes.
Default Gateway The IP address of the default gateway. When the system does not have a more specific route to a
packets destination, it sends the packet to the default gateway.
IP-Address/Mask The IP-Address and mask of the destination network corresponding to this route.
Preference The administrative distance associated with this route. Routes with low values are preferred over
routes with higher values.
Metric The cost associated with this route.
via Next-Hop The outgoing router IP address to use when forwarding traffic to the next router (if any) in the path
toward the destination.
Route-Timestamp The last updated time for dynamic routes. The format of Route-Timestamp is:
Days:Hours:Minutes if days 1
Hours:Minutes:Seconds if days < 1
Interface The outgoing router interface to use when forwarding traffic to the next destination. For reject routes,
the next hop interface would be Null0 interface.
T This flag is appended to a route to indicate that it is an ECMP route, but only one of its next hops has
been installed in the forwarding table. The forwarding table may limit the number of ECMP routes or
the number of ECMP groups. When an ECMP route cannot be installed because such a limit is reached,
the route is installed with a single next hop. Such truncated routes are identified by a T after the
interface name.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip route
Route Codes: C - Connected, S - Static
Default gateway is 1.1.1.2
C 1.1.1.0/24 [0/1] directly connected, 0/11
C 2.2.2.0/24 [0/1] directly connected, 0/1
C 5.5.5.0/24 [0/1] directly connected, 0/5
S 7.0.0.0/8 [1/0] directly connected, Null0
OIA 10.10.10.0/24 [110/6] via 5.5.5.2, 00h:00m:01s, 0/5
C 11.11.11.0/24 [0/1] directly connected, 0/11
S 12.0.0.0/8 [5/0] directly connected, Null0
S 23.0.0.0/8 [3/0] directly connected, Null0
C 1.1.1.0/24 [0/1] directly connected, 0/11
C 2.2.2.0/24 [0/1] directly connected, 0/1
C 5.5.5.0/24 [0/1] directly connected, 0/5
C 11.11.11.0/24 [0/1] directly connected, 0/11
S 10.3.2.0/24 [1/0] via 1.1.1.2, 0/11
Example: The following shows example CLI display output for the command to indicate a truncated route.
(UBNT EdgeSwitch) #show ip route
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip route ecmp-groups
Term Definition
Connected Routes The total number of connected routes in the routing table.
Static Routes Total number of static routes in the routing table.
RIP Routes Total number of routes installed by RIP protocol.
BGP Routes Total number of routes installed by the BGP protocol.
External The number of external BGP routes.
Internal The number of internal BGP routes.
Local The number of local BGP routes.
Term Definition
OSPF Routes Total number of routes installed by OSPF protocol.
Intra Area Routes Total number of Intra Area routes installed by OSPF protocol.
Inter Area Routes Total number of Inter Area routes installed by OSPF protocol.
External Type-1 Routes Total number of External Type-1 routes installed by OSPF protocol.
External Type-2 Routes Total number of External Type-2 routes installed by OSPF protocol.
Reject Routes Total number of reject routes installed by all protocols.
Total Routes Total number of routes in the routing table.
Best Routes (High) The number of best routes currently in the routing table. This number only counts the best route to
each destination. The value in parentheses indicates the highest count of unique best routes since
counters were last cleared.
Alternate Routes The number of alternate routes currently in the routing table. An alternate route is a route that was not
selected as the best route to its destination.
Route Adds The number of routes that have been added to the routing table.
Route Modifies The number of routes that have been changed after they were initially added to the routing table.
Route Deletes The number of routes that have been deleted from the routing table.
Unresolved Route Adds The number of route adds that failed because none of the routes next hops were on a local subnet.
Note that static routes can fail to be added to the routing table at startup because the routing
interfaces are not yet up. This counter gets incremented in this case. The static routes are added to the
routing table when the routing interfaces come up.
Invalid Route Adds The number of routes that failed to be added to the routing table because the route was invalid. A log
message is written for each of these failures.
Failed Route Adds The number of routes that failed to be added to the routing table because of a resource limitation in
the routing table.
Reserved Locals The number of routing table entries reserved for a local subnet on a routing interface that is down.
Space for local routes is always reserved so that local routes can be installed when a routing interface
bounces.
Unique Next Hops (High) The number of distinct next hops used among all routes currently in the routing table. These include
local interfaces for local routes and neighbors for indirect routes. The value in parentheses indicates
the highest count of unique next hops since counters were last cleared.
Next Hop Groups (High) The current number of next hop groups in use by one or more routes. Each next hop group includes
one or more next hops. The value in parentheses indicates the highest count of next hop groups since
counters were last cleared.
ECMP Groups (High) The number of next hop groups with multiple next hops. The value in parentheses indicates the
highest count of next hop groups since counters were last cleared.
ECMP Routes The number of routes with multiple next hops currently in the routing table.
Truncated ECMP Routes The number of ECMP routes that are currently installed in the forwarding table with just one next hop.
The forwarding table may limit the number of ECMP routes or the number of ECMP groups. When
an ECMP route cannot be installed because such a limit is reached, the route is installed with a single
nexthop.
ECMP Retries The number of ECMP routes that have been installed in the forwarding table after initially being
installed with a single next hop.
Routes with n Next Hops The current number of routes with each number of next hops.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip route summary
Connected Routes............................... 7
Static Routes.................................. 1
RIP Routes..................................... 20
BGP Routes..................................... 10
External..................................... 0
Internal..................................... 10
Local........................................ 0
Term Definition
Local The local route preference value.
Static The static route preference value.
Configured Default Gateway The route preference value of the statically-configured default gateway
DHCP Default Gateway The route preference value of the default gateway learned from the DHCP server.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip route preferences
Local.......................................... 0
Static......................................... 1
Configured Default Gateway..................... 253
DHCP Default Gateway........................... 254
show ip stats
This command displays IP statistical information. Refer to RFC 1213 for more information about the fields that are
displayed.
Format show ip stats
Modes Privileged EXEC, User EXEC
Parameter Description
Heap Size The amount of memory, in bytes, allocated at startup for the routing heap.
Memory In Use The number of bytes currently allocated.
Memory on Free List The number of bytes currently on the free list. When a chunk of memory from the routing heap is
freed, it is placed on a free list for future reuse.
Memory Available in Heap The number of bytes in the original heap that have never been allocated.
In Use High Water Mark The maximum memory in use since the system last rebooted.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show routing heap summary
In order to disable policy based routing from an interface, use thenoform of this command:
no ip policy route-map-name
ip prefix-list
To create a prefix list or add a prefix list entry, use theip prefix-listcommand in Global Configuration
mode. Prefix lists allow matching of route prefixes with those specified in the prefix list. Each prefix list includes
a sequence of prefix list entries ordered by their sequence numbers. A router sequentially examines each prefix
list entry to determine if the routes prefix matches that of the entry. An empty or nonexistent prefix list permits
all prefixes. An implicit deny is assumed if a given prefix does not match any entries of a prefix list. Once a match
or deny occurs the router does not go through the rest of the list. A prefix list may be used within a route map to
match a routes prefix using thematch ip addresscommand ( "match ip address" on page 335).
Up to 128 prefix lists may be configured. The maximum number of statements allowed in the prefix list is 64.
Default No prefix lists are configured by default. When neither thegenor theleoption is configured, the destination
prefix must match the network/length exactly. If thegeoption is configured without theleoption, any prefix
with a network mask greater than or equal to thegevalue is considered a match. Similarly, if theleoption
is configured without thegeoption, a prefix with a network mask less than or equal to thelevalue is
considered a match.
Format ip prefix-list list-name {[seq number] {permit | deny} network/length
[ge length] [lelength] | renumber renumber-interval first-statement-number}
Mode Global Configuration
Parameter Description
list-name The text name of the prefix list. Up to 32 characters.
seq number (Optional) The sequence number for this prefix list statement. Prefix list statements are ordered by this
number (lowest to highest) and applied in that order. If no sequence number is specified, the system
automatically selects a sequence number five larger than the last sequence number in the list. Two
statements may not be assigned the same sequence number. The value ranges from 1 to 4,294,967,294.
permit Permit routes whose destination prefix matches the statement.
deny Deny routes whose destination prefix matches the statement.
network/length Specifies the match criteria for routes being compared to the prefix list statement. The network can be
any valid IP prefix. The length is any IPv4 prefix length from 0 to 32.
ge length (Optional) If this option is configured, then a prefix is only considered a match if its network mask
length is greater than or equal to this value. This value must be longer than the network length and
less than or equal to 32.
Parameter Description
le length (Optional) If this option is configured, then a prefix is only considered a match if its network mask length is
less than or equal to this value. This value must be longer than the ge length and less than or equal to 32.
renumber (Optional) Provides the option to renumber the sequence numbers of the IP prefix list
statements with a given interval starting from a particular sequence number. The valid range for
renumberinterval is 1100, and the valid range for first-statement-number is 11000.
Example: The following example configures a prefix list that allows routes with one of two specific destination
prefixes, 172.20.0.0/16 and 192.168.1.0/24:
(UBNT EdgeSwitch)(config)# ip prefix-list apple seq 10 permit 172.20.0.0/16
(UBNT EdgeSwitch)(config)# ip prefix-list apple seq 20 permit 192.168.10/24
no ip prefix-list
To delete a prefix list or a statement in a prefix list, use thenoform of this command. The commandnoip
prefix-list list-namedeletes the entire prefix list. To remove an individual statement from a prefix list,
you must specify the statement exactly, with all its options.
Format no ip prefix-list list-name [seq number] { permit | deny } network/length
[ge length] [le length]
Mode Global Configuration
ip prefix-list description
To apply a text description to a prefix list, use theip prefix-list descriptioncommand in Global
Configuration mode.
Default No description is configured by default.
Format ip prefix-list list-name description text
Mode Global Configuration
Parameter Description
list-name The text name of the prefix list.
description text Text description of the prefix list. Up to 80 characters.
no ip prefix-list description
To remove the text description, use thenoform of this command.
route-map
To create a route map and enter Route Map Configuration mode, use theroute-mapcommand in Global
Configuration mode. One use of a route map is to limit the redistribution of routes to a specified range of route
prefixes.
The redistribution command specifies a route map which refers to a prefix list. The prefix list identifies the
prefixes that may be redistributed. EdgeSwitch accepts up to 64 route maps.
Default No route maps are configured by default. If no permit or deny tag is given, permit is the default.
Format route-map map-tag [permit|deny] [sequence-number]
Mode Global Configuration
Parameter Description
map-tag Text name of the route map. Route maps with the same name are grouped together in order of their
sequence numbers. A route map name may be up to 32 characters long.
permit (Optional) Permit routes that match all of the match conditions in the route map.
deny (Optional) Deny routes that match all of the match conditions in the route map.
sequence-number (Optional) An integer used to order the set of route maps with the same name. Route maps are
ordered from lowest to greatest sequence number, with lower sequence numbers being considered
first. If no sequence number is specified, the system assigns a value ten greater than the last statement
in the route map. The range is 0 to 65,535.
no route-map
To delete a route map or one of its statements, use thenoform of this command.
Format no route-map map-tag [permit|deny] [sequence-number]
Mode Global Configuration
match ip address
To configure a route map to match based on a destination prefix, use thematch ip address command
in Route Map Configuration mode. If you specify multiple prefix lists in one statement, then a match occurs if a
prefix matches any one of the prefix lists. If you configure a match ip address statement within a route
map section that already has a match ip address statement, the new prefix lists are added to the existing
set of prefix lists, and a match occurs if any prefix list in the combined set matches the prefix.
Default No match criteria are defined by default.
Format match ip address prefix-list prefix-list-name [prefix-list-name...]
Mode Route Map Configuration
Parameter Description
prefix-list-name The name of a prefix list used to identify the set of matching routes. Up to eight prefix lists may be specified.
no match ip address
To delete a match statement from a route map, use thenoform of this command.
Format no match ip address [prefix-list prefix-list-name [prefix-list-name...]]
Mode Route Map Configuration
Parameter Description
access-list-number The number that identifies an access list configured through access list CLI configuration commands.
1to 99 for standard access list number. This number is 100 to 199 for extended access list number.
access-list-name The access-list name that identifies named IP ACLs. Access-list name can be up to 31 characters in
length. A maximum of 16 ACLs can be specified in this match clause.
Example: The following sequence shows an example of creating a route-map with the match clause on an ACL
number and applying that route-map on an interface, where:
Theip policy route-map equal-accesscommand is applied to interface 0/1. All packets coming
inside 0/1 are policy-routed.
Sequence number 10 in route mapequal-accessis used to match all packets sourced from any host in
subnet 10.1.0.0. If there is a match, and if the router has no explicit route for the packets destination, it is sent
to next-hop address 192.168.6.6.
Sequence number 20 in route mapequal-accessis used to match all packets sourced from any host in
subnet 10.2.0.0. If there is a match, and if the router has no explicit route for the packets destination, it is sent
to next-hop address 172.16.7.7.
All other packets are forwarded as per normal L3 destination-based routing.
(UBNT EdgeSwitch) (config)#access-list 1 permit ip 10.1.0.0 0.0.255.255
(UBNT EdgeSwitch) (config)#access-list 2 permit ip 10.2.0.0 0.0.255.255
(UBNT EdgeSwitch) (config)#route-map equal-access permit 10
(UBNT EdgeSwitch) (config-route-map)#match ip address 1
(UBNT EdgeSwitch) (config-route-map)#set ip default next-hop 192.168.6.6
(UBNT EdgeSwitch) (config-route-map)#route-map equal-access permit 20
(UBNT EdgeSwitch) (config-route-map)#match ip address 2
(UBNT EdgeSwitch) (config-route-map)#set ip default next-hop 172.16.7.7
(UBNT EdgeSwitch) (config)#interface 0/1
(UBNT EdgeSwitch) (Interface 0/1)#ip address 10.1.1.1 255.255.255.0
(UBNT EdgeSwitch) (Interface 0/1)#ip policy route-map equal-access
(UBNT EdgeSwitch) (config)#interface 0/2
(UBNT EdgeSwitch) (Interface 0/2)#ip address 192.168.6.5 255.255.255.0
(UBNT EdgeSwitch) (config)#interface 0/3
(UBNT EdgeSwitch) (Interface 0/3)#ip address 172.16.7.6 255.255.255.0
Example: This example illustrates the scenario where an IP ACL referenced by a route-map is removed or rules are
added or deleted from that ACL (this is how configuration is rejected):
(UBNT EdgeSwitch) #show ip access-lists
(UBNT EdgeSwitch) #
(UBNT EdgeSwitch) #configure
Request denied. Another application using this ACL restricts the number of rules allowed.
Request denied. Another application using this ACL restricts the number of rules allowed.
no match ip address
To delete a match statement from a route map, use thenoform of this command.
Format no match ip address [access-list-number | access-list-name]
Mode Route Map Configuration
match length
Use this command to configure a route map to match based on the Layer-3 packet length between specified
minimum and maximum values. Theminparameter specifies the packets minimum Layer-3 length, inclusive,
allowed for a match. Themaxparameter specifies the packets maximum Layer-3 length, inclusive, allowed for a
match. Each route-map statement can contain one match statement on packet length range.
Default No match criteria are defined by default.
Format match length min max
Mode Route Map Configuration
no match length
Use this command to delete a match statement from a route map.
Format no match length
Mode Route Map Configuration
match mac-list
Use this command to configure a route map in order to match based on the match criteria configured in a MAC
access-list.
A MAC ACL is configured before it is linked to a route-map. Actions present in MAC ACL configuration are
applied with other actions involved in route-map. When a MAC ACL referenced by a route-map is removed, the
routemap rule is also removed and the corresponding rule is not effective.
When a MAC ACL referenced by a route-map is removed or rules are added or deleted from that ACL, the
configuration is rejected.
Default No match criteria are defined by default.
Format match mac-list mac-list-name [mac-list-name]
Mode Route Map Configuration
Parameter Description
mac-list-name The mac-list name that identifies MAC ACLs. MAC Access-list name can be up to 31 characters in
length.
Example: This example illustrates the scenario where a MAC ACL referenced by a route-map is removed or rules
are added or deleted from that ACL (this is how configuration is rejected):
(UBNT EdgeSwitch) #show mac access-lists
(UBNT EdgeSwitch) #
(UBNT EdgeSwitch) #
(UBNT EdgeSwitch) #configure
Request denied. Another application using this ACL restricts the number of rules allowed.
no match mac-list
To delete a match statement from a route map, use thenoform of this command.
Format no match mac-list [...mac-list-name]
Mode Route Map Configuration
set interface
If the network administrator does not want to revert to normal forwarding but instead wants to drop a packet
that does not match the specified criteria, asetstatement needs to be configured to route the packets to
interfacenull0as the last entry in the route-map.
Configureset interface null0in a separate statement. It should not be added along with any other
statement having other match/set terms.
A route-map statement that is used for PBR is configured as permit or deny. If the statement is marked as deny,
traditional destination-based routing is performed on the packet meeting the match criteria. If the statement
is marked as permit, and if the packet meets all the match criteria, then set commands in the route-map
statement are applied. If no match is found in the route-map, the packet is not dropped; instead the packet is
forwarded using the routing decision taken by performing destination-based routing.
Format set interface null0
Mode Route Map Configuration
set ip next-hop
Use this command to specify the adjacent next-hop router in the path toward the destination to which the
packets should be forwarded. If more than one IP address is specified, the first IP address associated with a
currently up-connected interface is used to route the packets.
This command affects all incoming packet types and is always used if configured. If the configured next-hop is
not present in the routing table, an ARP request is sent from the router. In a route-map statement, the terms set
ip next-hop and set ip default next-hop are mutually exclusive; however, set ip default
next-hop can be configured in a separate route-map statement.
Format set ip next-hop ip-address [...ip-address]
Mode Route Map Configuration
Parameter Description
ip-address The IP address of the next hop to which packets are output. It must be the address of an adjacent
router. A maximum of 16 next-hop IP addresses can be specified in this set clause.
no set ip next-hop
Use this command to remove a set command from a route map.
Format no set ip next-hop ip-address [...ip-address]
Mode Route Map Configuration
Parameter Description
ip-address The IP address of the next hop to which packets are output. It must be the address of an adjacent
router. A maximum of 16 next-hop IP addresses can be specified in this set clause.
set ip precedence
Use this command to set the three IP precedence bits in the IP packet header. With three bits, you have eight
possible values for the IP precedence; values 0 through 7 are defined. This command is used when implementing
QoS and can be used by other QoS services, such as weighted fair queuing (WFQ) and weighted random early
detection (WRED).
Format set ip precedence 0-7
Mode Route Map Configuration
Parameter Description
0 Sets the routine precedence
1 Sets the priority precedence
2 Sets the immediate precedence
3 Sets the Flash precedence
4 Sets the Flash override precedence
5 Sets the critical precedence
6 Sets the internetwork control precedence
7 Sets the network control precedence
no set ip precedence
Use this command to reset the three IP precedence bits in the IP packet header to the default.
Format no set ip precedence
Mode Route Map Configuration
show ip policy
This command lists the route map associated with each interface.
Format show ip policy
Mode Privileged Exec
Term Definition
Interface The interface
Route-map The route map
show ip prefix-list
This command displays configuration and status for a prefix list.
Format show ip prefix-list [detail | summary] prefix-list-name [network/length]
[seq sequence-number] [longer] [first-match]
Mode Privileged EXEC
Parameter Description
detail | summary (Optional) Displays detailed or summarized information about all prefix lists.
prefix-list-name (Optional) The name of a specific prefix list.
network/length (Optional) The network number and length (in bits) of the network mask.
seq (Optional) Applies the sequence number to the prefix list entry.
sequence-number (Optional) The sequence number of the prefix list entry.
longer (Optional) Displays all entries of a prefix list that are more specific than the given network/length.
first-match (Optional) Displays the entry of a prefix list that matches the given network/length.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip prefix-list fred
ip prefix-list fred:
count: 3, range entries: 3, sequences: 5 - 15, refcount: 0
seq 5 permit 10.10.1.1/20 ge 22
seq 10 permit 10.10.1.2/20 le 30
seq 15 permit 10.10.1.2/20 ge 29 le 30
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip prefix-list summary fred
ip prefix-list fred:
count: 3, range entries: 3, sequences: 5 - 15, refcount: 0
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip prefix-list detail fred
ip prefix-list fred:
count: 3, range entries: 3, sequences: 5 - 15, refcount: 0
seq 5 permit 10.10.1.1/20 ge 22 (hitcount: 0)
seq 10 permit 10.10.1.2/20 le 30 (hitcount: 0)
seq 15 permit 10.10.1.2/20 ge 29 le 30 (hitcount: 0)
show route-map
To display a route map, use the show route-map command in Privileged EXEC mode.
Format show route-map [map-name]
Mode Privileged EXEC
Parameter Description
map-name (Optional) Name of a specific route map.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) # show route-map test
route-map test, permit, sequence 10
Match clauses:
ip address prefix-lists: orange
Set clauses:
set metric 50
clear ip prefix-list
To reset IP prefix-list counters, use the clear ip prefix-list command in Privileged EXEC mode. This
command is used to clear prefix-list hit counters. The hit count is a value indicating the number of matches to a
specific prefix list entry.
Format clear ip prefix-list [[prefix-list-name] [network/length]]
Mode Privileged EXEC
Parameter Description
prefix-list-name (Optional) Name of the prefix list from which the hit count is to be cleared.
network/length (Optional) Network number and length (in bits) of the network mask. If this option is specified, hit
counters are only cleared for the matching statement.
no ip irdp
This command disables router discovery on an interface.
Format no ip irdp
Mode Interface Config
ip irdp address
This command configures the address that the interface uses to send the router discovery advertisements. The
valid values for ipaddr are 224.0.0.1, which is the all-hosts IP multicast address, and 255.255.255.255, which is
the limited broadcast address.
Default 224.0.0.1
Format ip irdp address ipaddr
Mode Interface Config
no ip irdp address
This command sets the address used to advertise the router for the interface to the default.
Format no ip irdp address
Mode Interface Config
ip irdp holdtime
This command configures the value, in seconds, of the holdtime field of the router advertisement sent from
this interface. The holdtime range is 4 to 9000 seconds.
Default 3 * maxinterval
Format ip irdp holdtime 4-9000
Mode Interface Config
no ip irdp holdtime
This command sets the value, in seconds, of the holdtime field of the router advertisement sent from this
interface, to the default.
Format no ip irdp holdtime
Mode Interface Config
ip irdp maxadvertinterval
This command configures the maximum time, in seconds, allowed between sending router advertisements from
the interface. The range for maxadvertinterval is 4 to 1800 seconds.
Default 600
Format ip irdp maxadvertinterval 4-1800
Mode Interface Config
no ip irdp maxadvertinterval
This command sets the maximum time, in seconds to the default.
Format no ip irdp maxadvertinterval
Mode Interface Config
ip irdp minadvertinterval
This command configures the minimum time, in seconds, allowed between sending router advertisements from
the interface. The range for minadvertinterval is 31800 seconds.
Default 0.75 * maxadvertinterval
Format ip irdp minadvertinterval 3-1800
Mode Interface Config
no ip irdp minadvertinterval
This command sets the minadvertinterval to the default.
Format no ip irdp minadvertinterval
Mode Interface Config
ip irdp multicast
This command configures the destination IP address for router advertisements as 224.0.0.1, which is the
default address. Thenoform of the command configures the IP address as 255.255.255.255 to send router
advertisements to the limited broadcast address.
Format ip irdp multicast ip-address
Mode Interface Config
no ip irdp multicast
To send router advertisements to the limited broadcast address, 255.255.255.255, instead of the default IP
address of 224.0.0.1, use thenoform of this command.
Format no ip irdp multicast
Mode Interface Config
ip irdp preference
This command configures the preferability of the address as a default router address, relative to other router
addresses on the same subnet.
Default 0
Format ip irdp preference -2147483648 to 2147483647
Mode Interface Config
no ip irdp preference
This command sets the preferability of the address as a default router address, relative to other router addresses
on the same subnet, to the default.
Format no ip irdp preference
Mode Interface Config
show ip irdp
This command displays the router discovery information for all interfaces, a specified interface, or specified
VLAN. The argument slot/port corresponds to a physical routing interface or VLAN routing interface. The
keyword vlan is used to specify the VLAN ID of the routing VLAN directly instead of in a slot/port format.
Format show ip irdp {slot/port | vlan 1-4093 | all}
Modes Privileged EXEC
User EXEC
Parameter Definition
slot/port The slot/port that corresponds to a physical routing interface or vlan routing interface.
vlan Use this keyword to specify the VLAN ID of the routing VLAN directly instead of in a slot/port format.
Term Definition
Interface The slot/port that corresponds to a physical routing interface or vlan routing interface.
vlan Use this keyword to specify the VLAN ID of the routing VLAN directly instead of in a slot/port format.
Ad Mode The advertise mode, which indicates whether router discovery is enabled or disabled on this interface.
Dest Address The destination IP address for router advertisements.
Max Int The maximum advertise interval, which is the maximum time, in seconds, allowed between sending
router advertisements from the interface.
Min Int The minimum advertise interval, which is the minimum time, in seconds, allowed between sending
router advertisements from the interface.
Hold Time The amount of time, in seconds, that a system should keep the router advertisement before
discardingit.
Preference The preference of the address as a default router address, relative to other router addresses on the
same subnet.
no vlan routing
This command deletes routing on a VLAN.
Format no vlan routing vlanid
Mode VLAN Config
Example 1: This example shows the command specifying a vlanid value. The interface-ID argument
is notused.
(UBNT EdgeSwitch)(Vlan)#vlan 14
(UBNT EdgeSwitch)(Vlan)#vlan routing 14 ?
<cr> Press enter to execute the command.
<1-24> Enter interface ID
Typically, you press Enter without supplying the interface ID value; the system automatically selects the interface
ID.
Example 2: In this example, the command specifies interface ID 51 for the VLAN 14 interface. The interface ID
becomes the port number in the slot/port for the VLAN routing interface. In this example, the slot/port is 4/51 for
the VLAN 14 interface.
(UBNT EdgeSwitch)(Vlan)#vlan 14 51
(UBNT EdgeSwitch)(Vlan)#
(UBNT EdgeSwitch)#show ip vlan
MAC Address used by Routing VLANs: 00:11:88:59:47:36
Logical
VLAN ID Interface IP Address Subnet Mask
------- -------------- --------------- ---------------
10 4/1 172.16.10.1 255.255.255.0
11 4/50 172.16.11.1 255.255.255.0
12 4/3 172.16.12.1 255.255.255.0
13 4/4 172.16.13.1 255.255.255.0
14 4/51 0.0.0.0 0.0.0.0 < slot/port is 4/51 for VLAN 14 interface
Example 3: In this example, an interface ID that is already in use is selected. In this case, the CLI displays an error
message and does not create the VLAN interface.
(UBNT EdgeSwitch) #show ip vlan
Logical
VLAN ID Interface IP Address Subnet Mask
------- -------------- --------------- ---------------
10 4/1 172.16.10.1 255.255.255.0
11 4/50 172.16.11.1 255.255.255.0
12 4/3 172.16.12.1 255.255.255.0
13 4/4 172.16.13.1 255.255.255.0
14 4/51 0.0.0.0 0.0.0.0
(UBNT EdgeSwitch)#config
(UBNT EdgeSwitch)(Config)#exit
(UBNT EdgeSwitch)(Vlan)#vlan 15
Example 4: The show running configuration command always lists the interface ID for each routing
VLAN, as shown below.
(UBNT EdgeSwitch) #show running-config
!Current Configuration:
!
!System Description "EdgeSwitch 24-Port 500W, 0.8.0.4712594, Linux 3.6.5-f4a26ed5"
!System Software Version "0.8.0.4712594"
!System Up Time "1 days 4 hrs 22 mins 0 secs"
!Additional Packages QOS,IPv6 Management,Routing
!Current SNTP Synchronized Time: SNTP Last Attempt Status Is Not Successful
!
vlan database
exit
configure
no logging console
aaa authentication enable enableNetList none
line console
serial timeout 0
exit
line telnet
exit
line ssh
exit
!
router rip
exit
router ospf
exit
ipv6 router ospf
exit
exit
interface vlan
Use this command to enter interface configuration mode for the specified VLAN. The valid vlan-id range is
from 1 to 4093.
Format interface vlan vlan-id
Mode Global Config
show ip vlan
This command displays the VLAN routing information for all VLANs with routing enabled.
Format show ip vlan
Modes Privileged EXEC
User EXEC
Term Definition
MAC Address used by The MAC Address associated with the internal bridge-router interface (IBRI). The same MAC Address is
Routing VLANs used by all VLAN routing interfaces. It will be displayed above the per-VLAN information.
VLAN ID The identifier of the VLAN.
Logical Interface The logical slot/port associated with the VLAN routing interface.
IP Address The IP address associated with this VLAN.
Subnet Mask The subnet mask that is associated with this VLAN.
IP Helper Commands
This section describes the commands to configure and monitor the IP Helper agent. IP Helper relays DHCP and
other broadcast UDP packets from a local client to one or more servers which are not on the same network at
theclient.
The IP Helper feature provides a mechanism that allows a router to forward certain configured UDP broadcast
packets to a particular IP address. This allows various applications to reach servers on nonlocal subnets, even
if the application was designed to assume a server is always on a local subnet and uses broadcast packets
(with either the limited broadcast address 255.255.255.255, or a network directed broadcast address) to reach
theserver.
The network administrator can configure relay entries both globally and on routing interfaces. Each relay entry
maps an ingress interface and destination UDP port number to a single IPv4 address (the helper address). The
network administrator may configure multiple relay entries for the same interface and UDP port, in which case
the relay agent relays matching packets to each server address. Interface configuration takes priority over global
configuration. That is, if a packets destination UDP port matches any entry on the ingress interface, the packet
is handled according to the interface configuration. If the packet does not match any entry on the ingress
interface, the packet is handled according to the global IP helper configuration.
The network administrator can configure discard relay entries, which direct the system to discard matching
packets. Discard entries are used to discard packets received on a specific interface when those packets would
otherwise be relayed according to a global relay entry. Discard relay entries may be configured on interfaces, but
are not configured globally.
In addition to configuring the server addresses, the network administrator also configures which UDP ports are
forwarded. Certain UDP port numbers can be specified by name in the UI as a convenience, but the network
administrator can configure a relay entry with any UDP port number. The network administrator may configure
relay entries that do not specify a destination UDP port. The relay agent relays assumes these entries match
packets with the UDP destination ports listed in Table 12 on page 349. This is the list of default ports.
The system limits the number of relay entries to four times the maximum number of routing interfaces. The
network administrator can allocate the relay entries as he likes. There is no limit to the number of relay entries on
an individual interface, and no limit to the number of servers for a given {interface, UDP port} pair.
The relay agent relays DHCP packets in both directions. It relays broadcast packets from the client to one or more
DHCP servers, and relays to the client packets that the DHCP server unicasts back to the relay agent. For other
protocols, the relay agent only relays broadcast packets from the client to the server. Packets from the server
back to the client are assumed to be unicast directly to the client. Because there is no relay in the return direction
for protocols other than DHCP, the relay agent retains the source IP address from the original client packet. The
relay agent uses a local IP address as the source IP address of relayed DHCP client packets.
When a switch receives a broadcast UDP packet on a routing interface, the relay agent checks if the interface is
configured to relay the destination UDP port. If so, the relay agent unicasts the packet to the configured server
IP addresses. Otherwise, the relay agent checks if there is a global configuration for the destination UDP port. If
so, the relay agent unicasts the packet to the configured server IP addresses. Otherwise the packet is not relayed.
Note that if the packet matches a discard relay entry on the ingress interface, then the packet is not forwarded,
regardless of the global configuration.
The relay agent only relays packets that meet the following conditions:
The destination MAC address must be the all-ones broadcast address (FF:FF:FF:FF:FF:FF)
The destination IP address must be the limited broadcast address (255.255.255.255) or a directed broadcast
address for the receive interface.
The IP time-to-live (TTL) must be greater than 1.
The protocol field in the IP header must be UDP (17).
The destination UDP port must match a configured relay entry.
clear ip helper statistics
Use this command to reset to zero the statistics displayed in the show ip helper statistics
command.
Format clear ip helper statistics
Mode Privileged EXEC
Parameter Description
server-address The IPv4 unicast or directed broadcast address to which relayed UDP broadcast packets are sent. The
server address cannot be an IP address configured on any interface of the local router.
dest-udp-port A destination UDP port number from 0 to 65535.
port name The destination UDP port may be optionally specified by its name. Whether a port is specified by its
number or its name has no effect on behavior. The names recognized are as follows:
dhcp Port 67
domain Port 53
isakmp Port 500
mobile-ip Port 434
nameserver Port 42
netbios-dgm Port 138
netbios-ns Port 137
ntp Port 123
pim-auto-rp Port 496
rip Port 520
tacacs Port 49
tftp Port 69
time Port 37
Other ports must be specified by number.
Example: To relay DHCP packets received on any interface to two DHCP servers, 10.1.1.1 and 10.1.2.1, use the
following commands:
(UBNT EdgeSwitch)#config
(UBNT EdgeSwitch)(config)#ip helper-address 10.1.1.1 dhcp
(UBNT EdgeSwitch)(config)#ip helper-address 10.1.2.1 dhcp
Example: To relay UDP packets received on any interface for all default ports to the server at 20.1.1.1, use the
following commands:
(UBNT EdgeSwitch)#config
(UBNT EdgeSwitch)(config)#ip helper-address 20.1.1.1
Parameter Description
server-address The IPv4 unicast or directed broadcast address to which relayed UDP broadcast packets are sent. The
server address cannot be in a subnet on the interface where the relay entry is configured, and cannot
be an IP address configured on any interface of the local router.
discard Matching packets should be discarded rather than relayed, even if a global ip helper-address
configuration matches the packet.
dest-udp-port A destination UDP port number from 0 to 65535.
port name The destination UDP port may be optionally specified by its name. Whether a port is specified by its
number or its name has no effect on behavior. The names recognized are as follows:
dhcp Port 67
domain Port 53
isakmp Port 500
mobile-ip Port 434
nameserver Port 42
netbios-dgm Port 138
netbios-ns Port 137
ntp Port 123
pim-auto-rp Port 496
rip Port 520
tacacs Port 49
tftp Port 69
time Port 37
Other ports must be specified by number.
Example: To relay DHCP packets received on interface 0/2 to two DHCP servers, 192.168.10.1 and 192.168.20.1,
use the following commands:
(UBNT EdgeSwitch)#config
(UBNT EdgeSwitch)(config)#interface 0/2
(UBNT EdgeSwitch)(interface 0/2)#ip helper-address 192.168.10.1 dhcp
(UBNT EdgeSwitch)(interface 0/2)#ip helper-address 192.168.20.1 dhcp
Example: To relay both DHCP and DNS packets to 192.168.30.1, use the following commands:
(UBNT EdgeSwitch)#config
(UBNT EdgeSwitch)(config)#interface 0/2
(UBNT EdgeSwitch)(interface 0/2)#ip helper-address 192.168.30.1 dhcp
(UBNT EdgeSwitch)(interface 0/2)#ip helper-address 192.168.30.1 dns
Example: This command takes precedence over an ip helper-address command given in global
configuration mode. With the following configuration, the relay agent relays DHCP packets received on any
interface other than 0/2 and 0/17 to 192.168.40.1, relays DHCP and DNS packets received on 0/2 to 192.168.40.2,
relays SNMP traps (port 162) received on interface 0/17 to 192.168.23.1, and drops DHCP packets received
on0/17:
(UBNT EdgeSwitch)#config
(UBNT EdgeSwitch)(config)#ip helper-address 192.168.40.1 dhcp
(UBNT EdgeSwitch)(config)#interface 0/2
(UBNT EdgeSwitch)(interface 0/2)#ip helper-address 192.168.40.2 dhcp
(UBNT EdgeSwitch)(interface 0/2)#ip helper-address 192.168.40.2 domain
(UBNT EdgeSwitch)(interface 0/2)#exit
(UBNT EdgeSwitch)(config)#interface 0/17
(UBNT EdgeSwitch)(interface 0/17)#ip helper-address 192.168.23.1 162
(UBNT EdgeSwitch)(interface 0/17)#ip helper-address discard dhcp
ip helper enable
Use this command to enable relay of UDP packets. This command can be used to temporarily disable IP helper
without deleting all IP helper addresses. This command replaces the bootpdhcprelay enable command,
but affects not only relay of DHCP packets, but also relay of any other protocols for which an IP helper address
has been configured.
Default disabled
Format ip helper enable
Mode Global Config
no ip helper enable
Use thenoform of this command to disable relay of all UDP packets.
Format no ip helper enable
Mode Global Config
show ip helper-address
Use this command to display the IP helper address configuration. The argument slot/port corresponds to
a physical routing interface or VLAN routing interface. The keyword vlan is used to specify the VLAN ID of the
routing VLAN directly instead of a slot/port format.
Format show ip helper-address [{slot/port|vlan 1-4093}]
Mode Privileged EXEC
Term Description
Interface The relay configuration is applied to packets that arrive on this interface. This field is set to any for
global IP helper entries.
UDP Port The relay configuration is applied to packets whose destination UDP port is this port. Entries whose
UDP port is identified as any are applied to packets with the destination UDP ports listed in Table 4.
Discard If Yes, packets arriving on the given interface with the given destination UDP port are discarded rather
than relayed. Discard entries are used to override global IP helper address entries which otherwise
might apply to a packet.
Hit Count The number of times the IP helper entry has been used to relay or discard a packet.
Server Address The IPv4 address of the server to which packets are relayed.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip helper-address
IP helper is enabled
Term Description
DHCP client messages The number of valid messages received from a DHCP client. The count is only incremented if IP helper
received is enabled globally, the ingress routing interface is up, and the packet passes a number of validity
checks, such as having a TTL>1 and having valid source and destination IP addresses.
DHCP client messages The number of DHCP client messages relayed to a server. If a message is relayed to multiple servers,
relayed the count is incremented once for each server.
DHCP server messages The number of DHCP responses received from the DHCP server. This count only includes messages
received that the DHCP server unicasts to the relay agent for relay to the client.
DHCP server messages The number of DHCP server messages relayed to a client.
relayed
UDP clients messages The number of valid UDP packets received. This count includes DHCP messages and all other protocols
received relayed. Conditions are similar to those for the first statistic in this table.
UDP clients messages The number of UDP packets relayed. This count includes DHCP messages relayed as well as all other
relayed protocols. The count is incremented for each server to which a packet is sent.
DHCP message hop count The number of DHCP client messages received whose hop count is larger than the maximum allowed.
exceeded max The maximum hop count is a configurable value listed in show bootpdhcprelay. A log message is
written for each such failure. The DHCP relay agent does not relay these packets.
Term Description
DHCP message with secs The number of DHCP client messages received whose secs field is less than the minimum value. The
field below min minimum secs value is a configurable value and is displayed in show bootpdhcprelay. A log message is
written for each such failure. The DHCP relay agent does not relay these packets.
DHCP message with giaddr The number of DHCP client messages received whose gateway address, giaddr, is already set to an
set to local address IP address configured on one of the relay agents own IP addresses. In this case, another device is
attempting to spoof the relay agents address. The relay agent does not relay such packets. A log
message gives details for each occurrence.
Packets with expired TTL The number of packets received with TTL of 0 or 1 that might otherwise have been relayed.
Packets that matched a The number of packets ignored by the relay agent because they match a discard relay entry.
discard entry
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)#show ip helper statistics
no ip unreachables
Use this command to prevent the generation of ICMP Destination Unreachable messages.
Format no ip unreachables
Mode Interface Config
ip redirects
Use this command to enable the generation of ICMP Redirect messages by the router. By default, the generation
of ICMP Redirect messages is enabled. You can use this command to configure an interface, a range of interfaces,
or all interfaces.
Default enable
Format ip redirects
Mode Global Config
Interface Config
no ip redirects
Use this command to prevent the generation of ICMP Redirect messages by the router.
Format no ip redirects
Mode Global Config
Interface Config
ip icmp echo-reply
Use this command to enable the generation of ICMP Echo Reply messages by the router. By default, the
generation of ICMP Echo Reply messages is enabled.
Default enable
Format ip icmp echo-reply
Mode Global Config
no ip icmp echo-reply
Use this command to prevent the generation of ICMP Echo Reply messages by the router.
Format no ip icmp echo-reply
Mode Global Config
ip icmp error-interval
Use this command to limit the rate at which IPv4 ICMP error messages are sent. The rate limit is configured as a
token bucket, with two configurable parameters, burst-size and burst-interval.
The burst-interval specifies how often the token bucket is initialized with burst-size tokens.
The burst-interval is from 0 to 2147483647 milliseconds (msec). The burst-size is the number of
ICMP error messages that can be sent during one burst-interval. The range is from 1 to 200 messages. To
disable ICMP rate limiting, set burst-interval to zero (0).
Default burst-interval of 1000 msec
burst-size of 100 messages
Format ip icmp error-interval burst-interval [burst-size]
Mode Global Config
no ip icmp error-interval
Use the no form of the command to return burst-interval and burst-size to their default values.
Format no ip icmp error-interval
Mode Global Config
Note: The commands in this chapter are in one of three functional groups:
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration
command, there is a show command that displays the configuration setting.
Clear commands clear some or all of the settings to factory defaults.
Parameter Description
address IPv6 prefix in IPv6 global address format.
prefix-length IPv6 prefix length value.
eui64 Formulate IPv6 address in eui64 format.
autoconfig Configure stateless global address autoconfiguration capability.
dhcp Configure dhcpv6 client protocol.
Parameter Description
gateway-address Gateway address in IPv6 global or link-local address format.
Parameter Description
ipv6-address The IPv6 address of the neighbor or interface.
macaddr The link-layer address.
Term Description
IPv6 Address The IPv6 address of the neighbor.
MAC Address The MAC Address of the neighbor.
isRtr Shows if the neighbor is a router. If TRUE, the neighbor is a router; if FALSE, it is not a router.
Neighbor State The state of the neighbor cache entry. Possible values are: Incomplete, Reachable, Stale, Delay, Probe,
and Unknown.
Age The time in seconds that has elapsed since an entry was added to the cache.
Last Updated The time in seconds that has elapsed since an entry was added to the cache.
Type The type of neighbor entry: Static if the entry is manually configured, Dynamic if dynamically resolved.
Neighbor Age
IPv6 Address MAC Address isRtr State (Secs) Type
------------------------ ----------------- ----- --------- ------------
FE80::5E26:AFF:FEBD:852C 5c:26:0a:bd:85:2c FALSE Reachable 0 Static
ping ipv6
Use this command to determine whether another computer is on the network. Ping provides a synchronous
response when initiated from the CLI and browser-based UI interfaces. To use the command, configure the
switch for network (in-band) connection. The source and target devices must have the ping utility enabled and
running on top of TCP/IP. The switch can be pinged from any IP workstation with which the switch is connected
through the default VLAN (VLAN 1), as long as there is a physical path between the switch and the workstation.
The terminal interface sends three pings to the target station. Use the ipv6-global-address|hostname
parameter to ping an interface by using the global IPv6 address of the interface. The argument slot/port
corresponds to a physical routing interface or VLAN routing interface. The keyword vlan is used to specify the
VLAN ID of the routing VLAN directly instead of a slot/port format. Use the optional size keyword to specify
the size of the ping packet.
You can utilize the ping or traceroute facilities over the service/network ports when using an IPv6 global address
ipv6-global-address|hostname. Any IPv6 global address or gateway assignments to these interfaces
will cause IPv6 routes to be installed within the IP stack such that the ping or traceroute request is routed out the
service/network port properly. When referencing an IPv6 link-local address, you must also specify the service or
network port interface by using the network parameter.
Default count: 1
interval: 3 seconds
size: 0 bytes
Format ping ipv6 {ipv6-global-address|hostname | {interface {slot/port | vlan 1-4093 |
network} link-local-address} [size datagram-size]}
Mode Privileged EXEC
User Exec
Parameter Description
interface Use the interface keyword to ping an interface by using the link-local address or the global IPv6
address of the interface.
size Use the optional size keyword to specify the size of the ping packet.
ipv6-address The link local IPv6 address of the device you want to query.
Note: Commands you issue in the Interface Config mode only affect a single interface. Commands you
issue in the Global Config mode affect all interfaces.
classofservice dot1p-mapping
This command maps an 802.1p priority to an internal traffic class. The userpriority values can range from
0-7. The trafficclass values range from 0 to 6, although the actual number of available traffic classes
depends on the platform.
Format classofservice dot1p-mapping userpriority trafficclass
Modes Global Config, Interface Config
no classofservice dot1p-mapping
This command maps each 802.1p priority to its default internal traffic class value.
Format no classofservice dot1p-mapping
Modes Global Config, Interface Config
classofservice ip-dscp-mapping
This command maps an IP DSCP value to an internal traffic class. The ipdscp value is specified as either an
iinteger from 0 to 63, or symbolically using one of the following keywords: af11, af12, af13, af21, af22,
af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef.
The trafficclass values can range from 0-6, although the actual number of available traffic classes
depends on the platform.
Format classofservice ip-dscp-mapping ipdscp trafficclass
Mode Global Config
no classofservice ip-dscp-mapping
This command maps each IP DSCP value to its default internal traffic class value.
Format no classofservice ip-dscp-mapping
Mode Global Config
classofservice ip-precedence-mapping
This command maps an IP Precedence value to an internal traffic class for a specific interface. The optional 0-7
parameter (IP precedence value) is only valid on platforms that support independent per-port class of service
mappings.
Format classofservice ip-precedence-mapping [0-7]
Mode Global Config
no classofservice ip-precedence-mapping
This command returns the mapping to its default value.
Format no classofservice ip-dscp-mapping
Mode Global Config
classofservice trust
This command sets the class of service trust mode of an interface or range of interfaces. You can set the mode
to trust the Dot1p (802.1p) or IP DSCP packet markings. You can also set the interface mode to untrusted. If you
configure an interface to use Dot1p, the mode does not appear in the output of the show running-config
command because Dot1p is the default.
Default dot1p
Format classofservice trust {dot1p | ip-dscp | untrusted}
Modes Global Config, Interface Config
no classofservice trust
This command sets the interface mode to the default value (Dot1p).
Format no classofservice trust
Modes Global Config, Interface Config
cos-queue max-bandwidth
This command specifies the maximum transmission bandwidth guarantee for each interface queue on an
interface, a range of interfaces, or all interfaces. The total number of queues supported per interface is platform
specific. A value from 0-100 (percentage of link rate) must be specified for each supported queue, with 0
indicating no maximum bandwidth. The sum of all values entered must not exceed 100.
Format cos-queue max-bandwidth bw-0 bw-1...bw-n
Modes Global Config, Interface Config
no cos-queue max-bandwidth
This command restores the default for each queues minimum bandwidth value.
Format no cos-queue min-bandwidth
Modes Global Config, Interface Config
cos-queue min-bandwidth
This command specifies the minimum transmission bandwidth guarantee for each interface queue on an
interface, a range of interfaces, or all interfaces. The total number of queues, n, supported per interface is
platform specific. A value from 0-100 (percentage of link rate) must be specified for each supported queue, with
0 indicating no guaranteed minimum bandwidth. The sum of all values entered must not exceed 100.
Format cos-queue min-bandwidth bw-0 bw-1...bw-n
Modes Global Config, Interface Config
no cos-queue min-bandwidth
This command restores the default for each queues minimum bandwidth value.
Format no cos-queue min-bandwidth
Modes Global Config, Interface Config
cos-queue random-detect
This command activates weighted random early discard (WRED) for each specified queue on the interface.
Specific WRED parameters are configured using the random-detect queue-parms and the
randomdetect exponentialweighting-constant commands.
Format cos-queue random-detect queue-id-1 [queue-id-2...queue-id-n]
Modes Global Config, Interface Config
When specified in Interface Config mode, this command affects a single interface only, whereas in Global Config
mode, it applies to all interfaces.
At least one, but no more than n, queue ID values are specified with this command. Duplicate queue ID values
are ignored. Each queue ID value ranges from 0 to (n1), where n is the total number of queues supported per
interface. The number n is platform dependent and corresponds to the number of supported queues (traffic
classes).
no cos-queue random-detect
Use this command to disable WRED, thereby restoring the default tail drop operation for the specified queues on
the interface.
Format no cos-queue random-detect queue-id-1 [queue-id-2...queue-id-n]
Modes Global Config, Interface Config
cos-queue strict
This command activates the strict priority scheduler mode for each specified queue for an interface queue on an
interface, a range of interfaces, or all interfaces.
Format cos-queue strict queue-id-1 [queue-id-2...queue-id-n]
Modes Global Config, Interface Config
no cos-queue strict
This command restores the default weighted scheduler mode for each specified queue.
Format no cos-queue strict queue-id-1 [queue-id-2...queue-id-n]
Modes Global Config, Interface Config
random-detect
This command is used to enable WRED for the interface as a whole, and is only available when per-queue
WRED activation control is not supported by the device Specific WRED parameters are configured using the
random-detect queue-parms and the random-detect exponential-weighting-constant
commands.
Format random-detect
Modes Global Config, Interface Config
When specified in Interface Config mode, this command affects a single interface only, whereas in Global Config
mode, it applies to all interfaces. The Interface Config mode command is only available on platforms that support
independent per-port class of service queue configuration.
no random-detect
Use this command to disable WRED, thereby restoring the default tail drop operation for all queues on the
interface.
Format no random-detect
Modes Global Config, Interface Config
random-detect queue-parms
This command is used to configure WRED parameters for each drop precedence level supported by a queue.
It is used only when per-COS queue configuration is enabled (using the cos-queue random-detect
command).
Format random-detect queue-parms queue-id-1 [queue-id-2...queue-id-n] min-thresh
thresh-prec-1...thresh-prec-n max-thresh thresh-prec-1...thresh-prec-n
drop-probability prob-prec-1...prob-prec-n
Modes Global Config, Interface Config
Each parameter is specified for each possible drop precedence (color of TCP traffic). The last precedence applies
to all non-TCP traffic. For example, in a 3-color system, four of each parameter specified: green TCP, yellow TCP,
red TCP, and non-TCP, respectively.
Parameter Definition
min-thresh Minimum threshold - Queue depth (as a percentage) where WRED starts marking and dropping traffic.
max-thresh Maximum threshold - Queue depth (as a percentage) above which WRED marks/drops all traffic.
drop-probability The percentage probability that WRED will mark/drop a packet, when the queue depth is at the
maximum threshold. (The drop probability increases linearly from 0 just before the minimum
threshold, to this value at the maximum threshold, then goes to 100% for larger queue depths).
no random-detect queue-parms
Use this command to set the WRED configuration back to the default.
Format no random-detect queue-parms queue-id-1 [queue-id-2...queue-id-n]
Modes Global Config, Interface Config
traffic-shape
This command specifies the maximum transmission bandwidth limit for the interface as a whole. The bandwidth
values are from 0-100 in increments of 1. You can also specify this value for a range of interfaces or all interfaces.
Also known as rate shaping, traffic shaping has the effect of smoothing temporary traffic bursts over time so that
the transmitted traffic rate is bounded.
Format traffic-shape bw
Modes Global Config, Interface Config
no traffic-shape
This command restores the interface shaping rate to the default value.
Format no traffic-shape
Modes Global Config, Interface Config
Term Definition
IP Precedence The IP Precedence value.
Traffic Class The traffic class internal queue identifier to which the IP Precedence value is mapped.
Term Definition
Class of Service Trust Mode The the trust mode, which is either Dot1P, IP DSCP, or Untrusted.
Non-IP Traffic Class (IP DSCP mode only) The traffic class used for non-IP traffic.
Untrusted Traffic Class (Untrusted mode only) The traffic class used for all untrusted traffic.
Term Definition
Interface Shaping Rate The global interface shaping rate value.
WRED Decay Exponent The global WRED decay exponent value.
Queue Id An interface supports n queues numbered 0 to (n-1). The specific n value is platform-dependent.
Minimum Bandwidth The minimum transmission bandwidth guarantee for the queue, expressed as a percentage.
Avalue of 0 means bandwidth is not guaranteed and the queue operates using best-effort. This is a
configuredvalue.
Maximum Bandwidth The maximum transmission bandwidth guarantee for the queue, expressed as a percentage.
Avalue of 0 means bandwidth is not guaranteed and the queue operates using best-effort. This is a
configuredvalue.
Scheduler Type Indicates whether this queue is scheduled for transmission using a strict priority or a weighted
scheme. This is a configured value.
Queue Management Type The queue depth management technique used for this queue (tail drop).
If you specify the interface, the command also displays the following information.
Term Definition
Interface The slot/port of the interface. If displaying the global configuration, this output line is replaced with a
Global Config indication.
Interface Shaping Rate The maximum transmission bandwidth limit for the interface as a whole. It is independent of any per-
queue maximum bandwidth value(s) in effect for the interface. This is a configured value.
WRED Decay Exponent The configured WRED decay exponent for a CoS queue interface.
Term Definition
Queue ID An interface supports n queues numbered 0 to (n-1). The specific n value is platform dependent.
WRED Minimum Threshold The configured minimum threshold the queue depth (as a percentage) where WRED starts marking
and dropping traffic.
WRED Maximum Threshold The configured maximum threshold is the queue depth (as a percentage) above which WRED marks /
drops all traffic.
WRED Drop Probability The configured percentage probability that WRED will mark/drop a packet, when the queue depth is
at the maximum threshold. (The drop probability increases linearly from 0 just before the minimum
threshold, to this value at the maximum threshold, then goes to 100% for larger queue depths).
Note: The mark possibilities for policing include CoS, IP DSCP, and IP Precedence. While the latter two
are only meaningful for IP packet types, CoS marking is allowed for both IP and non-IP packets, since it
updates the 802.1p user priority field contained in the VLAN tag of the Layer-2 packet header.
diffserv
This command sets the DiffServ operational mode to active. While disabled, the DiffServ configuration is retained
and can be changed, but it is not activated. When enabled, DiffServ services are activated.
Format diffserv
Mode Global Config
no diffserv
This command sets the DiffServ operational mode to inactive. While disabled, the DiffServ configuration is
retained and can be changed, but it is not activated. When enabled, DiffServ services are activated.
Format no diffserv
Mode Global Config
Note: Once you create a class match criterion for a class, you cannot change or delete the criterion. To
change or delete a class match criterion, you must delete and re-create the entire class.
The class type of match-all indicates all of the individual match conditions must be true for a packet to be
considered a member of the class.This command may be used without specifying a class type to enter the Class-
Map Config mode for an existing DiffServ class.
Note: The CLI mode is changed to Class-Map Config when this command is successfully executed
depending on the keyword specified.
no class-map
This command eliminates an existing DiffServ class. The class-map-name is the name of an existing DiffServ
class. (The class name default is reserved and is not allowed here.) This command may be issued at any time;
if the class is currently referenced by one or more policies or by any other class, the delete action fails.
Format no class-map class-map-name
Mode Global Config
class-map rename
This command changes the name of a DiffServ class. The class-map-name is the name of an existing
DiffServ class. The new-class-map-name parameter is a case-sensitive alphanumeric string from 1 to 31
characters uniquely identifying the class.
Default none
Format class-map rename class-map-name new-class-map-name
Mode Global Config
match ethertype
This command adds to the specified class definition a match condition based on the value of the ethertype. The
ethertype value is specified as one of the following keywords: appletalk, arp, ibmsna, ipv4, ipv6,
ipx, mplsmcast, mplsucast, netbios, novell, pppoe, rarp; or as a custom EtherType value in
the range of 0x0600-0xFFFF. Use the not option to negate the match condition.
Format match [not] ethertype {keyword | custom 0x0600-0xFFFF}
Mode Class-Map Config
match any
This command adds to the specified class definition a match condition whereby all packets are considered to
belong to the class. Use the not option to negate the match condition.
Default none
Format match [not] any
Mode Class-Map Config
match class-map
This command adds to the specified class definition the set of match conditions defined for another class. The
refclassname is the name of an existing DiffServ class whose match conditions are being referenced by the
specified class definition.
Default none
Format match class-map refclassname
Mode Class-Map Config
Note:
The parameters refclassname and class-map-name cannot be the same.
Only one other class may be referenced by a class.
Any attempt to delete the refclassname class while the class is still referenced by any
classmap-name fails.
The combined match criteria of class-map-name and refclassname must be an allowed
combination based on the class type.
Any subsequent changes to the refclassname class match criteria must maintain this validity, or
the change attempt fails.
The total number of class rules formed by the complete reference class chain (including both
predecessor and successor classes) must not exceed a platform-specific maximum. In some cases, each
removal of a refclass rule reduces the maximum number of available rules in the class definition by one.
no match class-map
This command removes from the specified class definition the set of match conditions defined for another class.
The refclassname is the name of an existing DiffServ class whose match conditions are being referenced by
the specified class definition.
Format no match class-map refclassname
Mode Class-Map Config
match cos
This command adds to the specified class definition a match condition for the Class of Service value (the only
tag in a single tagged packet or the first or outer 802.1Q tag of a double VLAN tagged packet). The value may be
from 0 to 7. Use the not option to negate the match condition.
Default none
Format match [not] cos 0-7
Mode Class-Map Config
match secondary-cos
This command adds to the specified class definition a match condition for the secondary Class of Service value
(the inner 802.1Q tag of a double VLAN tagged packet). The value may be from 0 to 7. Use the not option to
negate the match condition.
Default none
Format match [not] secondary-cos 0-7
Mode Class-Map Config, Ipv6-Class-Map Config
match dstip
This command adds to the specified class definition a match condition based on the destination IP address of
a packet. The ipaddr parameter specifies an IP address. The ipmask parameter specifies an IP address bit
mask and must consist of a contiguous set of leading 1 bits. Use the not option to negate the match condition.
Default none
Format match [not] dstip ipaddr ipmask
Mode Class-Map Config
match dstl4port
This command adds to the specified class definition a match condition based on the destination Layer-4 port of a
packet using a single keyword or numeric notation. To specify the match condition as a single keyword, the value
for portkey is one of the supported port name keywords. The currently supported portkey values are:
domain, echo, ftp, ftpdata, http, smtp, snmp, telnet, tftp, www. Each of these translates into
its equivalent port number. To specify the match condition using a numeric notation, one Layer-4 port number is
required. The port number is an integer from 0 to 65535. Use the not option to negate the match condition.
Default none
Format match [not] dstl4port {portkey | 0-65535}
Mode Class-Map Config
match ip dscp
This command adds to the specified class definition a match condition based on the value of the IP DiffServ
Code Point (DSCP) field in a packet, which is defined as the high-order six bits of the Service Type octet in the IP
header (the low-order two bits are not checked).
The dscpval value is specified as either an integer from 0 to 63, or symbolically through one of the following
keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be,
cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef. Use the not option to negate the match condition.
Note: The IP DSCP, IP Precedence, and IP ToS match conditions are alternative ways to specify a match
criterion for the same Service Type field in the IP header, but with a slightly different user notation.
Default none
Format match [not] ip dscp dscpval
Mode Class-Map Config
match ip precedence
This command adds to the specified class definition a match condition based on the value of the IP Precedence
field in a packet, which is defined as the high-order three bits of the Service Type octet in the IP header (the low-
order five bits are not checked). The precedence value is an integer from 0 to 7. Use the not option to negate
the match condition.
Note: The IP DSCP, IP Precedence, and IP ToS match conditions are alternative ways to specify a match
criterion for the same Service Type field in the IP header, but with a slightly different user notation.
Default none
Format match [not] ip precedence 0-7
Mode Class-Map Config
match ip tos
This command adds to the specified class definition a match condition based on the value of the IP TOS field in
a packet, which is defined as all eight bits of the Service Type octet in the IP header. The value of tosbits is a
2-digit hexadecimal number from 00-ff. The value of tosmask is a two-digit hexadecimal number from 00-ff.
The tosmask denotes the bit positions in tosbits that are used for comparison against the IP TOS field
in a packet. For example, to check for an IP TOS value having bits 7 and 5 set and bit 1 clear, where bit 7 is most
significant, use a tosbits value of a0 (hex) and a tosmask of a2 (hex). Use the not option to negate the
match condition.
Note: The IP DSCP, IP Precedence, and IP ToS match conditions are alternative ways to specify a match
criterion for the same Service Type field in the IP header, but with a slightly different user notation.
Note: This free form version of the IP DSCP/Precedence/TOS match specification gives the user complete
control when specifying which bits of the IP Service Type field are checked.
Default none
Format match [not] ip tos tosbits tosmask
Mode Class-Map Config
match protocol
This command adds to the specified class definition a match condition based on the value of the IP Protocol field
in a packet using a single keyword notation or a numeric value notation.
To specify the match condition using a single keyword notation, the value for protocol-name is one of
the supported protocol name keywords. The currently supported values are: icmp, igmp, ip, tcp, udp.
Avalue of ip matches all protocol number values.
To specify the match condition using a numeric value notation, the protocol number is a standard value assigned
by IANA and is interpreted as an integer from 0 to 255. Use the not option to negate the match condition.
Note: This command does not validate the protocol number value against the current list defined by IANA.
Default none
Format match [not] protocol {protocol-name | 0-255}
Mode Class-Map Config, Ipv6-Class-Map Config
match signature
This command maps the available signatures from the rules file to the AppIQ class. When the appiq class is
created, this menu displays an index number and its signature pattern. A single signature can be mapped using
a number or multiple signatures can be selected and mapped to a class. Using this command without an index
value maps all the available signatures to the same class.
Default none
Format match signature [StartIndex-EndIndex]
Mode Class-Map Config
match srcip
This command adds to the specified class definition a match condition based on the source IP address of a
packet. The ipaddr parameter specifies an IP address. The ipmask parameter specifies an IP address bit
mask and must consist of a contiguous set of leading 1 bits. Use the not option to negate the match condition.
Default none
Format match [not] srcip ipaddr ipmask
Mode Class-Map Config
match srcl4port
This command adds to the specified class definition a match condition based on the source Layer-4 port of a
packet using a single keyword or numeric notation. To specify the match condition as a single keyword notation,
the value for portkey is one of the supported port name keywords: domain, echo, ftp, ftpdata,
http, smtp, snmp, telnet, tftp, www. Each of these translates into its equivalent port number, which is
used as both the start and end of a port range.
To specify the match condition as a numeric value, one Layer-4 port number is required. The port number is an
integer from 0 to 65535. Use the not option to negate the match condition.
Default none
Format match [not] srcl4port {portkey | 0-65535}
Mode Class-Map Config
match vlan
This command adds to the specified class definition a match condition based on the value of the Layer-2 VLAN
Identifier field (the only tag in a single tagged packet or the first or outer tag of a double VLAN tagged packet).
The VLAN ID is an integer from 0-4093. Use the not option to negate the match condition.
Default none
Format match [not] vlan 0-4093
Mode Class-Map Config
match secondary-vlan
This command adds to the specified class definition a match condition based on the value of the Layer-2
secondary VLAN Identifier field (the inner 802.1Q tag of a double VLAN-tagged packet). The secondary VLAN ID is
an integer from 0-4093. Use the not option to negate the match condition.
Default none
Format match [not] secondary-vlan 0-4093
Mode Class-Map Config
Note: The only way to remove an individual policy attribute from a class instance within a policy is
to remove the class instance and re-add it to the policy. The values associated with an existing policy
attribute can be changed without removing the class instance.
drop
This command specifies that all packets for the associated traffic stream are to be dropped at ingress.
Format drop
Mode Policy-Class-Map Config
Incompatibilities Assign Queue, Mark (all forms), Mirror, Police, Redirect
mirror
This command specifies that all incoming packets for the associated traffic stream are copied to a specific egress
interface (physical port or LAG).
Format mirror slot/port
Mode Policy-Class-Map Config
Incompatibilities Drop, Redirect
redirect
This command specifies that all incoming packets for the associated traffic stream are redirected to a specific
egress interface (physical port or port-channel).
Format redirect slot/port
Mode Policy-Class-Map Config
Incompatibilities Drop, Mirror
conform-color
Use this command to enable color-aware traffic policing and define the conform-color class map. Used in
conjunction with the police command where the fields for the conform level are specified. The parameter
class-map-name is the name of an existing DiffServ class map.
Note: This command may only be used after specifying a police command for the policy-class
instance.
class
This command creates an instance of a class definition within the specified policy for the purpose of defining
treatment of the traffic class through subsequent policy attribute statements. The classname is the name of
an existing DiffServ class.
Note:
This command causes the specified policy to create a reference to the class definition.
The CLI mode is changed to Policy-Class-Map Config when this command is successfully executed.
Format class classname
Mode Policy-Map Config
no class
This command deletes the instance of a particular class and its defined treatment from the specified policy. The
parameter classname is the names of an existing DiffServ class.
Note: This command removes the reference to the class definition for the specified policy.
mark cos
This command marks all packets for the associated traffic stream with the specified class of service (CoS) value in
the priority field of the 802.1p header (the only tag in a single tagged packet or the first or outer 802.1Q tag of a
double VLAN tagged packet). If the packet does not already contain this header, one is inserted. The CoS value is
an integer from 0 to 7.
Default 1
Format mark-cos 0-7
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police
mark secondary-cos
This command marks the outer VLAN tags in the packets for the associated traffic stream as secondary CoS.
Default 1
Format mark secondary-cos 0-7
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police
mark cos-as-sec-cos
This command marks outer VLAN tag priority bits of all packets as the inner VLAN tag priority, marking Cos as
Secondary CoS. This essentially means that the inner VLAN tag CoS is copied to the outer VLAN tag CoS.
Format mark cos-as-sec-cos
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police
mark ip-dscp
This command marks all packets for the associated traffic stream with the specified IP DSCP value. The
dscpval value is specified as either an integer from 0 to 63, or symbolically through one of the following
keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be,
cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef.
Format mark ip-dscp dscpval
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark CoS, Mark IP Precedence, Police
mark ip-precedence
This command marks all packets for the associated traffic stream with the specified IP Precedence value. The IP
Precedence value is an integer from 0 to 7.
Format mark ip-precedence 0-7
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark CoS, Mark IP Precedence, Police
Policy Type In
police-simple
This command is used to establish the traffic policing style for the specified class. The simple form of the
police command uses a single data rate and burst size, resulting in two outcomes: conform and violate. The
conforming data rate is specified in kilobits-per-second (Kbps) and is an integer from 1 to 4294967295. The
conforming burst size is specified in kilobytes (KB) and is an integer from 1 to 128.
For each outcome, the only possible actions are drop, set-cos-as-sec-cos, set-cos-transmit,
set-sec-cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this simple
form of the police command, the conform action defaults to transmit and the violate action defaults to
drop. These actions can be set with this command once the style has been configured.
For set-dscp-transmit, a dscpval value is required and is specified as either an integer from 0 to 63, or
symbolically through one of the following keywords: af11, af12, af13, af21, af22, af23, af31,
af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef.
For set-prec-transmit, an IP Precedence value is required and is specified as an integer from 0-7.
For set-cos-transmit an 802.1p priority value is required and is specified as an integer from 0-7.
Format police-simple {1-4294967295 1-128 conform-action {drop | set-cos-as-sec-cos |
set-cos-transmit 0-7 | set-sec-cos-transmit 0-7 | set-prec-transmit 0-7 |
setdscp-transmit 0-63 | transmit} [violate-action {drop | set-cos-as-sec-cos |
set-cos-transmit 0-7 | set-sec-cos-transmit 0-7 | set-prec-transmit 0-7 |
setdscp-transmit 0-63 | transmit}]}
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark (all forms)
police-single-rate
This command is the single-rate form of the police command and is used to establish the traffic policing
style for the specified class.
For each outcome, the only possible actions are drop, set-cos-as-sec-cos, set-cos-transmit,
set-sec-cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this single-
rate form of the police command, the conform action defaults to transmit, the exceed action defaults to
drop, and the violate action defaults to drop. These actions can be set with this command once the style has
been configured.
Format police-single-rate {1-4294967295 1-128 1-128 conform-action {drop |
setcosassec-cos | set-cos-transmit 0-7 | set-sec-cos-transmit 0-7 |
set-prec-transmit 0-7 | set-dscp-transmit 0-63 | transmit} exceed-action
{drop | set-cos-as-sec-cos | set-cos-transmit 0-7 | set-sec-cos-transmit 0-7 |
set-prec-transmit 0-7 | set-dscp-transmit 0-63 | transmit} [violate-action
{drop | set-cos-as-sec-cos-transmit | set-cos-transmit 0-7 |
set-sec-cos-transmit 0-7 | set-prec-transmit 0-7 | set-dscp-transmit 0-63 |
transmit}]}
Mode Policy-Class-Map Config
police-two-rate
This command is the two-rate form of the police command and is used to establish the traffic policing style for
the specified class.
For each outcome, the only possible actions are drop, set-cos-as-sec-cos, set-cos-transmit,
set-sec-cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this two-
rate form of the police command, the conform action defaults to transmit, the exceed action defaults to
drop, and the violate action defaults to drop. These actions can be set with this command once the style has
been configured.
Format police-two-rate {1-4294967295 1-4294967295 1-128 1-128 conform-action {drop |
set-cos-as-sec-cos | set-cos-transmit 0-7 | set-sec-cos-transmit 0-7 |
set-prec-transmit 0-7 | set-dscp-transmit 0-63 | transmit} exceed-action
{drop | set-cos-as-sec-cos | set-cos-transmit 0-7 | set-sec-cos-transmit 0-7 |
set-prec-transmit 0-7 | set-dscp-transmit 0-63 | transmit} [violate-action {drop
| set-cos-as-sec-cos | set-cos-transmit 0-7 | set-sec-cos-transmit 0-7 | set-
prec-transmit 0-7 | set-dscp-transmit 0-63 | transmit}]}
Mode Policy-Class-Map Config
policy-map
This command establishes a new DiffServ policy. The policyname parameter is a case-sensitive
alphanumeric string from 1 to 31 characters uniquely identifying the policy. The type of policy is specific to the
inbound traffic direction as indicated by the in parameter, or the outbound traffic direction as indicated by
the out parameter, respectively.
Note: The CLI mode is changed to Policy-Map Config when this command is successfully executed.
no policy-map
This command eliminates an existing DiffServ policy. The policyname parameter is the name of an existing
DiffServ policy. This command may be issued at any time. If the policy is currently referenced by one or more
interface service attachments, this delete attempt fails.
Format no policy-map policyname
Mode Global Config
policy-map rename
This command changes the name of a DiffServ policy. The policyname is the name of an existing DiffServ
class. The newpolicyname parameter is a case-sensitive alphanumeric string from 1 to 31 characters
uniquely identifying the policy.
Format policy-map rename policyname newpolicyname
Mode Global Config
Note: This command effectively enables DiffServ on an interface in the inbound direction. There is no
separate interface administrative mode command for DiffServ.
Note: This command fails if any attributes within the policy definition exceed the capabilities of the
interface. Once a policy is successfully attached to an interface, any attempt to change the policy definition,
that would result in a violation of the interface capabilities, causes the policy change attempt to fail.
Format service-policy {in|out} policymapname
Modes Global Config, Interface Config
no service-policy
This command detaches a policy from an interface in the inbound direction as indicated by the in parameter, or
the outbound direction as indicated by the out parameter, respectively. The policyname parameter is the
name of an existing DiffServ policy.
Note: This command causes a service to remove its reference to the policy. This command effectively
disables DiffServ on an interface in the inbound direction or an interface in the outbound direction. There
is no separate interface administrative mode command for DiffServ.
Format no service-policy {in|out} policymapname
Modes Global Config, Interface Config
If class-name (the name of an existing DiffServ class) is specified, then the following fields are displayed:
Term Definition
Class Name The name of this class.
Class Type A class type of all means every match criterion defined for the class is evaluated simultaneously and
must all be true to indicate a class match.
Class Layer3 Protocol The Layer-3 protocol for this class. Possible value is IPv4.
Match Criteria Match Criteria fields are only displayed if they are configured. Not all platforms support all match
criteria. They are displayed in the order entered by the user. The fields are evaluated in accordance
with the class type. The possible Match Criteria fields are: Destination IP Address, Destination Layer 4
Port, Destination MAC Address, Ethertype, Source MAC Address, VLAN, Class of Service, Every, IP DSCP,
IP Precedence, IP TOS, Protocol Keyword, Reference Class, Source IP Address, and Source Layer 4 Port.
Values The values of the Match Criteria.
If class-name is not specified, a list of all defined DiffServ classes is displayed with the following fields:
Term Definition
Class Name The name of this class. (Classes are not necessarily displayed in the order in which they were created.)
Class Type A class type of all means every match criterion defined for the class is evaluated simultaneously and
must all be true to indicate a class match.
Ref Class Name The name of an existing DiffServ class whose match conditions are being referenced by the specified
class definition.
show diffserv
This command displays the DiffServ General Status Group information, which includes the current administrative
mode setting as well as the current and maximum number of rows in each of the main DiffServ private MIB
tables. This command takes no options.
Format show diffserv
Mode Privileged EXEC
Term Definition
DiffServ Admin mode The current value of the DiffServ administrative mode.
Class Table Size Current/Max The current and maximum number of entries (rows) in the Class Table.
Class Rule Table Size The current and maximum number of entries (rows) in the Class Rule Table.
Current/Max
Policy Table Size Current/Max The current and maximum number of entries (rows) in the Policy Table.
Policy Instance Table Size The current and maximum number of entries (rows) in the Policy Instance Table.
Current/Max
Policy Instance Table Max The current and maximum number of entries (rows) for the Policy Instance Table.
Current/Max
Policy Attribute Table Max The current and maximum number of entries (rows) for the Policy Attribute Table.
Current/Max
Service Table Size Current/Max The current and maximum number of entries (rows) in the Service Table.
show policy-map
This command displays all configuration information for the specified policy.
Format show policy-map [policyname]
Mode Privileged EXEC
If policyname (the name of an existing DiffServ policy) is specified, then the following fields are displayed:
Term Definition
Policy Name The name of this policy.
Policy Type The policy type (only inbound policy definitions are supported for this platform.)
Class Members The class that is a member of the policy.
The following information is repeated for each class associated with this policy (only those policy attributes
actually configured are displayed):
Term Definition
Assign Queue Directs traffic stream to the specified QoS queue. This allows a traffic classifier to specify which one of
the supported hardware queues are used for handling packets belonging to the class.
Class Name The name of this class.
Committed Burst Size (KB) The committed burst size, used in simple policing.
Committed Rate (Kbps) The committed rate, used in simple policing.
Conform Action The current setting for the action taken on a packet considered to conform to the policing parameters.
This is not displayed if policing is not in use for the class under this policy.
Conform Color Mode The current setting for the color mode. Policing uses either color blind or color aware mode. Color
blind mode ignores the coloration (marking) of the incoming packet. Color aware mode takes into
consideration the current packet marking when determining the policing outcome.
Conform COS The CoS mark value if the conform action is set-cos-transmit.
Conform DSCP Value The DSCP mark value if the conform action is set-dscp-transmit.
Conform IP Precedence The IP Precedence mark value if the conform action is set-prec-transmit.
Value
Drop Drop a packet upon arrival. This is useful for emulating access control list operation using DiffServ,
especially when DiffServ and ACL cannot co-exist on the same interface.
Exceed Action The action taken on traffic that exceeds settings that the network administrator specifies.
Exceed Color Mode The current setting for the color of exceeding traffic that the user may optionally specify.
Mark CoS The class of service value that is set in the 802.1p header of inbound packets. This is not displayed if
the mark cos was not specified.
Mark CoS as Secondary CoS The secondary 802.1p priority value (second/inner VLAN tag. Same as CoS (802.1p) marking, but the
dot1p value used for remarking is picked from the dot1p value in the secondary (i.e. inner) tag of a
double-tagged packet.
Mark IP DSCP The mark/re-mark value used as the DSCP for traffic matching this class. This is not displayed if mark ip
description is not specified.
Mark IP Precedence The mark/re-mark value used as the IP Precedence for traffic matching this class. This is not displayed if
mark ip precedence is not specified.
Mirror Copies a classified traffic stream to a specified egress port (physical port or LAG). This can occur
in addition to any marking or policing action. It may also be specified along with a QoS queue
assignment.
Non-Conform Action The current setting for the action taken on a packet considered to not conform to the policing
parameters. This is not displayed if policing not in use for the class under this policy.
Non-Conform COS The CoS mark value if the non-conform action is set-cos-transmit.
Non-Conform DSCP Value The DSCP mark value if the non-conform action is set-dscp-transmit.
Non-Conform IP Precedence The IP Precedence mark value if the non-conform action is set-prec-transmit.
Value
Term Definition
Peak Rate Guarantees a committed rate for transmission, but also transmits excess traffic bursts up to a user-
specified peak rate, with the understanding that a downstream network element (such as the next
hops policer) might drop this excess traffic. Traffic is held in queue until it is transmitted or dropped
(per type of queue depth management.) Peak rate shaping can be configured for the outgoing
transmission stream for an AP traffic class (although average rate shaping could also be used.)
Peak Burst Size (PBS). The network administrator can set the PBS as a means to limit the damage expedited forwarding
traffic could inflict on other traffic (e.g., a token bucket rate limiter) Traffic exceeding this limit is discarded.
Policing Style The style of policing, if any, used (simple).
Redirect Forces a classified traffic stream to a specified egress port (physical port or LAG). This can occur in
addition to any marking or policing action. It may also be specified along with a QoS queue assignment.
If policyname is not specified, the command displays a list of all defined DiffServ policies. The following
fields are displayed:
Term Definition
Policy Name The name of this policy. (The order in which the policies are displayed is not necessarily the same
order in which they were created.)
Policy Type The policy type (Only inbound is supported).
Class Members List of all class names associated with this policy.
Example: The following shows example CLI display output including the mark-cos-as-sec-cos option
specified in the policy action.
(UBNT EdgeSwitch) #show policy-map p1
Policy Name.................................... p1
Policy Type.................................... In
Class Name..................................... c1
Mark CoS as Secondary CoS...................... Yes
Example: The following shows example CLI display output including the mark-cos-as-sec-cos action used in the
policing (simple-police, police-single-rate, police two-rate) command.
(UBNT EdgeSwitch) #show policy-map p2
Policy Name....................... p2
Policy Type....................... In
Class Name........................ c2
Policing Style.................... Police Two Rate
Committed Rate.................... 1
Committed Burst Size.............. 1
Peak Rate......................... 1
Peak Burst Size................... 1
Conform Action.................... Mark CoS as Secondary CoS
Exceed Action..................... Mark CoS as Secondary CoS
Non-Conform Action................ Mark CoS as Secondary CoS
Conform Color Mode................ Blind
Exceed Color Mode................. Blind
Term Definition
DiffServ Admin Mode The current setting of the DiffServ administrative mode. An attached policy is only in effect on an
interface while DiffServ is in an enabled mode.
Interface The slot/port.
Direction The traffic direction of this interface service.
Operational Status The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface in the indicated direction.
Policy Details Attached policy details, whose content is identical to that described for the show policy-map
policymapname command (content not repeated here for brevity).
Term Definition
DiffServ Mode The current setting of the DiffServ administrative mode. An attached policy is only active on an
interface while DiffServ is in an enabled mode.
The following information is repeated for interface and direction (only those interfaces configured with an
attached policy are shown):
Term Definition
Interface The slot/port.
Direction The traffic direction of this interface service.
OperStatus The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface in the indicated direction.
Note: This command is only allowed while the DiffServ administrative mode is enabled.
Term Definition
Interface The slot/port.
Direction The traffic direction of this interface service.
Operational Status The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface in the indicated direction.
The following information is repeated for each class instance within this policy:
Term Definition
Class Name The name of this class instance.
In Discarded Packets The number of packets discarded for this class instance for any reason due to DiffServ treatment of the
traffic class.
show service-policy
This command displays a summary of policy-oriented statistics information for all interfaces in the specified
direction.
Format show service-policy in
Mode Privileged EXEC
The following information is repeated for each interface and direction (only those interfaces configured with an
attached policy are shown):
Term Definition
Interface The slot/port.
Operational Status The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface.
Note: The CLI mode changes to Mac-Access-List Config mode when you successfully execute this
command.
Note:
Thenoform of this command is not supported, since the rules within a MAC ACL cannot be deleted
individually. Rather, the entire MAC ACL must be deleted and respecified.
An implicit deny all MAC rule always terminates the access list.
The Ethertype may be specified as either a keyword or a four-digit hexadecimal value from 0x0600-0xFFFF.
The currently supported ethertypekey values are: appletalk, arp, ibmsna, ipv4, ipv6, ipx,
mplsmcast, mplsucast, netbios, novell, pppoe, rarp. Each of these translates into its equivalent
Ethertype value(s).
Table 13. Ethertype Keyword and 4-digit Hexadecimal Value
Ethertype Keyword Corresponding Value
appletalk 0x809B
arp 0x0806
ibmsna 0x80D5
ipv4 0x0800
ipv6 0x86DD
ipx 0x8037
mplsmcast 0x8848
mplsucast 0x8847
netbios 0x8191
novell 0x8137, 0x8138
pppoe 0x8863, 0x8864
rarp 0x8035
The vlan and cos parameters refer to the VLAN identifier and 802.1p user priority fields, respectively, of the
VLAN tag. For packets containing a double VLAN tag, this is the first (or outer) tag.
The time-range parameter allows imposing time limitation on the MAC ACL rule as defined by the
parameter time-range-name. If a time range with the specified name does not exist and the MAC ACL
containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied immediately.
If a time range with specified name exists and the MAC ACL containing this ACL rule is applied to an interface
or bound to a VLAN, then the ACL rule is applied when the time-range with specified name becomes active.
The ACL rule is removed when the time-range with specified name becomes inactive. For information about
configuring time ranges, see Time Range Commands for Time-Based ACLs on page 404.
The assign-queue parameter allows specification of a particular hardware queue for handling traffic that
matches this rule. The allowed queue-id value is 0 to (n-1), where n is the number of user configurable
queues available for the hardware platform. The assign-queue parameter is valid only for a permit rule.
The mirror parameter allows the traffic matching this rule to be copied to the specified slot/port, while
the redirect parameter allows the traffic matching this rule to be forwarded to the specified slot/port.
The assign-queue and redirect parameters are only valid for a permit rule.
Note: The special command form {deny | permit} any any is used to match all Ethernet Layer-2
packets, and is the equivalent of the IP access list match every rule.
The permit commands optional attribute rate-limit allows you to permit only the allowed rate of
traffic as per the configured rate in kbps, and burst-size in kbytes.
Example: The following shows an example of the command.
(UBNT EdgeSwitch) (Config)#mac access-list extended mac1
(UBNT EdgeSwitch) (Config-mac-access-list)#permit 00:00:00:00:aa:bb ff:ff:ff:ff:00:00
any rate-limit 32 16
(UBNT EdgeSwitch) (Config-mac-access-list)#exit
mac access-group
This command either attaches a specific MAC Access Control List (ACL) identified by name to an interface or
range of interfaces, or associates it with a VLAN ID, in a given direction. The name parameter must be the name
of an existing MAC ACL.
An optional sequence number may be specified to indicate the order of this mac access list relative to other mac
access lists already assigned to this interface and direction. A lower number indicates higher precedence order.
If a sequence number is already in use for this interface and direction, the specified mac access list replaces the
currently attached mac access list using that sequence number. If the sequence number is not specified for this
command, a sequence number that is one greater than the highest sequence number currently in use for this
interface and direction is used.
This command specified in Interface Config mode only affects a single interface, whereas the Global Config
mode setting is applied to all interfaces. The VLAN keyword is only valid in the Global Config mode. The
Interface Config mode command is only available on platforms that support independent per-port class of
service queue configuration.
Note: You should be aware that the out option may or may not be available, depending on the
platform.
Parameter Description
name The name of the Access Control List.
vlan-id A VLAN ID associated with a specific IP ACL in a given direction.
sequence A optional sequence number that indicates the order of this IP access list relative to the other IP access
lists already assigned to this interface and direction. The range is 1 to 4294967295.
no mac access-group
This command removes a MAC ACL identified by name from the interface in a given direction.
Format no mac access-group name {{in|out} vlan vlan-id {in|out}}
Modes Global Config, Interface Config
Note: The command output varies based on the match criteria configured within the rules of an ACL.
Term Definition
Rule Number The ordered rule number identifier defined within the MAC ACL.
Action The action associated with each rule. The possible values are Permit or Deny.
Source MAC Address The source MAC address for this rule.
Source MAC Mask The source MAC mask for this rule.
Committed Rate The committed rate defined by the rate-limit attribute.
Committed Burst Size The committed burst size defined by the rate-limit attribute.
Destination MAC Address The destination MAC address for this rule.
Ethertype The Ethertype keyword or custom value for this rule.
VLAN ID The VLAN identifier value or range for this rule.
COS The COS (802.1p) value for this rule.
Log Displays when you enable logging for the rule.
Assign Queue The queue identifier to which packets matching this rule are assigned.
Mirror Interface The slot/port to which packets matching this rule are copied.
Redirect Interface The slot/port to which packets matching this rule are forwarded.
Time Range Name Displays the name of the time-range if the MAC ACL rule has referenced a time range.
Rule Status Status (Active/Inactive) of the MAC ACL rule.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show mac access-lists mac1
Rule Number: 1
Action......................................... permit
Source MAC Address............................. 00:00:00:00:AA:BB
Source MAC Mask................................ FF:FF:FF:FF:00:00
Committed Rate................................. 32
Committed Burst Size........................... 16
IP Extended ACL:
Format access-list 100-199 {deny | permit} {every | {{eigrp | gre | icmp | igmp |
ip | ipinip | ospf | pim | tcp | udp | 0-255} {srcip srcmask|any|host srcip}
[range {portkey|startport} {portkey|endport} {eq|neq|lt|gt} {portkey|0-65535}]
{dstip dstmask|any|host dstip} [range {portkey|startport} {portkey|endport}
{eq|neq|lt|gt} {portkey|0-65535}] [flag [+fin|-fin] [+syn|-syn] [+rst|-rst]
[+psh|-psh] [+ack|-ack] [+urg|-urg] [established]] [icmp-type icmp-type
[icmp-code icmp-code] | icmp-message icmp-message] [igmp-type igmp-type]
[fragments] [precedence precedence | tos tos [tosmask] | dscp dscp]}}
[time-range time-range-name] [log] [assign-queue queue-id] [{mirror | redirect}
slot/port] [rate-limit rate burst-size]
Mode Global Config
Note: IPv4 extended ACLs have the following limitations for egress ACLs:
Match on port ranges is not supported.
The rate-limit command is not supported.
Table 14. ACL Command Parameters
Parameter Description
1-99 or 100-199 Range 1 to 99 is the access list number for an IP standard ACL. Range 100 to 199 is the access list
number for an IP extended ACL.
{deny | permit} Specifies whether the IP ACL rule permits or denies an action.
every Match every packet.
{eigrp | gre | icmp Specifies the protocol to filter for an extended IP ACL rule.
| igmp | ip | ipinip
| ospf | pim | tcp |
udp | 0-255}
srcip srcmask | Specifies a source IP address and source netmask for match condition of the IP ACL rule.
any | Specifying any specifies the source IP as 0.0.0.0 and the source IP mask as 255.255.255.255.
host scrip Specifying host A.B.C.D specifies the source IP as A.B.C.D and source IP mask as 0.0.0.0.
{{range Note: This option is available only if the protocol is TCP or UDP.
{portkey|startport} Specifies the source Layer-4 port match condition for the IP ACL rule. You can use the port number,
{portkey|endport} which ranges from 0-65535, or you specify the portkey, which can be one of the following keywords:
| {eq|neq|lt|gt}
For TCP: bgp, domain, echo, ftp, ftp-data, http, smtp, telnet, www, pop2, pop3.
{portkey|0-65535}]
For UDP: domain, echo, ntp, rip, snmp, tftp, time, and who.
For both TCP and UDP, each of these keywords translates into its equivalent port number, which is
used as both the start and end of a port range.
If range is specified, the IP ACL rule matches only if the Layer-4 port number falls within the
specified port range. The startport and endport parameters identify the first and last ports
that are part of the port range. They have values from 0 to 65535. The ending port must have a value
equal or greater than the starting port. The starting port, ending port, and all ports in between will be
part of the Layer-4 port range.
When eq is specified, the IP ACL rule matches only if the Layer-4 port number is equal to the
specified port number or portkey.
When lt is specified, the IP ACL rule matches if the Layer-4 port number is less than the specified
port number or portkey. It is equivalent to specifying a range of 0-<specified port number-1>.
When gt is specified, the IP ACL rule matches if the Layer-4 port number is greater than the specified
port number or portkey. It is equivalent to specifying a range of <specified port number+1>-65535.
When neq is specified, the IP ACL rule matches only if the Layer-4 port number is not equal to the
specified port number or portkey.
Two rules are added in the hardware one with range equal to 0-<specified port number-1> and one
with range equal to <specified port number+1>-65535.
Note: Port number matches only apply to unfragmented or first fragments.
dstip dstmask | Specifies a destination IP address and netmask for match condition of the IP ACL rule.
any | Specifying any implies a destination IP of 0.0.0.0 and destination mask of 255.255.255.255.
host dstip Specifying host A.B.C.D implies a destination IP of A.B.C.D and destination mask of 0.0.0.0.
precedence precedence | Specifies the TOS for an IP ACL rule depending on a match of precedence or DSCP values using the
tos tos [tosmask] | parameters dscp, precedence, tos/tosmask.
dscp dscp Note: tosmask is an optional parameter.
flag [+fin | -fin] Note: This option is available only if the protocol is tcp.
[+syn | -syn] Specifies that the IP ACL rule matches on the TCP flags.
[+rst | -rst]
When +fin, +syn, +rst, +psh, +ack, or +urg is specified, a match occurs if the specified flag
[+psh | -psh]
is set in the TCP header.
[+ack | -ack]
[+urg | -urg] When -fin, -syn, -rst, -psh, -ack, or -urg is specified, a match occurs if the specified flag
[established] is not set in the TCP header.
When established is specified, a match occurs if the specified RST or ACK bits are set in the TCP
header. Two rules are installed in the hardware when the established option is specified.
icmp-type icmp-type Note: This option is available only if the protocol is icmp.
[icmp-code Specifies a match condition for ICMP packets.
icmp-code] |
When icmp-type is specified, the IP ACL rule matches on the specified ICMP message type, a
icmp-message
number from0 to255.
icmp-message
When icmp-code is specified, the IP ACL rule matches on the specified ICMP message code, a
number from0 to255.
Specifying icmp-message implies that both icmp-type and icmp-code are specified. The
following icmp-messages are supported: echo, echo-reply, host-redirect, mobile-
redirect, net-redirect, net-unreachable, redirect, packet-too-big, port-
unreachable, source-quench, router-solicitation, router-advertisement,
time-exceeded, ttl-exceeded and unreachable.
igmp-type igmp-type This option is available only if the protocol is IGMP.
When igmp-type is specified, the IP ACL rule matches on the specified IGMP message type, a
number from0 to255.
fragments Specifies that the IP ACL rule matches on fragmented IP packets.
log Specifies that this rule is to be logged.
time-range Allows imposing time limitation on the ACL rule as defined by the parameter time-range-name.
time-range-name If a time range with the specified name does not exist and the ACL containing this ACL rule is applied
to an interface or bound to a VLAN, then the ACL rule is applied immediately. If a time range with
specified name exists and the ACL containing this ACL rule is applied to an interface or bound to a
VLAN, the ACL rule is applied when the time-range with specified name becomes active. The ACL
rule is removed when the time-range with specified name becomes inactive. For information about
configuring time ranges, see Time Range Commands for Time-Based ACLs on page 404.
assign-queue queue-id Specifies the assign-queue, which is the queue identifier to which packets matching this rule are
assigned.
{mirror | redirect} Specifies the mirror or redirect interface which is the slot/port to which packets matching this rule are
slot/port copied or forwarded, respectively.
rate-limit rate Specifies the allowed rate of traffic as per the configured rate in kbps, and burst-size in
burst-size kbytes.
no access-list
This command deletes an IP ACL that is identified by the parameter accesslistnumber from the system. The range
for accesslistnumber is 1-99 for standard access lists and 100-199 for extended access lists.
Format no access-list accesslistnumber
Mode Global Config
ip access-list
This command creates an extended IP Access Control List (ACL) identified by name, consisting of classification
fields defined for the IP header of an IPv4 frame. The name parameter is a case-sensitive alphanumeric string
from 1 to 31 characters uniquely identifying the IP access list. The rate-limit attribute configures the committed
rate and the committed burst size.
If an IP ACL by this name already exists, this command enters IPv4-Access_List config mode to allow updating
the existing IP ACL.
Note: The CLI mode changes to IPv4-Access-List Config mode when you successfully execute this
command.
no ip access-list
This command deletes the IP ACL identified by name from the system.
Format no ip access-list name
Mode Global Config
ip access-list rename
This command changes the name of an IP Access Control List (ACL). The name parameter specifies the names
of an existing IP ACL. The newname parameter is a case-sensitive alphanumeric string from 1 to 31 characters
uniquely identifying the IP access list.
This command fails if an IP ACL by the name newname already exists.
Format ip access-list rename name newname
Mode Global Config
Note:Thenoform of this command is not supported, since the rules within an IP ACL cannot be deleted
individually. Rather, the entire IP ACL must be deleted and respecified.
Note: An implicit deny all IP rule always terminates the access list.
Note: For IPv4, the following are not supported for egress ACLs:
A match on port ranges.
The rate-limit command.
The time-range parameter allows imposing atime limitation on the IP ACL rule as defined by the specified
time range (time-range-name). If the specified time range does not exist and the ACL containing this ACL
rule is applied to an interface or bound to a VLAN, then the ACL rule is applied immediately. If the specified time
range exists and the ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule
is applied when the specified time range becomes active. The ACL rule is removed when the specified time range
becomes inactive. For information about configuring time ranges, see Time Range Commands for Time-
Based ACLs on page 404.
The assign-queue parameter allows specification of a particular hardware queue for handling traffic that
matches this rule. The allowed queue-id value is from 0 to (n-1), where n is the number of user configurable
queues available for the hardware platform. The assign-queue parameter is valid only for a permit rule.
The permit commands optional attribute rate-limit allows you to permit only the allowed rate of
traffic as per the configured rate in kbps, and burst-size in kbytes.
Parameter Description
{deny | permit} Specifies whether the IP ACL rule permits or denies the matching traffic.
every Match every packet.
eigrp | gre | icmp | Specifies the protocol to match for the IP ACL rule.
igmp | ip | ipinip |
ospf | pim | tcp |
udp | 0-255
srcip srcmask | Specifies a source IP address and source netmask to match for the IP ACL rule.
any | Specifying any implies a source IP of 0.0.0.0 and the source IP mask of 255.255.255.255.
host srcip Specifying host A.B.C.D implies a source IP of A.B.C.D and the source IP mask of 0.0.0.0.
Parameter Description
[{range Note: This option is available only if the protocol is tcp or udp.
{portkey|startport} Specifies the Layer-4 port match condition for the IP ACL rule. Port number can be used, which ranges
{portkey|endport} | from 0-65535, or the portkey, which can be one of the following keywords:
{eq|neq|lt|gt}
For TCP: bgp, domain, echo, ftp, ftp-data, http, smtp, telnet, www, pop2, pop3
{portkey|0-65535} ]
For UDP: domain, echo, ntp, rip, snmp, tftp, time, who
Each of these keywords translates into its equivalent port number.
If range is specified, the IP ACL rule matches only if the Layer-4 port number falls within the
specified port range. The startport and endport parameters identify the first and last ports
that are part of the port range. They have values from 0 to 65535. The ending port must have a value
equal or greater than the starting port. The starting port, ending port, and all ports in between will be
part of the Layer-4 port range.
When eq is specified, the IP ACL rule matches only if the Layer-4 port number is equal to the
specified port number or portkey.
When lt is specified, the IP ACL rule matches if the Layer-4 port number is less than the specified
port number or portkey. It is equivalent to specifying a range of 0-<specified port number-1>.
When gt is specified, the IP ACL rule matches if the Layer-4 port number is greater than the specified
port number or portkey. It is equivalent to specifying a range of <specified port number+1>-65535.
When neq is specified, IP ACL rule matches only if the Layer-4 port number is not equal to the
specified port number or portkey.
Two rules are added in the hardware one with range equal to 0-<specified port number-1> and one
with range equal to <specified port number+1>-65535.
Note: Port number matches only apply to unfragmented or first fragments.
dstip dstmask | Specifies a destination IP address and netmask to match for the IP ACL rule.
any | Specifying any implies a destination IP of 0.0.0.0 and destination mask of 255.255.255.255.
host dstip Specifying host A.B.C.D implies a destination IP of A.B.C.D and destination mask of 0.0.0.0.
precedence precedence | Specifies the TOS for an IP ACL rule depending on a match of precedence or DSCP values using the
tos tos [tosmask] | parameters dscp, precedence, tos/tosmask.
dscp dscp Note: tosmask is an optional parameter.
flag [+fin | -fin] Note: This option is available only if the protocol is tcp.
[+syn | -syn] Specifies that the IP ACL rule matches on the TCP flags.
[+rst | -rst]
When +fin, +syn, +rst, +psh, +ack, or +urg is specified, a match occurs if the specified flag
[+psh | -psh]
is set in the TCP header.
[+ack | -ack]
[+urg | -urg] When -fin, -syn, -rst, -psh, -ack, or -urg is specified, a match occurs if the specified flag
[established] is not set in the TCP header.
When established is specified, a match occurs if the specified RST or ACK bits are set in the TCP
header. Two rules are installed in the hardware when the established option is specified.
icmp-type icmp-type Note: This option is available only if the protocol is icmp.
[icmp-code Specifies a match condition for ICMP packets.
icmp-code] |
When icmp-type is specified, the IP ACL rule matches on the specified ICMP message type, a
icmp-message
number from0 to255.
icmp-message
When icmp-code is specified, the IP ACL rule matches on the specified ICMP message code, a
number from0 to255.
Specifying icmp-message implies that both icmp-type and icmp-code are specified. The
following icmp-messages are supported: echo, echo-reply, host-redirect, mobile-
redirect, net-redirect, net-unreachable, redirect, packet-too-big, port-
unreachable, source-quench, router-solicitation, router-advertisement,
time-exceeded, ttl-exceeded and unreachable.
The ICMP message is decoded into corresponding ICMP type and ICMP code within that ICMP type.
igmp-type igmp-type Note: This option is visible only if the protocol is igmp.
When igmp-type is specified, the IP ACL rule matches on the specified IGMP message type, a
number from0 to255.
fragments Specifies that the IP ACL rule matches on fragmented IP packets.
log Specifies that this rule is to be logged.
time-range Allows imposing a time limitation on the ACL rule as defined by the parameter time-range-name.
time-range-name If a time range with the specified name does not exist and the ACL containing this ACL rule is applied
to an interface or bound to a VLAN, the ACL rule is applied immediately. If a time range with specified
name exists and the ACL containing this ACL rule is applied to an interface or bound to a VLAN, the
ACL rule is applied when the time-range with specified name becomes active. The ACL rule is removed
when the time-range with specified name becomes inactive.
Parameter Description
assign-queue queue- Specifies the assign-queue, which is the queue identifier to which packets matching this rule are
id assigned.
{mirror | redirect} Specifies the mirror or redirect interface which is the slot/port to which packets matching this rule are
slot/port copied or forwarded, respectively.
rate-limit rate Specifies the allowed rate of traffic as per the configured rate in kbps, and burst-size in
burst-size kbytes.
ip access-group
This command either attaches a specific IP Access Control List (ACL) identified by accesslistnumber or
name to an interface, range of interfaces, or all interfaces; or associates it with a VLAN ID in a given direction.
The parameter name is the name of the Access Control List.
An optional sequence number may be specified to indicate the order of this IP access list relative to other IP
access lists already assigned to this interface and direction. A lower number indicates higher precedence order.
If a sequence number is already in use for this interface and direction, the specified access list replaces the
currently attached IP access list using that sequence number. If the sequence number is not specified for this
command, a sequence number that is one greater than the highest sequence number currently in use for this
interface and direction is used.
Default none
Format ip access-group {accesslistnumber|name} {in|out} | vlan vlan-id {in|out}}
[sequence 1-4294967295]
Modes Interface Config, Global Config
Parameter Description
accesslistnumber Identifies a specific IP ACL. The range is 1 to 199.
name The name of the Access Control List.
vlan-id A VLAN ID associated with a specific IP ACL in a given direction.
sequence A optional sequence number that indicates the order of this IP access list relative to the other IP access
lists already assigned to this interface and direction. The range is 1 to 4294967295.
no ip access-group
This command removes a specified IP ACL from an interface.
Default none
Format no ip access-group {accesslistnumber|name} {{in|out} | vlan vlan-id {in|out}}
Mode Interface Config, Global Config
acl-trapflags
This command enables the ACL trap mode.
Default disabled
Format acl-trapflags
Mode Global Config
no acl-trapflags
This command disables the ACL trap mode.
Format no acl-trapflags
Mode Global Config
show ip access-lists
Use this command to view summary information about all IP ACLs configured on the switch. To view more
detailed information about a specific access list, specify the ACL number or name that is used to identify the IP
ACL. The rate-limit attribute displays committed rate and committed burst size.
Format show ip access-lists [accesslistnumber | name]
Mode Privileged EXEC
Term Definition
ACL ID/Name Identifies the configured ACL number or name.
Rules Identifies the number of rules configured for the ACL.
Direction Shows whether the ACL is applied to traffic coming into (ingress) or leaving (egress) the interface.
Interface(s) Identifies the interface(s) to which the ACL is applied (ACL interface bindings).
VLAN(s) Identifies the VLANs to which the ACL is applied (ACL VLAN bindings).
Note: Only the access list fields that you configure are displayed. Thus, the command output varies based
on the match criteria configured within the rules of an ACL.
Term Definition
Rule Number The number identifier for each rule that is defined for the IP ACL.
Action The action associated with each rule. The possible values are Permit or Deny.
Match All Indicates whether this access list applies to every packet. Possible values are True or False.
Protocol The protocol to filter for this rule.
ICMP Type Note: This is shown only if the protocol is ICMP.
The ICMP message type for this rule.
Starting Source L4 port The starting source Layer-4 port.
Ending Source L4 port The ending source Layer-4 port.
Starting Destination L4 port The starting destination Layer-4 port.
Ending Destination L4 port The ending destination Layer-4 port.
ICMP Code Note: This is shown only if the protocol is ICMP.
The ICMP message code for this rule.
Fragments If the ACL rule matches on fragmented IP packets.
Committed Rate The committed rate defined by the rate-limit attribute.
Committed Burst Size The committed burst size defined by the rate-limit attribute.
Source IP Address The source IP address for this rule.
Source IP Mask The source IP Mask for this rule.
Term Definition
Source L4 Port Keyword The source port for this rule.
Destination IP Address The destination IP address for this rule.
Destination IP Mask The destination IP Mask for this rule.
Destination L4 Port Keyword The destination port for this rule.
IP DSCP The value specified for IP DSCP.
IP Precedence The value specified IP Precedence.
IP TOS The value specified for IP TOS.
Log Displays when you enable logging for the rule.
Assign Queue The queue identifier to which packets matching this rule are assigned.
Mirror Interface The slot/port to which packets matching this rule are copied.
Redirect Interface The slot/port to which packets matching this rule are forwarded.
Time Range Name Displays the name of the time-range if the IP ACL rule has referenced a time range.
Rule Status Status (Active/Inactive) of the IP ACL rule.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ip access-lists ip1
ACL Name: ip1
Inbound Interface(s): 0/30
Rule Number: 1
Action......................................... permit
Match All...................................... FALSE
Protocol....................................... 1(icmp)
Committed Rate................................. 32
Committed Burst Size........................... 16
show access-lists
This command displays IP ACLs, IPv6 ACLs, and MAC access control lists information for a designated interface
and direction. Instead of slot/port, you can use lag lag-intf-num as an alternate way to specify the
LAG interface, where lag-intf-num is the LAG port number.
Format show access-lists interface {slot/port in|out}
Mode Privileged EXEC
Parameter Description
in|out in Display Access List information for a particular interface and the in direction.
outDisplay Access List information for a particular interface and the out direction.
Term Definition
ACL Type Type of access list (IP, IPv6, or MAC).
ACL ID Access List name for a MAC or IPv6 access list or the numeric identifier for an IP access list.
Sequence Number An optional sequence number may be specified to indicate the order of this access list relative to
other access lists already assigned to this interface and direction. A lower number indicates higher
precedence order. If a sequence number is already in use for this interface and direction, the specified
access list replaces the currently attached access list using that sequence number. If the sequence
number is not specified by the user, a sequence number that is one greater than the highest sequence
number currently in use for this interface and direction is used. Valid range is (1 to 4294967295).
Term Definition
ACL Type Type of access list (IP, IPv6, or MAC).
ACL ID Access List name for a MAC or IPv6 access list or the numeric identifier for an IP access list.
Sequence Number An optional sequence number may be specified to indicate the order of this access list relative to
other access lists already assigned to this interface and direction. A lower number indicates higher
precedence order. If a sequence number is already in use for this interface and direction, the specified
access list replaces the currently attached access list using that sequence number. If the sequence
number is not specified by the user, a sequence number that is one greater than the highest sequence
number currently in use for this interface and direction is used. Valid range is (1 to 4294967295).
Note: The CLI mode changes to IPv6-Access-List Config mode when you successfully execute this
command.
no ipv6 access-list
This command deletes the IPv6 ACL identified by name from the system.
Format no ipv6 access-list name
Mode Global Config
Note:
Thenoform of this command is not supported, since the rules within an IPv6 ACL cannot be deleted
individually. Rather, the entire IPv6 ACL must be deleted and respecified.
An implicit deny all IPv6 rule always terminates the access list.
The time-range parameter allows imposing time limitation on the IPv6 ACL rule as defined by the
parameter time-range-name. If a time range with the specified name does not exist and the IPv6 ACL
containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied immediately.
If a time range with specified name exists and the IPv6 ACL containing this ACL rule is applied to an interface
or bound to a VLAN, then the ACL rule is applied when the time-range with specified name becomes active.
The ACL rule is removed when the time-range with specified name becomes inactive. For information about
configuring time ranges, see Time Range Commands for Time-Based ACLs on page 404.
The assign-queue parameter allows specification of a particular hardware queue for handling traffic that
matches this rule. The allowed queue-id value is 0 to (n-1), where n is the number of user-configurable
queues available for the hardware platform. The assign-queue parameter is valid only for a permit rule.
The mirror parameter allows the traffic matching this rule to be copied to the specified slot/port,
while the redirect parameter allows the traffic matching this rule to be forwarded to the specified slot/port. The
assign-queue and redirect parameters are only valid for a permit rule.
The permit commands optional attribute rate-limit allows you to permit only the allowed rate of
traffic as per the configured rate in kbps, and burst-size in kbytes.
IPv6 ACLs have the following limitations:
Port ranges are not supported for egress IPv6 ACLs.
The rate-limit command is not supported for egress IPv6 ACLs.
Parameter Description
{deny | permit} Specifies whether the IPv6 ACL rule permits or denies the matching traffic.
every Specifies to match every packet.
{protocolkey | protocolkey specifies the protocol to match for the IPv6 ACL rule: icmpv6, ipv6, tcp, or udp.
number} number is the protocol number: 0-255.
source-ipv6-prefix/ Specifies a source IPv6 source address and prefix length to match for the IPv6 ACL rule.
prefix-length | any Specifying any implies specifying ::/0
| host Specifying host source-ipv6-address implies matching the specified IPv6 address.
source-ipv6-address The source-ipv6-address argument must be in the form documented in RFC 2373 where the
address is specified in hexadecimal using 16-bit values between colons.
Parameter Description
[{range Note: This option is available only if the protocol is TCP or UDP.
{portkey|startport} Specifies the Layer-4 port match condition for the IPv6 ACL rule. A port number can be used, in the
{portkey|endport} | range 0-65535, or the portkey, which can be one of the following keywords:
{eq | neq | lt | gt}
For TCP: bgp, domain, echo, ftp, ftp-data, http, smtp, telnet, www, pop2, pop3
{portkey|0-65535} ]
For UDP: domain, echo, ntp, rip, snmp, tftp, time, who
Each of these keywords translates into its equivalent port number.
When range is specified, IPv6 ACL rule matches only if the Layer-4 port number falls within the
specified port range. The startport and endport parameters identify the first and last ports
that are part of the port range. They have values from 0 to 65535. The ending port must have a value
equal or greater than the starting port. The starting port, ending port, and all ports in between are
part of the Layer-4 port range.
When eq is specified, IPv6 ACL rule matches only if the Layer-4 port number is equal to the specified
port number or portkey.
When lt is specified, IPv6 ACL rule matches if the Layer-4 port number is less than the specified port
number or portkey. It is equivalent to specifying the range as 0 to <specified port number-1>.
When gt is specified, IPv6 ACL rule matches if the Layer-4 port number is greater than the specified
port number or portkey. It is equivalent to specifying the range as <specified port number+1> to 65535.
When neq is specified, IPv6 ACL rule matches only if the Layer-4 port number is not equal to the
specified port number or portkey.
Two rules are added in the hardware, one with range equal to 0 to <specified port number-1> and one
with range equal to <specified port number+1> to 65535.
destination-ipv6- Specifies a destination IPv6 source address and prefix length to match for the IPv6 ACL rule.
prefix/prefix- Specifying any implies specifying ::/0.
length | any | host Specifying host destination-ipv6-address implies matching the specified IPv6 address.
destination-ipv6-
address The destination-ipv6-address argument must be in the form documented in RFC 2373
where the address is specified in hexadecimal using 16-bit values between colons.
[dscp dscp] Specifies the DSCP value to match for for the IPv6 rule.
flag [+fin | -fin] Specifies that the IPv6 ACL rule matches on the tcp flags.
[+syn | -syn] When +fin, +syn, +rst, +psh, +ack, or +urg is specified, a match occurs if the specified flag
[+rst | -rst] is set in the TCP header.
[+psh | -psh] When -fin, -syn, -rst, -psh, -ack, or -urg is specified, a match occurs if the specified flag
[+ack | -ack] is not set in the TCP header.
[+urg | -urg]
[established] When established is specified, a match occurs if specified either RST or ACK bits are set in the TCP
header.
Two rules are installed in hardware when established option is specified.
This option is visible only if protocol is tcp.
[icmp-type icmp-type Note: This option is available only if the protocol is icmpv6.
[icmp-code icmp-code] Specifies a match condition for ICMP packets.
| icmp-message
When icmp-type is specified, the IPv6 ACL rule matches on the specified ICMP message type, a
icmp-message]
number from0 to255.
When icmp-code is specified, the IPv6 ACL rule matches on the specified ICMP message code, a
number from0 to255.
Specifying icmp-message implies both icmp-type and icmp-code are specified.
The following icmp-messages are supported: destination-unreachable, echo-reply,
echo-request, header, hop-limit, mld-query, mld-reduction, mld-report, nd-na,
nd-ns, next-header, no-admin, no-route, packet-too-big, port-unreachable,
router-solicitation, router-advertisement, router-renumbering, time-
exceeded, and unreachable.
The ICMP message is decoded into the corresponding ICMP type and ICMP code within that ICMP type.
fragments Specifies that IPv6 ACL rule matches on fragmented IPv6 packets (Packets that have the next header
field is set to 44).
routing Specifies that IPv6 ACL rule matches on IPv6 packets that have routing extension headers (the next
header field is set to 43).
log Specifies that this rule is to be logged.
Parameter Description
time-range Allows imposing a time limitation on the ACL rule as defined by the parameter time-range-name.
time-range-name If a time range with the specified name does not exist and the ACL containing this ACL rule is applied
to an interface or bound to a VLAN, the ACL rule is applied immediately.
If a time range with the specified name exists and the ACL containing this ACL rule is applied to an
interface or bound to a VLAN, the ACL rule is applied when the time-range with the specified name
becomes active.
The ACL rule is removed when the time-range with specified name becomes inactive.
assign-queue Specifies the assign-queue, which is the queue identifier to which packets matching this rule are
queue-id assigned.
{mirror | redirect} Specifies the mirror or redirect interface which is the slot/port to which packets matching this
slot/port rule are copied or forwarded, respectively.
rate-limit rate Specifies the allowed rate of traffic as per the configured rate in kbps, and burst-size in
burst-size kbytes.
ipv6 traffic-filter
This command either attaches a specific IPv6 ACL identified by name to an interface or range of interfaces,
or associates it with a VLAN ID in a given direction. The name parameter must be the name of an existing
IPv6ACL.
An optional sequence number may be specified to indicate the order of this MAC access list relative to other IPv6
access lists already assigned to this interface and direction. A lower number indicates higher precedence order.
If a sequence number is already in use for this interface and direction, the specifiedIPv6 access list replaces the
currently attached IPv6 access list using that sequence number. If the sequence number is not specified for this
command, a sequence number that is one greater than the highest sequence number currently in use for this
interface and direction is used.
This command specified in Interface Config mode only affects a single interface, whereas the Global Config
mode setting is applied to all interfaces. The vlan keyword is only valid in the Global Config mode. The
Interface Config mode command is only available on platforms that support independent per-port class of
service queue configuration.
Format ipv6 traffic-filter name {{in|out}|vlan vlan-id {in|out}} [sequence
1-4294967295]
Modes Global Config, Interface Config
no ipv6 traffic-filter
This command removes an IPv6 ACL identified by name from the interface(s) in a given direction.
Format no ipv6 traffic-filter name {{in|out} | vlan vlan-id {in|out}}
Modes Global Config, Interface Config
Note: Only the access list fields that you configure are displayed. Thus, the command output varies based
on the match criteria configured within the rules of an ACL.
Term Definition
Rule Number The ordered rule number identifier defined within the IPv6 ACL.
Action The action associated with each rule. The possible values are Permit or Deny.
Match All Indicates whether this access list applies to every packet. Possible values are True or False.
Protocol The protocol to filter for this rule.
Committed Rate The committed rate defined by the rate-limit attribute.
Committed Burst Size The committed burst size defined by the rate-limit attribute.
Source IP Address The source IP address for this rule.
Source L4 Port Keyword The source port for this rule.
Destination IP Address The destination IP address for this rule.
Destination L4 Port Keyword The destination port for this rule.
IP DSCP The value specified for IP DSCP.
Flow Label The value specified for IPv6 Flow Label.
Log Displays when you enable logging for the rule.
Assign Queue The queue identifier to which packets matching this rule are assigned.
Mirror Interface The slot/port to which packets matching this rule are copied.
Redirect Interface The slot/port to which packets matching this rule are forwarded.
Time Range Name Displays the name of the time-range if the IPv6 ACL rule has referenced a time range.
Rule Status Status (Active/Inactive) of the IPv6 ACL rule.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show ipv6 access-lists ip61
Rule Number: 1
Action......................................... permit
Match Every.................................... FALSE
Protocol....................................... 17(udp)
Committed Rate................................. 32
Committed Burst Size........................... 16
Note: When you successfully execute this command, the CLI mode changes to Time-Range Config mode.
no time-range
This command deletes a time-range identified by name.
Format no time-range name
Mode Global Config
absolute
Use this command to add an absolute time entry to a time range. Only one absolute time entry is allowed per
time-range. The time parameter is based on the currently configured time zone.
The [start time date] parameters indicate the time and date at which the configuration that
referenced the time range starts going into effect. The time is expressed in a 24-hour clock, in the form of
hours:minutes. For example, 8:00 is 8:00 am and 20:00 is 8:00 pm. The date is expressed in the format
day month year. If no start time and date are specified, the configuration statement is in effect immediately.
The [end time date] parameters indicate the time and date at which the configuration that referenced
the time range is no longer in effect. The end time and date must be after the start time and date. If no end time
and date are specified, the configuration statement is in effect indefinitely.
Format absolute [start time date] [end time date]
Mode Time-Range Config
no absolute
This command deletes the absolute time entry in the time range.
Format no absolute
Mode Time-Range Config
periodic
Use this command to add a periodic time entry to a time range. The time parameter is based off of the
currently configured time zone.
The first occurrence of the days-of-the-week argument is the starting day(s) from which the configuration
that referenced the time range starts going into effect. The second occurrence is the ending day or days from
which the configuration that referenced the time range is no longer in effect. If the end days-of-the-week
are the same as the start, they can be omitted.
This argument can be any single day or combinations of days: Monday, Tuesday, Wednesday, Thursday,
Friday, Saturday, Sunday. Other possible values are:
daily: Monday through Sunday
weekdays: Monday through Friday
weekend: Saturday and Sunday
If the ending days of the week are the same as the starting days of the week, they can be omitted.
The first time parameter is the starting hours:minutes at which the configuration that referenced the
time range goes into effect. The second time parameter is the ending hours:minutes at which the
configuration that referenced the time range is no longer in effect.
The hours:minutes are expressed in a 24-hour clock. For example, 8:00 is 8:00 am; 20:00 is 8:00 pm.
Format periodic days-of-the-week time to time
Mode Time-Range Config
no periodic
This command deletes a periodic time entry from a time range.
Format no periodic days-of-the-week time to time
Mode Time-Range Config
show time-range
Use this command to display a time range and all the absolute/periodic time entries that are defined for the time
range. Use the name parameter to identify a specific time range to display. When name is not specified, all
the time ranges defined in the system are displayed.
Format show time-range [name]
Mode Privileged EXEC
The information in the following table is displayed when no time range name is specified.
Term Definition
Admin Mode The administrative mode of the time range feature on the switch
Current number of all Time The number of time ranges currently configured in the system.
Ranges
Maximum number of all The maximum number of time ranges that can be configured in the system.
Time Ranges
Time Range Name Name of the time range.
Status Status of the time range (active/inactive)
Periodic Entry count The number of periodic entries configured for the time range.
Absolute Entry Indicates whether an absolute entry has been configured for the time range (Exists).
no auto-voip
Use thenoform of the command to set the default mode.
auto-voip oui
Use this command to configure an OUI for Auto VoIP. The traffic from the configured OUI will get the highest
priority over the other traffic. The oui-prefix is a unique OUI that identifies the device manufacturer or
vendor. The OUI is specified in three octet values (each octet represented as two hexadecimal digits) separated
by colons. The string is a description of the OUI that identifies the manufacturer or vendor associated with
the OUI.
Default A list of known OUIs is present.
Format auto-voip oui oui-prefix oui-desc string
Mode Global Config
Example: The following example shows how to add an OUI to the table.
(UBNT EdgeSwitch) (Config)#auto-voip oui 00:03:6B desc Cisco VoIPPhone
no auto-voip oui
Use thenoform of the command to remove a configured OUI prefix from the table.
Format no auto-voip oui oui-prefix
Mode Global Config
Example: The following example shows how to add an OUI to the table.
(UBNT EdgeSwitch) (Config)#auto-voip oui 00:03:6B desc Cisco VoIPPhone
no auto-voip oui
Use thenoform of the command to remove a configured OUI prefix from the table.
Format no auto-voip oui oui-prefix
Mode Global Config, Interface Config
auto-voip protocol-based
Use this command to configure the global protocol-based auto VoIP remarking priority or traffic-class. If remark
priority is configured, the voice data of the session is remarked with the priority configured through this
command. The remark-priority is the 802.1p priority used for protocol-based VoIP traffic. If the interface
detects a call-control protocol, the device marks traffic in that session with the specified 802.1p priority value to
ensure voice traffic always gets the highest priority throughout the network path.
The tc value is the traffic class used for protocol-based VoIP traffic. If the interface detects a call-control
protocol, the device assigns the traffic in that session to the configured Class of Service (CoS) queue. Traffic
classes with a higher value are generally used for time-sensitive traffic. The CoS queue associated with the
specified traffic class should be configured with the appropriate bandwidth allocation to allow priority treatment
for VoIP traffic.
Note: You must enable tagging on auto VoIP enabled ports to remark the voice data upon egress.
no auto-voip protocol-based
Use this command to reset the global protocol based auto VoIP remarking priority or traffic-class to the default.
Format no auto-voip protocol-based {remark remark-priority | traffic-class tc}
Mode Global Config, Interface Config
auto-voip vlan
Use this command to configure the global Auto VoIP VLAN ID. The VLAN behavior is depend on the configured
auto VoIP mode. The auto-VoIP VLAN is the VLAN used to segregate VoIP traffic from other non-voice traffic. All
VoIP traffic that matches a value in the known OUI list gets assigned to this VoIP VLAN.
Default None
Format auto-voip vlan vlan-id
Mode Global Config
no auto-voip vlan
Use thenoform of the command to reset the auto-VoIP VLAN ID to the default value.
Format no auto-voip vlan
Mode Global Config
show auto-voip
Use this command to display the auto VoIP settings on the interface or interfaces of the switch.
Format show auto-voip {protocol-based|oui-based} interface {slot/port|all}
Mode Privileged EXEC
Term Description
VoIP VLAN ID The global VoIP VLAN ID.
Prioritization Type The type of prioritization used on voice traffic.
Class Value If the Prioritization Type is configured as traffic-class, then this value is the queue value.
If the Prioritization Type is configured as remark, then this value is 802.1p priority used to remark the
voice traffic.
Priority The 802.1p priority. This field is valid for OUI auto VoIP.
AutoVoIP Mode The Auto VoIP mode on the interface.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)# show auto-voip protocol-based interface all
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)# show auto-voip oui-based interface all
Term Description
OUI OUI of the source MAC address.
Status Default or configured entry.
OUI Description Description of the OUI.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch)# show auto-voip oui-table
Note: The commands in this chapter are in one of three functional groups:
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration
command, there is a show command that displays the configuration setting.
Clear commands clear some or all of the settings to factory defaults.
Term Description
Intf The valid PoE slot/port number.
MPS Absent Number of times the powered device has no longer requested power from the port (MPS is the
Maintenance Power Signature.)
Invalid Signature Counter of invalid signature in specific PoE port.
Power Denied Counter of power denied in specific PoE port.
Over Load Counter of over loading in specific PoE port.
Short Counter Counter of short in specific PoE port.
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show poe counters all
Term Description
Intf The valid PoE slot/port number.
OP Mode PoE Operational Mode
HP Enable High Power Enable
HP Mode High Power Mode
Detect Enable Detect Enable
Disconnect Enable Disconnect Enable
Class Enable Class Enable
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show poe port all
Term Description
Intf The valid PoE slot/port number.
Detection Detection Status
Class Class status
Consumed(W) Consumed Power
Voltage(V) Port Voltage
Current(mA) Port Current
Temperature(C) Temperature
Example: The following shows example CLI display output for the command.
(UBNT EdgeSwitch) #show poe status all
poe opmode
This command sets the PoE operational mode on specific port(s).
Format poe opmode {auto | passive24V | shutdown}
Mode Interface Config, Interface Range Config
Parameter Description
auto Configure auto for PoE operational mode.
passive24v Configure passive 24V mode for PoE operation mode.
Note: Cannot be set before the port linkup.
shutdown Disable PoE power on specific port.
Core
Table 15. NIM Log Messages
Component Message Cause
NIM NIM: L7_ATTACH out of order for Interface creation out of order.
interface unit x slot x port x
NIM NIM: Failed to find interface at unit x There is no mapping between the USP and Interface
slot x port x for event(x) number.
NIM NIM: L7_DETACH out of order for Interface creation out of order.
interface unit x slot x port x
NIM NIM: L7_DELETE out of order for Interface creation out of order.
interface unit x slot x port x
NIM NIM: event(x),intf(x),component(x), in An event was issued to NIM during the wrong
wrong phase configuration phase (probably Phase 1, 2, or WMU).
NIM NIM: Failed to notify users of Event was not propagated to the system.
interface change
NIM NIM: failed to send message to NIM NIM message queue full or non-existent.
message Queue.
NIM NIM: Failed to notify the components of Interface not created.
L7_CREATE event
NIM NIM: Attempted event (x), on USP x.x.x A component issued an interface event during the
before phase 3 wrong initialization phase.
NIM NIM: incorrect phase for operation An API call was made during the wrong initialization
phase.
NIM NIM: Component(x) failed on event(x) A component responded with a fail indication for an
for interface interface event.
NIM NIM: Timeout event(x), interface A component did not respond before the NIM timeout
remainingMask = xxxx occurred.
Utilities
Table 18. Trap Mgr Log Message
Component Message Cause
Trap Mgr Link Up/Down: slot/port An interface changed link state.
Management
Table 27. SNMP Log Message
Component Message Cause
SNMP EDB Callback: Unit Join: x. A new unit has joined the stack.
Switching
Table 35. Protected Ports Log Messages
Component Message Cause
Protected Ports Protected Port: failed to save This appears when the protected port configuration
configuration cannot be saved.
Protected Ports protectedPortCnfgrInitPhase1Process: This appears when protectedPortCfgRWLock Fails.
Unable to create r/w lock for protected
Port
Protected Ports protectedPortCnfgrInitPhase2Process: This appears when nimRegisterIntfChange with VLAN
Unable to register for VLAN change fails.
callback
Protected Ports Cannot add interface xxx to group yyy This appears when an interface could not be added to
a particular group.
Protected Ports unable to set protected port group This appears when a dtl call fails to add interface mask
at the driver level.
Protected Ports Cannot delete interface xxx from group This appears when a dtl call to delete an interface from
yyy a group fails.
Protected Ports Cannot update group YYY after deleting This message appears when an update group for a
interface XXX interface deletion fails.
Protected Ports Received an interface change callback This appears when an interface change call back has
while not ready to receive it come before the protected port component is ready.
QoS
Table 50. ACL Log Messages
Component Message Cause
ACL Total number of ACL rules (x) exceeds The combination of all ACLs applied to an interface
max (y) on intf i. has resulted in requiring more rules than the platform
supports.
ACL ACL name, rule x: This rule is not The ACL configuration has resulted in a requirement
being logged for more logging rules than the platform supports. The
specified rule is functioning normally except for the
logging action.
ACL aclLogTask: error logging ACL rule trap The system was unable to send an SNMP trap for this
for correlator number ACL rule which contains a logging attribute.
ACL IP ACL number: Forced truncation of one While processing the saved configuration, the system
or more rules during config migration encountered an ACL with more rules than is supported
by the current version. This may happen when code is
updated to a version supporting fewer rules per ACL
than the previous version.
Technologies
Table 53. Error Messages
Component Message Cause
Broadcom Invalid USP unit = x, slot = x, port A port was not able to be translated correctly during
=x the receive.
Broadcom In hapiBroadSystemMacAddress call to Failed to add an L2 address to the MAC table. This
bcm_l2_addr_add - FAILED : x should only happen when a hash collision occurs or
the table is full.
Broadcom Failed installing mirror action - rest A previously configured probe port is not being used
of the policy applied successfully in the policy. The release notes state that only a single
probe port can be configured.
Broadcom Policy x does not contain rule x The rule was not added to the policy due to a
discrepancy in the rule count for this specific policy.
Additionally, the message can be displayed when an
old rule is being modified, but the old rule is not in the
policy.
Broadcom ERROR: policy x, tmpPolicy x, size x, An issue installing the policy due to a possible
data x x x x x x x x duplicate hash.
Broadcom ACL x not found in internal table Attempting to delete a non-existent ACL.
Broadcom ACL internal table overflow Attempting to add an ACL to a full table.
Broadcom In hapiBroadQosCosQueueConfig, Failed Attempting to configure the bandwidth beyond its
to configure minimum bandwidth. capabilities.
Available bandwidth x
Broadcom USL: failed to put sync response on A response to a sync request was not enqueued.
queue This could indicate that a previous sync request was
received after it was timed out.
Broadcom USL: failed to sync ipmc table on Either the transport failed or the message was
unit=x dropped.
Broadcom usl_task_ipmc_msg_send(): failed to Either the transport failed or the message was
send with x dropped.
Broadcom USL: No available entries in the STG The Spanning Tree Group table is full in USL.
table
Broadcom USL: failed to sync stg table on Could not synchronize unit x due to a transport failure
unit=x or API issue on remote unit. A synchronization retry
will be issued.
Broadcom USL: A Trunk doesnt exist in USL Attempting to modify a Trunk that doesnt exist.
Broadcom USL: A Trunk being created by bcmx Possible synchronization issue between the
already existed in USL application, hardware, and sync layer.
Broadcom USL: A Trunk being destroyed doesnt Possible synchronization issue between the
exist in USL application, hardware, and sync layer.
Broadcom USL: A Trunk being set doesnt exist in Possible synchronization issue between the
USL application, hardware, and sync layer.
Broadcom USL: failed to sync trunk table on Could not synchronize unit x due to a transport failure
unit=x or API issue on remote unit. A synchronization retry
will be issued.
Broadcom USL: Mcast entry not found on a join Possible synchronization issue between the
application, hardware, and sync layer.
Broadcom USL: Mcast entry not found on a leave Possible synchronization issue between the
application, hardware, and sync layer.
Broadcom USL: failed to sync dVLAN data on Could not synchronize unit x due to a transport failure
unit=x or API issue on remote unit. A synchronization retry
will be issued.
Broadcom USL: failed to sync policy table on Could not synchronize unit x due to a transport failure
unit=x or API issue on remote unit. A synchronization retry
will be issued.
O/S Support
Table 54. Linux BSP Log Message
Component Message Cause
Linux BSP rc = 10 Second message logged at bootup, right after Starting
code Always logged.
2014-2015 Ubiquiti Networks, Inc. All rights reserved. Ubiquiti, Ubiquiti Networks, the Ubiquiti U logo, the Ubiquiti beam logo, and
EdgeSwitch are trademarks or registered trademarks of Ubiquiti Networks, Inc. in the United States and in other countries. All other
trademarks are the property of their respective owners.
AI042315