A10 Configuring Application Delivery Partitions
A10 Configuring Application Delivery Partitions
Patent Protection
A10 Networks products are protected by patents in the U.S. and elsewhere. The following website is provided to satisfy the virtual pat-
ent marking provisions of various jurisdictions including the virtual patent marking provisions of the America Invents Act. A10 Net-
works' products, including all Thunder Series products, are protected by one or more of U.S. patents and patents pending listed at:
https://www.a10networks.com/company/legal-notices/a10-virtual-patent-marking.
Trademarks
The A10 logo, A10 Harmony, A10 Lightning, A10 Networks, A10 Thunder, aCloud, ACOS, Affinity, aFleX, aFlow, aGalaxy, aGAPI, aVCS, AX,
aXAPI, IDsentrie, IP-to-ID, SSL Insight, SSLi, Thunder, Thunder TPS, UASG, and vThunder are trademarks or registered trademarks of A10
Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners.
Confidentiality
This document contains confidential materials proprietary to A10 Networks, Inc. This document and information and ideas herein may
not be disclosed, copied, reproduced or distributed to anyone outside A10 Networks, Inc. without prior written consent of
A10 Networks, Inc.
Anyone who uses the Software does so only in compliance with the terms of the End User License Agreement (EULA), provided later in
this document or available separately. Customer shall not:
1. reverse engineer, reverse compile, reverse de-assemble or otherwise translate the Software by any means
Disclaimer
This document does not create any express or implied warranty about A10 Networks or about its products or services, including but not
limited to fitness for a particular use and non-infringement. A10 Networks has made reasonable efforts to verify that the information
contained herein is accurate, but A10 Networks assumes no responsibility for its use. All information is provided "as-is." The product
specifications and features described in this publication are based on the latest information available; however, specifications are sub-
ject to change without notice, and certain features may not be available upon initial product release. Contact A10 Networks for current
information regarding its products or services. A10 Networks’ products and services are subject to A10 Networks’ standard terms and
conditions.
Environmental Considerations
Some electronic components may possibly contain dangerous substances. For information on specific component types, please con-
tact the manufacturer of that component. Always consult local authorities for regulations regarding proper disposal of electronic com-
ponents in your area.
Further Information
For additional information about A10 products, terms and conditions of delivery, and pricing, contact your nearest A10 Networks loca-
tion, which can be found by visiting www.a10networks.com.
Table of Contents
• Types of Partitions
Each partition may provide aggregated services that include networking, system, and application resources. Each partition
can be administered and monitored separately as independent entities (Figure 2).
Partition Benefits
Partitioning allows the ACOS device to be logically segmented to support separate configurations for different customers.
This provides isolation of configuration components and also isolates administration of these components. For example,
separate companies or separate departments within an enterprise may prefer to have their content isolated from other
departments.
Figure 3 shows an example: a service provider hosts an ACOS device shared by two companies: CorpA.com and CorpB.com.
Each company has its own dedicated servers that they want to manage in entirety. The partition for CorpA.com contains
CorpA.com's SLB resources. Likewise, the partition for CorpB.com contains CorpB.com's SLB resources.
Admins assigned to the partition for CorpA.com can add, modify, delete and save only those resources contained in
CorpA.com's partition. Likewise, CorpB.com's admins can add, modify, delete and save only the resources in CorpB.com's par-
tition.
For more information about administrative roles, refer to “Configuring Admin Access to Partitions” on page 10.
All CGN commands are blocked in partition p1. If you create the partition without using the application-type parameter,
then by default both SLB and CGN commands are available. Once an object for one application type is configured, the com-
mands for the other application type are disabled.
2. On the Create Partitions screen, you can specify the partition name, ID, and application type. In this example, CGN is
selected.
3. After the partition is created, use the “Partition” menu to switch to the new partition (“p1-cgn” in this example):
Note that the name of the partition in the menu bar is changed from “shared” to “p1_cgn.”
These new CGN commands make CGN self-sufficient within a partition. They parallel the SLB commands so that CGN is no
longer dependent on SLB constructs to exist before CGN can be enabled. This will help CGN and SLB to be enabled inde-
pendently of one another within a given partition.
Types of Partitions
This section contains the following:
• Shared Partition
• L3V Partitions
Shared Partition
Every ACOS device contains one shared partition; by default, this is the only partition on the device and cannot be deleted. If
you do not create any additional partitions on your device, all the configuration changes you make take place in the shared
partition. If you create additional L3V partitions, you must explicitly switch to that L3V partition for your configuration
changes to take effect in the desired partition.
L3V Partitions
Partitions that provide Layer 3-7 support are referred to as L3V partitions. Each L3V partition can contain either SLB or CGN
application resources, networking resources, and system resources. In essence, each L3V partition can operate as an inde-
pendent ACOS device. An L3V partition can be created, configured and deleted by a root admin and configured by a parti-
tion admin. The partition admin has access to configure all applications, network, and system resources within the partition.
For system and network resources, the partition admin will depend on the root admin for configuration help.
NOTE: Admin creation and partition creation can only be performed in the shared partition.
For details on L3V partitions and supported resources, refer to “Understanding L3V Partitions” on page 17.
• Managing Partitions
• Managing Partitions
• Partition-Based Banners
Once within an L3V partition, if you only have read access, you will not be able to enter the config mode. You can use show
commands only. For example:
ACOS[partition1]> enable
Password:
ACOS[partition1]#
ACOS[partition1]# config
Permission denied: Insufficient privilege
Other than a “root administrator” a partition admin is only able to make configuration changes inside the partition for which
they have privileges.
• Global privileges:
• read
• write
• Partition privileges:
• Partition-enable-disable
• Partition-read
• Partition-write
• System and networking resources can be configured only by admins with Global write privileges. An admin with such
privileges can configure all system and networking resources for all partitions.
• An L3V partition can be configured and accessed only by the admins who are assigned to it, and by admins with
Global read or Global write privileges.
• Admins assigned to an L3V partition can manage only the resources inside that partition.
NOTE: To delete an admin account, see “Delete an Admin Account” in the Management Access
and Security Guide.
The following command grants Partition-write privileges to the “exampleadmin” user for partition companyA:
Managing Partitions
This section contains the following:
• Deleting a Partition
To change the view to a private partition, use either of the following methods.
Deleting a Partition
Only an admin with Read Write privileges can delete a partition. When a partition is deleted, all resources within the partition
also are deleted.
NOTE: When you delete a partition, resources associated with the partition are permanently
deleted. This includes SSL certificates and keys, and aFleX scripts. These resources are
deleted even if you reload or reboot without saving the configuration. In this case, the
partition configuration is restored but the resources are still gone.
3. For the partition you want to delete, select the Deactivate link in the Action column for that partition. When the parti-
tion is deactivated, the icon in the Status column should change to a red circle with an “X” in it.
4. After the partition is deactivated, click the checkbox next to the partition name, then click Delete.
The no partition command unloads the partition but keeps the configuration on your system. To perform a hard delete
of the partition and associated configuration, you must also use the delete partition command.
Table 3 summarizes the CLI commands available to remove partitions or partition configurations.
Partition-Based Banners
Admins with the “write” or “write partition” access privilege level can configure the banner message displayed when the Priv-
ileged EXEC level of the CLI is accessed by a partition admin.
You may configure the default as a single or multiple lines. For details on configuring banners using the CLI or GUI, refer to
“Configuring Basic System Parameters” in the System Configuration and Administration Guide.
Admins assigned to a partition can view the resources in the shared partition and in their own private partition but not in any
other private partition.
To view the configuration for all partitions, use the show running-config partition command:
You can specify a partition-name at the end of the command to view only the resources in the specified partition.
To save the configuration on an ACOS device configured with private partitions, use either of the following methods:
If you have multiple partitions and want to save the configuration changes for all of them with a single command, use:
CAUTION: Before saving all partitions or before a reload, reboot, or shutdown operation, a root
admin should notify all partition admins to save their configurations. Saving all partitions
without consent from the partition admins is not recommended.
The all-partitions and partition partition-name options are not applicable for admins with Partition-write privi-
leges. Partition admins can only save their respective partitions. For these admins, the command syntax is the same as in pre-
vious releases. The options are available only to admins with Global Write privileges.
A configuration can be saved to a different configuration profile name (rather than being written to “startup-config”), as sup-
ported in previous releases. In this case, the resources that are saved depend on the partition(s) to which the write memory
command is applied. Unless the resources in the shared partition are being saved, the configuration profile name used with
the write memory command must already exist. The command does not create new configuration profiles for L3V parti-
tions.
For more information, see “Automated Configuration Synchronization” in Configuring ACOS Virtual Chassis Systems.
• L3V Partitions
L3V Partitions
L3V partitions provide a mechanism to segment a single ACOS device into multiple instances that behave independent of
each other. Layer 3 Virtualization (L3V) in each partition allows admins with the proper privileges to configure and view net-
work, SLB, and CGN resources.
Figure 4 show how an ACOS device can be carved into separate L3V partitions.
L3V allows the ACOS device to split layer 2, 3, and 4-7 resources in multi-instance architecture enabling virtual segmentation
for multi-client organizations. Specifically, in a corporation or at a service provider where many clients use the same load bal-
ancer, an administrator can create multiple private partitions and then control access to each organization’s configuration or
space. Each organization then can authenticate their own partition and configure their own devices as if they were a com-
pletely, separate organization.
ACOS devices provide support for multiple L3V partitions, and the number of partitions they support are platform depen-
dent (see “Number of Partitions Supported per ACOS Device” on page 9 for more information).
Every configured device has one shared partition. By default, all partitions will have access to the shared partition unless the
administrator restricts access to the shared partition. For example, when a user logs into a device, the user will also have
access, although limited, to the shared partition. For instance, the limited access will include access to templates.
Nothing within partitions is shared, unless an administrator allows users to share interfaces. When creating partitions, an
administrator may allow users to share partitions or leave the shared partition blank. Users too can share interfaces, but are
not required to.
Each partition has its own ARP table, and its own IPv4 and IPv6 route tables. They are completely separate from the ARP and
IP route tables in other partitions.
After a network resource belongs to a partition, the resource does not appear in show command output except for the L3V
partition and the partition to which the interface belongs. Likewise, statistics for the resource are not included in the statistics
counters for other private partitions.
Untagged VLAN ports are exclusively owned by the shared or private partitions.
Tagged VLAN ports can be shared across all the partitions by tagging them explicitly with unique VLAN IDs per partition
The administrator may create partitions using CLI or GUI. For details on configuring partitions, refer to “L3V Partition Configu-
ration” on page 21.
• VE number
NOTE: VE numbers must be unique and must match the VLAN ID in an L3V partition. If a VLAN
ID already belongs to a shared or another L3V partition, do not re-use it.
• NAT pool
• Interface IP addresses
For example, multiple partitions can use a real server that has IP address 10.10.10.10, but a given partition can have only one
instance of the server.
Each L3V partition supports a maximum of 2 loopback interfaces, with IDs 1-2. Loopback interface IDs 0-10 are valid in the
shared partition.
• Features That can be Configured at the Global Configuration Level Within an L3V Partition
• Features that can be Configured at the Interface Configuration Level within an L3V Partition
Features That can be Configured at the Global Configuration Level Within an L3V Partition
• Hardware-based SYN cookies
• DNS caching
• Session filtering
• SSL Insight
• Default compression block size for SLB
• Transparent TCP template
• Source NAT gateway for Layer 3
• Source NAT on VIP
• Reset stale session
• Application templates:
• TCP
• Source-IP persistence
• Destination-IP persistence
(Also see “L3V Partition Default SLB Templates” on page 20.)
Features that can be Configured at the Interface Configuration Level within an L3V
Partition
• IPv6 router advertisement and discovery
• Real server
• Real port
• Virtual server
• Virtual port
Changes to a default server or port template in an L3V partition do not affect the default server or port templates in the
shared partition or any other private partition. Likewise, changes to a default server or port template in the shared partition
do not affect the default server or port templates in private partitions.
NOTE: This behavior does not apply to feature templates such as HTTP, TCP, or source-IP per-
sistence templates.
Next Hop Load Distributor (NHLD) is supported in L3V partitions only if the feature is configured using a wildcard VIP.
Each L3V partition must be configured with a unique identifier; this unique identifier is bound to the partition for the
life of the partition. Only when the partition is deleted from the system can its partition ID can be re-used with the cre-
ation of a new partition.
3. Configure any SLB or CGN shared resources that you want to make available.
Configuration of SLB or CGN resources within an L3V partition can be performed by an admin with Partition-write priv-
ileges who is assigned to the partition. For details on a privileges, refer to “Administering L3V Partitions” on page 10.
4. Configure network and system connectivity resources such as interfaces, VLANs, routing, and so on for L3V partitions.
You also will need to configure any additional admin accounts for the partition.
NOTE: This document shows how to set up partitions and assign admins to them. The partition
admins will be able to configure their own SLB or CGN, network, and system resources.
In Release 4.0, the startup-config profile in an L3V partitions is not tied to the profile used in shared partition; this means that
an L3V partition administrator can choose to use a configuration saved in a profile for that L3V partition that is independent
of the configuration in use by the shared partition.
Profiles within an L3V partition can be dynamically loaded and unloaded. Using Figure 5 as an example, suppose the active
startup-config profile on partition p2 is “pf3,” and you want to change this so that profile “pf2” becomes the active startup-
config profile in partition p2:
1. Go to partition L3V_P2 and link the profile you want to be active (in this case, profile pf2) to the startup-config in that
partition:
ACOS(config)# active-partition L3V_P2
Current active partition: L3V_P2
ACOS[L3V_P2](config)# link startup-config pf2
4. Use the partition command to load the new profile, which you linked to the startup-config in step 1.
ACOS(config)# partition L3V_P2 id 2
1. From the top menu bar, select Partition, then select Create.
In addition to the Create option, any existing L3V partitions are also shown.
2. On the Create Partitions screen, enter the partition name, partition ID, and application type. (For more information
about the application type, see “Enabling SLB or CGN in a Partition” on page 7.)
For more information about the fields in the GUI, refer to the GUI online help.
Each partition can be configured for either SLB or CGN applications, but not both. To specify, use the application-type
parameter:
3. Now that the admin has been successfully created, log in to the partition using admin account:
login as: admin-l3v1
Using keyboard-interactive authentication.
Password:
Last login: Thu Aug 30 19:47:08 2012 from 192.168.33.157
ACOS-Active[l3v1]> enable
Password:
ACOS-Active[l3v1]# config
ACOS-Active[l3v1](config)#
a. Configure a VLAN:
ACOS-Active[l3v1](config)# vlan 50
ACOS-Active[l3v1](config-vlan:50)# tagged ethernet 1
ACOS-Active[l3v1](config-vlan:60)# router-interface ve 50
ACOS-Active[l3v1](config-vlan:60)# exit
ACOS-Active[l3v1](config)# vlan 60
ACOS-Active[l3v1](config-vlan:60)# tagged ethernet 1
ACOS-Active[l3v1](config-vlan:60)# router-interface ve 60
ACOS-Active[l3v1](config-vlan:60)# exit
b. Configure VEs:
ACOS-Active[l3v1](config)# interface ve 50
ACOS-Active[l3v1](config-if:ve50)# ip address 50.50.50.1 /24
ACOS-Active[l3v1](config-if:ve50)# exit
ACOS-Active[l3v1](config)# interface ve 60
ACOS-Active[l3v1](config-if:ve60)# ip address 60.60.60.1 /24
ACOS-Active[l3v1](config-if:ve60)# exit
c. Configure a server:
ACOS-Active[l3v1](config)# slb server s1-l3v 60.60.60.20
ACOS-Active[l3v1](config-real server)# port 80 tcp
ACOS-Active[l3v1](config-real server-node port)# exit
d. Configure a service-group:
ACOS-Active[l3v1](config)# slb service-group s1-80 tcp
ACOS-Active[l3v1](config-slb svc group)# member s1-l3v 80
e. Configure a VIP:
ACOS-Active[l3v1](config)# slb virtual-server vip1 50.50.50.15
ACOS-Active[l3v1](config-slb vserver)# port 80 tcp
ACOS-Active[l3v1](config-slb vserver-vport)# service-group s1-80
ACOS-Active[l3v1](config-slb vserver-vport)# exit
ACOS-Active[l3v1](config-slb vserver)# exit
5. View your running configuration. Since you have created an L3V partition, you can see and configure Layer 3 network
resources, such as VLANs, VEs, and IP Addresses:
ACOS-Active[l3v1](config)# show running-config
!Current configuration: 596 bytes
!
!Configuration last updated at 20:03:00 PDT Thu Aug 30 2012
!
active-partition l3v1
vlan 50
tagged ethernet 1
router-interface ve 50
!
vlan 60
tagged ethernet 1
router-interface ve 60
!
!
interface ethernet 1
mtu 9216
!
interface ve 50
ip address 50.50.50.1 255.255.255.0
!
interface ve 60
!
slb server s1-l3v 60.60.60.20
port 80 tcp
!
slb service-group s1-80 tcp
member s1-l3v 80
!
slb virtual-server vip1 50.50.50.15
port 80 tcp
name _50.50.50.15_TCP_80
service-group s1-80
[OK]
The following commands log onto the CLI and access partition dmz2:
The following command displays the list of Ethernet interfaces. The interfaces that belong exclusively to partition dmz1 are
not included. Interface 1 is listed, since it is a tagged member of dmz1’s VLAN. However, interface 2 is not listed, since it is an
untagged member of dmz1’s VLAN. Likewise, dmz1’s VE is not listed.
The following commands configure Layer 3 resources for partition dmz2, and list the interfaces:
The following commands again log onto the CLI and access partition dmz1, and display the list of Ethernet interfaces. Ether-
net 3 is not listed since it now belongs exclusively to partition dmz2.
The following commands log onto the CLI with Read Write admin access, and display the list of Ethernet interfaces in the
shared partition. All physical Ethernet interfaces are listed, including those belonging to individual partitions. The VEs
belonging to other partitions are not listed.
Below are some common reasons for enabling inter-partition routing capabilities:
• To allow the shared partition to route traffic downstream to the real servers via the L3V partitions.
• To allow incoming traffic destined for a L3V partition with SLB information to bypass the shared partition (since it
does not contain SLB configuration) and to be redirected to the L3V partition that is specified.
• To provide multiple L3V partitions, containing independent routing tables, with the ability to look up routing entries
in the shared partition’s routing table (by treating the shared partition as the next hop within the device.)
• To operate in conjunction with VRRP-A for route lookups in the Forwarding Information Base (FIB) tables.
This feature can be enabled successfully to route traffic between the shared and private partitions provided the following
requirements are met:
• Inter-partition routing is only provided for IPv4 addresses. Currently, no IPv6 address support is provided.
• L3V partitions do not have duplicate IP Addresses across all partitions. If duplicate addresses are discovered, they will
not be logged.
• If there are any overlapping real servers across partitions, NAT must be configured.
• Traffic must be received on the physical ingress port in the shared partition only.
• Static routes can forward traffic from the shared partition to VIP in an L3V partition.
The ip slb-partition-redirect command enables the support on the ingress Ethernet data port that will receive the
traffic addressed to the VIP in the private partition. Then, use the ip route command to add the static route whose destina-
tion is the network address configured in the private partition. Then, change the CLI session to the private partition (in this
example, p69, and configure a static default route back to the shared partition.
• Configure the specific route to the downstream real server via a private partition or to the VIPs in the private partition.
• Optionally, If you wish to enable forwarding of pass through (non-SLB) traffic, configure the ability to redirect traffic
arriving on an incoming interface to be redirected to a private partition, bypassing the shared partition.
Packets destined for the downstream real server will be forwarded using this route:
In the following example, the default route to reach the real server (10.15.0.0) from the shared partition will traverse via an
L3V partition (in this example, “partition a”). Packets destined for the downstream real server will be directed using this route:
Verify your configuration using the show ip route command. In this output, you can see that the real server 10.15.0.0/24
is accessible “via partition a”:
You can also verify your configuration using the show ip fib command. In this command, you see that “partition a” is the
nexthop to the network address to which the VIP belongs, 10.15.0.0.
The configuration is applied to the specified physical interface, virtual interface, or trunk at the interface configuration level.
In the following example, the ip slb-partition-redirect command will apply to the virtual interface (ve21) in the
shared partition. The IP Address 10.11.0.1 /24 indicates the IP Address of the incoming virtual interface.
ACOS(config)# interface ve 21
ACOS(config-if:ve:21)# ip address 10.11.0.1 /24
ACOS(config-if:ve:21)# ip slb-partition-redirect
Verify your virtual interface configuration to see if you have successfully redirected traffic destined for the specified incoming
interface downstream:
• Optionally, configure SLB in the L3V partition, if you have not already done so.
NOTE: The current release does not provide support for outbound source NAT for pass through
traffic.
Change the CLI session to the L3V partition, and configure a static default route back to the shared partition:
Packets destined upstream from the L3V partition will use the configured static route and will be sent out the specified out-
going interface:
Ensure that you have SLB running and VIPs configured in your L3V partition before you configure a static route to the VIP.
Configure the default route to the shared partition from the L3V partition:
Verify your configuration using the show ip route command. Look at the route that shows that 0.0.0.0/0 is accessible “via
partition shared”:
Verify your partition SLB configuration using the show run | sec slb command and display the SLB configuration sec-
tion:
Having configured the static route in the L3V partition and the shared partition, and having configured SLB redirect capabili-
ties on the shared partition, the inter-partition routing feature is now functional.
• If port-ovearload is configured in the shared partition and EIM/EIF is configured in an L3V partition, EIM/EIF will take
effect for inter-partition traffic.
• If EIM/EIF is configured in the shared partition and port-overload is configured in an L3V partition, then neither EIM/
EOF nor port-overload will take effect for inter-partition traffic.
This chapter describes the commands used to configure Application Delivery Partitions (ADPs).
active-partition
Description Switch to a different Application Delivery Partition (ADP) on your ACOS device.
Parameter Description
partition-name Name of the RBA or L3V partition you want to switch to.
shared The shared partition.
Usage Root admins or admins with Global read or Global write privileges can select the partition to
view. When an admin with one of these privilege levels logs in, the view is set to the shared
partition by default, which means all resources are visible.
Example The following command changes the view to private partition “companyA”:
• application-type
• partition
• partition-group
application-type
Description Configure the shared partition for either SLB or CGN applications.
Default All CLI commands for the prompt level are accessible until either the adc or cgnv6 option is
specified. After that, commands from the other are no longer available.
partition
Description Configure an L3V private partition.
Parameter Description
partition-name Specifies the name of the private partition, 1-14 characters.
id num Assigns an ID to the partition. The partition ID ensures that a
partition’s configuration remains consistent across devices in
multi-device deployments (for example, VRRP-A or aVCS).
The partition ID can be 1-127.
application-type Specifies whether this L3V partition will be used to configure
{adc | cgnv6} SLB or CGN applications. Once one is specified, commands
and options from the other are not longer accessible in the
partition.
You can change the application type at any time as long as
you have not configured the partition specifically for SLB or
CGN. Once you do, you must remove all such configuration
before being allowed to change the application type.
Default The ACOS device has a shared partition but no L3V partitions by default.
Usage To use this command, you must be logged in with an admin account that has Global write
privileges.
If you delete a partition, resources associated with the partition are permanently deleted.
This includes SSL certificates and keys, and aFleX scripts. These resources are deleted even if
you reload or reboot without saving the configuration. In this case, the partition
configuration is restored but the resources are still gone.
Example The following commands configure two partitions, “companyA” (used for SLB configuration)
and “companyB” (used for CGN configuration):
To change the “companyB” partition so that it can be used for SLB configuration, issue the
same command and replace cgnv6 with adc:
This is valid as long as you do not make any SLB-specific or CGN-specific configuration inside
the partition. Once you do, you must remove all such configuration before you will be
allowed to change the application type of the partition.
The no partition command unloads the partition but keeps the configuration on your
system. To perform a hard delete of the partition and associated configuration, you must also
use the delete partition command.
partition-group
Description Create a named set of partitions.
Replace group-name with the name of the group for the set of partitions.
This command changes the CLI to the configuration level for the group, where the following
command is available.
Parameter Description
member partition-name Adds a partition to the group.
You can specify one partition name on the command
line. To add additional partitions re-enter the command
for each partition.
Default None.
Example The following example creates a group called “slbgroup” and adds the L3V partition “compa-
nyA” as a member:
• show active-partition
• show partition
• show partition-config
• show partition-group
show active-partition
Description Show the active partition currently being managed by the CLI.
Mode All
Example The following command shows that the partition currently being managed by the CLI ses-
sion is the shared partition:
show partition
Description Show the L3V partitions configured on the ACOS device.
Parameter Description
all View all partitions on the device, both active and inactive.
Without this option, only active partitions are displayed in the
output.
available-id View the IDs available for partition creation.
Since partition ID mapping remains with a partition for the life-
time of the partition, this option is useful to view which IDs
remain available on the system for the creation of a new partition.
port-ownership View the port ownership information for each partition on the
device. The output provides information about which ports are in
use by which partitions.
Mode All
Usage To use this command, you must be logged in with an admin account that has root, Global
read, or Global write privileges.
Example The following command all active partitions configured on an ACOS device:
Field Description
Total Number of active partitions Number of partitions configured and being used on the system.
Total partitions allowed Maximum number of partitions the ACOS device can have.
Partition Name Name of the L3V partition.
Id ID of the L3V partition.
App Type Application type configured for the partition.
For more information, see the application-type command.
Admin Count Number of admins configured for the partition.
show partition-config
Description View the running-config for all partitions, or a specific L3V partition on the system.
This command replaces the show configuration command from previous releases.
Parameter Description
all View the running-config for all partitions on the system. This is the
default option if no specific partition is specified.
shared View the running-config for the shared partition only.
name View the running-config for the specified L3V partition only.
Mode All
Example The example below shows how to view the running-config for partition “companyB” (trun-
cated for brevity):
show partition-group
Description Show configured L3V partition groups.
Mode All