EXOS Command Reference 30 5
EXOS Command Reference 30 5
EXOS Command Reference 30 5
9036501-00 Rev AA
February 2020
Copyright © 2020 Extreme Networks, Inc. All rights reserved.
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks
This guide is intended for use by network administrators who are responsible for installing and setting
up network equipment. In addition to comprehensive conceptual information about each feature of our
software, you will also find detailed configuration material, helpful examples, and troubleshooting
information. Also included are supported platforms and recommended best practices for optimal
software performance.
Note
If the information in the release notes shipped with your switch differs from the information in
this guide, follow the release notes.
Conventions
This section discusses the conventions used in this guide.
Text Conventions
The following tables list text conventions that are used throughout this guide.
New! New Content Displayed next to new content. This is searchable text within
the PDF.
Platform-Dependent Conventions
Unless otherwise noted, all information applies to all platforms supported by ExtremeXOS software,
which are the following:
• ExtremeSwitching® switches
• SummitStack™
When a feature or feature implementation applies to specific platforms, the specific platform is noted in
the heading for the section describing that implementation in the ExtremeXOS command
documentation (see the Extreme Documentation page at www.extremenetworks.com/
documentation/). In many cases, although the command is available on all platforms, each platform
uses specific keywords. These keywords specific to each platform are shown in the Syntax Description
and discussed in the Usage Guidelines sections.
Terminology
When features, functionality, or operation is specific to a switch family, such as ExtremeSwitching, the
family name is used. Explanations about features and operations that are the same across all product
families simply refer to the product as the switch.
Related Publications
ExtremeXOS Publications
• ACL Solutions Guide
• ExtremeXOS 30.5 Command Reference Guide
• ExtremeXOS 30.5 EMS Messages Catalog
• ExtremeXOS 30.5 Feature License Requirements
• ExtremeXOS 30.5 User Guide
• ExtremeXOS Quick Guide
• ExtremeXOS Legacy CLI Quick Reference Guide
• ExtremeXOS Release Notes
• Extreme Hardware/Software Compatibility and Recommendation Matrices
• Switch Configuration with Chalet for ExtremeXOS 21.x and Later
• Using AVB with Extreme Switches
Providing Feedback to Us
Quality is our first concern at Extreme Networks, and we have made every effort to ensure the accuracy
and completeness of this document. We are always striving to improve our documentation and help
you work better, so we want to hear from you! We welcome all feedback but especially want to know
about:
• Content errors or confusing or conflicting information.
• Ideas for improvements to our documentation so you can find the information you need faster.
• Broken links or usability issues.
If you would like to provide feedback to the Extreme Networks Information Development team, you can
do so in two ways:
• Use our short online feedback form at https://www.extremenetworks.com/documentation-
feedback/.
• Email us at [email protected].
Please provide the publication title, part number, and as much detail as possible, including the topic
heading and page number if applicable, as well as your suggestions for improvement.
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
Extreme Portal
Search the GTAC (Global Technical Assistance Center) knowledge base, manage support cases and
service contracts, download software, and obtain product licensing, training, and certifications.
The Hub
A forum for Extreme Networks customers to connect with one another, answer questions, and share
ideas and feedback. This community is monitored by Extreme Networks employees, but is not
intended to replace specific guidance from GTAC.
Call GTAC
For immediate support: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the
support phone number in your country, visit: www.extremenetworks.com/support/contact
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number and/or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any action(s) already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
1. Go to www.extremenetworks.com/support/service-notification-form.
2. Complete the form with your information (all fields are required).
3. Select the products for which you would like to receive notifications.
Note
You can modify your product selections or unsubscribe at any time.
4. Click Submit.
This guide provides details of the command syntax for all ExtremeXOS commands in this ExtremeXOS
version.
The guide does not provide feature descriptions, explanations of the technologies, or configuration
examples. For information about the various features and technologies supported by Extreme Networks
switches, see the ExtremeXOS 30.5 User Guide.
Related commands are grouped together and organized into chapters based on their most common
usage. The chapters reflect the organization of the ExtremeXOS 30.5 User Guide. If a specific command
is relevant to a wide variety of functions and could be included in a number of different chapters, we
have attempted to place the command in the most logical chapter. Within each chapter, commands
appear in alphabetical order.
Product Overview
This table lists the Extreme Networks products that run the ExtremeXOS software.
Starting with v21.1, ExtremeXOS does not support chassis products. Many features that are new in
ExtremeXOS v21.1 and later are not supported in ExtremeXOS v16.x and will not run on chassis
platforms. For information about chassis products, see the applicable ExtremeXOS v16.x
documentation.
Software Required
For information about which ExtremeXOS software version is required for each hardware switch model,
see Extreme Hardware/Software Compatibility and Recommendation Matrices.
The features available on each switch are determined by the installed feature license and optional
feature packs. For more information, see the ExtremeXOS 30.5 Feature License Requirements
document.
Access Levels
When entering a command at the prompt, ensure that you have the appropriate privilege level.
Most configuration commands require you to have the administrator privilege level.
Syntax Symbols
You may see a variety of symbols shown as part of the command syntax.
These symbols explain how to enter the command, and you do not type them as part of the command
itself. The following table summarizes command syntax symbols.
Note
ExtremeXOS software does not support the ampersand (&), left angle bracket (<), or right
angle bracket (>) because they are reserved characters with special meaning in XML.
Syntax Helper
The CLI has a built-in syntax helper. If you are unsure of the complete syntax for a particular command,
enter as much of the command as possible, and then press:
• [Tab]— Auto-completes the command if there is a unique match. If there is a partial match, auto-
completes to the nearest match, and then lists the available options.
• ?—provides a list of options for the entered command.
If you enter an invalid command, the syntax helper notifies you of your error, and indicates where the
error is located.
If the command is one where the next option is a named component (such as a VLAN (Virtual LAN),
access profile, or route map), the syntax helper also lists any currently configured names that might be
used as the next option. In situations where this list is very long, the syntax helper lists only one line of
names, followed by an ellipsis (...) to indicate that there are more names that can be displayed.
Abbreviated Syntax
Abbreviated syntax is the shortest unambiguous allowable abbreviation of a command or parameter.
Typically, this is the first three letters of the command.
When using abbreviated syntax, you must enter enough characters to make the command
unambiguous and distinguishable to the switch. If you do not enter enough letters to allow the switch to
determine which command you mean, the syntax helper provides a list of the options based on the
portion of the command you have entered.
Object Names
All named components within a category of the switch configuration, such as VLAN, must be given a
unique object name.
Object names must begin with an alphabetical character and may contain alphanumeric characters and
underscores ( _ ), but they cannot contain spaces. The maximum allowed length for a name is 32
characters.
Object names can be reused across categories (for example, STPD (Spanning Tree Domain) and VLAN
names). If the software encounters any ambiguity in the components within your command, it
generates a message requesting that you clarify the object you specified.
Note
If you use the same name across categories, Extreme Networks recommends that you specify
the identifying keyword as well as the actual name. If you do not use the keyword, the system
may return an error message.
Reserved Keywords
Keywords such as vlan, STP (Spanning Tree Protocol), and other 2nd level keywords, are determined to
be reserved keywords and cannot be used as object names. This restriction applies to the specific word
(vlan) only, while expanded versions (vlan2) can be used.
A complete list of the reserved keywords for ExtremeXOS 12.4.2 and later software is found in the
“Reserved Keywords” section of the ExtremeXOS 30.5 User Guide. Any keyword that is not on this list
can be used as an object name. Prior to 12.4.2, all keywords were reserved, that is, none of them could
be used for naming user-created objects such as VLANs.
Command Shortcuts
Components are typically named using the create command.
When you enter a command to configure a named component, you do not need to use the keyword
of the component. For example, to create a VLAN, enter a VLAN name:
create vlan engineering
Once you have created the VLAN with a unique name, you can then eliminate the keyword vlan
from all other commands that require the name to be entered (unless you used the same name for
another category such as STPD or EAPS (Extreme Automatic Protection Switching)).
Port Numbering
Commands that require you to enter one or more port numbers use the parameter port_list in the
syntax.
Note
The keyword all acts on all possible ports; it continues on all ports even if one port in the
sequence fails.
Separate the port numbers by a dash to enter a range of contiguous numbers, and separate the
numbers by a comma to enter a range of non-contiguous numbers:
• x-y—Specifies a contiguous series of ports on a stand-alone switch.
• x,y—Specifies a non-contiguous series of ports on a stand-alone switch.
• x-y,a,d—Specifies a contiguous series of ports and a non-contiguous series of ports on a stand-alone
switch.
For example, if there is a switch in slot 2 of the stack with a total of four ports, the following ports are
valid:
• 2:1
• 2:2
• 2:3
• 2:4
You can also use wildcard combinations (*) to specify port combinations.
Line-Editing Keys
Table 5 describes the line-editing keys available using the CLI.
Command History
ExtremeXOS "remembers" all the commands you enter.
You can display a list of these commands by using the following command:
history
If you use a command more than once, consecutively, the history will list only the first instance.
rm on page 2374
rmdir on page 2376
rtlookup rpf on page 2377
rtlookup on page 2378
run diagnostics on page 2379
run elrp on page 2381
run failover on page 2383
run script on page 2384
run tech-support report on page 2385
run update on page 2387
run upm profile on page 2388
run vm-tracking repository on page 2389
save configuration on page 2389
save configuration as-script on page 2392
save configuration automatic on page 2393
save debug tracefiles memorycard on page 2395
save var key on page 2396
save vm image on page 2397
scp2 on page 2398
set var on page 2401
show access-list on page 2402
show access-list configuration on page 2404
show access-list counter on page 2406
show access-list counters process on page 2407
show access-list dynamic rule on page 2408
show access-list dynamic counter on page 2409
show access-list dynamic on page 2410
show access-list interface on page 2411
show access-list meter on page 2413
show access-list network-zone on page 2415
show access-list usage acl-mask port on page 2416
show access-list usage acl-range port on page 2417
show access-list usage acl-rule port on page 2417
show access-list usage acl-slice port on page 2419
show access-list width on page 2420
show accounts on page 2421
show accounts password-policy on page 2423
show auto-peering on page 2424
show auto-provision on page 2426
show avb on page 2427
show bandwidth pool on page 2428
show banner on page 2429
alias
alias alias_name command
Description
Creates aliases to execute any ExtremeXOS command, including any options, arguments, and
redirection.
Syntax Description
alias_name Specifies an alias name for the command.
command ExtremeXOS command that you are creating an alias for.
Default
N/A
Usage Guidelines
To be recognized, the alias must be the first word in the string typed at the shell prompt. Substitution
does not occur if the alias name string occurs anywhere else. Aliases are only recognized by the EXSH
shell session in which they are created.
Executing the command alias (with no other arguments) displays a list of current aliases. Executing
the command alias alias_name displays the command that will be substituted for alias_name.
After an alias has been created, you can auto-complete the alias name or display possible aliases along
with regular commands by pressing the TAB key. You can tab-complete arguments that follow
commands corresponding to an alias.
Creating an alias using the name of an existing ExtremeXOS command overrides the original meaning
of that command. For example, executing alias download "download image 102.3.10.5"
allows you to simply type download image_name to download your ExtremeXOS image from the
102.3.10.5 location . However, if you then want to download a bootrom file, the command download
bootrom 102.3.10.5filename no longer functions correctly. Such an alias can be disabled
temporarily and the original command behavior restored by preceding it directly (with no spaces in
between) with a backslash, \download bootrom 102.3.10.5filename This temporarily
overrides the alias definition and uses the original command.
To create an alias for a command that contains quoted strings within it, use a backslash. For example, if
creating an alias "cr" for the command configure vlan default description "This is
the default VLAN", use the command alias cr "configure vlan default
description \"This is the default VLAN\"".
Aliases are only available in the shell session in which they are created. When you exit the shell your
aliases are lost. To create persistent aliases, you need to add the aliases to the script exshrc.xsf that
you must create using the VI editor and save in the /usr/local/cfg folder.
Example
The following example creates an alias named "set" for configure commands:
alias set "configure"
You can now substitute the command set for all configure commands. For example, you can type
set vlan vlan_name tag tag instead of configure vlan vlan_name tag tag.
The following example creates an alias named "mycmd" to substitute for the configure policy
profile command with the following arguments:
alias mycmd "configure policy profile 1 name Extreme pvid 1000 pvid-status enable tci-
overwrite enable auth-override enable forbidden-vlans 2 cos-status enable cos 2 untagged-
vlans 2 egress-vlans 200"
Typing mycmd now executes the command configure policy profile 1 name Extreme
pvid 1000 pvid-status enable tci-overwrite enable auth-override enable
forbidden-vlans 2 cos-status enable cos 2 untagged-vlans 2 egress-vlans
200
History
This command was first available in ExtremeXOS 22.3
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
cd
cd directory_name
Description
Changes the current working directory to the directory of the specified file system or relative to the
current working directory.
Syntax Description
cd Change current working directory.
directory_name Pathname of a directory.
Default
N/A.
Usage Guidelines
Use this command to change the current working directory to the directory of the specified file system.
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the syntax of the specified policy attribute.
Syntax Description
attr Specifies the attribute check.
Default
N/A.
Usage Guidelines
Use this command to display the syntax of policy attributes. The command displays any additional
keywords to use with this attribute, and the types of values expected.
Policy attributes are used in the rule entries that make up a policy file.
For each attribute, this command displays which applications use the attribute, and whether the
attribute is a match condition or a set (action, action modifier) condition.
The syntax display does not show the text synonyms for numeric entries. For example, the icmp-type
match condition allows you to specify either an integer or a text synonym for the condition. Specifying
icmp-type 8 or icmp-type echo-request are equivalent, but the syntax display shows only the numeric
option.
Note
The syntax displayed is used by the policy manager to verify the syntax of policy files. The
individual applications are responsible for implementing the individual attributes. Inclusion of
a particular policy attribute in this command output does not imply that the attribute has
been implemented by the application. See the documentation of the particular application for
detailed lists of supported attributes.
Example
The following example displays the syntax of the policy attribute icmp-type:
check policy attribute icmp-type
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
check policy
check policy policy-name {access-list}
Description
Checks the syntax of the specified policy.
Syntax Description
policy-name Specifies the policy to check.
access-list Specifies that an access list specific check is performed.
Default
N/A.
Usage Guidelines
Use this command to check the policy syntax before applying it. If any errors are found, the line number
and a description of the syntax error are displayed. A policy that contains syntax errors will not be
applied.
This command can only determine if the syntax of the policy file is correct and can be loaded into the
policy manager database. Since a policy can be used by multiple applications, a particular application
may have additional constraints on allowable policies.
Example
The following example checks the syntax of the policy zone5:
check policy zone5
History
This command was available in ExtremeXOS 10.1.
The success message and the access-list keyword was added in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the specified access list counters.
Syntax Description
dynamic Specifies that the counter is from a dynamic ACL.
countername Specifies the ACL counter to clear.
any Specifies the wildcard ACL.
Default
The default direction is ingress; the default ACL type is non-dynamic.
Usage Guidelines
Use this command to clear the ACL counters. If you do not specify an interface, or the any option, you
will clear all the counters.
Example
The following example clears all the counters of the ACL on port 2:1:
clear access-list counter port 2:1
The following example clears the counter counter2 of the ACL on port 2:1
clear access-list counter counter2 port 2:1
History
This command was first available in ExtremeXOS 10.1.
The egress and dynamic options were first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the specified access list meters.
Syntax Description
meter_name Specifies the ACL meter to clear.
any Clear the meter applied to wildcard, including all VLANs and all ports.
ports Clear the meter applied to a specific port list.
port_list Specifies to clear the counters on these ports.
vlan Clear the meter applied to a specific VLAN.
vlan_name Specifies to clear the counters on the VLAN.
Default
N/A.
Usage Guidelines
Use this command to clear the out-of-profile counters associated with the meter configuration.
Example
The following example clears all the out-of-profile counters for the meters of the ACL on port 2:1:
clear access-list meter port 2:1
The following example clears the out-of-profile counters for the meter meter2 of the ACL on port 2:1:
clear access-list meter meter2 port 2:1
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Re-enables an account that has been locked out (disabled) for exceeding the permitted number failed
login attempts. This was configured by using the configure account [all | name]
password-policy lockout-on-login-failures [on | off] command.
Syntax Description
all Specifies all users.
name Specifies an account name.
Default
N/A.
Usage Guidelines
This command applies to sessions at the console port of the switch as well as all other sessions.
You can re-enable both user and administrative accounts, once they have been disabled for exceeding
the 3 failed login attempts.
Note
The failsafe accounts are never locked out.
This command only clears the locked-out (or disabled) condition of the account. The action of locking
out accounts following the failed login attempts remains until you turn it off by issuing the configure
account [all | name] password-policy lockout-on-login failures off
command.
Example
The following command re-enables the account finance, which had been locked out (disabled) for
exceeding 3 consecutive failed login attempts:
clear account finance lockout
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears flap statistics for routes to specified neighbors.
Syntax Description
all Specifies flap statistics for all routes.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP
(Border Gateway Protocol) neighbor.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3
VPN support.
rd_value Specifies the Route Distinquisher (RD) value for
the Layer 3 VPN routes for which you want to clear
flap statistics.
no-advertise Specifies the no-advertise community attribute.
no-export Specifies the no-export community attribute.
no-export-subconfed Specifies the no-export-subconfed community
attribute.
community_num Specifies a community number.
AS_Num Specifies an autonomous system ID (0-65535).
Num Specifies a community number.
any Specifies all routes with a given or larger mask
length.
netMaskLen Specifies a subnet mask length (number of bits).
networkPrefixFilter Specifies an IP address and netmask.
exact Specifies an exact match with the IP address and
subnet mask.
Default
If no address family is specified, IPv4 unicast is the default.
Note
You must specify an IPv6 address family for an IPv6 peer, because an IPv6 peer does not
support the default IPv4 unicast address family. Similarly, if you specify an IPv4 peer and an
address family in the command, an IPv4 address family must be specified.
Usage Guidelines
Use this command to clear flap statistics for a specified BGP neighbor.
The option network any / netMaskLen clears the statistics for all BGP routes whose mask length is
equal to or greater than maskLength, irrespective of their network address.
The option network any / netMaskLen exact clears the statistics for all BGP routes whose mask
length is exactly equal to maskLength, irrespective of their network address.
To clear flap statistics on Layer 3 VPNs, you must configure this feature in the context of the MPLS
(Multiprotocol Label Switching)-enabled VR; this feature is not supported for BGP routes on the CE
(VRF) side of the PE router.
Example
The following command clears the flap statistics for a specified neighbor:
clear bgp neighbor 10.10.10.10 flap-statistics all
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Resets the BGP counters for one or all BGP neighbor sessions to zero.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a specific BGP neighbor.
all Specifies that counters for all BGP neighbors should be reset.
Default
N/A.
Usage Guidelines
This command resets the following counters:
• In-total-msgs
• Out-total-msgs
• In-updates
• Out-updates
• FsmTransitions
The command clear counters also resets all counter for all BGP neighbors. For BGP, the clearcounters
command is equivalent to the following BGP command:
clear bgp neighbor all counters
Example
The following command resets the counters for the BGP neighbor at 10.20.30.55:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears information about a snooped IPv6 delegate prefix on a VLAN or all VLANs.
Syntax Description
ipv6_prefix Specifies a snooped IPv6 prefix (/prefix length) delegated via DHCP
(Dynamic Host Configuration Protocol) to clear.
ipv6-prefix all Clears all snooped IPv6 prefixes delegated via DHCP.
vlan_name Specifies a VLAN.
vlan all Clears all snooped IPv6 prefixes delegated via DHCP on all VLANs.
Default
N/A
Usage Guidelines
You can clear a specific snooped IPv6 delegated prefix. You can also clear all snooped IPv6 delegated
prefixes on a specific VLAN or on all VLANs.
Example
The following example clears information about all snooped IPv6 delegat prefixes on all VLANs.
clear bootprelay ipv6 prefix-delegation snooping ipv6-prefix all vlan all
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the CDP counter statistics.
Syntax Description
ports Specifies the ports to clear.
ports_list Specifies the port list.
Default
N/A.
Usage Guidelines
Use this command to clear the CDP counter statistics.
Example
The following example clears the CDP ports counters:
clear cdp counters
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the CDP neighbor information.
Syntax Description
device id Specifies the Device Identifier to be used in CDP.
device_id Specifies the Device Identifier of neighbor.
all Specifies all CDP neighbors.
Default
N/A.
Usage Guidelines
Use this command to clear the CDP neighbor information.
Example
The following command clears all CDP neighbor associations:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
clear counters
clear counters
Description
Clears all switch statistics and port counters, including port packet statistics, bridging statistics, IP
statistics, and log event counters.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
You should view the switch statistics and port counters before you clear them. Use the show ports
command to view port statistics. Use the show log counters command to show event statistics.
The CLI also provides a number of options that you can specify with the clear counters command. If you
specify an option, the switch only clears the statistics for that option. For example, if you want to clear,
reset only the STP (Spanning Tree Protocol) statistics and counters, use the clear counters stp
command. For more detailed information about those commands, see the specific chapter in the
ExtremeXOS 30.5 User Guide.
Viewing and maintaining statistics on a regular basis allows you to see how well your network is
performing. If you keep simple daily records, you will see trends emerging and notice problems arising
before they cause major network faults. By clearing the counters, you can see fresh statistics for the
time period you are monitoring.
Note
For the ENTERASYS-POLICY-PROFILE-MIB, the clear counters command does not clear
counter32.
Example
The following command clears all switch statistics and port counters:
clear counters
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the counters associated with BFD specific settings.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to clear the counters in the BFD session or interface (VLAN). If neither session or
interface are specified, the command clears all counters in BFD.
Example
The following command clears all counters in BFD:
# clear counters bfd
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command clears the bfd missed hellos counters.
Syntax Description
session-id Clear counters for sessions having session ID within the given range.
first Only or first of range of session ID.
last Last of range of session ID .
neighbor Neighbor address.
ipaddress Specify IPv4 or IPv6 destination address.
vr Virtual router.
vrname Virtual router name.
all All virtual routers.
current Clear only current set of bins.
history Clear only historical set of bins.
both Clear both current set and historical set of bins.
Default
Current.
Usage Guidelines
Sessions can be cleared by specifying neighbor IP, by specifying range of session IDs or by specifying
VR name. In addition, current bins and historical bins can be cleared separately. These options would
help resetting one particular session/bin while tests can run in other sessions/bins.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command clears both frame-delay and frame-loss information for all existing segments.
Syntax Description
N/A.
Default
N/A.
Usage Guidelines
Use this command to clear both frame-delay and frame-loss information for all existing segments.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears only frame-delay information for all existing segments.
Syntax Description
N/A.
Default
N/A.
Usage Guidelines
Use this command to clear only frame-delay information for all existing segments.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears only frame-loss information for all existing segments.
Syntax Description
N/A.
Default
N/A.
Usage Guidelines
Use this command to clear only frame-loss information for all existing segments.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears only frame-delay information for segment with given segment name.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to clear only frame-delay information for segment with given segment name.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears only frame-loss information for the given MEP in segment with given segment
name.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to clear only frame-loss information for the given MEP in segment with given
segment name.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears only frame-loss information for segment with given segment name for all
associated MEPs.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to clear only frame-loss information for segment with given segment name for all
associated MEPs.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears both frame-delay and frame-loss information for segment with given segment
name.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to clear both frame-delay and frame-loss information for segment with given
segment name.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears counters for current or historical cfm session missed-hellos.
Syntax Description
domain_name IEEE 802.1ag Domain name
association_name IEEE 802.1ag or ITU-T Y.1731 Association name
ports Specify ports to clear counters.
port_list List of ports to clear counters.
end-point Specify MEPs (Maintenance association End Point) to clear counters.
up End point is up.
down End point is down.
current Clear only current set of bins.
history Clear only historical set of bins.
both Clear both current and historical set of bins.
Default
Current.
Usage Guidelines
None.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the counters associated with EDP (Extreme Discovery Protocol).
Syntax Description
ports Specifies one or more ports or slots and ports.
Default
If you do not specify a port, the EDP counters will be cleared for all ports.
Usage Guidelines
This command clears the following counters for EDP protocol data units (PDUs) sent and received per
EDP port:
• Switch PDUs transmitted.
• VLAN PDUs transmitted.
• Transmit PDUs with errors.
• Switch PDUs received.
• VLAN PDUs received.
• Received PDUs with errors.
Example
The following command clears the EDP counters on all ports:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clear statistics on the specified ERPS (Ethernet Ring Protection Switching) ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
Default
N/A.
Usage Guidelines
Use this command to clear statistics on the specified ERPS ring.
Example
The following command clears statistics on the ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Clears all packet and byte counters for all MPLS LSPs and all MPLS protocol counters for all MPLS
interfaces.
Syntax Description
lsp all Clears all MPLS protocol counters for all MPLS LSPs.
vlan_name Clears all MPLS protocol counters for the MPLS interface on the
specified VLAN.
vlan all Clears all MPLS protocol counters for all MPLS interfaces.
Default
N/A.
Usage Guidelines
This command clears all packet and byte counters for all MPLS LSPs and all MPLS protocol counters for
all MPLS interfaces. If the lsp all keywords are specified, all packet and byte counters for all MPLS LSPs
are cleared. If the vlan all keywords are specified, all MPLS protocol counters for all MPLS interfaces are
cleared. If a VLAN name is specified, all MPLS protocol counters for the MPLS interface on that VLAN
are cleared.
Example
This example clears all MPLS counters associated with VLAN 1:
clear counters mpls vlan vlan_1
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support this feature as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears the event counters for the FDB (forwarding database) MAC-tracking feature.
Syntax Description
mac_addr Specifies a MAC address, using colon-separated bytes.
all Clears the counters for all tracked MAC addresses.
Default
N/A.
Usage Guidelines
The clear counters command also clears the counters for all tracked MAC addresses.
Example
The following example clears the counters for all entries in the MAC address tracking table:
Switch.1 # clear counters fdb mac-tracking all
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the identity management feature counters.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command clears the following identity management statistics counters:
• High memory usage level reached count
• Critical memory usage level reached count
• Max memory usage level reached count
• Normal memory usage level trap sent
• High memory usage level trap sent
• Critical memory usage level trap sent
• Max memory usage level trap sent
• Event notification sent
You can view these counters with the show identity-management statistics command.
Note
The clear counters command also clears these counters. The following counters relate to
active entries and are not cleared: Total number of users logged in, Total number of login
instances, and Total memory used.
Example
The following command clears the identity management feature counters:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears all the IPARP counters.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Example
This example clears all IPARP counters:
clear counters iparp
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears all the specified VPLS or VPWS counters.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
vpws_name Identifies the VPWS within the switch (character string).
all Specifies all VPLS or VPWS VPNs.
Default
N/A.
Usage Guidelines
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when clearing counters
for a VPWS. For backward compatibility, the l2vpn keyword is optional when clearing counters for a
VPLS. However, this keyword will be required in a future release, so we recommend that you use this
keyword for new configurations and scripts.
Example
This example clears all VPLS counters for the specified VPLS:
clear counters vpls myvpls
This example clears all VPWS counters for the specified VPWS:
clear counters l2vpn vpws myvpws
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support this feature as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears LDP control protocol counters and packet and byte counters associated with LDP LSPs.
Syntax Description
vlan_name Clears LDP control protocol counters on the specified VLAN.
vlan all Clears LDP control protocol counters on all MPLS interfaces.
lsp all Clears all LDP LSP packet and byte counters.
Default
N/A.
Usage Guidelines
By default, all LDP control protocol counters are cleared for all LDP interfaces and all byte counters.
Specifying the vlan keyword clears only the protocol counters associated with a specified LDP interface.
Specifying the lsp keyword clears only the packet and byte counters associated with LDP LSPs.
Example
This example clears all LDP control protocol counters and all packet and byte counters for all LDP LSPs:
clear counters mpls ldp
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support this feature as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears all packet and byte counters for all RSVP-TE LSPs and all RSVP-TE protocol counters for all MPLS
interfaces.
Syntax Description
lsp all Clears all packet and byte counters for all RSVP-TE LSPs.
vlan_name Clears all RSVP-TE protocol counters for the MPLS interface on the
specified VLAN.
vlan all Clears all RSVP-TE protocol counters on all MPLS interfaces.
Default
By default, all RSVP-TE control protocol counters are cleared for all RSVP-TE interfaces.
Usage Guidelines
This command clears all packet and byte counters for all RSVP-TE LSPs and all RSVP-TE protocol
counters for all MPLS interfaces. If the lsp all keywords are specified, all packet and byte counters for all
RSVP-TE LSPs are cleared. If the vlan all keywords are specified, all RSVP-TE protocol counters for all
MPLS interfaces are cleared. If a VLAN name is specified, all RSVP-TE protocol counters for the MPLS
interface on that VLAN are cleared.
Example
This example clears the RSVP-TE protocol counters on VLAN 1 only:
clear counters mpls rsvp-te vlan vlan_1
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support this feature as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears the packet and byte counters for one or all static LSPs.
Syntax Description
lsp_name Identifies the LSP for which counters are to be cleared.
all Specifies that counters are to be cleared for all static LSPs on this LSR.
Default
N/A.
Usage Guidelines
None.
Example
The following command clears the counters for a static LSP:
clear counters mpls static lsp lsp598
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support this feature as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears policy rule usage statistics.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command resets the counters on each rule to zero and clears the rule usage.
To see a list of used rules, use the port-hit option with the command show policy rule port-
hit {data} {detail} {wide}.
Example
The following example clears policy rule usage statistics:
# clear counters policy
# show policy rule port-hit
No entries found.
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the counters associated with the ports.
Syntax Description
ports Clears port-related statistics on specified ports or all ports in the
system.
port_list Port list for clear operation.
all All ports in the system.
Default
All ports.
Usage Guidelines
This command clears the counters for the ports, including the following:
• Statistics.
• Transmit errors.
• Receive errors.
• Collisions.
• Packets.
Note
If you use the clear counters command with no keyword, the system clears the counters for all
applications.
Example
The following example clears the counters on all ports:
clear counters ports all
History
This command was first available in ExtremeXOS 11.3.
This command was updated in ExtremeXOS 15.5 to include the port_list variable and the all
keyword.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears protocol filtering counters.
Syntax Description
port_list Specifies the port list is separated by a comma ( , ) or dash ( - ).
all Specifies all ports
Default
Disabled.
Usage Guidelines
Use this command to clear protocol filtering counters.
Example
The following example clears all protocol filtering counters:
clear counters ports protocol filter
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears, resets all STP statistics and counters.
Syntax Description
all Specifies all STP domain, port, and diagnostics counters.
diagnostics Specifies STP diagnostics counters.
domains Specifies STP domain counters.
ports Specifies STP port counters.
Default
N/A.
Usage Guidelines
If you do not enter a parameter, the result is the same as specifying the all parameter: the counters for
all domains, ports, and diagnostics are reset.
Enter one of the following parameters to reset the STP counters on the switch:
• all—Specifies the counters for all STPDs and ports, and clears all STP counters.
• diagnostics—Clears the internal diagnostic counters.
• domains—Clears the domain level counters.
• ports—Clears the counters for all ports and leaves the domain level counters.
Viewing and maintaining statistics on a regular basis allows you to see how well your network is
performing. If you keep simple daily records, you will see trends emerging and notice problems arising
before they cause major network faults. By clearing the counters, you can see fresh statistics for the
time period that you are monitoring.
Example
The following command clears all of the STP domain, port, and diagnostic counters:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears statistics (byte/packet counters) on a Virtual Network.
Syntax Description
all Clear all Virtual Network counters.
vn_name Clear counters only for the specified Virtual Network string.
Default
N/A.
Usage Guidelines
N/A.
Example
To clear statistics on an existing Virtual Network:
clear counters virtual-network vnet44
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2 standalone, and stacks with X670-G2
slots only.
Description
Use this command to clear statistics (byte/packet counters) on a Virtual Network remote endpoint.
Syntax Description
all Clear all remote endpoint counters.
ipaddress Clear counters for the specified remote endpoint IP address.
ipaddress A remote endpoint IP address.
Default
N/A.
Usage Guidelines
N/A.
Example
To clear statistics on an existing Virtual Network remote endpoint:
clear counters virtual-network remote-endpoint ipaddress vxlan 10.10.10.146
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X690, X670-G2, and X870 slots only.
Description
Clears all VPLS counters for the specified vpls_name.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string)
all Specifies all VPLS VPNs.
Default
N/A.
Usage Guidelines
This command clears all VPLS counters for the specified vpls_name. If the optional all keyword is
specified, all packet and byte counters for all VPLS VPNs are cleared.
Example
This example clears all VPLS counters for the specified VPLS:
clear counters vpls myvpls
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support this feature as described in in the
ExtremeXOS 30.5 Feature License Requirements document.
clear counters vr
clear counters {vr} vpn-vrf-name
Description
Clears statistics information for a VPN Virtual Routing and Forwarding instance (VPN VRF).
Syntax Description
vpn-vrf-name Specifies the name of a VPN VRF.
Default
N/A.
Usage Guidelines
This command can help to debug control path issues for a VPN VRF. Issuing a global XOS “clear
counter” command will also clear VRF counters. This command clears the following counters:
• Route add operation count.
• Route delete operation count.
• Routes dropped count.
Example
The following command clears the counters for VPN VRF red:
History
This command was first introduced in XOS Release 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears, resets all VRRP (Virtual Router Redundancy Protocol) statistics and counters.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRRP Router ID (VRID) for a VRRP instance. To display
the configured VRRP router instances, enter the show vrrp
command.
Default
N/A.
Usage Guidelines
Use this command to reset the VRRP statistics on the switch. Statistics are not reset when you disable
and re-enable VRRP.
If you do not enter a parameter, statistics for all VRRP VLANs are cleared.
If you specify only VLAN name, statistics for all VRRP VRIDs on that VLAN are cleared.
If you specify VLAN name and VRRP VRID, only statistics for that particular VRID are cleared.
Example
The following command clears the VRRP statistics on VRRP VLAN v1:
The following command clears the VRRP statistics for VRID 1 on VRRP VLAN v1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears weighted random early detection (WRED) statistics for all ports.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following example clears the WRED statistics for all ports:
# clear counters wred
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X450-G2, X460-G2, X670-G2, X435, X465, X590,
X620, X690, X870 series switches.
Description
Clears Explicit Congestion Notification (ECN) counters statistics for all ports.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Example
The following example clears ECN counter statistics for all ports:
# clear counters wred ecn
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on ExtremeSwitching X460-G2, X670, X435, X465, X590, X690, X870 series
switches.
Description
Clears the statistics counters.
Syntax Description
target Specifies an alpha numeric string that identifies the configured target.
Default
N/A.
Usage Guidelines
Use this command to unconfigure and reset all statistics counters.
Example
The following command clears all of the xml-notification statistics counters:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
clear cpu-monitoring
clear cpu-monitoring {process name}
Description
Clears, resets the CPU utilization history and statistics stored in the switch.
Syntax Description
name Specifies the name of the process.
Default
N/A.
Usage Guidelines
When you do not specify any keywords, this command clears the CPU utilization history for the entire
switch, including processes, and resets the statistics to zero (0).
When you specify process, the switch clears and resets the CPU utilization history for the specified
process.
Example
The following command resets the CPU history and resets statistics to 0 for the TFTP process running
on a switch:
# clear cpu-monitoring process tftpd
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the Domain Name System (DNS) cache entries.
Syntax Description
dns Domain Name System.
cache Specifies clearing the DNS cache.
Default
N/A.
Usage Guidelines
None.
Example
The following example clears the DNS cache:
# clear dns cache
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the Domain Name System (DNS) cache analytics entries for a virtual router (VR).
Syntax Description
dns Domain Name System.
cache Specifies the DNS cache.
analytics Specifies the DNS cache analytics.
entries Specifies clearing the analyzed DNS queries.
vr Specifies a VR on which to clear entries.
vr_name Specifies the VR name. If not specified, the VR of the current
command context is used.
Default
If not specified, by default the VR of the current command context is used.
Usage Guidelines
This command clears already analyzed DNS queries for a VR. If you do not clear entries with this
command, the entries are timed out based on the configured value in the command configure dns
cache analytics [{timeout minutes} {max-entries max_entries}]
Example
The following example clears the DNS cache analytics entries for the current VR:
# clear dns cache analytics entries
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears, resets the counters gathered by EAPS (Extreme Automatic Protection Switching) for all of the
EAPS domains and any EAPS shared ports configured on the switch.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to clear, reset the EAPS counters.
The counters continue to increment until you clear the information. By clearing the counters, you can
see fresh statistics for the time period you are monitoring.
To display information about the EAPS counters, use the following commands:
• show eaps counters —This command displays summary EAPS counter information.
• show eaps counters shared-port —If configured for EAPS shared ports, this command
displays summary EAPS shared port counter information.
Example
The following command clears, resets all of the counters for EAPS:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears and resets the ELRP counters.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
You should view the switch statistics before you delete the ELRP counters. Use the show log
counters command to display event statistics.
Viewing and maintaining statistics on a regular basis allows you to see how well your network is
performing. If you keep simple daily records, you will see trends emerging and notice problems arising
before they cause major network faults. By clearing the counters, you can see fresh statistics for the
time period that you are monitoring.
With hard-assisted ELRP, the request to clear ACL counters is sent from ELRP to the ACL manager, and
then to hardware one at a time. Since there is one ACL counter per VLAN port, it may take some time
for all of the counters to be cleared in hardware when multiple ACL counters are used. If you run the
clear elrp counters command before all counters are reset, the Pkts-Xmit statistics for some
VLANs might temporarily show the sum of partially cleared counters.
Example
The following command clears all switch statistics related to ELRP:
# clear elrp counters
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears one or more ELSM-enabled ports that are in the Down-Stuck state.
Syntax Description
port_list Specifies the ELSM-enabled ports that are permanently in the Down-
Stuck state.
Default
N/A.
Usage Guidelines
If you do not have automatic restart enabled, use this command to transition ELSM-enabled ports that
are permanently in the Down-Stuck state to the Down state. You can also use the enable elsm
ports port_list auto-restart command to transition a port from the Down-Stuck state to the
Down state.
For information about the ELSM-enabled ports states, see the command show elsm ports.
If automatic restart is enabled (this is the default behavior), automatic restart automatically transitions
the ports from the Down-Stuck state to the Down state. For more information, see the command enable
elsm ports auto-restart.
Example
The following command transitions the ports from the Down-Stuck state to the Down state:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the statistics gathered by ELSM for the specified ports or for all ports.
Syntax Description
port_list Specifies the ELSM-enabled ports for which ELSM statistics are being
cleared.
Default
N/A.
Usage Guidelines
You should view the ELSM statistics and counters before you clear them. To view ELSM-specific counter
information, use the show elsm ports all | port_list command. To view summary ELSM
information, including the ports configured for ELSM, use the show elsm command.
Use this command to clear only the ELSM-related counters. To clear all of the counters on the switch,
including those related to ELSM, use the clear counters command.
Viewing and maintaining statistics on a regular basis allows you to see how well your network is
performing. If you keep simple daily records, you will see trends emerging and notice problems arising
before they cause major network faults. By clearing the counter, you can see fresh statistics for the time
period you are monitoring.
Example
The following command clears the statistics gathered by ELSM for slot 2, ports 1-2:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the statistics gathered by ESRP (Extreme Standby Router Protocol) for all ESRP domains on the
switch.
Syntax Description
This command has no arguments or variables.
Default
None.
Usage Guidelines
Use this command to clear the state transition and the protocol packet counters gathered by ESRP.
The state transition count displays the number of times the ESRP domain entered the following states:
• Aware—An Extreme switch that does not participate in ESRP elections but is capable of listening to
ESRP Bridge Protocol Data Units (BPDUs).
• Master—The master switch is the device with the highest priority based on the election algorithm.
The master is responsible for responding to clients for Layer 3 routing and Layer 2 switching for the
ESRP domain.
• Neutral—The neutral state is the initial state entered by the switch. In a neutral state, the switch waits
for ESRP to initialize and run. A neutral switch does not participate in ESRP elections.
• PreMaster—The pre-master state is an ESRP switch that is ready to be master but is going through
possible loop detection prior to transitioning to master.
• Slave—The slave switch participates in ESRP but is not elected or configured the master and does
not respond to ARP requests but does exchange ESRP packets with other switches on the same
VLAN. The slave switch is available to assume the responsibilities of the master switch if the master
becomes unavailable or criteria for ESRP changes.
If the slave is in extended mode, it does not send ESRP hello messages; however, it sends PDUs that
can trigger a change in the master switch.
For more information about configuring the ESRP mode of operation on the switch, see the
configure esrp mode [extended | standard] command. By default, ESRP operates in
extended mode.
To display information about the ESRP domain, including the previously described states, use the show
esrp { {name} | {type [vpls-redundancy | standard]} } command.
The protocol packet count displays the number of times ESRP, ESRP-aware, and ESRP error packets
were transmitted and received.
To display information about the ESRP counters, use the show esrp {name} counters command.
Example
The following command clears the statistics gathered by ESRP:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the neighbor information for the specified ESRP domain.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
Default
N/A.
Usage Guidelines
If you add a new switch to your ESRP domain, use this command to clear the existing neighbor
information for the ESRP domain. After the switch is up, running, and configured as an ESRP-aware or
ESRP-enabled device, new neighbor information is learned.
Before using this command, schedule a downtime for your network. Use this command for maintenance
purposes only.
Example
The following example clears the existing neighbor information on the ESRP domain esrp1 after adding
a new switch to the ESRP domain:
clear esrp esrp1 neighbor
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the stickiness in the ESRP domain and forces the election of the ESRP master switch.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
Default
N/A.
Usage Guidelines
Use the clear esrp sticky command to force the election of the ESRP master switch. Before
using this command, schedule a downtime for your network.
For example, without stickiness configured, if an event causes the ESRP master to failover to the
backup, the previous backup becomes the new master. If another event causes the new master to
return to backup, you have experienced two network interruptions. To prevent this, use the configure
esrp election-policy command and select stickiness as an election algorithm.
If you use sticky as an election metric, and an event causes the ESRP master to failover, ESRP assigns
the new master with the highest sticky election metric of 1. Therefore, regardless of changes to the
neighbor’s election algorithm, the new master retains its position. Sticky is set on the master switch
only.
ESRP re-election can occur if sticky is set on the master and a local event occurs. During this time, if the
current master has lower election parameters, the backup can become the new master.
If you use clear esrp esrpDomain sticky command, it only affects the current master and can
trigger ESRP re-election.
Example
The following command clears the stickiness on the ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears Ethernet OAM counters.
Syntax Description
port_list Specifies the particular port(s).
Default
N/A.
Usage Guidelines
Use this command to clear the Ethernet OAM counters on one or more specified ports. If you do not
specify the port(s), counters for all ports are cleared.
Example
The following command clears Ethernet OAM counters on port 2:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is supported on all platforms.
clear fdb
clear fdb mac_addr | ports port_list | vlan vlan_name | blackhole| vxlan
ipaddress remote_ipaddress vr vr_name virtual-network vn_name
Description
Clears dynamic FDB entries that match the filter.
Syntax Description
mac_addr Specifies a MAC address, using colon-separated bytes.
port_list Specifies one or more ports or slots and ports.
vlan_name Specifies a VLAN name.
blackhole Specifies the blackhole entries.
vxlan Specifies VXLAN.
ipaddress IP address of the remote endpoint.
remote_ipaddress IPv4 address of the remote tunnel endpoint whose associated FDB
entries need to be cleared.
Default
All dynamic FDB entries are cleared by default.
Usage Guidelines
To clear FDB entries on a given remote endpoint (added to any virtual network):
To clear FDB entries on a given remote endpoint added to given virtual network:
To clear all VXLAN FDB entries (clear all entries learned on the access ports and VXLAN tunnels):
Example
The following example clears any FDB entries associated with VLAN corporate:
clear fdb vlan corporate
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the FDB information learned for VPLS.
Syntax Description
vpls_name Clears all FDB entries for the specified VPLS and its associated VLAN.
peer_ip_address Clears all FDB entries for the pseudowire (PW) associated with the
specified VPLS and LDP peer.
Default
N/A.
Usage Guidelines
If the command is used without keywords, every FDB entry learned from any PW is cleared. Using the
keywords vpls_name clears every FDB entry, (both PW and front panel Ethernet port for the service
VLAN) associated with the specified VPLS and the associated VLAN. If the specified VPLS is not bound
to a VLAN, the following error message appears:
Error: vpls VPLS_NAME not bound to a vlan
Using the keywords vpls_name and peer_ip_address clears all FDB entries from the PW associated with
the specified VPLS and LDP peer.
Once the information is cleared from the FDB, any packet destined to a MAC address that has been
flushed from the hardware is flooded until the MAC address has been re-learned.
Example
This example clears the FDB information for VPLS 1:
clear fdb vpls vpls1
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support this feature as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears Internet Group Management Protocol (IGMP) counters.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Example
The following example clears IGMP counters:
# clear igmp counters
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes one or all IGMP (Internet Group Management Protocol) groups.
Syntax Description
grpipaddress Specifies the group IP address.
name Specifies a VLAN name.
Default
N/A.
Usage Guidelines
This command can be used by network operations to manually remove learned IGMP group entries
instantly. Traffic is impacted until the IGMP groups are relearned. Use this command for diagnostic
purposes only.
Example
The following command clears all IGMP groups from VLAN accounting:
clear igmp group accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes one or all IGMP snooping entries.
Syntax Description
name Specifies a VLAN name.
Default
N/A.
Usage Guidelines
This command can be used by network operations to manually remove IGMP snooping entries instantly.
However, removing an IGMP snooping entry can disrupt the normal forwarding of multicast traffic until
the snooping entries are learned again.
The dynamic IGMP snooping entries are removed, and then recreated upon the next general query. The
static router entry and static group entries are removed and recreated immediately.
This command clears both the IGMPv2 and IGMPv3 snooping entries.
Example
The following command clears IGMP snooping from VLAN accounting:
clear igmp snooping accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears the inline statistics for the selected port to zero.
Syntax Description
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
Use this command to clear all the information displayed by the show inline-power stats
ports port_list command.
Example
The following command clears the inline statistics for ports 1–8 on a switch:
The following command displays cleared inline power configuration information for ports 1–8:
STATISTICS COUNTERS
Port State Class Absent InvSig Denied OverCurrent Short
1 delivering class3 0 0 0 0 0
2 delivering class3 0 0 0 0 0
3 searching class0 0 0 0 0 0
4 searching class0 0 0 0 0 0
5 searching class0 0 0 0 0 0
6 searching class0 0 0 0 0 0
7 searching class0 0 0 0 0 0
8 searching class0 0 0 0 0 0
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the PoE (Power over Ethernet) devices listed in PoE section of the
ExtremeXOS 30.5 User Guide.
clear iparp
clear iparp {ip_addr {vr vr_name} | vlan vlan_name | vr vr_name}
{refresh}
Description
Removes dynamic entries in the IP ARP table.
Syntax Description
ip_addr Specifies an IP address.
vlan_name Specifies a VLAN name.
vr_name Specifies a Virtual Router (VR) or Virtual Router Forwarding instance
(VRF) name.
refresh Refreshes the ARP cache and deletes the inactive entries.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
Permanent IP ARP entries are not affected.
This command is specific to a single VR or VRF, and it applies to the current VR context if you do not
specify a VR or VRF.
Based on the attributes you specify, the refresh attribute refreshes and deletes the corresponding ARP
entries as follows:
• clear iparp refresh—Refreshes the entire ARP table and deletes all inactive entries.
• clear iparp ip_addr refresh—Refreshes the specified IP address and deletes the IP ARP
entry if the ARP request for IP address fails.
• clear iparp vlan vlan_name refresh—Refreshes all IP ARP entries associated with the
VLAN and deletes all inactive entries for the VLAN.
• clear iparp vr vr_name refresh—Refreshes all IP ARP entries associated with the VR and
deletes all inactive entries for the VR.
Example
The following example removes a dynamically created entry from the IP ARP table:
clear iparp 10.1.1.5
The following example refreshes the ARP entry by sending an ARP request for the IP address 10.1.1.5. If
the ARP response is received, the dynamic entry is retained; otherwise, the dynamic entry is removed
from the IP ARP table if the ARP response is not received.
clear iparp 10.1.1.5 refresh
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clear the local protocol anomaly event cache.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
N/A.
Usage Guidelines
This command clears the local protocol anomaly event cache.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the violation counters.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command clears the ARP validation violation counters.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the DHCP binding entries present on a VLAN.
Syntax Description
vlan_name Specifies the VLAN of the DHCP server.
Default
N/A.
Usage Guidelines
Use this command to clear the DHCP binding entries present on a VLAN. When an entry is deleted, all
its associated entries (such as source IP lockdown, secured ARP, and so on) and their associated ACLs, if
any, are also deleted.
Example
The following command clears the DCHP binding entry temporary from the VLAN:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears locked-down source IP addresses on a per-port basis.
Syntax Description
ports Specifies the port or ports to be cleared.
all Specifies that all ports are to be cleared.
Default
N/A.
Usage Guidelines
Use this command to clear locked-down source IP addresses on a per port basis. This command deletes
the entries on the indicated ports and clears the associated ACLs.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the counters for the DAD feature.
Syntax Description
vr_name Specifies a VR for which to clear the counters.
ipaddress Specifies an IPv6 address for which to clear the counters.
vlan_name Specifies a VLAN for which to clear the counters.
Default
If you do not specify a VR or VRF, the command applies to the current VR context.
Usage Guidelines
The vr all option clears the DAD counters for all IPv6 interfaces on the switch.
This command clears the DAD failure counters and removes the MAC for the conflicting IPv6 address
after the duplicate address condition has been resolved. The DAD counters and saved MAC addresses
are not automatically cleared; they must be cleared with this command.
Example
The following command clears the DAD counters for all IPv6 interfaces in all VRs:
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears all IS-IS-related counters in the current virtual router.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command clears all area and VLAN counters.
The following area counters are cleared: corrupted LSPs, LSPDB overloads, manual address from area
count, LSP sequence number wraps, LSP sequence number skips, LSP purges, partition changes, and
SPF calculations.
The following VLAN counters are cleared: adjacency changes, adjacency initialization failures, rejected
adjacencies, ID field length mismatches, maximum area address mismatches, authentication type
failures, authentication failures, DIS changes, hello PDU TX and RX count, LSP TX and RX count, CSNP
TX and RX count, PSNP TX and RX count, unknown PDU type TX and RX count.
Example
The following command clears all IS-IS counters:
clear isis counters
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command clears all IS-IS counters for the specified router process or all router processes.
Syntax Description
area_name Specifies the router process for which counters are cleared.
all Clears IS-IS counters for all router processes.
Default
N/A.
Usage Guidelines
The following counters are cleared: corrupted LSPs, LSPDB overloads, manual address from area count,
LSP sequence number wraps, LSP sequence number skips, LSP purges, partition changes, SPF
calculations, authentication type failures, authentication failures, and ID field length mismatches.
Example
The following command clears the IS-IS counters for areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command clears all IS-IS counters for one or all VLANs.
Syntax Description
vlan all Clears the counters for all VLANs.
vlan_name Specifies a single VLAN for which counters are cleared.
Default
N/A.
Usage Guidelines
This command only affects VLANs that have been added to IS-IS router processes. The following
counters are cleared: adjacency changes, adjacency initialization failures, rejected adjacencies, ID field
length mismatches, maximum area address mismatches, authentication type failures, authentication
failures, DIS changes, hello PDU TX and RX count, LSP TX and RX count, CSNP TX and RX count, PSNP
TX and RX count, unknown PDU type TX and RX count.
Example
The following command clears the IS-IS counters for all VLANs:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
Clears L2PT VLAN counters.
Syntax Description
vlan Optionally clears counters only on a specific VLAN.
vman Optionally clears counters only on a specific VMAN.
vlan_name Specifies the VLAN name.
ports port_list Optionally clears counters only on specific ports of the VLAN/VMAN.
The port list is separated by a comma ( , ) or dash ( - ).
Default
Disabled.
Usage Guidelines
Use this command to clear L2PT VLAN counters.
Example
The following example clears all L2PT counters:
clear l2pt counters
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears L2PT VMAN counters.
Syntax Description
vlan Optionally clears counters only on a specific VLAN.
vman Optionally clears counters only on a specific VMAN.
vlan_name Specifies the VLAN name.
ports port_list Optionally clears counters only on specific ports of the VLAN/VMAN.
The port list is separated by a comma ( , ) or dash ( - ).
Default
Disabled.
Usage Guidelines
Use this command to clear L2PT VMAN counters.
Example
The following example clears all L2PT counters:
clear l2pt counters
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears L2PT counters.
Syntax Description
vpls Optionally clears counters only on a specific VPLS.
vpls_name Alpha numeric string identifying VPLS VPN.
peer ipaddress Optionally clears counters only on a specific peer of the VPLS. The
variable specifies an IPv4 address.
vpws vpws_name Optionally clears counters only on a specific VPWS. The variable is an
alphanumeric string identifying the VPWS VPN.
Default
Disabled.
Usage Guidelines
Use this command to clear L2PT counters.
Example
The following example clears L2PT counters on peer 1.1.1.1 of VPLS vpls1:
clear l2pt counters vpls vpls1 peer 1.1.1.1
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the counters associated with Link Aggregations Control Protocol (LACP).
Syntax Description
This command has no parameters or variables.
Default
N/A.
Usage Guidelines
This command clears the following counters for LACP; it sets these counters back to 0 for every LACP
port on the device:
• LACP PDUs dropped on non_LACP ports.
• Stats:
◦ Rx - Accepted.
◦ Rx - Dropped due to error in verifying PDU.
◦ Rx - Dropped due to LACP not being up on this port.
◦ Rx - Dropped due to matching own MAC.
◦ Tx - Sent Successfully.
◦ Tx - Transmit error.
Example
The following command clears the LACP counters on all ports:
clear lacp counters
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
clear license-info
clear license-info [{software} | port-speed]
Description
This command, which should be used only in conjunction with a representative from Extreme Networks,
clears the licensing information from the switch.
Syntax Description
software Specifies ExtremeXOS base software license.
port-speed Clears all port speed licenses (for ExtremeSwitching X870-96x-8c
switches only).
Default
N/A.
Usage Guidelines
Note
Use this command only under the guidance of an Extreme Networks representative.
When you reply “yes”, the license information is removed from the EEPROM and the switch deletes the
license.xlic file permanently.
Using the port-speed license keyword removes all port speed licensing. Port speed licenses increase
the rate from 10G to 100G on QSFP28+ ports 1 through 24 on ExtremeSwitching X870-96x-8c switches.
Example
The following command removes licensing information from the switch:
clear license-info
The following command removes port speed licensing from an ExtremeSwitching X870-96x-8c switch:
# clear license-info port-speed
Are you sure you want to clear port speed license information stored in EEPROM? (y/N)
Yes
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the LLDP (Link Layer Discovery Protocol) neighbor information collected for one or all ports on
the switch.
Syntax Description
port_list Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
LLDP neighbor information for each port is automatically cleared after the period defined by the TTL
TLV if no update LLDP protocol data unit (LLDPDU) is received. This command immediately clears the
LLDP neighbor information for the specified ports.
Example
The following command clears the LLDP information collected for all ports on the switch:
History
This command was first available in ExtremeXOS 12.4.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
clear log
clear log { static | messages [memory-buffer | nvram]}
Description
Clears the log messages in memory and NVRAM.
Syntax Description
static Specifies that the messages in the NVRAM and memory-buffer
targets are cleared.
memory-buffer Clears entries from the memory buffer.
nvram Clears entries from NVRAM.
Default
N/A.
Usage Guidelines
The switch log tracks configuration and fault information pertaining to the device.
By default, log entries that are sent to the NVRAM remain in the log after a switch reboot. The clear
log and clear log messages memory-buffer commands remove entries in the memory buffer
target; the clear log static and clear log messages nvram commands remove messages from the
NVRAM target. In addition, the clear log static command will also clear the memory buffer target.
Execution of these commands on a backup or standby node results in the clearing of that node’s
information only. Execution of these commands on the master node results in the clearing of
information on all nodes in the system.
Example
The following command clears all log messages, from the NVRAM:
# clear log static
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the incident counters for events.
Syntax Description
event-condition Specifies the event condition counter to clear.
all Specifies that all events counters are to be cleared.
event-component Specifies that all the event counters associated with a particular
component should be cleared.
severity Specifies the minimum severity level of event counters to clear (if the
keyword only is omitted).
only Specifies that only event counters of the specified severity level are to
be cleared.
Default
If severity is not specified, then the event counters of any severity are cleared in the specified
component.
Usage Guidelines
This command sets the incident counters to zero for each event specified. To display event counters, use
the following command: show log counters
See the command show log for more information about severity levels.
To get a listing of the event conditions in the system, use the following command: show log events
{details}
To get a listing of the components present in the system, use the following command: show log
components
In a SummitStack, execution of these commands on a backup or standby node results in the clearing of
that node’s information only. Execution of these commands on the master node results in the clearing
of information on all nodes in the system.
Example
The following example clears the event counters for event conditions of severity error or greater in the
component BGP:
clear log counters "BGP" severity error
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears MAC lock station information.
Syntax Description
all Clears all MAC locking station information for end stations connected
to this switch.
station_mac_address Specifies a MAC address.
first-arrival Clears first-arrival MAC locking station information.
static Clears static MAC locking station information.
port_list Specifies one or more ports or slots and ports.
Default
N/A
Usage Guidelines
None.
Example
The following example clears all MAC locking information:
clear mac-locking station all
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears counters for MAC Security (MACsec) encryption and authentication.
Syntax Description
ports Specifies port to configure.
port_list Lists ports to clear MACsec counters on.
Default
Counters for all MACsec ports are cleared unless you choose specific MACsec ports.
Usage Guidelines
This command clears the 4 packet/octet values of the show macsec ports port-list command,
as well as all the statistics shown under the heading “SecY Interface Statistics” of the show macsec
ports port-list detail command.
Additionally, all MACsec port statistics are cleared by the clear counters ports {port_list
| all} command.
Example
The following example clears all MACsec counters on port 44:
# clear macsec counters ports 44
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
Description
This command allows the clearing of the out-of-profile status and rate-limit counter for meters that
have been exceeded. For an input meter and the entered ports, the status option will remove the
ports from the disabled port out-of-profile list for the entered meter, re-enable ports that may have
been disabled due to the out-of-profile meter, and re-enable the syslog and traps for those ports as
well. For an input meter and the entered ports, the counter option will reset the counters. If the
neither the status nor counter option is specified, both will be cleared. If the disabled-ports options is
specified, only the out-of-profile meters that have disabled ports will be cleared. If no options are
specified, all the out-of-profile status and counters will be cleared. If no ports are specified, the
command clears the out-of-profile counter for a global meter. Note that the effected counter and status
are the aggregates of the rule based counters for both ACL and dot1p rules.
Syntax Description
metername Meter name.
disabled-ports Clear only the meter out-of-profile status that resulted in disabled-
port action.
status Clear only the meter out-of-profile status.
counters Clear only the meter counters.
ports Clear the meter applied to a specified port-list.
all Clear meter out-of-profile status on all ports.
portlist Port list separated by a comma or -.
port_group Port group name.
Default
N/A.
Usage Guidelines
None.
Examples
clear meter out-of-profile
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is availabe on all platforms.
Description
Clears MLD statistics counters.
Syntax Description
vlan_name Specifies a VLAN name.
Default
N/A.
Usage Guidelines
Use this command to manually clear MLD statistics counters.
Example
The following example clears all MLD counters for all VLANs:
clear mld counters
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes one or all MLD groups.
Syntax Description
v6grpipaddress Specifies the group IP address.
name Specifies a VLAN name.
Default
N/A.
Usage Guidelines
This command is used to manually remove learned MLD group entries instantly.
Example
The following command clears all MLD groups from VLAN accounting:
clear mld group accounting
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes one or all MLD snooping entries.
Syntax Description
name Specifies a VLAN name.
Default
N/A.
Usage Guidelines
This command can be used by network operations to manually remove MLD snooping entries instantly.
However, removing an MLD snooping entry can disrupt the normal forwarding of multicast traffic until
the snooping entries are learned again.
The static and dynamic MLD snooping entries are removed, and then recreated upon the next general
query. The static router entry is removed and recreated immediately.
Example
The following command clears MLD snooping from VLAN accounting:
clear mld snooping accounting
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command resets the MSDP (Multicast Source Discovery Protocol) counters to zero.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
Default
N/A.
Usage Guidelines
The clear msdp counters command clears the following MSDP counters:
• Per peer counters:
◦ Number of SA messages received.
◦ Number of SA messages transmitted.
◦ Number of SA request messages received.
◦ Number of SA request messages transmitted.
◦ Number of SA response messages received.
◦ Number of SA response messages transmitted.
◦ Number of SA messages received without encapsulated data.
◦ Number of SA messages transmitted without encapsulated data.
◦ Number of SA messages received with encapsulated data.
◦ Number of SA messages transmitted with encapsulated data.
◦ Number of times the MSDP peer attained an “ESTABLISHED” state.
◦ Number of times the peer-RPF check failed.
◦ Number of times the TCP connection attempt failed.
◦ Total number of received messages.
◦ Total number of transmitted messages.
• Global counters:
◦ None defined.
The clear counters command will also clear all MSDP counters, but it clears the counters for all
other applications too.
Example
The following command clears the counters for an MSDP peer with the IP address 192.168.45.43:
clear msdp counters peer 192.168.45.43
The following command clears the all peer and global counters:
clear msdp counters
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command purges all SA cache entries and notifies the PIM that the SA cache is empty.
Syntax Description
peer all Specifies all MSDP peers. All matching SA cache entries from all peers are
removed from the database.
grp-addr Specifies the IP address and subnet mask of the multicast group you want to
clear. All SA cache entries that match the specified group address are removed
from the database.
remoteaddr Specifies the IP address of the MSDP peer. All matching SA cache entries learned
from the specified peer are removed from the database.
vrname Specifies the name of the virtual router to which this command applies. If a name
is not specified, it is extracted from the current CLI context.
Default
N/A.
Usage Guidelines
MSDP receives SA messages periodically. After clearing SA cache entries from the local database, MSDP
relearns those entries during the next advertisement from its peer.
Example
The following example clears SA cache records for an MSDP peer with the IP address 192.168.45.43:
clear msdp sa-cache peer 192.168.45.43
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears both the PDU and attribute event counters per port.
Syntax Description
msrp Multiple Stream Registration Protocol.
counters MSRP packet and attribute event counters.
port_list Port list separated by a comma or "-".
all All ports.
Default
N/A.
Usage Guidelines
Use this command to clear both the PDU and attribute event counters per port.
Example
clear msrp counters
clear msrp counters ports 1-5
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X460-G2, X670-G2 switches if the AVB feature pack
license is installed on the switch.
Description
Clears MVRP statistics.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
event MVRP event counters.
packet MVRP packet counters.
Default
Clears both event and packet counters if none of the options are specified.
Usage Guidelines
Use this command to clear MVRP statistics. The default behavior clears both event and packet counters
if none of the options are specified. The statistics that are reset are the number of failed registrations on
that port, number of MVRPDUs sent, number of MVRPDUs received with error and without error for
packet counters and different MVRP events rx/tx counters for event counters. If no port is specified,
MVRP statistics of all ports are reset.
Example
The following command clears event counters:
# clear mvrp event counters
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X460-G2, X670-G2 switches if the AVB feature pack
license is installed on the switch.
Description
Deletes a dynamic entry from the neighbor cache.
Syntax Description
vr_name Specifies a VR or VRF.
ipv6address Specifies an IPv6 address.
vlan_name Specifies an IPv6 configured VLAN.
refresh Refreshes the IPv6 neighbor discovery cache and deletes the inactive
entries.
Default
N/A.
Usage Guidelines
This command clears dynamic entries from the neighbor cache. The vr option is used to specify the VR
or VRF on which the operation is performed. When this option is omitted, it applies to current VR
context.
When the ipv6address or vlan options are specified, only the entries with matching IPv6 addresses
or that correspond to that VLAN are cleared.
Based on the attributes you specify, the refresh attribute refreshes and deletes the corresponding IPv6
neighbor discovery entries as follows:
• clear neighbor-discovery cache refresh—Refreshes the entire IPv6 neighbor
discovery cache and deletes all inactive entries.
• clear neighbor-discovery cache ipv6address refresh—Refreshes the specified
neighbor-discovery entry and deletes the neighbor-discovery entry if the neighbor solicitation for
the IP address fails.
• clear neighbor-discovery cache vlan vlan_name refresh—Refreshes all neighbor-
discovery entries associated with the VLAN and deletes all inactive entries for the VLAN.
• clear neighbor-discovery cache vr vr_name refresh—Refreshes all neighbor-
discovery entries associated with the VR and deletes all inactive entries for the VR.
Example
The following example clears all entries from the neighbor cache:
clear neighbor-discovery cache
The following example refreshes all entries in the neighbor discovery cache and delete inactive entries if
the neighbor solicitation fails:
clear neighbor-discovery cache refresh
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears and initializes the network login sessions on a VLAN port.
Syntax Description
port_list Specifies the ports to clear.
Default
None.
Usage Guidelines
Clear the states of every MAC learned on this VLAN port and put the port back to unauthenticated
state. The port will be moved to its original VLAN if configured in campus mode.
Example
The following command clears the Network Login state of port 2:9:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the NetLogin authentication state.
Syntax Description
port portlist Clears only for the specified ports.
dot1x Clears only the 802.1x authentication state.
mac Clears only the MAC authentication state.
web-based Clears only web-based authentication state.
Default
N/A
Example
The following example clears the dot1x authentication state on port 1:
clear netlogin state agent port 1 dot1x
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Initialize/reset the network login sessions for a specified supplicant.
Syntax Description
mac Specifies the MAC address of the supplicant.
Default
N/A.
Usage Guidelines
This command is essentially equivalent to a particular supplicant logging out. The MAC address will be
cleared from the FDB, the port is put back to its original VLAN (for campus mode), and the port state is
set to unauthenticated, if this was the last authenticated MAC on this port.
Example
The following command resets the Network Login session for the supplicant with the MAC address of
00:e0:18:01:32:1f:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears gPTP port counters.
Syntax Description
gptp IEEE 802.1AS Generalized Precision Time Protocol.
counters gPTP port counters.
port_list Specifies one or more of the switch's physical ports.
all Specifies all of the switch's physical ports.
Default
N/A.
Usage Guidelines
Use this command to clear gPTP port counters. The command clear counters also clears the gPTP
port counters (along with all other counters).
Example
clear network-clock gptp counters
clear network-clock gptp counters ports 2-4
clear network-clock gptp counters ports all
History
This command was first available in ExtremeXOS 15.3
Platform Availability
This command is available on all platforms if the AVB feature pack license is installed on the switch.
Description
This command clears the accumulated PTP packet counters. The clear can be performed on the
following groups:
Note
This command is available only for Boundary and Ordinary clocks.
Syntax Description
network-clock External Clock for Ethernet synchronization.
ptp Precise Time Protoco.l
boundary Boundary clock.
ordinary Ordinary clock.
vlan VLAN.
ipv4_address Peer IP address.
unicast-master IP addresses that are masters to the local clock.
unicast-slave IP addresses that are slaves to the local clock.
all All VLAN.
counters PTP message counts.
Default
N/A.
Usage Guidelines
Use this command to clear the accumulated PTP packet counters.
Example
N/A.
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is only available on boundary and ordinary clocks on ExtremeSwitching X460-G2, X670-
G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
clear nodealias
clear nodealias { ports [port_list | all] | alias-id alias_id }
Description
This command clears alias entries out of the Node Alias feature database. You can clear information by
specified port(s) or alias ID. Node Alias discovers information about the end systems on a per-port
basis. Information from packets from end systems, such as VLANID, source MAC address, source IP
address, protocol, etc. are captured in a database that can be queried.
Syntax Description
nodealias Node Alias feature that maps source IP address, MAC address, host
name, and protocol on a per port basis.
ports Designates that you want to clear node alias information for the
selected ports.
port_list Specifies from which ports to clear node alias information. Designated
as a port list separated by comma (,) or dash (-).
all Clears node alias information from all ports.
alias-id Designates that you want to clear node alias information for the
specified alias ID from all ports.
alias_id Specifies the alias ID that you want information cleared for from the
database.
Default
None.
Usage Guidelines
If the port is part of a LAG (Link Aggregation Group), this command is only allowed on the master port.
Example
The following example clears all node alias entries on port 7:
clear nodealias ports 7
The following example clear node alias entries for alias ID 716168949 from all ports:
clear nodealias alias-id 716168949
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Clears the OSPF (Open Shortest Path First) counters (statistics).
Syntax Description
vlan_name Specifies a VLAN name.
router-identifier Specifies a router interface number.
area-identifier Specifies an OSPF area.
ip-address Specifies an IP address
ip-mask Specifies a subnet mask.
ipNetmask Specifies IP address / Netmask.
system Specifies the OSPF system counters.
Default
N/A.
Usage Guidelines
The global command clear counters also clears all OSPF counters. This global command is the
equivalent of clear ospf counters for OSPF.
Example
The following command clears the OSPF counters for area 1.1.1.1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears the OSPFv3 (Open Shortest Path First version 3) counters (statistics).
Syntax Description
all Specifies all VLANs, tunnels, areas, neighbors, or virtual-links.
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
router-identifier Specifies a router identifier, a four-byte, dotted decimal number.
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
Default
N/A.
Usage Guidelines
The global command clear counters also clears all OSPFv3 counters. This global command is the
equivalent of clear ospfv3 counters for OSPFv3.
This command can be used to clear various OSPFv3 counters (Interface, Area, Virtual-Link, System etc.).
The following is the list of various counters that would be reset to zero by this command:
• Neighbor specific counters:
◦ Number of state changes.
◦ Number of events.
• Interface/VLAN/Virtual-link/Tunnel specific counters:
◦ Hellos Rxed
◦ Hellos Txed
◦ DB Description Rxed
◦ DB Description Txed
◦ LSA Request Rxed
◦ LSA Request Txed
◦ LSA Update Rxed
◦ LSA Update Txed
◦ LSA Ack Rxed
◦ LSA Ack Txed
◦ In Discards
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears PIM multicast cache table.
Syntax Description
ipv4 Specifies an IPv4 address.
ipv6 Specifies an IPv6 address.
group_addr Specifies a group address.
source_addr Specifies a source IP address.
Default
If no options are specified, all PIM cache entries are flushed.
Usage Guidelines
This command can be used by network operators to manually remove IPMC software and hardware
forwarding cache entries instantly. If the stream is available, caches are re-created; otherwise, caches
are removed permanently. This command can disrupt the normal forwarding of multicast traffic.
Example
The following example resets the IP multicast table for group 224.1.2.3:
clear pim cache 224.1.2.3
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Clears all PIM snooping neighbors, joins received on the VLAN, and the VLAN forwarding entries.
Syntax Description
name Specifies the VLAN to which this command applies.
Default
N/A.
Usage Guidelines
None.
Example
The following command clears the PIM snooping database for the Default VLAN:
clear pim snooping "Default"
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command clears the counter and/or status of ports of a flood rate-limiter that may have had their
limit exceeded.
Syntax Description
port_list Clears a port list.
port_group Clears a port group.
all Clears all ports.
out-of-profile Clears only out-of-profile rate-limiters.
disabled-ports Clears only ports that have been disabled due to out-of-profile
status.
both Clears out-of-profile status and counter for rate-limiter.
status Clears only out-of-profile status for rate-limiter.
counter Clear only out-of-profile counter for rate-limiter.
Default
All.
Usage Guidelines
The clear ports rate-limit flood out-of-profile command allows the clearing of the
counter and/or status of ports of a flood rate-limiter that may have had their limit exceeded. For the
entered ports, the status option removes the ports from the disabled port out-of-profile list, re-enables
ports that may have been disabled due to out-of-profile rate-limit, and re-enables the syslog and traps
for those ports as well. For the entered ports, the counter option resets the counters. If neither option is
specified, both the status and counter will be cleared. If the disabled-ports option is specified, only
the out-of-profile statuses that have disabled ports will be cleared. If no options are specified, all out-of-
profile statuses will be cleared.
Example
clear ports all rate-limit flood out-of-profile
clear ports all rate-limit flood out-of-profile disabled-ports
clear ports fldGroupA rate-limit flood out-of-profile status
clear ports 1-24 rate-limit flood out-of-profile counter
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the counters related to port link-flapping.
Syntax Description
ports Physical ports.
port_list List of ports that you want to clear the link flap counters on.
all Selects all ports in the system to have their link-flap counters cleared.
counters Counters related to link flapping.
Default
N/A
Example
The following example clears the link flap counters for ports 4 through 12:
clear ports 4-12 link-flap-detection counters
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Manually enables ports that have been disabled due to excessive link-flapping.
Syntax Description
ports Physical ports.
port_list List of ports that you want to enable that were disabled due to
excessive link flapping.
all Enables all ports in the system that were disabled due to excessive link
flapping.
status Enable ports currently in disabled state due to excessive link flapping.
Default
N/A
Usage
Ports that have been disabled due to excessive link flapping cannot be enabled using the enable
port command. They must be enabled using the clear ports link-flap-detection
status command.
Example
The following example re-enables all ports on the switch that were disabled due to excessive link
flapping:
clear ports all link-flap-detection status
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears the counter and/or status of ports of a flood rate-limiter that may have had their
limit exceeded.
Syntax Description
port_list Clears a port list.
port_group Clears a port group.
all Clears all ports.
out-of-profile Clears only out-of-profile rate-limiters.
disabled-ports Clears only ports that have been disabled due to out-of-profile
status.
both Clears out-of-profile status and counter for rate-limiter.
Default
All.
Usage Guidelines
The clear ports rate-limit flood out-of-profile command allows the clearing of the
counter and/or status of ports of a flood rate-limiter that may have had their limit exceeded. For the
entered ports, the status option removes the ports from the disabled port out-of-profile list, re-enables
ports that may have been disabled due to out-of-profile rate-limit, and re-enables the syslog and traps
for those ports as well. For the entered ports, the counter option resets the counters. If neither option is
specified, both the status and counter will be cleared. If the disabled-ports option is specified, only
the out-of-profile statuses that have disabled ports will be cleared. If no options are specified, all out-of-
profile statuses will be cleared.
Example
clear ports all rate-limit flood out-of-profile
clear ports all rate-limit flood out-of-profile disabled-ports
clear ports fldGroupA rate-limit flood out-of-profile status
clear ports 1-24 rate-limit flood out-of-profile counter
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears the memory- and CPU-related statistics of “EXOS” and/or “other” groups.
Syntax Description
statistics Designates clearing statistics for the process groups.
exos Selects clearing statistics for the "EXOS" process group. If you make
no selection, statistics for both groups are cleared.
other Selects clearing statistics for the "other" process group. If you make
no selection, statistics for both groups are cleared.
Default
If you make no selection, statistics for both groups are cleared.
Example
The following example clears statistics for the "exos" group:
clear process group statistics exos
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears the RIP (Routing Information Protocol) counters (statistics).
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following command clears the RIP statistics counters:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Clears the RIPng (Routing Information Protocol Next Generation) global or interface-specific counters
(statistics).
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel-name Specifies an IPv6 tunnel.
Default
N/A.
Usage Guidelines
None.
Example
The following command clears the RIPng statistics counters:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.ature-link-22.1"/>
clear screen
clear screen
Description
This command clears the screen of a login session with the termcaps-defined capability and returns the
prompt to the top.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
clear session
clear session [history | sessId | all]
Description
Terminates a Telnet and/or SSH2 sessions from the switch.
Syntax Description
history Clears the chronology of sessions that were opened.
sessId Specifies a session number from show session output to terminate.
all Terminates all sessions.
Default
N/A.
Usage Guidelines
An administrator-level account can disconnect a management session that has been established by way
of a Telnet connection.
You can determine the session number of the session you want to terminate by using the show
session command. The output of this command displays information about current Telnet and/or
SSH2 sessions including:
• The session number.
• The login date and time.
• The user name.
• The type of Telnet session.
• Authentication information.
Depending on the software version running on your switch, additional session information may be
displayed. The session number is the first number displayed in the show session output.
When invoked to the clear the session history, the command clears the information about all the
previous sessions that were logged. The information about the active sessions remains intact.
Example
The following example terminates session 4 from the system:
clear session 4
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
clear slot
clear slot slot
Description
Clears a slot of a previously assigned module type.
Syntax Description
slot Specifies the slot number.
Default
N/A.
Usage Guidelines
All configuration information related to the node and the ports on the switch is erased. If a node is
present when you issue this command, the switch is reset to default settings.
If a node is configured for one type of switch, and a different type of switch is inserted in the stack, the
inserted node is put into a mismatch state (where the inserted node does not match the configured
node), and is not brought online. To use the new switch type in a node, the node configuration must be
cleared or configured for the new switch type. Use the enable mirroring to port tagged command to
configure the node.
Example
The following command clears node 2 of a previously assigned switch type:
clear slot 2
The following command clears slot 4 of a previously assigned switch type in a stack:
clear slot 4
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on SummitStacks.
Description
Clears entries and counters from a notification log.
Syntax Description
counters Specifies to clear counters.
entries Specifies to clear notification entries.
default Optionally clear just the default log.
name Optionally clear just the specified log.
hex Provide value in hexadecimal.
hex_name Optionally clear just the specified log (log name in hexadecimal).
Default
Disabled.
Usage Guidelines
Use this command to clear entries and counters from a notification log.
Example
The following example clears global counters:
clear snmp notification-log counters
The following example clears all entries from all logs:
clear snmp notification-log entries
The following example clears counters for the default log:
clear snmp notification-log counters default
The following example clears all entried from nmslog1:
clear snmp notification-log entries nmslog1
History
This command was first available in ExtremeXOS 15.5.
The default and hex keywords and hex_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Resets the partner Spanning Tree Protocol version to the configured version.
Syntax Description
stpd_name Specifies an STPD (Spanning Tree Domain) name on the switch.
port_list Specifies the port list, which can be separated with a comma or a
dash.
protocol-migration Resets the partner protocol mode to configured mode.
Default
N/A
Usage Guidelines
STP detects the spanning tree version on a network and sends out the equivalent BPDU. If this switch
receives a legacy IEEE 802.1D configuration BPDU (a BPDU with the protocol version set to 0), Protocol
Migration feature supports the forcefully allowing the user to choose the version, where a switch
supporting MSTP (Multiple Spanning Tree Protocol) is forced to behave as STP or RSTP.
For example, three bridges on shared media, two of are configured dot1w (RSTP) and one is dot1d
(legacy STP) mode
These bridges will transmit STP BPDUs on their connected ports since one of the peers is in dot1d
mode. If the dot1d mode configured bridge leaves this shared media the remaining two bridges will
keep sending STP BPDUs even though they should use RTP BPDUs normally. By using this feature we
can clear the STP BPDU transmission and starts sending the RSTP BPDUs.
Example
The following example resets the protocol migration for the port 1:10 in STP domain r1:
clear stpd r1 ports 1:10 protocol-migration
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears either all paired Bluetooth devices or a particular paired device.
Syntax Description
switch Designates clearing switch information.
bluetooth Designates clearing Bluetooth information.
device Designates clearing Bluetooth devices.
all Clears all Bluetooth devices.
address Clears only the Bluetooth device at the specified MAC address.
Default
N/A.
Usage Guidelines
To clear all paired Bluetooth devices, use the all option.
To clear only a specific device, use the address option. To find the address of a specific Bluetooth
device, use the show switch bluetooth [statistics | inventory] command without the
statistics option.
Example
The following example clears all Bluetooth devices:
# clear switch bluetooth device all
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X465 series switches.
clear vm storage
clear vm storage
Description
Formats the virtual machine (VM) storage module (SSD) for use.
Syntax Description
vm Designates a virtual machine.
storage Specifies formatting disk storage (VM storage module) for use by
VMs.
Default
N/A.
Usage Guidelines
None.
Example
The following example formats VM storage:
# clear vm storage
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
Description
Removes addresses from the DHCP allocation table.
Syntax Description
vlan_name Specifies the VLAN of the DHCP server.
all Specifies all IP addresses, or all IP addresses in a particular state.
offered Specifies IP addresses offered to clients.
assigned Specifies IP addresses offered to and accepted by clients.
declined Specifies IP addresses declined by clients.
expired Specifies IP addresses whose lease has expired and not renewed by
the DHCP server.
ipaddress Specifies a particular IP address.
Default
N/A.
Usage Guidelines
You can delete either a single entry, using the IP address, or all entries. If you use the all option, you can
additionally delete entries in a specific state.
Example
The following command removes all the declined IP addresses by hosts on the VLAN temporary:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure access-list
configure access-list aclname [any | ports port_list | vlan vlan_name]
{ingress | egress}
Description
Configures an access list to the specified interface.
Syntax Description
aclname Specifies the ACL policy file name.
any Specifies that this ACL is applied to all interfaces as the lowest
precedence ACL.
port_list Specifies the ingress or egress port list on which the ACL is applied.
vlan_name Specifies the VLAN on which the ACL is applied.
ingress Apply the ACL to packets entering the switch on this interface.
egress Apply the ACL to packets leaving the switch from this interface.
(ExtremeSwitching X460-G2, X670-G2, X440-G2, X465, X620 series
switches only).
Default
The default direction is ingress.
Usage Guidelines
The access list applied in this command is contained in a text file created either externally to the switch
or using the edit policy command. The file is transferred to the switch using TFTP before it is applied to
the ports. The ACL name is the file name without its “.pol” extension. For example, the ACL blocknetfour
would be in the file blocknetfour.pol.
Specifying the keyword any applies the ACL to all the ports, and is referred to as the wildcard ACL. This
ACL is evaluated for ports without a specific ACL applied to it, and is also applied to packets that do not
match the ACL applied to the interface.
Example
The following command configures the ACL policy test to port 1:2 at ingress:
The following command configures the ACL mydefault as the wildcard ACL:
The following command configures the ACL policy border as the wildcard egress ACL:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command puts user ACLs into "highest priority only" action resolution mode.
Syntax Description
This command has no arguments or variables.
Default
Multiple.
Usage Guidelines
Use this command to put user ACLs into "highest priority only" action resolution mode. All of the static
policies and dynamic ACL rules that are installed after this command has been executed execute only
the actions of the highest priority rule that has being matched, even if there are matches in the lower
priority virtual slices with non-conflicting actions. This behavior is achieved by putting all virtual slices
used by user ACLs into the same virtual group. However, all the policies and dynamic ACL rules that
were installed prior to the execution of this command would stay in their separate virtual groups. As a
result of this, the rules installed prior to the execution of this command will execute non- conflicting
actions from the matches in lower priority virtual slices in addition to executing all the actions of the
highest priority match. If a save and reboot was done after this command has being executed, all static
policies and dynamic ACL rules will operate in "highest priority only" action resolution mode.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command puts user ACLs into "multiple matches" action resolution mode. All the static policies and
dynamic ACL rules that are installed after this command is entered would execute all the actions of the
highest priority rule that has being matched as well as all non conflicting actions from the matches in
the lower priority virtual slices.
Syntax Description
This command has no arguments or variables.
Default
Multiple.
Usage Guidelines
Use this command to put user ACLs into "multiple matches" action resolution mode. All the static
policies and dynamic ACL rules that are installed after this command is entered would execute all the
actions of the highest priority rule that has been matched as well as all non-conflicting actions from the
matches in the lower priority virtual slices.
This behavior is achieved by putting all virtual slices used by user ACLs into separate virtual groups.
However, all the policies and dynamic ACL rules that were installed prior to the execution of this
command would stay in their old single virtual group. As a result, the rules installed prior to the
execution of this command will execute only the actions of the highest priority match. If the save and
reboot was done after this command has being executed, all static policies and dynamic ACL rules will
operate in "multiple matches" action resolution mode. "Multiple matches" is the default mode on the
switch, and if none of action-resolution commands has being executed the switch will operate in
"multiple matches" resolution mode.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a dynamic ACL rule to the specified interface and sets the priority and zone for the ACL.
Syntax Description
dynamic_rule Specifies a dynamic ACL rule.
first Specifies that the new dynamic rule is to be added as the first rule.
last Specifies that the new dynamic rule is to be added as the last rule.
priority Priority of rule within a zone.
p_number Specifies the priority number of the rule within a zone. The range is
from 0 (highest priority) to 7 (lowest priority).
zone Specifies the ACL zone for the rule.
before rule Specifies that the new dynamic rule is to be added before an existing
dynamic rule.
after rule Specifies that the new dynamic rule is to be added after an existing
dynamic rule.
any Specifies that this ACL is applied to all interfaces.
vlan_name Specifies the VLAN on which this ACL is applied.
port_list Specifies the ports on which this ACL is applied.
ingress Apply the ACL to packets entering the switch on this interface.
egress Apply the ACL to packets leaving the switch from this interface.
Default
The default direction is ingress.
Usage Guidelines
The dynamic rule must first be created before it can be applied to an interface. Use the following
command to create a dynamic rule:
create access-list dynamic-rule conditions actions {non-permanent}
When a dynamic ACL rule is applied to an interface, you will specify its precedence among any
previously applied dynamic ACLs. All dynamic ACLs have a higher precedence than any ACLs applied
through ACL policy files.
Specifying the keyword any applies the ACL to all the ports, and is referred to as the wildcard ACL. This
ACL is evaluated for ports without a specific ACL applied to them, and is also applied to packets that do
not match the ACL applied to the interface.
The priority keyword can be used to specify a sub-zone within an application’s space. For example, to
place ACLs into three sub-zones within the CLI application, you can use three priority numbers, such as
2, 4, and 7.
Configuring priority number 1 is the same as configuring first priority. Configuring priority number 8 is
the same as configuring last priority.
Example
The following command applies the dynamic ACL icmp-echo as the first (highest precedence) dynamic
ACL to port 1:2 at ingress:
The following command applies the dynamic ACL udpdacl to port 1:2, with a higher precedence than
rule icmp-echo:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
The egress option is available on ExtremeSwitching X450-G2, X460-G2, X670-G2 , X465 series switches
only.
Description
Removes a dynamic ACL rule from the specified interface.
Syntax Description
ruleName Specifies a dynamic ACL rule name.
any Deletes this ACL as the wildcard ACL.
vlan_name Specifies the VLAN on which this ACL is deleted.
port_list Specifies the ports on which this ACL is deleted.
all Deletes this ACL from all interfaces.
ingress Deletes the ACL for packets entering the switch on this interface.
egress Deletes the ACL for packets leaving the switch from this interface.
Default
The default direction is ingress.
Usage Guidelines
Specifying the keyword all removes the ACL from all interfaces it is used on.
Example
The following command removes the dynamic ACL icmp-echo from the port 1:2:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or removes IP and MAC addresses to and from the network-zone.
Syntax Description
network-zone Logical group of remote devices.
zone_name Specifies the network-zone name.
add Adds a logical group of entities to the network-zone.
delete Deletes a logical group of entities to the network-zone.
mac-address MAC address.
macaddress Specifies the MAC address to be added/removed to/from the
network-zone.
macmask Specifies the MAC Mask. Example FF:FF:FF:00:00:00.
ipaddress Specifies IPv4 address.
ipaddress Specifies the IP address.
netmask Specifies IP netmask.
ipNetmask Specifies the IP address/Netmask.
ipv6_address_mask Specifies IPv6 address/IPv6 prefix length.
Default
N/A.
Usage Guidelines
Use this command to to add or remove IP/MAC addresses to/from the network-zone.
Example
The following command adds an IPv6 IP address to network-zone “zone1”:
If you try to add the same IP/MAC with the same or narrow mask, the configuration is rejected, with the
following error message.
If you try to add more than eight attributes to a network-zone, the following error message is printed.
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Switches between ACL configuration modes.
Syntax Description
shared Sharing is “on” for counter rules.
dedicated Sharing is “off” for counter rules.
Default
Dedicated.
Usage Guidelines
Use this command to switch between two ACL configuration modes. In the first mode, “port-counters
shared”, similar port-based ACL rules with counters are allowed to share the same hardware entry. This
uses less space but provides an inaccurate counter value. In the second mode, “port-counters
dedicated”, similar port-based ACL rules with counters are not allowed to share the same hardware
entry, thereby consuming more entries but providing a precise count.
Only ACLs that are entered after this command is entered are affected. The command does not affect
any ACLs that are already configured.
To configure all ACLs in shared mode, configure access-list rule-compression port-counters shared must
be entered before any ACLs are configured or have been saved in the configuration when a switch is
booted.
This is a global setting for the switch; that is, the option does not support setting some ACL rules with
shared counters and some with dedicated counters.
To view the results of the configuration use the show access-list configuration command.
Example
The following command configures ACL rules with counters to share the same hardware entry:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures precedence mode for policy-file based ACLs that are applied on a VLAN.
Syntax Description
dedicated Allocates exclusive precedence for VLAN-based ACLs.
shared VLAN-based ACLs share the precedence with other ACLs.
Default
Dedicated.
Usage Guidelines
The following feature applies to only policy-file based ACLs that are applied on a VLAN. Use this
command to switch between two VLAN-based ACL configuration modes. In the shared vlan-
aclprecedence mode, VLAN-based ACL rules share the same precedence with other types of ACL rules
and provides the same behavior as in the previous software releases. In the dedicated vlan-acl-
precedence mode, VLAN-based ACL rules have different precedence compared to other types of ACL
rules and this is the default mode. The dedicated mode yields improved installation performance for
VLAN based access-lists but may affect hardware rule utilization in some configurations.
After configuring, you are prompted to reboot the system for the changes to take effect.
Example
The following command allocates exclusive precedence for VLAN-based static ACL rules:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the TCAM width of a switch.
Syntax Description
double Specifies a double wide ACL TCAM. Provides double wide ACL key
with additional qualifiers.
single Specifies a single wide ACL TCAM.
slotNo Specifies the slot to configure.
all Specifies all slots.
Default
Single.
Usage Guidelines
Note
This command is not applicable to the ExtremeSwitching X870 series switches. Key width is
applied automatically on X870 switches.
Use this feature to configure the width of the ACL TCAM key of a slot or switch to be either double wide
or single wide.
The switch must be rebooted for the configuration change to take effect.
If you attempt to configure a double wide mode on a slot or switch that does not support it, an error
message is displayed.
To display the configured mode, use the show access-list width command.
Example
The following command configures slot 1 to use double wide mode:
# configure access-list width double slot 1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
ExtremeSwitching X450-G2, X460-G2, X670-G2, X440-G2, X465, X620.
Description
Configures the priority of a zone; moves an application from one zone to another at a specified priority;
adds an application to a zone with a specified priority, or changes the priority of an application within a
zone; deletes an application from a zone.
Syntax Description
name Specifies a a zone name.
zone-priority number Sets the priority of the zone.
move-application Specifies the name of an application to be moved.
appl_name
to-zone name Specifies the zone to which the application is moved.
application-priority Sets the priority of the application within the zone. The range is from
number 0 (highest priority) to 7 (lowest priority).
add Adds an application to a zone at a specified priority.
application appl_name Specifies the application to be added to the zone.
application_priority Sets the priority of a new or existing application within a zone. The
number number range is from 0 (highest priority) to 7 (lowest priority).
Default
N/A.
Usage Guidelines
To configure the priority of a specific zone, use the syntax:
configure access-list zone name zone-priority number
To move an application from one zone to another, and set its priority in the new zone, use the syntax:
configure access-list zone name move-application appl-name to-zone name
application-priority number
To add an application to a zone and specify its priority or to change the priority of an application within
a zone, use the syntax:
configure access-list zone name {add} application appl-name
application_priority number
Example
The following command adds the CLI application to the zone myzone at a priority of 6:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure account
configure account [all | name]
Description
Configures a password for the specified account, either user account or administrative account.
Syntax Description
all Specifies all accounts (and future users).
name Specifies an account name.
Default
N/A.
Usage Guidelines
You must create a user or administrative account before you can configure that account with a
password.
The system prompts you to specify a password after you enter this command. You must enter a
password for this command; passwords cannot be null and cannot include the following characters: “<“,
“>”, and “?”.
Note
Once you issue this command, you cannot have a null password. However, if you want to have
a null password (that is, no password on the specified account), use the create account
command.
Passwords can have a minimum of 0 character and can have a maximum of 32 characters. Passwords
are case-sensitive. User names are not case-sensitive.
Note
If the account is configured to require a specific password format, the minimum is 8
characters. See configure account password-policy char-validation for
more information.
You must have administrator privileges to change passwords for accounts other than your own.
Example
The following example defines a new password green for the account marketing:
configure account marketing
Your keystrokes will not be echoed as you enter the new password. After you enter the password, the
switch will then prompt you to reenter it:
Reenter password: green
Assuming you enter it successfully a second time, the password is now changed.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Encrypts the password that is entered in plain text for the specified account, either user account or
administrative account.
Syntax Description
all Specifies all accounts (and future users).
name Specifies an account name.
e-password Enter in plain text the string you for an encrypted password. See
Usage Guidelines for more information.
Default
N/A.
Usage Guidelines
You must create a user or administrative account before you can configure that account with a
password.
When you use this command, the following password that you specify in plain text is entered and
displayed by the switch in an encrypted format. Administrators should enter the password in plain text.
The encrypted password is then used by the switch once it encrypts the plain text password. The
encrypted command should be used by the switch only to show, store, and load a system-generated
encrypted password in configuration; this applies with the following commands: save
configuration, show configuration, and use configuration.
Note
Once you issue this command, you cannot have a null password. However, if you want to have
a null password (that is, no password on the specified account), use the create account
command.
Passwords can have a minimum of 0 character and can have a maximum of 32 characters. Passwords
are case-sensitive. User names are not case-sensitive.
Note
If the account is configured to require a specific password format, the minimum is 8
characters. See configure account password-policy char-validation for
more information.
You must have administrator privileges to change passwords for accounts other than your own.
Example
The following command encrypts the password red for the account marketing:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Requires that the user include an upper-case letter, a lower-case letter, a digit, and a symbol in the
password.
Syntax Description
all Specifies all users (and future users).
name Specifies an account name.
none Resets password to accept all formats.
all-char-groups Specifies that the password must contain at least two characters from
each of the four groups.
Default
N/A.
Usage Guidelines
This feature is disabled by default.
Once you issue this command, each password must include at least two characters of each of the
following four types:
• Upper-case A-Z.
• Lower-case a-z.
• 0-9.
• !, @, #, $, %, ^, *, (, ).
The minimum number of characters for these specifically formatted passwords is 8 characters and the
maximum is 32 characters.
Use the none option to reset the password to accept all formats.
Example
The following example requires all users to use this specified format for all passwords:
configure account all password-policy char-validation all-char-groups
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch to verify the specified number of previous passwords for the account. The user is
prevented from changing the password on a user or administrative account to any of these previously
saved passwords.
Syntax Description
all Specifies all accounts (and future users).
name Specifies an account name.
num_passwords Specifies the number of previous passwords the system verifies for
each account. The range is 1 to 10 passwords.
none Resets the system to not remember any previous passwords.
Default
N/A.
Usage Guidelines
Use this command to instruct the system to verify new passwords against a list of all previously used
passwords, once an account successfully changes a password.
The limit is the number of previous passwords that the system checks against in the record to verify the
new password.
If this parameter is configured, the system returns an error message if a user attempts to change the
password to one that is saved by the system (up to the configured limit) for that account; this applies to
both user and administrative accounts. This also applies to a configured password on the default admin
account on the switch.
The limit of previous passwords that the system checks for previous use is configurable from 1 to 10.
Using the none option disables previous password tracking and returns the system to the default state
of no record of previous passwords.
Example
The following command instructs the system to verify that the new password has not been used as a
password in the previous 5 passwords for the account engineering:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables an account after the user has three consecutive failed login attempts.
Syntax Description
all Specifies all users (and future users).
name Specifies an account name.
on Specifies an account name.
off Resets the password to never lockout the user.
Default
N/A.
Usage Guidelines
If you are not working on SSH, you can configure the number of failed logins that trigger lockout, using
the configure cli max-failed-logins num-of-logins command.
This command applies to sessions at the console port of the switch as well as all other sessions and to
user-level and administrator-level accounts. This command locks out the user after 3 consecutive failed
login attempts; the user’s account must be specifically re-enabled by an administrator.
Using the off option resets the account to allow innumerable consecutive failed login attempts, which is
the system default. The system default is that three failed consecutive login attempts terminate the
particular session, but the user may launch another session; there is no lockout feature by default.
Note
The switch does not allow to lock out of at least one administrator account.
Example
The following command enables the account finance for lockout.
After three consecutive failed login attempts, the account is subsequently locked out:
configure account finance password-policy lockout-on-login-failures on
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to configure the lockout time period (ranging from one minute to one hour).
Syntax Description
all Configure all accounts.
name Configure a specific account name.
num_min Number of minutes (1-60) account is locked after max-failed-logins,
unless unlocked via clear account name lockout.
until-cleared Account is locked after max-failed-logins until unlocked via clear
account name lockout.
Default
Until-cleared.
Usage Guidelines
Use this command to configure the lockout time period (ranging from one minute to one hour. Note
that fail safe and admin accounts will also be locked out if lockout time period is specified. If there is
more than one admin account, admin will be locked out even if the lockout time period is set to
indefinite.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a time limit for the passwords for specified accounts. The passwords for the default admin
account and the failsafe account do not age out.
Syntax Description
all Specifies all accounts (and future users).
name Specifies an account name.
num_days Specifies the length of time that a password can be used. The range is
1 to 365 days.
none Resets the password to never expire.
Default
N/A.
Usage Guidelines
The passwords for the default admin account and the failsafe account never expire.
The time limit is specified in days, from 1 to 365 days. Existing sessions are not closed when the time
limit expires; it will not open the next time the user attempts to log in.
When a user logs into an account with an expired password, the system first verifies that the entered
password had been valid prior to expiring and then prompts the user to change the password.
Note
This is the sole time that a user with a user-level (opposed to an administrator-level) account
can make any changes to the user-level account.
Using the none option prevents the password for the specified account from ever expiring (it resets the
password to the system default of no time limit).
Example
The following command sets a 3-month time limit for the password for the account marketing:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Requires a minimum number of characters for passwords.
Syntax Description
all Specifies all accounts (and future users).
name Specifies an account name.
num_characters Specifies the minimum number of characters required for the
password. The range is 1–32 characters.
Default
N/A.
Usage Guidelines
Use this command to configure a minimum length restriction for all passwords for specified accounts.
This command affects the minimum allowed length for the next password; the current password is
unaffected.
The minimum password length is configurable from 1–32 characters. Using the none option disables the
requirement of minimum password length and returns the system to the default state (password
minimum is 0 by default).
Note
If the account is configured to require a specific password format, the minimum is 8
characters. See configure account password-policy char-validation for
more information.
Example
The following command requires a minimum of 8 letters for the password for the account management:
configure account management password-policy min-length 8
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Changes the privileges of an existing user account.
Syntax Description
account Login account.
all Specifies all accounts.
name Specifies a specific user account.
privilege Change the account privilege.
admin Administrative privilege.
user User (non-administrative) privilege.
Default
None.
Usage Guidelines
If an account is changed, any sessions that are currently logged in with that account are cleared, and
therefore forced to login again with the new privilege. If the specified account is logged in to a session
that cannot be cleared, an error message appears. If the account privilege is not changed by the option
selected in the command for the specified acount(s) (account already has that privilege), the request is
ignored and any sessions logged in with the account are not cleared.
If you attempt to remove administrative privileges from the sole account having administrative
privilege, you receive an error message.
Example
The following example adds administrative privilege to an account called "my_name":
configure account my_name privilege admin
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure banner
configure banner {after-login | { before-login } { acknowledge } |
before-login {acknowledge} save-to-configuration}
Description
Configures the banner string to be displayed for CLI screens.
Syntax Description
after-login Specifies that a banner be displayed after login.
before-login Specifies that a banner be displayed before login.
acknowledge Require acknowledgement of the banner before login.
save-to-configuration Save the before login banner to the configuration file as well as non-
volatile memory.
Default
N/A.
Usage Guidelines
Use this command to configure two types of banners:
• A banner for a CLI session that displays before login.
• A banner for a CLI session that displays after login.
If no optional parameters are specified, the command defaults to configuring a banner that is displayed
before the CLI session login prompt.
For each CLI session banner, you can enter up to 24 rows of 79-column text.
Press [Return] at the beginning of a line to terminate the command and apply the banner. To clear the
banner, press [Return] at the beginning of the first line.
Note
The system does not wait for a keypress when you use SSH for access; this only applies to the
serial console login sessions and Telnet sessions.
To disable the acknowledgement feature, use the configure banner command omitting the
acknowledge parameter.
To unconfigure one or more configured banners, use the unconfigure banner command.
Example
The following example add the text "test" before the pre-login prompt:
# configure banner before-login
test
# logout
Do you wish to save your configuration changes to primary.cfg? (y/N)
Y
test
login:
# show banner
Before-Login banner:
test
Acknowledge: Disabled
Save to : Non-volatile memory only
After-Login banner:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command adds the specified port as a primary or secondary loopback port to enable BFD
hardware assist mode.
Syntax Description
primary Unused front-panel primary port dedicated to Hardware Assist.
secondary Unused front-panel secondary port dedicated to Hardware Assist.
Default
None.
Usage Guidelines
The unused front panel port can be configured as a loopback port to enable BFD hardware assist mode.
The primary or secondary loopback port must be configured for this feature. The loopback-port is not
available for switching the user-data traffic, but is used internally by the BFD hardware to send control
packets. This port must not be part of any VLAN and should not be a trunk port. Use the none option to
unconfigure the loopback port and disable hardware assist if only the primary loopback port (or
secondary loopback port) is configured. Make sure that other applications have not already configured
these ports as loopback ports. Use the show bfd command to view the configured loopback ports.
Configuring "not-present" ports as loop-back ports is not supported.
Example
The following command configures port 10 as the primary loopback port for the BFD hardware assist
feature:
configure bfd hardware-assist primary loopback-port 10
The following command configures port 11 as secondary loopback port for BFD hardware assist feature:
configure bfd hardware-assist secondary loopback-port 11
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 and X870.
Description
Configures BFD transmit (TX) and receive (RX) intervals and multipliers on the VLAN.
Syntax Description
vlan_name Specifies the VLAN.
multiplier Specifies the detection multiplier. The range is 1 to 255.
rx_interval Specifies the receive interval for control packets in milliseconds. The
range is 100 to 4294967 ms. (3 to 4294967 ms if hardware assist is
enabled).
tx_interval Specifies the transmit interval for control packets in milliseconds. The
range is 100 to 4294967 ms. (3 to 4294967 ms if hardware assist is
enabled).
Default
The default value for RX and TX intervals is 1000 ms.
Usage Guidelines
Use this command to configure BFD.
Use the show bfd vlan command to display the current settings.
Example
The following command configures a transmit and receive interval of 2000 ms and a detection
multiplier of 2 on the VLAN vlan1:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures authentication for BFD on a VLAN.
Syntax Description
vlan_name Specifies the VLAN name.
none Specifies that no authentication is to be used. (Default)
encrypted Indicates that the password is already encrypted.
password Specifies a simple password to use to authenticate.
Default
The authentication default is none.
Usage Guidelines
Use this command to configure authentication for BFD on a VLAN using a password or specify that
none is required.
Use the show bfd vlan command to display the authentication setting.
The encrypted keyword is primarily for the output of the show configuration command, so that the
password is not revealed in the command output. Do not use it to set the password
Example
The following command configures authentication using the password password:
# configure bfd vlan vlan1 authentication simple-password password
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures a BGP aggregate route.
Syntax Description
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
ipaddress/masklength Specifies an IP network address and mask length.
as-match Generates autonomous system sequence path information (order of
AS numbers in AS_PATH is preserved).
as-set Generates autonomous system set path information (order of AS
numbers in AS_PATH is not preserved).
summary-only Specifies to send only aggregated routes to the neighbors.
advertise-policy Specifies the policy used to select routes for this aggregated route.
attribute-policy Specifies the policy used to set the attributes of the aggregated route.
Default
If no address family is specified, IPv4 unicast is the default.
N/A.
Usage Guidelines
Route aggregation is the process of combining the characteristics of several routes so that they are
advertised as a single route. Aggregation reduces the amount of information that a BGP speaker must
store and exchange with other BGP speakers. Reducing the information that is stored and exchanged
also reduces the size of the routing table.
Before you can create an aggregate route, you must enable BGP aggregation using the following
command:
enable bgp aggregation
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified address is an IPv4 address, an IPv4 address family must be specified with the
command. If the specified address is an IPv6 address, an IPv6 address family must be
specified with the command.
BGP supports overlapping routes. For example, you can configure both of the following aggregate
addresses:
• 192.0.0.0/8
• 192.168.0.0/16
After you create an aggregate route, the aggregate route remains inactive until BGP receives a route
with an IP address and mask that conforms to an aggregate route. When a conforming route is received,
the aggregate route becomes active and is advertised to BGP neighbors. If the summary-only option is
specified, only the aggregate route becomes active and is advertised. If the summary-only option is
omitted, any conforming aggregate routes and the received route are advertised to BGP neighbors.
Example
The following command configures a BGP aggregate route:
configure bgp add aggregate-address 192.1.1.4/30
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a sub-AS to a confederation.
Syntax Description
number Specifies a sub-AS number of the confederation. The range is 1 to
4294967295.
Default
N/A.
Usage Guidelines
Before you can add a sub-AS to a confederation on the switch, you must disable any BGP neighbor
sessions that are configured with the same AS number as a remote AS number. To disable BGP
neighbor sessions, use the following command:
disable bgp neighbor [remoteaddr | all]
IBGP requires networks to use a fully-meshed router configuration. This requirement does not scale
well, especially when BGP is used as an interior gateway protocol. One way to reduce the size of a fully-
meshed AS is to divide the AS into multiple sub-autonomous systems and group them into a routing
confederation. Within the confederation, all BGP speakers in each sub-AS must be fully-meshed. The
confederation is advertised to other networks as a single AS.
The AS number is a 4-byte AS number in either the ASPLAIN or the ASDOT format as described in RFC
5396, Textual Representation of Autonomous System (AS) Numbers.
Example
The following example adds one sub-AS to a confederation using the ASPLAIN 4-byte AS number
format:
configure bgp add confederation-peer sub-AS-number 65536
The following example adds one sub-AS to a confederation using the ASDOT 4-byte AS number format:
configure bgp add confederation-peer sub-AS-number 1.15
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a network to be originated from this router.
Syntax Description
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
ipaddress/ Specifies an IP network address and mask length.
masklength
policy Name of policy to be associated with network export. Policy can filter and/or
change the route parameters.
Default
If no address family is specified, IPv4 unicast is the default.
N/A.
Usage Guidelines
The network must be present in the routing table.
Using the export command to redistribute routes complements the redistribution of routes using the
configure bgp add network command. The configure bgp add network command adds
the route to BGP only if the route is present in the routing table. The enable bgp export command
redistributes an individual route from the routing table to BGP. If you use both commands to
redistribute routes, the routes redistributed using the network command take precedence over routes
redistributed using the export command.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified address is an IPv4 address, an IPv4 address family must be specified with the
command. If the specified address is an IPv6 address, an IPv6 address family must be
specified with the command.
Example
The following command adds a network to be originated from this router:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the AS number format displayed in show commands.
Syntax Description
asdot Specifies the ASDOT format.
asplain Specifies the ASPLAIN format.
Default
N/A.
Usage Guidelines
The ASPLAIN and ASDOT formats are described in RFC 5396, Textual Representation of Autonomous
System (AS) Numbers.
Example
The following command selects the ASDOT 4-byte AS number format:
configure bgp as-display-format asdot
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Changes the local AS number used by BGP.
Syntax Description
number Specifies a local AS number. The range is 1 to 4294967295.
Default
N/A.
Usage Guidelines
BGP must be disabled before the AS number can be changed.
The AS number is a 4-byte AS number in either the ASPLAIN or the ASDOT format as described in RFC
5396, Textual Representation of Autonomous System (AS) Numbers.
Example
The following command specifies a local AS number using the ASPLAIN 4-byte AS number format:
The following command specifies a local AS number using the ASDOT 4-byte AS number format:
Note
To remove the configured bgp as-number, assign as-number value as 0, i.e. configure bgp AS-
number 0.
Note
To remove the configured bgp routerid, give routerid value as 0.0.0.0 i.e. configure bgp
routerid 0.0.0.0.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the local cluster ID.
Syntax Description
cluster-id Specifies a 4 byte field used by a route reflector to recognize updates
from other route reflectors in the same cluster. The range is 0 -
4294967295.
Default
N/A.
Usage Guidelines
BGP must be disabled before the cluster ID can be changed.
Used when multiple route reflectors are used within the same cluster of clients.
Example
The following command appends a BGP route reflector cluster ID to the cluster list of a route:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Specifies a BGP routing confederation ID.
Syntax Description
confederation-id Specifies a routing confederation identifier, which is a 4-byte AS
number in the range of 1 to 4,294,967,295.
Default
N/A.
Usage Guidelines
IBGP requires that networks use a fully-meshed router configuration. This requirement does not scale
well, especially when BGP is used as an interior gateway protocol. One way to reduce the size of a fully-
meshed AS is to divide the AS into multiple sub-autonomous systems and group them into a routing
confederation. Within the confederation, each sub-AS must be fully-meshed. The confederation is
advertised to other networks as a single AS.
The confederation ID is a 4-byte AS number in either the ASPLAIN or the ASDOT format as described in
RFC 5396, Textual Representation of Autonomous System (AS) Numbers.
Example
The following command specifies a BGP routing confederation ID using the ASPLAIN 4-byte AS number
format:
The following command specifies a BGP routing confederation ID using the ASDOT 4-byte AS number
format:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes one or all BGP aggregated routes.
Syntax Description
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
ipaddress/masklength Specifies an IP network address and netmask length.
all Specifies all aggregated routes in the specified address family. If you
do not specify an address family, all aggregated routes in all address
families are deleted.
Default
N/A.
Usage Guidelines
Route aggregation is the process of combining the characteristics of several routes so that they are
advertised as a single route. Aggregation reduces the amount of information that a BGP speaker must
store and exchange with other BGP speakers. Reducing the information that is stored and exchanged
also reduces the size of the routing table.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified address is an IPv4 address, an IPv4 address family must be specified with the
command. If the specified address is an IPv6 address, an IPv6 address family must be
specified with the command.
Example
The following command deletes a BGP aggregate route:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Specifies a sub-AS that should be deleted from a confederation.
Syntax Description
sub-AS-number Specifies a sub-AS.
Default
N/A.
Usage Guidelines
Before you can change the configuration with this command, you must disable the BGP neighbors in
the confederation using the following command:
disable bgp neighbor [remoteaddr | all]
Example
The following command deletes a sub-AS from a confederation using the ASPLAIN 4-byte AS number
format:
The following command deletes a sub-AS from a confederation using the ASDOT 4-byte AS number
format:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a network to be originated from this router.
Syntax Description
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
all Specifies all networks for the specified address family. If no address
family is specified, all networks for all address families are deleted.
ipaddress/masklength Specifies an IP network address and netmask length.
Default
N/A.
Usage Guidelines
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified address is an IPv4 address, an IPv4 address family must be specified with the
command. If the specified address is an IPv6 address, an IPv6 address family must be
specified with the command.
Example
The following command deletes a network to be originated from this router:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures route distinguishers for an EVPN instance.
Syntax Description
bgp BGP capability.
evpn EVPN protocol.
instance Specifies configuring an EVPN instance
evpn_instance_name Specifies name of the EVPN instance.
rd Specifies configuring route distinguisher.
rd_value Route distinguisher in format <admin>:<assigned number>.
auto Specifes auto-derived route distinguisher values (default).
Default
By default, auto-derived route distinguisher values are used.
Example
The specifies auto-derived route distinguisher values for the EVPN instand "my_evpn":
# configure bgp evpn instance my_evpn rd auto
Warning: Changing RD value for EVPN instance my_evpn from to 'auto calculated' instance
will be reset
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures route targets for an EVPN instance.
Syntax Description
bgp BGP capability.
evpn EVPN protocol.
instance Specifies configuring an EVPN instance
evpn_instance_name Specifies name of the EVPN instance.
route-target Designates setting the route target association. Default is autoderived
import and export.
import Selects import route target.
export Selects export route target.
both Specifies import and export route target mode (default).
add Adds a route target.
delete Deletes a route target.
route_target Route target in format <global-admin-value>:<local-admin-value>.
Default
By default, if you do not specify route target, then the auto-derived values are used.
If you do not specify, import and export route target mode applies
Usage Guidelines
For EBGP applications of EVPN, the auto-derived values will not match between BGP peers since local
autonomous system (AS) is used in the derivation, and these differ between EBGP peers.
Note that the route target mode (import, export, or both) is automatically adjusted depending on
configuration. For example, if an “import” target exists and you add an “export” target for the same
value, the mode is automatically changed to “both”. Similarly, an entry can be deleted by mode. For
example, if an entry has mode of “both” and you delete the “import” target of the same value, the entry
is not deleted, instead its mode is changed to “export”. An attempt to delete an entry that does not
exist (value or mode) produces an error message and no action is taken. For example, if you attempt to
delete a route target using “both”, but the configured entry was only configured as “import” an error
message appears, and no action is taken.
Example
The following example configures for instance "my_evpn" route target both mode:
# configure bgp evpn instance my_evpn route-target both
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds or deletes a virtual extensible local area network (VXLAN) virtual network identifier (VNI) to an
EVPN instance.
Syntax Description
bgp BGP capability.
evpn EVPN protocol.
instance Specifies configuring an EVPN instance
evpn_instance_name Specifies name of the EVPN instance.
vxlan Specifies termination.
vni Specifies adding a VXLAN VNI to an EVPN instance.
vni_name Specifies the VNI (range = 1–16,777,215).
none Removes existing VNI setting for this EVPN instance.
Default
N/A.
Example
The following example adds the VXLAN VNI "12345" to an EVPN instance named "my_evpn":
# configure bgp evpn instance my_evpn vxlan vni 12345
The following example removes the existing VXLAN VNI associated with the EVPN instance named
"my_evpn":
# configure bgp evpn instance my_evpn vxlan vni none
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the shutdown priority for IGP export.
Syntax Description
route_type Specifies the BGP export route type.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
number Specifies the shutdown priority. The range is 0 - 65,535.
Default
The default value is 2048.
Note
You must specify an IPv6 address family for an IPv6 peer, because an IPv6 peer does not
support the default IPv4 unicast address family. Similarly, if you specify an IPv4 peer and an
address family in the command, an IPv4 address family must be specified.
Usage Guidelines
To export IPv6 protocols to BGP, you must specify an IPv6 address family.
Note
This command is not currently supported, and is not recommended for use.
Higher priority values lower the chance of an IGP export to be automatically disabled in case BGP or the
system goes to a low memory condition.
Note
For this command to execute, the specified protocol must support the specified address
family. For example, the command fails if you specify OSPF and the IPv6 unicast address
family. You can specify blackhole, direct, static, and IS-IS routes with IPv4 or IPv6 address
families.
Example
The following command configures the shutdown priority of BGP exported OSPF routes to 1000:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the import policy for BGP.
Syntax Description
policy-name Specifies the policy.
none Specifies no policy.
Default
N/A.
Usage Guidelines
Use the none keyword to remove a BGP import policy.
An import policy is used to modify route attributes while adding BGP routes to the IP route table.
Example
The following command configures a policy imprt_plcy for BGP:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Changes the default local preference attribute.
Syntax Description
number Specifies a value used to advertise this router’s degree of preference
to other routers within the AS. Range is 0 to 2147483647.
Default
100.
Usage Guidelines
BGP must be disabled before the local preference attribute can be changed.
BGP selects routes based on the following precedence (from highest to lowest):
• higher weight
• higher local preference
• shortest length (shortest AS path)
• lowest origin code
• lowest MED
• route from external peer
• lowest cost to Next Hop
• lowest routerID
Local preference is used to determine a preferred exit point from an AS. Local preferences are
exchanged throughout the AS. A change in the local-preference can result in a change in routing and
forwarding of traffic leaving the AS.
Example
The following command changes the default local preference attribute to 500:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command adds support for filtering BGP updates based on a specified maximum autonomous
system path (AS-path) length. This support is on a per BGP instance basis (not per neighbor).
Syntax Description
maximum-as-path- Specifies setting the AS path length.
length
max-as-path Value specifying the AS path length.
Range is 1 to 1,500.
none Specifies no maximum AS path length.
Default
N/A
Usage Guidelines
It can be desirable to protect the router against BGP updates with excessively long AS-paths to ensure
memory is not exhausted. Any BGP updates that exceed this user-defined limit are dropped. This
setting does not affect existing routes.
Example
The following example sets the AS-path to 500.
configure bgp maximum-as-path-length 500
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X450-G2, X460-G2, X670-G2, X465, X590, X620,
X690, X870.
Description
Enables or disables the BGP ECMP (Equal Cost Multi Paths) feature and specifies the maximum number
of paths supported on the current VR.
Syntax Description
max-paths Specifies the maximum number of paths. The range is 1 to 64. The
value 1 disables BGP ECMP. A value greater than 1 enables BGP ECMP
and specifies the maximum number of paths.
Default
One. BGP ECMP is disabled.
Usage Guidelines
This command triggers the BGP decision process, causing BGP to re-install the entire BGP routing table
into the IP forwarding table. This activity requires a significant amount of switch processor resources, so
we recommend that you enable or disable the BGP ECMP feature before enabling the BGP protocol
globally on a VR. To ensure that BGP ECMP routes are programmed in the hardware, enter the enable
iproute sharing command.
Note
BGP must be disabled before you can change the configuration with this command.
Example
The following command enables BGP ECMP and sets the maximum number of paths to 4 (the
maximum number of possible paths is 64):
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the metric to be included in the Multi-Exit-Discriminator (MED) path attribute.The MED path
attribute is included in route updates sent to external peers if a value is configured.
Syntax Description
none Specifies not to use a multi-exist-discriminator number.
bgp_med Specifies a multi-exit-discriminator number. The range is
0-2147483647.
Default
N/A.
Usage Guidelines
BGP selects routes based on the following precedence (from highest to lowest):
• higher weight
• higher local preference
• shortest length (shortest AS path)
• lowest origin code
• lowest MED
• route from external peer
• lowest cost to Next Hop
• lowest routerID
Note
BGP must be disabled before you can change the configuration with this command.
Example
The following command configures the metric to be included in the MED path attribute:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures EBGP to receive and accept a looped EBGP route from the specified neighbor, provided the
number of occurrences of local AS number in AS-Path is less than or equal to the value of as-count.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors. If
an IPv6 address family is specified, the configuration applies to all
IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support. This
address family is applicable for PE to PE BGP neighbor sessions only.
This keyword may prompt warning or error messages if executed for a
regular BGP neighbor session or for a PE to CE neighbor session.
as-count The maximum number of occurrences of local AS number in the
received route AS-Path. If the number of occurrences of local AS
number in AS-Path is more than as-count, the route is not accepted.
The valid range is from 1-16.
Default
This feature is disabled by default.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Usage Guidelines
In a hub and spoke configuration, it becomes necessary to accept an inbound EBGP route even though
the route's AS-Path contains the receiver's own AS-number. In such network topologies, this feature can
be enabled.
Note
A looped AS path is always allowed for IBGP, irrespective of the BGP configuration.
All EBGP routes with looped AS-Path are silently discarded by default.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following example enables BGP to accept looped BGP routes that contains a maximum of 6
occurrences of receiver's AS-number in AS-Path attribute:
History
This command required a specific license in ExtremeXOS 11.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Allows the local router to accept peering sessions intended for the specified alternate local autonomous
system (AS).
Syntax Description
bgp Specifies BGP.
neighbor Specifies BGP neighbor.
Default
N/A.
Usage Guidelines
This command provides configuration flexibility, particularly when peering with third-party devices that
may use a different AS number than the ExtremeXOS device uses for auto-peering.
Example
The following example configures the BPG neighbor at 192.168.99.1 to use an alternate local AS "50":
# configure bgp neighbor 192.168.99.1 alternate-local-as 50
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables or disables Bidirectional Forwarding Detection (BFD) protection of BGP peering sessions.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors. If
an IPv6 address family is specified, the configuration applies to all
IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
bfd on | off Configures BFD detection for the specified neighbor(s).
Default
BFD is disabled on neighbor by default.
Usage Guidelines
You must disable a neighbor before configuring BFD.
Example
The following example enables BFD on neighbor 192.168.24.2:
# disable bgp neighbor 192.168.24.2
# configure bgp neighbor 192.168.24.2 bfd on
# enable bgp neighbor 192.168.24.2
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
ExtremeSwitching X460-G2, X670-G2, X450-G2, X465, X590, X690, X870 series switches, with Core
License or above.
Description
Configures the route flap dampening feature for a BGP neighbor.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors. If
an IPv6 address family is specified, the configuration applies to all
IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support. This
address family is applicable for PE to PE BGP neighbor sessions only.
Using this keyword may prompt warning or error messages if
executed for a regular BGP neighbor session, or for a PE to CE
neighbor session.
half-life Specifies the dampening half life. Range is 1 to 45 minutes.
reuse-limit Specifies the reuse limit. Range is 1 to 20000.
suppress-limit Specifies the suppress limit. Range is 1 to 20000.
max-suppress Specifies the maximum hold down time. Range is 1 to 255 minutes.
policy-filter Specifies a policy.
none Removes the configured policy.
Default
This feature is disabled by default.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Usage Guidelines
This command applies to the current VR or VRF context.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
The half life is the period of time, in minutes, during which the accumulated penalty of a route is
reduced by half. The range is 1 to 45 minutes, and the default is 15 minutes.
The reuse limit is the penalty value below which a route is used again. The range is 1-20,000, and the
default is 750.
The suppress limit is the penalty value above which a route is suppressed. The range is 1-20,000, and
the default is 2,000.
The maximum hold down time is the maximum time a route can be suppressed, no matter how
unstable it has been, as long as it no longer flaps. The range is 1-255 minutes, and the default is 4 * the
half life.
If you change dampening parameters when routes are in suppressed or history state, the new
dampening parameters apply only to routes in the active state. Routes in the suppressed or history
state continue to use the old dampening parameters until they become active, at which time they use
the updated dampening parameters.
Instead of explicitly configuring the dampening parameters using the command line, you can associate
a policy using the policy-filter option. Multiple sets of parameters can be supplied using a policy.
Use the following command to disable route flap dampening for BGP neighbors:
configure bgp neighbor [remoteaddr | all] {address-family [ipv4-unicast
| ipv4-multicast | ipv6-unicast | ipv6-multicast | vpnv4]} no-dampening
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures route flap dampening to the BGP neighbor at 192.168.1.22 to the
default values:
configure bgp neighbor 192.168.1.22 dampening
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a description for a BGP neighbor.
Syntax Description
all Specifies all IPv4 and IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
description Specifies a string used to describe the neighbor.
Default
The description is a NULL string by default.
Usage Guidelines
Use this command to attach a description to a BGP neighbor. This description is displayed in the output
of the show bgp neighbor command when you specify the detail option, or when you specify a
particular neighbor. Enclose the string in double quotes if there are any blank spaces in the string. The
maximum length of the string is 56 characters.
If you do not specify the description parameter, the description is reset to the default.
Example
The following command configures the description for the BGP neighbor 192.168.1.22 to Toledo_5:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables EBGP from receiving and accepting a looped EBGP route from the specified neighbor,
provided the number of occurrences of local AS number in AS-Path is less than or equal to the value of
as-count.
Syntax Description
all Specifies that the configuration change applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration change applies to all IPv4
neighbors. If an IPv6 address family is specified, the configuration
change applies to all IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
This feature is disabled by default.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Usage Guidelines
In a hub and spoke configuration, it becomes necessary to accept an inbound EBGP route even though
the route's AS-Path contains the receiver's own AS-number. In such network topologies, this feature can
be enabled.
Note
A looped AS path is always allowed for IBGP, irrespective of the BGP configuration.
All EBGP routes with looped AS-Path are silently discarded by default.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the maximum number of IP prefixes accepted from a BGP neighbor.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses the IP
address format to determine if the address is an IPv4 or IPv6 address.
all Specifies that the configuration applies to all neighbors in the specified
address family. If no address family is specified or if an IPv4 address is
specified, the configuration applies to all IPv4 neighbors. If an IPv6 address
family is specified, the configuration applies to all IPv6 neighbors.
ipv4-unicast Specifies the IPv4 unicast address family.
Default
This feature is disabled by default.
Usage Guidelines
This command applies to the current VR or VRF context.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
Configure the peer group before configuring the neighbors. To configure the peer group, use the
following command:
configure bgp peer-group peer-group-name {address-family [ipv4-unicast |
ipv4-multicast | ipv6-unicast | ipv6-multicast | vpnv4]} maximum-prefix
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures the maximum number of IP prefixes accepted from all neighbors to
5000, sets the threshold for warning messages to 60%, and specifies SNMP traps:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the next hop address used in the outgoing updates to be the address of the BGP connection
originating the update.
Syntax Description
remoteaddr Specifies an IP address.
all Specifies all neighbors.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
This command applies to the current VR or VRF context. These settings apply to the peer group and all
neighbors of the peer group.
Note
The BGP neighbor must be disabled before you can change the configuration with this
command.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures the next hop address used in the updates to be the address of the
BGP connection originating it:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures no route flap dampening over BGP peer sessions (disables route flap dampening).
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors. If
an IPv6 address family is specified, the configuration applies to all
IPv6 neighbors.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
This feature is disabled by default.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Usage Guidelines
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
Use the following command to enable route flap dampening for BGP neighbors:
configure bgp neighbor [all | remoteaddr] {address-family [ipv4-unicast
| ipv4-multicast | ipv6-unicast | ipv6-multicast | vpnv4]} dampening
{{half-life half-life-minutes {reuse-limit reuse-limit-number suppress-
limit suppress-limit-number max-suppress max-suppress-minutes} | policy-
filter [policy-name | none]}
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command disables route flap dampening to the BGP neighbor at 192.168.1.22:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an RSA Data Security, Inc. MD5 (Message-Digest algorithm 5) Message-Digest Algorithm
secret password for a neighbor.
Syntax Description
all Specifies all IPv4 and IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
none Specifies not to use a password
encrypted Specifies an encrypted string; do not use.
tcpPassword Specifies a password string.
Default
N/A.
Usage Guidelines
This command applies to the current VR or VRF context.
You must disable the BGP neighbor before changing the password.
When a password is configured, TCP RSA Data Security, Inc. MD5 Message-Digest Algorithm
authentication is enabled on the TCP connection that is established with the neighbor.
Changes made to the parameters of a peer group are applied to all neighbors in the peer group.
To change any one of the following parameters you must disable and re-enable the peer session:
• timer
• source-interface
• soft-in-reset
• password
Changing a route reflector client automatically disables and enables the peer session.
The encrypted option is used by the switch when generating a configuration file, and when parsing a
switch-generated configuration file. Do not select the encrypted option in the CLI.
Example
The following command configures the password for a neighbor as Extreme:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an existing neighbor as the member of a peer group.
Syntax Description
all Specifies all neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
peer-group-name Specifies a peer group name.
none Removes the neighbor from the peer group.
acquire-all Specifies that all parameters should be inherited by the neighbor from
the peer group.
Default
By default, remote AS (if configured for the peer group), source-interface, outbound route policy, send-
community and next-hop-self settings are inherited.
Usage Guidelines
This command applies to the current VR or VRF context.
If acquire-all is not specified, only the default parameters are inherited by the neighbor.
When you remove a neighbor from a peer group, it retains the parameter settings of the group. The
parameter values are not reset to those the neighbor had before it inherited the peer group values.
To create a new neighbor and add it to a BGP peer group, use the following command:
create bgp neighbor remoteaddr peer-group peer-group-name {multi-hop}
The new neighbor is created as part of the peer group and inherits all of the existing parameters of the
peer group. The peer group must have a remote AS configured.
If you are adding an IPv4 peer to a peer group and no IPv4 address family capabilities are assigned to
the specified peer group, the IPv4 unicast and multicast address families are automatically enabled for
that peer group. If you adding an IPv6 peer to a peer group and no IPv6 address family capabilities are
assigned to the peer group, you must explicitly enable the IPv6 address family capabilities you want to
support.
Note
If the peer group or any member of the peer group has been configured with an IPv4 or IPv6
address family, the peer group only accepts peers that are configured to use that family. For
example, if a peer group is configured for the IPv4 unicast address family, the switch will not
allow you to add an IPv6 peer. LIkewise, an IPv6 peer group cannot accept an IPv4 peer.
Example
The following command configures an existing neighbor as the member of the peer group outer:
configure bgp neighbor 192.1.1.22 peer-group outer
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a route map filter for a neighbor.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors. If
an IPv6 address family is specified, the configuration applies to all
IPv6 neighbors.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support. This
address family is applicable for PE to PE BGP neighbor sessions only.
This keyword may prompt warning or error messages if executed for a
regular BGP neighbor session, or for a PE to CE neighbor session.
in Specifies to install the filter on the input side.
out Specifies to install the filter on the output side.
none Specifies to remove the filter.
policy Specifies a policy.
Default
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Usage Guidelines
This command applies to the current VR or VRF context.
The policy can be installed on the input or output side of the router. The policy is used to modify or filter
the NLRI information and the path attributes associated with it when exchanging updates with the
neighbor.
Note
A policy file applied to BGP neighbors cannot have NLRI for both IPv4 and IPv6 address
families defined in the same policy file.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures the route-policy filter for a neighbor based on the policy nosales:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a BGP neighbor to be a route reflector client.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
Default
N/A.
Usage Guidelines
Another way to overcome the difficulties of creating a fully-meshed AS is to use route reflectors. Route
reflectors allow a single router to serve as a central routing point for the AS or sub-AS.
Use this command to implicitly define the router to be a route reflector. The neighbor must be in the
same AS as the router.
When changing the route reflector status of a peer, the peer is automatically disabled and re-enabled
and a warning message appears on the console and in the log.
A cluster is formed by the route reflector and its client routers. Peer routers that are not part of the
cluster must be fully meshed according to the rules of BGP.
Example
The following command configures a BGP neighbor to be a route reflector client:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures whether the community path attribute associated with a BGP NLRI should be included in the
route updates sent to the BGP neighbor.
Syntax Description
remoteaddr Specifies an IP address of a BGP neighbor.
all Specifies all neighbors.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support. This
address family is applicable for PE to PE BGP neighbor sessions only.
This keyword may prompt warning or error messages if executed for a
regular BGP neighbor session, or for a PE to CE neighbor session.
send-community Specifies to include the community path attribute.
dont-send-community Specifies not to include the community path attribute.
both Send both standard and extended community attributes to this BGP
neighbor, or neighbors in peer group
extended Send only extended communities to this BGP neighbor or neighbors
in peer group
standard Send only standard communities to this BGP neighbor or neighbors in
peer group
Default
If no address family is specified, IPv4 unicast is the default. If no optional keyword (both, standard or
extended) is specified, standard is assumed.
Usage Guidelines
A BGP community is a group of BGP destinations that require common handling. ExtremeXOS supports
the following well-known BGP community attributes:
• no-export
• no-advertise
• no-export-subconfed
The command is additive; that is, if the command is executed twice with the standard or extended
option, both the extended and standard communities are sent to the BGP neighbor.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command includes the community path attribute associated with a BGP NLRI in the route
updates sent to all BGP neighbors:
History
This command was first available in ExtremeXOS 10.1.
Options to control the advertisement of extended community attributes were added in ExtremeXOS12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the shutdown priority for a BGP neighbor.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
number Specifies the shutdown priority. The range is 0 - 65,535.
Default
The default value is 1024.
Usage Guidelines
Note
This command is not currently supported, and is not recommended for use.
Higher priority values lower the chance of a BGP neighbor to be automatically disabled in case BGP or
the system goes to a low memory condition.
Example
The following command configures the shutdown priority of the BGP neighbor 10.0.20.1 to 500:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Applies the current input or output routing policy to the routing information already exchanged with
the neighbor.
Syntax Description
remoteaddr Specifies an IP address of a BGP neighbor.
all Specifies all neighbors.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support. This
address family is applicable for PE to PE BGP neighbor sessions only.
This keyword may prompt warning or error messages if executed for a
regular BGP neighbor session, or for a PE to CE neighbor session.
l2vpn-evpn Specifies the Layer 2 VPN-EVPN address family.
soft-reset Do a soft reconfiguration for the BGP neighbor.
in Specifies to apply the input routing policy.
out Specifies to apply the output routing policy.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
The input/output policy is determined by the route policy configured for the neighbor on the input
and/or output side of the router. This command does not affect the switch configuration.
If both the local BGP neighbor and the neighbor router support the route refresh capability, a dynamic
soft input reset can be performed. The configure bgp neighbor soft-reset command triggers the
generation of a Route-Refresh message to the neighbor. As a response to the Route-Refresh message,
the neighbor sends the entire BGP routing table in updates and the switch applies the appropriate
routing policy to the updates.
If the route-refresh capability is not supported by the neighbor, the configure bgp neighbor
soft-reset command reprocesses the BGP route database using the policy configured for that
neighbor.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command applies the current input routing policy to the routing information already
exchanged with the neighbor:
# configure bgp neighbor 192.168.1.5 soft-reset in
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Changes the BGP source interface for TCP connections.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
Default
Any.
Usage Guidelines
The source interface IP address must be a valid IP address of any VLAN configured on the switch.
Example
The following command changes the BGP source interface to 10.43.55.10:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the BGP neighbor timers.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
keepalive Specifies a BGP neighbor timer keepalive time in seconds. The range
is 0 to 21,845 seconds.
holdtime Specifies a BGP neighbor timer hold time in seconds. The range is 0
and 3to65,535 seconds.
Default
The default keepalive setting is 60 seconds. The default hold time is 180 seconds.
Usage Guidelines
You must disable the BGP neighbor before changing the timer values.
Example
The following command configures the BGP neighbor timers:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Assigns a locally-used weight to a neighbor connection for the route selection algorithm.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
weight Specifies a BGP neighbor weight.
Default
By default, the weight is 1.
Usage Guidelines
All routes learned from this peer are assigned the same weight. The route with the highest weight is
more preferable when multiple routes are available to the same network. The range is 0 to 65,535.
BGP selects routes based on the following precedence (from highest to lowest):
• higher weight
• higher local preference
• shortest length (shortest AS path)
• lowest origin code
• lowest MED
• route from external peer
• lowest cost to Next Hop
• lowest routerID
Example
The following command assigns a locally used weight of 10 to a neighbor connection:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures BGP to receive and accept a looped BGP route from the neighbors of the specified peer
group, provided the number of occurrences of local AS number in AS-Path is less than or equal to that
specified in as-count.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
as-count The maximum number of occurrences of local AS number in the
received route AS-Path. If the number of occurrences of local AS
number in AS-Path is more than as-count, the route is not accepted.
The valid range is from 1-16.
Default
This feature is disabled by default.
Usage Guidelines
In a hub and spoke configuration, it becomes necessary to accept an inbound BGP route even though
the route's AS-Path contains the receiver's own AS-number. In such network topologies, this feature can
be enabled.
This feature can also be enabled for both IBGP and EBGP neighbors, wherever necessary.
Note
BGP neighbors do not inherit the allowas-in configuration from their peer group unless you
explicitly specify the acquire-all option when adding a neighbor to a peer-group.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following example enables BGP to accept looped BGP routes that contains a maximum of 8
occurrences of receiver's AS-number in AS-Path attribute:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures route flap dampening for a BGP peer group.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
half-life-minutes Specifies the dampening half life.
reuse-limit-number Specifies the reuse limit.
suppress-limit-number Specifies the suppress limit.
max-suppress-minutes Specifies the maximum hold down time.
policy-name Specifies a policy.
none Removes any policy association.
Default
This feature is disabled by default.
Usage Guidelines
This command applies to the current VR or VRF context.
The half life is the period of time, in minutes, during which the accumulated penalty of a route is
reduced by half. The range is 1 to 45 minutes, and the default is 15 minutes.
The reuse limit is the penalty value below which a route is used again. The range is 1-20,000, and the
default is 750.
The suppress limit is the penalty value above which a route is suppressed. The range is 1-20,000, and
the default is 2,000.
The maximum hold down time is the maximum time a route can be suppressed, no matter how
unstable it has been, as long as it no longer flaps. The range is 1-255 minutes, and the default is 4 * the
half life.
If you change dampening parameters when routes are in suppressed or history state, the new
dampening parameters apply only to routes in the active state. Routes in the suppressed or history
state continue to use the old dampening parameters until they become active, at which time they use
the updated dampening parameters.
Instead of explicitly configuring the dampening parameters using the command line, you can associate
a policy using the policy-filter option. Multiple sets of parameters can be supplied using a policy.
Use the following command to disable route flap dampening for a BGP peer-group:
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures route flap dampening for the BGP peer group outer:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables BGP from receiving and accepting a looped BGP route from the neighbors of the specified
peer group, provided the number of occurrences of local AS number in AS-Path is less than or equal to
that specified in as-count.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
This feature is disabled by default.
Usage Guidelines
This command applies to the current VR or VRF context.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Note
BGP neighbors do not inherit the allowas-in configuration from their peer group unless you
explicitly specify the acquire-all option when adding a neighbor to a peer-group.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the maximum number of IP prefixes accepted for all neighbors in the peer group.
Syntax Description
name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
number Specifies the maximum number of prefixes that can be accepted. The
range is 0 to 4294967294. A value of 0 disables prefix limit feature.
percent Specifies the percentage of the maximum prefix (threshold) at which
a warning message is printed in the log (and on the console). An
SNMP trap can also be sent.
teardown Specifies that the peer session is torn down when the maximum is
exceeded.
seconds Specifies the length of time before the session is re-established, if the
session has been torn down due to exceeding the max limit. If the hold
down interval is 0 or not specified, it is kept down until the peer is
enabled. The range is 30 to 86400 seconds.
send-traps Specifies sending “number of prefix reached threshold” and “number
of prefix exceed the max-prefix limit” SNMP traps.
Default
This feature is disabled by default.
Usage Guidelines
This command applies to the current VR or VRF context.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
Configure the peer group before configuring the neighbors. To configure the neighbors, use the
following command:
After you enter this command, the switch automatically disables and enables all neighbors in the peer
group before the change takes effect.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures the maximum number of IP prefixes accepted from the peer group
outer to 5000, sets the threshold for warning messages to 60%, and specifies SNMP traps:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the next hop address used in the updates to be the address of the BGP connection
originating the update.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
next-hop-self Specifies that the next hop address used in the updates be the
address of the BGP connection originating it.
no-next-hop-self Specifies that the next hop address used in the updates not be the
address of the BGP connection originating it (Let the BGP protocol
decide the next hop).
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
This command applies to the current VR or VRF context.
These settings apply to the peer group and all neighbors of the peer group.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures the next hop address used in the updates to be the address of the
BGP connection originating it:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures no route flap dampening for a BGP peer group (disables route flap dampening).
Syntax Description
peer-group-name Specifies a BGP peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
This feature is disabled by default.
Usage Guidelines
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
Use the following command to enable route flap dampening for a BGP peer-group:
configure bgp peer-group peer-group-name {address-family [ipv4-unicast |
ipv4-multicast | ipv6-unicast | ipv6-multicast | vpnv4]} dampening
{{half-life half-life-minutes {reuse-limit reuse-limit-number suppress-
limit suppress-limit-number max-suppress max-suppress-minutes}} |
policy-filter [policy-name | none]}
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command disables route flap dampening to the BGP peer group outer:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Desccription
Configures the TCP RSA Data Security, Inc. MD5 Message-Digest Algorithm secret password for a peer
group and all neighbors of the peer group.
Syntax Description
peer-group-name Specifies a peer group.
none Specifies no password.
tcpPassword Specifies a password.
encrypted Specifies an encrypted string.
Default
N/A.
Usage Guidelines
Changes made to the parameters of a peer group are applied to all neighbors in the peer group.
After you enter this command, the switch automatically disables and enables all neighbors in the peer
group before the change takes effect.
Example
The following command configures the password as Extreme for the peer group outer and its
neighbors:
configure bgp peer-group outer password extreme
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the remote AS number for a peer group and all the neighbors of the peer group.
Syntax Description
peer-group-name Specifies a peer group.
number Specifies a remote AS number. The range is 1 to 4294967295.
Default
N/A.
Usage Guidelines
The AS number is a 4-byte AS number in either the ASPLAIN or the ASDOT format as described in RFC
5396, Textual Representation of Autonomous System (AS) Numbers.
Changes made to the parameters of a peer group are applied to all neighbors in the peer group.
After you enter this command, the switch automatically disables and enables all neighbors in the peer
group before the change takes effect.
Example
The following example configures the remote AS number for the peer group outer and its neighbors
using the ASPLAIN 4-byte AS number format:
configure bgp peer-group outer remote-AS-number 65536
The following example configures the remote AS number for the peer group abc and its neighbors
using the ASDOT 4-byte AS number format:
configure bgp peer-group abc remote-AS-number 1.10
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the policy for a peer group and all the neighbors of the peer group.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
in Specifies to install the policy on the input side.
out Specifies to install the policy on the output side.
none Specifies to remove the filter.
policy Specifies a policy.
Default
There is no default policy configuration.
Usage Guidelines
This command applies to the current VR or VRF context.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures the route policy for the peer group outer and its neighbors using
the policy nosales:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures all the peers in a peer group to be a route reflector client.
Syntax Description
peer-group-name Specifies a peer group.
route-reflector- Specifies that all the neighbors in the peer group be a route reflector
client client.
no-route-reflector- Specifies that all the neighbors in the peer group not be a route
client reflector client.
Default
N/A.
Usage Guidelines
This command implicitly defines this router to be a route reflector.
Example
The following command configures the peer group outer as a route reflector client:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures whether communities should be sent to neighbors as part of route updates.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
send-community Specifies that communities are sent to neighbors as part of route
updates.
dont-send-community Specifies that communities are not sent to neighbors as part of route
updates.
both Send both standard and extended community attributes to this BGP
neighbor, or neighbors in peer group.
extended Send only extended communities to this BGP neighbor or neighbors
in peer group.
standard Send only standard communities to this BGP neighbor or neighbors in
peer group.
Default
If no address family is specified, IPv4 unicast is the default. If no optional keyword (both, standard or
extended) is specified, standard is assumed.
Usage Guidelines
These settings apply to the peer group and all neighbors of the peer group.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
The command is additive; that is, if the command is executed twice with the standard or extended
option, both the extended and standard communities are sent to the BGP neighbor.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command configures communities to be sent to neighbors as part of route updates:
History
This command was first available in ExtremeXOS 10.1.
Options to control the advertisement of extended community attributes were added in ExtremeXOS12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Applies the current input/output routing policy to the neighbors in the peer group.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
in Specifies to apply the input routing policy.
out Specifies to apply the output routing policy.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
The input/output routing policy is determined by the route policy configured for the neighbors in the
peer group on the input/output side of the router. This command does not affect configuration of the
switch.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
Changes made to the parameters of a peer group are applied to all neighbors in the peer group.
Any configuration change with this command automatically disables and enables the neighbors before
the changes.
To configure this feature on Layer 3 VPNs, you must configure this feature in the context of the MPLS-
enabled VR; this feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command applies the current input routing policy to the neighbors in the peer group
outer:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the source interface for a peer group and all the neighbors of the peer group.
Syntax Description
peer-group-name Specifies a peer group.
any Specifies any source interface.
ipAddr Specifies an interface.
Default
N/A.
Usage Guidelines
The source interface IP address must be a valid IP address of a VLAN configured on the switch.
Changes made to the parameters of a peer group are applied to all neighbors in the peer group.
After you enter this command, the switch automatically disables and enables the neighbors so that the
changes can take effect.
Example
The following command configures the source interface for the peer group outer and its neighbors on
10.34.25.10:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the keepalive timer and hold timer values for a peer group and all the neighbors of the peer
group.
Syntax Description
peer-group-name Specifies a peer group.
keep-alive seconds Specifies a keepalive time in seconds. Range is 0 to 21845.
hold-time seconds Specifies a hold-time in seconds. Range is 0 and 3 to 65535.
Default
N/A.
Usage Guidelines
This command applies to the current VR or VRF context.
Changes made to the parameters of a peer group are applied to all neighbors in the peer group.
After you enter this command, the switch automatically disables and enables all neighbors in the peer
group before the change takes effect.
Example
The following command configures the keepalive timer and hold timer values for the peer group outer
and its neighbors:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the weight for the peer group and all the neighbors of the peer group.
Syntax Description
peer-group-name Specifies a peer group.
weight Specifies a BGP peer group weight. Range is 0 to 65,535.
Default
N/A.
Usage Guidelines
BGP selects routes based on the following precedence (from highest to lowest):
• higher weight
• higher local preference
• shortest length (shortest AS path)
• lowest origin code
• lowest MED
• route from external peer
• lowest cost to Next Hop
• lowest routerID
Example
The following command configures the weight for the peer group outer and its neighbors:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the address family used with graceful BGP restart.
Syntax Description
add Add the address family.
delete Remove the address family.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
Default
The default is IPv4 unicast.
Usage Guidelines
Before you can enter this command, you must disable BGP services on the switch with the disable
bgp command.
This command configures the address family participating in graceful BGP restart. An address family
can be added or deleted. By adding an address family, BGP instructs the switch to preserve BGP routes
of that address family during a graceful restart. The local OPEN message contains all the added address
families.
Note
When graceful restart is enabled on the switch, the IPv4 unicast address family support is
added by default. Graceful restart for other address families must be explicitly added using
this command.
For BGP graceful restart to inter-operate with Cisco routers, any restarting routers connected
to Cisco routers must be configured with the command, enable bgp neighbor
capability, in the following form: enable bgp neighbor remoteaddr
capability ipv4-unicast. The command must be executed before BGP is enabled
globally on the switch.
Example
The following command configures a router to add IPv4 unicast addresses to graceful BGP restarts:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the restart time used with graceful BGP restart. This is the maximum time a receiver router
waits for a restarting router to come back up.
Syntax Description
seconds Specifies the restart time. The range is 1 to 3600 seconds.
Default
The default is 120 seconds.
Usage Guidelines
Before you can enter this command, you must disable BGP services on the switch with the disable
bgp command.
This command configures the restart timer. This timer is started on the receiver router when it detects
the neighbor router is restarting (usually when the peer TCP session is reset). At that time, routes from
the restarting router are marked as stale, but are preserved in the routing table. The timer is stopped
when the restarting BGP neighbor goes to the ESTABLISHED state (it has finished restarting). If the
timer expires, the stale routes are deleted.
Example
The following command configures the graceful BGP restart timer:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the stale route timer used with graceful BGP restart. This is the maximum time to hold stale
paths on receiver routers while its neighbor gracefully restarts.
Syntax Description
seconds Specifies the stale route time. The range is 1 to 3600 seconds.
Default
The default is 360 seconds.
Usage Guidelines
Before you can enter this command, you must disable BGP services on the switch with the disable
bgp command.
This command configures the stale route timer. This timer is started when the restarting BGP peer goes
to the ESTABLISHED state after it restarts. The timer is stopped when the restarting BGP peer sends
EOR messages for all address families. When the timer is stopped, or it expires, the stale routes are
deleted.
Example
The following command configures the graceful BGP stale route timer:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the update delay timer used with graceful BGP restart. This is the maximum time to delay
updating BGP routes to the local IP route table.
Syntax Description
seconds Specifies the stale route time. The range is 1 to 3600 seconds.
Default
The default is 600 seconds.
Usage Guidelines
Before you can enter this command, you must disable BGP services on the switch with the disable
bgp command.
This command configures the update delay timer. Usually, a restarting router waits to receive EOR
messages from all the receiving BGP neighbors before it starts the route update. Otherwise, it does the
route selection when the timer expires.
Example
The following command configures the graceful BGP update delay timer:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the router as a graceful BGP restart router.
Syntax Description
none Do not act as a graceful BGP restart router.
planned Only act as a graceful BGP restart router for planned restarts.
unplanned Only act as a graceful BGP restart router for unplanned restarts.
both Act as a graceful BGP restart router for both planned and unplanned
restarts.
aware-only Only act as a graceful BGP receiver (helper) router.
Default
The default is none; graceful restart is disabled.
Usage Guidelines
This command configures the router as a graceful BGP router. You can decide to configure a router to
enter graceful restart for only planned restarts, for only unplanned restarts, or for both. Also, you can
decide to configure a router to be a receiver only (which helps a restarting BGP router to perform the
graceful restart process), and not to do graceful restarts itself.
After a graceful restart, the switch preserves the time stamps for all BGP routes in the RIB that were
received before the stale timer expired. After restart, the capabilities for all BGP peers are renegotiated.
Note
End of Restart (EOR) messages are not sent to BGP peers if the graceful restart feature is
disabled.
This command cannot be used while BGP is enabled globally on the switch.
Example
The following command configures a router to perform graceful BGP restarts only for planned restarts:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Changes the router identifier.
Syntax Description
router identifier Specifies a router identifier in the IPv4 address format.
Default
N/A.
Usage Guidelines
BGP must be disabled before changing the router ID.
BGP selects routes based on the following precedence (from highest to lowest):
• Higher weight
• Higher local preference
• Shortest length (shortest AS path)
• Lowest origin code
• Lowest MED
• Route from external peer
• Lowest cost to Next Hop
• Lowest router ID
Example
The following command changes the router ID:
Note
To remove the configured bgp routerid, give routerid value as 0.0.0.0 i.e. configure bgp
routerid 0.0.0.0.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Immediately applies the route policy associated with the network command, aggregation, import, and
redistribution.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command does not affect the switch configuration.
Example
The following command applies the route policy associated with the network command, aggregation,
import, and redistribution:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
configure bootprelay
configure bootprelay [ {vlan [vlan_name]} [add ip_address | delete
[ip_address] | all ]]
Description
This command configures DHCPv4 server/next hop relay for each VLAN IPv4 interfaces. This command
is not applicable to IPv6 interfaces. Configuring bootprelay per VLAN v4 level is supported only on IPv4,
and not on IPv6.
Syntax Description
bootprelay BOOTP Relay service.
add Adds DHCP BOOTP Relay server.
delete Deletes DHCP BOOTP Relay server.
ip_address IP address of bootp relay server.
Default
N/A.
Usage Guidelines
Use this command to configure the DHCPv4 server/next hop for each VLAN interface. The configuration
applied to the VR level is populated to all VLAN v4 IPv4/v6 interfaces.
Example
The following example displays IPv6 bootprelay information:
# sh bootprelay configuration ipv4
DHCPv4 BOOTP Relay : Enabled on virtual router "VR-Default"
Include Secondary : Disabled
BOOTP Relay Servers : 10.127.6.243
DHCP Relay Agent Information Option: Disabled
DHCP Relay Agent Information Check : Disabled
DHCP Relay Agent Information Policy: Replace
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the addresses to which BOOTP requests should be directed.
Syntax Description
ipv4 DHCPv4 BOOTP Relay service (default).
ipv6 DHCPv6 BOOTP relay service.
ip_address Specifies an IP address.
vrid Specifies a VR or VRF name.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
After IP unicast routing has been configured, you can configure the switch to forward DHCP or BOOTP
requests coming from clients on subnets being serviced by the switch and going to hosts on different
subnets.
Example
The following example configures BOOTP requests to be directed to 123.45.67.8:
configure bootprelay add 123.45.67.8
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes one or all IP destination addresses for forwarding BOOTP packets.
Syntax Description
ipv4 DHCPv4 BOOTP Relay service (default).
ipv6 DHCPv6 BOOTP relay service.
ip_address Specifies an IP address.
Default
If you do not specify a VR, the current VR context is used.
Usage Guidelines
None.
Example
The following command removes the destination address:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the DHCP relay agent option (option 82) checking.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
In some instances, a DHCP server may not properly handle a DHCP request packet containing a relay
agent option. Use this command to prevent DHCP reply packets with invalid or missing relay agent
options from being forwarded to the client.
Example
The following command configures the DHCP relay agent option check:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the circuit ID sub-option that identifies the port for an incoming DHCP request.
Syntax Description
port_info Specifies a text string that becomes the circuit ID sub-option for the
specified port. Specify a text string composed of 1 to 32 characters.
port Specifies the port to which the circuit ID sub-option is assigned.
Default
The default port_info is encoded as ((slot_number * 1000) + port_number/portIfindex). For example, if
the DHCP request is received on port 3:12, the default circuit ID port_info value is 3012. On standalone
switches, the slot number is one, so the default circuit ID port_info value is (1000 + port_number/
portIfindex). For example, the default port_info for port 3 on a standalone switch is 1003.
Usage Guidelines
The full circuit ID string uses the format vlan_info-port_info . To configure the vlan_info
portion of the circuit ID string, use the following command:
configure bootprelay dhcp-agent information circuit-id vlan-information
vlan_info {vlan} [vlan_name|all]
Example
The following command configures the circuit ID port_info value slot1port3 for port 1:3:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the circuit ID sub-option that identifies the VLAN for an incoming DHCP request.
Syntax Description
vlan_info Specifies a text string that becomes the circuit ID sub-option for the
specified VLAN. Specify a text string composed of 1 to 32 characters.
vlan_name Specifies the VLAN to which the circuit ID sub-option is assigned.
all Specifies that the vlan_info entered is to be used in the circuit ID sub-
option for all VLANs.
Default
The default vlan_info for each VLAN is the VLAN ID or tag.
Usage Guidelines
The full circuit ID string uses the format vlan_info-port_info . To configure the port_info portion
of the circuit ID string, use the following command:
configure bootprelay dhcp-agent information circuit-id port-information
port_info port port
Example
The following command configures the circuit ID vlan_info value VLANblue for VLAN blue:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the DHCP relay agent option (option 82).
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
After IP unicast routing has been configured, you can configure the switch to forward DHCP or BOOTP
requests coming from clients on subnets being serviced by the switch and going to hosts on different
subnets.
Configure the DHCP relay agent option (option 82), using the following command:
configure bootprelay dhcp-agent information option
To disable the DHCP relay agent option (option 82), use the following command: unconfigure
bootprelay dhcp-agent information option
Example
The following example configures the DHCP relay agent option:
configure bootprelay dhcp-agent information option
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the DHCP relay agent option (option 82) policy.
Syntax Description
drop Specifies to drop the packet.
keep Specifies to keep the existing option 82 information in place.
replace Specifies to replace the existing data with the switch’s own data.
Default
Replace.
Usage Guidelines
Use this command to set a policy for the relay agent. Packets can be dropped, the option 82
information can be replaced (the default), or the packet can be forwarded with the information
unchanged.
Example
The following command configures the DHCP relay agent option 82 policy to keep:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the remote ID sub-option that identifies the relaying switch for DHCP requests and replies.
Syntax Description
remote_id Specifies a text string that becomes the remote ID sub-option for the
switch. Specify a text string composed of 1 to 32 characters.
system-name Specifies that the switch name is used as the remote ID sub-option for
the switch.
vrid Specifies the VR on which to configure the remote ID sub-option.
Default
The switch MAC address.
Usage Guidelines
To display the remote-ID, use the following command: show bootprelay
Example
The following example configures the remote ID sub-option to specify the switch name in DHCP
requests and replies:
configure bootprelay dhcp-agent information remote-id system-name
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures DHCP smart relay mode, and includes a secondary IP address as the giaddr at the VR level.
Syntax Description
ipv4 Specifies DHCPv4 BOOTP Relay service (default).
ipv6 Specifies DHCPv6 BOOTP Relay service.
include-secondary (Optional) Uses both primary and secondary address(es) of the client
VLAN as gateway address.
sequential Uses primary and secondary address(es) of client VLAN in sequence
after 3 retries (default if include-secondary is on).
parallel Uses primary and secondary address(es) of client VLAN in parallel.
off Disables use of both primary and secondary address(es) of client
VLAN as gateway address (default).
vr Specifies a virtual router ID.
vr_name Specifies the virtual router.
Default
IPv4 is the default relay service.
The default value is off, but sequential is the default if include-secondary is on.
Usage Guidelines
Use this command to configure DHCP smart relay mode, and to include a secondary IP address as
giaddr at the VR level.
Example
The following example configures DHCPv4 BOOTP Relay service to use both primary and secondary
addresses of the client VLAN as the gateway address. By default, the command specifies that you use
the primary and secondary addresses of the client VLAN in sequence after three retries.
configure bootprelay ipv4 include-secondary sequential
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the option interface-id as described in RFC-4649 to an IPv6 bootp
relay/DHCP relay agent.
Syntax Description
bootprelay BOOTP Relay Service
ipv6 DHCPv6 BOOTP Relay Service
option DHCPv6 BOOTP Relay options
interface-id Interface identifier option.
interface_id_string Interface identifier string.
none Identifier defaults to 802.1Q VLAN ID.
all All VLANs.
Default
802.1Q VLAN ID if not configured.
Usage Guidelines
Use this command to configure the option interface-id as described in RFC-4649 to an IPv6
BOOTP relay/DHCP relay agent. After receiving an IPv6 BOOTP/DHCP request packet on the specified
VLAN, the agent adds the configured identifier to the packet and passes it to the server. If this option is
configured to be as system-name, the switch name is used as the remote-id. The same can be
unconfigured using the none option. After unconfiguring this option, the switch MAC address (the
default value) is used as remote-id. This option can be configured or unconfigured to a specified VLAN
or to all VLANs.
Example
* Switch # show bootprelay ipv6
BOOTP Relay: DHCPv6 BOOTP Relay enabled on virtual router "VR-Default"
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:0db8:85a3:0000:0000:8a2e:0370:7335
2001:0db8:85a3:0000:0000:8a2e:0370:7336
2001:0db8:85a3:0000:0000:8a2e:0370:7337
VLAN "Default":
BOOTP Relay : Disabled
VLAN "v1":
BOOTP Relay : Enabled
Interface ID : v1-12
Remote ID : v1_remId
VLAN "v2":
BOOTP Relay : Enabled
Interface ID : 100 (Default)
Remote ID : 00:04:96:52:A7:1B (Default)
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the remote-id option as described in RFC-4649 to an IPv6 BOOTP relay/
DHCP relay agent.
Syntax Description
bootprelay BOOTP Relay Service
ipv6 DHCPv6 BOOTP Relay Service
option DHCPv6 BOOTP Relay options
remote-id Remote-ID sub-option to identify remote host
remote_id_string Remote ID String
system-name System Name string
none Identifier defaults System MAC address
all All VLANs
Default
System MAC address if not configured.
Usage Guidelines
Use this command to configure the remote-id option as described in RFC-4649 to an IPv6 BOOTP
relay/DHCP relay agent. After receiving an IPv6 BOOTP/DHCP request packet on the specified VLAN,
the agent adds the configured identifier to the packet and passes it to the server. If this option is
configured to be as system-name, the switch name is used as the remote-id. The same can be
unconfigured using the none option. After unconfiguring this option, the switch MAC address (the
default value), is used as remote-id. This option can be configured orunconfigured to a specified VLAN
or to all VLANs.
Example
* Switch # show bootprelay ipv6
BOOTP Relay: DHCPv6 BOOTP Relay enabled on virtual router "VR-Default"
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:0db8:85a3:0000:0000:8a2e:0370:7335
2001:0db8:85a3:0000:0000:8a2e:0370:7336
2001:0db8:85a3:0000:0000:8a2e:0370:7337
VLAN "Default":
BOOTP Relay : Disabled
VLAN "v1":
BOOTP Relay : Enabled
Interface ID : v1-12
Remote ID : v1_remId
VLAN "v2":
BOOTP Relay : Enabled
Interface ID : 100 (Default)
Remote ID : 00:04:96:52:A7:1B (Default)
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds information about a snooped IPv6 delegated prefix on a VLAN.
Syntax Description
ipv6_prefix Specifies the IPv6 prefix (/prefix length) to be added.
ipv6Gateway Specifies the IPv6 gateway address.
vlan_name Specifies the VLAN.
valid_time Time, in seconds, that the delegated IPv6 prefix is valid.
Default
N/A
Usage Guidelines
Allows you to add a particular IPv6 delegated prefix to snoop if the prefix was issued or renewed during
reboot. If the prefix has been snooped earlier, this command renews the valid time for the prefix.
To set the specified prefix to always be valid, set the valid-time parameter to 0.
Before adding an IPv6 delegated prefix to snoop, you must enable IPv6 BOOTP relay and prefix
snooping using enable bootprelay ipv6 and configure bootprelay ipv6 prefix-
delegation snooping .
Example
The following example adds prefix /56.
configure bootprelay ipv6 prefix-delegation snooping add 5001:db8:3553:bf00::/56
fe80::a440:cfd5:c05b:d324 vlan v1 valid-time 300
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables and disables snooping of IPv6 prefixes delegated via DHCP.
Syntax Description
on Enables snooping of IPv6 prefixes delegated via DHCP on the
specified VLAN.
vlan_name Specifies the VLAN.
off Disables snooping of IPv6 prefixes delegated via DHCP on the
specified VLAN.
vlan all Disables snooping of IPv6 prefixes delegated via DHCP on all VLANs.
Default
By default, snooping of IPv6 prefixes is off.
Usage Guidelines
You can enable snooping on a specific VLAN.
Example
The following example disables snooping of IPv6 prefixes on all VLANs.
configure bootprelay ipv6 prefix-delegation snooping off vlan all
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures DHCP smart relay mode to include secondary IP address as giaddr at VLAN level.
Syntax Description
ipv4 Specifies DHCPv4 BOOTP Relay service (default).
ipv6 Specifies DHCPv6 BOOTP Relay service.
vlan Configure BOOTP relay for this VLAN, and overrides the VR level
configuration.
vlan_name Specifies the VLAN name.
include-secondary (Optional) Use both primary and secondary address(es) of the client
VLAN as gateway address.
sequential Use primary and secondary address(es) of client VLAN in sequence
after 3 retries (default if include-secondary is on).
parallel Use primary and secondary address(es) of client VLAN in parallel.
off Disable use of both primary and secondary address(es) of client
VLAN as gateway address (default).
Default
IPv4 is the default relay service.
off is the default value, but sequential is the default if include-secondary is on.
Usage Guidelines
Use this command to configure DHCP smart relay mode to include the secondary IP address as giaddr
at the VLAN level.
Example
The following command configures DHCPv4 BOOTP Relay service for the "vlan_100" VLAN, and uses
both primary and secondary address(es) of the client VLAN as gateway address. This overrides the VR
level configuration.
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures COS extended support on the IP phone. This information will be sent to the IP
phone from the ExtremeXOS switch by trust TLV and COS TLV.
Syntax Description
cos_value COS value range from 0 to 7.
port_list Port list separated by a comma or -";
Default
0.
Usage Guidelines
None.
Example
The following example sets the COS TLV value as 4 for port 5 in the ExtremeXOS switch, which will be
used by the IP phone to override priority received from PC or the attached device.
configure cdp cos-extend 4 ports 5
The following example sets the COS TLV value to default for port 5 in the ExtremeXOS switch.
configure cdp cos-extend 0 ports 5
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the device ID only in CDP.
Syntax Description
device-id Unique device identifier to be used in CDP.
system-mac Use system MAC address as the device identifier.
system-name Use sysName as the device identifier (default).
Default
system-name.
Usage Guidelines
Use this command to configure the Device ID. If you do not configure it, the MAC address is used as the
Device ID. This configuration of device ID is only used in the CDP .
Example
The following command configures the device ID as the MAC address:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables CDP on a port.
Syntax Description
seconds Specifies the transmit frequency in seconds. The range is 5,254
seconds. The default value is 60 seconds.
Default
60 seconds.
Usage Guidelines
Example
The following command configures the CDP frequency as two minutes:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the hold time of the neighbor information .
Syntax Description
seconds Duration in seconds that receiver must keep this packet. The range is
10-255 and the default is 180 seconds.
Default
60 seconds.
Usage Guidelines
Use this command to configure the hold time of the neighbor information for which a receiving device
should hold information before discarding it.
Example
The following command configures the CDP hold time as two minutes:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a specified VLAN’s IP address as the management address to be advertised by Cisco
Discovery Protocol (CDP).
Syntax Description
vlan Specifies a VLAN for the management IP address.
vlan_name Specifies a VLAN name for the management IP address (default is
"Mmgt").
vlan_id Specifies a VLAN ID for the management IP address.
primary-ip CDP advertises the primary IP address of the specified VLAN
(default).
The specified VLAN must be already configured with at least one
primary IPv4 or IPv6 address.
secondary-ip Specifies that CDP advertises the secondary IP address of the
specified VLAN.
The specified secondary IP address must already be configured on the
specified VLAN.
secondary_ip_address Specifies the secondary IP address of the specified VLAN.
Default
By default, the Management VLAN’s IP address is advertised by CDP.
If you do not specify, CDP advertises the primary IP address of the specified VLAN.
Usage Guidelines
If the Management VLAN IP address is not configured, you can specify any user-defined VLAN’s IP
address or front panel port VLAN’s IP address as the management address for the CDP protocol.
This command dictates the management address to be advertised by the CDP protocol; the equivalent
command for LLDP is configure lldp management-address on page 725.
To use this command, the specified VLAN must already exist. The management IP address configuration
is removed if the specified VLAN is deleted, or if the primary IP address of the specified VLAN is deleted
(if primary-ip configured), or if the specified secondary IP address of the specified VLAN is deleted
(if secondary-ip configured).
If primary-ip is configured and the specified VLAN has multiple primary IP addresses (IPv4 and
IPv6), then CDP advertises the first primary IP address that exists in the address table. If IPv4 is not
configured, CDP advertises the first IPv6 address.
If secondary-ip is configured and the specified VLAN has multiple secondary IP addresses, then
CDP advertises only the specified secondary IP address of the configuration.
Example
The following example configures the primary IP address of the VLAN "vlan1" as the management
address to be advertised by CDP protocol:
configure cdp management-address vlan vlan1 primary-ip
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the advertising status of the power available TLV on CDP ports.
Syntax Description
advertise Specifies to send the TLV to neighbors.
no-advertise Specifies not to send the TLV to neighbors.
port_list Port list separated by a comma or - .
Default
No-advertise.
Usage Guidelines
This command is for PoE switches.
Example
The following example advertises the Power Available TLV on port 1:
configure cdp power-available advertise ports 1
The following example does not advertise the Power Available TLV on port 1:
configure cdp power-available no-advertise ports 1
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures trust mode support for the IP phone. This information will be sent to the IP
phone from the ExtremeXOS switch by trust TLV.
Syntax Description
untrusted Instructs attached IP phone to overwrite priority received from PC
with configured COS value.
trusted Instructs IP phone to trust the priority received from PC or the
attached device.
port_list Port list separated by a comma or -";
Default
Trusted.
Usage Guidelines
None.
Example
The following example sets the trust TLV value as trusted for port 5 in the ExtremeXOS switch, which
will be used by the IP phone to not change the priority received from the PC or attached device.
configure cdp trust-extend trusted ports 5
The following example sets the trust mode to untrusted for port 5 in the ExtremeXOS switch, which will
be used by the IP phone to override priority received from the PC or attached device.
configure cdp trust-extend untrusted ports 5
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures voice VLAN, for voice traffic from the IP phone in one or more ports in
ExtremeXOS switch. This information will be sent to IP phone from the ExtremeXOS switch by VOIP
Reply TLV.
Syntax Description
vlan_name VLAN name.
vlan_id VLAN ID tag between 1 and 4,094.
advertise Configures when TLVs are sent to neighbors.
solicited Send TLVs to neighbors only when requested (default).
unsolicited Send TLVs to neighbors without waiting for a request.
dot1p Instructs IP phone to send dot1p tagged voice traffic.
untagged Instructs IP phone to send untagged voice traffic.
none No VLAN information is sent in CDP PDUs.
port_list Port list is separated by a comma or -";
all Instructs IP phone to send all traffic.
Default
By default, voice VLAN reply TLV are sent to neighbors only when requested.
Usage Guidelines
None.
Example
The following example sets the VOIP VLAN reply TLV value value as default in ExtremeXOS for port,
which will be used by the IP phone for voice traffic:
Configure cdp voip-vlan “Default” ports 5
The following example sets the VOIP VLAN reply TLV value as priority tagged in ExtremeXOS switch for
port 5, which will be used by the IP phone for voice traffic.
configure cdp voip-vlan dot1p ports 5
The following example sets the VOIP VLAN reply TLV value as untagged in ExtremeXOS switch, which
will be used by the IP phone for voice traffic.
configure cdp voip-vlan untagged ports 5
The following example sets the VOIP VLAN reply TLV value as none in ExtremeXOS switch, this will not
transmit any VLAN information TLV to the IP phone.
configure cdp voip-vlan none ports 5
The following example sets the VOIP VLAN reply TLV value as VLAN Id 1 in ExtremeXOS switch for port
5, which will be used by the IP phone for voice traffic.
configure cdp voip-vlan 1 ports 5
History
This command was first available in ExtremeXOS 21.1.
Ability to send voice VLAN reply TLV without receiving voice VLAN request TLV (unsolicited) was
added in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a maintenance association (MA) related to a specified maintenance domain (MD). This
command supports the 2-octet integer MA format.
Syntax Description
domain_name Specifies the domain you want to associate with this MA.
int Enter an integer to name the MA. The range is 0 to 65535.
vlan_name Specifies the VLAN you want to assign to this MA. Each MA contains
only one VLAN, VMAN, BVLAN or SVLAN.
vman_name Specifies the VMAN you want to assign to this MA.
Default
N/A.
Usage Guidelines
All ports configured on the specified VLAN are now CFM ports in the specified MA.
You add the MA, or association, to the domain, and the MA uses the MD level assigned to the domain.
Each MA can belong to only one domain, but several MAs can belong to a given domain. The MA is
unique within a given domain.
Example
The following command creates a 2-octet integer MA (350) that associates the domain brazil and the
VLAN admin:
configure cfm domain brazil add association integer 350 vlan admin
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a maintenance association (MA) related to a specified maintenance domain (MD). This
command supports the MEG MA format.
Syntax Description
meg ITU-T Y.1731 Maintenance Entity Group.
meg_name MEG name, maximum of 12 characters with 6 bytes ITU Carrier Code
and 6 bytes Organization specific Unique MEG ID Code.
Default
N/A.
Usage Guidelines
All ports configured on the specified MEG are now CFM ports in the specified MA.You add the MA, or
association, to the domain, and the MA uses the MD level assigned to the domain. Each MA can belong
to only one domain, but several MAs can belong to a given domain. The MA is unique within a given
domain.
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a maintenance association (MA) related to a specified maintenance domain (MD). This
command supports the character string MA format.
Syntax Description
domain_name Specifies the domain you want to associate with this MA.
string Enter up to 45 alphanumeric characters to name the MA.
vlan_name Specifies the VLAN you want to assign to this MA. Each MA contains
only one VLAN, VMAN, or BVLAN.
vman_name Specifies the VMAN you want to assign to this MA.
Default
N/A.
Usage Guidelines
All ports configured on the specified VLAN are now CFM ports in the specified MA.
You add the MA, or association, to the domain, and the MA uses the MD level assigned to the domain.
Each MA can belong to only one domain, but several MAs can belong to a given domain. The MA is
unique within a given domain.
Example
The following command creates an MA named service that associates the MD spain and the VLAN
finance:
configure cfm domain service add association string spain vlan finance
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a maintenance association (MA) related to a specified maintenance domain (MD). This
command supports the VLAN ID MA format.
Syntax Description
domain_name Specifies the domain you want to associate with this MA.
vlanid Specifies the VLAN ID.
vlan_name Specifies the VLAN you want to assign to this MA. Each MA contains
only one VLAN, VMAN, or BVLAN.
vman_name Specifies the VMAN you want to assign to this MA.
Default
N/A.
Usage Guidelines
All ports configured on the specified VLAN are now CFM ports in the specified MA.
You add the MA, or association, to the domain, and the MA uses the MD level assigned to the domain.
Each MA can belong to only one domain, but several MAs can belong to a given domain. The MA is
unique within a given domain.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a maintenance association (MA) related to a specified maintenance domain (MD). This
command supports the RFC 2685 VPN ID MA format.
Syntax Description
domain_name Specifies the domain you want to associate with this MA.
association IEEE 802.1ag Maintenance Association or ITU-T Y.1731 Maintenance
Entity Group
oui Enter a virtual private network (VPN) Organizational Unique Identifier
(OUI) in the format XX:XX:XX as part of the name for the MA.
index Enter the 32-bit VPN index you want to append to the OUI to name
the MA. The range is 0 to 4294967295.
vlan_name Specifies the VLAN you want to assign to this MA. Each MA contains
only one VLAN, VMAN, or BVLAN.
vman_name Specifies the VMAN you want to assign to this MA.
meg ITU-T Y.1731 Maintenance Entity Group.
meg_name MEG name, maximum of 12 characters with 6 bytes ITU Carrier Code
and 6 bytes organization specific unique MEG ID code.
Default
N/A.
Usage Guidelines
All ports configured on the specified VLAN are now CFM ports in the specified MA. You add the MA, or
association, to the domain, and the MA uses the MD level assigned to the domain. Each MA can belong
to only one domain, but several MAs can belong to a given domain. The MA is unique within a given
domain.
Example
The following command creates an MA with the VPN ID of 11:22:33 50 that associates the domain spain
and the VLAN accounting:
configure cfm domain spain add association vpn-id oui 11:22:33 index 50 vlan accounting
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to add a remote MEP with the given MEP ID and MAC address to an existing association.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
mepid Enter the MEP ID of the remote MEP being added. The range is 1 to
8191.
mac_address Specifies the MAC address for the remote MEP being added.
Default
N/A.
Usage Guidelines
Use this command to add a remote MEP with given MEP ID and MAC address to an existing association.
Use the show cfm detail command to verify your configuration.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to create an up MEP, down MEP, intermediate-point (MIP) on a maintenance
association, a group. You can also combine different maintenance points.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
port_list Specifies the port number(s).
up Enter the port to be the UP port of the MA; this MEP sends CCM
messages to all ports—other than the sending switch port—in this MA
on this switch.
down Enter the port to be the DOWN port of the MA; this MEP sends CCM
messages out of the configured physical port.
mepid Specifies a value for this MEP. The range is 1 to 8191.
NOTE: On each MA, each MEPID must be unique.
group CFM group that binds an LMEP to RMEPS. If not specified, the client
does not receive events from the respective RMEPs.
group_name Group name, maximum of 31 characters.
Default
N/A.
Usage Guidelines
These ports must already be in the MA (VLAN or VMAN) prior to assigning a MEP function to them. If
you try to assign a port not in the MA as an end-point, the system returns the following message:
The following port(s) <portlist> are not part of the associations VLAN.
Note
Ensure that you assigned the port number correctly to the UP MEP and to the DOWN MEP, or
the CCM messages go in the wrong direction.
Each MA needs at least two MEPs that can reach each other to exchange CCM messages.
You can also combine different maintenance points. The following are CLI restrictions on MP
combinations:
• DOWN and UP MEP cannot be present on the same association
• DOWN MEP and MIP cannot be present on the same association
• UP MEP and MIP can be present on the same association
• Only one UP MEP is allowed in an association
• Multiple DOWN MEPs are allowed in an association
Example
The following command configures port 1:20 as a MIP on the 350 association in the spain domain:
configure cfm domain spain association 350 ports 1:20 add intermediate-point
The following command configures port 5:10 to be the UP MEP on the test association in the brazil
domain, with a mepid of 500:
configure cfm domain brazil association test ports 5:10 add end-point up 500
History
This command was first available in ExtremeXOS 11.4.
This command was updated in ExtremeXOS 15.2 to include the optional group parameter.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to delete a remote MEP for a specific MEP ID and MAC address.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
mepid Enter the MEP ID of the remote MEP that is to be deleted.
Default
N/A.
Usage Guidelines
Use this command to delete a remote MEP of an MA for a specific MEP ID.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a maintenance end point (MEP) or maintenance intermediate point (MIP) from that MA.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_name IEEE 802.1ag or ITU-T Y.1731 association name
port_list Specifies the port number(s).
up Specifies that an UP MEP is to be deleted.
down Specifies that a DOWN MEP is to be deleted.
Default
N/A.
Usage Guidelines
Use this command to delete an MEP or MIP.
If the VPLS option is chosen then the CFM deletes all the VPLS-based MIPs.
Example
The following command deletes port 5:12 as an MIP on the test association in the brazil domain:
configure cfm domain brazil association test ports 5:12 delete intermediate-point
The following command deletes an UP MEP on port 5:10 on the test association in the brazil domain:
configure cfm domain brazil association test ports 5:10 delete end-point up
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to choose the destination MAC type for sending CFM PDUs for an MA.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
unicast CFM PDUs are sent to the unicast MAC address configured in static remote
MEP creation.
multicast CFM PDUs are sent to the standard multicast destination address.
Default
Multicast.
Usage Guidelines
Use this command to change the MAC type on a previously configured MA. If multicast is selected, CFM
PDUs are sent to the standard multicast destination. If unicast is selected, CFM PDUs are sent to the
unicast MAC address configured in static remote MEP creation.
Use the show cfm command to verify your configuration.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to create a group for an existing local end-point.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
port_list Enter the port number you want to configure as either an UP or DOWN MEP.
Default
N/A.
Usage Guidelines
Use this command to add a group to the association.
Example
configure cfm domain "MD1" association "MD1v1" ports 17 end-point down add group
"eapsCfmGrp"
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to delete one or all groups.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
port_list Enter the port number you want to configure as either an UP or DOWN MEP.
delete Delete configuration from the association
Default
N/A.
Usage Guidelines
Use this command to delete one or all groups from the association.
Example
configure cfm domain "MD1" association "MD1v1" ports 17 end-point down delete group
"eapsCfmGrp"
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to change time interval for an MEP to send out a CCM. We recommend configuring this
value as at least 1 second.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
port_list Enter the port number of the MEP on which you are changing the time
interval it sends out a CCM.
up Enter this variable if you are changing the time interval for sending a
CCM on an UP MEP.
down Enter this variable if you are changing the time interval for sending a
CCM on a DOWN MEP.
Default
1000 ms.
Usage Guidelines
Use this command to change the time interval between sending out CCMs on a previously configured
UP or DOWN MEP. If you attempt to change the interval on a port that is either not an MEP or having
wrong MEP type, the system returns an error message.
Note
We recommend that you use a transmit interval of at least 1 second (1000 ms).
The receiving system also uses this value multiplied by 3.5 to determine when the MEP is no longer
alive.
Use the show cfm command to verify your configuration and the show cfm detail command to
display the configured lifetime.
Note
The transmit interval value “3” is 3.3 msec. Also, the values 60000 and 600000 are supported
in hardware.
Example
The following command changes the interval the UP MEP (previously configured on port 2:4) uses to
send CCM messages on the 350 association in the finance domain to 10 seconds:
configure cfm domain finance association 350 ports 2:4 end-point up transmit-interval
10000
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to enable or disable sending CCMs on a given MEP.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
port_list Enter the port number you want to configure as either an UP or DOWN MEP.
Default
Enabled.
Usage Guidelines
Each MA needs at least two MEPs that can reach each other to exchange CCM messages.
Note
Ensure that you assigned the port number correctly to the UP MEP and to the DOWN MEP, or
the CCM messages go in the wrong direction.
These ports must already be in the MA (VLAN or VMAN) prior to assigning a MEP function to them. If
you try to assign a port not in the MA as an end-point, the system returns the following message:
The following port(s) <portlist> are not part of the associations VLAN.
Example
configure cfm domain "MD1" association "MD1v1" ports 17 end-point down delete group
"eapsCfmGrp"
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to change the MEP ID for a previously configured MEP. Each MEP within a single MA must
have a unique MEP ID.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
port_list Enter the port number you want to change the MEP ID.
up Enter this variable if you are changing the MEP ID on an UP MEP.
down Enter this variable if you are changing the MEP ID on a DOWN MEP.
mepid Enter the new value for this MEP. The range is 1 to 8191.
NOTE: On each MA, each MEPID must be unique.
Default
N/A.
Usage Guidelines
Use this command to change the MEPID on a previously configured UP or DOWN MEP. If you attempt to
change the MEPID on a port that is either not an MEP or having wrong MEP type, the system returns an
error message.
Example
The following command changes the MEP ID to 75 on the previously configured port 2:4 UP MEP on the
350 association in the finance domain:
configure cfm domain finance association 350 ports 2:4 end-point up mepid 75
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to disable or enable configuring the sender-id-ipaddress on a given MEP.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
Default
Disable.
Usage Guidelines
Each MA needs at least two MEPs that can reach each other to exchange CCM messages.
Note
Ensure that you assigned the port number correctly to the UP MEP and to the DOWN MEP, or
the CCM messages go in the wrong direction.
You must create the MEP for which the configuration is being made before changing the configuration.
Otherwise, the following error message is displayed:
The following port(s) <portlist> are not part of the associations VLAN.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables an MEP.
Syntax Description
domain_name Specifies the domain name.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
port_list Specifies the ports to configure.
Default
MEP is enabled by default.
Usage Guidelines
Use this command to enable or disable an MEP.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to modify the MAC address of an existing MEP.
Syntax Description
domain_name Enter the domain associated with the MA you are configuring.
association_nam IEEE 802.1ag or ITU-T Y.1731 association name.
e
mepid Specifies the MEP ID of the remote MEP being modified. The range is 1 to 8191.
mac_address Specifies the MAC address for the remote MEP being modified.
Default
N/A.
Usage Guidelines
Use this command to modify a remote MEP with given MEP ID and MAC address in an existing
association. Use the show cfm detail command to verify your configuration.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a maintenance association (MA), including all its configured values, from the switch.
Syntax Description
domain_name Enter the domain associated with the MA you are deleting.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
Default
N/A.
Usage Guidelines
When you delete an association, or MA, you also remove all its configured values from the switch. These
values include all configured MEPs, MIPs, and static remote MEPs.
Example
The following command deletes the MA test, in the domain of brazil, from the switch, along with all its
configured MIPs, MEPs, and static remote MEPs:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Changes a previously configured MD level for the specified domain.
Syntax Description
domain_name Enter the name of the domain for which you want to change the MD
level.
level Specifies the new MD level you are assigning to this domain. Enter a
value between 0 and 7.
Default
N/A.
Usage Guidelines
You can have up to 8 domains on a switch, and each one must have a unique MD level. Thus, a given MD
level exists only once one a switch.
The IEEE standard 801.2ag specifies different levels for different network users, as follows:
• 5 to 7 for end users
• 3 and 4 for Internet service providers (ISPs)
• 0 to 2 for operators (entities carrying the information for the ISPs)
Example
The following command changes the MD level of a previously created domain extreme to 2:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to create and associate an RMEP to a group.
Syntax Description
mepid Specifies the MEP ID of the remote MEP being created. The range is 1
to 8191.
Default
N/A.
Usage Guidelines
Use this command to create and associate an RMEP to a group.
Example
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to delete one or all RMEPs from a group.
Syntax Description
mepid Specifies the MEP ID of the remote MEP being created. The range is 1
to 8191.
Default
N/A.
Usage Guidelines
Use this command to delete one or all RMEPs from a group.
Example
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a CFM domain and association to a CFM segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
domain_name Specifies the IEEE 802.1ag maintenance domain.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
Default
N/A.
Usage Guidelines
Use this command to add a CFM domain and an association to a CFM segment. It is used to enable
DMM/DMR in the association that is configured in the CFM domain.
Example
The following command adds the domain cfm3 and the association as3 to the segment s2.
To delete the domain and/or association, use the command, configure cfm segment delete
domain association.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a CFM domain from a CFM segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to delete a CFM domain from a CFM segment.
Example
The following command deletes the domain and association from the segment s2.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the priority for the segment.
Syntax Description
segment-name An alpha numeric string identifying the segment name.
dot1p_priority Priority value that is set in the DMM/DMR. The range is 0 to 7.
Default
The default is 6.
Usage Guidelines
Use this command to configure the dot1p priority that a DMM/DMR frame can get.
Example
The following example configures a dot1p priority of 3 for segment s2.
configure cfm segment s2 dot1p 3
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the class of service for a particular cfm segment. This value is used to fill the
dot1p priority bit in the Ethernet header during transmission.
If the optional keyword frame-delay is not specified, the same value of Dot1p will be used for both
DMM and LMM. The optional keyword allows configuring different values for DMM and LMM.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
dot1p_priority Priority value that is set in the DMM/DMR. The range is 0 to 7.
Default
N/A.
Usage Guidelines
Use this command to configure the class of service for a particular cfm segment.
Example
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to configure the window size for calculating the alarm/clear threshold values for
DMM and Severely Errored Second (SES) threshold for LMM. This window size denotes the total number
of recent frames for which the threshold values will be measured.
If the optional keyword frame-delay or frame-loss is not specified, the same value of window size will be
used for both DMM and LMM. The optional keyword allows configuring values for DMM and LMM.
Syntax Description
segment_name Alphanumeric string identifying the segment name.
frame-delay Y.1731 Ethernet frame delay measurement.
window_size Window size for delay measurement; number of frames 1-1800 to be
used.
Default
60.
Usage Guidelines
Use this command to configure the window size for calculating the alarm/clear threshold values for
DMM and Severely Errored Second (SES) threshold for LMM.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the delay between two consecutive DMM/LMM frames.
Syntax Description
segment_name Alphanumeric string identifying the segment name.
frame-delay Y.1731 Ethernet frame delay measurement.
frame-loss Y.1731 Ethernet frame loss measurement.
interval Trasmit interval in seconds, with a range of 1 to 90.
Default
N/A.
Usage Guidelines
Configures the delay between two consecutive DMM/LMM frames. The configured delay would be for
both continuous and on-demand transmission. This command is optional, and if not configured, the
default interval would be 10 seconds.
If the optional keyword frame-delay or frame-loss is not specified, the same value of transmit-interval
will be used for both DMM and LMM. The optional keyword allows configuring different values for DMM
and LMM.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to configure the number of consecutive measurements to be used to determine
the availability status of a CFM segment.
Syntax Description
segment_name Alphanumeric string identifying the segment name.
frame-loss Y.1731 Ethernet frame loss measurement.
Default
10.
Usage Guidelines
This configuration is optional.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the class of service for a particular cfm segment. This value is used to fill the
dot1p priority bit in the Ethernet header during transmission.
If the optional keyword frame-loss is not specified, the same value of Dot1p will be used for both DMM
and LMM. The optional keyword allows configuring different values for DMM and LMM.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
dot1p_priority Priority value that is set in the DMM/DMR. The range is 0 to 7.
Default
N/A.
Usage Guidelines
Use this command to configure the class of service for a particular cfm segment.
Example
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to add/delete the local MEP for a given CFM segment.
Syntax Description
segment_name Alphanumeric string identifying the segment name.
frame-loss Y.1731 Ethernet frame loss measurement.
Default
N/A.
Usage Guidelines
The MEP with the given MEP ID should already be created in the system. The domain and association
for the segment should be configured before executing this command. If the domain and association
are not configured, the command throws an error.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to configure the percentage of frames lost in a measurement period for it to be
marked as SES (Severely Errored Second).
Syntax Description
segment_name Alphanumeric string identifying the segment name.
ses Severely errored second.
frame-loss Y.1731 Ethernet frame loss measurement.
Default
30%.
Usage Guidelines
This configuration is optional.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to configure the window size for calculating the alarm/clear threshold values for
DMM and Severely Errored Second (SES) threshold for LMM. This window size denotes the total number
of recent frames for which the threshold values will be measured.
If the optional keyword frame-delay or frame-loss is not specified, the same value of window size will be
used for both DMM and LMM. The optional keyword allows configuring values for DMM and LMM.
Syntax Description
segment_name Alphanumeric string identifying the segment name.
frame-loss Y.1731 Ethernet frame loss measurement.
window_size Window size for loss measurement; number of frames 1-1800 to be
used.
Default
1200.
Usage Guidelines
Use this command to configure the window size for calculating the alarm/clear threshold values for
DMM and Severely Errored Second (SES) threshold for LMM.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the alarm threshold and clear threshold.
Syntax Description
alarm-threshold Specifies the minimum threshold percentage.
clear-threshold Specifies the maximum threshold percentage.
value Specified the threshold percentage in a range of 1-99%.
Default
Alarm threshold is 10% of the total frames received during the current window.
Clear-threshold is 95% of the total frames received during the current window.
Usage Guidelines
Use this command to configure the alarm and clear threshold value for a CFM segment. Upon reaching
the alarm threshold, an error message is generated and displayed once, and the state is maintained until
the threshold reaches the clear threshold value.
This command is optional, and if not configured the default intervals are used.
Example
The following commands configure an alarm threshold of 15% and a clear-threshold of 90% for
segment-first.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timeout for a segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
msec Specifies the number of milliseconds. The range is 1 to 65535.
Default
50 milliseconds.
Usage Guidelines
Use this command to configure the timeout value for the reception of a DMR frame. If a DMR frame is
not received within this specified time, that frame is considered as an errored frame, and if the number
of errored frames reaches the alarm threshold of the current window size, an alarm is generated.
This command is optional, and if not configured, timeout is set to the default.
Example
The following command configures a timeout value of 45 milliseconds for the s4 segment:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the transmission interval of DMM frames.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
frame-delay Y.1731 Ethernet Frame Delay Measurement.
Default
10 seconds.
Usage Guidelines
Use this command to configure the delay between two consecutive DMM frames. The configured delay
is for both continuous and on-demand transmission. This command is optional, and if not configured
the default interval is used.
Example
The following example configures a transmission interval of 5 seconds for segment s2.
configure cfm segment s2 transmit-interval 5
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the measurement window size.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
size Specifies the number of frames to be used for delay measurement.
The range is 1 to 1800.
Default
60 frames.
Usage Guidelines
Use this command to configure the window size to be used for calculating the threshold values. This
window size denotes the total number of recent frames for which the threshold values are to be
measured.
This is an optional command and if not configured, the lower of either the default value or the total
number of frames sent is used.
Note
MEPs with intervals 3 and 10 cannot be created in this domain as the domain name format is
of dns type.
Example
The following command configures the measurement window size for the CFM segment segment-first
at 55:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure cli
configure cli [{ lines height } {columns width }]
Description
This command configures the number of lines and columns for the current login session only.
Syntax Description
lines Number of lines on the screen.
height Height of the screen.
columns Number of columns on the screen.
width Width of the screen.
Default
N/A.
Usage Guidelines
The screen size specified takes effect over whatever screen size the session may have started with or
whatever the current settings may be. If the terminal emulation supports dynamic resizing of the
window, this will cause the size set by this command to be overriden. The command accepts either lines
or columns or both in either order.
Example
The show management command has been enhanced to display the current screen size:
# show management
CLI idle timeout : Enabled (20 minutes)
CLI max number of login attempts: 3
CLI max number of sessions : 8
CLI paging : Enabled (this session only)
CLI space-completion : Disabled (this session only)
CLI configuration logging : Disabled
CLI password prompting only : Disabled
CLI scripting : Disabled (this session only)
CLI scripting error mode : Ignore-Error (this session only)
CLI persistent mode : Persistent (this session only)
CLI prompting : Enabled (this session only)
CLI screen/window size : 80 Lines 256 Columns (this session only)
CLI refresh : Enabled
Telnet access : Enabled (tcp port 23 vr all)
: Access Profile : not set
SSH Access : ssh module not loaded.
Web access : Enabled (tcp port 80)
: Access Profile : not set
Total Read Only Communities : 1
Total Read Write Communities : 1
RMON : Disabled
SNMP access : Enabled
: Access Profile : not set
SNMP Notifications : Enabled
SNMP Notification Receivers : None
SNMP stats: InPkts 0 OutPkts 0 Errors 0 AuthErrors
0
Gets 0 GetNexts 0 Sets 0 Drops 0
SNMP traps: Sent 0 AuthTraps Enabled
SNMP inform: Sent 0 Retries 0 Failed 0
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the size of the historical list (journal) of the most recently executed CLI
commands.
Syntax Description
journal List of the most recently executed CLI commands.
size size Configures the size (number) of remembered commands. Range is 50
to 200 (default = 100).
Default
One hundred commands are preserved in the journal by default.
Usage Guidelines
The journal retains as many as 200 of the most recently executed commands along with the timestamp
and user name. Commands are saved even after logging off, rebooting, or switch crashes.
Example
The following example sets the journal size to 150:
configure cli journal size 150
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Establishes the maximum number of failed logins permitted before the session is terminated.
Syntax Description
num-of-logins Specifies the maximum number of failed logins permitted; the range is 1 to
10.
Default
The default is three logins.
Usage Guidelines
The value must be greater than 0; the range is 1 to 10.
Example
The following command sets the maximum number of failed logins to five:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Limits number of simultaneous CLI sessions on the switch.
Syntax Description
num-of-sessions Specifies the maximum number of concurrent sessions permitted. The
range is 1 to 16.
Default
The default is eight sessions.
Usage Guidelines
The value must be greater than 0; the range is 1 to 16.
Example
The following command limits the number of simultaneous CLI sessions to ten:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the persistent nature of command execution for non-persistent commands.
Syntax Description
persistent Configures command execution to be persistent.
non-persistent Configures command execution to be not persistent.
Default
The default mode is non-persistent.
Usage Guidelines
All ExtremeXOS commands can operate in persistent mode, and a subset of the ExtremeXOS command
set can operate in non-persistent mode. Commands that are executed in persistent mode become part
of the saved switch configuration that persists when the switch is rebooted. Commands that are
executed in non-persistent mode configure temporary changes that are not saved in the switch
configuration and do not persist when the switch is rebooted.
Most commands operate only in persistent mode. The subset of commands that operate in non-
persistent mode are called non-persistent-capable commands. The Universal Port feature uses the non-
persistent-capable commands to configure temporary changes that could create security issues if the
switch were rebooted or reset. The use of non-persistent-capable commands in scripts and Universal
Port profiles allows you to make temporary configuration changes without affecting the default
configuration the next time the switch is started.
The configure cli mode command affects only the non-persistent-capable commands, which are listed
in the Universal Port chapter in the ExtremeXOS 30.5 User Guide. By default, all commands operate in
persistent mode with the following exceptions:
• In Universal Port dynamic profiles, the non-persistent-capable commands operate in non-persistent
mode unless preceded by the configure cli mode persistent command in the profile.
• In the CLI, CLI scripts, and static profiles, the non-persistent-capable commands operate in non-
persistent mode only when preceded by the configure cli mode non-persistent command.
You can use the configure cli mode persistent command and the configure cli mode non-persistent
command to change the mode of operation for non-persistent-capable commands multiple times
within a script, profile, or configuration session.
Example
The following example sets command execution to be persistent:
configure cli mode persistent
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the error handling process for CLI scripting on the switch.
Syntax Description
abort-on-error Configures Cli scripts to be aborted if a CLI error occurs.
ignore-error Configures the script to be executed when CLI errors occur.
Default
CLI: ignore-error Static profiles: abort-on-error Dynamic profiles: abort-on-error
Usage Guidelines
You can change the error-handling options within the scripts.
Example
The following command configures the switch to ignore syntax errors in CLI scripts:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Controls how old keywords that have been moved and redefined appear in the CLI.
Syntax Description
cli Configures aspects of the CLI.
moved-keywords Selects CLI keywords that were moved or processing options that
were renamed.
hide Deprecates old-moved keywords to hide them from help display.
show Shows old-moved keywords and corresponding redirection help text.
(Default)
no-help Shows old-moved keywords, but does not show redirection help text.
Default
By default, the show option is in effect.
Usage Guidelines
ExtremeXOS has evolved and incorporated many new features over time. During this development, CLI
keywords have been introduced that are not logically organized or do not conform to the CLI format
standards. This command provides a way to manage how old keywords that have been moved and
redefined appear in the CLI.
The option you select with this command, and if you elect to hide commands, which version of
ExtremeXOSversion was running when the hide command was issued, appear in the output of the
show management.
Example
The following example shows old commands and displays help text:
# configure cli moved-keywords show
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to configure prompting (with no echo) for all passwords, secrets, or keys.
Syntax Description
prompting-only Prompting is required when entering passwords, keys, and secrets.
The default is off.
on Enable the option.
off Disable the option.
Default
Off.
Usage Guidelines
Use this command to configure prompting (with no echo) for all passwords, secrets, or keys. Each CLI
command with password arguments will be modified to use the new mode (designated with
flags="prompting-only" in the CLI syntax attribute specification). Prompting must be handled in the
action script for that command.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum time a script can run.
Syntax Description
timeout Defines the timeout period in seconds.
Default
Regular script: no time limit default.xsf: 500 seconds autoexec.xsf: 500 seconds
Usage Guidelines
This command configures the maximum run time for all scripts, including default.xsf and autoexec.xsf,
which are described in Software Upgrade and Boot Options section in the ExtremeXOS 30.5 User Guide.
If no timeout period is configured, regular scripts do not timeout, and the default.xsf and autoexec.xsf
scripts time out after 500 seconds.
If a script does not finish running in the configured time, command execution stops and an error
message is logged. If the timer expires while a command is executing, the command execution
continues and all following commands are not executed.
If the timer command is executed inside a script, the timer is reset. If the command is issued more than
once inside a script the last timer command executed resets the timer. The timer is valid only for that
session. The use of nested scripts does not extend the execution period. When the parent script reaches
the timeout value, the parent script and all nested scripts terminate.
To configure a different timeout value for autoexec.xsf or default.xsf, the configure cli script timeout
command should be the first command in the script.
When a script timeout value is configured, the following variables are created: $CLI.SCRIPT_TIMEOUT
and $CLI.SCRIPT_TIME_REMAINING. If no timeout value is configured for a session, the variables are
not created.
You can use the $CLI.SCRIPT_TIMEOUT variable to adjust the timeout value. The
$CLI.SCRIPT_TIME_REMAINING variable returns the time remaining. When a timeout value is
configured, the variable values are as follows:
• If no script is running, both $CLI.SCRIPT_TIME_REMAINING and $CLI.SCRIPT_TIMEOUT show the
configured timeout value.
• If a script is aborted due to timeout, the $CLI.SCRIPT_TIME_REMANING variable returns the value0.
• If a script finishes execution (before the timeout value is reached) the
$CLI.SCRIPT_TIME_REMANING variable returns the remaining time.
Example
The following example configures the switch to terminate a script after 120 seconds:
configure cli script timeout 120
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure cos-index
configure cos-index cos_index [{ qosprofile qosprofile } {ingress-meter
ing_meter } {replace-tos tos_value {mask tos_mask}}]
Description
This command is used to configure the CoS (Class of Service) index, which is used to assign QoS
(Quality of Service) rate-shaping, rate-limiting, flood control, and 802.1p.
Syntax Description
cos_index Class of Service (CoS) index value, range 0 - 255.
qosprofile QoS profile.
qosprofile QoS profile name.
ingress-meter Ingress rate-limiter meter.
ing_meter Ingress rate-limiter meter name.
replace-tos Replace TS value.
tos_value TOS replacement value.
mask TOS replacement mask.
tos_mask TOS replacement mask value.
Default
N/A.
Usage Guidelines
The CoS index (0-255) is used to assign QoS rate-shaping, rate-limiting, flood control, and 802.1p. The
TOS value can be a value from 0-255. The TOS mask option allows for only certain bits of the field, those
masked, to be change. If the mask is not specified in the ToS input, all bits are overwritten. The replace-
dot1p value cannot be set for CoS indexes 0-7.
For indexes 0-7, the replace-tos option for the cos-index command will map to the configure
diffserv commands, which are associated with the qosprofile, assigned through the configure
dot1p command. Note that diffserv only replaces bits 0-5 of the TOS byte. Therefore, the replace-tos
mask is fixed to 0xfc for cos-index 0-7 and the equivalent diffserv replace value is shifted left 2 bits. On
some platforms, the hardware only allows replacement of bits 0-5. In which case, the mask is fixed to
0xfc and will result in an error if the user tries to change the mask.
Example
configure cos-index 51 qosprofile qp2 ingress-meter ingmeter2 replace-tos 64
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables the sending of core dump files to the internal memory card, a compact flash card, or
a USB 2.0 storage device.
Syntax Description
off Specifies that the switch does not save core dump files to memory or to
removable storage devices.
directory_path Directory path (memory card is /usr/local/ext; internal memory
is /usr/local/tmp; and home directory is /usr/local/cfg.
Default
Beginning with ExtremeXOS 11.6, configure debug core-dumps internal-memory is enabled by default.
Usage Guidelines
Note
Use this command only under the guidance of Extreme Networks Technical Support
personnel to troubleshoot the switch.
The switch only generates core dump files and writes them to the specified device in the following
situations:
• If an ExtremeXOS process fails.
• When forced under the guidance of Extreme Networks Technical Support.
If you configure the switch to write core dump files to the internal memory and attempt to download a
new software image, you might have insufficient space to complete the image download. If this occurs,
move or delete the core dump files from the internal memory. For example, if the switch supports a
removable storage device that has space available, transfer the files to the device. On switches without
removable storage devices, transfer the files from the internal memory card to a TFTP server. This frees
up space on the internal memory card while keeping the core dump files.
Before you can enable and save debug information to a removable storage device, you must install the
device. For more information about installing a removable storage device, refer to the hardware
documentation.
After you use the eject memorycard command and manually remove a removable storage device,
you are reminded to select another location to write the bebug files to.
Example
The following example enables a switch to save debug information to a removable storage device:
configure debug core-dumps /usr/local/ext
The following example enables the switch to save debug information to the internal memory card:
configure debug core-dumps /usr/local/tmp
History
This command was first available in ExtremeXOS 11.1.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
The options memorycard and internal-memory were removed and the variable
directory_path was added in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the DHCPv6 client identifier type for the client. A DHCP server uses this
identifier-type to identify clients for the selection of configuration parameters.
Syntax Description
dhcp Configure DHCP
ipv6 Configure DHCP IPv6 client
client Configure DHCP IPv6 client
identifier-type Configure DHCP IPv6 client identifier type
link-layer Configure link-layer address (system MAC) as DHCP IPv6 client
identifier
plus-time Configure link-layer address plus current time as DHCP IPv6 client
identifer
vendor-specific Configure DHCP IPv6 client identifier by prepending the vendor-
specific IANA value
Default
IPv4.
Usage Guidelines
Use this command to configure the DHCPv6 client identifier type for the client.
History
This command was first available in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the user privilege level needed to view diagnositc results.
Syntax Description
privilege Configure minimum privilege level needed to view diagnostic results.
admin Only admin (read-write) accounts can view diagnostic results.
user User (read-only) accounts can view diagnostic results also (default).
Default
User.
Usage Guidelines
Use this command to configure the privilege level required to view diagnostic results.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the default ingress DiffServ code point (DSCP) to QoS profile mapping.
Syntax Description
code-point Specifies a DiffServ code point (a 6-bit value in the IP-TOS byte in the IP
header). Supported values are 0 to 63.
qosprofile Specifies the QoS profile to which the DiffServ code point is mapped.
Default
See Table 6 below.
Usage Guidelines
You can specify up to 64 different code points for each port. Code point values are grouped and
assigned to the default QoS profiles as shown in the following table.
Example
The following command specifies that code point 25 be assigned to QP2:
# configure diffserv examination code-point 25 qosprofile qp2
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the egress Diffserv replacement mapping for either a QoS profile or an 802.1p priority value.
Syntax Description
qosprofile Specifies a QoS profile.
priority Specifies an 802.1p priority value to map to a code point.
code_point Specifies a 6-bit value to be used as the replacement DSCP in the IPv4
or IPv6 header.
Default
N/A.
Usage Guidelines
Note
We recommend that you use the qosprofile qosprofile value to configure this parameter.
Egress packets contain the DSCP assigned to the QoS profile, which can be selected by the 802.1p code
point or by an ACL. The default 802.1p priority value to QoS profile to DSCP mapping is shown in the
following table.
Example
The following command specifies that a code point value of 5 should be used to replace the DiffServ
(TOS) bits in packets in QP2:
# configure diffserv replacement qosprofile qp2 code-point 5
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the protected client list for the Domain Name System (DNS) cache analytics for the virtual
router (VR).
Syntax Description
dns Domain Name System.
cache Specifies configuring DNS cache.
analytics Specifies configuring DNS cache analytics.
add Specifies adding to the protected client list.
delete Specifies deleting from the protected client list.
protected-client Specifies configuring the protected client list.
client_ip Specifies the IPv4 network address of the protected client.
netmask Specifies the IP address netmask of the protected client.
ipNetmask Specifies the IP address/mask length of the protected client.
vr Specifies the VR.
vr_name Specifies the VR name. If not specified, the VR of the current
command context is used.
Default
If not specified, by default the VR of the current command context is used.
Usage Guidelines
Administrators can use this command to restrict the collection of DNS analytics for a protected client.
When you configure the client IP subnet in the protected list, DNS queries from configured protected
clients are erased from the analytics database and future queries are not stored.
Example
The following example adds the client at IP address 192.168.3.3 on VR-Default to the protected client list:
# configure dns cache analytics add protected-client 192.168.3.3 255.255.255.255 VR-
Default
or
# configure dns cache analytics add protected-client 192.168.3.3/32 VR-Default
The following example adds the subnet 192.168.3.0 on VR-Default to the protected client list:
# configure dns cache analytics add protected-client 192.168.3.0 255.255.255.0 VR-Default
or
# configure dns cache analytics add protected-client 192.168.3.0/24 VR-Default
The following example removes the client 192.168.3.3 on VR-Default from the protected client list:
# configure dns cache analytics delete protected-client 192.168.3.3 255.255.255.255 VR-
Default
or
# configure dns cache analytics delete protected-client 192.168.3.3/32 VR-Default
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or deletes a Domain Name System (DNS) name server.
Syntax Description
dns Domain Name System.
cache Specifies adding or deleting DNS name server.
add Specifies adding a name server.
delete Specifies deleting a name server.
name-server Specifies adding or deleting a DNS name server.
ip_address Specifies the IP address of the DNS name server.
vr Configures the VR on which the DNS name server is accessible.
vr_name Specifies the VR on which the DNS name server is accessible. If not
specified, the VR of the current command context is used.
Default
If no VR name is specified, the VR of the current command context is used.
Usage Guidelines
You can configure a maximum of 8 name servers.
To view the current DNS name servers, use the command show dns cache name-server.
Example
The following example adds a DNS name server located at 1.1.1.2:
# configure dns cache add name-server 1.1.1.2
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures Domain Name System (DNS) cache analytics.
Syntax Description
dns Domain Name System.
cache Specifies DNS cache.
analytics Specifies configuring DNS analytics.
timeout Specifies setting the timeout period for analyzed DNS queries. After
this time, existing entries are flushed.
minutes Specifies the timeout value in minutes. The range is 1 to 1,440. The
default is 1,440.
max-entries Specifies the maximum number of analyzed DNS queries in the
database. When this limit is met, new entries start replacing old
entries.
max_entries Specifies the value for the maximum analyzed queries. The range is
1,000 to 10,000. The default is 10,000.
Default
The default for the timeout period is 1,440 minutes.
Usage Guidelines
If query Q1 is learned at time t1 and the timeout period is configured as 5 minutes, this entry is removed
within t1 + 5 minutes.
To manually clear the DNS cache analytics, use the command clear dns cache analytics
entries {{vr} vr_name}.
Example
The following example sets the maximum number of entries to 2,000:
# configure dns cache analytics max-entries 2000
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Syntax Description
domain-suffix Specifies adding a domain suffix.
domain_name Specifies a domain name.
name-server Specifies adding a name server.
ip_address Specifies an IP address for the name server.
vr Specifies use of a virtual router.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document..
Description
Adds a domain suffix to the domain suffix list or a name server to the available server list for the DNS
client.
Default
N/A.
Usage Guidelines
The domain suffix list can include up to six items.
If the use of all previous names fails to resolve a name, the most recently added entry on the domain
suffix list will be the last name used during name resolution. This command will not overwrite any
exiting entries. If a null string is used as the last suffix in the list, and all other lookups fail, the name
resolver will attempt to look up the name with no suffix.
Up to eight DNS name servers can be configured. The default value for the virtual router used by the
DNS client option is VR-Default.
Example
The following command configures a domain name and adds it to the domain suffix list:
configure dns-client add domain-suffix xyz_inc.com
The following command specifies that the switch use the DNS server 10.1.2.1:
configure dns-client add name-server 10.1.2.1
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the domain that the DNS client uses if a fully qualified domain name is not entered.
Syntax Description
domain_name Specifies a default domain name.
Default
N/A.
Usage Guidelines
The default domain name will be used to create a fully qualified host name when a domain name is not
specified.
For example, if the default domain name is set to “food.com” then when a command like “ping dog” is
entered, the ping will actually be executed as “ping dog.food.com”.
Example
The following command configures the default domain name for the server:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a domain suffix from the domain suffix list or a name server from the available server list for the
DNS client.
Syntax Description
domain-suffix Specifies deleting a domain suffix.
domain_name Specifies a domain name.
name-server Specifies deleting a name server.
ip_address Specifies an IP address for the name server.
vr Specifies deleting a virtual router.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
N/A.
Usage Guidelines
Specifying a domain suffix removes an entry from the domain suffix list.
If the deleted item was not the last entry in the list, all items that had been added later are moved up in
the list. If no entries in the list match the domain name specified, an error message will be displayed.
The default value for the virtual router used by the DNS client option is VR-Default.
Example
The following example deletes a domain name from the domain suffix list:
configure dns-client delete domain-suffix xyz_inc.com
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the denial of service protection ACL expiration time.
Syntax Description
seconds Specifies how long the ACL is in place.
Default
The default is 5 seconds.
Usage Guidelines
This command configures how long the DoS protection ACL remains in place.
Example
This example sets the ACL expiration time to 15 seconds:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the denial of service protection interval.
Syntax Description
seconds Specifies how often the DoS protection counter is monitored.
Default
The default is one second.
Usage Guidelines
This command configures how often the DoS protection counter is monitored.
Example
This example sets the interval to 5 seconds:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the list of trusted ports.
Syntax Description
ports Specifies the trusted ports list.
ports-to-add Specifies the ports to add to the trusted ports list.
all Specifies all the ports.
ports-to-delete Specifies the ports to delete from the trusted ports list.
Default
N/A.
Usage Guidelines
Traffic from trusted ports will be ignored when DoS protect counts the packets to the CPU. If we know
that a machine connected to a certain port on the switch is a safe "trusted" machine, and we know that
we will not get a DoS attack from that machine, the port to which this machine is connected can be
configured as a trusted port, even though a large amount of traffic is going through this port.
Example
This example sets the trusted port list to 3:1-3:7:
This example adds the trusted port 3:8 to the current list (use this command with a network
administrator machine not connected to the internet that is attached to port 3:8):
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the denial of service protection alert threshold.
Syntax Description
packets Specifies how many packets in an interval will cause an alert.
Default
The default is 4000 packets.
Usage Guidelines
This command configures how many packets received in an interval will cause a DoS protection alert.
When an alert occurs, the packets are analyzed, and a temporary ACL is applied to the switch.
Example
This example sets the alert threshold to 8000 packets:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the denial of service protection notification threshold.
Syntax Description
packets Specifies how many packets in an interval will cause a notification.
Default
The default is 3500 packets.
Usage Guidelines
This command configures how many packets received in an interval will cause a DoS protection
notification.
Example
This example sets the notification threshold to 7500 packets:
History
This command was first available in ExtremeXOS 11.1
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an 802.1p priority to QoS profile mapping for the specified ports.
Syntax Description
dot1p_priority Specifies the 802.1p priority value. The value is an integer between 0
and 7.
qosprofile Specifies a specific QoS profile. The value range is QP1 to QP8.
ingress-meter Ingress rate-limiter meter.
ing_meter Ingress rate-limiter meter name.
none Dot1p examination rule has no ingress-meter (default if ingress-meter
is unspecified).
Default
The default mapping of each 802.1p priority value to QoS profile is shown in the following table.
Usage Guidelines
An 802.1p priority value seen on ingress can be mapped to a particular QoS profile and with specific
bandwidth management and priority behavior.
You must create the QoS profile first, using the create qosprofile [QP2| QP3 | QP4 | QP5
| QP6 | QP7] command, to map the 802.1p information to QoS profile 2 through 7.
SummitStack Only
You must create the QoS profile first, using the create qosprofile [QP2| QP3 | QP4 | QP5
| QP6 | QP7] command, to map the 802.1p information to QoS profile 2 through 6. You cannot
create QP7 in a SummitStack.
Example
The following commands reassign (from the default) the QoS profiles associated with 802.1p priority
values 1 and 2:
# configure dot1p type 2 qosprofile qp2
# configure dot1p type 1 qosprofile qp3
History
This command was first available in ExtremeXOS 11.0.
The ingress-meter, ing_meter, and none options were added in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds the specified control VLAN to the specified EAPS domain.
Syntax Description
name Specifies the name of an EAPS domain.
vlan_name Specifies the name of the control VLAN.
Default
N/A.
Usage Guidelines
You must configure one control VLAN for each EAPS domain. The control VLAN is used only to send
and receive EAPS messages.
A control VLAN cannot belong to more than one EAPS domain. When the EAPS domain is active, you
cannot delete or modify the configuration of the control VLAN.
By default, EAPS protocol data units (PDUs) are automatically assigned to QoS profile QP8. This
ensures that the control VLAN messages reach their intended destinations. You do not need to
configure a QoS profile for the control VLAN.
The VLAN must already exist before you can add it as a control VLAN. If you attempt to add a VLAN
that does not exist, the switch displays a message similar to the following:
* Switch.8 # configure eaps megtest add control foo^%% Invalid input detected at '^'
marker.
Example
The following command adds the control VLAN keys to the EAPS domain eaps_1.
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds the specified protected VLAN to the specified EAPS domain.
Syntax Description
name Specifies the name of an EAPS domain.
vlan_name Specifies the name of the protected VLAN.
Default
N/A.
Usage Guidelines
You must configure one or more protected VLANs for each EAPS domain. The protected VLANs are the
data-carrying VLANs.
When you configure a protected VLAN, the ring ports of the protected VLAN must be tagged (except in
the case of the default VLAN). As long as the ring is complete, the master node blocks the protected
VLANs on its secondary port.
The VLAN must already exist before you can add it as a protected VLAN. If you attempt to add a VLAN
that does not exist, the switch displays a message similar to the following:
* Switch.5 # configure eaps megtest add protected foo^%% Invalid input detected at '^'
marker.
Example
The following command adds the protected VLAN orchid to the EAPS domain eaps_1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Notifies the CFM that EAPs is interested in notifications for the specified MEP and RMEP pair.
Syntax Description
cfm Connectivity Fault Management.
add Add a MEP group.
delete Delete a MEP group.
group group_name MEP group to bind.
Default
N/A.
Usage Guidelines
This command notifies CFM that EAPs is interested in notifications for this MEP and RMEP pair. This
MEP should already be bound to a physical port, so when notification is received, EAPS associates that
notification with a ring-port failure.
Example
The following command deletes the control VLAN keys from the EAPS domain eaps_1:
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on all ExremeXOS platforms; however, not all platforms support hardware-
based CFM. Platforms with no hardware-based CFM support are limited to software-based CFM
transmit intervals of 100 ms or higher. Hardware-based intervals can go as low as 3.3 ms.
Description
Disables the loop protection warning messages displayed when configuring specific EAPS parameters.
Syntax Description
This command has no arguments or variables.
Default
By default, loop protection warnings are enabled and displayed when configuring specific EAPS
parameters.
Usage Guidelines
This is a global EAPS command. You configure the warning message display on a per switch basis, not
per EAPS domain.
When configuring the following EAPS parameters, the switch displays loop protection warning
messages:
• Adding EAPS primary or secondary ring ports to a VLAN
• Deleting a protected VLAN
• Disabling the global EAPS setting on the switch
• Disabling an EAPS domain
• Configuring an EAPS domain as a transit node
• Unconfiguring EAPS primary or secondary ring ports from an EAPS domain
We recommend that you keep the loop protection warning messages enabled. If you have considerable
knowledge and experience with EAPS, you might find the EAPS loop protection warning messages
unnecessary. For example, if you use a script to configure your EAPS settings, disabling the warning
messages allows you to configure EAPS without replying to each interactive yes/no question.
Example
The following command disables the loop protection warning messages:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the loop protection warning messages displayed when configuring specific EAPS parameters.
Syntax Description
This command has no arguments or variables.
Default
By default, loop protection warnings are enabled and displayed when configuring specific EAPS
parameters.
Usage Guidelines
This is a global EAPS command. You configure the warning message display on a per switch basis, not
per EAPS domain.
When configuring the following EAPS parameters, the switch displays loop protection warning
messages:
• Adding EAPS primary or secondary ring ports to a VLAN
• Deleting a protected VLAN
• Disabling the global EAPS setting on the switch
• Disabling an EAPS domain
• Configuring an EAPS domain as a transit node
• Unconfiguring EAPS primary or secondary ring ports from an EAPS domain
We recommend that you keep the loop protection warning messages enabled.
Example
The following command enables the loop protection warning messages:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes the specified control VLAN from the specified EAPS domain.
Syntax Description
name Specifies the name of an EAPS domain.
vlan_name Specifies the name of the control VLAN.
Default
N/A.
Usage Guidelines
None.
Example
The following example deletes the control VLAN keys from the EAPS domain eaps_1:
configure eapseaps_1 delete control vlan keys
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes the specified protected VLAN from the specified EAPS domain.
Syntax Description
name Specifies the name of an EAPS domain.
vlan_name Specifies the name of the protected VLAN.
Default
N/A.
Usage Guidelines
To prevent loops in the network, you must delete the ring ports (the primary and the secondary ports)
from the protected VLAN before deleting the protected VLAN from the EAPS domain. Failure to do so
can cause a loop in the network.
The switch displays by default a warning message and prompts you to delete the VLAN from the EAPS
domain. When prompted, do one of the following:
• Enter y delete the VLAN from the specified EAPS domain.
• Enter n or press [Return] to cancel this action.
If you have considerable knowledge and experience with EAPS, you might find the EAPS loop
protection warning messages unnecessary. For more information, see the configure eaps
config-warnings off command.
Example
The following example deletes the protected VLAN orchid from the EAPS domain eaps_1:
configure eapseaps_1delete protected vlan orchid
The switch displays the following warning message and prompts you to confirm this action:
WARNING: Make sure EAPS ring-ports are deleted from the VLAN first. Otherwise deleting
the VLAN from the EAPS domain could cause a loop in the network! Are you sure you want to
remove the VLAN before deleting EAPS ring-ports.? (y/n)
Enter y to delete the VLAN from the specified EAPS domain. Enter n to cancel this action.
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the action taken when the failtimer expires.
Syntax Description
name Specifies the name of an EAPS domain.
open-secondary-port Specifies to open the secondary port when the failtimer expires.
send-alert Specifies that a critical message is sent to the syslog when the
failtimer expires.
Default
Default is send-alert.
Usage Guidelines
By default the action is to send an alert if the failtimer expires. Instead of going into a Failed state, the
master node remains in a Complete or Init state, maintains the secondary port blocking, and writes a
critical error message to syslog warning the user that there is a fault in the ring. An SNMP trap is also
sent.
If the EAPS ring contains non-EAPS devices, you must use the open-secondary-port parameter.
Note
Use caution when setting the failtimer expiry action to open-secondary port. Using this
configuration, if the master node loses three consecutive hello PDUs, the failtimer expires—
but there might not be a break in the ring. Opening the secondary port in this situation
creates a loop.
Example
The following command configures the failtimer expiry action for EAPS domain eaps_1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the period after which the master node declares a failure if no hello PDUs are received.
Syntax Description
name Specifies the name of an EAPS domain.
seconds Specifies the number of seconds the master node waits before the failtimer
expires. Default is 3 seconds, and the range is 0 to 300 seconds.
milliseconds Specifies the number of milliseconds to wait before the failtimer expires. The range
is 300 to 999 milliseconds.
Default
The default is 3 seconds.
Usage Guidelines
Use the failtime keyword and its associated seconds parameter to specify the amount of time the
master node waits before the failtimer expires. The failtime period (seconds plus milliseconds) must be
set greater than the configured value for hellotime. The default value is three seconds.
Increasing the failtime value reduces the likelihood of false failure detections caused by network
congestion.
Note
You configure the action taken when the failtimer expires by using the configure eaps
failtime expiry-action command.
Example
The following command configures the failtimer value for the EAPS domain eaps_1 to 15 seconds:
configure eapseaps_1failtime15 0
The following command configures the failtimer value for the EAPS domain eaps_2 to 300 milliseconds:
History
This command was first available in ExtremeXOS 11.0.
The range for the failtimer was changed to 2 to 300 seconds in ExtremeXOS 11.1. The default value for
the failtimer remains unchanged.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables EAPS to converge more quickly.
Syntax Description
off Turns fast-convergence off. Default is off.
on Turns fast-convergence on.
Default
Default is off.
Usage Guidelines
This command acts on the switch, not per domain.
In certain environments to keep packet loss to a minimum when the ring is broken, configure EAPS with
fast-convergence turned on. If fast convergence is turned on, you can view the configuration with the
show eaps command.
Note
If fast-convergence is turned on, the link filters on all EAPS ring ports are turned off. This can
result problems if the port’s hardware encountered a problem and started “flapping” between
link-up/link-down states.
Example
The following command configures fast convergence for all of the EAPS domains on the switch:
configure eapsfast-convergence on
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the port through which a master node sends EAPS hello PDUs.
Syntax Description
name Specifies the name of an EAPS domain.
Default
Default is the primary port.
Usage Guidelines
This command is provided for special network topologies that use spatial reuse and require that all
EAPS hello PDUs travel in the same direction on the ring.
Note
We recommend the default (primary-port) configuration for this command.
Example
The following command configures the master switch to send EAPS hello packets from the secondary
port:
History
This command was first available in ExtremeXOS 12.4.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the period at which the master node sends EAPS hello PDUs to verify ring connectivity.
Syntax Description
name Specifies the name of an EAPS domain.
seconds Specifies the number of seconds to wait between transmission of hello PDUs on
the control VLAN. The range is 0 to 15 seconds.
milliseconds Specifies the number of milliseconds to wait between transmission of hello PDUs
on the control VLAN. The range is 0 to 999 milliseconds.
Default
Default is 1 second.
Usage Guidelines
Use the hellotime keyword and its associated parameters to specify the amount of time the master
node waits between transmissions of hello PDUs on the control VLAN. Increasing the hellotime value
results in a reduced load on the processor and less traffic on the EAPS ring.
Note
The hello PDU timer value must be smaller than the fail timer value to prevent false failure
detection. If you change the hello PDU timer, verify that the fail timer value remains larger.
This command applies only to the master node. If you configure the hello PDU timer for a transit node,
the timer value is ignored. If you later reconfigure that transit node as the master node, the master node
uses the configured hello PDU timer value.
In ExtremeXOS 11.0, the range is 1 to 15 seconds. If you are running ExtremeXOS 11.0 with the hello timer
value greater than 15 seconds and you upgrade to ExtremeXOS 11.1 or later, you must modify the hello
timer to be within the 1 to 15 seconds range.
Example
The following example configures the hellotime value for the EAPS domain eaps_1 to 300 milliseconds:
configure eap seaps_1 hellotime 0 300
History
This command was first available in ExtremeXOS 11.0.
The range for the hello timer was changed to 1 to 15 seconds in ExtremeXOS 11.1. The default value for
the hello timer remains unchanged.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch as either the EAPS master node or as an EAPS transit node for the specified
domain.
Syntax Description
name Specifies the name of an EAPS domain.
master Specifies that this switch should be the master node for the named EAPS
domain.
transit Specifies that this switch should be the transit node for the named EAPS
domain.
Default
N/A.
Usage Guidelines
One node (or switch) on the ring must be configured as the master node for the specified domain; all
other nodes (or switches) on the ring are configured as transit nodes for the same domain.
If you configure a switch to be a transit node for an EAPS domain, the switch displays by default
messages to:
• Remind you to configure a master node in the EAPS domain.
• Notify you that changing a master node to a transit node might cause a loop in the network. If you
have not assigned a new master node before changing the current master node to a transit node,
you might cause a loop in the network.
If you have considerable knowledge and experience with EAPS, you might find the EAPS loop
protection warning messages unnecessary. For more information, see the configure eaps
config-warnings off command.
Example
The following example identifies this switch as the master node for the domain named eaps_1:
configure eaps eaps_1 mode master
The following example identifies this switch as a transit node for the domain named eaps_1:
configure eaps eaps_1 mode transit
The switch displays the following warning message and prompts you to confirm this action:
WARNING: Make sure this specific EAPS domain has a Master node in the ring. If you change
this node from EAPS master to EAPS transit, you could cause a loop in the network. Are you
sure you want to change mode to transit? (y/n)
Enter y to identify the switch as a transit node. Enter n to cancel this action.
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch to add previously blocked ring ports to existing multicast groups when an EAPS
topology change occurs.
Syntax Description
on Enables the multicast add-ring-ports feature.
off Disables the multicast add-ring-ports feature.
Default
Off.
Usage Guidelines
When this feature is set to on and an EAPS topology change occurs, multicast traffic is fastpath
forwarded using the switch hardware during the topology transition. The on setting improves multicast
forwarding performance during the transition.
Note
EAPS multicast flooding must be enabled before this feature will operate. For information on
enabling EAPS multicast flooding, see the configure eaps multicast temporary-
flooding command description.
When this feature is set to off and an EAPS topology change occurs, multicast traffic is slowpath
forwarded using the CPU during the topology transition. The off setting reduces multicast forwarding
performance during the transition.
For other methods of supporting multicast traffic during an EAPS topology change, see the
descriptions for the following commands:
• configure eaps multicast send-igmp-query
• configure eaps multicast temporary-flooding
Example
The following example enables the add-ring-ports feature:
configure eaps multicast add-ring-ports on
History
This command was first available in ExtremeXOS 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch to send IGMP query messages to all protected VLANs when an EAPS topology
change occurs.
Syntax Description
on Enables the multicast send-igmp-query feature.
off Disables the multicast send-igmp-query feature.
Default
On.
Usage Guidelines
When this feature is set to on and an EAPS topology change occurs, the switch sends IGMP query
messages to all protected VLANs. If the protected VLANs in the node detecting (and generating) the
topology change do not have IP address, a query is generated with the source IP address set to the
querier address in that VLAN.
In a EAPS ring with many protected VLANs, the many responses can impact switch performance. This is
the default behavior and was the only method for supporting multicast traffic during EAPS topology
changes prior to release 12.1.2.
When this feature is set to off and an EAPS topology change occurs, the switch does not automatically
send IGMP queries to all protected VLANS during the topology transition. The off setting improves
switch performance during the transition, but you should use one of the following commands to see
that multicast traffic is supported during and after the topology change:
• configure eaps multicast add-ring-ports
Example
The following command disables the send-igmp-query feature:
History
This command was first available in ExtremeXOS 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the duration for which the switch temporarily enables multicast flooding when an EAPS
topology change occurs.
Syntax Description
seconds Specifies the period (in seconds) for which the switch enables
multicast flooding.
Default
15 seconds.
Usage Guidelines
The flooding duration configuration applies only when the temporary-flooding feature is enabled with
the following command:
configure eaps multicast temporary-flooding
Example
The following command configures the temporary-flooding feature duration for 30 seconds:
History
This command was first available in ExtremeXOS 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch to temporarily enable multicast flooding when an EAPS topology change occurs.
Syntax Description
on Enables the multicast temporary-flooding feature.
off Disables the multicast temporary-flooding feature.
Default
Off.
Usage Guidelines
When this feature is set to on and an EAPS topology change occurs, the switch temporarily enables
multicast flooding to all protected VLANs for the duration specified by the following command:
configure eaps multicast temporary-flooding duration
If you change the configuration to off, topology changes that occur after this command do not result in
temporary flooding. For example, if you change the configuration to off while flooding is in progress for
a protected VLAN or set of protected VLANs (due to an EAPS topology change), the flooding continues
for the configured duration period. New topology changes on the protected VLANs do not cause
flooding.
When this feature is set to off and an EAPS topology change occurs, the switch does not enable
flooding to all protected VLANS during the topology transition. The default switch response for
multicast traffic during an EAPS topology change is that defined by the following command:
configure eaps multicast send-igmp-query
You can also use the following command to configure the switch response for multicast traffic during an
EAPS topology change:
configure eaps multicast add-ring-ports
Example
The following command enables the temporary-flooding feature:
History
This command was first available in ExtremeXOS 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Renames an existing EAPS domain.
Syntax Description
old_name Specifies the current name of an EAPS domain.
new_name Specifies a new name for the EAPS domain.
Default
N/A.
Usage Guidelines
If you use the same name across categories (for example, STPD and EAPS names), we recommend that
you specify the identifying keyword as well as the actual name. If you do not use the keyword, the
system might return an error message.
Example
The following command renames EAPS domain eaps-1 to eaps-5:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a node port as the primary or secondary port for the specified EAPS domain.
Syntax Description
name Specifies the name of an EAPS domain.
primary Specifies that the port is to be configured as the primary port.
secondary Specifies that the port is to be configured as the secondary port.
ports Specifies one port or slot and port.
Default
N/A.
Usage Guidelines
Each node on the ring connects through two ring ports. One port must be configured as the primary
port; the other must be configured as the secondary port.
The primary and secondary ports have significance only on a master node. The health-check messages
are sent out the primary port of the master node, and the master node blocks the protected VLANs on
the secondary port.
The master node’s secondary EAPS port cannot be configured on ports that are already configured as
follows:
• Shared-port
• MLAG (Multi-switch Link Aggregation Group) ISC port
There is no distinction between the primary and secondary ports on a transit node.
Beginning with ExtremeXOS 11.1, if you have a primary or secondary port that is a member of a load-
shared group, you do not need to disable your EAPS domain and remove that ring port when modifying
the load-shared group. For more information about configuring load sharing on your switch, see
“Configuring Slots and Ports on a Switch” in the ExtremeXOS 30.5 User Guide.
For complete information about software licensing, including how to obtain and upgrade your license
and what licenses are appropriate for this feature, see the ExtremeXOS 30.5 Feature License
Requirements document.
Enter y to add the ports to the VLAN. Enter n or press [Return] to cancel this action.
If you see this message, either configure the VLAN as an EAPS protected VLAN by using the
configure eaps add protected vlan command or add ports that the EAPS domain does not
use as primary or secondary ring ports.
If you have considerable knowledge and experience with EAPS, you might find the EAPS loop
protection warning messages unnecessary. For more information, see the configure eaps
config-warnings off.
Example
The following example adds port 1 to the EAPS domain eaps_1 as the primary port:
configure eapseaps_1primary port 1
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an EAPS domain priority.
Syntax Description
name Specifies the name of an EAPS domain.
Default
Normal.
Usage Guidelines
Extreme Networks recommends that no more than 200 protected VLANs be configured as high priority
domains. Priority protection works best when the majority of protected VLANs are configured for
normal priority and a relatively small percentage of the protected VLANs are configured as high priority
domains.
When EAPS domains on two separate physical rings share a common link (shared-port configuration)
and have one or more protected VLANs in common, the domains must be configured with the same
domain priority.
When EAPS domain priority is configured on separate physical rings that are connected to the same
switch, the priorities on each ring are serviced independently. For example, if there is a break on both
Ring A and Ring B, the high priority domains on each ring are serviced before the lower priority
domains. However, the switch does not attempt to process the high priority domains on Ring B before
servicing the normal priority domains on Ring A.
For a high priority domain to get priority over normal priority domains, all switches in the EAPS domain
must support high priority domains. If high priority domains are configured on a switch that is in a ring
with one or more switches that do not support high priority domains (software releases before
ExtremeXOS Release 12.5), the high priority domain operates as a normal priority domain.
Example
The following command configures the eaps_1 domain as a high priority domain:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the common path health interval or timeout value.
Syntax Description
port Specifies the port number of the common link port.
health-interval Specifies the interval for health check messages on the common link.
timeout Specifies the timeout value for the common link.
seconds Specifies the amount of health interval, in seconds.
Default
N/A.
Usage Guidelines
This command allows you to configure the length of the common path health interval, in seconds, for a
given port. The range is from 1 to 10 seconds.
Example
The following command configures a common-link health interval of 5 seconds on port 1:1.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the link ID of the shared port.
Syntax Description
ports Specifies the port number of the common link port.
id Specifies the link ID of the port. The link ID range is 1 to 65535.
Default
N/A.
Usage Guidelines
Each common link in the EAPS network must have a unique link ID. The controller and partner shared
ports belonging to the same common link must have matching link IDs. No other instance in the
network should have that link ID.
If you have multiple adjacent common links, we recommend that you configure the link IDs in ascending
order of adjacency. For example, if you have an EAPS configuration with three adjacent common links,
moving from left to right of the topology, configure the link IDs from the lowest to the highest value.
Example
The following command configures the EAPS shared port 1:1 to have a link ID of 1.
configure eaps shared-port 1:1 link-id 1
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the mode of the shared port.
Syntax Description
ports Specifies the port number of the shared port.
controller Specifies the controller mode. The controller is the end of the common
link responsible for blocking ports when the common link fails thereby
preventing the superloop.
partner Specifies partner mode. The partner is responsible only for sending
and receiving health-check messages.
Default
N/A.
Usage Guidelines
The shared port on one end of the common link must be configured to be the controller. This is the end
responsible for blocking ports when the common link fails thereby preventing the superloop.
The shared port on the other end of the common link must be configured to be the partner. This end
does not participate in any form of blocking. It is responsible only for sending and receiving health-
check messages.
Example
The following command configures the shared port 1:1 to be the controller.
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the action taken when the segment timeout timer expires.
Syntax Description
port Specifies the port number of the common link port.
segment-down Marks the segment as DOWN if the segment timer expires. No link-
status-query is sent to verify that links are down.
send-alert If the segment timer expires, the switch keeps segments up, but sends
a warning message to the log. The segment fail flag is set, an SNMP
trap is sent, and a link-status-query is sent to verify if any links are
down.
Default
Default is send-alert.
Usage Guidelines
By default, the action is to send an alert if the segment timeout timer expires. Instead of the segment
going into a failed state and being marked as down, the segment remains in a segment up state with
the failed flag set. The switch writes a critical error message to the syslog warning the user that there is
a fault in the segment. An SNMP trap is also sent.
Note
Use caution when setting the segment-timeout expiry action to segment-down. Using this
configuration, if the controller or partner node loses three consecutive hello PDUs, the
failtimer expires—but there might not be a break in the segment. Opening a blocked port in
this situation creates a loop.
The following describes some general recommendations for using this command:
• When you configure your Extreme Networks switches as the partner and controller, respectively,
make sure that their segment timer configurations are identical.
For example, if you have a partner switch with the segment-timeout expiry action set to send-alert,
make sure the controller switch has its segment-timeout expiry action set to send-alert.
However, if you have a partner switch with the segment-timeout expiry action set to send-alert, and
the controller switch does not have a segment timer configuration, you must configure the partner
switch’s segment-timeout expiry action to segment-down.
• If you have a network containing non-Extreme Networks switches or non-EAPS devices, set the
segment-timeout expiry action to segment-down.
To view shared-port information, including shared-port segment status, use the following command:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the shared-port health interval timeout.
Syntax Description
port Specifies the port number of the common link port.
seconds Specifies the amount of health interval, in seconds.
Default
N/A.
Usage Guidelines
This command allows you to configure the length of the shared-port health interval timeout, in seconds,
for a given port.
Example
The following command configures a shared-port health interval timeout of 10 seconds on port 1:1.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the shared-port timeout.
Syntax Description
port Specifies the port number of the common link port.
seconds Specifies the amount of health interval, in seconds.
Default
N/A.
Usage Guidelines
This command allows you to configure the length of the shared-port timeout, in seconds, for a given
port.
Example
The following command configures a shared-port timeout of 10 seconds on port 1:1.
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Sets the advertisement interval and hold down interval for EDP.
Syntax Description
timer Specifies the advertisement interval in seconds.
timeout Specifies the hold down interval in seconds.
Default
The default setting for timer is 60 seconds, and for timeout is 180 seconds.
Usage Guidelines
Extreme Discover Protocol (EDP) is used to gather information about neighbor Extreme Networks
switches. EDP-enabled ports advertise information about the Extreme switch to other switches on the
interface and receive advertisements from other Extreme switches. Information about other Extreme
switches is discarded after the hold down interval timeout value is reached without receiving another
advertisement.
Example
The following command configures the EDP advertisement-interval to 2 minutes and the hold down
interval to 6 minutes:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables/disables Extreme Loop Recognition Protocol (ELRP) over various types of
dynamic VLANs.
Syntax Description
dynamic-vlans ELRP configuration options for dynamically created VLANs.
mvrp Specifies that the command applies to dynamic VLANs created by
Multiple VLAN Registration Protocol (MVRP) only.
netlogin Specifies that the command applies to dynamic VLANs created by
Network Login only.
vm-tracking Specifies that the command applies to dynamic VLANs created by
virtual machine MAC tracking only.
all (Default) Specifies that the command applies to all types of dynamic
VLANs.
on Enable ELRP for dynamic VLANs.
off Disables ELRP for dynamic VLANs.
Default
ELRP for dynamic VLANs is "off" by default. If the type of dynamic VLAN is not specified, the command
applies to all types of dynamic VLANs.
Example
The following example enables ELRP for all types of dynamic VLANs:
configure elrp-client dynamic-vlans on
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command sets actions to be taken after Extreme Loop Recognition Protocol (ELRP) on dynamic
VLANs detects a loop.
Syntax Description
dynamic-vlans ELRP configuration options for dynamically created VLANs.
mvrp Specifies that the command applies to dynamic VLANs created by
Multiple VLAN Registration Protocol (MVRP) only.
netlogin Specifies that the command applies to dynamic VLANs created by
Network Login only.
vm-tracking Specifies that the command applies to dynamic VLANs created by
virtual machine MAC tracking only.
all (Default) Specifies that the command applies to all types of dynamic
VLANs.
interval Specifies setting the time interval between successive ELRP polls.
sec Sets the time interval in seconds between successive ELRP polls.
Range is 1–600. Default = 1.
action Action to be taken after ELRP poll result.
log Print ELRP poll result to system log.
trap Send SNMP trap.
log-and-trap Print ELRP poll result to system log and send SNMP trap.
disable-port Disable port where looped PDU was transmitted or received.
egress Disable port where looped PDU was transmitted.
ingress Disable port where looped PDU was received (default).
duration Specifies setting the time period that the port is kept disabled before
re-enabling.
seconds Sets the time in seconds that the port is kept disabled before re-
enabling. Range is 15–600. Default = 30.
permanent Keep port disabled permanently. You must intervene to re-enable.
none Removes any previously set actions.
Default
If the type of dynamic VLAN is not specified, the command applies to all types of dynamic VLANs.
If the time duration is not set for the period between ELRP polls, the default is one second.
If not specified, the port that the looped PDU was received on is disabled.
If not specified, the disabled port is kept disabled for 30 seconds before it is re-enabled.
Example
The following example enables ELRP for all types of dynamic VLANs with a time interval between ELRP
polls of 2 seconds:
configure elrp-client dynamic-vlans interval 2
The following example enables ELRP for MVRP VLANs with SNMP trap set when a loop is detected:
configure elrp-client dynamic-vlans mvrp action trap
The following example enables ELRP for all types of dynamic VLANs and disables the egress port where
the loop is detected permanently:
configure elrp-client dynamic-vlans action disable-port egress permanent
The following example enables ELRP for VM-tracking VLANs and disables the ingress port where the
loop is detected for 100 seconds:
configure elrp-client dynamic-vlans vm-tracking action disable-port ingress duration 100
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command turns Extreme Loop Recognition Protocol (ELRP) on/off for client ports or uplink ports
for dynamic VLANs.
Syntax Description
netlogin Specifies that the command applies to dynamic VLANs created by
Network Login only.
vm-tracking Specifies that the command applies to dynamic VLANs created by
virtual machine MAC tracking only.
client-ports Specifies client ports only.
uplink-ports Specifies uplink ports only.
remote-endpoints Specifies remote endpoints that are part of this VLAN.
vxlan Specifies VXLAN remote endpoints that are part of this VLAN.
on Enable ELRP for dynamic VLANs.
off Disables ELRP for dynamic VLANs.
Default
ELRP for dynamic VLANs is "off" by default.
Example
The following example enables ELRP for Netlogin dynamic VLANs on uplink ports only:
configure elrp-client dynamic-vlans netlogin uplink-ports on
The following example enables ELRP for XNV dynamic VLANs on VXLAN remote endpoints that belong
to the VLAN:
configure elrp-client dynamic-vlans vm-tracking remote-endpoints vxlan on
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates an ELRP exclude port list.
Syntax Description
exclude Specifies that selected ports are to be excluded from ELRP disabling.
include Specifies that selected ports are to be included in ELRP disabling.
ports Specifies one or more ports to be excluded or included.
eaps-ring-ports Specifies whether EAPS ring ports are to be excluded or included.
remote-endpoints Specifies remote endpoints, if any, that are part of this VLAN.
vxlan Specifies VXLAN remote endpoints that are part of this VLAN.
inter-vlan-loop Excludes inter-VLAN loop detected ports.
Default
All ports, together with EAPS ring ports and VXLAN remote endpoints, are included by default; that is,
they are disabled if a loop is detected on that port.
Usage Guidelines
Use this command to specify ports, EAPS ring ports, or VXLAN remote endpoints that are to be part of
an ELRP exclude port list. Use the exclude option to add ports to the exclude port list. Use the include
option to remove them from the list.
When ELRP detects a loop and has been configured to automatically disable the port where a looped
ELRP PDU is received and an exclude port list has been configured, it will check to determine if that port
is on the exclude port list. If that port is on the list, ELRP will not disable it; if it is not on the list, it will be
disabled.
To display the ports that are include in the exclude port list, use the show elrp disabled-ports
command.
To remove the exclude port list, use the unconfigure elrp-client disable ports command.
Example
The following example adds port 2:1 to an ELRP exclude port list:
configure elrp-client disable-ports exclude 2:1,2:3
History
This command was first available in ExtremeXOS 12.5.3.
VXLAN (Virtual Extensible LAN) remote endpoint option added in ExtremeXOS 22.4.
The inter-vlan-loop option for excluding inter-VLAN loop detected ports was added in
ExtremeXOS 30.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures or unconfigures a front panel port as the designated loopback port for hardware-assisted
ELRP (Extreme Loop Recovery Protocol).
Syntax Description
elrp-client Configures ELRP client.
hardware-assist Selects configuring hardware-assisted ELRP.
loopback-port Designates selecting a loopback port for hardware-assisted ELRP.
port Selects the loopback port. The port must be an unused front panel
port.
none Unconfigures a loopback port.
Default
N/A.
Usage Guidelines
The loopback port must be an unused front panel port. The selected loopback port cannot be part of a
VLAN. The loopback port cannot be changed or unconfigured if hardware-assisted ELRP mode is
enabled. To disable hardware-assisted ELRP, use the command disable elrp-client .
Example
The following example configures port 7 as the loopback port for hardware-assisted ELRP:
# configure elrp-client hardware-assist loopback-port 7
The following example unconfigures the loopback port for hardware-assisted ELRP:
# configure elrp-client hardware-assist loopback-port none
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Turns on/off Extreme Loop Recovery Protocol (ELRP) inter-VLAN loop detection.
Syntax Description
inter-vlan-loop- ELRP detects loops between untagged ports on different VLANs on
detection the same switch.
on Turns on Inter-VLAN loop detection. (Default)
off Turns off Inter-VLAN loop detection.
Default
Inter-VLAN loop detection is on by default.
Usage Guidelines
It is common in networks for you to accidentally inter-connect two different VLANs by looping together
two untagged ports (one in each respective VLAN). This type of configuration results in an outage, and
it is difficult for the average user to detect.
If desired, you can then include or exclude the inter-VLAN loops to be disabled using the configure
elrp-client disable-ports [exclude | include] [ ports | eaps-ring-ports
| remote-endpoints vxlan | inter-vlan-loop] command.
Example
The following example turns on Inter-VLAN loop detection:
# configure elrp-client inter-vlan-loop-detection on
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Starts one-time, non-periodic ELRP packet transmission on the specified ports of the VLAN using the
specified count and interval.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
ports Specifies the set of VLAN ports for packet transmission.
remote-endpoints Specifies remote endpoints that are part of this VLAN.
vxlan Specifies VXLAN remote endpoints that are part of this VLAN.
interval Time interval between two successive ELRP PDUs.
interval Interval value between 1–64 seconds or 100–64,000 milliseconds.
Default is 1 second.
seconds Specifies that time interval is in the unit of seconds.
milliseconds Specifies that time interval is in the unit of milliseconds.
all Specifies all ports of this VLAN for packet transmission.
count Specifies the number of times ELRP packets must be transmitted. The
range is 1 to 255 times. The default is 3 times.
log Specifies that a message should be logged in the system log file when
ELRP packets are received back indicating detection of network loop,
or no packets are received within the specified duration.
print Specifies that a message should be printed to the console when ELRP
packets are received back indicating detection of network loop, or no
packets are received within the specified duration.
print-and-log Specifies that a message should be logged in the system log file and
printed to the console when ELRP packets are received back
indicating detection of network loop, or no packets are received
within the specified duration.
Default
Second—The interval between consecutive packet transmissions is 1 second.
Usage Guidelines
This command starts one-time, non-periodic ELRP packet transmission on the specified ports of the
VLAN using the specified count and interval. If any of these transmitted packets is returned, indicating
loopback detection, the ELRP client can perform a configured action such as logging a message in the
system log file or printing a log message to the console. There is no need to send a trap to the SNMP
manager for non-periodic requests.
Note
You can also use the command run elrp on page 2381 to perform one-time ELRP packet
transmission.
The ELRP client must be enabled globally in order for it to work on any VLANs. Use the enable
elrp-client command to globally enable the ELRP client.
The ELRP client can be disabled globally so that none of the ELRP VLAN configurations take effect. Use
the disable elrp-client command to globally disable the ELRP client.
Example
The following example starts one-time, non-periodic ELRP packet transmission on all ports of the VLAN
sales, uses the default interval and transmission times, and sends messages to the console:
configure elrp-client one-shot sales ports all interval 1 seconds retry 3 print
History
This command was first available in ExtremeXOS 11.1.
The ability to specify the time interval in milliseconds was introduced in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Starts periodic ELRP packet transmission on the specified ports of the VLAN or VXLAN remote tunnel
endpoints (RTEPs) using the specified interval.
Syntax Description
vlan Specifies a VLAN name.
vlan_name Specifies a VLAN name.
ports Specifies the set of VLAN ports for packet transmission.
all Specifies all ports for packet transmission.
none Specifies no ports for packet transmission. This option allows you to
configure (unambiguously) ELRP on only VXLAN RTEPs.
remote-endpoints Specifies to include the remote endpoints, if any, in this VLAN. Only
supported with software ELRP.
vxlan Specifies VXLAN remote endpoints.
interval Time interval between two successive ELRP PDUs.
interval Software ELRP interval range between 1–600 seconds or 1,000–
600,000 ms. Hardware-assisted ELRP interval range is between 3–
600,000 ms. Default is 1 second.
seconds Specifies that time interval is in the unit of seconds.
milliseconds Specifies that time interval is in the unit of milliseconds.
log Specifies that a message should be logged in the system log file when
ELRP packets are received back indicating detection of network loop,
or no packets are received within the specified duration.
log-and-trap (Default) Specifies that a message should be logged in the system log
file and trap message should be sent to the SNMP manager when
ELRP packets are received back indicating detection of network loop,
or no packets are received within the specified duration.
trap Specifies that a trap message should be sent to the SNMP manager
when ELRP packets are received back indicating detection of network
loop, or no packets are received within the specified duration.
disable-port Specifies that the port should be disabled where the looped PDU is
received.
egress Disable port where looped PDU was transmitted. Only supported with
software ELRP.
duration Specifies a hold time that the port is kept disabled before re-enabling.
seconds The number of seconds the port is kept disabled.
permanent Specifies that the port is disabled permanently. User intervention is
required to enable.
Default
The default interval between consecutive packet transmissions is 1 second.
Usage Guidelines
This command starts periodic ELRP packet transmission on the specified ports of the VLAN using the
specified interval. If any of these transmitted packets is returned, indicating loopback detection, the
ELRP client performs a configured action of logging a message in the system log file and/or sending a
trap to the SNMP manager.
Beginning with ExtremeXOS 12.4, you have the option to automatically disable the port where the
looped packet arrives and to specify the time interval for which the port remains disabled. When that
specified time expires, the port is automatically enabled.
Should a loop occur on multiple ports, only the first port in the VLAN on which the PDU is received is
disabled. The second port is ignored for 1 or 2 seconds and then if another PDU is received, that port is
disabled until the loop is gone. This prevents shutting down all ports in the VLAN.
Use either the configure elrp-client one-shot or the run elrp command to configure
non-periodic, one-time transmission of ELRP packets.
The ELRP client must be enabled globally in order for it to work on any VLANs. Use the enable
elrp-client command to globally enable the ELRP client.
The ELRP client can be disabled globally so that none of the ELRP VLAN configurations take effect. Use
the disable elrp-client command to globally disable the ELRP client.
Use the show elrp command to check the ELRP status and the show elrp disabled-ports
command to view details of ELRP disabled ports.
For the interval option with hardware-assisted ELRP, hardware-assisted ELRP uses ACL meter to
rate limit the PDU TX rate, which has a granularity of 8 Kbps, so for any interval configured for longer
than 70ms in hardware-assisted ELRP mode, the actual interval is around 70ms. This is determined by
hardware capabilities of the switch.
Example
The following example starts periodic ELRP packet transmission on slot 3, port 2 of VLAN marketing,
sends packet transmissions every 2 seconds, sends messages to the log, and should a loop be detected,
disables the port for 5 seconds:
configure elrp-client periodic marketing ports 3:2 interval 2 seconds log disable-port
duration 5
History
This command was first available in ExtremeXOS 11.1.
The ability to specify the time interval in milliseconds was introduced in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ELSM hello timer by specifying the time between consecutive hello messages for the
specified ports.
Syntax Description
port_list Specifies the port or ports for which the ELSM hello timer should be
configured.
hello_time Specifies the time in seconds between consecutive hello messages.
Use the same value for the hello interval on peer ports. The default
value is 1 second, and the range is 1 to 128 seconds.
Default
The default is 1 second.
Usage Guidelines
ELSM works between two connected ports, and each ELSM instance is based on a single port.
When you enable ELSM on the specified ports, the ports participate in ELSM with their peers and begin
exchanging ELSM hello messages.
ELSM uses two types of hello messages to communicate the health of the network to other ELSM ports:
• Hello+ — The ELSM-enabled port receives a hello message from its peer and no problem is detected.
• Hello- — The ELSM-enabled port does not receive a hello message from its peer.
ELSM also has hello transmit states. The hello transmit states display the current state of transmitted
ELSM hello messages. For more information about the hello transmit states, see the show elsm
ports command.
A high hello timer value can increase the time it takes for the ELSM-enabled port to enter the Up state.
The down timer is (2 + hold threshold) * hello timer. Assuming the default value of 2 for the hold
threshold, configuring a hello timer of 128 seconds creates a down timer of (2 + 2) 128, or 512 seconds. In
this scenario it would take 512 seconds for the port to transition from the Down to the Up state.
If you modify the hello timer on one port, we recommend that you use the same hello timer value on its
peer port.
Example
The following command specifies 5 seconds between consecutive ELSM hello messages for slot 2, ports
1-2 on the switch:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the number of Hello+ messages required by the specified ELSM-enabled ports to transition
from the Down-Wait state to the Up state.
Syntax Description
port_list Specifies the port or ports for which the ELSM hold threshold should
be configured.
hold_threshold Specifies the number of Hello+ messages required to transition from
the Down-Wait state to the Up state. The default is 2 messages, and
the range is 1 to 40 messages.
Default
The default is 2 Hello+ messages.
Usage Guidelines
The port begins in the Down state, so the first received Hello+ message transitions the ELSM-enabled
port from the Down state to the Down-Wait state. After that transition, the configured hold-threshold
value determines the number of Hello+ messages required to transition from Down-Wait state to the Up
state.
The ELSM hold threshold determines the number of Hello+ messages the ELSM peer port must receive
to transition from the Down-Wait state to the Up state. For example, a threshold of 1 means the ELSM
port must receive at least one Hello+ message to transition from the Down-Wait state to the Up state.
After the down timer expires, the port checks the number of Hello+ messages against the hold
threshold. If the number of Hello+ messages received is greater than or equal to the configured hold
threshold, the ELSM receive port moves from the Down-Wait state to the Up state.
If the number of Hello+ messages received is less than the configured hold threshold, the ELSM receive
port moves from the Down-Wait state back to the Down state and begins the process again.
If you modify the hold threshold on one port, we recommend that you use the same hold threshold
value on its peer port.
You configure the hold threshold on a per-port basis, not on a per-switch basis.
Example
The following command specifies that two Hello+ messages are required for the ELSM receive ports
configured on slot 2, ports 1-2, to transition from the Down-Wait state to the Up state:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the number of Hello+ messages required by the specified ELSM-enabled ports to transition
from the Up state to the Down state.
Syntax Description
port_list Specifies the port or ports for which the ELSM hold threshold should
be configured.
uptimer_threshold Specifies the number of Hello+ messages required to transition from
the Up- state to the Down state. The default is 6messages, and the
range is 3 to 60 messages.
Default
The default is 6 Hello+ messages.
Usage Guidelines
The ELSM up timer begins when the ELSM-enabled port enters the UP state. Each time the port
receives a Hello+ message, the timer restarts. Up timer is Uptimer_threshold * hello timer. When the Up
timer expires, it transits from UP state to DOWN state.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Add a control VLAN on the ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
control VLAN that carries ERPS control traffic.
vlan_name Alphanumeric string identifying the VLAN to be used for control
traffic.
Default
N/A.
Usage Guidelines
Use this command to add a control VLAN on the ERPS ring. This is the VLAN that carries ERPS control
traffic.
Note
Other VLAN types such as VMAN, SVLAN, CVLAN and BVLAN will not be used for control
traffic. A control VLAN cannot be deleted from a ring that has CFM configured.
Example
The following command adds a control VLAN named “vlan10” to an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Add a protected VLAN on the ERPS ring. This is a data VLAN that ERPS will protect.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
vlan_name Alphanumeric string identifying the data VLAN to be added that
ERPS will protect. This can be a VLAN, SVLAN, BVLAN or VMAN.
Default
N/A.
Usage Guidelines
Use this command to add a protected data VLAN on the ERPS ring. This VLAN will be protected by
ERPS, and it can be a VLAN, SVLAN, BVLAN or VMAN.
Note
The SVLAN-BVLAN combination cannot both be added to the same ring or sub-ring.
Example
The following command adds a protected VLAN named “vlan10” to an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configures ERPS control MAC (either default or auto) on a particular ERPS ring instance.
Syntax Description
erps Specifies ERPS (ITU-T G.8032).
ring-name Specifies the alphanumeric string that identifies the ERPS ring/sub-
ring.
control-mac Destination MAC used in R-APS PDUs .
auto Use ring ID-based MAC address (01:19:A7:00:00:ring-id).
default Use default MAC address (01:19:A7:00:00:01).
Default
By default, if an ERPS ring instance is created with a user-defined ring ID, the control MAC used by ring
instance is auto (01:19:A7:00:00:ring-id).
By default, if an ERPS ring instance is created without a user-defined ring ID, the control MAC used by
the ring instance is default (01:19:A7:00:00:01).
Usage Guidelines
As per the ITU G.8032 standard, destination MAC used in R-APS PDUs are of 2 types:
• 01:19:A7:00:00:01 (default)
• 01:19:A7:00:00:ringId (auto)
Note
This command is only applicable on ERPS ring instances created with user-defined ring ID.
Example
The following example configures the control MAC of an ERPS ring instance created with a user-defined
ring ID:
# configure erps Ring2 control-mac auto
The following example configures the control MAC of an ERPS ring instance created without a user-
defined ring ID:
# configure erps Ring1 control-mac auto
Error: This cli is applicable only when the erps ring is created with a user
defined ringId. The default
control-mac is used here.
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Associates or disassociates fault monitoring entities on the ERPS ring ports.
Syntax Description
ring_name Alphanumeric string that identifies the ERPS ring.
east East port.
west West port.
add Associates a CFM Down-MEP entity.
delete Disassociates a CFM Down-MEP entity.
group Specifies a CFM Down-MEP group.
group_name Specifies the name of the Down MEP group.
Default
N/A.
Usage Guidelines
Use this command to associate or disassociate fault monitoring entities on the ERPS ring ports.
Example
The following command associates fault monitoring on the group "group1":
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms running ExtremeXOS.
Description
Associates or disassociates a CFM UP MEP group for subring protection across the main ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
add Associates a CFM Up-MEP entity.
delete Disassociates a CFM Up-MEP entity.
group Specifies a CFM Up-MEP group.
Default
N/A.
Usage Guidelines
Use this command to associate or disassociate a CFM UP MEP group for subring protection across the
main ring.
When an UP MEP is configured for protection of a subring, the Manual Switch event will be enforced on
the subring port on the interconnected nodes.As per Appendix X of the standard, the MS is issued when
the node type and the multiple failure type are the same. ExtremeXOS implementation
currentlyconfigures the node type to be the same as the fault type. So the user will notice both the
subring ports of the two interconnected nodes to be held inMS when multiple failures on the main ring
occur. When the multiple failure clears this MS is also cleared.
Example
The following command associates a CFM UP MEP group for subring protection on the group "group1":
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms running ExtremeXOS.
Description
Delete a control VLAN on the ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
vlan_name Alphanumeric string identifying the VLAN used for control traffic.
Default
N/A.
Usage Guidelines
Use this command to delete a control VLAN from the ERPS ring. This is the VLAN that carries ERPS
control traffic.
Note
Other VLAN types such as VMAN, SVLAN, CVLAN and BVLAN will not be used for control
traffic.
A control VLAN cannot be deleted from a ring that has CFM configured.
Example
The following command deletes a control VLAN named “vlan10” from an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Delete a protected data VLAN from the ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
vlan_name Alphanumeric string identifying the data VLAN to be deleted from the
ERPS ring.
Default
N/A.
Usage Guidelines
Use this command to delete a protected VLAN from the ERPS ring.
Example
The following command deletes a protected VLAN named “vlan10” from an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configure or clear force-switch or manual-switch for the ERPS ring/sub-ring.
Syntax Description
dynamic-state Configure force/manual/clear switch on the active ERPS ring.
force-switch Force-switch operation.
manual-switch Manual-switch operation.
clear Clears force-switch/manual-switch.
Default
N/A.
Usage Guidelines
Use this command to configure or clear force-switch or manual-switch for the ERPS ring/sub-ring.
Note
In non-revertive mode, in the "Pending" state, you can use the clear option of this command
to return to the "Idle" state where the blocked link is manually reverted to the Ring Protection
Link (RPL).
Example
The following command clears force-switch and manual-switch on an ERPS ring named "ring1":
configure erps ring1 dynamic-state clear
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Rename the ERPS ring/sub-ring.
Syntax Description
old-ring-name Alphanumeric string that identifies the ERPS ring.
new-ring-name New alphanumeric string identifying the ERPS ring.
Default
N/A.
Usage Guidelines
Use this command to rename the ERPS ring or sub-ring.
Example
The following command an ERPS ring from “ring1” to “ring2”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Add RPL (ring protection link) neighbor configuration for the ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
port The slot:port number for RPL neighbor.
Default
N/A.
Usage Guidelines
Use this command to add RPL neighbor configuration for the ERPS ring.
Note
This command implicitly makes the node on which it is configured the RPL neighbor.
Example
The following command adds RPL neighbor on port 5 to an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Add an ERPS sub-ring to the EAPS domain.
Syntax Description
ring-name Alphanumeric string identififying the ERPS sub-ring.
domain_name Alphanumeric string identifying the EAPS domain.
Default
N/A.
Usage Guidelines
Use this command to add an ERPS sub-ring to the EAPS domain.
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Add ring protection link (RPL) owner configuration for the ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
port The slot:port number for the ring protection link (RPL) owner.
Default
N/A.
Usage Guidelines
Use this command to add ring protection link (RPL) owner configuration for the ERPS ring.
Note
This command implicitly makes the node on which it is configured the RPL owner.
Example
The following command adds RPL owner configuration on port 5 to an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Add or delete ERPS revert operation along with the “wait-to-restore” time interval.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
enable Enable revert mode to ERPS ring.
disable Disable revert mode from ERPS ring.
Default
The default is the revertive mode (enable).
Usage Guidelines
Use this command to enable/disable a G.8032 ring to revert to the original ring protection link (RPL)
block state.
Example
The following command disables revert mode from an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Add ring ports on the ERPS ring. Ths ring ports connect the switch to the ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
east Add the ring port to the east port of the switch.
west Add the ring port to the west port of the switch.
port The slot:port number for the ring port.
Default
N/A.
Usage Guidelines
Use this command to add ring ports on the ERPS ring. The ring ports can be added to the east or west
port of the switch. The ring ports connect the switch to the ERPS ring.
Example
The following command adds port 5 as a ring port on the east port of the switch for an ERPS ring
named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configures sub-ring mode.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
no-virtualChannel No Virtual Channel required to complete it's control path.
virtualChannel Virtual Channel required to complete it's control path.
Default
N/A.
Usage Guidelines
Use this command to add or delete ERPS sub-rings.
Example
The following example configures a virtual channel for the control path:
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms that are running ExtremeXOS.
Description
Add or delete a sub-ring to the main ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
add Add sub-ring.
delete Delete sub-ring.
sub_ring Alphanumeric string identifying the ERPS sub-ring.
Default
N/A.
Usage Guidelines
Use this command to add or delete ERPS sub-rings.
Example
The following example adds sub-ring “ring2” to “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configure a guard timer to control when the node should act on received R-APS (ring automatic
protection switching) messages.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
default The default value, 500 milliseconds.
milliseconds The interval for the guard timer in milliseconds, with a range of 10 to
2000.
Default
The default is 500 milliseconds.
Usage Guidelines
Use this command to configure a guard timer to control when the node should act on received R-APS
messages.
Example
The following command sets the guard timer to 1000 milliseconds for an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configure a hold-off timer to control when a signal fault is relayed.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
default The default value, 0 milliseconds.
milliseconds The interval for the hold-off time in milliseconds, with a range of 0 to
10000.
Default
The default is 0 milliseconds.
Usage Guidelines
Use this command to configure a hold-off timer to control when a signal fault is relayed.
Example
The following command sets the hold-off timer to 1000 milliseconds for an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configure a periodic timer to control the interval between signal failures.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
default The default value, 5000 milliseconds.
milliseconds The interval for the periodic time in milliseconds, with a range of 2000
to 7000.
Default
The default is 5000 milliseconds.
Usage Guidelines
Use this command to configure a periodic timer to control the interval between signal failure.
Example
The following command sets the periodic timer to 6000 milliseconds for an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configure a wait-to-block timer for revertive operations on RPL owner initiated reversion.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
default The default value, 5500 milliseconds.
milliseconds The time interval to wait before restoring, with a range of 5000 to
7000 milliseconds.
Default
The default is 5500 milliseconds.
Usage Guidelines
Use this command to configure a wait-to-block timer for revertive operations on RPL owner-initiated
reversion.
Example
The following command sets the wait-to-block timer to 6000 milliseconds for an ERPS ring named
“ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configure a time interval to wait before restoring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
default The default value, 300000 milliseconds.
milliseconds The time interval to wait before restoring, with a range of 0 to 720000
milliseconds.
Default
The default is 300000 milliseconds.
Usage Guidelines
Use this command to configure a time interval to wait before restoring.
Example
The following command sets the wait-to-restore timer to 3000 milliseconds for an ERPS ring named
“ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Identify the rings to which topology change events need to be propagated.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
add Add rings/sub-rings to topology change propagation list.
delete Delete rings/sub-rings from topology change propagation list.
ring-list List of ERPS rings/sub-rings to which topology change needs to be
propagated.
Default
N/A.
Usage Guidelines
Use this command to add or delete ERPS rings/sub-rings from the topology change propagation list.
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Configures the ports of an ESRP domain where ELRP packet transmission is requested by ESRP.
Syntax Description
esrpDomain Specifies an ESRP domain name.
ports Specifies list of slots and ports.
all Specifies all ports in the ESRP domain.
Default
All ports of an ESRP domain have ELRP transmission enabled.
Usage Guidelines
This command allows you to configure the ports in your network that might experience loops, such as
ports that connect to master, slave, or ESRP-aware switches, to receive ELRP packets. You do not need
to send ELRP packets to host ports.
Example
The following command enables ELRP packet transmission for slot 2, ports 3-5 on ESRP domain esrp1:
configure esrp esrp1 add elrp-poll ports 2:3-2:5
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a master VLAN to an ESRP domain.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
vlan_name Specifies the name of the master VLAN.
Default
N/A.
Usage Guidelines
You must configure one master VLAN for each ESRP domain. A master VLAN can belong to one ESRP
domain only. An ESRP domain contains one master and zero or more member VLANs.
Master VLANs can have their own set of ports, and member VLANs can have a different set of ports.
The state of the ESRP device determines whether the ports in the master and member VLANs are in the
forwarding or blocking state.
Example
The following command adds VLAN purple to the ESRP domain esrp1 as the master VLAN:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a member VLAN to an ESRP domain.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
vlan_name Specifies the name of the member VLAN.
Default
N/A.
Usage Guidelines
You can configure zero or more member VLANs for each ESRP domain. An ESRP domain contains one
master and zero or more member VLANs.
Master VLANs can have their own set of ports, and member VLANs can have a different set of ports.
The state of the ESRP device determines whether the ports in the master and member VLANs are in the
forwarding or blocking state.
Example
The following command adds VLAN green to the ESRP domain esrp1 as a member VLAN:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an ESRP domain to track environmental failures.
Syntax Description
esrpDomain Specifies an ESRP domain name.
priority Specifies a number between 0 and 254. The default priority is 255.
See the following "Usage Guidelines" section for more information.
Default
No environmental tracking.
Usage Guidelines
Environmental tracking tracks power supply temperature status.
If a failure is detected, the ESRP domain priority steps to the failover-priority value specified. By setting
the failover priority to be lower than the normal priority of the domain, it causes the affected domain to
go into slave mode.
The range of the priority value is 0 to 254. Setting the priority to 255 configures the switch to slave
mode, and to be ineligible to become the master. The switch remains in slave mode even when the
VLAN fails over from the current master.
To make effective use of this feature, the normal priority of the ESRP domain must be higher than the
failover priority of this command.
Example
The following command enables environmental failure tracking, and specifies that the ESRP priority for
ESRP domain esrp1 be set to 10 upon an environmental failure.
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an ESRP domain to track a route entry in the system’s routing table.
Syntax Description
esrpDomain Specifies an ESRP domain name.
ipaddress Specifies the IPv4 address of the route entry to be tracked.
masklength Specifies the subnet of the route entry to be tracked.
Default
Disabled.
Usage Guidelines
The track-ip metric consists of the total number of tracked IPv4 routes that are up or functional.
Note
ESRP route tracking is not supported on IPv6 networks.
Example
The following command enables IPv4 route failure tracking for routes to the specified subnet:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an ESRP domain to track an external gateway using ping.
Syntax Description
esrpDomain Specifies an ESRP domain name.
ipaddress Specifies the IPv4 address of the external gateway.
frequency Specifies setting the interval between ping requests.
seconds Sets the value for the interval in seconds between ping requests. The
range is 1 to 600 seconds. Default is 15.
miss Specifies the number of consecutive ping fails required for tracking
fail.
misses Sets the number of consecutive failed pings to declare tracking has
failed. Range is 1 to 256. Default is 4.
success Specifies setting the number of consecutive ping successes required
for tracking success.
successes Sets the number of consecutive successful pings to declare tracking
has succeeded. Range is 1 to 256. Default is 4.
Default
No ping tracking.
Usage Guidelines
The tracked-ping metric consists of the total number of stations that are successfully tracked using
ping. ESRP uses an aggregate of tracked pings and traced routes to track an external gateway.
Note
ESRP ping tracking is not supported on IPv6 networks.
To change any of the options for track-ping, you must delete track-ping on the ESRP domain
(configure esrp esrpDomain delete track-ping ipaddress ), and then configure it as
desired.
To view track-ping options, use the command show esrp { {name} | {type [vpls-
redundancy | standard]} } .
Example
The following command enables ping tracking for the external gateway at 10.207.29.17, pinging every 10
seconds, and considering the gateway to be unreachable if no response is received to 5 consecutive
pings:
configure esrp esrp1 add track-ping 10.207.29.17 frequency 10 miss 5
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an ESRP domain to track port connectivity to a specified VLAN.
Syntax Description
esrpDomain Specifies an ESRP domain name.
vlan_name Specifies the VLAN to be tracked.
Default
Disabled.
Usage Guidelines
The track-vlan metric is derived from the total number of active physical ports on the VLAN being
tracked by the ESRP domain.
If more than one VLAN shares a physical link, each VLAN counts the physical link.
The ESRP switch should have a higher priority number than its neighbors to ensure master election.
An ESRP domain can track one VLAN, and the tracked VLAN should not be a member of any other
ESRP domain in the system.
Example
The following command enables ESRP domain esrp1 to track port connectivity to VLAN engineering:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables selective forwarding by creating an aware port list and adds additional ports to the list.
Syntax Description
domain Specifies an ESRP domain name.
port_list Specifies the ports to be added to the aware port list.
group number Specifies the ESRP group within the given domain name
Default
The group number defaults to '0'.
Usage Guidelines
An ESRP-aware switch floods ESRP PDUs from all ports in an ESRP-aware VLAN. This flooding creates
unnecessary network traffic because some ports forward ESRP PDUs to switches that are not running
the same ESRP groups. You can select the ports that are appropriate for forwarding ESRP PDUs by
configuring selective forwarding on an ESRP-aware VLAN and thus reduce this excess traffic.
Configuring selective forwarding creates a port list of only those ports that forward to the ESRP groups
that are associated with an ESRP-aware VLAN. This ESRP-aware port list is then used for forwarding
ESRP PDUs.
Use this command to create or add to an existing port list for the ESRP groups associated with an
ESRP-aware VLAN.
Example
The following command configures esrp domain (d1) to forward ESRP PDUs on ports 5:1, 5:2, and 6:2.
History
This command was first available in Extreme XOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables all or part of selective forwarding by deleting ports from the ESRP-aware port list.
Syntax Description
domain Specifies an ESRP domain name.
all Specifies that all of the ports are to be disabled.
port_list Specifies the ports to be disabled from the ESRP-aware port list.
group number Specifies the ESRP group within the given domain name
Default
The group number defaults to '0'.
Usage Guidelines
By configuring selective forwarding, you create an ESRP-aware port list of only those ports that forward
to the ESRP groups that are associated with an ESRP-aware VLAN. That port list is used for forwarding
ESRP PDUs from the selected ports only of an ESRP-aware switch.
Use this command to delete one or more or all of the ports from an ESRP-aware port list. Deleting all of
the ports puts the domain back to the default state.
Example
The following command configures esrp domain (d1) to exclude ESRP PDUs on ports 5:1, 5:2, and 6:2.
History
This command was first available in Extreme XOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Descriptioin
Disables ELRP packet transmission on ports of an ESRP domain.
Syntax Description
esrpDomain Specifies an ESRP domain name.
ports Specifies list of slots and ports in the ESRP domain.
all Specifies all ports in the ESRP domain.
Default
All ports of an ESRP domain have ELRP transmission enabled.
Usage Guidelines
If you have host ports on an ESRP domain, you do not need to send ELRP packets to those ports.
If you change your network configuration, and a port no longer connects to a master, slave, or ESRP-
aware switch, you can disable ELRP transmission on that port.
Example
The following command disables ELRP packet transmission for slot 2, ports 3-5 on ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes the specifies master VLAN from the specified ESRP domain.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
vlan_name Specifies the name of the master VLAN.
Default
N/A.
Usage Guidelines
You must disable the ESRP domain before removing the master VLAN. To disable the ESRP domain, use
the disable esrp {esrpDomain} command.
If you attempt to remove the master VLAN before disabling the ESRP domain, the switch displays an
error message similar to the following:
ERROR: Failed to delete master vlan for domain "esrp1" ; ESRP is enabled!
If this happens, disable the ESRP domain and re-issue the configure esrp delete master
command.
Example
The following command deletes the master VLAN purple from the ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a member VLAN from the specified ESRP domain.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
vlan_name Specifies the name of the member VLAN.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes the member VLAN green from the ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Descriptioin
Disables environmental failure tracking for an ESRP domain.
Syntax Description
esrpDomain Specifies an ESRP domain name.
Default
No environmental tracking.
Usage Guidelines
None.
Example
The following command disables environmental failure tracking for ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables route entry tracking for an ESRP domain.
Syntax Description
esrpDomain Specifies an ESRP domain name.
ipaddress Specifies the IPv4 address of a tracked route entry.
masklength Specifies the subnet of a tracked route entry.
Default
Disabled.
Usage Guidelines
If you disable route tracking for a failed route, the ESRP domain recovers from the forced standby state.
If you disable route tracking for a route that is up and functional, there is no impact on the ESRP state.
Example
The following command disables tracking of routes to the specified subnet for ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the tracking of an external gateway using ping.
Syntax Description
esrpDomain Specifies an ESRP domain name.
ipaddress Specifies the IPv4 address of the external gateway.
Default
No ping tracking.
Usage Guidelines
If you disable ping tracking for a failed ping, the ESRP domain recovers from the forced standby state.
If you disable route tracking for a successful ping, there is no impact on the ESRP state.
Example
The following command disables ping tracking for the external gateway at 10.207.29.17:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the tracking of port connectivity to a specified VLAN.
Syntax Description
esrpDomain Specifies an ESRP domain name.
vlan_name Specifies the VLAN to be tracked.
Default
Disabled.
Usage Guidelines
If you delete a VLAN that is down, the ESRP domain recovers from the forced standby state.
Example
The following command disables the tracking of port connectivity to VLAN engineering:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Assigns an ESRP domain ID to an ESRP domain.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
number Specifies the number to use for the ESRP domain ID. The user-
configured ID range is 4096 through 65,535.
Default
If the master VLAN is tagged, ESRP uses that VLANid for the ESRP domain ID. If the master VLAN is
untagged, you must specify the ESRP domain ID.
Usage Guidelines
Before you enable a specific ESRP domain, it must have a domain ID. A domain ID is either a user-
configured number or the VLANid of the tagged master VLAN. If you do not have a domain ID, you
cannot enable ESRP on that domain.
Each switch participating in ESRP for a particular domain must have the same domain ID configured.
The number parameter range for user-configured domain IDs is 4096 through 65,535.
If the master VLAN is tagged, you can use that VLANid for the ESRP domain ID. The range for VLAN
tags is 2 through 4095. Tag 1 is assigned to the default VLAN.
Example
The following command assigns the domain ID 5000 to ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the election algorithm on the switch.
Syntax Description
esrpDomain Specifies an ESRP domain name.
ports > track > Specifies that this ESRP domain should consider election factors in
priority the following order: Active ports, tracking information, ESRP priority.
ports > track > Specifies that this ESRP domain should consider election factors in
priority > mac the following order: Active ports, tracking information, ESRP priority,
MAC address.
priority > mac Specifies that this ESRP domain should consider election factors in
the following order: ESRP priority, MAC address.
priority > ports > Specifies that this ESRP domain should consider election factors in
track > mac the following order: ESRP priority, active ports, tracking information,
MAC address.
priority > track > Specifies that this ESRP domain should consider election factors in
ports > mac the following order: ESRP priority, tracking information, active ports,
MAC address.
sticky > ports > Specifies that this ESRP domain should consider election factors in
track > priority the following order: Stickiness, active ports, tracking information,
ESRP priority.
sticky > ports > Specifies that this ESRP domain should consider election factors in
track > priority > the following order: Stickiness, active ports, tracking information,
mac ESRP priority, MAC address.
sticky > ports > Specifies that this ESRP domain should consider election factors in
weight > track > the following order: Stickiness, active ports, port weight, tracking
priority > mac information, ESRP priority, MAC address.
Note: Beginning with ExtremeXOS 11.1 and later, this is the default
election algorithm for extended mode.
sticky > priority > Specifies that this ESRP domain should consider election factors in
mac the following order: Stickiness, ESRP priority, MAC address.
sticky > priority > Specifies that this ESRP domain should consider election factors in
ports > track > mac the following order: Stickiness, ESRP priority, active ports, tracking
information, MAC address.
sticky > priority > Specifies that this ESRP domain should consider election factors in
track > ports > mac the following order: Stickiness, ESRP priority, tracking information,
active ports, MAC address.
sticky > track > Specifies that this ESRP domain should consider election factors in
ports > priority the following order: Stickiness, tracking information, active ports,
ESRP priority.
sticky > track > Specifies that this ESRP domain should consider election factors in
ports > priority > the following order: Stickiness, tracking information, active ports,
mac ESRP priority, MAC address.
track > ports > Specifies that this ESRP domain should consider election factors in
priority the following order: Tracking information, active ports, ESRP priority.
track > ports > Specifies that this ESRP domain should consider election factors in
priority > mac the following order: Tracking information, active ports, ESRP priority,
MAC address.
Default
In extended mode, the default election algorithm is sticky > ports > weight > track > priority > mac.
In standard mode, the default election algorithm is ports > track > priority > mac.
Usage Guidelines
The election algorithm determines the order of precedence of the election factors used to determine
the ESRP Master. The election factors are:
• Stickiness (sticky): the switch with the higher sticky value has higher priority. When an ESRP domain
claims master, its sticky value is set to 1 (available in extended mode only).
• Active Ports (ports): the number of active ports (the switch with the highest number takes priority)
• Tracking Information (track): whether the switch is using ESRP tracking. A switch using tracking has
priority.
• ESRP Priority (priority): a user-defined priority number between 0 and 254. A higher number has
higher priority. The default priority setting is 0. A priority setting of 255 makes an ESRP switch a
standby switch that remains in slave mode until you change the priority setting. We recommend this
setting for system maintenance. A switch with a priority setting of 255 never becomes the master.
• MAC address (mac): the switch MAC address. A higher-number address has priority.
• Active port weight (weight)—The switch that has the highest port weight takes precedence. The
bandwidth of the port automatically determines the port weight (available only in extended mode).
ESRP does not count ports with a weight of 0 (known as don’t count ports) regardless of ESRP
running in extended or standard mode.
The election algorithm must be the same on all switches for a particular ESRP domain. The election
algorithms that use sticky are and weight are available in extended mode only.
In ExtremeXOS 11.0, the extended mode default election algorithm is: sticky > ports > track > priority >
mac > weight. This election algorithm is not supported in ExtremeXOS 11.1.
Factors to Consider
The ports-track-priority or track-ports-priority options can be used to ensure that there is no failback if
the original Master recovers (the Master has the same ports, tracks and priority, but a higher MAC).
Any of the options with sticky can also be used to ensure that there is no failback if the original master
recovers. With sticky, if an event causes the ESRP master to failover, ESRP assigns the new master with
the sticky count of 1. After sticky is set on the master, regardless of changes to its neighbor’s election
algorithm, the new master retains its position. For example, adding active ports to the slave does not
cause the new master to failback to the original master, even if the slave has more active ports than the
master. Sticky algorithms provide for fewer network interruptions than non-sticky algorithms. Sticky is
set on the master switch only.
ESRP re-election can occur if sticky is set on the master and a local event occurs. During this time, if the
current master has lower election parameters, the backup can become the new master.
Switch Behavior
If a switch is master, it actively provides Layer 3 routing services to other VLANs, and Layer 2 switching
between all the ports of that VLAN. Additionally, the switch exchanges ESRP packets with other
switches that are in slave mode.
If a switch is in slave mode, it exchanges ESRP packets with other switches on that same VLAN. When a
switch is in slave mode, it does not perform Layer 3 routing or Layer 2 switching services for the VLAN.
If you attempt to use an election algorithm not supported by the switch, an error message similar to the
following appears:
Example
The following example configures the election algorithm to use tracking information as the first criteria
for determining the ESRP master switch for ESRP domain esrp1:
configure esrp esrp1 election-policy track > ports > priority > mac
History
This command was first available in ExtremeXOS 11.0.
The default election algorithm for extended mode was updated to sticky > ports > weight > track >
priority > mac, and the weight election factor was used in ExtremeXOS 11.1. The sticky > ports > track >
priority > mac > weight election algorithm is not supported in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the use of ELRP by ESRP in the master state.
Syntax Description
esrpDomain Specifies an ESRP domain name.
Default
Disabled.
Usage Guidelines
Use this command to disable the use of ELRP by ESRP in the master state. When you disable ELRP, the
ESRP master switch no longer transmits ELRP PDUs to detect network loops.
Example
The following command disables the use of ELRP in the master state on ESRP domain elrp1:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the use of ELRP by ESRP in the master state, and configures how often the master checks for
loops in the network.
Syntax Description
esrpDomain Specifies an ESRP domain name.
interval Specifies how often, in seconds, successive ELRP packets are sent. The
default is 1 second. The range is 1 to 64 seconds.
Default
• Use of ELRP in the master state—disabled
• Interval—1 second
Usage Guidelines
Use this command to enable the use of ELRP by ESRP in the master state. When an ESRP-enabled
switch is in the master state, and you enable elrp-master-poll, the switch periodically sends ELRP PDUs
at the configured interval level. If a loop is detected in the network, the transmitted PDUs are received
by the switch. The ESRP master switch then transitions to the slave state to break the network loop.
We recommend that you enable both premaster and master polling when using ELRP with ESRP. To
enable premaster polling, use the configure esrp esrpDomain elrp-premaster-poll
enable {count count | interval interval} .
If you attempt to configure master polling before premaster polling, the switch displays an error
message similar to the following:
ERROR: Premaster-poll should be enabled before enabling master-poll!
If this happens, first configure premaster polling followed by master polling (if required).
Specify the interval parameter to configure how often successive ELRP PDUs are sent while in the
master state. If you do not specify an interval value, the default value is used.
Example
The following command enables the use of ELRP in the master state on ESRP domain elrp1:
The following command configures the ESRP master to check for loops in the network every 3 seconds:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the use of ELRP by ESRP in the pre-master state.
Syntax Description
esrpDomain Specifies an ESRP domain name.
Default
Disabled.
Usage Guidelines
Use this command to disable the use of ELRP by ESRP in the pre-master state. When you disable ELRP
in the pre-master state, the ESRP pre-master switch no longer transmits ELRP PDUs to detect network
loops prior to changing to the master state.
Example
The following command disables the use of ELRP in the pre-master state on the ESRP domain elrp1:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the use of ELRP by ESRP in the pre-master state, and configures how many times the switch
sends ELRP PDUs and how often the switch sends ELRP PDUS in the pre-master state.
Syntax Description
esrpDomain Specifies an ESRP domain name.
count Specifies the number of times the switch sends ELRP PDUs. The
default is 3. The range is 1 to 32.
interval Specifies how often, in seconds, the ELRP PDUs are sent. The default
is 1 second. The range is 1 to 32 seconds.
Default
• Use of ELRP in the pre-master state—disabled
• Count—3 times
• Interval—1 second
Usage Guidelines
Use this command to enable the use of ELRP by ESRP in the pre-master state to prevent network loops
from occurring. When an ESRP-enabled switch is in the pre-master state (waiting to become the
master), and you enable elrp-premaster-poll, the switch periodically sends ELRP PDUs at the configure
level for a specified number of times. If there is a loop in the network, the transmitted PDUs are received
by the switch. If this happens, the ESRP pre-master switch does not transition to the master state;
rather, the switch transitions to the slave state.
We recommend that you enable both premaster and master polling when using ELRP with ESRP. To
enable master polling, use the configure esrp esrpDomain elrp-master-poll enable
{interval interval} .
If you attempt to configure master polling before premaster polling, the switch displays an error
message similar to the following:
ERROR: Premaster-poll should be enabled before enabling master-poll!
If this happens, first configure premaster polling followed by master polling (if required).
If you do not specify the optional count or interval parameters, the default values are used.
If the sender does not receive packets, there is no loop in the network.
Example
The following command enables the use of ELRP—with the default settings—in the pre-master state on
ESRP domain elrp1:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the group number to be used for the ESRP domain.
Syntax Description
esrpDomain Specifies an ESRP domain name.
group number Specifies the ESRP group number to which this ESRP domain should
be added. The range is 0 through 31.
Default
The default group number is 0.
Usage Guidelines
Each group runs an instance of ESRP within the same VLAN or broadcast domain. A maximum of seven
ESRP groups can be defined within the same networked broadcast domain. In addition, a maximum of
seven distinct ESRP groups can be supported on a single ESRP switch. You can configure a maximum of
32 ESRP groups in a network.
The most typical application for multiple ESRP groups is when two or more sets of ESRP switches are
providing fast-failover protection within a common subnet for two or more groups of users. An
additional use for ESRP groups is ESRP Host Attach; ESRP VLANs that share the same ESRP HA ports
must be members of different ESRP groups.
You must first disable an ESRP domain before you modify an existing or add a new group number. If
you try to modify the group number without disabling the ESRP domain, an error message similar to
the following is displayed:
Example
The following command configures ESRP domain esrp1 to be a member of ESRP group 2:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the mode of operation for ESRP on the switch.
Syntax Description
extended Specifies ESRP extended mode.
standard Specifies ESRP standard mode..
Default
The default mode is extended.
Example
The following command configures ESRP to run in standard mode:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Renames an existing ESRP domain.
Syntax Description
esrpDomain Specifies the current name of an ESRP domain.
new-name Specifies a new name for the ESRP domain.
Default
N/A.
Usage Guidelines
The maximum length for a name is 32 characters. Names can contain alphanumeric characters and
underscores ( _ ) but cannot be any reserved keywords, for example, esrp. Names must start with an
alphabetical character, for example, a, Z.
Example
The following command renames ESRP domain esrp1 to esrp3:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ESRP port mode for ESRP host attach.
Syntax Description
ports Specifies one or more ports or slots and ports that should be
configured.
host Specifies that the ports should be configured as host ports.
normal Specifies that the ports should be configured as normal ports.
Default
The default port mode is normal.
Usage Guidelines
Ports configured as normal ports do not accept or transmit Layer 2 or Layer 3 traffic when the local
ESRP device is a slave.
Ports configured as host ports allow the network to continue operation independent of ESRP status.
The command sets the port to forward, allowing those ports directly attached to the slave’s hosts to
communicate with other hosts that are connected to the master. If you use load sharing with the ESRP
HA feature, configure the load-sharing group first and then enable Host Attach on the group.
An ESRP Host Attach port cannot be a mirroring port, software-controlled redundant port, or Netlogin
port.
Example
The following command configures ports 1 through 5 on slot 3 as host ports:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables port restart for a port.
Syntax Description
ports Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
None.
Example
The following command disables port restart for ports 7-9 in slot 3 in the ESRP master domain:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures ESRP to restart ports if there is a state change and the downstream switch is from another
vendor.
Syntax Description
ports Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
If an ESRP domain becomes a slave, ESRP disconnects member ports that have port restart enabled.
The disconnection of these ports causes downstream devices to remove the ports from their FDB
tables. After 3 seconds the ports re-establish connection with the ESRP-enabled device. This feature
allows you to use ESRP in networks that include equipment from other vendors.
If switch becomes a slave, ESRP disconnects the physical links of member ports that have port restart
enabled.
An ESRP restart port cannot be a mirroring port, software-controlled redundant port, or Netlogin port.
Example
The following command enables port restart for ports 7-9 in slot 3 on the ESRP master domain:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Assigns the port weight for the specified ESRP port(s).
Syntax Description
ports Specifies one or more ports or slots and ports.
auto Specifies the switch to calculate the weight of a port based on the port’s
bandwidth and link speed.
port-weight Specifies an ESRP port weight of 0. With a port weight of 0, the ports are not
counted.
Default
The switch automatically calculates the weight of a port based on the bandwidth of the port.
Usage Guidelines
Use this command to override the automatically calculated port weight.
The port-weight parameter specifies a weight of 0. With this configuration, ESRP does not count host
ports and normal ports as active. With a weight of 0, ESRP experiences fewer state changes due to
frequent client activities like rebooting and unplugging laptops. A don’t-count port cannot be a
mirroring, software-controlled redundant port, or a Netlogin port.
For load shared ports, configure one master port in the load-share group with the port weight. A single
command specifies the weight for the entire load shared group. You can specify any port from the load
share group in the command. A load-shared port has an aggregate weight of all of its member ports. If
you add or delete a member port (or trunk), the weight of the master load-shared port is updated. For
more information about load sharing, see Configuring Slots and Ports on a Switch.
Example
The following command configures port 1 on slot 3 with a weight of 0:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ESRP priority.
Syntax Description
esrpDomain Specifies an ESRP domain number.
number Specifies a number between 0 and 255.
Default
The default ESRP priority is 0.
Usage Guidelines
The ESRP priority is one of the factors used by the ESRP election algorithm in determining which switch
is the Master switch.
The range of the priority value is 0 to 254, with 0 being the lowest priority, 254 being the highest. If the
ESRP priority is the determining criteria for the election algorithm, the highest priority value determines
which switch acts as master for a particular ESRP domain.
Setting the priority to 255 configures the switch to slave mode, and to be ineligible to become the
master. The switch remains in slave mode even when the ESRP domain fails over from the current
master. This feature is typically used to ensure a switch cannot become the ESRP master while it is
offline for servicing.
Example
The following command configures the ESRP priority to the highest priority on ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ESRP hello timer value.
Syntax Description
esrpDomain Specifies an ESRP domain name.
seconds Specifies the number of seconds between keep-alive packets. The range is 1 to
255 seconds.
Default
The default hello timer is 2 seconds.
Usage Guidelines
The timer specifies the interval, in seconds, for exchanging keep-alive packets between the ESRP
switches for this ESRP domain. A lower value specifies a more frequent exchange of keep-alive
messages, resulting in the faster detection of a failover condition. The timer setting must be configured
identically for the ESRP domain across all participating switches. To see the hello settings, use the show
esrp { {name} | {type [vpls-redundancy | standard]} } command.
If your configuration contains more than 2,000 ESRP VLANs and 256,000 FDB entries, we recommend
a timer setting greater than 3 seconds.
To view the hello timer settings, use the show esrp { {name} | {type [vpls-redundancy
| standard]} } command.
In a large ESRP configuration, the slave ESRP domain might inadvertently become the master ESRP
domain. This can occur when FDB entries are flushed during a master-slave transition. To avoid this we
recommend the general neighbor and hello timeout guidelines listed in Table 9 on page 491, which is
described in the description for the configure esrp timer neighbor command.
Example
The following command configures the ESRP hello timer to 4 seconds for the ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ESRP neighbor timeout value.
Syntax Description
esrpDomain Specifies an ESRP domain name.
seconds Specifies the number of seconds after which an ESRP neighbor times
out. The range is 6 to 1024 seconds.
Default
The default neighbor timeout is 8 seconds (four times the hello timer).
Usage Guidelines
The neighbor timeout specifies the amount of time that ESRP waits before considering the neighbor
down. The neighbor value must be at least 3 times the hello timer value. Entering a value outside of that
range generates an error message similar to the following:
operation Failed. Valid timer relationship "neighbor timeout >=
3*hello ; neutral timeout >= 2*hello ; premaster timeout >= 3*hello"!
To view the neighbor timer settings, use the show esrp { {name} | {type [vpls-
redundancy | standard]} } command.
In a large ESRP configuration, the slave ESRP domain might inadvertently become the master ESRP
domain. This can occur when FDB entries are flushed during a master-slave transition. To avoid this we
recommend the general neighbor and hello timeout guidelines listed in following table.
Example
The following command configures the ESRP neighbor timeout to 14 seconds for the ESRP domain
esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ESRP neutral timeout value.
Syntax Description
esrpDomain Specifies an ESRP domain name.
seconds Specifies the number of seconds after which an ESRP domain. The
range is 4 to 1024 seconds.
Default
The default neutral timeout is 4 seconds (two times the hello timer).
Usage Guidelines
After you create, configure, and enable the ESRP domain, it enters the neutral state. The neutral timeout
specifies the amount of time the ESRP domain stays in this temporary state before entering the slave
state. The neutral value must be at least 2 times the hello timer value. Entering a value outside of that
range generates an error message similar to the following:
operation Failed. Valid timer relationship "neighbor timeout >=
3*hello ; neutral timeout >= 2*hello ; premaster timeout >= 3*hello"!
To view the neutral timer settings, use the show esrp { {name} | {type [vpls-redundancy
| standard]} } command.
Example
The following command configures the ESRP neutral timeout to 8 seconds for the ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ESRP pre-master timeout value.
Syntax Description
esrpDomain Specifies an ESRP domain name.
seconds Specifies the maximum length of time, in seconds, that the
transitioning master VLAN remains in the pre-master state. The range
is 6 to 1024.
Default
The default timeout is 6 seconds (three times the hello timer).
Usage Guidelines
The premaster timer specifies how long the ESRP domain stays in the pre-master state. The pre-master
timer expires if the neighbor agrees to be the slave. The premaster value must be at least three times
the hello timer value. Entering a value outside of that range generates an error message similar to the
following:
operation Failed. Valid timer relationship "neighbor timeout >=
3*hello ; neutral timeout >= 2*hello ; premaster timeout >= 3*hello"!
To view the pre-master timer settings, use the show esrp { {name} | {type [vpls-
redundancy | standard]} } command.
Caution
Configure the pre-master state timeout only with guidance from Extreme Networks
personnel. Misconfiguration can severely degrade the performance of ESRP and your switch.
Example
The following command configures the pre-master timeout to 10 seconds for the ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ESRP restart timer value.
Syntax Description
esrpDomain Specifies an ESRP domain name.
seconds Specifies the maximum length of time, in seconds, that the neighbor
ESRP switch remains in its current state during an hitless failover. The
range is 2 to 1024.
Default
The default restart timer value is 2 seconds.
Usage Guidelines
The restart timer specifies the amount of time that the neighbor ESRP switch remains in its current
state during a hitless failover. This timer prevent the slave ESRP switch from trying to become master
during a hitless failover.
To view the restart settings, use the show esrp { {name} | {type [vpls-redundancy |
standard]} } command.
Example
The following command configures the restart timer value to 40 seconds for the ESRP domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure failsafe-account
configure failsafe-account {[deny | permit] [all | control | serial |
ssh {vr vr-name} | telnet {vr vr-name}]}
Description
Configures a name and password for the failsafe account, or restricts access to specified connection
types.
Syntax Description
deny Prohibits failsafe account usage over the specified connection type(s).
permit Allows a failsafe account to be used over the specified connection
type(s).
all Specifies all connection types.
control Specifies internal access between nodes in a SummitStack.
serial Specifies access over the switch console port.
ssh Specifies access using SSH on specified or all virtual routers.
telnet Specifies access using Telnet on specified or all virtual routers.
Default
The failsafe account is always configured.
The default connection types over which failsafe account access is permitted are the same as if permit
all is configured.
Usage Guidelines
The failsafe account is the account of last resort to access your switch.
If you use the command with no parameters, you are prompted for the failsafe account name and
prompted twice to specify the password for the account. The password does not appear on the display
at any time. You are not required to know the current failsafe account and password in order to change
it.
If you use the command with the permit or deny parameter, the permitted connection types are altered
as specified.
The failsafe account or permitted connection types are immediately saved to NVRAM on active nodes in
a SummitStack.
Note
The information that you use to configure the failsafe account cannot be recovered by
Extreme Networks. Technical support cannot retrieve passwords or account names for this
account. Protect this information carefully.
Once you enter the failsafe account name, you are prompted to enter the password. Once you
successfully log in to the failsafe account, you are logged in to an admin-level account.
Example
The following example restricts usage of the failsafe account to the series console port:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the VLAN advertised to Fabric Attach clients for them to use as the management VLAN.
Syntax Description
management-vlan Specifies setting he VLAN advertised to Fabric Attach clients for them
to use as the management VLAN. (Default is none.)
vlan_id Specifies the Management VLAN ID tag (1 and 4,094).
vlan_name Specifies the Management VLAN name.
untagged Management traffic should be sent untagged.
none No Fabric Attach management VLAN is in use.
Default
Unless configured, there is no Management VLAN by default.
Usage Guidelines
This command is only used when operating as a Fabric Attach server. It has no effect when operating as
a client or proxy.
Example
The following example sets the Management VLAN to a VLAN named "VLAN1" and specifies tagged
traffic:
# configure fabric attach management-vlan VLAN1
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series switches.
Description
Configures Fabric Attach authentication.
Syntax Description
ports Specify configuring ports.
port_list Specifies list of ports to configure.
all Configures all ports in the system.
authentication Configures Fabric Attach authentication.
disable Disable authentication setting (default).
enable Enable authentication setting.
key Configures Fabric Attach authentication key.
key Specifies the authentication key.
default Configures Fabric Attach authentication key to the default key.
(Default when no ‘key’ is specified.)
encrypted Configures Fabric Attach authentication key with encrypted key.
encrypted_key Specifies the encrypted authentication key.
Default
By default, all ports are configured to authentication disabled state.
Usage Guidelines
When enabled, the default key is used until configured otherwise. If the authentication fails, the Fabric
Attach information is dropped whether or not authentication is enabled on the receiving port.
When Fabric Attach authentication is configured on ports that are part of an MLAG, all ports on that
MLAG must have the same Fabric Attach authentication configuration.
To view Fabric Attach authentication configuration, use the show fabric attach ports
[port_list | all] authentication {detail} command. To view Fabric Attach
authentication status, use the show lldp {port [all | port_list]} neighbors
{detailed} command.
Example
The following example disables Fabric Attach authentication on all ports:
# configure fabric attach ports all authentication disable
The following example sets Fabric Attach authentication on port 1 with the default key:
# configure fabric attach ports 1 authentication key default
The following example sets Fabric Attach authentication on port 1 with the key "12345".
# configure fabric attach port 1 authentication key
Key: 12345
Reenter Key: 12345
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the uplink port for and enables Fabric Attach standalone proxy operation.
Syntax Description
uplink Uplink port for standalone proxy operation.
port Enables standalone proxy operation using the specified port as the
uplink.
none Removes uplink port and disables standalone proxy operation
(default).
Default
Standalone proxy mode is disabled (none) by default.
Usage Guidelines
Fabric Attach standalone proxy allows for Fabric Attach proxy functionality in environments without a
Fabric Attach server.
The Fabric Attach standalone proxy does not send provisioning requests upstream. A Fabric Attach
standalone proxy automatically accepts requests from Fabric Attach clients and assumes that the
upstream network has been provisioned appropriately. Disabling Fabric Attach standalone proxy mode
resets configured NSI/VLAN binding data to its default state and enables full Fabric Attach Proxy
operation. In Fabric Attach standalone proxy mode, you must provide the Fabric Attach server uplink
information, which is typically gathered through Fabric Attach server discovery. After you provide this
information, Fabric Attach standalone proxy mode operates as if a Fabric Attach server has been
discovered and is accepting NSI/VLAN binding requests. The binding clean-up is similar to a Fabric
Attach server timeout event, and occurs when the static uplink is deleted and when Fabric Attach
standalone proxy operation is disabled.
To confirm standalone poxy mode, use the show fabric attach statistics command with
either the agent or elements option.
Example
The following example enables proxy mode and specifies port 10 as the uplink port:
# configure fabric attach uplink 10
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the FDB aging time for dynamic entries.
Syntax Description
agingtime If agingtime is set to 0, all aging entries in the database are defined as
static, nonaging entries.
seconds Specifies the FDB aging time, in seconds. A value of 0 indicates that
the entry should never be aged out. All other platforms support the
value 0 (no aging) and a range of 15 to 1,000,000 seconds.
Default
300.
Usage Guidelines
If the aging time is set to 0 (zero), all dynamic entries in the database become static, nonaging entries.
This means that they do not age out, but non-permanent static entries can be deleted if the switch is
reset.
The software flushes the FDB table once the aging timeout parameter is reached, even if the switch is
running traffic and populating addresses in the FDB table.
For ExtremeSwitching X460-G2 switches, the hardware flushes the FDB table at periods based on the
configured software aging time. The actual hardware aging time does not exactly match the software
aging time and can be as high as twice the configured software aging time.
Example
The following example sets the FDB aging time to 3,000 seconds:
# configure fdb agingtime 3000
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables MAC address tracking for all MAC addresses on the specified ports.
Syntax Description
add Enables MAC address tracking for the specified ports.
delete Disables MAC address tracking for the specified ports.
port_list Specifies a list of ports on which MAC address tracking is to be
enabled or disabled.
all Specifies that MAC address tracking is to be enabled or disabled on all
ports.
Default
No ports are enabled for MAC address tracking.
Usage Guidelines
MAC address tracking events on enabled ports generate EMS messages and can optionally generate
SNMP traps.
Note
When a MAC address is configured in the tracking table, but detected on a MAC tracking
enabled port, the per MAC address statistical counters are not updated.
Example
The following example enables MAC address tracking for all MAC addresses on port 2:1:
configure fdb mac-tracking add ports 2:1
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the number of EMS and SNMP reports that can be generated each second for MAC
addresses that are duplicates of statically configured MAC addresses.
Syntax Description
count Specifies the number of duplicate MAC address events that are
reported each second. The range is 1 to 25.
Default
2.
Usage Guidelines
None.
Example
The following example configures the switch to report up to five duplicate MAC address events per
second:
# configure fdb static-mac-move packets 5
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to add or remove remote VTEPs to a MAC address.
Syntax Description
mac_addr Forwarding destination(s) for this MAC.
broadcast Forwarding destination(s) for broadcast traffic.
unknown-unicast Forwarding destination(s) for unknown unicast traffic.
unknown-multicast Forwarding destination(s) for unknown multicast traffic.
add Add to configuration.
delete Delete from configuration.
vr VR/VRF instance the IPv4 address is configured on.
vr_name An existing VR/VRF name.
ipaddress Configure the IP address of the remote tunnel endpoint to which the
MAC needs to be bound.
remote_ipaddress IPv4 address of the remote tunnel endpoint.
Default
VR-Default.
Usage Guidelines
You must first use the [create | delete] fdb command to add the first remote VTEP, and then
issue this command to add additional remote VTEPs for the same MAC. You cannot add a remote VTEP
to a static entry that has ports or blackhole configured. When the last VTEP is deleted, ExtremeXOS
deletes the FDB entry for that MAC.
Example
# configure fdb 01:00:5e:00:00:01 vlan vlan101 add vxlan ipaddress 30.30.30.1
# configure fdb broadcast vlan vlan101 add vxlan vr VR-Default ipaddress 30.30.30.1
# configure fdb unknown-unicast vlan vlan101 delete vxlan ipaddress 20.20.20.1
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X870, and X690 slots only.
Description
Adds a nexthop for the named flow redirection policy.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
ipaddress Specifies the IPv4 or IPv6 address of a new nexthop.
number Specifies the priority value for the nexthop.
Default
N/A.
Usage Guidelines
Use this command to add a new nexthop for the named flow redirection policy. You can specify an IPv4
address or an IPv6 unicast IP address (IPv6 multicast addresses are not supported). After you enter an
IP address, the redirection policy only accepts addresses from the same family as the first address
specified. For example, if the first IP address added is an IPv6 unicast address, you cannot add an IPv4
address to the policy.
The priority value can range from a low of 1 to a high of 4096. The nexthop with the highest priority
among multiple ones is preferred as the working nexthop. When each added nexthop has the same
priority, the first one configured is preferred.
Example
The following example adds a nexthop 10.1.1.1 for the flow redirection policy flow10 with a priority of 100:
configure flow-redirect flow10 add nexthop 10.1.1.1 priority 100.
History
This command was first available in ExtremeXOS 12.1.
The maximum number of flow redirects was increased to 4096 in ExtremeXOS 16.1.
Platform Availability
This command is available for IPv4 and IPv6 flow-redirection policies on the platforms listed for the
Policy Based Routing feature in the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a single or all nexthops for the named flow redirection policy.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
ipaddress Specifies the IPv4 or IPv6 address of the nexthop.
all Specifies that all configured nexthps are to be deleted.
Default
N/A.
Usage Guidelines
Use this command to delete a nexthop for the named flow redirection policy. If the deleted nexthop is
the working nexthop for the policy-based routing entry, another is selected from the remaining active
next hops, based on priority.
Example
The following command deletes the nexthop 10.1.1.1 from the flow redirection policy flow10:
The following command deletes all configured nexthop's from the flow redirection policy exflow:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available for IPv4 and IPv6 flow-redirection policies on the platforms listed for the
Policy Based Routing feature in the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures health checking for a specific flow redirection policy.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
ping Specifies ping health checking.
arp Specifies ARP health checking for IPv4.
neighbor-discovery Specifies Neighbor Discovery health checking for IPv6.
Default
Ping is the default.
Usage Guidelines
Use this command to configure health checking for a specific named flow redirection policy.
Example
The following command specifies arp health checking for the flow redirection policy flow10:
# configure flow-redirect flow10 health-check arp
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available for IPv4 and IPv6 flow-redirection policies on the platforms listed for the
Policy Based Routing feature in the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the ping interval, miss count, and success for a nexthop in the flow redirection policy.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
ip_address Specifies the IPv4 or IPv6 address of the nexthop.
seconds Specifies the number of seconds between pings. The default is “2”.
number Specifies the number of misses allowed. The default is “2”.
success Specifies a number of consecutive ping successes required to declare
that a nexthop is up.
successes Sets the value for the number of consecutive successful pings to
declare that a nexthop is up. Range is 1 to 256. The default is 4.
Default
The default for ping interval is 2 seconds.
Usage Guidelines
Use this command to set a ping interval, miss count, and ping success. When the ping response is not
received within the interval seconds * (number +1), the nexthop is considered to be dead and a new
candidate is selected from the remaining active nexthops.
Example
The following command configures a ping interval of 3 seconds, miss count of 3, and success count of 3
for the nexthop 10.1.1.1 in the flow redirection policy flow 3:
# configure flow-redirect flow3 nexthop 10.1.1.1 ping health-check interval 3 miss 3
success 3
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available for IPv4 and IPv6 flow-redirection policies on the platforms listed for the
Policy Based Routing feature in the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures packets to either follow the normal routing table or be dropped.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
drop Specifies that the packets are to be dropped.
forward Specifies that the packets are to follow the normal routing table.
Default
The default is forward.
Usage Guidelines
Use this command to set a drop or forward configuration for packets to be applied when all configured
next hops become unreachable.
Example
The following command configures packets of the flow redirection policy flow3 to be dropped when all
configured next hops become unreachable:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available for IPv4 and IPv6 flow-redirection policies on the platforms listed for the
Policy Based Routing feature in the ExtremeXOS 30.5 Feature License Requirements document.
configure flow-redirect vr
configure flow-redirect flow_redirect_name vr vr_name
Description
Configures a virtual router for a flow redirection policy.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
vr_name Specifies the name of the virtual router.
Default
The default virtual router is VR-Default.
Usage Guidelines
Because ACLs do not recognize the virtual router concept, one policy-based routing can be used for
multiple virtual routing entries when a VLAN-based virtual router is used for one port. This configuration
of a VR into a flow-redirect makes a policy-based routing work for a specific VR.
Example
The following command configures virtual router mgmt for flow redirection policy flow3:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available for IPv4 and IPv6 flow-redirection policies on the platforms listed for the
Policy Based Routing feature in the ExtremeXOS 30.5 Feature License Requirements document.
Description
Customizes the internal hardware forwarding tables based on the customer’s network requirements.
Syntax Description
forwarding Configure settings for hardware forwarding.
internal-tables Configure settings for internal lookup tables.
l2-and-l3 Program the internal lookup tables for layer-2 MAC FDB and layer-3
hosts and IP multicast (default).
more Configure the internal lookup tables for additional entries of specified
types.
l2 Program the internal lookup tables for additional layer-2 MAC FDB
entries.
l3-and-ipmc Program the internal lookup tables for additional layer-3 hosts and IP
multicast.
routes Programs the internal lookup tables for additional IPv4 routes and
IPv6 routes (mask 0–64) using Algorithmic Longest-Prefix Match
(ALPM). This option is only available on the ExtremeSwitching X670-
G2x465, X870, X690 series switches or stacks.
ipv6-mask-length Optimizes ALPM route capacity by choosing the maximum number of
bits in the IPv6 route subnet mask length.
64 Maximizes IPv4 route capacity (default).
IPv6 routes mask length:
• 0–64 bits use ALPM hardware
• 65–128 use ACL hardware without route sharing
128 Maximizes IPv6 route capacity for mask length 65–128 bits. All routes
use ALPM hardware with route sharing.
Default
For internal tables: l2-and-l3.
Usage Guidelines
Use this command to customize the internal hardware forwarding tables based on the customer’s
network requirements.
The ExtremeSwitching X450-G2, X460-G2, X670-G2, X465, X870, X690 have hardware forwarding
tables internal to the switch chips that can be partitioned in a flexible manner.
To display the current configuration, use the show forwarding configuration command.
Example
By default, the internal tables have L2 and L3 capacity whose relative size is similar to existing products.
The default is:
# configure forwarding internal-tables l2-and-l3
There are three other choices. You can elect to have more L2 hardware table entries:
# configure forwarding internal-tables more l2
Or, you can choose to have more L3 unicast and multicast entries:
# configure forwarding internal-tables more l3-and-ipmc
The following example configures the switch to use ALPM to increase IPv4 and IPv6 route scaling:
# configure forwarding internal-tables more routes
The current and configured values are shown in the output of the show command:
# show forwarding configuration
L3 Dual-Hash configuration:
Configured setting: on
Current setting: on
Dual-Hash Recursion Level: 1
Hash criteria for IP unicast traffic for L2 load sharing and ECMP route sharing
Sharing criteria: L3_L4
IP multicast:
Group Table Compression: on
Local Network Forwarding: slow-path
Lookup-Key: (SourceIP, GroupIP, VlanId)
Switch Settings:
Switching mode: store-and-forward
L2 Protocol:
Fast convergence: on
Rate Limit:
Overhead Bytes: 20
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
ExtremeSwitching X450-G2, X460-G2, X670-G2, X465, X590, X690, X870 (standalone or in a stack).
Description
Allows the fabric configuration to be turned off.
Syntax Description
auto Automatically configures fabric flow control based on the priority flow
control RX configuration.
off Unconfigures the fabric flow control.
Default
Auto.
Usage Guidelines
Use this command to turn off fabric configuration or return it to the default auto mode.
Example
The following command turns off the fabric configuration:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Modifies hardware table utilization by configuring the hash algorithm or dual-hash settings.
Syntax Description
crc16 Specifies the CRC16 hash algorithm.
crc32 Specifies the CRC32 hash algorithm. This is the default setting.
Default
In ExtremeXOS 11.5, the default hash algorithm is crc32.
Usage Guidelines
Note
Modify the hardware table hash algorithm only with the guidance of Extreme Networks
technical personnel.
The switch uses a hash algorithm to decide where to store the addresses in the hardware table. The
standard, default hash algorithm works well for most systems; however, for some addresses with certain
patterns, the hardware may attempt to store address information in the same section of the hardware.
If you are running ExtremeXOS 11.4 or earlier and experience a full hardware table that affects Layer 2, IP
local host, and IP multicast forwarding, you see messages similar to the following in the log:
<Info:HAL.IPv4Adj.Info> : adj 136.159.188.109: IP add error is Table full for new or
newly resolved ARP, egress valid <Info:HAL.IPv4Adj.Info> : adj 136.159.188.109: returned
-17 for L3 table bucket 181 <Warn:HAL.IPv4Mc.Warning> : Could not allocate a hardware
S,G,V entry (889f4648,effffffa,70) - hardware table resource exceeded (rv=-17).
If you are running ExtremeXOS 11.5 or later and experience a full hardware table that affects Layer 2, IP
local host, and IP multicast forwarding, you see messages similar to the following in the log:
<HAL.IPv4Adj.L3TblFull> MSM-A: IPv4 unicast entry not added. Hardware L3 Table full.
In the previously described situations, you can configure a different hash algorithm to select a different
section of the hardware to store addresses. You must save your configuration and reboot the switch to
modify the hash algorithm used by the hardware table. Typically, the dual-hash feature improves hash
utilization. You must save your configuration and reboot the switch to turn dual-hash on or off.
to crc16, when ExtremeXOS 11.5 loads, the hash algorithm becomes crc32. To change the hash algorithm
to crc16, use the configure forwarding hash-algorithm crc16 and save your switch
configuration.
Example
The following example modifies the hardware table hash algorithm to crc16:
configure forwarding hash-algorithm crc16
The switch displays the following message to describe the change and to prompt you to save your
configuration and reboot the switch:
Configured hash alorithm has been changed to ‘crc16’ with L3 dual-hash support ‘on’ for
applicable HW.
Warning: This command will only take effect after a save and reboot
History
This command was first available in ExtremeXOS 11.3.2.
Platform Availability
This command is available only on all platforms.
Description
Modifies hardware table utilization by configuring the dual hashing recursion level.
Syntax Description
0-3 Sets the maximum number of L3 hash buckets to modify to make
room for a new entry.
Default
The default is “1.”
Usage Guidelines
This command allows you to select the dual hashing “recursion level” for hardware with the dual-hash
feature. The setting applies only if dual-hash is configured or defaulted to “on” using the configure
forwarding hash-algorithm command.
The configured recursion level is the maximum number of existing hash entries to move in an attempt to
add a new hash entry. A higher recursion level may provide better hash utilization at the expense of
additional CPU processing. This command does not require a system reboot. However, the new
recursion level takes effect only for addresses added after the command is issued.
Example
The following command modifies the dual-hash recursion level to modify up to two L3 hash buckets in
an attempt to add a new entry:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables compression of entries in the IP multicast group table to facilitate improved IP
multicast scaling.
Syntax Description
group-table Enables compression.
off Disables compression.
Default
group-table.
Usage Guidelines
Compression of IP multicast group table entries allows the switch to process more multicast traffic
using the faster switch hardware instead of the relatively slower switch software. Compression requires
additional processing. Disable this feature if you suspect a problem exposed by IP multicast
compression.
When you enable or disable this feature, all IP multicast entries are flushed, and this can result in a
temporary loss of multicast traffic while the IP multicast entries are relearned.
Example
The following command disables compression:
configure forwarding ipmc compression off
History
This command was first available in ExtremeXOS 12.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets how forwarding of packets to local network IP multicast addresses (224.0.0.x) is handled.
Syntax Description
fast-path Specifies fast-path forwarding.
Fast-path forwarding dictates that packets traversing the switch do
not require processing by the CPU. Fast path packets are forwarded
entirely by ASICs and are sent at wire speed rate. This consumes
additional system ACL per-port or per-VLAN, depending on
configure igmp snooping filters [per-port | per-
vlan] selections.
slow-path Specifies slow-path forwarding (default). Packets are processed by
the CPU.
Default
Slow-path forwarding is the default configuration.
Example
The following example sets up fast-path forwarding for local network IP multicast addresses:
configure forwarding ipmc local-network-range fast-path
History
This command was first available in ExtremeXOS 15.3.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables you to choose the lookup-key for multicast forwarding.
Syntax Description
group-vlan Specifies that IP multicast forwarding database entries are
programmed as (*,GroupIP,VlanId).
source-group-vlan Specifies that IP multicast forwarding database entries are
programmed as (SourceIP, GroupIP, VlanId). (Default).
mac-vlan Specifies that IP multicast forwarding database entries are
programmed as (Mac, VlanId).
mixed-mode Specifies that IP multicast forwarding database entries are
programmed as follows: L3 cache entries (PIM/MVR/PVLAN) use
source-group-vlan; L2 cache entries (IGMP/MLD/PIM snooping) use
mac-vlan.
Default
source-group-vlan.
Usage Guidelines
Use this command to choose the lookup-key for multicast forwarding. The following restrictions apply
to this command:
The configure forwarding ipmc lookup-key mac-vlan command is disallowed under the
following conditions.
• If IPMC forwarding is enabled on at least on one VLAN
• If MVR is enabled either globally or on a VLAN
Similarly, enabling the above two features are disallowed,when the ipmc lookup-key is mac-vlan.
The following warning message is displayed when the mac-valn option is specified:
Warning: Usage of multicast IP addresses that could result in overlapping MAC
addresses should be avoided. Example: Using 225.1.1.1, 226.1.1.1 and 225.129.1.1 should
be avoided. Either one of the addresses could be used. Using multicast with PVLAN
should be avoided with this forwarding option.
• Mixed-mode: configure forwarding ipmc lookup-key mixed-mode
• The configure igmp snooping forwarding-mode [group-vlan | source-group-
vlan] command was introduced to support (*, G, V) forwarding before the IPMC compression
feature was introduced. Because we are introduced IPv6 multicast support in ExtremeXOS 15.2, this
command is deprecated, and the new configure forwarding ipmc lookup-key command
now covers both IPv4 and IPv6.
The following warning message appears when the mixed mode option is specified:
Warning: Usage of multicast IP addresses that could result in overlapping MAC addresses
should be avoided for snooping (IGMP/MLD/PIM snooping) controlled traffic.
Example: Using 225.1.1.1, 226.1.1.1 and 225.129.1.1 should be avoided. Either one of the addresses could be
used.
Example
The following command specifies that IP multicast forwarding database entries are programmed as
(*,GroupIP,VlanId):
configure forwarding ipmc lookup-key group-vlan
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch to flooding the unicast traffic during L2 protocol convergence.
Syntax Description
on Used to avoid flooding the unicast traffic during L2 protocol
convergence. (default)
off Used to Temporarily flooding unicast traffic during L2 protocol
convergence.
Default
On.
Usage Guidelines
Use this command to influence the L2-protocol convergence when topology changes in the network to
minimize the congestion.
Example
The following command will influence the L2-Protocol control traffic:
configure forwarding L2-protocol fast-convergence off
History
This command was first available in ExtremeXOS 15.1.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to select the number of overhead bytes that will be included in the rate
calculation.
Syntax Description
rate-limit Rate limiting features.
overhead_bytes Number of overhead bytes used in rate-limit and meter calculations.
Default
20 bytes to include the preamble and inter-frame gap.
Example
The following example displays the output of the show forwarding configuration command with the
rate limit information included.
L2 and L3 Forwarding table hash algorithm:
Configured hash algorithm: crc32
Current hash algorithm: crc32
L3 Dual-Hash configuration:
Configured setting: on
Current setting: on
Dual-Hash Recursion Level: 1
Hash criteria for IP unicast traffic for L2 load sharing and ECMP route sharing
Sharing criteria: L3_L4
IP multicast:
Group Table Compression: on
Local Network Forwarding: slow-path
Lookup-Key: (SourceIP, GroupIP, VlanId)
Switch Settings:
Switching mode: store-and-forward
L2 Protocol:
Fast convergence: on
Rate Limit:
Overhead Bytes: 20
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Identifies the fields that are used to select ECMP routes and load-sharing group ports.
Syntax Description
L3 Uses only Layer 3 IP addresses to select ECMP routes and load-
sharing ports.
L3_L4 Uses Layer 3 IP addresses and Layer4 TCP/UDP port numbers, if
present, to select ECMP routes and load-sharing ports.
Default
L3_L4.
Usage Guidelines
This command configures the criteria used to select ECMP routes and load-sharing group ports.
For ECMP routes, the configured criteria selects the next hop gateway. The L3 option uses only the
source and destination IP addresses to select the next hop gateway. The L3_L4 option uses the Layer4
TCP or UDP port and the source and destination IP addresses to select the next hop gateway.
For load-sharing groups (link aggregation groups), the configured criteria selects the load-sharing
group port. The load-sharing groups can be configured to use the following address-based algorithms:
• L2—Specifies port selection based on Layer 2 information.
• L3—Specifies port selection based on Layer 3 information.
• L3_L4—Specifies port selection based on Layer 3 and Layer4 information.
This command affects all the load-sharing groups that use either the L3 or L3_L4 link aggregation
algorithm. If the L3 option is specified, all the load-sharing groups that are configured with either the L3
or the L3_L4 address-based link aggregation algorithm use just the Layer 3 IP addresses for the egress
port selection. Similarly if the L3_L4 option is specified, all the load-sharing groups that are configured
with either L3 or L3_L4 address-based link aggregation algorithm use the Layer 3 IP addresses and
Layer4 port number for the egress port selection.
Selecting the L3 option over L3_L4 can be useful in a network where IP fragments are present, since
only the first fragment contains the Layer4 TCP or UDP port number. If the L3 option is selected, all IP
fragments in a given TCP or UDP session use the same ECMP gateway or load-sharing group port,
potentially avoiding inefficient packet reordering by the destination. If IP fragments are not prevalent,
better traffic distribution can be achieved by selecting L3_L4.
To display the forwarding sharing feature configuration, enter the command: show forwarding
configuration
Example
The following example modifies the sharing selection criteria to use just the Layer 3 IP addresses:
configure forwarding sharing L3
The following example modified the sharing selection criteria to use the Layer 3 and Layer 4
information:
configure forwarding sharing L3_L4
History
This command was first available in ExtremeXOS 11.6.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command controls the way the hardware filters are installed for VXLAN ARP suppression.
Syntax Description
iparp Selects IP ARP.
suppression ARP suppression. Requests may be proxied.
filters Control the way ARP suppression hardware filters are installed.
per-port Install ARP suppression hardware filters on a per-port basis (default).
per-vlan Install ARP suppression hardware filters on a per-VLAN basis.
Default
By default, per-port option is assumed.
Example
The following example sets IP ARP suppression filtering per-VLAN:
configure forwarding iparp suppression filters per-vlan
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, and X870 slots only.
Description
Configures the switching mode as either cut-through or store-and-forward.
Syntax Description
cut-through Specifies that a packet can begin being transmitted prior to its being
received in full.
store-and-forward Specifies that a packet is transmitted only after the entire packet has
been received and stored in the packet memory.
Default
Store-and-forward.
Usage Guidelines
Use this command to configure the switch to begin transmitting a packet before its entire contents have
been received. This reduces the forwarding latency of the switch.
Cut-through mode cannot be achieved for packet sizes that are less than or equal to 384 bytes. On the
ExtremeSwitching X670-G2, cut-through can be achieved for all packet sizes.
To display the switch mode settings, use the show forwarding configuration command.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
Cut-through forwarding mode is supported only on the 40G ports of the ExtremeSwitching X670-G2,
X870, and X690 series switches; and 100G ports on ExtremeSwitching X870 series switches.
Description
Selects the way VLAN membership is implemented for Extended Edge Switching extended ports.
Syntax Description
vpex
Specifies Extended Edge Switching.
vlan-port-filter Select hardware mechanism to enforce VLAN port membership.
hash-table Use hash table for VLAN port membership when different VLANs do not
share many ports (default).
port-group Use port group for VLAN port membership when different VLANs share
many ports and there is a requirement for large VLAN scale.
Default
Hash table is the default behavior.
Usage Guidelines
In Extended Edge Switching hardware, the extended ports are represented as virtual ports. The VLAN
membership of extended ports can be implemented in two ways:
• Hash table with VLAN and virtual port as key. Note that hash tables can lead to hash collisions at
higher scale. (Default)
• Virtual port group. Programming the same group number in the VLAN table and virtual port table
indicates membership. The hardware has 64 virtual port groups. You should select this option if
many VLANs share the same extended ports.
Note that changing this configuration at run time could result in temporary loss of traffic while the
tables are reprogrammed. It is preferable to identify which option works best for the particular topology
and leave the setting unchanged during runt ime or schedule the change during a maintenance window.
To see what setting you have selected with this command, see show forwarding configuration on page
2607.
Example
The following example selects a virtual port group to define VLAN membership:
# configure forwarding vpex vlan-port-filter port-group
History
This command was first available in ExtremeXOS 22.6.
Platform Availability
This command is available on ExtremeSwitching X670-G2, X465, X590, X690 series switches.
Description
This command defines VLAN/VR membership to an identity management role.
Syntax Description
role_name Name of the role.
tag VLAN tag for dynamic VLAN creation for this role.
tag VLAN tag between 1 and 4094.
vr Virtual router name for dynamic VLAN creation for this role.
vr_name Virtual router name.
none None.
Default
N/A.
Usage Guidelines
Use this command to configure VLAN tag and the VR in which the dynamic VLAN has to be created for
a role. By default the dynamic VLAN is created in VR-Default if the VR is not configured. The identity is
placed in the base VLAN if no VLAN tag is configured for this role. The configured VLAN tag and VR
can be set to none to unconfigure the same. VR-Mgmt is not allowed to configure. The VLAN tag and
VR is applicable only to the user created roles.
Example
The following example configures role "r1" and tag 100:
# configure identity-management role "r1" tag 100 vr "VR-Default"
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command defines
Syntax Description
role-based vlan Associates the identity to a specific VLAN based on the identity's role.
add Adds ports to the Identity Management role-based vlan enabled
portlist.
delete Deletes ports from the Identity Management role-based vlan enabled
portlist.
ports Configures Identity Management role-based VLAN on ports.
port_list Configures Identity Management role-based VLAN on specified port
list.
all Configures Identity Management role-based VLAN on all ports.
Default
N/A.
Usage Guidelines
Use this command to configure the role-based VLAN feature for Identity Management enabled ports.
This command requires the ports to be part of a base VLAN. Enabling role-based VLAN on Identity
Management enabled ports allows the identity to be placed in the correct VLAN mapped to the role as
configured by the administrator.
Note
You cannot enable the Identity Manager role-based VLAN feature on Netlogin enabled ports.
Example
The following example configures Identity Management on ports 1-3, and 5.
# configure identity-management role-based-vlan add ports 1-3,5
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the access-list source-address type.
Syntax Description
mac Specifies MAC addresses.
ip Specifies IP addresses.
Default
MAC addresses.
Usage Guidelines
The identity management feature can install ACLs for identities based on the source MAC or source IP
address. By default the MAC address of the identity is used to install the ACLs. Every network entity has
a MAC address, but not all network devices have an IP address, so we recommend that you use the
default mac selection to install ACLs for network entities based on the source MAC address.
You must disable the identity management feature with the disable identity-management
command before you use this command.
Example
The following command configures the identity management feature to use MAC-based ACLs:
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or deletes an entry in the identity manager blacklist.
Syntax Description
add Adds the specified identity to the blacklist.
delete Deletes the specified identity from the blacklist.
all Specifies that all identities are to be deleted from the blacklist. This
option is available only when the delete attribute is specified.
mac_address Specifies an identity by MAC address.
macmask Specifies a MAC address mask. For example: FF:FF:FF:00:00:00.
ip_address Specifies an identity by IP address.
netmask Specifies a mask for the specified IP address.
ipNetmask Specifies an IP network mask.
user_name specifies an identity by user name.
Default
N/A.
Usage Guidelines
The software supports up to 512 entries in the blacklist. When you add an identity to the blacklist, the
switch searches the whitelist for the same identity. If the identity is already in the whitelist, the switch
displays an error.
It is possible to configure an identity in both lists by specifying different attributes in each list. For
example, you can add an identity username to the blacklist and add the MAC address for that user’s
laptop in the whitelist. Because the blacklist has priority over the whitelist, the username is denied
access to the switch from all locations.
If you add a new blacklist entry that is qualified by a MAC or IP address, the identity manager does the
following:
• Reviews the identities already known to the switch. If the new blacklist entry is an identity known on
the switch, all existing ACLs (based on user roles or whitelist configuration) for the identity are
removed.
• When a blacklisted MAC-based identity is detected or already known, a Deny All ACL is programmed
for the identity MAC address for the port on which the identity is detected.
• When a blacklisted IP-based identity is detected or already known, a Deny All ACL is programmed
for the identity IP address for the port on which the identity is detected.
• The ACL for blacklisted MAC and IP addresses precedes any ACLs based on user names (including
Kerberos snooping) that may have been previously configured on the port. This ensures that a
Kerberos exchange cannot complete when initiated for blacklisted identities.
If you add a new blacklist entry that is qualified by a username (with or without a domain name), the
identity manager does the following:
• Reviews the identities already known to the switch. If the new blacklist entry is an identity known on
the switch, a Deny All ACL is programmed for the identity MAC address on all ports to which the
identity is connected.
• When a new blacklisted username-based identity accesses the switch, a Deny All ACL is
programmed for the identity MAC address on the port on which the identity was detected.
• The ACL for a blacklisted username follows any ACLs based on Kerberos snooping. This ensures that
a Kerberos exchange for another user can complete when initiated from the same MAC address.
Note
Identity manager programs ingress ACLs. Blacklisted devices can receive traffic from the
network, but they cannot send traffic into the network.
Deny All ACLs for blacklisted entries exist as long as the identity remains in the identity manager
database.
If you delete an identity from the blacklist, identity manager checks to see if the identity is in the local
database. If the identity is known to the switch, the switch does the following:
• Removes the Deny All ACL from the port to which the identity connected.
• Initiates the role determination procedure for the switch port to which the known identity
connected. This ensures that the appropriate role is applied to the identity that is no longer
blacklisted.
Note
The role determination process can trigger an LDAP refresh to collect identity attributes
for role determination.
Example
The following command adds a MAC address to the blacklist:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum amount of memory that is allocated to the identity management database.
Syntax Description
Kbytes Specifies the maximum amount of memory to be used for maintaining
identity information. The range is 64 to 49152 KB.
Default
512 KB.
Usage Guidelines
If the current memory usage is higher than the memory size specified in the configure identity-
management database memory-size command, the command is not successful and a warning message
appears. The message indicates that the current memory usage level is higher than the configured level
and that the memory can be freed only when existing identities log out or disconnect.
Example
The following command allocates 4096 kilobytes to the identity management database:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command provides the administrator a way to enable/disable the detection of the identities that
are triggered through any of the following protocols:
• FDB
• IPARP
• IPSecurity DHCP Snooping
• LLDP
• Netlogin
• Kerberos
Syntax Description
detection Detection of the identities.
on Detection of identities on.
off Detection of identities off.
fdb FDB identities.
iparp IPARP identities.
ipsecurity Identities detected through DHCP snooping entries.
kerberos Kerberos identities.
lldp LLDP identities.
all All identities.
Default
On.
Usage Guidelines
The identity manager detects the identities using the following protocols:
• FDB
• IPARP
• IPSecurity DHCP Snooping
• LLDP
• Netlogin
• Kerberos
By default, Identity Management detects identities through all the above mentioned protocols.
This feature provides the administrator a way to enable/disable the detection of the identities that are
triggered through any of the above said protocols. The administrator can control the identity detection
through any of the protocol trigger at the port level. This configuration can be applied to identity
management enabled ports only. ExtremeXOS displays an error if this configuration is applied for the
identity management disabled ports.
Note
All types of Netlogin identity will not be detected if the netlogin detection is disabled.
Enabling Kerberos identity detection will not create identities for the previously authenticated
Kerberos clients.
Example
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables a network administrator to choose usernames whose identity is not required to
be maintained. These user names are added to greylist. Identity Management module does not create
an identity when greylist users log in.
Syntax Description
username Specifies an identity by user name.
Default
N/A.
Usage Guidelines
The software supports up to 512 entries in greylist. Administrator can configure username as part of
greylist. When such configuration takes place, identity manager takes following action.
• Checks if the same entry is present in blacklist/whitelist. If yes, command is rejected with
appropriate error message.
• Checks if this entry is ineffective because of existing entries in blacklist/whitelist. During this check,
precedence of greylist is also taken into account.
◦ E.g: New entry being configured into greylist is: Richard@corp. Assume blacklist has higher
precedence and it has an entry "Richard". In this case, new entry is ineffective and the
configuration is rejected giving the details.
• If no conflict is found, greylist is updated.
• IDM checks if any existing identity matches the new entry in greylist. If match is found, location/
identity will be deleted and unknown identity is created with the same MAC.
If greylist user is the only user logged into the device, unknown identity is created and user is kept in
unauthenticated role. However if actual user is present along with greylist user, no additional policy is
applied for greylist user. Greylist user will get access permissions same as that of actual user logged in.
2. User identity is constructed based on NetLogin details, if deleted username is found in NetLogin
authenticated user database.
Example
The following command adds an username to the greylist:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the aging time for Kerberos snooping entries.
Syntax Description
minutes Specifies the aging time in minutes. The range is 1 to 65535 minutes.
Default
N/A.
Usage Guidelines
Kerberos does not provide any service for un-authentication or logout. Kerberos does provide a ticket
lifetime, but that value is encrypted and cannot be detected during snooping.
To enable the aging and removal of snooped Kerberos entries, this timer defines a maximum age for the
snooped entry. When a MAC address with a corresponding Kerberos entry in Identity Manager is aged
out, the Kerberos snooping timer starts. If the MAC address becomes active before the Kerberos
snooping timer expires, the timer is reset and the Kerberos entry remains active. If the MAC address is
inactive when the Kerberos snooping timer expires, the Kerberos entry is removed.
Example
The following command configures the aging time for 600 minutes:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch to remove all Kerberos snooping entries after the specified time expires.
Syntax Description
minutes Specifies the aging time in minutes. The range is 1 to 65535 minutes.
none Disables the Kerberos force-aging feature.
Default
N/A.
Usage Guidelines
If Kerberos force aging is enabled, we recommend that the Kerberos snooping force aging time be set
to the same value as the Kerberos ticket lifetime.
Example
The following command removes all Kerberos snooping entries after 600 minutes:
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
When identity management is enabled on a port, Kerberos packets are software-forwarded. With this
command, you can report if shared folder access via identity management-enabled ports is slow if there
exists other CPU-bound traffic.
Syntax Description
forwarding Configure how customer Kerberos authentication packets are
forwarded by this system.
fast-path Forward customer snooped Kerberos packets in hardware (default).
slow-path Forward customer snooped Kerberos packets in software. This option
is recommended only for systems with low CPU-bound traffic.
Default
Fast-path.
Usage Guidelines
Use this command to report if shared folder access via identity management-enabled ports is slow if
there exists other CPU-bound traffic.
Example
The following show command displays the modified Kerberos information:
# sh identity-management
Identity Management : Enabled
Stale entry age out (effective) : 180 Seconds (180 Seconds)
Max memory size : 512 Kbytes
Enabled ports : 1
SNMP trap notification : Enabled
Access list source address type : MAC
Kerberos aging time (DD:HH:MM) : None
Kerberos force aging time (DD:HH:MM) : None
Kerberos snooping forwarding : Fast path
Kerberos snooping forwarding : Slow path
Valid Kerberos servers : none configured(all valid)
LDAP Configuration:
-------------------
LDAP Server : No LDAP Servers configured
Base-DN : None
Bind credential : anonymous
mac : Enabled
web-based : Enabled
History
This command was first available in ExtremeXOS 15.1.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or deletes a Kerberos server to the Kerberos server list.
Syntax Description
ip_address Specifies a Kerberos server IP address to add or delete.
all Specifies that all Kerberos server list entries are to be deleted.
Default
No servers are in the Kerberos server list.
Usage Guidelines
When no servers are configured in the Kerberos server list, the Kerberos snooping feature processes
responses from all Kerberos servers, which can expose the system to simulated logins. To avoid this
exposure, you can configure a list of up to 20 valid Kerberos servers. When the Kerberos server list
contains one or more entries, the switch only processes responses from the Kerberos servers in the list.
Example
The following command adds the Kerberos server at IP address 10.10.10.1 to the Kerberos server list:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to configure the precedence of list types. You must specify the list-names in
the desired order of precedence. Listname1 will take precedence of all lists (i.e., highest precedence).
Listname2 will take precedence over Listname3. When the user/device logs in, entries present in
Listname1 will be searched at first to find matching role. Entries present in Listname2 will be searched
after Listname1 and entries in Listname3 will be searched at last.
Syntax Description
listname1 Specifies the list type which has precedence over all list types.
listname2 Specifies the list type which has next precedence, after listname1.
listname3 Specifies the list type which has least precedence of all.
Default
greylist, blacklist, whitelist
Usage Guidelines
By default, greylist entries have higher precedence over blacklist and whitelist entries.
This means that IDM consults with greylist first upon detection of user, and then decides if identity
needs to be created. If there is a greylist entry matching the incoming username, user identity is not
created. If there is no matching greylist entry, IDM proceeds with role identification for the user.
However, greylist precedence is configurable. Following are three possibilities for greylist precedence
configuration.
It is important to notice that blackist always has higher precedence over whitelist for ExtremeXOS 15.1.2.
In order to change the list precedence, Identity Management should be disabled first. Disabling IDM is
required since there may be many users/devices already mapped to some roles and policies/ACLs
applied. Considering the processing load of unmapping the roles and removing policies, changing
precedence isn't allowed when IDM is enabled. When precedence configuration is changed, each entry
present in the list with lower precedence (new precedence) is checked with each entry present in all the
lists with higher precedence.
Example
The following example instructs that blacklist has precedence over all lists. Greylist has precedence over
whitelist. Whitelist has least precedence.
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or deletes identity management for the specified ports.
Syntax Description
add Enables identity management on the specified port list.
delete Disables identity management on the specified port list.
port_list Specifies the ports to which this command applies.
all Specifies that this command applies to all ports.
Default
No ports are in the identity management enabled port list.
Usage Guidelines
If neither the add nor the delete keyword is entered, identity management is enabled on the specified
port list, and the new port list overrides any previous port list.
If identity management is enabled on a port and a user or device is connected to it, information about
the user or device is present in the identity management database. If this port is removed from the
identity-management enabled port list, the user or device information remains in the data base until the
user logs out or the device disconnects. However, once a port is deleted from enabled port list, no new
information is added to the identity management database for that port.
Note
Kerberos identities are not detected when both server and client ports are added to identity
management.
Example
The following command enables identity management on ports 2:3 and 2:5:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a child role to the specified role.
Syntax Description
role_name Specifies the name of an existing role.
child-role Specifies a name for the new child role (up to 32 characters).
Default
N/A.
Usage Guidelines
The child role name can include up to 32 characters. Role names must begin with an alphabetical letter,
and only alphanumeric, underscore (_), and hyphen (-) characters are allowed in the remainder of the
name. Role names cannot match reserved keywords. For more information on role name requirements
and a list of reserved keywords, see Object Names on page 13.
Example
The following example configures a child role named East for the existing role named India-Engr:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a dynamic ACL rule for the specified role and specifies the order.
Syntax Description
role_name Specifies the name of an existing role.
rule_name Specifies the name of a dynamic ACL rule to add to the specified role.
Default
The order of the dynamic rule is last if the order is not explicitly specified.
Usage Guidelines
The maximum number of policies or ACL rules that can be applied to a particular role is restricted to 8.
This count does not include the policies and rules inherited from a parent role. Since the maximum
hierarchy depth is 5, the maximum number of policies and rules supported for a role at the maximum
hierarchy depth is 40 (8 x 5).
When a dynamic ACL rule is added to a role, it is immediately installed for all identities mapped to that
role and roles below it in the role hierarchy.
Example
The following example configures the role named India-Engr to use the ACL rule named india-Engr-rule:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a policy for the specified role and specifies the order.
Syntax Description
role_name Specifies the name of an existing role.
policy-name Specifies the name of a policy to add to the specified role.
Default
The order of the policy is last if the order is not explicitly specified.
Usage Guidelines
The maximum number of policies or ACL rules that can be applied to a particular role is restricted to 8.
This count does not include the policies and rules inherited from a parent role. Since the maximum
hierarchy depth is 5, the maximum number of policies and rules supported for a role at the maximum
hierarchy depth is 40 (8 x 5).
When a policy is added to a role, it is immediately installed for all identities mapped to that role and all
roles below it in the role hierarchy.
Example
The following example configures the role named India-Engr to use the policy named india-Engr-policy:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or all child roles from the specified role.
Syntax Description
role_name Specifies the name of an existing role.
child-role Specifies a name for a child role to delete.
all Specifies that all child roles are to be deleted.
Default
N/A.
Usage Guidelines
None.
Example
The following example deletes the child role named East from the existing role named India-Engr:
The following command deletes all child roles from the existing role named India-Engr:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or all dynamic ACL rules for the specified role.
Syntax Description
role_name Specifies the name of an existing role.
rule_name Specifies the name of a dynamic ACL rule to delete from the specified
role.
all Specifies that all dynamic ACL rules are to be deleted.
Default
N/A.
Usage Guidelines
None.
Example
The following example deletes all dynamic rules from the role named India-Engr:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or all policies for the specified role.
Syntax Description
role_name Specifies the name of an existing role.
policy-name Specifies the name of a policy to delete from the specified role.
all Specifies that all policies are to be deleted from the specified role.
Default
N/A.
Usage Guidelines
None.
Example
The following example deletes the policy named india-Engr-policy from the role named India-Engr:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables or disables the match-criteria inheritance support. Check the current status by
issuing the show identity-management command.
Syntax Description
role User role.
match-criteria Match criteria for the role.
inheritance Inheriting match criteria from parent role to child role.
on | off Specifies whether match criteria inheritance is on or off.
Default
Off.
Usage Guidelines
From ExtremeXOS Release 15.2, child roles can inherit the match criteria of the parent role. This helps
the user since the match criteria need not be duplicated in all levels of hierarchy.
When match-criteria inheritance is on, for a user to be classified under a child role, he has to satisfy the
match criteria of the child role, and also all parent roles in the hierarchy.
Match criteria inheritance helps users in avoiding the need to duplicate match-criteria entries in the
hierarchy.
Example
For example, there are roles called Employee, USEmployee and USSales in an organization hierarchy of
a company XYZCorp.com. Till ExtremeXOS 15.1 (or with match-criteria inheritance off), the user has to
create three roles like this:
Now this can be simplified into the following since child role inherits parent role’s match criteria:
History
This command was first available in ExtremeXOS 15.2
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a priority value for the specified role.
Syntax Description
role_name Specifies the name of an existing role that you want to configure.
pri_value Specifies the role priority; the lower the priority number, the higher
the priority. The range of values is 1 to 255. Value 1 represents the
highest priority, and value 255 represents the lowest priority.
Default
Priority=255.
Usage Guidelines
The role priority determines which role a user is mapped to when the user’s attributes match the
match-criteria of more than 1 role. If the user’s attributes match multiple roles, the highest priority
(lowest priority value) role applies. If the priority is the same for all matching roles, the role for which the
priority was most recently set or modified is used.
Example
The following example configures the role named India-Engr to use the highest priority:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the stale-entry aging time for event entries in the identity management database.
Syntax Description
seconds Specifies the period (in seconds) at which event entries are deleted.
The range is 60 to 1800 seconds.
Default
180 seconds.
Usage Guidelines
The identity management database contains active entries, which correspond to active users and
devices, and event entries, which record identity management events such as user logout or device
disconnect. The active entries are automatically removed when a user logs out or a device disconnects.
The event entries are automatically removed after a period defined by the stale-entry aging time.
Note
To capture active and event entries before they are deleted, you can use external
management software such as Ridgeline™, which can access the switch using XML APIs. We
recommend that the external client(s) that poll the identity management database be
configured for polling cycles that are between one-third and two-thirds of the stale-aging
time. This ensures that a new database entry or event does not age out before the next
polling cycle.
The stale-entry aging time defines when event entries become stale. To preserve memory, the software
periodically uses a cleanup process to remove the stale entries. You can configure the stale-entry aging
time. The cleanup interval is defined by the software.
When memory usage is high, the software reduces both the stale-entry aging time and the cleanup
interval to keep memory available for new entries. The following table shows how the database is
managed as memory usage increases.
Whenever the database usage level changes, an EMS message is logged, and if enabled, an SNMP trap
is sent. If the switch changes the stale-entry aging time, the SNMP trap contains the new stale-entry
aging time.
Note
If the database level regularly reaches the high usage level, or if it reaches the critical or
maximum levels, it is time to investigate the cause of the issue. The solution might be to
increase the database memory size.
External clients should be capable of adjusting the polling cycles. Because the aging cycle is shorter
when memory is low, it is best if external clients can adjust their polling cycles in response to SNMP
traps that announce a change in the stale-entry aging time.
Example
The following command configures the stale-entry aging time for 90 seconds:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or deletes an identity in the identity manager whitelist.
Syntax Description
add Adds the specified identity to the whitelist.
delete Deletes the specified identity from the whitelist.
all Specifies that all identities are to be deleted from the whitelist. This
option is available only when the delete attribute is specified.
mac_address Specifies an identity by MAC address.
macmask Specifies a MAC address mask. For example: FF:FF:FF:00:00:00.
ip_address Specifies an identity by IP address.
netmask Specifies a mask for the specified IP address.
ipNetmask Specifies an IP network mask.
user_name Specifies an identity by user name.
Default
N/A.
Usage Guidelines
The software supports up to 512 entries in the whitelist. When you add an identity to the whitelist, the
switch searches the blacklist for the same identity. If the identity is already in the blacklist, the switch
displays an error.
It is possible to configure an identity in both lists by specifying different attributes in each list. For
example, you can add an identity username to the whitelist and add the MAC address for that user’s
laptop in the blacklist. Because the blacklist has priority over the whitelist, identity access is denied from
the user’s laptop, but the user can access the switch from other locations.
If you add a new whitelist entry that is qualified by a MAC or IP address, the identity manager does the
following:
• Reviews the identities already known to the switch. If the new whitelist entry is blacklisted (by
specifying a different identity attribute), no action is taken.
• If the identity is not blacklisted and is known on the switch, all existing ACLs for the identity are
removed.
• When a whitelisted MAC-based identity is detected or already known, an Allow All ACL is
programmed for the identity MAC address for the port on which the identity is detected.
• When a whitelisted IP-based identity is detected or already known, an Allow All ACL is programmed
for the identity IP address for the port on which the identity is detected.
If you add a new whitelist entry that is qualified by a username (with or without a domain name), the
identity manager does the following:
• Reviews the identities already known to the switch. If the new whitelist entry is an identity known on
the switch, an Allow All ACL is programmed for the identity MAC address on all ports to which the
identity is connected.
• When a new whitelisted username-based identity accesses the switch, an Allow All ACL is
programmed for the identity MAC address on the port on which the identity is detected.
• The ACL for a whitelisted username follows any ACLs based on Kerberos snooping.
Allow All ACLs for whitelisted entries exist as long as the identity remains in the identity manager
database.
If you delete an identity from the whitelist, identity manager checks to see if the identity is in the local
database. If the identity is known to the switch, the switch does the following:
• Removes the Allow All ACL from the port to which the identity connected.
• Initiates the role determination procedure for the switch port to which the known identity
connected. This ensures that the appropriate role is applied to the identity that is no longer
whitelisted.
Note
The role determination process can trigger an LDAP refresh to collect identity attributes
for role determination.
Example
The following command adds an IP address to the whitelist:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the time-out for idle console, SSH2, and Telnet sessions.
Syntax Description
minutes Specifies the time-out interval, in minutes. Range is 1 to 240 (1 minute
to 4 hours).
Default
The default time-out is 20 minutes.
Usage Guidelines
This command configures the length of time the switch will wait before disconnecting idle console,
SSH2, or Telnet sessions.
The idletimeout feature must be enabled for this command to have an effect (the idletimeout feature is
enabled by default).
Example
The following command sets the time-out for idle login and console sessions to 10 minutes:
configure cli idle-timeout 10
History
This command was first available in ExtremeXOS 10.1.
The cli keyword was added and the idletimeout keyword was changed to idle-timeout in
ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure igmp
configure igmp query_interval query_response_interval
last_member_query_interval {{vlan} vlan_name} {{vr} vr_name}
{robustness}
Description
Configures the IGMP timers.
Syntax Description
query_interval Specifies the interval (in seconds) between general queries.
query_response_interv Specifies the maximum query response time (in seconds).
al
last_member_query_int Specifies the maximum group-specific query response time (in
erval seconds).
vlan_name Applies the configuration only to the specified VLAN. If no VLAN is
specified, the configuration applies to all VLANs.
vr_name Specifies the VR to which the configuration should be applied. If no
parameter is specified, the configuration is applied to the current VR
context.
robustness Specifies the degree of robustness for the network.
Default
• query interval—125 seconds
• query response interval—10 seconds
• last member query interval—1 second
• robustness—2
Usage Guidelines
Timers are based on RFC2236. Specify the following:
• query interval—The amount of time, in seconds, the system waits between sending out general
queries. The range is 1 to 429,496,729 seconds.
• query response interval—The maximum response time inserted into the periodic general queries.
The range is 1 to 25 seconds.
• last member query interval—The maximum response time inserted into a group-specific query sent
in response to a leave group message. The range is 1 to 25 seconds.
• robustness—The degree of robustness of the network. The range is 2 to 7. This parameter allows
tuning for the expected packet loss on a link. If a link is expected to have packet loss, this parameter
can be increased.
• The group timeout is defined by the formula: group_timeout = (query_interval x robustness) +
query_response_interval, according to RFC 2236. You can explicitly define the host timeout using
the configure igmp snooping timer router_timeout host_timeout {vr
vrname} command. The effective host_timeout is the lesser value of the group_timeout and
the configured host_timeout.
Example
The following command configures the IGMP timers:
configure igmp 100 5 1 3
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Controls when the router-alert option is required for IGMPv2 and IGMPv3 packet reception and
processing.
Syntax Description
vlan Applies the configuration only to the specified VLAN. If no VLAN is
specified, the configuration applies to all VLANs.
Default
Off—All IGMP packets are received and processed.
Usage Guidelines
By default, the ExtremeXOS software receives and processes all IGMP packets, regardless of the setting
of the router-alert option within a packet. The default configuration works with all switches that support
the ExtremeXOS software.
IETF standards require that a router accept and process IGMPv2 and IGMPv3 packets only when the
router-alert option is set. The on setting for this command sets the ExtremeXOS software to comply
with the IETF standards and should be used when the switch will be used with third-party switches that
expect IETF compliant behavior.
Example
The following command configures the switch for IETF compliant IGMP packet processing:
configure igmp router-alert receive-required on
History
This command was first available in ExtremeXOS 12.5.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Controls whether the router-alert option is set when forwarding IGMPv2 and IGMPv3 packets.
Syntax Description
vlan Applies the configuration only to the specified VLAN. If no VLAN is
specified, the configuration applies to all VLANs.
Default
On—The router-alert option is set when forwarding IGMPv2 and IGMPv3 packets.
Usage Guidelines
IETF standards require that a router set the router-alert option in forwarded IGMPv2 and IGMPv3
packets. The ExtremeXOS software has been updated to comply with this requirement using the default
settings.
Earlier versions of the ExtremeXOS software forwarded all IGMP packets without setting the router-
alertoption. If compatibility issues arise, you can configure the software to use the legacy behavior by
using this command with the off option.
Example
The following command configures the switch for IETF compliant IGMP packet processing:
configure igmp router-alert transmit on
History
This command was first available in ExtremeXOS 12.5.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Selects the type of IGMP snooping filters that are installed.
Syntax Description
per-port Installs the per-port IGMP snooping filters.
per-vlan Installs the per-VLAN IGMP snooping filters.
Default
per-port.
Usage Guidelines
Use the per-vlan option when the number of VLANs configured on the switch is lower than the
maximum numbers listed in the following table. This option conserves usage of the hardware Layer 3
multicast forwarding table.
When the number of configured VLANs is larger than the maximum values listed here, select the per-
port option. Each VLAN requires additional interface hardware ACL resources. The per-port option
conserves usage of the interface hardware ACL resources.
Table 11: Maximum Number of VLANs Supported by per-VLAN IGMP Snooping Filters
ExtremeSwitching Switch Series Module Type Maximum Number of VLANs When per-VLAN
Snooping Filters are Installed
a Series 1000
c Series 2000.
e Series 448.
xl Series 2000.
The actual maximum value is smaller if other processes require entries in the interface ACL table. To
display the IGMP snooping filters configuration, use the show igmp snooping command.
Note
For MLD Snooping, the maximum number of VLANs is half of the numbers provided in this
table. The maximum number specified here is individual limit for IGMP snooping filters. If both
IGMP and MLD snooping filters are used, the maximum numbers are lower than the ones
specified.
Example
The following command configures the switch to install the per-VLAN IGMP snooping filters:
# configure igmp snooping filters per-vlan
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures certain multicast addresses to be slow path flooded within the VLAN.
Syntax Description
policy Specifies a policy file with a list of multicast addresses to be handled.
none Specifies no policy file is to be used.
vrname Specifies a virtual router.
Default
None.
Usage Guidelines
With this command, a user can configure certain multicast addresses to be slow path flooded within the
VLAN, which otherwise are fast path forwarded according to IGMP and/or Layer 3 multicast protocol.
A policy file is a text file with the extension, .pol. It can be created or edited with any text editor. The
specified policy file policy file should contain a list of addresses which determine if certain
multicast streams are to be treated specially. Typically, if the switch receives a stream with a destination
address which is in the policy file in 'permit' mode, that stream is software flooded and no
hardware entry is installed.
When adding an IP address into the policy file, a 32-bit host address is recommended.
This feature is meant to solve the multicast connectivity problem for unknown destination addresses
within system reserved ranges. Specifically this feature was introduced to solve the problem of
recognizing certain streams as control packets.
To create a policy file for the snooping flood-list, use the following template:
# This is a template for IGMP Snooping Flood-list Policy File
# Add your group addresses between "Start" and "End"
# Do not touch the rest of the file!!!!
entry igmpFlood {
if match any {
#------------------ Start of group addresses ------------------
nlri 234.1.1.1/32;
nlri 239.1.1.1/32;
#------------------- end of group addresses -------------------
}
then {
permit;
}
}
entry catch_all {
if {
}
then {
deny;
}
}
Note
The switch does not validate any IP address in the policy file used in this command. Therefore,
slow-path flooding should be used only for streams which are very infrequent, such as control
packets. It should not be used for multicast data packets. This option overrides any default
mechanism of hardware forwarding (with respect to IGMP, PIM, or DVMRP), so it should be
used with caution.
You can use the show igmp command to see the configuration of slow path flooding.
Example
The following example configures the multicast data stream specified in access1 for slow path flooding:
configure igmp snooping flood-list access1
The following command specifies that no policy file is to be used, this effectively disabling slow path
flooding:
configure igmp snooping flood-list none
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the IGMP snooping leave timeout.
Syntax Description
leave_timeout_ms Specifies an IGMP leave timeout value in milliseconds.
vlan_name Applies the configuration only to the specified VLAN. If no VLAN is
specified, the configuration applies to all VLANs.
Default
1000 ms.
Usage Guidelines
The leave-timeout is the IGMP leave override interval. If no other hosts override the IGMP leave by the
end of this interval, the receiver port is removed.
The range is 0 - 175000 ms (175 seconds). For timeout values of one second or less, you must set the
leave-timeout to a multiple– of 100 ms. For values of more than one second, you must set the leave-
timeout to a multiple of 1000 ms (one second).
Example
The following example configures the IGMP snooping leave timeout to one second:
configure igmp snooping leave-timeout 1000
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the IGMP snooping timers.
Syntax Description
router_timeout Specifies the time in seconds before removing a router snooping
entry.
host_timeout Specifies the time in seconds before removing a host’s group
snooping entry.
vrname Specifies a virtual router.
vlan_name Specifies the VLAN name. If no VLAN is specified, the setting is
applied to all existing VLANs.
Default
The router timeout default setting is 260 seconds. The host timeout setting is 260 seconds.
Usage Guidelines
Timers should be set to approximately 2.5 times the router query interval in use on the network. Specify
the following:
• router timeout—The maximum time, in seconds, that a router snooping entry can remain in the
IGMP snooping table without receiving a router report. If a report is not received, the entry is
deleted. The range is 10 to 214,748,364 seconds (6.8 years). The default setting is 260 seconds.
• host timeout—The maximum time, in seconds, that a group snooping entry can remain in the
IGMP snooping table without receiving a group report. If a report is not received, the entry is
deleted. The range is 10 to 214,748,364 seconds. The default setting is 260 seconds.
Note
The host_timeout value should be less than or equal to the query timeout value, which
is defined by the following: (query_interval x robustness) + query_response_interval.
IGMP snooping expects at least one device on every VLAN to periodically generate IGMP query
messages. Without an IGMP querier, the switch eventually stops forwarding IP multicast packets to any
port, because the IGMP snooping entries time out, based on the value specified in host_timeout or
router_timeout.
Example
The following example configures the IGMP snooping timers:
configure igmp snooping timer 600 600
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an IGMP dynamic group.
Syntax Description
vlan_name Specifies a vlan name.
portlist Specifies a port list.
grpipaddress Specifies the multicast group IP address.
Default
N/A.
Usage Guidelines
This command adds IGMP groups to specific VLANs or to ports belonging to specific VLANs. After the
groups are added, the expiration timer is started. This causes the groups to expire. The configuration is
not saved in the configuration file. The following message is displayed on execution of this command:
INFO: This command is not saved in the configuration.
Example
The following example adds a dynamic group to a switch port:
switch.111 # configure igmp snooping vlan "ixia113" ports 47 add dynamic group 225.1.1.1
Total: 1
switch.113 #
Total: 1
switch.115 #
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures VLAN ports to receive the traffic from a multicast group, even if no IGMP joins have been
received on the port.
Syntax Description
vlanname Specifies a VLAN name.
portlist Specifies one or more ports or slots and ports.
grpipaddress Specifies the multicast group IP address.
Default
N/A.
Usage Guidelines
Use this command to forward a particular multicast group to VLAN ports. In effect, this command
emulates a host on the port that has joined the multicast group. As long as the port is configured with
the static entry, multicast traffic for that multicast group is forwarded to that port.
The switch sends proxy IGMP messages in place of those generated by a real host. The proxy messages
use the VLAN IP address for source address of the messages. If the VLAN has no IP address assigned,
the proxy IGMP message uses 0.0.0.0 as the source IP address.
The multicast group should be in the class-D multicast address space, but should not be in the multicast
control subnet range (224.0.0.x/24).
If the ports also have an IGMP filter configured, the filter entries take precedence. IGMP filters are
configured using the command:
configure igmp snooping vlan vlanname ports portlist filterpolicy file
Example
The following example configures a static IGMP entry so that multicast group 225.1.1.1 is forwarded to
VLAN "marketing" on port 47:
switch.30 # configure igmp snooping marketing ports 47 add static group 225.1.1.1
Total: 1
switch.32 #
Total: 1
switch.34 #
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures VLAN ports to forward the traffic from all multicast groups, even if no IGMP joins have been
received on the port.
Syntax Description
vlanname Specifies a VLAN name.
portlist Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
Use this command to forward all multicast groups to the specified VLAN ports. In effect, this command
emulates a multicast router attached to those ports. As long as the ports are configured with the static
entry, all available multicast traffic is forwarded to those ports.
Example
The following example configures a static IGMP entry so all multicast groups are forwarded to VLAN
marketing on ports 2:1-2:4:
configure igmp snooping marketing ports 2:1-2:4 add static router
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes the port configuration that causes multicast group traffic to be forwarded, even if no IGMP
leaves have been received on the port.
Syntax Description
vlan_name Specifies a VLAN name.
port_list Specifies one or more ports or slots and ports.
ip_address Specifies the multicast group IP address.
all Delete all the static groups.
Default
N/A.
Usage Guidelines
This command is used to remove a static IGMP group entry created on a VLAN or on a port. Use this
command to remove a static group entry created by the following command:
configure igmp snooping vlan vlanname ports portlist add static group
ipaddress
Example
The following example removes a static IGMP entry that forwards the multicast group 224.34.15.37 to
the VLAN marketing on ports 2:1-2:4:
configure igmp snooping marketing ports 2:1-2:4 delete static group 224.34.15.37
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes the configuration that causes VLAN ports to forward the traffic from all multicast groups, even
if no IGMP joins have been received on the port.
Syntax Description
vlanname Specifies a VLAN name.
portlist Specifies one or more ports or slots and ports. On a SummitStack, it
can be a list of slots and ports. On a standalone switch, can be one or
more port numbers. May be in the form 1, 2, 3-5, 2:5, 2:6-2:8.
Default
N/A.
Usage Guidelines
This command is used to remove a static router port entry created on a VLAN. Use this command to
remove an entry created by the following command:
configure igmp snooping vlan vlanname ports portlist add static router
Example
The following example removes the static IGMP entry that caused all multicast groups to be forwarded
to VLAN marketing on ports 2:1-2:4:
configure igmp snooping marketing ports 2:1-2:4 delete static router
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an IGMP snooping policy file filter on VLAN ports.
Syntax Description
vlanname Specifies a VLAN name.
portlist Specifies one or more ports or slots and ports. On a SummitStack, it can be a
list of slots and ports. On a stand-alone switch, it can be one or more port
numbers. May be in the form 1, 2, 3-5, 2:5, 2:6-2:8.
policy Specifies the policy file for the filter.
Default
None.
Usage Guidelines
Use this command to filter multicast groups to the specified VLAN ports.
The policy file used by this command is a text file that contains the class-D addresses of the multicast
groups that you wish to block.
To remove IGMP snooping filtering from a port, use the none keyword version of the command.
Example
The following example configures the policy file ap_multicast to filter multicast packets forwarded to
VLAN marketing on ports 2:1-2:4:
configure igmp snooping marketing ports 2:1-2:4 filter ap_multicast
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures VLAN ports to support a maximum number of IGMP joins.
Syntax Description
vlanname Specifies a VLAN name.
portlist Specifies one or more ports or slots and ports.
num Specifies the maximum number of joins permitted on the ports. The
range is 1 to 500.
Default
No limit.
Usage Guidelines
None.
Example
The following example configures port 2:1 in the Default VLAN to support a maximum of 100 IGMP joins:
configure igmp snooping "Default" ports 2:1 set join-limit 100
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an IGMP SSM mapping.
Syntax Description
group_ip Specifies the multicast IP address for the group mapping.
prefix Specifies a prefix length for the multicast group IP address. The range
is 4 to 32.
mask Specifies the network mask for the group multicast IP address.
source_ip The IP address for a multicast group source.
src_domain_name The source domain name for the multicast group source.
vr-name Specifies a virtual router name. If the VR name is omitted, the switch
uses the VR specified by the current CLI VR context.
Default
N/A.
Usage Guidelines
IGMP SSM mapping operates only with IPv4.
Example
The following example configures an IGMP-SSM mapping for the range of multicast IP addresses at
232.1.1.0/24 originating from IP host 172.16.8.1:
configure igmp ssm-map add 232.1.1.0/24 172.16.8.1
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Unconfigures an SSM mapping.
Syntax Description
group_ip Specifies the multicast IP address for the group mapping.
prefix Specifies a prefix length for the multicast group IP address. The range
is 4 to 32.
mask Specifies the network mask for the group multicast IP address.
source_ip The IP address for a multicast group source.
all Specifies that all sources for the specified group or mask are deleted.
vr-name Specifies a virtual router name. If the VR name is omitted, the switch
uses the VR specified by the current CLI VR context.
Default
N/A.
Usage Guidelines
None.
Example
The following example deletes an IGMP-SSM mapping for the range of multicast IP addresses at
232.1.1.0/24 originating from IP host 172.16.8.1:
configure igmp ssm-map delete 232.1.1.0/24 172.16.8.1
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures PoE device detection mode for Extreme Networks PoE devices and
SummitStack. ExtremeSwitching platforms support per-port basis configuration.
Syntax Description
802.3af-only IEEE 802.3af detection only.
legacy-and-802.3af Capacitive and IEEE 802.3aqf detection.
4-point Selects 4-point detection (default).
2-point Selects 2-point detection (for extended detection signature range).
bypass No detection phase.
port_list Port list separated by a comma or - .
Default
Default is 4-point detection.
Usage Guidelines
None.
Example
# show inline-power configuration ports 1-2
Port Config Operator Limit Priority Detection Label
1 Enabled 30000 mW Low 802.3af-only
2 Enabled 30000 mW Low legacy-and-802.3af
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on:
PoE+
• ExtremeSwitching X450-G2-24p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-24p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X460-G2-24p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-16mp-32p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-24hp-10GE4—ExtremeXOS 22.2 and later.
• ExtremeSwitching X440-G2-48p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-24p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-12p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X465-48P—ExtremeXOS 30.2 and later.
• X435-8P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-24P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-8P-2T-W—ExtremeXOS 30.5 and later.
PoE++
• ExtremeSwitching X620-16p—ExtremeXOS 22.2 and later.
• ExtremeSwitching X465-24MU-24W—ExtremeXOS 30.2 and later.
• X465-48W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24MU—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465i-48W—ExtremeXOS 30.5 and later.
Description
Configures the disconnect precedence priority for the switch when a new PD is detected and the
measured inline power for that switch or specified slot is within 19 W of the switch’s or slot’s PoE power
budget.
Syntax Description
deny-port Specifies power be denied to PD requesting power, regardless of
priority.
lowest-priority Specifies power be withdrawn from lowest-priority port(s) when next
PD requesting power connects.
Default
Deny-port.
Usage Guidelines
You configure this parameter for the switch and for the entire SummitStack; you cannot configure this
per slot or per port.
If the power supplied to the PDs on a switch or specified slot exceeds the power that was budgeted for
that switch or specified slot, the system disconnects power to one or more ports to prevent power
overload.
You configure the switch to either deny power to the next PD that requests power on that switch or slot,
regardless of the priority, or to disconnect those PDs on ports with lower priorities until there is enough
power for the new PD. If you select this last argument and you did not configure port priorities or if
several ports have the same priority, the switch withdraws power (or disconnects) those ports with the
highest port number (s). For information about configuring the PoE priority for the ports, see
configure inline-power priority ports
The default value is deny-port. So, if you do not change the default value and the switch’s or slot’s
power is exceeded, the next PD requesting power will not be connected.
When the setting is lowest priority, the switch continues dropping ports with the lowest configured PoE
port priorities, or the highest port number in the case of equal PoE port priorities, until there is enough
power for the requesting PD.
From ExtremeXOS 30.2 , in ExtremeSwitching X465 series switches, when deny port is configured when
ports are given priority, priority overtakes deny port action.
Example
The following command sets the switch to withdraw power from the lowest-priority port(s):
configure inline-power disconnect-precedence lowest-priority
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on:
PoE+
• ExtremeSwitching X450-G2-24p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-24p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X460-G2-24p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-16mp-32p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-24hp-10GE4—ExtremeXOS 22.2 and later.
• ExtremeSwitching X440-G2-48p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-24p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-12p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X465-48P—ExtremeXOS 30.2 and later.
• X435-8P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-24P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-8P-2T-W—ExtremeXOS 30.5 and later.
PoE++
• ExtremeSwitching X620-16p—ExtremeXOS 22.2 and later.
• ExtremeSwitching X465-24MU-24W—ExtremeXOS 30.2 and later.
• X465-48W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24MU—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465i-48W—ExtremeXOS 30.5 and later.
Description
Lets you create your own label for a specified PoE port or group of PoE ports.
Syntax Description
string Specifies a name up to 15 characters in length to identify the specified
power port(s).
port_list Specifies one or more ports or slots and ports.
Default
No label.
Usage Guidelines
Use the show inline-power configuration ports command, as shown in the following
example, to display inline power configuration information, including the label (if any) for each port:
Example
The following command assigns the name “alpha-test_1” to port 1 on slot 4:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on:
PoE+
• ExtremeSwitching X450-G2-24p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-24p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X460-G2-24p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-GE4—ExtremeXOS 15.6 and later.
PoE++
• ExtremeSwitching X620-16p—ExtremeXOS 22.2 and later.
• ExtremeSwitching X465-24MU-24W—ExtremeXOS 30.2 and later.
• X465-48W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24MU—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465i-48W—ExtremeXOS 30.5 and later.
Description
Sets the power limit allowed for PDs connected to the specified ports.
Syntax Description
milliwatts An integer specifying the maximum allowed power in milliwatts.
port_list Specifies one or more ports or slots and ports.
Default
PoE—15,400 mW.
PoE+—30,000 mW.
Usage Guidelines
This command sets the power limit that a PD can draw on the specified ports. For PoE, the range is
3000 to 16800mW and the default value is 15400 mW. For PoE+, the range is 3,000 to 30,000 mW and
the default value is 30000 mW. For PoE++ Type 3, the range is 3,000 mW to 60,000 mW and the
default value is 60,000 mW. For PoE++ Type 4, the range is 3,000 mW to 90,000 mW and the default
value is 90,000 mW.
If the measured power for a specified port exceeds the port’s operator limit, the power is withdrawn
from that port and the port moves into a fault state.
If you try to set an operator-limit outside the accepted range, the system returns the following error
message:
Error: Invalid operator-limit value. Must be in the range of 3000-90000 mW for PoE
802.3bt port
Example
The following command sets the limit for legacy PDs on ports 3–6 of slot 5 on a SummitStack to 10000
mW:
configure inline-power operator-limit 10000 ports 5:3-5:6
History
This command was first available in ExtremeXOS 11.1.
PoE++ (Type 4) for 90W ports on ExtremeSwitching X465 (24W, 48W, 24MU-24W models) was added
in ExtremeXOS 30.2.
Platform Availability
This command is available on:
PoE+
• ExtremeSwitching X450-G2-24p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-24p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X460-G2-24p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-16mp-32p-10GE4—ExtremeXOS 15.6 and later.
PoE++
• ExtremeSwitching X620-16p—ExtremeXOS 22.2 and later.
• ExtremeSwitching X465-24MU-24W—ExtremeXOS 30.2 and later.
• X465-48W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24MU—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465i-48W—ExtremeXOS 30.5 and later.
Description
Sets the PoE priority on the specified ports.
Syntax Description
critical | high | low Sets the PoE priority for the specified ports.
port_list Specifies one or more ports or slots and ports.
Default
Low.
Usage Guidelines
The system allocates power to those ports with the highest priorities first. This command can also be
used in conjunction with the configure inline-power disconnect-precedence command.
If you configure the disconnect precedence as lowest priority, then newly detected PDs will be powered
if that port has higher priority than the existing powered ports.
If there are multiple ports at the same priority level (either configured or by default) and one of the
ports must have power withdrawn because of excessive power demands, those ports with the lower
port number are powered first. The higher port numbers have power withdrawn first in the case of
equal PoE port priorities.
Example
The following command assigns a critical PoE priority on ports 4 – 6 on slot 3 on a SummitSwitch:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on:
PoE+
• ExtremeSwitching X450-G2-24p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-24p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X460-G2-24p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-16mp-32p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-24hp-10GE4—ExtremeXOS 22.2 and later.
• ExtremeSwitching X440-G2-48p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-24p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-12p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X465-48P—ExtremeXOS 30.2 and later.
• X435-8P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-24P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-8P-2T-W—ExtremeXOS 30.5 and later.
PoE++
• ExtremeSwitching X620-16p—ExtremeXOS 22.2 and later.
• ExtremeSwitching X465-24MU-24W—ExtremeXOS 30.2 and later.
• X465-48W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24MU—ExtremeXOS 30.2 and later.
Description
Sets the inline power usage SNMP event threshold.
Syntax Description
threshold Specifies the percentage of budgeted power used on any PoE switch that
causes the system to send an SNMP event and create a log message. The
range 1 to 99; the default value is 70.
Default
70.
Usage Guidelines
This command sets the threshold for generating an SNMP event and an EMS message. On a
SummitStack, this threshold is when the measured power for a PoE module compared to the budgeted
power for that slot exceeds a certain value. On stand-alone switches, this threshold applies to the total
power available to the entire switch. The configured threshold value initiates the event and message
once that percentage of the budgeted power is being used.
The system generates an additional SNMP event and EMS message once the power usage falls below
the threshold again; once the condition clears.
Example
The following command sets the inline power usage alarm threshold at 75%:
configure inline-power usage-threshold 75
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on:
PoE+
• ExtremeSwitching X450-G2-24p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-24p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X450-G2-48p-10GE4—ExtremeXOS 16.1 and later.
• ExtremeSwitching X460-G2-24p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-48p-GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-16mp-32p-10GE4—ExtremeXOS 15.6 and later.
• ExtremeSwitching X460-G2-24p-24hp-10GE4—ExtremeXOS 22.2 and later.
• ExtremeSwitching X440-G2-48p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-24p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X440-G2-12p-10GE4—ExtremeXOS 21.1 and later.
• ExtremeSwitching X465-48P—ExtremeXOS 30.2 and later.
• X435-8P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-24P-4S—ExtremeXOS 30.5 and later.
• ExtremeSwitching X435-8P-2T-W—ExtremeXOS 30.5 and later.
PoE++
• ExtremeSwitching X620-16p—ExtremeXOS 22.2 and later.
• ExtremeSwitching X465-24MU-24W—ExtremeXOS 30.2 and later.
• X465-48W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24MU—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465-24W—ExtremeXOS 30.2 and later.
• ExtremeSwitching X465i-48W—ExtremeXOS 30.5 and later.
Description
Configures the switch to respond to ARP requests on behalf of devices that are incapable of doing so.
Syntax Description
ipNetmask Specifies an IP address/mask length.
ip_addr Specifies an IP address.
mask Specifies a subnet mask.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
When mask is not specified, an address with the mask 255.255.255.255 is assumed. When neither mac
nor vrrp is specified, the MAC address of the switch is used in the ARP response. When always is
specified, the switch answers ARP requests without filtering requests that belong to the same subnet of
the receiving router interface.
After IP ARP is configured, the system responds to ARP requests on behalf of the device as long as the
following conditions are satisfied:
• The valid IP ARP request is received on a router interface.
• The target IP address matches the IP address configured in the proxy ARP table.
• The source IP address is not on the same subnet as the target address (unless the always flag is set).
After all the proxy ARP conditions have been met, the switch formulates an ARP response using the
configured MAC address in the packet.
The default maximum number of proxy entries is 256, but can be increased to 4096 by using the
following command:
configure iparp max_proxy_entries max_proxy_entries
Example
The following example configures the switch to answer ARP requests for all devices with the address
range of 100.101.45.1 to 100.101.45.255:
configure iparp add proxy 100.101.45.0/24
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a permanent entry to the ARP table. You must specify the IP address and MAC address of the
entry.
Syntax Description
ip_addr Specifies an IP address.
vr_name Specifies a VR name.
mac Specifies a MAC address.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
None.
Example
The following example adds a permanent IP ARP entry to the switch for IP address 10.1.2.5:
configure iparp add 10.1.2.5 00:11:22:33:44:55
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or all proxy ARP entries.
Syntax Description
ipNetmask Specifies an IP address/mask length.
ip_addr Specifies an IP address.
mask Specifies a subnet mask.
vr_name Specifies a VR name.
all Specifies all ARP entries.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
When the mask is not specified, the software assumes a host address (that is, a 32-bit mask).
Example
The following command deletes the IP ARP proxy entry 100.101.45.0/24:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an entry from the ARP table.
Syntax Description
ip_addr Specifies an IP address.
vr_name Specifies a VR name.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
Removes any IP ARP entry (dynamic or permanent) from the table. You must specify the IP address of
the entry to delete the entry.
Example
The following command deletes an IP address entry from the ARP table:
configure iparp delete 10.1.2.5
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command improves IP convergence for IP traffic.
Syntax Description
on Fast-convergence on.
off Fast-convergence off (default).
Default
Off.
Usage Guidelines
Use this command for quick recovery when running IP traffic over an EAPS ring.
Example
The following example shows output from the configure ip-arp fast-convergence on command:
# show iparp
VR Destination Mac Age Static VLAN VID Port
VR-Default 10.109.1.2 00:04:96:52:2b:16 0 NO box1-box2 950 3
VR-Default 10.109.1.6 00:04:96:52:2a:f2 0 NO box1-box3 951 1
Dynamic Entries : 2 Static Entries : 0
Pending Entries : 0
In Request : 1 In Response : 1
Out Request : 1 Out Response : 1
Failed Requests : 0
Proxy Answered : 0
Rx Error : 0 Dup IP Addr : 0.0.0.0
Rejected Count : Rejected IP :
Rejected Port : Rejected I/F :
Max ARP entries : 8192 Max ARP pending entries : 256
ARP address check: Enabled ARP refresh : Enabled
Timeout : 20 minutes ARP Sender-Mac Learning : Disabled
Locktime : 1000 milliseconds
Retransmit Time : 1000 milliseconds
Reachable Time : 900000 milliseconds (Auto)
Fast Convergence : Off
# show iparp
VR Destination Mac Age Static VLAN VID Port
VR-Default 10.109.1.2 00:04:96:52:2b:16 1 NO box1-box2 950 3
VR-Default 10.109.1.6 00:04:96:52:2a:f2 1 NO box1-box3 951 1
Dynamic Entries : 2 Static Entries : 0
Pending Entries : 0
In Request : 1 In Response : 1
Out Request : 1 Out Response : 1
Failed Requests : 0
Proxy Answered : 0
Rx Error : 0 Dup IP Addr : 0.0.0.0
Rejected Count : Rejected IP :
Rejected Port : Rejected I/F :
Max ARP entries : 8192 Max ARP pending entries : 256
ARP address check: Enabled ARP refresh : Enabled
Timeout : 20 minutes ARP Sender-Mac Learning : Disabled
Locktime : 1000 milliseconds
Retransmit Time : 1000 milliseconds
Reachable Time : 900000 milliseconds (Auto)
Fast Convergence : On
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets the time before a new entry can replace an old entry in the Address Resolution Protocol (ARP)
table.
Syntax Description
vr Specifies setting a VR or VRF.
vr_name Specifies the name of the VR or VRF.
locktime Specifies setting a time before a new entry can replace an old entry.
locktime Sets locktime value (range 0–30,000 milliseconds). Default 1,000
milliseconds.
Default
The default locktime is 1,000 milliseconds.
Example
The following example sets the locktime to 5,000 milliseconds:
configure iparp locktime 5000
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum allowed IP ARP entries.
Syntax Description
max_entries Specifies the maximum number of IP ARP entries. The range is 1 to x,
where x is the number listed for the appropriate platform in table
below.
Default
The default value is 12,288, which is the combined value for all VRs, since VR-based maximum entries is
not supported starting with ExtremeXOS 30.1.
Usage Guidelines
The maximum IP ARP entries include dynamic, static, and incomplete IP ARP entries. The range for the
max_entries parameter is 1 to x, where x is the number listed for the appropriate platform in the
following table.
Starting with ExtremeXOS 30.1, the maximum configurable limit for IP ARP maximum entries is 157,696
for all platforms. A message appears if the configured value exceeds the theoretical hardware maximum
limit depending on the platform.
Example
The following example sets the maximum IP ARP entries to 2000 entries:
configure iparp max_entries 2000
History
This command was first available in ExtremeXOS 10.1.
Support for up to 32,768 ARP entries was first available in ExtremeXOS 12.4.
Per virtual router capability deprecated and the maximum configurable limit changed to 157, 696 in
ExtremeXOS 30.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum allowed incomplete IP ARP entries.
Syntax Description
max_pending_entries Specifies a number of maximum IP ARP entries.
Default
256.
Usage Guidelines
Range: 1–4,096.
Example
The following example sets the maximum pending IP ARP entries to 500 entries:
configure iparp max_pending_entries 500
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum allowed IP ARP proxy entries.
Syntax Description
max_proxy_entries Specifies maximum number of IP ARP proxy entries.
Default
256.
Usage Guidelines
Range: 0–4,096.
Example
The following example sets the maximum IP ARP proxy entries to 500 entries:
configure iparp max_proxy_entries 500
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures whether the switch replies to ARP requests on the specified VLAN by proxy ARP if the route
to the IP address is reachable, or only if proxy ARP entries have been created.
Syntax Description
vlan Selects VLAN(s) for the ARP requests.
vlan_name Specifies VLAN name for the ARP requests.
all Specifies all VLANs for the ARP requests.
reachable Specifies that the switch replies to ARP requests on the specified
VLAN(s) by proxy ARP if the route to IP address is reachable.
Configuration of proxy ARP entries is not required.
entry-required Specifies that the switch replies to ARP requests on the specified
VLAN(s) by proxy ARP only if proxy ARP entries have been created.
(Default)
Default
The default behavior is for the switch to reply to ARP requests on the specified VLAN(s) by proxy ARP
only if proxy ARP entries have been created.
Usage Guidelines
If an ARP request is received by the switch, it checks the ExtremeXOS proxy ARP table (user adds the
entries through the CLI). If it is present, an ARP reply is sent. If not present, it searches for the entry in
the kernel route table. If this IP address is reachable, then the ARP reply is sent.
reachable entry-required
(or command not configured)
Entry present in proxy ARP Table Reply to ARP request Reply to ARP request
(static entry added through
command configure iparp add on
page 584)
Static entry not present in proxy ARP Reply to ARP request if route is No reply to ARP request
table reachable
No static entry, but route reachable. Reply to ARP request
No static entry and route is not No reply to ARP request
reachable
Static entry present and route is Reply to ARP request
reachable
No static entry and route is not No reply to ARP request
reachable
Route reachable Reply to ARP request
Route not reachable No reply to ARP request
Example
The following example configures the switch to reply to ARP requests on all VLANs by proxy ARP if the
route to IP address is reachable:
configure iparp proxy vlan all reachable
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets the value for Address Resolution Protocol (ARP) reachable time
Syntax Description
reachable-time Specifies setting the ARP reachable time.
reachable_time Sets the value for the ARP reachable time (range is 1–1,474,515,000
milliseconds or 1–1,474,515 seconds).
auto Specifies having the ARP reachable time set automatically to 3/4 of
the configured ARP timeout (default).
milliseconds When setting the reachable time value, specifies milliseconds as the
time unit (range is 1–1,474,515,000).
seconds When setting the reachable time value, specifies seconds (range is 1–
1,474,515) as the time unit (default).
Default
The default setting is for the reachable time to be set automatically to 3/4 of the configured ARP
timeout. If you set the time manually, the default unit of measure for the value is seconds.
Example
The following example sets the reachable time to 500,000 seconds:
configure iparp reachable-time 500000 seconds
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets the value for Address Resolution Protocol (ARP) retransmit time
Syntax Description
retransmit-time Specifies setting the retransmit time.
retransmit_time Sets the retransmit time value (range is 1–4,294,967 seconds or 1–
4,294,967,295 milliseconds). Default is 1 second.
milliseconds When setting the retransmit time value, specifies milliseconds as the
time unit (range is 1–4,294,967,295).
seconds When setting the retransmit time value, specifies seconds (range is 1–
4,294,967) as the time unit (default).
Default
The default setting for the retransmit time is 1 second. The default unit of measure is seconds.
Example
The following example sets the retransmit time to 500,000 seconds:
configure iparp retransmit-time 500000 seconds
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the IP ARP timeout period.
Syntax Description
vr_name Specifies which VR or VRF IP ARP setting to change.
minutes Specifies a time in minutes.
Default
20 minutes.
Usage Guidelines
The range is 0-32,767. A setting of 0 disables timeout.
When the switch learns an ARP entry, it begins the timeout for that entry. When the timer reaches 0,
the entry is aged out, unless IP ARP refresh is enabled. If ARP refresh is enabled, the switch sends an
ARP request for the address before the timer expires. If the switch receives a response, it resets the
timer for that address.
Newly configured ARP timeout values apply only to ARP entries that are learned after the new value is
set. Previously learned ARP entries timeout after the previously configured time.
Example
The following command sets the IP ARP timeout period to 10 minutes:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an observation domain ID.
Syntax Description
domain_id Specifies a decimal integer.
Default
Domain 0.
Usage Guidelines
Use this command to set an observation domain ID that is used in the flow records sent to the collector.
The collector can then use this ID to correlate records to their origin.
Example
The following command configures a domain ID of 4 for the switch:
# configure ip-fix domain 4
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configures the settings for the flow key(s) for IPv4.
Syntax Description
src-ip Specifies the source IP address field as part of the flow key.
src-port Specifies the L4 source port field as part of the flow key.
dest-ip Specifies the destination IP address field as part of the flow key.
dest-port Specifies the L4 destination port field as part of the flow key.
protocol Specifies the L4 protocol field as part of the flow key.
tos Specifies the type of service field as part of the flow key.
Default
All flow keys.
Usage Guidelines
Use this command to specify which of the designated flow-keys to use. This overrides the default which
is all keys. The template sent to the Collector (per the IPFIX standard) contains only the keys used. Then,
on a per port basis, you can define masks for the IPv4 source and destination address fields, for
instance, to aggregate flows based on subnets. (see configure ip-fix ports flow-key ipv4
mask ipaddress)
The size of the field (in bits) for each key is as follows:
• Source IP Address (32).
• Destination IP Address (32).
Example
The following command configures IPv4 traffic to use the source IP address and L4 protocol:
# configure ip-fix flow-key ipv4 src-ip protocol
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configures the settings for the flow key(s) for IPv6.
Syntax Description
src-ip Specifies the source IP address field as part of the flow key.
src-port Specifies the L4 source port field as part of the flow key.
dest-ip Specifies the destination IP address field as part of the flow key.
dest-port Specifies the L4 destination port field as part of the flow key.
next-hdr Specifies the next header field as part of the flow key.
tos Specifies type of service field as part of the flow key.
flow-label Specifies IPv6 flow-label field as part of the flow key.
Default
All flow keys.
Usage Guidelines
Use this command to specify which of the designated flow-keys to use. This overrides the default which
is all keys. The template sent to the Collector (per the IPFIX standard) contains only the keys used. Then,
on a per port basis, you can define masks for the IPv6 source and destination address fields, for
instance, to aggregate flows based on subnets.
The size of the field (in bits) for each key is as follows:
• Source IP Address (128).
• Destination IP Address (128).
• L4 Source Port (16).
• L4 Destination Port (16).
• Next Header (8).
• IPv6 Flow Label (20).
• TOS (DSCP + ECN) (8).
To display the configured flow keys, use the show ip-fix command.
Example
The following command configures IPv6 traffic to use the destination IP address and next header:
# configure ip-fix flow-key ipv6 dest-ip next-hdr
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configures the settings for the flow key(s) for non-IP type data.
Syntax Description
src-mac Specifies the source MAC address field as part of the flow key.
dest-mac Specifies the destination MAC address field as part of the flow key.
Default
All flow keys.
Usage Guidelines
Use this command to specify which of the designated flow-keys to use. This overrides the default which
is all keys. The template sent to the Collector (per the IPFIX standard) contains only the keys used.
The size of the field (in bits) for each key is as follows:
• Source MAC Address (48).
• Destination MAC Address (48).
• Ethertype (16).
• VLAN ID (12).
• VLAN Priority (3).
• VLAN Tagged (1).
To display the configured flow keys, use the show ip-fix command.
Example
The following command configures non-IP traffic to use the source MAC address and VLAN ID:
# configure ip-fix flow-key src-mac vlan-id
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Identifies the collector and how communication with it is handled.
Syntax Description
ipaddress Specifies the IP address.
sctp Specifies SCTP.
tcp Specifies TCP.
udp Specifies UDP. This is the default.
portno Specifies the number of an L4 port. The default is 4739.
vrname Specifies a VR.
Default
The protocol field will default to UDP. The L4-port field will default to 4739. The VR field will default to
VR-Mgmt.
Usage Guidelines
Use this command to specify the IP address, port number, transport protocol and VR for a collector.
Example
The following command specifies a collector with an IP address of 1.1.1.1, and transport protocol of TCP:
# configure ip-fix ip-address 1.1.1.1 protocol tcp
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Defines masks for the IPv4 source and destination address flow keys.
Syntax Description
port_list Specifies the ports.
source Specifies a source IP address.
destination Specifies a destination IP address.
value Specifies the IP address mask (in standard format).
Default
N/A.
Usage Guidelines
Use this command to define masks for the IPv4 source and destination address flow keys on a per port
basis. For example, this can be used to minimize the information sent to the collector and aggregate
flows.
Example
The following command defines a mask for source IP address flow key 255.255.0.0 on port 21:
3 configure ip-fix ports 21 flow-key ipv4 mask source ipaddress 255.255.255.0
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Defines masks for the IPv6 source and destination address flow keys.
Syntax Description
port_list Specifies the ports.
source Specifies a source IP address.
destination Specifies a destination IP address.
value Specifies the IP address mask (in standard format).
Default
N/A.
Usage Guidelines
Use this command to define masks for the IPv6 source and destination address flow keys on a per port
basis. For example, this can be used to minimize the information sent to the collector and aggregate
flows.
Example
The following command defines a mask for the source IP address flow key ff::0 on port 21:
# configure ip-fix ports 21 flow-key ipv6 mask source ipaddress ff::0
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configures metering on all, dropped only, or non dropped traffic.
Syntax Description
port_list Specifies the ports.
all Specifies all packets.
dropped-only Specifies only dropped packets.
non-dropped Specifies only non-dropped packets.
Default
All.
Usage Guidelines
Use this command to configure metering on all packets, only dropped packets, or only non-dropped
packets.
Example
The following command configures metering dropped packets only:
# configure ip-fix ports 2:1 record dropped-only
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configures metering on ingress and/or egress ports.
Syntax Description
port_list Specifies the ports.
ingress Specifies ingress ports only.
egress Specifies egress ports only.
ingress-and-egress Specifies both ingress and egress ports.
Default
Ingress.
Usage Guidelines
Use this command to configure metering on ingress and/or egress ports.
Example
The following command configures metering on port 2 egress:
# configure ip-fix ports 2 egress
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configures the source IP address used to communicate to the collector.
Syntax Description
ipaddress Specifies the source IP address to be used in IPFIX packets.
vrname Specifies a virtual router name.
Default
Switch IP address of the interface the traffic egresses.
Usage Guidelines
Use this command to specify the source IP address and VR to use when sending from the switch to a
given collector. Otherwise, the default is used.
To reset to the default of the switch IP address, use the unconfigure ip-fix ip-address
command.
Example
The following command configures an IP address of 1.1.1.1 and VR of finance:
# configure ip-fix source ip-address 1.1.1.1 finance
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configures whether IP forwarding must be enabled on a VLAN before transmitting IP packets originated
by the switch on that VLAN to a gateway.
Syntax Description
require-ipforwarding Specifies that IP forwarding must be enabled on a VLAN before IP
packets that originate on the switch can be transmitted to a gateway.
dont-require- Specifies that all IP packets that originate on the switch can be
ipforwarding transmitted, regardless of the IP forwarding configuration to the
gateway.
Default
dont-require-ipforwarding.
Usage Guidelines
To display the current setting for this command, use the show ipconfig command.
Example
The following command configures the switch to transmit switch-originated packets to gateways only
on those VLANs for which IP forwarding is enabled:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
configure ipmcforwarding
configure ipmcforwarding to-cpu [auto | off] ports port_list
Description
Configure whether IP multicast CPU filters are installed automatically.
Syntax Description
auto The software will automatically program IP multicast processing
based on configuration.
off IP multicast packets received on this port are always flooded with no
CPU processing.
port_list Specifies on or more ports.
Default
N/A.
Usage Guidelines
IP forwarding and IPMC forwarding must be enabled for the configuration to operate.
Example
The following example configures automatic operation for port 2.1:
configure ipmcforwarding to-cpu auto ports 2.1
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a static multicast route to the multicast routing table.
Syntax Description
default Specifies default gateway.
source-net Specifies an IP address/mask length.
mask-len Mask length for the IP multicast source's subnet. Range is [1-32].
mask Specifies a subnet mask.
protocol Unicast routing protocol that is to be used for route learning.
rpf-address Next hop through which the multicast source can be reached.
metric Specifies a cost metric.
vr-name Specifies the virtual router to which the route is added.
Default
The following defaults apply:
• metric—1
• vr-name—VR of the current CLI context
• protocol—none
Usage Guidelines
This command allows you to statically configure where multicast sources are located (even though the
unicast routing table has different entries). It allows you to configure a multicast static route in such a
way as to have non-congruent topology for Unicast and Multicast topology and traffic.
Example
The following example configures a multicast static route for all multicast sources within network
subnet 192.168.0.0/16. Those sources are reachable through the gateway 192.75.0.91.
configure ipmroute add 192.168.0.0/16 192.75.0.91
The following example configures multicast static route for all sources via a single gateway with a
metric of 100:
configure ipmroute add 0.0.0.0/0 192.75.0.91 100
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a static multicast address from the multicast routing table.
Syntax Description
default Specifies default gateway.
source-net Specifies an IP address/mask length.
mask-len Mask length for the IP multicast source's subnet. Range is 1–32.
mask Specifies a subnet mask.
protocol Unicast routing protocol that is to be used for route learning.
rpf-address Next hop through which the multicast source can be reached.
vr-name Specifies the virtual router to which the route is added.
Default
vr-name is the VR of the current CLI context.
Usage Guidelines
This command allows you to delete an existing multicast static route. It allows you to configure
congruent topology for unicast and multicast packets and traffic.
Example
The following example deletes a multicast static route:
configure ipmroute delete 192.168.0.0/16 192.75.0.91
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Sets the maximum transmission unit (MTU) for the VLAN.
Syntax Description
mtu Specifies the IP maximum transmission unit (MTU) value. Range is
from 1500 to 9194. However, CLI will allow the maximum limit upto
9216 considering port configuration such as tagging which influences
L2 Header size. But the values greater than 9194 may lead to packet
loss and hence not recommended.
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
Default
The default IP MTU size is 1500.
Usage Guidelines
Use this command to enable jumbo frame support or for IP fragmentation with jumbo frames. Jumbo
frames are Ethernet frames that are larger than 1522 bytes, including 4 bytes used for CRC. Both
endstations involved in the transfer must be capable of supporting jumbo frames. The switch does not
perform IP fragmentation or participate in MTU negotiation on behalf of devices that do not support
jumbo frames.
When enabling jumbo frames and setting the MTU size for the VLAN, keep in mind that some network
interface cards (NICs) have a configured maximum MTU size that does not include the additional 4bytes
of CRC included in a jumbo frame configuration. Ensure that the NIC maximum MTU is at or below the
maximum MTU size configured on the switch. Frames that are larger than the MTU size configured on
the switch are dropped at the ingress port.
If you use IP fragmentation with jumbo frames and you want to set the MTU size greater than 1500, all
ports in the VLAN must have jumbo frames enabled.
Example
The following example sets the MTU size to 2000 for VLAN sales:
configure ip-mtu 2000 vlan sales
History
This command was available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a default blackhole route to the routing table. All traffic destined for an unknown IP destination is
silently dropped, and no ICMP (Internet Control Message Protocol) message is generated.
Syntax Description
multicast Adds the default blackhole route to the multicast routing table.
multicast-only Adds the default blackhole route to the multicast routing table. This
option is provided for backward compatibility with releases prior to
ExtremeXOS Release 12.1.
unicast Adds the default blackhole route to the unicast routing table.
unicast-only Adds the default blackhole route to the unicast routing table. This
option is provided for backward compatibility with releases prior to
ExtremeXOS Release 12.1.
vrname Specifies the VR or VRF to which the route is added.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
While a default route is for forwarding traffic destined to an unknown IP destination, and a blackhole
route is for discarding traffic destined to a specified IP destination, a default blackhole route is for
discarding traffic to the unknown IP destination.
The default blackhole route is treated like a permanent entry in the event of a switch reset or power
off/on cycle. The default blackhole route’s origin is "b" or "blackhole" and the gateway IP address for
this route is 0.0.0.0.
Example
The following example adds a blackhole default route into the routing table:
configure iproute add blackhole default
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a default blackhole route to the routing table. All traffic destined for an unknown IPv6 destination
is silently dropped.
Syntax Description
vr_name Specifies the VR or VRF to which the route is added.
multicast-only Specifies only multicast traffic for the route.
unicast-only Specifies only unicast traffic for the route.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
While a default route is for forwarding traffic destined to an unknown IPv6 destination, and a blackhole
route is for discarding traffic destined to a specified IPv6 destination, a default blackhole route is for
discarding traffic to the unknown IPv6 destination.
The default blackhole route is treated like a permanent entry in the event of a switch reset or power
off/on cycle. The default blackhole route’s origin is "b" or "blackhole" and the gateway IPv6 address for
this route is ::.
The packets are silently discarded. In other words, no ICMP message is sent to indicate that the packets
are discarded.
Example
The following example adds a blackhole default route into the routing table:
configure iproute add blackhole ipv6 default
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a blackhole address to the routing table. All traffic destined for an unknown IPv6 destination is
silently dropped.
Syntax Description
ipv6Netmask Specifies an IPv6 address/prefix length.
vr_name Specifies the VR or VRF to which the route is added.
multicast-only Specifies only multicast traffic for the route.
unicast-only Specifies only unicast traffic for the route.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
A blackhole entry directs packets with a matching specified address prefix to be discarded. Blackhole
entries are useful as a security measure or in special circumstances where a specific destination address
must be discarded. Blackhole entries are treated like permanent entries in the event of a switch reset or
power off/on cycle.
The packets are silently discarded. In other words, no ICMP message is sent to indicate that the packets
are discarded.
Example
The following example causes packets with a destination address of 2001:db8::3452 to be silently
discarded:
configure iproute add blackhole 2001:db8::3452/128
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a default gateway to the routing table.
Syntax Description
gateway Specifies a gateway IPv4 address.
ipv6Gateway Specifies a VLAN gateway IPv6 address.
ipv6ScopedGateway Specifies a scoped gateway.
bfd Enables Bidirectional Forwarding Detection (BFD) protection for the
route.
Default
If no metric is specified, the default metric of 1 is used. If you do not specify a VR or VRF, the current VR
context is used.
Usage Guidelines
Default routes are used when the router has no other dynamic or static route to the requested
destination. A default gateway must be located on a configured IPv6 interface. Use the unicast-only or
multicast-only options to specify a particular traffic type. If not specified, both unicast and multicast
traffic uses the default route.
Example
The following example configures a default route for the switch:
configure iproute add default 2001:db8::1234:5678
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a static route to the specified routing table.
Syntax Description
ipNetmask Specifies an IP address/mask length.
ip_addr Specifies an IP address.
mask Specifies a subnet mask.
gateway Specifies a gateway IP address.
bfd Enables Bidirectional Forwarding Detection (BFD) protection for the
route.
multicast-only Adds the specified route to the multicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS release 12.1.
unicast Adds the specified route to the unicast routing table.
unicast-only Adds the specified route to the unicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS Release 12.1.
vlan Specifies the egress VLAN name used for an Inter-VR route.
vrname Specifies the VR or VRF to which the route is added.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
Use a mask value of 255.255.255.255 to indicate a host entry.
The gateway address must be present on a directly attached subnet, or the following message appears:
ERROR: Gateway is not on directly attached subnet
The gateway address must be different from loop back address or local addresses, or the following
message appears:
ERROR: Gateway cannot be local or loop back address
Note
Although dynamic unicast routes can be captured in the multicast routing table, unicast static
routes cannot be captured in the multicast routing table. To create a static route for the
multicast routing table, you must specify the multicast option.
This command can add BFD protection to a link only when the BFD client at each end of the link is
enabled (see the configure iproute add (IPv4) command).
Once the BFD session is established, the operational status of the route reflects the operational status
of the BFD session.
To remove BFD protection for a static route, enter this command without the BFD keyword.
Beginning in ExtremeXOS 15.6, the egress VLAN name may now be a VLAN belonging to a VR different
from the VR of the static route itself. When the VRs differ, Inter-VR routing of hardware and software
forwarded packets is performed.
Example
The following example adds a static address to the routing table in the current VR context:
configure iproute add 10.1.1.0/24 123.45.67.1
In the following example of an Inter-VR routing scenario, VLAN v1 belongs to VR vr1, and VLAN v2
belongs to VR vr2. The final two commands add Inter-VR routes between VR vr1 and VR vr2. The
resulting behavior is that IPv4 unicast packets originating in VR vr1, and a destination IP address in
subnet 52.0.0.0/8, are forwarded to gateway 20.1.1.2 belonging to VLAN v2 in VR vr2 per the first Inter-
VR route. Reverse packets originating in VR vr2 with a destination IP address in subnet 51.0.0.0/8 are
forwarded to gateway 10.1.1.2 belonging to VLAN v1 in VR vr1 per the second Inter-VR route. The vr
vr_name of the static route command refers to which VR's route table the route is added.
create vr "vr1"
create vr "vr2"
create vlan "v1" vr vr1
create vlan "v2" vr vr2
configure vlan v1 tag 10
configure vlan v2 tag 20
configure vlan v1 add ports 1 tagged
configure vlan v2 add ports 2 tagged
configure vlan v1 ipaddress 10.1.1.1/8
configure vlan v2 ipaddress 20.1.1.1/8
enable ipforwarding vlan v1
enable ipforwarding vlan v2
The Inter-VR routing example above is for packets routed through a gateway to a remote subnet. Inter-
VR routing can also be accomplished to/from a host adjacent to the switch, such as hosts in the switch’s
IPv4 ARP cache, by adding a /32 host route. In the example network above, to have packets from VR1
route to a host/server in VR2 directly on the 20.1.1.1/8 subnet, such as 20.1.1.66, the following CLI
command can be used by specifying 20.1.1.66/32:
configure iproute add 20.1.1.66/32 20.1.1.66 vlan v2 vr vr1
History
This command was first available in ExtremeXOS 10.1.
Beginning in ExtremeXOS 15.6, the egress VLAN name may now be a VLAN belonging to a VR different
from the VR of the static route itself.
Platform Availability
This command is available on all platforms with Layer 3 support.
Description
Adds an IPv6 static route to the routing table.
Syntax Description
ipv6Netmask Specifies an IPv6 address/prefix length.
ipv6Gateway Specifies a gateway.
ipv6ScopedGateway Specifies a scoped gateway.
bfd Enables Bidirectional Forwarding Detection (BFD) protection for the
IPv6 route.
metric Specifies a cost metric.
vr_name Specifies the VR or VRF to which the route is added.
multicast Adds the specified route to the multicast routing table.
multicast-only Adds the specified route to the multicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS release 12.1.
unicast Adds the specified route to the unicast routing table.
unicast-only Adds the specified route to the unicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS release 12.1.
Default
If you do not specify a VR or VRF, the current VR context is used. If you do not specify a metric, then
the default metric of 1 is used.
Usage Guidelines
Use a prefix length of 128 to indicate a host entry.
Note
Although dynamic unicast routes can be captured in the multicast routing table, unicast static
routes cannot be captured in the multicast routing table. To create a static route for the
multicast routing table, you must specify the multicast option.
Example
The following example adds a static route to the routing table:
configure iproute add 2001:db8:0:1111::/64 fe80::1111%default
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Assigns a specific IP route to use a named LSP.
Note
To create a static IP route that does not use a specific named LSP as an mpls-next-hop, use
the following command: configure iproute add [ipNetmask | ip_addr mask]
gateway {metric} {multicast | multicast-only | unicast | unicast-
only} {vr vrname} .
Syntax Description
ipaddress Specified an IP address.
netmask Specifies an IP address/prefix length.
ipNetmask Specifies an IP address/prefix length.
lsp_name Specifies a named MPLS LSP to be used to reach the route.
metric Specifies a cost metric.
multicast Adds the specified route to the multicast routing table.
multicast-only Adds the specified route to the multicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS Release 12.1.
unicast Adds the specified route to the unicast routing table.
unicast-only Adds the specified route to the unicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS release 12.1.
vrname Specifies the virtual router to which the route is added.
Default
N/A.
Usage Guidelines
This command assigns a named LSP to a specific IP route. Once configured, all IP traffic matching the
configured route is forwarded over the specified LSP. For an RSVP-TE LSP, the correct label information
is only associated with the route if the LSP is active. If the RSVP-TE LSP is disabled or is withdrawn, the
label information is removed from the route table and the route entry is marked down. If multiple LSPs
are added to a route and ECMP is enabled using route-sharing command, only one LSP is used to
forward IP traffic.
Note
IP routes can only be assigned to named LSPs in the VR in which MPLS is configured to
operate.
Example
The following command adds a static address to the routing table:
configure iproute add 10.1.1.0/24 lsp lsp598
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Adds a static route to the routing table.
Syntax Description
ipNetmask Specifies an IP address/mask length.
ip_addr Specifies an IP address.
mask Specifies a subnet mask.
gateway Specifies a VLAN gateway.
bfd Enables Bidirectional Forwarding Detection (BFD) protection for the
IPv6 route.
metric Specifies a cost metric.
vrname Specifies the virtual router to which the route is added.
multicast Adds the specified route to the multicast routing table.
multicast-only Adds the specified route to the multicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS 12.1.
unicast Adds the specified route to the unicast routing table.
unicast-only Adds the specified route to the unicast routing table. This option is
provided for backward compatibility with releases prior to
ExtremeXOS 12.1.
Default
If you do not specify a virtual router, the current virtual router context is used.
Usage Guidelines
Use a mask value of 255.255.255.255 to indicate a host entry.
Note
Although dynamic unicast routes can be captured in the multicast routing table, unicast static
routes cannot be captured in the multicast routing table. To create a static route for the
multicast routing table, you must specify the multicast option.
Example
The following example adds a static address to the multicast routing table:
configure iproute add 10.1.1.0/24 123.45.67.1 5 multicast
History
This command was first available in ExtremeXOS 10.1.
The multicast and unicast keywords were first available in ExtremeXOS 12.1. These keywords
replace multicast-only and unicast-only, which remain in the software for backward
compatibility.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures protection and resiliency on IPv4 and IPv6 static routes.
Syntax Description
default Default route.
ipv4_or_ipv6_network IPv4 or IPv6 network address.
gateway Gateway IP address.
protection Selects the type of protection on this route (default is none).
bfd Enables BFD protection on this route.
ping Enables ICMP ping protection on this route.
none Disables all protection on this route (default).
Default
No protection is the default.
Usage Guidelines
For static routes configured with protection type ping, static routes are initially down. Static routes
become "up" for each configured gateway/device IP when a timely ICMP Echo Reply is received from
that IP within the configured ping interval. Static routes transition from up to down when no timely
reply is received for the configured number of missed intervals. Severely delayed ICMP Echo Replies are
ignored if received after the configured interval time elapses, because a new ICMP Echo Request has
already been sent. Static routes with ping protection need not be ECMP routes. Thus when a device is
unresponsive, a different route with a higher cost or shorter prefix length can route packets elsewhere.
The protection type (BFD, ping, or none) for an existing static route can be changed dynamically
without deleting the route. To change the protection type, simply re-add an existing static route with a
different protection type.
Example
The following example adds a static route for 100.0.0.0/24 with ping health check monitoring to
gateway IP 1.2.3.4.
configure iproute add 100.0.0.0/24 1.2.3.4 protection ping
ExtremeXOS initiates ping health check monitoring to the adjacent device with IP address 1.2.3.4. The
route for 100.0.0.0/24 is protected, meaning if ping responses are received from 1.2.3.4 in a timely
manner, the static route for 100.0.0.0/24 to 1.2.3.4 is “up” in the routing table. If no ping response is
received in a timely manner, the route is down.
If ping responses are received by both 1.2.3.4 and 1.2.3.5, IP packets destined to subnet 100.0.0.0/24 are
Layer-3 load balanced by hardware between 1.2.3.4 and 1.2.3.5. If for example, no ping response is
received from 1.2.3.4 in a timely manner, IP packets destined to 100.0.0.0/24 are sent only to 1.2.3.5.
Later, upon receiving a ping response from 1.2.3.4, packets are load balanced again.
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
All platforms with an Edge license or greater.
Description
Deletes a static address from the routing table.
Syntax Description
ipNetmask Specifies an IP address/mask length.
ipaddress Specifies an IP address.
mask Specifies a subnet mask.
gateway Specifies a VLAN gateway.
multicast Specifies a multicast route to delete.
multicast-only Specifies a multicast route to delete.
unicast Specifies a unicast route to delete.
unicast-only Specifies a unicast route to delete.
vlan Specifies the egress VLAN name used for an Inter-VR route.
vrname Specifies the virtual router to which the route is deleted.
Default
If you do not specify a virtual router, the current virtual router context is used.
Usage Guidelines
Use a value of 255.255.255.255 or /32 for mask to indicate a host entry.
Example
The following example deletes an address from the multicast routing table:
configure iproute delete 10.101.0.0/24 10.101.0.1 multicast
History
This command was first available in ExtremeXOS 10.1.
The multicast and unicast keywords were first available in ExtremeXOS 12.1. These keywords
replace multicast-only and unicast-only, which remain in the software for backward
compatibility.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a blackhole route from the routing table.
Syntax Description
ipv6Netmask Specifies an IPv6 address/prefix length.
vr_name Specifies the VR or VRF from which the route is deleted.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
A blackhole entry directs packets with a specified destination address to be discarded. Blackhole entries
are useful as a security measure or in special circumstances where a specific destination address must
be discarded. Blackhole entries are treated like permanent entries in the event of a switch reset or
power off/on cycle.
Example
The following example deletes a blackhole route from the routing table for packets with a destination
address of 2001:db8::3452, so the packets are no longer discarded:
configure iproute delete blackhole 2001:db8::3452/128
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a default blackhole route from the routing table.
Syntax Description
multicast Specifies a default blackhole multicast route to delete.
multicast-only Specifies a default blackhole multicast route to delete. This option is
provided for backward compatibility with releases prior to
ExtremeXOS Release 12.1.
unicast Specifies a default blackhole unicast route to delete.
unicast-only Specifies a default blackhole unicast-only route to delete. This option
is provided for backward compatibility with releases prior to
ExtremeXOS Release 12.1.
vrname Specifies a VR or VRF name.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
None.
Example
The following command deletes a blackhole default route from the routing table:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a default blackhole route from the routing table.
Syntax Description
vr_name Specifies the VR or VRF from which the route is deleted.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
While a default route is for forwarding traffic destined to an unknown IPv6 destination, and a blackhole
route is for discarding traffic destined to a specified IPv6 destination, a default blackhole route is for
discarding traffic to the unknown IPv6 destination.
The default blackhole route is treated like a permanent entry in the event of a switch reset or power
off/on cycle. The default blackhole route's origin is "b" or "blackhole" and the gateway IPv6 address for
this route is "::."
Example
The following example deletes a blackhole default route from the routing table:
configure iproute delete blackhole default
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a default gateway from the routing table.
Syntax Description
ipv6Gateway Specifies a VLAN gateway IPv6 address.
ipv6ScopedGateway Specifies a scoped gateway.
vr_name Specifies the VR or VRF from which the route is deleted.
Default
If no metric is specified, the default metric of 1 is used. If you do not specify a VR or VRF, the current VR
context is used.
Usage Guidelines
Default routes are used when the router has no other dynamic or static route to the requested
destination. A default gateway must be located on a configured IPv6 interface.
Example
The following example deletes a default route from the switch:
configure iproute delete default 2001:db8::1234:5678
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Changes the priority for all routes from a particular route origin.
Syntax Description
auto-peering Specifies auto-peering routes.
ripng Specifies RIPng.
host-mobility Host-Mobility route.
blackhole Specifies the blackhole route.
icmp Specifies ICMP.
static Specifies static routes.
ospfv3-intra Specifies OSPFv3 Intra routing.
ospfv3-inter Specifies OSPFv3 Inter routing.
ospfv3-as-external Specifies OSPFv3 AS External routing.
ospfv3-extern1 Specifies OSPFv3 External 1 routing.
ospfv3-extern2 Specifies OSPFv3 External 2 routing.
isis Specifies ISIS routing.
isis-level-1 Specifies IS-IS Level 1 routing.
isis-level-2 Specifies IS-IS Level 2 routing.
isis-level-1-external Specifies IS-IS Level 1 External routing.
isis-level-2-external Specifies IS-IS Level 2 External routing.
ebgp Specifies EBGP routes.
ibgp Specifies IBGP routes.
priority Specifies a priority number in the range of 11 to 65534.
vr_name Specifies a VR or VRF name.
Default
The following table lists the relative priorities assigned to routes depending upon the learned source of
the route.
Usage Guidelines
Although these priorities can be changed, do not attempt any manipulation unless you are expertly
familiar with the possible consequences. If you change the route priority, you must save the
configuration and reboot the system.
Note
The priority for a blackhole route can not overlap with the priority of any other route origin.
Example
The following example sets the IPv6 route priority for static routing to 1200:
configure iproute ipv6 priority static 1200
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document..
Description
Changes the priority for all routes from a particular route origin.
Syntax Description
auto-peering Specifies the auto-peering route.
blackhole Specifies the blackhole route.
bootp Specifies BOOTP.
ebgp Specifies E-BGP routes.
host-mobility Host-Mobility route.
ibgp Specifies I-BGP routes.
icmp Specifies ICMP.
isis Specifies IS-IS and applies only to blackhole routes installed for
summary addresses.
isis-level-1 Specifies IS-IS Level 1 routing.
isis-level-1-external Specifies IS-IS Level 1 External routing.
isis-level-2 Specifies IS-IS Level 2 routing.
isis-level-2-external Specifies IS-IS Level 2 External routing.
mpls Specifies MPLS routing.
ospf-as-external Specifies OSPF as External routing.
ospf-extern1 Specifies OSPF External 1 routing.
ospf-extern2 Specifies OSPF External 2 routing.
ospf-inter Specifies OSPFInter routing.
ospf-intra Specifies OSPFIntra routing.
rip Specifies RIP.
static Specifies static routes.
priority Specifies a priority number in the range of 11 to 65534.
vrname Specifies a VR or VRF name.
Default
The following table lists the relative priorities assigned to routes depending upon the learned source of
the route.
Usage Guidelines
Although these priorities can be changed, do not attempt any manipulation unless you are expertly
familiar with the possible consequences. If you change the route priority, you must save the
configuration and reboot the system.
Note
The priority for a blackhole route cannot overlap with the priority of any other route origin.
Example
The following example sets IP route priority for static routing to 1200:
configure iproute priority static 1200
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Reserves storage space for IPv4 and IPv6 routes in the Longest Prefix Match (LPM) hardware tables,
allowing individual local and remote IPv4 unicast hosts to occupy the unused portions of the tables.
Syntax Description
num_routes_needed Specifies a specific number of routes to reserve.
maximum Reserves the maximum amount of space for IP route entries. No IPv4
hosts are stored in the LPM and External tables.
default Reserves the default amount of space for IP route entries.
all For SummitStack switches only, this option applies the reservation to
all applicable slots.
slot_num For SummitStack switches only, this option applies the reservation to
the specified slot.
Usage Guidelines
Demand on the Layer 3 Hash table can be reduced by allowing IPv4 hosts to be stored in the LPM
tables instead. This command allows you to reserve a portion of the LPM tables for routes, and this
creates an unreserved portion that can be used to store IPv4 hosts. For more information, see the
“Extended IPv4 Host Cache” section of the ExtremeXOS 30.5 User Guide.
The default setting can support most networks, but if more than a few hundred local IP hosts and IP
multicast entries are present, you can improve switch performance by calculating and configuring the
reserved space for route entries to allow unreserved space for IPv4 hosts. Changing the number of
reserved route entries does not require a reboot of the affected slots or switch.
You can view the current LPM hardware table usage by entering the show iproute reserved-
entries statistics command. The LPM table statistics are in the columns under the In HW Route
Table heading.
If the switch contains fewer routes than the capacity of the LPM tables, the number of route entries to
reserve for a slot or switch should be the number of routes currently used in the hardware tables, plus
an additional cushion for anticipated growth. Because each IPv6 route takes up the space of two IPv4
routes, the number of route entries to reserve is two times the value in the IPv6 routes column, plus the
value in the IPv4 routes column, plus room for anticipated growth. For example, if you want to reserve
space for 100 IPv4 routes and 20 IPv6 routes, the required number of route entries is 140 (100 + 2*20).
The maximum values shown above apply to ExtremeSwitching series switches operating independently
or as part of a SummitStack. The maximum option can be used to specify the maximum values.
When maximum is specified, IPv4 hosts do not occupy LPM table space. Note that when maximum is
specified, software forwarding can result, depending on the utilization and addresses in the Layer 3
Hash table, and is therefore not recommended.
If the switch contains more routes than the capacity of the LPM tables, a trade-off can be made. You
can choose to reserve 400 iproute entries, for example. The 400 IPv4 routes with the longest length
network masks will be installed in the LPM table, and the remainder of the LPM table can be used for
cache space for local and remote hosts. The remote host entries are only required for IPv4 addresses
matching one of the 300 routes not installed in the LPM table. Since in this example, not all routes can
be stored anyway, leaving appropriate room for individual remote hosts can result in more fast-path
forwarding.
Depending on the actual routes present, IP route compression for IPv4 and/or IPv6 can be enabled to
reduce the number of routes required in the LPM tables. For more information, see the description for
the following command: enable iproute compression {vr vrname}
Example
The following command reserves up to 140 IPv4 routes or 70 IPv6 routes, or any combination in
between, on all switches in a SummitStack:
# configure iproute reserved-entries 140 slot all
For details on the configuration changes, see the command descriptions for the following commands:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the desired interval between pings and number of misses for ping protection of IPv4 and
IPv6 static routes.
Syntax Description
ipv4 Designates IPv4 settings (default).
ipv6 Designates IPv6 settings.
protection Configures route protection settings.
ping Configures static route ping protection interval and number of misses.
interval Number of seconds between pings to protected gateways. Ping
response must be received within configured interval.
seconds Number of seconds between pings to protected gateways. Range is 1–
600. Default is 2.
miss Number of pings with no response before associated routes are
considered down.
misses Number of pings with no response before associated routes are
considered down. Range is 2–255. Default is 3.
Default
If not specified, IPv4 is the default, and:
• Interval = 2 seconds
• Misses = 3
Usage Guidelines
At the configurable interval, each unique gateway or device IP address configured for static route ping
protection is sent an ICMP or ICMPv6 Echo Request if the ARP or Neighbor cache entry already has the
IP->MAC binding. An ARP or Neighbor Solicitation is sent if the IP->MAC binding is unknown, and upon
receiving a response, the ICMP Echo Request is sent.
The desired interval between pings and number of misses can be configured independently for IPv4
and IPv6.
Example
The following example sets for IPv4 a ping interval of 3 seconds and number of missed pings to 5:
configure iproute ipv4 protection ping interval 3 miss 5
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
All platforms with an Edge license or greater.
Description
This command is used to configure the "default" hash algorithm used to choose a gateway when
hardware forwards an IPv4 or IPv6 unicast packet to a route with multiple equal-cost multipath
gateways.
For information about configuring the custom hash method, see the command configure iproute
sharing hash-method custom on page 636.
The values within the IP unicast packet that are considered in the hash calculation depend on the
setting of another command, configure forwarding sharing [L3 | L3_L4]. With the
default, L3_L4, the hash calculation includes Source and Destination IP addresses, and the Source and
Destination Layer 4 Port numbers. Or, if configure forwarding sharing L3 is configured, the
hash calculation only includes Source and Destination IP addresses. The distribution of packets among
multiple gateways based on the IP Route Sharing lower or upper hash algorithm will depend on
network traffic. The command will not result in traffic loss and takes effect immediately.
Syntax Description
iproute IP routing module.
sharing Configure settings for equal cost multipath
routing";capability="route_sharing.
hash-method Configures hardware forwarding hash method used to select among
ECMP gateways for an IPv4 or IPv6 destination.
default Default method for ECMP hardware hash calculation. For information
about configuring the custom hash method, see the configure
iproute sharing hash-method custom {hash-
algorithm [xor | crc-16 | crc-32 [lower |
upper]]} command.
hash-algorithm Configure hardware forwarding hash algorithm used to select among
ECMP gateways for an IPv4 or IPv6 destination";capability="pib".
crc Cyclic Redundancy Check (CRC).
lower Lower bits of CRC32 hash calculation of source and destination packet
criteria, used to select an ECMP gateway (Default).
upper Upper bits of CRC32 hash calculation. May improve distribution when
source and destination IP and ports do not vary much.
Default
Lower.
Usage Guidelines
Use this command to configure the hash algorithm used to choose a gateway when hardware forwards
an IPv4 or IPv6 unicast packet to a route with multiple equal-cost multipath gateways. The values within
the IP unicast packet that are considered in the hash calculation depend on the setting of another
command, configure forwarding sharing [L3 | L3_L4]. With the default, L3_L4, the hash
calculation includes Source and Destination IP addresses, and the Source and Destination Layer 4 Port
numbers. Or, if configure forwarding sharing L3 is configured, the hash calculation only
includes Source and Destination IP addresses. The distribution of packets among multiple gateways
based on the IP Route Sharing lower or upper hash algorithm will depend on network traffic. The
command will not result in traffic loss and takes effect immediately.
Example
# configure iproute sharing hash-algorithm upper
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the new “custom” hash method, and optionally, to set the hash algorithm for
IPv4 and IPv6 ECMP.
For information about configuring the "default" hash method, see the command configure iproute
sharing hash-algorithm crc on page 634.
Syntax Description
hash-method Configures hardware forwarding hash method used to select among
ECMP gateways for an IPv4 or IPv6 destination.
custom Alternate method for ECMP hardware hash calculation, which may
improve distribution.
hash-algorithm Configures custom hardware forwarding hash algorithm used to select
among ECMP gateways for an IPv4 or IPv6 destination.
xor Use exclusive-OR for ECMP hash computation.
crc-16 Use CRC-16 for ECMP hash computation.
crc-32 Use CRC-32 for ECMP hash computation (default for custom hash-
method).
lower Lower bits of CRC32 hash calculation (default for custom hash-
method).
upper Upper bits of CRC32 hash calculation.
Default
If the “custom” hash-method is specified without a hash-algorithm, the default hash-algorithm is
crc32 lower.
Usage Guidelines
The “custom” hash method already supported for address-based port load sharing can now be used to
distribute IP packets among multiple equal-cost IP gateways. The custom hash algorithm for ECMP can
be configured independently from the hash algorithm for port load sharing (“link aggregation” or
“LAG”).
The configured custom hash algorithm for IP ECMP is independent from the custom hash algorithm for
port load sharing. This prevents undesirable hash polarization when the custom hash method is used
concurrently for both ECMP and port load sharing. With separate hash algorithm controls, a given
packet can choose 1 out of 'N' active ECMP gateways, and independently choose a different 1 out of 'N'
active links in a port load share group used to reach the selected ECMP gateway.
To control whether Layer 4 port numbers, as well as source and/or destination IP address, are part of
the hash calculation for both ECMP and port load sharing, use the following command: configure
sharing address-based custom ipv4 [L3-and-L4 | source-only |
destination-only | source-and-destination]
IPv6 ECMP hash field criteria for “custom” is always L3-and-L4. With the custom hash method, the
IPv6 Flow Label value in IPv6 packets is included in the hash calculation. The default hash method is
incapable of including the IPv6 Flow Label value.
Example
The following example sets the custom hash method to use exclusive-OR for ECMP hash computation:
# configure iproute sharing hash-method custom hash-algorithm xor
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, X670-G2,X465, X870 series
switches as standalone or in stacks.
Description
Specifies the maximum number of gateways in each gateway set in the ECMP hardware table.
Syntax Description
max_gateways Specifies the maximum number of ECMP gateways in a gateway. The
only values allowed are 2, 4, 8, 16, 32 and 64.
Default
16 gateways.
Usage Guidelines
When IPv4 or IPv6 route sharing is enabled, the maximum number of gateways value represents the
maximum number of next-hop gateways that can be used for communications with a destination
subnet. Each gateway represents an alternative path to a subnet. The gateways can be defined with
static routes, or they can be learned through the OSPF, OSPFv3, BGP, or IS-IS protocols. The value for
max-gateways applies to both IPv4 and IPv6 on all VRs.
When Pseudowire Label Switch Path Load Sharing is enabled, the maximum number of gateways value
represents the maximum number of LSPs that a pseudowire can use for multi-path transport.
The max-gateways setting changes how the hardware is configured for multi-path; however, individual
protocols have multi-path limitations that may be lower than the configured max-gateways setting.
Additionally, the values supported for the max-gateways setting may vary, depending on the platform.
See the ExtremeXOS Release Notes for the supported values of max-gateways for each protocol and
platform.
The ExtremeXOS Release Notes also list the total number of route destinations and the total
combinations of gateway sets that each platform can support with the different max-gateways option
selections. For more information on selecting the maximum number of gateways and how this affects
different platforms, see the “ECMP Hardware Table” in the ExtremeXOS 30.5 User Guide.
You must save the configuration and reboot the switch for the new value to take effect. To see the
current and configured value, use the commands show ipconfig or show ipconfig ipv6.
Example
The following example changes the maximum number of ECMP gateways per subnet or gateway set to
8:
configure iproute sharing max-gateways 8
History
This command was first available in ExtremeXOS 11.4.
Support for shared gateway sets in the ECMP table was added in ExtremeXOS 12.4.
The default value for max. gateways was changed in ExtremeXOS 22.1 from 4 to 16. This applies only to
new configurations. Existing configurations retain their settings.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches..
Description
Configures the maximum IPv4 ICMP allowed size.
Syntax Description
size Specifies the size of the IPv4 ICMP in bytes.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default size is 512 bytes.
Usage Guidelines
This command configures the IPv4 ICMP allowed size. The absolute maximum is 1023 bytes.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum ipv6 ICMP allowed size.
Syntax Description
size Specifies the size of the IPv6 ICMP in bytes.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default size is 512 bytes.
Usage Guidelines
This command configures the IPv6 ICMP allowed size. The absolute maximum is 16K bytes.
You can use this command to configure the maximum IPv6 ICMP packet size for detecting IPv6 ICMP
anomalies. If the next header in the IPv6 ICMP packet is not 0x3A:ICMP, this anomaly is not detected.
For example, an IPv6 ICMP packet with packet header 0x2c: Fragment Header is not detected.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the size of local notification cache.
Syntax Description
size Specifies the size of the local notification cache.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is 1000 events.
Usage Guidelines
This command configures the size of local notification cache. Cached events are stored in local memory.
The range is between 1 and 1000 events per second. If the cache is full, newer events replace older
events.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the rate limiting for protocol anomaly notification.
Syntax Description
value Specifies the period of the rate limit.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is 10 events per second.
Usage Guidelines
This is a paired command with configure ip-security anomaly-protection notify
rate window that configures the rate limiting for protocol anomaly notification. When the anomaly
notification is enabled, in order to avoid overloading CPU, the system generates only the number of
limited notifications in a period of window seconds. The range is from 1 to 100 events.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the rate limiting for protocol anomaly notification.
Syntax Description
value Specifies the period of the rate limit.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is 1 second.
Usage Guidelines
This is a paired command with configure ip-security anomaly-protection notify
rate limit that configures the rate limiting for protocol anomaly notification. When the anomaly
notification is enabled, in order to avoid overloading CPU, the system generates only the number of
limited notifications in a period of window seconds. The range is between 1 and 300 seconds.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an anomaly rate-based notification feature.
Syntax Description
value Specifies the number of events for the trigger.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is 1.
Usage Guidelines
This is a paired command with configure ip-security anomaly-protection notify
trigger on that configures an anomaly rate-based notification feature. The anomaly notification is
automatically triggered if the rate of anomaly events is greater than the configured ON value, and the
notification is disabled if the rate falls below the value set in the configure ip-security
anomaly-protection notify trigger off command.
Note
The value set in ON must be greater than or equal to the value set in OFF.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an anomaly rate-based notification feature.
Syntax Description
value Specifies the number of events for the trigger.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is 1.
Usage Guidelines
This is a paired command with configure ip-security anomaly-protection notify
trigger off that configures an anomaly rate-based notification feature. The anomaly notification is
automatically triggered if the rate of anomaly events is greater than the configured ON value, and the
notification is disabled if the rate falls below the value set in the configure ip-security
anomaly-protection notify trigger off command.
Note
The value set in ON must be greater than or equal to the value set in OFF.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the minimum TCP header allowed.
Syntax Description
size Specifies the size of the header in bytes.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default value is 20 bytes.
Usage Guidelines
This command configures the minimum TCP header allowed. It takes effect for both IPv4 and IPv6 TCP
packets.
The range of the minimum TCP header may be between 8 and 255 bytes.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a DHCP binding.
Syntax Description
ip_address Specifies the IP address for the DHCP binding.
mac_address Specifies the MAC address for the DHCP binding.
dynamic Configuration options for dynamically created VLANs.
vlan_id VLAN ID tag between 1 and 4,094.
vlan_name Specifies the name of the VLAN for the DHCP binding.
server_port Specifies the server port for the DHCP binding.
client_port Specifies the client port for the DHCP binding.
seconds Specifies the number of seconds for the lease.
Default
N/A.
Usage Guidelines
This commands allows you to add a DHCP binding in order to re-create the bindings after reboot and to
allow IP Security features to work with clients having static IP addresses.
Note
Setting the lease-time to 0 causes the DHCP binding to be static; in other words, it is not
aged-out if no DHCP renew occurs. This is for use with clients using static IP addresses.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a DHCP binding.
Syntax Description
ip_address Specifies the IP address for the DHCP binding.
vlan_name Specifies the name of the VLAN for the DHCP binding.
dynamic Configuration options for dynamically created VLANs.
vlan_id VLAN ID tag between 1 and 4,094.
Default
N/A.
Usage Guidelines
This commands allows you to delete a DHCP binding created with the command configure ip-
security dhcp-binding add ip ip_address mac mac_address {vlan}vlan_name
server-portserver_port client-portclient_port lease-timeseconds.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a storage file for DHCP binding information.
Syntax Description
name Specifies the name of the DHCP binding storage file.
Default
N/A.
Usage Guidelines
This commands allows you to configure the filename with which the DHCP bindings storage file is
created on the external server when it is uploaded to the external server. The text file resides on an
external server. You can configure the server with the command configure ip-security dhcp-
bindings storage location server [primary | secondary] ip_address |
hostname]{vrvr-name} tftp.
The bindings file must have a .xsf extension. If the input filename doesn't already have a .xsf extension,
one is added automatically.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the server location for the DHCP bindings storage file. The uploads can be made to any TFTP
server regardless of the virtual router that it is present in.
Syntax Description
ip_address Specifies the IP address location for the bindings storage file.
hostname Specifies the hostname of the server.
vr-name Specifies the virtual router name.
none Using no option unconfigures the server.
Default
N/A.
Usage Guidelines
This commands allows you to specify where you want to store the DHCP storage file that you created
with the command configure ip-security dhcp-bindings storage filename name.
Note
Using the command with no option unconfigures the server.
Example
The following command configures storage to the primary server 10.1.1.14:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures DHCP bindings file storage upload variables.
Syntax Description
minutes Specifies the number of minutes for the write interval.
num_changed_entries Specifies the limit for the write threshold.
Default
The default write threshold is 50 entries; the default write interval is 30 minutes.
Usage Guidelines
This commands allows you to configure the upload variables for the DHCP bindings file that you created
with the command configure ip-security dhcp-bindings storage filename name
and specified the location of with the command configure ip-security dhcp-bindings
storage location server [primary | secondary] ip_address |hostname]
{vrvr-name} tftp.
For redundancy, the DHCP bindings file is uploaded to both the primary and the secondary server. The
failure of one upload (for example, due to a TFTP server timeout) does not affect the upload of any
other.
When the maximum file size limit is reached, no additional DHCP bindings can be uploaded until one of
the older bindings is removed.
The point at which DHCP bindings can be uploaded can be configured to work in one of the following
ways:
• Periodic upload: Upload every N minutes, provided that DHCP bindings have changed since the last
upload.
• Upload based on number of yet-to-be uploaded entries: Allows you to configure the maximum
number of changed entries that are allowed to accumulate before being uploaded.
The write interval is configurable from 5 minutes to 1 day, with a default value of 30 minutes. The default
value of the write threshold is 50 entries, with a minimum of 25 and maximum of 200.
Additions and deletions are considered changes, but updates are not, which means that DHCP renewals
of existing leases are not counted.
By default, the write interval is in effect, but not the write-threshold. You may change whichever of
these you wish by explicitly configuring the value.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the DHCP relay agent option (option 82) checking in the server-originated packets.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command enables the checking of the server-originated packets for the presence of option 82. In
some instances, a DHCP server may not properly handle a DHCP request packet containing a relay
agent option. Use this command to prevent DHCP reply packets with invalid or missing relay agent
options from being forwarded to the client. With checking enabled, the following checks and actions
are performed:
• When the option 82 is present in the packet, the MAC address specified in the remote-ID sub-option
is the switch system MAC address. If the check fails, the packet is dropped.
• When option 82 is not present in the packet, the DHCP packet is forwarded with no modification.
Example
The following command enables DHCP relay agent option checking:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the port information portion of the circuit ID.
Syntax Description
port_info Specifies the circuit ID port information in the format of VLAN Info -
Port Info; maximum length is 32 bytes.
port Specifies the port for which DHCP Snooping should be enabled.
Default
The default value is the ASCII representation of the ingress port’s SNMP ifIndex.
Usage Guidelines
This command allows you to configure the port information portion of the circuit ID whose format is
vlan_info - port_info for each port. The parameter port info is a string of up to 32 bytes in
length. When a specific value is not configured for port information, the port_info defaults to the
ASCII representation of the ingress ports’s SNMP ifIndex.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the VLAN info portion of the circuit ID of a VLAN.
Syntax Description
vlan_info Specifies the circuit ID VLAN information for each VLAN in the format
of VLAN Info-Port Info; maximum length is 32 bytes.
vlan_name Specifies the VLAN for which DHCP should be enabled.
all Specifies all VLANs.
dynamic Configuration options for dynamically created VLANs.
Default
The default value is the ASCII representation of the ingress VLAN’s ID.
Usage Guidelines
This command allows you to configure the VLAN information portion of the circuit ID of a VLAN. The
VLAN info is a string of characters of up to 32 bytes in length, and is entered in the format of VLAN
InfoPort Info. When a specific value is not configured for a VLAN, vlan_info defaults to the ASCII
representation of the ingress VLAN’s ID.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the DHCP relay agent option (option 82).
Syntax Description
This command has no arguments or variables.
Default
The default is unconfigured.
Usage Guidelines
This command enables the DHCP relay agent option (option 82), which is inserted into client-originated
DHCP packets before they are forwarded to the server.
To disable the DHCP relay agent option (option 82), use the following command:
unconfigure ip-security dhcp-snooping information option
Example
The following command enable the DHCP relay agent option:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the DHCP relay agent option (option 82) policy.
Syntax Description
drop Specifies to drop the packet.
keep Specifies to keep the existing option 82 information in place.
replace Specifies to replace the existing data with the switch’s own data.
Default
The default value is replace.
Usage Guidelines
Use this command to set a policy for the relay agent. Packets can be dropped, the option 82
information can be replaced (the default), or the packet can be forwarded with the information
unchanged.
Example
The following command configures the DHCP relay agent option 82 policy to keep:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the DHCP relay agent remote ID.
Syntax Description
remote-id Specifies configuring the remote ID.
system-name Specifies assigning the switch's system name as the remote ID.
remote-id_info Specifies assigning a user-defined string as the remote ID (up to 32
characters).
Default
If neither a system name nor the customized remote ID is configured, the default is the switch's MAC
address.
Usage Guidelines
This command specifies setting the remote ID as either the switch's system name (for example,
X465-48P) or a user-defined string. If neither selection has been made, or you unconfigure the remote
ID (unconfigure ip-security dhcp-snooping information remote-id), the default
remote ID is the switch's MAC address. However, this default (MAC address) name does not appear in
the show ip-security dhcp-snooping information remote-id command.
Example
The following command configures the DHCP remote ID as the switch's system name::
# configure ip-security dhcp-snooping information remote-id system-name
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the operation of the duplicate address detection (DAD) feature on the specified VR.
Syntax Description
max_solicitations Specifies the number of times the DAD feature tests for a duplicate
address. The range is 1 to 10, and the default value is 1.
vr_name Specifies a VR on which to enable this feature.
Default
DAD status: On on VR-Default.
Usage Guidelines
When the DAD feature is enabled, the switch checks for duplicate IPv6 addresses on the specified VR
when an IPv6 interface is initialized, or when a DAD check is initiated with a CLI command. After
initialization, and when this feature is off, the switch does not start DAD checks.
Changes to the number of solicitations configuration take affect the next time the DAD check is run.
By default, this command applies to the current VR context, if no VR name is specified. If vr all is
specified, the command applies to all user VRs and VR-Default.
Example
The following command enables the DAD feature on all user VRs and VR-Default:
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to configure the IPv6 hop-limit. This hop-limit is used in all originated IPv6
packets, and (if router discovery is enabled) in outgoing Router Advertisement packets as well.
Syntax Description
hop_limit Hop limit for all originated IPv6 packets, and the advertised hop-limit
for Router Advertisements. Hop limit value is between 1 and 255.
Default is 64.
dont-specify-in-ra Sets the advertised hop-limit in Router Advertisements to zero.
vr Virtual router.
vlan VLAN.
all All VLANs.
Default
64.
Usage Guidelines
Use this command to configure the IPv6 hop-limit. The hop-limit is used in all originated IPv6 packets,
and (if router discovery is enabled) in outgoing Router Advertisement packets as well.
The 0 value is special and used only in outgoing Router Advertisements to convey to the receiving hosts
that the router has not specified a hop-limit value to be used when originating IPv6 packets. This can be
configured by specifying the optional dont-specify-in-ra keyword. The hop-limit can be
configured for a VLAN, all VLANs in a Virtual Router, or all VLANs in the system. By default, the hop-
limit is configured for all vlans in the current Virtual Router context of the CLI.
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure irdp
configure irdp [multicast | broadcast | mininterval maxinterval lifetime
preference]
Description
Configures the destination address of the router advertisement messages.
Syntax Description
multicast Specifies multicast setting.
broadcast Specifies broadcast setting.
mininterval Specifies the minimum time between advertisements.
maxinterval Specifies the maximum time between advertisements. Default is 600.
lifetime Specifies the lifetime of the advertisement. Default is 1800.
preference Specifies the router preference level. Default is 0.
Default
Broadcast (255.255.255.255). The default mininterval is 450.
Usage Guidelines
ICMP Router Discovery Protocol (IRDP) allows client machines to determine what default gateway
address to use. The switch sends out IP packets at the specified intervals identifying itself as a default
router. IRDP enabled client machines use this information to determine which gateway address to use
for routing data packets to other networks.
Example
The following example sets the address of the router advertiser messages to multicast:
configure irdp multicast
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
Description
This command associates the specified VLAN interface with the specified IS-IS router process.
Syntax Description
vlan all Adds all IS-IS eligible VLANs to the router process.
vlan_name Specifies a single IS-IS eligible VLAN to be added to the router
process.
area_name Identifies the router process to which the VLANs are added.
ipv4 | ipv6 Specifies the VLAN IP address type, IPv4 or IPv6, to be added. If you
do not specify an IP address type, the VLAN is added for the IPv4
address type. To support both IP address types on the same VLAN,
enter the command twice, using a different IP address type each time.
Default
IPv4.
Usage Guidelines
An IS-IS-eligible interface is one that already has the appropriate IP address type (IPv4 or IPv6) address
assigned to it. The VLAN must have an IPv4 address assigned to it if ipv4 is specified or an IPv6 address
assigned to it if ipv6 is specified. In the event that a VLAN address is unconfigured, the interface is
automatically removed from the IS-IS router.
VLANs are added to an IS-IS router process to form adjacencies with neighboring IS-IS routers. Hello
PDUs are transmitted over these interfaces once the router process is enabled and has a system ID and
area address. IP forwarding, IPv6 forwarding, or both must be enabled on the interface. If the router
process operates at both L1 and L2, interfaces can be configured to form adjacencies in only a specific
level.
Example
The following command adds VLAN SJvlan with an IPv4 address type to areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command adds an IS-IS area address to the specified routing process.
Syntax Description
area_name Specifies the area name of the IS-IS process to which to add the area
address.
area_address Specifies an IS-IS area address to add to the IS-IS process. The area
address can be from 1 to 13 bytes long and must be entered in the
following format: 0101.0102.0103.0104.0105.0106.07.
Default
None.
Usage Guidelines
The IS-IS area address defines an L1 or L2 area within an AS. An IS-IS routing process must be assigned
at least one area address before it can send or process PDUs. The area address must be configured
appropriately. Level 1 routers only form adjacencies with other level 1 routers with at least one area
address in common. Multiple area addresses may be configured, which may be desirable during a
topological transition. The maximum number of area addresses that can be configured is 3.
Example
The following command assigns area address 0011.03 to areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command adds an IPv4 or IPv6 summary address for the specified level on the specified router
process.
Syntax Description
area_name Specifies the router process to which the summary address is to be
added.
ipv4_address_mask Specifies an IPv4 summary address.
ipv6_address_mask Specifies an IPv6 summary address.
level Specifies the IS-IS level for the summary address. The level 1 option
summarizes level 2 routes leaked to level 1. The level 2 option
summarizes level 1 routes that are advertised into level 2.
Default
No summarization.
Usage Guidelines
Route summaries are useful for minimizing the number of LSPs required to describe reachability for an
area. The summary address is advertised instead of the actual reachable addresses. This is particularly
useful for L1/L2 routers in which the summary address is used in a single LSP instead of including a part
or all of the addresses reachable in its level 1 area.
Note that a summary address is only advertised if at least one route matches the summary address. If
there is no route present that matches the summary address exactly, a blackhole route is installed for
the summary address. If an interlevel filter permits any route matched by the summary address, and
that route is present, the summary address is advertised.
If multiple summary addresses are installed in which one or more supersede each other (10.0.0.0/8 and
10.0.0.0/16, for example), only the more specific summary addresses are advertised.
Example
The following command adds an IPv4 summary address to areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets or clears the password for level 1 LSPs.
Syntax Description
area_name Specifies the router process to which the password configuration
applies.
none Disables level 1 password authentication.
encrypted simple Enables password authentication and specifies that the supplied
password password is encrypted and must be decrypted prior to placement in a
TLV.
authenticate-snp tx- Enables password authentication and level 1 SNP authentication. If the
only tx-only keyword is specified, the password is included in SNPs on
transmission, but received SNPs are not authenticated.
Default
None.
Usage Guidelines
Only plain text passwords are supported. Passwords may be up to 254 alphanumeric characters in
length. Although passwords are plaintext in the protocol, they are displayed and saved in an encrypted
form.
When password authentication is enabled, received packets are authenticated against the configured
password and are discarded if the password does not match. Authentication TLVs are included in
transmitted level 1 LSPs with a configured password.
Example
The following command configures the password extreme for areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command deletes an area address from the specified routing process.
Syntax Description
area_name Specifies the area name of the IS-IS process from which to delete the
area address.
area_address Specifies the area address name to delete from the IS-IS process.
Default
None.
Usage Guidelines
If this router process has only one area address configured, this command also causes the routing
process to stop sending or processing IS-IS PDUs.
Example
The following command deletes the 0011.03 area address from areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command removes the specified IPv4 or IPv6 summary address from the specified router process
at the specified level.
Syntax Description
area_name Specifies the router process from which the summary address is to be
deleted.
ipv4_address_mask Specifies an IPv4 summary address.
ipv6_address_mask Specifies an IPv6 summary address.
level Specifies the IS-IS level for the summary address.
Default
No summarization.
Usage Guidelines
Individual reachable addresses that were superseded by the summary address are now advertised in
separate LSPs.
Example
The following command deletes an IPv4 summary address from areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets or clears the password for Level 2 LSPs.
Syntax Description
area_name Specifies the router process for which the password is set or cleared.
none Disables level 2 password authentication.
Default
None.
Usage Guidelines
Packets received are authenticated against the configured password and are discarded if the password
does not match. Authentication TLVs are included in transmitted level 2 LSPs with the configured
password. Only plain text passwords are supported. Although LSPs contain plain text passwords,
passwords are displayed and saved in an encrypted form.
Example
The following command sets the domain password to Extreme:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command provides a method of restricting L1 routes from being redistributed into the L2 domain
on an L1/L2 router.
Syntax Description
area_name Specifies the router process for which this configuration change
applies.
policy Specifies a policy to control how L1 routes are redistributed.
none Removes any previously configured interlevel filters.
ipv4 | ipv6 Applies the interlevel filter to IPv4 or IPv6. If neither IPv4 nor IPv6 is
specified, this command applies to IPv4.
Default
None.
Usage Guidelines
This command has no effect on level 1-only and level 2-only routers. Normally all L1 routes are
redistributed into L2 on an L1/L2 router. Routes are permitted unless explicitly denied in the policy. This
command does not necessarily disable level 1 to level 2 redistribution unless the configured policy
effectively filters out all routes. For policies, the nlri match attribute is supported, and the permit and
deny set attributes are supported.
Example
The following command removes any previously configured interlevel filters in areax for IPv4:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables route leaking from level 2 to level 1 on an L1/L2 router.
Syntax Description
area_name Specifies the router process for which this configuration change
applies.
policy Specifies a policy to control how L2 routes are leaked to L1.
block-all Blocks all route leaking.
allow-all Leaks all routes into level 1.
ipv4 | ipv6 Applies the interlevel filter to IPv4 or IPv6. If neither IPv4 nor IPv6 is
specified, this command applies to IPv4.
Default
block-all.
Usage Guidelines
When a policy is supplied with this command, all routes are leaked unless explicitly denied in the policy.
This command has no effect on level 1-only and level 2-only routers. For policies, the nlri match attribute
is supported, and the permit and deny set attributes are supported.
Example
The following command configures areax to leak all level 2 routes to level 1 for IPv4:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the specified router process to operate as a level 1, level 2, or level 1/level 2
router.
Syntax Description
area_name Specifies the router process you are configuring.
level Specifies the IS-IS operation level for the router.
Default
both-1-and-2.
Usage Guidelines
Adjacencies are only formed with other routers of the same level. In addition, level 1 adjacencies are only
formed with other level 1 routers with the same area address.
If there are no other L2 areas, the default is both-1-and-2. If an L2 or L1/L2 area is already present, the
default is L1. This is because there can be only one L2 area in each system.
Example
The following command configures the areax router to operate at level 1:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command specifies the metric style for the specified router process and IS-IS level.
Syntax Description
area_name Specifies the router process for which the metric style is to be
configured.
narrow Specifies the narrow metric style, which uses the 6-bit default metric.
Only narrow metrics are encoded in originated TLVs; only narrow SPF
calculations are performed.
narrow transition Specifies the narrow metric style, which uses the 6-bit default metric.
Only narrow metrics are encoded in originated TLVs; both narrow and
wide SPF calculations are performed.
wide Specifies the wide metric style, which uses the 24-bit metric specified
in RFC 3784. Only wide metrics area encoded in originated TLVs; only
wide SPF calculations are performed.
wide transition Specifies the wide metric style, which uses the 24-bit metric specified
in RFC 3784. Only wide metrics are encoded in originated TLVs; both
narrow and wide SPF calculations are performed.
transition Specifies both the narrow and wide metrics. Both narrow and wide
metric types are encoded in TLVs; both narrow and wide SPF
calculations are performed.
level Specifies the IS-IS level to which the metric style applies.
Default
Narrow.
Usage Guidelines
Refer to RFC 3787, Section 5.1, for information on how to migrate a network from narrow metric-style to
wide metric-style. Note that Section 5.2 is not supported. As a result, each interface's narrow and wide
metric values must match while transitioning the metric style. Only when the entire network has
transitioned to wide metric style should the interface metrics be configured differently than the
configured narrow metric.
Example
The following command configures areax for the narrow metric style:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables or disables the overload bit feature while the specified IS-IS process is
initializing.
Syntax Description
area_name Specifies the area name of the IS-IS process for which this feature is to
be enabled or disabled.
off Disables the overload bit feature during initialization.
suppress Specifies that one or all types of reachability information is to be
suppressed or excluded from LSPs during initialization.
external When included with the suppress option, this specifies that external
reachability information is to be excluded from LSPs during
initialization.
interlevel When included with the suppress option, this specifies that interlevel
reachability information is to be excluded from LSPs during
initialization.
all When included with the suppress option, this specifies that external
and interlevel reachability information is to be excluded from LSPs
during initialization.
seconds Specifies the period (in seconds) during which this feature is enabled
at initialization.
Default
Off.
Usage Guidelines
This command configures the overload bit to be set only while the configured router is initializing, and
only for the period of time specified. This can be useful to minimize network churn while a new router
joins and learns the topology. The suppress options are used during startup if the router process is level
1/level 2 or is running another protocol, such as BGP (in order to wait for the other protocol to
converge). Note that in the latter case, there is no signaling between protocols to indicate convergence.
Again, this can reduce churn while the topologies are learned during router initialization.
Note
Although enable isis area area_name overload-bit {suppress [external
| interlevel | all]} and disable isis area area_name overload-bit
override the overload bit behavior configured by the configure isis area
area_name overload-bit on-startup [ off | {suppress [external |
interlevel | all]}seconds] command, the enable and disable commands do not
modify the configured parameters.
Example
The following command enables the areax overload bit feature for 15 seconds during initialization:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the system ID for an IS-IS router process.
Syntax Description
area_name Specifies the area name of the IS-IS process to which to add the
system ID.
automatic Sets the system ID to the system MAC address.
system_id Specifies the 6-byte system ID using three sets of four hexadecimal
digits, where each set is separated by a period. For example: 001B.
1F62.1201.
Default
Automatic (system MAC address is used).
Usage Guidelines
The system ID must be a unique ID within the AS. Typically a system MAC address is used as the system
ID. Sometimes a combination of one of the router's IP addresses and 2 prefix bytes are used. The
assignment of the system ID may vary depending on how the AS is chosen to be administered.
Example
The following example configures an IS-IS system ID for areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the minimum time required to wait before regenerating the same LSP.
Syntax Description
area_name Specifies the router process for which you want to configure the LSP
generation interval.
seconds Specifies the generation level in seconds. The range is 1 to 120
seconds.
level Specifies the level to which you want to apply the configuration. If
neither level 1 nor level 2 is specified, the configuration applies to both
levels.
Default
30 seconds.
Usage Guidelines
In link flapping situations in a mesh network, this can greatly reduce the amount of network traffic
generated from LSP flooding.
Example
The following command sets the LSP generation interval to a value of 40 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the refresh rate for locally originated LSPs.
Syntax Description
area_name Specifies the router process for which you are setting the LSP refresh
timer.
seconds Specifies the LSP refresh interval. The range is 1 to 65535 seconds.
Default
900 seconds.
Usage Guidelines
This value should be configured to be less than the maximum LSP lifetime value, which is set with the
configure isis area area_name timer max-lsp-lifetimeseconds command. Locally
originated LSPs are purged and retransmitted at the specified interval regardless of link state.
Example
The following command sets the LSP refresh timer for areax to 1200 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the LSP lifetime timer for locally originated LSPs.
Syntax Description
area_name Specifies the router process for which you want to configure the LSP
lifetime timer.
seconds Specifies the LSP lifetime in seconds. The range is 1 to 65535 seconds.
Default
1200 seconds.
Usage Guidelines
This value should be configured to be greater than the LSP refresh interval, which is set with the
configure isis area area_name timer lsp-refresh-intervalseconds command.
The remaining lifetime value is included in LSPs when they are flooded. Routers age out LSPs from
other routers using the remaining lifetime provided in the LSP. If a refreshed version of the LSP is not
received before it is aged out, an SPF recalculation occurs, possibly resulting in routing around the
router from which the LSP originated.
Example
The following command configures the LSP lifetime timer for 1800 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the IS-IS T2 timer for the specified router process and level.
Syntax Description
area_name Specifies the router process for which the T2 timer configuration
applies.
seconds Specifies the T2 timer value. The range is 5 to 65535 seconds.
level Specifies the IS-IS level to which this timer configuration applies. If
neither level 1 nor level 2 is specified, the configuration applies to both
levels.
Default
60 seconds.
Usage Guidelines
The T2 timer is the restart timer for the LSP database for an IS-IS level. If the T2 timer for the respective
level expires before the database has been resynchronized, SPF is run for that level.
Example
The following command configures the areax level 1 T2 timer for 90 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command specifies the minimum time to wait between SPF calculations.
Syntax Description
area_name Specifies the router process for which you are configuring the SPF
interval.
seconds Specifies the minimum time between SPF calculations. The range is 1
to 120 seconds.
level Specifies the IS-IS level to which the timer configuration applies. If
neither level 1 nor level 2 is specified, the configuration applies to both
levels.
Default
10 seconds.
Usage Guidelines
This helps prevent switch CPU overloading when a link flap causes several back-to-back SPF
calculations.
Example
The following command configures the SPF interval timer for 30 seconds on areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables or disables use of multi-topology TLVs as specified in draft-ietf-isis-wg-multi-
topology-11.
Syntax Description
area_name Specifies the router process to be configured.
single Specifies a single topology, where extended TLVs are used in SPF
calculation and TLVs.
multi Specifies a multi topology, where only the multi-topology TLVs are
used in SPF calculation and TLVs.
transition Specifies a transition topology, where both extended and multi-
topology TLVs are used in SPF calculation and TLVs. The transition
option is useful when migrating a routing domain.
level For L1/L2 routers, this applies the configuration to IS-IS level 1 or level
2. If the level option is not specified, the configuration applies to both
L1 and L2 areas. This option has no affect on L1-only and L2-only
routers.
Default
Single.
Usage Guidelines
Multi-topology capability is desirable if both an IPv4 topology and an IPv6 topology exist with different
routing paths.
Extreme supports MT IDs 0 and 2 (IPv4 unicast and IPv6 unicast) only.
Example
The following command configures the transition topology mode for areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the circuit type level for one or all IS-IS VLANs.
Syntax Description
vlan all Applies the selected circuit type to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the circuit type configuration
applies.
level [1 | 2 | Sets the circuit type level to level 1, level 2, or to both level 1 and level
both-1-and-2] 2.
Default
Both-1-and-2.
Usage Guidelines
Hello PDUs are only sent on the specified level for the selected VLANs. This can be useful for level 1/
level 2 routers that are neighbors.
Note that for per-level VLAN configurable parameters L1 and L1/L2, point-to-point interfaces use the
level 1 parameters, and L2-only point-to-point interfaces use the L2 parameters.
Example
The following command configures all IS-IS VLANs to use circuit type level 1:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command removes a VLAN interface from the specified router process.
Syntax Description
vlan all Deletes all IS-IS VLANs.
vlan_name Specifies a single VLAN to delete.
area_name Specifies the router process from which the VLAN is deleted. If you do
not specify an IS-IS area, the software deletes the VLAN from the
configured IS-IS area.
ipv4 | ipv6 Specifies the IP address type for which the VLAN is deleted. If you do
not specify an IP address type, the VLAN for the IPv4 address type is
deleted. If the VLAN was added as IPv6, the ipv6 option must be used
to remove the VLAN. If the VLAN was added as both IPv4 and IPv6,
each VLAN IP address type must be deleted with a separate
command.
Default
N/A.
Usage Guidelines
The associated adjacency is removed, causing the removal of the corresponding LSP if there is one, and
causing an SPF recalculation if the router process is enabled. Hello PDUs are no longer sent on the
specified interface. This command applies to IS-IS-enabled VLANs only.
Example
The following command deletes the IPv4 address type for all VLANs in areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the hello multiplier for one or all IS-IS VLANs.
Syntax Description
vlan all Applies the configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the configuration applies.
Default
3.
Usage Guidelines
The hello multiplier is used in conjunction with the hello interval to compute the holding time. The
holding time is included in hello PDUs and is calculated by multiplying the hello multiplier by the hello
interval. If the hello interval is set to minimal, the holding time is set to 1 second and the hello interval is
calculated by dividing 1 second by the hello multiplier. For example, a hello interval of minimal and a
hello multiplier of 4 means that the hold interval is set to 250 ms (and the holding time to 1 second). The
holding time tells the neighboring router how long to wait before declaring the sending router dead.
Example
The following command sets the SJvlan hello multiplier to 4:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command applies a policy map for routes imported to the FIB from all IS-IS router processes on
this virtual router.
Syntax Description
policy-map Specifies the policy to apply.
none Removes any policies assigned to this virtual router.
Default
None.
Usage Guidelines
IS-IS policy files support the following policy match conditions:
• nlri IPv4-address/mask-len IPv6-address/mask-len
• route-origin [isis-level-1 | isis-level-2 | isis-level-1-external |
isis-level-2-external]
Example
The following command applies the IS-IS policy policy2 to the virtual router:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command specifies the link type for one or all IS-IS VLANs.
Syntax Description
vlan all Applies the link type configuration to all IS-IS VLANs.
vlan_name Specifies a single IS-IS VLAN to which the link type configuration is
applied.
broadcast Selects the broadcast link type for the specified VLANs.
point-to-point Selects the point-to-point link type for the specified VLANs.
Default
Broadcast.
Usage Guidelines
On broadcast interfaces, a DIS is elected. There is no DIS election on point-to-point interfaces. If it is
known that only two routers will be present on a physical network, it may be desirable to set their
connecting interfaces to point-to-point mode. This reduces the overhead associated with DIS election
and periodic CSNP transmissions and processing. In addition, if the adjacency is both level 1 and level 2,
only one set of hello PDUs are sent on a point-to-point interface whereas hello PDUs are sent for both
levels on broadcast interfaces. Interfaces in point-to-point mode must have an IP address assigned to
them. Unnumbered interfaces are not supported.
For point-to-point interfaces, level 1 parameters apply to L1-only and L1/L2 interfaces. Level 2
parameters apply to L2-only point-to-point interfaces.
Example
The following command configures all IS-IS VLANs to use the broadcast link type:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures LSP flooding behavior for the specified interface.
Syntax Description
vlan all Applies the configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the configuration applies.
block-none Disables LSP blocking.
block-all Blocks all LSPs. No LSPs are flooded out of the selected interface.
Default
Block-none.
Usage Guidelines
In a mesh environment, which is a set of fully interconnected point-to-point interfaces, LSP flooding can
generate N2 PDUs because no router can tell which routers have and have not received the flooded LSP.
By carefully selecting the links over which LSPs are flooded, traffic can be greatly reduced at the cost of
some resiliency. Using mesh group IDs instead of a full block (the block-all option) allows a finer
granularity of control.
Example
The following command configures blocking on SJvlan for group 5:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the narrow metric for one or all IS-IS VLANs.
Syntax Description
vlan all Applies the configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the configuration applies.
metric metric Sets the metric value. The range is 1 to 63.
level [1 | 2] Limits the configuration to either level 1 or level 2. If neither level 1 nor
level 2 is specified, the configuration applies to both levels.
Default
10.
Usage Guidelines
If narrow metrics are enabled, this value is used in the associated LSPs for the selected VLANs.
Example
The following command sets the narrow metric for all IS-IS VLANs to 15:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets or clears the authentication password for one or all IS-IS VLANs.
Syntax Description
vlan all Applies the password configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the password configuration is
applied.
none Clears the password configuration and disables hello PDU
authentication.
encrypted Specifies that the supplied password is encrypted and must be
decrypted prior to using it in a TLV.
password Specifies the password. Passwords may be up to 254 alphanumeric
characters in length.
level [1 | 2] Limits the password configuration to level 1 or level 2. If neither level 1
or level 2 is specified, the configuration applies to both levels.
Default
None.
Usage Guidelines
If configured, the specified password is included in Hello PDUs for the specified level. In addition,
received Hello PDUs on the specified interface are authenticated with the same password. Hello PDUs
that are not authenticated are discarded.
Only plain text passwords are supported. Note that if the password is changed on an interface with an
existing adjacency, the neighboring router needs to be configured as well. Depending on how timers are
configured, the adjacency may time out while transitioning between passwords. Although passwords
appear in plain text during configuration, they are displayed and saved in encrypted form.
Example
The following command assigns password Extreme to all level 1 VLANs configured for IS-IS:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the priority used for DIS election on broadcast interfaces.
Syntax Description
vlan all Applies the configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the configuration applies.
priority priority Sets the priority value. The range is 0 to 127.
level [1 | 2] Limits the configuration to either level 1 or level 2. If neither level 1 nor
level 2 is specified, the configuration applies to both levels.
Default
64.
Usage Guidelines
A higher priority value is preferred over a lower priority value. The priority is encoded in level 1 or level 2
hello PDUs. This command is not valid for point-to-point interfaces. Note that a priority of 0 has no
special meaning other than the fact that it is the lowest priority. A router with a priority of 0 can still
become the DIS.
Example
The following command configures priority level 32 for SJvlan:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the T3 global restart timer for all IS-IS router processes on the current virtual
router.
Syntax Description
seconds Specifies the restart grace period in seconds. The range is 1 to 65535
seconds.
Default
65535.
Usage Guidelines
If the grace period expires before LSP resynchronization is complete, the virtual router sets the overload
bit in LSPs that it originates.
Example
The following command sets the restart grace period to 5000 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures IS-IS graceful restart behavior.
Syntax Description
none Disables IS-IS graceful restart. When graceful restart is disabled, this
router still operates as a helper to other restarting routers.
planned Initiates IS-IS graceful restart only in response to the restart process
isis.
unplanned Initiates graceful restart only when the IS-IS process is restarted due
to a process crash or an unplanned failover.
both Initiates graceful restart for all events supported by the planned and
unplanned options.
Default
None.
Usage Guidelines
The command options specify under which circumstances graceful restart is to be performed. This
command has no effect during normal switch boot up. All IS-IS routing processes in the current virtual
router are affected by this command.
All neighboring routers must support IS-IS restart in order for graceful restart to work. If graceful restart
is not performed after a process restart or failover, the router's adjacencies are re-initialized causing SPF
recalculation throughout the network and, if the overload bit is not configured to be set during startup,
churn as adjacencies change state and LSPs are learned.
Note
The planned and unplanned command options do not affect the actual restart protocol
operation of IS-IS; they only determine when the restart process occurs.
Example
The following command configures the switch to initiate a graceful restart for all events supported by
the planned and unplanned options:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the minimum time between consecutive CSNP transmissions on the specified
interface.
Syntax Description
vlan all Applies the timer configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the timer configuration applies.
seconds Sets the timer interval. The range is 1 to 65535 seconds.
level [1 | 2] Limits the configuration to either level 1 or level 2. If neither level 1 nor
level 2 is specified, the configuration applies to both levels.
Default
10 seconds.
Usage Guidelines
Periodic CSNPs are only sent on broadcast interfaces and only by the DIS.
Example
The following command sets the CSNP interval time for all IS-IS VLANs to 15 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the interval between two consecutive hello transmissions.
Syntax Description
vlan all Applies the timer configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the timer configuration applies.
seconds Sets the timer interval. The range is 1 to 65535 seconds.
minimal Specifies that the hello interval is calculated by dividing 1 second by
the hello multiplier.
level [1 | 2] Limits the configuration to either level 1 or level 2. If neither level 1 nor
level 2 is specified, the configuration applies to both levels.
Default
10 seconds.
Usage Guidelines
If this router is the elected DIS, hellos are sent three times more frequently than the configured interval.
When the timer configuration is set to minimal, the holding time included in the PDU is set to 1 second.
Otherwise, the holding time is computed by multiplying the hello interval by the hello multiplier. The
holding time tells the neighboring router how long to wait before declaring the sending router dead.
Example
The following command sets the hello interval timer for all VLANs to 15 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the minimum time between LSP transmissions.
Syntax Description
vlan all Applies the timer configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the timer configuration applies.
milliseconds Specifies the timer value. The range is 1 to 4294967295 milliseconds.
Default
33 milliseconds.
Usage Guidelines
This is used to throttle LSP flooding. Higher values reduce network traffic and can help keep
underpowered routers from becoming overloaded during network events. Lower values speed up
convergence.
Example
The following command sets the minimal LSP interval for IS-IS VLANs to 66 milliseconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command configures the T1 restart retransmit timer for one or all VLANs.
Syntax Description
vlan all Specifies that the T1 restart timer configuration applies to all VLANs.
vlan_name Specifies a VLAN to which the T1 restart timer configuration applies.
seconds Specifies the T1 restart timer value. The range is 1 to 65535 seconds.
level [1 | 2] Limits the configuration change to level 1 or level 2. If neither level 1
nor level 2 is specified, the configuration applies to both levels.
Default
3 seconds.
Usage Guidelines
If, after sending a restart request, the router process associated with this interface does not receive a
restart acknowledgement and a CSNP within the period specified by this command, another restart
request is sent.
Example
The following command sets the T1 restart timer to 6 seconds on all level 1 VLANs:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the time to wait for an acknowledgement of a transmitted LSP on a point-to-point
interface.
Syntax Description
vlan all Applies the timer value to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the timer configuration applies.
seconds Defines the timer value. The range is 0 to 65535 seconds.
Default
5 seconds.
Usage Guidelines
If an acknowledgement is not received when the timer expires, the LSP is resent and the timer is reset.
Example
The following command sets the retransmit interval for the SJvlan to 10 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command sets the wide metric value for one or all IS-IS VLANs.
Syntax Description
vlan all Applies the configuration to all IS-IS VLANs.
vlan_name Specifies a single VLAN to which the configuration applies.
metric Sets the metric. The range is 1 to 16777214.
level [1 | 2] Limits the configuration change to either level 1 or level 2. If neither
level 1 nor level 2 is specified, the configuration applies to both levels.
Default
10.
Usage Guidelines
If the wide metric style is enabled on the associated IS-IS router process, the wide metric value is used
in Extended IP reachability TLVs, Extended IS Reachability TLVs, and IPv6 Reachability TLVs in LSPs.
Example
The following command sets the wide metric to 15 for all IS-IS VLANs:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
configure jumbo-frame-size
configure jumbo-frame-size framesize
Description
Sets the maximum jumbo frame size for the switch.
Syntax Description
framesize Specifies a maximum transmission unit (MTU) size for a jumbo frame.
The range is 1523 to 9216; the default is 9216.
Default
Jumbo frames are disabled by default. The default size setting is 9216.
Usage Guidelines
Jumbo frames are used between endstations that support larger frame sizes for more efficient transfers
of bulk data. Both endstations involved in the transfer must be capable of supporting jumbo frames.
The framesize keyword describes the maximum jumbo frame size “on the wire,” and includes 4 bytes of
cyclic redundancy check (CRC) plus another 4 bytes if 802.1Q tagging is being used.
To enable jumbo frame support, you must configure the maximum transmission unit (MTU) size of a
jumbo frame that will be allowed by the switch.
Note
Extreme Networks recommends that you set the MTU size so that fragmentation does not
occur.
Some network interface cards (NICs) have a configured maximum MTU size that does not include the
additional 4 bytes of CRC. Ensure that the NIC maximum MTU size is at or below the maximum MTU
size configured on the switch. Frames that are larger than the MTU size configured on the switch are
dropped at the ingress port.
Example
The following command configures the jumbo frame size to 5500:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds an entry to an L2PT profile.
Syntax Description
profile profile_name Specifies the profile that defines L2PT configuration for L2 protocols.
add protocol filter Adds the specified Layer 2 protocol filter.
filter_name
action Specifies the action to perform on PDUs of the protocol (the default
value is tunnel).
tunnel Specifies to tunnel PDUs through the network.
cos cos Specifies to override the class of service for tunneled PDUs, and
specifies the class of service value to use for tunneling PDUs.
encapsulate Specifies to encapsulate PDUs at egress, and decapsulate L2PT
packets at ingress.
none Specifies to not participate in tunneling for this protocol.
Default
Disabled.
Usage Guidelines
Use this command to add an entry to an L2PT profile.
Example
The following example adds an entry to my_l2pt_prof to tunnel protocols in "mylistt" at cos 2:
configure l2pt profile my_l2pt_prof add protocol filter mylist action tunnel cos 2
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an entry to an L2PT profile.
Syntax Description
profile profile_name Specifies the profile that defines L2PT configuration for L2 protocols.
delete protocol filter Deletes the specified Layer 2 protocol filter.
filter_name
Default
Disabled.
Usage Guidelines
Use this command to delete an entry to an L2PT profile.
Example
The following example deletes the entry for "mylist" from my_l2pt_prof:
configure l2pt profile my_l2pt_prof delete protocol filter mylist
The following example deletes the entry entry for "mylist" from my_l2pt_prof that is in use by a service:
configure l2pt profile my_l2pt_prof delete protocol filter mylist
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a VPLS, H-VPLS, or VPWS peer for the node you are configuring.
Syntax Description
vpls_name Specifies the VPLS for which you are configuring a peer.
vpws_name Specifies the VPWS for which you are configuring a peer.
ipaddress Specifies the IP address of the peer node.
core Specifies that the peer is a core node. This option applies only to VPLS peers.
full-mesh Specifies that the peer is a core full-mesh node. This is the default setting if
neither the core or spoke options are specified. This option applies only to
VPLS peers.
primary Specifies that the peer is an H-VPLS core node and configures a primary H-
VPLS connection to that core node. This option applies only to H-VPLS peers.
secondary Specifies that the peer is an H-VPLS core node and configures a secondary H-
VPLS connection to that core node. This option applies only to H-VPLS peers.
spoke Specifies that the peer is a H-VPLS spoke node. This option applies only to H-
VPLS peers.
Default
N/A.
Usage Guidelines
Each VPLS or H-VPLS node supports up to 64 peers, and each VPWS supports one peer. H-VPLS core
nodes can peer with other core nodes and/or spoke nodes. H-VPLS spoke nodes can peer with core
nodes but not with other spoke nodes.
VPLS core nodes must be configured in a full-mesh with other core nodes. Thus, all core nodes in the
VPLS must have a configured PW to every other core node serving this VPLS. By default, the best LSP
is chosen for the PW. The underlying LSP used by the PW can be configured by specifying the named
LSP using the CLI command configure l2vpn [vpls vpls_name | vpwsvpws_name]
peeripaddress [add | delete] mpls lsplsp_name.
H-VPLS spoke nodes establish up to two point-to-point connections to peer with core nodes. If both
primary and secondary peers are defined for a spoke node, the spoke node uses one of the peers for all
communications. If both peers are available, the spoke node uses the connection to the primary peer. If
the primary peer connection fails, the spoke node uses the secondary peer. If the primary peer later
recovers, the spoke node reverts back to using the primary peer.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when configuring a
VPWS peer. For backward compatibility, the l2vpn keyword is optional when configuring a VPLS peer.
However, this keyword will be required in a future release, so we recommend that you use this keyword
for new configurations and scripts.
Example
The following command adds a connection from the local core switch to the core switch at 1.1.1.202:
The following command adds a connection from the local core switch to the spoke switch at 1.1.1.201:
The following command adds a primary connection from the local spoke switch to the core switch at
1.1.1.203:
The following command adds a VPWS connection from the local node to the peer switch at 1.1.1.204:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Adds a VLAN or VMAN service to a VPLS or VPWS.
Syntax Description
vpls_name Identifies the VPLS interface within the switch (character string).
vpws_name Identifies the VPWS interface within the switch (character string).
vlan_name Logically binds the VLAN to the specified VPLS or VPWS.
vman_name Adds the named VMAN to the VPLS or VPWS.
Default
N/A.
Usage Guidelines
Only one VLAN or VMAN can be configured per VPLS or VPWS.
When a VLAN service is added to a VPLS or VPWS, the VLAN ID is locally significant to the switch.
Thus, each VLAN VPLS or VPWS interface within the Layer 2 VPN can have a different VLAN ID. This
greatly simplifies VLAN ID coordination between metro network access points. Traffic may be switched
locally between VLAN ports if more than one port is configured for the VLAN.
When a VMAN service has been configured for a VPLS or VPWS, the VMAN ID is locally significant to
the switch. Thus, each VMAN VPLS or VPWS interface within the Layer 2 VPN can have a different
VMAN ID, just like the VLAN service. The only difference is that the Layer 2 VPN overwrites the outer
VMAN tag on Layer 2 VPN egress and leaves the inner VLAN tag unmodified. Because the inner VLAN
tag is considered part of the customer packet data, the VMAN service can be used to emulate port-
based services. This is accomplished by configuring the Layer 2 VPN to strip the 802.1Q tag from the
tunneled packet. Since the switch inserts the VMAN tag when the packet is received and the 802.1Q tag
is stripped before the packet is sent on the VPLS or VPWS PW, all packets received on ports that are
members of the VMAN are transmitted unmodified across the Layer 2 VPN. The command configure
l2vpn [vpls vpls_name | vpws vpws_name] dot1q tag exclude is used to configure
the switch to strip the 802.1Q tag on the VPLS.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when adding a service
to VPWS. For backward compatibility, the l2vpn keyword is optional when adding a service to VPLS.
However, this keyword will be required in a future release, so we recommend that you use this keyword
for new configurations and scripts.
Example
The example below adds a VLAN and a VMAN to the named VPLS:
The following example adds a VLAN and a VMAN to the named VPWS:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Deletes the specified VPLS or VPWS peer.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
vpws_name Identifies the VPWS within the switch (character string).
ipaddress Specifies the IP address for the peer node that is the endpoint of the
VC-LSP. This option applies only to VPLS peers.
all Deletes all VPLS or VPWS peers. This option applies only to VPLS
peers.
Default
N/A.
Usage Guidelines
When the VPLS or VPWS peer is deleted, VPN connectivity to the peer is terminated. The all keyword
can be used to delete all peers associated with the specified Layer 2 VPN.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when deleting a VPWS
peer. For backward compatibility, the l2vpn keyword is optional when deleting a VPLS peer. However,
this keyword will be required in a future release, so we recommend that you use this keyword for new
configurations and scripts.
Example
The following example removes connectivity to 1.1.1.202 from VPLS1:
configure vpls vpls1 delete peer 1.1.1.202
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements
Description
Deletes the specified VLAN or VMAN service from the specified Layer 2 VPN.
Syntax Description
vpls_name Identifies the VPLS interface within the switch (character string).
vpws_name Identifies the VPWS interface within the switch (character string).
vlan_name Logically binds the VLAN to the specified VPLS.
vman_name Adds the named VMAN to the VPLS.
Default
N/A.
Usage Guidelines
If there are no services configured for the VPLS or VPWS, all PWs within the Layer 2 VPN are terminated
from the switch.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when deleting a service
from a VPWS. For backward compatibility, the l2vpn keyword is optional when deleting a service from a
VPLS. However, this keyword will be required in a future release, so we recommend that you use this
keyword for new configurations and scripts.
Example
The following example removes a service interface from a VPLS:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the Virtual Circuit Connectivity Verification (VCCV) health check test and fault notification
intervals for the specified VPLS or VPWS instance.
Syntax Description
vpls_name Identifies the VPLS instance for which health check is to be configured.
vpws_name Identifies the VPWS instance for which health check is to be configured.
all Specifies that the configuration applies to all VPLS instances on the local
node.
interval_seconds Defines the interval between health check tests. The range is 1 to 10 seconds.
fault_multiplier Specifies how long health check waits before a warning level message is
_ number logged. The wait period is the interval_seconds multiplied by the
fault_multiplier_number. The fault_multiplier_number range
is 2 to 6.
Default
Interval is 5 seconds.
Fault mulitplier is 4.
Usage Guidelines
The VCCV health-check configuration parameters can be configured at anytime after the VPLS has
been created.
The l2vpn keyword is introduced in ExtremeXOS Release 12.4 and is required when configuring health
check for a VPWS. For backward compatibility, the l2vpn keyword is optional when configuring health
check for a VPLS. However, this keyword will be required in a future release, so Extreme Networks
recommends that you use this keyword for new configurations and scripts.
Example
The following command configures the health check feature on the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 12.1.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Adds or deletes a named LSP as a specified PW for the specified Layer 2 VPN peer.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
vpws_name Identifies the VPWS within the switch (character string).
ipaddress Specifies the IP address for the peer node that is the endpoint of the
PW-LSP. This option applies only to VPLS peers.
add Permits addition of up to four RSVP-TE LSPs to the VPLS peer.
delete Removes the LSP specified by the lsp_name parameter from the PW-
LSP aggregation list.
lsp_name Removes the specified lsp.
Default
N/A.
Usage Guidelines
If all the named LSPs are deleted from the configured Layer 2 VPN peer, VPLS or VPWS attempts to use
the best-routed path LSP, if one exists. The delete portion of this command cannot be used to remove a
named LSP that was selected by the switch as the best LSP. If no LSPs exist to the peer, Layer 2 VPN
connectivity to the peer is lost. Currently, the VPLS or VPWS PW uses only one LSP.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when configuring a
VPWS instance. For backward compatibility, the l2vpn keyword is optional when configuring a VPLS
instance. However, this keyword will be required in a future release, so we recommend that you use this
keyword for new configurations and scripts.
Example
The following examples add and remove a named LSP:
configure l2vpn vpls vpls1 peer 1.1.1.202 add mpls lsp “to-olympic4"
configure l2vpn vpls vpls1 peer 1.1.1.202 delete mpls lsp “to-olympic4"
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the maximum number of MAC SAs (Source Addresses) that can be learned for a given VPLS
or VPWS peer.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
ipaddress Specifies the IP address for the peer node that is the endpoint of the
PW-LSP. This option applies only to VPLS peers.
limit-learning Specifies a limit to the number of MAC SAs to be learned for the
specified VPLS and peer.
number The maximum number of MAC SAs that can be learned for the
specified VPLS and peer.
unlimited-learning Specifies no limit to the number of MAC SAs to be learned for the
specified VPLS and peer.
Default
Unlimited.
Usage Guidelines
This parameter can only be modified when the specified VPLS is disabled. The unlimited-learning
keyword can be used to specify that there is no limit. The default value is unlimited-learning.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when configuring a
VPWS instance. For backward compatibility, the l2vpn keyword is optional when configuring a VPLS
instance. However, this keyword will be required in a future release, so we recommend that you use this
keyword for new configurations and scripts.
Example
The following example causes no more than 20 MAC addresses to be learned on VPLS1’s PW to 1.1.1.202:
configure vpls vpls1 peer 1.1.1.202 limit-learning 20
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures L2VPN VPLS service over MPLS Static PW.
Syntax Description
vpls_name Specifies the VPLS for which you are configuring a peer.
ipaddress Specifies the IP address of the peer node.
static-pw Specifies the static pseudowire transmit label.
transmit label
outgoing_pw_lab Specifies the name of the egress label.
el
receive-label Specifies the static PW receive label.
ncoming_pw_labe Specifies the name of the ingress label.
l
Default
N/A.
Usage Guidelines
Use this command to statically configure a new MPLS Ethernet PW for the specified VPLS. You must
specify the outgoing (MPLS ingress) and incoming (MPLS egress) PW labels. Similarly, you must
configure the peer with a static PW that has the reverse PW label mappings.
Locally, the incoming_pw_label must be unique and is allocated out of the static label space. The
outgoing_pw_label must match the peer’s configured incoming PW label.
Just like a signaled PW, a static PW can optionally be configured to use any type of tunnel LSP: LDP,
RSVP-TE, or Static. In the case of RSVP-TE and LDP, those protocols must be configured and enabled
and an LSP must be established before traffic can be transmitted over the static PW.
For Static LSPs, only the MPLS ingress LSP (or outgoing LSP) is specified. Unlike signaled PWs, there is
no end-to-end PW communication that is used to verify that the PW endpoint is operational, and in the
case of static LSPs, that the data path to the PW endpoint is viable. In the event of a network fault, if a
secondary RSVP-TE LSP is configured or the routing topology changes such that there is an alternate
LDP LSP, the static PW will automatically switch LSPs in order to maintain connectivity with the PW
endpoint. Static LSPs can be protected proactively by configuring BFD to verify the static LSPs IP next
hop connectivity. Optionally, the underlying LSP for the PW can be explicitly specified using a named
LSP. When a named LSP is explicitly specified, only the specified named LSP is used to carry the PW. In
the event that a specified named LSP is withdrawn, the VPLS/VPWS remains operationally down until
the named LSP is restored.
Since VC Status signaling is not supported, the VC Status “standby” bit cannot be used to allow support
for PW redundancy and H-VPLS. Consequently, only “core full-mesh” PWs are allowed to have statically
configured labels.
Example
The following command configures a new MPLS ethernet pseudowire for vpls1 :
configure vpls vpls1 add peer 1.1.1.202
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on all platforms that support MPLS as described in the ExtremeXOS 30.5
Feature License Requirements document.
Note
This command has been replaced with the following command: configure l2vpn [vpls
vpls_name | vpws vpws_name] add service [{vlan} vlan_name |
{vman}vman_name] . This command is still supported for backward compatibility, but it
will be removed from a future release, so we recommend that you start using the new
command.
Description
Configures service for VPLS.
Syntax Description
vpls_name Identifies the VPLS interface within the switch (character string)
vlan_name Logically binds the VLAN to the specified VPLS.
vman_name Adds the named VMAN to the VPLS.
Default
N/A.
Usage Guidelines
This command configures the VPLS service for the specified vpls_name. The VPLS service may be a
customer VLAN or a customer VMAN. Specifying the vlan_name logically binds the VLAN to the
specified VPLS. Only one VLAN or VMAN may be configured per VPLS.
When a VLAN service has been configured for a VPLS, the VLAN is added to the VPLS specified by the
vpls_name. The VLAN ID is locally significant to the switch. Thus, each VLAN VPLS interface within
the VPLS network may have a different VLAN ID service bound to the VPLS. This greatly simplifies
VLAN ID coordination between metro network access points. Traffic may be switched locally between
VLAN ports if more than one port is configured for the VLAN.
When a VMAN service has been configured for a VPLS, the VMAN is added to the VPLS specified by
vpls_name. The VMAN ID is locally significant to the switch. Thus, each VMAN VPLS interface within the
VPLS network may have a different VMAN ID, just like the VLAN service. The only difference is that the
VPLS network overwrites the outer VMAN tag on VPLS egress and leaves the inner VLAN tag
unmodified. Because the inner VLAN tag is considered part of the customer packet data, the VMAN
service can be used to emulate port-based services. This is accomplished by configuring the VPLS to
strip the 802.1Q tag from the tunneled packet. Since the switch inserts the VMAN tag when the packet
is received and the 802.1Q tag is stripped before the packet is sent on the VPLS PW, all packets received
on ports that are members of the VMAN are transmitted unmodified across the VPLS. The command
configure vpls vpls_name dot1q tag exclude is used to configure the switch to strip the
802.1Q tag on the VPLS.
Example
The example below adds a VLAN and a VMAN to the named VPLS:
configure vpls myvpls add service vlan myvlan
configure vpls myvpls add service vman myvman
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Changes the labels of a statically configured Ethernet PW for a VPLS.
Syntax Description
vpls_name Specifies the VPLS for which you are configuring a peer.
peer Specifies the peer IP address.
ipaddress Specifies the IP address of the peer node.
static-pw Specifies the static pseudowire.
transmit label Specifies the pseudowire transmit label.
outgoing_pw_label Specifies the name of the egress label.
receive-label Specifies the static pseudowire receive label.
incoming_pw_label Specifies the name of the ingress label.
Default
N/A.
Usage Guidelines
Use this command to change the labels of a statically configured Ethernet PW for a VPLS that already
exists. Either or both the outgoing (MPLS ingress) and incoming (MPLS egress) PW labels can be
specified. The peer must be similarly configured with a static PW that has the reverse PW label
mappings. Locally, the incoming_pw_label must be unique and is allocated out of the static label
space. The outgoing_pw_label must match the peer’s configured incoming PW label. The CES or
L2VPN can remain operational during the change; however, the PW will go down and come back up.
Example
The following command changes the VPLS label to "VPLS1":
configure l2vpn vpls vpls1 peer static-pw 1.1.1.202
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on all platforms that support MPLS as described in the ExtremeXOS 30.5
Feature License Requirements document.
Description
Configures a VPLS instance to provide protected access using the EAPS redundancy type, the specified
ESRP domain, or STP.
Syntax Description
vpls_name Specifies the VPLS for which you are configuring protection.
esrpDomain Configures a VPLS instance to provide protected access using the specified
ESRP domain.
eaps Configures a VPLS instance to use the EAPS redundancy type.
stp Configures a VPLS instance to request an FDB relearning process on an
adjacent node when STP responds to a topology change for a VLAN.
Default
Redundancy disabled.
Usage Guidelines
Only one redundancy mode can be configured at a time on a VPLS, and the VPLS must be disabled
when the redundancy mode is configured. If you attempt to configure a second mode, an error appears.
The current redundancy mode must be unconfigured before you configure a different redundancy
mode.
The ESRP domain specified must be a valid ESRP domain of type vpls-redundancy. If not, the command
is rejected with an appropriate error message. When a VPLS instance is associated with an ESRP
domain, the user cannot delete the ESRP domain unless the VPLS redundancy has been unconfigured.
For VPLS access protection to become fully functional, VPLS redundancy must also be configured on a
second VPLS peer using the same VPLS name and ESRP domain.
Specify the redundancy type as EAPS when using redundant EAPS access rings. This configuration
requires EAPS shared links to be configured between redundant VPLS nodes. This configures VPLS to
use a PW between VPLS attachment nodes instead of using a customer VLAN. This configuration is
only required when there is an EAPS ring on the VPLS service VLAN.
Note
The EAPS master should not be on a VPLS node.
The STP option enables VPLS interfaces to respond appropriately to STP topology changes in a VLAN.
For example, if STP detects a link failure, it will flush the appropriate FDB entries to initiate relearning on
the STP protected interfaces. When this option is selected and STP initiates relearning, the VPLS
interfaces on the same VLAN also initiate relearning so that a new VLAN path to the VPLS core can be
learned. For more information, including limitations and restrictions, see the “VPLS STP Redundancy
Overview” Section in the ExtremeXOS 30.5 User Guide.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4. For backward compatibility, the l2vpn
keyword is optional when configuring a VPLS instance. However, this keyword will be required in a
future release, so we recommend that you use this keyword for new configurations and scripts.
Example
The following command adds redundancy to the vpls1 VPLS using the esrp1 domain:
configure l2vpn vpls vpls1 redundancy esrp esrp1
The following command specifies the EAPS redundancy type for the vpls2 VPLS:
configure l2vpn vpls vpls2 redundancy eaps
The following command specifies the STP redundancy type for the vpls3 VPLS:
configure l2vpn vpls vpls3 redundancy STP
History
This command was first available in ExtremeXOS 12.1.
The l2vpn keyword and the STP option were added in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures L2VPN VPWS service over MPLS Static PW.
Syntax Description
vpws_name Specifies the VPWS for which you are configuring a peer.
ipaddress Specifies the peer IP address.
ipaddress Specifies the IP address of the peer node.
static-pw Specifies the static pseudowire transmit label.
transmit-label
outgoing_pw_lab Specifies the name of the egress label.
el
receive-label Specifies the static PW receive label.
incoming_pw_lab Specifies the name of the ingress label.
el
Default
N/A.
Usage Guidelines
Use this command to statically configure a new MPLS Ethernet PW for the specified VPWS. You must
specify the outgoing (MPLS ingress) and incoming (MPLS egress) PW labels. Similarly, you must
configure the peer with a static PW that has the reverse PW label mappings.
Locally, the incoming_pw_label must be unique and is allocated out of the static label space. The
outgoing_pw_label must match the peer’s configured incoming PW label.
Just like a signaled PW, a static PW can optionally be configured to use any type of tunnel LSP: LDP,
RSVP-TE, or Static. In the case of RSVP-TE and LDP, those protocols must be configured and enabled
and an LSP must be established before traffic can be transmitted over the static PW.
For Static LSPs, only the MPLS ingress LSP (or outgoing LSP) is specified. Unlike signaled PWs, there is
no end-to-end PW communication that is used to verify that the PW endpoint is operational, and in the
case of static LSPs, that the data path to the PW endpoint is viable. In the event of a network fault, if a
secondary RSVP-TE LSP is configured or the routing topology changes such that there is an alternate
LDP LSP, the static PW will automatically switch LSPs in order to maintain connectivity with the PW
endpoint. Static LSPs can be protected proactively by configuring BFD to verify the static LSPs IP next
hop connectivity. Optionally, the underlying LSP for the PW can be explicitly specified using a named
LSP. When a named LSP is explicitly specified, only the specified named LSP is used to carry the PW. In
the event that a specified named LSP is withdrawn, the VPLS/VPWS remains operationally down until
the named LSP is restored.
Since VC Status signaling is not supported, the VC Status “standby” bit cannot be used to allow support
for PW redundancy and H-VPLS. Consequently, only “core full-mesh” PWs are allowed to have statically
configured labels.
Example
The following command configures VPWS service for VPWS1 on peer 1.1.1.202:
configure vpws vpws1 add peer 1.1.1.202
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on all platforms that support MPLS as described in the ExtremeXOS 30.5
Feature License Requirements document.
Description
Changes the labels of a statically configured Ethernet pseudowire for a VPWS.
Syntax Description
vpws_name Specifies the VPWS for which you are configuring a peer.
peer Specifies the peer IP address.
ipaddress Specifies the IP address of the peer node.
static-pw Specifies the static pseudowire.
transmit label Specifies the pseudowire transmit label.
outgoing_pw_lab Specifies the name of the egress label.
el
receive-label Specifies the static pseudowire receive label.
incoming_pw_lab Specifies the name of the ingress label.
el
Default
N/A.
Usage Guidelines
Use this command to change the labels of a statically configured Ethernet pseudowire for a VPWS that
already exists. Either or both the outgoing (MPLS ingress) and incoming (MPLS egress) PW labels can
be specified. The peer must be similarly configured with a static PW that has the reverse PW label
mappings. Locally, the incoming_pw_label must be unique and is allocated out of the static label
space. The outgoing_pw_label must match the peer’s configured incoming PW label. The CES or
L2VPN can remain operational during the change; however, the PW will go down and come back up.
Example
The following command changes the VPWS label to "vpws1":
configure l2vpn vpws vpws1 peer static-pw 1.1.1.202
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on all platforms that support MPLS as described in the ExtremeXOS 30.5
Feature License Requirements document.
configure l2vpn
configure l2vpn [vpls vpls_name | vpws vpws_name] {dot1q [ethertype
hex_number | tag [include | exclude]]} {mtu number}
Description
Configures VPLS or VPWS parameters.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
vpws_name Identifies the VPWS within the switch (character string).
dot1q Specifies the action the switch performs with respect to the 802.1Q ethertype
or tag.
ethertype Overwrites the ethertype value for the customer traffic sent across the PW
hex_number Identifies the ethertype, uses the format of 0xN.
tag Specifies the action the switch performs with respect to the 802.1Q tag.
include Includes the 802.1Q tag when sending packets over the VPLS L2 VPN.
exclude Strips the 802.1Q tag before sending packets over the VPLS L2 VPN.
mtu Specifies the MTU value of the VPLS transport payload packet.
number The size (in bytes) of the MTU value. The configurable MTU range is 1492
through 9216. The default VPLS MTU value is 1500.
Default
dot1q tag - excluded.
Usage Guidelines
This command configures the VPLS and VPWS parameters. PWs are point-to-point links used to carry
VPN traffic between two devices within the VPLS. Each device must be configured such that packets
transmitted between the endpoints are interpreted and forwarded to the local service correctly. The
optional ethertype keyword may be used to overwrite the Ethertype value for the customer traffic sent
across the PW. By default, the configured switch ethertype is used. If configured, the ethertype in the
outer 802.1q field of the customer packet is overwritten using the configured ethertype value. The
ethertype value is ignored on receipt.
Optionally, the switch can be configured to strip the 802.1q tag before sending packets over the VPLS or
VPWS Layer 2 VPN. This capability may be required to provide interoperability with other vendor
products or to emulate port mode services. The default configuration is to include the 802.1q tag.
The mtu keyword optionally specifies the MTU value of the VPLS or VPWS transport payload packet
(customer packet). The MTU value is exchanged with VPLS-configured peer nodes. All VPLS peer nodes
must be configured with the same MTU value. If the MTU values do not match, PWs cannot be
established between peers. The MTU values are signaled during PW establishment so that endpoints
can verify that MTU settings are equivalent before establishing the PW. By default the MTU is set to
1500. The configurable MTU range is 1492 through 9216. Changing the MTU setting causes established
PWs to terminate. Payload packets might be dropped if the VPLS or VPWS MTU setting is greater than
the MPLS MTU setting for the PW interface.
Note
The maximum MTU value supported depends on the current configuration options. For more
information, see “Configuring the Layer 2 VPN MTU” in the ExtremeXOS 30.5 User Guide.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when enabling a VPWS.
For backward compatibility, the l2vpn keyword is optional when enabling a VPLS. However, this
keyword will be required in a future release, so we recommend that you use this keyword for new
configurations and scripts.
Example
The following commands change the various parameters of a particular VPLS:
configure vpls vpls1 dot1q ethertype 0x8508
configure vpls vpls1 dot1q ethertype 0x8509 mtu 2500
configure vpls vpls1 dot1q tag exclude mtu 2430
configure vpls vpls1 dot1q mtu 2500
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the member port of an LACP to ensure the order that ports are added to the aggregator.
The lower value you configure for the port’s priority, the higher priority that port has to be added to the
aggregator.
Syntax Description
port Specifies the LACP member port that you are specifying the priority
for.
port_priority Specifies the priority you are applying to this member port to be
assigned to the LACP aggregator. The range is from 0 to 65535; the
default is 0. The lower configured value has higher priority to be
added to the aggregator.
Default
The default priority is 0.
Usage Guidelines
The port must be added to the LAG prior to configuring it for LACP. The default value is 0, or highest
priority.
You can configure the port priority to ensure the order in which LAG ports join the aggregator. If you do
not configure this parameter, the lowest numbered ports in the LAG are the first to be added to the
aggregator; if there are additional ports configured for that LAG, they are put in standby mode.
Use this command to override the default behavior and ensure the order in which LAG ports are
selected. Also, if more than one port is configured with the same priority, the lowest numbered port
joins the aggregator.
Example
The following command sets the port priority for the LAG port 5:1 to be 55 (which will probably put that
port in standby initially):
configure lacp member-port 5:1 priority 55
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to configure a previously added LDAP domain as default or non-default. If a
domain is configured as default, older default domain, if any, will no longer be default since once only
one domain can be default at a time.
Syntax Description
domain_name Name of domain to be configured.
Default
N/A.
Usage Guidelines
Use this command to configure an LDAP domain as default or non-default.
Example
This command marks the LDAP domain sales.XYZCorp.com as the default domain.
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command adds an LDAP server under an LDAP domain and configures the parameters for
contacting the server.
Syntax Description
domain_name Specifies the LDAP domain under which this server should be added.
host_ipaddr Specifies a IP address for an LDAP server to add.
host_name Specifies a DNS hostname for an LDAP server to add.
server_port Specifies a port number for the LDAP service. The default port
number is 389.
client_ipaddr Specifies the LDAP client IP address, which should be set to the IP
address of the interface that will connect to the LDAP server.
vr_name Specifies the VR name for the interface that will connect to the LDAP
server. The default VR for LDAP client connections is VR-Mgmt.
encrypted sasl Specifies that the LDAP client uses Digest RSA Data Security, Inc. MD5
digest-md5 Message-Digest Algorithm encryption over SASL (Simple
Authentication and Security Layer) to communicate with the LDAP
server. Note that this mechanism encrypts only the password
credentials, and the LDAP information exchange uses plain text.
Note:
To support Digest RSA Data Security, Inc. MD5 Message-Digest
Algorithm over SASL, the LDAP client (bind user) password must be
stored using ‘reverse encryption,’ and the host_name should be
configured as the fully-qualified host name for the LDAP server.
Default
client-ipaddr is optional. If client-ipaddr is not specified, the LDAP client looks up the interface through
which the LDAP server can be reached.
If "encrypted sasl digest-md5' is not specified, the LDAP client talks to the LDAP server using plain text.
Usage Guidelines
You can configure up to 8 LDAP servers under one LDAP domain. The LDAP servers are contacted in
the order of configuration. If the first server does not respond before the timeout period expires, the
second server is contacted. This process continues until an LDAP server responds, and then the
responding server marked as 'active'. Subsequent LDAP requests for that LDAP domain are sent to the
'active' server.
Note
If the switch cannot resolve the host name using a DNS server, the switch rejects the
command and generates an error message.
As of 15.2, the "identity-management" keyword is now optional in this command.
Example
The following command configures LDAP client access to LDAP server LDAP1 using encrypted
authentication:
The following command adds the LDAP server LDAPServer1.sales.XYZCorp.com under the domain
sales.XYZCorp.com and configures the LDAP client to contact it over VR-Default. It also configures the
LDAP client to communicate with the server using digest-md5 encryption over SASL.
The following command adds the LDAP server 192.168.1.1 under the domain sales.XYZCorp.com and also
configures the LDAP client to contact it through the interface 10.10.10.1 over VR-Mgmt.
History
This command was first available in ExtremeXOS 12.5.
This command was modified in ExtremeXOS 15.2 to make the identity management keyword optional.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LDAP base-dn to be used while searching an user under an LDAP domain.
Syntax Description
domain_name Specifies the LDAP domain for which this base-dn is to be configured.
base_dn Specifies the LDAP base domain under which the users are to be
searched.
none Specifies the LDAP root domain as the location under which the users
are to be searched.
default Restores the base_dn to it default value i.e., same as the domain
name.
Default
By default base-dn is assumed to be the same as the domain name unless configured otherwise.
If a domain is not specified, the base-dn is configured for the default domain.
Usage Guidelines
LDAP base-dn is the LDAP directory root under which the users are to be searched. By default base-dn
is assumed to be the same as the domain name.
For users upgrading from ExtremeXOS 15.1 and older versions, a domain is created with the same name
as the base-dn in the older configuration. This domain is marked as the default domain. This can be
changed later if required.
Example
The following commands configure the base-dn for the domain sales.XYZCorp.com.
The base-dn configured as XYZCorp.com means that XYZCorp.com is the base location to search for
user information.
The base-dn configured as none means that the directory root is the base location to search for user
information.
History
This command was first available in ExtremeXOS 12.5.
This command was modified in ExtremeXOS 15.2 to add the {domain [domain_name | all]}
option.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LDAP client credentials required for the switch to access an LDAP server.
Syntax Description
domain_name Specifies the LDAP domain for which this bind-user is to be
configured.
user_name Specifies the user name for LDAP server access.
encrypted Indicates that the specified password is encrypted.
password Specifies the user password for LDAP server access.
Note:
To support Digest RSA Data Security, Inc. MD5 Message-Digest
Algorithm over SASL, the password must be stored using ‘reverse
encryption.’
Default
If no domain is specified, the bind-user is configured for the default domain.
Usage Guidelines
The bind-user is an LDAP user who has read access to user information in the LDAP directory.
On many newer directory servers "anonymous" access is disabled. You may also find that though the
LDAP bind succeeds, the anonymous user might be denied read access to user information.
Example
The following command configures the LDAP bind user as jsmith with password Extreme for the
domain sales.XYZCorp.com:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to delete one or all LDAP servers from one or all LDAP domains.
Syntax Description
domain_name Specifies the LDAP domain from which this server is to be deleted.
all Specifies that all configured LDAP servers are to be deleted.
host_ipaddr Specifies the IP address of the LDAP server to delete.
host_name Specifies a DNS hostname of the LDAP server to delete.
server_port Specifies a port number for the LDAP service to delete. The default
port number is 389.
vr vr_name Specifies the virtual router to delete.
Default
If a domain is not specified, the server(s) under default domain is deleted.
Usage Guidelines
None.
Example
The following command deletes the LDAP server LDAPServer1.sales.XYZCorp.com from the domain
sales.XYZCorp.com:
The following command deletes all LDAP servers from all LDAP domains:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables LDAP queries for the specified type of network login users.
Syntax Description
domain_name Specifies the LDAP doman for which this configuraton is to be
applied.
dot1x Enables or disables LDAP queries for dot1x network login.
mac Enables or disables LDAP queries for MAC network login.
web-based Enables or disables LDAP queries for web-based network login.
Default
LDAP queries are enabled for all types of network login.
Usage Guidelines
It may be necessary to disable LDAP queries for specific type of netlogin user, for example, netlogin
mac users, whose username is the same as mac address. The LDAP directory might not contain useful
information about these type of users and unnecessary LDAP queries can be avoided.
Note
LDAP queries are not sent for locally authenticated network login users.
Example
The following command enables LDAP queries for MAC network login:
The following command disables LDAP queries for dot1x network login:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an OID to perform a hierarchical search if the LDAP server requires it.
Syntax Description
domain_name Domain name on which to configure ldap.
all All domains.
ldap-matching-rule- Configures the OID 1.2.840.113556.1.4.1941.
in-chain
oid Object identifier.
none Specifies that LDAP query should not include any OID for hierarchical
search.
Default
N/A.
Usage Guidelines
Use this command to configure an OID to perform a hierarchical search if the LDAP requires it. The OID
supplied with this command will be used to form the LDAP query. If a server does not require extended
control OID, the none option can be selected.
Example
configure ldap domain abc.com hierarchical-search-oid ldap_matching_rule_in_chain
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a specified VLAN’s IP address as the management address to be advertised by LLDP.
Syntax Description
vlan Specifies a VLAN for the management IP address.
vlan_name Specifies a VLAN name for the management IP address (default is
"Mgmt").
vlan_id Specifies a VLAN ID for the management IP address.
primary-ip LLDP advertises the primary IP address of the specified VLAN
(default).
The specified VLAN must be already configured with at-least one
primary IPv4 address.
secondary-ip Specifies that LLDP advertises the secondary IP address of the
specified VLAN.
The specified secondary IP address must already be configured on the
specified VLAN.
Default
The system MAC address is advertised by default if the Management VLAN IP address is not configured
and no VLAN is specified by this command.
If you do not specify, LLDP advertises the primary IP address of the specified VLAN.
Usage Guidelines
If the Management VLAN IP address is not configured, LLDP and CDP (Cisco Discovery Protocol)
advertise the system MAC address as the management address in their management TLV, which makes
the network device not accessible. If the Management VLAN IP address is not configured, you can
specify any user-defined VLAN’s IP address or front panel port VLAN’s IP address as the management
address for LLDP and CDP protocols.
This command dictates the management address to be advertised by the LLDP protocol; the equivalent
command for CDP is configure cdp management-address on page 328.
To use this command, the specified VLAN must already exist. The management IP address configuration
is removed if the specified VLAN is deleted, or if the primary IP address of the specified VLAN is deleted
(if primary-ip configured), or if the specified secondary IP address of the specified VLAN is deleted
(if secondary-ip configured).
If primary-ip is configured and the specified VLAN has multiple primary IP addresses (IPv4 and
IPv6), then LLDP advertises the first primary IP address that exists in the address table.
If secondary-ip is configured and the specified VLAN has multiple secondary IP addresses, then
LLDP advertises only the specified secondary IP address of the configuration.
Note
LLDP does not recognize IPv6 addresses in this field.
Example
The following example configures the primary IP address of the VLAN "vlan1" as the management
address to be advertised by LLDP protocol:
configure lldp management-address vlan vlan1 primary-ip
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
The fast-start feature is automatically enabled when you enable the LLDP MED capabilities TLV. This
command configures how many times, from 1 to 10, the switch sends out an LLDP MED packet with an
interval of 1 second.
Syntax Description
count Specifies the number of times the switch transmits LLDP MED TLVs each
second (once it detects a neighbor transmitting LLDP MED TLVs). The range is
1 to 10.
Default
3.
Usage Guidelines
When the switch detects a MED-capable device, this count determines how many times the switch
sends a LLDP MED TLVs with an interval of 1 second. The fast-start feature enables the MED-capable
device to quickly learn information; this command changes the value from the default 3. The fast-start
feature is automatically enabled when you enable the LLDP MED capabilities TLV.
Note
After you configure the LLDP MED capability TLV, the fast-start feature automatically runs. To
configure the LLDP MED capability TLV, use the configure lldp ports [all |
port_list] [advertise | no-advertise] vendor-specific med
capabilities command.
Example
The following command configures fast learning on the switch to a value of 2:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an application priority to be advertised to DCBX end stations.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
This command configures the switch to advertise the priority that an end station should use for the
specified application or port number. The priority number is mapped to an 802.1p value, which
determines how the switch manages traffic from that application or port.
The switch supports a maximum of 8 DCBX applications per port. If an application configuration already
exists on the specified port or ports, the priority is updated to the new value. If the maximum number of
applications for a port is exceeded, the switch logs an error message.
Example
The following command configures the switch to advertise priority 4 for the iSCSI application on ports1
to 24:
configure lldp ports 1-24 dcbx add application name iscsi priority 4
The following command configures the switch to advertise priority 3 for ethertype value 34525 on port1:
The following command configures the switch to advertise priority 6 for Layer 4 port 992 on port1:
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes the priority configuration for one or all applications from the specified ports.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
application_name Specifies an application. Supported values are:
• fcoe—Fiber Channel Over Ethernet (FCoE).
• fip—FCoE Initiation Protocol (FIP).
• iscsi—Internet Small Computer System Interface (iSCSI).
Default
N/A.
Usage Guidelines
This command configures the switch to advertise the priority that an end station should use for the
specified application or port number. The priority number is mapped to an 802.1p value, which
determines how the switch manages traffic from that application or port.
If an application configuration already exists on the specified port or ports, the priority is updated to the
new value.
Example
The following command removes the priority configuration for Layer 4 port 30 on port 23:
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not to advertise management address information to its
neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
With ExtremeXOS, you can only add one management address TLV per LLDPDU and the information
must be the IP address configured on the management VLAN. If no IP address is assigned to the
management VLAN, the system sends the system MAC address. LLDP does not send out IPv6
addresses in this field.
Example
The following command advertises the management address information for port 1:5:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise port description information to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
N/A.
Example
The following command configures port 1:7 to not advertise the port description information to
neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not to advertise its system capabilities to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
When at least one VLAN exists with more than two ports, bridging is sent to enabled.
When at least one VLAN on the switch has IP forwarding enabled, the system automatically sets the
router bit.
Example
The following command configures all ports to advertise system capability information to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not to advertise its system description to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
Advertise.
Usage Guidelines
Although not mandatory according to the standard, this TLV is included in the LLDPU by default when
you enable LLDP.
When enabled, the system sends the following image (from the show version command) in the system
description TLV:
Example
The following command configures port 1:4 through port 1:8 to not advertise the system description
information to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Default
Configures the LLDP port to advertise or not to advertise its system name to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
N/A.
Example
The following command configures port 1:6 to advertise the system name to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise up to 8 call server IP addresses to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
ip_address_1... Specifies IP address of up to 8 call servers.
.8
Note:
NOTE: This parameter does not apply when you configure the no-advertise
parameter.
Default
No advertise.
Usage Guidelines
The Avaya phone uses this proprietary LLDP TLV for addressing information. You can configure the IP
address for up to 8 call servers in a single TLV.
Example
The following command configures ports 1-5 to advertise two call server IP addresses to neighbors:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise the 802.1q framing configuration to its
neighbors. The Avaya phone uses this proprietary LLDP TLV information. In addition to this LLDP TLV,
you must enable LLLDP as well as configure both the LLDP MED capabilities TLV and the LLDP network
policy TLV.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
tagged Specifies to use tagging.
NOTE: This parameter applies only when you use the advertise parameter.
untagged Specifies not to use tagging.
NOTE: This parameter applies only when you use the advertise parameter.
auto Specifies following a predetermined sequence (see Usage Guidelines below).
NOTE: This parameter applies only when you use the advertise parameter.
Default
No advertise.
Usage Guidelines
Before configuring this LLDP TLV, you must take the following steps:
• Enable LLDP using the enable lldp ports command.
• Enable the LLDP MED capabilities TLV using the configure lldp ports vendor-specific
med capabilities command.
• Enable the LLDP MED network policy TLV using the configure lldp ports vendor-
specific med policy application command.
This TLV is used to exchange information about Layer 2 priority tagging between the network
connectivity device (switch) and the Avaya phone.
If you configure the TLV to advertise tagging, the phone uses tagging information, which it retrieves
from the configure lldp ports vendor-specific med policy application
command. If you configure the TLV to advertise untagged, the phone does not use any tagging,
including 802.1q priority tagging.
If you configure the TLV to advertise auto, the phone cycles through the following sequence until an
action is successful:
• Uses the configuration advertised by the LLDP MED network policy TLV, as configured by the
configure lldp ports vendor-specific med policy application command.
• Uses the priority tagged frames configured by the phone’s server.
• Sends the traffic untagged.
Example
The following command configures al ports to advertise the dot1q framing as untagged to neighbors:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise up to 4 file server IP addresses to its neighbors.
The Avaya phone uses this proprietary LLDP TLV to learn the IP address(es) of the file server(s) to use.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
Default
No advertise.
Usage Guidelines
The Avaya phone uses this proprietary LLDP TLV for addressing information. You can configure the IP
address for up to 4 file servers in a single TLV.
Example
The following command configures all ports to advertise two file server IP addresses to neighbors:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise a requested conservation level. By default, the
requested conservation value on this proprietary LLDP TLV is 0, which is no power conservation. This
LLDP TLV is sent out only on PoE-capable Ethernet ports.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
No advertise.
Usage Guidelines
The switch sends this proprietary LLDP TLV to request a PD to go into a certain power conservation
level or request the PD to go to the maximum conservation level. This LLDP TLV is transmitted only on
PoE-capable ports.
When configured to advertise, the switch sends this TLV with a requested conservation power level of 0,
which requests no power conservation. To temporarily change this conservation level, use the SNMP
lldpXAvExLocPortXPoEPSEPortReqLevel object to set a new value; the reconfigured value is not saved
over a reboot. (This SNMP object can be set from 0 to 243 or 255.)
Example
The following command configures all ports to advertise the currently requested conservation level to
neighbors:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not to advertise Data Center Bridging Exchange (DCBX)
information to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
ieee Specifies the DCBX protocol defined in IEEE 802.1Qaz.
baseline Specifies the DCBX protocol known as Baseline Version 1.01, which
was defined before IEEE 802.1Qaz.
Default
No advertisement for both DCBX protocols.
Usage Guidelines
If you do not specify a protocol with this command, the advertise option enables advertisement for the
IEEE 802.1Qaz protocol, and the no-advertise option disables advertisement for both protocols.
Example
The following command advertises DCBX information according to IEEE 802.1Qaz for port 1:5:
configure lldp ports 1:5 advertise vendor specific dcbx
The following command advertises DCBX information according to Baseline Version 1.01 for port 2:1:
configure lldp ports 2:1 advertise vendor specific dcbx baseline
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise port VLAN information to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
all Specifies all VLANs on the port.
vlan_name Specifies the VLAN on the port that you want to advertise.
Default
No advertise.
Usage Guidelines
When configured to advertise, the switch inserts a port and protocol VLAN ID TLV for each VLAN
configured on the ports. The port and protocol VLAN ID TLV allows the port to advertise if it supports
protocol and/or tagged VLANs, along with the associated tagged values. A separate TLV is sent for
each VLAN that you want to advertise.
By default, once you configure this TLV, the system sends all protocol-based VLANs on the port.
However, the LLDPDU cannot exceed 1500 bytes, so you should configure the port to advertise only the
specified VLANs.
Note
The total LLPDU size is 1500 bytes; any TLVs after that limit are dropped.
This TLV does not send information on the type of protocol that the VLAN has enabled; it just says
whether the port is enabled or disabled for protocol-based VLANs. As Extreme Networks devices are
always capable of supporting protocol-based VLANs, once you configure this TLV, the system always
advertises support for these VLANs.
Example
The following command configures all ports to advertise port and protocol VLAN information to
neighbors for all VLANs on all ports:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise port vlan ID information to its neighbors. This
allows a VLAN bridge port to advertise the port VLAN identifier that is associated with untagged or
priority-tagged frames.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
The port VLAN ID TLV allows the port to transmit the VLAN ID associated with untagged VLANs. There
can be only one port VLAN ID in each LLPDU.
If no untagged VLANs are configured on the specified port, the TLV is not added to the LLPDU, even if
you configured this to advertise.
Example
The following command configures all ports to advertise port vlan ID information to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise VLAN name information to its neighbors. Use
this TLV to advertise information for the tagged VLANs you want to specify on the port. This allows an
IEEE 802.1Q-compatible 802 LAN station to advertise the assigned name of any VLAN with which it is
configured.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
vlan Specifies all VLANs on the port.
vlan_name Specifies the VLAN on the port that you want to advertise.
Default
No advertise.
Usage Guidelines
The VLAN name TLV sends the VLAN name and the tag used; it associates a name to a tag for the
specified VLAN. This allows an IEEE 802.1Q-compatible 802 LAN station to advertise the assigned name
of any VLAN with which it is configured.
You can enable this TLV for tagged and untagged VLANs. When you enable this TLV for tagged VLANs,
the TLV advertises the IEEE 802.1Q tag for that VLAN. (For untagged VLANs, the internal tag is
advertised.) You can specify exactly which VLANs to advertise.
When configured to advertise, the switch inserts a VLAN name TLV for every VLAN configured on the
ports. By default, once you configure this TLV, the system sends all VLAN names on the port. However,
each VLAN name can require up to 32 bytes and the LLDPDU cannot exceed 1500 bytes, so you should
configure the port to advertise only the specified VLANs, using the keyword vlan_name.
Note
The total LLPDU size is 1500 bytes; any TLVs after that limit are dropped.
Example
The following command configures all ports to not advertise VLAN name information to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise link-aggregation capabilities to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
When configured, this TLV is added to each LLDP port LLDPDU indicating the link-aggregation
capabilities, status, and value of the master port of the load-sharing group.
Example
The following command configures port 1:12 to not advertise link-aggregation capabilities to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise MAC and physical layer capabilities to its
neighbors. The capabilities include duplex and bit rate.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
When configured, the system advertises information about the speed capabilities, as well as
autonegotiation support and status, of the LLDP port.
Example
The following command configures all ports to advertise MAC/PHY capabilities to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise its maximum frame size to its neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
When jumbo frames are not enabled on the specified port, the TLV reports a value of 1518 once you
configure it to advertise. If jumbo frames are enabled, the TLV inserts the configured value for the
jumbo frames.
Example
The following command configures ports 1:12 and 1:13 to advertise the maximum frame size to
neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise Power over Ethernet (PoE) capabilities to its
neighbors.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
with-classification Specifies to use LLDP for Data Link Layer Classification.
This option is available only on PoE+ ports.
Default
No advertise.
Usage Guidelines
When configured, the system includes this TLV. We recommend enabling this TLV only on PoE-capable
ports.
The following information is transmitted for LLDP ports with this TLV:
• Support PoE or not
• Port class
◦ Power sourcing equipment (PSE)
◦ Powered device (PD)
• Power pairs used to supply power
◦ Signal
◦ Spare
• Power status
• Support pairs control or not
• Power class
◦ Class0
◦ Class1
◦ Class2
◦ Class2
◦ Class3
◦ Class4
Data link layer classification allows fine-grained dynamic re-allocation of power based on changing
needs. This feature is enabled by enabling LLDP (transmit and receive) and configuring transmission of
the power-via-MDI TLV. The ExtremeXOS software sends an LLDPDU containing a power-via-MDI TLV
within 10 seconds of DLL classification being enabled. A PD may request a new power value using an
LLDPDU. The allocated power might be changed if a request is received and approved after a power
review. The software responds with an allocated power value within 10 seconds of receipt of an LLDPDU
with a different requested power from a PD. Power allocation can be controlled to a granularity of 0.1
watts. When DLL classification is enabled, it takes precedence over physical classification.
Note
For more information on advertising power support, see the configure lldp ports
vendor-specific med power-via-mdi command.
Example
The following command configures all ports to advertise power capabilities to neighbors:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise MED capabilities. This TLV must be enabled
before any of the other MED TLVs can be enabled. Also, this TLV must be set to no-advertise after all
other MED TLVs are set to no-advertise.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
No advertise.
Usage Guidelines
This command enables the LLDP media endpoint discovery (MED) capabilities TLV, which allows LLDP-
MED network connectivity devices to definitively determine that particular endpoints support LLDP
MED, and if so, to discover which LLDP MED TLVs the particular endpoint devices are capable of
supporting and to which specific device class the device belongs to.
This TLV must be enabled before any of the other MED TLVs can be enabled; and this TLV must be set
to no-advertise after all other MED TLVs are set to no-advertise.
As with all the LLDP MED TLVs, the switch sends this TLV only after it detects a MED-capable device on
the port. The switch does not automatically send this TLV after it is enabled; the switch must first detect
a MED-capable device on the port.
Note
Network connectivity devices wait to detect LLDP MED TLVs from endpoints before they send
out LLDP MED TLVs; so L2 network connectivity devices do not exchange LLDP MED
messages.
The following information is included in the LLDP MED capabilities TLV when it is transmitted:
• The supported LLDP MED TLVs—For Extreme Networks devices, these are capabilities, network
policy, location, and extended power (extended power only advertised only on PoE-capable ports).
• The MED device type—For Extreme Networks devices, this is advertised as a network connectivity
device (set to 4).
Example
The following command configures all ports to advertise MED capabilities to neighbors:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise MED location information. You configure up to 3
different location identifiers.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies to not send the information to neighbors.
coordinate-based Specifies using the coordinate-based location identifier. This value is
exactly 16 bytes long; see RFC 3825 for details.
hex_value Enter a hexadecimal value with each byte separated by a colon. Or,
you can obtain this value from a network management application.
NOTE: This parameter is not used when the no-advertise parameter is
configured.
civic-based Specifies using the civic-based location identifier. This value must
have a minimum length of 6 bytes; see RFC3825 for details.
ecs-elin Specifies using the ecs location identifier. (Emergency Call Service, as
defined in the TIA-TSB-146.)
elin Enter a numerical string; the range is 10 to 25 characters. Or, you can
obtain this value from a network management application. (See the
TIA-TSB-146 standard for a definition of these numbers; also, the
network management application must be able to handle the LLDP
MED MIB.)
NOTE: This parameter is not used when the no-advertise parameter is
configured.
Default
No advertise.
Usage Guidelines
You might need to use a specific format for your specific VoIP implementation; see the VoIP
manufacturer’s manual for details.
You must configure the LLDP MED capabilities TLV before configuring this TLV. Configure the LLDP
MED capabilities TLV using the configure lldp ports [all | port_list] [advertise |
no-advertise] vendor-specific med capabilities command.
As with all the LLDP MED TLVs, the switch sends this TLV only after it detects a MED-capable device on
the port. The switch does not automatically send this TLV after it is enabled; the switch must first detect
a MED-capable device on the port.
Example
The following command configures all ports to advertise MED location information to neighbors using
the ECS format:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise MED network policy TLVs. This TLV advertises
VLAN configuration and associated Layer 2 and Layer 3 attributes that apply for a set of specific
applications on that port. You can advertise up to 8 TLVs, each for a specific application, per port/VLAN.
Each application type can exist only once per port. This TLV tells the endpoint the specific VLAN to use
for the specific application, along with its unique priority.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
advertise Specifies to send the information to neighbors.
voice Specifies voice application on specified port/VLAN(s).
Default
No advertise.
Usage Guidelines
This command enables the LLDP MED network policy TLV, which allows network connectivity devices
and endpoint devices to advertise VLAN configuration and associated Layer 2 and Layer 3 attributes
that apply for a set of specific application on that port. This TLV can be enabled on a per port/VLAN
basis. Each application type can exist only once on a port.
You can enable the transmission of a TLV policy for each application. A maximum of 8 TLVs can be
enabled, and each can have a unique DSCP value and/or priority tagging.
You must configure the LLDP MED capabilities TLV before configuring this TLV. Configure the LLDP
MED capabilities TLV using the configure lldp ports [all | port_list] [advertise |
no-advertise] vendor-specific med capabilities command.
As with all the LLDP MED TLVs, the switch sends this TLV only after it detects a MED-capable device on
the port. The switch does not automatically send this TLV after it is enabled; the switch must first detect
a MED-capable device on the port.
The following information is transmitted for LLDP ports with this TLV:
• Application type
Used as configured.
• Unknown policy flag
Set to 0.
• Tagged flag
Set to tagged for tagged VLANs; set to untagged for untagged VLANs. By default, set to 0.
• VLAN ID
Copied from the VLAN. However, if you configure the priority-tagged parameter, this value is set to
0.
• Layer 2 priority
Note
See the documentation provided by the manufacturer of connected devices regarding values.
Example
The following command configures all ports to advertise videoconferencing on the VLAN video with a
DSCP of 7 to neighbors:
configure lldp ports all advertise vendor-specific med policy application video-
conferencing vlan video dscp 7
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the LLDP port to advertise or not advertise MED power requirement details. This TLV can
only be enabled on a PoE-capable port and is used for advanced power management between the MED
network connectivity and endpoint devices.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
advertise Specifies to send the information to neighbors.
no-advertise Specifies not to send the information to neighbors.
Default
No advertise.
Usage Guidelines
When enabled, this LLDP MED TLV advertises fine-grained power requirement details about PoE
settings and support. This TLV can be enabled only on a PoE-capable port; the switch returns an error
message if this TLV is configured for a non-PoE-capable port.
You must configure the LLDP MED capabilities TLV before configuring this TLV. Configure the LLDP
MED capabilities TLV using the configure lldp ports [all | port_list] [advertise |
no-advertise] vendor-specific med capabilities command.
As with all the LLDP MED TLVs, the switch sends this TLV only after it detects a MED-capable device on
the port. The switch does not automatically send this TLV after it is enabled; the switch must first detect
a MED-capable device on the port.
Note
For additional information on power support, see the configure lldp ports vendor-
specific dot3 power-via-mdi command.
The following information is transmitted for LLDP MED PoE-capable ports with this TLV:
• Power type
Set to PSE.
• Power source
Example
The following command configures all ports to advertise MED power information to neighbors:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the delay before the receive state machine is reinstalled once the LLDP transmit mode has
been disabled.
Syntax Description
seconds Specifies the delay that applies to the reinitialization attempt. The
range is 1 to 10 seconds.
Default
2 seconds.
Usage Guidelines
N/A.
Example
The following command configures a reinitialization delay of 10 seconds:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the allowed interval at which SNMP notifications are sent.
Syntax Description
seconds Specifies the interval at which LLDP SNMP notifications are sent. The
range is 5 to 3600 seconds.
Default
5 seconds.
Usage Guidelines
This is a global timer. If one port sends a notification, no notifications for other ports go out for the
configured interval.
Example
The following command configures an interval of 60 seconds for LLDP SNMP notifications:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the delay time between successive frame transmissions initiated by a value change or status
change in any of the LLDP local systems Management Information Base (MIB).
The auto option uses a formula (0.25 * transmit-interval) to calculate the number of seconds.
Syntax Description
auto Uses the formula (0.25 * transmit-interval) to calculate the seconds.
seconds Specifies the interval at which LLDP notifications are sent. The range
is 1 to 8291.
Default
2 seconds.
Usage Guidelines
This is the timer between triggered updates.
Example
The following command configures the delay between LLDP frame transmissions for triggered updates
to be automatically calculated:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Calculates the actual time-to-live (TTL) value used in the LLDPDU messages.
The formula is transmit-interval * transmit-hold; by default the TTL value is (30*4) 120 seconds.
Syntax Description
hold Used to calculate the TTL value; the range is 2 to 10.
Default
4.
Usage Guidelines
N/A.
Example
The following command configures the transmit-hold value (which is used to calculate the TTL of the
LLDP packets) to 5:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the periodic transmittal interval for LLDPDUs.
Syntax Description
seconds Specifies the time between LLDPDU transmissions. The range is 5 to
32768.
Default
30 seconds.
Usage Guidelines
N/A.
Example
The following command configures a transmittal interval of 20 seconds for LLDPDUs.
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the real-time log-level message to display.
Syntax Description
severity Specifies a message severity. Severities include critical, error, warning,
notice, info, debug-summary, debug-verbose, and debug-data.
only Specifies only log messages of the specified severity level.
Default
If not specified, messages of all severities are displayed on the console display.
Usage Guidelines
You must enable the log display before messages are displayed on the log display. Use the enable
log display command to enable the log display. This allows you to configure the system to maintain
a running real-time display of log messages on the console.
Severity filters the log to display messages with the selected severity or higher (more critical). Severities
include critical, error, warning, info, notice, debug-summary, debug-verbose, and debug-data.
You can also control log data to different targets. The command equivalent to configure log
display is the following:
To display the current configuration of the log display, use the following command:
show log configuration target console-display
In a stack, this command is applicable only to Master and Backup nodes and not applicable to the
standby nodes.
Example
The following command configures the system log to maintain a running real-time display of log
messages of critical severity or higher:
The following command configures the system log to maintain a running real-time display of only log
messages of critical severity:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a log filter to add or delete detailed feature messages based on a specified set of events.
In a stack, this command is applicable only to Master and Backup nodes and not applicable to the
standby nodes.
Syntax Description
name Specifies the filter to configure.
add Add the specified events to the filter.
delete Remove the specified events from the filter.
exclude Events matching the specified events will be excluded.
Default
If the exclude keyword is not used, the events will be included by the filter. If severity is not specified,
then the filter will use the component default severity threshold (see the note note: If no severity is
specified when delete or exclude is specified, severity all is used when delete or exclude is specified).
Usage Guidelines
This command controls the incidents that pass a filter by adding, or deleting, a specified set of events. If
you want to configure a filter to include or exclude incidents based on event parameter values (for
example, MAC address or BGP Neighbor) see the command configure log filter events
match.
When the add keyword is used, the specified event name is added to the beginning of the filter item list
maintained for this filter. The new filter item either includes the events specified, or if the exclude
keyword is present, excludes the events specified.
The delete keyword is used to remove events from the filter item list that were previously added using
the add command. All filter items currently in the filter item list that are identical to, or a subset of, the
set of events specified in the delete command will be removed.
Severity Levels
When an individual event name is specified following the events keyword, no severity value is needed
since each event has pre-assigned severity. When a component, subcomponent, or the all keyword is
specified following the events keyword, a severity value is optional. If no severity is specified, the
severity used for each applicable subcomponent is obtained from the pre-assigned severity threshold
levels for those subcomponents. For example, if STP were specified as the component, and no severity
is specified for the add of an include item, then only messages with severity of error and greater would
be passed, since the threshold severity for the STP component is error. If STP.InBPDU were specified as
the component, and no severity is specified, then only messages with severity of warning and greater
would be passed, since the threshold severity for the STP.InPBDU subcomponent is warning. Use the
show log components command to see this information.
The severity keyword all can be used as a convenience when delete or exclude is specified. The use of
delete (or exclude) with severity all deletes (or excludes) previously added events of the same
component of all severity values.
Note
If no severity is specified when delete or exclude is specified, severity all is used.
If the only keyword is present following the severity value, then only the events in the specified
component at that exact severity are included. Without the only keyword, events in the specified
component at that severity or more urgent are included. For example, using the option severity warning
implies critical, error, or warning events, whereas the option severity warning only implies warning
events only. Severity all only is not a valid choice.
Any EMS events with severity debug-summary, debug-verbose, or debug-data will not be logged
unless debug mode is enabled. See the command enable log debug-mode.
Filter Optimization
Each time a configure log filter command is issued for a given filter name, the events specified are
compared against the current configuration of the filter to try to logically simplify the configuration.
the filter item in the first command is automatically deleted since all events in the BGP.Keepalive
subcomponent at severity error would be also included as part of the second command, making the
first command redundant.
More Information
See the command show log for more information about severity levels.
To get a listing of the components present in the system, use the following command:
Example
The following command adds all STP component events at severity info to the filter mySTPFilter:
configure log filter myStpFilter add events stp severity info
The following command adds the STP.OutBPDU subcomponent, at the pre-defined severity level for
that component, to the filter myStpFilter:
configure log filter myStpFilter add events stp.outbpdu
The following command excludes one particular event, STP.InBPDU.Drop, from the filter:
configure log filter myStpFilter add exclude events stp.inbpdu.drop
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a log filter to add or delete detailed feature messages based on a specified set of events and
match parameter values.
In a stack, this command is applicable only to Master and Backup nodes and not applicable to the
standby nodes.
Syntax Description
name Specifies the filter to configure.
add Add the specified events to the filter.
Default
If the exclude keyword is not used, the events will be included by the filter. If severity is not specified,
then the filter will use the component default severity threshold (see the note on note: If no severity is
specified when delete or exclude is specified, severity all is used when delete or exclude is specified).
Usage Guidelines
This command controls the incidents that pass a filter by adding or deleting a specified set of events
that match a list of type value pairs. This command is an extension of the command configure
log filter events , and adds the ability to filter incidents based on matching specified event
parameter values to the event.
See the configure log filter events command configure log filter events for
more information on specifying and using filters, on event conditions and components, and on the
details of the filtering process. The discussion here is about the concepts of matching type value
pairs to more narrowly define filters.
Note
The slot parameters are available only on SummitStacks.
Beginning with ExtremeXOS 11.2, you can specify the ipaddress type as IPv4 or IPv6, depending on the
IP version. The following examples show how to configure IPv4 addresses and IPv6 addresses:
• IPv4 address.
To configure an IPv6 address, with a mask of 128 assumed, use the following command:
◦ configure log filter myFilter add events all match ipaddress 3ffe::1
◦ To configure a range of IPv6 addresses with a mask of 16, use the following command:
◦ configure log filter myFilter add events all match ipaddress
3ffe::/16
IPv6 scoped addresses consist of an IPv6 address and a VLAN. The following examples identify a
link local IPv6 address.
To configure a scoped IPv6 address, with a mask of 128 assumed, use the following command:
Note
In the previous example, if you specify the VLAN name, it must be a full match; wild cards are
not allowed.
The value depends on the parameter type specified. As an example, an event may contain a physical
port number, a source MAC address, and a destination MAC address. To allow only those incidents with
a specific source MAC address, use the following in the command:
configure log filter myFilter add events aaa.radius.requestInit secerity
notice match source mac-address 00:01:30:23:C1:00 configure log filter
myFilter add events bridge severity notice match source mac-address
00:01:30:23:C1:00
The string type is used to match a specific string value of an event parameter, such as a user name. The
exact string is matched with the given parameter and no regular expression is supported.
In other words, if the match keyword is specified, an incident will pass a filter so long as all parameter
values in the incident match those in the match criteria, but all parameter types in the match criteria
need not be present in the event definition.
More Information
See the command show log for more information about severity levels.
To get a listing of the components present in the system, use the following command:
show log components
Example
By default, all log targets are associated with the built-in filter, DefaultFilter. Therefore, the most
straightforward way to send additional messages to a log target is to modify DefaultFilter. In the
following example, the command modifies the built-in filter to allow incidents in the STP component,
and all subcomponents of STP, of severity critical, error, warning, notice and info. For any of these
events containing a physical port number as a match parameter, limit the incidents to only those
occurring on physical ports 3, 4 and 5 on slot 1, and all ports on slot 2:
configure log filter DefaultFilter add events stp severity info match ports 1:3-1:5, 2:*
If desired, issue the unconfigure log DefaultFilter command to restore the DefaultFilter back to its
original configuration.
History
This command was first available in ExtremeXOS 10.1.
New parameter type values, including esrp and eaps were added in ExtremeXOS 11.0 and 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the minimum user account level needed to view logs.
Syntax Description
messages NVRAM and memory-buffer message targets.
privilege Configure minimum privilege level needed to view logs.
admin Only admin (read-write) accounts can view log.
user User (read-only) accounts can view log also (default).
Default
User.
Usage Guidelines
Use this command to configure the account level needed to view logs.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Associates a filter to a target.
In a stack, this command is applicable only to Master and Backup nodes. This command is not
applicable to standby nodes.
Syntax Description
target Specifies the device to send the log entries.
console Specifies the console display.
memory-buffer Specifies the switch memory buffer.
primary-node Specifies the primary node in a stack.
backup-node Specifies the backup node in a stack.
nvram Specifies the switch NVRAM.
session Specifies the current session (including console display).
syslog Specifies a syslog remote server.
all Specifies all of the syslog remote servers.
ipaddress Specifies the syslog IP address.
ipPort Specifies the UDP port number for the syslog target.
vr_name Specifies the virtual router that can reach the server IP address.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
If severity is not specified, the severity level for the target is left unchanged. If a virtual router is not
specified, VR-Mgmt is used.
Usage Guidelines
This command associates the specified filter and severity with the specified target. A filter limits
messages sent to a target.
Although each target can be configured with its own filter, by default, all targets are associated with the
built-in filter, DefaultFilter. Each target can also be configured with its own severity level. This provides
the ability to associate multiple targets with the same filter, while having a configurable severity level for
each target.
A message is sent to a target if the target has been enabled, the message passes the associated filter,
the message is at least as severe as the configured severity level, and the message output matches the
regular expression specified. By default, the memory buffer and NVRAM targets are enabled. For other
targets, use the command enable log target. The following table describes the default
characteristics of each type of target.
The built-in filter, DefaultFilter, and a severity level of info are used for each new telnet session. These
values may be overridden on a per-session basis using the configure log target filter
command and specify the target as session. Use the following form of the command for per-session
configuration changes:
configure log target session filter filtername {severity severity
{only}}
Configuration changes to the current session target are in effect only for the duration of the session,
and are not saved in FLASH memory. The session option can also be used on the console display, if the
changes are desired to be temporary. If changes to the console-display are to be permanent (saved to
FLASH memory), use the following form of the command:
configure log target console filter filtername {severity severity
{only}}
SummitStack Only
The backup-node target is only active on the primary-node, and the primary-node target is active on
backup-node and standby-nodes.
Example
The following example sends log messages to the previously syslog host at 10.31.8.25, port 8993, and
facility local3, that pass the filter myFilter and are of severity warning and above:
configure log target syslog 10.31.8.25:8993 local3 filter myFilter severity warning
The following example sends log messages to the current session, that pass the filter myFilter and are of
severity warning and above:
configure log target session filter myFilter severity warning
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the formats of the displayed message, on a per-target basis.
In a stack, this command is applicable only to Master and Backup nodes and not applicable to the
standby nodes.
Syntax Description
console Specifies the console display.
session Specifies the current session (including console display).
memory-buffer Specifies the switch memory buffer.
nvram Specifies the switch NVRAM.
syslog Specifies a syslog target.
all Specifies all remote syslog servers.
ipaddress Specifies the syslog IP address.
ipPort Specifies the UDP port number for the syslog target.
vr_name Specifies the virtual router that can reach the server IP address.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
The following defaults apply to console display, memory buffer, NVRAM, and session targets:
• timestamp—hundredths
• date—mm-dd-yyyy
• event-name—condition
• process-name—off
• severity—on
• source-line—off
• host-name—off
Usage Guidelines
This command configures the format of the items that make up log messages. You can choose to
include or exclude items and set the format for those items, but you cannot vary the order in which the
items are assembled.
When applied to the targets console or session, the format specified is used for the messages sent to
the console display or telnet session. Configuration changes to the session target, be it either a telnet or
console display target session, are in effect only for the duration of the session, and are not saved in
FLASH.
When this command is applied to the target memory-buffer, the format specified is used in subsequent
show log and upload log commands. The format configured for the internal memory buffer can
be overridden by specifying a format on the show log and upload log commands.
When this command is applied to the target syslog, the format specified is used for the messages sent
to the specified syslog host.
Timestamps
Timestamps refer to the time an event occurred, and can be output in either seconds as described in
RFC 3164 (for example, “13:42:56”), hundredths of a second (for example, “13:42:56.98”), or suppressed
altogether. To display timestamps as hh:mm:ss, use the seconds keyword, to display as hh:mm:ss.HH,
use the hundredths keyword, or to suppress timestamps altogether, use the none keyword. Timestamps
are displayed in hundredths by default.
Date
The date an event occurred can be output as described in RFC 3164. Dates are output in different
formats, depending on the keyword chosen. The following lists the date keyword options, and how the
date “March 26, 2005” would be output:
• Mmm-dd—Mar 26
• mm-dd-yyyy—03/26/2005
• dd-mm-yyyy—26-03-2005
• yyyy-mm-dd—2005-03-26
• dd-Mmm-yyyy—26-Mar-2005
Dates are suppressed altogether by specifying none. Dates are displayed as mm-dd-yyyy by default.
Event Names
Event names can be output as the component name only by specifying event-name component and as
component name with condition mnemonic by specifying event-name condition, or suppressed by
specifying event-name none. The default setting is event-name condition to specify the complete name
of the events.
Host Name
The configured SNMP name of the switch can be output as HOSTNAME described in RFC 3164 by
specifying host-name. The default setting is off.
Process Name
For providing detailed information to technical support, the (internal) ExtremeXOS task names of the
applications detecting the events can be displayed by specifying process-name. The default setting is
off.
Severity
A four-letter abbreviation of the severity of the event can be output by specifying severity on or
suppressed by specifying severity off. The default setting is severity on. The abbreviations are: Crit, Erro,
Warn, Noti, Info, Summ, Verb, and Data. These correspond to: Critical, Error, Warning, Notice,
Informational, Debug-Summary, Debug-Verbose, and Debug-Data.
Source Line
For providing detailed information to technical support, the application source file names and line
numbers detecting the events can be displayed by specifying source-line. The default setting is off. You
must enable debug mode using the enable log debug-mode command to view the source line
information. For messages generated prior to enabling debug mode, the source line information is not
displayed.
Tag ID
The process-id of the (internal) ExtremeXOS process that generated the event that resulted in the log
message can be displayed by specifying tag-id. The default setting is off.
Tag Name
The name of the log component to which the generated event belongs can be displayed by specifying
tag-name. The default setting is on. The tag name would be the same as the output of event-name
component.
Example
In the following example, the switch generates the identical event from the component SNTP (Simple
Network Time Protocol), using three different formats.
Using the default format for the session target, an example log message might appear as:
05/29/2005 12:15:25.00 <Warn:SNTP.RslvSrvrFail> The SNTP server parameter value
(TheWrongServer.example.com) can not be resolved.
If you set the current session format using the following command:
configure log target session format timestamp seconds date mm-dd-yyyy event-name component
To provide some detailed information to technical support, you set the current session format using the
following command:
configure log target session format timestamp hundredths date mmm-dd event-name condition
source-line process-name
History
This command was first available in ExtremeXOS 10.1.
The ipPort and host-name parameters were first introduced in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Associates a match expression to a target.
In a stack, this command is applicable only on a Master and Backup nodes. This command is not
applicable for standby nodes.
Syntax Description
console Specifies the console display.
memory-buffer Specifies the switch memory buffer.
nvram Specifies the switch NVRAM.
primary-node Specifies the primary node in a stack.
backup-node Specifies the backup-node in a stack.
session Specifies the current session (including console display).
syslog Specifies a syslog target.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
By default, targets do not have a match expression. If a virtual router is not specified, VR-Mgmt is used.
Usage Guidelines
This command configures the specified target with a match expression. The filter associated with the
target is not affected. A message is sent to a target if the target has been enabled, the message passes
the associated filter, the message is at least as severe as the configured severity level, and the message
output matches the regular expression specified.
See the command show log for a detailed description of simple regular expressions. By default,
targets do not have a match expression.
Specifying any instead of match-expression effectively removes a match expression that had been
previously configured, causing any message to be sent that has satisfied all of the other requirements.
Example
The following command sends log messages to the current session, that pass the current filter and
severity level, and contain the string user5:
configure log target session match user5
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the log buffer threshold alert.
Syntax Description
percent-full Generate a log event when the memory buffer percentage fully
exceeds the specified percentage threshold.
percent Percent-full threshold to generate a log event [50-100].
none No alert.
Default
None.
Usage Guidelines
Use this command to configure the log buffer threshold alert.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets the severity level of messages sent to the target.
In a stack, this command is applicable only to Master and Backup nodes. You cannot run this command
on standby nodes.
Syntax Description
console Specifies the console display.
memory-buffer Specifies the switch memory buffer.
nvram Specifies the switch NVRAM.
primary-node Specifies the primary node in a stack.
backup-node Specifies the backup node in a stack.
session Specifies the current session (including console display).
syslog Specifies a syslog target.
all Specifies all of the remote syslog servers.
ipaddress Specifies the syslog IP address.
ipPort Specifies the UDP port number for the syslog target.
vr_name Specifies the virtual router that can reach the server IP address.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
By default, targets are sent messages of the following severity level and above:
• console display—info
• memory buffer—debug-data
• NVRAM—warning
• session—info
• syslog—debug-data
• primary node—warning (stack only)
• backup node—warning (stack only)
Usage Guidelines
This command configures the specified target with a severity level. The filter associated with the target
is not affected. A message is sent to a target if the target has been enabled, the message passes the
associated filter, the message is at least as severe as the configured severity level, and the message
output matches the regular expression specified.
See the command show log for a detailed description of severity levels.
Example
The following command sends log messages to the current session, that pass the current filter at a
severity level of info or greater, and contain the string user5:
configure log target session severity info
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command specifies the source-ip-address to use when sending log messages to the Syslog server.
The Syslog server's IP address along with the ipPort and local facility (a tuple) identify which Syslog
server target is to be configured.
Syntax Description
syslog Specifies a Syslog target.
all Specifies all of the remote Syslog servers.
ipaddress Specifies the Syslog server’s IP address.
udp-port Remote Syslog server UDP port. Default 514.
udp_port UDP port number.
ipPort Specifies the UDP port number for the Syslog target.
tls_port Specifies remote Syslog server Transport Layer Security (TLS) for
connection type.
tls_port TLS port number.
vr_name Specifies the virtual router that can reach the server IP address.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Note: The address family (i.e IPv4 or IPv6) of the specified source IP
address must be the same as the address family of the Syslog server's.
Default
If a virtual router is not specified, the following virtual routers are used:
• ExtremeXOS 10.1—VR-0
• ExtremeXOS 11.0 and later—VR-Mgmt
Usage Guidelines
Use this command to identify and configure the Syslog server’s IP address. By configuring a source IP
address, the Syslog server can identify from which switch it received the log message.
If you do not configure a source IP address for the Syslog target, the switch uses the IP address in the
configured VR that has the closed route to the destination.
Example
The following command configures the IP address for the specified Syslog target:
configure log target syslog 10.12.1.15 from 10.234.56.78
configure log target syslog 2001:12:1::1 from 2001:44::1
History
This command was first available in ExtremeXOS 10.1.
The udp-port parameter and support for the EMS to send log messages to Syslog servers having IPv6
address was added in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a log target to receive events that conform to a specific EMS filter and severity level
requirements.
Syntax Description
upm_profile_name Specifies a UPM log target to configure.
filter-name Assigns an EMS filter to the specified log target.
severity Specifies the minimum severity level for events sent to the log target.
only Specifies that only events at the specified severity are sent to the log
target.
Default
N/A.
Usage Guidelines
Events that meet the criteria established in the EMS filter and the optional severity requirements are
forwarded to the UPM log target profile. You can further restrict the forwarded events with the
following command:
Example
The following example configures UPM log target testprofile1 to receive events that meet the criteria
defined in EMS filter testfilter1:
configure log target upm testprofile1 filter testfilter1
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a log target to receive only those events that meet the specified match criteria.
Syntax Description
upm_profile_name Specifies the UPM log target to be configured.
any Matches any event. Use this option to remove a limitation configured
with the regex option.
regex Specifies an expression that must be contained in all forwarded
events.
Default
N/A.
Usage Guidelines
This command further restricts the events selected by the command: configure log target upm
{upm_profile_name} filter filter-name {severity [[severity] {only}]}.
Example
The following example configures UPM log target testprofile1 to receive events that meet the criteria
contain the text warning:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a Web server target with an EMS filter.
Syntax Description
xml_target_name Specifies the name of the xml notification target.
filter-name Specifies the name of the EMS filter.
severity Specifies the least severe level to send (if the keyword only is
omitted).
Default
N/A.
Usage Guidelines
Use this command to configure a Web server target with an EMS filter. All EMS filters can be applied.
Example
The following command configures the Web server target test2 with EMS filter filtertest2:
configure log target xml-notification test filter filtertest2
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the MAC address lock down timeout value in seconds for the specified port or group of
ports or for all ports on the switch.
Syntax Description
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
seconds Configures the length of the time out value in seconds. The default is
15 seconds; the range is 15 to 2,000,000 seconds.
Default
The default is 15 seconds.
Usage Guidelines
This timer overrides the FDB aging time.
This command only sets the duration of the MAC address lock down timer. To enable the lock down
timeout feature, use the following command:
enable mac-lockdown-timeout ports [all | port_list]
Example
The following command configures the MAC address lock down timer duration for 300 seconds for
ports 2:3, 2:4, and 2:6:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables and disables the aging of first-arrival MAC addresses.
Syntax Description
port_list Specifies one or more ports or slots and ports.
enable MAC addresses aged out from the forwarding database are removed
from MAC locking.
disable MAC addresses aged out from the forwarding database are not
removed from MAC locking.
Default
First-arrival MAC lock aging is disabled by default.
Usage Guidelines
This command does not apply to MAC addresses locked by static locking.
When enabled, first-arrival MAC addresses that are aged out of the forwarding database are removed
from the associated port MAC lock. New MAC addresses can be learned until the configured first-arrival
limit is reached.
Example
The following command enables first-arrival MAC lock aging on port 2:3:
configure mac-locking ports 2:3 first-arrival aging enable
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures dynamic MAC locking on a port by restricting MAC locking on a port to a maximum number
of end station addresses first connected to that port.
Syntax Description
port_list Specifies one or more ports or slots and ports.
learn_limit Specifies the maximum number of first-arrival end station MAC
addresses that can be connected to the port. Valid values are 0–600.
Default
600 first-arrival end station MAC addresses
Usage Guidelines
When the configured limit is reached, no further entries are learned. If, however, the learned entries are
aged out, new MAC addresses can be learned.
You cannot specify a value that is lower than the number of MACs locked in the MAC lock station table.
Example
The following example configures 400 as the maximum number of first-arrival MAC addresses that can
connect to port 14.
configure mac-locking ports 14 first-arrival limit-learning 400
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Clears or retains first arrival MAC locking addresses when the link goes down.
Syntax Description
port_list Specifies one or more ports or slots and ports.
clear-macs First arrival MAC locking addresses will be cleared when the link goes
down.
retain-macs First arrival MAC locking addresses will be retained when the link goes
down.
Default
When the link goes down, by default, all the first arrival MAC locking addresses will be removed
(cleared).
Usage Guidelines
If you specify retain-macs, the first arrival MAC locking addresses will be retained even when the link
goes down.
Example
The following example disables the clearing of first arrival MAC locking addresses on port 14.
configure mac-locking ports 14 first-arrival link-down-action retain-macs
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Moves all current first-arrival MAC locking addresses to static entries.
Syntax Description
port_list Specifies one or more ports or slots and ports.
Default
N/A
Usage Guidelines
This command converts dynamic MAC locked station entries to static MAC locked entries. The static
MAC locked entries are saved in configuration and preserved across reboots.
This command does not convert the forwarding database entries to static-permanent entries.
Example
The following example converts the dynamic MAC locked station entries on port 14 to static MAC locked
entries.
configure mac-locking ports 14 first-arrival move-to-static
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a port to be disabled or remain enabled when the port learns the configured maximum
number of MACs.
Syntax Description
port_list Specifies one or more ports or slots and ports.
disable-port Disables the port when the configured MAC limit is reached.
remain-enabled Port remains enabled after the configured MAC limit is reached.
Default
The port remains enabled after the configured MAC limit is reached.
Usage Guidelines
This command is used for both first arrival and static MAC locking methods.
Example
The following example configures port 14 to be disabled when the configured MAC limit is reached.
configure mac-locking ports 14 learn-limit-action disable-port
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables the sending of a syslog message for MAC lock messages.
Syntax Description
port_list Specifies one or more ports or slots and ports.
violation Sends a syslog message if the maximum value configured for dynamic
and static MAC locking is exceeded.
threshold Sends a syslog message if the maximum value configured for dynamic
and static MAC locking is reached.
on Sending a syslog message for the specified event is enabled.
off Sending a syslog message for the specified event is disabled.
Default
If neither violation nor threshold is specified, violation is used by default.
Usage Guidelines
When MAC locking violations are enabled, the device sends a syslog message if a connected end station
exceeds the maximum value configured for dynamic and static MAC locking.
When MAC locking thresholds are enabled, the device sends an syslog message if a connected end
station reaches the maximum value configured for dynamic and static MAC locking.
Example
The following example enables threshold syslog messages on port 14.
configure mac-locking ports 14 log threshold on
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes MAC locking for all MAC address or the specified MAC address on the specified port.
Syntax Description
port_list Specifies one or more ports or slots and ports.
station_mac_address Specifies the MAC address from which MAC locking will be deleted.
all Deletes MAC locking from all MAC addresses associated with the
specified port.
Default
N/A
Usage Guidelines
None.
Example
The following example deletes MAC locking from the MAC address 00-a0-c9-0d-32-11 on port 14.
configure mac-locking ports 14 static delete station 00-a0-c9-0d-32-11
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Restricts MAC locking on a port to a maximum number of static (management defined) MAC addresses
for end stations connected to this port.
Syntax Description
port_list Specifies one or more ports or slots and ports.
learn_limit Specifies the maximum number of static end station MAC addresses
that can be connected to the port. Valid values are 0–64.
Default
64 static end station MAC addresses.
Usage Guidelines
When the configured limit is reached, no further entries are learned. If, however, the learned entries are
aged out, new MAC addresses can be learned.
You cannot set a value that is lower than the number of MACs locked in the MAC lock station table.
You cannot configure the learning limit on both a port and a port-VLAN. If the learning limit is
configured on a port, configuration on a port-VLAN will is not allowed. Similarly, if the learning limit is
configured on a port-VLAN, configuration on port is not allowed.
Example
The following example configures 40 as the maximum number of static MAC addresses that can
connect to port 14.
configure mac-locking ports 14 static limit-learning 40
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates, enables, and disables a static MAC locking entry.
Syntax Description
port_list Specifies one or more ports or slots and ports.
add Adds a MAC locking association between the specified MAC address
and port.
enable Enables an existing MAC locking association between the specified
MAC address and port.
disable Disables an existing MAC locking association between the specified
MAC address and port.
station_mac_address Specifies the MAC address.
Default
A static MAC locking association is enabled by default.
Usage Guidelines
Up to 64 MAC addresses can be locked per port.
When added and enabled, a static MAC lock configuration allows only the end station designated by the
MAC address to participate in frame relay.
Disabled entries are counted when calculating the total number of locked stations.
Example
The following example creates a MAC locking association between port 14 and 00-a0-c9-0d-32-11.
configure mac-locking ports 14 static add 00-a0-c9-0d-32-11
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables the sending of an SNMP trap for MAC lock messages.
Syntax Description
violation Sends an SNMP trap if the maximum value configured for dynamic
and static MAC locking is exceeded.
threshold Sends an SNMP trap if the maximum value configured for dynamic
and static MAC locking is reached.
on Sending an SNMP trap for the specified event is enabled.
off Sending an SNMP trap for the specified event is disabled.
Default
If neither violation nor threshold is specified, violation is used by default.
Usage Guidelines
When MAC locking violations are enabled, the device sends an SNMP trap if a connected end station
exceeds the maximum value configured for dynamic and static MAC locking.
When MAC locking thresholds are enabled, the device sends an SNMP trap if a connected end station
reaches the maximum value configured for dynamic and static MAC locking.
Example
The following example enables threshold traps on port 14.
configure mac-locking ports 14 trap threshold on
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the preferred cipher suite for MAC Security (MACsec).
Syntax Description
cipher-suite Selects provisioning MACsec cipher suite to be used if elected as key
server.
gcm-aes-128 Galois/Counter Mode of AES-128 symmetric block cipher (Default).
gcm-aes-256 Galois/Counter Mode of AES-256 symmetric block.
ports Specifies configuring ports.
port_list Lists which ports to configure the selected cipher suite on.
Default
The cipher suite gcm-aes-128 is selected by default.
Usage Guidelines
If GCM-AES-256 is desired between two switches using the LRM/MACsec Adapter, you need to issue
this command on at least the key server side, but preferably on both sides.
If the port is elected as MKA key server, then the configured cipher suite is used to protect all port
traffic. If the peer port is elected as MKA key server, then the peer chooses which cipher suite to use.
Example
The following example selects the gcm-aes-256 cipher suite on ports 22, 30–33:
# configure macsec cipher-suite gcm-aes-256 22,30-33
The following example selects the gcm-aes-128 cipher suite on port 30:
# configure macsec cipher-suite gcm-aes-128 30
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
Description
Configures a previously created connectivity-association (CA) object that holds MAC Security (MACsec)
key authentication data. For a particular CA, you can change the pre-shared key and enable/disable
authentication on one or more ports.
Syntax Description
connectivity- Secures connectivity provided between MACsec stations.
association
ca_name Selects CA object to configure.
pre-shared-key Selects static MACsec key consisting of both a CKN and CAK:
ckn Selects changing the CA key name.
This public (non-secret) key name allows each of the MKA
participants to select which connectivity association key (CAK) to use
to process a received MACsec key agreement (MKA) protocol packets
(MKPDU).
ckn Sets the CA key name. Length allowed is 1–32 characters, entered as
ASCII or an octet string preceded with 0x.
cak Sets the connectivity association key (CAK). If you are using 256-bit
cipher suite, then the CAK must be 32 octets. The 128-bit cipher suite
can use either a 16- or 32-octet CAK.
This is a long-lived secret key used to derive short-lived lower-layer
keys (ICK, KEK, and SAK) that are used for key distribution and data
encryption.
cak Sets the non-encrypted CAK value. Must be entered as an octet string
(for example: “0x859e72f0…”). A 128-bit (16 octet) CAK requires 32
hexadecimal digits, and a 256-bit (32 octet) CAK requires 64
hexadecimal digits. These values are secret and should be generated
off switch with a suitable pseudorandom number generator.
encrypted Designates that secret key value is in encrypted format.
encrypted_cak Sets the value for the secret key. The encrypted CAK value is
generated by the show configuration macsec command for
previously configured CAKs.
ports Specifies configuring ports.
port_list Lists which ports to configure.
enable Enable the MKA connectivity association on the selected port list.
disable Disables the MKA connectivity association on the selected port list.
Default
N/A.
Usage Guidelines
You can only enable/disable CAs on ports that support MACsec.
Example
The following example sets CKN to "the red key" and CAK to a 128-bit key
"0x01020304050607080910111213141516” for CA object "testca":
Note
The CAK shown here is an example. Use your own random number for maximum security.
configure macsec connectivity-association testca pre-shared-key ckn “the red key” cak
“0x01020304050607080910111213141516”
The following example enables MACsec authentication on port 13 for CA object "testca":
# configure macsec connectivity-association testca ports 13 enable
The following example disables MACsec authentication on port 13 for CA object "testca":
# configure macsec connectivity-association testca ports 13 disable
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
Description
Sets MAC Security (MACsec) mode or half-duplex mode on ports 25–48 on ExtremeSwitching X460-
G2-24p-24hp, X460-G2-24t-24ht, and 10/100/1000 ports on X465 switches.
Syntax Description
hw-mode Set the mutually exclusive hardware mode to MACsec or half-duplex.
ports Specify ports to configure.
port_list List of ports to configure.
macsec-mode Enable MACsec mode on the defined port list.
half-duplex-mode Enable half-duplex mode on the defined port list (Default).
Default
Half-duplex mode is the default.
Usage Guidelines
This command sets the mutually exclusive modes for MACsec or half-duplex behavior on
ExtremeSwitching X460-G2-24p-24hp, X460-G2-24t-24ht, and ExtemeSwitching X465 switches. To
use MACsec, you must enable MACsec mode on these switches, since half-duplex mode is the default
mode.
To configure half-duplex mode, you must remove any MACsec configuration from the specified ports. To
configure MACsec mode, you must remove any half-duplex configuration from the specified ports.
You must save and reboot for this command to take effect.
To view your current mode setting, use the show macsec command.
Example
The following example enables MACsec mode on an ExtremeSwitching X460-G2-24p-24hp switch on
port 25:
# configure macsec hw-mode ports 25 macsec-mode
This command will only take effect after a save and reboot.
# save configuration
No default configuration database has been selected to boot up the system.
Save configuration will set the new configuration as the default database.
The selected configuration file is now "primary.cfg". By default, this file will be used
for saving the configuration which will take effect after the next switch reboot.
# reboot
Are you sure you want to reboot the stack? (y/N) Yes
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Platform Ports
ExtremeSwitching X460-G2-24p-24hp, X460- Half-duplex, 1G ports (25–48)
G2-24t-24ht switches
ExtremeSwitching X465 10/100/1000 ports
Description
Configures the include-SCI flag to ensure interoperability with third-party devices that do not decode
encrypted MAC Security (MACsec) packets when the SCI is not present.
Syntax Description
include-sci Provision inclusion of SCI in SecTAG field while transmitting MACsec
frames.
enable Include SCI in SecTAG.
disable Do not include SCI in SecTAG (Default).
ports Specifies configuring ports.
port_list Lists which ports to configure the include-SCI flag on.
Default
Disabled by default (SCI is not included in MAC Security Tag (SecTAG)).
Usage Guidelines
The SecTAG appended to each data packet contains an optional parameter called Secure Channel
Indicator (SCI). The SCI is used to identify the sending Secure Association (SA) when the connectivity-
association (CA) comprises three or more peers.
Because ExtremeXOS only supports point-to-point links (which have exactly two peers), the SCI is not
sent by default (which saves 8-octets per SecTAG’d packet). Certain third-party MACsec devices, such
as the CentOS’s MACsec client and Cisco Catalyst 3650, fail to decode encrypted MACsec packets when
the SCI is not present. To ensure interoperability with such devices, you can configure the Include-SCI
flag. When this flag is set, the port always includes the 8-octet SCI in the SecTAG of all outgoing
packets.
Important
After enabling MACsec, if you change the include-SCI flag, you must run the configure
macsec initialize ports port_list command afterward. Otherwise, the change is
not applied.
Example
The following example enables including SCI in SecTAG field while transmitting MACsec frames on port
13:
configure macsec include-sci enable port 13
The following example disables including SCI in SecTAG field while transmitting MACsec frames on port
44:
# configure macsec include-sci disable port 44
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
Description
Resets the MAC Security (MACsec) Key Agreement (MKA) protocol state machine on one or more ports
and applies MACsec configuration changes to already enabled ports.
Syntax Description
initialize Selects resetting the MACsec Key Agreement protocol state machine.
ports Specifies configuring ports.
port_list Lists which ports to reset the MACsec Key Agreement protocol state
machine on.
Default
N/A.
Usage Guidelines
Issuing this command resets the MKA state machine, which in turn deletes any secured channels and
their secure association keys (SAKs). This command is also used to apply MACsec configuration
changes (mka actor-priority, include-sci, replay-protect) to an already enabled port. All traffic is blocked
until MKA renegotiates a new set of keys and those keys are installed. For more information, see
IEEE802.1X-2010 Clause 12.9.3 Initialization.
Example
The following example resets the MACsec Key Agreement protocol state machine on port 13:
configure macsec initialize ports 13
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
Description
Configures MAC Security (MACsec) actor’s priority for port(s).
Syntax Description
mka Configures MACsec key agreement (MKA) parameters.
actor-priority Designates setting the priority advertised during MKA key server
election.
actor-priority Sets the actor priority value. A lower value denotes higher
priority.Range is 0–255 or 0x0–0xFF. Default is 0x10.
ports Specifies configuring ports.
port_list Lists which ports to configure the actor priority on.
Default
Default value for actor priority is 0x10.
Usage Guidelines
Each MKA participant selects the participant advertising the highest priority as the key server. In the
event of a tie, the participant with the highest priority MAC address (lowest value) is selected. The
recommended priority range for infrastructure ports is 0x00 to 0x1f, with a default of 0x10. You can
assign the full range of priorities, 0x00 to 0xff:
• To have a port become a key server, raise the priority by assigning a priority value less than 0x10.
• To not have a port become key server, lower the priority by assigning a priority value greater than
0x10.
Important
After enabling MACsec, if you change the actor priority, you must run the configure
macsec initialize ports port_list command afterward. Otherwise, the change is
not applied.
Example
The following example raises the actor priority value to 0x5 on port 13:
# configure macsec mka actor-priority "0x5" port 13
# configure macsec initialize port 13
The following example lowers the actor priority value to "31" on port 14:
# configure macsec mka actor-priority 31 port 14
# configure macsec initialize port 14
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
Description
Configures MAC Security (MACsec) replay-protect window size for port(s).
Syntax Description
replay-protect Configures dropping out-of-order packets received on a port.
window_size_in_packet Sets replay-protect window size value. Out-of-order packets up to
s selected value are accepted. Range is 0–4,294,967,295. Default is 0
(out-of-order packets are dropped).
disable Disables replay protection. Out-of-order packets are allowed.
ports Specifies configuring ports.
port_list Lists which ports to configure the replay-protect window on.
Default
Default value for replay-protect window is 0 packets, which drops all out-of-order packets.
Usage Guidelines
The replay protection feature provides for the dropping of out-of-order packets received on a port. The
window size is set to 0 by default, meaning any packet received out-of-order is dropped. Setting the
window size to non-zero sets the range of sequence numbers that are tolerated, to allow receipt of
packets that have been misordered by the network. If replay protection is disabled, packet sequence
numbers are not checked and out-of-order packets are not dropped.
Important
After enabling MACsec, if you change the replay protect window size, you must run the
configure macsec initialize ports port_list command afterward.
Otherwise, the change is not applied.
Example
The following example disables replay protection on port 13:
# configure macsec replay-protect disable port 13
# configure macsec intialize port 13
The following example sets replay-protect window size to 50 packets on port 14. If the last data packet
received has a packet number (PN) of N, then the next received packet is accepted if its PN is greater
than or equal to N-50. If the PN is less than N-50, the packet is dropped and the "Late Pkts" counter is
incremented:
# configure macsec replay-protect 50 port 14
# configure macsec intialize port 14
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
Description
Configures the IPv4 multicast cache timeout.
Syntax Description
seconds Idle time after which cache entries are deleted.
none Cache entries are not timed out.
Default
300 seconds.
Usage Guidelines
Cache timeout is the time after which the cache entries are deleted if traffic is not received for that
duration. This applies only for snooping and MVR caches and does not apply for PIM caches.
The range is 90 to 100000 seconds. You can use the option none if you do not want the cache entry to
be deleted. If none is configured, the cache entries can be deleted only using the following command:
clear igmp snooping
Example
The following example configures the IPv4 multicast cache timeout to 400 seconds.
configure mcast ipv4 cache timeout 400
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the IPv6 multicast cache timeout.
Syntax Description
seconds Idle time after which cache entries are deleted.
none Cache entries are not timed out.
Default
300 seconds.
Usage Guidelines
Cache timeout is the time after which the cache entries are deleted if traffic is not received for that
duration. This applies only for snooping and MVR caches and does not apply for PIM caches.
The range is 90 to 100000 seconds. You can use the option none if you do not want the cache entry to
be deleted. If none is configured, the cache entries could be deleted only using the following command:
clear igmp snooping
Example
The following example configures the IPv6 multicast cache timeout to 400 seconds.
configure mcast ipv6 cache timeout 400
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MLD snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
configure meter
configure meter metername {committed-rate cir [Gbps | Mbps | Kbps |
Pps]} {max-burst-size burst-size [Kb | Mb | packets]} {out-actions
[{disable-port} {drop | set-drop-precedence {dscp [none | dscp-
value]} {dot1p [ none | dot1p-value ]}} {log} {trap}]} {ports
[port_group | port_list]}
Description
Configures an ACL meter to provide ingress traffic rate shaping.
Syntax Description
metername Specifies the ACL meter name.
committed-rate Specifies the committed information rate in gigabits per second
(Gbps), megabits per second (Mbps), or kilobits per second (Kbps).
max-burst-size Specifies the maximum burst size or peak burst size in kilobits (Kb) or
megabits (Mb).
out-actions Specifies actions to take if traffic exceeds the profile.
drop Specifies to drop out of profile traffic.
set-drop-precedence Specifies to mark packet for high drop precedence.
dscp Specifies to set DSCP.
dscp-value DSCP value (0-63).
none Specifies to leave the DSCP or dot1p value unchanged.
dot1p Specifies dot1p value to be set.
dot1p-value Dot1p value (0-7).
Default
By default, a newly committed meter has no maximum burst size, no committed rate, and a default
action of drop.
Usage Guidelines
The meter configured with this command is associated with an ACL rule by specifying the meter name
using the meter action modifier within the rule.
The committed-rate keyword specifies the traffic rate allowed for this meter, and the configured rate
operates as described in Table 17. The rate you specify is rounded up to the next granularity increment
value. For example, if you configure a 1 Mbps committed rate for a platform with a 64Kbps granularity
increment, this value falls between the increment values of 960 Kbps and 1024 Kbps, so the effective
committed rate is set to 1024 Kbps. Also, note that some platforms listed below require an adjustment
to the expected rate to calculate the configured rate.
The max-burst-size keyword specifies the maximum number of consecutive bits that are allowed to be
in-profile at wire-speed. The max-burst-size parameter can be specified in Kb, Mb, or Gb. The specified
max-burst-size is rounded down to the nearest supported size. The max-burst-size range on
ExtremeSwitching switches is 32Kb to 128Mb.
The keyword out-actions specifies the action that is taken when a packet is out-of-profile. The
supported actions include dropping the packet, marking the drop precedence for the packet, setting
the DSCP value in the packet, or setting the DOT1P value in the packet. The keyword drop indicates that
any out-of-profile packet is immediately dropped. The keyword set-drop-precedence marks out-of-
profile packets with high drop precedence. If the optional keyword set-dscp is specified, the DSCP
value, as specified by the parameter dscp-value, is written into the out-of-profile packet. Setting the
DSCP value to none leaves the DSCP value in the packet unchanged. If the optional keyword set-dot1p is
specified, the DOT1P value, as specified by the parameter dot1p-value, is written into the out-of-
profile packet. Setting the DOT1P value to none leaves the DOT1P value in the packet unchanged.
Example
The following example configures the ACL meter maximum_bandwidth, assigns it a rate of 10 Mbps,
and sets the out of profile action to drop:
configure meter maximum_bandwidth committed-rate 10 Mbps out-action drop
History
This command was available in ExtremeXOS 11.1.
The log, trap and ports keywords and port-group and port_list variables were added in
ExtremeXOS 16.1
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies mirror source filters for an instance.
Syntax Description
mirror_name Specifies the mirror's name.
vlan Specifies a VLAN.
vlan_id Specifies a VLAN ID.
port Specifies a port or slot and port.
port Specifies particular ports or slots and ports.
ip-fix Enables mirroring of the first fifteen packets of every IPFIX flow.
egress Specifies packets be mirrored as they are sent from a port.
ingress-and-egress Specifies all forwarded packets be mirrored. This is the default for
port-based mirroring.
Default
N/A.
Usage Guidelines
You must enable port-mirroring using the enable mirroring to port command before you can
configure the mirroring filter definitions.
Port mirroring configures the switch to copy all traffic associated with one or more ports to a monitor
port on the switch. The switch uses a traffic filter that copies a group of traffic to the monitor port.
Up to 128 mirroring filters can be configured with the restriction that a maximum of 16 of these can be
configured as VLAN and/or virtual port (port + VLAN) filters.
One monitor port or 1 monitor port list can be configured. A monitor port list may contain up to 16 ports.
For general guideline information and information for various platforms, see “Guidelines for Mirroring”
in the ExtremeXOS 30.5 User Guide or the Usage Guidelines of the enable mirroring to port
command.
Example
The following example sends all traffic coming into a switch on port 11 and the VLAN default to the
mirror port:
configure mirror add port 11 vlan default
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Mirrors detected anomaly traffic to the mirror port.
Syntax Description
port_list Specifies the list of ports.
Default
N/A.
Usage Guidelines
The command mirrors detected anomaly traffic to the mirror port. You must enable a mirror port and
enable protocol anomaly protection on the slot that has the port to be monitored before using this
command. After configuration, only detected anomaly traffic from these ports are dropped or mirrored
to the mirror port, and legitimate traffic is not affected.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or deletes existing mirrors to a mirror MIB instance (specified by a control index) .
Syntax Description
mirror_name Specifies a specific mirror name to add to or delete from a mirror MIB
instance.
control_index Mirror destination control index (1–4).
Also known as: etsysMirrorDestinationControlIndex. Each comprises a
group of mirror names.
add Specifies adding a mirror name to group referenced by a control
index.
delete Specifies deleting a mirror name from a group referenced by a control
index.
Default
N/A.
Usage Guidelines
To use policy-based mirroring, you need a mirror MIB instance (designated by a control index) with one
or more associated mirrors to apply mirrors to a policy profile.
Only mirrors with a single 'to' port or remote-ip can be applied to a mirror MIB instance.
Example
The following example adds existing mirror "mirror1" to mirror MIB instance with control index "2":
configure mirror 2 add mirror1
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes mirror source filters for an instance.
Syntax Description
mirror_name Specifies the mirror's name.
port Specifies a port or a slot and port.
port Specifies particular ports or slots and ports.
ip-fix Disables mirroring packets of IPFIX flows.
vlan Specifies a VLAN.
vlan_id Specifies a VLAN ID.
name Specifies a VLAN name.
Default
N/A.
Example
The following example deletes the mirroring filter on port 1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates, edits or deletes a mirroring instance description string.
Syntax Description
mirror_name Specifies the mirror name.
description Specifies the mirror description to create or edit.
none Deletes the existing mirror description.
Default
N/A.
Usage Guidelines
Use this command to create, edit or delete a mirroring instance description string.
Example
The following example configures the mirror description.
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Updates or specifies the "to port" definitions for a named mirroring instance .
Syntax Description
mirror_name Specifies the mirror name.
name Specifies a new mirror name.
new_name Specifies the new mirror name.
Default
N/A.
Usage Guidelines
Use this command to update or specify the "to port" definitions for a named mirroring instance.
Example
configure mirror m1 name m2
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure mirror to
configure mirror mirror_name {to [port port | port-list port_list |
loopback port port] | remote-ip {add} remote_ip_address {{vr}
vr_name } {from [source_ip_address | auto-source-ip]} {ping-check [on
| off]}] {remote-tag rtag | port none} {priority priority_value}
Description
Updates or specifies the "to port", "to port list", or remote IP address destination definitions for a named
mirroring instance.
Syntax Description
mirror_name Specifies the mirror name.
port Specifies the mirror output port.
port-list Specifies the list of ports where traffic is to be mirrored.
loopback port Specifies an otherwise unused port required when mirroring to a
port_list. The loopback-port is not available for switching user data
traffic.
port Specifies a single loopback port that is used internally to provide this
feature.
remote-tag Specifies the value of the VLAN ID used by the mirrored packets when
egressing the monitor port.
port Specifies the port definition for the mirroring instance.
none Specifies none for the to port definition.
remote-ip Sends mirrored packets to specified remote destination IP address.
remote_ip_address Specifies the destination remote IP address for mirrored packets.
add Adds a redundant (more than one) remote IP address with a unique
priority to a mirror instance.
vr Specifies the virtual router of the remote IP address.
vr_name Specifies the virtual router name. If not specified, VR of current
command context is used.
from Configures source IP address of encapsulated mirrored packets.
source_ip_address Specifies the local source IPv4 address for encapsulated mirrored
packets.
auto-source-ip Automatically use source IP address of egress VLAN to be used to
reach remote IP address.
ping-check Configure ping health check for remote IP address.
on Only send mirrored packets to remote IP address if periodic pings to
remote IP address are successful (default).
off Send mirrored packets to remote IP address without any ping health
check, assuming MAC address and port of next hop IP address are
static or learned.
priority Configures a unique priority value for each redundant remote IP
address of a mirror instance.
priority_value Sets a unique priority value for a remote IP address.
The priority value must be unique for each remote IP address in the
mirror instance.
The range is from 1 (least preferred) to 100 (most preferred). The
default is 50.
Default
Ping health check of the remote IP address is enabled unless otherwise specified.
Usage Guidelines
Use this command to update, or specify the "to port", "to port-list", or remote IP address destination
definitions for a named mirroring instance.
The none keyword can be used to remove a previously configured port/port-list , or remote IP address
on a disabled mirror instance.
For high availability, you can add up to four redundant remote IP addresses. For each mirror instance,
the remote IP address with the highest configured priority value that has status “up” is used as the
destination IP address for GRE-tunneled mirrored traffic. All other remote IP addresses deemed “up” for
that mirror instance are standby—ready to be used in the event the preferred remote IP address
becomes “down”. If you are adding another (redundant) remote IP address to an existing mirror that
already has a remote IP address configured, you must use the add option.
Example
The following example configures a mirror instance to port 3, slot 4:
# configure mirror to port 3:4
The following example configures multiple (redundant) remote IP addresses ("5.1.1.2", "4.1.1.2", "3.1.1.2",
"2.1.1.2") for mirror "analytics_chicago_1":
# enable mirror analytics_chicago_1 to remote-ip 5.1.1.2
# configure mirror analytics_chicago_1 to remote-ip add 4.1.1.2 priority 40
# configure mirror analytics_chicago_1 to remote-ip add 3.1.1.2 priority 30
# configure mirror analytics_chicago_1 to remote-ip add 2.1.1.2 priority 20
# configure mirror analytics_chicago_1 add vlan v1
# show mirror
analytics_chicago_1 (Enabled)
Description:
Mirror to remote IP: 5.1.1.2 VR : VR-Default
From IP : Auto source IP Ping check: On
Priority : 50
Status : Up. Active
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes one or all of the redundant remote IP addresses from a mirror instance.
Syntax Description
mirror_name Mirror instance name.
to Selects mirroring to another location.
remote-ip Send mirrored packets to specified destination IP address using L2
GRE encapsulation.
delete Delete all or one remote IP addresses from a mirror instance.
all Delete all remote IP addresses from a disabled mirror instance.
remote_ip_address Delete the specified existing remote IP address from a mirror instance.
vr Specifies a virtual router.
vr_name Specifies the name of the virtual router to which this command
applies. If a name is not specified, the current CLI context is used.
Default
If a virtual router is not specified, the current CLI context is used.
Usage Guidelines
To delete all or the last remaining remote IP address, you must disable the mirror first (disable
mirror mirror_name | all ).
Example
The following example removes the remote IP address "1.1.3.3" from the mirror instance "m1":
# configure mirror m1 to remote-ip delete 1.1.3.3
History
This command was first available in ExtremeXOS 30.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a configurable GRE protocol type for mirror-to-remote IP addresses.
Syntax Description
mirror Specifies configuring mirrors.
to Selects mirroring to another location.
remote-ip Sends mirrored packets to specified destination IP address using L2
GRE encapsulation.
protocol-type Selects GRE protocol type in the header of mirrored packets to all
remote IP addresses.
erspan-v1 Specifies GRE protocol type 0x88BE, Encapsulated Remote Switched
Port Analyzer version 1, also known as ERSPAN type II (default).
trans-ether-bridging Specifies GRE protocol type 0x6558, Trans Ether Bridging.
user-defined Specifies GRE protocol type specified in hexadecimal (for example,
0x6558).
protocol_value Specifes a user-defined, two-byte hexadecimal value for GRE protocol
type (for example, 0x6558).
Default
By default, the type is erspan-v1.
Usage Guidelines
The configured value is global, and the new value is applied immediately in hardware for all active
mirrors to remote IP addresses.
To view the current setting, use the show mirror [mirror_name | control_index |
mirror_name_li] | [all | enabled] command.
Example
The following example sets the type as trans-ether-bridging:
# configure mirror to remote-ip protocol-type trans-ether-bridging
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the IP address for alternate health check mechanism.
Syntax Description
mlag Multi-switch Link Aggregation used to combine remote ports and
local ports to a common logical connection.
peer Multi-switch Link Aggregation Group peer switch.
peer_name Alphanumeric string identifying the MLAG peer.
alternate Health check on an alternate path.
ipaddress MLAG peer IP address for alternate path health checks.
vr Virtual router.
vr_name Virtual router name.
none Do not use alternate path health checks.
Default
None.
Usage Guidelines
Use this command to configure the IP address for alternate health check mechanism. Use the none
option to unconfigure the configured IP.
Example
The following example displays show mlag peer output with the alternate path IP configured:
When the alternate path IP is not configured, the following output is shown:
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures the MD5 authentication key for checkpoint connection to MLAG peer.
Syntax Description
mlag Multi-switch Link Aggregation Group used to combine remote ports
and local ports to a common logical connection.
peer Multi-switch Link Aggregation Group peer switch.
peer_name Alphanumeric string identifying the MLAG peer.
authentication Authentication for MLAG checkpoint connection.
md5 MD5 authentication type.
key Authentication key for checkpoint connection to the MLAG peer.
encrypted Authenticaton key is in encrypted format.
auth_key Authentication key. Max 32 characters.
none Do not use authentication.
Default
None.
Usage Guidelines
Use this command to configure MD5 authentication key for checkpoint connection to MLAG peer.
Example
The following example displays show mlag peer output when authentication is not configured:
MLAG Peer : p2
VLAN : isc Virtual Router : VR-Default
Local IP Address : 10.1.1.1 Peer IP Address : 10.1.1.2
MLAG ports : 1 Tx-Interval : 1000 ms
Checkpoint Status : Up Peer Tx-Interval : 1000 ms
Rx-Hellos : 8722 Tx-Hellos :
8725
The following example displays show mlag peer output when authentication is configured:
MLAG Peer : p2
VLAN : isc Virtual Router : VR-Default
Local IP Address : 10.1.1.1 Peer IP Address : 10.1.1.2
MLAG ports : 1 Tx-Interval : 1000 ms
Checkpoint Status : Up Peer Tx-Interval : 1000 ms
Rx-Hellos : 8722 Tx-Hellos :
8725
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures the length of time between health check hello packets.
Syntax Description
peer_name Specifies an alpha numeric string identifying the MLAG peer.
msec Specifies an MLAG peer health-check hello interval in milliseconds.
The range is 50-10000ms. The default is 1000ms.
Default
The interval default is 1000 milliseconds.
Usage Guidelines
Use this command to configure the length of time between health check hello packets exchanged
between MLAG peer switches. After three health check hellos are lost, the MLAG peer switch is declared
to be failed, triggering an MLAG topology change.
Example
The following command sets an interval of 700 milliseconds on the switch101 peer. switch:
# configure mlag peer switch101 interval 700
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Associates an MLAG peer switch with an MLAG peer structure.
Syntax Description
peer_name Specifies an alpha numeric string identifying the MLAG peer.
peer_ip_address Specifies an IPv4 or IPv6 address.
VR Specifies a virtual router.
Default
N/A.
Usage Guidelines
Use this command to associate an MLAG peer structure with an MLAG peer switch IP address.
The specified IP address must be contained within an existing direct route. If not, the following error
message is displayed:
ERROR: Specified IP address is not on directly attached subnet in VR.
The link connecting MLAG peer switches should use load sharing. If it does not, a output similar to the
following is displayed:
Note: VLAN v1 will be used as the Inter-Switch Connection to the MLAG
peer mp1. Warning: The VLAN v1 does not have a load share port
configured yet. It is recommended that the Inter-Switch Connection use
load sharing.
Example
The following command associates the MLAG peer structure switch101 with the MLAG peer switch IP
address 1.1.1.1 on VR-USER:
# configure mlag peer switch101 ipaddress 1.1.1.1 vr “VR-USER”
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures MLAG LACP MAC on each of the MLAG peer switches. This MAC address will be used as the
system identifier in the LACPDUs sent over the MLAG ports.
Syntax Description
mlag Multi-switch link aggregation used to combine remote ports and local
ports to a common logical connection.
peer_name Alphanumeric string identifying the MLAG peer.
lacp-mac MAC address to be used as the system identifier in LACPDU for MLAG
ports.
auto System identifier in LACPDU automatically uses switch MAC of MLAG
peer with higher IP address for ISC control VLAN (default).
lacp_mac_address MAC address.
Default
Auto.
Usage Guidelines
This command is used to configure the System Identifier used in LACPDU for MLAG ports. The same
value has to be configured on both the MLAG peers.
Example
# configure mlag peer "peer1" lacp-mac auto
# configure mlag peer "peer1" lacp-mac 00:01:02:03:04:05
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Renames an established MLAG peer.
Syntax Description
mlag Specifies configuring MLAG settings.
peer Specifies configuring aspects of the MLAG peer switch.
peer_name Current MLAG peer name.
name Specifies renaming the MLAG peer.
new_peer_name Specifies the new name for the MLAG peer.
Default
N/A.
Usage Guidelines
To view changes made with this command, use the show mlag peer {peer_name} command.
Example
The following example changes the MLAG peer name from "mlag1" to "mlag2":
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Sets a preference for having a fast convergence time or conserving access lists.
Syntax Description
conserve-access-lists Specifies that conserving access lists is preferred over low traffic
convergence time.
fast Specifies that low traffic convergence time is preferred at the expense
of the number of user access lists.
Default
Conserve-access-lists.
Usage Guidelines
Achieving fast convergence times on local MLAG port state changes (down and up), independent of the
number of FDB entries learned on the MLAG port, requires the use of ACLs. This limits the number of
ACLs you have available. This command allows you to set your preference for having either fast
convergence time or conserving available access lists for your users.
Note
Configuring fast convergence-control limits the number of ACLs that can be supported by the
switch. You must ensure that the system has sufficient user ACLs free when fast mode is
selected. Configuring conserve-access-lists convergence-control may increase convergence
times on MLAG port failures.
Fast convergence configuration has global significance in that it applies to all MLAG groups that are
currently configured and those that may be configured in the future.
Example
The following command specifies a priority of conserving access lists over low traffic convergence time:
# configure mlag ports convergence-control conserve-access-lists
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures MLAG linkup isolation, which prevents flood traffic received on newly operational MLAG
ports from being forwarded to ISC ports before the ISC blocking filter is installed.
Syntax Description
on Isolate MLAG ports from sending traffic to local ISC port during link-
up transition until remote ISC port is configured.
off Do not isolate MLAG ports from sending traffic to local ISC port during
link-up transition.
Default
The default is off.
Usage Guidelines
Under certain circumstances, a temporary (less than a second) loop condition exists when an MLAG
port becomes operational, but before the remote MLAG peer installs the ISC blocking filter. MLAG linkup
isolation addresses this condition by preventing any flood traffic (broadcast, unknown, unicast, etc.)
received on a just operational MLAG port from being forwarded to ISC ports until the remote MLAG
peer installs the ISC blocking filter.
Example
The following example enables MLAG linkup isolation:
configure mlag ports link-up-isolation on
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command configures a reload delay on Multi-switch Link Aggregation Group (MLAG) ports.
Syntax Description
reload-delay Specifies creating a reload delay on MLAG ports.
reload-delay Specifies the MLAG port reload-delay timer in seconds (range = 1–
1,200 seconds). The default is 30 seconds.
Default
The default reload-delay timer interval is 30 seconds.
Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. This command allows you to configure a time delay for MLAG ports providing
enough time for ISC ports/neighborship of other Layer 3 protocols to come up. To have this delay timer
take effect, you need to issue the enable mlag port reload-delay on page 2168 command.
Example
The following example sets the reload-delay to 60 seconds:
# configure mlag ports reload-delay 60
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
configure mld
configure mld query_interval query_response_interval
last_member_query_interval {{vlan} vlan_name} {{vr} vr_name}
{robustness}
Description
Configures the Multicast Listener Discovery (MLD) timers.
Syntax Description
query_interval Specifies the interval (in seconds) between general queries.
query_response_interv Specifies the maximum query response time (in seconds).
al
last_member_query_int Specifies the maximum group-specific query response time (in
erval seconds).
vlan_name Applies the configuration only to the specified VLAN. If no VLAN is
specified, the configuration appliese to all VLANs.
vr_name Specifies the VR to which the configuration should be applied. If not
parameter is specified, the configuration is applied to the current VR
context.
robustness Specifies the degree of robustness for the network.
Default
• query interval—125 seconds
• query response interval—10 seconds
• last member query interval—1 second
• robustness—2
Usage Guidelines
Timers are based on RFC2710. Specify the following:
• query interval—The amount of time, in seconds, the system waits between sending out general
queries. The range is 1 to 429,496,729 seconds.
• query response interval—The maximum response time inserted into the periodic general queries.
The range is 1 to 25 seconds.
• last member query interval—The maximum response time inserted into a group-specific query sent
in response to a leave group message. The range is 1 to 25 seconds.
• robustness—The degree of robustness of the network. The range is 2 to 7.
Example
The following command configures the MLD timers:
configure mld 100 5 1 3
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures fast-learning mode.
Syntax Description
vlan_name Specifies a vlan name
Default
off.
Usage Guidelines
When MLD snooping is enabled on a VLAN, learning of group entries will happen only when the next
periodic query is sent by the querier in the network. When fast-learning is turned on using this
command, a query is sent under the following conditions:
• When MLD snooping is enabled.
• When MLD snooping VLAN is operationally up.
• Group join limit changed through configuration.
Query generated for faster learning uses unspecified address as the source address (both L2 and L3),
unless the switch generating the triggered query is the querier for the network.
Example
configure mld snooping fast-learning on
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MLD snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Selects the type of MLD snooping filters that are installed.
Syntax Description
per-port Installs the per-port MLD snooping filters.
per-vlan Installs the per-VLAN MLD snooping filters.
Default
per-port.
Usage Guidelines
Use the per-vlan option when the number of VLANs configured on the switch is lower than half of the
maximum numbers listed in Table 11 on page 557. This option conserves usage of the hardware Layer 3
multicast forwarding table.
When the number of configured VLANs is larger than half of the maximum values listed in Table 11 on
page 557, select the per-port option. Each VLAN requires additional interface hardware ACL resources.
The per-port option conserves usage of the interface hardware ACL resources.
To display the MLD snooping filters configuration, use the show mld snooping command.
Example
The following command configures the switch to install the per-VLAN MLD snooping filters:
configure mld snooping filters per-vlan
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MLD snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures certain multicast addresses to be slow path flooded within the VLAN.
Syntax Description
policy Specifies a policy file with a list of multicast addresses to be handled.
none Specifies no policy file is to be used.
Default
None.
Usage Guidelines
With this command, you can configure certain multicast addresses to be slow path flooded within the
VLAN, instead of fast path forwarded according to MLD and/or Layer 3 multicast protocol.
A policy file is a text file with the extension .pol. It can be created or edited with any text editor. The
specified policy file policy file should contain a list of addresses that determine if certain multicast
streams are to be treated specially. Typically, if the switch receives a stream with a destination address
which is in the policy file in 'permit' mode, that stream is software flooded and no hardware entry
is installed.
When adding an IPv6 address into the policy file, a 128-bit host address is recommended.
This feature is meant to solve the multicast connectivity problem for unknown destination addresses
within system reserved ranges. Specifically this feature was introduced to solve the problem of
recognizing a certain stream as control packets.
To create a policy file for the snooping flood-list, use the following template:
# This is a template for MLD Snooping Flood-list Policy File
# Add your group addresses between "Start" and "End"
# Do not touch rest of file!!!!
entry mldFlood {
if match any {
#------------------ Start of group addresses ------------------
nlri ff05::100:1/128;
nlri ff05::100:15/128;
#------------------- end of group addresses -------------------
} then {
permit;
}
}
entry catch_all {
if {
} then {
deny;
}
}
Note
The switch does not validate any IP address in the policy file used in this command. Therefore,
slow-path flooding should be used only for streams that are very infrequent, such as control
packets. It should not be used for multicast data packets. This option overrides any default
mechanism of hardware forwarding (with respect to MLD or PIM), so it should be used with
caution.
You can use the show mld command to see the configuration of slow path flooding.
Note
This command has no effect in the current release, as IPv6 multicast traffic floods on all
platforms.
Example
The following example configures the multicast data stream specified in access1 for slow-path flooding:
configure mld snooping flood-list access1
The following command specifies that no policy file is to be used, thus effectively disabling slow-path
flooding:
configure mld snooping flood-list none
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the MLD snooping leave timeout.
Syntax Description
leave_timeout_ms Specifies an MLD leave timeout value in milliseconds upon receiving
an MLD done message.
vlan_name Applies the configuration only to the specified VLAN. If no VLAN is
specified, the configuration applies to all VLANs.
vr_name Specifies the VR to which the configuration should be applied. If no
parameter is specified, the configuration is applied to the current VR
context.
Default
1000 ms.
Usage Guidelines
The range is 0–175000 ms (175 seconds). For timeout values of one second or less, you must set the
leave-timeout to a multiple of 100 ms. For values of more than one second, you must set the leave-
timeout to a multiple of 1000 ms (one second).
The specified time is the maximum leave timeout value. The switch could leave sooner if an MLD done
message is received before the timeout occurs.
Example
The following example configures the MLD snooping leave timeout to 10 seconds:
configure mld snooping leave-timeout 10000
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the MLD snooping timers.
Syntax Description
router_timeout Specifies the time in seconds before removing a router snooping
entry.
host_timeout Specifies the time in seconds before removing a host’s group
snooping entry.
vlan_name Applies the configuration only to the specified VLAN. If no VLAN is
specified, the configuration applies to all VLANs.
vr_name Specifies the VR to which the configuration should be applied. If no
parameter is specified, the configuration is applied to the current VR
contex.
Default
The router timeout default setting is 260 seconds. The host timeout setting is 260 seconds.
Usage Guidelines
Timers should be set to approximately 2.5 times the router query interval in use on the network. Specify
the following:
• router_timeout—The maximum time, in seconds, that a router snooping entry can stay without
receiving a router report. The range is 10 to 214,748,364 seconds (6.8 years). The default setting is
260 seconds.
• host_timeout—The maximum time, in seconds, that a group snooping entry can stay without
receiving a group report. The range is 10 to 214,748,364 seconds (6.8 years). The default setting is
260 seconds.
MLD snooping is a Layer 2 function of the switch. It does not require multicast routing to be enabled.
The feature reduces the flooding of IPv6 multicast traffic. On the VLAN, MLD snooping optimizes the
usage of network bandwidth and prevents multicast traffic from being flooded to parts of the network
that do not need it. The switch does not reduce any IP multicast traffic in the local multicast domain
(FF02::x).
MLD snooping is enabled by default on the switch. MLD snooping expects at least one device on every
VLAN to periodically generate MLD query messages. Without an MLD querier, the switch eventually
stops forwarding IPv6 multicast packets to any port, because the MLD snooping entries times out,
based on the value specified in host timeout.
Example
The following example configures the MLD snooping timers to 600 seconds for both timers:
configure mld snooping timer 600 600
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an MLD dynamic group.
Syntax Description
vlan_name Specifies a VLAN name.
portlist Specifies a port list.
IPv6_grp_ipaddress Specifies the multicast group IPv6 address.
Default
N/A.
Usage Guidelines
This command adds MLD groups to specific VLANs or to ports belonging to specific VLANs. After the
groups are added, the expiration timer is started; this causes the groups to expire. The configuration is
not saved in the configuration file. The following message is displayed on execution of this command:
INFO: This command is not saved in the configuration.
Example
The following example configures a dynamic MLD entry so the multicast group ff02::1:1 is forwarded to
VLAN marketing on ports 2:1-2:4:
configure mld snooping marketing ports 2:1-2:4 add dynamic group ff02::1:1
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures VLAN ports to receive the traffic from a multicast group, even if no MLD joins have been
received on the port.
Syntax Description
vlan_name Specifies a VLAN name.
port_list Specifies one or more ports or slots and ports. On a SummitStack, it
can be a list of slots (nodes) and ports. On a standalone switch, it can
be one or more port numbers. In the form 1, 2, 3-5, 2:5, 2:6-2:8.
IPv6_grp_ipaddress Specifies the multicast group IPv6 address.
Default
N/A.
Usage Guidelines
Use this command to forward a particular multicast group to VLAN ports. In effect, this command
emulates a host on the port that has joined the multicast group. As long as the port is configured with
the static entry, multicast traffic for that multicast group is forwarded to that port.
The switch sends proxy MLD messages in place of those generated by a real host. The proxy messages
use the VLAN IPv6 address for source address of the messages. If the VLAN has no IPv6 address
assigned, the proxy MLD message uses 0::0 as the source IP address.
Example
The following example configures a static MLD entry so the multicast group ff02::1:1 is forwarded to
VLAN marketing on ports 2:1-2:4:
configure mld snooping marketing ports 2:1-2:4 add static group ff02::1:1
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures VLAN ports to forward the traffic from all multicast groups, even if no MLD joins have been
received on the port.
Syntax Description
vlan_name Specifies a VLAN name.
port_list Specifies one or more ports or slots and ports. On a SummitStack, it
can be a list of slots and ports. On a standalone switch, it can be one
or more port numbers. May be in the form 1, 2, 3-5, 2:5, 2:6-2:8.
Default
N/A.
Usage Guidelines
Use this command to forward all multicast groups to the specified VLAN ports. In effect, this command
emulates a multicast router attached to those ports. As long as the ports are configured with the static
entry, all available multicast traffic is forwarded to those ports.
Example
The following example configures a static MLD entry so all multicast groups are forwarded to VLAN
marketing on ports 2:1-2:4:
configure mld snooping marketing ports 2:1-2:4 add static router
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes the configuration that causes VLAN ports to receive the traffic from a multicast group, even if
no MLD joins have been received on the port.
Syntax Description
vlan_name Specifies a VLAN name.
port_list Specifies one or more ports or slots and ports. On a modular switch, it
can be a list of slots and ports. On a standalone switch, it can be one
or more port numbers. In the form 1, 2, 3-5, 2:5, 2:6-2:8.
all Specifies all multicast groups.
v6grpipaddress Specifies the multicast group IPv6 address.
Default
N/A.
Usage Guidelines
Use this command to delete a static group from a particular VLAN port.
Example
The following example removes a static MLD entry so the multicast group ff02::a:b is not forwarded to
VLAN marketing on ports 2:1-2:4, unless an MLD join message is received on the port:
configure mld snooping marketing ports 2:1-2:4 delete static group ff02::a:b
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures VLAN ports to stop forwarding the traffic from all multicast groups, unless MLD joins have
been received on the port.
Syntax Description
vlan_name Specifies a VLAN name.
port_list Specifies one or more ports or slots and ports. On a SummitStack, it
can be a list of slots and ports. On a standalone switch, it can be one
or more port numbers. May be in the form 1, 2, 3-5, 2:5, 2:6-2:8.
Default
None.
Usage Guidelines
Use this command to remove the configuration that forwards all multicast groups to the specified VLAN
ports.
Example
The following example removes a static MLD entry so all multicast groups are not forwarded to VLAN
marketing on ports 2:1-2:4, unless an MLD join is received on the port:
configure mld snooping marketing ports 2:1-2:4 delete static router
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a MLD snooping policy file filter on VLAN ports.
Syntax Description
vlan_name Specifies a VLAN name.
port_list Specifies one or more ports or slots and ports. On a SummitStack, can
be a list of slots and ports. On a standalone switch, can be one or
more port numbers. May be in the form 1, 2, 3-5, 2:5, 2:6-2:8.
policy Specifies the policy file for the filter.
Default
None.
Usage Guidelines
Use this command to filter multicast groups to the specified VLAN ports.
The policy file used by this command is a text file that contains the IPv6 multicast addresses of the
multicast groups that you wish to block.
To remove MLD snooping filtering from a port, use the none keyword version of the command.
Example
The following example configures the policy file ap_multicast to filter multicast packets forwarded to
VLAN marketing on ports 2:1-2:4:
configure mld snooping marketing ports 2:1-2:4 filter ap_multicast
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MLD snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures VLAN ports to support a maximum number of MLD joins.
Syntax Description
vlan_name Specifies a VLAN name
port_list Specifies one or more ports or slots and ports.
num Specifies the maximum number of joins permitted on the ports. The
range is 1 to 5000.
Default
No limit.
Usage Guidelines
None.
Example
The following example configures port 2:1 in the Default VLAN to support a maximum of 100 MLD joins:
configure mld snooping "Default" ports 2:1 join-limit 100
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MLD snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds an MLD SSM Mapping entry on a VR.
Syntax Description
v6groupnetmask You must provide group address with the mask length. Instead of
configuring separate entries for a continuous range of IP addresses,
this optimizes a range of group IP addresses to be configured as a
single entry.
v6sourceip Specifies the source IP address for which the SSM should apply.
src_domain_name Provides the option to use DNS to obtain IP addresses dynamically by
specifying the domain name.
VR vr_name Specifies the virtual router name.
Default
N/A.
Usage Guidelines
When an MLDv1 report is received for this group or group range, the list of sources configured using this
command is used as part of source-specific information to PIM.
The following error message displays when more than 50 source addresses are configured for a specific
group:
ERROR: Cannot configure more than 50 sources for group ff30::1/128 on VR-Default
The following error message displays when a source address is already configured:
ERROR: Source 2001:0DB8:1::1 already present for group ff30::1/128 on VR-Default
The following error message displays when a DNS name is already configured:
ERROR: Only one source domain name allowed for group ff30::1/128 on VR-Default
Example
The following example configures a MLD-SSM mapping entry:
configure mld ssm-map add ff06::/64 2001::1
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes an MLD SSM Mapping entry on a VR.
Syntax Description
v6groupnetmask You must provide group address with the mask length. Instead of
configuring separate entries for a continuous range of IP addresses,
this optimizes a range of group IP addresses to be configured as a
single entry.
v6sourceip Specifies the source IP address for which the SSM should apply.
src_domain_name Provides the option to use DNS to obtain IP addresses dynamically by
specifying the domain name.
all Specifies that all the mapping entries associated with
v6groupnetmask are deleted.
vr vr_name Specifies the virtual router name.
Default
N/A.
Usage Guidelines
When an MLDv1 report is received for this group or group range, the list of sources configured using this
command is used as part of source-specific information to PIM.
The following error message displays when specified entry is not found:
ERROR: SSM Mapping entry (ff30::1/128, 2001:0DB8:1::10) not found on VR-Default
Example
The following example deletes a MLD-SSM mapping entry:
configure mld ssm-map delete ff06::/64 2001::1
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds an MPLS interface to the specified VLAN.
Syntax Description
vlan_name Identifies the VLAN where the MPLS interface is added.
Default
VLANs are not configured with an MPLS interface.
Usage Guidelines
An MPLS interface must be configured on a VLAN in order to transmit or receive MPLS packets on that
interface. By default, MPLS, LDP, and RSVP-TE are disabled for the MPLS interface. The specified VLAN
should have an IP address configured and should have IP forwarding enabled. The MPLS interface on
the VLAN does not become active until these two conditions are met. Also, if the IP address is
unconfigured from the VLAN or IP forwarding is disabled for the VLAN, the MPLS interface goes down.
The MPLS interface state is viewed using the show mpls interface command.
The VLAN must be operational for the MPLS interface to be up. This means that at least one port in the
VLAN must be active or the VLAN must be enabled for loopback mode.
It is recommended that when you configure MPLS on an OSPF interface that can be used to reach a
given destination, you should configure MPLS on all OSPF interfaces that can be used to reach that
destination. (You should enable MPLS on all of the VLANs connected to the backbone network).
Example
The following example adds MPLS to the VLAN vlan_usa:
configure mpls add vlan vlan_usa
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Removes an MPLS interface from the specified VLAN.
Syntax Description
vlan_name Identifies the VLAN for which the MPLS interface is deleted.
vlan all Deletes the MPLS interface from all VLANS that have MPLS
configured.
Default
VLANs are not configured with an MPLS interface.
Usage Guidelines
An MPLS interface must be configured on a VLAN in order to transmit or receive MPLS packets on that
interface. If the MPLS interface is deleted, all configuration information associated with the MPLS
interface is lost. Issuing this command brings down all LDP neighbor sessions and all LSPs that are
established through the specified VLAN interface. When the all VLANs option is selected, the MPLS
interface for all MPLS configured VLANs is deleted.
Example
The following example deletes MPLS from the VLAN vlan_k:
configure mpls delete vlan vlan_k
History
This command was first available in ExtremeXOS 11.6
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the QoS profile that is used for the EXP value when EXP examination is enabled.
Syntax Description
value Specifies the value that is used for the EXP value.
qosprofile Specifies the QoS profile that is used for the EXP value.
Default
The QoS profile matches the EXP value + 1.
Usage Guidelines
This command configures the QoS profile that is used for the EXP value when EXP examination is
enabled. By default, the QoS profile matches the EXP value + 1. That is, EXP value of 0 is mapped to QoS
profile qp1, EXP value of 1 is mapped to QoS profile qp2, etc. This configuration has switch-wide
significance. The EXP value must be a valid number from 0 through 7 and the qosprofile must match
one of the switch's QoS profiles.
Note
EXP examination must be enabled using the “enable mpls exp examination” command before
the configured EXP value to QoS profile mapping is actually used to process packets.
Example
The following command sets QoS profile q5 to be used for EXP value 7:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the EXP value that is used for the specified QoS profile when EXP replacement is enabled.
Syntax Description
qosprofile Specifies the QoS profile that is used for the EXP value.
value Specifies the value that is used for the EXP value.
Default
The EXP value matches the QoS profile -1.
Usage Guidelines
This command configures the EXP value that is used for the QoS profile when EXP replacement is
enabled. By default, the EXP value matches the QoS profile - 1. That is, QoS profile qp1 is mapped to EXP
value of 0, QoS profile qp2 is mapped to EXP value of 1, etc. This configuration has switch-wide
significance. The qosprofile must match one of the switch's QoS profiles and the EXP value must be a
valid number from 0 through 7.
Note
EXP replacement must be enabled using the “enable mpls exp replacement” command before
the configured EXP value to QoS profile mapping is actually used to process packets.
Example
The following command sets EXP value 2 to be used with QoS profile 4:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the number of labels that are reserved for specifying the incoming label for static LSPs and
static pseudowires.
Syntax Description
labels Specifies that labels are reserved to specify the incoming label for
static LSPs and static pseudowires.
max-static Specifies the number of labels that are reserved to specify the
incoming label for static LSPs and static PWs.
max_static-labels Specifies the value for the maximum number of static labels.
Default
The default static label range size is 100.
Usage Guidelines
Use this command to configure the number of labels that are reserved for specifying the incoming label
for static LSPs and static PWs. The static label range generally starts at 16 and the default static label
range size is 100. This means that the default static label range is 16 through 115 and can be allocated for
either incoming (both transit and egress) static LSPs, or incoming static PWs. The maximum static
label_range_size is equal to the incoming label table size – 100 labels for signaling. 960 labels are
reserved for L3VPNs. The maximum number of labels available for static configuration is 7116, since at
least 100 of those labels are reserved for dynamic signaling.
Since these values vary per-platform, use the show mpls label usage command to see details
about label usage and platform capability. The minimum static label range size is 0.
Note
MPLS must be disabled when issuing this command. If MPLS is enabled, an error message is
displayed and the command has no affect. All other labels, including outgoing labels for static
LSPs and PWs and signaled labels used by RSVP-TE and LDP, are allocated out of the
dynamic label space.
Example
The following example illustrates how to configure MPLS max-static labels, and how to display them:
Summit1.2 # show mpls lab usage
History
This command was first available in ExtremeXOS 15.4
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures a filter to be used by LDP when originating unsolicited label mapping advertisements to LDP
neighbors.
Syntax Description
direct Specifies that the advertisement filter is applied to the associated FECs with
directly-attached routing interfaces.
rip Specifies that the advertisement filter is applied to FECs associated with RIP
routes exported by OSPF.
static Specifies that the advertisement filter is applied to FECs associated with static
routes.
all Specifies that unsolicited label mapping advertisements are originated for all
routes of the specified type.
lsr-id Specifies that an unsolicited label advertisement is originated for a direct route
that matches the MPLS LSR ID.
none Specifies that no unsolicited label mapping advertisements are originated for
the specified route type.
Default
None—the default setting for RIP and static routing methods.
Usage Guidelines
You can configure how the advertisement filter is applied, as follows:
• direct—The advertisement filter is applied to the FECs associated with directly-attached routing
interfaces.
• rip—The advertisement filter is applied to the FECs associated with RIP routes exported by OSPF.
• static—The advertisement filter is applied to the FECs associated with static routes.
Advertising labels for a large number of routes may increase the required number of labels that must be
allocated by LSRs. Take care to ensure that the number of labels advertised by LERs does not
overwhelm the label capacity of the LSRs.
Example
The following command configures LDP to originate labels for all local IP interfaces:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the loop-detection parameters used by LDP.
Syntax Description
hop-count Configures the number of LSRs that the label message can traverse.
hop_count_limit Specifies the hop count limit. The valid configuration range is from 1 to 255.
path-vector Configures the maximum number of LSR IDs that can be propagated in the
label message.
path_vector_lim Specifies the path vector limit. The valid configuration range is from 1 to 255.
it
Default
The default for the hop-count and path-vector limits is 255.
Usage Guidelines
Configuration changes are only applicable to newly created LDP sessions. Disabling and enabling LDP
forces all the LDP sessions to be recreated. LDP loop detection must first be enabled for these
configuration values to be used.
Example
This command sets the LDP hop count loop detection value to 10. The configured path vector value
remains at 255.
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures LDP peer session timers for the switch.
Syntax Description
targeted Specifies targeted LDP sessions.
link Specifies link LDP sessions.
hello_hold_seconds The amount of time (in seconds) that a hello message received from a
neighboring LSR remains valid. The rate at which Hello messages are
sent is 1/3 the configured hello-time. If a Hello message is not received
from a particular neighboring LSR within the specified
hello_hold_seconds, then the hello-adjacency is not maintained
with that neighboring LSR. The range is 6 to 65,534 seconds.
keep_alive_hold_secon The time (in seconds) during which an LDP message must be received
ds for the LDP session with a particular peer LSR to be maintained. If an
LDP PDU is not received within the specified session
keep_alive_hold_seconds, the corresponding LDP session is
torn down. The range is 6 to 65,534 seconds.
Default
link hello_hold_seconds – 15 seconds
Usage Guidelines
The LDP peer hello-adjacency timers are separately configurable for link and targeted LDP sessions. The
hello timer parameter specifies the amount of time (in seconds) that a Hello message received from a
neighboring LSR remains valid. The rate at which Hello messages are sent is 1/3 the configured hello-
time. If a Hello message is not received from a particular neighboring LSR within the specified
hello_hold_seconds, then the hello-adjacency is not maintained with that neighboring LSR.
The session keep_alive_hold_seconds parameter specifies the time (in seconds) during which an
LDP message must be received for the LDP session to be maintained. The rate at which Keep Alive
messages are sent, provided there are no LDP messages transmitted, is 1/6 the configured keep-alive-
time. If an LDP PDU is not received within the specified session keep_alive_hold_seconds
interval, the corresponding LDP session is torn down. The minimum and maximum values for hold
timers are 6 and 65,534, respectively.
Changes to targeted timers only affect newly created targeted sessions. Disabling and then enabling
VPLS or LDP causes all current targeted sessions to be re-created. The default values for the various
times are as follows: link hello_hold_seconds (15), link keep_alive_hold_seconds (40),
targeted hello_hold_seconds (45), and targeted keep_alive_hold_seconds (60). Changes
to the link keep-alive timers do not take effect until the LDP session is cycled.
Example
The following command configures link-level LDP hello adjacency hold time to 30 seconds and the keep
alive time to 10 seconds:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the MPLS LSR ID for the switch.
Syntax Description
ipaddress Specifies an IP address to identify the MPLS LSR for the switch. The MPLS LSR-ID
should be configured to the same IP address as the OSPF Router ID.
Default
No LSR ID is configured by default.
Usage Guidelines
LDP, RSVP-TE, and L2 VPNs all use the LSR ID. It is normally set to the OSPF Router ID.
The LSR ID must be configured before MPLS can be enabled. The LSR ID cannot be changed while
MPLS is enabled. It is highly recommended that an IP address be configured on a OSPF enabled
loopback VLAN that matches the configured LSR ID and OSPF ID. If an LSR ID loopback IP address is
configured, OSPF automatically advertises the LSR ID as a routable destination for setting up LSPs. The
LSR ID remains active if an interface goes down if the LSR-ID is configured as an IP address on a
loopback VLAN, as recommended. This significantly enhances network stability and operation of an
MPLS network.
Example
The following command configures the LSR ID to 192.168.50.5:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Specifies the maximum amount of Committed Information Rate (CIR) bandwidth which can be used by
RSVP-TE LSP reservations.
Syntax Description
committed_bp Specifies a bitrate for the bandwidth to be reserved.
s
Kbps Specifies the designated bitrate in kilobits per second.
Mbps Specifies the designated bitrate in megabits per second.
Gbps Specifies the designated bitrate in gigabits per second.
vlan Specifies that the bandwidth is to be reserved for a specific VLAN.
vlan_name Identifies the VLAN for which the bandwidth is reserved.
vlan all Specifies that the bandwidth is reserved for all VLANS that have MPLS configured.
receive Specifies that the bandwidth is reserved for ingress traffic only.
transmit Specifies that the bandwidth is reserved for egress traffic only.
both Specifies that the bandwidth is reserved for both ingress and egress traffic.
Default
The default is zero, which means no RSVP-TE LSP bandwidth reservations are accepted.
If bandwidth is specified without specifying traffic direction, the default is both directions.
Usage Guidelines
This command specifies the maximum amount of Committed Information Rate (CIR) bandwidth which
can be used by dynamic RSVP-TE LSP bandwidth reservations. By sub-allocating reserveable
bandwidth for RSVP-TE from the VLAN’s available bandwidth, the switch can guarantee that as LSPs
are established, a minimum amount of CIR bandwidth is available for other traffic.
Note
Beginning with ExtremeXOS Release 12.2.1, CIR bandwidth for the receive direction is not
tracked by TE IGPs, such as OSPF-TE, and configuring it is not required. Configuring CIR
bandwidth for the receive direction does not prevent an LSP from going operational due to
lack of receive bandwidth; however, it can be useful for tracking and informational purposes.
An Info level log (MPLS.RSVPTE.IfRxBwdthExcd) is generated if the setup of a TE LSP
requires receive bandwidth greater than that which is currently available for the receive
direction on a particular interface. This generally happens only when TE LSPs with different
previous hops ingress the switch on the same interface (for example, from a multi-access link)
and egress the switch on different interfaces.
The keyword both configures the reserved bandwidth for both ingress and egress LSP CIR reservations
and overwrites any previous receive or transmit settings.
Example
The following command reserves 25 Mbps of CIR bandwidth for all RSVP-TE CIR reservations on the
specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Adds a configured path to the specified RSVP-TE LSP.
Syntax Description
lsp_name Specifies the name of the LSP you are configuring.
path_name Specifies the name of the path to be used by the specified LSP.
any Configures the specified LSP to use any path.
profile_name Specifies a profile to be applied to the specified LSP. If the profile name is omitted,
the profile named default is used.
primary Designates the specified path as the primary path. Only one primary path can be
configured for an RSVP-TE LSP. If this option is omitted and no primary path has
been specified, the specified path is added as a primary path. If not specified and
a primary path has already been added, the path is added as a secondary path.
secondary Designates the specified path as a secondary path.
frr_profile_n Specifies a fast reroute (FRR) profile to be applied to the detour LSP that backs
ame up the specified LSP.
Default
N/A.
Usage Guidelines
The LSP is not signaled until a path is added to the LSP.
If you want fast reroute protection for the LSP, use the primary option and specify the fast reroute
profile name you want to use. To specify the default fast reroute profile, enter default-frr.
The switch chooses the local MPLS VLAN interface from which to signal the LSP. To force an LSP to use
a specific local MPLS interface, configure the local interface IP address as the first ERO in the associated
path.
Example
This command adds the path sydney-bypass to the LSP named aus as a secondary path:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Changes the configuration that has been configured with the configure mpls rsvp-te lsp
lsp_name add path [path_name | any] {profileprofile_name} {primary
{frr_profile_name} | secondary} command.
Syntax Description
lsp_name Specifies the name of the LSP you are changing.
path_name Specifies the name of the path to be used by the specified LSP.
any Configures the specified LSP to use any path.
standard_pro Specifies a profile to be applied to the specified LSP. If the profile name is omitted,
file_ name the profile named default is used.
frr_profile_ Specifies a fast reroute (FRR) profile to be applied to the detour LSP that backs up
name the specified LSP.
Default
N/A.
Usage Guidelines
None.
Example
This command changes the LSP named aus to use any available path:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described iin the ExtremeXOS
30.5 Feature License Requirements document.
Description
Deletes a path from the specified RSVP-TE LSP.
Syntax Description
lsp_name Specifies a name for the RSVP-TE LSP.
path_name Specifies a name for the path to be deleted from the RSVP-TE LSP.
any Configures the specified LSP to use any path.
all Deletes all added paths from the specified RSVP-TE LSP.
Default
N/A.
Usage Guidelines
This command deletes a path from the specified RSVP-TE LSP. All the added paths can be deleted by
specifying the all keyword. If the active path is deleted, then one of the other configured paths becomes
the active path for the LSP. If there are no other defined paths, then the LSP is marked down and cannot
be used to forward IP or VPN traffic.
Example
The following command deletes the path called through-knightsbridge for the LSP london:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables or disables fast-reroute protection for the specified LSP.
Syntax Description
lsp_name Specifies the name of the LSP you are configuring.
Default
Disabled.
Usage Guidelines
To signal the fast-reroute protected LSP, use the enable mpls rsvp-te lsp [lsp_name |
all] command. Similarly, to disable the fast-reroute protected LSP, use the disable mpls rsvp-
te lsp [lsp_name | all] command.
Example
This command enables fast-reroute protection on LSP aus:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Changes the profile that the configured LSP path uses.
Syntax Description
lsp_name Specifies the RSVP-TE LSP.
path_name Specifies the configured RSVP-TE LSP path.
profile_name Specifies a profile to be applied to the configured LSP path.
Default
N/A.
Usage Guidelines
This command changes the profile that the configured LSP path uses.
Note
Changing the profile while an LSP is active may cause the LSP to be torn down and re-
signaled.
Example
The following command configures the switch to apply the LSP profile gold-class to the LSP path
sydney-bypass for the LSP aus:
configure mpls rsvp-te lsp aus path sydney-bypass use profile gold-class
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the type of traffic that may be transported across a named LSP.
Syntax Description
lsp_name Specifies the RSVP-TE LSP.
ip-traffic Controls the forwarding of routed IP traffic across the specified LSP.
vpn-traffic Controls the forwarding of VPN traffic over the LSP.
allow Allows transport of the specified traffic across the LSP.
deny Denies transport of the specified traffic across the LSP.
allow Allows all VPLS VPN traffic to be transported across the LSP.
all Allows the transmission of all VPN traffic over the LSP.
assigned- Limits the transport of VPN traffic to VPLS instances that are explicitly configured
only to use the specified LSP name.
Default
The default behavior is to allow RSVP-TE LSPs to transport all types of traffic without restriction.
Usage Guidelines
This command configures the type of traffic that may be transported across a named LSP. By default,
both IP traffic and VPN traffic are set to allow transport for a newly created LSP. The ip-traffic keyword
is used to allow or deny forwarding of routed IP traffic across the specified LSP. If allowed, the LSP label
information is inserted into the routing table and the switch forwards traffic over the LSP that matches
the IP route entry to which this LSP is associated. If denied, the LSP label information is removed from
the routing table and the switch does not use the LSP to transport IP traffic. The vpn-traffic keyword
controls the transmission of VPN traffic over the LSP. When denied, the LSP is not used as a transport
for PWs or other VPN related traffic. These transport configuration options are independent. For
example, if vpn-traffic is set to allow and ip-traffic is set to deny, then no routed IP traffic is transported
across the LSP, but the LSP may still be used to transport VPN traffic.
The optional assigned-only keyword limits the transport of VPN traffic to only those VPLS instances
that are explicitly configured to use the specified LSP name.
Example
The following command prevents the switch from using LSP aus to forward IP traffic:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the TE metric value for the RSVP-TE interface specified by the vlan_name argument.
Syntax Description
value Specifies a value for the RSVP-TE metric.
vlan Specifies that the RSVP-TE metric is configured for a specific VLAN.
vlan_name Identifies the VLAN for which the RSVP-TE metric is configured.
Default
The associated default IGP metric.
Usage Guidelines
The TE metric can be any unsigned non-zero 32-bit integer. The default value for the RSVP-TE interface
is to use the associated default IGP metric. The TE metric is exchanged between OSPF routers and is
used in the calculation of the CSPF topology graph.
Example
The following command configures an RSVP-TE metric of 220 on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
The routed path for an RSVP-TE LSP can be described by a configured sequence of the LSRs and/or
subnets traversed by the path. Each defined LSR or subnet represents an ERO subobject. Up to 64
subobjects can be added to each path name. LSRs and/or subnets can be either included or excluded.
Syntax Description
path_name Specifies the path to which the IP address is added.
include Specifies an LSR or subnet to be included in the path calculation.
ipNetmask Specifies an IP prefix.
strict Specifies that the subobject must be topologically adjacent to the
previous subobject in the ERO list.
loose Specifies that the subobject need not be topologically adjacent to the
previous subobject in the ERO list.
exclude Specifies a subnet to be excluded in the path calculation.
number Specifies the LSR path order.
Default
The order value defaults to 100 if the path has no EROs configured or a value 100 more than the highest
order number configured for the path.
Usage Guidelines
This command adds an IP address to the Explicit Route Object (ERO) for the specified path name. The
RSVP-TE routed path may be described by a configured sequence of the LSRs and/or subnets that the
path traverses. Each defined LSR or subnet represents an ERO subobject. Up to 64 subobjects can be
added to each path name. The ERO keyword identifies an LSR using an IP prefix, which may represent
an LSR's Router ID, loopback address, or direct router interface. Each IP prefix is included in the ERO as
an IPv4 subobject.
If the ERO is specified as strict, the strict subobject must be topologically adjacent to the previous
subobject as listed in the ERO. If the ERO is specified as loose, the loose subobject is not required to be
topologically adjacent to the previous subobject as listed in the ERO. If the specified IP prefix matches
the OSPF router ID or a configured loopback IP address, the ERO must be configured as loose.
The LSR path order is optionally specified using the order keyword. The order number parameter is an
integer value from 1 to 65535. IP prefixes with a lower number are sequenced before IP prefixes with a
higher number. Thus, the LSP path follows the configured path of IP prefixes with a number value from
low to high. If the order keyword is not specified, the number value for the LSR defaults to a value equal
to the current highest number value plus 100. If the list of IP prefixes added to the path does not reflect
an actual path through the network topology, the path message is returned with an error from a
downstream LSR and the LSP is not established.
1 “Topologically adjacent” indicates that the router next hop matches either the interface IP address or OSPF router ID of an
immediate peer LSR.
The order of a configured subobject cannot be changed. The ERO subobject must be deleted and re-
added with a different order. If a subobject is added to or deleted from the ERO while the associated
LSP is established, the path is torn down and is re-signaled using the new ERO. Duplicate ERO
subobjects are not allowed.
Defining an ERO for the path is optional. If no ERO is configured, the path is signaled along the best
available path and the ERO is not included in the path message. When the last subobject in the ERO of
the path message is reached and the egress IP node of the path has not been reached, the remaining
path to the egress node is signaled along the best available path. If the next subobject in the ERO is
loose, the best available path to the next subobject is chosen. Configuring EROs could lead an LSP to
take an undesirable path through the network, so care should be taken when specifying EROs.
Example
The following example adds the IP interface address 197.57.30.7/24 as a loose ERO to the path sydney-
bypass:
History
This command was first available in ExtremeXOS 11.6.
The include and exclude options were added in ExtremeXOS 15.7. "Include" was the previous
default behavior.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Deletes a subobject from the Explicit Route Object (ERO) for the specified path name.
Syntax Description
path_name Specifies the path from which the ERO is deleted.
all Specifies that the entire ERO should be deleted from the named path.
ipNetmask Specifies the ERO subobject to be deleted.
number Specifies the order number of the ERO subobject to be deleted.
Default
N/A.
Usage Guidelines
This command deletes a subobject from the Explicit Route Object (ERO) for the specified path name.
The ERO subobject is specified using an IP prefix or order number. If a subobject is deleted from an ERO
while the associated LSP is established, the path is torn down and is re-signaled using a new ERO. The
all keyword may be used to delete the entire ERO from the path name. When there is no configured
ERO, the path is no longer required to take an explicit routed path. The path is then signaled along the
best available path and no ERO is included in the path message.
Example
The following command deletes all the configured EROs from the path sydney-bypass:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the specified RSVP-TE FRR profile.
Syntax Description
frr_profile_name Specifies the FRR LSP profile to configure.
bandwidth_rate_ Specifies the bandwidth requirement for the FRR LSP.
bps This should be set to match the options chosen for the protected LSP.
Otherwise, a mismatch between the bandwidth settings for the detour and
protected LSPs can impact service.
bandwidth_rate_ Specifies the units for the bandwidth rate. Valid entries are Kbps, Mbps, and
unit Gbps.
detour Specifies the detour method of fast reroute. This is the only method
supported in this release.
hop_limit_value Specifies the maximum number of hops that the detour path is allowed to
take from the current node or point of local repair (PLR) to a merge point
(MP) node. If set to 0, only link protection is provided.
bandwidth- When enabled, this option specifies that the signaled bandwidth on the
protection detour path must be guaranteed. If this option is disabled, the detour path
might not support the bandwidth needed for the protected LSP.
node-protection When enabled, the this option indicates to the PLRs along a protected path
that a detour path that bypasses at least the next node of the protected LSP
is desired. If this option is disabled, the backup path might or might not
bypass the next node, in which case the user might or might not have next-
node protection.
hold-priority Specifies the hold priority of the LSP. Lower numbers indicate higher priority.
The range is from 0 to 7.
Hold priority is used when deciding whether a session can be preempted by
another session. This works exactly the same as the hold-priority set in the
standard profile that is valid for the protected LSP and for standard LSPs.
setup-priority Specifies the setup priority of the LSP. Lower numbers indicate higher priority.
The range is from 0 to 7.
The setup priority is used when deciding whether the detour LSP can
preempt another session. This works exactly the same as the setup-priority
set in the standard profile that is valid for the protected LSP and standard
LSPs.
Default
Bandwidth: Newly-created profiles are configured as best-effort. Setup-priority: 7 (lowest) Hold-
priority: 0 (highest) Hop-limit: 3 Protect-bandwidth: enabled Protect-node: enabled
Usage Guidelines
A FRR profile is a set of attributes that are applied to the detour and protected LSPs when a protected
LSP is configured. A default profile (frr-default) is provided which cannot be deleted, but can be applied
to any protected LSP. The maximum number of configurable profiles is 1000.
Note
Changing any of the profile parameters causes LSPs using the profile to be torn down and re-
signaled. There is no guarantee that the re-signaled LSP will be successfully established.
Future ExtremeXOS implementations may support the make-before-break LSP concept.
Example
The following command configures the FRR profile frrprofile for 100 Mbps bandwidth:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures an RSVP-TE profile with the specified profile name.
Syntax Description
profile_name Specifies the LSP profile.
bandwidth Specifies bandwidth reservation.
best-effort Indicates no bandwidth reservation.
committed_bps Specifies the committed bandwidth to be reserved across the MPLS
network, in bits per second. The range is from 64 Kbps to 10 Gbps.
peak_bps Specifies the maximum bandwidth signaled in bits per second. The range
is from 64 Kbps to 10 Gbps.
Kbps Specifies the designated bitrate in kilobits per second.
Mbps Specifies the designated bitrate in megabits per second.
Gbps Specifies the designated bitrate in gigabits per second.
burst_size Specifies the maximum number of bytes (specified in bits) that the LSP is
allowed to burst above the specified peak-rate. The range is from 0 to
1000 Mb.
Kb Kilobits
Mb Megabits
hold_priority Specifies the priority of the LSP. Lower numbers indicate higher priority.
The range is from 0 to 7.
setup_priority Specifies the priority of the LSP. Lower numbers indicate higher priority.
The range is from 0 to 7.
number Specifies the MTU value for the LSP. The range is from 296 to 9216/
use-local- Specifies that the MTU value is inherited from the local egress VLAN
interface interface.
record Configures hop-by-hop path recording.
enabled route-only Causes the Record Route Object (RRO) to be inserted into the path
message. The enabled option enables recording of hops and labels. The
enabled route-only option records only hops.
disabled Specifies that no RRO is inserted into the path message.
path-computation Computation strategy for calculating a path to the LSP destination:
• full = Requires the ingress node to fully calculate a path to the LSP
destination (default).
• partial = Allows the ingress node to calculate only part of the path
to the LSP destination.
full Allows the entire LSP path to be specified at ingress LSR (no calculations
performed by any transit nodes).
partial Allows you to specify ‘part’ of the path at ingress LSR. (For OSPF usage,
specify LSP path to the ABR, then ABR provides the calculation into the
other areas.)
Default
Bandwidth: Newly-created profiles are configured as best-effort.
Setup-priority: 7 (lowest).
Hold-priority: 0 (highest).
MTU: use-local-interface.
Path-computation: full.
Usage Guidelines
A profile is a set of attributes that are applied to the LSP when the LSP is configured using the configure
mpls rsvp-te lsp command. A default profile is provided which cannot be deleted, but may be applied to
any TE LSP. The profile_name for the default profile is default. The default profile parameter values
are initially set to their respective default values. The maximum number of configurable profiles is 1000.
LSPs may signal reserved bandwidth. By default, newly created profiles are configured to not signal
bandwidth requirements and thus are classified as best-effort. If bandwidth needs to be reserved across
the MPLS network, the bandwidth parameters specify the desired reserved bandwidth for the LSP. The
committed-rate specifies the mean bandwidth and the peak-rate specifies the maximum bandwidth
signaled. The peak-rate must be equal to or greater than the committed-rate. If the peak-rate is not
specified, traffic is not clipped above the committed-rate setting. The rates are specified in bps and
must be qualified by Kbps, Mbps, or Gbps. The minimum and maximum bandwidth rates are 64 Kbps
and 10 Gbps, respectively. The max-burst-size specifies the maximum number of bytes (specified in
bits) that the LSP is allowed to burst above the specified peak-rate. The minimum burst size is 0 and the
maximum burst size is 1000 Mb.
The setup-priority and hold-priority are optional parameters indicating the LSP priority. During path set
up, if the requested bandwidth cannot be reserved through the LSR, the setup-priority parameter is
compared to the hold-priority of existing LSPs to determine if any of the existing LSPs need to be
preempted to allow a higher priority LSP to be established. Lower numerical values represent higher
priorities. The setup-priority range is 0 to 7 and the default value is 7 (lowest). The hold-priority range is
also 0 to 7 and the default value is 0 (highest). If bandwidth is requested for the LSP, the CSPF
calculation uses the available bandwidth associated with the CoS as specified by the hold-priority.
The bandwidth, hold-priority, and setup-priority values are signaled in the path message. If the
bandwidth setting is changed, all LSPs using this profile are re-signaled. If the bps setting is decreased,
a new path message is sent along the LSP indicating the new reservation. If the bps setting is increased,
the LSP is torn down and resignaled using the new bandwidth reservations.
The record command is used to enable hop-by-hop path recording. The enabled keyword causes the
Record Route Object (RRO) to be inserted into the path message. The RRO is returned in the RESV
Message and contains a list of IPv4 subobjects that describe the RSVP-TE path. Path recording by
default is disabled. When disabled, no RRO is inserted into the path message.
The mtu keyword optionally specifies the MTU value for the LSP. By default, this value is set to use-
local-interface. In the default configuration, the MTU value is inherited from the local egress VLAN
interface. The minimum MTU value is 296 and the maximum value is 9216. Path MTU information is
carried in the Integrated Services or Null Service RSVP objects and is used by RSVP to perform path
MTU identification.
Note
Changing any of the profile parameters causes LSPs using the profile to be torn down and re-
signaled. There is no guarantee that the re-signaled LSP will be successfully established.
Future ExtremeXOS implementations may support the make-before-break LSP concept.
To view LSP recorded route information, enter one of the following commands:
show mpls rsvp-te lsp [ingress {fast-reroute} | ingress_lsp_name |
ingressingress_lsp_name | ingress [destination | origin]ipaddress]
{[all-paths | detail] | summary | down-paths {detail}} show mpls rsvp-te
lsp [egress | transit] {fast-reroute} {{lsp_name} {[destination |
origin]ipaddress} {detail} | summary}
Example
The following command configures the RSVP-TE profile gold-class with a committed bandwidth of 100
Mbps and the setup and hold priorities are both set to 0 (highest priority):
configure mpls rsvp-te profile gold-class bandwidth committed-rate 100 mbps hold-priority
0 setup-priority 0
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the timers associated with rapidly retrying failed LSPs.
Syntax Description
percent Specifies a percent increase in the interval allowed before each subsequent attempt
to re-signal an LSP. The valid range is from 0 to 100 percent.
milliseconds Specifies the time (in milliseconds) to wait before attempting to re-signal the LSP.
retry-limit Specifies the maximum allowed attempts to establish an LSP.
number Specifies a maximum number of allowed attempts to establish an LSP. The valid
number range is from zero to 255.
Default
Delay interval: 500 milliseconds.
Usage Guidelines
This command configures the timers associated with rapidly retrying failed LSPs. If an LSP fails to
establish, the switch attempts to rapidly retry the setup by sending additional path messages based on
the rapid-retry timers. The delay-interval timer specifies the time (in milliseconds) to wait before
sending another path message. If the LSP fails to establish itself on subsequent attempts, the delay-
interval time is incremented based on the decay-rate setting. The decay operation multiplies the delay-
interval time by the decay rate, and adds the result to the current delay-interval time.
For example, if the decay-rate is set to 50 percent and the current delay-interval time is 500
milliseconds, a path message is retransmitted in 750 milliseconds. If the LSP fails to establish on the
next attempt, a path message is retransmitted after a further decayed delay interval of 1125 milliseconds
(1.125 seconds). A per-LSP delay-interval time is maintained for each LSP until the LSP is established.
This process of decaying the retry time continues until the LSP is established or the retry-limit expires. If
the retry-limit is reached, attempts to rapidly retry the LSP are suspended.
When the switch starts the process of re-signaling the LSP based on the standard-retry timers, the
LSP's rapid-retry timers return to the initial configuration settings. If the standard-retry delay-interval
time is reached before all of the rapid-retry attempts have completed, the standard-retry mechanisms
take over.
The default rapid-retry LSP timer parameter values are 500 milliseconds for the delay-interval, 50
percent for the decay-rate, and a retry-limit of 10. The valid range for delay-interval is 10 to 1000
milliseconds. The valid decay-rate range is 0 to 100 percent. The valid retry-limit is 0 to 100. A value of 0
indicates that the LSP is not re-signaled using the rapid-retry timers.
When summary-refresh or bundle-message is enabled, the rapid-retry timer values are used for
resending any message that is not acknowledged.
Example
The following command sets the maximum number of rapid retries to five:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the timers associated with the establishment of an LSP.
Syntax Description
percent Specifies a percent increase in the interval allowed
before each subsequent attempt to re-signal an LSP.
The valid range is from 0 to 100 percent.
seconds Specifies the time (in seconds) to wait before
attempting to re-signal the LSP.
retry-limit Specifies the maximum allowed attempts to establish
an LSP.
Default
Delay interval: 30 seconds.
Usage Guidelines
This command configures the timers associated with the establishment of an LSP. If an LSP fails to
establish, the LSP is re-signaled based on the configuration of these timers. The delay-interval timer
specifies the time (in seconds) to wait before attempting to re-signal the LSP. If the LSP fails to establish
itself on subsequent attempts, the delay-interval time is incremented based on the decay-rate setting.
The decay operation multiplies the delay-interval time by the decay rate, and adds the result to the
current delay-interval time. For example, if the decay-rate is set to 50 percent and the current delay-
interval time is 30 seconds, the LSP is re-signaled in 45 seconds. If the LSP failed to establish on the
next attempt, the delay interval would be further decayed to 67 seconds.
A per-LSP delay-interval time is maintained for each LSP until the LSP is established. This operation of
decaying the retry time continues until the LSP is established or the retry-limit expires. If the retry-limit
is reached, attempts to establish the LSP are suspended.
Disabling and enabling the LSP resets the LSP's delay-interval time and retry-limit to the initial
configuration settings and LSP establishment attempts resume. The default LSP timer parameter values
are 30 seconds for delay-interval, with a 0 percent decay-rate, and retry-limit of unlimited. The valid
range for delay-interval is 1 to 60 seconds. The valid decay-rate range is 0 to 100 percent. The valid
retry-limit is 0 to 255 or unlimited. A value of 0 indicates that the LSP is not re-signaled.
Example
The following command allows unlimited retries for establishing MPLS RSVP-TE LSPs:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the RSVP-TE protocol parameters for the specified VLAN.
Syntax Description
bundle_message_ Specifies the maximum time a transmit buffer is held to allow multiple RSVP
milliseconds messages to be bundled into a single PDU. The valid range is from 50 to 3000
milliseconds.
hello_keep_ Specifies the number of hello-time intervals that can elapse before an RSVP-
number TE peer is declared unreachable. The range is from one to 255.
hello_interval_ Specifies the RSVP Hello packet transmission interval. The valid range is from 1
seconds to 60 seconds.
refresh_keep_ Specifies a factor to be used in calculating the maximum allowed interval
number without an RSVP refresh message before an RSVP session is torn down. The
range is from one to 255.
refresh_seconds Specifies the interval for sending refresh path messages. The range is from 1
to 600 seconds.
summary_refresh_ Specifies the interval for sending summary refresh messages. The valid range
milliseconds is from 50 (1/20 second) to 10000 (10 seconds).
vlan Specifies that the configured protocol parameters are for a specific VLAN.
vlan_name Identifies a particular VLAN for which the protocol parameters are configured.
vlan all indicates that the protocol configuration parameters apply to all RSVP-TE
enabled VLANs.
Default
Bundle-message-time: 1000 milliseconds (1 second).
Hello-keep-multiplier value: 3.
Hello-time: 3 seconds.
Refresh-keep-multiplier value: 3.
Refresh-time: 30 seconds.
Usage Guidelines
This command configures the RSVP-TE protocol parameters for the specified VLAN. The VLAN keyword
all indicates that the configuration changes apply to all VLANs that have been added to MPLS.
The hello-time value specifies the RSVP hello packet transmission interval. The RSVP hello packet
enables the switch to detect when an RSVP-TE peer is no longer reachable. If an RSVP hello packet is
not received from a peer within the configured interval, the peer is declared down and all RSVP sessions
to and from that peer are torn down. The formula for calculating the maximum allowed interval is:
[hello-time * hello-keep-multiplier]. The default hello-interval time is 3 seconds with a valid range from 1
to 60 seconds. The default hello-keep-multiplier value is three with a range from one to 255.
The refresh-time specifies the interval for sending refresh path messages. RSVP refresh messages
provide “soft state” link-level keep-alive information for previously established paths and enable the
switch to detect when an LSP is no longer active. Path messages are used to refresh the LSP if summary
refresh is disabled. If summary refresh is enabled, summary refresh messages are sent in place of
sending individual path messages for every LSP. The default refresh-time is 30 seconds. The minimum
and maximum refresh-time values are one and 600 (or 10 minutes) respectively.
If summary refresh is enabled, summary refresh messages are sent at intervals represented by the
configured summary-refresh-time. The configurable summary-refresh-time range is 50 milliseconds
(one twentieth of a second) to 10000 milliseconds (10 seconds). The default setting for summary-
refresh-time is 3000 milliseconds (3 seconds). RSVP sessions are torn down if an RSVP refresh message
is not received from a peer within the configured interval. The formula for calculating the maximum
allowed interval is: [(refresh-keep-multiplier + 0.5) * 1.5 * (refresh-time or summary-refresh-time)]. The
default refresh-keep-multiplier value is three. The minimum and maximum refresh-keep-multiplier
values are one and 255 respectively.
The bundle-message-time, specified in milliseconds, indicates the maximum time a transmit buffer is
held to allow multiple RSVP messages to be bundled into a single PDU. The default bundle-message-
time is 1000 milliseconds (one second). The bundle-message-time value may be set to any value
between 50 milliseconds and 3000 milliseconds (or 3 seconds). Message bundling is only attempted
when it is enabled.
Note
Summary refresh must be enabled using the “enable mpls rsvp-te summary-refresh”
command for a configured summary-refresh-time to actually be used.
Example
The following command sets the RSVP-TE hello time to 5 seconds on all MPLS interfaces:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the type of traffic that can be transported across a static ingress LSP.
Syntax Description
lsp_name Identifies the static LSP to be configured.
ip-traffic Specifies whether IP traffic is to be allowed or denied access to the LSP.
[allow | deny]
vpn-traffic Specifies whether VPN traffic is to be allowed or denied access to the LSP.
[allow {all | The optional assigned-only keyword limits the transport of VPN traffic to
assigned-only} | only those VPLS instances that are explicitly configured to use the specified
deny] LSP.
Default
N/A.
Usage Guidelines
This command has no effect if the named LSP is a transit or egress LSP. By default, IP traffic and VPN
traffic are set to deny for a newly created static LSP. The transport configuration options are
independent. For example, if VPN traffic is set to allow and IP traffic is set to deny, then no routed IP
traffic is transported across the LSP, but the LSP can still transport VPN traffic. When configured to
deny for IP traffic, the specified LSP cannot be configured as an IP next hop for a default or static route.
Example
The following command configures a static LSP to transport IP traffic and all VPN traffic:
configure mpls static lsp lsp598 transport ip-traffic allow vpn-traffic allow all
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the ingress and egress segments of a static LSP.
Syntax Description
lsp_name Identifies the static LSP to be configured.
egress_label Specifies the egress label for the LSP. The supported range is x7FC00 to
x803FF.
The egress label should match the corresponding ingress label of the next
hop. There is no egress label at the egress LSR of a static LSP.
egress implicit- If PHP is supported, an LSR can be configured to use the implicit-null label
null for LSPs that terminate at the next-hop LER.
evlan_name Specifies the egress VLAN for the LSP.
ipaddress Specifies the IP address for the next-hop router along the static LSP.
ingress_label Identifies the ingress label for this LSP. The supported range is x7FC00 to
x7FFFF at transit LSRs and 0x80000 to 0x803FF at destination LSRs.
The ingress label should match the corresponding egress label of the
previous hop. There is no ingress label at the ingress LSR of a static LSP.
ivlan_name When an ingress label is specified, this argument optionally specifies the
ingress VLAN for the LSP.
Default
N/A.
Usage Guidelines
The ingress and egress segments can be configured any time before enabling the LSP. At the ingress
LER, only the egress segment is configured and at the egress LER, only the ingress segment is
configured. For LSPs that transit an LSR, it is mandatory to configure both ingress and egress segments.
On any given LSR, the ingress label, if present, must match the egress label on the upstream LSR and
the egress label must match the ingress label of the downstream LSR. Once configured, any change to
the ingress or egress segments requires administratively disabling the LSP first. If the next-hop IP
address is not within the subnet as defined by the interface VLAN name, the configuration is rejected.
Example
The following command configures a static LSP on an ingress LSR:
configure mpls static lsp lsp1 egress 0x7fc01 egress-vlan v50 next-hop 50.0.0.2
configure mpls static lsp lsp1 egress 0x80001 egress-vlan v100 next-hop 100.0.0.2 ingress
0X7FC01 ingress-vlan v50
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command sets the join, leave, leave all, periodic, and extended-refresh timer values for a list of
ports. The unit value is in milliseconds. The join timer, leave all timer, and periodic timer are started for
each MRP application per port. The leave timer is started for each state machine that is in LV (leave)
state. The default values for join, leave, leave-all, are 200, 600, and 10000, respectively. The default
values for join, leave, leave-all, periodic and extended-refresh timers are 200, 600, 10000, 1000, and 0
milliseconds, respectively.
Syntax Description
mrp Multiple Registration Protocol.
ports Ports.
port_list Port list separated by a comma or -" type="portlist_t".
all All ports.
timers Multiple Registration Protocol timers.
extended-refresh Timer value to use in place of regular leave timer, only in cases when
leave-all is received or sent.
extended_refresh_msec Extended refresh timer value in milliseconds (range is 600 ms to
300000 ms, default is 10000 ms).
join The time interval to delay sending MRP advertisements.
join_msec Join timer value in milliseconds (range is 0 ms to 500 ms, default is
200 ms).
leave The time interval to wait in the leaving state before transitioning to the
empty state.
leave_msec Leave timer value in milliseconds (range is 600 ms to 3000 ms,
default is 600 ms).
leave-all The time interval used to control the frequency of "leave all"
messages.
leave_all_msec Leave All timer value in milliseconds (range is 5000 ms to 20000 ms,
default is 10000 ms).
periodic The time interval between two periodic events.
periodic_msec Periodic timer value in milliseconds (range is 1000ms to 300000 ms,
default is 1000 ms); type="uint32_t".
off Turn off timer.
refresh Timer value to use in place of regular timer, only in cases when leave-
all is received or sent.
auto-refresh Automatically calculate timer values based on number of talkers and
listeners.
refresh_msec Refresh timer value in milliseconds (range is 600ms to 300000ms,
default is 0ms (off)).
Default
The default values for join, leave, leave-all, are 200, 600, and 10000, respectively. The default values for
join, leave, leave-all, periodic and extended-refresh timers are 200, 600, 10000, 1000, and 0
milliseconds, respectively.
Usage Guidelines
This command is used to set the join, leave, and leave-all timer values for a list of ports. The unit value is
in milliseconds. The join timer and leave all timer are started for each MRP application per port. The
leave timer is started for each state machine that is in LV (leave) state. The default values for these
timers are 200, 600, and 10000, respectively.
configure mrp ports 4 timers join 300
configure mrp ports all timers leave-all 15000
configure mrp ports all timers join 300 leave-all 15000
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the AS number format displayed in show commands.
Syntax Description
asdot Specifies the ASDOT format.
asplain Specifies the ASPLAIN format.
Default
N/A.
Usage Guidelines
The ASPLAIN and ASDOT formats are described in RFC 5396, Textual Representation of Autonomous
System (AS) Numbers.
Example
The following command selects the ASDOT 4-byte AS number format:
configure msdp as-display-format asdot
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the maximum limit on rejected SA cache entries that an MSDP router will store in its
database.
Syntax Description
max-cache Specifies the maximum number of rejected SA cache entries that the MSDP
router will store in its database. To remove the limit, enter 0 (zero) for the max-
cache value.
vrname Specifies the name of the virtual router to which this command applies. If a name
is not specified, it is extracted from the current CLI context.
Default
By default, the maximum cache entries stored is zero. That is, rejected SA cache entries are not stored.
Any SA cache entries that are stored and not refreshed for six minutes are removed.
Usage Guidelines
SA cache are rejected because of:
• Peer-RPF failure
• Policy denied
When a previously rejected SA cache entry is accepted because of an RP reachability change or policy
rule change, the rejected SA cache entry is moved to the accepted SA cache list.
By default, rejected SA cache entries are discarded. You can configure a limit for rejected cache entries
to store them, which will help debug/diagnose some issues; however, it consumes extra memory.
Example
The following command sets the maximum rejected cache limit to 100 for an MSDP router:
configure msdp max-rejected-cache 100
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the originator ID for an MSDP router. The originator ID is the RP address you want to use
(instead of the default) in locally originated SA messages.
Syntax Description
ip-address Specifies the RP address to use in locally originated SA messages. To
unconfigure an originator ID (that is, to use the default RP address), enter the IP
address 0.0.0.0.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
By default, the RP address is used as the originator ID in locally originated SA messages.
Usage Guidelines
Use this command to override the default RP address used in SA messages. Because only RPs and
MSDP border routers originate SAs, there are times when it is necessary to change the ID used for this
purpose. The originator ID address must be one of the interface addresses on the MSDP router.
You can configure the MSDP originator ID only when MSDP is disabled globally.
Example
The following example configures the originator ID for an MSDP router:
configure msdp originator-id 10.203.134.1
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures a default or static RPF peer from which all MSDP SA messages are accepted.
To remove the default peer, enter the configure msdp peer no-default-peer command.
Syntax Description
filter-name Specifies the name of the policy filter associated with the default peer. The peer
will be the default peer for all SA entries that are permitted by the policy filter. If
an SA message is allowed by the policy filter, it will be accepted. Otherwise, the
SA message has to go through the regular RPF-check. The static peer RPF
check is the last step in peer RPF algorithm. So, if an SA message is denied by
the default peer policy, ultimately the SA message will be rejected by MSDP.
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
By default, no static RPF peer is configured.
The default-peer-policy keyword specifies the name of the policy filter associated with the
default peer. You can configure multiple default peers with different policies. If no policy is specified,
then the current peer is the default RPF peer for all SA messages.
Usage Guidelines
Configuring a default peer simplifies peer-RPF checking of SA messages. If the peer-RPF check fails, the
default peer rule is applied to see if the SA messages should be accepted or rejected.
If a default peer policy is specified, the peer is the default peer only for the (Source, Group), or (S, G),
that satisfies the policy. If the policy is not specified, then the default peer is used for all (S, G, RP).
You can configure multiple default peers on an MSDP router; however, all default peers must either have
a default policy or not. A mix of default peers, with a policy and without a policy, is not allowed.
You can use the following policy attributes in a default peer policy. All other attributes are ignored.
• Match:
◦ multicast-group
◦ multicast-source
◦ pim-rp
• Set:
◦ permit.
◦ deny.
Example
The following example configures an MSDP peer with the IP address 192.168.45.43 as the default peer
policy for "sales":
configure msdp peer 192.168.45.43 default-peer default-peer-policy sales
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a name or description for an MSDP peer. This text is for display purposes only.
Syntax Description
remoteaddr Specifies the IP address of the MSDP peer.
peer-description Specifies the name or description of the MSDP peer. The maximum is 63
characters.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
By default, no name or description is specified.
Usage Guidelines
Use this command to configure a name or description to make an MSDP peer easier to identify. The
description is visible in the output of the show msdp peer command.
Example
The following example configures the name "internal_peer" to an MSDP peer:
configure msdp peer 192.168.45.43 description internal_peer
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures an MSDP peer to become a member of a mesh-group. To remove a peer from
a mesh-group, enter the none CLI keyword for the mesh-group.
Syntax Description
mesh-group-name Specifies the name of the MSDP mesh-group.
none Removes a peer from a mesh-group.
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
N/A.
Usage Guidelines
A mesh-group is a group of MSDP peers with fully meshed MSDP connectivity. Any SA messages
received from a peer in a mesh-group are not forwarded to other peers in the same mesh-group.
Example
The following example configures an MSDP peer with the IP address 192.168.45.43 to become a member
of a mesh-group called "intra":
configure msdp peer 192.168.45.43 mesh-group intra
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command removes a default peer.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
no-default-peer Removes a default peer.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
N/A.
Usage Guidelines
None.
Example
The following command removes all MSDP peers:
configure msdp peer all no-default-peer
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures a TCP RSA Data Security, Inc. MD5 Message-Digest Algorithm password for
an MSDP peer.This command enables TCP RSA Data Security, Inc. MD5 Message-Digest Algorithm
authentication for a MSDP peer. When a password is configured, MSDP receives only authenticated
MSDP messages from its peers. All MSDP messages that fail TCP RSA Data Security, Inc. MD5 Message-
Digest Algorithm authentication are dropped.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
none Removes the previously configured password.
encrypted Encrypts the password for RSA Data Security, Inc. MD5 Message-Digest
Algorithm authentication. To improve security, the password displays in
encrypted format and cannot be seen as simple text. Additionally, the
password is saved in encrypted format.
tcpPassword Specifies the password to use for RSA Data Security, Inc. MD5 Message-Digest
Algorithm authentication at the TCP level. The password must be an ASCII
string with a maximum of 31 characters.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Defaults
By default, TCP RSA Data Security, Inc. MD5 Message-Digest Algorithm authentication is disabled for
the MSDP peer.
Usage Guidelines
We recommend that you enable TCP RSA Data Security, Inc. MD5 Message-Digest Algorithm
authentication for all MSDP peers to protect MSDP sessions from attacks. You can execute this
command only when the MSDP peer is disabled or when MSDP is globally disabled on that VR.
Example
The following example configures a password for the MSDP peer with the IP address 192.168.45.43,
which automatically enables TCP MD5 authentication:
configure msdp peer 192.168.45.43 password test123
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures an incoming or outgoing policy filter for SA messages.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
in Associates the SA filter with inbound SA messages.
out Associates the SA filter with outbound SA messages.
filter-name Specifies the name of the policy associated with an SA filter. To remove an
SA filter, enter the none CLI keyword instead of filter-name.
vr_name Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
By default, no SA filter is configured for an MSDP peer. That is, incoming and outgoing SA messages are
not filtered.
Usage Guidelines
This command configures an SA filter such that only a specified set of SA messages are accepted or
sent to a peer. Note that an SA filter does not adversely impact the flow of SA request and response
messages.
You can use the following policy attributes in an SA filter policy. All other attributes are ignored.
• Match:
◦ multicast-group
◦ multicast-source
◦ pim-rp
• Set:
◦ permit
◦ deny
Example
The following example configures an incoming SA messages filter on an MSDP peer with the IP address
192.168.45.43:
configure msdp peer 192.168.45.43 sa-filter in allow_229
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command allows you to limit the number of SA entries from an MSDP peer that the router will allow
in the SA cache. To allow an unlimited number of SA entries, use 0 (zero) as the value for max-sa.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
max-sa Specifies the maximum number of SA entries from an MSDP peer allowed in
the SA cache. To specify an unlimited number of SA entries, use 0 (zero) as
the value for max-sa.
vr_name Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
By default, no SA entry limit is set. The router can receive an unlimited number of SA entries from an
MSDP peer.
Usage Guidelines
You can use this command to prevent a distributed denial of service (DOS) attack. We recommend that
you configure an MSDP SA limit on all MSDP peer sessions. Note that a rejected SA cache entry is not
included in the number of SA cache entries received from a peer.
Example
The following example configures the SA entry limit of 500 for the MSDP peer with the IP address
192.168.45.43:
configure msdp peer 192.168.45.43 sa-limit 500
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures the source interface for the MSDP peer TCP connection.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
ipaddress Specifies the IP address of the MSDP router interface to use on one end of
a TCP connection. The ipaddress must be one of the MSDP router
interface addresses; otherwise, the command fails and an error message
displays.
any Specifies to use any interface as one end of the TCP connection. The
source interface is selected based on the IP route entry used to reach the
MSDP peer. The egress interface that reaches the MSDP peer is used as
the source interface for the TCP connection. Basically, this command
removes the previously configured source interface of the MSDP peer.
vrname Specifies the name of the virtual router to which this command applies. If
a name is not specified, it is extracted from the current CLI context.
Defaults
By default, the source interface is selected based on the IP route entry used to reach the MSDP peer.
The egress interface that reaches the MSDP peer is used as the source interface for the TCP connection.
Usage Guidelines
You must first disable MSDP or the MSDP peer before using this command. We recommend that you
configure a source interface for MSDP peers that are not directly connected. We also recommend using
the loopback address as the MSDP peer connection endpoint.
Example
The following example configures a source interface for an MSDP peer with the IP address 192.168.45.43:
configure msdp peer 192.168.45.43 source-interface 60.0.0.5
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
The command configures the keep-alive and hold timer intervals of the MSDP peers.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
keep-alive-sec Specifies the keep-alive timer interval in seconds. The range is1–60 seconds.
hold-time-sec Specifies the hold timer interval in seconds. The range is 3–75 seconds.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
By default, the:
• Keep-alive timer interval is 60 seconds.
• Hold timer interval is 75 seconds.
• SA timer interval is 60 seconds.
Usage Guidelines
You can use this command only when either MSDP or the MSDP peer is disabled. The hold timer interval
must be greater than the keep-alive timer interval.
Example
The following example configures the keep-alive and hold timer intervals for the MSDP peer 55.0.0.83:
configure msdp peer 55.0.0.83 timer keep-alive 30 hold-time 60
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the limit to which multicast data packets are sent in SA messages to an MSDP peer. If the
time-to-live (TTL) in the IP header of an encapsulated data packet exceeds the TTL threshold
configured, encapsulated data is not forwarded to MSDP peers.
Syntax Description
remoteaddr Specifies the IP address of the MSDP peer on which to configure a TTL
threshold.
all Specifies all MSDP peers.
ttl Specifies the TTL value. The range is 0–255. To restore the default value, enter a
TTL value of 0 (zero).
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
The default value is zero, meaning all multicast data packets are forwarded to the peer regardless of the
TTL value in the IP header of the encapsulated data packet.
Usage Guidelines
This command allows you to configure a TTL value to limit multicast data traffic.
Example
The following example configures a TTL threshold of 5:
configure msdp peer 192.168.45.43 ttl-threshold 5
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the MSDP router to send SA request messages to the MSDP peer when a new member
becomes active in a group.
Syntax Description
remoteaddr Specifies the IP address of the MSDP peer from which the local router requests SA
messages when a new member becomes active in a group, and MSDP has no
cache entry for the group in the local database.
vr_name Specifies the name of the virtual router on which the MSDP cache server is
configured. If a virtual router name is not specified, it is extracted from the current
CLI context.
Default
By default, the router does not send SA request messages to its MSDP peers when a new member joins
a group and wants to receive multicast traffic. The new member simply waits to receive SA messages,
which eventually arrive.
Usage Guidelines
You can use this command to force a new member of a group to learn the current active multicast
sources in a connected PIM-SM domain that are sending to a group. The router will send SA request
messages to the specified MSDP peer when a new member joins a group and MSDP doesn’t have a
cache entry for that group in the local database. The peer replies with the information in an SA cache
response message.
Note
An MSDP peer must exist before it can be configured as an SA cache server. The configure
msdp sa-cache-server command accepts the value for remoteaddr only if it is an existing
peer’s IP address.
Example
The following example configures an MSDP cache server:
configure msdp sa-cache-server 172.19.34.5
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures the system-wide MSRP variables.
Syntax Description
msrp Multiple Stream Registration Protocol.
latency-max-frame- Maximum size of interfering frame (used in latency calculations).
size
frame_size The maximum frame size in bytes (range 64 to 2000, default is 1522).
ignore-latency- Ignore accumulated latency changes when evaluating first value
changes change.
talker-vlan-pruning Talker propagation is filtered on ports where VLAN does not exist.
on Turn on.
off Turn off.
Default
1522.
Usage Guidelines
Use this command to configure the system-wide MSRP variables.
Example
# configure msrp latency-max-frame-size 100
History
This command was first available in ExtremeXOS 15.3. The ignore-latency-changes, talker-vlan-pruning,
and on | off options were added in 15.3.2.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Specifies the default VLAN ID on the port for MSRP data stream. The sr-pvid serves as a
recommendation to connected AVB devices; AVB devices may still use other VLAN IDs if they are
configured to do so.
Syntax Description
msrp Multiple Stream Registration Protocol
port_list List of ports in the switch.
all All the ports in the switch.
sr-pvid Default VLAN Identifier for stream-related traffic.
vlan_tag VLAN ID ranging from 1 to 4094 (default is 2).
Default
2.
Usage Guidelines
Use this command to specify the default VLAN ID on the port for MSRP data streams. The sr-pvid
serves as a recommendation to connected AVB devices; AVB devices may still use other VLAN IDs if
they are configured to do so.
Example
# configure msrp ports 1,2,3 sr-pvid 2
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Configures delta-bandwidth value per traffic class per MSRP port.
Syntax Description
msrp Multiple Stream Registration Protocol.
port_list List of ports in the switch.
traffic-class Traffic class.
A Traffic class A.
B Traffic class B.
delta-bandwidth Delta-bandwidth percentage (range 0 to 100, default 75 for class A, 0
for class B).
Default
Class A: 75, Class B: 0.
Usage Guidelines
The delta bandwidth configuration limits the amount of bandwidth that can be used by the given
stream reservation class. Each class is allowed to use a maximum of its delta bandwidth plus the delta
bandwidth configured for each of the higher classes. For example, if the delta bandwidth for classes A
and B are configured to 10 and 10 respectively, class A streams can use up to 10 percent of the link
bandwidth, and class B streams can us up to 20 percent of the link bandwidth. The sum of the class A
and B delta bandwidth values must be less than 100 percent.
Example
# configure msrp ports all traffic-class A delta-bandwidth 50
# configure msrp ports 1-5 traffic-class B delta-bandwidth 0
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
This command configures the LAG bandwidth mode as either cumulative or master-port only.
Syntax Description
all All the ports in the switch.
port_list Port list separated by a comma or -
cumulative Use bandwidth of a single port, plus a percentage of bandwidth of
every other LAG member port in the group.
single-port Use bandwidth of a single port only for the entire LAG.
percentage Percentage of bandwidth of each LAG port to be added to master
port bandwidth.
Default
Single-port.
Usage Guidelines
If cumulative mode is selected, the percentage is also configured.
Example
This CLI command displays bandwidth information of an MSRP port.
# show msrp ports bandwidth
Port Port Class Delta Maximum Reserved Available
Speed Effective
------ ------- ----- --------- --------- --------- ---------
5ab 0 M A 75.00% 0.00% 0.00% 0.00%
B 0.00% 0.00% 0.00% 0.00%
*21ab 1000 M A 75.00% 75.00% 0.00% 75.00%
B 0.00% 75.00% 0.00% 75.00%
Flags: (*) Active, (!) Administratively disabled,
(a) SR Class A allowed, (b) SR Class B allowed.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
This command configures MSRP first value change recovery timer, or disables the timer. If configured,
the system waits until the configured timer value before allowing recovery of streams from first value
change failure. If disabled, the system does not recover from first value change failure.
Syntax Description
msrp Multiple Stream Registration Protocol.
timers Multiple Stream Registration Protocol timers.
first-value-change- The time interval to wait to allow recovery of stream from first value
recovery change failure.
Default
30000 ms.
Usage Guidelines
Use this command to allow streams to recover from first value change failure.
Example
# configure msrp timers first-value-change recovery 20000
# configure msrp timers first-value-change recovery off
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Configures the number used to identify the MSTP BPDUs sent in the MSTP region.
Syntax Description
format_identifier Specifies a number that MSTP uses to identify all BPDUs sent in the
MSTP region. The default is 0. The range is 0 to 255.
Default
The default value used to identify the MSTP BPDU is 0.
Usage Guidelines
For a switch to be part of an MSTP region, you must configure each switch in the region with the same
MSTP configuration attributes, also known as MSTP region identifiers. These identifiers consist of the
following:
• Region Name—The name of the MSTP region.
• Format Selector—The number used to identify the format of MSTP BPDUs. The default is 0.
• Revision Level—This identifier is reserved for future use; however, the switch uses and displays a
default of 3.
You can configure only one MSTP region on the switch at any given time.
The switches contained in a region transmit and receive BPDUs that contain information relevant to only
that MSTP region. By having devices look at the region identifiers, MSTP discovers the logical boundary
of a region.
If you have an active MSTP region, Extreme Networks recommends that you disable all active STPDs in
the region before modifying the value used to identify MSTP BPDUs on all participating switches.
Example
The following command configures the number 2 to identify the MSTP BPDUs sent within an MSTP
region:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the name of an MSTP region on the switch.
Syntax Description
regionName Specifies a user-defined name for the MSTP region. May be up to 32
characters.
Default
By default, the switch uses the MAC address of the switch to generate an MSTP region.
Before you configure the MSTP region, it also has the following additional defaults:
• MSTP format Identifier—0.
• MSTP Revision Level—3.
Usage Guidelines
The maximum length for a name is 32 characters. Names can contain alphanumeric characters and
underscores ( _ ) but cannot be any reserved keywords, for example, mstp. Names must start with an
alphabetical character, for example, a, Z.
By default, the switch uses the unique MAC address of the switch to generate an MSTP region. Since
each MAC address is unique, every switch is in its own region by default.
For multiple switches to be part of an MSTP region, you must configure each switch in the region with
the same MSTP configuration attributes, also known as MSTP region identifiers. These identifiers consist
of the following:
• Region Name—The name of the MSTP region.
• Format Selector—The number used to identify the format of MSTP BPDUs. The default is 0.
• Revision Level—This identifier is reserved for future use; however, the switch uses and displays a
default of 3.
You can configure only one MSTP region on the switch at any given time.
The switches inside a region exchange BPDUs that contain information for MSTIs. The switches
connected outside of the region exchange CIST information. By having devices look at the region
identifiers, MSTP discovers the logical boundary of a region.
If you have an active MSTP region, we recommend that you disable all active STPDs in the region before
renaming the region on all of the participating switches.
Example
The following example creates an MSTP region named purple:
configure mstp region purple
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the revision number of the MSTP region.
Syntax Description
revision This parameter is reserved for future use.
Default
The default value of the revision level is 3.
Usage Guidelines
Although this command is displayed in the CLI, it is reserved for future use. Please do not use this
command.
If you accidentally configure this command, remember that each switch in the region must have the
same MSTP configuration attributes, also known as MSTP region identifiers. These identifiers consist of
the following:
• Region Name—The name of the MSTP region.
• Format Selector—The number used to identify the format of MSTP BPDUs. The default is 0.
• Revision Level—An unsigned integer encoded within a fixed field of 2 octets that identifies the
revision of the current MST configuration. MSTP revision level can be set from 0 to 65536, with the
default being 3. The revision number is not incremented automatically each time that the MST
configuration is committed.
Example
The following command returns the MSTP revision number to 3, the default revision number:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a port to receive MVR multicast streams.
Syntax Description
vlan-name Specifies a VLAN name.
port-list A list of ports or slots and ports.
Default
N/A.
Usage Guidelines
This command is used to add a group of virtual ports for multicast forwarding through MVR. By default,
some ports on non-MVR VLANs (router ports, primary and secondary EAPS ports), are excluded from
the MVR cache egress list. This command is used to override these rules, so that if valid IGMP
memberships are received, or a router is detected, streams are forwarded out on the ports.
Example
The following example adds the ports 1:1 and 1:2 of VLAN v1 to MVR for forwarding:
configure mvr vlan v1 add receiver port 1:1-1:2
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a VLAN as an MVR VLAN.
Syntax Description
vlan-name Specifies a VLAN name.
Default
N/A.
Usage Guidelines
Configures MVR on the specified VLAN. When a multicast stream in the specified MVR address range is
received on the VLAN, it is leaked to all other VLAN ports where the corresponding IGMP join message
is received. By default, the entire multicast address range 224.0.0.0/4, except for the multicast control
range 224.0.0.0/24 is used for MVR. To change the MVR address range, use the following command:
configure mvr vlan vlan-name mvr-address {policy-name | none}
Example
The following example configures VLAN v1 as an MVR VLAN:
configure mvr add vlan v1
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a port not to receive MVR multicast streams.
Syntax Description
vlan-name Specifies a VLAN name.
port-list A list of ports or slots and ports.
Default
N/A.
Usage Guidelines
This command is used to delete a group of virtual ports for multicast forwarding through MVR. After
using this command, the ports revert to the default forwarding rules.
Example
The following example deletes the ports 1:1 and 1:2 of VLAN v1 to MVR for forwarding:
configure mvr vlan v1 delete receiver port 1:1-1:2
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a VLAN from MVR.
Syntax Description
vlan-name Specifies a VLAN name.
Default
N/A.
Usage Guidelines
Removes MVR from the specified VLAN.
Example
The following example configures VLAN v1 as a non-MVR VLAN:
configure mvr delete vlan v1
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the MVR address range on a VLAN.
Syntax Description
vlan-name Specifies a VLAN name.
policy-name Specifies a policy file.
Default
The default address range is 224.0.0.0/4 (all multicast addresses), but excluding 224.0.0.0/24 (the
multicast control range).
Usage Guidelines
If no policy file is specified (the none option), the entire multicast address range 224.0.0.0/4, except for
the multicast control range 224.0.0.0/24 is used for MVR.
MVR must first be configured on the VLAN before using this command.
If the policy is later refreshed, groups denied and newly allowed groups in the policy are flushed from
fast path forwarding. This allows synching existing channels with the new policy, without disturbing
existing channels.
The following is a sample policy file mvrpol.pol. This policy configures 236.1.1.0/24 as the MVR address
range. Any address outside this range has the standard switching behavior on an MVR VLAN.
Entry extreme1 {
if match any {
nlri 236.1.1.0/24 ;
}
then {
permit ;
}
}
Example
The following example configures the MVR address range specified in the policy file mvrpol.pol for the
VLAN v1:
configure mvr vlan v1 mvr-address mvrpol
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the MVR static group address range on a VLAN.
Syntax Description
vlan-name Specifies a VLAN name.
policy-name Specifies a policy file.
Default
By default, all the MVR group addresses work in static mode.
Usage Guidelines
If no policy file is specified (the none option), the entire multicast address range 224.0.0.0/4, except for
the multicast control range 224.0.0.0/24, is used for static groups in MVR.
MVR must first be configured on the VLAN before using this command.
The following is a sample policy file mvrpol.pol. This policy configures 236.1.1.0/24 as the MVR static
group address range. Any MVR addresses outside this range are dynamically registered through IGMP.
An MVR VLAN will proxy join only for addresses that are not in the static group. If you want all the
multicast groups to by dynamic, use a policy file with this command that denies all multicast addresses.
Entry extreme1 {
if match any {
nlri 236.1.1.0/24 ;
}
then {
permit ;
}
}
Example
The following example configures the MVR static group address range specified in the policy file
mvrpol.pol for the VLAN v1:
configure mvr vlan v1 static group mvrpol
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the STP domain to use for dynamically created VLANs.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
stpd The STP domain used for MVRP.
stpd_name The STP domain the VLAN is to be associated. All ports of the domain
will be advertised, when this VLAN gets registered.
Default
s0.
Usage Guidelines
Use this command to configure the STP domain used for MVRP.
Example
The following example configures the default STP domain for MVRP to "stpd2":
configure mvrp stpd stpd2
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used for per port setting for the VLAN registration. If the global registration is
forbidden, ports cannot be added to any VLAN dynamically irrespective of the per-port setting. So for
ports to be registered, the global and the per-port setting both should be “normal”, which is the default
value.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
tag The 802.1Q VLAN ID.
vlan_tag VLAN ID ranging from 1 to 4094; type=uint16_t"; range="[1,4094]".
ports Ports.
port_list Port list separated by a comma or -"; type="portlist_t";
all All ports.
registration Whether port can be added dynamically to the VLAN.
forbidden Port cannot be added dynamically to the VLAN.
normal Port can be added dynamically to the VLAN.
Default
Normal.
Usage Guidelines
Use this command to control dynamic addition of ports to VLANs.
Example
configure mvrp tag 2 ports 2,3,4 registration forbidden
History
This command was first available in ExtremeXOS 15.3.
The registration option, and forbidden and normal keywords were added in 15.3.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Controls whether the given VLAN ID may be advertised in MVRP messages transmitted on the given set
of ports.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
tag The 802.1Q VLAN ID.
transmit When enabled, MVRP message are sent on the ports.
on Transmission of MVRP messages are enabled on the port(s) for the
given tag.
off Transmission of the MVRP messages are disabled on the port(s) for
the given tag.
Default
Transmit on.
Usage Guidelines
Use this command to control whether the given VLAN ID may be advertised in MVRP messages
transmitted on the given set of ports.
Example
The following command configures transmit off for VLAN ID 100 on all MVRP ports:
configure mvrp tag 100 ports all transmit off
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables the dynamic VLAN creation feature of MVRP.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
auto-creation When enabled, results in VLANs added dynamically on the switch
through MVRP.
on Enable auto-creation.
off Disable auto-creation.
Default
Enabled.
Usage Guidelines
Use this command to enable or disable the dynamic VLAN creation of MVRP. By default, auto-creation
is enabled. If disabled, the switch may participate in the MVRP protocol, and advertised static VLANs,
but will not dynamically create VLANs.
Example
The following command enables MVRP VLAN auto creation:
configure mvrp vlan auto-creation on
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is a global system setting. If global registration is forbidden, ports cannot be added to
any VLAN dynamically.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
vlan VLAN.
registration Whether all ports can be added to new dynamic VLANs. This can be
overridden by static port addition to VLAN.
forbidden Ports cannot be added dynamically to the VLAN. This can be
overridden by static port addition.
normal Ports can be added dynamically to the VLAN (default).
Default
Normal.
Usage Guidelines
Use this command to set global registration. If global registration is forbidden, ports cannot be added to
any VLAN dynamically.
Example
The following command allows ports to be added dynamically to the VLAN:
configure mvrp vlan registration normal
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a static entry to the neighbor cache.
Syntax Description
vr_name Specifies a VR or VRF.
ipv6address Specifies an IPv6 address.
scoped_link_local Specifies a scoped, link-local address.
mac Specifies a MAC address.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
This command adds static entries to the neighbor cache.
Example
The following example adds a static entry to the neighbor cache:
configure neighbor-discovery cache add fe80::2315%default 00:11:22:33:44:55
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a static entry from the neighbor cache.
Syntax Description
vr_name Specifies a VR or VRF.
ipv6address Specifies an IPv6 address.
scoped_link_local Specifies a scoped, link-local address.
Default
If you do not specify a VR or VRF, the current VR context is used.
Usage Guidelines
This command deletes static entries from the neighbor cache.
Example
The following example deletes a static entry from the neighbor cache:
configure neighbor-discovery cache delete fe80::2315%default
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Sets the time before a new entry can replace an old entry in the Neighbor Discovery Protocol (NDP)
cache of neighbor IPv6 addresses\MAC addresses.
Syntax Description
vr Specifies setting a VR or VRF.
vr_name Specifies the name of the VR or VRF.
locktime Specifies setting a time before a new entry can replace an old entry.
locktime Sets the locktime value in milliseconds with a range of 0–30,000.
Default is 1,000 milliseconds.
Default
The default locktime is 1,000 milliseconds.
Example
The following example sets the locktime to 5,000 milliseconds:
configure neighbor-discovery cache locktime 5000
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the maximum allowed IPv6 neighbor entries.
Syntax Description
max_entries Specifies the maximum allowed IPv6 neighbor entries. The range is 1
to 49,152.
Default
8,192.
Usage Guidelines
For ExtremeXOS 30.1, the maximum configurable limit for neighbor discovery maximum entries is
changed to 49,152 for all platforms. A message appears if the configured value exceeds the theoretical
hardware maximum limit depending on the platform.
Example
The following example sets the maximum allowed IPv6 neighbor entries to 512:
configure neighbor-discovery cache max_entries 512
History
This command was first available in ExtremeXOS 12.4.
Per virtual router capability was deprecated and the maximum configurable limit set to 49,152 in
ExtremeXOS 30.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the maximum number of pending IPv6 neighbor entries.
Syntax Description
max_pending_entries Specifies the maximum number of pending IPv6 neighbor entries. The
range is 1 to 4096.
Default
1,024.
Usage Guidelines
None.
Example
The following example sets the maximum number of pending IPv6 neighbor entries to 2,056:
configure neighbor-discovery cache max_pending_entries 2056
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Sets the value for Neighbor Discovery Protocol (NDP) reachable time
Syntax Description
reachable-time Specifies setting the NDP reachable time.
reachable_time Sets the value for the NDP reachable time (range is 1–1,474,515,000
millisecond or 1–1,474,515 second).
auto Specifies having the NDP reachable time set automatically to 3/4 of
the configured NDP timeout (default).
milliseconds When setting the reachable time value, specifies milliseconds as the
time unit (range is 1–1,474,515,000).
seconds When setting the reachable time value, specifies seconds (range is 1–
1,474,515) as the time unit (default).
Default
The default setting is for the reachable time to be set automatically to 3/4 of the configured NDP
timeout. If you set the time manually, the default unit of measure for the value is seconds.
Example
The following example sets the reachable time to 500,000 seconds:
configure neighbor-discovery cache reachable-time 500000 seconds
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Sets the value for Neighbor Discovery Protocol (NDP) retransmit time
Syntax Description
retransmit-time Specifies setting the retransmit time.
retransmit_time Sets the retransmit time value (range is 1–4,294,967 seconds or 1–
4,294,967,295 milliseconds). The default is 1 second.
milliseconds When setting the retransmit time value, specifies milliseconds as the
time unit (range is 1–4,294,967,295).
seconds When setting the retransmit time value, specifies seconds (range is 1–
4,294,967) as the time unit (default).
Default
The default setting for the retransmit time is 1 second. The default unit of measure is seconds.
Example
The following example sets the retransmit time to 500,000 seconds:
configure neighbor-discovery cache retransmit-time 500000 seconds
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a timeout value for entries in the neighbor cache.
Syntax Description
vr_name Specifies a VR or VRF.
timeout Specifies a timeout value for neighbor cache entries. The range is 1 to
32767 minutes.
Default
20 minutes.
Usage Guidelines
None.
Example
The following example configures the neighbor cache timeout for 30 minutes:
configure neighbor-discovery cache timeout 30
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document./>
Description
Adds an entry to the MAC address list for MAC-based network login.
Syntax Description
mac Specifies the MAC address to add.
mask Specifies the number of bits to use for the mask.
default Specifies the default entry.
encrypted Used to display encrypted form of password in configuration files. Do
not use.
password Specifies the password to send for authentication.
ports Specifies the port or port list to use for authentication.
Default
If no password is specified, the MAC address will be used.
Usage Guidelines
Use this command to add an entry to the MAC address list used for MAC-based network login.
If no match is found in the table of MAC entries, and a default entry exists, the default will be used to
authenticate the client. All entries in the list are automatically sorted in longest prefix order.
To associate a MAC address with one or more ports, specify the ports option when using the
configure netlogin add mac-list [mac {mask} | default] {encrypted}
{password} {portsport_list} command.
You must enable MAC-based network login on the switch and the specified ports before using this
command. If MAC-based network login is not enabled on the specified port(s), the switch displays a
warning message similar to the following:
WARNING: Not all specified ports have MAC-Based NetLogin enabled.
Example
The following command adds the MAC address 10:20:30:40:50:60 with the password foo to the list:
configure netlogin add mac-list 10:20:30:40:50:60 password foo
The following command associates MAC address 10:20:30:40:50:70 with ports 2:2 and 2:3. This means
authentication requests from MAC address 10:20:30:40:50:70 are only accepted on ports 2:2 and 2:3:
configure netlogin add mac-list mac 10:20:30:40:50:70 ports 2:2-2:3
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configure the ports that will be hijacked and redirected for HTTP or HTTPS traffic.
Syntax Description
tcp_port Specifies the port to be hijacked.
Default
HTTP traffic.
Usage Guidelines
This command allows you to configure the ports that will be hijacked and redirected for HTTP or HTTPS
traffic. For each hijacked proxy port, you must specify whether the port is to be used for HTTP or HTTPS
traffic.
No more than 5 such ports are supported in addition to ports 80 and ports 443. Attempts to add more
than 5 ports generate an error.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Lets you configure network login aging.
Syntax Description
minutes Specifies the aging time in minutes.
Default
The default value is 5.
Usage Guidelines
Use this command to configure the aging time for network login. The aging time is the time after which
learned clients that failed authentication or did not attempt to authenticate are removed from the
system. This prevents the switch from keeping all clients ever seen on a network-login-enabled port.
Example
The following command specifies an aging time of 15 minutes:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets the number refresh failures.
Syntax Description
num_failures Specifies the number of refresh failures. The range is from 0 to 5.
Default
The default is 0.
Usage Guidelines
This command allows you to set the number of refresh failures allowed. You can set the number of
failures to be from between 0 to 5. The default value is 0.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the order of database authentication protocols to use.
Syntax Description
mac Specifies MAC-based authentication.
web-based Specifies Web-based authentication.
radius Specifies an authentication order from only the RADIUS database.
local Specifies an authentication order from only the local database.
radius local Specifies an authentication order of RADIUS database first, followed
by local.
local radius Specifies an authentication order of local database first, followed by
RADIUS.
Default
By default, the authentication order is RADIUS, local-user database.
Usage Guidelines
As of ExtremeXOS 16.1, the functionality of this command is more consistent with management
authentications. If RADIUS responds with a reject, then that reject is honored. The only time the local
database is checked is when the RADIUS server does not respond.
Example
The following command sets the database authentication order to local-user database, RADIUS:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures authentication failure VLAN on network login enabled ports.
Syntax Description
vlan_name Specifies the name of the authentication failure VLAN.
port_list Specifies one or more ports or slots and ports. If the ports keyword is
not used, the command applies to all ports.
Default
By default, authentication failure VLAN is configured on all network login enabled ports if no port is
specifically configured.
Usage Guidelines
Use this command to configure authentication failure VLAN on network login enabled ports. When a
supplicant fails authentication, it is moved to the authentication failure VLAN and is given limited access
until it passes the authentication either through RADIUS or local. Depending on the authentication
database order for that particular network login method (MAC, web or dot1x), the other database is
used to authenticate the client. If the final result is an authentication failure and if the authentication
failure VLAN is configured and enabled on that port, the client is moved to that location.
There four different authentication orders which can be configured per authentication method
currently. They are:
• RADIUS.
• local.
• RADIUS, local.
• local, RADIUS.
In each case, you must consider the end result in deciding whether to authenticate the client in
authentication failure VLAN or authentication service unavailable VLAN (if configured).
For example, when netlogin mac authentication database order is local, radius, if the authentication of a
MAC client fails through a local database, RADIUS is used for authentication. If RADIUS also fails
authentication, the client is moved to authentication failure VLAN. The same is true for all
authentication database orders (radius,local; local,radius; radius; local).
If authentication through local fails, but passes through RADIUS, the client is moved to the appropriate
destination VLAN.
If the local authentication fails and the RADIUS server is not available, the client is not moved to
authentication failure VLAN.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Globally configures the order of the Network Login (NetLogin) port’s authentication protocols.
Syntax Description
dot1x Configures the 802.1x authentication protocol preference.
mac Configures the MAC-based authentication protocol preference.
web-based Configures the web-based authentication protocol preference.
cep Configure Convergence End Point (CEP) authentication protocol
preference. CEP only appears as an option if policy is enabled.
Default
By default, the protocol precedence order for a NetLogin-enabled port is:
• Dot1x
• Web-based
• MAC
• CEP
Usage Guidelines
Web-based authentication occurs only when the port belongs to the NetLogin VLAN.
When you change the protocol precedence, the action for the current highest precedence protocol
takes effect immediately if the client is authenticated by this protocol.
When you disable the highest precedence protocol on a port, the action for the next precedence
protocol takes effect immediately if client is authenticated by this protocol.
Example
The following example sets the protocol precedence order to Dot1x, Web-based, and MAC.
configure netlogin authentication protocol-order dot1x web-based mac cep
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures authentication service-unavailable VLAN on NetLogin-enabled ports.
Syntax Description
vlan_name Specifies the name of the service-unavailable VLAN.
port_list Specifies one or more ports or slots and ports. If the ports keyword is
not used, the command applies to all ports.
add Add service-unavailable VLAN to ports (default).
tagged Configure port as tagged to the service-unavailable VLAN.
untagged Configure port as untagged to the service-unavailable VLAN (default).
delete Delete existing service-unavailable VLAN from ports.
Default
If a port is not specified, all NetLogin-enabled ports are applied.
If not specified, the ports are configured as untagged to the service-unavailable VLAN by default.
Usage Guidelines
This command configures authentication service-unavailable VLAN(s) on the specified NetLogin-
enabled ports. Authentication service-unavailable VLAN is configured on all the NetLogin-enabled
ports, if no port is specifically selected. When an authentication service is not available to authenticate
the NetLogin clients, they are moved to the authentication service-unavailable VLAN(s) and are given
limited access until the authentication service is available through RADIUS.
Starting with ExtremeXOS 30.2, you can specify up to 10 service-unavailable VLANs per port.
As of ExtremeXOS 16.1, the functionality of this command is more consistent with management
authentications. If RADIUS responds with a reject, then that reject is honored.
There are four different authentication orders that can be configured per authentication method
currently. They are:
• RADIUS
• Local
• RADIUS, local
• Local, RADIUS
The service unavailable VLAN is used only when authentication order is "RADIUS". The authentication
failure VLAN is used for all other modes (local; RADIUS, local; local, RADIUS).
For example, when the Netlogin MAC authentication database order is local, RADIUS, if the
authentication of a MAC client fails through a local database, RADIUS is used for authentication. If
RADIUS also fails authentication, the client is moved to the authentication failure VLAN.
Note
If web is enabled on a port where Dot1x or MAC is also enabled, the authentication failure/
service-unavailable VLAN configuration is not applicable to those clients where Dot1x or
MAC clients that fail authentication or where authentication service is not available.
Example
The following example adds the service-unavailable VLAN "v1" on tagged ports 1 and 2:
# configure netlogin authentication service-unavailable add vlan v1 ports 1,2 tagged
History
This command was first available in ExtremeXOS 12.1.
The ability to configure multiple service-unavailable VLANs was added in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the network login page banner.
Syntax Description
banner Specifies the HTML code for the banner.
Default
The default banner is the Extreme Networks logo.
Usage Guidelines
The banner is a quoted, HTML string, that will be displayed on the network login page. The string is
limited to 1024 characters.
This command applies only to the web-based authentication mode of network login.
Example
The following command configures the network login page banner:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the base URL for network login.
Syntax Description
url Specifies the base URL for network login.
Default
The base URL default value is “network-access.com.”
Usage Guidelines
When you login using a web browser, you are redirected to the specified base URL, which is the DNS
name for the switch.
This command applies only to the web-based authentication mode of network login.
Example
The following command configures the network login base URL as access.net:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an entry from the MAC address list for MAC-based network login.
Syntax Description
mac Specifies the MAC address to delete.
mask Specifies the number of bits to use for the mask.
default Specifies the default entry.
Default
N/A.
Usage Guidelines
Use this command to delete an entry from the MAC address list used for MAC-based network login.
Example
The following command deletes the MAC address 10:20:30:40:50:60 from the list:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configure the ports that are to be hijacked and redirected for HTTP or HTTPS traffic.
Syntax Description
tcp_port Specifies the port to be hijacked.
Default
N/A.
Usage Guidelines
This command allows you to unconfigure the ports that will be hijacked and redirected for HTTP or
HTTPS traffic.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the default EAPOL version sent in transmitted packets for network login.
Syntax Description
eapol-version Specifies the EAPOL version. Choices are "v1" or "v2".
Default
The default is "v1".
Usage Guidelines
Although the ExtremeXOS software supports EAPOL version 2, some clients do not yet accept the
version 2 EAPOL packets. The packet format for the two versions is the same.
Example
The following command changes the EAPOL version to 2:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a guest VLAN for 802.1X authentication network login.
Syntax Description
vlan_name Specifies the name of the guest VLAN.
port_list Specifies one or more ports or slots and ports. If the ports keyword is
not used, the command applies to all ports.
Default
N/A.
Usage Guidelines
This command configures the guest VLAN for 802.1X on the current virtual router (VR).
Note
Beginning with ExtremeXOS 11.6, you can configure guest VLANs on a per port basis, which
allows you to configure more than one guest VLAN per VR. In ExtremeXOS 11.5 and earlier,
you can only configure guest VLANs on a per VLAN basis, which allows you to configure only
one guest VLAN per VR.
If you do not specify any ports, the guest VLAN is configured for all ports.
A guest VLAN provides limited or restricted network access if a supplicant connected to a port does not
respond to the 802.1X authentication requests from the switch. A port always moves untagged into the
guest VLAN.
Note
The supplicant does not move to a guest VLAN if it fails authentication after an 802.1X
exchange; the supplicant moves to the guest VLAN only if it does not respond to an
802.1X authentication request.
To modify the supplicant response timer, use the following command and specify the supp-resp-
timeout parameter:
configure netlogin dot1x timers [{server-timeout server_timeout} {quiet-
periodquiet_period} {reauth-period reauth_period {reauth-
maxmax_num_reauths}} {supp-resp-timeoutsupp_resp_timeout}]
If a supplicant on a port in the guest VLAN becomes 802.1X-capable, the switch starts processing the
802.1X responses from the supplicant. If the supplicant is successfully authenticated, the port moves
from the guest VLAN to the destination VLAN specified by the RADIUS server.
Example
The following command creates a guest VLAN for 802.1X named guest for all ports:
The following command creates a guest VLAN named guest for ports 2 and 3:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures receiving tagged EAPOL packets on dot1x-enabled ports.
Syntax Description
on Turns EAPOL-tagged frames feature on.
off Turns EAPOL-tagged frames feature off . Default is off.
Default
Default is off.
Usage Guidelines
When this feature is on and switch receives tagged EAPOL packet on dot1x-enabled ports, tagged
EAPOL response is sent out on those ports. On untagged ports, the EAPOL frames are sent untagged.
When this feature is off, switch sends unatgged EAPOL packets on all the tagged/untagged ports. This
command allows you to authenticate dot1x users on tagged and unatagged ports.
Example
The following example enables the switch to send tagged EAPOL packets:
configure netlogin dot1x tag-eapol on
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the 802.1X timers for network login.
Syntax Description
server-timeout Specifies the timeout period for a response from the RADIUS server.
The range is 1 to 120 seconds.
quiet-period Specifies the time for which the switch will not attempt to
communicate with the supplicant after authentication has failed. The
range is 0 to 65535 seconds.
reauth-period Specifies time after which the switch will attempt to re-authenticate
an authenticated supplicant. The range is 0 to 86,400 seconds.
reauth-max Specifies the maximum reauthentication counter value. The range is 1
to 10.
supp-resp-timeout Specifies the time for which the switch will wait for a response from
the supplicant. The range is 1 to 120 seconds.
reauthentication Enables or disables dot1x reauthentication
on Enables reauthentication.
off Disables reauthentication.
Default
The defaults are as follows:
• server-timeout—30 seconds.
• quiet-period—60 seconds.
• reauth-period—3600 seconds.
• reauth-max—3.
• supp-resp-timeout—30 seconds.
Usage Guidelines
To disable re-authentication, specify 0 for the reauth-period parameter. (If reauth-period is set to 0,
reauth-max value doesn't apply.)
If you attempt to configure a timer value that is out of range (not supported), the switch displays an
error message. The following is a list of sample error messages:
• server-timeout—ERROR: RADIUS server response timeout out of range (1..120
sec)
• quiet-period—%% Invalid number detected at '^' marker. %% Input number
must be in the range [0, 65535].
• reauth-period—%% Invalid input detected at '^' marker. %% Input number must be in the range [0,
86400].
• reauth-max—ERROR: Re-authentication counter value out of range (1..10)
• supp-resp-timeout—ERROR: Input number must be in the range [1, 10].
• greater than RADIUS timeout—Dot1x server timeout should be configured with a
value greater than the RADIUS server timeout.
To display the 802.1X timer settings, use the show netlogin command with and without the dot1x
option.
If reauthentication is enabled by this command, the session-timeout value sent from RADIUS has
priority. If no value is sent from RADIUS, then the locally configured reauth_period defines the
reauthentication period.
If the locally configured value is "0" with reauthentication off, and if any session timeout value sent from
RADIUS is ignored, the locally configured "0" takes precedence.
Example
The following command changes the 802.1X server-timeout to 10 seconds:
configure netlogin dot1x timers server-timeout 10
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the switch to automatically and dynamically create a VLAN after receiving authentication
requests from one or more supplicants (clients).
Syntax Description
disable Specifies that the switch does not automatically create dynamic VLANs. This is the
default behavior.
enable Specifies that the switch automatically create dynamic VLANs.
Default
The default is disabled.
Usage Guidelines
Use this command to configure the switch to dynamically create a VLAN. If configured for dynamic
VLAN creation, the switch automatically creates a supplicant VLAN that contains both the supplicant’s
physical port and one or more uplink ports.
A dynamically created VLAN is only a Layer 2 bridging mechanism; this VLAN does not work with
routing protocols to forward traffic. After the switch unauthenticates all of the supplicants from the
dynamically created VLAN, the switch deletes that VLAN.
Note
Dynamically created VLANs do not support the session refresh feature of web-based network
login because dynamically created VLANs do not have an IP address. Also, dynamic VLANs
are not supported on ports when STP and network login are both configured on the ports.
By dynamically creating and deleting VLANs, you minimize the number of active VLANs configured on
your edge switches. In addition, the RADIUS server forwards VSA information to dynamically create the
VLAN thereby simplifying switch management. A key difference between dynamically created VLANs
and other VLANs is that the switch does not save dynamically created VLANs. Even if you use the save
command, the switch does not save a dynamically created VLAN.
Note
If the ASCII string only contains numbers, it is interpreted as the VLAN ID. Dynamic VLANs
only support numerical VLAN IDs; VLAN names are not supported.
The switch automatically generates the VLAN name in the following format: SYS_NLD_TAG where TAG
specifies the VLAN ID. For example, a dynamic network login VLAN with an ID of 10 has the name
SYS_NLD_0010.
The uplink ports send traffic to and from the supplicants from the core of the network.
By default the setting is none. For more information about this command, see the usage guidelines for
configure netlogin dynamic-vlan uplink-ports.
If the switch dynamically creates a VLAN, the VLAN name begins with SYS_NLD_ and the output
contains a d flag for the dynamically created VLAN.
To display the status of dynamic VLAN configuration on the switch, use the following command: show
netlogin
The switch displays the current state of dynamic VLAN creation (enabled or disabled) and the uplink
port(s) associated with the dynamic VLAN.
Example
The following example automatically adds ports 1:1-1:2 to the dynamically created VLAN as uplink ports:
configure netlogin dynamic-vlan uplink-ports 1:1-1:2
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies which port(s) are added as tagged, uplink ports to the dynamically created VLANs for
network login.
Syntax Description
port_list Specifies one or more ports to add to the dynamically created VLAN
for network login.
none Specifies that no ports are added. This is the default setting.
Default
The default setting is none.
Usage Guidelines
Use this command to specify which port(s) are used as uplink ports and added to the dynamically
created VLAN for network login. The uplink ports send traffic to and from the supplicants from the core
of the network.
Uplink ports should not be configured for network login (network login is disabled on uplink ports). If
you specify an uplink port with network login enabled, the configuration fails and the switch displays an
error message similar to the following:
ERROR: The following ports have NetLogin enabled: 1, 2
By default, the setting is disabled. For more detailed information about this command, see the usage
guidelines configure netlogin dynamic-vlan uplink-ports.
If the switch dynamically creates a VLAN, the VLAN name begins with SYS_NLD_ and the output
contains a d flag for the dynamically created VLAN.
To display the status of dynamic VLAN configuration on the switch, use the following command:
show netlogin
The switch displays the current state of dynamic VLAN creation (enabled or disabled) and the uplink
port(s) associated with the dynamic VLAN.
Example
The following command configures the switch to add ports 1:1-1:2 to the dynamically created network
login VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears multiple authentication properties for one or more ports.
Syntax Description
dot1x IEEE 802.1X Port-based network access control.
mac MAC authentication.
web-based Web-based authentication.
convergence-endpoint Convergence-endpoint authentication.
timeout Number of seconds before idle timeout (range 0-172800).
Default
Timeout = 300 seconds.
Usage Guidelines
This command appears in show configuration {module-name} {detail} for "policy" rather
than "netlogin."
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X450-G2, X460-G2, X670-G2 , X465 series
switches.
Description
Changes a previously associated security profile.
Syntax Description
user-name Specifies the name of an existing local network login account.
security_profile Specifies a security profile string during account creation.
Default
N/A.
Usage Guidelines
Use this command to change any previously associated security profiles on the switch.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an existing local network login account.
Syntax Description
user-name Specifies the name of an existing local network login account.
tagged Specifies that the client be added as tagged.
untagged Specifies that the client be added as untagged.
vlan_name Specifies the name of the destination VLAN.
vlan_tag Specifies the VLAN ID, tag, of the destination VLAN.
none Specifies that the VSA 211 wildcard (*) is applied, only if you do not
specify tagged or untagged.
Default
N/A.
Usage Guidelines
Use this command to modify the attributes of an existing local network login account. You can update
the following attributes associated with a local network login account:
• Password of the local network login account.
• Destination VLAN attributes including: adding clients tagged or untagged, the name of the VLAN,
and the VLAN ID.
Note
Passwords are case-sensitive and must have a minimum of 1 character and a maximum of
32 characters.
You must create a local network login account before using this command. To create a local network
login user name and password, use the following command:
create netlogin local-user user-name {encrypted} {password} {vlan-vsa
[[{tagged | untagged} [vlan_name] | vlan_tag]]} {security-
profilesecurity_profile}
You might be attempting to modify a local network login account that is not present or the switch, or
you might have incorrectly entered the account name. To confirm the names of the local network login
accounts on your switch, use the following command:
show netlogin local-users
Additional Requirements
This command applies only to the web-based and MAC-based modes of network login. 802.1X network
login does not support local database authentication.
You must have administrator privileges to use this command. If you do not have administrator
privileges, the switch displays a message similar to the following:
This user does not have permissions for this command.
Passwords are case-sensitive. Passwords must have a minimum of 0 characters and a maximum of 32
characters. If you attempt to create a password with more than 32 characters, the switch displays the
following message after you re-enter the password:
Password cannot exceed 32 characters
Example
This section contains the following examples:
• Updating the password.
• Modifying destination VLAN attributes.
After you enter the local network login user name, press [Enter]. The switch prompts you to enter a
password; however, the switch does not display the password. At the prompt enter the new password:
password:
After you enter the new password, press [Enter]. The switch then prompts you to re-enter the
password:
Reenter password:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the reauthentication period for network login MAC-based authentication.
Syntax Description
reauth_period Specifies time after which the switch will attempt to re-authenticate
an authenticated supplicant. The range is 0, 30 to 86,400 seconds.
reauthentication Configure mac reauthentication.
on MAC reauthentication is enabled.
off MAC reauthentication is disabled.
delay Configure MAC authentication delay period.
delay_period MAC authentication delay period. 0-120 seconds range.
Default
The default is 0 (disabled).
Usage Guidelines
This command allows you to configure the reauth-period for network login MAC-based authentication.
The session-timeout configuration on the RADIUS server overrides the reauth-period if it has been
configured.
In MAC mode, if reauthentication is turned off, globally and per-port, using this command, a session
timeout sent by RADIUS takes precedence and local timers are ignored.
Example
The following command configures a MAC authentication delay period of 100 seconds on port 39:
configure netlogin mac ports 39 timers delay 100
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets option to send the Network Login (NetLogin) MAC Authentication MAC address in either
uppercase or lowercase for user name or password.
Syntax Description
netlogin Configures NetLogin specific settings.
mac Configures NetLogin settings specific to MAC.
username Configures MAC user name credential attributes.
case Configures MAC user name case.
lower Use lowercase (for example: aa:bb:cc:dd:ee:ff).
upper Use uppercase (for example: AA:BB:CC:DD:EE:FF). Default.
Default
By default, the uppercase is used.
Usage Guidelines
When the user name case is configured as lowercase, if the client with MAC address aa:bb:cc:dd:ee:ff
sends a frame, Netlogin MAC sends “aabbccddeeff” (default “None” delimiter) as username and default
password for authentication.
Example
The following example sets the NetLogin MAC to be sent in lowercase:
# configure netlogin mac username case lower
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the NetLogin MAC username format used when sending out for authentication to a RADIUS
server.
Syntax Description
mac Configure Network Login settings specific to MAC.
username Configure username credential attributes.
format Configure username format.
hyphenated Hyphen separator (XX-XX-XX-XX-XX-XX).
colon-separated Colon separator (XX:XX:XX:XX:XX:XX).
none No separator (XXXXXXXXXXXX) (This is the default).
Default
No separator is the default.
Example
The following example sets the MAC username format with colon separator:
configure netlogin mac username format colon-separated
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the action network login takes if a VLAN move fails. This can occur if two clients attempt to
move to an untagged VLAN on the same port.
Syntax Description
authenticate Specifies that the client is authenticated.
deny Specifies that the client is not authenticated. This is the default
setting.
Default
The default setting is deny.
Usage Guidelines
Use this command to specify how network login behaves if a VLAN move fails. Network login can either
authenticate the client on the current VLAN or deny the client.
The following describes the parameters of this command if two clients want to move to a different
untagged VLAN on the same port:
• authenticate—Network login authenticates the first client that requests a move and moves that
client to the requested VLAN. Network login authenticates the second client but does not move that
client to the requested VLAN. The second client moves to the first client’s authenticated VLAN.
• deny—Network login authenticates the first client that requests a move and moves that client.
Network login does not authenticate the second client.
To view the current move-fail-action setting on the switch, use the show netlogin command.
Example
The following command configures network login to authenticate the client on the current VLAN:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the egress traffic in an unauthenticated state.
Syntax Description
all Specifies all network login ports.
port_list Specifies one or more network login ports.
none Specifies that no traffic is sent out if if no authenticated clients exist
on the VLAN.
unicast Specifies that the unicast flooding traffic for the VLANs on the
network login enabled port be sent.
broadcast Specifies that the broadcast traffic for the VLANs on the network
login enabled port be sent.
all_cast Specifies that the broadcast and unicast flooding traffic for the VLANs
on the network login enabled port be sent.
Default
The default is none.
Usage Guidelines
This command allows you to configure the egress traffic in an unauthenticated state on a per-port basis.
Enabling ONEPolicy removes the action of this command. This command is supported only in non-
policy mode
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Use this command to set the NetLogin trap setting for ports.
Syntax Description
all Configure all ports in the system.
port_list List of ports to configure.
allowed-users Number of users allowed per port. Only applicable if the ONEPolicy
feature is enabled.
allowed_users Number of users allowed per port.
authentication mode Port authentication mode. Only applicable if the ONEPolicy feature is
enabled.
optional Authentication optional. Only applicable if ONEPolicy is enabled.
required Authentication required. Only applicable if ONEPolicy is enabled.
all-traps Enable sending all trap types. Only applicable if the ONEPolicy feature
is enabled.
no-traps Disable sending all trap types. Only applicable if the ONEPolicy
feature is enabled.
success Enable sending success trap.
fails Enable sending failed trap.
terminated Enable sending terminated trap.
max-reached Enable sending max number users reached trap. This is applicable in
ONEPolicy mode only.
Default
By default, all traps are sent in both ONEPolicy mode and non-ONEPolicy mode.
Usage Guidelines
The following command options are only applicable if ONEPolicy is enabled. They have no effect
without ONEPolicy being enabled:
• authentication mode [optional | required]
• allowed-users allowed_users
• all-traps | no-traps | [{success} {failed} {terminated} {max-reached}]
This command appears in show configuration {module-name} {detail} for "policy" and
"netlogin."
Trap configurations after applying no-traps are appended until no-traps is configured again (for
example: no-traps configuration followed by success, and thenterminated traps, sends success
and terminated traps:
# configure netlogin ports 1 trap no-traps
# show configuration "policy"
**no traps commands appear due to no-traps being configured
# configure netlogin ports 1 trap success
# show configuration "policy"
# Module policy configuration.
# configure netlogin ports 1 trap success
**success traps command appears
# configure netlogin ports 1 trap terminated
# show configuration "policy"
# Module policy configuration.
# configure netlogin ports 1 trap success
# configure netlogin ports 1 trap terminated
**success and terminated traps commands appear
Example
This example shows how to enable all NetLogin port trap setting:
configure netlogin trap port 1:1 all
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the network login port’s mode of operation.
Syntax Description
all Specifies all netlogin ports.
port_list Specifies one or more network login ports.
mac-based-vlans Allows more than one untagged VLAN.
port-based-vlans Allows only one untagged VLAN. This is the default behavior.
Default
The default setting is port-based-vlans.
Usage Guidelines
Use this command to configure network login MAC-based VLANs on a network login port.
If you modify the mode of operation to mac-based-vlans and later disable all network login protocols
on that port, the mode of operation automatically returns to port-based-vlans.
When you change the network login port’s mode of operation, the switch deletes all currently known
supplicants from the port and restores all VLANs associated with that port to their original state. In
addition, by selecting mac-based-vlans, you are unable to manually add or delete untagged VLANs
from this port. Network login now controls these VLANs.
With network login MAC-based operation, every authenticated client has an additional FDB flag that
indicates a translation MAC address. If the supplicant’s requested VLAN does not exist on the port, the
switch adds the requested VLAN.
To enable network login on the switch, use the following command to enable network login and to
specify an authentication method (for example, 802.1X—identified as dot1.x in the CLI):
To enable network login on the ports, use the following command to enable network login and to
specify an authentication method (for example, 802.1X—identified as dot1.x in the CLI):
If you attempt to configure network login MAC-based VLANs on 10 Gigabit Ethernet ports, the
switch displays an error message similar to the following:
ERROR: The following ports do not support the MAC-Based VLAN mode; 1, 2, 10
• You can have a maximum of 1,024 MAC addresses per ExtremeSwitching switch.
The following is sample output from the show fdb netlogin mac-based-vlans command:
The added output displays information about the mode of operation for the network login port.
• VLAN cfg—The term MAC-based appears next to the tag number.
• NetLogin port mode—This output was added to display the port mode of operation. Mac based
appears as the network login port mode of operation.
To view information about the ports that are temporarily added in MAC-based mode for network login,
due to discovered MAC addresses, use the following command:
show vlan detail
Example
The following command configures the network login ports mode of operation:
configure netlogin ports 1:1-1:10 mode mac-based-vlans
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the network login port restart feature.
Syntax Description
all Specifies all network login ports.
port_list Specifies one or more network login ports.
Default
The default setting is no-restart; the network login port restart feature is disabled.
Usage Guidelines
Use this command to disable the network login port restart feature on a network login port.
Configure network login port restart on ports with directly attached supplicants. If you use a hub to
connect multiple supplicants, only the last unauthenticated supplicant causes the port to restart.
Enabling ONEPolicy removes the action of this command. This command is supported only in non-
policy mode
Output from this command includes the enable/disable state for network login port restart.
Example
The following command disables network login port restart on port 1:1:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the network login port restart feature.
Syntax Description
all Specifies all network login ports.
port_list Specifies one or more network login ports.
Default
The default setting is no-restart; the network login port restart feature is disabled.
Usage Guidelines
Use this command to enable the network login port restart feature on a network login port. This allows
network login to restart specific network login-enabled ports when the last authenticated supplicant
releases, regardless of the configured protocols on the port.
Configure network login port restart on ports with directly attached supplicants. If you use a hub to
connect multiple supplicants, only the last unauthenticated supplicant causes the port to restart.
Enabling ONEPolicy removes the action of this command. This command is supported only in non-
policy mode
Output from this command includes the enable/disable state for network login port restart.
Example
The following command enables network login port restart on port 1:1:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the redirect URL for Network Login.
Syntax Description
url Specifies the redirect URL for Network Login.
Default
The redirect URL default value is “http://www.extremenetworks.com”; the default port value is 80.
Usage Guidelines
In ISP mode, you can configure network login to be redirected to a base page after successful login
using this command. If a RADIUS server is used for authentication, then base page redirection
configured on the RADIUS server takes priority over this configuration.
You can also configure a specific port location at a specific target URL location. For example, you can
configure a target port 8080 at extremenetworks.com with the following command:
configure netlogin redirect-page "www.extremenetworks.com:8080"
This command applies only to the web-based authentication mode of Network Login.
Example
The following command configures the redirect URL as http://www.extremenetworks.com/support:
configure netlogin redirect-page http://www.extremenetworks.com/support
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures network login session refresh.
Syntax Description
refresh_seconds Specifies the session refresh time for network login in seconds.
Default
Enabled, with a value of 180 seconds for session refresh.
Usage Guidelines
Network login sessions can refresh themselves after a configured timeout. After the user has been
logged in successfully, a logout window opens which can be used to close the connection by clicking on
the Logout link. Any abnormal closing of this window is detected on the switch and the user is logged
out after a time interval as configured for session refresh. The session refresh is enabled and set to 360
seconds by default. The value can range from 1 to 3600 seconds. When you configure the network login
session refresh for the logout window, ensure that the FDB aging timer is greater than the network login
session refresh timer.
This command applies only to the web-based authentication mode of network login.
Example
The following command enables network login session refresh and sets the refresh time to 100 seconds:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Use this command to set the maximum number of seconds an authenticated session may last before
termination of the session.
Syntax Description
dot1x IEEE 802.1X Port-based network access control.
mac MAC authentication.
web-based Web-based authentication.
convergence-endpoint Convergence-endpoint authentication.
timeout Number of seconds before session timeout (range 0-172800).
Default
0 seconds.
Usage Guidelines
A value of zero may be superseded by a session timeout value provided by the authenticating server.
For example, if a session is authenticated by a RADIUS server, that server may encode a session-timeout
attribute in its authentication response.
If you want to scale to 65,000 authenticated users, use a session timeout value of at least 300 minutes.
Example
The following example shows how to set the session-timeout value for an active session, for mac
authentication to 500 seconds:
configure netlogin session-timeout mac 500
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Use this command to set the NetLogin system traps.
Syntax Description
enable Enable sending traps when max users reached in system
disable Disable sending traps when max users reached in system
Default
Disabled.
Usage Guidelines
The specifications from this command appear in show configuration {module-name}
{detail} for "policy" and "netlogin."
Example
This example shows how to enable the NetLogin maximum users trap setting:
configure netlogin trap max-users enabled
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the VLAN for Network Login.
Syntax Description
vlan Specifies the VLAN for Network Login.
Default
N/A.
Usage Guidelines
This command will configure the VLAN used for unauthenticated clients. One VLAN needs to be
configured per VR. To change the VLAN, network login needs to be disabled. Network login can only be
enabled when a VLAN is assigned (and no ports are configured for it).
Example
The following command configures the VLAN login as the network login VLAN:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the Best Master Clock Algorithm (BMCA) as part of gPTP.
Syntax Description
network-clock Network Clock
gptp IEEE 802.1AS Generalized Precision Time Protocol
bmca Best Master Clock Algorithm
on Use BMCA to dynamically port roles.
off Disable BMCA and statically set port roles.
Default
On.
Usage Guidelines
Use this command to configure the BMCA as part of gPTP.
Example
The following example displays output from the show command with BMCA.
# show network-clock gptp
gPTP status : Enabled
BMCA : [On | Off]
Static slave port : 5 (used when BMCA Off)
--or--
Static slave port : None (used when BMCA Off)
gPTP enabled ports : *1m *21d *22d *47d
Flags: (*) Active, (!) Administratively disabled,
(d) Disabled gPTP port role, (m) Master gPTP port role,
(p) Passive gPTP port role, (s) Slave gPTP port role
History
This command was first available in ExtremeXOS 15.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the switch's default-set parameters, specifically its grandmaster clock priority
values that are used to elect the grandmaster clock in the network.
Syntax Description
priority1_value The switch's grandmaster clock priority1 value. This is the most
significant parameter used to select the grandmaster clock in the
network. Lower values indicate higher priority, and 255 prevents the
switch from becoming the grandmaster clock.
priority2_value The switch’s grandmaster clock priority2 value. This is one of the least
significant parameters used to select the grandmaster clock in the
network. Lower values indicate higher priority.
Default
• Priority1_value = 246 (from 802.1AS 8.6.2.1)
• Priority2_value = 248 (from 802.1AS 8.6.2.5)
Usage Guidelines
Use this command to configure the switch's default-set parameters, specifically its grandmaster clock
priority values that are used to elect the grandmaster clock in the network. The Best Master Clock
Algorithm uses six parameters from each time-aware system in the network to select the grandmaster
clock in the network. Priority1 is the highest precedence value; it allows users to preemptively configure
which systems they prefer to be the grandmaster clock. Priority2 is a lower precedence value; it allows
users to configure tiebreaker priorities.
The default priority1 values defined by IEEE 802.1AS-2011 clause 8.6.2.1 give preference to network
infrastructure systems such as Extreme switches.
Example
configure network-clock gptp default-set priority1 248
configure network-clock gptp default-set priority2 100
configure network-clock gptp default-set priority1 248 priority2 100
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures gPTP Announce parameters on the specified ports. Announce messages are used to elect
the grandmaster clock and determine the time-synchronous spanning tree.
Syntax Description
port_list Specifies one or more of the switch's physical ports.
only Apply change only to specified port, even if port is master of a load
sharing group.
all Specifies all of the switch's physical ports.
log_2_interval The interval between Announce messages used by the switch on the
port when the port is initialized or when the switch receives a
message interval request TLV with announceInterval value 126. This
value is in log 2 seconds. The valid range of values is -3 (2-3 = 0.125
seconds) to 17 (217 = 131072 seconds).
timeout_count On a gPTP slave port, the number of announce intervals to wait
without receiving an Announce message before assuming the master
is no longer sending Announce messages.
Default
• log_2_interval = 0 (1 second; 802.1AS-2011 10.6.2.2)
• timeout_count = 3 (802.1AS-2011 10.6.3.2)
Usage Guidelines
Use this command to configure gPTP Announce parameters on the specified ports. Announce
messages are used to elect the grandmaster clock and determine the time-synchronous spanning tree.
Announce selects the grandmaster in the network and establishes the tree from the grandmaster to all
other time-aware systems in the network.
Example
# configure network-clock gptp ports 1-2 announce initial-interval 127
# configure network-clock gptp ports all announce receipt-timeout 5
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Configures gPTP peer delay parameters on the specified ports.
Syntax Description
port_list Specifies one or more of the switch’s physical ports.
only Apply change only to specified port, even if port is master of a load
sharing group.
all Specifies all of the switch’s physical ports.
lost_responses_value The number of consecutive Peer Delay RequestPdelay_Req
messages that the switch must send on a port without receiving a
valid response before it considers the port not to be exchanging Peer
Delay messages with its neighbor.
log_2_interval The interval between Peer Delay RequestPdelay_Req messages sent
by the switch on the port when the port is initialized or when the
switch receives on the port a message interval request TLV with
linkDelayInterval value of 126. This value is in log2 seconds. The valid
range of values is -3 (2-3 = 0.125 seconds) to 17 (217 = 131072
seconds).
asymmetry_time The time that the propagation delay from this switch to the neighbor
is less than the estimated one-way propagation delay between the
switch and its neighbor (which is also the time that the propagation
delay from the neighbor to this switch is greater than the estimate).
This value is negative if the propagation delay to the neighbor is
greater than the estimate. It can be in nanoseconds, microseconds,
milliseconds, or seconds. The maximum value is 4,294,967,295
nanoseconds (approximately 4.3 seconds). Let tIR be the propagation
delay from this switch (initiator) to the neighbor (responder), tRI be
the propagation delay from the neighbor to this switch, and
meanPathDelay be the estimated one-way propagation delay. Then:
• meanPathDelay = (tIR + tRI) / 2
• tIR = meanPathDelay – asymmetry_time
• tRI = meanPathDelay + asymmetry_time
neighbor_thresh_time The maximum measured mean of the propagation delay between this
switch and the neighbor above which the switch considers the port
unable to run gPTP. This value can be in nanoseconds, microseconds,
milliseconds, or seconds.
auto Use a media specific default value for the neighbor_thresh_time:
• Copper: 800 nanoseconds. This category includes short range
copper cables such as SFP+ Direct Attach and QSRP+ Passive
Copper.
• Multi-mode fiber: 11 microseconds. This category includes the
QSFP+ Active Optical cables. 11 microseconds allows 10
microseconds for 100BASE-FX 2 km plus 10% tolerance.)
• Single-mode fiber: 550 microseconds. This allows 500
microseconds for our “LX100” transceiver plus 10% tolerance.
Default
• Lost_responses_value = 3 (802.1AS 11.5.3)
• Log_2_interval = 0 (1 second; not specified in 802.1AS)
• Asymmetry_time = 0 (802.1AS 10.2.4.8)
• Neighbor_thresh_time = Copper media: 800 nanoseconds, fiber media: 4,294,967,295 nanoseconds
Usage Guidelines
Peer Delay messages determine whether a neighboring system is gPTP capable and measure the
propagation delay on the link between the switch and a neighboring gPTP capable system.
• allowed-lost-responses corresponds to 802.1AS parameter allowedLostResponses.
• initial-req-interval corresponds to 802.1AS parameter
initialLogPdelayReqInterval.
• asymmetry corresponds to 802.1AS parameter delayAsymmetry.
• neighbor-thresh corresponds to 802.1AS parameter neighborPropDelayThresh.
Example
configure network-clock gptp ports 1-3 peer-delay allowed-lost-responses 5
configure network-clock gptp ports 1-2 peer-delay initial-log-interval -3
configure network-clock gptp ports 1-2 peer-delay neighbor-thresh 3 nanoseconds
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Configures gPTP synchronization parameters on the specified ports.
Syntax Description
port_list Specifies one or more of the switch's physical ports.
only Apply change only to specified port, even if port is master of a load
sharing group.
all Specifies all of the switch's physical ports.
log_2_interval The interval between Sync messages used by the switch for the port
when the port is initialized or when the switch receives a message
interval request TLV with timeSyncInterval value of 126. This value is in
log2 seconds. The valid range of values is -3 (2-3 = 0.125 seconds) to
17 (217 = 131072 seconds).
timeout_count On a gPTP slave port, the number of sync intervals to wait without
receiving a Sync message before assuming the adjacent master port is
no longer sending Sync messages.
Default
• log_2_interval = -3 (0.125 second; 802.1AS 11.5.2.3)
• timeout_count = 3 (802.1AS 10.6.3.1)
Usage Guidelines
Synchronization distributes the time from the grandmaster to all other time-aware systems in the
networks.
Example
configure network-clock gptp ports 1-2 sync initial-interval -1
configure network-clock gptp ports all sync receipt-timeout 5
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
This command allows to you configure the port that will be the slave-port when BMCA is off. All other
enabled network gPTP ports will be master ports.
Syntax Description
network-clock Network Clock
gptp Variable description, available options, and notes.
slave-port Configure slave port when Best Master Clock Algorithm is off.
port_no Port Number of slave port
none This switch is the Grand Master Clock (GMC).
Default
N/A.
Usage Guidelines
Use this command to you configure the port that will be the slave-port when BMCA is off. All other
enabled network gPTP ports will be master ports.
Example
The following example shows the output of the show network-clock gptp command with BMCA.
History
This command was first available in ExtremeXOS 15.7.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Configure the input network clock source as Sync-E or PTP. A region can also be configured using this
command.
Syntax Description
sync-e Synchronous Ethernet (ITU-T standard) (Default).
ptp Precision Time Protocol.
E1 Specifies the European and Asian clock region selection (Default).
T1 Specifies the North American clock region selection.
Default
The default input clock source is Synchronous Ethernet. The default region is E1.
Usage Guidelines
The ExtremeSwitching X460-G2 series switches have clock sources beyond SyncE. The clock which
drives all of the ports on a switch may be selected from:
• SyncE (Synchronous Ethernet).
• PTP – Precision Time Protocol, an optional 1588v2 module.
Example
The following command configures the region as T1:
# configure network-clock clock-source input region t1
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Configure the output network clock source as bits bnc 1 or 2.
Syntax Description
bits-bnc-1 Bits Clock 1 BNC connector.
1pps 1pps output clock.
8KHz 8 KHz output clock (default).
bits-bnc-2 Bits Clock 2 BNC connector.
E1 E1 (2.048 MHz) output clock (default).
T1 T1 (1.544 MHz) output clock.
10MHz 10 MHz output clock.
Default
The default output clock source for Bits Clock 1 BNC connector is 8 KHz, and the default for Bits Clock 2
BNC connector is E1 (2.048 MHz).
Usage Guidelines
The ExtremeSwitching X460-G2 series switches have clock sources beyond SyncE. The clock which
drives all of the ports on a switch may be selected from:
• SyncE (Synchronous Ethernet).
• PTP – Precision Time Protocol, an optional 1588v2 module.
Example
The following command configures the region as T1:
# configure network-clock clock-source input region t1
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
Adds an entry to the unicast master table for a PTP clock instance. This command is available for
boundary and ordinary clocks.
Syntax Description
boundary Boundary clock.
ordinary Ordinary clock.
add unicast- IP addresses that are potential master to the local clock.
master
ipv4_address IPv4 address.
query-interval Mean interval between requests from a node for a unicast Announce
message
seconds_log_base The log base 2 value in seconds of the mean interval between requests from a
_2 node for a unicast Announce message. For example, to specify 8 seconds
between requests, use 3. The default value is 1, and the range is -2 to 4.
vlan_name VLAN name to which the command is to be applied.
Default
The default value of the query interval is log base 2 (1), or 2 seconds mean interval between requests
from the node for a unicast Announce Message.
Usage Guidelines
Use this command to add an entry to the unicast master table for a PTP clock instance. This command
is available only for boundary clocks. The mean interval between requests from the node for a unicast
Announce message can be configured from 1/4 second to 16 seconds, with a default of 2 seconds.
Example
The following command adds a static unicast master entry to the PTP clock port lpbk-gm in the
boundary clock:
# configure network-clock ptp boundary add unicast-master 192.168.1.1 query-interval 0
vlan lpbk-gm
The following command adds a static unicast master entry to the PTP clock port lpbk-master in the
ordinary clock clock:
# configure network-clock ptp ordinary add unicast-master 192.168.15.10 vlan lpbk-master
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Configure the value of the PTP announce interval time on the port(s) for sending announce messages.
This command is available only for boundary and ordinary clocks. The interval time is the time between
successive announce messages.
Syntax Description
boundary Boundary clock instance.
ordinary Ordinary clock instance.
seconds_log_bas The log base 2 value of the seconds between successive announce messages.
e_2 For example, to specify 8 seconds, use 3. The default value is 1, and the range
is -2 to 4.
vlan_name Name of the VLAN to apply the command to.
Default
The default value of the announce interval is log base 2 (1), or 2 seconds.
Usage Guidelines
Use this command to configure the value of PTP announce interval time on the port(s) for sending
announce messages. The announce interval is set using log base 2 values. The range is -2 to 4. This
command is available only for boundary and ordinary clocks.
Example
The following example configures announce interval to be 1/second on the clock port lpbk-gm of the
ordinary clock:
# configure network-clock ptp ordinary announce interval 0 vlan lpbk-gm
The following example configures announce interval to be 2/second on the clock-port lpbk-gm of the
boundary clock:
# configure network-clock ptp boundary announce interval -1 vlan lpbk-gm
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Deletes an entry from the unicast slave table for a PTP clock instance. This command is available only
for boundary clocks.
Syntax Description
boundary Boundary clock instance.
unicast-slave IP addresses that are potential slave to the local clock.
ipv4_address IPv4 address.
vlan VLAN.
vlan_name Name of the specific VLAN to add for the PTP clock instance.
Default
The default configuration of clock port is slave mode.
Usage Guidelines
Use this command to delete an entry from the unicast slave table for a PTP clock instance.
Example
The following command removes a static unicast master entry from boundary clock:
# configure network-clock ptp boundary delete unicast-slave 192.168.1.1 vlan lpbk-gm
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Add a VLAN to a PTP boundary clock instance as a clock port. You can configure the clock port as
slave-only port or master-only port.
Syntax Description
boundary Boundary clock instance.
vlan_name Name of the specific VLAN to be added to or deleted from the PTP clock
instance.
one-step 1-step protocol mode (default).
two-step 2-step protocol mode.
slave-only Force clock port to be slave.
master-only Force clock port to be master.
Default
The default configuration of clock port is master or slave mode.
Usage Guidelines
Use this command to add a VLAN to a PTP boundary clock instance as a clock port. You can configure
the clock port as slave-only port, or master-only port. The slave-only clock port has the PTP port state
forced to slave. The slave port does not respond to signaling messages from other slaves, and Sync/
DelayResponse event messages are not generated by the slave-only ports.
The master-only clock port has the PTP port state forced to master. The master port generates Sync/
DelayResponse event messages to downstream slave clocks.
The default configuration of clock port is master or slave mode. In this mode, the clock port state is
based on the Best Master Clock (BMC) algorithm running on the port. The BMC algorithm decides the
clock port state transition to master or slave depending on the event messages received on the clock
port from the associated unicast master(s)/slave(s).
Example
The following example adds a vlan 'lpbk-gm' as a slave clock port to boundary clock:
# configure network-clock ptp boundary add vlan lpbk-gm one-step slave-only
The following example adds a vlan 'lpbk-ord' as a master clock port to boundary clock in two-step
protocol mode:
# configure network-clock ptp boundary add vlan lpbk-ord two-step master-only
The following example adds a vlan 'lpbk-transit' as a clock port to boundary clock whose master/slave
state is decided by BMCA:
# configure network-clock ptp boundary add vlan lpbk-transit one-step
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Configures the value of PTP delay request interval time to send successive delay request messages
when the port is in the master state.
Syntax Description
boundary Boundary clock instance.
ordinary Ordinary clock instance.
seconds_log_bas The log base 2 value of the seconds of the timeout for PTP announce
e_2 messages. For example, to specify 8 seconds, use 3. The default value is -6,
and the range is -7 to 5.
vlan_name VLAN name to which the command is to be applied.
Default
The default value of the announce delay request interval is log base 2 (-6), or 64 delay request
messages per second.
Usage Guidelines
Use this command to configure the value of PTP delay request interval time to send delay request
messages when the port is in the master state. The clock port should not have unicast static slaves or
masters added to apply the configuration.
Set the delay request interval using log base 2 values. The range is -7 to 5. This command is available
only for boundary and ordinary clocks.
Example
The following command configures the delay request message rate of 32/second on the clock port
lpbk-gm of the ordinary clock:
# configure network-clock ptp ordinary delay-request-interval -5 vlan lpbk-gm
The following command configures the delay request message rate of 128/second on the clock port
lpbk-gm of the boundary clock:
# configure network-clock ptp boundary delay-request-interval -7 vlan lpbk-gm
History
This command was first available in v 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Add an entry to the unicast slave table for a PTP clock instance. This command is available only for
boundary clocks.
Syntax Description
boundary Boundary clock instance.
unicast-slave IP addresses that are potential slaves to the local clock.
ipv4_address IPv4 address.
vlan VLAN.
vlan_name Name of the specific VLAN to add for the PTP clock instance.
Default
The default configuration of clock port is slave mode.
Usage Guidelines
Use this command to add an entry to the unicast slave table for a PTP clock instance.
Example
The following command adds a static unicast slave entry to the PTP clock port lpbk-slave in the
boundary clock:
# configure network-clock ptp boundary add unicast-slave 192.168.15.20 vlan lpbk-slave
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Configure the value of the timeout for receiving PTP announce messages. This command is available
only for boundary clocks and ordinary clocks.
Syntax Description
boundary Boundary clock instance.
ordinary Ordinary clock instance.
seconds_log_bas The log base 2 value of the seconds of the timeout for PTP announce
e_2 messages. For example, to specify 8 seconds, use 3. The default value is 3, and
the range is 2 to 8.
vlan_name VLAN name to which the command is to be applied.
Default
The default value of the announce timeout is log base 2 (3), or 8 seconds.
Usage Guidelines
Use this command to configure the value of the timeout for PTP announce messages. The clock port
should not have unicast static slaves or masters added for this configuration to be applied.
Example
The following example configures announce timeout interval to be 16 seconds on the clock port lpbk-
gm of the ordinary clock:
# configure network-clock ptp ordinary announce timeout 4 vlan lpbk-gm
The following example configures announce timeout interval to be 4 seconds on the clock port lpbk-gm
of the boundary clock:
# configure network-clock ptp boundary announce timeout 2 vlan lpbk-gm
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Deletes a given clock port (VLAN), or all clock ports added to the specified PTP clock instance.
Syntax Description
boundary Boundary clock instance.
ordinary Ordinary clock instance.
vlan VLAN.
vlan_name Name of the specific VLAN to be added to or deleted from the PTP clock
instance.
all Add or delete all VLANs.
Default
N/A.
Usage Guidelines
Use this command to delete a given clock port (VLAN), or all clock ports added to the specified PTP
clock instance.
Example
The following example deletes all clock ports from the boundary clock:
# configure network-clock ptp boundary delete vlan all
The following example deletes vlan lpbk-gm from the ordinary clock:
# configure network-clock ptp ordinary delete vlan lpbk-gm
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Delete an entry from the unicast master table for a PTP clock instance. This command is available only
for boundary clocks.
Syntax Description
boundary Boundary clock.
ordinary Ordinary clock.
ipv4_address IPv4 address of a master to the local clock.
vlan_name VLAN name to which the command is to be applied.
Default
N/A.
Usage Guidelines
Use this command to delete an entry from the unicast master table for a PTP clock instance. This
command is available only for boundary clocks.
Example
The following command removes a static unicast master entry from boundary clock:
# configure network-clock ptp boundary delete unicast-master 192.168.1.1 vlan lpbk-gm
The following command removes a static unicast master entry from ordinary clock:
# configure network-clock ptp ordinary delete unicast-master 192.168.15.10 vlan lpbk-
master
History
This command was first available in ExtremeXOS 15.1 Revision 2.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Adds or deletes the physical port(s) to or from the end-to-end-transparent clock.
Syntax Description
add Add ports.
delete Delete ports.
ports Physical ports.
port_list List of ports to be added or deleted.
one-step One step operation.
Default
N/A.
Usage Guidelines
Use this command to add or delete the physical port(s) to, or from, the end-to-end-transparent clock.
The fiber only 1G ports, 10G ports, and stack ports cannot be added to the End-to-End transparent
clock.
Example
The following example configures end-to-end transparent clock on the front panel ports:
# configure network-clock ptp end-to-end-transparent add ports 1-4 one-step
The following example deletes the front panel ports from the end-to-end transparent clock:
# configure network-clock ptp end-to-end-transparent delete ports 2-4
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Add a VLAN to a PTP ordinary clock instance as a clock port.
Syntax Description
ordinary Ordinary clock instance.
vlan_name Name of the specific VLAN to be added to or deleted from the PTP clock
instance.
one-step 1-step protocol mode (default).
two-step 2-step protocol mode.
slave-only Force clock port to be a slave.
Default
The default protocol mode on the clock port is one-step.
Usage Guidelines
Use this command to add a VLAN to a PTP ordinary clock instance as a clock port. The ordinary clock
master (grand-master) mode of operation is not supported.
Example
The following example adds a vlan 'lpbk-gm' as a slave clock port to ordinary clock:
# configure network-clock ptp ordinary add vlan lpbk-gm one-step slave-only
The following example adds a vlan 'lpbk-gm2' as a slave clock port to ordinary clock in two-step mode:
# configure network-clock ptp ordinary add vlan lpbk-gm2 two-step slave-only
History
This command was first available in ExtremeXOS 15.1, but was not shown in the documentation until
revision 2 of this guide.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Assign priority1 and priority2 values for a PTP clock instance.
Syntax Description
boundary Boundary clock instance.
ordinary Ordinary clock instance.
priority1 Priority1 of the clock.
priority2 Priority2 of the clock.
priority Value of priority. 0 is the highest priority. The default value is 128, the range is
0-255.
Default
The default value of the priority is 128. The range is 0-255.
Usage Guidelines
Use this command to assign priority1 and priority2 values for a PTP clock instance. This command is
available only for boundary and ordinary clocks.
Example
The following example assigns priority1 and priority2 values for the boundary clock:
# configure network-clock ptp boundary priority1 50
# configure network-clock ptp boundary priority2 128
The following example assigns priority1 and priority2 values for ordinary clock:
# configure network-clock ptp ordinary priority1 10
# configure network-clock ptp ordinary priority2 200
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Configure the value of PTP Sync message interval time to send Sync event message to the slaves when
the port is in the master state.
Syntax Description
boundary Boundary clock instance.
ordinary Ordinary clock instance.
sync-interval Time between successive sync messages.
seconds_log_bas The log base 2 value of the seconds of the timeout for PTP announce
e_2 messages. For example, to specify 2 seconds, use 1. The default value is -6, and
the range is -7 to 1.
vlan_name VLAN name to which the command is to be applied.
Default
The default value of the seconds_log_base_2 parameter is -6.
Usage Guidelines
Use this command to configure the announce message rate on the clock port. The clock port should not
have unicast static slaves or masters added for this configuration to be applied.
Example
The following command configures the sync message rate of 2/second on the clock port lpbk-gm of the
boundary clock:
# configure network-clock ptp boundary sync-interval -1 vlan lpbk-gm
The following command configures the sync message rate of 8/second on the clock port lpbk-gm of the
ordinary clock:
# configure network-clock ptp ordinary sync-interval -3 vlan lpbk-gm
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X670-G2, and X460-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Configures synchronous Ethernet on a particular port to be a source 1 or source 2 for synchronizing
clock.
Syntax Description
source-1 Source 1 external input clock
source-2 Source 2 external input clock
port port
port 100Mbps/1G port Copper/Fiber Ports
Default
None of the ports are source 1 or 2.
Usage Guidelines
Use this command to configure SyncE on a particular port to be a primary master or secondary master
for synchronizing the clock.
If you attempt to configure SyncE on a management port, the following message is displayed:
ERROR: Synchronous Ethernet is not supported on the Mgmt port.
If you attempt to configure more than one source-1 or source-2 port, the following message is displayed:
ERROR: Only one port can be configured as source-1/source-2.
If you attempt to configure SyncE on a port that is not supported, the following message is displayed:
ERROR: Cannot Configure Synchronous Ethernet on ports
Example
The following command configures port 2 as SyncE source.
# configure network-clock sync-e source-1 port 2
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 platform.
Description
Configures synchronous Ethernet clock-source to be a source 1 or source 2 for synchronizing clock.
Syntax Description
source-1 Source 1 external input clock.
source-2 Source 2 external input clock.
value Value of the Quality level of the clock (T1 default QL_ST3, E1 default
QL_SEC).
Default
None of the ports are source 1 or 2.
Usage Guidelines
Use the following command to configure "source-1" as the Synchronous Ethernet clock-source. It
generates ESMC messages with quality level QL_PRC.
configure network-clock sync-e clock-source source-1 quality-level
QL_PRC
If no quality-level is specified, the default value is used (T1 default QL_ST3, E1 default QL_SEC).
Example
# configure network-clock sync-e clock-source source-1 quality-level QL_PRC
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 platform.
Description
This command modifies the per-port maximum number of alias entries in the Node Alias database.
Node Alias discovers information about the end systems on a per-port basis. Information from packets
from end systems, such as VLANID, source MAC address, source IP address, protocol, etc. are captured
in a database that can be queried.
Syntax Description
nodealias Node Alias feature that maps source IP address, MAC address, host
name, and protocol on a per port basis.
ports Designates that specified ports should have the specified maximum
number of alias entries applied.
port_list Lists the ports to apply the specified maximum number of alias entries
to. Designated as a port list separated by comma (,) or dash (-).
all Specifies that all ports have the specified maximum number of alias
entries.
maxentries Designates a maximum number of alias entries per port.
entries The value for the maximum number of aliases entries. The default is
8,192 divided evenly by the number of ports in the switch.
Default
If no value is specified for the maximum number of alias entries, the default is 8,192 divided evenly by
the number of ports in the switch.
Usage Guidelines
The per-port limit can be set up to 8,192 for all switch ports. For example, if the switch has 32 ports, you
can configure the maximum limit as 32 × 8,192. However, the switch can only hold a maximum of 8,192
alias entries per slot.
As a result of snooping one frame, the Node Alias feature may create additional entries to facilitate the
searching based on finer details, such as protocol type. For example, when a BGP frame is received, two
entries are created: one entry with protocol type IP, and another entry with protocol type BGP.
If you change the maximum alias entries to a value that is less than the number entries in the database,
the more recent entries are retained.
Example
The following example specifies a maximum of 100 alias entries on all ports:
configure nodealias ports all maxentries 100
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Specifies whether an NTP key is trusted or not trusted.
Syntax Description
keyid Specifies the key ID as a value from 1 to 65534.
trusted Specifies that the key is in trusted status. To use a specific key for an
NTP session, set the key to trusted status.
not-trusted Specifies that the key is in not trusted status.
Default
An NTP key is not trusted by default.
Usage Guidelines
After an NTP key is created, the generated key is not-trusted by default. To use a specific key for an NTP
session, the key must be trusted. The trusted option changes the key to trusted status. The not-trusted
option changes the key to untrusted status.
Example
The following command changes NTP key 1 to trusted status:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes the internal local clock from the clock source list.
Syntax Description
N/A.
Default
N/A.
Usage Guidelines
N/A.
Example
The following command removes the internal local clock from the clock source list:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the internal local clock with a stratum number. The stratum number defines the distance
from the reference clock. The lower the number, the closer the switch is to the reference clock.
Syntax Description
stratum_number Specifies the distance from the reference clock from 2 through 16, with
2 being closest and 16 being the farthest away.
Default
The local clock is disabled by default.
Usage Guidelines
The internal local clock is configured as a clock source with a given stratum number. Because the local
clock is not as reliable as an external clock source with GPS or CDMA, the stratum number should be
higher than the stratum number of the external clock source to allow the system to acquire the most
reliable clock information from the clock source lists.
Example
The following command configures the local clock with a stratum number of 3:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Restricts a host or block of client IP addresses from getting NTP service. When NTP is enabled over a
VLAN, an NTP server is configured, or a broadcast NTP server is in a VLAN, the VLAN's IP block or NTP
server's IP address is automatically added into the system with a permit action.
Syntax Description
add Restricts a client from getting NTP service.
delete Removes a client from the restrict list.
network Specifies a host or block of IP addresses.
mask Specifies the subnet mask of the network.
permit Specifies that a particular block of client IP addresses is permitted to
get NTP service.
deny Specifies that a particular block of client IP addresses is denied NTP
service.
vr Specifies VRs for NTP service.
vr_name Specifies the VR name for allowing/denying NTP service. If no VR
name is specified, the current command context is used.
Default
All addresses are denied by default.
Usage Guidelines
N/A.
Example
The following command restricts a block of client IP addresses from getting NTP service:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an NTP server or peer.
Syntax Description
ip_address Specifies the IP address of the NTP server or peer.
host_name Specifies the host name of the NTP server or peer.
keyid Specifies the key ID as a value from 1 to 65534.
burst Follows the same burst mechanism when an NTP server is reachable.
initial-burst Allows the system to send six burst packets when an NTP server
becomes unreachable (discovered but unreachable).
vr Specifies VR.
vr_name Specifies the VR name. If no VR name is specified, the current
command context is used.
Default
If no VR name is specified, the current command context is used.
Usage Guidelines
The initial-burst option is useful when a fast time synchronization is required at the initial stage.
Example
The following command adds an NTP server named “Missouri” with key 5 and an initial burst:
configure ntp server add Missouri key 5 initial-burst
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes an NTP server or peer from external clock source lists.
Syntax Description
ip-address Specifies the IP address of the NTP server or peer.
host_name Specifies the host name of the NTP server or peer.
Default
N/A.
Usage Guidelines
N/A.
Example
The following command removes an NTP peer Missouri from external clock source lists
configure npt peer delete Missouri
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures BFD for OSPFv2.
Syntax Description
bfd Bidirectional forwarding detection.
on Turn on BFD for OSPF interface.
off Turn off BFD for OSPF interface.
Default
Off.
Usage Guidelines
Use this command to turn BFD protection on or off on a specific OSPF interface.
The following example configures BFD protection on for VLAN 1:
Example
configure ospf vlan1 bfd on
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Adds a virtual link connected to another ABR.
Syntax Description
router-identifier Specifies the router ID of the other end of the link.
area-identifier Specifies an OSPF area.
Default
N/A.
Usage Guidelines
A virtual link provides a logical path between the ABR of the disconnected area and the ABR of the
normal area that connects to the backbone. A virtual link must be established between two ABRs that
have a common area, with one ABR connected to the backbone. Specify the following:
• router-identifier—Far-end router interface number.
• area-identifier—Transit area used for connecting the two end-points. The transit area cannot have
the area identifier 0.0.0.0. and cannot be a stub area or an NSSA.
Example
The following command configures a virtual link between the two interfaces:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables OSPF on one or all VLANs (router interfaces).
Syntax Description
vlan-name Specifies a VLAN name.
all Specifies all VLANs.
area-identifier Specifies the area to which the VLAN is assigned.
passive Specifies to stop sending and receiving hello packets on this interface.
Default
Disabled.
Usage Guidelines
Not applicable.
Example
The following command enables OSPF on a VLAN named accounting:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the OSPF link type.
Syntax Description
vlan-name Specifies a VLAN name.
area-identifier Specifies the area to which the VLAN is assigned.
auto Specifies to automatically determine the OSPF link type based on the
interface type.
broadcast Specifies a broadcast link, such as Ethernet. Routers must elect a DR
and a BDR during synchronization.
point-to-point Specifies a point-to-point link type, such as PPP.
passive Specifies to stop sending and receiving packets on this interface.
Default
Auto.
Usage Guidelines
The passive parameter indicates that the router only synchronizes and listens, and does not originate or
send any new information on the interface.
Example
The following command configures the OSPF link type as automatic on a VLAN named accounting:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a range of IP addresses in an OSPF area to be aggregated.
Syntax Description
area-identifier Specifies an OSPF area.
ip-address Specifies an IP address
ip-mask Specifies a subnet mask.
ipNetmask Specifies IP address / Netmask.
advertise Specifies to advertise the aggregated range of IP addresses.
noadvertise Specifies not to advertise the aggregated range of IP addresses.
type-3 Specifies type 3 LSA, summary LSA.
type-7 Specifies type 7 LSA, NSSA external LSA.
Default
N/A.
Usage Guidelines
If advertised, the aggregated IP range is exported as a single LSA by the ABR.
Example
The following command is used to summarize a certain range of IP addresses within an area and export
them out as a single address:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a range of aggregated IP addresses in an OSPF area.
Syntax Description
area-identifier Specifies an OSPF area.
ip-address Specifies an IP address.
ip-mask Specifies a subnet mask.
ipNetmask Specifies IP address / Netmask.
Default
N/A.
Usage Guidelines
Not applicable.
Example
The following command deletes an aggregated IP address range:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an external filter policy.
Syntax Description
area-identifier Specifies the OSPF target area.
policy-map Specifies a policy.
none Specifies not to apply an external filter (removes the existing policy, if
any).
Default
N/A.
Usage Guidelines
For switches configured to support multiple OSPF areas (an ABR function), a policy can be applied to
an OSPF area that filters a set of OSPF external routes from being advertised into that area.
Example
The following command configures an external filter policy, nosales:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a global inter-area filter policy.
Syntax Description
area-identifier Specifies the OSPF target area.
policy-map Specifies a policy.
none Specifies not to apply an interarea filter.
Default
N/A.
Usage Guidelines
For switches configured to support multiple OSPF areas (an ABR function), a policy can be applied to
an OSPF area that filters a set of OSPF inter-area routes from being sourced from any other areas.
Example
The following command configures an inter-area filter policy, nosales:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an OSFP area as a normal area.
Syntax Description
area-identifier Specifies an OSPF area.
Default
Normal.
Usage Guidelines
A normal area is an area that is not any of the following:
• Stub area.
• NSSA.
Virtual links can be configured through normal areas. External routes can be distributed into normal
areas.
Example
The following command configures an OSPF area as a normal area:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an OSPF area as an NSSA.
Syntax Description
area-identifier Specifies an OSPF area.
summary Specifies that type-3 can be propagated into the area.
nosummary Specifies that type-3 cannot be propagated into the area.
cost Specifies a cost metric.
translate Specifies whether type-7 LSAs are translated into type-5 LSAs.
Default
N/A.
Usage Guidelines
NSSAs are similar to the existing OSPF stub area configuration option, but have the following two
additional capabilities:
• External routes originating from an ASBR connected to the NSSA can be advertised within the
NSSA.
• External routes originating from the NSSA can be propagated to other areas, including the
backbone area, if translated to type 5 LSAs.
When configuring an OSPF area as an NSSA, the translate option should only be used on NSSA border
routers, where translation is to be enforced. If translate is not used on any NSSA border router in a
NSSA, one of the ABRs for that NSSA is elected to perform translation (as indicated in the NSSA
specification). The option should not be used on NSSA internal routers. Doing so inhibits correct
operation of the election algorithm.
Example
The following command configures an OSPF area as an NSSA:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an OSPF area as a stub area.
Syntax Description
area-identifier Specifies an OSPF area.
summary Specifies that type-3 can be propagated into the area.
nosummary Specifies that type-3 cannot be propagated into the area.
cost Specifies a cost metric.
Default
N/A.
Usage Guidelines
A stub area is connected to only one other area. The area that connects to a stub area can be the
backbone area. External route information is not distributed into stub areas. Stub areas are used to
reduce memory and computation requirements on OSPF routers.
Example
The following command configures an OSPF area as a stub area:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the timers for all interfaces in the same OSPF area.
Syntax Description
area- Specifies an OSPF area.
identifier
retransmit- Specifies the length of time that the router waits before retransmitting an LSA that
interval is not acknowledged. The range is 1–3,600 seconds.
transit- Specifies the length of time it takes to transmit an LSA packet over the interface.
delay The range is 1–3,600 seconds.
hello- Specifies the interval at which routers send hello packets. The range is 1–65,535
interval seconds.
dead- Specifies the interval after which a neighboring router is declared down due to the
interval fact that hello packets are no longer received from the neighbor. The range is 1–
2,147,483,647 seconds.
wait-timer- Specifies the interval between the interface coming up and the election of the DR
interval and BDR. Usually equal to the dead timer interval.
Default
• retransmit interval—Default: 5
• transit delay—Default: 1
• hello interval—Default: 10
• dead interval—Default: 40
• wait timer interval—Default: dead interval
Usage Guidelines
Configuring OSPF timers on a per-area basis is a shorthand for applying the timers and authentication
to each VLAN in the area at the time of configuration. If you add more VLANs to the area, you must
configure the timers and authentication for the new VLANs explicitly.
Example
The following command sets the timers in area 0.0.0.2:
# configure ospf area 0.0.0.2 timer 10 1 20 200
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the AS-external LSA limit and overflow duration associated with OSPF database overflow
handling.
Syntax Description
number Specifies the number of external routes that can be held in a link-state
database.
seconds Specifies a duration for which the system has to remain in the
overflow state.
Default
The default for timeout is 0, which indicates that once the router goes into overflow state, it stays there
until OSPF is disabled and then re-enabled.
Usage Guidelines
Not applicable.
Example
The following command configures the AS-external LSA limit and overflow duration:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Aggregates AS-external routes in a specified address range.
Syntax Description
ipaddress Specifies an IP address.
ip-mask Specifies a subnet mask.
ipNetmask Specifies IP address / Netmask.
cost Specifies a metric that will be given to the summarized route.
tag Specifies an OSPF external route tag.
Default
N/A.
Usage Guidelines
This command is only valid on an ASBR.
Example
The following command summarizes AS-external routes:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is availablSe on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes an aggregated OSPF external route.
Syntax Description
ip-address Specifies an IP address.
ip-mask Specifies a subnet mask.
ipNetmask Specifies IP address / Netmask.
Default
N/A.
Usage Guidelines
This command is only valid on an ASBR.
Example
The following command deletes the aggregated AS-external route:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Specifies the authentication password (up to eight characters) or RSA Data Security, Inc. MD5 Message-
Digest Algorithm key for one or all interfaces in a specific area or a virtual link.
Syntax Description
vlan-name Specifies a VLAN name.
all Specifies all VLANs
router- Specifies the router ID of the remote router.
identifier
area-identifier Specifies an OSPF area.
encrypted Indicates that the password (or key) is already encrypted (do not use this
option).
simple-password Specifies an authentication password (up to 8 ASCII characters).
md5_key_id Specifies a RSA Data Security, Inc. MD5 Message-Digest Algorithm key, from
0-255.
md5_key Specifies a numeric value from 0-65,536. Can also be alphanumeric, up to 26
characters.
none Disables authentication.
Default
N/A.
Usage Guidelines
The md5_key is a numeric value with the range 0 to 65,536 or alphanumeric. When the OSPF area is
specified, authentication information is applied to all OSPF interfaces within the area.
The encrypted option is used by the switch when generating a configuration file and when parsing a
switch-generated configuration file. Do not select the encrypted option in the CLI.
Example
The following command configures RSA Data Security, Inc. MD5 Message-Digest Algorithm
authentication on the VLAN subnet_26:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the cost metric of one or all interface(s) or an area.
Syntax Description
area-identifier Specifies an OSPF area.
vlan-name Specifies a VLAN name.
all Specifies all VLANs.
automatic Determine the advertised cost from the OSPF metric table.
cost Specifies the cost metric.
Default
The default cost is automatic.
Usage Guidelines
The range is 1 through 65535.
Example
The following command configures the cost metric of the VLAN accounting:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes a virtual link.
Syntax Description
router-identifier Specifies the router ID of the other end of the link.
area-identifier Specifies an OSPF area.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes a virtual link:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables OSPF on one or all VLANs (router interfaces).
Syntax Description
vlan-name Specifies a VLAN name.
all Specifies all VLANs.
Default
N/A.
Usage Guidelines
Not applicable.
Example
The following command disables OSPF on VLAN accounting:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the import policy for OSPF.
Syntax Description
policy-map Specifies the policy.
Default
No policy.
Usage Guidelines
An import policy is used to modify route attributes while adding OSPF routes to the IP route table. This
command provides the flexibility of using import policy to determine the routes to be added to or
removed from the routing table. In order to prevent a route being added to the routing table, the policy
file must contain a matching rule with action “deny”. If there is no matching rule for a particular route, or
the keyword “deny” is missing in the rule, the default action is “permit”, which means that route will be
installed into the routing table.
If a policy rule set the cost to be greater than 65535, OSPF limits the metric of any matching routes to
be 65535.
Example
The following example applies the policy campuseast to OSPF routes:
History
This command was first available in ExtremeXOS 10.1.
Beginning in ExtremeXOS 15.7, this command allows Import Policy to be used by OSPFv2 to install
routes selectively into the switch routing table.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the OSPF LSA batching interval.
Syntax Description
seconds Specifies a time in seconds.
Default
The default setting is 30 seconds.
Usage Guidelines
The range is between 0 (disabled) and 600 seconds, using multiples of 5 seconds. The LSAs added to
the LSDB during the interval are batched together for refresh or timeout.
Example
The following command configures the OSPF LSA batch interval to a value of 100 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the automatic interface costs for 10 Mbps, 100 Mbps, and 1 Gbps interfaces, and optionally,
the 2.5 Gbps, 5 Gbps, 10 Gbps, 25 Gbps, 40 Gbps, 50 Gbps, and 100 Gbps interfaces.
Syntax Description
cost Specifies the interface cost for the indicated interfaces.
Default
• 10 Mbps—The default cost is 10.
• 100 Mbps—The default cost is 5.
• 1 Gbps—The default cost is 4.
• 2.5 Gbps—The default cost is 3.
• 5 Gbps—The default cost is 3.
• 10 Gbps—The default cost is 2.
• 25 Gbps—The default cost is 2.
• 40 Gbps—The default cost is 2.
Usage Guidelines
Not applicable.
Example
The following command configures the automatic interface costs for 10 Mbps, 100 Mbps, and 1 Gbps
interfaces:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the priority used in the designated router and backup designated router election algorithm
for one or all OSPF interface(s) or for all the interfaces within the area.
Syntax Description
area-identifier Specifies an OSPF area.
vlan-name Specifies a VLAN name.
all Specifies all VLANs.
priority Specifies a priority range. The range is 0 through 255.
Default
The default setting is 1.
Usage Guidelines
The range is 0 through 255, and the default setting is 1. Setting the value to 0 ensures that the router is
never selected as the designated router or backup designated router.
Example
The following command sets all the interfaces in area 1.2.3.4 to not be selected as the designated router:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the grace period sent out in Grace-LSAs and used by a restarting router.
Syntax Description
seconds Grace period, in seconds. The default value is 120 seconds. Range is 1
to 1800 seconds.
Default
The default is 120 seconds.
Usage Guidelines
This command configures the grace period sent out to helper neighbor routers and used by the
restarting router. The value of the grace period must be greater that the dead interval, and less than the
LSA refresh time.
Example
The following command configures a router to send LSAs with a 240 second grace period during
graceful OSPF restarts:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the router as a graceful OSPF restart router.
Syntax Description
none Do not act as a graceful OSPF restart router.
planned Only act as a graceful OSPF restart router for planned restarts.
unplanned Only act as a graceful OSPF restart router for unplanned restarts.
both Act as a graceful OSPF restart router for both planned and unplanned
restarts.
Default
The default is none.
Usage Guidelines
This command configures the router as a graceful OSPF router. When configured for planned restarts, it
will advertise Grace-LSAs before restarting (for example, during an upgrade of the OSPF module).
When configured for unplanned restarts, it will advertise Grace-LSAs after restarting but before sending
any Hellos. When configured for both, the router will advertise restarting regardless of whether the
restart was planned or unplanned.
Example
The following command configures a router to perform graceful OSPF restarts only for planned restarts:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the router as a graceful OSPF restart helper router.
Syntax Description
all Specifies all VLANs
vlan-name Specifies a VLAN name.
area-identifier Specifies an OSPF area.
router- Specifies the router ID of the remote router of the virtual link.
identifier
none Do not act as a graceful OSPF restart helper router.
planned Only act as a graceful OSPF restart helper router for planned restarts.
unplanned Only act as a graceful OSPF restart helper router for unplanned restarts.
both Act as a graceful OSPF restart helper router for both planned and unplanned
restarts.
Default
The router default is none.
Usage Guidelines
This command configures the router as a graceful OSPF restart helper router for a single or multiple
routers. When the router is acting as a helper, it will continue to advertise the restarting router as if it
was fully adjacent.
One OSPF interface may not help more than one restarting router. An OSPF interface may not enter
helper mode when the router is performing a graceful restart. All the interfaces to a neighbor router
must be configured as graceful restart helpers, or the router will not support graceful restart for its
neighbor.
Example
The following command configures a router to be a graceful OSPF helper router for planned restarts for
all routers in area 10.20.30.40:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the OSPF router ID. If automatic is specified, the switch uses the highest IP interface address
as the OSPF router ID.
Syntax Description
automatic Specifies to use automatic addressing.
router-identifier Specifies a router address.
Default
Automatic.
Usage Guidelines
Each switch that is configured to run OSPF must have a unique router ID. It is recommended that you
manually set the router ID of the switches participating in OSPF, instead of having the switch
automatically choose its router ID based on the highest interface IP address. Not performing this
configuration in larger, dynamic environments could result in an older link-state database remaining in
use.
Note
Do not set the router ID to 0.0.0.0.
Example
The following command sets the router ID:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the minimum number of seconds between Shortest Path First (SPF) recalculations.
Syntax Description
seconds Specifies a time in seconds. The range is 0 to 300 seconds.
Default
3 seconds.
Usage Guidelines
Not applicable.
Example
The following command configures the minimum number of seconds between Shortest Path First (SPF)
recalculations:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the timers for a virtual link.
Syntax Description
router- Specifies the router ID of the other end of the link.
identifier
area-identifier Specifies an OSPF area.
retransmit- Specifies the length of time that the router waits before retransmitting an LSA
interval that is not acknowledged. The range is 1–3,600 seconds.
transit-delay Specifies the length of time it takes to transmit an LSA packet over the
interface. The range is 1–3,600 seconds.
hello-interval Specifies the interval at which routers send hello packets. The range is 1–
65,535 seconds.
dead-interval Specifies the interval after which a neighboring router is declared down due to
the fact that hello packets are no longer received from the neighbor. The range
is 1–2,147,483,647 seconds.
Default
• retransmit interval—Default: 5
• transit delay—Default: 1
• hello interval—Default: 10
• dead interval—Default: 40
• wait timer interval—Default: dead interval
Usage Guidelines
Configuring OSPF timers on a per-area basis is a shorthand for applying the timers and authentication
to each VLAN in the area at the time of configuration. If you add more VLANs to the area, you must
configure the timers and authentication for the new VLANs explicitly.
Example
The following command sets the timers on the virtual link in area 0.0.0.2 and remote router ID 6.6.6.6:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Associates a VLAN (router interface) with an OSPF area. By default, all router interfaces are associated
with area 0.0.0.0.
Syntax Description
vlan-name Specifies a VLAN name.
area-identifier Specifies an OSPF area.
Default
Area 0.0.0.0
Usage Guidelines
Any OSPF network that contains more than one area is required to have an area configured as area 0,
also called the backbone. All areas in an autonomous system must be connected to the backbone.
When designing networks, you should start with area 0, and then expand into other areas.
The backbone allows summary information to be exchanged between ABRs. Every ABR hears the area
summaries from all other ABRs. The ABR then forms a picture of the distance to all networks outside of
its area by examining the collected advertisements, and adding in the backbone distance to each
advertising router.
When a VLAN is configured to run OSPF, by default you must assign it to an area.
Example
The following command associates the VLAN accounting with an OSPF area:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the IP address of a point-to-point neighbor.
Syntax Description
vlan-name Specifies a VLAN name.
ip-address Specifies an IP address.
Default
N/A.
Usage Guidelines
None.
Example
The following command configures the IP address of a point-to-point neighbor:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes the IP address of a point-to-point neighbor.
Syntax Description
vlan-name Specifies a VLAN name.
ip-address Specifies an IP address.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes the IP address of a point-to-point neighbor:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the OSPF wait interval for a VLAN or all VLANs.
Syntax Description
vlan-name Specifies a VLAN name.
all Specifies all VLANs.
retransmit- Specifies the length of time that the router waits before retransmitting an LSA
interval that is not acknowledged. The range is 1–3,600.
transit-delay Specifies the length of time it takes to transmit an LSA packet over the
interface. The range is 1–3,600 seconds.
hello-interval Specifies the interval at which routers send hello packets. The range is 1–
65,535 seconds.
dead-interval Specifies the interval after which a neighboring router is declared down due to
the fact that hello packets are no longer received from the neighbor. The range
is 1–2,147,483,647.
wait-timer- Specifies the interval between the interface coming up and the election of the
interval DR and BDR. Usually equal to the dead timer interval.
Default
• retransmit interval—5 seconds.
• transit delay—1 second.
• hello interval—10 seconds.
• dead interval—40 seconds.
• wait timer interval—dead interval.
Usage Guidelines
Specify the following:
• retransmit interval—If you set an interval that is too short, unnecessary retransmissions will result.
• transit delay—The transit delay must be greater than 0.
• hello interval—Smaller times allow routers to discover each other more quickly, but also increase
network traffic.
Example
The following command configures the OSPF wait interval on the VLAN accounting:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables OSPFv3 on all VLANs or all tunnels (router interfaces).
Syntax Description
all Specifies all IPv6 configured VLANs or all IPv6 tunnels.
instanceId Specifies the instance ID for these interfaces. Range is 0 to 255.
area_identifier Specifies the area to which the interfaces are assigned.
passive Specifies to stop sending and receiving hello packets on this interface.
Default
OSPFv3 is disabled on the interfaces.
Usage Guidelines
This command is used to enable the OSPFv3 protocol on all IPv6 configured VLANs or all IPv6 tunnels.
The instance ID is used to control the selection of other routers as neighbors. The router will become a
neighbor only with routers that have the same instance ID.
To change the instance ID associated with an interface, you must first remove the interface from the
OSPFv3 area and then add it back with a different instance ID.
The passive parameter indicates that the router only synchronizes and listens, and does not originate or
send any new information on the interface.
Example
The following command enables OSPFv3 on all IPv6 tunnels:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Syntax Description
Enables OSPFv3 on an interface.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
instanceId Specifies the instance ID for this interfaces. Range is 0 to 255.
area_identifier Specifies the area to which the VLAN is assigned.
auto Specifies to automatically determine the OSPFv3 link type based on
the interface type.
broadcast Specifies a broadcast link, such as Ethernet. Routers must elect a DR
and a BDR during synchronization.
Default
The default link-type is Auto.
Usage Guidelines
This command is used to enable the OSPFv3 protocol on an IPv6 configured VLAN or an IPv6 tunnel.
The instance ID is used to control the selection of other routers as neighbors. The router will become a
neighbor only with routers that have the same instance ID.
To change the instance ID associated with an interface, you must first remove the interface from the
OSPFv3 area and then add it back with a different instance ID.
The passive parameter indicates that the router only synchronizes and listens, and does not originate or
send any new information on the interface.
Enable IPv6 forwarding before enabling OSPFv3; otherwise, you will receive a warning message.
You cannot change the link-type value while OSPFv3 is enabled on the interface.
Example
The following example adds the VLAN accounting (enabling OSPFv3 on the interface), to the area
0.0.0.1 with an instance ID of 2:
configure ospfv3 add vlan accounting instance-id 2 area 0.0.0.1 link-type auto
History
This command was first available in ExtremeXOS 11.2.
The broadcast and point-to-point link-type keywords were supported in ExtremeXOS 15.7.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a virtual link connected to another ABR.
Syntax Description
router_identifier Specifies the router ID of the other end of the link.
area_identifier Specifies the transit area identifier, a four-byte, dotted decimal
number.
Default
N/A.
Usage Guidelines
A virtual link provides a logical path between the ABR of the disconnected area and the ABR of the
normal area that connects to the backbone. A virtual link must be established between two ABRs that
have a common area, with one ABR connected to the backbone. Specify the following:
• router_identifier—Far-end router identifier, a four-byte, dotted decimal number.
• area_identifier—Transit area used for connecting the two end-points. The transit area cannot
have the area identifier 0.0.0.0. and cannot be a stub area or an NSSA.
Example
The following command configures a virtual link with router ID 10.1.2.1 through the transit area 10.1.0.0:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a range of IPv6 addresses in an OSPFv3 area to be aggregated.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
ipv6netmask Specifies an IPv6 address / prefix length.
advertise Specifies to advertise the aggregated range of IPv6 addresses.
noadvert Specifies not to advertise the aggregated range of IPv6 addresses.
inter-prefix Specifies aggregate, inter-area-prefix LSAs.
nssa NSSA LSAs.
Default
No OSPFv3 inter-area-prefix LSAs are configured.
Usage Guidelines
If advertised, the aggregated IPv6 range is exported as a single LSA by the ABR.
Example
The following command is used to summarize a certain range of IPv6 addresses within an area and
export them out as a single address to area 0.0.0.1:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the cost of sending a packet to all interfaces belonging to an area.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
automatic Determine the advertised cost from the OSPFv3 metric table.
cost Specifies the cost metric. Range is 1 to 65535.
Default
The default cost is automatic.
Usage Guidelines
Use this command to set the cost of the links belonging to area manually, if the default cost needs to be
overwritten. The interface cost is advertised as the link cost in router-LSA.
Example
The following command configures the cost of area 0.0.0.1 to 10. All the links of this area will inherit the
area's cost value of 10.
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes a range of IPv6 addresses in an OSPFv3 area to be aggregated.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
ipv6netmask Specifies an IPv6 address / prefix length.
inter-prefix Inter-Area-Prefix LSAs.
nssa NSSA LSAs.
Default
No OSPFv3 inter-area-prefix LSAs are configured.
Usage Guidelines
If you attempt to delete a range that was not configured, you receive an error message.
Example
The following command is used to delete a summary network from area 0.0.0.1:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an external filter policy.
Syntax Description
area_identifier Specifies the OSPFv3 target area.
policy_map Specifies a policy.
none Specifies not to apply an external filter (removes the existing policy, if any).
Default
N/A.
Usage Guidelines
For switches configured to support multiple OSPFv3 areas (an ABR function), a policy can be applied to
an OSPFv3 area that filters a set of OSPFv3 external routes from being advertised into that area, in
other words, filtering some of the inbound AS-external-LSAs.
OPSFv3 routers that do not have enough memory to hold the entire AS-external-LSAa should configure
an external area filter to drop part of the external-LSAs. Configuring this policy will enable routers with
limited resources to be put into an OSPFv3 network.
Policy files for this command will only recognize the following policy attributes:
• Match attributes:
◦ nlri IPv6-address/mask-len
• Action (set) attributes
◦ permit
◦ deny
Any other policy attribute will not be recognized and will be ignored.
entry one {
if match any{
nlri 2001:db8:3e5c::/48;
nlri 2001:db8:2146:2341::/64;
} then {
deny;
}
}
Example
The following command configures an external filter policy, nosales for area 1.2.3.4:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an inter-area filter policy.
Syntax Description
area_identifier Specifies the OSPFv3 target area.
policy_map Specifies a policy.
none Specifies not to apply an inter-area filter (removes the existing policy,
if any).
Default
N/A.
Usage Guidelines
ExtremeXOS OSPFv3 can apply an inter-area policy to filter some inter-area-prefix-LSAs and inter-area-
router-LSAs from other areas. This can reduce the size of link state database of routers belonging to the
area.
Policy files for this command will only recognize the following policy attributes:
• Match attributes:
◦ nlri IPv6-address/mask-len
• Action (set) attributes:
◦ permit
◦ deny
Any other policy attribute will not be recognized and will be ignored.
entry one {
if match any{
nlri 2001:db8:3e5c::/48;
nlri 2001:db8:2146:2341::/64;
} then {
deny;
}
}
entry two {
if match any{
nlri 2001:db8:444::/48;
nlri 2001:db8:541f:65bd::/64;
} then {
permit;
}
}
Example
The following command configures an inter-area filter policy, nosales for area 1.2.3.4:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an OSPFv3 area as a normal area.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
Default
Normal.
Usage Guidelines
A normal area is an area that is not any of the following:
• Stub area
• NSSA
Virtual links can be configured through normal areas. External routes can be distributed into normal
areas.
Example
The following command configures an OSPFv3 area as a normal area:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
NSSAs are similar to the OSPFv3 stub area configuration option, but have the following two additional
capabilities:
• External routes originating from an ASBR connected to the NSSA can be advertised within the
NSSA.
• External routes originating within the NSSA can be propagated to other areas if translated to AS-
external LSAs. When configuring an OSPFv3 area as an NSSA, the translate option should only be
used on NSSA border routers, where translation is to be enforced. If translate is not used on any
NSSA border router, one of the ABRs for that NSSA is elected to perform translation.
Syntax Description
area-identifier Area identifier.
nosummary Inter-Area-Prefix LSAs prohibited.
summary Inter-Area-Prefix LSAs allowed.
cost Route metric.
translate Always translate NSSA LSAs to AS-external LSAs.
Default
None.
Usage Guidelines
This command must specify the cost of the default route advertised into the NSSA.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the priority used in the designated router and backup designated router election algorithm
for all the interfaces within the area.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
priority Specifies a priority range. The range is 0 through 255.
Default
The default setting is 1.
Usage Guidelines
When two routers are attached to a network, both attempt to become the designated router. The one
with the higher priority takes precedence. If there is a tie, the router with the higher router ID takes
precedence. Setting the value to 0 ensures that the router is never selected as the designated router or
backup designated router.
Example
The following command sets all the interfaces in area 1.2.3.4 to not be selected as the designated router:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document. On switches with Core license, the non-zero
interface priority will take effect; on switches with Advanced Edge license, the default interface priority
is 0.
Description
Configures an OSPFv3 area as a stub area.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
summary Specifies that inter-area LSAs can be propagated into the area.
nosummary Specifies that inter-area LSAs cannot be propagated into the area.
cost Specifies a cost metric.
Default
N/A.
Usage Guidelines
A stub area is connected to only one other area. The area that connects to a stub area can be the
backbone area. External route information is not distributed into stub areas. Stub areas are used to
reduce memory consumption requirements on OSPFv3 routers.
Example
The following command configures an OSPFv3 area as a stub area:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the timers for all interfaces in the same OSPFv3 area.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
retransmit_interval Specifies the length of time that the router waits before retransmitting
an LSA that is not acknowledged. The range is 1 to 1,800 seconds.
transit_delay Specifies the length of time it takes to transmit an LSA packet over
the interface. The range is 1 to 1,800 seconds.
hello_interval Specifies the interval at which routers send hello packets. The range is
1 to 65,535 seconds.
dead_interval Specifies the interval after which a neighboring router is declared
down due to the fact that hello packets are no longer received from
the neighbor. The range is 1 to 65,535 seconds.
Default
• Retransmit interval—Default: 5 seconds
• Transit delay—Default: 1 second
• Hello interval—Default: 10 seconds
• Dead interval—Default: 40 seconds
Usage Guidelines
Configuring OSPFv3 timers on a per-area basis is a shorthand for applying the timers to each VLAN and
tunnel in the area at the time of configuration. If you add more VLANs or tunnels to the area, you must
configure the timers for them explicitly.
The value of the dead interval and the hello interval must be same for all OSPFv3 routers connected to a
common link. The value of the dead interval and the hello interval are advertised by OSPFv3 in Hello
packets. The shorter the hello interval, the earlier topological changes will be detected, but more
routing traffic will ensue.
The retransmit interval must be greater than the expected round trip delay between any two routers on
the attached network. The setting of this parameter must be conservative, or needless retransmission
will result.
Note
The wait interval for the interface is not separately configurable. It is always equal to the dead
interval.
Example
The following command sets the timers in area 0.0.0.2:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures BFD for OSPFv3.
Syntax Description
bfd Bidirectional forwarding detection
on Turn on BFD for OSPFv3 interface.
off Turn off BFD for OSPFv3 interface.
Default
Off.
Usage Guidelines
Use this command to turn on or off BFD protection on a specific OSPFv3 interface.
The following example configures BFD protection on for VLAN 1:
Example
# configure ospfv3 vlan1 bfd on
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Disables OSPFv3 on one or all VLANs or tunnels (router interfaces).
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all VLANs, or tunnels.
Default
N/A.
Usage Guidelines
None.
Example
The following command disables OSPFv3 on VLAN accounting:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a virtual link connected to another ABR.
Syntax Description
router_identifier Specifies the router ID of the other end of the link.
area_identifier Specifies the transit area identifier, a four-byte, dotted decimal
number.
Default
N/A.
Usage Guidelines
A virtual link provides a logical path between the ABR of the disconnected area and the ABR of the
normal area that connects to the backbone. A virtual link must be established between two ABRs that
have a common area, with one ABR connected to the backbone. Specify the following:
• Router-identifier—Far-end router identifier, a four-byte, dotted decimal number.
• Area-identifier—Transit area used for connecting the two end-points. The transit area cannot have
the area identifier 0.0.0.0. and cannot be a stub area or an NSSA.
Example
The following command deletes a virtual link with router ID 10.1.2.1 through the transit area 10.1.0.0:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the import policy for OSPFv3.
Syntax Description
policy_map Specifies the policy.
Default
No policy.
Usage Guidelines
An import policy is used to modify route attributes while adding OSPFv3 routes to the IPv6 route table.
This command provides the flexibility of using import policy to determine the routes to be added to or
removed from the routing table. In order to prevent a route being added to the routing table, the policy
file must contain a matching rule with action “deny”. If there is no matching rule for a particular route, or
the keyword “deny” is missing in the rule, the default action is “permit”, which means that route will be
installed into the routing table.
Policy files for this command will recognize only the following policy attributes:
• Match attributes:
◦ nlri IPv6-address/mask-len
◦ route-origin [ospf | ospf-extern1 | ospf-extern2 | ospf-inter | ospf-intra]
• Action (set) attributes
◦ cost cost
◦ tag number
◦ deny
Any other policy attribute will not be recognized and will be ignored.
Example
The following example applies the policy campuseast to OSPFv3 routes:
History
This command was first available in ExtremeXOS 11.2.
Beginning in ExtremeXOS 15.7, this command allows Import Policy to be used by OSPFv3 to install
routes selectively into the switch routing table.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Moves an interface from one OSPFv3 area to another.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
Default
N/A.
Usage Guidelines
Use this command to move an already configured interface from one area to another. The instance ID
associated with the interface will be unchanged.
Example
The following command moves the VLAN accounting to the OSPFv3 area 0.0.0.6:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the cost of one or all interface(s).
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all IPv6 configured VLANs or all IPv6 tunnels.
automatic Determine the advertised cost from the OSPFv3 metric table.
cost Specifies the cost metric. Range is 1 to 65535.
Default
The default cost is automatic.
Usage Guidelines
Use this command to set the cost of an interface (a VLAN or tunnel) manually, if the default cost needs
to be overwritten. The interface cost is advertised as the link cost in router-LSA.
Example
The following command configures the cost metric of the VLAN accounting:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the priority used in the designated router and backup designated router election algorithm
for one or all OSPFv3 interface(s).
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all IPv6 configured VLANs or all IPv6 tunnels.
priority Specifies a priority range. The range is 0 through 255.
Default
The default setting is 1.
Usage Guidelines
When two routers are attached to a network, both attempt to become the designated router. The one
with the higher priority takes precedence. If there is a tie, the router with the higher router ID takes
precedence. Setting the value to 0 ensures that the router is never selected as the designated router or
backup designated router.
Example
The following command sets the priority of the interface VLAN corporate to 10:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document. On switches with Core license, the non-zero
interface priority will take effect; on switches with Advanced Edge license, the default interface priority
is 0.
Description
Configures the timers for all interfaces in the same OSPFv3 area.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all IPv6 configured VLANs or all IPv6 tunnels.
retransmit_interval Specifies the length of time that the router waits before retransmitting
an LSA that is not acknowledged. The range is 1 to 3600 seconds.
transit_delay Specifies the length of time it takes to transmit an LSA packet over
the interface. The range is 1 to 3600 seconds.
hello_interval Specifies the interval at which routers send hello packets. The range is
1 to 65535 seconds.
dead_interval Specifies the interval after which a neighboring router is declared
down due to the fact that hello packets are no longer received from
the neighbor. The range is 1 to 65535 seconds.
Default
• Retransmit interval—Default: 5 seconds.
• Transit delay—Default: 1 second.
• Hello interval—Default: 10 seconds.
• Dead interval—Default: 40 seconds.
Usage Guidelines
Use this command to configure the OSPFv3 timers on a per-interface basis.
The value of the dead interval and the hello interval must be same for all OSPFv3 routers connected to a
common link. The value of the dead interval and the hello interval are advertised by OSPFv3 in Hello
packets. The shorter the hello interval, the earlier topological changes will be detected, but more
routing traffic will ensue.
The retransmit interval must be greater than the expected round trip delay between any two routers on
the attached network. The setting of this parameter must be conservative, or needless retransmission
will result.
Note
The wait interval for the interface is not separately configurable. It is always equal to the dead
interval.
Example
The following command sets the timers for the VLAN corporate:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures the LSA batch interval. LSAs added during this interval are batched together
for update.
Syntax Description
seconds Interval in seconds. Range is 0 to 600. (Default 0, not batched).
Default
0.
Usage Guidelines
The range is 0 to 600 seconds.
Example
The following example shows the output of the show ospfv3 command including the LSA batch
interval output:
# show ospfv3
OSPFv3 : Disabled RouterId : 0.0.0.0
RouterId Selection : Automatic ASBR : No
ABR : No ExtLSAs : 0
ExtLSAChecksum : 0x0 OriginateNewLSAs : 0
ReceivedNewLSAs : 0 SpfHoldTime : 3s
Num of Areas : 1 LSA Batch Interval : 0s
10M Cost : 100 100M Cost : 50
1000M Cost (1G) : 40 2500M Cost (2.5G) : 40
5000M Cost (5G) : 40 10000M Cost (10G) : 20
25000M Cost (25G) : 20 40000M Cost (40G) : 20
50000M Cost (50G) : 20 100000M Cost (100G) : 10
Graceful Restart : None Grace Period : 120s
Import Policy File : none
SNMP Traps : Disabled
Redistribute:
Protocol Status Cost Type Tag Policy
direct Disabled 20 2 --- none
e-bgp Disabled 20 2 --- none
i-bgp Disabled 20 2 --- none
ripng Disabled 20 2 --- none
static Disabled 20 2 --- none
isis-level-1 Disabled 20 2 --- none
isis-level-2 Disabled 20 2 --- none
isis-level-1-external Disabled 20 2 --- none
isis-level-2-external Disabled 20 2 --- none
host-mobility Disabled 20 2 --- none
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the optional interface costs for 10 Mbps, 100 Mbps, 1 Gbps. 2.5 Gbps, 5 Gbps, 10 Gbps, 25
Gbps 40 Gbps, 50 Gbps, and 100 Gbps interfaces.
Syntax Description
cost_x Specifies the interface cost for the indicated interfaces. Range is 1 to
65535.
Default
• 10 Mbps—The default cost is 100.
• 100 Mbps—The default cost is 50.
• 1 Gbps—The default cost is 40.
• 2.5 Gbps—The default cost is 40.
• 5 Gbps—The default cost is 40.
• 10 Gbps—The default cost is 20.
• 25 Gbps—The default cost is 20.
• 40 Gbps—The default cost is 20.
• 50 Gbps—The default cost is 20.
• 100 Gbps—The default cost is 10.
Usage Guidelines
The value of the costs cannot be greater for higher speed interfaces. In other words, the following
condition must be true:
cost_10m >= cost_100m >= cost_1g >= cost_2.5g >= cost_5g cost_10g >= cost_25g >= cost_40g >=
cost_50g >= cost_100g
Example
The following command configures the automatic interface costs for 10 Mbps, 100 Mbps, 1 Gbps, 2.5
Gbps, 5 Gbps, 10 Gbps, 25 Gbps, 40 Gbps, 50 Gbps, and 100 Gbps interfaces:
configure ospfv3 metric-table 10M 110 100M 70 1G 50 2.5G 45 5G 40 10G 35 25G 30 40G 25
50G 20 100G 15
The following example displays the output of the show ospfv3 command:
# show ospfv3
OSPFv3 : Disabled RouterId : 0.0.0.0
RouterId Selection : Automatic ASBR : No
ABR : No ExtLSAs : 0
ExtLSAChecksum : 0x0 OriginateNewLSAs : 0
ReceivedNewLSAs : 0 SpfHoldTime : 3s
Num of Areas : 1 LSA Batch Interval : 0s
10M Cost : 110 100M Cost : 70
1000M Cost (1G) : 50 2500M Cost (2.5G) : 45
5000M Cost (5G) : 40 10000M Cost (10G) : 35
25000M Cost (25G) : 30 40000M Cost (40G) : 25
50000M Cost (50G) : 20 100000M Cost (100G) : 15
Graceful Restart : None Grace Period : 120s
Import Policy File : none
SNMP Traps : Disabled
Redistribute:
History
This command was first available in ExtremeXOS 11.2.
The 2.5G, 5G, 25G and 50G speeds were added in ExtremeXOS 22.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures the graceful restart behavior the router.
Syntax Description
none Disable graceful restart.
planned Support planned restart only.
unplanned Support unplanned restart only.
both Support both planned and unplanned restart.
Default
Graceful restart is disabled by default.
Usage Guidelines
When configured for planned restarts, it will support planned restarts (like process restart) and
advertise Grace LSAs before restarting. When configured for unplanned restarts, it will support
unplanned restarts (like failover in a stack) and advertise Grace LSAs after restarting but before sending
any Hellos. When configured for both, the router will support both planned and unplanned restarts.
Unplanned restarts and BFD configuration on interfaces are incompatible in ExtremeXOS. If both are
enabled, an unplanned restart will fail.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the grace period sent out in Grace LSAs and used by a restarting router.
Syntax Description
seconds Interval in seconds. Range is 1 to 1800.
Default
The default grace period is 120 seconds.
Usage Guidelines
The range is 1 to 1800 seconds. The grace period should be greater than hello interval and router dead
interval of the OSPFv3 interfaces on the router.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures graceful restart helper mode behavior of OSPFv3 interfaces for its neighbors.
When an interface is acting as a helper, it will continue to advertise the restarting router as if it was fully
adjacent.
Syntax Description
vlan
all Variable description, available options, and notes.
vlan-name VLAN name.
area OSPFv3 area.
area-identifier Area identifier.
none Disable helper mode.
planned Support planned restart only.
unplanned Support unplanned restart only.
both Support both planned and unplanned restart.
Default
Restart helper mode is disabled by default.
Usage Guidelines
When the area option is used the command applies to all interfaces in the area at that time. One
OSPFv3 interface may not help more than one restarting router at a time. An OSPFv3 interface may not
enter helper mode when the router is performing a graceful restart. All the interfaces to a neighbor
router must be configured as graceful restart helpers, or the router will not support graceful restart for
its neighbor.
Restart Helper mode is displayed in the show ospfv3 interfaces detail output.
Interface ID : 19 Instance ID : 0
State : P2P Number of state chg : 1
Hello due in : 7s Number of events : 2
Total Num of Nbrs : 1 Nbrs in FULL State : 1
Hellos Rxed : 127733 Hellos Txed : 127739
DB Description Rxed : 4 DB Description Txed : 3
LSA Request Rxed : 1 LSA Request Txed : 1
LSA Update Rxed : 2121 LSA Update Txed : 6156
LSA Ack Rxed : 5962 LSA Ack Txed : 2121
In Discards : 0
DR RtId : 0.0.0.0 BDR RtId : 0.0.0.0
Restart Helper : Both
Restart Helper Strict LSA Checking: Enabled
BFD Protection : Off
Neighbors:
RtrId: 10.1.1.1 IpAddr: fe80::204:96ff:fe51:ea8e Pri: 1 Type: Auto
State: FULL DR: 0.0.0.0 BDR: 0.0.0.0 Dead Time: 00:00:31
Options: 0x13 (-|R|-|-|E|V6) Opaque LSA: No
Restart Helper Status: Off
Last Restart Helper Exit Reason: None
BFD Session State: None
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the OSPFv3 router ID. If automatic is specified, the switch uses the highest IPv4 interface
address as the OSPFv3 router ID.
Syntax Description
automatic Specifies to use automatic addressing.
router_identifi Specifies a router identifier, a four-byte, dotted decimal number.
er
Default
Automatic.
Usage Guidelines
Each switch that is configured to run OSPFv3 must have a unique router ID. The router ID is a four-byte,
dotted decimal number, like an IPv4 address. Even though the IP address format has changed from IPv4
to IPv6, the router ID format has not. It is recommended that you manually set the router ID of the
switches participating in OSPFv3, instead of having the switch automatically choose its router ID based
on the highest interface IPv4 address (if it exists). Not performing this configuration in larger, dynamic
environments could result in an older link-state database remaining in use.
Note
Do not set the router ID to 0.0.0.0.
Example
The following command sets the router ID to 10.1.6.1:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the minimum number of seconds between Shortest Path First (SPF) recalculations.
Syntax Description
spf-hold-time SPF hold time.
seconds Specifies a time in seconds. The range is 0 to 300 seconds.
Default
3 seconds.
Usage Guidelines
Setting the interval too high will force OSPFv3 to run SPF calculations less frequently. This will reduce
the CPU load, but will cause delay in routes getting updated in the IPv6 routing table. Setting the
interval too low will decreases the interval between SPF calculations, but will increase the processing
load on CPU.
Example
The following command configures the minimum number of seconds between Shortest Path First (SPF)
recalculations:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures graceful restart helper mode behavior of OSPFv3 interfaces for its neighbors.
When an interface is acting as a helper, it continues to advertise the restarting router as if it was fully
adjacent.
Syntax Description
virtual-link OSPFv3 virtual link.
routerid OSPFv3 router ID.
router-identifier Router ID of neighbor OSPFv3 router.
area OSPFv3 area.
area-identifier Transit area ID of virtual link.
restart-helper Graceful restart helper mode.
none Disable helper mode (default).
planned Support planned restart only.
Default
Helper mode is disabled by default.
Usage Guidelines
When the area option is used, the command applies to all interfaces in the area at that time. One
OSPFv3 interface may not help more than one restarting router at a time. An OSPFv3 interface may not
enter helper mode when the router is performing a graceful restart. All the interfaces to a neighbor
router must be configured as graceful restart helpers, or the router does not support graceful restart for
its neighbor.
Restart helper mode appears in the show ospfv3 interfaces detail output.
# show ospfv3 interfaces detail
Interface : v100 Enabled : ENABLED
Router : ENABLED AreaID : 0.0.0.0
RouterID : 10.1.1.2 Link Type : point-to-point
Passive : No Cost : 40/A
Priority : 1 Transit Delay : 1s
Hello Interval : 10s Rtr Dead Time : 40s
Retransmit Interval : 5s Wait Timer : 40s
Interface ID : 19 Instance ID : 0
State : P2P Number of state chg : 1
Hello due in : 7s Number of events : 2
Total Num of Nbrs : 1 Nbrs in FULL State : 1
Hellos Rxed : 127733 Hellos Txed : 127739
DB Description Rxed : 4 DB Description Txed : 3
LSA Request Rxed : 1 LSA Request Txed : 1
LSA Update Rxed : 2121 LSA Update Txed : 6156
LSA Ack Rxed : 5962 LSA Ack Txed : 2121
In Discards : 0
DR RtId : 0.0.0.0 BDR RtId : 0.0.0.0
Restart Helper : Both
Restart Helper Strict LSA Checking: Enabled
BFD Protection : Off
Neighbors:
RtrId: 10.1.1.1 IpAddr: fe80::204:96ff:fe51:ea8e Pri: 1 Type: Auto
State: FULL DR: 0.0.0.0 BDR: 0.0.0.0 Dead Time: 00:00:31
Options: 0x13 (-|R|-|-|E|V6) Opaque LSA: No
Restart Helper Status: Off
Last Restart Helper Exit Reason: None
BFD Session State: None
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timers for a virtual link.
Syntax Description
router_identifi Specifies the router ID of the other end of the link.
er
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
retransmit_inte Specifies the length of time that the router waits before retransmitting an LSA
rval that is not acknowledged. The range is 1 to 3600 seconds.
transit_delay Specifies the length of time it takes to transmit an LSA packet over the
interface. The range is 1 to 3600 seconds.
hello_interval Specifies the interval at which routers send hello packets. The range is 1 to
65535 seconds.
dead_interval Specifies the interval after which a neighboring router is declared down due to
the fact that hello packets are no longer received from the neighbor. The range
is 1 to 65535 seconds.
Default
• Retransmit interval—Default: 5 seconds.
• Transit delay—Default: 1 second.
• Hello interval—Default: 10 seconds.
• Dead interval—Default: 40 seconds.
Usage Guidelines
In OSPFv3, all areas must be connected to a backbone area. If the connection to the backbone is lost, it
can be repaired by establishing a virtual link.
The smaller the hello interval, the faster topological changes will be detected, but more routing traffic
will ensue.
The setting of the retransmit interval should be conservative, or needless retransmissions will result. The
value should be larger for serial lines and virtual links.
The transmit delay value should take into account the transmission and propagation delays for the
interface.
Note
The wait interval is not separately configurable. It is always equal to the dead interval.
Example
The following command sets the timers on the virtual link to router 6.6.6.6 transiting area 0.0.0.2:
configure ospfv3 virtual-link 6.6.6.6 area 0.0.0.2 timer 10 transit-delay 1
hello‑interval 20 dead-interval 200
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the OVSDB server in ExtremeXOS to establish connections to remote OVSDB controllers.
Syntax Description
schema OVSDB schema.
hardware_vtep Specifies Hardware VXLAN Tunnel End-Point (VTEP).
add Add to the local OVSDB server.
delete Delete from the local OVSDB server.
connection Specifies OVSDB connection.
client Initiates connection to remote server.
tcp Specifies unencrypted TCP connection to remote server.
ssl Specifies encrypted connection using SSL/TLS to remote server.
ipaddress remote_ip Specifies IP address of the remote server.
port remote_port Specifies TCP port number of the remote server (default is 6640).
Default
If you do not a specify a TCP port for the remote server, the default is 6640.
Usage Guidelines
A switch in factory default configuration does not initiate connections to any remote OVSDB managers.
At least one server or client connection must be added so that ExtremeXOS can be managed using
OVSDB management protocol.
The OVSDB server in ExtremeXOS initiates the connections to managers listed in the relevant manager
tables of the OVSDB database being served. For example, if the manager table in the Hardware VTEP
database has an entry for TCP:172.16.19.21:6640, then ExtremeXOS initiates a connection to that IP
address and port number.
When using SSL for OVSDB connections, an SSL certificate must be configured on ExtremeXOS. It is
recommended that all CLI-configured OVSDB connections should be either client or server connections;
client and server OVSDB connections should not be configured simultaneously.
Example
The following example has OVSDB initiate SSL connections on TCP port 6632 and VLAN with IP address
172.16.21.21:
configure ovsdb schema hardware_vtep add connection client ssl ipaddress 172.16.21.21
port 6632
The following example stops OVSDB from initiating (and also terminates any currently active) SSL
connections configured in the previous example:
configure ovsdb schema hardware_vtep delete connection client ssl ipaddress 172.16.21.21
port 6632
History
This command was first available in ExtremeXOS release 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X590, X670-G2, X870, and X690 slots only.
Description
configure the OVSDB server to listen for incoming connections from OVSDB controllers.
Syntax Description
schema OVSDB schema.
hardware_vtep Specifies Hardware VXLAN Tunnel End-Point (VTEP).
add Add to the local OVSDB server.
delete Delete from the local OVSDB server.
connection Specifies OVSDB connection.
server Specifies to wait for incoming connections.
tcp Specifies unencrypted TCP connection to remote server.
ssl Specifies encrypted connection using SSL/TLS to remote server.
ipaddress local_ip Specifies IP address of local VLAN to listen on (default is 0.0.0.0).
port local_port Specifies TCP port number to listen on.
Default
N/A.
Usage Guidelines
You can configure the OVSDB server to listen for incoming connections from OVSDB controllers. A
switch in factory default configuration does not listen on any local ports. The OVSDB server in
ExtremeXOS listens for incoming connections from managers listed in the relevant manager tables of
the OVSDB database being served. For example, if the manager table in the Hardware VTEP database
has an entry for PTCP:6640, then ExtremeXOS listens for connections on that port number.
When using SSL for OVSDB connections, an SSL certificate must be configured on ExtremeXOS. It is
recommended that all CLI-configured OVSDB connections should be either client or server connections;
client and server OVSDB connections should not be configured simultaneously.
Example
The following example has OVSDB listen for incoming connections on TCP port 6640:
configure ovsdb schema hardware_vtep add connection server tcp port 6640
The following examples stops OVSDB from listening for incoming connections configured in the
previous example:
configure ovsdb schema hardware_vtep delete connection server tcp port 6640
History
This command was first available in ExtremeXOS release 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465. X590, X870, X690 series
switches, and stacks with X465, X590, X670-G2, X870, and X690 slots only.
Description
Deletes all connections that have been configured for an OVSDB schema.
Syntax Description
schema OVSDB schema.
hardware_vtep Hardware VXLAN tunnel end-point (VTEP).
delete Delete from the local OVSDB server.
connection Specifies OVSDB connection.
all Specifies all OVSDB connections for deletion.
Default
N/A.
Usage Guidelines
You can use this command to delete all connections that have been configured for an OVSDB schema.
This command only removes the connections; any ExtremeXOS objects created previously are not
affected by this command.
The contents of the hardware_vtep schema persists across changes of active ExtremeXOS
configurations (CLI commands, use configuration). Since the manager table might not be empty, this
can result in ExtremeXOS continuing to be managed by external OVSDB controllers. It is recommended
that the contents of the manager table be verified whenever the active ExtremeXOS configuration is
changed, and if needed, the manager table be emptied by deleting all OVSDB connections using this
command.
Example
The following example removes all connections for hardware_vtep schema:
configure ovsdb schema hardware_vtep delete connection all
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X870, X690 series
switches, and stacks with X465, X590, X670-G2, X870, and X690 slots only.
Description
Controls the frequency at which ExtremeXOS updates the statistics in the Logical_Binding_Stats table
of the hardware_vtep schema.
Syntax Description
schema OVSDB schema.
hardware_vtep Hardware VXLAN Tunnel End-Point (VTEP).
logical_binding_stats Specifies configuring the Logical_Binding_Stats table.
update-interval Selects the update interval for the logical_binding_stats statistics.
none Disables updating the statistics (default value).
interval Update interval in seconds (range = 1–65,535).
Default
By default the statistics in this table are never updated.
Usage Guidelines
Updating statistics too frequently can degrade the performance of the ExtremeXOS switch.
Example
The following example sets the Logical_Binding_Stats statistics to be updated every 60 seconds:
configure ovsdb schema hardware_vtep logical_binding_stats update-interval 60
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X870, X690 series
switches, and stacks with X465, X590, X670-G2, X870, and X690 slots only.
Description
Configures an IP interface for PIM.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
vlan-name Specifies a VLAN name.
all Specifies all VLANs.
dense Specifies PIM dense mode (PIM-DM). (Default mode.)
sparse Specifies PIM sparse mode (PIM-SM).
passive Specifies a passive interface.
Default
Dense.
Usage Guidelines
When an IP interface is created, per-interface PIM configuration is disabled by default.
The switch supports both dense mode and sparse mode operation. You can configure dense mode or
sparse mode on a per-interface basis. After they are enabled, some interfaces can run dense mode,
while others run sparse mode.
Passive interfaces are host only interfaces that allow a multicast stream from other VLANs to be
forwarded to edge hosts. Since they do not peer with other PIM routers, you should not connect a
multicast router to a passive interface.
In order for the interface to participate in PIM, PIM must be globally enabled on the switch using the
following command: enable pim
Example
The following example enables PIM-DM multicast routing on VLAN accounting:
configure pim add vlan accounting dense
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a PIM VLAN as a border VLAN, which is used to demarcate a PIM domain when using MSDP.
Syntax Description
ipv4 Configures a PIM timer on IPv4 router interfaces.
ipv6 Configures a PIM timer on IPv6 router interfaces.
vlan_name Specifies a VLAN name.
border Interface is domain border.
Default
None.
Usage Guidelines
MSDP is used to connect multiple multicast routing domains. A PIM-SM domain is created by limitingthe
reach of PIM BSR advertisements. When a border VLAN is configured, PIM BSR advertisements are not
forwarded out of the PIM VLAN.
Example
The following example configures a PIM border on a VLAN called "vlan_border":
configure pim vlan_border border
History
This command was first available in ExtremeXOS 10.1.
The ipv4 and ipv6 keywords were added giving an option to support this functionality in IPv6 as well
in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS User Guide.
Description
Configures a candidate bootstrap router for PIM sparse-mode operation.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
vlan_name Specifies a VLAN name.
priority Specifies a priority setting. The range is 0 - 255.
none Deletes a CBSR.
Default
The default setting for priority is 0, and indicates the lowest priority.
Usage Guidelines
The VLAN specified for CBSR must have PIM enabled for it to take effect. After PIM is enabled, CBSRs
advertise themselves in the PIM domain. A bootstrap router (BSR) is elected among all the candidates
based on CBSR priority. To break the tie among routers with the same priority setting, the router with
the numerically higher IP address is chosen.
An ExtremeXOS switch can support up to 145 RPs per group when it is configured as a PIM BSR
(bootstrap router). If more than 145 RPs are configured for a single group, the BSR ignores the group
and does not advertise the RPs. Non-BSR switches can process more than 145 RPs in the BSR message.
Example
The following example configures a candidate bootstrap router on the VLAN accounting:
configure pim cbsr vlan accounting 30
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a rendezvous point and its associated groups statically, for PIM sparse mode operation.
Syntax Description
ipv4 Specifies an IPv4 address.
ipv6 Specifies an IPv6 address.
ip_address Specifies a static CRP address.
none Deletes the static rendezvous point.
policy Specifies a policy file name.
priority Specifies a priority setting. The range is 0–255.
Default
The default setting for priority is 192. Priority value 0 indicates the highest priority.
Usage Guidelines
In PIM-SM, the router sends a join message to the rendezvous point (RP). The RP is a central multicast
router that is responsible for receiving and distributing multicast packets. If you use a static RP, all
switches in your network must be configured with the same RP address for the same group (range).
ExtremeXOS switches support up to 64 static RPs (32 IPv4 and 32 IPv6), and up to 180 groups (group/
mask entries) in a single RP policy file. If you configure more than 180 group entries in a single RP policy
file, the switch will not process entries added after the first 180.
The policy file contains a list of multicast group addresses served by this RP.
This policy file is not used for filtering purposes. As used with this command, the policy file is just a
container for a list of addresses. So a typical policy file used for RP configuration looks a little different
from a policy used for other purposes.
If routers have different group-to-RP mappings, due to misconfiguration of the static RP (or any other
reason), traffic is disrupted.
Example
The following example statically configures an RP and its associated groups defined in policy file rp-list:
configure pim crp static 10.0.3.1 rp-list
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the candidate rendezvous point advertising interval in PIM sparse mode operation.
Syntax Description
ipv4 Specifies an IPv4 address.
ipv6 Specifies an IPv6 address.
crp_adv_interval Specifies a candidate rendezvous point advertising interval in seconds.
The range is 1 to 1,717,986,918.
Default
The default is 60 seconds.
Usage Guidelines
Increasing this time results in increased convergence time for CRP information to the PIM routers.
Example
The following example configures the candidate rendezvous point advertising interval to 120 seconds:
configure pim crp timer 120
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the dynamic candidate rendezvous point (CRP) for PIM sparse-mode operation.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
vlan_name Specifies a VLAN name.
none Specifies to delete a CRP.
policy Specifies a policy file name.
priority Specifies a priority setting. The range is 0–255.
Default
The default setting for priority is 192. Priority value 0 indicates the highest priority.
Usage Guidelines
ExtremeXOS switches support up to 50 RPs in a switch, and up to 180 groups (group/mask entries) in a
single RP policy file. If you configure more than 180 group entries in single RP policy file, then the switch
will not process entries added after first 180.
The policy file contains the list of multicast group addresses serviced by this RP. This set of group
addresses are advertised as candidate RPs. Each router then elects the common RP for a group address
based on a common algorithm. This group to RP mapping should be consistent on all routers.
This policy file is not used for filtering purposes. As used with this command, the policy file is just a
container for a list of addresses. So a typical policy file used for RP configuration looks a little different
from a policy used for other purposes. The following is a sample policy file that configures the CRP for
the address ranges 239.0.0.0/24 and 232.144.27.0/24:
entry extreme1 {
if match any {
}
then {
nlri 239.0.0.0/24 ;
nlri 232.144.27.0/24 ;
}
}
Example
The following example configures the candidate rendezvous point for PIM sparse-mode operation on
the VLAN HQ_10_0_3 with the policy rp-list and priority set to 30:
configure pim crp HQ_10_0_3 rp-list 30
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables PIM on a router interface.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
vlanname Specifies a VLAN name.
all Specifies all VLANs.
Default
N/A.
Usage Guidelines
Use this command to disable PIM for a specific or all VLANs.
Example
The following example disables PIM on VLAN accounting:
configure pim delete vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command is used to configure a PIM interface that receives multicast data traffic. It could be either
from a source directly connected or from a PIM neighbor. In the second case (from a source not directly
connected), if the received interface has no PIM neighbor, the traffic is dropped (default behavior). If
you turn off this check, the traffic is processed.
Syntax Description
dense-neighbor-check Check if multicast traffic is received from PIM neighbor in dense mode.
on Drop multicast traffic if not received from PIM neighbor (default).
off Forward multicast traffic even if not received from PIM dense
neighbor.
Default
The default is on.
Example
The following example turns on dense neighbor check:
configure pim dense-neighbor-check on
History
This command was first available in ExtremeXOS 15.1.4.
Platform Availability
This command is available on platforms that support the appropriate license. For more information, see
the ExtremeXOS 30.5 Feature License Requirements.
Description
Configures the designated router (DR) priority that is advertised in PIM hello messages.
Syntax Description
ipv4 IPv4 address family (default).
ipv6 IPv6 address family.
vlan all Apply to all VLANs.
dr-priority Designated Router Priority for VLAN.
priority Priority value for VLAN (default 1). The range is 0–4294967295.
Default
The default setting for dr-priority is 1.
Usage Guidelines
The dr-priority option allows a network administrator to give preference to a particular router in
the DR election process by giving it a numerically larger DR priority. The dr-priority option is
included in every hello message, even if no DR priority is explicitly configured on that interface. This is
necessary because priority-based DR election is only enabled when all neighbors on an interface
advertise that they are capable of using the dr-priority option.
The DR priority is a 32-bit unsigned number, and the numerically larger priority is always preferred. A
router's idea of the current DR on an interface can change when a PIM hello message is received, when
a neighbor times out, or when a router's own DR priority changes. If the router becomes the DR or
ceases to be the DR, this will normally cause the DR register state machine to change states.
Subsequent actions are determined by that state machine. The DR election process on interface is as
follows:
• If any one of the neighbor on the interface is not advertised the DR priority (not DR capable) then
DR priority will not considered for the all the neighbors in the circuit, and the primary IP address will
be considered for all the neighbors.
• The higher DR priority or higher primary address will be elected as DR.
Example
configure pim ipv4 vlan accounting dr-priority 10
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command is used to configure the PIM ECMP hash algorithm.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
hash Configure Hash Algorithm for Equal Cost Multipath Routing.
source Hash for route sharing is based on source address only.
group Hash for route sharing is based on group address only.
source-group Hash for route sharing is based on source and group
addresses.
source-group-nexthop Hash for route sharing is based on source, group, and next
hop addresses (default).
Default
Source-group-nexthop.
Usage Guidelines
Use this command to modify the hash algorithm used by PIM for path selection.
Example
The following command configures the PIM ECMP hash algorithm based on source-group-nexthop:
configure pim ipv6 iproute sharing hash source-group-nexthop
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on platforms that support the appropriate license.
Description
Configures the register filter at the First Hop Router (FHR). This is the router to which the multicast
source is connected to.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
rp_policy_name Specifies the Policy File for Register filter.
none Unconfigures the configured FHR Register filter.
Default
IPv4.
Usage Guidelines
Use this command to add or remove a First Hop Router Register Filter policy.
Example
The following example configures an IPv4 register policy named "entry_policy" at the FHR:
configure pim ipv4 register-policy entry_policy
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the register filter at the Rendezvous Point.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
rp_policy_name Specifies the Policy File for RP Register filter.
none Unconfigures the configured RP Register filter.
Default
N/A.
Usage Guidelines
Use this command to add or remove a Rendezvous Point Register Filter policy.
Example
The following example configures IPv4 register policy named "entry_policy":
configure pim ipv4 register-policy rp entry_policy
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the initial PIM-SM periodic register rate.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
interval Specifies an interval time in seconds. Range is 0 - 60. Default is 0.
Default
The default interval is 0.
Usage Guidelines
Configuring a non-zero interval time can reduce the CPU load on the first hop switch, in case register
stop messages are not received normally.
When a non-zero value is configured, the first hop switch sends a few register messages and then waits
for a corresponding register stop from the RP for time seconds. The process is repeated until the
register stop is received. This command should be used when the (S,G) tree between the first hop
router and the RP is not converging quickly.
When the default value is zero in default mode, the switch sends continuous register messages until the
register stop is received.
Example
The following example configures the initial PIM register rate limit interval:
configure pim register-rate-limit-interval 2
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures an interval for periodically sending null-registers.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
reg-interval Specifies an interval time in seconds. Range is 30 - 200 seconds.
Default is 60.
probe-interval Specifies an interval time in seconds. Default is 5.
Default
The following defaults apply:
• register-suppress-interval—60
• register-probe-interval—5
Usage Guidelines
The register-probe-interval time should be set less than the register-suppress-interval time. By default,
a null register is sent every 55 seconds (register-suppress-interval – register-probe-interval). A response
to the null register is expected within register probe interval. By specifying a larger interval, a CPU peak
load can be avoided because the null-registers are generated less frequently. The register probe time
should be less than half of the register suppress time, for best results.
Example
The following example configures the register suppress interval and register probe time:
configure pim register-suppress-interval 90 register-probe time 10
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures <S,G,RPT> prune messages processing by PIM Snooping.
Syntax Description
accept <S,G,RPT> prune messages are processed.
drop <S,G,RPT> prune messages are not processed.
Default
Default configuration is accept.
Usage Guidelines
Use this command when it is desirable to disable PIM <S,G,RPT> prune messages processing by PIM
Snooping.
Example
The following example disables <S,G,RPT> prune messages processing by PIM Snooping:
configure pim snooping sgrpt-prune drop
History
This command was first available in ExtremeXOS 15.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the Feature License Requirements document.
Description
Configures the priority for out of memory shutdown.
Syntax Description
ipv4 Configures a PIM timer on IPv4 router interfaces.
ipv6 Configures a PIM timer on IPv6 router interfaces.
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
number Priority for VLAN range is [0 - 65535].
Default
IPv4.
Usage Guidelines
None.
Example
The following example configures the shutdown priority for VLAN 36:
config pim vlan v36 shutdown-priority 22
History
This command was first available in ExtremeXOS 12.4.
The ipv4 and ipv6 keywords were added giving an option to support this functionality in IPv6 as well
in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the threshold, in kbps, for switching to SPT. On leaf routers, this setting is based on data
packets. On the RP, this setting is based on register packets. When infinity option is configured on First
Hop Routers or Intermediary Routers, SPT switching is disabled. Traffic forwarding will be performed
based on RPT paths only.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
infinity Disables Shortest Path Tree (SPT) switching on Last Hop or
Intermediary routers.
leaf-threshold Specifies the rate of traffic per (s,g,v) group in kbps for the last hop.
Range is 0 - 4194303.
rp_threshold Specifies an RP threshold. Range is 0 - 4194303.
Default
The default setting is 0 for both parameters.
Usage Guidelines
For the best performance, use default value of 0.
Example
The following example changes the threshold for switching to SPT:
configure pim spt-threshold 4 16
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the range of multicast addresses for PIM SSM.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
default Specifies the default address range. 232.0.0.0/8 for IPv4 or FF3x::/96
for IPv6.
policy-name Specifies a policy that defines the SSM address range.
Default
By default, no SSM range is configured. Using this command with the default keyword sets the range to
232.0.0.0/8. To reset the switch to the initial state, use the unconfigure pim ssm range
command.
Usage Guidelines
Initially, no range is configured for SSM. After a range is configured, you can remove the range with the
unconfigure pim ssm range command. If you wish to change the PIM SSM range, you must first
unconfigure the existing range, and then configure the new range.
SSM requires that hosts use IGMPv3 messages to register to receive multicast group packets. When a
range is configured for SSM, any IGMPv2 messages for an address in the range are ignored. Also, any
IGMPv3 Exclude messages are ignored.
Note
If a PIM-SSM range is configured, IGMPv2 messages and IGMPv3 exclude messages within the
PIM-SSM range are ignored on all IP interfaces, whether or not PIM-SSM is configured on the
interfaces.
To specify a range different from the default PIM SSM range, create a policy file. The match statement of
the policy file contains the group addresses to be treated as PIM SSM addresses. For example, to specify
the PIM SSM address range as 232.0.0.0/8 and 233.0.0.0/8, use the following policy file:
Entry extreme1 {
if match any {
nlri 232.0.0.0/8 ;
nlri 233.0.0.0/8 ;
}
then {
permit ;
}
}
Example
The following example sets the PIM SSM range to 232.0.0.0/8 and 233.0.0.0/8, if the policy file
ssmrange.pol contains the policy example used above:
configure pim ssm range policy ssmrange
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the interval at which state refresh messages are originated.
Syntax Description
interval Specifies a refresh interval in seconds. The range is 30–90 seconds.
Default
60 seconds.
Usage Guidelines
None.
Example
The following example configures the interval to 45 seconds:
configure pim state-refresh timer origination-interval 45
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Defines how long a multicast source (S,G) is considered active after a packet is received from the
source.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
interval Specifies a source-active timer interval in seconds. The range is 90–
300 seconds.
Default
210 seconds.
Usage Guidelines
None.
Example
The following example configures the interval to 180 seconds:
configure pim state-refresh timer source-active-timer 180
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a time-to-live (TTL) value for PIM-DM state refresh messages.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
ttl_value Specifies a TTL value. The range is 1–64.
Default
16.
Usage Guidelines
None.
Example
The following example configures the TTL value for 24:
configure pim state-refresh ttl 24
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables or disables the PIM-DM state refresh feature on one or all VLANs.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
Default
Disabled.
Usage Guidelines
When this feature is disabled on an interface, the interface behaves as follows:
• State refresh messages are not originated.
• State refresh messages received on the interface are dropped without processing.
• State refresh messages received on other interfaces are not forwarded to the disabled interface.
Example
The following example enables the PIM-DM state refresh feature on VLAN blue:
configure pim state-refresh blue on
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the global PIM timers on the specified router interfaces.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
hello_interval Specifies the amount of time before a hello message is sent out by the
PIM router. The range is 1–65,535 seconds.
jp_interval Specifies the join/prune interval. The range is 1–65,535 seconds.
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
Default
• hello_interval—30 seconds
• jp_interval—60 seconds
Usage Guidelines
These default timers should only be adjusted when excess PIM control packets are observed on the
interface.
Example
The following example configures the PIM timers on the VLAN accounting:
configure pim timer 150 300 vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a trusted neighbor policy.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
vlan_name Specifies a VLAN name.
Default
No policy file, so all gateways are trusted.
Usage Guidelines
Because PIM leverages the unicast routing capability that is already present in the switch, the access
policy capabilities are, by nature, different. When the PIM protocol is used for routing IP multicast traffic,
the switch can be configured to use a policy file to determine trusted PIM router neighbors for the
VLAN on the switch running PIM. This is a security feature for the PIM interface.
Example
The following example configures a trusted neighbor policy on the VLAN backbone using the policy
"nointernet":
configure pim vlan backbone trusted-gateway nointernet
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds rules and configures the rule precedence list for an access-list.
Syntax Description
access-list Configures access-list rule model.
rule-precedence Specifies modifying a rule's precedence in the access-list.
list_dot_rule Specifies the access-list name and rule name in the format
list_name.rule_name.
Default
N/A.
Usage Guidelines
An access-list always contains at least one rule and is not active or programmed until it is assigned to a
profile. Assigning a different profile ID to an access-list that already has one overwrites the current
value. Setting the profile ID to “none” removes the access-list from the active/programmed rules. A
profile ID can only be assigned to an access-list, and not per rule, so the list_name must only contain
an access-list and not a list_dot_rule value.
Example
The following example places the access-list "ACL1.ace3" before "ACL1.ace1":
# configure policy access-list rule-precedence ACL1.ace3 before ACL1.ace1
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets the interval at which the switch automatically clears rule usage statistics.
Syntax Description
autoclear Designates setting the parameters for auto-clearing the policy rule
usage statistics.
interval Designates setting the interval when the switch automatically clears
rule usage. Default is 0 (statistics are not automatically cleared).
interval Sets the value for the interval in minutes when the switch
automatically clears rule usage. Range is 0 to 65,535.
Default
By default, the autoclear interval is 0, which means that statistics are not automatically cleared.
Usage Guidelines
If you have configured Syslog and/or trap actions to notify you when a policy rule is used by using the
following command: configure policy rule profile_index [{app-signature group
group name name} | ether ether | icmp6type icmp6type | icmptype icmptype
| ip6dest ip6dest |ipdestsocket ipdestsocket | ipfrag | ipproto ipproto
| ipsourcesocket ipsourcesocket | iptos iptos | ipttl ipttl | macdest
macdest | macsource macsource | port port | tcpdestportIP tcpdestportIP
| tcpsourceportIP tcpsourceportIP | udpdestportIP udpdestportIP |
udpsourceportIP udpsourceportIP ] {mask mask } {port-string
[ port_string | all]} {storage-type [non-volatile | volatile]} {drop |
forward} {syslog syslog} {trap trap} {cos cos } {mirror-destination
control_index} {clear-mirror} , this command allows you to set the interval when these
statistics will be cleared.
Example
The following example sets the interval for automatically clearing rule usage statistics to 1 minute:
# configure policy autoclear interval 1
History
This command was available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a user-defined policy application signature.
Syntax Description
app-signature Configures application signature specific settings.
group Configures application signature group-specific settings.
group Specifies the group name.
name Configures application signature display name-specific settings.
name Specifies the display name assigned to the application signature.
Maximum of 32 characters. To see name choices, use the show
policy app-signature group {group {name name}}
{built-in | custom {detail} | detail} command.
add Adds patterns to the display name.
delete Removes patterns from the display name.
pattern_list Specifies a list of strings enclosed in quotes used to identify the
application, each separated by a space. Maximum of 255 characters.
Default
N/A.
Usage Guidelines
The application signature groups are built-in and additional ones cannot be created. There are built-in
values for application signature names, which cannot be modified or deleted.
Example
The following example for the group name "E-commerce" and application signature name "Warehouse"
adds the patterns "bjs.com", "costco.com", and "samsclub.com":
# configure policy app-signature group "E-commerce" name Warehouse add "bjs.com
costco.com samsclub.com"
History
This command was first available in ExtremeXOS 30.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a minimum time-to-live (TTL) value for Layer 7 policy/application signature.
Syntax Description
app-signature Specifies configuring application signature settings.
minimum-ttl Specifies setting override to low DNS-reply TTL values with a
minimum value. The default is none, which specifies not overriding the
TTL values.
none Specifies not overriding DNS-reply TTL values (default).
1 Specifies a minimum TTL of 1 minute.
5 Specifies a minimum TTL of 5 minutes.
10 Specifies a minimum TTL of 10 minutes.
Default
By default, the DNS-reply TTL values are not overridden (none).
Usage Guidelines
To view the TTL minimum value set by this command, use the show policy app-signature
command.
Example
The following example sets a minimum TTL of 5 minutes:
# configure policy app-signature minimum-ttl 5
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures a captive portal server’s HTTP redirect URL and its status.
Syntax Description
web-redirect Configures web-redirect.
redirect_index Configures a web redirect index (range = 1–10).
server Configures a server for the web redirect index.
server_id Sets the server ID to use ( range = 1–2).
url Configures captive portal server absolute URL.
redirect_url Sets HTTP/HTTPS URL that users are redirected to
http(s)://<IPv4Address or Hostname>:<L4Port>/
<Path>
Where IPV4Address or Hostname is the IPv4 address or hostname
of the captive portal server (DNS server needs to be configured on the
device).
L4Port by default is 80. Should be provided with the value on which
the captive portal web-server is running.
status Captive portal server status: "enable" or "disable" (default is disable).
Default
By default, captive portal server status is disabled.
Example
The following example configures and enables the URL for a particular captive portal server (index 2) in
web-redirect (index 1):
configure policy captive-portal web-redirect 1 server 2 url http://192.168.1.1:80/static/
index.jsp enable
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures which L4 listening ports (sockets) are redirected when a captive portal web-
redirect is defined on a policy profile.
Syntax Description
listening Configures captive portal HTTP listening ports (up to three L4 ports).
socket_list List of L4 ports on which to listen (1–65,535) separated by commas
(for example: 80,8080,2000).
Default
N/A
Usage Guidelines
You can configure a maximum of three L4 listening ports.
Example
The following example configures two L4 listening ports 80 and 8080 to be redirected by captive
portal:
configure policy captive-portal listening 80,8080
The following example tries to apply a fourth listening port 5000. This fails because you can only have
three listening ports configured:
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures whether or not captive portal ACL rules are programmed within the reserved space for
ONEPolicy.
Syntax Description
captive-portal Configures captive portal elements.
rule-use Configures captive portal rule use.
reserved Configures captive portal to program rules in the space reserved by
resource-profile configuration at the expense of IPv4 group rules.
unreserved Configures captive portal to program rules outside the space reserved
by resource-profile configuration (default).
Default
By default, captive portal rules are programmed outside of the reserved space for ONEPolicy.
Usage Guidelines
If not specified to do otherwise, ONEPolicy programs its captive portal-related rules outside of the
reserved ACL rule space for ONEPolicy (unreserved). This results in additional ACL slice usage. This
command enables you to specify that these rules are programmed within the already reserved ACL rule
space at the expense of IPv4 rule capacity (reserved).
To view the selection for this command, use the show policy captive-portal {web-
redirect {redirect_index | all} | listening | rule-use} command with the
rule-use option.
Example
The following example confines captive portal ACL rules to the reserved space for ONEPolicy:
# configure policy captive-portal rule-use reserved
History
This command was first available in ExtremeXOS 30.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command globally enables or disables Convergence End Point (CEP) for ONEPolicy.
Syntax Description
enable Enables CEP for ONEPolicy.
disable Disables CEP for ONEPolicy.
Default
By default CEP is disabled.
Usage Guidelines
This feature requires that ONEPolicy is enabled on the switch (see enable policy on page 2234).
Example
The following example enables CEP on the switch:
# configure policy convergence-endpoint enable
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command clears all existing Convergence End Point (CEP) connections per port.
Syntax Description
ports Specify ports to configure.
port_list Designates which ports to clear CEP connections from.
Default
N/A
Example
The following example clears CEP connections from port 3:
# configure policy convergence-endpoint clear ports 3
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command sets a global default policy index for a Convergence End Point (CEP) detection type. This
policy is applied when a phone of the specified type is detected on a port.
Syntax Description
index The policy index to apply. Use 0 to clear an index.
Note: After CEP devices are mapped to a profile, changing the index
value to "0" or to some other policy profile name, the existing CEP
connections are still be mapped to the old profile that was configured
initially when the CEP devices were detected. To force a refresh of
existing detected devices, disable, and then enable, CEP (see
configure policy convergence-endpoint on page 1098) or disable, and
then enable, the port(s) (see disable port on page 1912 and enable
port on page 2235).
Default
N/A
Usage Guidelines
The corresponding policy must be configured using the policy management commands (for example,
configure policy profile on page 1103).
Example
The following example applies as default the policy associated with index number "12" to Cisco type
CEPs.
# configure policy convergence-endpoint index 12 cisco
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables or disables a Convergence End Point (CEP) detection type on one or more
ports.
Syntax Description
port_list Specifies ports to configure for CEP detection.
all Specifies that all ports are configured for CEP detection.
cisco Selects Cisco type of CEP detection.
lldp-med Selects LLDP-MED type of CEP detection.
enable Enables CEP for the provided type.
disable Disables CEP for the provided type.
Default
By default, CEP detection is disabled on all ports for all types.
Usage Guidelines
This feature requires that ONEPolicy is enabled on the switch (see enable policy on page 2234).
Example
The following example configures CEP detection for Cisco type on port 3:
# configure policy convergence-endpoint ports 3 cisco enable
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures what action is taken for an invalid policy.
Syntax Description
default-policy Ignore the result and search for the next policy assignment rule.
drop Block traffic.
forward Forward traffic as if no policy has been assigned via 802.1D/Q rules.
Default
None.
Example
This example shows how to assign a drop action to invalid policies:
X450G2-48t-10G4.4 # configure policy invalid action drop
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Use this command to add entries to the mapping table and to set the map table response state for the
switch.
Syntax Description
vlan_list VLAN ID or range of IDs (1–4,094)
profile_index Policy ID (1–63).
response Indicates which attributes to use from RADIUS response.
tunnel Applies the VLAN-tunnel attribute. VLAN/NSI mappings from RADIUS
are used if present. Mappings in policy profile are ignored.
policy Applies the policy specified in the filter-ID. VLAN/NSI mappings from
policy profile are used if present. Mappings in RADIUS response are
ignored.
both An enhanced policy option that applies either all the filter-ID and
VLAN tunnel attributes or the policy depending upon whether one or
both are present.
VLAN/NSI mappings from either RADIUS or policy profile may be
used. Mappings in RADIUS response have a higher precedence over
policy profile when both contain mappings.
Default
N/A.
Usage Guidelines
The policy response is the default response for the configure policy maptable command.
Example
This example adds an entry to the map table that maps VLAN 3 to policy profile 8:
configure policy maptable 3 8
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command assigns an administrative rule to a port.
Syntax Description
ports Port string
admin-id Policy ID
admin_id Policy ID (1-63).
Default
N/A.
Usage Guidelines
Use this command to assign an administrative rule to a port.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a policy profile entry.
Syntax Description
profile_index Policy ID (1-63).
name Policy profile name.
name Profile name string 1-64 characters.
pvid-status PVID status (enable/disable).
pvid PVID value (0-4,095). Default is 1, which specifies Default VLAN.
cos-status CoS status (enable/disable).
cos Class of Service value (0-22).
egress-vlans Egress VLAN list (1-4094).
forbidden-vlan Forbidden VLAN list (1–4,094).
untagged-vlans Untagged VLAN list (1-4,094).
append Append to one of Egress, Forbidden, Untagged VLAN list.
clear Clear from one of Egress, Forbidden, Untagged VLAN list.
tci_overwrite TCI-overwrite status (enable/disable).
Note: You cannot set a precedence if the rule model is set for ACL
Style Policy (access-list). To set the rule model, use the command
configure policy rule-model [access-list |
hierarchical].
precedence Sets the rule precedence (for example: 1–2, 10, 12–18, 20–23, 25, 31).
To see the supported rules, use show policy profile {all |
profile_index} {detail} .
default Sets the default rule precedence, rather than a custom one (1–2, 10, 12–
19, 23, 20–22, 25, 31).
Default
If optional parameters are not specified, none are applied.
If you do not set a policy classification rule precedence, the default order is used (1–2, 10, 12–19, 23, 20–
22, 25, 31).
Usage Guidelines
Use this command to create a policy profile entry.
Example
This example shows how to create a policy profile 1 named "netadmin" with PVID override enabled for
PVID 10, and Class-of-Service override enabled for CoS 5. This profile can use VLAN 10 for untagged
egress:
# configure policy profile 1 name netadmin pvid-status enable pvid 10 cos-status enable
cos 5 untagged-vlans 10
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a profile that controls the policy rule resources available for MAC/IPv4/IPv6/L2.
Syntax Description
default Configure a profile with the default settings.
less-acl Configure a profile that removes some access list resources to be used
for rules.
more-ipv4 Configure a profile that adds IPv4 rules.
more-ipv4-no-ipv6 Configure a profile that adds IPv4 rules at the expense of IPv6 rules.
more-ipv4-no-l2 Configure a profile that adds IPv4 rules at the expense of L2 rules. L2
ether rules are accounted for in the first available space from IPv4,
IPv6, or MAC group.
more-ipv4-no-mac-no- Configure a profile that adds IPv4 rules at the expense of MAC and
ipv6 IPv6 rules
more-ipv4-no-mac-no- Configure a profile that adds IPv4 rules at the expense of MAC, IPv6,
ipv6-no-l2 and L2 rules. L2 ether rules are accounted for in the IPv4 group.
more-mac-no-ipv6 Configure a profile that adds MAC rules at the expense of IPv6 rules.
profile-modifier Specifies modifying the current profile settings.
no-mac Specifies modifying the current profile, which removes all MAC rules.
no_mac Specifies removing all MAC rules: "enable" or "disable" (default is
disabled).
no-ipv4 Specifies modifying the current profile, which removes all IPv4 rules.
no_ipv4 Specifies removing all IPv4 rules: "enable" or "disable" (default is
disabled).
no-ipv6 Specifies modifying the current profile, which removes all IPv6 rules.
no_ipv6 Specifies removing all IPv6 rules: "enable" or "disable" (default is
disabled).
no-l2 Modify the current profile that removes all L2 rules. L2 ether rules are
accounted for in the first available space from IPv4, IPv6, or MAC
group.
no_l2 Modifier that removes all L2 rules: enable or disable (default is
disabled).
Default
By default, the profile modifier is none.
Usage Guidelines
You cannot configure the system to use a new resource profiles while policy is enabled. You must
disable policy first.
You cannot configure the system to use a new resource-profile where the profile does not fit with
existing defined rules. An error message similar to the following appears:
Current IPv6 rule usage 1 is higher than max value 0 supplied by profile more-mac-no-ipv6
Example
The following example configures the system to use the resource settings of more-ipv4-no-ipv6:
configure policy resource-profile more-ipv4-no-ipv6
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Use this command to assign incoming untagged frames to a specific policy profile and to VLAN or CoS
classification rules.
Syntax Description
port Port string.
port Port string - (data: 1; mask: 16).
app-signature Associates an application signature to a policy profile.
group Associates an application signature group to a policy profile
group Specifies the group name.
name Associates an application signature name to a policy profile.
name Specifies the display name assigned to the application signature.
Maximum of 32 characters. To see name choices, use the show
policy app-signature group {group {name name}}
{built-in | custom {detail} | detail} command.
macsource MAC source address.
macsource MAC source address - (data: a-b-c-d-e-f; mask: 1-48).
macdest MAC destination address.
macdest MAC destination address - (data: a-b-c-d-e-f; mask: 1-48).
ip6dest IPv6 address.
ip6dest IPv6 address (data: aaaa::bbbb; mask 1-128).
ipsourcesocket Source IP address / Source IpSocket.
ipsourcesocket Source IP address (data: a.b.c.d[:ab (0-65535)[-cd (0-65535)]]; mask:
1-48, 64).
ipdestsocket Destination IP address / Destination IpSocket.
ipdestsocket Destination IP address (data: a.b.c.d[:ab (0-65535) [-cd (0-65535)]];
mask: 1-48,64).
ipfrag IP fragmentation flag.
Default
• If mask is not specified, all data bits are considered relevant.
• If port-string is not specified, rule is scoped to all ports.
• By default, a Syslog or trap entry only occurs on the first use of the rule.
Usage Guidelines
Classification rules are automatically enabled when created.
Note
ExtremeSwitching X440-G2 and X620 series switches do not support macsource, macdest, or
ip6dest classification rule types. Example:
# configure policy rule 1 macsource 00-00-00-00-00-01 port-string 3 drop
ERROR: Set failed!
Note
The ExtremeSwitching X870 does not support a port-string with the ip6dest classification
rule type.
Example
This example shows how to create (and enable) a classification rule to associate with policy number 1.
This rule will drop Ethernet II Type 1526 frames:
# configure policy rule 1 ether 1526 drop
This example shows how to create (and enable) a classification rule to associate with policy profile
number 5. This rule specifies that UDP frames from source port 45 will be forwarded:
# configure policy rule 5 udpsourceportip 45 forward forward
The following example associates the application signature with group "Storage and name "mike1" to
policy rule "2" to block traffic:
# configure policy rule 2 app-signature group "Storage" name "mike1" drop
History
This command was first available in ExtremeXOS 16.1.
Applying mirrors to policies and Syslog/trap actions on rule use was added in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Use this command to assign incoming untagged frames to a specific policy profile and to VLAN or
Class-of-Service classification rules.
Syntax Description
admin-profile Policy ID of 0.
macsource MAC source address.
macsource MAC source address - (data: a-b-c-d-e-f; mask: 1-48).
port Port string.
port Port string - (data: 1; mask: 16).
mask Number of most significant bits to match data value (rule-meaning)
mask Number of most significant bits to match data value (rule-meaning).
Range: 1 - 144.
port-string Rule port scope.
port-string Rule port scope.
all Scope to all ports.
storage-type Storage type of this rule.
non-volatile This entry shall be added to non-volatile storage.
volatile This entry shall be removed from volatile storage.
admin-pid Policy ID (1-63).
admin-pid Policy ID (1-63).
Default
• If mask is not specified, all data bits will be considered relevant.
• If port-string is not specified, rule will be scoped to all ports.
Usage Guidelines
Classification rules are automatically enabled when created.
Example
This example shows how to configure classification rule 2 as an administrative profile and assign it to
ingress port 1:1:
configure policy rule admin-profile port 1:1 port-string 1:1 admin-pid 2
History
This command was first available in ExtremeXOS release 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Selects the rule model type for configuring policy rules.
Syntax Description
rule-model Selects a rule model for configuring and ordering policy-based rules.
access-list Selects access-list rule model, which allows multiple match criteria per
rule along with assignable rule ordering within an access-list (Default).
hierarchical Selects hierarchical rule model, which allows one match criteria per
rule and uses the rule type to assign its precedence.
Default
The factory default for rule model is access-list.
However, if you are upgrading to ExtremeXOS 30.5 or later, and the switch has an existing policy rules
configuration, then the rule model remains hierarchical.
Usage Guidelines
To configure rule models, policy must be disabled.
If you change rule models, the configuration of the other rule model is deleted.
Example
The following example sets the rule model to hierarchical:
# configure policy rule-model hierarchical
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the number of slices used by shared features, such as Layer 7 policy and dynamic ACL.
Syntax Description
slices Configures look-up stage TCAM resources.
shared Designates setting the shared lookup stage TCAM resources.
shared Sets the shared slice value (range is 0–4).
l7GuaranteedPercentag Designates setting the percentage of shared slice that Layer 7 is
e guaranteed.
l7GuaranteedPercentag Specifies the guaranteed Layer 7 percentage value (range is 0–100).
e
dynAclGuaranteedPerce Designates setting the percentage of shared slice that is dynamic ACL
ntage guaranteed.
dynAclGuaranteedPerce Specifies the guaranteed dynamic ACL percentage value (range is 0–
ntage 100).
Default
N/A.
Usage Guidelines
To make changes using this command, you must first disable policy (disable policy).
To view selections made by this command, use the show policy slices command.
Example
The following example configures policy to use 2 slices for shared features and allocate a guaranteed
40% to Layer 7 and 40% to dynamic ACLs:
# configure policy slices shared 2 l7GuaranteedPercentage 40 dynAclGuaranteedPercentage 40
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the number of slices used by a profile in the look-up stage TCAM resources.
Syntax Description
slices Configures look-up stage TCAM resources.
tci-overwrite Configures look-up Stage TCAM resources used by profile with tci-
overwrite enabled.
slices Specifies the number of slices between 0 and 4. The default is 4.
shared Configures look-up stage TCAM resources.
shared Specifies the shared slice value (0–4).
Default
By default, the number of slices is 4.
Usage Guidelines
This command only runs if policy is disabled.
This command enables you to allocate only the slice resources necessary and allow the rest to be used
outside of policy. In a stack with slots having differing VCAP slice depths, each slot has the number of
rules available as follows: numSlices * (VCAP slice depth)).
Example
The following example configures policy to use 3 slices with tci-overwrite enabled:
# configure policy slices tci-overwrite 3
History
This command was first available in ExtremeXOS 30.4.
Platform Availability
This command is available on ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Sets Syslog parameters for policy rules.
Syntax Description
syslog Sets Syslog parameters for policy rules.
machine-readable Sets whether hexadecimal or decimal format is used for Syslog
messages.
machine_readable Sets whether hexadecimal or decimal format is used for Syslog
messages: "enable" (= hexadecimal) or "disable" (= decimal). Default
is disabled (decimal).
extended-format Sets whether extended format is used for Syslog messages.
extended_format Sets whether extended format is used for Syslog messages: "enable"
(= extended) or "disable" (= not extended). Default is disabled (not
extended).
every-time Sets whether Syslog messages are sent every time a rule is used (not
just first time).
every_time Sets whether Syslog messages are sent every time a rule is used (not
just first time): "disable" or "enable". Default is disabled.
Default
By default, Syslog messages are only sent on first use of a rule.
By default, extended-format and machine-readable are disabled (not extended and in decimal
format).
Usage Guidelines
This command allows you to set parameters for Syslog messages that are sent when a policy rule is
used when set up in the command configure policy rule profile_index [{app-
signature group group name name} | ether ether | icmp6type icmp6type |
icmptype icmptype | ip6dest ip6dest |ipdestsocket ipdestsocket | ipfrag
| ipproto ipproto | ipsourcesocket ipsourcesocket | iptos iptos | ipttl
ipttl | macdest macdest | macsource macsource | port port |
tcpdestportIP tcpdestportIP | tcpsourceportIP tcpsourceportIP |
udpdestportIP udpdestportIP | udpsourceportIP udpsourceportIP ] {mask
mask } {port-string [ port_string | all]} {storage-type [non-volatile |
volatile]} {drop | forward} {syslog syslog} {trap trap} {cos cos }
{mirror-destination control_index} {clear-mirror} .
When Syslog messages are configured to be sent every time a rule is used, messages are sent at a
maximum rate of once every five seconds.
To view the parameters configured by this command, use the command show policy syslog
{machine-readable} {extended-format} {every-time}.
Example
The following example sets Syslog messages to be sent every time a rule is used:
#configure policy syslog every-time enable
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables or disables the configuration of VLAN Authorization-specific settings.
Syntax Description
enable Enable VLAN Authorization.
disable Disabel VLAN Authorization
Default
N/A.
Usage Guidelines
None.
Example
This example shows how to enable VLAN Authorization:
X450G2-48t-10G4.4 # configure policy vlanauthorization enable
History
This command was first available in ExtremeXOS 16.1
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures VLAN Authorization for a port, port list, or all ports.
Syntax Description
port_list List of ports to configure.
all Configure all ports.
enable Enable VLAN Authorization on port.
disable Disable VLAN Authorization on port.
tagged Add port to egress of the VLAN-ID returned.
untagged Add port to the untagged egress of the VLAN-ID returned.
Default
N/A.
Usage Guidelines
None.
Example
This example shows how to enable VLAN Authorization for port 1:1 for tagged packets:
X450G2-48t-10G4.5 # configure policy vlanauthorization port 1:1 enable tagged
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a description string setting up to 255 characters.
Syntax Description
port_list Specifies one or more ports or slots and ports.
string Specifies a port description of up to 255 characters per port. You cannot use
the following characters: ‘ “ ‘, “<”, “>”, “:”, “<space>”, “&”
Default
None.
Usage Guidelines
Use this command to configure a port description of up to 255 characters per port.
In case that user configures a string longer than 64 chars, the following warning will be displayed:
Some characters are not permitted as they have special meanings. These are: ‘ “ ‘, “<”, “>”, “:”, “<space>”,
“&”. The first character should be alphanumeric. This new field is CLI accessible only via “show port info
detail” but is also accessible via the SNMP ifAlias object of IfXTable from IF-MIB (RFC 2233) and the
XML API. In order to access the value via SNMP the following command should be issued: configure
snmp ifmib ifalias size extended.
Example
The following command configures the port:
configure ports 1:3 description-string CorporatePort_123
History
This command was available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Assigns the primary or secondary ethertype value to the specified ports.
Syntax Description
port_list Specifies the list of ports to be configured.
primary Assigns the primary ethertype value to the specified ports.
secondary Assigns the secondary ethertype value to the specified ports.
Default
N/A.
Usage Guidelines
None.
Example
The following example configures port 2:1 to use the secondary ethertype:
configure port 2:1 ethertype secondary
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the direct attach feature on the specified port.
Syntax Description
port Specifies a single port on which to enable the direct attach feature.
Default
Off.
Usage Guidelines
You should only enable the direct attach feature on ports that directly connect to a VM server running
VEPA software.
This feature requires installation of the Direct Attach feature pack. For more information, see the
ExtremeXOS 30.5 Feature License Requirements document..
Example
The following command enables the direct attach feature on port 2:1:
# configure port 2:1 reflective-relay on
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum amount of the shared packet buffer to be used by the specified ports.
Syntax Description
port_list Specifies a list of ports or slots and ports.
percent Specifies the maximum portion of the shared packet buffer to allot. The
range is 0 to 100 percent.
Note
On some platforms, the hardware provides a limited number of settings. In these cases,
ranges of percentage values achieve the same setting.
Note
You can view the configured percentage value using the show ports port-list info
detail command.
Note
You can view the effect of this command using the show ports port-list buffer
command.
Default
None.
Usage Guidelines
It is possible to overcommit the shared packet buffer using this command.
Example
The following command sets the shared packet buffer for port 1:1 to 50%:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure ports
configure ports {group} port_group [[ add | delete ] port_list ]
Description
Creates or deletes a generic port-group name that can be associated with a list of ports.
Syntax Description
group Named list of ports.
port_group Port group name.
add Add ports to port group.
delete Delete ports from port group.
port_list Specifies a port list.
Default
N/A.
Usage Guidelines
Use this command to add or delete a generic port-group name to a list of ports.
Note
Because port-groups may be configured for multiple applications, no check is done other
than that the values entered are ports. Individual applications handle illegal actions on ports
as necessary. QoS commands that use port groups are updated automatically if the ports
group is removed or if ports are added or removed from the group.
Example
configure ports group testGroup add 1-5
configure ports testGroup delete 3
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Manually configures port speed and duplex setting configuration on one or more ports on a switch.
Syntax Description
port_list Specifies one or more ports or slots and ports.
medium Specifies the medium as either copper or fiber. Note: This parameter
applies to combo ports..
speed Specifies the port speed as either 10, 100, 1,000 (1 Gigabit), 2,500 (2.5
Gigabit), 5,000 (5 Gigabit), 10,000 (10 Gigabit), 25,000 (25 Gibabit),
40,000 (40 Gigabit), 50,000 (50 Gigabit), or 100,000 (100 Gigabit)
Mbps ports.
duplex [half] Specifies half duplex; transmitting and receiving data one direction at
a time.
duplex [full] Specifies full duplex; transmitting and receiving data at the same time.
Default
Auto on for 1G and 10G copper ports.
Usage Guidelines
You can manually configure the duplex setting and the speed on 10/100 and 10/100/1000 Mbps and
fiber SFP gigabit Ethernet ports.
In general, SFP gigabit Ethernet ports are statically set to 1 Gbps, and their speed cannot be modified.
However, there are SFPs supported by Extreme Networks that can have a configured speed:
• 100 FX SFPs, which must have their speed configured to 100 Mbps.
• 100FX/1000LX SFPs, which can be configured at either speed.
• SFP+ optics, must have their speed configured to 10G auto off.
Gigabit Ethernet ports support flow control only when autonegotiation is turned on. When
autonegotiation is turned off, flow control is not supported. For more detailed information about flow
control on Extreme Networks devices, see the ExtremeXOS 30.5 User Guide.
When configuring combination ports you can specify the medium as copper or fiber. If the medium is
not specified for combination ports then the configuration is applied to the current primary medium.
The current primary medium is displayed in the Media Primary column of the show ports
configuration command output.
Note
The keyword medium is used to select the configuration medium for combination ports. If the
port_list contains any non-combination ports, the command is rejected.
When upgrading a switch running ExtremeXOS 12.3 or earlier software to ExtremeXOS 12.4 or
later, saved configurations from combo ports (copper or fiber) are applied only to combo
ports fiber medium. When downgrading from ExtremeXOS 12.4 or later to ExtremeXOS 12.3 or
earlier, saved configurations from combo ports (copper or fiber) are silently ignored.
Therefore, you need to reconfigure combo ports during such an upgrade or downgrade.
Example
The following example turns autonegotiation off for port 2 with copper medium and a port speed of
100 Mbps at full duplex:
configure ports 2 medium copper auto off speed 100 duplex full
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables autonegotiation for the particular port type.
Syntax Description
port_list Specifies one or more ports or slots and ports.
medium Specifies the medium as either copper or fiber. Note: This parameter
applies to combo ports.
speed Specifies the port speed as either 10, 100, 1,000 (1 Gigabit), 2,500 (2.5
Gigabit), 5,000 (5 Gigabit), 10,000 (10 Gigabit), 25,000 (25 Gibabit),
40,000 (40 Gigabit), 50,000 (50 Gigabit), or 100,000 (100 Gigabit)
Mbps ports.
duplex [half] Specifies half duplex; transmitting and receiving data one direction at
a time.
duplex [full] Specifies full duplex; transmitting and receiving data at the same time.
Default
Auto on for 1G and 10G copper ports.
Usage Guidelines
The type of ports enabled for autonegotiation are 802.3u for 10/100 Mbps ports or 802.3z for gigabit
Ethernet ports.
When configuring combo ports you can specify the medium as copper or fiber. If the medium is not
specified for combination ports then the configuration is applied to the current primary medium. The
current primary medium is displayed in the Media Primary column of the show ports
configuration command output.
Note
The keyword medium is used to select the configuration medium for combination ports. If the
port_list contains any non-combination ports, the command is rejected.
When upgrading a switch running ExtremeXOS 12.3 or earlier software to ExtremeXOS 12.4 or
later, saved configurations from combo ports (copper or fiber) are applied only to combo
ports fiber medium. When downgrading from ExtremeXOS 12.4 or later to ExtremeXOS 12.3 or
earlier, saved configurations from combo ports (copper or fiber) are silently ignored.
Therefore, you need to reconfigure combo ports during such an upgrade or downgrade.
Note
For switches that do not support half-duplex (the ExtremeSwitching X450-G2 and X460-G2),
the copper switch ports must have auto negotiation disabled and full duplex enabled when
connecting 10/100/1000 Mbps devices that do not auto negotiate. If the switch attempts and
fails to auto negotiate with its partner, it will fail to link up. A non-negotiating connected
device must also be manually configured for full duplex or packet loss and port errors will
occur each time it detects a collision.
Example
The following example configures the switch to autonegotiate for port 2, with copper medium at a port
speed of 100 Mbps at full duplex:
# configure ports 2 medium copper auto on speed 100 duplex full
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the autopolarity detection feature on the specified Ethernet ports.
Syntax Description
port_list Specifies one or more ports on the switch.
off Disables the autopolarity detection feature on the specified ports.
on Enables the autopolarity detection feature on the specified ports.
Default
Enabled.
Usage Guidelines
This feature applies to only the 10/100/1000 BASE-T ports, and copper medium on combination ports.
When autopolarity is disabled on one or more Ethernet ports, you can verify that status by using the
following command:
# show ports information detail
Example
The following command disables the autopolarity detection feature on ports 5 to 7 on a switch:
# configure ports 5-7 auto-polarity off
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a user-defined string for a port or group of ports.
Syntax Description
port_list Specifies one or more ports or slots and ports.
string Specifies a user-defined display string.
Default
The null string is the default.
Usage Guidelines
The display string can be up to 15 characters. Display strings do not need to be unique for each port—
you can assign the same string to multiple ports. For example, you could give all the ports that
connected to a particular department a common display string.
The string is displayed in certain commands such as the show ports information command.
Note
Do not use a port number as a display string. For example, do not assign the display string “2”
to port2.
Example
The following command configures the user-defined string corporate for port 1 on a stand-alone switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the default dot1p priority to be used for the internal priority for untagged
traffic on the specified port.
Syntax Description
port_list Specifies a port list.
all Specifies all ports.
dot1p_priority Priority number from 0 to 7 to be used for untagged packets.
Default
0.
Usage Guidelines
Use this command to configure the default dot1p priority to be used for the internal priority for
untagged traffic on the specified port. This priority is used for untagged frames when dot1p
examination is enabled on a port.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the default DWDM channel number.
Syntax Description
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
Default
Channel number - 21.
Usage Guidelines
Use this command to configure the default DWDM channel number to the DWDM optical module
inserted in the given port. This default channel number of 21 and will be mapped to the appropriate
corresponding channel number of the vendor specific channel. If a non-tunable DWDM optic is present,
then the DWDM configuration is silently removed from the software.
Example
The following command configures the default DWDM channel 21 on supported port 1:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Selects the DWDM channel frequency for the selected ports.
Syntax Description
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
channel_number Specifies the channel number, which corresponds to one of 102
available channel frequencies.
Default
Channel number – 21.
Usage Guidelines
The following table lists the available frequencies and the channel number you must specify to select
each frequency.
Table 18: TX Wavelengths and Channel Assignments for the Tunable DWDM XFP/SPF+
TX Channel TX Channel TX Channel TX Channel
Wavelength Wavelength Wavelength Wavelength
1568.77 nm 11 1558.17 nm 24 1547.72 nm 37 1537.40 nm 50
1568.36 nm 1150 1557.77 nm 2450 1547.32 nm 3750 1537.00 nm 5050
1567.95 nm 12 1557.36 nm 25 1546.92 nm 38 1536.61 nm 51
1567.54 nm 1250 1556.96 nm 2550 1546.52 nm 3850 1536.22 nm 5150
1567.13 nm 13 1556.55 nm 26 1546.12 nm 39 1535.82 nm 52
1566.72 nm 1350 1556.15 nm 2650 1545.72 nm 3950 1535.43 nm 5250
1566.31 nm 14 1555.75 nm 27 1545.32 nm 40 1535.04 nm 53
1565.90 nm 1450 1555.34 nm 2750 1544.92 nm 4050 1534.64 nm 5350
1565.50 nm 15 1554.94 nm 28 1544.53 nm 41 1534.25 nm 54
1565.09 nm 1550 1554.54 nm 2850 1544.13 nm 4150 1533.86 nm 5450
1564.68 nm 16 1554.13 nm 29 1543.73 nm 42 1533.47 nm 55
1564.27 nm 1650 1553.73 nm 2950 1543.33 nm 4250 1533.07 nm 5550
1563.86 nm 17 1553.33 nm 30 1542.94 nm 43 1532.68 nm 56
1563.45 nm 1750 1552.93 nm 3050 1542.54 nm 4350 1532.29 nm 5650
1563.05 nm 18 1552.52 nm 31 1542.14 nm 44 1531.90 nm 57
Table 18: TX Wavelengths and Channel Assignments for the Tunable DWDM XFP/SPF+
(continued)
TX Channel TX Channel TX Channel TX Channel
Wavelength Wavelength Wavelength Wavelength
1562.64 nm 1850 1552.12 nm 3150 1541.75 nm 4450 1531.51 nm 5750
1562.23 nm 19 1551.72 nm 32 1541.35 nm 45 1531.12 nm 58
1561.83 nm 1950 1551.32 nm 3250 1540.95 nm 4550 1530.72 nm 5850
1561.42 nm 20 1550.92 nm 33 1540.56 nm 46 1530.33 nm 59
1561.01 nm 2050 1550.52 nm 3350 1540.16 nm 4650 1529.94 nm 5950
1560.61 nm 21 1550.12 nm 34 1539.77 nm 47 1529.55 nm 60
1560.20 nm 2150 1549.72 nm 3450 1539.37 nm 4750 1529.16 nm 6050
1559.79 nm 22 1549.32 nm 35 1538.98 nm 48 1528.77 nm 61
1559.39 nm 2250 1548.91 nm 3550 1538.58 nm 4850 1528.38 nm 6150
1558.98 nm 23 1548.51 nm 36 1538.19 nm 49
1558.58 nm 2350 1548.11 nm 3650 1537.79 nm 4950
The supported channel numbers are not contiguous. If you specify a channel number that is not listed in
the preceding table, the following error message appears:
Error: DWDM Channel configuration failed. Channel number 100 is out of
configurable range. The channel range for the Optical module in port
<port number> is 11 .. 6150.
If the optical module in one of the ports in the specified list does not support DWDM, the following error
message is displayed:
Error: No TDWDM Optics on port <port number>.
If the optical module in one of the ports in the specified port list is not an Extreme supported optical
module, the following error message is displayed:
Error: DWDM Channel configuration failed. Optical module is not Extreme
Networks certified. For DWDM channel configuration, Extreme Network
Certified DWDM module is required.
To display the configuration, use the show ports configuration or the show ports
information detail command.
Example
The following command configures DWDM channel 21 on a modular port 1:1:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables EEE on the physical layer.
Syntax Description
port_list Specifies one or more ports or slots and ports.
on Specifies that the port advertises to its link partner that it is EEE
capable at certain speeds
off Specifies that the port advertises to its link partner that it is not EEE
capable at certain speeds
Default
Off.
Usage Guidelines
Use this command to enable EEE on the switch. The keyword on specifies that the port advertises to its
link partner that it is EEE capable at certain speeds. If both sides, during auto-negotiation, determine
that they both have EEE on and are compatible speed wise, they will determine other parameters (how
long it takes to come out of sleep time, how long it takes to wake up) and the link comes up. During
periods of non-activity, the link will shut down parts of the port to save energy. This is called LPI for low
power idle. When one side sees it must send something, it wakes up the remote and then transmits.
Example
The following example turns the EEE feature on for port 2:
config port 2 eee on
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
EEE is supported on the following Extreme Networks platforms:
• ExtremeSwitching X440-G2—all copper ports
• ExtremeSwitching X450-G2—BASE-T ports only
• ExtremeSwitching X460-G2—all copper ports, except the 16 multi-rate ports on the X460-
G2-16mp-32p-10GE4
• ExtremeSwitching X465—copper 10/100/1000.
• ExtremeSwitching X620—all copper ports with 12 multi-rate ports on X620-16p supporting EEE only
at 10G
• v X690—100Mb, 1Gb, and 10Gb on 10GBaseT ports of X690-48t-2q-4c
• ExtremeSwitching X590—100Mb, 1Gb, and 10Gb on 10GBaseT ports of X690-48t-2q-4c
Description
Enables/disables IEEE Forward Error Correction (FEC) Clause 74 or 91 modes.
Syntax Description
port_list List of ports to enable/disable FEC modes on.
forward-error- Configures port FEC mode.
correction
off Disables all FEC modes (default).
on Enables FEC modes.
c174 Enables/disables FEC IEEE Clause 74.
c191 Enables/disables FEC IEEE Clause 91.
Default
FEC is not enabled by default.
Usage Guidelines
This command allows you to enable/disable Clause 91 or Clause 74 (exclusively) on a per-port basis
regardless of speed/type.
FEC gives the receiver the ability to correct errors without requiring a reverse channel to request
retransmission of data, but at the cost of a fixed, higher forward channel bandwidth. Some devices
require this to interoperate.
Example
The following example enables FEC Clause 91 on port 1:
# configure ports 1 forward-error-correction on cl91
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X465 (VIM-4YE),X590, X670-G2, X690, and X870
series switches.
Description
Enables isolation mode on a per-port basis.
Syntax Description
port_list Specifies one or more ports, or slots and ports.
isolation Specifies that Isolated ports are not allowed to inter-communicate.
on Turns on isolation. Isolated ports are not allowed to inter-
communicate.
off Turns off isolation. This is the default setting.
Default
Isolation is off by default.
Usage Guidelines
Use this command to enable isolation mode on a per-port basis. You can issue the command on a single
port or on a master port of a load share group. If you issue the command on a non-master port of a load
share group the command will fail. When a port load share group is formed, all of the member ports
assume the same isolation setting as the master port.
Example
The following command enables isolation mode on ports 2 and 4 on a switch:
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures L2PT profiles on service interfaces.
Syntax Description
vlan Specifies the VLAN configuration.
vman Specifies the VMAN configuration.
vlan_name Specifies the VLAN name.
ports port_list Specifies the port and port list separated by a comma ( , ) or dash
( - ).
profile Specifies the L2PT profile for the ports.
none Specifies that no L2PT profile should be bound to the ports (default).
profile_name Specifies the L2PT profile to be bound to the ports.
Default
Disabled.
Usage Guidelines
Use this command to configure L2PT profiles on service interfaces.
Example
The following example binds my_l2pt_prof with ports 2 and 5 of VMAN cust1:
configure vman cust1 ports 2,5 l2pt profile my_l2pt_prof
The following example binds my_l2pt_prof with ports 2 and 5 of VMAN cust1. Port 5 is not a part of
VMAN cust1:
configure vman cust1 ports 2,5 l2pt profile my_l2pt_prof
Error: Port 5 is not part of the service.
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Add or deletes actions (disabling ports, logging events, generating SNMP traps) to be taken when
excessive link flapping is detected.
Syntax Description
ports Physical ports.
port_list List of ports to set link-flap detection actions upon.
all Sets the configured action for link-flap detection upon all ports in the
system.
action Sets actions to be taken when excessive link flapping is detected.
add Adds action(s).
delete Deletes action(s).
disable-port Disables selected ports if link-flap threshold is exceeded. After a port
is disabled, the port either stays down for the configured disable time
value (set in the configure ports link-flap-detection
interval threshold disable-time command) or can be re-
enabled manually using the clear ports link-flap-
detection status command.
log Generates a log event if link-flap threshold is exceeded.
Default
By default, all actions are turned off.
Example
The following example adds all link-flap actions (disabling ports, logging events, generating SNMP
traps) on ports 3–10:
configure ports 3-10 link-flap-detection action add all-actions
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets interval, threshold (maximum number of link down events), and disable time values for link-flap
detection.
Syntax Description
ports Physical ports.
port_list List of ports to activate link-flap detection upon.
all Sets link-flap detection characteristics on all ports in the system.
interval Sets time interval for collecting link-flap events.
interval Interval value in seconds. Default is 5 seconds. Range is 1 second to
indefinitely.
indefinitely Accumulate link-flap instances forever.
threshold Sets number of link-flap events tolerated before action is taken.
Default
These options have the following default values:
Usage
If the default link-scan interval is 50 ms, then in 1 second, a maximum of 20 link state transitions (up or
down) and 10 link down transitions can be detected. Assuming the link-flap interval is set to 5, the
maximum link-flap threshold is 10 * 5 = 50. Maximum threshold for interval of 10 seconds appears in the
output of the show ports all link-flap configuration command.
Similarly, if the current threshold is 50, default link-scan interval is 50 ms, and the interval is changed to
4 seconds, then an error message appears:
configure ports 7 link-flap-detection threshold 100
configure ports 7 link-flap-detection interval 2
Error: Current threshold of 100 for port 7 is invalid with
new interval value of 2 seconds. Threshold must be less
than 40 for interval to be 2 seconds.
Example
The following example sets the threshold value to 15 link flaps that can be accumulated in an infinite
interval for all ports.
configure ports all link-flap-detection interval indefinitely threshold 15
History
This command was first available in ExtremeXOS release 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Turns on or off link-flap detection.
Syntax Description
ports Physical ports.
port_list List of ports to activate link-flap detection upon.
all Activates link-flap detection on all port in the system.
on Link-flap detection is on.
off Link-flap detection is off.
Default
Link-flap detection is disabled by default.
Example
The following example turns off link-flap detection on ports 1–15:
Configure ports 1-15 link-flap-detection off
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the link-scan interval. The configure command allows the user to set the interval in a range
between the default for the platform and 500 ms. A higher interval can free up CPU cycles when fast
link detection is not a requirement.
Syntax Description
ports Ports.
link-scan Configure link scan attributes for polling port status.
interval Configure amount of time between polling port status
milliseconds Interval in milliseconds. Range is 50 to 500 for most platforms. The minimum
interval depends on the default for the platform."; type="int"; range="[50,500]
default Default interval (50 ms for most platforms).
slot Slot number (default all slots)"; capability="slot_available"
all All slots.
Default
50 ms.
Usage Guidelines
Use this command to configure the link-scan interval.
Example
# sh ports link-scan
Slot Interval (ms)
----- ---------------
1 50 (default)
2 300
3 50 (default)
4 50 (default)
5
6
7
8 200
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Starts counting VLAN statistics on a port or a group of ports.
Syntax Description
port_list Specifies one or more ports. May be in the form: 1, 2, 3-5, 2:5, 2:6-2:8.
all Specifies all ports.
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
rx-only Specifies receive statistics.
tx-only Specifies transmit statistics.
Default
N/A.
Usage Guidelines
Use this command to configure access to VLAN statistics per port.
The rx-only and tx-only parameters are intended for, but not restricted to, use on ports that support
both receive and transmit statistics. Ports on slots that do not support transmit statistics do not require
explicit use of the rx-only keyword. In the absence of specifying either rx-only or tx-only, both RX and
TX VLAN statistics are gathered if both are supported on the configured port.
When both receive and transmit statistics are configured and resources for either receive or transmit are
not available, neither receive nor transmit statistics will be configured.
The number of VLANs that can be monitored is dependent on filtering resources on the involved switch.
When per-port monitoring is configured, the following commands display the latest statistics directly
from the hardware in real time. This information is not logged.
To display VLAN statistics at the port level, use the following command:
show ports {port_list} vlan statistics {no-refresh | refresh}
To display VLAN statistics at the VLAN level, use the following command:
Example
The following example configures per-port monitoring of transmit statistics for a set of ports for the
VLAN named finance on a switch:
configure ports 2,3 monitor vlan finance tx-only
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X450-G2, X460-G2, X670-G2, X440- G2, X465,
X590, X620, X690, X870 series switches.
Description
Partitions 100G and 40G ports into multiple partition speeds. Also, for ExtremeSwitching X465 series
switches, partitions 25G ports into a single 10G port.
Syntax Description
port_list Specifies one or more ports.
all Specifies all ports.
1x100G Specifies partitioning a 100G port into a single 100G port (applies only to
switches with 100G port(s)).
1x40G Specifies partitioning a 40G port into a single 40G port (applies only to switches
with 40G port(s)).
2x50G Specifies partitioning a 100G port into a two 50G port (applies only to switches
with 100G port(s)).
4x10G Specifies partitioning a 40G port into a four 10G port (applies only to switches
with 40G port(s)).
Specifies partitioning a 25G port into a single 10G port (applies only to X465).
Apply 4x10G option on the first VIM port (port 25 on 24-port models, and port
49 on 48-port models).
4x25G Specifies partitioning a 100G port into a four 25G port (applies only to switches
with 100G port(s)).
Default
For 40G ports the default partition is 1x40G.
Usage Guidelines
Use this command to partition 100G and 40G ports into multiple partition speeds, and for
ExtremeSwitching X465 series switches, partitions25G ports into a single 10G port.
For ExtremeSwitching X465 series switches, to partition a 25G port into a single 10G port, . apply the
4x10G option on the first VIM port (port 25 on 24-port models, and port 49 on 48-port models).
Example
The following example partitions port 6:1 into four 10G ports:
configure ports 6:1 partition 4x10G
History
This command was available in ExtremeXOS 12.6.
This command was expanded to include partitioning 100G ports in ExtremeXOS 22.2
Platform Availability
This command is available on the following switch models:
40 Gb One 40 Gb port or
Four 10 Gb ports
Description
This command configures the bandwidth usage of the six uplink ports (49, 53, 57, 61, 65, 69) of the
ExtremeSwitching X690 series switches.
Syntax Description
partition-template Specifies configuring bandwidth usage of the ExtremeSwitching X690
series switches' uplink ports.
2x100G-and-4x40G Selects the following usage:
• Ports 49–52: 40G
• Ports 53–56: 40G
• Ports 57–60: 40G
• Ports 61–64: 100G
• Ports 65–68: 40G
• Ports 69–72: 100G
This is the default setting.
4x100G Selects the following usage:
• Ports 49–52: Not used
• Ports 53–56: Not used
• Ports 57–60: 100G
• Ports 61–64: 100G
• Ports 65–68: 100G
• Ports 69–72: 100G
Default
The default setting is 2x100G and 4x40G.
Usage Guidelines
ExtremeSwitching X690 series switches allow 400Gbps of combined I/O bandwidth for the six uplink
ports (49, 53, 57, 61, 65, 69). If all of these uplink ports are configured to use their maximum capacity
(49, 53 can operate at 40G; and 57, 61, 65, and 69 can operate at 100G), they can exceed the total
allowed bandwidth:
Port 49 (40G) + Port 53 (40G) + Port 57 (100G) + Port 61 (100G) + Port 65 (100G) + Port 69 (100G) =
480G > 400G (allowed limit)
The default port partition template configures the six ports as two 100G and four 40G ports. This
default uses all six ports within the available total I/O bandwidth. You can also create a configuration of
four 100G uplink ports. In this configuration, two QSFP ports, 49 and 53, are unused so as not to exceed
the total allowed I/O bandwidth. The output of the show ports partition-template {slot
[ slot | all ] } command indicates "not present" (NP) state for the unused ports.
Example
The following example changes the configuration of the six uplink ports on an ExtremeSwitching X690
switch from the default configuration of 2x100G and 4x40G to 4x100G:
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X690 series switches.
Description
Configures the primary uplink port to use a preferred medium.
Syntax Description
port_list Specifies the port number. On a stand-alone switch, this value is just the port
number, and on a SummitStack, this value is the slot and port number.
copper Specifies that the port should always use the 10/100/1000 BASE-T connection
whenever a link is established even when a fiber link is also present.
fiber Specifies that the port should always use the 1 gigabit Ethernet fiber connection
whenever a link is established even when a copper link is also present.
force Disables automatic failover. If the specified preferred medium is not present, the
link does not come up even if the secondary medium is present.
Default
The default is fiber.
Usage Guidelines
You specify either copper or fiber for the specified port. The switch evaluates the copper energy and
the fiber signal at the time these ports come online. If both are present, the configured preferred
medium is chosen; however, if only one is present, the switch brings up that medium and uses this
medium the next time the switch is rebooted. When a failure occurs and the uplinks are swapped, the
switch continues to keep that uplink assignment until another failure occurs or until the assignment is
changed using the CLI.
If you use the force option, it disables automatic failover. If you force the preferred-medium to fiber and
the fiber link goes away, the copper link is not used, even if available.
To display the preferred medium, use the show port information detail command (you must use the
detail variable to display the preferred medium).
It is not recommended to use SFP in a 10G fiber combination port while designating copper forceas
the preferred medium. Link does not come up if SFP is used.
Note
Running this command on the combination ports of the ExtremeSwitching X460-G2 or the
X440-G2 series switches flaps the active link once.
Example
The following example establishes copper port 4 as the primary uplink on the ExtremeSwitching series
switch and fiber port 4 as the redundant uplink port:
configure ports 4 preferred-medium copper
Copper port 4 becomes the primary uplink until a failure occurs on that link. At that time, fiber port 4
becomes the primary uplink and copper port 4 becomes the redundant port. This assignment stays in
place until the next failure.
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X460-G2, X440-G2, and X620 series switches.
Description
Configures protocol filtering on a port.
Syntax Description
port_list Specifies the port list separated by a comma ( , ) or dash ( - ).
all Specifies all ports.
protocol filter Specifies the protocol filter.
Default
Disabled.
Usage Guidelines
Use this command to configure protocol filtering on a port.
Example
The following example unbinds the L2PT profile from peer 1.1.1.1 of VPLS cust2:
configure l2vpn vpls cust2 peer 1.1.1.1 l2pt profile none
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a port-based traffic group, which configures one or more ingress ports to use a particular
egress QoS profile.
Syntax Description
port_list Specifies a list of ports or slots and ports.
qosprofile Specifies a QoS profile.
Default
All ingress ports have the default qosprofile of QP1.
Usage Guidelines
This command assigns traffic ingressing the specified port to a specified egress QoS profile. Extreme
switches support eight egress QoS profiles (QP1 to QP8) for each port. SummitStack does not permit
configuration of QP7.
Example
The following command configures port 5 to use QoS profile QP3:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an egress traffic rate limit for a port or groups of ports.
Syntax Description
port_list Specifies one or more ports or slots and ports.
no-limit Specifies traffic be transmitted without limit; use to reconfigure or unconfigure
previous rate-limiting parameters.
cir-rate Specifies the desired rate limit in Kbps, Mbps, or Gbps.
max-burst-size Specifies the maximum burst size or peak burst size in kilobits (Kb) or megabits
(Mb).
Default
No-limit.
Usage Guidelines
Port speed limits the egress traffic, as follows:
• 1 Gbps port—64 Kbps increments.
• 10 Gbps port—1 Mbps increments.
If the specified egress limit (cir-rate) is not a multiple of 64 Kbps for a 1 Gbps port or 1 Mbps for a
10Gbps port, the specified value is rounded down to the nearest appropriate multiple based on the port
type.
The max-burst-size parameter is the amount of traffic above the value in the cir-rate parameter that is
allowed to burst from the port(s) for a short duration. If max-burst-size has been configured as "0", then
it will use maximum available burst value.
Example
The following command configures egress rate-limiting on port 1 a switch for 3 Mbps and a maximum
burst size or 5 M bits:
History
This command was available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Limits the amount of ingress flooded traffic; minimizes network impact of broadcast loops.
Syntax Description
port_list Specifies the port number. On a stand-alone switch, this value is just the port
number, and on a SummitStack, this value is the slot and port number.
port_group Port group name.
broadcast Specifies all broadcast packets.
multicast Specifies all flooded multicast packets (known IP multicast caches are still
forwarded at line rate).
unknown- Specifies all packets with unknown MAC DAs.
destmac
no-limit Specifies unlimited rate.
pps Packets per second allowed; range is from 0 to 262,144.
out-actions Out-of-profile action.
log Generate log event if traffic exceeds configured rate.
trap Generate SNMP trap if traffic exceeds configured rate.
disable-port Disable the underlying port when traffic exceeds configured rate.
Default
No limit.
Usage Guidelines
Use this command to limit the amount of ingress flooding traffic and to minimize the network impact of
broadcast loops.
Note
When the multicast keyword is used, both known and unknown multicast traffic will be
rate limited.
Example
The following example rate limits broadcast packets on port 3 on a stand-alone switch to 500 pps:
configure ports 3 rate-limit flood broadcast 500
History
This command was available in ExtremeXOS 11.1.
The out-actions, log, trap, disable-port, and port_group options were added in
ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a software-controlled redundant port.
Syntax Description
primaryPort Specifies one primary port or slot and port.
redundantPort Specifies one or redundant port or slot and port.
secondaryPort
link Specifies state of link:
on—Specifies keeping the redundant port active, but block trafficoff—Specifies
forcing the link down on the redundant port
Default
N/A.
Usage Guidelines
The first port specifies the primary port. The second port specifies the redundant port.
A software-controlled redundant port is configured to back up a specified primary port; both ports are
on the same device. The redundant port tracks the link state of the associated primary port, and if the
link on the primary port fails, the redundant port establishes a link and becomes active. You can back up
a specified Ethernet port with a redundant, dedicated Ethernet port.
You configure the redundant link to be always physically up but logically blocked or to be always
physically down. The default is off, or the redundant link is down.
The following criteria must be considered when configuring a software-controlled redundant port:
• You can configure only one redundant port for each primary port.
• You cannot have any Layer 2 protocols configured on any of the VLANs that are present on the
ports. (You will see an error message if you attempt to configure software redundant ports on ports
with VLANs running Layer 2 protocols.)
• The primary and redundant port must have identical VLAN memberships.
• The master port is the only port of a load-sharing group that can be configured as either a primary
or redundant port. (The entire trunk must go down before the software-controlled redundant port
takes effect.)
• Only one side of the link should be configured as redundant.
Example
The following command configures a software-controlled redundant port:
History
This command was available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures virtual ports for limited or locked MAC address learning.
Syntax Description
port_list Specifies one or more ports or slots and ports.
tagged tag Specifies the port-specific VLAN tag. When there are multiple ports
specified in the port_list, the same tag is used for all of them.
vlan_name Specifies the name of the VLAN.
vlan_list Specifies a VLAN list of IDs.
limit-learning number Specifies a limit on the number of MAC addresses that can be
dynamically learned on the specified ports.
blackhole Specifies that blackhole entries are created for MAC addresses that
exceed the limit-learning limit. This is the default setting.
stop-learning Specifies that the learning be halted to protect the switch from
exhausting FDB resources by not creating blackhole entries.
lock-learning Specifies that the current FDB entries for the specified ports should
be made permanent static, and no additional learning should be
allowed.
unlimited-learning Specifies that there should not be a limit on MAC addresses that can
be learned.
unlock-learning Specifies that the port should be unlocked (allow unlimited, dynamic
learning).
Default
Unlimited, unlocked learning.
Usage Guidelines
If you have enabled ESRP, see the appropriate volume of the ExtremeXOS 30.5 User Guide for
information about using this feature with ESRP.
Limited learning
The limited learning feature allows you to limit the number of dynamically-learned MAC addresses per
VLAN. When the learned limit is reached, all new source MAC addresses are blackholed at both the
ingress and egress points. This prevent these MAC addresses from learning and responding to ICMP and
address resolution protocol (ARP) packets.
If the limit you configure is greater than the current number of learned entries, all the current learned
entries are purged.
Dynamically learned entries still get aged, and can be cleared. If entries are cleared or aged out after the
learning limit has been reached, new entries will then be able to be learned until the limit is reached
again.
Permanent static and permanent dynamic entries can still be added and deleted using the create
fdb and delete fdb commands. These override any dynamically learned entries.
For ports that have a learning limit in place, the following traffic still flows to the port:
• Packets destined for permanent MACs and other non-blackholed MACs.
• Broadcast traffic.
• EDP traffic.
Traffic from the permanent MAC and any other non-blackholed MACs will still flow from the virtual port.
If you configure a MAC address limit on VLANS that participate in an Extreme Standby Router Protocol
(ESRP) domain, you should add an additional back-to-back link (that has no MAC address limit on these
ports) between the ESRP-enabled switches. Doing so prevents ESRP protocol data units (PDUs) from
being dropped due to MAC address limit settings.
Stop learning
When stop-learning is enabled with learning-limit configured, the switch is protected from exhausting
FDB resources by not creating blackhole entries. Any additional learning and forwarding is prevented,
but packet forwarding from FDB entries is not impacted.
Port lockdown
The port lockdown feature allows you to prevent any additional learning on the virtual port, keeping
existing learned entries intact. This is equivalent to making the dynamically-learned entries permanent
static, and setting the learning limit to zero. All new source MAC addresses are blackholed.
Locked entries do not get aged, but can be deleted like any other permanent FDB entries. The
maximum number of permanent lockdown entries is 1024. Any FDB entries above will be flushed and
blackholed during lockdown.
For ports that have lockdown in effect, the following traffic still flows to the port:
• Packets destined for the permanent MAC and other non-blackholed MACs.
• Broadcast traffic.
• EDP traffic.
Traffic from the permanent MAC will still flow from the virtual port.
Once the port is locked down, all the entries become permanent and will be saved across reboot.
When you remove the lockdown using the unlock-learning option, the learning-limit is reset to
unlimited, and all associated entries in the FDB are flushed.
To display the locked entries on the switch, use the following command:
show fdb
To verify the MAC security configuration for the specified VLAN or ports, use the following commands:
show vlan vlan name security show ports port_list info detail
Example
The following example limits the number of MAC addresses that can be learned on ports 1, 2, 3, and 6 in
a VLAN named accounting, to 128 addresses:
configure ports 1, 2, 3, 6 vlan accounting learning-limit 128
The following example locks ports 4 and 5 of VLAN accounting, converting any FDB entries to static
entries, and prevents any additional address learning on these ports:
configure ports 4,5 vlan accounting lock-learning
The following example removes the learning limit from the specified ports:
configure ports 1, 2, vlan accounting unlimited-learning
The following example unlocks the FDB entries for the specified ports:
configure ports 4,5 vlan accounting unlock-learning
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the power visualization, which periodically polls for input power usage.
Syntax Description
seconds Input power usage poll interval in seconds. If zero is configured, then
the input power measurement is disabled.
change-action The action to be taken whenever the power is increased or decreased
by the configured threshold power value (none, log, log-and-trap, or
trap).
watts The power value in watts for the change threshold. The default value
is 2 watts.
Default
The default poll interval is 60 seconds.
Usage Guidelines
Use this command to configure change actions to be taken when input power usage is increased or
decreased by the configured threshold power value. The polling interval is also configurable, with a
default value of 60 seconds.
Note
Input power usage values are only estimates.
Example
The following command configures a polling interval of 10 seconds, a change action of log-and-trap,
and a change threshold of 3 watts:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds the specified VLAN as the network VLAN on the specified PVLAN.
Syntax Description
name Specifies the name of the PVLAN to which the VLAN is added.
vlan_name Specifies a VLAN to add to the PVLAN.
Default
N/A.
Usage Guidelines
The VLAN must be created and configured with a tag before it is added to the PVLAN.
Example
The following example adds VLAN "sharednet" as the network VLAN for the PVLAN named
"companyx":
configure private-vlan companyx add network sharednet
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the Private VLAN feature. The features and the
platforms that support them are listed in the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Adds the specified VLAN as a subscriber VLAN on the specified PVLAN.
Syntax Description
name Specifies the name of the PVLAN to which the VLAN is added.
vlan_name Specifies a VLAN to add to the PVLAN.
non-isolated Configures the subscriber VLAN as a non-isolated subscriber VLAN.
port Specifies the port that serves as the loopback port.
Default
If the non-isolated option is omitted, this command adds the specified VLAN as an isolated
subscriber VLAN.
Usage Guidelines
The VLAN must be created and configured with a tag before it is added to the PVLAN. If the non-
isolated option is omitted, the VLAN is added as an isolated subscriber VLAN. If the non-isolated option
is included, the VLAN is added as an non-isolated subscriber VLAN.
If two or more subscriber VLANs have overlapping ports (where the same ports are assigned to both
VLANs), each of the subscriber VLANs with overlapping ports must have a dedicated loopback port.
Example
The following example adds VLAN "restricted" as a subscriber VLAN for the PVLAN named
"companyx":
configure private-vlan companyx add subscriber restricted isolated
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the Private VLAN feature. For features and the
platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes the specified VLAN from the specified PVLAN.
Syntax Description
name Specifies the name of the PVLAN from which the VLAN is deleted.
network Specifies that the VLAN to be deleted is a network VLAN.
subscriber Specifies that the VLAN to be deleted is a subscriber VLAN.
vlan_name Specifies the VLAN to delete from the PVLAN.
Default
N/A.
Usage Guidelines
This command deletes a VLAN from a PVLAN, but it does not delete the VLAN from the system—it just
breaks the link between the VLAN and the PVLAN. You can use this command to delete both network
and subscriber VLANs.
Example
The following example deletes network VLAN "sharednet "from the PVLAN named "companyx":
configure private-vlan companyx delete network sharednet
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the Private VLAN feature. For features and the
platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a user-defined protocol filter.
Syntax Description
filter Configures a protocol filter.
filter_name Specifies a protocol filter name.
add Specifies that you add a protocol.
delete Specifies that you delete a protocol.
etype Specifies an ethertype protocol.
llc Specifies LLC protocol.
snap Specifies SNAP protocol.
hex Specifies a four-digit hexadecimal number between 0 and FFFF that
represents:
• The Ethernet protocol type taken from a list maintained by the
IEEE.
• The DSAP/SSAP combination created by concatenating a two-
digit LLC Destination SAP (DSAP) and a two-digit LLC Source SAP
(SSAP).
• The SNAP-encoded Ethernet protocol type.
Default
N/A.
Usage Guidelines
Supported protocol types include:
• etype—IEEE Ethertype.
• llc—LLC Service Advertising Protocol.
• snap—Ethertype inside an IEEE SNAP packet encapsulation.
The protocol filter must already exist before you can use this command. Use the create protocol
command to create the protocol filter.
Note
Protocol-based VLAN for Etype from 0x0000 to 0x05ff are not classifying as per filter. When
traffic arrive with these Etypes, it is classifed to native VLAN rather protocol-based VLAN.
Example
The following example adds MPLS to "my_filter":
configure protocol “my_filter” add etype 0x8847
configure protocol filter “my_filter” add etype 0x8847
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command changes the CPU limit for the "Other" (non-ExtremeXOS) process group.
Syntax Description
other Designates "Other" (non-ExtremeXOS) process group.
cpu-limit Designates changing the maximum amount of CPU that the "Other"
process group can use during resource contention.
cpu-limit Sets the value for the CPU limit value as a percentage. The valid range
is 5% to 50%; default is 10%.
Default
By default, the CPU limit of "Other" group is 10%. With the default configuration, the "EXOS" group CPU
limit is 90%.
Usage Guidelines
This command allows you to configure CPU limits for the “Other” group. The configured CPU
percentage is guaranteed for the "Other" group, unless a real-time kernel task needs CPU.
When this command is issued, the CPU limit for the "EXOS" group is changed as well. For example, if
you change the CPU limit value to 30, the new values are: 70% for "EXOS", and 30% for "Other".
If you try to configure a limit that is greater than the current configured value, a warning message
appears:
Warning: Increasing CPU limit of the “Other” group may degrade EXOS performance and lead
to network instability. The CPU limit for the “Other” group has been increased from 10% to
30%.
To see the status of the process groups, use the command show process group on page 3062.
Example
The following example changes the "Other" process group CPU limit to 30%. Additionally, the "EXOS"
group is changed to 70%:
# configure process group other cpu-limit 30
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command changes the memory limit for the "Other" (non-ExtremeXOS) process group.
Syntax Description
other Designates "Other" (non-ExtremeXOS) process group.
memory-limit Designates changing the memory limit for the "Other" process group.
memory-limit Sets the value, as a percentage, for the "Other" process group
memory limit. The valid range is 5% to 50%; default is 5% of total
system memory.
Default
Default memory limit for the "Other" group is 5% of total system memory. With the default
configuration, the memory limit of the "EXOS" group is 95%.
Usage Guidelines
This command allows you to increase or decrease the memory limit assigned to the “Other” (non-
ExtremeXOS) process group. The configured limit is used as the new upper bound for the "Other"
group. When this command is issued, the memory limit for the "EXOS" group is changed as well. For
example, if the current value is 95% for "EXOS", and 5% for “Other”, if you change the memory limit
value to 30, the new values are: 70% for "EXOS", and 30% for “Other”.
If you try to set a memory limit below the value that is already consumed by the "Other" group, an error
message appears. For example, when you change the memory limit to 5% when it is already consuming
8.7%, the following error message appears.
Error: Desired memory-limit (5%) must be greater than or equal to the current memory
consumption (8.7%) of the group “Other”.
You also cannot increase the memory limit on a process group beyond the available memory for the
process group. For example, if you try increasing the memory limit on the “Other” (non-ExtremeXOS)
group to 40% when the “EXOS” group is already consuming 70%, the following error message appears:
Error: Desired memory-limit (40%) must be less than or equal to the available memory of
(30%) for the “Other” group. “EXOS” is currently consuming 70% of system memory.
To see the status of the process groups, use the command show process group on page 3062.
Example
The following example sets the "other" process group memory limit to 25%. This also sets the memory
limit to 75% for the "EXOS" group:
# configure process group other memory-limit 25
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes the specified protocol type from a protocol filter.
Syntax Description
name Specifies a protocol filter name.
hex Specifies a four-digit hexadecimal number between 0 and FFFF that
represents:
• The Ethernet protocol type taken from a list maintained by the
IEEE.
• The DSAP/SSAP combination created by concatenating a two-
digit LLC Destination SAP (DSAP) and a two-digit LLC Source SAP
(SSAP).
• The SNAP-encoded Ethernet protocol type.
Default
N/A.
Usage Guidelines
Supported protocol types include:
• etype—IEEE Ethertype.
• llc—LLC Service Advertising Protocol.
• snap—Ethertype inside an IEEE SNAP packet encapsulation.
Example
The following example deletes protocol type LLC SAP with a value of FEFF from protocol "fred":
configure protocol fred delete llc feff
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the destination address as well as an arbitrary field of the protocol.
Syntax Description
filter_name Specifies a protocol filter name.
add Specifies that you add a protocol.
delete Specifies that you delete a protocol.
dest-mac Specifies the destination MAC address used by PDUs of the protocol.
mac_address Specifies the MAC address.
etype Specifies the EtherType used by PDUs of the protocol.
llc Specifies the LLC DSAP and SSAP used by PDUs of the protocol.
snap Specifies the SNAP protocol identifier used by PDUs of the protocol.
hex Specifies a four-digit hexadecimal number between 0 and FFFF that
represents:
• The Ethernet protocol type taken from a list maintained by the
IEEE.
• The DSAP/SSAP combination created by concatenating a two-digit
LLC Destination SAP (DSAP) and a two-digit LLC Source SAP
(SSAP).
• The SNAP-encoded Ethernet protocol type.
Default
N/A.
Usage Guidelines
Supported protocol types include:
• etype—IEEE Ethertype.
• llc—LLC Service Advertising Protocol.
• snap—Ethertype inside an IEEE SNAP packet encapsulation.
A maximum of 15 protocol filters, each containing a maximum of six protocols, can be defined.
The protocol filter must already exist before you can use this command. Use the create protocol
command to create the protocol filter.
No more than seven protocols can be active and configured for use.
Note
Protocol-based VLAN for Etype from 0x0000 to 0x05ff are not classifying as per filter. When
traffic arrive with these Etypes, it is classifed to native VLAN rather protocol-based VLAN.
Example
The following example LACP to the protocol list "mylist":
configure protocol “mylist” add dest-mac 01:80:C2:00:00:02 etype 0x8809 field offset 14
value
01 mask FF
The following example removes EFM OAM from the protocol list "mylist":
configure protocol filter “mylist” delete dest-mac 01:80:C2:00:00:02 etype 0x8809 field
offset
14 value 03 mask FF
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure qosprofile
configure qosprofile egress qosprofile [{minbw minbw_number} {maxbw
maxbw_number} | {peak_rate peak_bps [K | M]}] [ports [port_list |
port_group |all]]
Description
Modifies the default egress QoS profile parameters.
Syntax Description
minbw The minimum bandwidth (minbw) option specifies the committed
information rate as a percentage of the maximum port speed. The
range is 0 to 100%, and the default value is 0. When autonegotiation is
off, the CIR is the specified percentage of the configured port speed.
When autonegotiation is on, the CIR is the specified percentage of the
maximum port speed.
maxbw The maximum bandwidth (maxbw) option specifies the peak rate as a
percentage of the maximum port speed. The range is 0 to 100%, and
the default value is 100. When autonegotiation is off, the peak rate is
the specified percentage of the configured port speed. When
autonegotiation is on, the peak rate is the specified percentage of the
maximum port speed (the switch does not detect the negotiated port
speed).
peak_rate Specifies a peak rate in Kbps (k) bits or Mbps (m).
committed_rate Specifies a committed information rate in Kbps (k) bits or Mbps (m).
port_list Specifies a list of slots and ports to which the parameters apply.
Specify ports in the following formats: 3-5, 2:5, 2:6-2:8.
buffer_percentage When used without a port-list, specifies the percentage of the total
buffer you are reserving for this QoS profile on all ports for which an
override has not been configured. The range is 1 to 100; the default
setting is 100.
When used with a port-list, specifies a percentage override of the
maxbuffer setting for the QoS profile specified. The range is 1-10000;
the default is 100 (i.e., no override). Setting 100% is equivalent to
unconfiguring the maxbuffer override.
qosprofile Specifies a QoS profile name.
use-strict-priority When the global qosscheduler configuration (configure qosscheduler
command) is set to weighted-round-robin, this option overrides the
global configuration for the specified QoS profile, so that it operates in
strict-priority-mode. This enables hybrid strict-priority and weighted-
round-robin scheduling operation.
weight-value Specifies the weight value used for queue service weighting in the
weighted-round-robin scheduler for this QoS profile. Range is 1-15 or
1-127 depending on hardware type. 0=strict-priority. Default is 1.
This command enables the user to input a weight for queues in the
weighted-round-robin scheduler or weighted-deficit-round-robin
scheduler. The weight of both WRR and WDRR algorithms have been
extended to 1-127.
ports Port list for maxbuffer and per-port weight override.
port_list Port list.
port_group Port group name.
all Specifies this applies to all ports on the device.
Default
• QoS profiles—QP1 and QP8 on SummitStack and ExtremeXOS series switches
• Minimum bandwidth—0%
• Maximum bandwidth—100%
• Maximum buffer—100%
• Maxbuffer override—100% (no override)
• Weight—1
• Priority—By default, each qosprofile is assigned a different priority level:
◦ QP1 - 1, Low (the lowest priority)
◦ QP2 - 2, LowHi
◦ QP3 - 3, Normal
◦ QP4 - 4, NormalHi
◦ QP5 - 5, Medium
◦ QP6 - 6, MediumHi
◦ QP7 - 7, High
◦ QP8 - 8, HighHi (highest priority)
Usage Guidelines
Note
You can view the effect of setting the buffer-percentage using the show ports port-
list buffer command.
Note
You can view the configured buffer-percentage value using the show qosprofile or show
qosprofile ports port-list commands, respectively.
QoS profiles QP1 and QP8 are preconfigured. If you want to use a QoS profile in the range of QP2
through QP7, you must first create the QoS profile. QoS profile QP7 is reserved on SummitStack for
stack management and cannot be created or modified.
When specified without a port-list, the maxbuffer parameter can configure a reduction in the maximum
amount of packet buffer space allotted to the specified QoS profile. If you reduce the allotment below
the default value of 100%, the reduction releases packet buffer space to the shared packet buffer.
Regardless of the setting for this parameter, the system does not drop any packets as long as reserved
packet buffer memory for the port and QOS profile or shared packet memory for the port remains
available.
Note
The configuration defined by the maxbuffer attribute in this command can be overridden on a
per-port basis if the port is specified along with the maxbuffer parameter.
When specified with a port-list, the maxbuffer setting overrides the system-wide reduction of packet
buffer reservation set with the configure qosprofile maxbuffer command for the specified QoS profile. If
the packet buffer reservation is reduced to 75 percent for the entire QoS profile, the specified ports are
allotted 75% of the allotment for the specified QoS profile. If for specified ports the maxbuffer is set to
200 percent, the packet buffer reservation will be set to 200 percent of the normal packet buffer
reservation for those ports, thus overriding the maxbuffer percentage set for the QoS profile.
Note
The packet buffer configuration feature is provided for expert users who fully understand the
impact of buffer configuration changes. Improper buffer configuration can stop traffic flow
through QoS profiles and ports for which no direct configuration change was made.
A range of ports has its own packet buffer pool. The maxbuffer override capability allows you to
overcommit the packet buffer pool for the port range. When a packet buffer pool is overcommitted by
more than 20%, the following message appears in the system log:
Warning: Packet memory is overcommitted by <percentage> for ports in range <port-range>
It is also possible to configure maxbuffer overrides such that the size of the shared portion of the buffer
pool is reduced to zero. If some port and QoS profile in the port range for that buffer pool does not have
sufficient reserved packet memory to accommodate larger packets, it will be impossible for that port
and QoS profile to transmit any packets of the larger size. In this case, the following message appears in
the system log:
Warning: At least one port and QoS profile in port range <port-range> cannot transmit
packets larger than <packet-size> because of packet memory configuration.
The weight-value parameter does not apply when the switch is configured for strict priority scheduling,
which is the default configuration. To configure the type of scheduling you want to use for the entire
switch, use the configure qosscheduler command.
The weight-value parameter configures the relative weighting for each QoS profile. Because each QoS
profile has a default weight of 1, all QoS profiles have equal weighting. If you configure a QoS profile
with a weight of 4, that specified QoS profile is serviced 4 times as frequently as the remaining QoS
profiles, which still have a weight of 1. If you configure all QoS profiles with a weight of 16, each QoS
profile is serviced equally but for a longer period.
When the switch is configured for weighted-round-robin mode, the use-strict-priority option overrides
the switch configuration for the specified QoS profile on all ports. Among QoS profiles configured with
the use-strict-priority-option, QoS profile QP8 has the highest priority and QP1 has the lowest priority.
All strict-priority QoS profiles are serviced first according to their priority level, and then all other QoS
profiles are serviced based on their configured weight.
Note
If you specify use-strict-priority, lower-priority queues and weighted-round-robin queues are
not serviced at all as long as higher-priority queues have any remaining packets.
Example
The following example overrides the maximum buffer setting configured on QoS profile qp1 for port1:1:
# configure qosprofile qp1 maxbuffer 75 port 1:1
History
This command was first available in ExtremeXOS 10.1.
Committed and peak rates were added in ExtremeXOS 11.0. Also in ExtremeXOS 11.0, ports were made
mandatory.
Support for all platforms was added in the respective platform introduction releases.
Platform Availability
This command is available on all platforms with specific parameter exceptions as noted in the Syntax
Description above.
Description
This command enables the user to input a weight value for queue service weighting in the weighted-
round-robin scheduler or weighted-deficit-round-robin scheduler for this QoS profile. The weight value
of both WRR and WDRR algorithms have been extended to 1-127 on this supported hardware (refer to
the ExtremeXOS 30.5 User Guide for supported hardware).
Syntax Description
weight_value Range is 1-15 or 1-127 depending on hardware type.
Default
Strict priority.
Usage Guidelines
Use this command to input a weight value for queue service weighting in the weighted-round-robin
scheduler or weighted-deficit-round-robin scheduler for this QoS profile. The weight value of both WRR
and WDRR algorithms have been extended to 1-127 on this supported hardware (refer to the
ExtremeXOS 22.6 User Guide for supported hardware).
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures WRED on the specified QoS profile for the specified port.
Syntax Description
egress This optional parameter specifies an egress QoS profile.
qosprofile Specifies a QoS profile name. Valid names are QP1 to QP8.
color Specifies the WRED color to be configured.
green Specifies that the WRED configuration applies to TCP traffic that is
marked green.
non-tcp any Specifies that the WRED configuration applies to any non-TCP traffic.
red Specifies that the WRED configuration applies to TCP traffic that is
marked red.
min_thresh Specifies the minimum threshold for the specified WRED color. The
range is 1 to 100 percent.
max_threshold Specifies the maximum threshold for the specified WRED color. The
range is 1 to 100 percent.
max_drop_rate Specifies the maximum drop rate for the specified WRED color. The
range is 1 to 100 percent.
port_list Specifies a list of slots and ports to which the parameters apply.
Specify ports in the following formats: 3-5, 2:5, 2:6-2:8.
non-tcp red Specifies that the WRED configuration applies to non-TCP traffic that
is marked red.
avg_weight Specifies the weight constant for calculating the average queue size
for the specified QoS profile. The range is 1 to 15.
all Specifies that this command applies to all ports on the device.
Default
• Minimum threshold—100%
• Maximum threshold—100%
• Maximum drop rate—100%
• Average weight—4
Usage Guidelines
The max_drop_rate, min_threshold, and max_threshold parameters apply to the specified
color. The avg_weight parameter applies to all colors on the specified QoS profile. Increasing the
avg_weight value reduces the probability that traffic is dropped. Conversely, decreasing the avg_weight
value increases the probability that traffic is dropped.
Example
The following example configures WRED settings for port 2:1, QoS profile qp3, color green:
configure qosprofile qp3 wred color tcp green min-threshold 80 max-threshold 95 max-drop-
rate 75 ports 2:1
The following example configures the average weight for port 2:1, QoS profile qp2:
configure qosprofile qp2 wred avg-weight 4 ports 2:1
The following example configures WRED settings for non-TCP traffic on port 4, QoS profile qp3:
configure qosprofile qp3 wred color non-tcp any min-threshold 10 ports 4
The following example configures WRED settings using "wredGroup" as the port_group variable:
configure qosprofile qp8 wred color tcp red min-threshold 25 max-streshold 75 max-drop-
rate 30 ports wredGroup
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X450-G2, X460-G2, X670-G2, X435, X465, X590,
X620, X690, X870 series switches.
Description
This command turns Explicit Congestion Notification (ECN) on or off for the corresponding QoS profile
for the given port(s).
Syntax Description
qp_num QoS profile (qp1, qp2, qp3, qp3, qp4, qp5, qp6, qp7, qp8)
wred Designates weighted random early detection (WRED).
ecn Designates ECN.
on Enables ECN.
off Disables ECN.
ports Selects ports.
port_list Selects specific ports to apply the ECN setting for the designated QoS
profile.
all Selects all ports to apply the ECN setting for the designated QoS
profile.
Default
N/A.
Usage Guidelines
Weighted Random Early Detection (WRED) drops the packets, based on the average length exceeding
a specific threshold value to indicate congestion. Explicit Congestion Notification (ECN) is an extension
to WRED that marks the drop-eligible packets, instead of dropping, using the same criteria of minimum
threshold, maximum threshold, and drop probability
Example
The following example enables ECN for QoS profile 5 on port 2:
# configure qosprofile egress qp5 wred ecn on ports 2
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on ExtremeSwitching X460-G2, X670, X435, X465, X590, X690, X870 series
switches.
Description
This command specifies the scheduling algorithm that the switch uses to service QoS profiles.
Syntax Description
strict-priority Specifies the switch services the higher-priority QoS profiles first.
weighted-round-robin Specifies the switch services all QoS profiles based on the configured
weighting for each QoS profile.
weighted-deficit- Allows you to use a credit-based algorithm in order to sample the size
round-robin of the packet while scheduling various queues.
ports Ports to display.
port_list Port list.
port_group Port group name
all Al portsl.
Default
Strict-priority.
Usage Guidelines
When issued without a port_list or port_group, this command configures the global scheduling
algorithm that will be applied to all ports that have not been configured with per-port scheduling. When
issued with a port_list or port_group, this command configures the scheduling algorithm for specific
ports.
The scheduling algorithm for a qosprofile can be overridden either globally or on a per-port basis with
the command:
configure qosprofile qosprofile use-strict-priority
In strict-priority mode, QoS profile QP8 has the highest priority and QP1 has the lowest priority.
Note
Queues are serviced using the configured scheduling algorithm until all of the minBws are
satisfied, then all queues are serviced using the configured scheduling algorithm until all of
the maxBws are satisfied.
Example
The following example configures the switch for weighted-round-robin servicing:
configure qosscheduler weighted-round-robin
This command specifies the scheduling algorithm the switch uses to service QoS profiles. Weighted-
deficit-round-robin mode of scheduling allows you to use a credit based algorithm in order to sample in
the size of the packet while scheduling various queues.
History
This command was first available in ExtremeXOS 15.1.
The ports and all keywords, and port_list and port_group variables were added in
ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to configure the algorithm used to determine the rotation of RADIUS servers.
Syntax Description
standard Standard Extreme retransmission algorithm.
round-robin Simple Round Robin retransmission algorithm.
Default
Standard.
Usage Guidelines
Use this command to configure the algorithm to determine rotation of RADIUS servers.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to set the number of retries the switch will attempt. This value may be global or
on a per server basis.
Syntax Description
mgmt-access RADIUS authentication for management access.
netlogin RADIUS authentication for netlogin access.
primary Primary server.
secondary Secondary server.
index RADIUS server index.
retries RADIUS server retries.
retries RADIUS sever retries. Range 1-20.
Default
The default value is 3, with a range of 0-10.
Usage Guidelines
None.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures up to eight RADIUS authentication servers.
Note
It is recommended to enable loopback mode on the VLAN associated with radius if the radius
connectivity is established via a front panel port on a SummitStack.
Syntax Description
mgmt-access Specifies the RADIUS authentication server for switch management.
netlogin Specifies the RADIUS authentication server for network login.
primary Configures the primary RADIUS authentication server.
secondary Configures the secondary RADIUS authentication server.
index RADIUS server index. Range: 1 - 2147483641.
ipaddress The IP address of the server being configured.
host_ipV6addr Server IPv6 address.
hostname The host name of the server being configured.
udp_port The UDP port to use to contact the RADIUS authentication server.
ipaddress The IP address used by the switch to identify itself when
communicating with the RADIUS authentication server.
client_ipV6addr Client IPv6 address.
vr_name Specifies the virtual router on which the client IP is located.
Default
The following lists the default behavior of this command:
• The UDP port setting is 1812.
• The virtual router used is VR-Mgmt, the management virtual router.
• Switch management and network login use the same primary and secondary RADIUS servers for
authentication (only if the realm is not specified in the command).,
Usage Guidelines
Use this command to specify RADIUS server information.
The RADIUS server defined by this command is used for user name authentication and CLI command
authentication.
Beginning with ExtremeXOS 11.2, you can specify one pair of RADIUS authentication servers for switch
management and another pair for network login. To specify RADIUS authentication servers for switch
management (Telnet, SSH, and console sessions), use the mgmt-access keyword. To specify RADIUS
authentication servers for network login, use the netlogin keyword. If you do not specify a keyword,
switch management and network login use the same pair of RADIUS authentication servers.
If you are running ExtremeXOS 11.1 or earlier and upgrade to ExtremeXOS 11.2, you do not lose your
existing RADIUS server configuration. Both switch management and network login use the RADIUS
authentication server specified in the older configuration.
Specifying mgmt-access or netlogin before the index will create a RADIUS entry with only that
realm specified, if neither are specified both realms will be enabled.
Note
You cannot use a stacking alternate IP address as the RADIUS client in primary RADIUS server
configuration.
Example
The following example configures the primary RADIUS server on host radius1 using the default UDP port
(1812) for use by the RADIUS client on switch 10.10.20.30 using a virtual router interface of VR-Default:
configure radius primary server radius1 client-ip 10.10.20.30 vr vr-Default
The following example configures the primary RADIUS server for network login authentication on host
netlog1 using the default UDP port for use by the RADIUS client on switch 10.10.20.31 using, by default,
the management virtual router interface:
configure radius netlogin primary server netlog1 client-ip 10.10.20.31
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the authentication string used to communicate with the RADIUS authentication server.
Syntax Description
mgmt-access Specifies the switch management RADIUS authentication server.
netlogin Specifies the network login RADIUS authentication server.
primary Configures the authentication string for the primary RADIUS server.
secondary Configures the authentication string for the secondary RADIUS server.
index RADIUS server index.
encrypted Indicates that the string is already encrypted.
secret The string to be used for authentication.
Default
Unconfigured.
Usage Guidelines
The secret must be the same between the client switch and the RADIUS server.
The RADIUS server must first be configured for use with the switch as a RADIUS client.
The mgmt-access keyword specifies the RADIUS server used for switch management authentication.
The netlogin keyword specifies the RADIUS server used for network login authentication.
If you do not specify the mgmt-access or netlogin keywords, the secret applies to both the
primary or secondary switch management and netlogin RADIUS servers.
The encrypted keyword is primarily for the output of the show configuration command, so the shared
secret is not revealed in the command output. Do not use it to set the shared secret.
Example
The following example configures the shared secret as "purplegreen" on the primary RADIUS server for
both switch management and network login:
configure radius primary shared-secret purplegreen
The following example configures the shared secret as "redblue" on the primary switch management
RADIUS server:
configure radius mgmt-access primary shared-secret redblue
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timeout interval for RADIUS authentication requests.
Syntax Description
mgmt- Specifies the switch management RADIUS authentication server.
access
netlogin Specifies the network login RADIUS authentication server.
primary Primary server.
secondary Secondary server.
index RADIUS server index.
seconds Specifies the number of seconds for authentication requests. Range is 1 to 240
seconds.
Default
The default is 3 seconds.
Usage Guidelines
This command configures the timeout interval for RADIUS authentication requests. When the timeout
has expired, another authentication attempt will be made. After three failed attempts to authenticate,
the alternate server will be used. This only refers to the default configuration. After six failed attempts,
local user authentication will be used.
The mgmt-access keyword specifies the RADIUS server used for switch management authentication.
The netlogin keyword specifies the RADIUS server used for network login authentication.
If you do not specify the mgmt-access or netlogin keywords, the timeout interval applies to both switch
management and netlogin RADIUS servers.
Example
The following example configures the timeout interval for RADIUS authentication to 10 seconds. After
30 seconds (three attempts), the alternate RADIUS server will be used. After 60 seconds (six attempts)
local user authentication is used.
Note
This example assumes the default number of retries.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to set the number of retries the switch will attempt. This value may be global or
on a per server basis.
Syntax Description
mgmt-access RADIUS authentication for management access
netlogin RADIUS authentication for netlogin access.
primary Primary server.
secondary Secondary server.
index RADIUS server index.
retries RADIUS server retries.
retries RADIUS sever retries. Range 1-20.
Default
The default value is 3, with a range of 0-10.
Usage Guidelines
None.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the RADIUS accounting server.
Syntax Description
mgmt-access Specifies the RADIUS authentication server for switch management.
netlogin Specifies the RADIUS authentication server for network login.
primary Configures the primary RADIUS authentication server.
secondary Configures the secondary RADIUS authentication server.
index RADIUS server index. Range: 1 - 2147483641.
ipaddress The IP address of the server being configured.
host_ipV6addr Server IPv6 address.
hostname The host name of the server being configured.
udp_port The UDP port to use to contact the RADIUS authentication server.
ipaddress The IP address used by the switch to identify itself when
communicating with the RADIUS authentication server.
client_ipV6addr Client IPv6 address.
vr_name Specifies the virtual router on which the client IP is located.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
The following lists the default behavior of this command:
• The UDP port setting is 1813.
• The virtual router used is VR-Mgmt, the management virtual router.
• Switch management and network login use the same RADIUS accounting server.
Usage Guidelines
Use this command to specify the radius accounting server.
The accounting server and the RADIUS authentication server can be the same.
Beginning with ExtremeXOS 11.2, you can specify one pair of RADIUS accounting servers for switch
management and another pair for network login. To specify RADIUS accounting servers for switch
management (Telnet, SSH, and console sessions), use the mgmt-access keyword. To specify RADIUS
accounting servers for network login, use the netlogin keyword. If you do not specify a keyword,
switch management and network login use the same pair of RADIUS accounting servers.
If you are running ExtremeXOS 11.1 or earlier and upgrade to ExtremeXOS 11.2, you do not lose your
existing RADIUS accounting server configuration. Both switch management and network login use the
RADIUS accounting server specified in the older configuration.
Example
The following example configures RADIUS accounting on host radius1 using the default UDP port (1813)
for use by the RADIUS client on switch 10.10.20.30 using a virtual router interface of VR-Default for both
management and network login:
configure radius-accounting primary server radius1 client-ip 10.10.20.30 vr vr-Default
The following example configures RADIUS accounting for network login on host netlog1 using the
default UDP port for use by the RADIUS client on switch 10.10.20.31 using the default virtual router
interface:
configure radius-accounting netlogin primary server netlog1 client-ip 10.10.20.31
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the authentication string used to communicate with the RADIUS accounting server.
Syntax Description
mgmt-access Specifies the switch management RADIUS accounting server.
netlogin Specifies the network login RADIUS accounting server.
primary Configures the authentication string for the primary RADIUS
accounting server.
secondary Configures the authentication string for the secondary RADIUS
accounting server.
encrypted Indicates that the string is already encrypted.
secret The string to be used for authentication. Maximum length of 32
characters.
Default
Unconfigured.
Usage Guidelines
The secret must be the same between the client switch and the RADIUS accounting server.
The mgmt-access keyword specifies the RADIUS accounting server used for switch management.
The netlogin keyword specifies the RADIUS accounting server used for network login.
If you do not specify the mgmt-access or netlogin keywords, the secret applies to both the primary or
secondary switch management and netlogin RADIUS accounting servers.
The encrypted keyword is primarily for the output of the show configuration command, so the
shared secret is not revealed in the command output. Do not use it to set the shared secret.
Example
The following command configures the shared secret as “purpleaccount” on the primary RADIUS
accounting server for both management and network login:
The following command configures the shared secret as “greenaccount” on the primary management
RADIUS accounting server:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timeout interval for RADIUS-Accounting authentication requests.
Syntax Description
mgmt- Specifies the switch management RADIUS authentication server.
access
netlogin Specifies the network login RADIUS authentication server.
primary Primary server.
secondary Secondary server.
index RADIUS server index.
seconds Specifies the number of seconds for authentication requests. Range is 1 to 240
seconds.
Default
The default is 3 seconds.
Usage Guidelines
This command configures the timeout interval for RADIUS-Accounting authentication requests. When
the timeout has expired, another authentication attempt will be made. After three failed attempts to
authenticate, the alternate server will be used.
The mgmt-access keyword specifies the RADIUS accounting server used for switch management.
The netlogin keyword specifies the RADIUS accounting server used for network login.
If you do not specify the mgmt-access or netlogin keywords, the timeout interval applies to both switch
management and netlogin RADIUS accounting servers.
Example
This example configures the timeout interval for RADIUS-Accounting authentication to 10 seconds.
After 30 seconds (three attempts), the alternate RADIUS server will be used:
Note
This example assumes the default number of retries of 3.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures up to eight RADIUS servers with dynamic authorization.
Note
It is recommended to enable loopback mode on the VLAN associated with RADIUS if the
RADIUS connectivity is established using a front panel port on a SummitStack.
Syntax Description
dynamic-authorization Specifies RADIUS dynamic authorization.
index RADIUS server index. Range: 1–2147483641.
serverhost_ipaddrhost Server IPv4 address in either IPv4 (host_ipaddr) or IPv6
_ipV6addr (host_ipV6addr) format.
hostname The host name of the server being configured.
client-ip Client address in either IPv4 (client_ipaddr) or IPv6 format
client_ipaddrclient_i (client_ipV6addr).
pV6addr
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
The virtual router used is VR-Mgmt, the management virtual router.
Usage Guidelines
Use this command to specify RADIUS server information.
The RADIUS server defined by this command is used for user name authentication and CLI command
authentication.
Example
The following example configures a RADIUS dynamic authorization server with server index 100 on host
"radius1" using the default UDP port (1812) for use by the RADIUS client on switch 10.10.20.30 using a
virtual router interface of VR-Default:
configure radius dynamic-authorization 100 server radius1 client-ip 10.10.20.30 vr vr-
Default
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures RIP on an IP interface.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
Default
N/A.
Usage Guidelines
When an IP interface is created, RIP configuration is disabled on the interface by default. When the RIP
interface is disabled, the parameters are not reset to default automatically.
Example
The following command configures RIP on the VLAN finance:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables RIP on an IP interface.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
Default
N/A.
Usage Guidelines
When an IP interface is created, RIP configuration is disabled on the interface by default. When the RIP
interface is disabled by this command, the parameters are not reset to default automatically.
Example
The following command deletes RIP on a VLAN named finance:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures the RIP garbage time.
Syntax Description
seconds Specifies a time in seconds.
Default
120 seconds.
Usage Guidelines
None.
Example
The following command configures the RIP garbage time to have a 60-second delay:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures the import policy for RIP.
Syntax Description
policy-name Specifies the policy.
Default
No policy.
Usage Guidelines
An import policy is used to modify route attributes while adding RIP routes to the IP route table. The
import policy cannot be used to determine the routes to be added to the routing table.
Example
The following example applies the policy campuseast to RIP routes:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures the route timeout period.
Syntax Description
seconds Specifies a time in seconds.
Default
180 seconds.
Usage Guidelines
If a router does not receive an update message from its neighbor within the route timeout period (180
seconds by default), the router assumes the connection between it and its neighbor is no longer
available.
Example
The following example sets the route timeout period to 120 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Specifies the time interval in seconds within which RIP sends update packets.
Syntax Description
seconds Specifies a time in seconds. The range is 10 to 180.
Default
30 seconds.
Usage Guidelines
The router exchanges an update message with each neighbor every 30 seconds (default value) or if
there is a change to the overall routed topology (also called triggered updates). The timer granularity is
10 seconds. Timer minimum is 10 seconds and maximum is 180 seconds.
Example
The following command sets the update timer to 60 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures the cost (metric) of the interface.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
cost Specifies a cost metric.
Default
The default setting is 1.
Usage Guidelines
The specified interface cost is added to the cost of the route received through this interface.
Example
The following command configures the cost for the VLAN finance to a metric of 3:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures RIP to ignore certain routes received from its neighbor, or to suppress certain routes when
performing route advertisements.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
policy-name Specifies a policy.
none Removes any policy from the VLAN.
Default
N/A.
Usage Guidelines
Use the in option to configure an input route policy, which determines which RIP routes are accepted as
valid routes. This policy can be combined with the trusted neighbor policy to accept selected routes
only from a set of trusted neighbors.
Use the out option to configure an output route policy, which determines which RIP routes are
advertised on the VLAN.
Example
The following command configures the VLAN backbone to accept selected routes from the policy
nosales:
The following command uses the policy nosales to determine which RIP routes are advertised into the
VLAN backbone:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Syntax Description
vlan_name Specifies to apply settings to specific VLAN name.
all Specifies all VLANs.
none Specifies to drop all received RIP packets.
v1only Specifies to accept only RIP version 1 format packets.
v2only Specifies to accept only RIP version 2 format packets.
any Specifies to accept RIP version 1 and RIP version 2 packets.
Default
N/A.
Usage Guidelines
None.
Example
The following command configures the receive mode for the VLAN finance to accept only RIP version 1
format packets:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures a trusted neighbor policy to determine trusted RIP router neighbors for the VLAN on the
switch running RIP.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
policy-name Specifies a policy.
none Removes any trusted-gateway policy from the VLAN.
Default
N/A.
Usage Guidelines
Use this command to set a policy to determine trusted neighbors. A neighbor is defined by its
IPaddress. Only the RIP control packets from trusted neighbors will be processed.
Example
The following command configures RIP to use the policy nointernet to determine from which RIP
neighbor to receive (or reject) the routes to the VLAN backbone:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Changes the RIP transmission mode for one or all VLANs.
Syntax Description
vlan_name Specifies to apply settings to a specific VLAN name.
all Specifies all VLANs.
none Specifies to not transmit any packets on this interface.
v1only Specifies to transmit RIP version 1 format packets to the broadcast
address.
v1comp Specifies to transmit RIP version 2 format packets to the broadcast
address.
v2only Specifies to transmit RIP version 2 format packets to the RIP multicast
address.
Default
N/A.
Usage Guidelines
None.
Example
The following command configures the transmit mode for the VLAN finance to transmit version 2
format packets to the broadcast address:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures RIPng on an IP interface.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel-name Specifies an IPv6 tunnel.
all Specifies all IPv6 configured VLANs or tunnels.
Default
N/A.
Usage Guidelines
For RIPng to be active on the interface, it must also be globally enabled using the command disable
ripng export [direct | ospfv3 | ospfv3-extern1 | ospfv3-extern2 |
ospfv3-inter | ospfv3-intra | static | isis | isis-level-1| isis-
level-1-external | isis-level-2| isis-level-2-external | bgp]. If the keyword
all is specified, all IPv6 configured VLANs or tunnels will be configured for RIPng.
Example
The following command configures RIPng on the VLAN finance:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the cost (metric) of the interface..
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel-name Specifies an IPv6 tunnel.
metric Specifies a cost metric. Range is 1 to 15.
Default
The default setting is 1.
Usage Guidelines
The specified interface cost is added to the cost of the route received through this interface.
Example
The following command configures the cost for the VLAN finance to a metric of 3:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Default
Removes an interface from RIPng routing.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel-name Specifies an IPv6 tunnel.
all Specifies all IPv6 configured VLANs or tunnels.
Default
N/A.
Usage Guidelines
This command removes an interface from RIPng routing. However, the RIPng-specific interface
configuration will be preserved, even if RIPng is unconfigured on the interface. The interface
configuration information is removed only when the IPv6 interface itself gets deleted by, for example, by
unconfiguring all the IPv6 addresses on the interface.
Example
The following command removes the VLAN finance from RIPng routing:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the RIPng garbage time.
Syntax Description
seconds Specifies a time in seconds. Range is 10 to 2400 seconds.
Default
120 seconds.
Usage Guidelines
This command configures the time interval after which a route in the RIPng routing database that has
expired will be removed. The value is rounded off to nearest multiple of 10.
Example
The following command configures the RIPng garbage time to have a 60-second delay:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the import policy for RIPng.
Syntax Description
policy-name Specifies the policy.
Default
No policy.
Usage Guidelines
Use this command to configure the policy to be applied to RIPng routes installed into the system
routing table from the RIPng routing process. This policy can be used to modify parameters associated
with routes installed into the routing table. The import policy cannot be used to determine the routes to
be added to the routing table.
The following is a sample policy file that can be used with RIPng. It changes the metric to 12 for any
routes from the subnets 2001:db8:2ccc::/64 and 2001:db8:2ccd::/64:
entry filter_routes {
If match any{
nlri 2001:db8:2ccc:: /64;
nlri 2001:db8:2ccd:: /64;
}
then {
cost 12;
}
}
Example
The following example applies the policy campuseast to RIPng routes:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures RIPng to ignore or modify certain routes received from its neighbors, or to suppress certain
routes when performing route advertisements.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel-name Specifies an IPv6 tunnel.
policy-name Specifies a policy.
none Removes any policy from the VLAN.
Default
N/A.
Usage Guidelines
Use the in option to configure an input route policy, which determines which RIPng routes are accepted
as valid routes from RIPng neighbors. This policy can be combined with the trusted neighbor policy to
accept selected routes only from a set of trusted neighbors.
Use the out option to configure an output route policy, which determines which RIPng routes are
advertised to other RIPng neighbors.
The following is a sample policy file that could be used with RIPng. It will drop any routes from the
subnets 2001:db8:2ccc::/64 and 2001:db8:2ccd::/64:
entry filter_routes {
If match any{
nlri 2001:db8:2ccc:: /64;
nlri 2001:db8:2ccd:: /64;
}
then {
deny;
}
}
Example
The following command configures the VLAN backbone to accept routes from its neighbor as specified
by the policy nosales:
The following command uses the policy nosales to determine which RIP routes are advertised into the
VLAN backbone:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the route timeout period for RIPng.
Syntax Description
seconds Specifies a time in seconds. Range is 10 to 3600.
Default
180 seconds.
Usage Guidelines
If a router does not receive an update message from its neighbor within the route timeout period (180
seconds by default), the router assumes the connection between it and its neighbor is no longer
available.
Example
The following example sets the route timeout period to 120 seconds:
configure ripng routetimeout 120
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a trusted neighbor policy to determine trusted RIPng router neighbors for the interfaces on
the switch running RIPng.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel-name Specifies an IPv6 tunnel.
policy-name Specifies a policy.
none Removes any trusted-gateway policy from the VLAN.
Default
None. Control packets from all of the neighbors are processed.
Usage Guidelines
Use this command to set a policy to determine trusted neighbors. A neighbor is defined by its
IPaddress. Only the RIPng control packets from trusted neighbors will be processed.
The following policy designates neighbors from the fe80:202:b3ff:fe4a:6ada:: /64 subnet and the
neighbor at fe80:203::b3ff:fe4a:6ada as trusted gateways:
entry filter_gateways {
If match any{
nlri fe80:202:b3ff:fe4a:6ada:: /64;
nlri fe80:203::b3ff:fe4a:6ada:: /64;
}
then {
permit;
}
}
Example
The following command configures RIPng to use the policy nointernet to determine from which RIPng
neighbor to receive (or reject) the routes to the VLAN backbone:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Specifies the time interval in seconds within which RIPng sends update packets.
Syntax Description
seconds Specifies a time in seconds. The range is 10 to 3600.
Default
30 seconds.
Usage Guidelines
The router exchanges an update message with each neighbor every 30 seconds (default value), or if
there is a change to the overall routed topology (also called triggered updates). The timer granularity is
10 seconds. Timer minimum is 10 second and maximum is 3600 seconds.
Example
The following command sets the update timer to 60 seconds:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Allows you to change management access to your device and to enhance security.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command runs an interactive script that prompts you to choose to enable or disable SNMP, Telnet,
and enabled ports.
Refer to “Using Safe Defaults Mode” in the ExtremeXOS 30.5 User Guide for complete information on
the safe default mode.
After you issue this command, the system presents you with the following interactive script:
Telnet is enabled by default. Telnet is unencrypted and has been the target of security
exploits in the past. Would you like to disable Telnet? [y/N]: SNMP access is enabled by
default. SNMP uses no encryption, SNMPv3 can be configured to eliminate this problem.
Would you like to disable SNMP? [y/N]: All ports are enabled by default. In some secure
applications, it maybe more desirable for the ports to be turned off. Would you like
unconfigured ports to be turned off by default? [y/N]: Changing the default failsafe
account username and password is highly recommended. If you choose to do so, please
remember the username and password as this information cannot be recovered by Extreme
Networks. Would you like to change the failsafe account username and password now? [y/N]:
Would you like to permit failsafe account access via the management port? [y/N]: Since you
have chosen less secure management methods, please remember to increase the security of
your network by taking the following actions: * change your admin password * change your
failsafe account username and password * change your SNMP public and private strings *
consider using SNMPv3 to secure network management traffic
Example
The following command reruns the interactive script to configure management access:
configure switch safe-default-script
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables you to toggle between the default OpenSSL library (FIPS compatible) and FIPS
capable library.
Syntax Description
on Enables FIPS mode.
off Disable FIPS mode.
Default
Off.
Usage Guidelines
After enabling/disabling FIPS, EPM will be notified to change the bit dedicated to FIPS Mode. As per
requirement, currently SSH and SNMP will use this bit to toggle between normal and FIPS mode.
Example
# sh security fips-mode
FIPS Mode (current) : Off
FIPS Mode (configured) : Off
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Turns on or off external Python scripting support when FIPS mode is turned off.
Syntax Description
on Turns on external Python scripting support (default).
off Turns off external Python scripting support.
Default
By default, when FIPS mode is off, external Python scripting support is enabled.
Usage Guidelines
To enable external Python scripting support with the command, FIPS mode must be turned off
(configure security fips-mode [on | off]). Python scripting configuration is ignored
when FIPS mode is turned on.
Example
The following example turns off external Python scripting support:
# configure security python off
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the sFlow agent’s IP address.
Syntax Description
ipaddress Specifies the IP address from which sFlow data is sent on the switch.
Default
The default configured IP address is 0.0.0.0, but the effective IP address is the management port IP
address.
Usage Guidelines
This command allows you to configure the IP address of the sFlow agent. Typically, you would set this to
the IP address used to identify the switch in the network management tools that you use. The agent
address is stored in the payload of the sFlow data, and is used by the sFlow collector to identify each
agent uniquely. The default configured value is 0.0.0.0, but the switch will use the management port IP
address if it exists.
Both the commands unconfigure ports monitor vlan and unconfigure sflow agent
will reset the agent parameter to the default.
Example
The following command sets the sFlow agent’s IP address to 10.2.0.1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the sFlow collector IP address.
Syntax Description
ipaddress Specifies the IP address to send the sFlow data.
udp-port-number Specifies the UDP port to send the sFlow data.
vr_name Specifies from which virtual router to send the sFlow data.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
The following values are the defaults for this command:
• UDP port number—6343
• Virtual router—VR-Mgmt (previously called VR-0)
Usage Guidelines
This command allows you to configure where to send the sFlow data. You must specify an IP address
for the sFlow data collector, and you may specify a particular UDP port, if your collector uses a non-
standard port. You may also need to specify from which virtual router to send the data.
You can configure up to four sFlow collectors. Each unique IP address/UDP port/virtual router
combination identifies a collector.
Both the commands unconfigure ports monitor vlan and unconfigure sflow
collector will reset the collector parameters to the default.
Example
The following command specifies that sFlow data should be sent to port 6343 at IP address 192.168.57.1
using the virtual router VR-Mgmt:
configure sflow collector ipaddress 192.168.57.1
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum number of sFlow samples handled by the CPU per second.
Syntax Description
rate Specifies the maximum sFlow samples per second.
Default
The default value is 2000 samples per second.
Usage Guidelines
This command configures the maximum number of samples sent to the CPU per second. If this rate is
exceeded, the internal sFlow CPU throttling mechanism kicks in to limit the load on the CPU.
Every time the limit is reached, the sample rate is halved (the value of number in the configure
sflow sample-rate number or configure sflow ports port_list sample-
ratenumber command is doubled) on the slot (SummitStack) or ports (stand-alone switch) on which
maximum number of packets were received during the last snapshot.
This effectively halves the sampling frequency of all the ports on that slot or stand-alone switch with a
sub-sampling factor of 1. The sampling frequency of ports on that slot or stand-alone switch with a sub-
sampling factor greater than 1 will not change; the sub-sampling factor is also halved so the that the
same rate of samples are sent from that port.
The maximum CPU sample rate is based on the total number of samples received from all the sources.
The valid range is 100 to 200000 samples per second.
Example
The following command specifies that the sFlow maximum CPU sample rate should be set to 4000
samples per second:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the sFlow counter polling interval.
Syntax Description
seconds Specifies the number of seconds between polling each counter. The
value can range from 0 to 3600 seconds.
Default
The default polling interval is 20 seconds.
Usage Guidelines
Each sFlow statistics counter is polled at regular intervals, and this data is then sent to the sFlow
collector. This command is used to set the polling interval. To manage CPU load, polling for sFlow
enabled ports are distributed over the polling interval, so that all ports are not polled at the same
instant. For example, if the polling interval is 20 seconds and there are twenty counters, data is collected
successively every second.
Example
The following command sets the polling interval to 60 seconds:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the sFlow per-port sampling rate.
Syntax Description
port_list Specifies a list of ports.
number Specifies the fraction (1/number) of packets to be sampled.
Default
The default number is 8192, unless modified by the configure sflow sample-rate command.
Usage Guidelines
This command configures the sampling rate on a particular set of ports, and overrides the system-wide
value set in the configure sflow sample-rate command. The rate is rounded off to the next
power of two, so if 400 is specified, the sample rate is configured as 512. The valid range is 256 to
536870912.
Example
The following command sets the sample rate for the ports 4:6 to 4:10 to one packet out of every 16384:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the sFlow default sampling rate.
Syntax Description
number Specifies the fraction (1/number) of packets to be sampled.
Default
The default number is 8192.
Usage Guidelines
This command configures the default sampling rate. This is the rate that newly enabled sFlow ports will
have their sample rate set to. Changing this rate will not affect currently enabled sFlow ports. The rate is
rounded off to the next power of two, so if 400 is specified, the sample rate is configured as 512. The
valid range is 256 to 536870912.
Configuring a lower number for the sample rate means that more samples will be taken, increasing the
load on the switch. Do not configure the sample rate to a number lower than the default unless you are
sure that the traffic rate on the source is low.
The minimum rate that these platforms sample is 1 out of every 256 packets. If you configure a rate to
be less than 256, the switch automatically rounds up the sample rate to 256.
Example
The following example sets the sample rate to one packet out of every 16384:
configure sflow sample-rate 16384
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds ports to a load-sharing, or link aggregation, group. By using link aggregation, you use multiple
ports as a single logical port. Link aggregation also provides redundancy because traffic is redistributed
to the remaining ports in the LAG if one port in the group goes down.
Syntax Description
port Specifies the logical port for a load-sharing group or link aggregation
group (LAG). This number also functions as the LAG Group ID.
port_list Specifies one or more ports or slots and ports to be grouped in the
LAG.
add Adds a port list to the existing distribution port list for the given slot.
all All active members of the group are eligible for distribution for
packets received on the given slot. This is the existing behavior and
the default. This option effectively deletes any existing configured
port list for the slot.
Default
N/A.
Usage Guidelines
Use this command to dynamically add ports to a load-sharing group, or link aggregation group (LAG).
Note
You must create a LAG (or load-sharing group) before you can configure the LAG. To create a
LAG, see enable sharing grouping on page 2259.
VMAN ports can belong to LAGs. If any port in the LAG is enabled for VMAN, all ports in the group are
automatically enabled to handle jumbo size frames. Also, VMAN is automatically enabled on all ports of
the untagged LAG.
Note
All ports that are designated for the LAG must be removed from all VLANs prior to
configuring the LAG.
SummitStack only
The following guidelines apply to link aggregation:
• A static LAG can include a maximum of 8 ports.
• An LACP LAG can include a maximum of 16 ports; out of these up to 8 can be selected links and the
remaining 8 will be standby links.
• A Health Check LAG can include a maximum of 8 ports.
Example
The following example adds port 3 to the LAG with the logical port 4 on a switch:
configure sharing 3 add port 4
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the part of the packet examined by the switch when selecting the egress port
for transmitting link aggregation, or load-sharing, data.
Syntax Description
ipv4 IPv4 hash configuration for custom load sharing and L2VPN sharing.
source-only Indicates that the switch should examine the IP source address only.
destination-only Indicates that the switch should examine the IP destination address
only.
source-and- Indicates that the switch should examine the IP source and destination
destination address.
hash-algorithm Hash algorithm for custom load sharing and L2VPN sharing.
xor Use exclusive-OR for load sharing hash computation.
crc-16 Use CRC-16 for load sharing hash computation.
crc-32 Use CRC-32 for load sharing hash computation.
lower Use lower 16 bits of CRC32 for load sharing hash computation.
upper Use upper 16 bits of CRC32 for load sharing hash computation.
Default
Algorithm: source-and-destination.
Usage Guidelines
This command specifies the part of the packet header that the switch examines to select the egress
port for address-based load-sharing trunks. The address-based load-sharing setting is global and
applies to all load-sharing trunks, or LAGs, that are address-based and configured with a custom
algorithm. You change this setting by issuing the command again with a different option.
The xor hash algorithm guarantees that the same egress port is selected for traffic distribution based on
a pair of IP addresses, Layer4 ports, or both, regardless of which is the source and which is the
destination.
For IP-in-IP and GRE tunneled packets, the switch examines the inner header to determine the egress
port.
Example
The following example configures the switch to examine the source IP address:
# configure sharing address-based custom ipv4 source-only
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is supported on the ExtremeSwitching X450-G2, X460-G2, X670-G2, X465, X590, X690,
X870 series switches.
Description
Configures the hash seed used in the CRC hashing algorithms of the “custom” load sharing algorithm.
Syntax Description
address-based Selects address-based sharing.
custom Configuration for address-based custom load sharing and L2VPN
sharing.
hash-seed Selects configuring hash seed used with CRC hash algorithms.
seed Sets the hash seed value. Prior to ExtremeXOS22.5, the default value
was 0x7F2193EA.
switch-mac-address Use the last four bytes of the switch's MAC address to create a unique
seed value (Default).
Default
The default is switch-mac-address.
Usage Guidelines
The default configuration of the hash seed is switch-mac-address, which uses the last four bytes of
the switch’s MAC address as the hash seed to provide a unique seed value on all Extreme Networks
switches in the network. Such a configuration prevents hash polarization in MLAG network
configurations by default.
Prior to supporting configuring the hash seed (ExtremeXOS 30.1), the default value of the hash seed
was 0x7F2193EA. You can restore the legacy default behavior for the hash seed by explicitly configuring
this legacy value.
To verify your hash seed configuration, use the show ports port_list sharing
distribution configuration or show {port port_number} sharing {detail}
commands.
Example
The following example sets the hash seed value to "123456789":
configure sharing address-based custom hash-seed 123456789
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is supported on the ExtremeSwitching X450-G2, X460-G2, X670-G2, X465, X590, X690,
X870 series switches.
Description
Modifies the distribution algorithm of an existing LAG.
Syntax Description
master_port Specifies the master logical port for the load-sharing group or LAG.
algorithm Specifies modifying the distribution algorithm of an existing LAG.
address-based Specifies link aggregation by address-based algorithm.
L2 Specifies address-based link aggregation by Layer 2. This is the
default.
L3 Specifies address-based link aggregation by Layer 3.
Default
Address-based link aggregation by Layer 2 is the default.
Usage Guidelines
This command allows you to modify the distribution algorithm of an existing LAG, created using the
command enable sharing grouping on page 2259.
If you select the custom option, you configure the customer link aggregation algorithm with the
following command: configure sharing address-based custom [ipv4 [L3-and-L4 |
source-only | destination-only | source-and-destination] | hash-
algorithm [xor | crc-16]]
Since the custom and port-based algorithms may not be used at the same time, changing the algorithm
on multiple groups between the custom and port-based algorithms requires changing the algorithm on
these groups to either L2, L3, or L3_L4 as an intermediate step.
Example
The following example sets the distribution algorithm for the LAG on port 24 to address-based link
aggregation by Layer 3 IP plus Layer 4 port:
# configure sharing 24 algorithm address-based L3_L4
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes ports from a link aggregation, or load-sharing, group.
Syntax Description
port Specifies the logical port for a load-sharing group or a LAG. This
number also functions as the LAG Group ID.
port_list Specifies one or more ports or slots and ports to be grouped in the
LAG.
Default
N/A.
Usage Guidelines
Use this command to dynamically delete ports from a load-sharing group, or link aggregation group
(LAG). This command applies to static and dynamic link aggregation.
Example
The following example deletes port 3:12 from the LAG with the logical port, or LAG Group ID, 3:9:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command provides two different configuration options for specifying subsets of active member
ports as eligible for distribution. Both of these options specify a subset of the active member ports on a
per slot basis. The specific choice of configuration is described in the CLI as a “distribution-mode”. The
choice of distribution mode is configurable per LAG.
Syntax Description
all All active members of the group are eligible for distribution on all slots
in the switch. This is the existing behavior and the default.
local-slot If there are one or more active members of the group on the slot
where traffic is received, distribution will be restricted to these “local-
slot” members.
port-lists If there are one or more active members of the group in the
configured distribution port list for the slot on which traffic is received,
distribution will be restricted to these configured ports.
Default
All.
Usage Guidelines
The “local-slot” distribution mode restricts distribution of unicast packets to the active LAG members
on the same slot where the packet was received. If no active LAG members are present on the slot
where the packet was received, all active LAG member ports are included in the distribution algorithm.
The “local-slot” distribution mode may be specified during LAG creation with the “enable sharing” CLI
command. It may also be configured dynamically with the “configure sharing” command. This
distribution mode is self-configuring in the sense that no configuration is required other than the
specification of the “local-slot” distribution mode. Addition or deletion of LAG member ports via the
“configure sharing <master_port> [add | delete] <port_list>” command is automatically handled. The
“local-slot” distribution mode is useful for reducing the fabric bandwidth load of a switch.
Example
# show sharing distribution configuration
Config Distribution Distribution
Master Mode Lists
================================================================================
1:1 Port Lists Slot 1: 1:1-10, 1:15
Slot 5: 1:11-22
1:25 Local Slot Slot 1: 1:25
Slot 5: 1:26
5:1 Port Lists
5:10 All Slot 1: 5:11
Slot 5: 5:10
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on SummitStack switches.
Description
Configures monitoring for each member port of a health check LAG.
Syntax Description
port Specifies the member port.
IP Address Specifies the IP address to monitor.
TCP Port Specifies the TCP port to watch. The default is port 80.
sec Specifies the frequency in seconds at which tracking takes place. The
default is 10 seconds.
count Specifies the number of misses before a connection loss is reported.
The default is 3 misses.
Default
N/A.
Usage Guidelines
To configure a health check LAG, you first create a health check type of LAG using the enable
sharing grouping command. Then use this command to configure the monitoring for each
member port. You can configure each member port to track a particular IP address, but only one IP
address per member port.
To display the monitoring configuration for a health check LAG, use the show sharing health-
check command.
To display the link aggregation configured on a switch, use the show ports sharing command.
Example
The following commands configure four different member ports:
When the TCP port, seconds, or counts are not specified, they default to the values described in the
Syntax Description.
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Unconfigures monitoring for each member port of a health check LAG.
Syntax Description
port Specifies the member port.
IP Address Specifies the IP address.
TCP Port Specifies the TCP port.
Default
N/A.
Usage Guidelines
Use this command to remove the monitoring configuration on the ports of a health check link
aggregation group. Each port must be unconfigured separately, specifying the IP address and TCP port.
Example
The following command removes the configuration setting on port 12 that monitors IP address 10.1.1.3:
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables configured monitoring on a member port of a health check LAG.
Syntax Description
port Specifies the member port.
Default
N/A.
Usage Guidelines
This disables/enables monitoring on a particular member port. When monitoring is disabled, the
member port is added back to the LAG if it has not already been added. This allows a member port to
be added back to LAG even though connectivity to the host is down.
Example
The following command disables port 12:
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures whether the switch sends LACPDUs periodically (active) or only in response to LACPDUs
sent from the partner on the link (passive).
Syntax Description
port Specifies the master logical port for the LAG you are setting the
activity mode for.
active Enter this value to have the switch periodically sent LACPDUs for this
LAG.
passive Enter this value to have the switch only respond to LACPDUs for this
LAG.
Default
Active.
Usage Guidelines
You must enable sharing and create the LAG prior to assigning this LACP activity mode.
Note
One side of the link must be in active mode in order to pass traffic. If you configure your side
in the passive mode, ensure that the partner link is in LACP active mode.
To verify the LACP activity mode, use the show lacp lag group-id detail command.
If you attempt to enter a port number that is different that a LAG group ID, the system returns the
following error message:
ERROR: LAG group Id does not exist
Note
In ExtremeXOS version 11.3, the activity mode cannot be changed from active.
Example
The following command changes the activity mode to passive for the specified LAG group ID:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a defaulted LAG port to be removed from the aggregator.
Syntax Description
port Specifies the master logical port for the LAG you are setting the default action
for.
add Enter this value to have the switch add defaulted ports to the aggregator for
this LAG.
delete Enter this value to have the switch delete defaulted ports from the aggregator
for this LAG.
Default
Delete.
Usage Guidelines
You must enable sharing and create the LAG prior to configuring this LACP parameter.
You can configure whether you want a defaulted LAG port removed from the aggregator or added back
into the aggregator. If you configure the LAG to remove ports that move into the default state, those
ports are removed from the aggregator and the port state is set to unselected.
Note
In ExtremeXOS version 11.3, defaulted ports in the LAG are always removed from the
aggregator; this is not configurable.
If you configure the LAG to add the defaulted port into the aggregator, the system takes inventory of
the number of ports currently in the aggregator:
• If there are fewer ports in the aggregator than the maximum number allowed, the system adds the
defaulted port to the aggregator (port set to selected and collecting-distributing).
• If the aggregator has the maximum ports, the system adds the defaulted port to the standby list
(port set to standby).
Note
If the defaulted port is assigned to standby, that port automatically has a lower priority
than any other port in the LAG (including those already in standby).
To verify the LACP default action, use the show lacp lag group-id detail command.
If you attempt to enter a port number that is different that a LAG group ID, the system returns the
following error message:
ERROR: LAG group Id does not exist
Note
To force the LACP trunk to behave like a static sharing trunk, use this command to add ports
to the aggregator.
Example
The following command deletes defaulted ports from the aggregator for the specified LAG group ID:
configure sharing 5:1 lacp defaulted-state-action delete
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command provides the ability to configure fallback. If fallback is enabled and LACP PDUs are not
received on LACP-configured ports within the timeout period, the port with the lowest priority value
will be added to the aggregator. The port stays in this state until fallback is disabled or until LACP PDUs
are exchanged between the switch and its link partner, causing LAG reconfiguration.
Syntax Description
port LAG group ID.
fallback Allow a single member port with lowest value priority to be added to
the aggregator is LACP PDUs are not received within timeout.
enable Enable fallback. Port priority and fallback timeout control port
aggregator membership.
disable Disable fallback. LACP PDUs or defaulted-state-action control port
aggregator membership.
Default
Disabled.
Example
Port list:
Member Port Rx Sel Mux Actor Partner
Port Priority State Logic State Flags Port
--------------------------------------------------------------------------------
17 10 Initialize Unselected Detached A-G----- 0
18 5 Initialize Fallback Collect-Dist A-GSCD-- 1018
19 5 Idle Unselected Detached -------- 0
================================================================================
Actor Flags: A-Activity, T-Timeout, G-Aggregation, S-Synchronization
C-Collecting, D-Distributing, F-Defaulted, E-Expired
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the LACP fallback timeout value in seconds.
Syntax Description
lacp LACP (Link Aggregation Control Protocol).
fallback Allow single member port with lowest value priority to be added to
the aggregator if LACP PDUs are not received within timeout.
timeout Timeout used to determine how long to wait for LACP PDUs before
entering fallback.
seconds Fallback timeout in seconds. Range 0-100.
Default
60 seconds.
Example
Port list:
Member Port Rx Sel Mux Actor Partner
Port Priority State Logic State Flags Port
--------------------------------------------------------------------------------
17 10 Initialize Unselected Detached A-G----- 0
18 5 Initialize Fallback Collect-Dist A-GSCD-- 1018
19 5 Idle Unselected Detached -------- 0
================================================================================
Actor Flags: A-Activity, T-Timeout, G-Aggregation, S-Synchronization
C-Collecting, D-Distributing, F-Defaulted, E-Expired
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the system priority used by LACP for each LAG to establish the station on which end
assumes priority in determining those LAG ports moved to the collecting/distributing state of the
protocol. That end of the LAG with the lowest system priority is the one that assumes control of the
determination. This is optional; if you do not configure this parameter, LACP uses system MAC values to
determine priority. If you choose to configure this parameter, enter a value between 1 and 65535.
Syntax Description
port Specifies the master logical port for the LAG you are setting the
priority for.
priority Enter the value you want for the priority of the system for the LACP.
The range is 0 to 65535; there is no default.
Default
N/A.
Usage Guidelines
The LACP uses the system MAC values to assign priority to one of the systems, and that system then
determines which LAG ports move into the collecting/distributing state and exchange traffic. That end
of the LAG with the lowest system priority is the one that assumes control of the determination. If you
wish to override the default LACP system priority for a specific LAG, use this command to assign that
LAG a specific LACP priority. Enter a value between 0 and 65535.
You must enable sharing and create the LAG prior to assigning this LACP priority.
To verify the LACP system priority, use the show lacp command.
To change the system priority you previously assigned to a specific LAG, issue the configure
sharing lacp system-priority command using the new priority you want. To remove the
assigned system priority entirely and use the LACP priorities, issue the configure sharing lacp
system-priority command using a value of 0.
Example
The following command assigns LAG 10 an LACP system priority of 3:
configure sharing 10 lacp system-priority 3
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timeout used by each LAG to stop transmitting once LACPDUs are no longer received
from the partner link. You can configure this timeout value to be either 90 seconds, long, or 3 seconds,
short.
Syntax Description
port Specifies the master logical port for the LAG you are setting the
timeout value for.
long Enter this value to use 90 seconds as the timeout value.
short Enter this value to use 3 seconds as the timeout value.
Default
Long.
Usage Guidelines
You must enable sharing and create the LAG prior to assigning this LACP timeout value.
To verify the LACP timeout value, use the show lacp lag group-id detail command.
If you attempt to enter a port number that is different that a LAG group ID, the system returns the
following error message:
ERROR: LAG group Id does not exist
Note
In ExtremeXOS version 11.3, the timeout value is set to long and cannot be changed.
Example
The following command changes the timeout value for the specified LAG group ID to short:
configure sharing 5:1 lacp timeout short
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to configure a value for the minimum number of active links to keep the
entire LAG up.
Syntax Description
sharing Load sharing.
port Master port.
minimum-active Minimum active links for group to remain in service.
min_links_active Number of active links. Default is 1. Range is 1 – 8.
Default
1
Usage Guidelines
Use this command to configure the value for the minimum number of active links to keep the LAG up.
Example
The following example display output from the show port port sharing command using
minimum active links:
# sh ports 14 sharing
Load Sharing Monitor
Config Current Agg Min Ld Share Ld Share Agg Link Link Up
Master Master Control Active Algorithm Group Mbr State Transitions
==============================================================================
14 Static 2 L2 14 - R 0
L2 15 Y A
1
L2 16 - R 0
==============================================================================
Link State: A-Active, D-Disabled, R-Ready, NP-Port not present, L-Loopback
Minimum Active: (<) Group is down. # active links less than configured minimum
Load Sharing Algorithm: (L2) Layer 2 address based, (L3) Layer 3 address based
(L3_L4) Layer 3 address and Layer 4 port based
(custom) User-selected address-based configuration
Custom Algorithm Configuration: ipv4 L3-and-L4, xor
Number of load sharing trunks: 2 (1 displayed)
History
This command was first available in ExtremeXOS 15.7.
Platform Availability
All ExtremeXOS-based platforms that support static LAG and LACP are supported.
Description
Sets the load_sharing_key for all ports in the port_list.
Syntax Description
load_sharing_key Specifies the load sharing key. Valid load sharing keys are in the range
[0-15].
default Unconfigures and resets the load sharing keys for ports in the
port_list to default values.
ports Specifies the logical port for a load-sharing group.
port_list Specifies one or more ports or slots and ports to be grouped in the
LAG.
Default
N/A.
Usage Guidelines
This command sets the load_sharing_key for all ports in the port_list. default unconfigures
and resets the load sharing keys for ports in port_list to default values.
Configured load sharing keys are displayed in the output of the show configuration hal
command. Both configured and default load sharing keys are displayed in the output of the "show
sharing port-based keys" command.
Example
The following example causes all packets received on ports in slot 1 to choose the lowest port number in
all aggregators for distribution.:
configure sharing port-based key 0 ports 1
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or removes a descriptive name to a slot.
Syntax Description
slot Specifies a specific port extender by slot number.
slot Specifies a specific port extender by slot number.
description Specifies naming the BPE at the designated slot.
slot_description Name for the BPE at the designated slot (max. of 64 characters long).
none Specifies removing the current name assigned to the BPE at the
designated slot.
Default
N/A.
Usage Guidelines
To remove a name from a slot, use the none option.
Example
The following example applies the name "Accounting Dept" to the BPE at slot 100:
configure slot 100 description Accounting Dept
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a slot for a particular type of node.
Syntax Description
slot Specifies the slot number.
module_type The particular switch in the SummitStack.
Usage Guidelines
The configure sharing lacp timeout command displays different switch parameters
depending on the type of switch you are configuring and the version of ExtremeXOS running on the
switch.
Upon powering up the stack, ExtremeXOS automatically determines the system power budget and
protects the switch from any potential overpower configurations. If power is available, ExtremeXOS
powers on and initializes the nodes in the stack. When ExtremeXOS detects that a node will cause an
overpower condition, the node remains powered down, and is not initialized. An entry is made to the
system log indicating the condition.
Example
The following command configures slot 2 in a stack for a ExtremeSwitching X460-G2 switch:
# configure slot 2 module X460-G2
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the number of times a slot can be restarted on a failure before it is shut down.
Syntax Description
slot_number Specifies the slot number.
num_restarts Specifies the number of times the slot can be restarted. The range is
from 0 to 10,000.
Default
The default is 5.
Usage Guidelines
This command allows you to configure the number of times a slot can be restarted on a failure before it
is shut down. If the number of failures exceeds the restart-limit, the module goes into a “Failed” state. If
that occurs, use the disable slot and enable slot commands to restart the module.
Example
The following command configures slot 2 on the switch to be restarted up to 3 times upon a failure:
configure slot 2 restart-limit 3
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available only on SummitStack.
Description
Configures the Ethertype that the Simple Loop Protection Protocol (SLPP) Guard feature uses to
identify SLPP PDUs.
Syntax Description
slpp Specifies configuring SLPP.
guard Specifies disabling a port as soon as an SLPP PDU is received.
ethertype Specifies selecting the Ethertype used by PDUs of the SLPP protocol.
hex Specifies the Ethertype value in hexadecimal [0x0600-0xffff]. The
default is 0x8102.
Default
By default, the Ehtertype is 0x8102.
Usage Guidelines
SLPP is an application that detects loops in a Split Multi-link Trunking (SMLT) network. SLPP Guard is a
complementary feature that helps prevent loops in networks by administratively disabling an edge port
if a switch receive an SLPP PDU from an SMLT network.
This command configures the Ethernet type field of the packet that SLPP Guard uses to identify SLPP
PDUs.
Example
The following example configures the SLPP Guard Ethertype as 0x8110:
# configure slpp guard ethertype 0x8110
History
This command was available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the recovery timeout period for the Simple Loop Protection Protocol (SLPP) Guard feature.
Syntax Description
slpp Specifies configuring SLPP.
guard Specifies disabling a port as soon as an SLPP PDU is received.
ports Specifies ports on which to configure the recovery timeout period.
port_list Selects which ports to configure the recovery timeout period for (list
separated by a comma or -).
all Specifies configuring all ports with the designated recovery timeout
period.
recovery-timeout Specifies configuring the timeout period after which ports are re-
enabled.
seconds Designates the recovery timeout period in seconds after which the
ports are re-enabled. Range is 10–65,535. Default is 60 seconds.
none
Default
By default, the recovery timeout period is 60 seconds.
Usage Guidelines
SLPP is an application that detects loops in a Split Multi-link Trunking (SMLT) network. SLPP Guard is a
complementary feature that helps prevent loops in networks by administratively disabling an edge port
if a switch receives an SLPP PDU from an SMLT network.
On a port with SLPP Guard enabled, if an SLPP PDU is received, the port is immediately disabled. After
the configured timeout value set by this command expires (associated with each port), the port is
automatically re-enabled.
Example
The following example configures the recovery timeout period to 600 seconds for port 9:
# configure slpp guard ports 9 recovery-timeout 600
History
This command was available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures SNMP to use an ACL policy or ACL rule for access control.
Syntax Description
access_profile Specifies an ACL policy.
readonly Specifies that access granted by the specified policy is read only.
readwrite Specifies that access granted by the specified policy is read/write.
add Specifies that an ACL rule is to be added to the SNMP application.
rule Specifies an ACL rule.
first Specifies that the new rule is to be added before all other rules.
before Specifies that the new rule is to be added before a previous rule.
after Specifies that the new rule is to be added after a previous rule.
previous_rule Specifies an existing rule in the application.
delete Specifies that the named rule is to be deleted.
none Specifies that all the rules or a policy file is to be deleted.
Default
SNMP access is enabled by default, with no ACL policies.
Usage Guidelines
You must be logged in as administrator to configure SNMP parameters. You can restrict SNMP access in
the following ways:
• Implement an ACL policy. You create an ACL policy file that permits or denies a specific list of IP
addresses and subnet masks for SNMP. You must create the ACL policy file before you can use this
command. If the ACL policy file does not exist on the switch, the switch returns an error message
indicating that the file does not exist.
In the ACL policy file for SNMP, the source-address field is the only supported match condition. Any
other match conditions are ignored.
The permit or deny counters are also updated accordingly, regardless of whether the ACL is
configured to add counters. To display counter statistics, use the show access-list counters
process snmp command.
Only the following match conditions and actions are copied to the client memory. Others that may be in
the rule are not copied.
Match conditions:
• Source-address—IPv4 and IPv6
• Actions:
◦ Permit
◦ Deny
When adding a new rule, use the first, before, and after previous_rule parameters to position it within
the existing rules.
If the SNMP traffic does not match any of the rules, the default behavior is deny.
If you attempt to implement a policy that does not exist, an error message similar to the following
appears:
Error: Policy /config/MyAccessProfile.pol does not exist on file system
If this occurs, make sure the policy you want to implement exists. To confirm the existence of the
policies, use the ls command. If the policy does not exist, create the ACL policy file.
Example
The following example applies the ACL policy file MyAccessProfile_2 to SNMP:
configure snmp access-profile MyAccessProfile_2
The following example applies the ACL rule DenyAccess to SNMP as the first rule in the list:
configure snmp access-profile add DenyAccess first
The following example deletes the ACL rule DenyAccess from the SNMP application:
configure snmp access-profile delete DenyAccess
To delete the use of all the ACL rules or a policy file by SNMP, use the following command:
configure snmp access-profile none
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a SNMP read or read/write community string.
Syntax Description
readonly Specifies read-only access to the system.
readwrite Specifies read and write access to the system.
encrypted Community name is encrypted.
hex Provide value in hexadecimal.
hex_community_name Community name in hexadecimal.
store-encrypted Community name will be stored as encrypted, instead plain text.
alphanumeric_string Specifies an SNMP community string name. See “Usage Guidelines”
for more information.
Default
The default read-only community string is public. The default read/write community string is private.
Usage Guidelines
Community strings provide a simple method of authentication between a switch and a remote network
manager. Read community strings provide read-only access to the switch. The default read-only
community string is public. Read-write community strings provide read and write access to the switch.
The default read/write community string is private. Sixteen read-only and sixteen read/write
community strings can be configured on the switch, including the defaults.
An authorized trap receiver must be configured to use the correct community strings on the switch for
the trap receiver to receive switch-generated traps. In some cases, it may be useful to allow multiple
community strings so that all switches and trap receivers are not forced to use identical community
strings. The configure snmp add community command allows you to add multiple community
strings in addition to the default community string.
We recommend that you delete the defaults of the community strings. To delete the value of the default
read/write and read-only community strings, use the configure snmp delete community
command.
Example
The following command adds a read/write community string with the value extreme:
History
This command was first available in ExtremeXOS 10.1.
The hex keyword and hex_community_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a notification log.
Syntax Description
name Specifies the name of the log.
hex Provide value in hexadecimal.
hex_name Name of the log in hexadecimal.
user Name of the SNMP user on whose behalf the log should be created.
snmp_user_name SNMP user name in ASCII..
hex_snmp_user_name SNMP user name in hexadecimal.
sec-model Security framework associated with the user.
sec_model Security model.
sec-level Authentication and privacy levels of the user.
sec_level Security level.
Default
Disabled.
Usage Guidelines
Use this command to add a notification log. All entries in the log and its configuration are removed
when this command is successfuly executed.
Example
The following example adds nmslog1:
configure snmp add notification log nmslog1 user admin sec-model usm sec-level priv
History
This command was first available in ExtremeXOS 15.5.
The hex keyword, hex_name variable, and hex_snmp_user_name variable were added in
ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds the IP address of a trap receiver to the trap receiver list and specifies which SNMPv1/v2c traps are
to be sent.
Syntax Description
ip_address Specifies an SNMP trap receiver IPv4 address.
ipv6_address Specifies an SNMP trap receiver IPv6 address
hex_community_name Specifies that the trap receiver is to be supplied as a colon separated
string of hex octets.
community_name Specifies the community string of the trap receiver to be supplied in
ASCII format.
port_number Specifies a UDP port to which the trap should be sent. Default is 162.
src_ip_address Specifies the IPv4 address of a VLAN to be used as the source address
for the trap.
src_ipv6_address Specifies the IPv6 address of a VLAN to be used as the source address
for the trap.
vr_name Specifies the name of the virtual router.
trap_mode Specifies the mode of the traps:enhanced—Contains extra varbinds at
the end.standard—Does not contain extra varbinds.
Default
Trap receivers are in enhanced mode by default, and the version is SNMPv2c by default.
Usage Guidelines
The IP address can be unicast, multicast, or broadcast.
An authorized trap receiver can be one or more network management stations on your network.
Authorized trap receivers must be configured on the switch for the trap receiver to receive switch-
generated traps. The switch sends SNMP traps to all trap receivers configured to receive the specific
trap group.
To view the SNMP trap receivers configured on the switch, use the show management command. The
show management command displays information about the switch including the destination and
community of the SNMP trap receivers configured on the switch.
Example
The following command adds the IP address 10.101.0.100 as a trap receiver with community string
purple:
The following command adds the IP address 10.101.0.105 as a trap receiver with community string green,
using port 3003:
The following command adds the IP address 10.101.0.105 as a trap receiver with community string blue,
and IP address 10.101.0.25 as the source:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a SNMP read or read/write community string.
Syntax Description
readonly Specifies read-only access to the system.
readwrite Specifies read and write access to the system.
all Specifies all of the SNMP community stings.
alphanumeric_string Specifies an SNMP community string name. See “Usage Guidelines”
for more information.
hex Provide value in hexadecimal.
hex_community_name Community name in hexadecimal.
Default
The default read-only community string is public. The default read/write community string is private.
Usage Guidelines
You must have at least one community string for SNMP access. If you delete all of the community
strings on your system, you will no longer have SNMP access, even if you have SNMP enabled.
The community strings allow a simple method of authentication between the switch and the remote
network manager. There are two types of community strings on the switch. Read community strings
provide read-only access to the switch. The default read-only community string is public. read/write
community strings provide read and write access to the switch. The default read/write community
string is private. Sixteen read-only and sixteen read-write community strings can be configured on the
switch, including the defaults. The community string for all authorized trap receivers must be configured
on the switch for the trap receiver to receive switch-generated traps. SNMP community strings can
contain up to 32 characters.
For increased security, we recommend that you change the defaults of the read/write and read-only
community strings.
Use the configure snmp add commands to configure an authorized SNMP management station.
Example
The following command deletes a read/write community string named extreme:
History
This command was first available in ExtremeXOS 10.1.
The hex keyword and hex_community_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a notification log.
Syntax Description
default The default log.
name Specifies the name of the log.
Default
Disabled.
Usage Guidelines
Use this command to delete a notification log. All entries in the log and its configuration are removed
when this command is successfuly executed.
Example
The following example deletes nmslog1:
configure snmp delete notification-log hex 01:02
History
This command was first available in ExtremeXOS 15.5.
The default and hex keywords and hex_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a specified trap receiver or all authorized trap receivers.
Syntax Description
ip_address Specifies an SNMP trap receiver IPv4 address.
ipv6_address Specifies an SNMP trap receiver IPv6 address.
port_number Specifies the port associated with the receiver.
all Specifies all SNMP trap receiver IP addresses.
Default
The default port number is 162.
Usage Guidelines
Use this command to delete a trap receiver of the specified IPv4 or IPv6 address, or all authorized trap
receivers.
This command deletes only the first SNMPv1/v2c trap receiver whose IP address and port number
match the specified value.
Example
The following command deletes the trap receiver 10.101.0.100 from the trap receiver list:
The following command deletes entries in the trap receiver list for 10.101.0.100, port 9990:
Any entries for this IP address with a different community string will not be affected.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Controls the accessible string size for the SNMP ifAlias object.
Syntax Description
default Specifies read-only access to the system.
extended Specifies read and write access to the system.
Default
N/A.
Usage Guidelines
Use this command to control the accessible string size for the SNMP ifAlias object.
If you choose the extended size option, the following warning will be displayed:
Warning: Changing the size to [extended] requires the use of increased
255 chars long ifAlias object of ifXtable from IF-MIB(RFC 2233)
You can always configure a 255 character long string regardless the configured value of ifAlias size. Its
value only affects the SNMP behavior.
Example
The following example shows how to configure the accessible string size for the SNMP ifAlias to the
default value:
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Changes the configuration of a notification log.
Syntax Description
filter-profile-name Sets the notification filter profile for this log (default: none).
none Specifies the global entry limit.
filter_profile_name Sets the notification filter profile for this log (default: none)
Default
Usage Guidelines
Use this command to change the configuration of a notification log. Use the configure snmpv3
add filter-profile command to create notification filter profiles.
Example
The following example sets the filter for the default log to all and its maximum size to 1500:
configure snmp notification-log default filter-profile-name all entry-limit 1500
History
This command was first available in ExtremeXOS 15.5.
The hex keywords and hex_name and hex_filter_profile_name variables were added in
ExtremeXOS 15.6
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures notification log settings that affect all logs.
Syntax Description
global-entry-limit Sets the maximum number of entries in all logs combined (default:
16000)
global_entry_limit Specifies the global entry limit. Range is 1-16000.
global-age-out Sets the number of minutes a notification should be kept in a log
before it is automatically removed (default: 1440 for one day).
none Specifies that notifications are not aged out.
minutes Specifies the global age out in minutes. The range is 1 - 4294967295.
Default
global-entry-limit is 16000.
Usage Guidelines
Use this command to configure notification log settings that affect all logs.
Example
The following example sets the log size to 10000, and disable aging:
configure snmp notification-log global-entry-limit 10000 global-age-out none
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the name of the system contact.
Syntax Description
sysContact An alphanumeric string that specifies a system contact name.
Default
N/A.
Usage Guidelines
The system contact is a text field that enables you to enter the name of the person(s) responsible for
managing the switch. A maximum of 255 characters is allowed. The allowed character set is A-Z, a-z,
0-9, +-@_.,:;()/ ”.
To view the name of the system contact listed on the switch, use the show switch command. The
show switch command displays switch statistics including the name of the system contact.
Example
The following example defines FredJ as the system contact:
configure snmp syscontact FredJ
The following output from the show switch command displays FredJ as the system contact:
SysName: engineeringlab
SysLocation: englab
SysContact: FredJ
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the location of the switch.
Syntax Description
sysLocation An alphanumeric string that specifies the switch location.
Default
N/A.
Usage Guidelines
Use this command to indicate the location of the switch. A maximum of 255 characters is allowed. The
allowed character set is A-Z, a-z, 0-9, +-@_.,:;()/ ”.
To view the location of the switch on the switch, use the show switch command. The show switch
command displays switch statistics including the location of the switch.
Example
The following example configures a switch location name on the system:
configure snmp syslocation englab
The following output from the show switch command displays englab as the location of the switch:
SysName: engineeringlab
SysLocation: englab
SysContact: FredJ
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the name of the switch.
Syntax Description
sysName An alphanumeric string that specifies a device name.
Default
The default sysName is the model name of the device (for example, ExtremeSwitching X440-G2).
Usage Guidelines
You can use this command to change the name of the switch. A maximum of 255 characters is allowed.
The allowed character set is A-Z, a-z, 0-9, +-@_.,:;()/ ”.
The sysName appears in the switch prompt. On a SummitStack, the sysName appears in the prompt of
all active nodes in the stack when there is a master node present in the stack.
To view the name of the system listed on the switch, use the show switch command. The show
switch command displays switch statistics including the name of the system.
Example
The following example names the switch:
configure snmp sysname engineeringlab
The following output from the show switch command displays engineeringlab as the name of the
switch:
SysName: engineeringlab
SysLocation: englab
SysContact: FredJ
History
This command was first available in ExtremeXOS 10.1.
Beginning in ExtremeXOS 15.7, the maximum number of characters has been changed to 255.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to configure the time during which the set of affected sessions will be
collected and a single trap will be set for contiguous session IDs. This means that there is a small delay
between event occurrence and trap generation. You have the option to disable this optimization delay
using the none option.
Syntax Description
snmp Configure SNMP specific settings.
traps Configure SNMP Trap generation settings.
Default
1000 ms.
Usage Guidelines
Use this command to configure the time window during which the set of affected sessions is collected
and single trap is set for contiguous sessions IDs.
Example
The following command configures the BFD batch-delay:
# configure snmp traps batch-delay bfd 1000
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Creates (and modifies) a group and its access rights.
Syntax Description
hex_group_name Specifies the group name to add or modify. The value is to be supplied
as a colon separated string of hex octets.
group_name Specifies the group name to add or modify. The value is to be supplied
in ASCII format.
sec-model Specifies the security model to use.
snmpv1 Specifies the SNMPv1 security model.
snmpv2c Specifies the SNMPv2c security model.
usm Specifies the SNMPv3 User-based Security Model (USM).
sec-level Specifies the security level for the group.
noauth Specifies no authentication (and implies no privacy) for the security
level.
authnopriv Specifies authentication and no privacy for the security level.
priv Specifies authentication and privacy for the security level.
read-view Specifies the read view name:hex_read_view_name—Specifies a hex
value supplied as a colon separated string of hex
octetsread_view_name—Specifies an ASCII value.
write-view Specifies the write view name:hex_write_view_name—Specifies a hex
value supplied as a colon separated string of hex
octetswrite_view_name—Specifies an ASCII value.
notify-view Specifies the notify view name:hex_notify_view_name—Specifies a
hex value supplied as a colon separated string of hex
octetsnotify_view_name—Specifies an ASCII value.
volatile Specifies volatile storage.
Default
The default values are:
• sec-model—USM
• sec-level—noauth
• read view name—defaultUserView
• write view name— “”
• notify view name—defaultNotifyView
• non-volatile storage
Usage Guidelines
Use this command to configure access rights for a group. All access groups are created with a unique
default context, “”, as that is the only supported context.
Use more than one character when creating unique community strings and access group names.
A number of default groups are already defined. These groups are: admin, initial, v1v2c_ro, v1v2c_rw.
• The default groups defined are v1v2c_ro for security name v1v2c_ro, v1v2c_rw for security name
v1v2c_rw, admin for security name admin, and initial for security names initial, initialmd5, initialsha,
initialmd5Priv and initialshaPriv.
• The default access defined are admin, initial, v1v2c_ro, v1v2c_rw, and v1v2cNotifyGroup.
Example
In the following command, access for the group defaultROGroup is created with all the default values:
security model usm, security level noauth, read view defaultUserView, no write view, notify view
defaultNotifyView, and storage nonvolatile.
In the following command, access for the group defaultROGroup is created with the values: security
model USM, security level authnopriv, read view defaultAdminView, write view defaultAdminView,
notify view defaultAdminView, and storage nonvolatile.
configure snmpv3 add access defaultROGroup sec-model usm sec-level authnopriv read-view
defaultAdminView write-view defaultAdminView notify-view defaultAdminView
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds an SNMPv3 community entry.
Syntax Description
hex_community_index Specifies the row index in the snmpCommunity table as a hex value
supplied as a colon separated string of hex octets.
community_index Specifies the row index in the snmpCommunity Table as an ASCII
value.
hex_community_name Specifies the community name as a hex value supplied as a colon
separated string of hex octets.
community_name Specifies the community name as an ASCII value.
hex_user_name Specifies the USM user name as a hex value supplied as a colon
separated string of hex octets.
user_name Specifies the USM user name as an ASCII value.
tag Specifies the tag used to locate transport endpoints in
SnmpTargetAddrTable. When this community entry is used to
authenticate v1/v2c messages, this tag is used to verify the
authenticity of the remote entity.hex_transport_tag—Specifies a hex
value supplied as a colon separated string of hex octetstransport_tag
—Specifies an ASCII value
volatile Specifies volatile storage.
Default
N/A.
Usage Guidelines
Use this command to create or modify an SMMPv3 community in the community MIB.
Example
switch # configure snmp add community readonly extreme store-encrypted
switch # show snmpv3 community
Community Index : extreme
Community Name : hys{fnj (encrypted)
Security Name : v1v2c_ro
Context EngineID : 80:00:07:7c:03:00:04:96:27:b6:63
Context Name :
Transport Tag :
Storage Type : NonVolatile
Row Status : Active
switch # configure snmp add community readwrite extreme123
switch # show snmpv3 community
Community Index : extreme
Community Name : hys{fnj (encrypted)
Security Name : v1v2c_ro
Context EngineID : 80:00:07:7c:03:00:04:96:27:b6:63
Context Name :
Transport Tag :
Storage Type : NonVolatile
Row Status : Active
Community Index : extreme123
Community Name : extreme123
Security Name : v1v2c_rw
History
This command was first available in ExtremeXOS. 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a filter to a filter profile.
Syntax Description
hex_profile_name Specifies the filter profile that the current filter is added to. The value
is to be supplied as a colon separated string of hex octets.
profile_name Specifies the filter profile that the current filter is added to in ASCII
format.
object identifier Specifies a MIB subtree.
subtree_mask Specifies a hex octet string used to mask the subtree. For example, f7a
indicates 1.1.1.1.0.1.1.1.1.0.1.0.
included Specifies that the MIB subtree defined by object identifier/mask is to
be included.
Default
The default values are:
• mask value—empty string (all 1s).
• type—included.
• storage—non-volatile.
Usage Guidelines
Use this command to create a filter entry in the snmpNotifyFilterTable. Each filter includes or excludes a
portion of the MIB. Multiple filter entries comprise a filter profile that can eventually be associated with a
target address. Other commands are used to associate a filter profile with a parameter name, and the
parameter name with a target address.
This command can be used multiple times to configure the exact filter profile desired.
Example
The following command adds a filter to the filter profile prof1 that includes the MIB subtree 1.3.6.1.4.1/f0:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Associates a filter profile with a parameter name.
Syntax Description
hex_profile_name Specifies the filter profile name. The value is to be supplied as a colon
separated string of hex octets.
profile_name Specifies the filter profile name in ASCII format.
hex_param_name Specifies a parameter name to associate with the filter profile. The
value to follow is to be supplies as a colon separated string of hex
octets.
param_name Specifies a parameter name to associate with the filter profile in ASCII
format.
volatile Specifies volatile storage.
Default
The default storage type is non-volatile.
Usage Guidelines
Use this command to add an entry to the snmpNotifyFilterProfileTable. This table associates a filter
profile with a parameter name. The parameter name is associated with target addresses, and the filter
profile is associated with a series of filters, so, in effect, you are associating a series of filters with a
target address.
Example
The following command associates the filter profile prof1 with the parameter name P1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a user name (security name) to a group.
Syntax Description
hex_group_name Specifies the group name to add or modify. The value is to be supplied
as a colon separated string of hex octets.
group_name Specifies the group name to add or modify in ASCII format.
hex_user_name Specifies the user name to add or modify. The value to follow is to be
supplies as a colon separated string of hex octets.
user_name Specifies the user name to add or modify in ASCII format.
sec-model Specifies the security model to use.
snmpv1 Specifies the SNMPv1 security model.
snmpv2c Specifies the SNMPv2c security model.
usm Specifies the SNMPv3 User-based Security Model (USM).
volatile Specifies volatile storage.
Default
The default values are:
• sec-model—USM.
• non-volatile storage.
Usage Guidelines
Use this command to associate a user name with a group.
As per the SNMPv3 RFC, a security name is model independent while a username is model dependent.
For simplicity, both are assumed to be same here. User names and security names are handled the
same. In other words, if a user is created with the user name username, the security name value is the
same, username.
Every group is uniquely identified by a security name and security model. So the same security name
can be associated to a group name but with different security models.
Example
The following command associates the user userV1 to the group defaultRoGroup with SNMPv1 security:
The following command associates the user userv3 with security model USM and storage type volatile
to the access group defaultRoGroup:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds (and modifies) a MIB view.
Syntax Description
hex_view_name Specifies the MIB view name to add or modify. The value is to be
supplies as a colon separated string of hex octets.
view_name Specifies the MIB view name to add or modify in ASCII format.
object_identifier Specifies a MIB subtree.
subtree_mask Specifies a hex octet string used to mask the subtree. For example, f7a
indicates 1.1.1.1.0.1.1.1.1.0.1.0.
included Specifies that the MIB subtree defined by subtree/mask is to be
included.
excluded Specifies that the MIB subtree defined by subtree/mask is to be
excluded.
volatile Specifies volatile storage.
Default
The default mask value is an empty string (all 1s). The other default values are included and non-volatile.
Usage Guidelines
Use this command to create a MIB view into a subtree of the MIB. If the view already exists, this
command modifies the view to additionally include or exclude the specified subtree.
In addition to the created MIB views, there are three default views. They are: defaultUserView,
defaultAdminView, and defaultNotifyView.
Example
The following command creates the MIB view allMIB with the subtree 1.3 included as non-volatile:
The following command creates the view extremeMib with the subtree 1.3.6.1.4.1.1916 included as non-
volatile:
The following command creates a view vrrpTrapNewMaster which excludes VRRP notification .1 and the
entry is volatile:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds an entry to the snmpNotifyTable.
Syntax Description
hex_notify_name Specifies the notify name to add. The value is to be supplied as a
colon separated string of hex octets.
notify_name Specifies the notify name to add in ASCII format.
hex_tag Specifies a string identifier for the notifications to be sent to the
target. The value is supplied as a colon separated string of octets.
tag Specifies a string identifier for the notifications to be sent to the target
in ASCII format.
trap Specifies an unconfirmed notification.
Default
The default storage type is non-volatile.
Usage Guidelines
Use this command to add an entry to the snmpNotifyTable. When a notification is to be sent, this table
is examined. For the target addresses that have been associated with the tags present in the table,
notifications are sent based on the filters also associated with the target addresses.
Example
The following command sends notifications to addresses associated with the tag type1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds and configures an SNMPv3 target address and associates filtering, security, and notifications with
that address.
Syntax Description
hex_addr_name Specifies a string identifier for the target address. The value is to be
supplied as a colon separated string of hex octets.
addr_name Specifies a string identifier for the target address in ASCII format.
hex_param_name Specifies the parameter name associated with the target. The value is
to be supplied as a colon separated string of hex octets.
param_name Specifies the parameter name associated with the target in ASCII
format.
ip_address Specifies an SNMPv3 target IPv4 address.
ipv4-with-mask Specify IPv4 address with hexadecimal mask.
ip_and_tmask Specifies the IPv4 address and hexadecimal mask in form A.B.C.D/
NN...
ipv6_address Specifies an SNMPv3 target IPv6 address.
ipv6-with-mask Specify IPv6 address with hexadecimal mask.
ipv6_and_tmask Specifies an IPv6 address and hexadecimal mask in form
A:B:C:D:E:F:G:H/NN...
port_number Specifies a UDP port. Default is 162.
src_ip_address Specifies the IPv4 address of a VLAN to be used as the source address
for the trap.
src_ipv6_address Specifies the IPv6 address of a VLAN to be used as the source address
for the trap.
vr_name Specifies the name of the virtual router.
tag-list Specifies a list of comma separated string identifiers for the
notifications to be sent to the target.
hex_tag_list Tag list in RFC 3413 format (in hexadecimal).
volatile Specifies volatile storage. By specifying volatile storage, the
configuration is not saved across a switch reboot.
Default
The default values are:
• transport-port—port 162.
• non-volatile storage.
If you do not specify tag-list the single tag defaultNotify, a pre-defined value in the snmpNotifyTable is
used.
Usage Guidelines
Use this command to create an entry in the SNMPv3 snmpTargetAddressTable. The param parameter
associates the target address with an entry in the snmpTargetParamsTable, which specifies security and
storage parameters for messages to the target address, and an entry in the
snmpNotifyFilterProfileTable, which specifies filter profiles to use for notifications to the target address.
The filter profiles are associated with the filters in the snmpNotifyFilterTable.
The list of tag-lists must match one or more of the tags in the snmpNotifyTable for the trap to be sent
out.
Example
The following command specifies a target address of 10.203.0.22 with the name A1, and associates it
with the security parameters and target address parameter P1:
The following command specifies a target address of 10.203.0.22 with the name A1, and associates it
with the security parameters and target address parameter P1, and the notification tags type1 and
type2:
configure snmpv3 add target-addr A1 param P1 ipaddress 10.203.0.22 from 10.203.0.23 tag-
list type1,type2
History
This command was first available in ExtremeXOS 10.1.
The virtual router, IP address and hexadecimal mask parameters were added in ExtremeXOS 12.3.
The hex keyword and hex_tag_list variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds and configures SNMPv3 target parameters.
Syntax Description
hex_param_name Specifies the parameter name associated with the target. The value is
to be supplied as a colon separated string of hex octets.
param_name Specifies the parameter name associated with the target in ASCII
format.
hex_user_name Specifies a user name. The value is to be supplied as a colon separated
string of hex octets.
user_name Specifies a user name in ASCII format.
mp-model Specifies a message processing model; choose from SNMPv1,
SNMPv2, or SNMPv3.
sec-model Specifies the security model to use.
snmpv1 Specifies the SNMPv1 security model.
snmpv2c Specifies the SNMPv2c security model.
usm Specifies the SNMPv3 User-based Security Model (USM).
sec-level Specifies the security level for the group.
noauth Specifies no authentication (and implies no privacy) for the security
level.
authnopriv Specifies authentication and no privacy for the security level.
priv Specifies authentication and privacy for the security level.
volatile Specifies volatile storage. By specifying volatile storage, the
configuration is not saved across a switch reboot.
Default
The default values are:
• sec-level—noauth.
• non-volatile storage.
Usage Guidelines
Use this command to create an entry in the SNMPv3 snmpTargetParamsTable. This table specifies the
message processing model, security level, security model, and the storage parameters for messages to
any target addresses associated with a particular parameter name.
To associate a target address with a parameter name, see the command configure snmpv3 add
target-addr.
Example
The following command specifies a target parameters entry named P1, a user name of guest, message
processing and security model of SNMPv2c, and a security level of no authentication:
configure snmpv3 add target-params P1 user guest mp-model snmpv2c sec-model snmpv2c sec-
level noauth
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds (and modifies) an SNMPv3 user.
Syntax Description
hex_user_name Specifies the user name to add or modify. The value is to be supplied
as a colon separated string of hex octets.
user_name Specifies the user name to add or modify in ASCII format.
engine-id SNMP engine id. If not specified, the user is created with the local
engine id.
engine_id Engine id (in hexadecimal)"; type="ostring_t
authentication Specifies the authentication password or hex string to use for
generating the authentication key for this user.
md5 Specifies RSA Data Security, Inc. MD5 Message-Digest Algorithm
authentication.
sha Specifies SHA authentication.
localized-key Following value is a MD5 or SHA digest of the engine-id and user's
password.
auth_localized_key Authentication localized key (in hexadecimal) ) ;type="ostring_t"
privacy Specifies the privacy password or hex string to use for generating the
privacy key for this user.
des Specifies the use of the 56-bit DES algorithm for encryption. This is
the default.
3des Specifies the use of the 168-bit 3DES algorithm for encryption.
aes Specifies the use of the AES algorithm for encryption.
128 Specifies the use of the 128-bit AES algorithm for encryption.
192 Specifies the use of the 192-bit AES algorithm for encryption.
256 Specifies the use of the 256-bit AES algorithm for encryption.
priv_localized_key Privacy localized key (in hexadecimal)"; type="ostring_t"
volatile Specifies volatile storage. By specifying volatile storage, the
configuration is not saved across a switch reboot.
Default
The default values are:
• authentication—no authentication.
• privacy—no privacy.
• non-volatile storage.
Usage Guidelines
Use this command to create or modify an SNMPv3 user configuration.
The default user names are: admin, initial, initialmd5, initialsha, initialmd5Priv, initialshaPriv. The initial
password for admin is password. For the other default users, the initial password is the user name.
If hex is specified, supply a 16 octet hex string for RSA Data Security, Inc. MD5 Message-Digest
Algorithm, or a 20 octet hex string for SHA.
You must specify authentication if you want to specify privacy. There is no support for privacy without
authentication.
Note
3DES, AES 192, and AES 256 bit encryptions are proprietary implementations and may not
work with some SNMP managers.
Example
The following command configures the user guest on the local SNMP Engine with security level noauth
(no authentication and no privacy):
The following command configures the user authMD5 to use RSA Data Security, Inc. MD5 Message-
Digest Algorithm authentication with the password palertyu:
The following command configures the user authShapriv to use SHA authentication with the hex key
shown below, the privacy password palertyu, and volatile storage:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a new user by cloning from an existing SNMPv3 user.
Syntax Description
hex_user_name Specifies the user name to add or to clone from. The value is to be
supplies as a colon separated string of hex octets.
user_name Specifies the user name to add or to clone from in ASCII format.
engine-id SNMP engine ID
engine_id Engine ID of the user to be added in hexadecimal format. Default:
local engine ID)"; type="ostring_t
clone_from_engine_id Engine ID of the user to be cloned in hexadecimal (Default: local
engine ID)"; type="ostring_t
Default
N/A.
Usage Guidelines
Use this command to create a new user by cloning an existing one. After you have successfully cloned
the new user, you can modify its parameters using the following command:
configure snmpv3 add user [[hex hex_user_name] |user_name]
{authentication [md5 | sha] [hexhex_auth_password |auth_password]}
{privacy {des | 3des | aes {128 | 192 | 256}} [[hexhex_priv_password] |
priv_password]} }{volatile}
Users cloned from the default users will have the storage type of non-volatile. The default names are:
admin, initial, initialmd5, initialsha, initialmd5Priv, initialshaPriv.
Example
The following command creates a user cloneMD5 with same properties as the default user initalmd5. All
authorization and privacy keys will initially be the same as with the default user initialmd5.
The following command adds a remote user named nmsuser2 belonging to the SNMP engine with
engine-id 11:22:33 by cloning another remote user named nmsuser1 belonging to the SNMP engine with
engine id AA:BB::CC:
conf snmpv3 add user nmsuser2 engine-id 11:22:33 clone-from nmsuser1 engine-id AA:BB:CC
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes access rights for a group.
Syntax Description
all-non-defaults Specifies that all non-default (non-permanent) security groups are to
be deleted.
hex_group_name Specifies the group name to be deleted. The value is to be supplies as
a colon separated string of hex octets.
group_name Specifies the group name to be deleted in ASCII format.
sec-model Specifies the security model to use.
snmpv1 Specifies the SNMPv1 security model.
snmpv2c Specifies the SNMPv2c security model.
Default
The default values are:
• sec-model—USM.
• sec-level—noauth.
Usage Guidelines
Use this command to remove access rights for a group. Use the all-non-defaults keyword to delete all
the security groups, except for the default groups. The default groups are: admin, initial, v1v2c_ro,
v1v2c_rw.
Deleting an access will not implicitly remove the related group to user association from the
VACMSecurityToGroupTable. To remove the association, use the following command:
configure snmpv3 delete group {[[hex hex_group_name] |group_name]} user
[all-non-defaults | {[[hexhex_user_name] |user_name] {sec-model [snmpv1|
snmpv2c|usm]}}]
Example
The following command deletes all entries with the group name userGroup:
The following command deletes the group userGroup with the security model snmpv1 and security level
of authentication and no privacy (authnopriv):
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an SNMPv3 community entry.
Syntax Description
all Specifies that all community entries are to be removed.
hex_community_index Specifies the row index in the snmpCommunityTable. The value is to
be supplied as a colon separated string of hex octets.
community_index Specifies the row index in the snmpCommunityTable in ASCII format.
hex_community_name Specifies the community name. The value is to be supplied as a colon
separated string of hex octets.
community_name Specifies the community name in ASCII format.
Default
The default entries are public and private.
Usage Guidelines
Use this command to delete an SMMPv3 community in the community MIB.
Example
The following command deletes an entry with the community index comm_index:
The following command creates an entry with the community name (hex) of EA:12:CD:CF:AB:11:3C:
History
This command was first available in ExtremeXOS 10.1.
The all-non-defaults keyword was replaced with the all keyword in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a filter from a filter profile.
Syntax Description
all Specifies all filters.
hex_profile_name Specifies the filter profile of the filter to delete. The value is to be
supplied as a colon separated string of hex octets.
profile_name Specifies the filter profile of the filter to delete in ASCII format.
object_identifier Specifies the MIB subtree of the filter to delete.
Default
N/A.
Usage Guidelines
Use this command to delete a filter entry from the snmpNotifyFilterTable. Specify all to remove all
entries. Specify a profile name to delete all entries for that profile name. Specify a profile name and a
subtree to delete just those entries for that filter profile and subtree.
Example
The following command deletes the filters from the filter profile prof1 that reference the MIB subtree
1.3.6.1.4.1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes the association of a filter profile with a parameter name.
Syntax Description
all Specifies all filter profiles.
hex_profile_name Specifies the filter profile name to delete. The value is to be supplied
as a colon separated string of hex octets.
profile_name Specifies the filter profile name to delete in ASCII format.
hex_param_name Specifies to delete the filter profile with the specified profile name and
parameter name. The value is to be supplied as a colon separated
string of hex octets.
param_name Specifies to delete the filter profile with the specified profile name and
parameter name in ASCII format.
Default
The default storage type is non-volatile.
Usage Guidelines
Use this command to delete entries from the snmpNotifyFilterProfileTable. This table associates a filter
profile with a parameter name. Specify all to remove all entries. Specify a profile name to delete all
entries for that profile name. Specify a profile name and a parameter name to delete just those entries
for that filter profile and parameter name.
Example
The following example deletes the filter profile prof1 with the parameter name P1:
configure snmpv3 delete filter-profile prof1 param P1
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a user name (security name) from a group.
Syntax Description
hex_group_name Specifies the group name to delete or modify. The value is to be
supplied as a colon separated string of hex octets.
group_name Specifies the group name to delete or modify in ASCII format.
all-non-defaults Specifies that all non-default (non-permanent) users are to be deleted
from the group.
hex_user_name Specifies the user name to delete or modify. The value is to be
supplied as a colon separated string of hex octets.
user_name Specifies the user name to delete or modify in ASCII format.
sec-model Specifies the security model to use.
snmpv1 Specifies the SNMPv1 security model.
snmpv2c Specifies the SNMPv2c security model.
usm Specifies the SNMPv3 User-based Security Model (USM).
Default
The default value for sec-model is USM.
Usage Guidelines
Use this command to remove the associate of a user name with a group.
As per the SNMPv3 RFC, a security name is model independent while a username is model dependent.
For simplicity, both are assumed to be same here. User names and security names are handled the
same. In other words, if a user is created with the user name username, the security name value is the
same, username.
Every group is uniquely identified by a security name and security model. So the same security name
can be associated to a group name but with different security models.
The default users are: admin, initial, initialmd5, initialsha, initialmd5Priv, initialshaPriv.
Example
The following command deletes the user guest from the group UserGroup for the security model
snmpv2c:
The following command deletes the user guest from the group userGroup with the security model USM:
History
This command was first available in ExtremeXOS 10.1.
The hex_group_name and the hex_user_name parameters were added in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a MIB view.
Syntax Description
all-non-defaults Specifies that all non-default (non-permanent) MIB views are to be
deleted.
hex_view_name Specifies the MIB view to delete. The value is to be supplied as a colon
separated string of hex octets.
view_name Specifies the MIB view name to delete in ASCII format.
object_identifier Specifies a MIB subtree.
Default
N/A.
Usage Guidelines
Use this command to delete a MIB view. Views which are being used by security groups cannot be
deleted. Use the all-non-defaults keyword to delete all the MIB views (not being used by security
groups) except for the default views. The default views are: defaultUserView, defaultAdminView, and
defaultNotifyView.
Use the configure snmpv3 add mib-view command to remove a MIB view from its security
group, by specifying a different view.
Example
The following command deletes all views (only the permanent views will not be deleted):
The following command deletes all subtrees with the view name AdminView:
The following command deletes the view AdminView with subtree 1.3.6.1.2.1.2
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an entry from the snmpNotifyTable.
Syntax Description
hex_notify_name Specifies the notify name to add. The value is to be supplied as a
colon separated string of hex octets.
notify_name Specifies the notify name to add in ASCII format.
all-non-defaults Specifies that all non-default (non-permanent) notifications are to be
deleted.
Default
N/A.
Usage Guidelines
Use this command to delete an entry from the snmpNotifyTable. When a notification is to be sent, this
table is examined. For the target addresses that have been associated with the tags present in the table,
notifications will be sent, based on the filters also associated with the target addresses.
Example
The following command removes the N1 entry from the table:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes SNMPv3 target addresses.
Syntax Description
hex_addr_name Specifies an identifier for the target address. The value is to be
supplied as a colon separated string of hex octets.
addr_name Specifies a string identifier for the target address.
all Specifies all target addresses.
Default
N/A.
Usage Guidelines
Use this command to delete an entry in the SNMPv3 snmpTargetAddressTable.
Example
The following command deletes target address named A1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes SNMPv3 target parameters.
Syntax Description
hex_param_name Specifies the parameter name associated with the target. The value is
to be supplied as a colon separated string of hex octets.
param_name Specifies the parameter name associated with the target in ASCII
format.
Default
N/A.
Usage Guidelines
Use this command to delete an entry in the SNMPv3 snmpTargetParamsTable. This table specifies the
message processing model, security level, security model, and the storage parameters for messages to
any target addresses associated with a particular parameter name.
Example
The following command deletes a target parameters entry named P1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an existing SNMPv3 user.
Syntax Description
all Specifies that all users are to be deleted.
hex_user_name Specifies the user name to delete. The value is to be supplied as a
colon separated string of hex octets.
user_name Specifies the user name to delete.
engine-id SNMP engine ID
engine-id Engine ID in hexadecimal (Default: local engine ID)"; type="ostring_t
Default
N/A.
Usage Guidelines
Use this command to delete an existing user.
Deleting users does not implicitly remove the related group-to-user association from the
VACMSecurityToGroupTable. To remove the association, use the following command:
configure snmpv3 delete group {[[hex hex_group_name] | group_name]} user
[all-non-defaults | {[[hex hex_user_name] | user_name] {sec-model
[snmpv1|snmpv2c|usm]}}]
Example
The following command deletes all users:
configure snmpv3 delete user all
The following command deletes a remote user named "ambiguoususer" with engine id 11:22:33:
configure snmpv3 delete user ambiguoususer engine-id 11:22:33
History
This command was first available in ExtremeXOS 10.1.
The all-non-default keyword was replaced with the all keyword in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the SNMPv3 Engine Boots value.
Syntax Description
(1-2147483647) Specifies the value of engine boots.
Default
N/A.
Usage Guidelines
Use this command if the Engine Boots value needs to be explicitly configured. Engine Boots and Engine
Time will be reset to one (1) if the Engine ID is changed. Engine Boots can be set to any desired value,
but will latch on its maximum, 2147483647.
Example
The following command configures Engine Boots to 4096:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Decription
Configures the SNMPv3 snmpEngineID.
Syntax Description
hex_engine_id Specifies the colon delimited hex octet that serves as part of the
snmpEngineID (5-32 octets).
Default
The default snmpEngineID is the device MAC address.
Usage Guidelines
Use this command if the snmpEngineID needs to be explicitly configured. The first four octets of the ID
are fixed to 80:00:07:7C,which represents Extreme Networks Vendor ID. Once the snmpEngineID is
changed, default users are reverted back to their original passwords/keys, while non-default users are
removed from the device.
Example
The following command configures the snmpEngineID to be 80:00:07:7C:00:0a:1c:3e:11:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures SNMPv3 INFORM notification retries.
Syntax Description
hex_addr_name Specifies a address name in hexadecimal format.
addr_name Specifies the address name in ASCII format.
retry_count Specifies the maximum number of times to resend an SNMPv3 inform.
Default
The retry default is 3.
Usage Guidelines
Use this command to configure the number of times an SNMPv3 INFORM message is to be resent to the
(notification responder) manager when a response has not been received.
Example
The following command configures a retry count of 5 for the target address A1:
History
This command was first available in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the SNMPv3 INFORM notification timeout.
Syntax Description
hex_addr_name Specifies the address name in hexadecimal format.
addr_name Specifies the address name in ASCII format.
timeout_val Specifies the number of seconds.
Default
The timeout value default is 15 seconds.
Usage Guidelines
Use this command to configure how many seconds to wait for a response before resending an SNMPv3
INFORM.
Example
The following command configures a timeout value of 20 seconds for the target address A1:
History
This command was first available in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure sntp-client
configure sntp-client [primary | secondary] host-name-or-ip {vr vr_name}
Description
Configures an NTP server for the switch to obtain time information.
Syntax Description
primary Specifies a primary server name.
secondary Specifies a secondary server name.
host-name-or-ip Specifies a host name or IPv4 address or IPv6 address.
vr Specifies use of a virtual router.NOTE: User-created VRs are supported
only on the platforms listed for this feature in the ExtremeXOS 30.5
Feature License Requirements document.
vr_name Specifies the name of a virtual router.
Default
N/A.
Usage Guidelines
Queries are first sent to the primary server. If the primary server does not respond within 1 second, or if
it is not synchronized, the switch queries the second server. If the switch cannot obtain the time, it
restarts the query process. Otherwise, the switch waits for the sntp-client update interval before
querying again.
Example
The following example configures a primary NTP server:
configure sntp-client primary 10.1.2.2
The following example configures the primary NTP server to use the management virtual router VR-
Mgmt:
configure sntp-client primary 10.1.2.2 vr VR-Mgmt
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the interval between polls for time information from SNTP servers.
Syntax Description
update-interval Specifies an interval in seconds.
Default
64 seconds.
Usage Guidelines
None.
Example
The following command configures the interval timer:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures SSH2 to use an ACL policy or ACL rule for access control.
Syntax Description
access_profile Specifies an ACL policy.
add Specifies that an ACL rule is to be added to the SSH2 port.
rule Specifies an ACL rule.
first Specifies that the new rule is to be added before all other rules.
before Specifies that the new rule is to be added before a previous rule.
after Specifies that the new rule is to be added after a previous rule.
previous_rule Specifies an existing rule in the application.
delete Specifies that one particular rule is to be deleted.
none Specifies that all the rules or a policy file is to be deleted.
Default
N/A.
Usage Guidelines
You must be logged in as administrator to configure SSH2 parameters.
• Implement an ACL policy file that permits or denies a specific list of IP addresses and subnet masks
for the SSH2 port. You must create the ACL policy file before you can use this command. If the ACL
policy file does not exist on the switch, the switch returns an error message indicating that the file
does not exist.
In the ACL policy file for SSH2, the “source-address” field is the only supported match condition. Any
other match conditions are ignored.
Policy files can also be configured using the enable ssh2 command.
• Add an ACL rule to the SSH2 application through this command. Once an ACL is associated with
SSH2, all the packets that reach an SSH2 module are evaluated with this ACL and appropriate action
(permit or deny) is taken, as is done using policy files.
The permit or deny counters are also updated accordingly regardless of whether the ACL is
configured to add counters. To display counter statistics, use the show access-list counters
process command.
Only the following match conditions and actions are copied to the client memory. Others that may
be in the rule are not copied.
Match conditions:
◦ Source-address—IPv4 and IPv6
◦ Actions—Permit or Deny
When adding a new rule, use the first, before, and after previous_rule parameters to position it within
the existing rules.
If the SSH2 traffic does not match any of the rules, the default behavior is deny. To permit SSH2 traffic
that does not match any of the rules, add a permit all rule at the end of the rule list.
If you attempt to implement a policy that does not exist on the switch, an error message similar to the
following appears:
Error: Policy /config/MyAccessProfile.pol does not exist on file system
If this occurs, make sure the policy you want to implement exists on the switch. To confirm the policies
on the switch, use the ls command. If the policy does not exist, create the ACL policy file.
Example
The following example applies the ACL MyAccessProfile_2 to SSH2:
configure ssh2 access-profile MyAccessProfile_2
The following example copies the ACL rule, DenyAccess to the SSH2 application in first place:
configure ssh2 access-profile add DenyAccess first
The following example removes the association of a single rule from the SSH2 application:
configure ssh2 access-profile delete DenyAccess
The following example removes the association of all ACL policies and rules from the SSH2 application:
configure ssh2 access-profile none
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the minimal supported Diffie-Hellman group.
Syntax Description
dh-group Configures the Diffie-Hellman group. Used for cryptographic key
exchange. Higher groups are stronger.
minimum Configures minimal supported Diffie-Hellman group to avoid using
weaker groups.
1 Supports Diffie-Hellman group 1 (1,024 bit), 14 (2,048 bit), 16 (4,096
bit), and 18 (8,192 bit).
14 Supports group 14 (2,048 bit), 16 (4,096 bit), and 18 (8,192 bit).
Default.
16 Supports Diffie-Hellman group 16 (4,096 bits) and 18 (8,192 bits).
18 Supports only Diffie-Hellman group 18 (8,192 bits).
Default
The minimal supported Diffie-Hellman group is 14. This means that Diffie-Hellman groups 14, 16, and 18
are supported by default.
Usage Guidelines
Openssh-7.5p1 supports Diffie-Hellman group 1, 14, 16, and 18 as part of the key exchange algorithms. By
default, Diffie-Hellman group 14, 16, and 18 are supported.
To revert back to using Diffie-Hellman group 1 (in addition to Diffie-Hellman group 14, 16, and 18), set the
minimal support group to Diffie-Hellman group1.
The server picks the first entry from the client proposal and matches it with its own proposal. If there is
no match, the server picks the next entry from the client proposal and so on. If no match is found, the
connection is rejected.
Example
The following example configures Diffie-Hellman group 16 as the minimum supported Diffie-Hellman
group.
configure ssh2 dh-group minimum 16
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables ciphers/Message Authentication Codes (MACs) for use with SSHv2.
Syntax Description
cipher Specifies cipher to disable for the encrypting session.
cipher Specific cipher name to disable.
all Specifies all ciphers/MACs available in current mode.
mac Specifies MACs to disable for the encrypting session.
mac Specific MAC name to disable.
Default
None.
Example
The following example disables cipher "aes256-ctr":
configure ssh2 disable cipher "aes256-ctr"
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables DSA/RSA X509v3 public key algorithms.
Syntax Description
pk-alg Specifies disabling DSA/RSA X509v3 public key algorithms.
pkalg_name Specifies which algorithm to disable: "ssh-dss" "ssh-rsa" "x509v3-
sign-dss" "x509v3-sign-rsa"
all Specifies disabling all public key algorithms available.
Default
By default all the algorithms are enabled.
Example
The following example disables the ssh-dss algorithm:
configure ssh2 disable pk-alg ssh-dss
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the required ciphers/Message Authentication Codes (MACs) with SSHv2.
Syntax Description
cipher Specifies cipher to use for encrypting the session.
cipher Cipher name for encrypting session.
all Specifies all ciphers/MACs available in current mode.
mac Specifies MACs to use for encrypting the session.
mac MAC name for encrypting session.
Default
In Default mode, the following ciphers/MACs are disabled by default:
• Ciphers: 3des-cbc, blowfish-cbc, aes128-cbc, aes192-cbc, aes256-cbc, cast128-cbc, rijndael-
[email protected], arcfour, arcfour128, arcfour256
• MACs: hmac-md5, hmac-md5-96, [email protected], hmac-md5-96-
[email protected], hmac-ripemd160, [email protected], hmac-ripemd160-
[email protected], hmac-sha1-96, [email protected]
Example
The following example enables cipher "aes256-ctr" for the encrypting the session:
configure ssh2 enable cipher "aes256-ctr"
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables DSA/RSA X509v3 public key algorithms.
Syntax Description
pk-alg Specifies enabling DSA/RSA X509v3 public key algorithms.
pkalg_name Specifies which algorithm to enable: "ssh-dss" "ssh-rsa" "x509v3-sign-
dss" "x509v3-sign-rsa"
all Specifies enabling all public key algorithms available.
Default
ssh-dss is disabled by default.
Usage Guidelines
This public key algorithm configuration is used for the user key only—not for the host key. For a user key,
ssh-dss algorithm is supported, but disabled by default. However, for host key, ssh-dss algorithm is not
supported for both server and client. For backward compatibility it is supported in the server only
during a switch image upgrade if this algorithm is present in earlier release.
Example
The following example enables the ssh-dss algorithm:
configure ssh2 enables pk-alg ssh-dss
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures idle-timeout for SSH/SFTP connections.
Syntax Description
none Idle timeout disabled.
minutes Timeout value in minutes. Range is 1 to 240.
Default
60 minutes.
Usage Guidelines
If you enable the idle timer using the enable idletimeout command, the SSH2 connection times out after
20 minutes of inactivity by default. If you disable the idle timer using the disable idletimeout command,
the SSH2 connection times out after 60 minutes of inactivity by default. This timeout value can be
modified using the command “configure ssh2 idletimeout <minutes> wherein <minutes> can be from 1
to 240 ”. This ssh idle timer is applicable for SFTP connections as well.
Example
Configured ssh idle timeout is displayed in “show management” output:
# show management
CLI idle timeout : Enabled (2 minutes)
CLI max number of login attempts: 3
CLI max number of sessions : 8
CLI paging : Enabled (this session only)
CLI space-completion : Disabled (this session only)
CLI configuration logging : Disabled
CLI journal size : 100
CLI password prompting only : Disabled
CLI scripting : Disabled (this session only)
CLI scripting error mode : Ignore-Error (this session only)
CLI persistent mode : Persistent (this session only)
CLI prompting : Enabled (this session only)
CLI screen size : 32 Lines 112 Columns (this session only)
CLI refresh : Enabled
Telnet access : Enabled (tcp port 23 vr all)
: Access Profile : not set
SSH access : Enabled (Key valid, tcp port 22 vr all)
: Access Profile : not set
SSH2 idle timeout : 20 minutes
Web access : Enabled (tcp port 80)
: Access Profile : not set
Total Read Only Communities : 1
Total Read Write Communities : 1
RMON : Disabled
SNMP access : Enabled
: Access Profile : not set
SNMP Notifications : Enabled
SNMP Notification Receivers : None
SNMP stats: InPkts 0 OutPkts 0 Errors 0 AuthErrors 0
Gets 0 GetNexts 0 Sets 0 Drops 0
SNMP traps: Sent 0 AuthTraps Enabled
SNMP inform: Sent 0 Retries 0 Failed 0
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Generates the Secure Shell 2 (SSH2) host key. This command is used to regenerate a host key, if there is
already one existing.
Syntax Description
pregenerated indicates that the SSH2 host key is already available with the user.
Default
The switch generates a key for each SSH2 session.
Usage Guidelines
Secure Shell 2 (SSH2) is a feature of ExtremeXOS that allows you to encrypt session data between a
network administrator using SSH2 client software and the switch or to send encrypted data from the
switch to an SSH2 client on a remote system. Configuration, policy, image, and public key files may also
be transferred to the switch using the Secure Copy Program (SCP2).
A host key must be generated before the switch can accept incoming ssh connections. This can be done
by the switch using the commands "enable ssh2" (if ssh is not enabled previously) or "configure ssh2
key pregenerated" (if you wish to use a pregenerated key as the host key).
If you elect to have the key generated, the key generation process can take up to one minute, and
cannot be canceled after it has started. For the switch to use the newly generated key the exsshd
process needs to be restarted using the command restart process [class cname | name
{msm slot}] with "exsshd" as the name.
To use a key that has been previously created, use the pregenerated keyword. Use the show ssh2
private-key command to list and copy the previously generated key. Then use the configure
ssh2 key {pregenerated} command where “pregenerated” represents the key that you paste.
Note
In ExtremeXOS 22.5 and later, ssh-dss (DSA) host key is not supported in both server and
client. For backward compatibility, it is supported in server only during a switch image
upgrade if this algorithm is present in earlier release.
The key generation process generates the SSH2 private host key. The SSH2 public host key is derived
from the private host key, and is automatically transmitted to the SSH2 client at the beginning of an
SSH2 session.
To view the status of SSH2 on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
SSH2 sessions, whether a valid key is present, and the TCP port and virtual router that is being used.
Example
The following command generates an authentication key for the SSH2 session:
configure ssh2 key
To configure an SSH2 session using a previously generated key, use the following command:
configure ssh2 key pregenerated <pre-generated key>
Enter the previously-generated key (you can copy and paste it from the saved configuration file; a part
of the key pattern is similar to 2d:2d:2d:2d:20:42:45:47:).
History
This command was first available in the ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets SSHv2 session rekeying interval by specifying a time interval value and/or amount of transferred
data.
Syntax Description
ssh2 Specifies setting SSHv2 behavior.
rekey Specifies rekey request interval for SSH connection.
time-interval Sets rekey time interval.
time_interval Specifies rekey time interval value in minutes. Valid range 1 to 1,440.
none Specifies no time limit for rekey interval (default).
data-limit Specifies rekey interval in terms of amount of data transferred.
data_size Sets data transfer limit in MB. Valid range is 1 to 4,096 MB.
default Sets the data limit to the default specified by the cipher. Values range
between 1GB and 4GB. This is the default setting.
Default
If nothing is specified, the rekey time interval is set to none, and the data limit is specified by the cipher
in use.
Usage Guidelines
You can set both a time limit and a data limit for the rekey interval. Your selections for rekeying appear
in the output of the show ssh2 command.
Example
The following example sets the SSHv2 rekey time interval to one hour (60 mins):
configure ssh2 rekey time-interval 60
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command (secure-mode on) disables the weak ciphers and macs in SSH server and client.
Syntax Description
on Enable all supported algorithms.
off Enable only compliance algorithms.
Default
Off.
Usage Guidelines
After enabling secure-mode:
• For communication, SSH server uses a new secure-mode list made each for ciphers and macs.
• For SSH client, EPM is notified to change the bit dedicated to SSH secure-mode, which hides the
weak ciphers and macs from SSH client CLI commands.
Example
configure ssh2 secure-mode on
show management
CLI idle timeout : Disabled
CLI max number of login attempts: 3
CLI max number of sessions : 8
CLI paging : Enabled (this session only)
CLI space-completion : Disabled (this session only)
CLI configuration logging : Enabled
CLI password prompting only : Disabled
CLI RADIUS cmd authorize tokens : 2
CLI scripting : Disabled (this session only)
CLI scripting error mode : Ignore-Error (this session only)
CLI persistent mode : Persistent (this session only)
CLI prompting : Enabled (this session only)
CLI screen size : 24 Lines 80 Columns (this session only)
CLI refresh : Enabled
Telnet access : Enabled (tcp port 23 vr all)
: Access Profile : not set
SSH access : Enabled (Key valid, tcp port 22 vr all)
: Secure-Mode : On
: Access Profile : not set
SSH2 idle time : 60 minutes
Web access : Enabled (tcp port 80)
: Access Profile : not set
Total Read Only Communities : 1
Total Read Write Communities : 1
RMON : Disabled
SNMP access : Enabled
: Access Profile : not set
SNMP Notifications : Enabled
SNMP Notification Receivers : None
SNMP stats: InPkts 0 OutPkts 0 Errors 0 AuthErrors
0
Gets 0 GetNexts 0 Sets 0 Drops 0
SNMP traps: Sent 0 AuthTraps Enabled
SNMP inform: Sent 0 Retries 0 Failed 0
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Associates a user to a key.
Syntax Description
key_name Specifies the name of the public key.
user_name Specifies the name of the user.
Default
N/A.
Usage Guidelines
This command associates (or binds) a user to a key. Pressing TAB at the end of the command lists
existing account names.
Example
The following example binds the key id_dsa_2048 to user admin:
configure sshd2 user-key id_dsa_2048 add user admin
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disassociates a user to a key.
Syntax Description
key_name Specifies the name of the public key.
user_name Specifies the name of the user.
Default
N/A.
Usage Guidelines
This command disassociates (or unbinds) a user to a key. Pressing TAB at the end of the command
shows a list of users attached to the key.
Example
The following example unbinds the key id_dsa_2048 from user admin:
configure sshd2 user-key id_dsa_2048 delete user admin
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the hash algorithm.
Syntax Description
ssl SSL.
certificate Certificate.
hash-algorithm Hash algorithm to use (Default SHA-512).
hash_algorithm Name of hash algorithm to use (Default SHA-512).
Default
SHA-512 algorithm.
Usage Guidelines
Use this command to configure the hash algorithm. Once configured, this configured algorithm will be
used for the next certificate creation. Previously MD5 was the only hashing algorithm available. As of
ExtremeXOS 16.1, the default has been changed to more secure SHA-512 algorithm. If you prefer the
older version, you can configure to the least secure MD5 hashing algorithm.
Example
The following example displays the show ssl output with the SHA-512 algorithm configured:
X460G2-48t-10G4.5 # show ssl
HTTPS Port Number: 443 (Enabled)
Signature Algorithm configured: SHA-512 with RSA Encryption
Private Key matches the Certificate's public key.
RSA Key Length: 1024
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 0 (0x0)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=IN, O=ext, CN=ext
Validity
Not Before: Dec 7 21:52:53 2014 GMT
Not After : Dec 7 21:52:53 2015 GMT
Subject: C=IN, O=ext, CN=ext
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Obtains the pre-generated certificate from the user.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
You must upload or generate a certificate for SSL server use. With this command, you copy and paste
the certificate into the command line followed by a blank line to end the command. The following
security algorithms are supported:
• RSA for public key cryptography (generation of certificate and public-private key pair, certificate
signing). RSA key size between 2,048 and 4,096 bits.
• Symmetric ciphers (for data encryption): RC4, DES, and 3DES.
• Message Authentication Code (MAC) algorithms: RSA Data Security, Inc. MD5 Message-Digest
Algorithm and SHA.
This command is also used when downloading or uploading the configuration. Do not modify the
certificate stored in the uploaded configuration file because the certificate is signed using the issuer's
private key.
The certificate and private key file should be in PEM format and generated using RSA as the
cryptography algorithm.
Example
The following command obtains the pre-generated certificate from the user:
configure ssl certificate pregenerated
Next, you open the certificate, and then copy and paste the certificate into the console/Telnet session,
followed by a blank line to end the command.
History
This command was first available in the ExtremeXOS 11.2 and supported with the SSH module.
As of ExtremeXOS 21.1, the SSH XMOD is part of the base image and not available as a separate XMOD
module.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a self-signed certificate and private key that can be saved in the EEPROM.
Syntax Description
length Specifies the private key length in bytes. Valid values are between 2,048 and 4,096.
code Specifies the country code in 2-character form.
org_name Specifies the organization name. The organization name can be up to 64 characters
long.
name Specifies the common name. The common name can be up to 64 characters long.
Default
N/A.
Usage Guidelines
This command creates a self signed certificate and private key that can be saved in the EEPROM. The
certificate generated is in the PEM format.
The size of the certificate depends on the RSA key length (privkeylen) and the length of the other
parameters (country, organization name, and so forth) supplied by the user. For an RSA key length of
4,096, the certificate length is approximately 2 Kb, and the private key length is approximately 3 Kb.
Example
The following example creates an SSL certificate in the USA for a website called bigcats:
configure ssl certificate privkeylen 2048 country US organization IEEE common-name bigcats
History
This command was first available in the ExtremeXOS 11.2 and supported with the SSH module.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Generates certificate signing request (CSR) and private key.
Syntax Description
ssl Specifies SSL (Secure Sockets Layer).
csr Specifies creating a CSR (certificate signing request).
privkeylen Specifies setting the private key length.
length Specifies the value for the private key length in bytes (2,048–4,096).
country Specifies setting the country code.
code Specifies the two-character value for the country code.
organization Specifies setting the organization name.
org_name Specifies the value for the organization name (maximum of 64
characters).
common-name Specifies setting the common name.
name Specifies setting the value for the common name (maximum of 60
characters).
Default
N/A.
Usage Guidelines
Note
There can only be one CSR per switch.
After entering values for the private key length, country code, organization, and common name, you are
prompted to enter information for the Distinguished Name (DN): state, locality, organization unit, and
email address.
Note
Due to changes in the Distinguished Name (DN), you are prompted to provide country,
organization, and common name to ensure backward compatibility.
Example
The following example creates a CSR with a private key length of 2,048, country is USA, organization is
"EXTR", and the common name is "test":
# configure ssl csr privkeylen 2048 country US organization EXTR common-name test
You are about to be asked to enter information that will be incorporated into your
certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
For some fields there will be a default value in [].
If you enter '.' the field will be left blank.
-----
State or Province Name (full name) []: North Carolina
Locality Name (eg, city) [Default City]: Raleigh
Organizational Unit Name (eg, section) []: RDU
Email Address []: [email protected]
.................................................+++
.................+++
CSR and Key Pair generated.
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Obtains the pre-generated private key from the user.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command is also used when downloading or uploading the configuration. The private key is stored
in the EEPROM, and the certificate is stored in the configuration file.
With this command, you copy and paste the private key into the command line followed by a blank line
to end the command. The following security algorithms are supported:
• RSA for public key cryptography (generation of certificate and public-private key pair, certificate
signing). RSA key size between 1024 and 4096 bits.
• Symmetric ciphers (for data encryption): RC4, DES, and 3DES.
• Message Authentication Code (MAC) algorithms: RSA Data Security, Inc. MD5 Message-Digest
Algorithm and SHA.
The certificate and private key file should be in PEM format and generated using RSA as the
cryptography algorithm.
Example
The following command obtains the pre-generated private key from the user:
configure ssl privkey pregenerated
Next, you the open the certificate and then copy and paste the certificate into the console/Telnet
session, followed by [Enter] to end the command.
History
This command was first available in the ExtremeXOS 11.2 and supported with the SSH module.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures debounce time feature on stacking ports.
Syntax Description
port-list Specifies one or more stacking ports.
default Configure the default value.
milliseconds Time in milliseconds. Range is 0 (no debouncing) to 5000.
Default
Default debounce time value is 0.
Usage Guidelines
Debounce timer can be configured to override the false link flaps i.e. link flaps that happens in a
milliseconds interval.
Example
configure stack-ports 1:1 1:2 debounce time 150
History
This command was first available in ExtremeXOS 15.3.4.
Platform Availability
The command is available on all stackable switches.
Description
Configures an alternate management IP address, subnetwork, and gateway.
Syntax Description
node-address Specifies the MAC address of a node in the stack. To view the MAC
addresses for all nodes in a stack, enter the show stacking command.
A node address or slot number is required unless the automatic keyword is
specified.
slot_number Specifies the slot number of the target node. To view the slot numbers,
enter the show stacking command.
ipaddress netmask Specifies the unique address that exists on the Management VLAN subnet
as configured on the initial master node together with the subnetwork
mask specified for the Management subnetwork.
Example: 66.77.88.1 255.255.255.0.
ipNetmask Specifies the unique address that exists on the Management VLAN subnet
as configured on the initial master node, followed by a slash (/) character,
followed by a decimal number that represents the number of leading one
bits in the subnetwork address. An example is 66.77.88.1/24.
gateway The address of an IP router. A default route is set up to reach this gateway.
Default
No alternate IP address is configured.
Usage Guidelines
If a Management subnetwork is configured and the alternate IP subnetwork does not exactly match the
configured Management subnetwork, the information configured by one of the commands specified
above is not used. The previously configured alternate IP address is removed if it was installed and
subsequently a Management subnetwork is configured that does not exactly match the alternate IP
subnetwork. In either case, an error message is logged. The alternate IP address is used if there is no
configured Management subnetwork.
To use the command with the node address, the node must be in the stack topology; and to use the
command with the slot number, the node must be in the active topology. This form of the command
operates only on one node at a time. There are no checks to verify that the address is the one
configured in the management VLAN subnet.
The command that does not require a node address or slot number specifies the automatic keyword.
Usage of this form of the command causes an alternate IP address to be assigned to every node in the
stack topology. The first address is the address specified in the [ipaddress netmask |
ipNetmask] parameter. The next address is the IP address plus one, and so on. Since there is a
specified subnet mask, the address is checked to insure that the block of IP addresses fits within the
specified subnet given the number of nodes in the stack topology. The range of addresses is tested to
insure that each one is a valid IP unicast address. If the test fails, no node is configured and an error
message is printed. Assignment is in the order in which nodes would currently appear in the show
stacking display.
The alternate IP address, subnetwork, and gateway are only used when the node is operating in
stacking mode.
Example
To configure an alternate IP address for every node in the stack with a single command:
You may configure an alternate IP address using a slot number for a node that is currently occupying
the related slot:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command provides an easy way to initially configure the stacking parameters of all nodes in a new
stack.
Syntax Description
This command does not have additional syntax.
Default
N/A.
Usage Guidelines
This command performs the following functions:
• Informs you of the stacking parameters that will be set.
• Informs you of the number of nodes that will be configured.
• Informs you whether minimal or no redundancy will be configured, and which slot will contain the
master node.
• Informs you of the slot number that will be assigned to the node on which your management
session is being run.
• If applicable, warns you that the current configuration file changes will be lost and you need to save
the files.
• If the stack topology is a daisy chain, warns you that you should wire the stack as a ring before
running this command.
• Requires you to confirm before the operation takes place. If you proceed, the command does the
following:
◦ Enables stacking on all nodes.
◦ Configures the stacking MAC address using the factory address of the current node.
◦ Configures a slot number for each node.
◦ Configures redundancy to minimal in a ring topology or none in a daisy chain topology.
◦ Configures the stacking protocol.
◦ Reboots the stack topology.
• Selects the enhanced stacking protocol.
The stack mac-address is configured as if the configure stacking mac-address was issued on
the current node.
Stack slot numbers are assigned as if the configure stacking slot-number automatic
command was issued on the current node.
On a daisy chain topology, the master-capability is configured as if the configure stacking redundancy
none command was issued. On a ring topology, the master-capability is configured as if the configure
stacking redundancy minimal command was issued.
If you choose not to proceed with the setup, the following message is displayed:
Cancelled easy stack setup configuration.
Example
If you have an 8-node stack in a ring topology and have powered on all the nodes, the show
stacking command shows the stack topology as a ring with all intended nodes present. If you have
not changed any ExtremeXOS configuration, the command displays as follows:
If the 8-node stack topology is a daisy chain, and the user is logged into a node in the middle of the
chain, the command output might appear as follows:
- choose and configure a slot number (this node will be assigned to slot 5)
- configure redundancy to none (slot 1 will be the master node)
Upon completion, the stack will automatically be rebooted into the new configuration.
Warning: If stacking is already configured, this command will alter that configuration.
Warning: This stack is a daisy chain. It is highly recommended that the stack
be connected as a ring before running this command.
Do you wish to proceed? (y/N) Yes
Stacking configuration is complete. Rebooting...
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
Allows you to restrict the license level at which the node operates.
Syntax Description
node-address Specifies the MAC address of a node in the stack. To view the MAC
addresses for all nodes in a stack, enter the show stacking
command.
slot-number Specifies the slot number of the target node. To view the slot numbers,
enter the show stacking command.
Default
No license level restriction is configured.
Usage Guidelines
This command causes a node to operate at a lower license level than the level that was purchased for
the node.
Running this command does not change the installed license level. For example, if a stackable is
configured with the Advanced Edge license and you configure a license level restriction of Edge, the
unit is restricted to features available in the Edge license. However, you can remove the restriction and
operate at the Advanced Edge level.
If the installed license level of the target node is lower than the level you are attempting to configure,
the following message appears:
Warning: Switch will not operate at a license level beyond that which
was purchased.
If the node-address or slot parameter is not specified, the command takes effect on every node in the
stack topology.
This command takes effect after you restart the node. The following message appears after the
command is executed:
This command will take effect at the next reboot of the specified
node(s).
If you restart the node without configuring a license level restriction, the node operates at the
purchased license level. To see the purchased license level of a node, run show licenses after
logging in to the node.
The show licenses command displays the current license level in use as the Effective License Level:
The Effective License Level appears only when stacking is enabled. The command is node-specific. The
effective license level is the level at which the node is restricted to operate, and is not necessarily the
level at which the entire stack is operating. This is because it is possible to have the restriction differ on
each node, in which case one or more nodes may have failed because of the differing levels.
Example
To configure the stacking level Edge on all nodes in a stack:
To configure the stacking level Advanced Edge for an active node that currently occupies slot 4:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
Selects a node in the stack whose factory assigned MAC address is to be used to form the stack MAC
address.
The formed address is then configured on every node in the stack topology.
Syntax Description
node-address Specifies the MAC address of a node in the stack. To view the MAC addresses for all
nodes in a stack, enter the show stacking command.
slot-number Specifies the slot number of an active node whose factory MAC address is to be
used to form the stack MAC address. To view the slot numbers, enter the show
stacking command.
Default
No stack MAC selection is configured.
Usage Guidelines
You must select a node whose factory assigned MAC address can be used to form a MAC address that
represents the stack as a whole. The system forms the stack MAC address by setting the Universal /
Local bit in the specified MAC address. This means that the stack MAC address is a locally administered
address, and not the universal MAC address assigned to the selected node.
If you do not specify any node, the stack MAC address is formed from the factory assigned MAC
address of the node from which you are running the command.
This command takes effect only after you restart the node. The following message appears after you
run the command:
This command will take effect at the next reboot of the specified
node(s).
If a stack node that has just joined the active topology detects that its stack MAC address is not
configured or is different than the stack MAC address in use, it logs the following message at the Error
log level:
The stack MAC address is not correctly configured on this node. The
stack can not operate properly in this condition. Please correct and
reboot.
If you have not configured (or inconsistently configured) the stack MAC address you might encounter
difficulty in diagnosing the resulting problems. Whenever the master node (including itself) detects that
one or more nodes in its active topology do not have the correct or any stack MAC address configured,
it displays the following message to the console every five minutes until you configure a MAC address
and restart the node(s):
The stack MAC address is either not configured or its configuration is
not consistent within the stack. The stack can not operate properly in
this condition. Please correct and reboot.
Example
To select the node to which you have logged in to supply the MAC address for stack MAC address
formation:
To select a node other than the one to which you are logged in to supply the MAC address for stack
MAC address formation:
To select an active node to supply the MAC address for stack MAC address formation:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
The command configures a node to be allowed to operate as either a backup or master, or prevents a
node from operating as either.
The command controls the setting on the specified node only. To set the master capability for all nodes
on a stack, you can use the command configure stacking redundancy [none | minimal
| maximal].
Syntax Description
node_address Specifies the MAC address of a node in the stack. To view the MAC addresses
for all nodes in a stack, enter the show stacking command.
slot_number Specifies the slot number of the target active node. To view the slot numbers,
enter the show stacking command.
Default
Master-capability is On.
Usage Guidelines
At least one node in the stack topology must be master-capable.
If you attempt to disable the master-capability of the only master capable node in a stack topology, the
attempt is denied and following message appears:
Error: At least one node must have Master-capability configured "on".
This command is used to set up master-capability manually. It can also be used to adjust the result
achieved when the configure stacking redundancy [none | minimal | maximal]
command is used.
The setting takes effect the next time the node reboots. When this command is executed successfully,
the following message appears:
This command will take effect at the next reboot of the specified
node(s).
Example
To turn on the master capability for a node:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures a slot number on one or all nodes in the stack topology.
Syntax Description
node_address Specifies the MAC address of a node in the stack. To view the MAC addresses
for all nodes in a stack, enter the show stacking command.
slot_number Specifies a number between 1 and 8 that is to be assigned as the slot number
of the target node.
Default
The default slot-number for a node in stacking mode is 1.
Usage Guidelines
The configuration is stored on the affected node(s) immediately but does not take effect until the next
reboot of the node(s). The configuration applies only when the node is running in stacking mode. To see
the configured and active slot numbers of all nodes, use the show stacking configuration
command.
If a node-address and a slot number are specified, then the node is configured with the specified slot
number. There is no check for a duplicate slot number at this time; the number is simply assigned as
requested.
To see the resulting slot number assignment, run the show stacking configuration command.
Note
Failure to configure a node does not prevent configuration of the slot numbers on the other
nodes, and does not affect the slot number assigned to each node.
This command will take effect at the next reboot of the specified
node(s).
Example
To configure slot number 4 for the node with MAC address 00:04:96:26:6b:ed:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures a priority value to be used to influence master and backup election.
Syntax Description
node-address Specifies the MAC address of a node in the stack. To view the MAC addresses
for all nodes in a stack, enter the show stacking command.
slot_number Specifies the slot number of the target node. To view the slot numbers, enter
the show stacking command.
node_pri Specifies the priority as a value between 1 and 100.
Default
Automatic priority.
Usage Guidelines
The node role election priority is a value that is internally calculated by ExtremeXOS for each node. This
calculated value helps determine which nodes are elected as master and backup. For more information,
see “Configuring the Master, Backup, and Standby Roles” in the ExtremeXOS 30.5 User Guide.
This command allows you to configure a priority value that affects the outcome of this calculation. You
can configure the priority on any node in a stack topology. You can specify an integer node-pri value
between 1 and 100. The larger the value, the greater the node role election priority.
If no node address or slot is specified, the command takes effect on all nodes at the next node role
election cycle. Priority configuration has no operational effect on switches that are not in stacking
mode.
If configured on every node, automatic priority commands ExtremeXOS to determine the node role
election priority of each active node. Currently, the automatic priority algorithm chooses the master-
capable node with the lowest slot number as master and the node with the second lowest slot number
as backup. Extreme networks may alter this behavior in later releases.
If you have configured a node with automatic priority and if you have configured another node to use a
node-pri value, the node with automatic priority uses zero as the node-priority value during the node
role election.
Example
To allow ExtremeXOS to determine node role election priority:
configure stacking priority automatic
To configure the automatic priority algorithm for the stackable with node address 00:04:96:26:6b:ed:
configure stacking node-address 00:04:96:26:6b:ed priority automatic
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures the stacking port protocol.
Syntax Description
standard Specifies the standard protocol, which is supported on all SummitStack capable
switches.
enhanced Specifies the enhanced protocol. The enhanced protocol is required to support
MPLS.
Default
Standard.
Usage Guidelines
Use this command to change the configured stacking protocol on a stack.
Note
You must reboot the switch to activate the protocol change.
If MPLS is enabled on the switch, you must disable MPLS before you can change the stacking protocol
to standard.
To display the stacking protocol configuration, enter the show stacking configuration command.
Example
To configure a switch to use the enhanced protocol, enter the following command:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command sets a master-capability value for every node in the stack topology.
Syntax Description
none Only one node has master-capability turned on and all other nodes have master-
capability turned off.
minimal Two nodes have master-capability turned on and all other nodes have master-
capability turned off.
maximal All nodes have master-capability turned on.
Default
Default value in an unconfigured stack is maximal.
Usage Guidelines
If there are more than eight nodes in the stack topology, the following message appears and the
command is not executed:
ERROR: This command can only be used when the stack has eight nodes or
less.
Since only eight nodes can be operational in an active topology at a time, you must disconnect the
remaining nodes before configuring master-capability with this command.
If there is a slot number tie or if the slot numbers were never configured, the following message appears
and the command is not executed:
ERROR: Unique slot numbers must be configured before using this command.
The setting takes effect at the next restart of the node. The following message appears after the
command is successfully executed:
This command will take effect at the next reboot of the specified
node(s).
Redundancy configuration has no operational effect on a node that is not in stacking mode.
Example
To turn on master-capability on all nodes:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures a slot number on all nodes in the stack topology, selecting the number automatically.
Syntax Description
automatic Configures slot numbers on every node in the stack, selecting the number
automatically. If there are more than eight nodes in the stack topology, the
assignment is only performed on the first eight nodes.
Automatic slot number assignment causes assignment of slot numbers
starting from 1 and increasing up to 8. The nodes in the stack topology are
assigned the numbers in the order in which they would appear currently in the
show stacking command output. In a ring, slot number 1 is assigned to the
current node, slot number 2 is assigned to the node connected to the current
node's stack port 2, and so forth. In a daisy chain, slot 1 is assigned to the node
at the end of the chain that begins with the node connected to the current
node's stack port 1.
Default
The default slot-number for a node in stacking mode is 1.
Usage Guidelines
The configuration is stored on the affected node(s) immediately but does not take effect until the next
reboot of the node(s). The configuration applies only when the node is running in stacking mode. To see
the configured and active slot numbers of all nodes, use the show stacking configuration
command.
To see the resulting slot number assignment, run the show stacking configuration command.
Note
Failure to configure a node does not prevent configuration of the slot numbers on the other
nodes, and does not affect the slot number assigned to each node.
If you enter the command with the automatic option, the following confirmation message appears:
Reassignment of slot numbers may make the stack incompatible with the
current configuration file. Do you wish to continue? (y/n)
Example
To configure all slot-numbers for a stack:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables or disables stacking auto-discovery.
Syntax Description
stacking-support Configures stacking support.
auto-discovery Configures auto-discovery for stacking.
Default
Stacking auto-discovery is enabled by default.
Usage Guidelines
Stacking auto-discovery allows a new switch, added to replace a node in a stack, to auto-discover its
stack links, auto-provision its stacking parameters, and join the existing stack.
Example
The following example disables stacking auto-discovery:
# configure stacking-support auto-discovery disable
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X460-G2, X450-G2, and X440-G2 series switches.
Description
Selects the switch ports and speed for stack communications.
Syntax Description
stack-ports Specifies the stacking port range to be configured. Valid stacking port entries
are 1, 2, 1-2, and all.
native Selects the specified stacking port, which is the native, dedicated port that only
supports stacking.
V160 Specifies that the native stacking ports on the option card operate at 160 Gbps.
V320 Specifies that the native stacking ports on the option card operate at 320 Gbps.
V400 Specifies that the native stacking ports on the option card operate at 400 Gbps
(ExtremeSwitching X590, X690, and X870 only).
alternative- Select the V400 alternate configuration stacking mode.
configuration
help Provides more details regarding the alternate configuration stacking mode
alternate Selects the alternate (Ethernet) stacking port associated with the specified
stacking port. The alternate port numbers are listed in the following table.
Default
Switches with native stack ports default to "Native". This command does not apply to switches without
native stack ports.
Native stacking ports on ExtremeSwitching switches with option cards operate as one 40 Gbps port.
ExtremeSwitching X670-G2-48x platforms, front panel ports are used for 160G and 320G stacking. For
ExtremeSwitching X460-G2, VIM-2Q ports are used for 160G stacking.
Usage Guidelines
The configuration entered with this command applies to only the local node and does not become
active until after the following events:
• The stacking-support option is enabled (if applicable).
• The switch restarts.
The V160, V320, and V400 keywords apply only to ExtremeSwitching switches with an installed option
card. Each speed configuration requires a specific cabling configuration. For more information, see the
ExtremeSwitching and Summit Switches: Hardware Installation Guide for Switches Using ExtremeXOS
Version 30.5.
"V400" is the default mode that sets the stack ports to 106G. "V400 alternative-configuration" is
required when using specific fiber cables. This mode sets the stack ports to 100G, enables pre-
emphasis, and FEC (clause_91). Cables requiring alternative-configuration include:
• QSFP28 SR4
• QSFP28 LR4
• QSFP28 CWDM4
• QSFP28 PSM4
• QxQ AOC cable - 5m
• QxQ AOC cable - 7m
• QxQ AOC cable - 10m
• QxQ AOC cable - 20m
For a complete list of supported cables, see ExtremeSwitching and Summit Switches: Hardware
Installation Guide for Switches Using ExtremeXOS Version 30.5.
The stacking-support option configures the switch to use stacking protocols. This option is
automatically enabled on most platforms, but some platforms require you to manually enable the
stacking-support option. The following table lists the ExtremeSwitching series switches and option card
configurations that support Stacking Port Selection Control, and it lists which platforms require manual
Stacking-Support Option Control.
Table 20: ExtremeSwitching Series Switch Support for Alternate Stack Ports
Switch Model Number Switch Alternate Port Alternate Port Stacking- Stacking Port
Option for Stack Port for Stack Port Support Selection
Card Option Control
Control
X440-G2-12t-10GE4 None 15 16 Yes Yes
X440-G2-12p-10GE4
X440-G2-24t-10GE4 None 27 28 Yes Yes
X440-G2-24x-10GE4
X440-G2-24t-10GE4-DC
X440-G2-24p-10GE4
X440-G2-48t-10GE4 None 49 50 Yes Yes
X440-G2-48t-10GE4-DC
X440-G2-48p-10GE4
X450-G2-24t-10GE4 None 27 28 Yes Yes
X450-G2-24p-10GE4 27 28
X450-G2-48t-10GE4 51 52
X450-G2-48p-10GE4 51 52
X460-G2-24t-1G VIM-2X 33 34 Yes Yes
X460-G2-24p-1G 33 34
X460-G2-48t-1G 53 54
X460-G2-48p-1G 53 54
X460-G2-24p-10G None 31 32 Yes Yes
X460-G2-24t-10G 31 32
X460-G2-24x-10G 31 32
X460-G2-48p-10G 51 52
X460-G2-48t-10G 51 52
X460-G2-48x-10G 51 52
X460-G2-24p-24hp-10GE4 51 52
X460-G2-24t-24ht-10GE4 51 52
X460-G2-16mp-32p-10GE4 51 52
X620-8t-2x None 9 10 Yes Yes
X620-10x
X620-16t None 15 16 Yes Yes
X620-16x
X620-16p
X670-G2-48x-4q None 47 48 Yes Yes
X670-G2-72x None 71 72 Yes Yes
When the alternate stack port is selected for a native stack port and the switch is restarted, the native
stack port remains visible in the CLI and can be configured. However, any configuration applied to the
replaced stack port is ignored and does not affect switch operation.
An alternate stack port runs the stacking protocol and cannot operate on a link connected to a data
port that is not configured as a stack port. Both ends of a stack link must be configured to use the
stacking protocol. The stacking link must be directly connected to two the alternate stacking ports of
two stacking switches. The direct connection is necessary because stacking protocols cannot pass
through an intermediate switch.
After a data port is activated as an alternate stack port, all data port configuration commands still work,
but they do not change the operation of the alternate stack port. The LEDs on an Ethernet port used as
an alternate stacking port operate according to the behavior of the Ethernet port. The LEDs on the
related (disabled) native stacking port remain dark.
Note
Commands that contain the stacking-support keyword operate only on the local switch;
they do not apply to all switches in the stack. If an active stack topology has been formed, you
can telnet to a slot elsewhere in the stack, log on to that switch, and use commands with the
stacking-support keyword on that switch.
Example
The following command configures the switch to use the alternate stack port for Stack Port 1 after the
next switch restart:
configure stacking-support stack-ports 1 selection alternate
The following command configures the switch to use both native stacking ports after the next switch
restart:
configure stacking-support stack-ports 1-2 selection native
The following command configures stack ports 1 and 2 to operate as four 40 Gbps ports:
configure stacking-support stack-ports 1-2 selection native V160
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches. The V160 keyword is supported only on switches with
the VIM3-40G4X or VIM4-40G4X option card installed.
Description
Adds all ports or a list of ports within a VLAN to a specified STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
all Specifies all of the ports in the VLAN to be included in the STPD.
port_list Specifies the port or ports to be included in the STPD.
dot1d Specifies the STP encapsulation mode of operation to be 802.1D.
emistp Specifies the STP encapsulation mode of operation to be EMISTP.
pvst-plus Specifies the STP encapsulation mode of operation to be PVST+.
Default
Default port mode for default STPD (s0) and user-created STPDs is dot1d.
Usage Guidelines
To create an STP domain, use the create stpd command. To create a VLAN, use the create vlan
command.
In an EMISTP or PVST+ environment, this command adds a list of ports within a VLAN to a specified
STPD provided the carrier VLAN already exists on the same set of ports. You can also specify the
encapsulation mode for those ports.
In an MSTP environment, you do not need a carrier VLAN. A CIST controls the connectivity of
interconnecting MSTP regions and sends BPDUs across the regions to communicate region status. You
must use the dot1d encapsulation mode in an MSTP environment.
• A VLAN/port for which the carrier VLAN does not yet belong.
Note
This restriction is enforced only in an active STP domain and when you enable STP to
make sure you have a legal STP configuration.
Care must be taken to ensure that ports in overlapping domains do not interfere with the orderly
working of each domain’s protocol.
By default, when the switch boots for the first time, it automatically creates a VLAN named default with
a tag value of 1 and STPD s0. The switch associates VLAN default to STPD s0. All ports that belong to
this VLAN and STPD are in 802.1D encapsulation mode with autobind enabled. If you disable autobind
on the VLAN default, that configuration is saved across a reboot.
Naming Conventions
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keywords stpd and vlan are optional.
This encapsulation mode supports the following STPD modes of operation: 802.1D, 802.1w, and
MSTP.
• emistp—This mode sends BPDUs with an 802.1Q tag having an STPD ID in the VLAN ID field.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
• pvst-plus—This mode implements PVST+ in compatibility with third-party switches running this
version of STP. The STPDs running in this mode have a one-to-one relationship with VLANs, and
send and process packets in PVST+ format.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
These encapsulation modes are for STP ports, not for physical ports. When a physical port belongs to
multiple STPDs, it is associated with multiple STP ports. It is possible for the physical port to run in
different modes for different domains for which it belongs.
MSTP STPDs use 802.1D BPDU encapsulation mode by default. To ensure correct operation of your
MSTP STPDs, do not configure EMISTP or PVST+ encapsulation mode for MSTP STPDs.
STPD Identifier
An StpdID is used to identify each STP domain. You assign the StpdID when configuring the domain. An
STPD ID must be identical to the VLAN ID of the carrier VLAN in that STPD and that VLAN cannot
belong to another STPD.
MSTP uses two different methods to identify the STPDs that are part of the MSTP network. An instance
ID of 0 identifies the Common and Internal Spanning Tree (CIST). The switch assigns this ID
automatically when you configure the CIST STPD. A multiple spanning tree instance identifier identifies
each STP domain that is part of an MSTP region. You assign the MSTI (Multiple Spanning Tree Instances)
ID when configuring the STPD that participates in the MSTP region. In an MSTP region, MSTI IDs only
have local significance. You can reuse MSTI IDs across MSTP regions.
Example
Create a VLAN named marketing and an STPD named STPD1 as follows:
create vlan marketing
create stpd stpd1
The following command adds the VLAN named marketing to the STPD STPD1, and includes all the ports
of the VLAN in STPD1:
configure stpd stpd1 add vlan marketing ports all
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables and disables the backup root feature.
Syntax Description
stpd_name Specifies an STPD name on the switch.
on Enables backup root.
off Disable backup root.
Default
By default, the backup root feature is disabled.
Usage Guidelines
The backup root feature is used to get faster convergence when the root bridge connectivity is lost.
Backup root feature enabled bridge port should be connected to Root with point to point link. When
backup root bridge loses contact with the root bridge, the backup root bridge automatically lowers its
bridge priority below the priority of the lost root. This causes the backup root bridge to become the
new root. If a reboot occurs, the new root will have its priority restored to the original configured value.
If the priority of the root bridge is zero and the backup root loses connectivity to the root bridge,
automatic assignment of the priority value for the backup root will be the initial configured value.
This feature is activated only when connectivity with the root bridge is lost. Raising the priority on the
root does not cause the backup root feature to be activated.
Example
The following example enables the backup root feature on the STP domain r1:
configure stpd r1 backup-root on
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command specifies whether to forward or drop BPDUs when STP is disabled.
Syntax Description
bpdu-forwarding Specifies forwarding or discarding spanning tree BPDUs when STP is
disabled.
on Forward STP BPDUs when spanning tree is disabled (default).
off Drop STP BPDUs when spanning tree is disabled.
Default
The default is on.
Usage Guidelines
STP must be disabled globally to disable BPDU forwarding; otherwise, an error message appears:
Error: All Spanning Tree Domains must be disabled globally before configuring stpd bpdu-
forwarding off.
When the BPDU forwarding is off and you try to configure the filter method using the configure
stpd filter-method [system-wide| port-based] command, the following error message
appears:
Error: Spanning Tree Forwarding must be enabled globally before configuring filter-
method.
Example
The following example disables BPDU forwarding when STP is disabled:
configure stpd bpdu-forwarding off
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the default encapsulation mode for all ports added to the specified STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
dot1d Specifies the STP encapsulation mode of operation to be 802.1d.
emistp Specifies the STP encapsulation mode of operation to be EMISTP.
pvst-plus Specifies the STP encapsulation mode of operation to be PVST+.
Default
Ports in the default STPD (s0) are dot1d mode.
Usage Guidelines
Care must be taken to ensure that ports in overlapping domains do not interfere with the orderly
working of each domain’s protocol.
By default, when the switch boots for the first time, it automatically creates a VLAN named default with
a tag value of 1 and STPD s0. The switch associates VLAN default to STPD s0. All ports that belong to
this VLAN and STPD are in 802.1d encapsulation mode with autobind enabled. If you disable autobind
on the VLAN default, that configuration is saved across a reboot.
MSTP STPDs use 802.1D BPDU encapsulation mode by default. To ensure correct operation of your
MSTP STPDs, do not configure EMISTP or PVST+ encapsulation mode for MSTP STPDs.
Naming Conventions
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional. For name creation guidelines and a list of reserved names, see Object
Name in the ExtremeXOS 30.5 User Guide.
This encapsulation mode supports the following STPD modes of operation: 802.1D, 802.1w, and
MSTP.
• emistp—This mode sends BPDUs with an 802.1Q tag having an STPD ID in the VLAN ID field.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
• pvst-plus—This mode implements PVST+ in compatibility with third-party switches running this
version of STP. The STPDs running in this mode have a one-to-one relationship with VLANs and send
and process packets in PVST+ format.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
Note
These encapsulation modes are for STP ports, not for physical ports. When a physical port
belongs to multiple STPDs, it is associated with multiple STP ports. It is possible for the
physical port to run in different modes for different domains for which it belongs.
STPD Identifier
An StpdID is used to identify each STP domain. You assign the StpdID when configuring the domain. An
STPD ID must be identical to the VLAN ID of the carrier VLAN in that STP domain, and that VLAN
cannot belong to another STPD.
MSTP uses two different methods to identify the STPDs that are part of the MSTP network. An instance
ID of 0 identifies the Common and Internal Spanning Tree (CIST). The switch assigns this ID
automatically when you configure the CIST STPD. A multiple spanning tree instance identifier identifies
each STP domain that is part of an MSTP region. You assign the MSTI ID when configuring the STPD that
participates in the MSTP region. In an MSTP region, MSTI IDs only have local significance. You can reuse
MSTI IDs across MSTP regions.
Example
The following example specifies that all ports subsequently added to the STPD STPD1 be in PVST+
encapsulation mode unless otherwise specified or manually changed:
configure stpd stpd1 default-encapsulation pvst-plus
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or more ports in the specified VLAN from an STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
all Specifies that all of the ports in the VLAN are to be removed from the
STPD.
port_list Specifies the port or ports to be removed from the STPD.
Default
N/A.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keywords stpd and vlan are optional.
In EMISTP and PVST+ environments, if the specified VLAN is the carrier VLAN, all protected VLANs on
the same set of ports are also removed from the STPD.
You also use this command to remove autobind ports from a VLAN. ExtremeXOS records the deleted
ports so that the ports are not automatically added to the STPD after a system restart.
When a port is deleted on the MSTI, it is automatically deleted on the CIST as well.
Example
The following example removes all ports of a VLAN named Marketing from the STPD STPD1:
configure stpd stpd1 delete vlan marketing ports all
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or overwrites the STP domain description field.
Syntax Description
stpd_name Specifies an STPD name on the switch.
stpd-description Specifies an STPD description.
none Clears the STPD string.
Default
The STP domain description string is empty.
Usage Guidelines
Use this command to add or overwrite the STP domain description field.
To display the description, use the show stpd stpd_name command. When no STP domain
description is configured, Description is not displayed in the output.
To clear the STP domain description string, either specify the keyword none in this command or use the
unconfigure stpd {stpd_name} command.
Example
The following command adds the description “this is s0 domain” to the STPD named s0:
History
This command was first available in ExtremeXOS 12.4.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures Spanning Tree BPDU hardware filters.
Syntax Description
system-wide Installs system-wide hardware filters for Spanning Tree.
port-based Installs per-port hardware filters for Spanning Tree.
Default
By default, system-wide hardware filters are installed.
Usage Guidelines
You must disable Spanning Tree before changing the filter method. Use the disable stpd command
to disable Spanning Tree.
Example
The following example sets the filter method for Spanning Tree as system-wide.
configure stpd filter-method system-wide
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the method used by STP to flush the FDB during a topology change.
Syntax Description
vlan-and-port Specifies a VLAN and port combination flush method.
port-only Specifies a port flush method.
Default
The default flush method is vlan-and-port.
Usage Guidelines
For scaled up configurations where there are more than 1000 VLANs and more than 70 ports
participating in STP, the number of messages exchanged between STP/FDB/HAL modules can
consume a lot of system memory during an STP topology change using the default configuration for
flush method. In such situations, setting the flush method to “port-only” can help reduce the system
memory consumption.
Example
The following command sets the flush method to port-only:
History
This command was available in ExtremeXOS 12.4.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the time (in seconds) that the ports in this STPD spend in the listening and learning states
when the switch is the root bridge.
Syntax Description
stpd_name Specifies an STPD name on the switch.
seconds Specifies the forward delay time in seconds. The default is 15 seconds,
and the range is 4 to 30 seconds.
Default
The default forward delay time is 15 seconds.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
Example
The following command sets the forward delay from STPD1 to 20 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the time delay (in seconds) between the transmission of BPDUs from this STPD when it is the
root bridge.
Syntax Description
stpd_name Specifies an STPD name on the switch.
seconds Specifies the hello time in seconds. The default is 2 seconds, and the
range is 1 to 10 seconds.
Default
The default hello time is 2 seconds.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
In an MSTP environment, configure the hello timer only on the CIST, not on the MSTIs.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
Example
The following command sets the time delay from STPD1 to 10 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the loop protect event threshold.
Syntax Description
stpd_name Specifies an STPD name on the switch.
threshold Sets the number of loop protect events that must be received before
disabling the port. The valid range is 1–10.
none Disables the loop protect threshold. The port will not remain enabled
even if loop protect events are received.
Default
By default, the loop protect threshold is enabled and set to three loop protect events.
Usage Guidelines
If the loop protect event threshold disables a port, you must enable the port manually.
Example
The following example configures the loop protect event threshold to five events.
configure stpd r1 loop-protect event-threshold 5
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the interval for which loop protect events are counted by the loop protect event threshold.
Syntax Description
stpd_name Specifies an STPD name on the switch.
interval The length of the interval, in seconds, over which the loop protect
event threshold is defined. The valid range is 0–255 seconds.
Default
By default the interval is set to 180 seconds.
Usage Guidelines
None.
Example
The following example sets the loop protect event window to 120 seconds for STP domain r1.
configure stpd r1 loop-protect event-window 120
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the maximum age of a BPDU in the specified STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
seconds Specifies the maxage time in seconds. The default is 20 seconds, and
the range is 6 to 40 seconds.
Default
The default maximum age of a BPDU is 20 seconds.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
In an MSTP environment, configure the maximum age of a BPDU only on the CIST, not on the MSTIs.
Note that the time must be greater than, or equal to 2 * (Hello Time + 1) and less than, or equal to 2 *
(Forward Delay –1).
Example
The following command sets the maximum age of STPD1 to 30 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the maximum hop count of a BPDU until the BPDU is discarded in the specified MSTP STP
domain.
Syntax Description
stpd_name Specifies an STPD name on the switch.
hopcount Specifies the number of hops required to age out information and
notify changes in the topology. The default is 20 hops, and the range
is 6 to 40 hops.
Default
The default hop count of a BPDU is 20 hops.
Usage Guidelines
This command is applicable only in an MSTP environment.
If your STPD has the same name as another component, for example a VLAN, Extreme Networks
recommends that you specify the identifying keyword as well as the name. If your STPD has a name
unique only to that STPD, the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
In an MSTP environment, the hop count has the same purpose as the maxage timer for 802.1D and
802.1w environments.
The main responsibility of the CIST is to exchange or propagate BPDUs across regions. The switch
assigns the CIST an instance ID of 0, which allows the CIST to send BPDUs for itself in addition to all of
the MSTIs within an MSTP region. Inside a region, the BPDUs contain CIST records and piggybacked M-
records. The CIST records contain information about the CIST, and the M-records contain information
about the MSTIs. Boundary ports only exchange CIST record BPDUs.
On boundary ports, only CIST record BPDUs are exchanged. In addition, if the other end is an 802.1D or
802.1w bridge, the maxage timer is used for interoperability between the protocols.
Example
The following command sets the hop of the MSTP STPD, STPD2, to 30 hops:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the operational mode for the specified STP domain.
Syntax Description
stpd_name Specifies an STPD name on the switch.
dot1d Specifies the STPD mode of operation to be 802.1D.
dot1w Specifies the STPD mode of operation to be 802.1w, and rapid
configuration is enabled.
mstp Specifies the STPD mode of operation to be 802.1s, and rapid
configuration is enabled.
cist Configures the specified STPD as the common instance spanning tree
for the MSTP region.
msti Configures the specified STPD as a multiple spanning tree instance for
the MSTP region.
instance Specifies the Id of the multiple spanning tree instance. The range is 1
to 4,094.
Default
The STPD s0 by default operates in MSTP CIST mode.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
If you configure the STP domain in 802.1D mode, the rapid reconfiguration mechanism is disabled.
If you configure the STP domain in 802.1w mode, the rapid reconfiguration mechanism is enabled. You
enable or disable RSTP on a per STPD basis only. You do not enable RSTP on a per port basis.
If you configure the STP domain in MSTP mode, the rapid reconfiguration mechanism is enabled. You
enable or disable MSTP on a per STPD basis only. You do not enable MSTP on a per port basis. MSTP
STPDs use 802.1D BPDU encapsulation mode by default. To ensure correct operation of your MSTP
STPDs, do not configure EMISTP or PVST+ encapsulation mode for MSTP STPDs.
You must first configure a Common and Internal Spanning Tree (CIST) before configuring any multiple
spanning tree instances (MSTIs) in the region. You cannot delete or disable a CIST if any of the MSTIs are
active in the system.
STP operational mode can be changed while VLANs are associated with an STP domain. In MSTP mode,
mode change is allowed only for CIST domains.
Example
The following command configures STPD s1 to enable the rapid reconfiguration mechanism and operate
in 802.1w mode:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures suppressing IGMP- and MLD-triggered queries when STP topology changes are received.
Syntax Description
multicast Specifies multicast options.
send-query For VLANs associated with STPD, when topology changes occur, send
or suppress IGMP or MLD queries.
on Send IGMP or MLD queries (default).
off Do not send IGMP or MLD queries.
Default
Sending IGMP or MLD queries is on.
Usage Guidelines
Whenever STP topology changes are received on a port, the switch sends triggered queries that mark
the peer port as a router port and floods all multicast packets towards this port. This can cause
unnecessary bandwidth usage. This command allows you to allow or suppress this forwarding.
Example
The following example turns off IGMP and MLD queries:
# configure stpd multicast send-query off
History
This command was first available in ExtremeXOS 21.1.5-Patch1-2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows a port to be selected as an alternate or backup port.
Syntax Description
stpd_name Specifies an STPD name on the switch.
port Specifies a port.
Default
The default is disabled.
Usage Guidelines
Use this command to revert to the default that allows a specified port to be elected to any STP port role.
Example
The following command disables an active role on STDP s1, port 6:3:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Prevents a port from becoming an alternate or backup port.
Syntax Description
stpd_name Specifies an STPD name on the switch.
port Specifies a port.
Default
The default is disabled.
Usage Guidelines
Use this command to keep a port in an active role. It prevents a specified port from being elected to an
alternate or backup role which puts the port in a blocking state.
The following describes the port role and state when RSTP stabilizes.
This feature can be enabled on only one STP port in the STP domain.
An active port role (root or designated) cannot be enabled with an edge port.
To disable this command, use the configure stpd ports active-role disable command.
To view the status of the active role, use the show stpd ports command.
Example
The following command enables an active role on STDP s1, port 6:3:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables and disables auto-edge detection.
Syntax Description
stpd_name Specifies an STPD name on the switch.
on Enables auto-edge detection on the specified port.
off Disables auto-edge detection on the specified port.
port_list Specifies one or more ports or slots and ports.
Default
By default, auto-edge detection is on.
Usage Guidelines
None.
Example
The following example enables auto-edge detection on port 1:10 in STP domain r1:
configure stpd r1 ports auto-edge on 1:10
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures BPDU Restrict.
Syntax Description
stpd_name Specifies an STPD name on the switch.
port_list Specifies one or more ports or slots and ports.
bpdu-restrict Disables port as soon as a BPDU is received.
recovery-timeout Time after which the port will be re-enabled.
seconds Specifies the time in seconds. The range is 60 to 600. The default is
300.
Default
The default is disabled.
Usage Guidelines
Before using this command, the port(s) should be configured for edge-safeguard.
Example
The following command enables bpdu-restrict on port 2 of STPD s1:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the path cost of the port in the specified STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
auto Specifies the switch to remove any user-defined port cost value(s)
and use the appropriate default port cost value(s).
cost Specifies a numerical port cost value. The range is 1 through
200,000,000.
port_list Specifies one or more ports or slots and ports.
Default
The switch automatically assigns a default path cost based on the speed of the port, as follows:
• 10 Mbps port—the default cost is 2,000,000.
• 100 Mbps port—the default cost is 200,000.
• 1000 Mbps port—the default cost is 20,000.
• 10000 Mbps ports—the default cost is 2,000.
The default port cost for trunked ports is dynamically calculated based on the available bandwidth.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
The 802.1D-2004 standard modified the default port path cost value to allow for higher link speeds. If
you have a network with both 802.1D-2004 and 802.1D-1998 compliant bridges, a higher link speed can
create a situation whereby an 802.1D-1998 compliant bridge could become the most favorable transit
path and possibly cause the traffic to span more bridges. To prevent this situation, configure the port
path cost to make links with the same speed use the same path host value. For example, if you have 100
Mbps links on all bridges, configure the port path cost for the 802.1D-2004 compliant bridges to 19
instead of using the default 200,000.
Note
You cannot configure the port path cost on 802.1D-1998 compliant bridges to 200,000
because the path cost range setting is 1 to 65,535.
The range for the cost parameter is 1 through 200,000,000. If you configure the port cost, a setting of 1
indicates the highest priority.
If you configured a port cost value and specify the auto option, the switch removes the user-defined
port cost value and returns to the default, automatically assigned, port cost value.
The auto port cost of a trunk port is calculated based on number member ports in the trunk port. Link
up and down of the member port does not affect the trunk port cost, thus it does not trigger topology
change. Only adding or removing a member port to/from the trunk port causes auto trunk port cost to
change. Also, by so configuring a static trunk port cost, the value is frozen regardless of the number of
member ports in the trunk port.
The switch automatically assigns a default path cost based on the speed of the port, as follows:
• 10 Mbps port—the default cost is 100.
• 100 Mbps port—the default cost is 19.
• 1000 Mbps port—the default cost is 4.
• 10000 Mbps ports—the default cost is 2.
Example
The following command configures a cost of 100 to slot 2, ports 1 through 5 in STPD s0:
History
This command was first available in ExtremeXOS 10.1.
The default costs were updated based on support for the 802.1D-2004 standard in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the edge safeguard loop prevention on the specified RSTP or MSTP edge port.
Syntax Description
stpd_name Specifies an STPD name on the switch.
port_list Specifies one or more edge ports.
bpdu-restrict Disables port as soon as a BPDU is received.
recovery-timeout Time after which the port will be re-enabled.
seconds Specifies the time in seconds. The range is 60 to 600. The default is
300.
Default
By default, this feature is disabled.
Usage Guidelines
This command applies only to ports that have already been configured as edge ports.
Loop prevention and detection on an edge port configured for RSTP or MSTP is called edge safeguard.
An edge port configured with edge safeguard immediately enters the forwarding state and transmits
BPDUs.
If you disable this feature, the edge port enters the forwarding state but no longer transmits BPDUs
unless a BPDU is received by that edge port. This is the default behavior.
Recovery time starts as soon as the port becomes disabled. If no recovery-timeout is specified, the port
is permanently disabled.
BPDU restrict can be disabled using the configure stpd stpd_name ports bpdu-restrict
disableport_list command.
To view the status of the edge safeguard feature use the show {stpd} stpd_name ports
{[detail |port_list {detail}]} command. You can also use the show stpd {stpd_name
| detail} command to display the STPD configuration on the switch, including the enable/disable
state for edge safeguard.
Note
In MSTP, configuring edge safeguard at CIST will be inherited in all MSTI.
Example
The following command disables edge safeguard on RSTP edge port 4 in STPD s1 on a stand-alone
switch:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the edge safeguard loop prevention on the specified RSTP or MSTP edge port.
Syntax Description
stpd_name Specifies an STPD name on the switch.
port_list Specifies one or more edge ports.
bpdu-restrict Disables port as soon as a BPDU is received.
recovery-timeout Time after which the port will be re-enabled.
seconds Specifies the time in seconds. The range is 60 to 600. The default is
300.
Default
By default, this feature is disabled.
Usage Guidelines
This command applies only to ports that have already been configured as edge ports.
Loop prevention and detection on an edge port configured for RSTP or MSTP is called edge safeguard.
You configure edge safeguard on RSTP or MSTP edge ports to prevent accidental or deliberate
misconfigurations (loops) resulting from connecting two edge ports together or by connecting a hub or
other non-STP switch to an edge port. Edge safeguard also limits the impact of broadcast storms that
might occur on edge ports.
An edge port configured with edge safeguard immediately enters the forwarding state and transmits
BPDUs. This advanced loop prevention mechanism improves network resiliency but does not interfere
with the rapid convergence of edge ports.
Recovery time starts as soon as the port becomes disabled. If no recovery-timeout is specified, the port
is permanently disabled.
BPDU restrict can be disabled using the configure {stpd} stpd_name ports bpdu-
restrict [enable | disable]port_list {recovery-timeout {seconds}} command
and selecting disable.
To view the status of the edge safeguard feature use the show {stpd} stpd_name ports
{[detail |port_list {detail}]} command. You can also use the show stpd {stpd_name
| detail} command to display the STPD configuration on the switch, including the enable/disable
state for edge safeguard.
Note
In MSTP, configuring edge safeguard at CIST will be inherited in all MSTI.
Example
The following command enables edge safeguard on RSTP edge port 4 in STPD s1 on a stand-alone
switch:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the ports in the specified STPD as auto, broadcast, edge, or point-to-point link types.
Syntax Description
stpd_name Specifies an STPD name on the switch.
auto Specifies the switch to automatically determine the port link type. An
auto link behaves like a point-to-point link if the link is in full-duplex
mode or if link aggregation is enabled on the port. Used for 802.1w
configurations.
broadcast Specifies a port attached to a LAN segment with more than two
bridges. Used for 802.1D configurations. A port with broadcast link
type cannot participate in rapid reconfiguration using RSTP or MSTP.
By default, all STP.1D ports are broadcast links.
point-to-point Specifies a port attached to a LAN segment with only two bridges. A
port with point-to-point link type can participate in rapid
reconfiguration. Used for 802.1w and MSTP configurations. By default,
all 802.1w and MSTP ports are point-to-point link types.
port_list Specifies one or more ports or slots and ports.
edge Specifies a port that does not have a bridge attached. An edge port is
placed and held in the STP forwarding state unless a BPDU is received
by the port. Used for 802.1w and MSTP configurations.
edge-safeguard Specifies that the edge port be configured with edge safeguard, a
loop prevention and detection mechanism. Used for 802.1w and MSTP
configurations.
enable Specifies that edge safeguard be enabled on the edge port(s).
disable Specifies that edge safeguard be disabled on the edge port(s).
bpdu-restrict Disables port as soon as a BPDU is received.
recovery-timeout Time after which the port will be re-enabled.
seconds Specifies the time in seconds. The range is 60 to 600. The default is
300.
Default
STP.1D ports are broadcast link types 802.1w and MSTP ports are auto link types.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
The default, broadcast links, supports legacy STP (802.1D) configurations. If the switch operates in
802.1D mode, any configured port link type will behave the same as the broadcast link type.
RSTP rapidly moves the designated ports of a point-to-point link type into the forwarding state. This
behavior is supported by RSTP and MSTP only.
In an MSTP environment, configure the same link types for the CIST and all MSTIs.
If you configure a port to be an edge port, the port immediately enters the forwarding state. Edge ports
remain in the forwarding state unless the port receives a BPDU. In that case, edge ports enter the
blocking state. The edge port remains in the blocking state until it stops receiving BPDUs and the
message age timer expires.
Edge Safeguard
Loop prevention and detection on an edge port configured for RSTP or MSTP is called edge safeguard.
You configure edge safeguard on RSTP or MSTP edge ports to prevent accidental or deliberate
misconfigurations (loops) resulting from connecting two edge ports together or by connecting a hub or
other non-STP switch to an edge port. Edge safeguard also limits the impact of broadcast storms that
might occur on edge ports.
An edge port configured with edge safeguard immediately enters the forwarding state and transmits
BPDUs. This advanced loop prevention mechanism improves network resiliency but does not interfere
with the rapid convergence of edge ports.
Recovery time starts as soon as the port becomes disabled. If no recovery-timeout is specified, the port
is permanently disabled.
BPDU restrict can be disabled using the configure stpd stpd_name ports bpdu-restrict
disableport_list command.
To configure a port as an edge port and enable edge safeguard on that port, use the configure
stpd stpd_name ports link-type edgeport_list edge-safeguard command and
specify enable.
To disable edge safeguard on the edge port, use the configure stpd stpd_name ports link-
type edgeport_list edge-safeguard command and specify disable.
Two other commands are also available to enable and disable edge safeguard:
configure stpd ports edge-safeguard enable
configure stpd ports edge-safeguard disable
Example
The following command configures slot 2, ports 1 through 4 to be point-to-point links in STPD s1:
The following command enables edge safeguard on the RSTP edge port on slot 2, port 3 in STPD s1
configured for RSTP:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables and disables loop protect on a port.
Syntax Description
stpd_name Specifies an STPD name on the switch.
on Enables loop protect on the specified port.
Default
By default, loop protect is off.
Usage Guidelines
Loop protect prevents loops due to misconfiguration or one-way communication failures.
Example
The following example enables loop protect on port 1:10 in the STP domain r1:
configure stpd r1 ports loop-protect on 1:10
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures whether the link partner is capable of the loop protect feature.
Syntax Description
stpd_name Specifies an STPD name on the switch.
capable The link partner supports the loop protect feature.
incapable The link partner does not support the loop protect feature.
port_list Specifies one or more ports or slots and ports.
Default
By default, this command is set to incapable.
Usage Guidelines
Ports work in two loop protect operational modes:
• If the port is set to capable, the port works in full mode.
• If the port is set to incapable, the port works limited mode.
In full mode, when RSTP/MSTP BPDUs are received on a point-to-point link and the port is designated, a
loop protect timer is set to three times the hello time. When this timer expires, the port is moved to the
blocking state. Limited mode adds the requirement that the flags field in the BPDU indicates a root
role.
Example
The following example configures loop protect partner capability to "capable" for port 1:10 in the STP
domain r1:
configure stpd r1 ports loop-protect partner capable 1:10
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the encapsulation mode for the specified port list.
Syntax Description
stpd_name Specifies an STPD name on the switch.
dot1d Specifies the STP encapsulation mode of operation to be 802.1d.
emistp Specifies the STP encapsulation mode of operation to be EMISTP.
pvst-plus Specifies the STP encapsulation mode of operation to be PVST+.
port_list Specifies one or more ports or slots and ports.
Default
Ports in the default STPD (s0) and user-created STPDs are dot1d mode.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
MSTP STPDs use 802.1D BPDU encapsulation mode by default. To ensure correct operation of your
MSTP STPDs, do not configure EMISTP or PVST+ encapsulation mode for MSTP STPDs.
This encapsulation mode supports the following STPD modes of operation: 802.1D, 802.1w, and
MSTP.
• emistp—This mode sends BPDUs with an 802.1Q tag having an STPD ID in the VLAN ID field.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
• pvst-plus—This mode implements PVST+ in compatibility with third-party switches running this
version of STP. The STPDs running in this mode have a one-to-one relationship with VLANs, and
send and process packets in PVST+ format.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
Example
The following command configures STPD s1 with PVST+ packet formatting for slot 2, port 1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the port priority of the port in the specified STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
priority Specifies a numerical port priority value. The range is 0 through 240
and is subject to the multiple of 16 restriction.
port_list Specifies one or more ports or slots and ports.
Default
The default is 128.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
By changing the priority of the port, you can make it more or less likely to become the root port or a
designated port.
To preserve backward compatibility and to use ExtremeXOS 11.5 or earlier configurations, the existing
configure stpd ports priority command is available in ExtremeXOS 11.6. If you have an
ExtremeXOS 11.5 or earlier configuration, the switch interprets the port priority based on the
802.1D-1998 standard. If the switch reads a value that is not supported in ExtremeXOS 11.6, the switch
rejects the entry. For example, if the switch reads the configure stpd ports priority 16 command from an
ExtremeXOS 11.5 or earlier configuration, (which is equivalent to the command configure stpd ports
priority 8 entered through CLI), the switch saves the value in the new ExtremeXOS 11.6 configuration as
configure stpd ports port-priority 128.
The range for the priority parameter is 0 through 240 and is subject to the multiple of 16 restriction.
Example
The following command assigns a priority of 32 to slot 2, ports 1 through 5 in STPD s0:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the port priority of the port in the specified STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
priority Specifies a numerical port priority value. The range is 0 through 31 for
STP and 0 through 15 for MSTP and RSTP.
port_list Specifies one or more ports or slots and ports.
Default
The default is 128.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
By changing the priority of the port, you can make it more or less likely to become the root port or a
designated port.
To preserve backward compatibility and to use ExtremeXOS 11.5 or earlier configurations, the existing
configure stpd ports priority command is available in ExtremeXOS 11.6. If you have an
ExtremeXOS 11.5 or earlier configuration, the switch interprets the port priority based on the
802.1D-1998 standard. If the switch reads a value that is not supported in ExtremeXOS 11.6, the switch
rejects the entry.
The range for the priority parameter is 0 through 31 for STP and 0 through 15 for MSTP and RSTP.
ExtremeXOS 11.6 introduces support for a new ports priority command: configure stpd ports
port-priority. When you save the port priority value in an ExtremeXOS 11.6 configuration, the
switch saves it as the new command configure stpd ports port-priority with the
corresponding change in priority values. The priority range of this command is 0 through 240 and is
subject to the multiple of 16 restriction. For more information see configure stpd ports port-
priority.
Example
The following command assigns a priority of 1 to slot 2, ports 1 through 5 in STPD s0:
History
This command was first available in ExtremeXOS 10.1.
The priority range and behavior was updated based on support for the 802.1D-2004 standard in
ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Turns on/off reflection Bridge Protocol Data Unit (BPDU) behavior.
Syntax Description
stpd Spanning Tree Protocol (STP) domain.
stpd_name Specifies the STP domain name
ports Ports in this STP domain to configure.
reflection-bpdu Copy contents (bridge ID, root ID, etc.) of received RSTP/MSTP
proposal BPDU in transmitted agreement BPDU. Default is on.
Default
Reflection BPDU behavior is on by default.
Usage Guidelines
For Rapid Spanning Tree Protocol (RSTP) proposal handshake to work with CISCO switches, the switch
that receives the proposal BPDU reflects back the same BPDU (all the contents) with an agreement flag
set. This ensures that the other port is acknowledging the proposal that the switch has send out, so the
acknowledgment BPDU contains the same contents of the other switch's proposal BPDU with the
agreement bit set, instead of the proposal bit.
However, this behavior when used with EOS upstream bridges receiving the agreement BPDU (whose
MAC OUI is different than 00:01:F4, 00:11:88, 00:1F:45, 20:B3:99) causes the switch to believe it is being
sent its own BPDU, thus causing a multisource event during a topology change. This command allows
you turn off the BPDU reflection behavior to avoid this problem.
Example
To enable reflection BPDU on domain "s1" on port 7:
configure s1 ports reflection-bpdu on 7
History
This command was first available in ExtremeXOS 22.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables restricted role on the specified port inside the core network.
Syntax Description
stpd_name Specifies an STPD name on the switch.
port_list Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
The restricted role is disabled by default. If set, it can cause a lack of spanning tree connectivity. A
network administrator enables the restricted role to prevent bridges external to a core region of the
network from influencing the spanning tree active topology, possibly because those bridges are not
under the full control of the administrator.
Note
Disabling Restricted Role at CIST is inherited by all MSTI.
Example
The following command disables restricted role for s1 on port 6:3:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables restricted role on the specified port inside the core network.
Syntax Description
stpd_name Specifies an STPD name on the switch.
port_list Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
Enabling restricted role causes the port not to be selected as a root port even if it has the best spanning
tree priority vector. Such a port is selected as an alternate port after the root port has been selected.
The restricted role is disabled by default. If set, it can cause a lack of spanning tree connectivity. A
network administrator enables the restricted role to prevent bridges external to a core region of the
network from influencing the spanning tree active topology, possibly because those bridges are not
under the full control of the administrator.
Note
Restricted role should not be enabled with edge mode.
Enabling Restricted Role at CIST is inherited by all MSTI.
Example
The following command enables restricted role on port 6:3:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Restricts the propagation of Topology Change Notification (TCN) BPDUs on the specified port.
Syntax Description
stpd_name Specifies an STPD name on the switch.
on Does not propagate received TCN BPDUs and topology changes to
other ports.
off Allows the propagation of received TCN BPDUs and topology changes
to other ports.
port_list Specifies one or more ports or slots and ports.
Default
The default value is off.
Usage Guidelines
Set restricted-tcn to on to prevent unnecessary address flushing caused by persistent TCNs.
Restricting TCNs is a useful when it is not possible to remove the source of the TCNs.
Example
The following example disables the propagation of TCNs in port 1:10 for STP domain r1:
configure stpd r1 ports restricted-tcn on 1:10
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the bridge priority of the STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
priority Specifies the bridge priority of the STPD. The range is 0 through
61,440.
• If the bridge priority mode is configured as dot1d and the protocol
mode is configured as dot1w, then value can be configured in
increments of 1.
• If the bridge priority mode is configured as dot1t and the protocol
mode is configured as dot1w, then priority value can be configured
in increments of 4,096.
Default
The default priority is 32,768.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
The range for the priority parameter is 0 through 61,440. If the bridge priority mode is configured as
dot1d and the protocol mode is configured as dot1w, then value can be configured in increments of 1. If
the bridge priority mode is configured as dot1t and the protocol mode is configured as dot1w, then
priority value can be configured in increments of 4,096. A setting of 0 indicates the highest priority.
If you have an ExtremeXOS 11.5 or earlier configuration that contains an STP or RSTP bridge priority that
is not a multiple of 4,096, the switch rejects the entry and the bridge priority returns to the default
value. The MSTP implementation already uses multiples of 4,096 to determine the bridge priority.
For example, to lower the numerical value of the priority (which gives the priority a higher precedence),
you subtract 4,096 from the default priority: 32,768 - 4,096 = 28,672. If you modify the priority by a
value other than 4,096, the switch rejects the entry.
The range for the priority parameter is 0 through 65,535. A setting of 0 indicates the highest priority.
Example
The following command sets the bridge priority of STPD1 to 16,384:
History
This command was first available in ExtremeXOS 10.1.
The priority range and behavior was updated based on support for the 802.1D-2004 standard in
ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets STP bridge priority values.
Syntax Description
stpd STP domain/STP global configuration.
stpd_name STP domain name on the switch.
priority-mode Control allowable bridge priority values.
dot1d Allow any bridge priority value.
Valid values are 0–65,535 (in increments of 1), with 0 indicating high
priority and 65,535 low priority.
dot1t Allow bridge priority in steps of 4,096.
This option is the default bridge priority mode. Valid values are 0–
61,440 (in increments of 4,096), with 0 indicating high priority and
61,440 low priority. Values are automatically rounded up or down
depending on the dot1t value to which the entered value is closest.
Default
dot1t option is configured by default for operation mode dot1w and MSTP.
Example
The following example configures the priority-mode as dot1d:
configure stpd s1 priority-mode dot1d
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Assigns an StpdID to an STPD.
Syntax Description
stpd_name Specifies an STPD name on the switch.
stpd_tag Specifies the VLAN ID of the carrier VLAN that is owned by the STPD.
Default
N/A.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If your STPD has a name unique only to that STPD,
the keyword stpd is optional.
You should not configure any STP parameters unless you have considerable knowledge and experience
with STP. The default STP parameters are adequate for most networks.
An STPD ID is used to identify each STP domain. You assign the StpdID when configuring the domain.
An STPD ID must be identical to the VLAN ID of the carrier VLAN in that STP domain, and that VLAN
cannot belong to another STPD. Unless all ports are running in 802.1D mode, an STPD with ports
running in either EMISTP mode or PVST+ mode must be configured with an STPD ID.
You must create and configure the VLAN, along with the tag, before you can configure the STPD tag. To
create a VLAN, use the create vlan command. To configure the VLAN, use the configure vlan
commands.
MSTP Only
MSTP uses two different methods to identify the STPDs that are part of the MSTP network. An instance
ID of 0 identifies the CIST. The switch assigns this ID automatically when you configure the CIST STPD.
To configure the CIST STPD, use the configure stpd stpd_name mode [dot1d | dot1w |
mstp [cist | mstiinstance]] command.
An MSTI identifier (MSTI ID) identifies each STP domain that is part of an MSTP region. You assign the
MSTI ID when configuring the STPD that participates in the MSTP region. Each STPD that participates in
a particular MSTP region must have the same MSTI ID. To configure the MSTI ID, use the configure
stpd stpd_name mode [dot1d | dot1w | mstp [cist | mstiinstance]] command.
Example
The following example assigns an StpdID to the purple_st STPD:
configure stpd purple_st tag 200
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables and disables the new-root trap.
Syntax Description
stpd_name Specifies an STPD name on the switch.
on Enables the new-root trap.
off Disables the new-root trap.
Default
By default, the trap is enabled (on).
Usage Guidelines
The new-root trap is sent when the new root bridge is elected.
Example
The following example disables the new-root trap for the STP domain r1.
configure stpd r1 trap new-root off
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables and disables the topology change trap for all ports or edge ports only.
Syntax Description
stpd_name Specifies an STPD name on the switch.
edge-ports Specifies that topology change traps will be sent only for edge ports.
on Enables the topology change trap.
off Disables the topology change trap.
Default
By default, the topology change trap is disabled (off) for all ports.
Usage Guidelines
You cannot enable the topology change trap for edge ports if you have disabled the topology change
trap for all ports.
Example
The following example disables the topology change trap for edge ports only in the STP domain r1.
configure stpd r1 trap topology-change edge-ports off
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the maximum BPDUs transmitted per second.
Syntax Description
stpd_name Specifies an STPD name on the switch.
tx_hold_count Specifies the maximum number of BPDUs transmitted per second.
The valid range is 1–10.
Default
By default, the maximum number of BPDUs transmitted per second is 6.
Usage Guidelines
The transmit hold count is used by the port transmit state machine to limit BPDU transmission rate.
Example
The following example configures the transmit hold count for STP domain r1 to five BPDUs per second:
configure stpd r1 tx-hold-count 5
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the boot menu timeout duration.
Syntax Description
boot-menu Specifies changing the boot menu configuration.
delay Specifies setting the delay before the switch automatically boots the
ExtremeXOS image.
default Sets the boot delay to the default of 5 seconds.
seconds Sets the delay in seconds before booting. Range is 1 to 600 seconds.
Default is 5 seconds.
Default
The default is 5 seconds.
Usage Guidelines
To view the current setting for the boot menu delay, use the command show switch boot-menu.
Example
The following example sets the boot delay to 10 seconds:
configure switch boot-menu delay 10
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is only available on the ExtremeSwitching X465, X590, X690, X870.
Description
Configures how the ExtremeXOS software handles faults for the switch.
Syntax Description
normal Upon a fault detection, the switch only sends a message to the syslog.
This is the default setting.
strict Upon a fault detection, the switch takes the action configured by the
configure sys-recovery-level slot or the command.
Default
The default setting is normal.
Usage Guidelines
Use this command in conjunction with the configure sys-recovery-level switch [none |
reset | shutdown] command to implement your network’s fault handling strategy.
ExtremeXOS 11.5 enhances the number of switch-fabric tests completed and monitored by the polling
module of the system health checker. Additionally with ExtremeXOS 11.5, you can now configure how
ExtremeXOS handles a detected fault based on the configuration of the configure sys-
recovery-level slot [all | slot_number] [none | reset | shutdown] or the
configure sys-recovery-level switch [none | reset | shutdown] command.
If you configure the strict parameter, the switch takes the action configured by the configure sys-
recovery-level slot or the configure sys-recovery-level switch command, which
can include logging only or restarting, rebooting, or shutting down the suspect device.
To maintain a smooth upgrade for devices running ExtremeXOS 11.4 and earlier, the switch-fabric tests
introduced in ExtremeXOS 11.5 are set to only log error messages (‘normal mode’) by default. However,
we recommend that you configure ‘strict mode’ so the system can attempt to recover by utilizing the
action configured in the configure sys-recovery-level slot or the configure sys-
recovery-level switch command (which by default is reset).
Depending on your switch configuration, the following table shows how ExtremeSwitching series
switches behave when the ExtremeXOS software detects a fault:
show switch
The system health check setting, displayed as SysHealth check, shows the polling setting and how
ExtremeXOS handles faults. The polling setting appears as Enabled, and the fault handling setting
appears in parenthesis next to the polling setting. In the following truncated output, the system health
check setting appears as SysHealth check: Enabled (Normal):
If you use the strict parameter, which configures the switch to take the action configured by the
configure sys-recovery-level slot or the configure sys-recovery-level switch
command, (Strict) would appear next to Enabled.
Example
The following command configures the switch to forward faults to be handled by the level set by the
configure sys-recovery-level switch command:
# configure sys-health-check all level strict
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the remote Syslog server host address, and filters messages to be sent to the remote Syslog
target.
Syntax Description
ipaddress Specifies the remote Syslog server IP address.
ipPort Specifies the UDP port number for the Syslog target.
tls_port Specifies remote Syslog server Transport Layer Security (TLS) for
connection type.
tls_port TLS port number (default is 6514).
vr_name Specifies the virtual router that can reach the server IP address.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
If a virtual router is not specified, VR-Mgmt is used. If UDP port is not specified, 514 is used. If TLS port is
not specified, 6514 is used.
Usage Guidelines
Options for configuring the remote Syslog server include:
• ipaddress—The IP address of the remote Syslog server host
• ipPort—The UDP port
• vr_name—The virtual router that can reach the Syslog host
• local0-local7—The Syslog facility level for local use
The switch log overwrites existing log messages in a wrap-around memory buffer, which may cause you
to lose valuable information once the buffer becomes full. The remote Syslog server does not overwrite
log information, and can store messages in non-volatile files (disks, for example).
The enable syslog command must be issued in order for messages to be sent to the remote Syslog
server(s). Syslog is disabled by default. A total of four Syslog servers can be configured at one time.
When a Syslog server is added, it is associated with the filter DefaultFilter. Use the configure log
target filter command to associate a different filter.
The Syslog facility level is defined as local0 – local7. The facility level is used to group Syslog data.
Example
The following example adds the remote Syslog server with an IP address of 10.0.0.1:
configure syslog add 10.0.0.1 local1
The following example adds the remote Syslog server with an IP address of 2001:11::123:
configure syslog add 2001:11::123 local1
History
This command was first available in ExtremeXOS 10.1.
The udp-port parameter and support for the EMS (Event Management System) to send log messages
to Syslog servers having IPv6 address was added in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Turns on/off ciphers for Syslog Transport Layer Security (TLS) sessions.
Syntax Description
syslog Specifies configuring the remote Syslog target.
tls Transport Layer Security (TLS) protocol.
cipher Specifies configuring the algorithm to use for encrypting Syslog TLS
sessions.
cipher Specifies the cipher name to enable or disable.
all Specifies all ciphers for enabling.
on Enable selected cipher. Default is that all ciphers are on.
off Disables selected cipher.
Default
By default, all ciphers are enabled.
Usage Guidelines
A minimum of one cipher must be enabled.
To view which ciphers are enabled and disabled, use the command show log configuration on page
2751.
Example
The following example enables all ciphers for Syslog TLS sessions:
configure syslog tls cipher all on
The following example disables the aes128-sha cipher for Syslog TLS sessions:
configure syslog tls cipher aes128-sha off
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the maximum time that transmitted data may remain unacknowledged before TCP closes the
connection to avoid loss of logging to TLS Syslog server.
Syntax Description
tls Specifies Transport Layer Security protocol.
tcp-user-timeout Specifies the maximum time that transmitted data may remain
unacknowledged before TCP closes the connection.
seconds Timeout period in seconds. Range = 20–900.
default Specifies not using value from tcp-user-timeout option; use the
system default.
Default
The default is to use Linux default—tcp-user-timeout is not enabled.
Usage Guidelines
For Linux, by default, it takes about 15 minutes for kernel to end a TCP connection when transmitted
data remains unacknowledged. This results in a potential loss of logs to TLS Syslog server during the 15
minutes window due to link down. This command allows you to reduce this window.
Example
The following example sets the TCP user timeout value to 30 seconds:
configure syslog tls tcp-user-timeout 30
The following example turns off using the TCP user timeout value and accepts system default:
configure syslog tls tcp-user-timeout default
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a remote Syslog server address.
Syntax Description
ipaddress Specifies the remote Syslog server IP address.
ipPort Specifies the UDP port number for the Syslog target.
tls_port Specifies remote Syslog server Transport Layer Security (TLS) for
connection type.
tls_port TLS port number.
vr_name Specifies the virtual router that can reach the server IP address.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
If a virtual router is not specified, VR-Mgmt is used.
Usage Guidelines
This command is used to delete a remote Syslog server target.
Example
The following example deletes the remote Syslog server with an IP address of 10.0.0.1:
configure syslog delete 10.0.0.1 local1
The following example deletes the remote Syslog server with an IP address of 2001:11::123 :
configure syslog delete 2001:11::123 local1
History
This command was first available in ExtremeXOS 10.1.
The udp-port parameter and support for the EMS to send log messages to Syslog servers having IPv6
address was added in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Specifies the remote Syslog server certificate reference identifier.
Syntax Description
all All specified targets.
ipaddress Specifies the remote Syslog server IPv4 or IPv6 address.
tls-port Specifies using a remote Syslog server Transport Layer Security (TLS)
port.
tls_port Specifies the remote Syslog server Transport Layer Security (TLS)
port (default is 6514).
vr Specifies a virtual router.
vr_name Specifies the virtual router ID.
local Specifies the remote Syslog server facility: "local0" "local1" "local2"
"local3" "local4" "local5" "local6" "local7".
reference-identifier Remote Syslog server certificate reference identifier.
reference_identifier Identifier value (for example, the host name). If none is specified, the
existing reference identifier configuration is removed.
Default
If a TLS port is not specified, the default is 6514.
Example
The following example specifies the reference identifier as "hostname" for all specified targets on VR
"vr1":
# configure syslog all vr vr1 reference-identifier hostname
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a standalone switch to be addressed with a slot number.
Syntax Description
system Configures system settings.
ports Configures system ports settings.
notation Configures system port notation settings.
slot:port Designates slot:port notation. For example, 1:47. (Default on stacks
and Extended Edge Switching)
port Port-only notation. For example, 47. (Default on standalone switches).
Default
By default, on standalone switches, port notation is used.
Usage Guidelines
You can configure a standalone system as a slotted system with this command, which allows for
commands which had ‘slot’ arguments to be visible and take in a valid slot number of ‘1’, along with any
port arguments specified in ‘slot’:’port’ notation. In turn, any command output would specify ‘slot’
information and ports displayed in ‘slot’:’port’ notation.
To view the port notation status, use the show management command.
Example
The following example changes a standalone switch to have slot:port notation:
# configure system ports notation slot:port
This command will take effect after the next reboot.
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a recovery option for instances where a hardware exception occurs on ExtremeSwitching
series switches.
Syntax Description
none Configures the switch to maintain its current state regardless of the
detected fault. The switch does not reboot or shutdown. ExtremeXOS
logs fault and error messages to the syslog.
reset Configures the switch to reboot upon detecting a hardware fault.
ExtremeXOS logs fault, error, system reset, and system reboot
messages to the syslog.
shutdown Configures the switch to shut down upon detecting a hardware fault.
All ports are taken offline in response to the reported errors; however,
the management port remains operational for debugging purposes
only. If the switch shuts down, it remains in this state across additional
reboots or power cycles until you explicitly clear the shutdown state.
Default
The default setting is reset.
Usage Guidelines
Use this command for system auto-recovery upon detection of hardware problems. You can configure
ExtremeSwitching series switches to take no action, automatically reboot, or shutdown if the switch
detects a hardware fault. This enhanced level of recovery detects faults in the CPU.
You must specify one of the following parameters for the switch to respond to hardware failures:
• none—Configures the switch to maintain its current state regardless of the detected fault. The
switch does not reboot or shutdown.
• reset—Configures the switch to reboot upon detecting a hardware fault.
• shutdown—Configures the switch to shutdown upon fault detection. All ports are taken offline in
response to the reported errors; however, the management port remains operational for debugging
purposes only.
Messages Displayed
If you configure the hardware recovery setting to either none (ignore) or shutdown, the switch prompts
you to confirm this action by displaying a message similar to the following:
Are you sure you want to shutdown on errors? (y/n)
Enter y to confirm this action and configure the hardware recovery level. Enter n or press [Enter] to
cancel this action.
If you change the hardware recovery setting from the default (reset) to either none (ignore) or
shutdown, the Recovery Mode output is expanded to include a description of the hardware recovery
mode. If you keep the default behavior or return to reset, the Recovery Mode output lists only the
software recovery setting.
The following truncated output from a ExtremeSwitching series switch displays the software recovery
and hardware recovery settings (displayed as Recovery Mode):
If you configure the hardware recovery setting to none, the output displays “Ignore” to indicate that no
corrective actions will occur on the switch. “Ignore” appears only if you configure the hardware recovery
setting to none.
If you configure the hardware recovery setting to shutdown, the output displays “Shutdown” to indicate
that the switch will shutdown if fault detection occurs. “Shutdown” appears only if you configure the
hardware recovery setting to shutdown.
If you configure the hardware recovery setting to reset, the output displays only the software recovery
mode.
Example
The following command configures the switch to not take an action if a hardware fault occurs:
# configure sys-recovery-level switch none
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure sys-recovery-level
configure sys-recovery-level [all | none]
Description
Configures a recovery option for instances where a software exception occurs in ExtremeXOS.
Syntax Description
all Configures ExtremeXOS to log an error into the syslog and reboot the
system after any software task exception occurs.
none Configures the recovery level to none. No action is taken when a
software task exception occurs; there is no system reboot, which can
cause unexpected switch behavior.
Default
The default setting is all.
Usage Guidelines
If the software fails, the switch automatically reboots or leaves the system in its current state. You must
specify one of the following parameters for the system to respond to software failures:
• all—The system will send error messages to the Syslog and reboot if any software task exception
occurs.
• none—No action is taken when a software task exception occurs. The system does not reboot, which
can cause unexpected switch behavior.
Note
Use the none parameter only under the guidance of Extreme Networks Technical Support
personnel.
The default setting and behavior is all. Extreme Networks strongly recommends using the default
setting.
This command displays general switch information, including the software recovery level. The following
truncated output from an ExtremeSwitching switch displays the software recovery setting (displayed as
Recovery Mode):
Note
All platforms display the software recovery setting as Recovery Mode.
Example
The following command configures a switch to not take an action when any software task exception
occurs:
# configure sys-recovery-level none
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sets the requirement that the privilege level attribute (priv-lvl) must be specified for TACACS priv-levl
authentication to occur.
Syntax Description
priv-levl Specifies setting the requirement that the privilege level attribute for
authentication to occur.
required Fails login attempt if priv-lvl attribute is not provided.
optional Allows login to occur with read-only privilege if priv-lvl is not
provided. (default).
Default
By default, the priv-lvl is not required.
Usage Guidelines
Using this command to set the privilege level attribute as required does not change any behavior
associated with values received in the priv-lvl attribute, only the presence/absence of the attribute.
Example
The following example makes the priv-lvl attribute required for TACACS authentication:
# configure tacacs priv-lvl required
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the server information for a TACACS+ authentication server.
Syntax Description
primary Configures the primary TACACS+ server.
secondary Configures the secondary TACACS+ server.
ipaddress The IP address of the TACACS+ server being configured.
hostname The host name of the TACACS+ server being configured.
tcp_port The TCP port to use to contact the TACACS+ server.
ipaddress The IP address used by the switch to identify itself when
communicating with the TACACS+ server.
vr_name Specifies the virtual router on which the client IP is located.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
TACACS+ uses TCP port 49. The default virtual router is VR-Mgmt, the management virtual router.
Usage Guidelines
Use this command to configure the server information for a TACACS+ server.
Example
The following command configures server tacacs1 as the primary TACACS+ server for client switch
10.10.20.35 using a virtual router interface of VR-Default:
configure tacacs primary server tacacs1 client-ip 10.10.20.35 vr vr-Default
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the shared secret string used to communicate with the TACACS+ authentication server.
Syntax Description
primary Configures the authentication string for the primary TACACS+ server.
secondary Configures the authentication string for the secondary TACACS+
server.
encrypted Indicates that the string is already encrypted.
string The string to be used for authentication.
Default
N/A.
Usage Guidelines
The secret must be the same between the client switch and the TACACS+ server.
The encrypted keyword is primarily for the output of the show configuration command, so the shared
secret is not revealed in the command output. Do not use it to set the shared secret.
Example
The following command configures the shared secret as “purplegreen” on the primary TACACS+ server:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timeout interval for TACAS+ authentication requests.
Syntax Description
seconds Specifies the number of seconds for authentication requests. Range is
3 to 120 seconds.
Default
The default is 3 seconds.
Usage Guidelines
Use this command to configure the timeout interval for TACACS+ authentication requests.
To detect and recover from a TACACS+ server failure when the timeout has expired, the switch makes
one authentication attempt before trying the next designated TACACS+ server or reverting to the local
database for authentication. In the event that the switch still has IP connectivity to the TACACS+ server,
but a TCP session cannot be established, (such as a failed TACACS+ daemon on the server), failover
happens immediately regardless of the configured timeout value.
For example, if the timeout value is set for 3 seconds (the default value), it will take 3 seconds to fail
over from the primary TACACS+ server to the secondary TACACS+ server. If both the primary and the
secondary servers fail or are unavailable, it takes approximately 6 seconds to revert to the local
database for authentication.
Example
The following command configures the timeout interval for TACACS+ authentication to 10 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the TACACS+ accounting server.
Syntax Description
primary Configures the primary TACACS+ accounting server.
secondary Configures the secondary TACACS+ accounting server.
ipaddress The IP address of the TACACS+ accounting server being configured.
hostname The host name of the TACACS+ accounting server being configured.
tcp_port The TCP port to use to contact the TACACS+ server.
ipaddress The IP address used by the switch to identify itself when
communicating with the TACACS+ accounting server.
vr_name Specifies the virtual router on which the client IP is located.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
Unconfigured. The default virtual router is VR-Mgmt, the management virtual router.
Usage Guidelines
You can use the same TACACS+ server for accounting and authentication.
Example
The following command configures server tacacs1 as the primary TACACS+ accounting server for client
switch 10.10.20.35 using a virtual router interface of VR-Default:
configure tacacs-accounting primary server tacacs1 client-ip 10.10.20.35 vr vr-Default
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the shared secret string used to communicate with the TACACS+ accounting server.
Syntax Description
primary Configures the authentication string for the primary TACACS+
accounting server.
secondary Configures the authentication string for the secondary TACACS+
accounting server.
string The string to be used for authentication.
Default
N/A.
Usage Guidelines
Secret needs to be the same as on the TACACS+ server.
The encrypted keyword is primarily for the output of the show configuration command, so the shared
secret is not revealed in the command output. Do not use it to set the shared secret.
Example
The following command configures the shared secret as “tacacsaccount” on the primary TACACS+
accounting server:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timeout interval for TACACS+ accounting authentication requests.
Syntax Description
seconds Specifies the number of seconds for accounting requests. Range is 3
to 120 seconds.
Default
The default is 3 seconds.
Usage Guidelines
This command configures the timeout interval for TACACS+ accounting authentication requests.
To detect and recover from a TACACS+ accounting server failure when the timeout has expired, the
switch makes one authentication attempt before trying the next designated TACACS+ accounting
server or reverting to the local database for authentication. In the event that the switch still has IP
connectivity to the TACACS+ accounting server, but a TCP session cannot be established, (such as a
failed TACACS+ daemon on the accounting server), failover happens immediately regardless of the
configured timeout value.
For example, if the timeout value is set for 3 seconds (the default value), it takes 3 seconds to fail over
from the primary TACACS+ accounting server to the secondary TACACS+ accounting server. If both the
primary and the secondary servers fail or are unavailable, it takes approximately 6 seconds to revert to
the local database for authentication.
Example
The following command configures the timeout interval for TACACS+ accounting authentication to 10
seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command adds collectors that the switch attempts to connect to for the purpose of forwarding
status reports. The collector is identified by its hostname or IP address.
This command also configures the initial value of the TCP port that the collector is listening to, the VR
name and source IP address that the switch uses to attempt to connect to the collector, and the SSL
mode whether the switch needs to turn SSL on or off when it connects to the collector.
Syntax Description
hostname Host name of the collector.
ip_address IPv4 address of the collector.
tcp-port TCP port number that the collector is listening.
port Port number. The range is 1-65535.
vr vr_name Specifies the Virtual router and virtual router name. The default name is VR-
Mgmt.
from Specifies the source and the source IPv4 address. The default source is the IP
source_ip_addr address on VLAN Mgmt.
ess
ssl Specifies the Secure Sockets Layer.
on Specifies that SSL is on.
off Specifies that SSL is off.
Default
Disabled.
Usage Guidelines
This command adds collectors that the switch attempts to connect to for the purpose of forwarding
status reports. The collector is identified by its hostname or IP address. Each added collector needs to
have a unique hostname or IP address. If the specified hostname or IP address has already existed, an
error message ‘ERROR: The collector 1.1.1.1 already exists’ is displayed. Other commands use hostname
or IP address to specify the collector that the command reconfigures, deletes, runs reports for, or shows
configuration and status.
This command also configures the initial value of the TCP port that the collector is listening to, the VR
name and source IP address that the switch uses to connect to the collector, and the SSL mode that
determines if the switch needs to turn SSL on/off when connecting to the collector. The purpose of
having a default collector configured is to minimize the configuration required for a customer to enable
techSupport.
Example
The following command adds a collector at address "1.1.1.1" listening to TCP port "1":
configure tech-support add collector 1.1.1.1 tcp-port 1
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command reconfigures the TCP port, the VR, the Source IP Address, and SSL mode of an existing
collector.
Syntax Description
hostname Host name of the collector.
ip_address IPv4 address of the collector.
tcp-port TCP port number that the collector is listening.
port Port number. The range is 1-65535.
vr vr_name Specifies the Virtual router and virtual router name. The default name is VR-
Mgmt.
from Specifies the source and the source IPv4 address. The default source is the IP
source_ip_addr address on VLAN Mgmt.
ess
ssl Specifies the Secure Sockets Layer.
on Specifies that SSL is on.
off Specifies that SSL is off.
Default
Disabled.
Usage Guidelines
This command reconfigures the TCP port, the VR, the Source IP Address, and SSL mode of an existing
collector. The collector to be reconfigured is specified by its hostname or IP address. If the specified
collector does not exist, an error message ERROR: The collector 1.1.1.1 does not
exists is displayed.
Example
The following command reconfigures the tech support collector:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the amount and type of data that is included in the status report for a
collector.
Syntax Description
all Configures report data set for all existing collectors.
hostname Specifies the host name of the collector.
ip_address Specifies the IPv4 address of the collector.
data-set Specifies the report data set. The default is detail.
detail Specifies the output of show tech-support area for area general, config,
log, VLAN, and EPM.
summary Specifies the output of show tech-support all command.
Default
The default is detail.
Usage Guidelines
This command configures the amount and type of data that is included in the status report for a
collector. When you specify all, it configures a report data set for all existing collectors; otherwise
report data is set for a particular collector specified by the hostname or IP address. When the data
set is set to summary, the status report sent by the switch includes installed ExtremeXOS and Bootrom
image versions, the active partition, serial number, equipment type, installed hardware options, stored
SRAM contents, basic switch configuration, and log messages. The output of the summary option is
collected from the show tech-support area command for the area general, configuration, log,
VLAN, and EPM. Changing the report data set to detail will send the full output of the show tech
command. When a collector is added, the data set is set to detail.
Example
The following command example configures a specific collector to display a detailed output set:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures how often the switch sends status reports for a collector.
Syntax Description
all Configures report mode for all report collectors.
hostname Configures report mode based on the host name of the collector.
ip_address Configures report mode based on the IPv4 address of the collector.
bootup Send status report when the switch boots up. The default value is on.
on Specifies that the status reporting is on at bootup.
off Specifies that the status reporting is off at bootup.
error-detected Specifies that a status report is sent when a critical severity event is logged. The
default value is off.
on Specifies that error-detected reporting is on.
off Specifies that error-detected reporting is off. This is the default value.
daily Specifies that status reports are sent once a day. The default value is off.
on time hour Specifies the time to send the report. Specifies the hour 0-23. The default value
is 0 (12:00AM).
off Specifies that the daily status reports are off. This is the default value.
Default
Disabled.
Usage Guidelines
This command configures the frequency that the switch sends status reports for a collector. By
specifying all, it configures report frequency for all existing collectors; otherwise it configures report
frequency for a particular collector specified by the hostname or IP address. If the bootup option is set
to on, the switch sends a status report when the switch boots up. If the error-detected option is
set to on, the switch sends a status report when a critical severity event is logged. If the daily option
is set to on, the switch sends a status report once a day regardless of the switchs' operational status
during the last 24 hour period.
Optionally, you can specify the hour that the report is sent. The default hour is 0, and the valid range is
0 to 23, where 0 is 12:00 AM local time and 23 is 11:00 PM local time. You can enable or disable each
option (bootup, error-detected or daily) independently. When all three options of a collector
are turned off, the switch does not send any status report to that collector even if the report mode of
the collector is set to automatic. When a collector is added, the bootup option is set to on, and the
error-detected and daily option is set to off.
Example
The following command example configures the report mode on all existing collectors:
configure tech-support collector all report
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the report mode for a collector.
Syntax Description
all Configures report mode for all report collectors.
hostname Configures report mode based on the host name of the collector.
ip_address Configures report mode based on the IPv4 address of the collector.
automatic Automatically reports switch status to the configured collector (Default).
manual Manually reports switch status to the configured collector through the run
tech-support report.
Default
Disabled.
Usage Guidelines
This command configures the report mode for a collector. When you specify all, it configures report
mode for all existing collectors, otherwise it configures report mode for a particular collector specified
by the hostname, or IP address. When the report mode is set to automatic, the switch automatically
attempts to connect to the cloud-hosted collector, and reports the switch status information based on
the frequency and data set setting of the collector. Changing the configuration to manual restricts
reporting to user initiated mode using the run tech-support command for that collector. When a
collector is added, the report mode is set to automatic by default.
Example
The following command example configures the report mode on all existing collectors:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command deletes existing collectors.
Syntax Description
all Specifies that you delete all report collectors.
hostname Specifies the host name of the collector you want to delete.
ip_address Specifies the IPv4 address of the collector you want to delete.
Default
Disabled.
Usage Guidelines
This command deletes existing collectors. If you specify all, it deletes all existing collectors; otherwise it
deletes the collector specified by the hostname or IP address. If the specified collector does not exist, an
error message ERROR: The collector 1.1.1.1 does not exist is displayed.
Example
The following example deletes all collectors :
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures Telnet to use an ACL policy or ACL rule for access control.
Syntax Description
access_profile Specifies an ACL policy.
add Specifies that an ACL rule is to be added to the Telnet application.
rule Specifies an ACL rule.
first Specifies that the new rule is to be added before all other rules.
before Specifies that the new rule is to be added before a previous rule.
after Specifies that the new rule is to be added after a previous rule.
previous_rule Specifies an existing rule in the application.
delete Specifies that one particular rule is to be deleted.
none Specifies that all the rules or a policy file is to be deleted.
Default
Telnet is enabled with no ACL policies and uses TCP port 23.
Usage Guidelines
You must be logged in as administrator to configure Telnet parameters.
In the ACL policy file for Telnet, the “source-address” field is the only supported match condition.
Any other match conditions are ignored.
The permit or deny counters are also updated accordingly regardless of whether the ACL is
configured to add counters. To display counter statistics, use the show access-list counters
process telnet command.
Only the following match conditions and actions are copied to the client memory. Others that may be in
the rule are not copied.
Match conditions:
• Source-address—IPv4 and IPv6
• Actions—Permit or Deny
When adding a new rule, use the first, before, and after previous_rule parameters to position it within
the existing rules.
If the Telnet traffic does not match any of the rules, the default behavior is deny. To permit Telnet traffic
that does not match any of the rules,add a permit all rule at the end of the rule list.
If you attempt to implement a policy that does not exist on the switch, an error message similar to the
following appears:
Error: Policy /config/MyAccessProfile.pol does not exist on file system
If this occurs, make sure the policy you want to implement exists on the switch. To confirm the policies
on the switch, use the configure snmp add community command. If the policy does not exist,
create the ACL policy file.
Example
The following example applies the ACL policy MyAccessProfile_2 to Telnet:
configure telnet access-profile MyAccessProfile_2
The following example applies the ACL rule DenyAccess to the Telnet application in the first position in
the list:
configure telnet access-profile add DenyAccess first
The following example removes the association of a single ACL rule from the Telnet application:
configure telnet access-profile delete DenyAccess
The following example removes the association of an ACL policy or all ACL rules from the Telnet
application:
configure telnet access-profile none
History
This command was first available in ExtremeXOS 11.2.
Support for ACL rules for Telnet was added in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the TCP port used by Telnet for communication.
Syntax Description
portno Specifies a TCP port number. The default is 23. The range is 1 through
65535. The following TCP port numbers are reserved and cannot be
used for Telnet connections: 22, 80, and 1023.
default Specifies the default Telnet TCP port number. The default is 23.
Default
The switch listens for Telnet connections on Port 23.
Usage Guidelines
You must be logged in as administrator to configure the Telnet port.
The portno range is 1 through 65535. The following TCP port numbers are reserved and cannot be used
for Telnet connections: 22, 80, and 1023. If you attempt to configure a reserved port, the switch displays
an error message similar to the following:
Example
The following command changes the port used for Telnet to port 85:
The following command returns the port used for Telnet to the default port of 23:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure telnet vr
configure telnet vr [all | default | vr_name]
Description
Configures the virtual router used on the switch for listening for Telnet connections.
Syntax Description
all Specifies to use all virtual routers for Telnet connections.
default Specifies to use the default virtual router for Telnet connections. The
default router is VR-Mgmt.
vr_name Specifies the name of the virtual router to use for Telnet connections.
NOTE: User-created VRs are supported only on the platforms listed
for this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Usage Guidelines
You must be logged in as administrator to configure the virtual router.
If you specify all, the switch listens on all of the available virtual routers for Telnet connections.
The vr_name specifies the name of the virtual router to use for Telnet connections.
If you specify a virtual router name that does not exist, the switch displays an error message similar to
the following:
configure telnet vr vr-ttt ^ %% Invalid input detected at '^' marker.
Example
The following command configures the switch to listen for and receive Telnet requests on all virtual
routers:
configure telnet vr all
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure time
configure time month day year hour min sec
Description
Configures the system date and time.
Syntax Description
month Specifies the month. The range is 1-12.
day Specifies the day of the month. The range is 1-31.
year Specifies the year in the YYYY format.The range is 2003 to 2036.
hour Specifies the hour of the day. The range is 0 (midnight) to 23 (11 pm).
min Specifies the minute. The range is 0-59.
sec Specifies the second. The range is 0-59.
Default
N/A.
Usage Guidelines
The format for the system date and time is as follows:
mm dd yyyy hh mm ss
The time uses a 24-hour clock format. You cannot set the year earlier than 2003 or past 2036. You have
the choice of inputting the entire time/date string. If you provide one item at a time and press [Tab], the
screen prompts you for the next item. Press [cr] to complete the input.
Example
The following command configures a system date of February 15, 2002 and a system time of 8:42 AM
and 55 seconds:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a time profile of an appointment starting at a specific time on a specific calendar date.
Syntax Description
time_profile_name Specifies the name of the time profile.
start Specifies the appointment starting specification .
start_hour Specifies the start hour. The range is 0-23.
start_minute Specifies the start minutes. The range is 0-59.
start_month Specifies the start month. The range is 1-12.
start_day Specifies the start day. The range is 1-31.
start_year Specifies the start year, YYYY.
stop Specifies the appointment stopping specification.
stop_hour Specifies the stop hour. The range is 0-23.
stop_minute Specifies the stop minutes. The range is 0-59.
stop_month Specifies the stop month. The range is 1-12.
stop_day Specifies the stop day. The range is 1-31.
stop_year Specifies the stop year, YYYY.
in Specifies the stop in time.
stop_count Specifies the stop count.
stop_units Specifies the stop units (for example, minutes , hours, days, weeks).
Default
N/A.
Usage Guidelines
Use this command to create a time profile of an appointment starting at a specific time on a specific
calendar date.
Example
The following command configures a time profile named testprofile to start at 11:30 a.m. on February 24,
2012 :
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure timezone
configure timezone {name tz_name} GMT_offset {autodst {name
dst_timezone_ID} {dst_offset} {begins [every floatingday | on
absoluteday] {at time_of_day} {ends [every floatingday | on
absoluteday] {at time_of_day}}} | noautodst}
Description
Configures the Greenwich Mean Time (GMT) offset and Daylight Saving Time (DST) preference.
Syntax Description
tz_name Specifies an optional name for this timezone specification. May be up
to six alphabetic characters in length. The default is an empty string.
GMT_offset Specifies a Greenwich Mean Time (GMT) offset, in + or - minutes.
autodst Enables automatic Daylight Saving Time.
dst-timezone-ID Specifies an optional name for this DST specification. May be up to six
characters in length. The default is an empty string.
dst_offset Specifies an offset from standard time, in minutes. Value is in the
range of 1 to 60. Default is 60 minutes.
floatingday Specifies the day, week, and month of the year to begin or end DST
each year. Format is: week day month where:
week is specified as [first | second | third | fourth | last] or 1-5. day is
specified as [sunday | monday | tuesday | wednesday | thursday |
friday | saturday] or 1-7 (where 1 is Sunday). month is specified as
[january | february | march | april | may | june | july | august |
september | october | november | december] or 1-12.
Default for beginning is second sunday march; default for ending is
first sunday november.
Default
Autodst, beginning every second Sunday in March, and ending every first Sunday in November.
Usage Guidelines
Network Time Protocol (NTP) server updates are distributed using GMT time.
To properly display the local time in logs and other timestamp information, the switch should be
configured with the appropriate offset to GMT based on geographic location.
Automatic DST changes can be enabled or disabled. The default configuration, where DST begins on
the second Sunday in March at 2:00 AM and ends the first Sunday in November at 2:00 AM, applies to
most of North America (beginning in 2007), and can be configured with the following syntax:
configure timezone GMT_offst autodst.
The starting and ending date and time for DST may be specified, as these vary in time zones around the
world.
• Use the every keyword to specify a year-after-year repeating set of dates (for example, the last
Sunday in March every year).
• Use the on keyword to specify a non-repeating, specific date for the specified year. If you use this
option, you will need to specify the command again every year.
• The begins specification defaults to every second Sunday in March.
• The ends specification defaults to every first sunday november.
• The ends date may occur earlier in the year than the begins date. This will be the case for countries
in the Southern Hemisphere.
• If you specify only the starting or ending time (not both) the one you leave unspecified will be reset
to its default.
• The time_of_day specification defaults to 2:00.
• The timezone IDs are optional. They are used only in the display of timezone configuration
information in the show switch command.
To disable automatic DST changes, re-specify the GMT offset using the noautodst option: configure
timezone gmt_offst noautodst.
For name creation guidelines and a list of reserved names, see Object Names in the ExtremeXOS 30.5
User Guide.
Example
The following example configures GMT offset for Mexico City, Mexico and disables automatic DST:
configure timezone -360 noautodst
The following four commands are equivalent, and configure the GMT offset and automatic DST
adjustment for the US Eastern timezone, with an optional timezone ID of EST:
configure timezone name EST -300 autodst name EDT 60 begins every second sunday march at
2 ends every first sunday november at 2:00
configure timezone name EST -300 autodst name EDT 60 begins every 1 1 4 at 2:00 ends
every 5 1 10 at 2:00
configure timezone name EST -300 autodst name EDT
configure timezone -300 autodst
The following example configures the GMT offset and automatic DST adjustment for the Middle
European timezone, with the optional timezone ID of MET:
configure timezone name MET 60 autodst name MDT begins every last sunday march at 1 ends
every last sunday october at 1
The following command configures the GMT offset and automatic DST adjustment for New Zealand.
The ending date must be configured each year because it occurs on the first Sunday on or after March
5:
configure timezone name NZST 720 autodst name NZDT 60 begins every first sunday october
at 2 ends on 3/16/2002 at 2
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures one or more trusted DHCP ports.
Syntax Description
ports Specifies one or more ports to be configured as trusted ports.
all Specifies all ports to be configured as trusted ports.
Default
N/A.
Usage Guidelines
To configure trusted DHCP ports, you must first enable DHCP snooping on the switch. To enable DHCP
snooping, use the following command:
enable ip-security dhcp-snooping {vlan} vlan_name ports [all |ports]
violation-action [drop-packet {[block-mac | block-port]
[durationduration_in_seconds | permanently] | none]}] {snmp-trap}
Trusted ports do not block traffic; rather, the switch forwards any DHCP server packets that appear on
trusted ports. Depending on your DHCP snooping configuration, the switch drops packets and can
disable the port temporarily, disable the port permanently, blackhole the MAC address temporarily,
blackhole the MAC address permanently, and so on.
If you configure one or more trusted ports, the switch assumes that all DHCP server packets on the
trusted port are valid.
To display any violations that occur, including those on DHCP trusted ports if configured, use the
following command: show ip-security dhcp-snooping violations {vlan} vlan_name
Example
The following command configures ports 2:2 and 2:3 as trusted ports:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures and enables a trusted DHCP server on the switch.
Syntax Description
vlan_name Specifies the VLAN name.
dynamic Configuration options for dynamically created VLANs.
vlan_id VLAN ID tag between 1 and 4,094.
ip_address Specifies the IP address of the trusted DHCP server.
Default
N/A.
Usage Guidelines
If you configured trusted DHCP server, the switch forwards only DHCP packets from the trusted servers.
The switch drops DHCP packets from other DHCP snooping-enabled ports.
You can configure a maximum of eight trusted DHCP servers on the switch.
If you configure a port as a trusted port, the switch assumes that all DHCP server packets on that port
are valid.
To display any violations that occur, including those on the DHCP trusted servers if configured, use the
following command:
show ip-security dhcp-snooping violations {vlan} vlan_name
Example
The following command configures a trusted DHCP server on the switch:
configure trusted-servers vlan purple add server 10.10.10.10 trust-for dhcp-server
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a trusted DHCP server from the switch.
Syntax Description
vlan_name Specifies the VLAN name.
ip_address Specifies the IP address of the trusted DHCP server.
dynamic Configuration options for dynamically created VLANs.
vlan_id VLAN ID tag between 1 and 4,094.
Default
N/A.
Usage Guidelines
Use this command to delete a trusted DHCP server from the switch.
To display any violations that occur, including those on the DHCP trusted servers if configured, use the
following command:
show ip-security dhcp-snooping violations {vlan} vlan_name
Example
The following command deletes a trusted DHCP server from the switch:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures an IPv6 address/prefix on a tunnel.
Syntax Description
tunnel_name Specifies an IPv6 tunnel.
ipv6-link-local Specifies the link-local address for a tunnel.
eui64 Specifies an EUI64 interface identifier for the lower 64 bits of the
address.
ipv6_address_mask Specifies an IPv6 address / IPv6 prefix length.
Default
N/A.
Usage Guidelines
This command will configure an IPv6 address/prefix route on the specified tunnel.
6to4 tunnels must follow the standard address requirement. The address must be of the form
2002:IPv4_source_endpoint::/16, where IPv4_source_endpoint is replaced by the IPv4
source address of the endpoint, in hexadecimal, colon separated form. For example, for a tunnel
endpoint located at IPv4 address 10.20.30.40, the tunnel address would be 2002:a14:1e28::/16. In hex, 10
is a, 20 is 14, 30 is 1e and 40 is 28.
Note
This command does not work for GRE tunnels. The following error message is displayed:
Error: IPv6 addresses can not be configured on GRE type tunnels!
Example
The following example configures the 6in4 tunnel "link39" with the IPv6 link-local address:
configure tunnel link39 ipaddress ipv6-link-local
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 interworking feature in the ExtremeXOS
30.5 Feature License Requirements document..
Description
This command allows you to add and delete the TWAMP endpoints.
Syntax Description
ip The endpoint IP address, either IPv4 or IPv6.
udp_port The UDP port the endpoint will listen on; range is 1025 - 65535
name An optional VR may be used; default is VR-Default.
Default
N/A.
Usage Guidelines
Use this command to add and delete the TWAMP endpoints. The user specifies the IP address and UDP
port number for the endpoint. Removing the endpoint terminates all test sessions associated with the
endpoint.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the shared secret used for authentication and encryption.
Syntax Description
key_name The 80 octet KeyID field in the Set-Up-Response control message
from RFC 4656.
shared_secret The shared secret passphrase, which is used to derive the shared
secret key, as defined in RFC 5357.
Default
N/A.
Usage Guidelines
None.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to modify the number of test sessions to support and timeout value for those
test sessions.
Syntax Description
count Range 0 – 2000 entries; default 2000.
ref_wait Range 30 – 3600 seconds; default 900 seconds.
Default
count = 2000
ref_wait = 900
Usage Guidelines
The timeout value is the REFWAIT value specified in RFC 5357.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to modify the number of concurrent TWAMP control sessions to support and
the timeout value for those control sessions.
Syntax Description
count Range 1 - 64.
serv_wait Range 30 - 3600 seconds.
Default
count = 64
serv_wait = 900
Usage Guidelines
The application terminates the control session if the timeout value expires without the reception of a
TWAMP-Control message. This value is the SERVWAIT value specified in RFC 5357.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a pre-defined event that triggers the named profile.
Syntax Description
upm-event Specifies a pre-defined event type: device-detect, device-undetected,
user-authenticate, user-unauthenticated.
profile-name Specifies the profile to be configured.
port-list Attaches the UPM profile to the specified port(s).
Default
N/A.
Usage Guidelines
This command configures a profile to be executed when the specified event occurs on the specified
port(s).
Example
The following example shows how to configure a profile on port 1:1, called “profile 1” that is triggered by
the event “device-detect”:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Defines a maximum execution period for a profile.
Syntax Description
seconds Defines the execution period in seconds. The range is 2 to
4294967295 seconds.
Default
30 seconds.
Usage Guidelines
If you make a mistake while configuring a profile and the profile loops, it will loop until the end of the
maximum execution period. While testing new profiles, consider configuring a relatively short execution
time so that any accidental loops do not create long delays during testing.
Example
The following example sets the execution period to 10 seconds:
configure upm profile test maximum execution-time 10
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.opic/ph
"/>
Description
Creates and names a UPM timer that is activated after the specified time in seconds.
Syntax Description
timer-name Specifies the name of the UPM timer to be created.
time-in-secs Configures the interval after which the UPM timer is activated.
seconds Configures the UPM timer to be activated after every instance of the
specified interval.
Default
N/A.
Usage Guidelines
Use this command to configure a timer that activates after the specified time. This is useful for
deployment in CLI scripts, because you do not know what the current time will be when the script
executes.
When a switch configuration is saved or restored, the UPM timers are activated only at the
predetermined timings that were originally configured with the start time.
The periodic timer configured with the every keyword and the one-time timer configured with only the
after keyword have a maximum range of one year in seconds (31,622,400 seconds).
Example
The following example configures the UPM timer “A” to be activated every 10 seconds, after an interval
of 20 seconds:
configure upm timer "timerA" after 20 every 10
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Use this command to configure the time setting on a UPM timer.
Syntax Description
timer-name Specifies the name of the UPM timer to be created.
month Configures the month when the UPM timer is activated.
day Configures the day when the UPM timer is activated.
year Configures the year when the UPM timer is activated.
hour Configures the hour when the UPM timer is activated.
min Configures the minute when the UPM timer is activated.
secs Configures the second when the UPM timer is activated.
seconds Configures the UPM timer to be activated at every instance of the specified
interval.
Default
N/A.
Usage Guidelines
Use this command to when you know the exact time you want an event to execute. If you use this
command without the every keyword, the timer is activated once at the specified time. The every
keyword configures a periodic timer that is activated at every instance of the time specified in seconds.
When a switch configuration is saved or restored, the UPM timers are activated only at the
predetermined timings that were originally configured with the start time.
Example
The following example shows how to configure a timer, T1, that is activated every 10 seconds beginning
at 1400 hours on October 16, 2006:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Associates a profile with a UPM timer.
Syntax Description
timer-name Specifies the name of the UPM timer to be associated with the named
profile.
profileName Specifies the name of the profile to be associated with the UPM timer.
Default
N/A.
Usage Guidelines
Each timer can be attached to only one profile. Once a timer is configured to a profile, it must be
unconfigured from that profile before it can be configured to a different profile.
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
configure virtual-network
configure virtual-network vn_name [add | delete] [{vlan vlan_name} |
{vman vman_name | dynamic {vlan} vlan_id]
Description
This command adds/removes a tenant VLAN or VMAN to a virtual network.
Syntax Description
vn_name Alphanumeric string indentifying the Virtual Network to be
configured.
add Add a tenant VLAN to the Virtual Network.
delete Delete a tenant VLAN from the Virtual Network.
vlan Specifies VLAN.
vlan_name Name of the tenant VLAN.
vman Specifies VMAN.
vman_name Name of the tenant VMAN.
dynamic Specifies configuring options for dynamically created VLANs.
Adds dynamic VLAN’s VID to a VNET. You can save this to the
configuration and is it persistent across reboots. After reboot when a
dynamic VLAN gets created with matching VID, the VLAN is internally
applied to the VNET, so that you do not need to reconfigure this every
time after reboot.
vlan Add or delete a tenant VLAN to the Virtual Network
vlan_id VLAN ID tag between 2 and 4,094.
Default
N/A.
Usage Guidelines
Only a single VLAN/VMAN can be added to a virtual network.
Example
The following example adds a VLAN to an existing virtual network:
# configure virtual-network my_virtual_network add vlan vlan100
The following example adds dynamic VLANs with VID 100 to virtual network "my_virtual_network":
# configure virtual-network my_virtual_network add dynamic vlan 100
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2,X465, X590, X690, X870 standalone,
and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Add ports that can terminate tunnels carrying VXLAN or NVGRE encapsulated traffic.
Syntax Description
add Add to existing overlay tunnel termination configuration.
network Configuration related to underlay network.
ports Select ports that can terminate tunnels carrying VXLAN or NVGRE
encapsulated traffic.
all Select all ports.
portlist Lists ports to be added.
Default
N/A.
Example
The following example adds ports 1–10 to terminate tunnels carrying VXLAN or NVGRE encapsulated
traffic:
configure virtual-network add network ports 1-10
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 standalone,
and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Deletes ports that can terminate tunnels carrying VXLAN or NVGRE encapsulated traffic.
Syntax Description
delete Delete from existing overlay tunnel termination configuration.
network Configuration related to underlay network.
ports Remove ports that can terminate tunnels carrying VXLAN or NVGRE
encapsulated traffic.
all Select all ports.
portlist Lists ports to be deleted.
Default
N/A.
Example
The following example deletes ports 1–10 to terminate tunnels carrying VXLAN or NVGRE encapsulated
traffic:
configure virtual-network delete network ports 1-10
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 standalone,
and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Globally controls enabling or disabling auto-creation of virtual networks.
Syntax Description
virtual-network Virtual overlay network.
dynamic Configure creation of dynamic virtual networks.
on Enable creation of dynamic virtual networks by applications such as
BGP Auto-peering.
off Disable creation of dynamic virtual networks by applications such as
BGP Auto-peering (default).
Default
By default, automatic creation of virtual networks is disabled.
Usage Guidelines
Creating or deleting BGP Auto-peering enables or disables automatic virtual network creation.
You can view the setting from this command in the show virtual-network {vn_name |
vxlan vni vni | [vlan vlan_name | vman vman_name]} command.
Example
The following example enables automatic creation of virtual networks:
# configure virtual-network dynamic on
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 standalone,
and stacks with X670-G2, X465, X590, X690, X87 slots only.
Description
This command configures a local IPv4 address to be used as SIP for encapsulated packets.
Syntax Description
ipaddress Configure the IP address to be used as source IP address for VXLAN
packets encapsulated by this gateway.
ipaddress An existing interface IPv4 address.
vr VR/VRF instance the IPv4 address is configured on.
vr_name An existing VR/VRF name.
none Remove existing IP address configuration for the local tunnel endpoint
for this virtual router.
Default
VR-Default.
Usage Guidelines
The address must have been configured as an interface address prior to issuing this command.
Although not mandatory, it is strongly recommended that a loopback VLAN IP address be used as the
local IP address for tunnels. “VR-Default” is the default for VR/VRF name. ExtremeXOS checks if the
given IP address is configured on the VR/VRF. If not configured, the command fails with an appropriate
error message. This release of ExtremeXOS supports tunnel termination on a single VR/VRF. That
VR/VRF can be a user created. If you intend to change the IP address or the VR/VRF, you can re-issue
the same command with a different IP address to effect the change.
Example
To configure a local tunnel endpoint IP address in a user created VR/VRF:
configure virtual-network local-endpoint ipaddress 10.10.10.1 vr VR-User
To change a local tunnel endpoint to a different IP address within the same VR/VRF:
configure virtual-network local-endpoint ipaddress 20.20.20.1 vr VR-User
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 standalone,
and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Use this command to enable or disable statistics monitoring (byte/packet counters) on a Virtual
Network.
Syntax Description
vn_name Alphanumeric string identifying the Virtual Network to be configured.
on Enable statistics.
off Disable statistics.
Default
N/A.
Usage Guidelines
N/A.
Example
To enable statistics monitoring on an existing Virtual Network:
configure virtual-network vnet1 monitor on
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 standalone,
and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Renames virtual networks.
Syntax Description
virtual-network Configures virtual networks.
vn_name Specifies the virtual network to be renamed.
name Selects renaming the virtual network.
new_name Specifies the new name for the virtual network.
Default
N/A.
Usage Guidelines
Dynamically created virtual networks are not saved to the configuration. When a dynamically created
virtual network is renamed, the virtual network becomes static and is saved to the configuration.
Example
The following example changes the name of the virtual network from "vn1" to "vn2":
# configure virtual-network vn name vn2
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X870 series switches, and stacks
with X465, X670-G2, and X870 slots only.
Description
Use this command to add or remove a remote endpoint to a virtual network.
Syntax Description
vn_name Alphanumeric string identifying the Virtual Network to be configured.
add Add configuration to the virtual network.
delete Delete configuration from the virtual network.
ipaddress A remote endpoint IP address.
vr VR/VRF instance the remote endpoint is associated with.
vr_name An existing VR/VRF name.
Default
VR-Default.
Usage Guidelines
This command is only valid when the virtual network is operating in “flooding standard” mode. The
remote endpoint will receive unknown destination frames of all types that enter the virtual network
from the local endpoint. For "explicit-remotes" flooding mode, the remote endpoints are added when
BUM FDB entries are added.
Example
To add a remote endpoint to an existing Virtual Network:
configure virtual-network my_virtual_network add remote-endpoint vxlan ipaddress 1.2.3.4
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
This command enables or disables statistics monitoring (byte/packet counters) on a Virtual Network
remote endpoint.
Syntax Description
ipaddress An existing interface IPv4 address.
vr VR/VRF instance the IPv4 address is configured on.
vr_name An existing VR/VRF name.
on Enable statistics.
off Disable statistics.
Default
Off.
Usage Guidelines
The command applied on dynamic remote endpoint is not saved to the configuration. If you want it to
be saved, convert the remote endpoint to static using the command create virtual-network
remote-endpoint vxlan ipaddress ipaddress {vr vr_name}.
Example
To enable statistics monitoring on an existing Virtual Network remote endpoint:
configure virtual-network remote-endpoint vxlan ipaddress 10.10.10.146 monitor on
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Use this command to assign a VXLAN VNI to a virtual network.
Syntax Description
vn_name Alphanumeric string identifying the Virtual Network to be configured.
vni Virtual Network Identifier value between 1 and 16777215.
none Remove existing VXLAN VNI configuration for this virtual network.
Default
N/A.
Usage Guidelines
The range of supported VNIs is 1-16777215. The VNI needs to be unique and not more than a one VNI
can configured for a virtual-network in this release of ExtremeXOS.
Example
To configure a VXLAN VNI value of 10000 to an existing Virtual Network:
configure virtual-network my_virtual_network vxlan vni 10000
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Maps a static VLAN to a Network Service Identifier (NSI) or Individual Service Identifier (ISID).
Syntax Description
vlan Specifies VLAN.
vlan_name Specifies the name of the VLAN to map.
vlan_id Specifies the ID of the VLAN to map.
add Specifies mapping a VLAN to an NSI.
nsi Specifies an NSI.
nsi Specifies the ID number of the NSI to map to the VLAN.
Default
N/A.
Usage Guidelines
These static VLAN mappings do not age out of the LLDP database, but are removed when the VLAN is
deleted or when removed by the command configure vlan delete nsi | isid on page 1444.
Example
The following example maps VLAN "vlan1" to NSI "1000":
# configure vlan vlan1 add nsi 1000
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds one or more ports in a VLAN.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
port_list Specifies a list of ports or slots and ports.
all Specifies all ports.
tagged tag Specifies the ports should be configured as tagged.
Default
Untagged.
Usage Guidelines
The VLAN must already exist before you can add (or delete) ports: use the create vlan command to
create the VLAN.
If the VLAN uses 802.1Q tagging, you can specify tagged or untagged port(s). If the VLAN is untagged,
the ports cannot be tagged.
Untagged ports can only be a member of a single VLAN. By default, they are members of the default
VLAN (named Default). In order to add untagged ports to a different VLAN, you must first remove them
from the default VLAN. You do not need to do this to add them to another VLAN as tagged ports. If you
attempt to add an untagged port to a VLAN prior to removing it from the default VLAN, you see the
following error message:
Error: Protocol conflict when adding untagged port 1:2. Either add this port as tagged or
assign another protocol to this VLAN.
Note
This message is not displayed if keyword all is used as port_list.
The ports that you add to a VLAN and the VLAN itself cannot be explicitly assigned to different virtual
routers (VRs). When multiple VRs are defined, consider the following guidelines while adding ports to a
VLAN:
• A VLAN can belong (either through explicit or implicit assignment) to only one VR.
• If a VLAN is not explicitly assigned to a VR, then the ports added to the VLAN must be explicitly
assigned to a single VR.
• If a VLAN is explicitly assigned to a VR, then the ports added to the VLAN must be explicitly
assigned to the same VR or to no VR.
• If a port is added to VLANs that are explicitly assigned to different VRs, the port must be explicitly
assigned to no VR.
Note
User-created VRs are supported only on the platforms listed for this feature in in the
ExtremeXOS 30.5 Feature License Requirements document. On switches that do not
support user-created VRs, all VLANs are created in VR-Default and cannot be moved.
Refer to the STP section in the ExtremeXOS 30.5 User Guide for more information on configuring
Spanning Tree Domains.
Note
If you use the same name across categories (for example, STPD and EAPS names), we
recommend that you specify the identifying keyword as well as the actual name. If you do not
use the keyword, the system may return an error message.
Beginning with ExtremeXOS 11.4, the system returns the following message if the ports you are adding
are already EAPS primary or EAPS secondary ports:
WARNING: Make sure Vlan1 is protected by EAPS. Adding EAPS ring ports to a VLAN could
cause a loop in the network. Do you really want to add these ports? (y/n)
Example
The following example assigns tagged ports 1:1, 1:2, 1:3, and 1:6 to a VLAN named "accounting":
configure vlan accounting add ports 1:1, 1:2, 1:3, 1:6 tagged
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds the specified ports to the specified network VLAN and enables tag translation for all subscriber
VLAN tags to the network VLAN tag.
Syntax Description
vlan_name Specifies the network VLAN to which the ports are added.
vlan_list Specifies a VLAN list of IDs.
port_list Specifies the ports to be added to the network VLAN.
Default
N/A.
Usage Guidelines
This command is allowed only when the specified VLAN is configured as a network VLAN on a PVLAN.
Example
The following example adds port 2:1 to VLAN sharednet and enables VLAN translation on that port:
configure sharednet add ports 2:1 private-vlan translated
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the Private VLAN feature. For features and the
platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds one or more ports in a VLAN to a specified STPD.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all of the ports to be included in the STPD.
port_list Specifies the port or ports to be included in the STPD.
tagged Specifies the ports should be configured as tagged.
tag Specifies the port-specific VLAN tag. When there are multiple ports
specified in the port_list, the same tag is used for all of them.
When unspecified port tag is equal to the VLAN tag.
untagged Specifies the ports should be configured as untagged.
stpd_name Specifies an STPD name on the switch.
dot1d Specifies the STP encapsulation mode of operation to be 802.1d.
emistp Specifies the STP encapsulation mode of operation to be EMISTP.
pvst-plus Specifies the STP encapsulation mode of operation to be PVST+.
Default
Ports in the default STPD (s0) are in dot1.d mode.
Usage Guidelines
To create a VLAN, use the create vlan command. To create an STP domain, use the create stpd
command.
In an EMISTP or PVST+ environment, this command adds a list of ports to a VLAN and a specified STPD
at the same time provided the carrier VLAN already exists on the same set of ports. You can also
specify the encapsulation mode for those ports.
In an MSTP environment, you do not need a carrier VLAN. A CIST controls the connectivity of
interconnecting MSTP regions and sends BPDUs across the regions to communicate region status. You
must use the dot1d encapsulation mode in an MSTP environment.
Note
This restriction is only enforced in an active STP domain and when you enable STP to
ensure you have a legal STP configuration.
Naming Conventions
If your VLAN has the same name as another component, for example an STPD, we recommend that you
specify the identifying keyword as well as the name. If your VLAN has a name unique only to that VLAN,
the keywords vlan and stpd are optional.
This encapsulation mode supports the following STPD modes of operation: 802.1D, 802.1w, and
MSTP.
• emistp—This mode sends BPDUs with an 802.1Q tag having an STPD ID in the VLAN ID field.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
• pvst-plus—This mode implements PVST+ in compatibility with third-party switches running this
version of STP. The STPDs running in this mode have a one-to-one relationship with VLANs, and
send and process packets in PVST+ format.
This encapsulation mode supports the following STPD modes of operation: 802.1D and 802.1w.
These encapsulation modes are for STP ports, not for physical ports. When a physical ports belongs to
multiple STPDs, it is associated with multiple STP ports. It is possible for the physical port to run in
different modes for different domains for which it belongs.
MSTP STPDs use only 802.1D BPDU encapsulation mode. The switch prevents you from configuring
EMISTP or PVST+ encapsulation mode for MSTP STPDs.
Specify the port tag when you need to put multiple vlans into a broadcast domain.
Example
The following command adds slot 1, port 2 and slot 2, port 3, members of a VLAN named Marketing, to
the STPD named STPD1, and specifies that they be in EMISTP mode:
configure vlan marketing add ports 1:2, 2:3 tagged stpd stpd1 emistp
The following example configures vlan with tag 100 and port tag of 10 and 11 on two different ports:
create vlan exchange tag 100
config vlan exchange add ports 3 tagged 10
config vlan exchange add ports 4 tagged 11
The following example configures a VLAN with tag 100, and port tag of 10 and 11 on the same ports:
create vlan exchange tag 100
config vlan exchange add ports 3 tagged 10
config vlan exchange add ports 3 tagged 11
The following example configures VLAN with tag 100, and port tag of 10 on two ports and 11 on a
different port:
create vlan exchange tag 100
config vlan exchange add ports 2:3,2:4 tagged 10
config vlan exchange add ports 2:5 tagged 11
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures secondary IP addresses on a VLAN to support multinetting.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_id Specifies a VLAN id.
ip_address Specifies an IP address.
netmask Specifies a network mask.
ipNetmask Specifies an IP address with network mask.
Default
N/A.
Usage Guidelines
Adding a secondary IP address to a VLAN enables multinetting. Secondary addresses are added to
support legacy stub IP networks.
Once you have added a secondary IP address to a VLAN, you cannot unconfigure the primary IP
address of that VLAN until you delete all the secondary addresses. Delete secondary address with the
following command:
configure [ {vlan} vlan_name |vlan vlan_id] delete secondary-ipaddress
[ip_address | all]
Example
The following example configures the VLAN multi to support the 10.1.1.0/24 subnet in addition to its
primary subnet:
configure vlan multi add secondary-ipaddress 10.1.1.1/24
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Unmaps a static VLAN from a Network Service Identifier (NSI) or Individual Service Identifier (ISID).
Syntax Description
vlan Specifies VLAN.
vlan_name Specifies the name of the VLAN to remove.
vlan_id Specifies the ID of the VLAN to remove.
delete Specifies removing the mapping of a VLAN from an NSI.
nsi Specifies an NSI.
nsi Specifies the ID number of the NSI to unmap from the VLAN.
isid Specifies an ISID.
isid Specifies the ID number of the ISID to unmap from the VLAN.
Default
N/A.
Usage Guidelines
Only mappings created by the command configure vlan add nsi | isid on page 1436 can be removed
using this command.
Example
The following example removes VLAN "vlan1" from NSI "1000":
# configure vlan vlan1 delete nsi 1000
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or more ports in a VLAN.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
all Specifies all ports.
port_list Specifies a list of ports or slots and ports.
tagged tag Specifies the port-specific VLAN tag. When there are multiple ports
specified using port_list, the same tag is used for all of them.
Default
When unspecified, the port tag is equal to the VLAN tag.
Usage Guidelines
Specify port tag to delete a VLAN port that has a different tag from the VLAN tag.
Example
The following example removes ports 1, 3, and 7 on a switch from a VLAN named accounting:
configure accounting delete ports 1,3,7
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes secondary IP addresses on a VLAN that were added to support multinetting.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_id Specifies a VLAN ID.
ip_address Specifies an IP address.
all Specifies all secondary IP addresses.
Default
N/A.
Usage Guidelines
Once you have added a secondary IP address to a VLAN, you cannot unconfigure the primary IP
address of that VLAN until you delete all the secondary addresses. Use the all keyword to delete all
the secondary IP addresses from a VLAN.
Example
The following example removes the 10.1.1.0 secondary IP address from the VLAN "multi":
configure vlan multi delete secondary-ipaddress 10.1.1.1
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a description for the specified VLAN.
Syntax Description
vlan_name Specifies the VLAN name.
vlan-description Specifies a VLAN description (up to 64 characters) that appears in
show vlan commands and can be read from the ifAlias MIB object for
the VLAN.
none This keyword removes the configured VLAN description.
Default
By default, the VLAN has no description.
Usage Guidelines
The VLAN description must be in quotes if the string contains any space characters. If a VLAN
description is configured for a VLAN that already has a description, the new description replaces the old
description.
Example
The following example assigns the description "Campus A" to VLAN vlan1:
configure vlan vlan1 description “Campus A”
History
This command was first available in ExtremeXOS 12.4.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a set of DHCP addresses for a VLAN.
Syntax Description
vlan_name Specifies the VLAN on whose ports DHCP will be enabled.
ipaddress1 Specifies the first IP address in the DHCP address range to be
assigned to this VLAN.
ipaddress2 Specifies the last IP address in the DHCP address range to be assigned
to this VLAN.
Default
N/A.
Usage Guidelines
The following error conditions are checked: ipaddress2 >= ipaddress1, the range must be in the VLAN's
network, the range does not contain the VLAN's IP address, and the VLAN has an IP address assigned.
Example
The following command allocates the IP addresses between 192.168.0.20 and 192.168.0.100 for use by
the VLAN temporary:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timer value in seconds returned as part of the DHCP response.
Syntax Description
vlan_name Specifies the VLAN on whose ports netlogin should be disabled.
lease-timer Specifies the timer value, in seconds.
Default
N/A.
Usage Guidelines
The timer value is specified in seconds. The timer value range is 0 - 4294967295, where 0 indicates the
default (not configured) value of 7200 second.
Example
The following command configures the DHCP lease timer value for VLAN corp:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the DHCP options returned as part of the DHCP response by a switch configured as a DHCP
server.
Syntax Description
vlan_name Specifies the VLAN on which to configure DHCP.
code Specifies the generic DHCP option code.
option_number Specifies the DHCP Option number.
16-bit Specifies that one to four 16-bit unsigned integer values associated
with selected DHCP option.
32-bit Specifies that one to four 32-bit unsigned integer values associated
with selected DHCP option.
flag Specifies that 1 byte value associated with selected DHCP option
number.
hex Specifies that hexadecimal string associated with selected DHCP
option number.
string Specifies that a string is associated with selected DHCP option
number.
string_value The string value associated with specified option.
default-gateway Specifies the router option.
dns-server Specifies the Domain Name Server (DNS) option.
primary Specifies the primary DNS option.
secondary Specifies the secondary DNS option.
wins-server Specifies the NetBIOS name server (NBNS) option.
ipaddress The IP address associated with the specified option.
Default
N/A.
Usage Guidelines
This command configures the DHCP options that can be returned to the DHCP client. For the default-
gateway option you are only allowed to configure an IP address that is in the VLAN's network range. For
the other options, any IP address is allowed.
The options below represent the following BOOTP options specified by RFC2132:
• default-gateway—Router option, number 3.
• dns-server—Domain Name Server option, number 6.
• wins-server—NetBIOS over TCP/IP Name Server option, number 44.
Example
The following command configures the DHCP server to return the IP address 10.10.20.8 as the router
option:
History
This command was first available in ExtremeXOS 11.0.
The primary and secondary DNS options were added in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Statically provisions uplink ports for all dynamically created VLANs.
Syntax Description
dynamic-vlan Configuration options for dynamically created VLANs.
uplink-ports Tagged uplink ports for VLANs created by ExtremeXOS.
add Add ports to dynamic VLAN uplink port list.
delete Remove ports from dynamic VLAN uplink port list.
ports Ports to be configured as uplink ports.
Default
N/A.
Usage Guidelines
Use this command to statically provision uplink ports for dynamically created VLANs.
Example
# conf vlan dynamic-vlan uplink-ports add ports 16-18
# conf vlan dynamic-vlan uplink-ports add 20,22,24
# configure vlan dynamic-vlan uplink-ports delete ports 22
# configure vlan dynamic-vlan uplink-ports delete 16-18
# configure vlan dynamic-vlan uplink-ports delete all
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Assigns an IPv4 address and an optional subnet mask or an IPv6 address to the VLAN. Beginning with
ExtremeXOS 11.2, you can specify IPv6 addresses. You can assign either an IPv4 address, and IPv6
address, or both to the VLAN. Beginning with ExtremeXOS 11.3, you can use this command to assign an
IP address to a specified VMAN and enable multicasting on that VMAN.
Note
You can also use this command to assign an IP address to a VMAN on all platforms that
support the VMAN feature. For information on which software licenses and platforms support
the VMAN feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_id Specifies a VLAN ID.
ipaddress Specifies an IPv4 address.
netmask Specifies an IPv4 subnet mask in dotted-quad notation (for example,
255.255.255.0). This parameter supports 255.255.255.254 for 31-bit prefixes.
ipNetmask Specifies an IPv4 prefix mask in CIDR notation. This parameter supports /31 for
31-bit prefixes.
ipv6-link-local Specifies IPv6 and configures a link-local address generated by combining the
standard link-local prefix with the automatically generated interface in the
EUI-64 format. Using this option automatically generates an entire IPv6
address; this address is only a link-local, or VLAN-based, IPv6 address; that is,
ports on the same segment can communicate using this IP address and do not
have to pass through a gateway.
eui64 Specifies IPv6 and automatically generates the interface ID in the EUI-64
format using the interface’s MAC address. Once you enter this parameter, you
must add the following variables: ipv6_address_mask. Use this option
when you want to enter the 64-bit prefix and use a EUI-64 address for the rest
of the IPv6 address.
ipv6_address_ma Specify the IPv6 address in the following format: x:x:x:x:x:x:x:x/prefix length,
sk where each x is the hexadecimal value of one of the 8 16-bit pieces of the 128-
bit wide address.
Default
N/A.
Usage Guidelines
The VLAN must already exist before you can assign an IP address; use the create vlan command to
create the VLAN (also the VMAN must already exist).
Note
If you plan to use the VLAN as a control VLAN for an EAPS domain, do NOT configure the
VLAN with an IP address. For information about adding secondary IP addresses to VLANs,
see the IPv4 Unicast Routing section in the ExtremeXOS 30.5 User Guide .
Beginning with ExtremeXOS 11.2, you can specify IPv6 addresses. For information about IPv6 addresses,
see the IPv6 Unicast Routing section in the ExtremeXOS 30.5 User Guide.
Beginning with ExtremeXOS 11.3, you can assign an IP address (including IPv6 addresses) to a VMAN.
Beginning with version 11.4, you can enable multicasting on that VMAN.
Beginning with ExtremeXOS 15.7.1, you can configure IPv4 addresses with 31-bit prefixes on network
VLANs and the Mgmt VLAN.
To enable multicasting on the specified VMAN once you assigned an IP address, take the following
steps:
Example
The following examples are equivalent; both assign an IPv4 address of 10.12.123.1 to a VLAN named
"accounting":
configure vlan accounting ipaddress 10.12.123.1/24
configure vlan accounting ipaddress 10.12.123.1 255.255.255.0
The following example assigns a link local IPv6 address to a VLAN named management:
configure vlan accounting ipaddress ipv6-link-local
History
This command was first available in ExtremeXOS 10.1.
Support for 31-bit prefixes on IPv4 addresses was added in ExtremeXOS in 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Renames a previously configured VLAN.
Syntax Description
vlan_name Specifies the current (old) VLAN name.
vlan_id Specifies the VLAN ID.
name Specifies a new name for the VLAN.
Default
N/A.
Usage Guidelines
You cannot change the name of the default VLAN “Default.”
For information on VLAN name requirements and a list of reserved keywords, see Object Names in the
ExtremeXOS 30.5 User Guide.
Note
If you use the same name across categories (for example, STPD and EAPS names), we
recommend that you specify the identifying keyword as well as the actual name. If you do not
use the keyword, the system may return an error message.
Example
The following example renames VLAN vlan1 to engineering:
configure vlan vlan1 name engineering
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the timer value returned as part of the DHCP response for clients attached to networklogin-
enabled ports.
Syntax Description
vlan_name Specifies the VLAN to which this timer value applies.
seconds Specifies the timer value, in seconds.
Default
10 seconds.
Usage Guidelines
The timer value is specified in seconds.
This command applies only to the web-based authentication mode of network login.
Example
The following command sets the timer value to 15 seconds for VLAN corp:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a VLAN traffic group, which links all the ingress ports in the specified VLAN to the specified
egress QoS profile.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
qosprofile Specifies an egress QoS profile. The supported values are: qp1 to qp8
and none.
Default
None.
Usage Guidelines
Extreme switches support eight egress QoS profiles (QP1 to QP8) for each port. The QoS profile QP7 is
not available to you on a SummitStack.
Example
The following command configures VLAN accounting to use QoS profile QP3:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a VLAN to use a specific protocol filter.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
protocol_name Specifies a protocol filter name. This can be the name of a predefined
protocol filter, or one you define.The following protocol filters are
predefined: IP, IPv6, IPX, NetBIOS, DECNet, IPX_8022, IPX_SNAP,
AppleTalk.
Using any indicates that this VLAN should act as the default VLAN for
its member ports.
Default
Protocol any.
Usage Guidelines
If the keyword any is specified, all packets that cannot be classified into another protocol-based VLAN
are assigned to this VLAN as the default for its member ports.
Use the configure protocol command to define your own protocol filter.
Protocol Filters
These devices do not forward packets with a protocol-based VLAN set to AppleTalk. To ensure that
AppleTalk packets are forwarded on the device, create a protocol-based VLAN set to "any" and define
other protocol-based VLANs for other traffic, such as IP traffic. The AppleTalk packets pass on the “any”
VLAN, and the other protocols pass traffic on their specific protocol-based VLANs.
Example
The following example configures the protocol filter "my_filter" to vlan v1:
configure vlan v1 protocol "my_filter"
configure vlan v1 protocol filter "my_filter"
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a prefix to the router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
prefix Specifies the prefix to add.
Default
N/A.
Usage Guidelines
This command adds a prefix to the router advertisement messages for the VLAN. Prefixes defined with
this command are only included in the router advertisement messages and have no operational impact
on VLANs.
To configure the parameters for this prefix, use the following command:
configure vlan vlan_name router-discovery {ipv6} set prefix prefix
[autonomous-flag auto_on_off | onlink-flag onlink_on_off | preferred-
lifetime preflife |valid-lifetime validlife]
Example
The following command adds the prefix 2001:db8:3456::/64 for the VLAN "top_floor":
configure vlan top_floor router-discovery add prefix 2001:db8:3456::/64
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the router lifetime value sent in router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
defaultlifetime Specifies the router lifetime. Range is 0, or max-interval to 9000
seconds.
Default
1800 seconds.
Usage Guidelines
This command configures the router lifetime value to be included in the router advertisement messages.
The value is specified in seconds and is either 0, or between max-interval and 9000 seconds. A value of
0 indicates that the router is not to be used as a default router.
After a host sends a router solicitation, and receives a valid router advertisement with a non-zero router
lifetime, the host must desist from sending additional solicitations on that interface, until an event such
as re-initialization takes place.
Example
The following example configures the default-lifetime to be 3600 seconds for the VLAN "top_floor":
configure vlan top_floor router-discovery default-lifetime 3600
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes prefixes from the router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
prefix Specifies the prefix to delete.
all Specifies to delete all prefixes.
Default
N/A.
Usage Guidelines
This command deletes previously defined router advertisement prefixes.
Example
The following example deletes the prefix 2001:db8:3161::/64 for the VLAN "top_floor":
configure vlan top_floor router-discovery delete 2001:db8:3161::/64
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the link MTU value sent in router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
linkmtu Specifies the link MTU. Range is 0 to 9216.
Default
0, meaning that no link MTU information is sent.
Usage Guidelines
This command configures the link MTU placed into the router advertisement messages. Advertisement
of the MTU helps ensure use of a consistent MTU by hosts on the VLAN.
The minimum value is 0, and the maximum value is 9216. The default value is 0, which means that no
link MTU information is included in the router discovery messages.
Example
The following example configures the link MTU to be 5126 for the VLAN "top_floor":
configure vlan top_floor router-discovery link-mtu 5126
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the managed address configuration flag value sent in router discovery advertisements on
the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
on_off Specifies setting the flag to on or off.
Default
Off.
Usage Guidelines
This command configures the contents of the managed address configuration flag in the router
advertisement messages.
A value of on tells hosts to use the administered (stateful) protocol DHCP for address autoconfiguration
in addition to any addresses autoconfigured using stateless address autoconfiguration. A value of off
tells hosts to use stateless address autoconfiguration. If this command is not entered, the default value
is off.
Example
The following example configures the managed address configuration flag to be on for the VLAN
"top_floor":
configure vlan top_floor router-discovery managed-config-flag on
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the maximum time between unsolicited router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
maxinterval Specifies the maximum time between advertisements, in seconds.
Range is 4 to 1800.
Default
600 seconds.
Usage Guidelines
This command configures the maximum amount of time before an unsolicited router advertisement
message is advertised over the links corresponding to the VLAN.
Example
The following example configures the max-interval to be 300 seconds for the VLAN "top_floor":
configure vlan top_floor router-discovery max-interval 300
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the minimum time between unsolicited router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
mininterval Specifies the minimum time between advertisements, in seconds.
Range is 3 to 1350 (see guidelines).
Default
200 seconds, or max-interval × .33 (see guidelines).
Usage Guidelines
This command configures the minimum amount of time before an unsolicited router advertisement
message is advertised over the links corresponding to the VLAN.
The minimum value is three seconds. The maximum time is (.75 × max-interval) seconds. If you do not
explicitly set this value, the min-interval value is reset whenever the max-interval is configured. Min-
interval will then be dynamically adjusted to .33 times the max-interval.
Example
The following example configures the min-interval to be 300 seconds for the VLAN "top_floor":
configure vlan top_floor router-discovery min-interval 300
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the other stateful configuration flag value sent in router discovery advertisements on the
VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
on_off Specifies setting the flag to on or off.
Default
Off.
Usage Guidelines
This command configures the contents of the other stateful configuration flag in the router
advertisement messages.
When set to on, hosts use the administered (stateful) protocol (DHCP) for autoconfiguration of other
(non-address) information. If this command is not entered, the default value is off.
Example
The following example configures the other stateful configuration flag to be on for the VLAN
"top_floor":
configure vlan top_floor router-discovery other-config-flag on
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the reachable time value in router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
reachabletime Specifies the reachable time value in advertisements, in milliseconds.
Range is 0 to 3,600,000 (one hour).
Default
30,000 milliseconds.
Usage Guidelines
The reachable time is the time, in milliseconds, that a node assumes a neighbor is reachable after having
received a reachability confirmation. A value of 0 means the time is unspecified by this router. The
maximum value is 3,600,000 (1 hour).
Example
The following example configures the reachable time to be 3,600,000 milliseconds for the VLAN
"top_floor":
configure vlan top_floor router-discovery reachable-time 3600000
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the retransmit time value in router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
retransmittime Specifies the reachable time value in advertisements, in milliseconds.
Range is 0 to 4,294,967,295 (approximately 50 days).
Default
1,000 milliseconds.
Usage Guidelines
This command configures the retransmit time value in the router advertisement messages.
The retransmit time, in milliseconds, is the time between retransmitted neighbor solicitation messages.
A value of 0 means the value is unspecified by this router. The maximum value is 4,294,967,295.
Example
The following example configures the retransmit time to be 604,800,000 milliseconds (one week) for
the VLAN "top_floor":
configure vlan top_floor router-discovery retransmit-time 604800000
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Sets the parameters for a prefix in the router discovery advertisements on the VLAN.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
prefix Specifies which prefix’s parameters to set.
auto_on_off Specifies the autonomous flag.
onlink_on_off Specifies the on link flag.
preflife Specifies the preferred lifetime in seconds. Maximum value is
4,294,967,295.
validlife Specifies the valid lifetime in seconds. Maximum value is
4,294,967,295.
Default
The prefix parameter defaults are:
• Valid lifetime—2,592,000 seconds (30 days)
• On-link flag—on
Usage Guidelines
This command configures the attributes associated with the specified prefix.
The autonomous-flag flag option modifies the autonomous flag of the prefix. The autonomous flag
value specifies whether the prefix can be used for autonomous address configuration (on) or not (off).
The onlink-flag option modifies the on link flag of the prefix. The on link flag specifies whether the
prefix can be used for on link determination (on) or not (off). The default value of the on link flag is on.
The preferred-lifetime option modifies the preferred lifetime of a prefix. The preferred lifetime
value is the time (from when the packet is sent) that addresses generated from the prefix via stateless
address autoconfiguration remain preferred. The maximum value is 4,294,967,295. The default value is
604,800 seconds (7 days).
The valid-lifetime option modifies the valid lifetime of a prefix. The valid lifetime value is the time
(from when the packet was sent) that the prefix is valid for the purpose of on-link determination. The
maximum value is a 4,294,967,295. The default value is 2,592,000 seconds (30 days).
Example
The following example sets the on link parameter of the prefix 2001:db8:3161::/64 to off, for the VLAN
"top_floor":
configure vlan top_floor router-discovery set prefix 2001:db8:3161::/64 onlink-flag off
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the in the
ExtremeXOS 30.5 Feature License Requirements document..
Description
Configures the router discovery advertisements to send only with VRRP link local address on the VRRP-
enabled VLAN interface.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
router-discovery IPv6 Router Discovery configuration
ipv6 IPv6 Router Discovery configuration.
vrrp-lla-only Router advertisement is sent only with VRRP’s virtual link local
address.
on_off Specifies setting the flag to on or off. Default is off.
Default
Default is off.
Usage Guidelines
This command configures the router advertisements to use only VRRP’s link local address and avoid
VLAN link local address on VRRP-enabled VLAN interfaces.
When set to on, VRRP’s link local address is used in router advertisements. If this command is not
entered, the default value is off and VLAN link local address is used in router advertisements.
Note
You need to explicitly set this value to "off" when VRRP is disabled on the VLAN.
Example
The following example configures the router discovery advertisements to use VRRP link local address
for the VLAN "top_floor":
# configure vlan top_floor router-discovery vrrp-lla-only on
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on all platforms that support the Advanced Edge License as shown in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds or deletes a subVLAN to a superVLAN.
Syntax Description
vlan_name Specifies a superVLAN name.
add Adds the subVLAN to the superVLAN.
delete Deletes the subVLAN from the superVLAN.
sub_vlan_name Specifies a subVLAN name.
Default
N/A.
Usage Guidelines
The following properties apply to VLAN aggregation operation:
• All broadcast and unknown traffic remain local to the subVLAN and does not cross the subVLAN
boundary. All traffic within the subVLAN are switched by the subVLAN, allowing traffic separation
between subVLANs (while using the same default router address among the subVLANs).
• Hosts can be located on the superVLAN or on subVLANs. Each host can assume any IP address
within the address range of the superVLAN router interface. Hosts on the subVLAN are expected to
have the same network mask as the superVLAN and have their default router set to the IP address of
the superVLAN.
• All IP unicast traffic between subVLANs is routed through the superVLAN. For example, no ICMP
redirects are generated for traffic between subVLANs, because the superVLAN is responsible for
subVLAN routing. Unicast IP traffic across the subVLANs is facilitated by the automatic addition of
an ARP entry (similar to a proxy ARP entry) when a subVLAN is added to a superVLAN. This feature
can be disabled for security purposes.
Example
The following example adds the subVLAN "vsub1" to the superVLAN "vsuper":
configure vlan vsuper add subvlan vsub1
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures subVLAN address ranges on each subVLAN to prohibit the entry of IP addresses from hosts
outside of the configured range.
Syntax Description
vlan_name Specifies a subVLAN name.
ipaddress1 Specifies an IP address.
ipaddress2 Specifies another IP address.
Default
N/A.
Usage Guidelines
There is no error checking to prevent the configuration of overlapping subVLAN address ranges
between multiple subVLANs. Doing so can result in unexpected behavior of ARP within the superVLAN
and associated subVLANs.
Example
The following example configures the subVLAN vsuper to prohibit the entry of IP addresses from hosts
outside of the configured range of IP addresses:
configure vlan vsuper subvlan-address-range 10.1.1.1 - 10.1.1.255
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables or disables ARP suppression on VXLAN tenant VLANs.
Syntax Description
vlan_name VLAN name.
suppress Specifies suppression of ARP on VXLAN tenant VLANs.
arp-only Specifies ARP suppression. Requests may be proxied.
none Disable ARP suppression (default).
Default
ARP is suppressed.
Usage Guidelines
This command is allowed on VXLAN tenant VLANs only.
Example
The following example enables ARP suppression on VXLAN tenant VLAN "tenant1":
configure vlan tenant1 suppress arp-only
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, and X870 slots only.
Description
Assigns a unique 802.1Q tag to the VLAN.
Syntax Description
vlan_name Specifies a VLAN name.
tag Specifies a value to use as an 802.1Q tag. The valid range is from 2 to
4095.
remote-mirroring Specifies that the tagged VLAN is for remote mirroring.
Default
The default VLAN uses an 802.1Q tag (and an internal VLANid) of 1.
Usage Guidelines
If any of the ports in the VLAN use an 802.1Q tag, a tag must be assigned to the VLAN. The valid range
is from 2 to 4094 (tag 1 is assigned to the default VLAN, and tag 4095 is assigned to the management
VLAN).
The 802.1Q tag is also used as the internal VLANid by the switch.
You can specify a value that is currently used as an internal VLANid on another VLAN; it becomes the
VLANid for the VLAN you specify, and a new VLANid is automatically assigned to the other untagged
VLAN.
Example
The following command assigns a tag (and internal VLANid) of 120 to a VLAN named accounting:
configure accounting tag 120
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Associates a UDP forwarding profile to a VLAN.
Syntax Description
vlan_name Specifies a VLAN name.
profilename Specifies a policy file to use for the UDP forwarding profile.
none Removes any UDP forwarding profile from the VLAN.
Default
No UDP profiles are associated with the VLAN.
Usage Guidelines
You can apply a UDP forwarding policy only to an L3 VLAN (a VLAN having at least one IP address
configured on it). If there is no IP address configured on the VLAN, then the command is rejected.
A UDP forwarding policy must contain only the following attributes. Unrecognized attributes are
ignored.
• Match attributes
◦ Destination UDP port number (destination-port)
◦ Source IP address (source-ipaddress)
• Action modified (set) attributes
◦ Destination IP address (destination-ipaddress)
◦ VLAN name (vlan)
Policy files used for UDP forwarding are processed differently from standard policy files. Instead of
terminating when an entry’s match clause becomes true, each entry in the policy file is processed and
the corresponding action is taken for each true match clause.
For example, if the following policy file is used as a UDP forwarding profile, any packets destined for
UDP port 67 are sent to IP address 20.0.0.5 and flooded to VLAN to7:
entry one {
if match all {
destination-port 67 ;
} then {
destination-ipaddress 20.0.0.5 ;
}
}
entry two {
if match all {
destination-port 67 ;
} then {
vlan "to7" ;
}
}
If you include more than one VLAN set attribute or more than one destination-ipaddress set attribute in
one policy entry, the last one is accepted and the rest are ignored.
Note
Although the ExtremeXOS Policy manager allows you to set a range for the destination-port,
you should not specify the range for the destination-port attribute in the match clause of the
policy statement for the UDP profile. If a destination-port range is configured, the last port in
the range is accepted and the rest are ignored.
You can have two valid set statements in each entry of a UDP forwarding policy; one a destination-
ipaddress and one a VLAN. ExtremeXOS currently allows a maximum of eight entries in a UDP
forwarding policy, so you can define a maximum of 16 destinations for one inbound broadcast UDP
packet: eight IP addresses and eight VLANs.
Note
It is strongly advised to have no more than eight entries in a UDP forwarding profile. The UDP
forwarding module processes those entries even if the entries do not contain any attributes
for UDP forwarding. Having more than eight entries drastically reduces system performance.
If the inbound UDP traffic rate is very high, having more than eight entries could cause the
system to freeze or become locked.
If you rename a VLAN referred to in your UDP forwarding profile, you must manually edit the
policy to reflect the new name, and refresh the policy.
You can also validate whether the UDP profile has been successfully associated with the VLAN by using
the command show policy {policy-name | detail}. UDP forwarding is implemented as part
of the netTools process, so the command does display netTools as a user of the policy.
Example
The following example associates the UDP forwarding profile "port123_to_corporate" to VLAN "to-
sales":
configure vlan to-sales udp-profile port123_to_corporate
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
Description
Globally, allows untagged ports to be moved directly from untagged VLANs to either different
untagged VLANs or tagged VLANs.
Syntax Description
on Auto-move global setting is on, which allows you to move untagged
ports from untagged VLANs without first removing the port VLAN
configuration.
off Auto-move global setting is off; you cannot directly move untagged
ports from untagged VLANs without first removing the port VLAN
configuration.
inform Auto-move global setting is on, but you are informed when such a
move occurs (default):
Port # untagged has been auto-moved from VLAN
"x" to "y".
Default
The default is inform.
Usage Guidelines
The global setting of this command impacts the following configuration commands:
• configure vlan add ports on page 1437
• configure vman add ports on page 1486
Moving tagged ports is not impacted by this global setting. You can move tagged ports directly without
having to enable the auto-move global setting.
Example
The following example turns on the auto-move global setting:
configure vlan untagged-ports auto-move on
The following example turns on the auto-move global setting with the inform option:
configure vlan untagged-ports auto-move inform
When the inform keyword is used, you can directly move an untagged port, but you are informed that
this has occurred:
configure vlan untagged-ports auto-move inform
configure vlan v2 add ports 1 untagged
Port 1 untagged has been auto-moved from VLAN "Default" to "v2".
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds the specified port as a loopback port for the specified member VLAN.
Syntax Description
vlan_name Specifies the name of the member VLAN to which you want to add
the loopback port.
port Specifies the port that serves as the loopback port.
Default
N/A.
Usage Guidelines
If two or more member VLANs have overlapping ports (where the same ports are assigned to both
VLANs), each of the member VLANs with overlapping ports must have a dedicated loopback port.
The loopback port can be added to the member VLAN when the member VLAN is created, or you can
use this command to add the loopback port at a later time.
Example
The following example adds port 2:1 as a loopback port for the member VLAN leafvlan:
configure leafvlan vlan-translation add loopback-port 2:1
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the VLAN Translation feature. For features and
the platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a member VLAN to a translation VLAN.
Syntax Description
vlan_name Specifies the name of the translation VLAN to which you want to add
the member VLAN.
member_vlan_name Specifies the member VLAN to be added to the translation VLAN.
port Specifies the port that serves as the loopback port.
loopback-port If two or more member VLANs have overlapping ports (where the
same ports are assigned to both VLANs), each of the member VLANs
with overlapping ports must have a dedicated loopback port.
Default
N/A.
Usage Guidelines
This command configures VLAN tag translation between the two VLANs specified. The member VLAN
is added to the list maintained by translation VLAN. A translation VLAN can have multiple member
VLANs added to it.
Example
The following example adds member VLAN leafvlan to the translation VLAN branchvlan:
configure branchvlan vlan-translation add member-vlan leafvlan
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the VLAN Translation feature. For features and
the platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes the loopback port from the specified member VLAN.
Syntax Description
vlan_name Specifies the name of the member VLAN from which you want to
delete the loopback port.
Default
N/A.
Usage Guidelines
This command disables and deletes the loopback port from the specified member VLAN. This
command does not delete the member VLAN.
Example
The following example deletes the loopback port from the member VLAN leafvlan:
configure leafvlan vlan-translation delete loopback-port
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the VLAN Translation feature. For features and
the platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes one or all member VLANs from a translation VLAN.
Syntax Description
vlan_name Specifies the name of the translation VLAN from which you want to
delete the member VLAN.
member_vlan_name Specifies the member VLAN to be deleted from the translation VLAN.
all Deletes all member VLANs from the specified translation VLAN.
Default
N/A.
Usage Guidelines
This command removes the link between the translation VLAN and the specified member VLANs, but it
does not remove the VLANs from the switch.
Example
The following example deletes member VLAN leafvlan from the translation VLAN branchvlan:
configure branchvlan vlan-translation delete member-vlan leafvlan
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the VLAN Translation feature. For features and
the platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds or deletes Insight (sideband) or management ports to a virtual machine (VM).
Syntax Description
vm Designates a virtual machine.
vm_name Specifies the VM name to add or delete ports to.
add Designates adding Insight ports to a VM.
delete Designates deleting Insight ports from a VM.
ports Designates adding or deleting ports.
portlist Selects the Insight ports to add or delete.
Default
N/A.
Usage Guidelines
Multiple VMs cannot use the same sideband port, but they can share the management port. To view
ports for an existing VM, use the command show vm {vm_name | detail}.
This command does not take effect until the next time the guest VM is started.
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
Example
The following example adds port 1–5 to VM "vm1":
# configure vm vm1 add ports 1-5
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
Description
Adds a virtual interface to a guest virtual machine (VM).
Syntax Description
vm Virtual machine.
vm_name Specifies the VM to add the virtual interface to.
add Specifies adding a virtual interface.
virtual-interface Specifies the virtual interface to add.
name Specifies adding an optional name to the virtual interface.
vf_name Specifies an optional name (unique within this VM) for the virtual
interface to add to the VM.
port Specifies the associated Insight port (physical function for this virtual
interface).
port Specifies the Insight port number.
Default
N/A.
Usage Guidelines
The maximum number of virtual interfaces that you can attach is 16. The Insight port specified cannot
already be a dedicated port within the VM.
To delete a virtual interface from a guest VM, use the configure vm vm_name delete
virtual-interface [name vf_name | mac mac_addr] command.
Example
The following example add a virtual interface to the VM "vm1" on port 7:
# configure vm vm1 add virtual-interface port 7
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
Description
Deletes a virtual interface from a guest virtual machine (VM).
Syntax Description
vm Virtual machine.
vm_name Specifies the VM to delete the virtual interface from.
delete Specifies deleting a virtual interface.
virtual-interface Specifies which virtual interface to delete.
Default
N/A.
Usage Guidelines
To add a virtual interface to a guest VM, use the configure vm vm_name add virtual-
interface port port {vlan vlan_id} {name vf_name} command.
Example
The following example deletes the virtual interface "my_vf" from the VM "vm1":
# configure vm vm1 delete virtual-interface my_vf
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
configure vm cpus
configure vm vm_name cpus num_cpus
Description
Configures an existing virtual machine (VM) CPU allocation.
Syntax Description
vm Designates a virtual machine.
vm_name Specifies the VM name to configure.
cpus Designates specifying the number of CPUs to allocate to the VM.
num_cpus Specifies the number of CPUs to allocate to the VM. Range is 1–2. The
default is 1.
Default
By default, the number of CPUs allocated is 1.
Usage Guidelines
The number of CPUs allocated to a VM is set when the VM is created (default is 1), but you can change
the allocation with this command. To view the number of CPUs currently allocated to a VM, use the
command show vm {vm_name | detail}.
This command does not take effect until the next time the guest VM is started.
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
Example
The following example changes the number of CPUs allocated to VM "vm1" to 2:
# configure vm vm1 cpus 2
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
configure vm memory
configure vm vm_name memory memory_size
Description
Changes the amount of memory assigned to an existing virtual machine (VM).
Syntax Description
vm Designates creating a virtual machine.
vm_name Specifies the VM name to change memory for.
memory Designates specifying the amount of RAM allocated to the VM.
memory_size Specifies the amount of RAM (in MB) allocated to the VM. The default
is 4,096.
Default
By default, the amount of RAM allocated to a VM is 4,096.
Usage Guidelines
The amount of RAM allocated to a VM is set when the VM is created (default is 4,096 MB), but you can
change the allocation with this command. To view the amount of RAM currently allocated to a VM, use
the command show vm {vm_name | detail}.
This command does not take effect until the next time the guest VM is started.
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
Example
The following example changes the amount of RAM allocated to VM "vm1" to 2,000 MB:
# configure vm vm1 memory 2000
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
Description
Configures the VNC display for a virtual machine (VM).
Syntax Description
vm Designates a virtual machine.
vm_name Specifies the VM name to configure the VNC display for.
vnc Specifies providing a display number for VNC access.
none Disables VNC access (default).
vnc_display Specifies the VNC screen number. Range is 0–15.
Default
By default, VNC access is disabled.
Usage Guidelines
For the VNC display number (or screen number), you can use the values from 0 to 15. These correspond
to TCP ports 5,900 to 5,915.
Multiple VMs can be configured with the same VNC display, but VMs configured with the same display
number cannot run at the same time. A VM cannot be started if the VNC port is already in use.
For security reasons, the VNC display is only accessible using SSH tunnel.
Example
The following example enables VNC on VM "vm1" with display number 3:
# configure vm vm1 vnc 3
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
Description
Adds one or more ports to a VMAN.
Syntax Description
vman-name Specifies the name of the VMAN to configure.
vman_id Specifies the ID of the VMAN to configure
all Specifies all switch ports.
port_list Specifies a list of ports.
Default
If you do not specify a parameter, the default value is untagged, which creates a CNP.
Usage Guidelines
This command adds ports as either CNPs or PNPs. To add a port to a VMAN as a CEP, use the following
command:
configure vman add ports cep on page 1489
The VMAN must already exist before you can add (or delete) ports. VMAN ports can belong to load-
sharing groups.
When a port is configured serve as a CNP for one VMAN and A PNP for another VMAN, it inspects the
VMAN ethertype in received packets. Packets with a matching ethertype are treated as tagged and
switched across the associated PNP VMAN. Packets with a non-matching ethertype are treated as
untagged and forwarded into the associated CNP VMAN.
When a port is configured only as a CNP (an untagged VMAN member), whether the VMAN ethertype
is 0x8100 or otherwise, all received packets ingress the associated VMAN regardless of the packet's
tagging.
Note
If you use the same name across categories (for example, STPD and EAPS names), we
recommend that you specify the identifying keyword as well as the actual name. If you do not
use the keyword, the system may return an error message.
• Multiple VMAN roles can be combined on one port with certain VLAN types as shown in the
following table.
Table 22: Port Support for Combined VMAN Roles and VLANs
Platform Combined Combined Combined Combined
CNP, CEP, and PNP, CNP, PNP and PNP and
Tagged and CEP Tagged VLAN Untagged
VLAN , VLAN
ExtremeSwitching X460-G2, X670-G2 X X X X
Note: If the
secondary
VMAN
ethertype is
selected for
the port, it
must be set
to 0x8100.
Note
If you already configured VLANs and VMANs on the same switch using ExtremeXOS 11.4, you
cannot change the VMAN ethertype from 0X8100 without first removing either the VLAN or
VMAN configuration.
Example
The following example assigns ports 1:1, 1:2, 1:3, and 1:6 to a VMAN named accounting:
configure vman accounting add ports 1:1, 1:2, 1:3, 1:6 tag 100
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
2 Subsets of this group are also supported. That is, any two of these items are supported.
3 When a CNP is combined with a CEP or tagged VLAN, any CVIDs not explicitly configured for a CEP or tagged
VLAN are associated with the CNP.
4 A PNP (tagged VMAN) and a CNP (untagged VMAN) or CEP cannot be combined on a port for which the
selected VMAN ethertype is 0x8100.
Description
Adds one or more switch ports to the specified VMAN as Customer Edge Ports (CEPs), and configures
the CVIDs on those ports to map to the VMAN.
Syntax Description
vman_name Specifies the VMAN to configure.
vman_id Specifies the VMAN ID to configure.
port_list Specifies a list of ports.
cvid_first Specifies a CVLAN ID (CVID) or the first in a range of CVIDs that the
CEP will accept and map to the specified VMAN. Valid values are
1-4095.
cvid_last Specifies the last in a range of CVIDs that the CEP will accept and map
to the VMAN. Valid values are 1-4095.
translate Enables translation of the specified CEP CVID range to the specified
VMAN CVID range.
cvid_first_xlate Specifies a VMAN CVID or the first in a range of VMAN CVIDs to which
the CEP CVIDs will map. Valid values are 1-4095.
cvid_last_xlate Specifies the last in a range of VMAN CVIDs to which the CEP CVIDs
will map. Valid values are 1-4095. The number of VMAN CVIDs in this
range must equal the number of CEP CVIDs specified in this
command.
port-cvid Port's customer VLAN ID used for untagged packets.
port_cvid Customer VLAN ID assigned to untagged packets from 1.
Default
N/A.
Usage Guidelines
If you specify only one CVID or a range of CVIDs without translation, the specified CVIDs are mapped to
the specified VMAN and appear unchanged in the VMAN.
If you specify CVID translation, the CEP CVIDs map to different VMAN CVIDs. The number of CEP CVIDs
specified must equal the number of VMAN CVIDs specified. The first CEP CVID in the specified range
maps to the first CVID in the range specified for the VMAN. The difference between cvid_first and
cvid_first_xlate establishes an offset N that maps CEP CVIDs to VMAN CVIDs. (Offset N =
cvid_first_xlate - cvid_first.) The translated VMAN CVID that corresponds to a CEP CVID can be
determined as follows:
Note
CVID translation can reduce the number of CVIDs that can be mapped to VMANs.
After you enable and configure a CEP with this command, you can use the following command to map
additional CVIDs on the port to the VMAN:
configure [ {vman} vman_name | vman vman_id] ports port_list add cvid
cvid_first {- cvid_last} {translate cvid_first_xlate {-
cvid_last_xlate}}
When this command specifies multiple ports, each port gets an independent CVID map; the ports do
not share a common map. Changes to the CVID map affect only the ports specified in the configuration
command. For example, consider the following commands:
After these commands are entered, port 1 maps CVIDs 10 and 11 to VMAN vman1, and port 2 maps only
CVID 10 to vman1.
You can add the same port as a CEP to multiple VMANs. A port can also support multiple VMANs in
different roles as shown in Table 22 on page 1488.
To view the CEP CVID configuration for a port, use the show vman command.
ExtremeXOS 21.1 adds an optional port CVID parameter to the existing untagged and CEP VMAN port
configuration options. When present, any untagged packet received on the port will be double tagged
with the configured port CVID and the SVID associated with the VMAN. If the port is untagged, packets
received with a single CVID will still have the SVID added as usual. If the port is CEP, only untagged and
any specifically configured CVIDs will be allowed. As double tagged packets are received from tagged
VMAN ports and forwarded to untagged VMAN ports, the SVID associated with the VMAN is stripped.
Additionally, the CVID associated with the configured Port CVID is also stripped in the same operation.
If the port is CEP and CEP egress filtering is enabled, only the specified port-cvid and cvids are allowed
to egress.
Example
The following example configures port 1 as a CEP for VMAN vman1 and specifies that CEP CVID 5 maps
to CVID 5 on the VMAN:
configure vman vman1 add port 1 cep cvid 5
The following example configures port 1 as a CEP for VMAN vman1 and enables the port to translate
CEP CVIDs 10-19 to VMAN CVIDs 20-29:
configure vman vman1 add port 1 cep cvid 10 - 19 translate 20 - 29
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or more ports from a VMAN.
Syntax Description
vman-name Specifies a VMAN name.
vman_list Specifies a VMAN list name.
all Specifies all ports in the VMAN.
port_list Specifies a list of ports.
Default
N/A.
Usage Guidelines
The VMAN must already exist before you can delete ports.
Example
The following example deletes ports 1, 2, 3, and 6 on a switch for a VMAN named accounting:
configure vman accounting delete ports 1,2,3,6
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Changes the default ethertype for the VMAN header.
Syntax Description
value Specifies an ethertype value in the format of 0xffff.
primary Assigns the ethertype as the primary Ethernet value.
secondary Assigns the ethertype as the secondary Ethernet value.
Default
Ethertype value of 0x88a8 and type primary.
Usage Guidelines
The software supports two VMAN ethertype values: a primary value and a secondary value. By default,
the primary ethertype applies to all VMANs. To use the secondary ethertype, define the ethertype with
this command, and then assign the secondary ethertype to ports with the following command:
configure port port_list ethertype {primary | secondary}
If your VMAN transits a third-party device (other than an Extreme Networks device), you must
configure the ethertype for the VMAN tag as the ethertype that the third-party device uses. If you
configure both primary and secondary ethertypes, you can connect to devices that use either of the
two values assigned.
The system supports all VMAN ethertypes, including the standard ethertype of 0x8100.
Example
The following command changes the VMAN ethertype value to 8100:
configure vman ethertype 0x8100
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds one or more CVIDs to a CEP.
Syntax Description
vman_name Specifies the VMAN to configure.
vman_id Specifies the VMAN ID to configure.
port_list Specifies a list of ports.
cvid_first Specifies a Customer VLAN ID (CVID) or the first in a range of CVIDs
that the CEP will accept and map to the specified VMAN. Valid values
are 1-4095.
cvid_last Specifies the last in a range of CVIDs that the CEP will accept and map
to the VMAN. Valid values are 1-4095.
translate Enables translation of the specified CEP CVID range to the specified
VMAN CVID range.
cvid_first_xlate Specifies a VMAN CVID or the first in a range of VMAN CVIDs to which
the CEP CVIDs will map. Valid values are 1-4095.
cvid_last_xlate Specifies the last in a range of VMAN CVIDs to which the CEP CVIDs
will map. Valid values are 1-4095. The number of VMAN CVIDs in this
range must equal the number of CEP CVIDs specified in this
command.
port-cvid Port's customer VLAN ID used for untagged packets.
port_cvid Customer VLAN ID assigned to untagged packets from 1.
Default
N/A.
Usage Guidelines
Before you can add CVIDs to CEPs, you must configure the target physical ports as CEPs using the
following command:
configure vman add ports on page 1486
If you specify only one CVID or a range of CVIDs without translation, the specified CVIDs are mapped to
the specified VMAN and appear unchanged in the VMAN.
If you specify CVID translation, the CEP CVIDs map to different VMAN CVIDs. The number of CEP CVIDs
specified must equal the number of VMAN CVIDs specified. The first CEP CVID in the specified range
maps to the first CVID in the range specified for the VMAN. The difference between cvid_first and
cvid_first_xlate establishes an offset N that maps CEP CVIDs to VMAN CVIDs. (Offset N =
cvid_first_xlate - cvid_first.) The translated VMAN CVID that corresponds to a CEP CVID can be
determined as follows:
Note
CVID translation can reduce the number of CVIDs that can be mapped to VMANs.
When this command specifies multiple ports, each port gets an independent CVID map; the ports do
not share a common map. Changes to the CVID map affect only the ports specified in the configuration
command. For example, consider the following commands:
configure vman vman1 add port 1-2 cep cvid 10
configure vman vman1 port 1 add cvid 11
After these commands are entered, port 1 maps CVIDs 10 and 11 to VMAN vman1, and port 2 maps only
CVID 10 to vman1.
To view the CEP CVID configuration for a port, use the show vman command.
Example
The following example adds CVIDs 20-29 to port 1 and VMAN vman1 and enables translation to CVIDs
30-39:
configure vman vman1 port 1 add cvid 20 - 29 translate 30 - 99
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on all platform.
Description
Deletes one or more CVIDs from a CEP.
Syntax Description
vman_name Specifies the VMAN to configure.
vman_list Specifies the VMAN list to configure.
port_list Specifies a list of ports.
cvid_first Specifies a CVID or the first in a range of CVIDs that are to be deleted.
Valid values are 1-4095.
cvid_last Specifies the last in a range of CVIDs that are to be deleted. Valid
values are 1-4095.
Default
N/A.
Usage Guidelines
Each CEP has its own CVID map, and this command deletes CVIDs only from the ports specified with
this command.
If all the CVIDs are deleted from a CEP, the CEP is deleted from the VMAN.
To view the CEP CVID configuration for a port, use the show vman command.
Example
The following command deletes CVID 15 on port 1 from VMAN vman1:
configure vman vman1 port 1 delete cvid 15
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a VMAN to use a specific protocol filter.
Syntax Description
vman_name Specifies a VMAN name.
vman_list Specifies a VMAN list.
protocol Specifies a protocol filter.
filter Specifies a protocol filter.
filter_name Specifies a protocol filter name.
Default
N/A.
Usage Guidelines
Use this command to configure a VMAN to use a specific protocol filter.
Protocol Filters
These devices do not forward packets with a protocol-based VLAN set to AppleTalk. To ensure that
AppleTalk packets are forwarded on the device, create a protocol-based VLAN set to “any” and define
other protocol-based VLANs for other traffic, such as IP traffic. The AppleTalk packets pass on the “any”
VLAN, and the other protocols pass traffic on their specific protocol-based VLANs.
Example
The following example configures the protocol filter “my_filter” to vlan v1:
configure vlan v1 protocol my_filter
configure vlan v1 protocol filter my_filter
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Assigns a tag to a VMAN.
Syntax Description
vman_name Specifies a VMAN name.
tag Specifies a value to use as the VMAN tag. The valid range is from 2 to
4094.
Default
N/A.
Usage Guidelines
Every VMAN requires a unique tag.
You can specify a value that is currently used as an internal VLAN ID on another VLAN; it becomes the
VLAN ID for the VLAN you specify, and a new VLAN ID is automatically assigned to the other untagged
VLAN.
Example
The following example assigns a tag of 120 to a VMAN named "accounting":
configure vman accounting tag 120
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the authentication database options and sequence for VM authentication.
Syntax Description
nms Specifies the configured Network Management System (NMS).
vm-map Specifies the configured VMMAP file.
local Specifies the configured local database.
Default
nms vm-map local.
Usage Guidelines
The switch attempts VM authentication in the sequence specified. For example, in the default
configuration, the switch attempts NMS authentication first, VMMAP authentication second, and local
authentication third. If nms is specified, the switch always attempts NMS authentication before
attempting VMMAP file authentication.
Example
The following command configures the database authentication order:
# configure vm-tracking authentication database-order local nms vm-map
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Specifies a policy file or dynamic ACL rule to apply to VMs during periods that are outside of the
approved time slot for that VM.
Syntax Description
policy_name Specifies the name of a policy file to apply to the VM authentication
request.
rule_name Specifies the name of an ACL rule to apply to the VM authentication
request.
Default
N/A.
Usage Guidelines
This command is not supported in this software release. It will be supported in a future release.
The none option applies no policy name or ACL rule during periods that are outside of the approved
time slot for that VM.
Note
This command is provided to support future identity management features. It serves no
practical purpose in this release.
Example
The following command applies no policy name or ACL rule during periods that are outside of the
authorized authentication period:
# configure vm-tracking blackhole none
History
This command was first visible in ExtremeXOS 12.5, but it is not supported in this release. This command
will be supported in a future release.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures the parameters associated with a local VM database entry to be used for VM MAC local
authentication.
Syntax Description
mac Specifies the MAC address for the VM database entry you want to
configure.
name Specifies a name to represent this VM in show vm-tracking command
display.
ipaddress Specifies the IP address for the VM. This must match the IP address
configured on the VM.
vpp_name Specifies the name of a VPP to apply to the local VM.
tag VLAN tag between 1 and 4094.
vr_name Virtual router name.
Default
N/A.
Usage Guidelines
Before you configure a VM entry in the local VM database, you must create the entry with the create
vm-tracking local-vm command.
Before you assign an VPP to a VM entry in the local VM database, you must create the VPP with the
create vm-tracking vpp command.
Example
The following command configures an IP address for the VM entry specified by the MAC address:
# configure vm-tracking local-vm mac-address 00:E0:2B:12:34:56 ip-address 10.10.10.1
History
This command was first available in ExtremeXOS 12.5.
The ingress-vpp and egress-vpp options were replaced with the vpp option in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures the timeout period for authentication attempts with the configured NMS servers.
Syntax Description
seconds Specifies the timeout period in seconds.
Default
3 seconds.
Usage Guidelines
None.
Example
The following command configures the switch to allow 1 minute for successful authentication of a VM
with the NMS server:
# configure vm-tracking nms timeout 60
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures the switch RADIUS client to an NMS for VM authentication.
Syntax Description
primary | secondary Specifies the whether you are configuring the primary or secondary
NMS.
ipaddress Specifies the NMS IP address.
hostname Specifies the NMS DNS hostname.
udp_port Specifies the UDP port number of the NMS application.
client_ip Specifies the client IP address, which is the switch IP address on the
interface leading to the NMS.
encrypted Specifies that the secret key for communications with the NMS is
encrypted.
secret Specifies a key or password for communications with the NMS.
vr_name Specifies the VR that is used to access the NMS.
Default
N/A.
Usage Guidelines
The NMS is a RADIUS server such as the one provided with Ridgeline.
Example
The following command configures the switch to authenticate VMs through the primary NMS server
Ridgeline using the password password:
# configure vm-tracking nms primary server Ridgeline client-ip 10.10.3.3 shared-secret
password
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures FTP file synchronization for NVPP and VMMAP files.
Syntax Description
primary | secondary Specifies the whether you are configuring the primary or secondary
FTP server.
ipaddress Specifies the FTP server IP address.
vr_name Specifies the VR that is used to access the FTP server.
seconds Specifies how often the switch updates the local files that are
synchronized with the FTP server. The range is 40 to 3600 seconds.
path_name Specifies the path to the repository server files from the FTP server
root directory. The default directory for repository server files is: pub.
user_name Specifies a user name for FTP server access. If no username is
specified, the switch uses user name anonymous.
encrypted This keyword indicates that the specified password is encrypted.
password Specifies the password for the specified user name.
Default
Refresh interval: 600 seconds.
Usage Guidelines
Some jitter is added to the refresh interval period to prevent all switches from downloading files at the
same time.
Example
The following example configures the switch to refresh the VMMAP and NVPP files from primary FTP
server ftp1 every five minutes:
# configure vm-tracking repository primary server ftp1 refresh-interval 300
History
This command was first available in ExtremeXOS 12.5.
Support for specifying an FTP user name was added in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures the RADIUS reauthentication period for VM MAC addresses.
Syntax Description
reauth_period Specifies the reauthentication period in seconds. The ranges are 0 and
30-7200 seconds.
Default
0 seconds.
Usage Guidelines
One way to periodically apply Virtual Port Profiles (VPPs) to VM MAC addresses is to configure a
reauthentication period. At the end of each reauthentication period, the switch reauthenticates each VM
MAC address and applies any updated VPPs.
This command applies to only those VMs that authenticate through RADIUS. Reauthentication is
disabled when the reauthentication period is set to 0 seconds. When reauthentication is disabled, the
VM MAC address remains authenticated until the FDB entry for that VM expires.
Example
The following command enables RADIUS server reauthentication at 2 minute intervals:
# configure vm-tracking timers reauth-period 120
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures an LVPP to use the specified policy or ACL rule.
Syntax Description
vpp_name Specifies the name of an existing LVPP.
add Specifies whether the LVPP should start using the specified policy or
rule.
ingress Specifies that the policy mapped to the LVPP is for ingress traffic.
egress Specifies that the policy mapped to the LVPP is for egress traffic.
policy_name Specifies a policy to add to or delete from the LVPP.
rule_name Specifies a dynamic ACL rule to add to or delete from the LVPP.
Default
N/A.
Usage Guidelines
Multiple ACL or policy files can be mapped to each LVPP. A maximum of 8 ingress and 4 egress ACL or
policies are available to be mapped to each LVPP. If the policy file or dynamic rule specified in this
command fails to bind, then the CLI command is rejected.
Before you can configure an LVPP, you must first create it with the create vm-tracking vpp
command.
Example
The following command configures LVPP vpp1 to use the dynamic ACL rule named rule1 for ingress
traffic:
# configure vm-tracking vpp vpp1 add ingress dynamic-rule rule1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Configures whether counters need to be installed for Virtual Machine MAC which receives this VPP
mapping.
Syntax Description
ingress-only Only counts packets ingressing the switch whose source MAC address
matches VM MAC.
egress-only Only counts packets egressing the switch whose source MAC address
matches VM MAC.
both Counts packets ingressing and egressing the switch whose source
MAC address matches VM MAC.
none No packets will be counted.
Default
N/A.
Usage Guidelines
Use this command to configure whether counters need to be installed for Virtual Lachine MAC which
receives this VPP mapping.
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Specifies that the LVPP should stop using the specified policy or rule.
Syntax Description
vpp_name Specifies the name of an existing LVPP.
delete Specifies whether the LVPP should stop using the specified policy or
rule.
ingress Specifies that the policy mapped to the LVPP is for ingress traffic.
egress Specifies that the policy mapped to the LVPP is for egress traffic.
policy_name Specifies a policy to add to or delete from the LVPP.
rule_name Specifies a dynamic ACL rule to add to or delete from the LVPP.
Default
N/A.
Usage Guidelines
Multiple ACL or policy files can be mapped to each LVPP. A maximum of 8 ingress and 4 egress ACL or
policies are available to be mapped to each LVPP. If the policy file or dynamic rule specified in this
command fails to bind, then the CLI command is rejected.
Before you can configure an LVPP, you must first create it with the create vm-tracking vpp
command.
Example
The following command configures LVPP vpp1 to use the dynamic ACL rule named rule1 for ingress
traffic:
# configure vm-tracking vpp vpp1 add ingress dynamic-rule rule1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command configures the VLAN tag and VR name for VPP. If the detected VM MAC uses this VPP,
then the port in which the VM MAC is detected will be placed on this VR/VLAN.
Syntax Description
vpp_name Specifies a name for the LVPP.
tag Specifies a name for the VLAN tag.
vr_name Specifies a name for the Virtual Router.
Default
N/A.
Usage Guidelines
Use this command to configure the VLAN tag and VR name for VPP. If the detected VM MAC uses this
VPP, then the port in which the VM MAC is detected will be placed on this VR/VLAN.
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
configure vpls
configure vpls vpls_name {dot1q [ethertype hex_number | tag [include |
exclude]]} {mtu number}
Note
This command has been replaced with the following command: configure l2vpn
[vpls vpls_name | vpwsvpws_name] {dot1q [ethertypehex_number |
tag [include | exclude]]} {mtunumber} .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Configures VPLS parameters.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
dot1q Specifies the action the switch performs with respect to the 802.1Q ethertype or
tag.
ethertype Overwrites the ethertype value for the customer traffic sent across the PW.
hex_number Identifies the ethertype, uses the format of 0xN.
tag Specifies the action the switch performs with respect to the 802.1Q tag.
include Includes the 802.1Q tag when sending packets over the VPLS L2 VPN.
exclude Strips the 802.1Q tag before sending packets over the VPLS L2 VPN.
mtu Specifies the MTU value of the VPLS transport payload packet.
number The size (in bytes) of the MTU value. The configurable MTU range is 1492 through
9216. The default VPLS MTU value is 1500.
Default
dot1q tag - excluded.
Usage Guidelines
This command configures the VPLS parameters. PWs are point-to-point links used to carry VPN traffic
between two devices within the VPLS. Each device must be configured such that packets transmitted
between the endpoints are interpreted and forwarded to the local service correctly. The optional
ethertype keyword may be used to overwrite the Ethertype value for the customer traffic sent across
the PW. By default, the configured switch ethertype is used. If configured, the ethertype in the outer
802.1q field of the customer packet is overwritten using the configured ethertype value. The ethertype
value is ignored on receipt.
Optionally, the switch can be configured to strip the 802.1q tag before sending packets over the VPLS
L2 VPN. This capability may be required to provide interoperability with other vendor products or to
emulate port mode services. The default configuration is to include the 802.1q tag.
The mtu keyword optionally specifies the MTU value of the VPLS transport payload packet (customer
packet). The MTU value is exchanged with VPLS-configured peer nodes. All VPLS peer nodes must be
configured with the same MTU value. If the MTU values do not match, PWs cannot be established
between VPLS peers. The MTU values are signaled during PW establishment so that endpoints can
verify that MTU settings are equivalent before establishing the PW. By default the VPLS MTU is set to
1500. The configurable MTU range is 1492 through 9216. Changing the MTU setting causes established
PWs to terminate. VPLS payload packets may be dropped if the VPLS MTU setting is greater than the
MPLS MTU setting for the PW interface.
Note
The maximum MTU value supported depends on the current configuration options. For more
information, see Configuring the Layer 2 VPN MTU in the ExtremeXOS 30.5 User Guide.
Example
The following commands change the various parameters of a particular VPLS:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: . This command is still
supported for backward compatibility, but it will be removed from a future release, so we
recommend that you start using the new command.
Description
Configures a VPLS or H-VPLS peer for the node you are configuring.
Syntax Description
vpls_name Specifies the VPLS for which you are configuring a peer.
ipaddress Specifies the IP address of the peer node.
core Specifies that the peer is a core node.
full-mesh Specifies that the peer is a core full-mesh node. This is the default setting if
neither the core or spoke options are specified.
primary Specifies that the peer is an H-VPLS core node and configures a primary H-
VPLS connection to that core node.
secondary Specifies that the peer is an H-VPLS core node and configures a secondary H-
VPLS connection to that core node.
spoke Specifies that the peer is a H-VPLS spoke node.
Default
N/A.
Usage Guidelines
Up to 32 core nodes can be configured for each VPLS. H-VPLS spoke nodes can peer with core nodes.
Nodes can belong to multiple VPLS instances. The ipaddress parameter identifies the VPLS node that is
the endpoint of the VPLS PW.
Core nodes must be configured in a full-mesh with other core nodes. Thus, all core nodes in the VPLS
must have a configured PW to every other core node serving this VPLS. By default, the best LSP is
chosen for the PW. The underlying LSP used by the PW can be configured by specifying the named LSP
using the CLI command configure l2vpn [vpls vpls_name | vpwsvpws_name]
peeripaddress [add | delete] mpls lsplsp_name .
Spoke nodes establish up to two point-to-point connections to peer with core nodes. If both primary
and secondary peers are defined for a spoke node, the spoke node uses one of the peers for all
communications. If both peers are available, the spoke node uses the connection to the primary peer. If
the primary peer connection fails, the spoke node uses the secondary peer. If the primary peer later
recovers, the spoke node reverts back to using the primary peer.
Example
The following command adds a connection from the local core switch to the core switch at 1.1.1.202:
The following command adds a connection from the local core switch to the spoke switch at 1.1.1.201:
The following command adds a primary connection from the local spoke switch to the core switch at
1.1.1.203:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the command below. This command is still supported
for backward compatibility, but it will be removed from a future release, so we
recommend that you start using the new command.
Description
Deletes a VPLS peer from the specified vpls_name.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
ipaddress Specifies the IP address for the peer node that is the endpoint of the
VC-LSP.
all Deletes all VPLS peers.
Default
N/A.
Usage Guidelines
This command deletes a VPLS peer from the specified vpls_name. When the VPLS peer is deleted, VPN
connectivity to the VPLS peer is terminated. The all keyword may be used to delete all peers associated
with the specified VPLS.
Example
The following example removes connectivity to 1.1.1.202 from VPLS1:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: configure l2vpn
[vpls vpls_name | vpws vpws_name] delete service [{vlan}
vlan_name | {vman} vman_name] .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Deletes local VPLS service from the specified vpls_name.
Syntax Description
vpls_name Identifies the VPLS interface within the switch (character string).
vlan_name Logically binds the VLAN to the specified VPLS.
vman_name Adds the named VMAN to the VPLS.
Default
N/A.
Usage Guidelines
This command deletes the local VPLS service from the specified vpls_name. Specifying the
vlan_name or vman_name deletes the service from the VPLS. If there are no services configured for
the VPLS, all PWs within the VPLS are terminated from the switch.
Example
The following example removes a service interface from a VPLS:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: configure l2vpn
[vpls [vpls_name | all] | vpws [vpws_name | all]] health-check
vccv {intervalinterval_seconds} {fault-
multiplierfault_multiplier_number} .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Configures the VCCV health check test and fault notification intervals for the specified VPLS instance.
Syntax Description
vpls_name Identifies the VPLS instance for which health check is to be configured.
all Specifies that the configuration applies to all VPLS instances on the local node.
interval_secon Defines the interval between health check tests. The range is 1 to 10 seconds.
ds
fault_multipli Specifies how long health check waits before a warning level message is logged.
er_ number The wait period is the interval_seconds multiplied by the
fault_multiplier_number. The fault_multiplier_number range is
2 to 6.
Default
Interval is 5 seconds.
Fault mulitplier is 4.
Usage Guidelines
The VCCV health-check configuration parameters can be configured at anytime after the VPLS has
been created.
Example
The following command configures the health check feature on the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures L2PT profiles on service interfaces.
Syntax Description
l2vpn Specifies the Layer 2 Virtual Private Network.
vplsvpls_name Specifies Virtual Private LAN Service over MPLS, and the
alphanumeric string identifying the VPLS VPN.
peer ipaddress Specifies the VPLS peer, and the IPv4 address.
l2pt profile Specifies Layer 2 protocol tunneling and the L2PT profile for the PW.
none Specifies that no L2PT profile should be bound to the PW (default).
profile_name Specifies the L2PT profile to be bound to the PW.
Default
Disabled.
Usage Guidelines
Use this command to configure L2PT profiles on service interfaces.
Example
The following example unbind the L2PT profile from peer 1.1.1.1 of VPLS cust2:
configure l2vpn vpls cust2 peer 1.1.1.1 l2pt profile none
The following example binds my_l2pt_prof with peer 1.1.1.1 of VPLS cust1. my_l2pt_prof specifies
tunneling actions:
configure l2vpn vpls cust1 peer 1.1.1.1 l2pt profile my_l2pt_prof
Error: Tunnel action may be applied only to ports.
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Note
This command has been replaced with the following command: configure l2vpn
[vpls vpls_name | vpwsvpws_name] peer ipaddress [add | delete]
mpls lsplsp_name .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Configures a named LSP to be used for the PW to the specified VPLS peer.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
ipaddress Specifies the IP address for the peer node that is the endpoint of the
PW-LSP.
add Permits addition of up to four RSVP-TE LSPs to the VPLS peer.
delete Removes the LSP specified by the lsp_name parameter from the PW-
LSP aggregation list.
lsp_name Removes the specified lsp.
Default
N/A.
Usage Guidelines
This command configures a named LSP to be used for the PW to the specified VPLS peer. The delete
keyword removes the LSP specified by the lsp_name. If all the named LSPs are deleted to the
configured VPLS peer, VPLS attempts to use the best-routed path LSP, if one exists. The delete portion
of this command cannot be used to remove a named LSP that was selected by the switch as the best
LSP. If no LSPs exist to the VPLS peer, VPN connectivity to the VPLS peer is lost. Currently, the VPLS
PW uses only one LSP.
In ExtremeXOS 15.4, this command is modified to display an informational message when multiple
transport LSPs are configured for a VPLS PW, when LSP sharing is not enabled. This message is only
displayed once per switch boot.
Example
The following examples add and remove a named LSP:
configure vpls vpls1 peer 1.1.1.202 add mpls lsp "to-olympic4"
configure vpls vpls1 peer 1.1.1.202 delete mpls lsp "to-olympic4"
configure vpls vpls1 peer 20.20.20.83 add mpls lsp lsp2
Note
To share LSPs in HW, use the enable l2vpn sharing command.
History
This command was first available in ExtremeXOS 11.6.
This command was modified, in ExtremeXOS 15.4, to display an informational message when multiple
transport LSPs are configured for a VPLS PW, and LSP sharing is not enabled.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: configure l2vpn
[vpls vpls_name | vpwsvpws_name] peeripaddress [limit-
learningnumber | unlimited-learning] .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Configures the maximum number of MAC SAs (Source Addresses) that can be learned for a given VPLS
and peer.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
ipaddress Specifies the IP address for the peer node that is the endpoint of the
PW-LSP.
limit-learning Specifies a limit to the number of MAC SAs to be learned for the
specified VPLS and peer.
number The maximum number of MAC SAs that can be learned for the
specified VPLS and peer.
unlimited-learning Specifies no limit to the number of MAC SAs to be learned for the
specified VPLS and peer.
Default
Unlimited.
Usage Guidelines
This command configures the maximum number of MAC SAs (Source Addresses) that can be learned
for a given VPLS and peer. This parameter can only be modified when the specified VPLS is disabled.
The unlimited-learning keyword can be used to specify that there is no limit. The default value is
unlimited-learning.
Example
The following example causes no more than 20 MAC addresses to be learned on VPLS1’s PW to 1.1.1.202:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Configures a SNMP VPN identifier for traps from the specified VLPLS.
Syntax Description
vpls_name Specifies the VPLS for which you are configuring the identification string.
identifier Specifies a text string to identify the VPLS in SNMP traps.
Default
N/A.
Usage Guidelines
None.
Example
The following command configures the identifier vpls1trap for SNMP VPN traps on VPLS vpls1:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
In an Extended Edge Switching topology, allows the bridge port extender (BPE) slot assignment to be
applied to an MLAG identifier on the specified MLAG peer when the port connected to the BPE is
physically connected to the MLAG peer switch.
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
mlag-id Specifies setting a unique MLAG identifier of the MLAG port attached
to the bridge port extender (BPE).
mlag_id Sets the MLAG identifier value of the MLAG port attached to the BPE.
Range is 1–65,000.
peer Specifies naming the MLAG peer switch.
peer_name Name of the MLAG peer switch.
slot Specifies configuring the slot identifier for the attached BPE.
slot_num Specifies the BPE slot number. Range is 100–162.
Default
N/A
Usage Guidelines
An Extended Edge Switching topology allows the BPE slot assignment to be applied to an MLAG
identifier on the specified MLAG peer when the port connected to the BPE is physically connected to
the MLAG peer switch.
The same Extended Edge Switching slot number must have been declared on the MLAG peer that has a
port in the MLAG. On the peer with the MLAG port, either this form of the command can be used, or the
traditional form where a controlling bridge port is related to a slot number.
Example
The following example for MLAG peer switch "cb2" declares slot 100 on MLAG "11":
# configure vpex mlag-id 11 peer cb2 slot 100
History
This command was first available in ExtremeXOS 22.7.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X690, X590 series switches.
Description
Allows you to associate a bridge port extender (BPE) to a slot.
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
ports Specifies the switch ports attached to the BPE.
port_list Specifies the switch ports attached to the BPE. Must be in the format
slot:port. Only a single port can be configured at a time.
Note: If the switch port is a LAG, the port specified must be the
master port.
Default
N/A
Usage Guidelines
You must enable VPEX mode (enable vpex) before using this command.
The behavior of this command is similar to assigning slots within a chassis. After assigning a slot
number to the port extender, you can make port-level configuration choices with the familiar
slot:port notation in other commands involving the port extender's ports (for example, configure
vlan v1 add port 100:1).
Example
The following example assigns a BPE attached to switch port 1:23 to slot 100:
configure vpex ports 1:23 slot 100
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X690, X590 series switches.
Description
In an Extended Edge Switching ring topology, places the "ring common" link between approximately
equal length cascades.
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
ring Specifies ring topology changes.
rebalancing Places the ring common link between approximately equal length
cascades.
auto Ring re-balancing will automatically run at the next ring convergence.
off Automatic ring re-balancing is disabled (default).
Default
By default, ring re-balancing is disabled.
Usage Guidelines
This command controls the Extended Edge Switching ring re-balancing operation. Re-balancing may or
may not take place at the time that ring formation is complete, depending on the setting of this
command. An Extended Edge Switching ring consists of two configured Extended Edge Switching
cascades of BPEs that are connected at their ends. The connected link is called the ring common link.
The ring forms automatically. Two control plane cascades span all bridge port extenders (BPEs) in the
ring, with each originating from a controlling bridge (CB) port and ending at the BPE that is connected
to the other CB port. However, the data plane cascades remain as configured (that is, no data plane
traffic crosses the common link). Re-balancing moves the ring common link so that the data plane
cascades are approximately equal in length. The cost of doing this is a data plane disruption to some
BPEs in the ring that is the same as that which would have occurred had a single link in the ring been
broken. Re-balancing is a dynamic operation. It does not change the cascade configurations.
Changing this setting takes effect the next time that a ring experiences a new ring formation. There is
no immediate effect.
You can view your re-balancing selection with the show vpex command.
Example
The following example turns off ring re-balancing:
History
This command was first available in ExtremeXOS 22.7.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X690, X590 series switches.
Description
Assigns a list of ports to the specified VR.
Syntax Description
vr-name Specifies the name of the VR.
port_list Specifies the ports to add to the VR.
Default
By default, all ports are assigned to VR-Default.
Usage Guidelines
When a new VR is created, by default, no ports are assigned, no VLAN interface is created, and no
support for any routing protocols is added. Use this command to assign ports to a VR. Since all ports
are initially assigned to VR-Default, you might need to delete the desired ports first from the VR where
they reside before you add them to the desired VR.
If you plan to assign VR ports to a VLAN, be aware that the ports that you add to a VLAN and the VLAN
itself cannot be explicitly assigned to different VRs. When multiple VRs are defined, consider the
following guidelines while adding ports to a VR:
• A VLAN can belong (either through explicit or implicit assignment) to only one VR.
• If a VLAN is not explicitly assigned to a VR, then the ports added to the VLAN must be explicitly
assigned to a single VR.
• If a VLAN is explicitly assigned to a VR, then the ports added to the VLAN must be explicitly
assigned to the same VR or to no VR.
• If a port is added to VLANs that are explicitly assigned to different VRs, the port must be explicitly
assigned to no VR.
Example
The following example adds all the ports on slot 2 to the VR "vr-acme":
configure vr vr-acme add ports 2:*
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Starts a Layer 3 protocol instance for a VR or VRF.
Syntax Description
vr_name Specifies the name of a VR or a VRF.
protocol Specifies a Layer 3 protocol that you can add or delete.
name Specifies the name of a VR or a VRF. The following protocols are
supported on VRs: RIP, RIPng, OSPF, OSPFv3, BGP, PIM. IS-IS, and
MPLS. The following protocols are supported on VRFs: BGP, OSPFv3.
add Adds a routing protocol to VRF for PE – CE communication .
delete Specifies the name of a VR or a VRF.
Default
By default, none of the dynamic protocols are added to a User VR or a VRF.
Usage Guidelines
When a new VR or VRF is created, by default, no ports are assigned, no VLAN interface is created, and
no support for any routing protocols is added.
MPLS is the only protocol that you can add to or delete from VR-Default. When MPLS is enabled on a
switch, the default configuration adds MPLS to VR-Default. You cannot add or delete any other
protocols from VR-Default, and you cannot add or delete any protocols from the other system VRs, VR-
Mgmt and VR-Control.
Note
You must delete the MPLS protocol from VR-Default before you can add it to a user VR. MPLS
can be active on only one VR within a switch.
When you add a protocol to a VRF, the parent VR starts that protocol, if it was not already running, and
adds a protocol instance to support the VRF.
Note
OSPFv3 protocol can be added only to the user VR and non-VPN VRF.
If a previously configured protocol instance is deleted, the CE routes imported from that protocol into
the VRF RIB is removed.
Example
The following example starts RIP on the VR "vr-acme":
configure vr vr-acme add protocol rip
The following example starts a BGP protocol instance for VRF "vr-widget":
configure vr vr-widget add protocol bgp
History
This command was first available in ExtremeXOS 11.0.
Support for the OSPFv3 and RIPng protocols on user VRs was added in ExtremeXOS 12.5.
Support for the BGP protocol on VRFs was added in ExtremeXOS 12.6.0-BGP.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, X670-G2 , X465, X590, X690,
X870 series switches.
Description
Removes a list of ports from the VR specified.
Syntax Description
vr-name Specifies the name of the VR.
port_list Specifies the ports to remove from the VR.
Default
By default, all ports are assigned to VR-Default.
Usage Guidelines
When a new VR is created, by default, no ports are assigned, no VLAN interface is created, and no
support for any routing protocols is added. Use this command to remove ports from a VR. Since all
ports are initially assigned to VR-Default, you might need to delete the desired ports first from the VR
where they reside before you add them to the desired VR.
Example
The following example removes all the ports on slot 2 from the VR "vr-acme":
configure vr vr-acme delete ports 2:*
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Stops and removes a Layer 3 protocol instance for a VR or VRF.
Syntax Description
vr-name Specifies the name of the VR.
protocol-name Specifies the Layer 3 protocol. The following protocols are supported
on VRs: RIP, RIPng, OSPF, OSPFv3, BGP, PIM. IS-IS, and MPLS. The
following protocols are supported on VRFs: BGP, OSPFv3.
Default
N/A.
Usage Guidelines
MPLS is the only protocol that you can add to or delete from VR-Default. When MPLS is enabled on a
switch, the default configuration adds MPLS to VR-Default. You cannot add or delete any other
protocols from VR-Default, and you cannot add or delete any protocols from the other system VRs, VR-
Mgmt and VR-Control.
Note
You must delete the MPLS protocol from VR-Default before you can add it to a user VR. MPLS
can be active on only on VR within a switch.
When you delete a protocol from a VRF, the protocol instance is deleted on the parent VR and the CE
routes imported from that protocol into the VRF Routing Information Base (RIB) are removed. The
parent VR continues to run the protocol until that protocol is removed from the VR.
Example
The following example shutdowns and removes RIP from the VR "vr-acme":
configure vr vr-acme delete protocol rip
The following example deletes the BGP protocol instance for VRF "vr-widget":
configure vr vr-widget delete protocol bgp
History
This command was first available in ExtremeXOS 11.0.
Support for the OSPFv3 and RIPng protocols on user VRs was added in ExtremeXOS 12.5.
Support for the BGP protocol on VRFs was added in ExtremeXOS 12.6.0-BGP.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, X670-G2 , X465, X590, X690,
X870 series switches.
configure vr description
configure vr vr_name {description desc_string }
Description
Use this command to configure a description for the specified VR or VRF.
Syntax Description
vr_name Specifies the name of a user VR or a VRF.
desc_string Specifies a text string to describe the VR. If the text string contains
space characters, the entire string must be enclosed with double
quotes (" ").
Default
No description.
Usage Guidelines
This command allows you to add comments about a VRF/VR entity. Entering a NULL string on the CLI
will unconfigure the description string for the VRF/VR. If the description string has spaces in it, then the
string must be enclosed within double quotes (" ").
This text message appears in the show virtual-router command display when the command
specifies a VR name. For VPN VRFs, this message is returned for a mplsL3VPN MIB query of the MIB
variable mplsL3VpnVrfDescription.
Example
The following example configures a description for the VRF "corporate":
configure vr corporate description "VRF for the corporate intranet"
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
configure vr rd
configure vr vrf_name rd [2_byte_as_num:4_byte_number | ip_address:
2_byte_number | 4_byte_as_num:2_byte_number]
Description
Use this command to configure a route-distinguisher (RD) for a VPN VRF.
Syntax Description
vrf_name Specifies the name of a VPN VRF.
rd Specifies a Route Distinguisher for a VRF. It can be either ASN-
related, where it is represented as 2-byte AS number:4-byte
num. It can be IP-address based where it is represented as 4-byte
IP address:2-byte number.
2_byte_as_num Specifies a 2-byte Autonomous System (AS) number.
4_byte_number Specifies a 4-byte number to further identify the RD. This number
can be chosen by organization that configures the RD, and this
number does not need to match any other network configuration
parameters.
ip_address Specifies an IP address to include as part of the RD.
4_byte_as_num Specifies a 4-byte AS number.
2_byte_number Specifies a 2-byte number to further identify the RD. This number
can be chosen by the organization that configures the RD, and this
number does not need to match any other network configuration
parameters.
Default
N/A.
Usage Guidelines
The RD can be specified in the following formats:
• 2_byte_as_num:4_byte_number
Note
Although Route Distinguisher is eight-bytes wide, this CLI accepts only six bytes value. The
first two bytes ("type" field) is deduced from the values entered on the CLI, so it is redundant
to set the type field on the CLI too. If 2-byte as-num:4-byte num is entered on the CLI, the
type field is automatically set to 0. If ip_address:2_byte_number is entered on the CLI, the
type field is automatically set to 1. Type 2 (4-bytes AS number) Route Distinguisher is not
supported.
Route Distinguisher is a mandatory parameter for a VRF. Without this parameter, a VRF
cannot be active and local VPN routes cannot be advertised across the SP’s backbone to the
remote VPN sites.
Use this command to configure or change the RD for a VPN VRF. If you use this command to change
the RD, the Layer 3 VPN associated with that VPN VRF is reset by automatically disabling and re-
enabling the VRF.
RD is added to the beginning of the VPN customer’s IPv4 prefix to make globally unique VPNv4
prefixes. You must configure RD for a VRF to be functional. This command is not applicable for a heavy-
weight traditional VR.
Example
The following examples configure RDs using the two of the supported formats:
configure vr corporate-extreme rd 10.203.134.5:324
configure vr corporate-guest rd 9643:7000
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, X670-G2 , X465 series switches.
configure vr route-target
configure vr vrf_name route-target [import | export | both] [add |
delete] [route_target_extended_community]
Description
Use this command to add or delete entries in the import and export lists for route target extended
communities for a specified VPN VRF.
Syntax Description
vrf_name Specifies the name of a VPN VRF.
import Specifies that the specified route target extended
community is to be added to or deleted from the import list
for the VRF.
export Specifies that the specified route target extended
community is to be added to or deleted from the export list
for the VRF.
both Specifies that the specified route target extended
community is to be added to or deleted from both the
import and export lists for the VRF.
add Specifies that the specified route target extended
community is to be added to the specified list for the VRF.
Default
No default route targets. If you do not specify the import or export options at the CLI, by default
both is assumed.
Usage Guidelines
This command creates lists of import and export route target extended communities for the specified
VRF. Route Target attributes are used to control the VPNv4 route distribution by BGP. Learned routes
(from the PE) that carry a specific route target extended community are imported into all VRFs
configured with that extended community as an import target. Routes learned from a VRF site are
labeled with export route target extended communities configured for that VRF. This is used to control
the VRFs into which the route is imported.
To configure multiple route target extended communities in import or export lists, execute this
command with add option multiple times, once for each extended community. Use the delete option
to remove an extended community from an import or export list. You cannot use this command for a
heavy-weight traditional VR.
Example
The following examples configure route target extended communities using the two supported formats:
configure vr corporate-extreme route-target both add 172.16.186.230:9823
configure vr corporate-guest route-target both add 9643:7002
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, X670-G2 series switches.
configure vr vpn-id
configure vr vrf_name vpn-id 3_byte_oui:4_vpn_index
Description
This command configures a globally unique identifier for a VPN VRF.
Syntax Description
vrf_name Specifies the name of a VPN VRF.
3_byte_oui Specifies an organizationally unique identifier (OUI). The IEEE
organization assigns this identifier to companies. The OUI is restricted
to three bytes and must be entered in hexadecimal format.
4_vpn_index Identifies the VPN within a company. This VPN index is restricted to 4
bytes and must be entered in hexadecimal format.
Default
VPN ID is not configured for VRFs.
Usage Guidelines
The VPN ID uniquely identifies a VPN. This command is only applicable for a VPN VRF. Each VRF
configured in a PE router can have a VPN ID. Use the same VPN ID for the VRFs on other PE routers that
belong to the same VPN. Ensure that the VPN ID is unique for each VPN in the Service Provider
network.
The oui and vpn index parameters must be entered on the CLI in hex format.
Example
The following example assigns VPN ID ac:9f3c8 to a VRF named "corporate-extreme":
configure vr corporate-extreme vpn-id ac:9f3c8
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, X670-G2 series switches.
Description
The first version of this command adds a primary VR or secondary VR to a specified group by supplying
a VLAN name and VRID. The second version of the command deletes a primary VR or secondary VR
from a specified group by supplying a VLAN name and VRID.
Syntax Description
group Form a group of VRRP VRs to operate in high-scale mode.
group_name Specifies the VRRP group name.
add Adds a VR to a VRRP group.
primary-vr Specifies adding/deleting a primary VR of the VRRP group that sends
VRRP advertisement at configured intervals.
secondary-vr Specifies adding/deleting a secondary VR of the VRRP group that
sends VRRP advertisement at a slower rate than the primary VR.
vlan Specifies a VLAN for the VR.
vlan_name Specifies the VLAN name for the VR.
vrid Specifies a VRID for the VR.
vridval Specifies the VRID for the VR.
delete Deletes VR(s) from the VRRP group.
all Specifies that all VRs (secondary and primary) are deleted from the
VRRP group.
vlan_list List of VLAN ID tags (1–4,094).
Default
When adding multiple secondary VRs at once, if no VRIDs are specified, all VRs configured on the
specified VLANs are added to the group.
Example
The following example adds a primary VR VLAN "v1", VRID "1" for VRRP group "ExtremeNet":
configure vrrp group ExtremeNet add primary-vr vlan v1 vrid 1
The following example adds a set of VRRP VRs configured on VLANs having VLAN IDs ranging from 11
to 20. Out of all of the VRs configured on these VLANs only VRs with VRID ranging from 1 to 2 are
added to the VRRP group:
Configure vrrp group ExtremeNet add secondary-vr vlan 11-20 vrid 1-2
The following example adds all VRs configured on given VLANs to the group as secondary VRs:
configure vrrp group ExtremeNet add secondary-vr vlan 11-20
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures fabric routing.
Syntax Description
group Specifies VRRP VRs information that form the group.
group_name Name of the specific VRRP group.
fabric-routing Configures fabric routing on all members of the group.
on Enables fabric routing capability.
off Disables fabric routing capability.
port_list Port list separated by a comma or –.
vlan_name Specifies the name of a VRRP VLAN.
vlan_list VLAN list (1–4,094).
vridval Specifies the VRID for the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
vrid_list List of virtual router IDs (1–255).
Default
N/A
Usage Guidelines
This configuration can be present on all VRRP routers, regardless of the VRRP state of the router. Fabric
routing is enabled only when the VRRP router is in backup state.
You need to configure fabric routing on all members of group when a member’s VRID is reused in
another group.
Example
The following command turns on fabric routing capability on all VR members of the group
"ExtremeNet":
configure vrrp group ExtremeNet fabric-routing on
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a backup VRRP router instance to accept or reject packets addressed to the IP address
owner when operating as the VRRP master.
Additionally, this command provides capability for switches to configure the VRRP virtual IP as NTP
server address.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of a VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
on Specifies that the VRRP instance is to accept packets addressed to the
IP address owner.
off Specifies that the VRRP instance not accept packets addressed to the
IP address owner.
Note:
Ping packets are accepted, regardless of the configuration for this
command.
Default
Off.
Usage Guidelines
When a backup VRRP router operates as master, it accepts VRRP traffic and routes traffic. The backup
router in master mode also accepts ping packets and IPv6 neighbor solicitations and advertisements.
However, because the backup router is not the IP address owner, the default configuration rejects all
other traffic addressed to the IP address owner.
If your network requires that a backup VRRP router in master mode accept all traffic addressed to the IP
address owner, use this command to configure accept-mode on.
In the ExtremeXOS 15.3 release, NTP VRRP Virtual IP support is added. This feature allows you to
configure the VRRP virtual IP as NTP server address. The NTP server when configured on the VRRP
master will listen on the physical and virtual IP address for NTP clients. For this feature to work correctly,
you need to enable accept mode in VRRP. Enabling accept mode allows the switch to process non-ping
packets that have a destination IP set to the virtual IP address.
Example
The following example configures a backup VRRP router in master mode to accept packets addressed
to the IP address owner:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Associates a virtual IP address with a specific VRRP instance.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vlan_id VLAN ID tag (1–4,094).
vridval Specifies the VRID of a VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
ipaddress Specifies a virtual IPv4 or IPv6 address to be assigned to the VRRP
instance.
Default
N/A.
Usage Guidelines
Each VRRP instance is identified by an ID number, VLAN name, and virtual IP address. When two or
more routers are configured with the same VRRP ID number, VLAN name, and virtual IP address, the
routers with matching parameters are all part of the same VRRP instance. One router within the
instance will become the VRRP instance master, and the others will become backup routers for the
VRRP instance.
Most routers within a VRRP instance will have a virtual IP address that is different from the actual IP
addresses configured on the router. If the virtual IP address for a VRRP instance matches an IP address
configured on a host router, the VRRP instance is known as the IP address owner. On the IP address
owner, the VRRP instance priority defaults to 255, and by default, the IP address owner becomes the
VRRP master when VRRP is enabled.
Note
There is no requirement to configure an IP address owner within a VRRP instance.
Before each VRRP router is enabled, it must be configured with at least one virtual IPv4 or IPv6 address.
You can repeat this command to add additional virtual IP addresses to the VRRP router. If a virtual IPv4
address is added to a VRRP router, you cannot later add a virtual IPv6 address. Similarly, if a virtual IPv6
address is added to a VRRP router, you cannot later add a virtual IPv4 address.
Each IPv6 VRRP instance is associated with one and only one virtual link local address, which serves as
the source IP address for subsequent router announcement packets generated by the master VRRP
router. The virtual link local address can be explicitly configured or generated automatically. One way to
explicitly configure the virtual link local address is to add it to the virtual IP address list with this
command.
Example
The following example associates virtual IPv4 address 10.1.2.3 to VRRP router instance 1:
configure vrrp vlan vlan-1 vrid 1 add 10.1.2.3
The following example associates virtual IPv6 address 2001:db8::3452 to VRRP router instance 2:
configure vrrp vlan vlan-1 vrid 2 add 2001:db8::3452
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a tracking entry for the specified route. When this route becomes unreachable, this entry is
considered to be failing.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of the target VRRP instance. To display the
configured VRRP router instances, enter the show vrrp command.
ipaddress Specifies the IPv4 or IPv6 prefix of the route to track.
masklength Specifies the length of the route's prefix.
Default
N/A.
Usage Guidelines
The route specified in this command might not exist in the IP routing table. When you create the entry
for a route, an immediate VRRP failover might occur.
Note
VRRP tracking is not supported on MPLS LSPs.
Example
The following command enables IP route failure tracking for routes to the specified subnet:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a tracking entry for the specified IP address. The entry is tracked using pings to the IP address,
sent at the specified frequency.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vrid vridval Specifies the VRID of the target VRRP instance. To display the
configured VRRP router instances, enter the show vrrp command.
ipaddress Specifies the IPv4 or IPv6 address to be tracked.
frequency seconds Specifies the number of seconds between pings to the target IP
address. The range is 1 to 600 seconds.
miss misses Specifies the number of misses allowed before this entry is considered
to be failing. The range is 1 to 255 pings.
success successes Sets how many ping successes are required for tracking success.
Range is 1–255. (Default is 10 × misses.)
Default
If the number of successes is not specified, the default is ten times the number of misses specified.
Usage Guidelines
Adding an entry with the same IP address as an existing entry causes the new values to overwrite the
existing entry's frequency and miss number.
Example
The following command enables ping tracking for the external gateway at 3.1.0.1, pinging every 3
seconds, and considering the gateway to be unreachable if no response is received to 5 consecutive
pings:
configure vrrp vlan vlan-1 vrid 1 add track-ping 3.1.0.1 frequency 3 miss 5
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document./ph "/>
Description
Configures a VRRP VLAN to track port connectivity to a specified VLAN. When this VLAN is in the down
state, this entry is considered to be failing.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of the target VRRP instance. To display the
configured VRRP router instances, enter the show vrrp command.
target_vlan_name Specifies the name of the VLAN to track.
Default
N/A.
Usage Guidelines
Up to eight VLANs can be tracked.
Deleting a tracked VLAN does not constitute a failover event for the VRRP VLAN tracking it, and the
tracking entry is deleted.
Example
The following command enables VRRP VLAN vlan-1 to track port connectivity to VLAN vlan-2:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Specifies a virtual IPv6 link local address for the VRRP router instance.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of a VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
vll_addr Specifies a virtual link local address to be assigned to the VRRP
instance.
Usage Guidelines
Each IPv6 VRRP instance is associated with one and only one virtual link local address, which serves as
the source IP address for subsequent router announcement packets generated by the master VRRP
router. The virtual link local address can be explicitly configured or generated automatically.
One way to explicitly configure the virtual link local address is to add it to the virtual IP address list with
this command. The new link local address must match the FE80::/64 subnet, and it must match the
address in use on all other router in this VRRP instance.
Note
If an IPv4 address has been added to a VRRP router, you cannot later add any IPv6 address,
so you cannot add a link local address.
Example
The following example associates virtual IPv6 link local address fe80::1111 to VLAN vlan-1:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the time between VRRP advertisements in seconds or centiseconds.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of a VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
interval Specifies an interval value for the time between advertisements. The
range is 1 through 40 seconds or 10 through 4095 centiseconds.
seconds Specifies that the interval value is in seconds. If you do not specify
seconds or centiseconds, the interval value is applied as seconds.
centiseconds Specifies that the interval value is in centiseconds.
Default
The advertisement interval is 1 second.
Usage Guidelines
The advertisement interval specifies the interval between advertisements sent by the master router to
inform the backup routers that its alive. You must use whole integers when configuring the
advertisement interval.
An extremely busy CPU can create a short dual master situation. To avoid this, increase the
advertisement interval.
Note
The milliseconds keyword is replaced by the centiseconds keyword, but the milliseconds
keyword is still recognized to support existing configurations and scripts. Any values specified
in milliseconds are converted to centiseconds. All new configurations and scripts should
specify the interval in either seconds or centiseconds. The maximum value for an interval
specified in seconds is 40. However, the software supports older configurations and scripts
that specify values up to 255, which were supported prior to ExtremeXOS Release 12.7.
To view your VRRP configuration, including the configured advertisement interval, use one of the
following commands:
• show vrrp {virtual-router {vr-name}} {detail}
• show vrrp vlan vlan_name {stats}
If you enter a number that is out of the seconds or centiseconds range, the switch displays an error
message. For example, if the interval value is set to 999 and the centiseconds keyword is missing, the
switch displays an error message similar to the following:
configure vrrp blue vrid 250 advertisement-interval 999 Error:
Advertisement interval must be between 1 and 255 seconds. 999 out of
range
Example
The following command configures the advertisement interval for 15 seconds:
The following command configures the advertisement interval for 200 centiseconds:
History
This command was first available in ExtremeXOS 10.1.
The centiseconds keyword replaced the milliseconds keyword, and the maximum value for intervals
specified in seconds was reduced to 40 in ExtremeXOS 12.7.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a tracking entry for the specified route.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of the target VRRP instance. To display the
configured VRRP router instances, enter the show vrrp command.
ipaddress Specifies the IPv4 or IPv6 prefix of the route.
masklength Specifies the length of the route's prefix.
Default
N/A.
Usage Guidelines
Deleting a tracking entry while VRRP is enabled causes the VRRP VRs state to be re-evaluated for
failover.
Example
The following command disables tracking of routes to the specified subnet for VLAN vlan-1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Descriptioin
Deletes a tracking entry for the specified IP address.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of the target VRRP instance. To display the
configured VRRP router instances, enter the show vrrp command.
ipaddress Specifies the IP address to be tracked.
Default
N/A.
Usage Guidelines
Deleting a tracking entry while VRRP is enabled causes the VRRP VRs state to be re-evaluated for
failover.
A VRRP node with a priority of 255 might not recover from a ping-tracking failure if there is a Layer 2
switch between it and another VRRP node. In cases where a Layer 2 switch is used to connect VRRP
nodes, we recommend that those nodes have priorities of less than 255.
Example
The following command disables ping tracking for the external gateway at 3.1.0.1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes the tracking of port connectivity to a specified VLAN.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
target_vlan_name Specifies the name of the tracked VLAN.
Default
N/A.
Usage Guidelines
Deleting a tracking entry while VRRP is enabled causes the VRRP VRs state to be re-evaluated for
failover.
Example
The following command disables the tracking of port connectivity to VLAN vlan-2:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a virtual IPv4 or IPv6 address from a specific VRRP router.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vlan_id VLAN ID tag (1–4,094).
vridval Specifies the VRID of the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
ipaddress Specifies the virtual IP address to be deleted from the VRRP instance.
This is common for IPv4/IPv6 addresses.
Usage Guidelines
When a VRRP router is enabled, it must have at least one virtual IP address. When the VRRP router is
not enabled, there are no restrictions on deleting the IP address.
Example
The following command removes IP address 10.1.2.3 from VLAN vlan-1:
configure vrrp vlan vlan-1 vrid 1 delete 10.1.2.3
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Specifies that a higher priority backup router does not preempt a lower priority master.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID of a VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
Default
The default setting is preempt.
Usage Guidelines
The preempt mode controls whether a higher priority backup router preempts a lower priority master.
dont-preempt prohibits preemption. The router that owns the virtual IP address always preempts,
independent of the setting of this parameter.
Example
The following command disallows preemption:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
All instances of VRRP have host-mobility off by default. Configuring host-mobility to “on” state starts
ARP route learning. By default, all ports perform the route learning. Configuring host-mobility excluded-
ports will disable the route learning on the port list provided. All ports of the VRRP VLAN that are
connected to another router should be excluded. If ports are not excluded, routes are created for
devices as if they are directly connected and this may cause traffic to take a longer route.
Syntax Description
host-mobility Exportable Host Route learning via ARP/ND on the specified VLAN
and VRID.
on Advertise host routes for hosts learned via ARP/ND.
off Do not advertise host routes for hosts learned via ARP/ND.
exclude-ports Exclude ports from host-mobility route learning (Default: no ports are
excluded).
add Add ports to host-mobility exclude list; host-mobility routes will not
be learned on the ports.
delete Delete ports from host-mobility exclude list.
Default
Off.
Usage Guidelines
Configuring host-mobility excluded-ports will disable the route learning on the port list provided. All
ports that are connected to another router should be excluded. If ports are not excluded, routes will be
created for devices as if they are directly connected and may cause traffic to take a longer route.
Example
configure vrrp vlan vlan1 vrid 1 host-mobility on excluded-ports add 1,10
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command allows you to eliminate the pseudo header for VRRPv3 IPv4 Checksum calculation.
Default
Include.
Example
configure vrrp vlan "v1" vrid 1 ipv4 checksum exclude-pseudo-header
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Specifies that a higher priority backup router preempts a lower priority master.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID for a VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
seconds Specifies a preempt delay period in seconds. The value range is 1 to
3600 seconds, or 0, which selects the original preempt delay period.
Default
Preempt enabled.
Delay configuration: 0.
Usage Guidelines
The preempt option enables a higher-priority backup router to preempt a master with a lower priority.
When a VRRP enabled router receives a lower priority VRRP advertisement and preemption is enabled,
the higher-priority VRRP enabled router takes over as master. The new master starts sending VRRP
advertisements and the old, lower-priority master relinquishes mastership.
Note
The router that owns the virtual IP address always preempts, independent of the setting of
this parameter.
When a VRRP enabled router preempts the master, it does so in one of the following ways:
• If the preempt delay timer is configured for between 1 and 3600 seconds and the lower-priority
master is still operating, the router preempts the master when the timer expires.
• If the preempt delay timer is configured for 0, the router preempts the master after 3 times the hello
interval.
• If the higher priority router stops receiving advertisements from the current master for 3 times the
hello interval, it takes over mastership immediately.
Note
The preempt feature can be disabled with the configure vrrp vlan vrid dont-
preempt command.
Example
The following command allows preemption:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the priority value of a VRRP router instance.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vlan_list VLAN list (1–4,094).
vridval Specifies the VRID for the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
vrid_list List of virtual router IDs (1–255).
priorityval Specifies the priority value of the router. The default is 100. The
priority range is 1-255.
Default
The default priority is 100.
Usage Guidelines
This command changes the priority of a VRRP router. If the VRRP router is the IP address owner (which
means that the VRRP router IP address matches the VRRP VLAN IP address), the priority is 255 and
cannot be changed. If the VRRP router is not the IP address owner, the priority can be changed to
values in the range of 1 to 254.
To change the priority of the IP address owner or to make a different VRRP router the IP address owner,
disable VRRP and reconfigure the affected switches to use VRRP router addresses that support the
priorities you want to assign.
Example
The following command configures a priority of 150 for VLAN vrrp-1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Defines the conditions under which the router automatically relinquishes master status when the
tracked entities fail.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID for the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
all Specifies that the mastership is relinquished when one of the
following events occur:
All of the tracked VLANs failAll of the tracked routes failAll of the
tracked PINGs fail
any Specifies that the mastership is relinquished when any of the tracked
VLANs, routes, or PINGs fail.
Default
The default setting is all.
Usage Guidelines
None.
Example
The following command configures the track mode to any:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Selects the VRRP version to apply to the VRRP router instance.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID for the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
v3-v2 Specifies VRRP v3 with VRRP v2 compatibility.
v3 Selects VRRP v3.
v2 Specifies VRRP v2.
Default
VRRP v3 with VRRP v2 compatibility.
Note
Configurations created by earlier ExtremeXOS software releases have an implied version of
v2. If the configuration is subsequently saved, the version is explicitly set to v2.
Usage Guidelines
None.
Example
The following command configures the VRRP router instance to use VRRP v3 only:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures HTTP to use an ACL rule for access control.
Syntax Description
add Specifies that an ACL rule is to be added to the website.
rule Specifies an ACL rule.
first Specifies that the new rule is to be added before all other rules.
before Specifies that the new rule is to be added before a previous rule.
after Specifies that the new rule is to be added after a previous rule.
previous_rule Specifies an existing rule in the application.
delete Specifies that one particular rule is to be deleted.
none Specifies that all the rules or a policy file is to be deleted.
Default
N/A.
Usage Guidelines
You must be logged in as administrator to configure HTTP parameters.
Use this command to restrict HTTP access by adding an ACL rule to the HTTP application. Once an ACL
is associated with HTTP, all the packets that reach a HTTP module are evaluated with this ACL and
appropriate action (permit or deny) is taken, as is done using policy files.
The permit or deny counters are also updated accordingly regardless of whether the ACL is configured
to add counters. To display counter statistics, use the tftp put on page 3289 http command.
Only the following match conditions and actions are copied to the client memory. Others that may be in
the rule are not copied.
Match conditions
• Source-address—IPv4 and IPv6
Actions
• Permit
• Deny
When adding a new rule, use the first, before, and after previous_rule parameters to position it within
the existing rules.
If the SNMP traffic does not match any of the rules, the default behavior is permit. To deny SNMP traffic
that does not match any of the rules, add a deny all rule at the end or the rule list.
Example
The following example copies the ACL rule, DenyAccess to the HTTP application in first place:
configure web http access-profile add DenyAccess first
The following example removes the association of the ACL rule DenyAccess from the HTTP application:
configure web http access-profile delete DenyAccess
The following example removes the association of all ACL rules from the HTTP application:
configure web http access-profile none
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds or deletes an ExtremeXOS module to or from the Web server target.
Syntax Description
target Specifies an alpha numeric string that identifies the configured target.
module Specifies the name of the ExtremeXOS module.
Default
N/A.
Usage Guidelines
Use the add option to attach a module to the Web server target in order to receive events from that
application and send them to the targeted Web server. There is no limitation to the number of modules
that can be attached.
Use the delete option to detach ExtremeXOS modules from the Web server target in order to stop
receiving events from that module.
Example
The following command deleted the target test2 from EMS:
configure xml-notification target test2 ems
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the Web server target in the XML client.
Syntax Description
target Specifies an alpha numeric string that identifies the configured target.
url Specifies the Web server URL.
vr_name Specifies the virtual router over which the XML client process can
connect to a Web server to send push notifications.
user Specifies the alpha numeric string identifying the Web server user.
encrypted-auth Specifies the encrypted user authentication string.
queue-size Specifies in numeric format, the size of the buffer that stores incoming
events from ExtremeXOS software.
Default
N/A.
Usage Guidelines
Use this command to configure the Web server target in XML client process.
Example
The following command configures the target target2 for the user admin:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures the destination address MAC that L2PT encapsulated packets use.
Syntax Description
encapsulation Specifies Layer 2 protocol tunneling encapsulation.
dest-mac Specifies the destination MAC address to use for encapsulated PDUs.
mac_addr Specifies the MAC address.
Default
Usage Guidelines
NA
Example
The following example sets the L2PT destination address MAC to 01:00:00:01:01:02:
configure l2pt encapsulation dest-mac 01:00:00:01:01:02
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
cp
cp old_name new_name
Description
Copies a file from the specified file system or relative to the current working directory to another file on
the specified file system or relative to the current working directory.
Syntax Description
old_name Specifies the name of the file that you want to copy.
new_name Specifies the name of the newly copied configuration or policy file.
Default
N/A.
Usage Guidelines
Use this command to copy a file from the specified file system or relative to the current working
directory to another file on the specified file system or relative to the current working directory. This
command provides the functionality to replicate an existing file by creating a new entry in the file
system, reading the content of the existing file and writing that content to the new one. If given a
different name, the new file can be created in the same directory as the existing file.
When you copy a configuration or policy file from the system, make sure youspecify the appropriate file
extension. For example, when you want to copy a policy file, specify the filename and .pol.
When you copy a file on the switch, the switch displays a message similar to the following:
Copy config test.cfg to config test1.cfg on switch? (y/n)
Enter y to copy the file. Enter n to cancel this process and not copy the file.
When you enter y, the switch copies the file with the new name and keeps a backup of the original file
with the original name. After the switch copies the file, use the ls command to display a complete list
of files. In this example, the switch displays the original file named test.cfg and the copied file named
test_rev2.cfg.
...
-rw-r--r-- 1 root root 100980 Sep 23 09:16 test.cfg
-rw-r--r-- 1 root root 100980 Oct 13 08:47 test_rev2.cfg
...
When you enter n, the switch displays a message similar to the following:
Copy cancelled.
For the memorycard option, the source and/or destination is a compact flash card or USB 2.0 storage
device. You must mount the compact flash card or USB storage device for this operation to succeed.
The cp command copies a file from the switch to the compact flash card, the USB storage device, or a
file already on one of those devices. If you copy a file from the switch to the removable storage device,
and the new filename is identical to the source file, you do not need to re-enter the filename.
Case-sensitive Filenames
Filenames are case-sensitive. In this example, you have a configuration file named Test.cfg. If you
attempt to copy the file with the incorrect case, for example test.cfg, the switch displays a message
similar to the following:
Error: cp: /config/test.cfg: No such file or directory
Since the switch is unable to locate test.cfg, the file is not copied.
When specifying a local filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Dash ( - ).
• Underscore ( _ ).
By making a copy of a core dump file, you can easily compare new debug information with the old file if
needed.
When you configure and enable the switch to send core dump (debug) information to the internal
memory card, specify the internal-memory option and associated internal-memory name options to
copy an existing core dump file.
If you have an external compact flash card or a USB 2.0 storage device installed, you can copy the core
dump file to that location. When you send core dump information to a removable storage device,
specify the memorycard option and associated memorycard name options to copy an existing core
dump file.
For information about configuring and sending core dump information to the internal memory card, see
the configure debug core-dumps and save debug tracefiles memorycard commands.
For more detailed information about core dump files, see Troubleshooting in the ExtremeXOS 30.5 User
Guide.
Example
The following example makes a copy of a configuration file named test.cfg and gives the copied file a
new name of test_rev2.cfg:
cp test.cfg test_rev2.cfg
The following example makes a copy of a configuration file named primary.cfg on the switch and stores
the copy on the removable storage device with the same name, primary.cfg:
cp primary.cfg /usr/local/ext
History
This command was first available in ExtremeXOS 11.0.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create access-list
create access-list dynamic_rule conditions actions {non_permanent}
Description
Creates a dynamic ACL.
Syntax Description
dynamic_rule Specifies the dynamic ACL name. The name can be from 1-32
characters long.
conditions Specifies the match conditions for the dynamic ACL.
actions Specifies the actions for the dynamic ACLs.
non_permanent Specifies that the ACL is not to be saved.
Default
By default, ACLs are permanent.
Usage Guidelines
This command creates a dynamic ACL rule. Use the configure access-list add command to
apply the ACL to an interface.
The conditions parameter is a quoted string of match conditions, and the actions parameter is a quoted
string of actions. Multiple match conditions or actions are separated by semi-colons. A complete listing
of the match conditions and actions is in the ACLs section of the ExtremeXOS 30.5 User Guide.
Dynamic ACL rule names must be unique, but can be the same as used in a policy-file based ACL. Any
dynamic rule counter names must be unique. For name creation guidelines and a list of reserved names,
see Object Names in the ExtremeXOS 30.5 User Guide.
By default, ACL rules are saved when the save command is executed, and persist across system reboots.
Configuring the optional keyword non-permanent means the ACL will not be saved.
Example
The following example creates a dynamic ACL that drops all ICMP echo-request packets on the
interface:
create access-list icmp-echo "protocol icmp;icmp-type echo-request" "deny"
The created dynamic ACL will take effect after it has been configured on the interface. The previous
example creates a dynamic ACL named icmp-echo that is equivalent to the following ACL policy file
entry:
entry icmp-echo {
if {
protocol icmp;
icmp-type echo-request;
} then {
deny;
}
The following example creates a dynamic ACL that accepts all the UDP packets from the
10.203.134.0/24 subnet that are destined for the host 140.158.18.16, with source port 190 and a
destination port in the range of 1200 to 1250:
create access-list udpacl "source-address 10.203.134.0/24;destination-address
140.158.18.16/32;protocol udp;source-port 190;destination-port 1200 - 1250;" "permit"
The previous example creates a dynamic ACL entry named udpacl that is equivalent to the following
ACL policy file entry:
entry udpacl {
if {
source-address 10.203.134.0/24;
destination-address 140.158.18.16/32;
protocol udp;
source-port 190;
destination-port 1200 - 1250;
} then {
permit;
}
}
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a network-zone with a specified name.
Syntax Description
access-list Access list
network-zone Network zone
zone_name Network zone name
Default
N/A.
Usage Guidelines
Use this command to create a network-zone with a specified name. The network-zone can then be
associated with the policy file using either the "source-zone" or "destination-zone" attribute.
Example
If the user tries to create a network-zone that was already created, the following error message will be
displayed on the console, and the command will be rejected.
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a dynamic ACL zone, and sets the priority of the zone.
Syntax Description
name Specifies the dynamic ACL zone name. The name can be from 1-32
characters long.
zone-priority number Specifies priority of the zone. The range is from 1 (highest priority) to
4294967295 (lowest priority).
Default
The denial of service, system, and security zones are configured by default, and cannot be deleted.
Usage Guidelines
This command creates a dynamic ACL zone. You can configure the priority of the zone in relation to the
default zones or to other configured zones.
Example
The following command creates a new zone, called myzone, with a priority of 2:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create account
create account [admin | user | lawful-intercept] account-name {encrypted
encrypted_password | password}
Description
Creates a new user account.
Syntax Description
admin Specifies an access level for admin account type. This user has read
and write privileges.
user Specifies an access level for user account type. This user has read-only
privileges.
lawful-intercept Specifies an access level for lawful intercept account type.
account-name Specifies a new user account name.
encrypted
Caution: Using this option incorrectly can result in you being locked
out of your switch account.
Default
N/A.
Note: Only a single lawful-intercept account can exist at any one time
on the system.
You can use the default names (admin and user), or you can create new names and passwords for the
accounts. Default accounts do not have passwords assigned to them. For name creation guidelines and
a list of reserved names, see Object Names in the ExtremeXOS 30.5 User Guide.
Usage Guidelines
The switch can have a total of 16 user accounts.
When you use the encrypted keyword, the following password that you specify should be in
encrypted hash format. Administrators should not use the encrypted option and should enter the
password in plain text. Using this option with a plain text password, as opposed to a hashed version of a
password, can result in the user being locked out of the account. Generally, this option should not be
used. A valid use of this option would be when transferring account information between switches
using the output of the show configuration on page 2515 command, where the displayed password is
in hashed form. You can copy this hashed password and enter it as the password with the encrypted
option. The switch will de-crypt the hashed password into the plain text password that as specified for
the original account.
The system prompts you to specify a password after you enter this command and to reenter the
password. If you do not want a password associated with the specified account, press [Enter] twice.
You must have administrator privileges to change passwords for accounts other than your own. User
names are not case-sensitive. Passwords are case-sensitive. User account names must have a minimum
of 1 character and can have a maximum of 32 characters. Passwords must have a minimum of 0
characters and can have a maximum of 32 characters. For user names, only alphanumeric, dash (-), and
underscore (_) characters may be used. If you use a hashtag (#), everything after it is ignored.
Note
User names cannot begin with a number.
Note
If the account is configured to require a specific password format, the minimum is eight
characters. See configure account password-policy char-validation for
more information.
Example
The following example creates a new account named "John2" with administrator privileges:
create account admin John2
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command creates and enables BGP auto-peering using a range of supplied VLANs, the BGP router
ID, and AS number.
Syntax Description
vlans Designates the VLANs that auto-peering uses. If a VLAN range is not
specified, VLANs are created dynamically.
vlan_list VLAN list (range is 2–4,094).
routerid Designates a BGP router ID.
ipaddress Specifies the BGP router ID as an IP address in IPv4 format (x.y.z.w).
Default
N/A
Usage Guidelines
This command creates the VLAN list, configures the VLANs with an IPv6 link-local address, and enables
IPv6 forwarding. It also creates a loopback VLAN with an IP address of the BGP router ID. Within BGP,
the router ID, AS number, and easyBGP capability are configured along with redistribution of host-
mobility routes.
A sufficient number of VLANs must be configured to cover all possible number of BGP links. Estimating
too low of a VLAN range might result in unexpected connection issues. Resizing the VLAN range
requires deleting the AutoBGP setup and recreating it with an appropriate range (see delete auto-
peering). If a VLAN range is not specified, VLANs are created dynamically.
Example
The following example creates auto-peering with VLANs 500 through 505, using BGP router ID at
10.3.4.2 with AS 52:
# create auto-peering bgp vlans 500-505 routerid 10.3.4.2 AS-number 52
History
This command was first available in ExtremeXOS 22.5.
The requirement to specify a VLAN range (have VLANs created dynamically) was added in ExtremeXOS
30.3.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series switches.
This feature requires the Advanced Edge license. For more information about licenses, see the
ExtremeXOS 30.5 Feature License Requirements.
Description
Creates an EVPN instance.
Syntax Description
bgp BGP capability.
evpn EVPN protocol.
instance Specifies creating an EVPN instance
evpn_instance_name Name of the EVPN instance.
Default
N/A.
Usage Guidelines
The EVPN instance will become active if the configured VNI matches the configured VNI of a virtual
network.
Example
The following example creates an EVPN instance named "my_evpn":
# create bgp evpn instance my_evpn
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a new neighbor and makes it part of the peer group.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
peer-group-name Specifies a peer group.
multi-hop Specifies to allow connections to EBGP peers that are not directly
connected.
Default
N/A.
Usage Guidelines
You can specify an IPv4 or IPv6 address for the BGP peer. The address can be a global unicast or a link-
local address. IPv6 link-local remote addresses are supported only for EBGP single-hop peerings.
If you are adding an IPv4 peer to a peer group and no IPv4 address family capabilities are assigned to
the specified peer group, the IPv4 unicast and multicast address families are automatically enabled for
that peer group. If you adding an IPv6 peer to a peer group and no IPv6 address family capabilities are
assigned to the peer group, you must explicitly enable the IPv6 address family capabilities you want to
support.
Note
If the peer group or any member of the peer group has been configured with an IPv4 or IPv6
address family, the peer group only accepts peers that are configured to use that family. For
example, if a peer group is configured for the IPv4 unicast address family, the switch will not
allow you to add an IPv6 peer. LIkewise, an IPv6 peer group cannot accept an IPv4 peer.
If the multihop keyword is not specified, the IP addresses of the EBGP speaker and peer must belong to
the same subnet.
All the parameters of the neighbor are inherited from the peer group. The peer group should have the
remote AS configured.
If you do not specify acquire-all, only the mandatory parameters are inherited from the peer group. If
you specify acquire-all, all of the parameters of the peer group are inherited. This command disables the
neighbor before adding it to the peer group.
Example
The following command creates a new neighbor and makes it part of the peer group outer:
create bgp neighbor 192.1.1.22 peer-group outer
The following example specifies how to create a neighbor peer group in a VRF (PE – CE neighbor
session):
virtual-router <vr_vrf_name>
create bgp neighbor <remoteaddr> remote-AS-number <asNumber> {multi-hop}
create bgp neighbor <remoteaddr> peer-group <peer-group-name> {multi-hop}
delete bgp [{neighbor} <remoteaddr> | neighbor all ]
[create | delete] bgp peer-group <peer-group-name>
BGP maintains a separate RIB (RIB-In, RIB-Loc and RIB-Out) for each of the VRF it is configured to run.
So routes received from a peer in VRF1 are not mixed up with routes from a peer in VRF2. Additionally,
BGP routes in a VRF are regular IPv4 routes of address family ipv4. The BGP decision algorithm occurs
inside a VRF and is not impacted by any BGP activity in other VRF.There can be two BGP neighbors
with the same peer IP address in two different VRFs.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a new BGP peer.
Syntax Description
remoteaddr Specifies an IP address of the BGP neighbor.
as-number Specifies a remote AS number. The range is 1 to 4294967295.
multi-hop Specifies to allow connections to EBGP peers that are not directly
connected.
Default
N/A.
Usage Guidelines
You can specify an IPv4 or IPv6 address for the BGP peer. The address can be a global unicast or a link-
local address. IPv6 link-local remote addresses are supported only for EBGP single-hop peerings.
If the multihop keyword is not specified, the IP addresses of the EBGP speaker and peer must belong to
the same subnet.
The AS number is a 4-byte AS number in either the ASPLAIN or the ASDOT format as described in RFC
5396, Textual Representation of Autonomous System (AS) Numbers.
If the AS number is the same as the AS number provided in the configure bgp as command, then the
peer is consider an IBGP peer, otherwise the neighbor is an EBGP peer. The BGP session to a newly
created peer is not started until the enable bgp neighbor command is issued.
Example
The following command specifies a BGP peer AS number using the ASPLAIN 4-byte AS number format:
The following command specifies a BGP peer AS number using the ASDOT 4-byte AS number format:
The following example specifies how to create a neighbor peer group in a VRF (PE – CE neighbor
session):
virtual-router <vr_vrf_name>
create bgp neighbor <remoteaddr> remote-AS-number <asNumber> {multi-hop}
create bgp neighbor <remoteaddr> peer-group <peer-group-name> {multi-hop}
delete bgp [{neighbor} <remoteaddr> | neighbor all ]
[create | delete] bgp peer-group <peer-group-name>
BGP maintains a separate RIB (RIB-In, RIB-Loc and RIB-Out) for each of the VRF it is configured to run.
So routes received from a peer in VRF1 are not mixed up with routes from a peer in VRF2. Additionally,
BGP routes in a VRF are regular IPv4 routes of address family ipv4. The BGP decision algorithm occurs
inside a VRF and is not impacted by any BGP activity in other VRF.There can be two BGP neighbors
with the same peer IP address in two different VRFs.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a new peer group.
Syntax Description
peer-group-name Specifies a peer group.
Default
N/A.
Usage Guidelines
You can use BGP peer groups to group together up to 512 BGP neighbors. All neighbors within the peer
group inherit the parameters of the BGP peer group. The following mandatory parameters are shared
by all neighbors in a peer group:
• source-interface
• out-nlri-filter
• out-aspath-filter
• out-route-policy
• send-community
• next-hop-self
The BGP peer group name must begin with an alphabetical character and may contain alphanumeric
characters and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For name creation guidelines and a list of reserved names, see the ExtremeXOS 30.5
Feature License Requirements document..
No IPv4 or IPv6 address family capabilities are added a to a new peer group. When the first IPv4 peer is
added to a peer group, the IPv4 unicast and multicast families are enabled by default. No IPv6 address
family capabilities are automatically added when an IPv6 peer is added to a peer group; you must
explicitly add any IPv6 address family capabilities that you want for a peer group.
Example
The following command creates a new peer group named outer:
create bgp peer-group outer
The following example specifies how to create a neighbor peer group in a VRF (PE – CE neighbor
session):
virtual-router <vr_vrf_name>
create bgp neighbor <remoteaddr> remote-AS-number <asNumber> {multi-hop}
BGP maintains a separate RIB (RIB-In, RIB-Loc and RIB-Out) for each of the VRF it is configured to run.
So routes received from a peer in VRF1 are not mixed up with routes from a peer in VRF2. Additionally,
BGP routes in a VRF are regular IPv4 routes of address family ipv4. The BGP decision algorithm occurs
inside a VRF and is not impacted by any BGP activity in other VRF.There can be two BGP neighbors
with the same peer IP address in two different VRFs.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a maintenance domain (MD) in the DNS name format and assigns an MD level to that domain.
Syntax Description
name Assigns the name you want for this domain, using the DNS name
format. Enter alphanumeric characters for this format; the maximum is
43 characters.
level Specifies the MD level you are assigning to this domain. Enter a value
between 0 and 7.
Default
N/A.
Usage Guidelines
You can have up to 8 domains on a switch, and each one must have a unique MD level.
You assign each domain a maintenance domain (MD) level, which function in a hierarchy for forwarding
CFM messages. The levels are from 0 to 7; with the highest number being superior in the hierarchy.
The IEEE standard 801.2ag specifies different levels for different network users, as follows:
• 5 to 7 for end users
• 3 and 4 for Internet service providers (ISPs)
• 0 to 2 for operators (entities carrying the information for the ISPs)
Note
MEPs with intervals 3 and 10 cannot be created in this domain as the domain name format
is of dns type.
Example
The following command creates a domain, using the DNS name format, named extreme and assigns
that domain an MD level of 2:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a maintenance domain (MD) in the MAC address + 2-octet integer format and assigns an MD
level to that domain.
Syntax Description
mac-addr Enter a MAC address in the format XX:XX:XX:XX:XX:XX to specify part of the domain
name.
int Enter the 2-octet integer you want to append to the MAC address to specify the
domain name.
level Specifies the MD level you are assigning to this domain. Enter a value between 0 and 7.
Default
N/A.
Usage Guidelines
You can have up to 8 domains on a switch, and each one must have a unique MD level.
You assign each domain a maintenance domain (MD) level, which function in a hierarchy for forwarding
CFM messages. The levels are from 0 to 7; with the highest number being superior in the hierarchy.
The IEEE standard 801.2ag specifies different levels for different network users, as follows:
• 5 to 7 for end users
• 3 and 4 for Internet service providers (ISPs)
• 0 to 2 for operators (entities carrying the information for the ISPs)
Example
The following command creates a domain, using the MAC + 2-octet integer format, with the MAC
address of 11:22:33:44:55:66 and an integer value of 63; it also assigns that domain an MD level of 2:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a maintenance domain (MD) in the string name format and assigns an MD level to that domain.
Syntax Description
str_name Enter a character string to specify part of the domain name. The maximum length is 43
characters.
level Specifies the MD level you are assigning to this domain. Enter a value between 0 and 7.
Default
N/A.
Usage Guidelines
You can have up to 8 domains on a switch, and each one must have a unique MD level.
You assign each domain a maintenance domain (MD) level, which function in a hierarchy for forwarding
CFM messages. The levels are from 0 to 7; with the highest number being superior in the hierarchy.
The IEEE standard 801.2ag specifies different levels for different network users, as follows:
• 5 to 7 for end users
• 3 and 4 for Internet service providers (ISPs)
• 0 to 2 for operators (entities carrying the information for the ISPs)
Example
The following command creates a domain, using the string format having a value of extreme; it also
assigns that domain an MD level of 2:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a CFM segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
mac_addr Specifies the MAC address.
segment_name_to_copy Specifies the CFM segment whose configuration is to be copied.
Default
N/A.
Usage Guidelines
Use this command to explicitly create a CFM segment where the segment name is a 32-byte long alpha-
numeric character string.
Example
The following command creates a CFM segment named segment-new using MAC address
00:11:22:11:33:11 and copying segment-old:
Here, the copy existing cfm segment is an optional parameter, and if used, the following
configurations from the existing CFM segment are copied to the newly created segment:
• DMM transmission interval
• Class of service
• Threshold values
• Measurement window size
• Timeout value
Note
The copy option is not shown in "show config" as it is used only for copying the existing
values when creating a segment.
If you later configure any of the above mentioned information in segment-new, the old value(s) which
were copied from segment-old will be overwritten with the new one in segment-new, as is done for any
other commands. The same will not be true on the reverse case. If you modify the values of segment-
old, the modified value will NOT be propagated to the CFM segments which use segment-old's
configurations. In other words, the configurations of segment-old that are at the time of creating
segment-new will alone be copied and not any other changes that are made to segment-old later on.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates an EAPS shared port on the switch.
Syntax Description
ports Specifies the port number of the common link port.
Default
N/A.
Usage Guidelines
To configure a common link, you must create a shared port on each switch on either end of the common
link.
Example
The following command creates a shared port on the EAPS domain.
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
create eaps
create eaps name
Description
Creates an EAPS domain with the specified name.
Syntax Description
name Specifies the name of an EAPS domain to be created. Can be up to 32
characters in length.
Default
N/A.
Usage Guidelines
An EAPS domain name must begin with an alphabetical character and may contain alphanumeric
characters and underscores (_), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS Concepts Guide.
Example
The following command creates EAPS domain eaps_1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates an ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
ring-id Specifies configuring a unique integer ID for ERPS ring.
ring_id Sets the ERPS ring ID value. Range is 1 to 239.
Default
N/A.
Usage Guidelines
Use this command to create an ERPS ring, and optionally the ring ID.
Example
The following command creates an ERPS ring named “ring1” with ring ID "50":
create erps ring1 ring-id 50
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create esrp
create esrp esrp_domain {type [vpls-redundancy | standard]}
Description
Creates an ESRP domain with the specified name on the switch.
Syntax Description
esrp_domain Specifies the name of an ESRP domain to be created. Can be up to 32
characters in length.
Default
The ESRP domain is disabled and in the “Aware” state.
When you create an ESRP domain, it has the following default parameters:
• Operational version—Extended
• Priority—0
• VLAN interface—none
• VLAN tag—0
• Hello timer—2 seconds
• Neighbor timer—8 seconds
• Premaster timer—6 seconds
• Neutral timer—4 seconds
• Neighbor restart timer—30 seconds
• VLAN tracking—none
• Ping tracking—none
• IP route tracking—none
Usage Guidelines
The type keyword specifies the type of ESRP domain when a new ESRP domain is created. The only
types supported are vpls-redundancy and standard. Not specifying the optional ESRP domain type
results in the creation of an ESRP domain of type standard. The standard ESRP domain is equivalent to
the legacy ESRP domain type that was implicitly created. The vpls-redundancy domain type is only
specified when redundant access to an MPLS VPLS network is desired.
An ESRP domain name must begin with an alphabetical character and may contain alphanumeric
characters and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For ESRP domain name guidelines and a list of reserved names, see Object Names in
the ExtremeXOS 30.5 User Guide.
Each ESRP domain name must be unique and cannot duplicate any other named ESRP domains on the
switch. If you are uncertain about the ESRP names on the switch, use the show esrp command to
view the ESRP domain names.
For complete information about software licensing, including how to obtain and upgrade your license
and what licenses are appropriate for this feature, see the ExtremeXOS 30.5 Feature License
Requirements document.
Example
The following command creates ESRP domain esrp1 on the switch:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a MAC address to the MAC address tracking table.
Syntax Description
mac_addr Specifies a device MAC address, using colon-separated bytes.
Default
The MAC address tracking table is empty.
Usage Guidelines
None.
Example
The following command adds a MAC address to the MAC address tracking table:
create fdb mac-tracking entry 00:E0:2B:12:34:56
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a permanent static FDB entry.
Syntax Description
mac_addr Specifies a device MAC address, using colon-separated bytes.
vlan_name Specifies a VLAN name associated with a MAC address.
port_list Specifies one or more ports or slots and ports associated with the
MAC address.
tagged tag Specifies the port-specific VLAN tag. When there are multiple ports
specified in port_list, the same tag is used for all of them.
blackhole Enables the blackhole option. Any packets with either a source MAC
address or a destination MAC address matching the FDB entry are
dropped.
broadcast Forwarding destination(s) for broadcast traffic.
unknown-unicast Forwarding destination(s) for unknown unicast traffic.
unknown-unicast Forwarding destination(s) for unknown multicast traffic.
vxlan The MAC address is reachable through a VXLAN Tunnel.
vr VR/VRF instance the IPv4 address is configured on.
vr_name An existing VR/VRF name.
ipaddress Configure the IP address of the remote tunnel endpoint to which the
MAC needs to be bound.
remote_ipaddress IPv4 address of the remote tunnel endpoint.
Default
N/A.
Usage Guidelines
Permanent entries are retained in the database if the switch is reset or a power off/on cycle occurs. A
permanent static entry can either be a unicast or multicast MAC address. After they have been created,
permanent static entries stay the same as when they were created. If the same MAC address and VLAN
is encountered on another virtual port that is not included in the permanent MAC entry, it is handled as
a blackhole entry. The static entry is not updated when any of the following take place:
• A VLAN identifier (VLANid) is changed.
• A port is disabled.
• A port enters blocking state.
• A port goes down (link down).
A permanent static FDB entry is deleted when any of the following take place:
• A VLAN is deleted.
• A port mode is changed (tagged/untagged).
• A port is deleted from a VLAN.
Permanent static entries are designated by spm in the flags field of the show fdb output. You can use
the show fdb command to display permanent FDB entries.
If the static entry is for a PVLAN VLAN that requires more than one underlying entry, the system
automatically adds the required entries. For example, if the static entry is for a PVLAN network VLAN,
the system automatically adds all required extra entries for the subscriber VLANs.
You can create FDB entries to multicast MAC addresses and list one or more ports. If more than one
port number is associated with a permanent MAC entry, packets are multicast to the multiple
destinations.
IGMP snooping rules take precedence over static multicast MAC addresses in the IP multicast range
(01:00:5e:xx:xx:xx) unless IGMP snooping is disabled.
Note
When a multiport list is assigned to a unicast MAC address, load sharing is not supported on
the ports in the multiport list.
In ExtremeXOS 21.1, this command was extended to add a remote VTEP as a destination to a MAC
address. Three new tokens “broadcast”, “unknown-multicast” and “unknown-unicast” have been added
to this command. When you want to specify a destination to forward all broadcast or unknown unicast
traffic on that VLAN, these token are used. For “broadcast”, “unknown-multicast” and “unknown-
unicast” only remote VTEPs (and not port_list or blackhole) can be specified in this release of
ExtremeXOS. These entries can only be created when the virtual-network is in explicit-remote flooding
mode.
Example
The following command adds a permanent, static entry to the FDB for MAC address 00 E0 2B 12 34 56,
in VLAN marketing on port 4 on a switch:
create fdb 00:E0:2B:12:34:56 vlan marketing port 4
The following example adds a permanent, static entry to the FDB for MAC address 00:01:02:03:04:05, in
VLAN marketing, on a VLAN port that has tag 100 on port 3 on a switch:
create fdb 00:01:02:03:04:05 vlan msk ports 3 tag 100
History
This command was first available in ExtremeXOS 10.1.
The ability to create a multicast FDB with multiple entry ports was added in ExtremeXOS 11.3.
The blackhole option was first available for all platforms in ExtremeXOS 12.1.
In ExtremeXOS 12.3, the fdb keyword was introduced as an alias to the fdbentry keyword to avoid
interference with the syntax of the MAC-Tracking feature commands. Both keywords execute; however,
the syntax helper (tab completion) does not recognize the fdbentry keyword.
Three new tokens “broadcast”, “unknown-multicast” and “unknown-unicast” were added to this
command in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create flow-redirect
create flow-redirect flow_redirect_name
Description
Creates a named flow redirection policy.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
Default
N/A.
Usage Guidelines
Use this command to create a named flow redirection policy to which nexthop information can be
added.
For name creation guidelines and a list of reserved names, see Object Names in the ExtremeXOS 30.5
User Guide.
Example
The following example creates a flow redirection policy names flow3:
create flow-redirect flow3
History
This command was first available in ExtremeXOS 12.1.
The maximum number of flow redirects was increased to 4096 in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates and configures an identity management role.
Syntax Description
role_name Specifies a name for the new role (up to 32 characters).
match_criteria Specifies an expression that identifies the users to be assigned to the
new role.
pri_value Specifies the role priority; the lower the priority number, the higher
the priority. The range of values is 1 to 255. Value 1 represents the
highest priority, and value 255 represents the lowest priority.
Default
Priority=255.
Usage Guidelines
The identity management feature supports a maximum of 64 roles.
The role name can include up to 32 characters. Role names must begin with an alphabetical letter, and
only alphanumeric, underscore (_), and hyphen (-) characters are allowed in the remainder of the name.
Role names cannot match reserved keywords, or the default role names reserved by identity manager.
For more information on role name requirements and a list of reserved keywords, see Object Names in
the ExtremeXOS 30.5 User Guide. The role names reserved by identity manager are:
• authenticated.
• blacklist.
• unauthenticated.
• whitelist.
Table 23 lists match criteria attributes that can be retrieved from an LDAP server.
Table 24 on page 1588 lists locally learned attributes that can be used for match criteria.
The role priority determines which role a user is mapped to when the user’s attributes match the
match-criteria of more than 1 role. If the user’s attributes match multiple roles, the highest priority
(lowest numerical value) role applies. If the priority is the same for all matching roles, the role for which
the priority was most recently set or modified is used.
Example
The following examples create roles for the conditions described in the comments that precede the
commands:
# Creates a role named "India-Engr" that matches employees from the Engineering
# department who work in India
* Switch.22 # create identity-management role "India-Engr" match-criteria
"country==India; AND department==Engineering;"
# Creates a role named “US-Engr” that matches employees whose title is Engineer and
# who work in United States
* Switch.23 # create identity-management role US-Engr match-criteria "title contains
Engineer; AND country == US;" priority 100
# Creates a role named "Avaya4300Device" for Avaya phones of type 4300 that are
# manufactured by Avaya
* Switch.24 # create identity-management role "Avaya4300Device" match-criteria "device-
capability == Phone; AND device-name == Avaya4300; AND device-manufacturer-name == Avaya;"
# Creates a role for all Extreme Networks switches with MAC-OUI "00:04:96"
* Switch.25 # create identity-management role "ExtremeSwitch" match-criteria "mac-oui ==
00:04:96;"
# Creates a role for all identities with IP address 1.2.3.1 - 1.2.3.255
* Switch.26 # create identity-management role "EngineeringDomain" match-criteria "ip-
Address == 1.2.3.0/255.255.255.0;"
# Creates a role for all phone devices with MAC_OUI of "00:01:e6"
* Switch.27 # create identity-management role "Printer" match-criteria "mac ==
00:01:e6:00:00:00/ff:ff:ff:00:00:00; device-capability == Phone;"
# Creates a role for the user name "adam" when he logs in from IP address 1.2.3.1 -
# 1.2.3.255.
History
This command was first available in ExtremeXOS 12.5.
Support for matching locally learned attributes was added in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command creates an IS-IS router process in the current virtual router.
Syntax Description
area_name Defines a name for the new IS-IS router process.
Default
N/A.
Usage Guidelines
No PDUs are sent until after the following events:
• The router process has been enabled
• The router process has been assigned a system ID and area address
• The router process has at least one interface (VLAN) that has IPv4 or IPv6 forwarding enabled.
By default, newly created IS-IS router processes are Level 1/Level 2 routers if a level 2 router process
does not already exist in the current virtual router. No more than one IS-IS router process may be
configured as a level 2 router. IS-IS router processes on different virtual routers may have the same
name, but this is not recommended as it may cause confusion when administering the switch. The
router process name supplied with this command may be optionally used as the hostname for this
router process when dynamic hostname exchange support is enabled.
The area name must begin with an alphabetical character and may contain alphanumeric characters
and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name is 32
characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS Concepts Guide.
Example
The following command creates a new IS-IS router process named areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
Creates an L2PT profile.
Syntax Description
l2pt Creates a Layer 2 protocol tunneling profile.
profile Profile that defines L2PT configuration for L2 protocols.
profile_name Specifies a profile name (maximum 32 characters).
Default
Disabled.
Usage Guidelines
Use this command to create an L2PT profile.
Example
The following example create a new L2PT profile named "my_l2pt_prof":
create l2pt profile my_l2pt_prof
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a Layer 2 VPN, which can be either a VPLS or VPWS.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string). The vpls_name string
must begin with an alphabetic character, and may contain up to 31 additional
alphanumeric characters.
vpws_name Identifies the VPWS within the switch (character string). The vpws_name string
must begin with an alphabetic character, and may contain up to 31 additional
alphanumeric characters.
pwid Specifies a PW ID. Must be a non-zero 32-bit value that has network-wide
significance.
Default
For the VPLS dot1q tag, the default value is exclude.
Usage Guidelines
Each VPLS or VPWS is a member of a single VPN, and each VPN can have only one associated VPLS or
VPWS per switch. External to the switch, each VPN has an identifier.
A VPLS or VPWS name must begin with an alphabetical character and may contain alphanumeric
characters and underscores (_), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
Any non-zero 32-bit value that has network-wide significance can be specified for the identifier. This
pwid is used on all pseudo-wires in the VPLS.
The l2vpn keyword is introduced in ExtremeXOS Release 12.4 and is required when creating a VPWS.
For backward compatibility, the l2vpn keyword is optional when creating a VPLS. However, this keyword
will be required in a future release, so we recommend that you use this keyword for new configurations
and scripts.
Note
The switch's LSR ID must be configured before a VPLS or VPWS can be created.
Example
This example creates a VPLS with 99 as the PW ID:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command is used to add an LDAP domain. The new domain can be added as the default. Older
default domains, if any, will no longer be the default since once only one domain can be default at a
time.
Syntax Description
domain_name Name of new LDAP domain to be added
Default
N/A.
Usage Guidelines
Use this command to add an LDAP domain.
You can see the LDAP domains added by using the show ldap domain command.
Supporting multiple domains gives ExtremeXOS the capabilty to send LDAP queries to gather
information about users belonging to different domains but connected to the same switch.
Example
The following command creates an LDAP domain with the name "sales.XYZCorp.com and marks it as
the default domain:
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a log filter with the specified name.
Syntax Description
name Specifies the name of the filter to create.
copy Specifies that the new filter is to be copied from an existing one.
filter_name Specifies the existing filter to copy.
Default
N/A.
Usage Guidelines
This command creates a filter with the name specified. A filter is a customizable list of events to include
or exclude, and optional parameter values. The list of events can be configured by component or
subcomponent with optional severity, or individual condition, each with optional parameter values. See
the commands configure log filter events and configure log filter events
match for details on how to add items to the filter.
The filter can be associated with one or more targets using the configure log target filter
command to control the messages sent to those targets. The system has one built-in filter named
DefaultFilter, which itself may be customized. Therefore, the create log filter command can be
used if a filter other than DefaultFilter is desired. As its name implies, DefaultFilter initially contains the
default level of logging in which every ExtremeXOS component and subcomponent has a pre-assigned
severity level.
If another filter needs to be created that will be similar to an existing filter, use the copy option to
populate the new filter with the configuration of the existing filter. If the copy option is not specified, the
new filter will have no events configured and therefore no incidents will pass through it.
Example
The following command creates the filter named fdb2, copying its configuration from the filter
DefaultFilter:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command logs an event using the text provided as the message.
Syntax Description
log Configure log service.
message Message to be logged.
text Text of log message.
Default
N/A.
Usage Guidelines
Use this command to log an event using the text as provided as the message.
Example
# create log message "Creating the test VLAN"
# show log
08/06/2012 14:11:28.28 <Info:System.userComment> Creating the test VLAN
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a new UPM target profile.
Syntax Description
upm_profile_name Specifies the name of an existing UPM profile.
Default
N/A.
Usage Guidelines
After configuration, a UPM log target links an EMS filter with a UPM profile. This command creates the
UPM log target.
The default configuration for a new log target binds the target to the EMS filter defaultFilter, which is
used for all system events. To configure the log target, use the command: configure log target
upm {upm_profile_name} filterfilter-name {severity [[severity] {only}]}.
The default status of a new UPM log target is disabled. To enable the log target, use the command:
enable log target upm {upm_profile_name}.
To view the log target, use the command: show log configuration target upm
{upm_profile_name}.
Example
The following example creates a new UPM log target named testprofile1:
create log target upm testprofile1
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a Web server XML-notification target name.
Syntax Description
target_name Specifies the name of a non-existing XML notification target.
xml_target_name Specifies the name of an already existing XML notification target.
Default
N/A.
Usage Guidelines
Use this command to create a web server XML-notification target name for EMS.
Example
The following command creates the target name test2:
create log target xml-notification text2
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a named connectivity-association (CA) object that holds MAC Security (MACsec) key
authentication data.
Syntax Description
connectivity- Secures connectivity provided between MACsec stations.
association
ca_name Defines CA object name.
pre-shared-key Selects static MACsec key consisting of both a CKN and CAK:
ckn Selects CA key name.
This public (non-secret) key name allows each of the MKA
participants to select which connectivity association k ey (CAK) to use
to process a received MACsec key agreement (MKA) protocol packets
(MKPDU).
ckn Sets the CA key name. Length allowed is 1–32 characters, entered as
ASCII or an octet string preceded with 0x.
cak Sets the connectivity association key (CAK). If you are using 256-bit
cipher suite, then the CAK must be 32 octets. The 128-bit cipher suite
can use either a 16- or 32-octet CAK.
This is a long-lived secret key used to derive short-lived lower-layer
keys (ICK, KEK, and SAK) which are used for key distribution and data
encryption.
cak Sets the non-encrypted CAK value. Must be entered as an octet string
(for example: “0x859e72f0…”). A 128-bit (16 octet) CAK requires 32
hexadecimal digits, and a 256-bit (32 octet) CAK requires 64
hexadecimal digits. These values are secret and should be generated
off switch with a suitable pseudorandom number generator.
encrypted Designates that secret key value is in encrypted format.
encrypted_cak Sets the value for the secret key. The encrypted CAK value is
generated by the show configuration macsec command for
previously configured CAKs.
Default
N/A.
Usage Guidelines
Up to 64 unique CA profiles can be created.
Example
The following example creates the CA object "testca" with a CKN of "the blue key" and 128-bit CAK of
“0x01020304050607080910111213141516”:
# create macsec connectivity-association testca pre-shared-key ckn “the blue key” cak
“0x01020304050607080910111213141516”
The following example creates the CA object "testca2" with a CKN of "the red key" and 256-bit CAK of
“0x0102030405060708091011121314151617181920212223242526272829303132”:
# create macsec connectivity-association testca2 pre-shared-key ckn “the red key” cak
“0x0102030405060708091011121314151617181920212223242526272829303132”
Note
The CAKs shown here are examples. Use your own random number for maximum security.
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
create meter
create meter meter-name
Description
This command creates a meter for ingress traffic rate limiting.
Syntax Description
meter-name Specifies the meter name.
Default
N/A.
Usage Guidelines
Meter names must begin with an alphabetical character and may contain alphanumeric characters and
underscores ( _ ), but they cannot contain spaces. The maximum allowed length for a name is 32
characters. For meter name guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
Example
The following command creates the meter maximum_bandwidth:
History
This command was available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a "control group" mirror referenced by a unique control index.
Syntax Description
control_index Mirror destination control index in the form of a number 1–4. Also
know as. etsysMirrorDestinationControlIndex. Each comprises a group
of mirror names.
Default
N/A.
Usage Guidelines
You can apply mirrors to policy profile rules by using a "control group" mirror referenced by a unique
control index number (1–4). These control group mirrors are etsysMirrorDestinationControlEntry entries
in the ENTERASYS-MIRROR-CONFIG-MIB (Mirror MIB). A Mirror MIB instance (designated by a control
index) can be associated with up to four "physical" mirrors, each being one destination port (or tunnel).
To create physical mirrors, use the command create mirror mirror_name {to [port port
| port-list port_list loopback-port port] { remote-tag rtag } | remote-
Example
The following example creates a control group mirror with control index number of "1":
# create mirror 1
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create mirror
create mirror mirror_name {to [port port | port-list port_list loopback-
port port] { remote-tag rtag } | remote-ip remote_ip_address {{ vr }
{vr_name } {from [ source_ip_address | auto-source-ip]}{ping-check
[on | off]} priority priority_value ]} {description mirror-desc}
Description
Creates a named mirror instance with an optional description, and optional "to port" definition, or
remote IP address destination.
Syntax Description
mirror_name Specifies the mirror name.
port Specifies the mirror output port.
port_list Specifies the list of ports where traffic is to be mirrored.
loopback-port Specifies an otherwise unused port required when mirroring to a
port_list. The loopback-port is not available for switching user data
traffic.
port Specifies a single loopback port that is used internally to provide this
feature.
remote-tag Specifies the value of the VLAN ID used by the mirrored packets when
egressing the monitor port.
description Specifies a description of the named mirror instance.
mirror-desc The specified mirror description.
Default
Disabled.
Ping health check of the remote IP address is enabled unless otherwise specified.
Usage Guidelines
Use this command to create a named mirror instance with an optional description and optional "to port"
or remote IP address definitions. You can create 15 named instances (the instance "DefaultMirror" is
created automatically).
For high availability, you can add up to four redundant remote IP addresses. When creating a mirror
with this command, you can add one IP address. To add additional remote IP addresses, use the
configure mirror mirror_name {to [port port | port-list port_list |
loopback port port] | remote-ip {add} remote_ip_address {{vr} vr_name }
{from [source_ip_address | auto-source-ip]} {ping-check [on | off]}]
{remote-tag rtag | port none} {priority priority_value}command.
Example
The following example creates a mirror instance on port 3, slot 4 :
create mirror to port 3:4
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates an MLAG peer switch association structure.
Syntax Description
peer_name Specifies an alpha numeric string identifying the MLAG peer.
authentication Authentication for MLAG checkpoint connection.
md5 MD5 authentication type.
key Authentication key for checkpoint connection to the MLAG peer.
encrypted Authentication key in in encrypted format.
auth_key Authetication key used for checkpoint connection.
Default
N/A.
Usage Guidelines
This command creates an MLAG peer switch association structure.
You must use a unique name for the peer switch. If you attempt to create an MLAG peer with a name
that already exists, the following error message is displayed:
ERROR: MLAG peer with specified name already exists
Example
The following command creates a peer switch structure switch101:
# create mlag peer switch101
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Creates internal resources for an RSVP-TE LSP.
Syntax Description
lsp_name Specifies a name for the LSP you are creating. The character string must begin
with an alphabetic character, and may contain up to 31 additional
alphanumeric characters.
ipaddress Specifies the endpoint of the LSP.
Default
N/A.
Usage Guidelines
This command creates internal resources for an RSVP-TE LSP.
The LSP name must begin with an alphabetical character and may contain alphanumeric characters and
underscores (_), but it cannot contain spaces. The maximum allowed length for a name is 32 characters.
For name creation guidelines and a list of reserved names, see Object Names in the ExtremeXOS 30.5
User Guide.
The ipaddress specifies the endpoint of the LSP. The LSP is not signaled until a path is specified for the
LSP using the configure mpls rsvp-te lsp lsp_name add path command. When multiple
LSPs are configured to the same destination, IP traffic is load-shared across active LSPs that have IP
transport enabled. The maximum number of RSVP-TE LSPs that can be created is 1024.
Note
The LSP must be created before it can be configured.
Example
The following command creates an RSVP-TE LSP:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Creates an RSVP-TE routed path resource.
Syntax Description
path_name Identifies the path within the switch. The character string must begin with an
alphabetic character, and may contain up to 31 additional alphanumeric
characters.
Default
N/A.
Usage Guidelines
This command creates an RSVP-TE path resource.
The path_name parameter must begin with an alphabetical character and may contain alphanumeric
characters and underscores (_), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
Note
The RSVP-TE LSP is not signaled along the path until an LSP is created and then configured
with the specified path_name.
Example
The following example creates an RSVP-TE path:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Creates an LSP container to hold FRR configuration parameters.
Syntax Description
profile_name Specifies a name for the new RSVP-TE fast-reroute profile. The character
string must begin with an alphabetic character and may contain up to 31
additional alphanumeric characters.
Default
N/A.
Usage Guidelines
A profile name must begin with an alphabetical character and may contain alphanumeric characters
and underscores (_), but it cannot contain spaces. The maximum allowed length for a name is 32
characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
Example
The following command creates a new FRR profile named frrprofile:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Creates configured RSVP-TE profile with the specified profile name.
Syntax Description
profile_name Identifies the RSVP-TE profile. The character string must begin with an
alphabetic character and may contain up to 31 additional alphanumeric
characters.
standard The standard option differentiates this command version from the command
that creates a fast-reroute profile. If you do not specify an option, a standard
RSVP-TE profile is created.
Default
N/A.
Usage Guidelines
This command creates a configured RSVP-TE profile with the specified profile name. The default profile
cannot be deleted. If a profile is associated with a configured LSP, the profile cannot be deleted.
A profile name must begin with an alphabetical character and may contain alphanumeric characters
and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name is 32
characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
Example
The following command creates an RSVP-TE profile:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Creates internal resources for a static LSP and assigns a name to the LSP.
Syntax Description
lsp_name Identifies the LSP to be created.
ipaddress Specifies the endpoint of the LSP.
Default
N/A.
Usage Guidelines
An LSP name must begin with an alphabetical character and may contain alphanumeric characters and
underscores (_), but it cannot contain spaces. The maximum allowed length for a name is 32 characters.
For name creation guidelines and a list of reserved names, see Object Names in the ExtremeXOS 30.5
User Guide.
Example
The following command creates a static LSP:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Creates an MSDP mesh-group.
Syntax Description
mesh-group-name Specifies the name for the MSDP mesh-group.
vrname Specifies the name of the virtual router to which this command applies. If
a name is not specified, it is extracted from the current CLI context.
Default
N/A.
Usage Guidelines
A mesh-group is a group of MSDP peers with fully meshed MSDP connectivity. Create a mesh-group to:
• Reduce SA message flooding.
• Simplify peer-RPF flooding.
SA messages received from a peer in a mesh-group are not forwarded to other peers in the same mesh-
group, which reduces SA message flooding.
A mesh group name must begin with an alphabetical character and may contain alphanumeric
characters and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
Example
The following example creates a mesh-group called "verizon:":
create msdp mesh-group verizon
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates an MSDP peer.
Syntax Description
remoteaddr Specifies the IP address of the MSDP router to configure as an MSDP peer.
remote-AS Specifies the autonomous system (AS) number of the MSDP peer. This optional
parameter is deprecated in ExtremeXOS 12.1, though the option is still available in
the CLI for backward compatibility. The software ignores this parameter.
vrname Specifies the name of the virtual router to which this command applies. If a name
is not specified, it is extracted from the current CLI context.
Default
N/A.
Usage Guidelines
The BGP route database is used by MSDP to determine the AS number for the peer. You can display the
AS number (which can be a 2-byte for 4-byte AS number) using the command:
Example
The following example creates an MSDP peer:
create msdp peer 192.168.45.43 remote-as 65001
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a local network login user name and password.
Syntax Description
user-name Specifies a new local network login user name. User names must have
a minimum of 1 character and a maximum of 32 characters.
encrypted The encrypted option is used by the switch to encrypt the password.
Do not use this option through the command line interface (CLI).
password Specifies a local network login user password. Passwords must have a
minimum of 0 characters and a maximum of 32 characters.
tagged Specifies that the client be added as tagged.
untagged Specifies that the client be added as untagged.
vlan_name Specifies the name of the destination VLAN.
vlan_tag Specifies the VLAN ID, tag, of the destination VLAN.
security_profile Specifies a security profile string during account creation.
Default
N/A.
Usage Guidelines
Use this command to create a local network login account and to configure the switch to use its local
database for network login authentication. This method of authentication is useful in the following
situations:
• If both the primary and secondary (if configured) RADIUS servers timeout or are unable to respond
to authentication requests.
• If no RADIUS servers are configured.
• If the RADIUS server used for network login authentication is disabled.
If any of the above conditions are met, the switch checks for a local user account and attempts to
authenticate against that local account.
Extreme Networks recommends creating a maximum of 64 local accounts. If you need more than 64
local accounts, we recommend using RADIUS for authentication. For more information about RADIUS
authentication, see the ExtremeXOS 30.5 User Guide.
You can also specify the destination VLAN to enter upon a successful authentication.
Note
If you do not specify a password or the keyword encrypted, you are prompted for one.
Additional Requirements
This command applies only to the web-based and MAC-based modes of network login. 802.1X network
login does not support local database authentication.
You must have administrator privileges to use this command. If you do not have administrator
privileges, the switch displays a message similar to the following:
This user does not have permissions for this command.
User names are not case-sensitive. Passwords are case-sensitive. User names must have a minimum of 1
character and a maximum of 32 characters. Passwords must have a minimum of 0 characters and a
maximum of 32 characters. If you use RADIUS for authentication, we recommend that you use the same
user name and password for both local authentication and RADIUS authentication.
If you attempt to create a user name with more than 32 characters, the switch displays the following
messages:
%% Invalid name detected at '^' marker. %% Name cannot exceed 32 characters.
If you attempt to create a password with more than 32 characters, the switch displays the following
message after you re-enter the password:
Password cannot exceed 32 characters
Example
The following command creates a local network login user name and password:
create netlogin local-user megtest
After you enter the local network login user name, press [Enter]. The switch prompts you to enter a
password (the switch does not display the password):
password:
After you enter the password, press [Enter]. The switch then prompts you to re-enter the password:
Reenter password:
The following command creates a local network login user name, password, and associates a
destination VLAN with this account:
create netlogin local-user accounting vlan-vsa blue
As previously described, the switch prompts you to enter and confirm the password.
History
This command was first available in ExtremeXOS 11.2.
The vlan-vsa parameter and associated options were added in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates PTP clock instance and defines the mode of operation.
Syntax Description
boundary Create the clock instance as a boundary clock.
ordinary Create the clock instance as an ordinary clock.
domain_number PTP domain number (default 0, range 0 to 255).
end-to-end- Create the clock instance as an end-to-end transparent clock.
transparent
Default
The PTP domain number defaults to 0 for boundary and ordinary clock instances.
Usage Guidelines
Use this command to create a PTP clock instance, and administratively configure the mode of operation
of PTP on this instance. You can provision a boundary or ordinary clock instance to synchronize the
node with another node with the most precise clock. In boundary clock configuration, the device
synchronizes with the grand-master, or another boundary clock, and operates as a master clock for
downstream nodes. In ordinary clock configuration, the device synchronizes with the grand-master, or
another boundary clock, and acts as a slave. The ordinary clock is by default in the slave-only mode of
operation, and does not propagate the clock downstream. The ordinary clock cannot have more than
one clock port.
The end-to-end-transparent clock can be provisioned to correct for the residence delay incurred by PTP
event packets passing through the switch (referred as residence time).
Note
You can create a maximum of two clock instances in the switch—one boundary clock and one
end-to-end transparent clock, or one ordinary clock and one end-to-end transparent clock.
The boundary and ordinary clock instances cannot be simultaneously provisioned in the
switch.
After you enable a boundary clock, you cannot create an ordinary clock. However, you can delete the
boundary clock instance and create a new one in order to change the domain number. To create an
ordinary clock instance in the switch that has the boundary clock instance enabled, delete the boundary
clock instance, save the configuration and reboot the switch. After the reboot, you can create and
enable the ordinary clock instance.
Similarly, to create and enable a boundary clock in a switch that has an ordinary clock enabled, delete
the ordinary clock instance, save the configuration and reboot the switch. After the reboot you can
create and enable a boundary clock.
The following message is displayed when you create the boundary clock instance in a device with no
prior clock instances:
Warning: The ordinary clock cannot be created after enabling the
boundary clock. A delete followed by save and reboot are required to
create the ordinary clock.
After you enable a boundary clock instance, if you delete the instance and try to create an ordinary
clock instance, the above message is displayed as an error, and the ordinary clock instance is not
created.
Example
The following command creates an ordinary clock on domain 5:
The following command creates a boundary clock on default domain (domain 0):
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2, X670-G2 series switches.
Description
Enables an NTP key for an NTP session.
Syntax Description
keyid Specifies the key ID as a value from 1 to 65534.
key_string Specifies an alphanumeric key string, from 5 to 20 numbers or
characters, or a combination of both.
md5 Specifies MD5 authentication type.
sha256 Specifies SHA-265 authentication type.
Default
N/A.
Usage Guidelines
N/A.
Example
The following command enables an NTP key using RSA Data Security, Inc. MD5 Message-Digest
Algorithm encryption on the switch:
create ntp key 1 md5 oklahoma
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates an OSPF area.
Syntax Description
area-identifier Specifies an OSPF area.
Default
Area 0.0.0.0.
Usage Guidelines
Area 0.0.0.0 does not need to be created. It exists by default.
Example
The following command creates an OSPF area:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates an OSPFv3 area.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
Default
Area 0.0.0.0.
Usage Guidelines
Area 0.0.0.0 does not need to be created. It exists by default.
Example
The following command creates a non-backbone OSPFv3 area:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates policy access-list match criteria.
Syntax Description
access-list Specifies access-list rule model to select multiple match criteria per
rule.
list_dot_rule Specifies the access-list name and rule name in the format
list_name.rule_name.
matches Selects up to 5 match criteria.
app-signature Associates an application signature to a policy profile.
udpsrc_mask Specifies the number of most significant bits to match data value
(range 1–64).
actions Specifies selecting one or more actions to occur when there is a
match.
cos Specifies Class of Service (CoS) as an action.
cos Defines the CoS (0–255), or -1 for no CoS, or CoS with no forwarding
behavior to remove the existing forwarding settings.
drop Specifies dropping any packets that match this rule.
forward Specifies forwarding any packets that match this rule.
mirror-destination Specifies mirroring any packets that match this rule.
control_index Defines which mirror destination control index (1–4).
syslog Enables, disables, or prohibits Syslog using event Policy.LogRuleHit on
first rule use.
Default
N/A.
Usage Guidelines
To use this command, the policy rule model must be set to access-list (use command configure
policy rule-model [access-list | hierarchical]).
Example
The following example creates the policy access list "ACL1.ace3" with match criteria of IP source address
"10.1.1.1" and mask "32" with the action to forward with Class of Service level "2":
# create policy access-list ACL1.ace3 matches ipsource 10.1.1.1 mask 32 actions forward
cos 2
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a pre-defined action set for use in RADIUS Change of Authentication (CoA).
Syntax Description
access-list Specifies access-list features.
action-set Defines a set of actions that can be applied to multiple sets of match
conditions.
set-id Identifies the global action-set ID (range 1–63).
drop Specifies dropping any packets that match this rule.
forward Specifies forwarding any packets that match this rule.
cos Specifies setting Class of Service (CoS).
cos Specifies the CoS value: 0–255, or -1 for no CoS, or CoS with no
forwarding behavior to remove forwarding behavior.
mirror-destination Specifies setting a mirror destination control index.
control_index Specifies setting the mirror destination control index (1–4).
syslog Specifies Syslog logging using event Policy.LogRuleHit when first rule
use occurs.
Default
N/A.
Usage Guidelines
You can view your configurations made with this command using the show policy access-list
action-set {set_id} command.
Example
The following example creates an action set "1" with CoS level of 3 and Syslog behavior:
# create policy access-list action-set 1 cos 3 syslog
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command creates a generic port-group name that can be associated with a list of ports. The
port_group option could be implemented in configure or show commands that currently accept a
port_list. The QoS commands are expanded to accept the port_group option. QoS commands
that use port groups are updated automatically if the ports group is removed or if ports are added or
removed from the group.
Syntax Description
port_group Specifies a port group name.
Default
N/A.
Usage Guidelines
Use this command to create a generic port-group name to be associated with a list of ports.
Example
create ports group testGroup
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create private-vlan
create private-vlan name {vr vr_name}
Description
Creates a PVLAN framework with the specified name.
Syntax Description
name Specifies a name for the new PVLAN.
vr_name Specifies the VR in which the PVLAN is created.
Default
N/A.
Usage Guidelines
The PVLAN is a framework that links network and subscriber VLANs; it is not an actual VLAN.
A private VLAN name must begin with an alphabetical character and may contain alphanumeric
characters and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For private VLAN naming guidelines and a list of reserved names, see Object Names in
the ExtremeXOS 30.5 User Guide.
Example
The following example creates a PVLAN named "companyx":
create private-vlan companyx
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the Private VLAN feature. For features and the
platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Adds a C executable process compiled using the C-based SDK.
Syntax Description
process ExtremeXOS user process
name Name of the user process
executable Executable
exe Name of the executable relative to /usr/local/cfg
start Startup behavior
auto Create a daemon process and start it immediately
on-demand Create a run-to-completion process and use \"start process\
node Node in stack in which to create the process.
node Primary node, backup node, or both (default is primary).
vr Virtual router in which to start the process
vr-name Virtual router name (Default is VR-Mgmt)
description Description
arg1-9 Variable value
Default
VR-Mgmt is the default VR used if not specified.
Usage Guidelines
The executable must be uploaded to /usr/local/cfg using the normal mechanisms (for example,
TFTP).
Fields are provided by the user and passed directly into an epmrc entry. Not all epmrc fields are
available.
This command adds C executable processes. To add a Python module, use the create process python-
module on page 1626 command.
A process must first exist on the primary node if you are creating it only on the backup node, If a
process already exists on the primary node, you cannot create it on both the primary and secondary
node. Also, if the backup node is down, a new process cannot be created on it.
Example
create process foo_userd executable foobard start auto vr VR-Default description “Run
foobard on the default VR” “arg1” “arg2 with spaces”
The following error is displayed if an attempt is made to create a process with an invalid name:
Error: Process name %s is invalid. Process names must begin with a letter, contain only
alphanumeric and
“_” characters, and be less than 32 characters long.
History
This command was first available in ExtremeXOS 15.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Adds a Python module process.
Syntax Description
process ExtremeXOS user process
name Name of the user process
python-module The Python module to import and run
python-module The module relative to /usr/local/cfg
start Startup behavior
auto Create a daemon process and start it immediately
on-demand Create a run-to-completion process and use \start process\
Default
VR-Mgmt is the default VR used if not specified.
Usage Guidelines
The executable must be uploaded to /usr/local/cfg using the normal mechanisms (for example,
TFTP).
From EPM’s perspective, a Python-based process is an instance of the “expy” executable with some
arguments, namely the Python module.
This command adds a Python module. To add a C executable processes, use the create process
executable on page 1624 command.
A process must first exist on the primary node if you are creating it only on the backup node, If a
process already exists on the primary node, you cannot create it on both the primary and secondary
node. Also, if the backup node is down, a new process cannot be created on it.
Example
The following are examples of create process python-module commands.
python-module foo_program start auto vr vr-default
create process foo_user1 python-module “foo.run” “arg1 to foo.main”
create process foo_user2 python-module “foo.noargs.needed”
create process foo_user3 python-module “foo.daemon” start auto “arg1 to foo.main”
The following error is displayed if an attempt is made to create a process with an invalid name:
Error: Process name %s is invalid. Process names must begin with a letter, contain only
alphanumeric and
“_” characters, and be less than 32 characters long.
History
This command was first available in ExtremeXOS 15.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create protocol
create protocol {filter} filter_name
Description
Creates a user-defined protocol filter.
Syntax Description
filter Specifies a protocol filter.
filter_name Specifies a protocol filter name. The protocol filter name can have a
maximum of 31 characters.
Default
N/A.
Usage Guidelines
Protocol-based VLANs enable you to define packet filters that the switch can use as the matching
criteria to determine if a particular packet belongs to a particular VLAN.
After you create the protocol, you must configure it using the configure protocol command. To assign it
to a VLAN, use the configure {vlan} vlan_name protocol {filter} filter_name
command.
Example
The following command creates a protocol named "my_filter", and a protocol filter named
"my_other_filter":
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create qosprofile
create qosprofile [QP2| QP3 | QP4 | QP5 | QP6 | QP7]
Description
Creates a QoS profile.
Syntax Description
QP2....QP7 Specifies the QoS profile you want to create.
Default
N/A.
Usage Guidelines
ExtremeSwitching series switches allow dynamic creation and deletion of QoS profiles QP2 to QP7.
Creating a QoS profile dynamically does not cause loss of traffic.
QoS profiles QP1 and QP8 are part of the default configuration and cannot be deleted. You must create
a QoS profile in the range of QP2 to QP7 before you can configure it or assign it to traffic groups.
Qos profile QP7 cannot be created in a SummitStack; this queue is reserved for control traffic.
Note
The sFlow application uses QP2 to sample traffic on SummitStack and ExtremeSwitching
series switches; any traffic grouping using QP2 can encounter unexpected results when sFlow
is enabled on these specific devices.
Example
The following command creates QoS profile QP3:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates and sends an SNMP trap containing the information defined in the command.
Syntax Description
severity Specifies one of the eight severity levels defined in the ExtremeXOS
software. Enter one of the following values: critical, error, warning,
notice, info, debug-summary, debug-verbose, debug-data.
EventName Specifies the event name. Enter a name using alphanumeric
characters.
msg Specifies a message. Enter the message using alphanumeric
characters.
Default
N/A.
Usage Guidelines
None.
Example
The following example sends a trap of severity info for event AAA with the message user XYZ logged in:
create snmp trap severity info event AAA "user XYZ logged in"
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a file for the user-key or host-key.
Syntax Description
host-key Specifies the name of the host-key.
user-key Specifies the name of the user-key.
key_name Specifies the name of the public key.
Default
N/A.
Usage Guidelines
This command is used to write the user or the host public key in a file. The key files will be created with
a .ssh file extension; this enables the administrator to copy the public key files to another server.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a user key.
Syntax Description
key_name Specifies the name of the public key.
key Specifies the key.
Note: The key cannot have any spaces in it.
subject Specifies the subject.
comment Specifies the comment (an optional field).
Default
N/A.
Usage Guidelines
This command is used to enter, or cut and paste, your public key. You can also enter the public key into
the switch by using the SCP or SFTP client that is connected to the switch.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create stpd
create stpd stpd_name {description stpd-description}
Description
Creates a user-defined STPD.
Syntax Description
stpd_name Specifies a user-defined STPD name to be created. May be up to 32
characters in length.
stpd-description Specifies an STP domain description string.
Default
The default device configuration contains a single STPD called s0.
When an STPD is created, the STPD has the following default parameters:
• State—disabled.
• StpdID—none.
• Assigned VLANs—none.
• Bridge priority—32,768.
• Maximum BPDU age—20 seconds.
• Hello time—2 seconds.
• Forward delay—15 seconds.
• Operational mode—802.1D.
• Rapid Root Failover—disabled.
• Default Binding Mode (encapsulation mode)—Ports in the default STPD (s0) are in 802.1d mode.
Ports in user-created STPDs are in emistp mode.
• Maximum hop count (when configured for MSTP)—20 hops.
• STP domain description string—empty.
Usage Guidelines
The maximum length for a name is 32 characters. Names can contain alphanumeric characters and
underscores ( _ ) but cannot be any reserved keywords, for example, stp or stpd. Names must start with
an alphabetical character, for example, a, Z. For name creation guidelines and a list of reserved names,
see Object Names on page 13.
Each STPD name must be unique and cannot duplicate any other named STPDs on the switch. If you
are uncertain about the STPD names on the switch, use the show stpd command to view the STPD
names.
You can, however, re-use names across multiple categories of switch configuration. For example, you
can use the name Test for an STPD and a VLAN. If you use the same name, we recommend that you
specify the appropriate keyword when configuring the STPD. If you do not specify the appropriate
keyword, the switch displays a message similar to the following:
%% Ambiguous command: "configure Test"
To view the names of the STPDs on the switch, enter configure and press [Tab]. Scroll to the end of the
output to view the names.
The maximum length for an STPD description is 180 characters. The description must be in quotes if the
string contains any spaces. To display the description, use the show stpd stpd_name command.
Each STPD has its own Root Bridge and active path. After the STPD is created, one or more VLANs can
be assigned to it.
Example
The following example creates an STPD named purple_st:
create stpd purple_st
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a time profile of an appointment starting at a specific time on a specific calendar date.
Syntax Description
time_profile_name Specifies the name of the time profile.
start Specifies the appointment starting specification .
start_hour Specifies the start hour. The range is 0-23.
start_minute Specifies the start minutes. The range is 0-59.
start_month Specifies the start month. The range is 1-12.
start_day Specifies the start day. The range is 1-31.
start_year Specifies the start year, YYYY.
stop Specifies the appointment stopping specification.
stop_hour Specifies the stop hour. The range is 0-23.
stop_minute Specifies the stop minutes. The range is 0-59.
stop_month Specifies the stop month. The range is 1-12.
stop_day Specifies the stop day. The range is 1-31.
stop_year Specifies the stop year, YYYY.
in Specifies the stop in time.
stop_count Specifies the stop count.
stop_units Specifies the stop units (for example, minutes , hours, days, weeks).
Default
N/A.
Usage Guidelines
Use this command to create a time profile of an appointment starting at a specific time on a specific
calendar date.
Example
The following example configures a time profile named "testprofile" to start at 11:30 a.m. on February 24,
2012:
configure time profile testprofile start 11 : 30 { 2 { / 24 { / 2012
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Configures a recurring time profile using a day of the week .
Syntax Description
time_profile_name Specifies the name of the time profile.
recur Specifies that the time profile recurs.
daily every Specifies if the recurrence is daily, or on specified days.
daily_interval days Specifies the recurrence rate. The range is 1-7
weekly every Specifies if the recurrence is every week, or on specified weeks.
weekly_interval weeks Specifies the recurrence rate. The range is 1-52.
on Specifies that the recurrent profile is on a specified week or month.
weekdays Specifies the recurrence is on weekdays.
weekends Specifies the recurrence is on weekends.
monthly every Specifies the recurrence is every month or on a specified month.
monthly_interval Specifies the stop month. The range is 1-12.
months
stop_day Specifies the stop day. The range is 1-31.
stop_year Specifies the stop year, YYYY.
in Specifies the stop in time.
stop_count Specifies the stop count.
stop_units Specifies the stop units (for example, minutes , hours, days, weeks).
Default
N/A.
Usage Guidelines
Use this command to create a time profile of an appointment starting at a specific time on a specific
calendar date.
Example
The following command configures a time profile named "testprofile" to start at 11:30 a.m. on February
24, 2012:
configure time profile testprofile start 11 : 30 { 2 { / 24 { / 2012
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates an IPv6-to-IPv4 (6to4) tunnel.
Syntax Description
tunnel_name Specifies an IPv6 tunnel.
source-address Specifies an IPv4 address for the tunnel.
Default
N/A.
Usage Guidelines
This command will create a new IPv6-to-IPv4 (also known as a 6to4 tunnel), and add it to the system.
Only one 6to4 tunnel can be configured on any particular VR.
The tunnel name must be unique and cannot overlap the same name space as VLANs, other tunnels, or
VRs. The name must begin with an alphabetical character and may contain alphanumeric characters
and underscores ( _ ), but it cannot contain spaces. The maximum allowed lengthfor a name is 32
characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
The source address of the tunnel must be one of the IPv4 addresses already configured on the switch.
You cannot remove an IPv4 address from the switch if a tunnel that uses it still exists.
Example
The following example creates the 6to4 tunnel "link35" with source address 192.168.10.1:
create tunnel link35 6to4 source 192.168.10.1
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 interworking feature in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Allows switch administrators to add a GRE tunnel. This command is in-line with adding an ipv6-in-ipv4
tunnel.
Syntax Description
gre Generic Routing Encapsulation tunnel.
destination-address IPv4 destination address of the tunnel.
source-address IPv4 source address of the tunnel.
Default
No GRE tunnels exist in the system.
Usage Guidelines
Use this command to add a GRE tunnel.
Example
create tunnel myGREtunnel gre destination 10.0.0.2 source 10.0.0.1
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the platforms listed for the GRE feature in the ExtremeXOS 30.5 Feature
License Requirements document.
Description
Creates an IPv6-in-IPv4 (6in4) tunnel.
Syntax Description
tunnel_name Specifies an IPv6 tunnel.
source-address Specifies an IPv4 address for the tunnel.
Default
N/A.
Usage Guidelines
This command creates a new IPv6-in-IPv4 (otherwise known as a configured tunnel or a 6in4 tunnel)
and add it to the system. A maximum of 255 tunnels (including one 6to4 tunnel) can be configured on
the system.
The tunnel name must be unique and cannot overlap the same name space as VLANs, other tunnels, or
VRs. The name must begin with an alphabetical character and may contain alphanumeric characters
and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name is 32
characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
The source address of the tunnel must be one of the IPv4 addresses already configured on the switch.
You cannot remove an IPv4 address from the switch if a tunnel is still exists that uses it.
Example
The following example creates the 6in4 tunnel "link39" with destination address 10.10.10.10 and source
address 192.168.10.15:
create tunnel link39 ipv6-in-ipv4 destination 10.10.10.10 source 192.168.10.15
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 interworking feature in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Creates a new profile of a specified type.
Syntax Description
profile-name Specifies the UPM profile to be created.
Default
N/A.
Usage Guidelines
Use this command to create a profile and name it. The maximum profile size is 5000 characters.
A UPM profile name must begin with an alphabetical character and may contain alphanumeric
characters and underscores (_), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For name creation guidelines and a list of reserved names, see Object Names on page
13.
There is a limited capability to edit the profile with this command. If you enter a period (.) as the first
and the only character on a line, you terminate the editing of the file. Use the command: edit upm
profile profile-name for block mode capability.
Example
The following example shows how to create a profile named "P2":
# create upm profile p2
enable port 2:*
disable port 3:1
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates and names a UPM timer.
Syntax Description
timer-name Specifies the name of the UPM timer to be created.
Default
N/A.
Usage Guidelines
You can create UPM timers with a name. A profile can be associated with eight timers, but a timer can
be bound to only one profile at any point in time. You can create a maximum of 32 timers. A name
space for the timers is available to help when you are typing the commands.
A UPM timer name must begin with an alphabetical character and may contain alphanumeric characters
and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name is 32
characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
create virtual-network
create virtual-network vn_name {flooding [standard | explicit-remotes]}
Description
This command creates a virtual network instance in ExtremeXOS. The virtual network instance maps to
a bridge instance within ExtremeXOS.
Syntax Description
vn_name Alphanumeric string identifying the Virtual Network to be created.
flooding Configure flooding method for unknown-destination frames.
standard Standard L2 flooding behavior to remote endpoints and tenant ports.
explicit-remotes Explicitly configured flooding to remote endpoints with standard L2
flooding to tenant ports.
Default
Standard.
Usage Guidelines
This bridge instance is not dependent on the overlay encapsulation scheme. The virtual network name
can be a maximum of 32 characters. The current restrictions on naming objects in ExtremeXOS apply.
Virtual network names are added to a new namespace within ExtremeXOS. Virtual networks may use
one of two flooding methods for flooding to remote endpoints. The “standard” mode offers handling of
unknown destination frames very similar to standard Layer 2. The unknown destination frames are
flooded to all local ports and remote endpoints. The “explicit-remotes” mode offers granular control of
which remote endpoints receive certain types of unknown destination frames. Different remote
endpoint sets may be configured for; broadcast, unknown unicast, and unknown multicast. These sets
are configured with create fdb and configure fdb commands
Example
The following example creates the virtual network "my_virtual_network":
create virtual-network my_virtual_network
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, and X465 standalone, and stacks with
X670-G2 , and X465 slots only.
Description
This command creates a remote endpoint.
Syntax Description
ipaddress A remote endpoint IP address.
vr VR/VRF instance the remote endpoint is associated with
vr_name An existing VR/VRF name.
Default
VR-Default
Usage Guidelines
This command is useful when you want to explicitly add a remote endpoint in addition to the ones
learnt dynamically (OSPF extensions). In flood mode explicit, you must create a remote-endpoint using
this command, if the configurations on remote-endpoint (like monitor) need to be saved to the
configuration. Otherwise, the configuration will be lost after the switch reboots.
Example
To create a remote endpoint:
create virtual-network vxlan remote-endpoint ipaddress 1.2.3.4
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
create virtual-router
To create virtual routers, use the following command:
create virtual-router vr-name {type [vrf | vpn-vrf {vr parent_vr_name}]}
To create local-only virtual routers (ExtremeSwitching X440.G2 and X620 only), use the following
command:
create virtual-router vr-name local-only {type [vrf | vpn-vrf {vr
parent_vr_name}]}
Description
Use the create virtual-router command to create a user VR or VRF.
Syntax Description
vr-name Virtual router name.
type Specifies the type of virtual router you are creating.
local-only Specifies local-only VR. For ExtremeSwitching X435, X440-G2, and
X620 series switches and stacks only.
vrf Specifies that you are creating a new L3 or IP routing domain.
vpn-vrf Specifies that you are creating a new L3 or IP routing domain that
supports L3VPNs. For ExtremeSwitching X460-G2, X670-G2, X870,
X690 series switches only.
parent_vr_name Specifies the parent VR that supports the VRF you are creating.
Default
If no type is specified, then the default is to create a user virtual router. A virtual router creates
separate L3 Routing Domains.
If parent_vr_name parameter is not specified, the VRF will be created under the VR of the current CLI
context. The default is VR-Default.
Usage Guidelines
All VRFs are created under default VR or a user created VR. VPN-VRFs can be created in any VR but for
L3VPNs to work, VPN-VRFs should be created under a parent VR where MPLS is configured. There is a
single namespace maintained by the configuration manager and it contains VRs and VRFs. Hence the
name for a VR or a VRF must be unique in ExtremeXOS.
A VR or VRF name must begin with an alphabetical character and may contain alphanumeric characters
and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name is 31
characters. The name must be unique among the object names on the switch, and the name is case
insensitive. For information on VR and VRF name guidelines and a list of reserved names, see Object
Names in the ExtremeXOS 30.5 User Guide.
When a new VR is created, by default, no ports are assigned, no VLAN interface is created, and no
support for any routing protocols is added. A protocol process is started in the parent VR when a
protocol instance is added to a VRF. If you do not specify a VR type, this command creates a user VR.
VRFs are supported as children of user VRs or VR-Default. If a parent_vr_name is specified when a
VRF is created, the new VRF is created under that parent, provided that the parent supports VRFs. If no
parent is specified, the VRF is assigned to the VR for the current VR context, or to VR-Default if the
current VR context does not support VRFs.
Note
To support Layer 3 VPNs, a VPN VRF must be created under the VR that supports MPLS. The
software supports MPLS on only one VR.
Starting with ExtremeXOS 22.6, you can create "local-only" virtual routers that have separate logical IP
lookup tables used only for IP packets to or from the switch's local IP addresses. This feature is only
applicable for ExtremeSwitching X440-G2 and X620 series switches and stacks with these switches. All
other platforms support separate logical IP lookup tables in hardware, so "local-only" is not specified.
Example
The following example creates the VR "vr-acme":
create virtual-router vr-acme
The following example creates the local-only VR "vrl" (on X435, X440-G2, and X620 series switches
only):
create virtual-router vr1 local-only
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create vlan
create vlan [ vlan_name {tag tag} | vlan_list ] {description vlan-
description } {vr name }
Description
Creates a named VLAN.
Syntax Description
vlan_name Specifies a VLAN name (up to 32 characters).
vlan_list Specifies a VLAN list of IDs.
tag Specifies a value to use as an 802.1Q tag. The valid range is from 2 to 4095.
vlan- Specifies a VLAN description (up to 64 characters) that appears in show vlan
description commands and can be read from the ifAlias MIB object for the VLAN.
name Specifies a VR or virtual routing and forwarding (VRF) instance in which to create
the VLAN.
Note: User-created VRs are supported only on the platforms listed for this feature
in the ExtremeXOS 30.5 Feature License Requirements document. On switches
that do not support user-created VRs, all VLANs are created in VR-Default and
cannot be moved.
Default
A VLAN named Default exists on all new or initialized Extreme switches:
• It initially contains all ports on a new or initialized switch, except for the management port(s), if there
are any.
• It has an 802.1Q tag of 1.
• The default VLAN is untagged on all ports.
• It uses protocol filter any.
If you do not specify the VR, the VLAN is created in the current VR.
If the VLAN description contains one or more space characters, you must enclose the complete name in
double quotation marks.
Usage Guidelines
A newly-created VLAN has no member ports, is untagged, and uses protocol filter any until you
configure it otherwise. Use the various configure vlan commands to configure the VLAN to your needs.
Internal VLANids are assigned automatically using the next available VLANid starting from the high end
(4094) of the range.
The VLAN name can include up to 32 characters. VLAN names must begin with an alphabetical letter,
and only alphanumeric, underscore ( _ ), and hyphen (-) characters are allowed in the remainder of the
name. VLAN names cannot match reserved keywords. For more information on VLAN name
requirements and a list of reserved keywords, see Object Names in the ExtremeXOS 30.5 User Guide.
Note
If you use the same name across categories (for example, STPD and EAPS names), we
recommend that you specify the identifying keyword as well as the actual name. If you do not
use the keyword, the system may return an error message.
VLAN names are locally significant. That is, VLAN names used on one switch are only meaningful to that
switch. If another switch is connected to it, the VLAN names have no significance to the other switch.
Note
The VLAN description is stored in the ifAlias MIB object.
If you do not specify a VR when you create a VLAN, the system creates that VLAN in the default VR
(VR-Default). The management VLAN is always in the management VR (VR-Mgmt).
Once you create VRs, ExtremeXOS allows you to designate one of these as the domain in which all your
subsequent configuration commands, including VLAN commands, are applied. If you create VRs, ensure
that you are creating the VLANs in the desired virtual-router domain.
Note
User-created VRs are supported only on the platforms listed for this feature in the
ExtremeXOS 30.5 Feature License Requirements document.. On switches that do not support
user-created VRs, all VLANs are created in VR-Default and cannot be moved.
Example
The following example creates a VLAN named accounting on the current VR:
create vlan accounting description "Accounting Dept"
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
create vm image
create vm vm_name image image_file {memory memory_size} {cpus num_cpus}
{vnc [none | vnc_display]}
Description
Creates a guest virtual machine (VM) from a disk image file.
Syntax Description
vm Designates creating a virtual machine.
vm_name Specifies the VM name.
image Designates using a disk image file to create the VM.
image_file Specifies the disk image file to use in qcow2 or any QEMU-supported
(including VMDK) format.
memory Designates specifying the amount of RAM allocated to the VM.
memory_size Specifies the amount of RAM (in MB) allocated to the VM. The default
is 4,096.
cpus Designates specifying the number of CPUs to allocate to the VM.
num_cpus Specifies the number of CPUs to allocate to the VM. Range is 1–2. The
default is 1.
vnc Specifies providing a display number for VNC access.
none Disables VNC access (default).
vnc_display Specifies the VNC screen number. Range is 0–15.
Default
The default memory size to run the VM on is 4,096 MB.
Usage Guidelines
The disk image must be a qcow2 or any QEMU-compatible file.
If the VM storage device has not been initialized when this command is run, you are prompted to run
the clear vm storage command to initiate partitioning, file system creation, and initialization of the
file/directory structure on the device.
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
For the VNC display number (or screen number), you can use the values from 0 to 15. These correspond
to TCP ports 5,900 to 5,915. Multiple VMs can be configured with the same VNC display, but VMs
configured with the same display number cannot run at the same time. A VM cannot be started if the
VNC port is already in use. The VNC display is only accessible using SSH tunnel for security reasons.
Example
The following example creates a VM called "vm1" with disk image file "my_file" with 2,000 MB as the
amount of RAM allocated to the VM:
# create vm vm1 image my_file memory 2000
History
This command was first available in ExtremeXOS 30.3.
VNC capability and support for any QEMU-compatible disk was added in ExtremeXOS 30.5.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
create vm ova
create vm vm_name ova ova_file {memory memory_size} {cpus num_cpus} {vnc
[none | vnc_display]}
Description
Creates a guest virtual machine (VM) from an Open Virtual Appliance (OVA) file.
Syntax Description
vm Designates creating a virtual machine.
vm_name Specifies the VM name.
ova Designates using an OVA file to create the VM.
ova_file Specifies the OVA file to use.
memory Designates specifying the amount of RAM allocated to the VM.
memory_size Specifies the amount of RAM (in MB) allocated to the VM. The default
is 4,096.
cpus Designates specifying the number of CPUs to allocate to the VM.
num_cpus Specifies the number of CPUs to allocate to the VM. Range is 1–2. The
default is 1.
vnc Specifies providing a display number for VNC access.
none Disables VNC access (default).
vnc_display Specifies the VNC screen number. Range is 0–15.
Default
The default memory size to run the VM on is 4,096 MB.
Usage Guidelines
If the VM storage device has not been initialized when this command is run, you are prompted to run
the clear vm storage command to initiate partitioning, file system creation, and initialization of the
file/directory structure on the device.
Compatibility issues may occur when using third-party OVA files. The image format qcow2 is generally
more reliable.
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
For the VNC display number (or screen number), you can use the values from 0 to 15. These correspond
to TCP ports 5,900 to 5,915. Multiple VMs can be configured with the same VNC display, but VMs
configured with the same display number cannot run at the same time. A VM cannot be started if the
VNC port is already in use. The VNC display is only accessible using SSH tunnel for security reasons.
Example
The following example creates a VM called "vm1" with OVA file "my_ova" with 2,000 MB as the amount
of RAM allocated to the VM:
# create vm vm1 ova my_ova memory 2000
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
create vman
create vman [vman-name | vman_list] {learning-domain} {vr vr_name}
Description
Creates a VMAN.
Syntax Description
vman-name Specifies a VMAN name using up to 32 characters.
vman_list Specifies the VMAN tag range or VMAN Tag List (Ex: 2-4 or 2,3).
learning-domain Specifies that this VMAN is a learning domain, which supports inter-
VMAN forwarding.
vr Specifies a virtual router.
vr_name Specifies a virtual router name.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document. On switches that do not support user-created VRs, all
VLANs are created in VR-Default and cannot be moved.
Default
N/A.
Usage Guidelines
For information on VMAN name requirements and a list of reserved keywords, see Object Names on
page 13. You must use mutually exclusive names for:
• VLANs
• VMANs
• IPv6 tunnels
The keyword learning-domain enables you to create a VMAN that serves as a learning domain for inter-
VMAN forwarding.
If you do not specify the virtual router, the VMAN is created in the current virtual router. After you create
the VMAN, you must configure the VMAN tag and add the ports that you want.
Example
The following example creates a VMAN named "fred":
create vman fred
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Creates a local VM database entry to be used for VM MAC local authentication, with optional
parameters.
Syntax Description
mac Specifies the MAC address for the VM. This must match the MAC
address configured on the VM and be unique among the locally
configure VM addresses.
name Specifies a name to represent this VM in show vm-tracking command
display.
ipaddress Specifies the IP address for the VM. This must match the IP address
configured on the VM.
vpp_name Specifies the virtual port profile to apply for the local VM.
tag VLAN tag between 1 and 4094.
vr_name Virtual router name.
Default
N/A.
Usage Guidelines
A VM name can include up to 32 characters. VM names must begin with an alphabetical letter, and only
alphanumeric, underscore ( _ ), and hyphen (-) characters are allowed in the remainder of the name. VM
names cannot match reserved keywords. For more information on VM name requirements and a list of
reserved keywords, see Object Names.
The following command creates a VM entry named VM1 in the local VM database:
# create vm-tracking local-vm mac-address 00:E0:2B:12:34:56 name VM1
The following command creates a VM entry and assigns IP address 10.10.2.2 to the entry:
# create vm-tracking local-vm mac-address 00:E0:2B:12:34:57 ip-address 10.10.2.2
The following command creates a VM entry and assigns VPP vpp1 to it:
# create vm-tracking local-vm mac-address 00:E0:2B:12:34:58 vpp vpp1
History
This command was first available in ExtremeXOS 12.5.
The ingress-vpp and egress-vpp options were replaced with the vpp option in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Creates a Local VPP (LVPP).
Syntax Description
vpp_name Specifies a name for the new VPP.
Default
N/A.
Usage Guidelines
A VPP name can include up to 32 characters. VPP names must begin with an alphabetical letter, and
only alphanumeric, underscore (_), and hyphen (-) characters are allowed in the remainder of the name.
VPP names cannot match reserved keywords. For more information on VPP name requirements and a
list of reserved keywords, see Object Names on page 13.
Example
The following example creates a VPP named vpp1:
# create vm-tracking vpp vpp1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Note
This command has been replaced with the following command: create l2vpn [vpls
vpls_name | vpwsvpws_name] fec-id-type pseudo-wire pwid .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Creates a VPLS instance with the specified vpls_name.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string). The vpls_name string must
begin with an alphabetic character, and may contain up to 31 additional alphanumeric
characters.
pwid Specifies a PW ID. Must be a non-zero 32-bit value that has network-wide significance.
Default
For the VPLS dot1q tag, the default value is exclude.
Usage Guidelines
This command creates a VPLS instance with the specified vpls_name. Each VPLS represents a
separate virtual switch instance (VSI).
The vpls_name parameter must begin with an alphabetical character and may contain alphanumeric
characters and underscores ( _ ), but it cannot contain spaces. The maximum allowed length for a name
is 32 characters. For name creation guidelines and a list of reserved names, see Object Names in the
ExtremeXOS 30.5 User Guide.
Each VPLS is a member of a single VPN and each VPN may have only one associated VPLS per switch.
External to the switch, each VPN has an identifier.
Any non-zero 32-bit value that has network-wide significance can be specified for the identifier. This
pwid is used on all pseudowires in the VPLS.
Note
The switch's LSR ID must be configured before a VPLS can be created.
Example
This example creates a VPLS with 99 as the PW ID:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command defines a VRRP group to operate in high-scale mode.
Syntax Description
group Specifies setting up a VRRP group for high-scale mode.
group_name Specifies the VRRP group name.
Default
None.
Example
The following example creates a VRRP group called "vrrp1".
create vrrp group vrrp1
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates a VRRP instance on the switch.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vlan_list VLAN list (1–4,094).
vridval Specifies a VRID for the VRRP instance. The value can be in the range
of 1‑255.
vrid_list List of virtual router IDs (1–255).
Default
N/A.
Usage Guidelines
VRRP Router IDs can be used across multiple VLANs. You can create multiple VRRP routers on different
VLANs. VRRP router IDs need not be unique to a specific VLAN.
Note
The total number of supported VRRP router instances is dependent on the switch hardware.
For more information, see the ExtremeXOS Release Notes.
Before configuring any VRRP router parameters, you must first create the VRRP instance on the switch.
If you define VRRP parameters before creating the VRRP, you might see an error similar to the
following:
If this happens, create the VRRP instance and then configure its parameters.
Example
The following command creates a VRRP router on VLAN vrrp-1, with a VRRP router ID of 1:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Creates the Web server target in the XML client.
Syntax Description
new-target Specifies a name for the target being created.
url Specifies the Web server URL.
vr_name Specifies the name of the virtual router over which the XML client
process can connect to the Web server.
user Specifies the name of the user.
encrypted-auth Specifies the encrypted user authentication string.
queue-size Specifies, in numeric format, the size of the buffer that stores
incoming events from ExtremeXOS.
Default
N/A.
Usage Guidelines
Use this command to create the Web server target in the XML client process.
Note
You cannot enter a password in the CLI directly. It is a two-step process similar to creating a
user account in ExtremeXOS.
Example
The following command creates a target target2 on http://10.255.129.22:8080/xos/webservice with a
queue size of 100:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete access-list
delete access-list dynamic_rule
Description
Deletes a dynamic ACL.
Syntax Description
dynamic_rule Specifies the dynamic ACL name.
Default
N/A.
Usage Guidelines
This command deletes a dynamic ACL rule. Before you delete a dynamic ACL, it must be removed from
any interfaces it is applied to. Use the configure access-list delete command to remove the ACL from an
interface.
Example
The following command deletes the dynamic ACL icmp-echo:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to delete a network-zone and all configurations that belong to that zone.
Syntax Description
zone_name Network-zone name
Default
N/A.
Usage Guidelines
Use this command to delete a network-zone and all configurations belonging to that zone.
Example
If the user tries to delete a network-zone that is bound with one or more policy files, the following error
message will be displayed, and the command will be rejected.
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an ACL zone.
Syntax Description
name Specifies the zone name.
Default
N/A.
Usage Guidelines
This command deletes an ACL zone. You must remove all applications from a zone before you can
delete the zone. To delete an application from a zone, use the command configure access-list zone
name delete application appl-name .
Example
The following command deletes the zone my_zone:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete account
delete account name
Description
Deletes a specified user account.
Syntax Description
name Specifies a user account name.
Default
N/A.
Usage Guidelines
Use the show accounts command to determine which account you want to delete from the system.
The show accounts output displays the following information in a tabular format:
• The user name.
• Access information associated with each user.
• User login information.
• Session information.
Depending on the software version running on your switch and the type of switch you have, additional
account information may be displayed.
You must have administrator privileges to delete a user account. The system must have one
administrator account; the command will fail if an attempt is made to delete the last administrator
account on the system.
To ensure security, change the password on the default account, but do not delete it. The changed
password will remain intact through configuration uploads and downloads.
If you must delete the default account, first create another administrator-level account.
Example
The following command deletes account John2:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete auto-peering
delete auto-peering
Description
This command deletes auto-peering, removing all of the auto-peering configuration. This command
deletes the VLAN list, loopback, and BGP configuration created with enabling auto-peering.
Syntax Description
This command has no arguments or variables.
Default
N/A
Usage Guidelines
Important
Deleting auto-peering when executed on a large leaf-spine topology causes massive change
in the network with many route withdrawals and updates.
Example
The following example deletes auto-peering:
delete auto-peering
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series switches.
This feature requires the Advanced Edge license. For more information about licenses, see the
ExtremeXOS 30.5 Feature License Requirements.
Description
Deletes an EVPN instance.
Syntax Description
bgp BGP capability.
evpn EVPN protocol.
instance Specifies deleting an EVPN instance.
evpn_instance_name Name of the EVPN instance.
Default
N/A.
Example
The following example deletes an EVPN instance named "my_evpn":
# delete bgp evpn instance my_evpn
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes one or all BGP neighbors.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of the BGP neighbor to be deleted.
all Specifies all IPv4 and IPv6 neighbors.
Default
N/A.
Usage Guidelines
You can use global unicast remote addresses to delete all BGP peer types. You can use link-local remote
address to delete only EBGP single-hop peers.
Example
The following command deletes the specified IPv4 BGP neighbor:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a peer group.
Syntax Description
peer-group-name Specifies a peer group.
Default
N/A.
Usage Guidelines
Use this command to delete a specific BGP peer group.
Example
The following command deletes the peer group named outer:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes the specified maintenance domain (MD) from the switch, as well as all configuration setting
related to this MD.
Syntax Description
domain Enter the name of the domain you want to delete.
Default
N/A.
Usage Guidelines
This command deletes all configuration settings related to the domain—for example, all MAs, MIPs, and
MEPs—as well as the domain itself.
Example
The following command deletes the domain atlanta (as well as all settings related to this domain):
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or all CFM segments.
Syntax Description
segment_name An alpha-numeric string identifying the segment name.
all Specifies all CFM segments.
Default
N/A.
Usage Guidelines
Use this command to delete one or all CFM segments.
Example
The following example deletes the CFM segment "segment-new":
delete cfm segment segment-new
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an EAPS shared port on a switch.
Syntax Description
ports Specifies the port number of the Common Link port.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes shared port 1:1.
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on all platforms with the appropriate license. For complete information about
software licensing, including how to obtain and upgrade your license and what licenses are appropriate
for this feature, see the ExtremeXOS 30.5 Feature License Requirements document.
delete eaps
delete eaps name
Description
Deletes the EAPS domain with the specified name.
Syntax Description
name Specifies the name of an EAPS domain to be deleted.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes EAPS domain eaps_1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete erps
delete erps ring-name
Description
Deletes an ERPS ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
Default
N/A.
Usage Guidelines
Use this command to delete an ERPS ring.
Example
The following command deletes an ERPS ring named “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
delete esrp
delete esrp esrpDomain
Description
Deletes the ESRP domain with the specified name.
Syntax Description
esrpDomain Specifies the name of an ESRP domain to be deleted.
Default
N/A.
Usage Guidelines
You must first disable an ESRP domain before you delete it. To disable an ESRP domain, use the
disable esrp command.
You do not have to remove the master or member VLANs from an ESRP domain before you delete it.
When you delete an ESRP domain, All VLANs are automatically removed from the domain.
For ESRP domains configured of type VPLS-redundancy, you need to unconfigure all associated VPLS
instances from the ESRP domain using the unconfigure vpls redundancy command before deleting the
domain.
Example
The following command deletes ESRP domain esrp1 from the switch:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a MAC address from the MAC address tracking table.
Syntax Description
mac_addr Specifies a device MAC address, using colon-separated bytes.
all Specifies that all MAC addresses are to be deleted from the MAC
address tracking table.
Default
The MAC address tracking table is empty.
Usage Guidelines
None.
Example
The following example deletes a MAC address from the MAC address tracking table:
delete fdb mac-tracking entry 00:E0:2B:12:34:56
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete fdb
delete fdb [all | mac_address [vlan vlan_name ] |vxlan { vr vr_name }
{ipaddress} remote_ipaddress ] | broadcast vlan vlan_name vxlan { vr
vr_name } {ipaddress} remote_ipaddress | unknown-multicast vlan
vlan_name vxlan { vr vr_name } {ipaddress} remote_ipaddress |
Description
Deletes one or all permanent FDB entries.
Syntax Description
all Specifies all FDB entries.
mac_address Specifies a device MAC address, using colon-separated bytes.
vlan_name Specifies the specific VLAN name.
broadcast Forwarding destination(s) for broadcast traffic.
unknown-unicast Forwarding destination(s) for unknown unicast traffic.
unknown-unicast Forwarding destination(s) for unknown multicast traffic.
vxlan The MAC address is reachable through a VXLAN Tunnel.
vr VR/VRF instance the IPv4 address is configured on.
vr_name An existing VR/VRF name.
ipaddress Configure the IP address of the remote tunnel endpoint to which the
MAC needs to be bound.
remote_ipaddress IPv4 address of the remote tunnel endpoint.
Default
N/A.
Usage Guidelines
In ExtremeXOS 21.1, this command was extended to delete a remote VTEP as a destination to a MAC
address. Three new tokens “broadcast”, “unknown-multicast” and “unknown-unicast” have been added
to this command. When you want to specify a destination to forward all broadcast or unknown unicast
traffic on that VLAN, these token are used. For “broadcast”, “unknown-multicast” and “unknown-
unicast” only remote VTEPs (and not port_list or blackhole) can be specified in this release of
ExtremeXOS. These entries can only be created when the virtual-network is in explicit-remote flooding
mode.
Example
The following example deletes a permanent entry from the FDB:
delete fdb 00:E0:2B:12:34:56 vlan marketing
The following example deletes all permanent entries from the FDB:
delete fdb all
History
This command was first available in ExtremeXOS 11.0.
In ExtremeXOS 12.3, the fdb keyword was introduced as an alias to the fdbentry keyword to avoid
interference with the syntax of the MAC-Tracking feature commands. Both keywords execute; however,
the syntax helper (tab completion) does not recognize the fdbentry keyword.
Three new tokens “broadcast”, “unknown-multicast” and “unknown-unicast” were added to this
command in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete flow-redirect
delete flow-redirect flow_redirect_name
Description
Deletes the named flow redirection policy.
Syntax Description
flow_redirect_name Specifies the name of the flow redirection policy.
Default
N/A.
Usage Guidelines
Use this command to delete a named flow-redirection policy. Before it can be deleted, all nexthop
information must be deleted, otherwise an error message is displayed.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes one or all roles.
Syntax Description
role_name Specifies a name of an existing role to delete.
all Specifies that all roles are to be deleted.
Default
N/A.
Usage Guidelines
Any policy applied to users of a deleted role gets reverted. The users are placed under one of the other
roles based on their attributes. Parent and child relationships to other roles are also deleted. For
example, all child roles under the deleted role become orphans and hence they and their descendants
no longer inherit the policies of the deleted role.
Example
The following example deletes the role named India-Engr:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables and deletes the specified IS-IS router process in the current virtual router.
Syntax Description
all Deletes all IS-IS router processes.
area_name Specifies the name of the IS-IS router process to be deleted.
Default
None.
Usage Guidelines
All configuration for the specified router is lost. All routes learned from this router process are purged
from the routing tables.
Example
The following command deletes the IS-IS process named areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
Deletes an L2PT profile.
Syntax Description
l2pt Deletes a Layer 2 protocol tunneling profile.
profile Profile that defines L2PT configuration for L2 protocols.
profile_name Specifies a profile name (maximum 32 characters).
Default
Disabled.
Usage Guidelines
Use this command to delete an L2PT profile.
Example
The following example deletes my_l2pt_prof that is currently in use by a service:
delete l2pt profile my_l2pt_prof
The following example deletes my_l2pt_prof that is not associated with any service:
delete l2pt profile my_l2pt_prof
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete l2vpn
delete l2vpn [vpls [vpls_name | all] | vpws [vpws_name | all]]
Description
Deletes the specified VPLS or VPWS.
Syntax Description
vpls_nam Identifies the VPLS within the switch (character string).
e
vpws_nam Identifies the VPWS within the switch (character string).
e
all Specifies all VPLS or VPWS instances.
Default
N/A.
Usage Guidelines
All PWs established to VPLS or VPWS peers are terminated.
The l2vpn keyword is introduced in ExtremeXOS Release 12.4 and is required when deleting a VPWS.
For backward compatibility, the l2vpn keyword is optional when deleting a VPLS. However, this
keyword will be required in a future release, so we recommend that you use this keyword for new
configurations and scripts.
Example
This commands deletes the VPLS myvpls:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command is used to delete one or all LDAP domains.
When an LDAP domain is deleted, all LDAP servers added under that domain are also deleted. Also all
LDAP configurations done for that domain are deleted.
Syntax Description
domain_name Name of the LDAP domain that wil be deleted.
Default
N/A.
Usage Guidelines
Use this command to delete one or all LDAP domains.
When an LDAP domain is deleted, all LDAP servers added under that domain are also deleted. All LDAP
configurations for that domain are also deleted.
Example
This command deletes the LDAP domain sales.XYZCorp.com
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Syntax Description
filter-name Specifies the filter to delete.
all Specifies that all filters, except DefaultFilter, are to be deleted
Default
N/A.
Usage Guidelines
This command deletes the specified filter, or all filters except for the filter DefaultFilter. The specified
filter must not be associated with a target. To remove that association, associate the target with
DefaultFilter instead of the filter to be deleted, using the following command:
configure log target target filter DefaultFilter
Example
The following command deletes the filter named fdb2:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes the specified UPM log target.
Syntax Description
upm_profile_name Specifies the name of the UPM log target to be deleted.
Default
N/A.
Usage Guidelines
This command deletes the log target and any configurations applied to that target. To disable a target
and retain the target configuration, use the following command:
disable log target upm {upm_profile_name}.
Example
The following command deletes the UPM log target testprofile1:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a Web server target.
Syntax Description
xml_target_name Specifies the name of the xml notification target.
Default
N/A.
Usage Guidelines
Use this command to delete a Web server target.
Example
The following command deleted the Web server target target2:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a previously created connectivity-association (CA) object that holds MAC Security (MACsec)
key authentication data.
Syntax Description
connectivity- Secures connectivity provided between MACsec stations.
association
ca_name Selects the CA to delete.
Default
N/A.
Usage Guidelines
Prior to deletion, ports assigned to the CA must be removed with the configure macsec
connectivity-association ca_name [pre-shared-key {ckn ckn} {cak
[encrypted encrypted_cak] | cak} | ports [port_list] [enable | disable]]
command using the disable option.
Example
The following example deletes the CA "testca":
# delete macsec connectivity-association testca
History
This command was first available in ExtremeXOS 30.1.
Platform Availability
This command is available on the following platforms.
Note
The MACsec feature requires the installation of the MAC Security feature pack license.
Note: * For ExtremeSwitching X460-G2 series switches, the VIM-2X option does not support the LRM/
MACsec Adapter.
delete meter
delete meter meter-name
Description
Deletes a meter.
Syntax Description
meter-name Specifies the meter name.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes the meter maximum_bandwidth:
History
This command was available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a user-defined mirroring instance, and unconfigures the "DefaultMirror" instance.
Syntax Description
mirror_name Specifies a specific mirror name to delete.
control_index Mirror destination control index (1–4).
Also know as: etsysMirrorDestinationControlIndex. Each comprises a
group of mirror names.
all Specifies that you delete all named mirror instances.
Default
Disabled.
Usage Guidelines
Use this command to delete a user-defined mirroring instance and unconfigure the "DefaultMirror"
instance. Mirroring instances must be in the "disabled" state in order to be deleted. The all command
will fail if any mirroring instance is in the "enabled" state.
Example
The following example deletes all mirroring instances:
delete mirror all
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a peer switch from the MLAG structure.
Syntax Description
peer_name Specifies an alpha numeric string identifying the MLAG peer.
Default
N/A.
Usage Guidelines
This command deletes an MLAG peer switch from the association structure.
Before you delete an MLAG peer switch, you must disable it. If it is not disabled, the following error
message is displayed:
ERROR: MLAG ports currently associated with peer. First disable MLAG
ports using "disable mlag port <port>" before deleting MLAG peer
Example
The following command deletes a peer switch structure switch101:
# delete mlag peer switch101
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Deletes internal resources for the specified RSVP-TE LSP.
Syntax Description
lsp_name Specifies the LSP within the switch to be deleted.
all Deletes all RSVP-TE configured LSPs.
Default
N/A.
Usage Guidelines
This command deletes internal resources for the specified RSVP-TE LSP. The LSP is first withdrawn if it
is currently active. Deleting an LSP may cause a PW to fail. Any static routes configured to a deleted
LSP are also removed.
Example
The following command deletes the configured RSVP-TE LSP named lsp598:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Deletes a configured RSVP-TE routed path with the specified path name.
Syntax Description
path_name Specifies a path within the switch to be deleted.
all Deletes all paths not associated with an LSP.
Default
N/A.
Usage Guidelines
This command deletes a configured RSVP-TE routed path with the specified name. All associated
configuration information for the specified path is deleted. If the all keyword is specified, all paths not
associated with an LSP are deleted.
Note
A path cannot be deleted as long as the path name is associated with an LSP.
Example
The following command deletes the configured RSVP-TE path named path598:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Deletes a configured RSVP-TE profile with the specified profile name.
Syntax Description
profile_name Specifies a configured RSVP-TE profile to be deleted.
all Deletes all profiles not associated with an LSP, except the default profile.
Default
N/A.
Usage Guidelines
This command deletes a configured RSVP-TE profile with the specified profile name. If the all keyword is
specified, all profiles not associated with an LSP are deleted (except for the default profile).
Note
A profile cannot be deleted as long as the profile name is associated with a configured LSP.
The default profile cannot be deleted.
Example
The following command deletes the configured RSVP-TE profile named prof598:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Deletes internal resources for one or all static LSPs.
Syntax Description
lsp_name Identifies the LSP to be deleted.
all Specifies that all LSPs are to be deleted.
Default
N/A.
Usage Guidelines
All resources associated with the specified LSPs are released. Static LSPs cannot be deleted when the
LSP is configured for an IP route or VPLS configuration.
Example
The following command deletes a static LSP:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Removes an MSDP mesh-group.
Syntax Description
mesh-group-name Specifies the name of the MSDP mesh-group. The character string can be a
maximum of 31 characters.
vrname Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
N/A.
Usage Guidelines
A mesh-group is a group of MSDP peers with fully meshed MSDP connectivity. Mesh-groups are used to
achieve two goals:
• Reduce SA message flooding.
• Simplify peer-RPF flooding.
SA messages received from a peer in a mesh-group are not forwarded to other peers in the same mesh-
group.
Use the delete msdp mesh-group command only if you created a mesh-group that you want to remove.
By default, there is no MSDP mesh-group.
Example
The following example removes a mesh-group called "verizon":
delete msdp mesh-group verizon
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes an MSDP peer.
Syntax Description
all Deletes all MSDP peers.
remoteaddr Specifies the IP address of the MSDP router to configure as an MSDP peer.
vr_name Specifies the name of the virtual router to which this command applies. If a name is
not specified, it is extracted from the current CLI context.
Default
N/A.
Usage Guidelines
None.
Example
The following example deletes an MSDP peer:
delete msdp peer 192.168.45.43
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a specified local network login user name and its associated password.
Syntax Description
user-name Specifies a local network login user name.
Default
N/A.
Usage Guidelines
Use the show netlogin local-users command to determine which local network login user
name you want to delete from the system. The show netlogin local-users output displays the
user name and password in a tabular format.
This command applies only to web-based and MAC-based modes of network login. 802.1X network
login does not support local database authentication.
Example
The following command deletes the local network login megtest along with its associated password:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Delete a PTP clock instance.
Syntax Description
boundary Delete the boundary clock instance.
ordinary Delete the ordinary clock instance.
end-to-end- Delete the End-to-End transparent clock instance.
transparent
Usage Guidelines
Use this command to delete a PTP boundary, ordinary, or end-to-end transparent clock instance. We
recommend that you delete the ordinary or boundary clock instance before you delete the end-to-end
transparent clock instance.
Example
The following commands delete an ordinary clock, boundary clock and end-to-end transparent clock:
# delete network-clock ptp ordinary
# delete network-clock ptp boundary
# delete network-clock ptp end-to-end-transparent
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X460-G2, X670-G2series switches.
Description
Deletes an NTP key; it cannot be used for outgoing or incoming NTP sessions.
Syntax Description
keyid Specifies the key ID as a value from 1 to 65534.
all Deletes all keys.
Default
N/A.
Usage Guidelines
N/A.
Example
The following command deletes NTP key 5 on the switch:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes an OSPF area or all OSPF areas.
Syntax Description
area-identifier Specifies an OSPF area.
all Specifies all areas.
Default
N/A.
Usage Guidelines
An OSPF area cannot be deleted if it has an associated interface. Also, area 0.0.0.0 cannot be deleted.
Example
The following command deletes an OSPF area:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes an OSPFv3 area or all OSPFv3 areas.
Syntax Description
area_identifier Specifies an OSPFv3 area, a four-byte, dotted decimal number.
all Specifies all areas.
Default
N/A.
Usage Guidelines
An OSPFv3 area cannot be deleted if it has an associated interface. Also, area 0.0.0.0 cannot be
deleted.
Example
The following command deletes an OSPFv3 area:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes previously created access list and their rules.
Syntax Description
access-list Configures access list rule model.
all-rules Deletes all access lists and their rules.
list_dot_rule Defines the access list name with optional rule name in the format
list_name.rule_name.
Default
N/A.
Usage Guidelines
You can remove a specific rule or remove all the rules from an access list, or remove all access lists and
their rules.
Example
The following example deletes the access list rule"ACL1.rule1":
# delete policy access-list ACL1.ace2
The following example deletes all access lists and their rules:
# delete policy access-list all-rules
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a pre-defined action set.
Syntax Description
access-list Specifies access-list features.
action-set Specifies deleting an action set, which is a defined a set of actions that
can be applied to multiple sets of match conditions.
set-id Specifies which action set to delete by its global action set ID.
Default
N/A.
Example
The following example deletes action set "1":
# delete policy access-list action-set 1
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command deletes a generic port-group name that can be associated with a list of ports. The
port_group option could be implemented in configure or show commands that currently accept a
port_list. The QoS commands are expanded to accept the port_group option. QoS commands
that use port groups are updated automatically if the ports group is removed or if ports are added or
removed from the group.
Syntax Description
port_group Specifies a port group name.
Default
N/A.
Usage Guidelines
Use this command to delete a generic port-group name associated with a list of ports.
Example
delete port-group testGroup
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete private-vlan
delete private-vlan name
Description
Deletes the PVLAN framework with the specified name.
Syntax Description
name Specifies the name of the PVLAN to be deleted.
Default
N/A.
Usage Guidelines
The PVLAN is a framework that links network and subscriber VLANs; it is not an actual VLAN.
This command deletes the PVLAN framework, but it does not delete the associated VLANs. If the ports
in the network VLAN were set to translate, they are changed to tagged.
Example
The following example deletes the PVLAN named "companyx":
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on all platforms that support the Private VLAN feature. For features and the
platforms that support them, see the ExtremeXOS 30.5 Feature License Requirements document.
delete process
delete process
Description
This command provides the ability for an end-user to delete dynamically-created processes.
Syntax Description
This command has no arguments or variables.
Default
N/A
Usage Guidelines
Use this command to delete dynamically-created processes only.
History
This command was first available in ExtremeXOS 15.7..
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete protocol
delete protocol {filter} filter_name
Description
Deletes a user-defined protocol.
Syntax Description
filter Deletes a protocol filter.
filter_name Specifies a protocol filter name to delete.
Default
N/A.
Usage Guidelines
If you delete a protocol that is in use by a VLAN, the protocol associated with than VLAN becomes
none.
Example
The following examples delete a protocol named "my_filter" and a protocol filter named
"my_other_filter":
delete protocol “my_filter”
delete protocol filter “my_other_filter”
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete qosprofile
delete qosprofile [QP2| QP3 | QP4 | QP5 | QP6 | QP7]
Description
Deletes a user-created QoS profile.
Syntax Description
QP2....QP7 Specifies the user-created QoS profile you want to delete.
Default
N/A.
Usage Guidelines
You cannot delete the default QoS profiles of QP1 and QP8. On a SummitStack, you also cannot delete
QoS profile QP7. If you attempt to delete QoS profile QP7, the system returns an error.
All configuration information associated with the specified QoS profile is removed.
Example
The following command deletes the user-created QoS profile QP3:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Deletes a user key.
Syntax Description
key_name Specifies the name of the public key to be deleted.
Default
N/A.
Usage Guidelines
This command is used to delete a user key. The key is deleted regardless of whether or not it is bound to
a user.
Note
If a user is bound to the key, they are first unbound or unassociated, and then the key is
deleted.
Example
The following example shows the SSH user key id_dsa_2048 being deleted:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete stpd
delete stpd stpd_name
Description
Removes a user-defined STPD from the switch.
Syntax Description
stpd_name Specifies a user-defined STPD name on the switch.
Default
N/A.
Usage Guidelines
If your STPD has the same name as another component, for example a VLAN, we recommend that you
specify the identifying keyword as well as the name. If you do not specify the stpd keyword, an error
message similar to the following is displayed:
%% Ambiguous command: "delete Test"
In this example, to delete the STPD Test, enter delete stpd Test.
If you created an STPD with a name unique only to that STPD, the keyword stpd is optional.
In an MSTP environment, you cannot delete or disable a CIST if any of the MSTIs are active in the
system.
Example
The following example deletes an STPD named "purple_st":
delete stpd purple_st
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete tunnel
delete tunnel tunnel_name
Description
Deletes an IPv6 tunnel.
Syntax Description
tunnel_name Specifies an IPv6 tunnel.
Default
N/A.
Usage Guidelines
This command will destroy a previously created tunnel. The command acts on either a 6to4 or a 6in4
tunnel. When the tunnel interface is removed, all dynamic routes through that interface are purged from
the system. The configured static routes are removed from the hardware tables and become inactive.
Example
The following example deletes the tunnel link39:
delete tunnel link39
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 interworking feature in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Deletes the specified profile.
Syntax Description
profile-name Specifies the UPM profile to be deleted.
Default
N/A.
Example
The following command deletes a UPM profile called sample_1:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes the specified UPM timer.
Syntax Description
timer-name Specifies the name of the UPM timer to be deleted.
Default
N/A.
Usage Guidelines
You can delete a UPM timer by specifying its name.
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
delete var
delete var varname
Note
This is a script command and operates only in scripts or on the command line when
scripting is enabled with the following command: enable cli scripting
{permanent}.
Description
Deletes a variable.
Syntax Description
varname Specifies the name of the scripting variable to be deleted.
Default
N/A.
Usage Guidelines
The format of a local variable (case insensitive) is: $VARNAME.
Example
The following example deletes local variable x:
delete var x
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Note
This is a script command and operates only in scripts or on the command line when
scripting is enabled with the following command: enable cli scripting
{permanent}.
Description
Deletes the variables that have been saved using a key.
Syntax Description
key Specifies that variables associated with the specified key must be
deleted.
Default
N/A.
Usage Guidelines
CLI scripting must be enabled to use this command. The user is responsible for generating unique keys
for each variable. The system has a limited amount of memory to store these variables.
Example
The following command deletes all variables associated with the key “red:”
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete virtual-network
delete virtual-network vn_name
Description
This command deletes a virtual network.
Syntax Description
virtual-network Designates deleting a virtual network.
vn_name Specifies which virtual network.
Default
N/A.
Example
The following example deletes the virtual network "my_virtual_network":
delete virtual-network my_virtual_network
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2 , X465 standalone, and stacks with
X670-G2 , X465 slots only.
Description
This command deletes a remote endpoint.
Syntax Description
ipaddress A remote endpoint IP address.
vr VR/VRF instance the remote endpoint is associated with
vr_name An existing VR/VRF name.
Default
N/A.
Usage Guidelines
This command is useful when user wants to delete a remote endpoint in addition to the ones learned
dynamically (OSPF extensions).
Example
To remove a remote endpoint:
delete virtual-network vxlan remote-endpoint ipaddress 1.2.3.4
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
delete virtual-router
delete virtual-router vr-name
Description
This command deletes a VR or VRF.
Syntax Description
vr-name Specifies the name of the VR or VRF.
Default
N/A.
Usage Guidelines
Only user VRs and VRFs can be deleted.
Before you delete a user VR, you must delete all VLANs and protocols assigned to the VR, and you must
delete any child VRFs. All of the ports assigned to a deleted VR are made available to assign to other
VRs.
Before you delete a VRF, you must delete all VLANs and stop all protocols that are assigned to that VRF.
All of the ports assigned to a deleted VRF are deleted and made available to assign to other VRs and
VRFs. Any routing protocol instance that is assigned to the VRF is deleted gracefully.
Example
The following example deletes the VR "vr-acme":
delete virtual-router vr-acme
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete vlan
delete [ {vlan} vlan_name | vlan vlan_list]
Description
Deletes a VLAN.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
Default
N/A.
Usage Guidelines
If you delete a VLAN that has untagged port members and you want those ports to be returned to the
default VLAN, you must add them back explicitly using the configure svlan delete ports
command.
Note
The default VLAN cannot be deleted. Before deleting an ISC VLAN, you must delete the MLAG
peer.
Example
The following command deletes the VLAN accounting:
delete accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete vman
delete vman [vman-name | vman_list]
Description
Deletes a previously created VMAN.
Syntax Description
vman-name Specifies a VMAN name.
vman_list Specifies a VMAN list.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes the VMAN accounting:
delete vman accounting
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
delete vm
delete vm vm_name
Description
Deletes an existing virtual machine (VM).
Syntax Description
vm Designates a virtual machine.
vm_name Specifies the VM name to delete.
Default
N/A.
Usage Guidelines
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
Example
The following example deletes the vm "vm1":
# delete vm vm1
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
Description
Deletes the specified VM entry in the local VM database.
Syntax Description
mac Specifies the MAC address for a VM entry to delete.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes the VM entry for MAC address 00:E0:2B:12:34:56 in the local VM
database:
# delete vm-tracking local-vm mac-address 00:E0:2B:12:34:56
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Deletes the specified LVPP.
Syntax Description
vpp_name Specifies a name for the LVPP to delete.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes the VPP named vpp1:
# delete vm-tracking vpp vpp1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
delete vpls
delete vpls [vpls_name | all]
Note
This command has been replaced with the following command: delete l2vpn [vpls
[vpls_name | all] | vpws [vpws_name | all]] .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Deletes the VPLS with the specified vpls_name.
Syntax Description
vpls_nam Identifies the VPLS within the switch (character string).
e
all Specifies all VPLS.
Default
N/A.
Usage Guidelines
This command deletes the VPLS with the specified vpls_name. All PWs established to VPLS peers are
terminated. The all keyword may be used to indicate that all VPLS instances are to be deleted.
Example
This commands deletes the VPLS myvpls:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command deletes a VRRP group used to operate in high-scale mode.
Syntax Description
group Specifies deleting a VRRP group.
group_name Specifies the VRRP group name.
Default
None.
Example
The following example deletes a VRRP group called "vrrp1".
delete vrrp group vrrp1
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes a specified VRRP instance.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vridval Specifies the VRID for the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
Default
N/A.
Usage Guidelines
None.
Example
The following command deletes the VRRP instance on the VLAN vrrp-1 identified by VRID 2:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Deletes the Web server target on the XML client process.
Syntax Description
target Specifies the configured target.
Default
N/A.
Usage Guidelines
Use this command to delete the Web server target on the XML client process.
Example
The following command deletes the target test2:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows special packets to be blocked by low priority ACLs.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command allows ACLs to deny certain special packets from reaching the CPU, even if the packets
match ACLs that would otherwise deny them. The special packets include STP and EAPS BPDUs, and
ARP replies for the switch.
When this feature is disabled, these same packets will be denied if an ACL is applied that contains a
matching entry that denies the packets. Contrary to expectations, the packets will still be denied if there
is a higher precedence entry that permits the packets.
Example
The following example enables ACLs to deny STP BPDU packets from reaching the switch CPU:
disable access-list permit to-cpu
History
This command was first available in ExtremeXOS 11.3.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables blackholing of packets during ACL refresh.
Syntax Description
This command has no arguments or variables.
Default
The feature is enabled.
Usage Guidelines
When access control lists (ACLs) are refreshed, this feature provides that any packets arriving during
the refresh will be blackholed.
If you disable this feature, the ACLs will be refreshed as described in the refresh policy command.
Example
The following command disables dropping of packets during an ACL refresh:
disable access-list refresh blackhole
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable account
disable account [all {admin|user | name]
Description
Disables the specified account locally.
Syntax Description
all Specifies that all accounts, or all accounts of a certain type, will be
disable.
admin Specifies that all administrative accounts will be disabled locally.
user Specifies that all user accounts, including Lawful-Intercept accounts,
will be disabled locally.
name Specifies the name of the account that will be disabled locally.
Default
Enabled.
Usage Guidelines
If the user is disabled locally, the user's login will fail.
If you disable all administrative accounts, you can use the failsafe account.
Example
The following example disables all user accounts.
disable account all user
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable auto-provision
disable auto-provision
Description
Disables the auto provision capability.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to disable the auto provision capability.
To display the status of auto provision on the switch, use the show auto-provision command.
Example
The following command disables the auto provision capability:
disable auto-provision
# disable auto-provision
This setting will take effect at the next reboot of this switch.
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable avb
disable avb
Description
This command is a macro command that can be used to disable all AVB protocols globally on the
switch. It is equivalent to issuing the following three commands:
disable mvrp
disable msrp
Syntax Description
avb Audio Video Bridging
Default
Disabled.
Usage Guidelines
Use this command to disable all AVB protocols globally on the switch.
Example
disable avb
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms that support the AVB feature and that have an AVB feature
pack license installed. To see which platforms support AVB and for information about obtaining a
license, see the ExtremeXOS 30.5 Feature License Requirements.
Description
This command is a macro command that can be used to disable all AVB protocols on the given ports. It
is equivalent to issuing the following three commands:
Syntax Description
avb Audio Video Bridging.
port_list Port list separated by a comma or "-".
all All ports.
Default
Disabled.
Usage Guidelines
Use this command to disable all AVB protocols on the given ports.
Example
disable avb ports all
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms that support the AVB feature and that have an AVB feature
pack license installed. To see which platforms support AVB and for information about obtaining a
license, see the ExtremeXOS 30.5 Feature License Requirements.
disable bgp
disable bgp
Description
Disables BGP.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to disable BGP on the router.
Example
The following command disables BGP:
disable bgp
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables advertisement of BGP inactive routes, which are defined as those routes that rated best by
BGP and not best in the IP routing table.
Syntax Description
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
Default
Disabled.
Usage Guidelines
This command can be successfully executed only when BGP is globally disabled. If you want to disable
inactive route advertisement and BGP is enabled, you must disable BGP (disable bgp), disable this
feature, and then enable BGP (enable bgp).
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Example
The following command disables inactive route advertisement for IPv4 unicast traffic:
disable bgp address-family ipv4-unicast advertise-inactive-route
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables BGP route aggregation.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Route aggregation is the process of combining the characteristics of several routes so that they are
advertised as a single route. Aggregation reduces the amount of information that a BGP speaker must
store and exchange with other BGP speakers. Reducing the information that is stored and exchanged
also reduces the size of the routing table.
Example
The following command disables BGP route aggregation:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables BGP from comparing Multi Exit Discriminators (MEDs) for paths from neighbors in different
Autonomous Systems (AS).
Syntax Description
This command has no arguments or variables.
Default
ExtremeXOS does not compare MEDs for paths from neighbors in different AS.
Usage Guidelines
The MED is one of the parameters that is considered when selecting the best path among many
alternative paths. The path with a lower MED is preferred over a path with a higher MED. By default,
during the best path selection process, MED comparison is done only among paths from the same AS.
BGP must be disabled before you can change the configuration with this command.
Example
The following command disables MED from being used in comparison among paths from different AS:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the AS-number:number format of display for communities in the output of show commands.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Using this command, communities are displayed as a single decimal value.
Example
The following command disables the AS-number:number format of display for communities:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
For IPv4 and IPv6 routes, this command disables the PE router to export and redistribute local VRF
routes to remote PE routers through BGP.
Syntax Description
vr Specifies the source VPN VRF of the exported routes.
vr_name Specifies the name of the source VPN VRF.
route_type Specifies the source or origin of the route types to be exported
to remote PE routers. Valid Types: blackhole, direct, and bgp.
address-family Specifies the address family for the exported routes. Valid types
are ipv4-unicast, vpnv4.
vpn4 Specifies that routes from the VRF are exported as vpnv4 routes
over MPBGP.
Default
Disabled.
Usage Guidelines
This command disables a PE router to advertise learned routes from CE routers to remote PE routers in
a Service Provider's backbone. Executing this command allows the PE router to convert VRF native IPv4
routes into VPN-IPv4 route,s and advertise to all remote PE BGP neighbors as VPN-IPv4 routes.
• For Layer 3 VPNs, you must enter the disable bgp export vr command in the context of the
VRF that supports the Layer 3 VPN.
• When the export source is the Layer 3 VPN, you can specify direct, or remote-vpn to disable route
export to the VRF. The destination address family must be ipv4‑unicast.
• This export command is applicable in Parent VR context only. If you execute it in a VRF context, an
error message is returned.
Example
The following command disables BGP to advertise a vpnv4 route named "corp1_vpn_vrf":
disable bgp export "corp1_vpn_vrf" bgp address-family vpnv4
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables BGP from exporting routes from other protocols to BGP peers.
Syntax Description
bgp For Layer 3 VPNs, this specifies that BGP routes learned from CE
routers are to be exported to remote PE routers.
route_type Specifies the BGP export route type.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
Default
Disabled.
Note
You must specify an IPv6 address family for an IPv6 peer, because an IPv6 peer does not
support the default IPv4 unicast address family. Similarly, if you specify an IPv4 peer and an
address family in the command, an IPv4 address family must be specified.
Usage Guidelines
The exporting of routes between any two routing protocols is a discrete configuration function. For
example, you must configure the switch to export routes from OSPF to BGP and, if desired, you must
configure the switch to export routes from BGP to OSPF. You must first configure both protocols and
then verify the independent operation of each. Then you can configure the routes to export from OSPF
to BGP, and the routes to export from BGP to OSPF.
You can use policies to associate BGP attributes including Community, NextHop, MED, Origin, and Local
Preference with the routes. Policies can also be used to filter out exported routes.
Using the export command to redistribute routes complements the redistribution of routes using the
configure bgp add network command. The configure bgp add network command adds
the route to BGP only if the route is present in the routing table. The enable bgp export command
redistributes an individual route from the routing table to BGP. If you use both commands to
redistribute routes, the routes redistributed using the network command take precedence over routes
redistributed using the export command.
Note
For this command to execute, the specified protocol must support the specified address
family. For example, the command fails if you specify OSPF and the IPv6 unicast address
family. You can specify blackhole, direct, static, and IS-IS routes with IPv4 or IPv6 address
families.
For Layer 3 VPNs, the disable bgp export command must be entered in the context of the VRF that
supports the Layer 3 VPN.
When the export source is the Layer 3 VPN, you can specify direct, or remote-vpn to disable route
export to the VRF. The destination address family must be ipv4‑unicast.
When the export source is the VRF, you can specify direct, or bgp to disable route export to the VPN.
The destination address family must be vpnv4.
Example
The following command disables BGP from exporting routes from the OSPF protocol to BGP peers:
The following command disables the export of BGP routes from a VRF to a VPN:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables BGP fast external fallover functionality.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables the BGP fast external fallover on the router. This command applies to all
directly-connected external BGP neighbors.
When BGP fast external fallover is enabled, the directly-connected EBGP neighbor session is
immediately reset when the connecting link goes down.
If BGP fast external fallover is disabled, BGP waits until the default hold timer expires (3 keepalives) to
reset the neighboring session. In addition, BGP might teardown the session somewhat earlier than hold
timer expiry if BGP detects that the TCP session and it's directly connected link is broken (BGP detects
this while sending or receiving data from TCP socket).
Example
The following command disables BGP fast external fallover:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables IP forwarding over calculated MPLS LSPs to subnets learned via BGP.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables IP forwarding over calculated MPLS LSPs to subnets learned via BGP.
(Calculated refers to an LSP that only reaches part of the way to the destination). By default, IP
forwarding over MPLS LSPs to subnets learned via BGP is disabled.
Example
The following command disables BGP’s use of MPLS LSPs to reach BGP routes:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables BGP multipath-relax feature, which modifies the definition of an equal cost BGP route.
Syntax Description
multipath-relax Selects BGP multipath relax feature.
Default
This feature is disabled by default.
Usage Guidelines
This feature modifies the definition of equal cost BGP routes as specified in RFC-4271. In particular,
routes with the same AS-path length, but differing AS numbers in the path are not considered equal
cost by default. However, with multipath-relax enabled, routes with the same AS-path length can have
differing AS number values in the AS-path and still be considered equal cost.
Example
The following example disables the BGP multipath-relax feature:
disable bgp multipath-relax
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables overriding the BGP specification behavior with respect to the next-hop of routes advertised to
EBGP peers.
Syntax Description
bgp Specifies BGP.
neighbor Specifies BGP neighbor.
remoteaddr Specifies BGP neighbor IP address.
all Specifies all BGP neighbors.
address-family Specifies address family.
l2vpn-evpn Specifies L2VPN EVPN address-family type.
next-hop-unchanged Enables preserving the BGP next-hop when routes are advertised to
EBGP peers (default is disabled).
Default
Default is that next-hop-unchanged is disabled.
Usage Guidelines
This command disables overriding the specification behavior with respect to the next-hop of routes
advertised to EBGP peers. Specifically, disabling with this command does not maintain the BGP next-
hop for routes advertised to EBGP peers instead of replacing the next-hop with either the outgoing
interface IP address or the local loopback address.
Example
The following example disables next-hop unchanged for BGP neighbor at 192.168.66.2:
# disable bgp neighbor 192.168.66.2 l2vpn-evpn next-hop-unchanged
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command disables neighbor capability for one or all BGP neighbors on a Layer 3 VPN.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors.
remoteaddr Specifies the IPv4 address of a BGP neighbor.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
community Disables neighbor capability for communities.
ext-community Disables neighbor capability for extended communities.
prefix Disables neighbor capability for prefixes.
send Disables neighbor capability filter list send capability.
receive Disables neighbor capability filter list receive capability.
both Disables neighbor capability filter list send and receive capability.
Default
Disabled.
Usage Guidelines
Enter this command multiple times to configure the address family, type, and direction attributes.
Example
The following command disables the neighbor capability feature for a Layer 3 VPN neighbor:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command disables an address family or the route refresh capability for one or all neighbors.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors. If
an IPv6 address family is specified, the configuration applies to all
IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
route-refresh Specifies ROUTE-REFRESH message capabilities.
Default
The following capabilities are enabled by default for IPv4 peers: IPv4 unicast, IPv4 multicast, and route
refresh.
The following capabilities are enabled by default for IPv6 peers: route refresh.
Usage Guidelines
This command applies to the current VR or VRF context.
Note
To inter-operate with Cisco routers for BGP graceful restart, you must enable IPv4 unicast
address capability.
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
Example
The following example disables the route-refresh feature for all neighbors:
disable bgp neighbor all capability route-refresh
The following example disables the VPNv4 address family for a neighbor:
disable bgp neighbor 192.168.96.235 capability vpnv4
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes a default route to a single BGP neighbor or to all BGP neighbors.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified, the
configuration applies to the IP Unicast family on all IPv4 peers. If an
IPv4 address family is specified, the configuration applies to all IPv4
neighbors. If an IPv6 address family is specified, the configuration
applies to all IPv6 neighbors.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
Default
Disabled. BGP does not automatically originate and advertise default routes to BGP neighbors.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Note
You must specify an IPv6 address family for an IPv6 peer, because an IPv6 peer does not
support the default IPv4 unicast address family. Similarly, if you specify an IPv4 peer and an
address family in the command, an IPv4 address family must be specified.
Usage Guidelines
This command can be successfully executed at any time, irrespective of whether local BGP or the
remote BGP peer is enabled or disabled.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Example
The following command removes default routes for IPv4 unicast traffic for all BGP peer nodes:
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the removal of private AS numbers from the AS path in route updates sent to EBGP peers.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
Default
Disabled.
Usage Guidelines
Private AS numbers are AS numbers in the range 64512 through 65534. You can remove private AS
numbers from the AS path attribute in updates that are sent to external BGP (EBGP) neighbors.
Possible reasons for using private AS numbers include:
• The remote AS does not have officially allocated AS numbers.
• You want to conserve AS numbers if you are multi-homed to the local AS.
Private AS numbers should not be advertised on the Internet. Private AS numbers can only be used
locally within an administrative domain. Therefore, when routes are advertised out to the Internet, the
private AS number can be stripped out from the AS paths of the advertised routes using this feature.
Example
The following command disables the removal of private AS numbers from the AS path in route updates
sent to the EBGP peers:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the soft input reset feature.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified, the
configuration applies to the IP Unicast family on all IPv4 peers. If an
IPv4 address family is specified, the configuration applies to all IPv4
neighbors. If an IPv6 address family is specified, the configuration
applies to all IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
Disabled.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Usage Guidelines
Disabling the soft input reset feature can potentially limit the amount of system memory consumed by
the RIB-in.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
Before you can change the configuration with this command, you must disable BGP, and you must
disable the corresponding BGP neighbor session using the following command:
disable bgp neighbor [remoteaddr | all]
To disable this feature on Layer 3 VPNs, you must do so in the context of the MPLS-enabled VR; this
feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command disables the soft input reset for the neighbor at 192.168.1.17:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the BGP session.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
Default
Disabled.
Usage Guidelines
After the session has been disabled, all the information in the route information base (RIB) for the
neighbor is flushed.
Example
The following command disables the BGP session:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command disables peer-group capability for a peer group on a Layer 3 VPN.
Syntax Description
remoteaddr Specifies the IPv4 address of a BGP neighbor.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
community Disables peer-group capability for communities.
ext-community Disables peer-group capability for extended communities.
send Disables peer-group capability filter list send capability.
receive Disables peer-group capability filter list receive capability.
both Disables peer-group capability filter list send and receive capability.
Default
Disabled.
Usage Guidelines
Enter this command multiple times to configure the address family, type, and direction attributes.
By specifying the address-family, type and direction in multiple commands, you can better control the
actual ORF capabilities sent to a peer. In the case where a particular address-family is explicitly disabled
for a peering, the ORF capability configuration for that address-family is ignored and not sent.
ORF capabilities can only be enabled for IPv4 neighbors, and only for IPv4 address families. If
configured for IPv6 neighbors or address-families the command is rejected with the following error
message:
Outbound-route-filtering not supported for IPv6 neighbors
or
Outbound-route-filtering not supported for address family <addr_family>
Example
The following command disables the peer-group capability feature for a Layer 3 VPN peer group:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command disables an address family or the route-refresh capability for a peer group.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
route-refresh Specifies ROUTE-REFRESH message capabilities.
Default
All capabilities are enabled for IPv4 peer groups by default.
Only the route refresh capability is enabled for peer groups by default.
Usage Guidelines
This command applies to the current VR or VRF context.
Note
To inter-operate with Cisco routers for BGP graceful restart, you must enable IPv4 unicast
address capability.
Example
The following command disables the route-refresh feature for the peer group outer:
The following command disables the VPNv4 address family for a peer group:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Removes default routes to all BGP neighbors in the specified peer group.
Syntax Description
peer-group-name Specifies the BGP peer group for which the default routes are
removed.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
Default
Disabled. BGP does not automatically originate and advertise default routes to BGP neighbors.
Usage Guidelines
This command can be successfully executed at any time, irrespective of whether local BGP or the
remote BGP peers are enabled or disabled.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
Example
The following command removes default routes for IPv4 unicast traffic for all nodes in the test BGP peer
group:
History
This command was first available in ExtremeXOS 12.2.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the removal of private autonomous system (AS) numbers from the AS_Path attribute of
outbound updates.
Syntax Description
peer-group-name Specifies a peer group.
Default
Disabled.
Usage Guidelines
This command applies to the current VR or VRF context.
Example
The following command disables the BGP peer group outer from removing private AS numbers:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the soft input reset feature.
Syntax Description
peer-group-name Specifies a peer group.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
Default
Disabled.
Usage Guidelines
Disabling the soft input reset feature can potentially limit the amount of system memory consumed by
the RIB-in.
After you enter this command, the switch automatically disables and enables all neighbors in the peer
group before the change takes effect.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
Example
The following command disables the soft input reset feature:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables a BGP peer group and all its BGP neighbors.
Syntax Description
peer-group-name Specifies a peer group.
Default
Disabled.
Usage Guidelines
This command applies to the current VR or VRF context.
Example
The following command disables the BGP peer group outer:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the generation and processing of BOOTP packets on a VLAN to obtain an IP address for the
VLAN from a BOOTP server.
Syntax Description
bootp Disable BOOTP client.
ipv4 IPv4 client. (default)
dhcp Disable DHCP client.
ipv6 IPv6 client.
vlan Specify VLAN to configure BOOTP/DHCP client for.
vlan Specifies a VLAN name.
all Disables all VLANs.
Default
Disabled.
Usage Guidelines
If the IPv4/IPv6 keyword is not specified, IPv4 is taken as default for the mentioned VLAN.
Example
The following example disables the generation and processing of BOOTP packets on a VLAN named
accounting:
disable bootp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables BOOTPRelay v6. This can be done across the VR or on a per VLAN basis.
Syntax Description
bootprelay BOOTP Relay service.
IPv4 DHCPv4 BOOTP Relay service.
IPv6 DHCPv6 BOOTP Relay service.
Default
N/A.
Usage Guidelines
Use this command to disable BOOTP Relay across the VR or on a per VLAN basis.
Example
The following command displays IPv6 bootprelay information:
* switch # show bootprelay ipv6
BOOTP Relay: DHCPv6 BOOTP Relay enabled on virtual router "VR-Default"
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:0db8:85a3:0000:0000:8a2e:0370:7335
2001:0db8:85a3:0000:0000:8a2e:0370:7336
2001:0db8:85a3:0000:0000:8a2e:0370:7337
VLAN "Default":
BOOTP Relay : Disabled
VLAN "v1":
BOOTP Relay : Enabled
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7338
Interface ID : v1-12
Remote ID :v1_remId
VLAN"v2":
BOOTP Relay : Enabled
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7339
Interface ID : 100 (Default)
Remote ID : 00:04:96:52:A7:1B (Default)
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
disable bootprelay
disable bootprelay {{vlan} [vlan_name] | {{vr} vr_name} | all [{vr}
vr_name]}
Description
Disables the BOOTP relay function on one or all VLANs for the specified VR or VRF.
Syntax Description
vlan_name Specifies a single VLAN on which to disable the BOOTP relay feature.
vr_name Specifies a single VR on which to disable the BOOTP relay feature.
all Specifies that BOOTP relay is to be disabled for all VLANs on the
specified VR or VRF.
Default
The BOOTP relay function is disabled on all VLANs and VRs.
Usage Guidelines
Because VLAN names are unique on the switch, you can specify only a VLAN name (and omit the VR
name) to disable BOOTP relay. When you disable BOOTP relay on a VR or VRF, BOOTP relay is disabled
on all VLANs for that VR. If you enter the command without specifying a VLAN or a VR, the
functionality is disabled for all VLANs in the current VR context.
Example
The following command disables the forwarding of BOOTP requests on all VLANs in the current VR
context:
disable bootprelay
You can use either of the following commands to disable the forwarding of BOOTP requests on VLAN
unit2:
You can use any one of the following commands to disable the forwarding of BOOTP requests on all
VLANs in VR zone3:
History
This command was first available in ExtremeXOS 10.1.
The capability to disable BOOTP relay on a VLAN was added in ExtremeXOS 12.4.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables CDP on a port.
Syntax Description
port_list Specifies the list of ports to disable CDP on.
all Specifies that you disable CDP on all ports.
Default
Enabled.
Usage Guidelines
Example
The following command disables CDP on all ports on the switch:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Stops DMM frame transmission.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
mep mep_id Specifies the maintenance association End Point that helps trigger a
particular MEP level session on that segment. The range is 1-8191. The
default is all MEPs on the segment.
Default
N/A.
Usage Guidelines
Use this command to stop transmission of DMM frames for a selected CFM segment. This command
stops transmission that has been triggered using the command enable cfm segment frame-
delay measurement.
This stops the transmission for both continuous and on-demand mode.
Example
The following command stops frame transmission on the CFM segment segment-first:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command stops the transmission of the LMM frames for a particular cfm segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
This below command stops the transmission of the LMM frames for a particular cfm segment. This stops
the transmission for both continuous and on-demand mode.
Example
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable clear-flow
disable clear-flow
Description
Disable the CLEAR-Flow agent.
Syntax Description
This command has no arguments or variables.
Default
CLEAR-Flow is disabled by default.
Usage Guidelines
When the CLEAR-Flow agent is disabled, sampling stops and the and all rules are left in the current
state. It will not reset actions that were taken while CLEAR-Flow was enabled.
Example
The following example disables CLEAR-Flow on the switch:
disable clear-flow
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Disables command line history expansion.
Syntax Description
cli Command line interface settings.
history Command history settings.
expansion Substitute occurrences of '!n:w' with the corresponding line 'n' and
word 'w+1' from command history (default disabled).
session Configures history expansion for this CLI session only (default ).
permanent Configures history expansion for this CLI session, and all future
sessions.
Default
CLI history expansion is disabled by default.
Usage Guidelines
To view the status of CLI history expansion on the switch, use the show management command.
Example
The following command disables CLI history expansion for this session and all future sessions:
disable cli history expansion permanent
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables CLI prompting for the session.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Use this command to have all CLI user prompts automatically continue with the default answer.
To re-enable CLI prompting for the session, use the enable cli prompting command.
To view the status of CLI prompting on the switch, use the show management command.
Example
The following command disables prompting:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to disable the default auto refresh behavior. The auto refresh behavior is used
for some "show" commands.
Syntax Description
session Use refresh setting for this CLI session only.
permanent Use refresh setting for this CLI session, and all future sessions
(default).
Default
Permanent.
Usage Guidelines
Use this command to disable the show command auto refresh or add the no-refresh option to the
individual command. Since the default for the session may be set to disable cli refresh, the
commands that take a no-refresh option now allow for the alternate refresh case if you want to
selectively enable a refreshed display.
Example
The following is sample output showing the CLI refresh information.
# show management
CLI idle timeout : Enabled (20 minutes)
CLI max number of login attempts : 3
CLI max number of sessions : 8
CLI paging : Enabled (this session only)
CLI space-completion : Disabled (this session only)
CLI configuration logging : Disabled
CLI scripting : Disabled (this session only)
CLI scripting error mode : Ignore-Error (this session only)
CLI persistent mode : Persistent (this session only)
CLI prompting : Enabled (this session only)
CLI refresh : Enabled (this session only)
Telnet access : Enabled (tcp port 23 vr all)
: Access Profile : not set
SSH Access : ssh module not loaded.
Web access : Enabled (tcp port 80)
: Access Profile : not set
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the use of the CLI scripting commands. When used without the permanent option, it disables
the CLI scripting commands for the current session and is a per session setting. The permanent option
affects new sessions only and is saved across switch reboots.
Syntax Description
permanent Disables the CLI scripting commands for new sessions only; this
setting is saved across switch reboots.
Default
CLI scripting commands are disabled by default.
Usage Guidelines
You can disable the CLI scripting commands for the session only after this feature has been enabled.
Example
The following command disables the CLI scripting commands for the current session:
disable cli scripting
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the display of CLI commands and responses during script operation.
Syntax Description
This command has no arguments or variables.
Default
During interactive script sessions: CLI scripting output enabled.
Usage Guidelines
When the CLI scripting output is disabled, the only script output displayed is the show var
{varname} command and its output. All other commands and responses are not displayed.
When the load script filename {arg1} {arg2} ... {arg9} command is entered, the
software disables CLI scripting output until the script is complete, and then CLI scripting output is
enabled. Use the enable cli scripting output and disable cli scripting output commands to control what
a script displays when you are troubleshooting.
Example
The following command disables CLI scripting output for the current session or until the enable cli
scripting output command is entered:
disable cli scripting output
History
This command was first available in ExtremeXOS 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the ExtremeXOS feature that completes a command automatically with the spacebar. If you
disable this feature, the [Tab] key can still be used for auto-completion.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command disables using the spacebar to automatically complete a command:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the logging of CLI configuration commands to the switch Syslog.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Every command is displayed in the log window which allows you to view every command executed on
the switch.
To view the status of configuration logging on the switch, use the show management command. The
show management command displays information about the switch including the enable/disable
state for configuration logging.
Example
The following command disables the logging of CLI configuration command to the Syslog:
disable cli config-logging
History
This command was first available in ExtremeXOS 11.0.
The cli-config-logging keyword was split into cli config-logging in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
When CLI logging is enabled, disables showing fully expanded commands, rather than abbreviations, in
the log.
Syntax Description
expansion Disables command expansion in logs.
Default
Expansion is disabled by default.
Usage Guidelines
When CLI logging is enabled (see enable cli config-logging on page 2054), this command disables
showing fully expanded commands, rather than abbreviations, in the log.
For example, with command expansion disabled, a command entered in abbreviated format, such as
config por 33 auto of spee 10000 duplex ful
If command expansion is enabled, the command appears in the log in expanded form:
configure ports 33 auto off speed 10000 duplex full
To see the status of command expansion, use show management on page 2774.
Example
The following example turns off command expansion:
disable cli-config-logging expansion
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables pausing at the end of each show screen.
Syntax Description
session Disables viewing output of commands one screenful at a time for the
current user session only (default).
permanent Disables viewing output of commands one screenful at a time
permanently (setting persists after rebooting).
Default
Clipaging is enabled per session by default.
Usage Guidelines
The command line interface (CLI) is designed for use in a VT100 environment.
Most show command output pauses when the display reaches the end of a page. This command
disables the pause mechanism and allows the display to print continuously to the screen.
To view the status of CLI paging on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
CLI paging.
Example
The following command disables cli paging permanently (persists after rebooting) and allows you to
print continuously to the screen:
disable cli paging permanent
History
This command was first available in ExtremeXOS 10.1.
The clipaging option was split into two keywords in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable cpu-monitoring
disable cpu-monitoring
Description
Disables CPU monitoring on the switch.
Syntax Description
This command has no arguments or variables.
Default
CPU monitoring is enabled and occurs every 5 seconds.
Usage Guidelines
Use this command to disable CPU monitoring on the switch.
This command does not clear the monitoring interval. Therefore, if you altered the CPU monitoring
interval, this command does not return the CPU monitoring interval to 5 seconds. To return to the
default frequency level, use the enable cpu-monitoring {interval seconds}
{thresholdpercent} and specify 5 for the interval.
Example
The following command disables CPU monitoring on the switch:
disable cpu-monitoring
History
This command was first available in an ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables DHCP on a specified port in a VLAN.
Syntax Description
port_list Specifies the ports for which DHCP should be disabled.
vlan_name Specifies the VLAN on whose ports DHCP should be disabled.
Default
N/A.
Usage Guidelines
None.
Example
The following command disables DHCP for port 6:9 in VLAN corp:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the generation and processing of DHCP packets on a VLAN to obtain an IP address for the
VLAN from a DHCP server.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
Default
If the IPv4/IPv6 keyword is not specified, IPv4 is taken as default for the mentioned VLAN.
Usage Guidelines
None.
Example
The following command disables the generation and processing of DHCP packets on a VLAN named
accounting:
disable dhcp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
This command was modified in ExtremeXOS 15.6 to include the ipv4 and ipv6 keywords
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the examination of the DiffServ field in an IP packet.
Syntax Description
port_list Specifies a list of ports or slots and ports to which the parameters
apply.
all Specifies that DiffServ examination should be disabled for all ports.
Default
Disabled.
Usage Guidelines
The diffserv examination feature is disabled by default.
Example
The following command disables DiffServ examination on the specified ports:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the replacement of DiffServ code points in packets transmitted by the switch.
Syntax Description
port_list Specifies a list of ports or slots and ports on which Diffserv
replacement will be disabled.
all Specifies that DiffServ replacement should be disabled for all ports.
qosprofile Disables DiffServ on a QoS profile.
Default
The DiffServ replacement feature is disabled by default.
Usage Guidelines
N/A.
Example
The following example disables DiffServ replacement on selected ports:
disable diffserv replacement ports 1:2,5:5,6:6
History
This command was first available in ExtremeXOS 11.0.
The qosprofile keyword and qosprofile variable were added in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the Domain Name System (DNS) cache on a virtual router (VR) or VLAN.
Syntax Description
dns Domain name system.
cache Specifies disabling the DNS cache.
vlan Specifies disabling DNS cache on a VLAN.
vlan_name Specifies the VLAN name.
vr Specifies disabling DNS cache on a VR.
vr_name Specifies the VR name. If not specified, the VR of the current
command context is used.
Default
If no VR name is specified, the VR of the current command context is used.
Usage Guidelines
To view the DNS cache configuration, use the command show dns cache configuration
{{vlan} vlan_name | {vr} vr_name}
Example
The following example disables DNS cache on VLAN "VLAN1":
# disable dns cache vlan VLAN1
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables Domain Name System (DNS) analytics.
Syntax Description
dns Domain Name System.
cache Specifies DNS cache.
analytics Specifies disabling DNS cache analytics. Analytics provides more
insight into DNS queries when DNS cache is enabled. Default is
disabled.
vr Specifies disabling DNS analytics on a VR.
vr_name Specifies the VR name. If not specified, the VR of the current
command context is used.
Default
DNS analytics is disabled by default.
Usage Guidelines
To enable DNS analytics, use the command enable dns cache analytics {{vr} vr_name}.
Example
The following example disables DNS analytics on VR "vr1":
# disables dns cache analytics vr vr1
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable dos-protect
disable dos-protect
Description
Disables denial of service protection.
Syntax Description
There are no arguments or variables for this command.
Default
Default is disabled.
Usage Guidelines
None.
Example
The following command disables denial of service protection:
disable dos-protect
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Used with VMANs, and instructs the switch to examine the 802.1p value of the outer tag, or added
VMAN header, to determine the correct egress queue on the egress port.
Syntax Description
all Specifies all ports.
port_list Specifies a list of ports or slots and ports.
Default
Disabled.
Usage Guidelines
Use this command to instruct the system to refer to the 802.1p value contained in the outer tag, or
VMAN encapsulation tag, when assigning the packet to an egress queue at the egress port of the
VMAN.
Note
See “Quality of Service” in the ExtremeXOS 30.5 User Guide for information on configuring
and displaying the current 802.1p and DiffServ configuration for the inner, or original header,
802.1p value.
Example
The following example uses the 802.1p value on the outer tag, or VMAN encapsulation, to put the
packet in the egress queue on the VMAN egress port:
disable dot1p examination inner-tag port 3:2
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Prevents examination of the 802.1p priority field as part of the QoS configuration.
Syntax Description
port_list Specifies a list of ports or slots and ports.
all Specifies that dot1p replacement should be disabled for all ports.
Default
Enabled.
Usage Guidelines
The 802.1p examination feature is enabled by default. To free ACL resources, disable this feature
whenever another QoS traffic grouping is configured. (For information on available ACL resources, see
ACLs in the ExtremeXOS 30.5 User Guide)
Note
If you disable this feature when no other QoS traffic grouping is in effect, 802.1p priority
enforcement of 802.1q tagged packets continues.
SummitStack Only.
Dot1p examination cannot be disabled for priority values 5 and 6. However, the precedence of the
examination is lowered so that all other traffic grouping precedences are higher. The mappings you
configure with the configure dot1p type command remain in effect.
As part of the COS global status enable action, COS will automatically enable dot1p examination on all
ports. An internal status will track this event. The disable dot1p examination command will print an
additional warning message in the event that COS was configured via SNMP. If the COS global status is
disabled via SNMP, the internal status will be cleared and the additional WARNING message will not be
displayed.
Example
The following command disables 802.1p value examination on ports 1 to 5:
disable dot1p examination ports 1-5
History
This command was available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the ability to overwrite 802.1p priority values for a given set of ports.
Syntax Description
port_list Specifies a list of ports or slots and ports to which the parameters
apply.
all Specifies that 802.1p replacement should be disabled for all ports.
qosprofile Disables 802.1p on a QoS profile.
Note: If this option is not specified it will disable dot1p replacement for
all qosprofiles.
Default
N/A.
Usage Guidelines
The dot1p replacement feature is disabled by default.
Beginning with ExtremeXOS version 11.4 on the 1 Gigabit Ethernet ports, 802.1p replacement always
happens when you configure the DiffServ traffic grouping.
Example
The following example disables 802.1p value replacement on all ports:
disable dot1p replacement ports all
History
This command was first available in ExtremeXOS 11.0.
The qosprofile keyword and qosprofile variable were added in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable eaps
disable eaps {name}
Description
Disables the EAPS function for a named domain or for an entire switch.
Syntax Description
name Specifies the name of an EAPS domain.
Default
Disabled for the entire switch.
Usage Guidelines
To prevent loops in the network, the switch displays by default a warning message and prompts you to
disable EAPS for a specific domain or the entire switch. When prompted, do one of the following:
• Enter y to disable EAPS for a specific domain or the entire switch.
• Enter n or press [Return] to cancel this action.
If you have considerable knowledge and experience with EAPS, you might find the EAPS loop
protection warning messages unnecessary. For more information, see the configure eaps
config-warnings off.
Example
The following command disables the EAPS function for entire switch:
disable eaps
The switch displays the following warning message and prompts you to confirm this action:
WARNING: Disabling EAPS on the switch could cause a loop in the network!
Are you sure you want to disable EAPS? (y/n) Enter y to disable EAPS on the switch. Enter n to cancel
this action.
The following command disables the EAPS function for the domain eaps-1:
The switch displays the following warning message and prompts you to confirm this action:
WARNING: Disabling specific EAPS domain could cause a loop in the
network!
Are you sure you want to disable this specific EAPS domain? (y/n)
Enter y to disable the EAPS function for the specified domain. Enter n to cancel this action.
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the EDP on one or more ports.
Syntax Description
ports Specifies one or more ports or slots and ports, including management
port.
all Specifies all ports on the switch, including management port.
Default
Enabled.
Usage Guidelines
You can use the disable edp ports command to disable EDP on one or more ports when you no
longer need to locate neighbor Extreme Networks switches.
Example
The following command disables EDP on ports 2 and 4 on a switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable elrp-client
disable elrp-client
Description
Disables the ELRP client (standalone ELRP) globally.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables the ELRP globally so that none of the ELRP VLAN configurations take effect.
The ELRP client must be enabled globally in order for it to work on any VLANs. Use the enable
elrp-client command to globally enable the ELRP client.
Example
The following command globally disables the ELRP client:
disable elrp-client
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the ELSM protocol for the specified ports.
Syntax Description
port_list Specifies the port or ports for which ELSM should be disabled.
Default
The default is disabled.
Usage Guidelines
ELSM works between two connected ports, and each ELSM instance is based on a single port. When
you disable ELSM on the specified ports, the ports no longer send ELSM hello messages to their peers
and no longer maintain ELSM states.
When you enable ELSM on the specified ports, the ports participate in ELSM with their peers and begin
exchanging ELSM hello messages. To enable ELSM, use the following command:
enable elsm ports port_list
For more information about ELSM, see the command enable elsm ports.
Example
The following command disables ELSM for slot 2, ports 1-2 on the switch:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disable ELSM automatic restart for the specified ports.
Syntax Description
port_list Specifies the port or ports for which ELSM auto-restart is being
disabled.
Default
The default is enabled.
Usage Guidelines
If you disable ELSM automatic restart, the ELSM-enabled port can transition between the following
states multiple times: Up, Down, and Down-Wait. When the number of state transitions is greater than
or equal to the sticky threshold, the port enters and remains in the Down-Stuck state.
The ELSM sticky threshold specifies the number of times a port can transition between the Up and
Down states. The sticky threshold is not user-configurable and has a default value of 1. That means a
port can transition only one time from the Up state to the Down state. If the port attempts a subsequent
transition from the Up state to the Down state, the port enters the Down-Stuck state.
If the port enters the Down-Stuck state, you can clear the stuck state and have the port enter the Down
state by using one of the following commands:
If you use the enable elsm ports command, automatic restart is always enabled; you do not have
to use the clear elsm ports command to clear the stuck state.
If you configure automatic restart on one port, we recommend that you use the same configuration on
its peer port.
Example
The following example disables ELSM automatic restart for slot 2, ports 1-2 on the switch:
disable elsm ports 2:1-2:2 auto-restart
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable erps
disable erps
Description
Disable ERPS/ITU-T G.8032 standard).
Syntax Description
N/A.
Default
N/A.
Usage Guidelines
Use this command to disable ERPS.
Example
The following command disables ERPS:
disable erps
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Disables the ability on ERPS rings to block virtual channel recovery to avoid temporary loops .
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
block-vc-recovery Block on Virtual channel recovery.
Default
N/A.
Usage Guidelines
Use this command to disable the ability on ERPS rings to block on virtual channel recovery to avoid
temporary loops. This is done on interconnected nodes for sub-ring configurations.
Example
The following example disables a virtual channel recovery block on “ring1”:
History
This command was first available in ExtremeXOS 15.13.
Platform Availability
This command is available on all platforms that are running ExtremeXOS.
Description
Disable an existing ERPS ring/sub-ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
Default
N/A.
Usage Guidelines
Use this command to disable an existing ERPS ring/sub-ring.
Example
The following example disables an existing ERPS ring identified as “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Disable the ability of ERPS to set the topology-change bit to send out Flush events.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS sub-ring.
topology-change Topology change propagation control.
Default
N/A.
Usage Guidelines
Use this command to disable the ability of ERPS to set the topology-change bit to send out Flush
events.
Example
The following example disables the ability to set the topology-change bit for an existing ERPS sub-ring
identified as “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
disable esrp
disable esrp {esrpDomain}
Description
Disables ESRP for a named domain or for the entire switch.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
Default
Disabled for the entire switch.
Usage Guidelines
If you do not specify a domain name, ESRP is disabled for the entire switch.
If you disable an ESRP domain, the domain enters the Aware state, the switch notifies its neighbor that
the ESRP domain is going down, and the neighbor clears its neighbor table. If the master switch
receives this information, it enters the neutral state to prevent a network loop. If the slave switch
receives this information, it enters the neutral state.
Example
The following command disables ESRP for the entire switch:
disable esrp
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
Description
Disables Ethernet OAM on ports.
Syntax Description
port_list Specifies the particular ports.
all Specifies all fiber ports.
Default
Ethernet OAM is disabled on all ports.
Usage Guidelines
Use this command to disable Ethernet OAM on one or more specified ports or on all fiber ports.
When operating as a stack master, the ExtremeSwitching switch can process this command for ports on
supported platforms.
Example
The following command disables Ethernet OAM on port 1:
# disable ethernet oam ports 1 link-fault-management
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables EMS and SNMP reporting of discovered MAC addresses that are duplicates of statically
configured MAC addresses.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following example disables this feature:
disable fdb static-mac-move
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables Layer 2 egress flooding on one or more ports.
Syntax Description
all_cast Specifies disabling egress flooding for all packets on specified ports.
broadcast Specifies disabling egress flooding only for broadcast packets.
multicast Specifies disabling egress flooding only for multicast packets.
unicast Specifies disabling egress flooding only for unknown unicast packets.
port_list Specifies one or more ports or slots and ports.
all Specifies all ports on the switch.
Default
Enabled for all packet types.
Usage Guidelines
Note
If an application requests specific packets on a specific port, those packets are not affected by
the disable flooding ports command.
This is particularly useful when you are working on an edge device in the network. The practice of
limiting flooded egress packets to selected interfaces is also known as upstream forwarding.
Note
If you disable egress flooding with static MAC addresses, this can affect many protocols, such
as IP and ARP.
You can disable egress flooding for unicast, multicast, or broadcast MAC addresses, as well as for all
packets on the ports of the switch. The default behavior is enabled egress flooding for all packet types.
Example
The following example disables unicast flooding on ports 10-12::
# disable flooding unicast port 10-27
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables specified flow control configurations.
Syntax Description
tx-pause Specifies transmission pause processing.
priority Specifies all priorities or single priorities--dot1p priority for tagged
packets and internal priority for untagged packets. Used with priority
flow control only.
rx-pause Specifies reception pause processing.
qosprofile Specifies a QoS profile (“qp1” “qp2” “qp3” “qp4” “qp5” “qp6” “qp7”
“qp8”) to pause for priority flow control packet reception. Used with
priority flow control only.
all Specifies all ports or slots.
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
To disable RX flow-control, TX flow-control must first be disabled. Refer to the disable flow-
control ports command. If you attempt to disable RX flow-control with TX flow-control enabled,
an error message is displayed.
Example
IEEE 802.3x
IEEE 802.1Qbb
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
IEEE 802.3x
The basic TX-pause and RX-pause functions of this command are available on all switches.
IEEE 802.1Qbb
The priority function (PFC) is available only on 10G ports.
Description
When disabled (default), only slow path packets (packets that cannot be forwarded by hardware) may
trigger ICMP redirects.
Syntax Description
fast-path Only slow path packets (packets that cannot be forwarded by
hardware) may trigger ICMP redirects.
Default
Disabled.
Usage Guidelines
Use this command so that only slow path packets (packets that cannot be forwarded by hardware) may
trigger ICMP redirects.
Example
The enabled or disabled setting is displayed when entering the command:
# show ipconfig ipv6
Route Sharing : Disabled
ICMP Redirect for Fast Path : Enabled
Max Shared Gateways : Current: 4 Configured: 4
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the generation of ICMP redirect messages on one or all VLANs.
Syntax Description
name Specifies a VLAN name.
Default
Enabled.
Usage Guidelines
Disables the generation of ICMP redirects (type 5) to hosts who direct routed traffic to the switch where
the switch detects that there is another router in the same subnet with a better route to the destination.
Example
The following example disables ICMP redirects from VLAN "accounting":
disable icmp redirects vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the modification of route table information when an ICMP redirect message is received.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This option only applies to the switch when the switch is not in routing mode.
If the switch has a route to a destination network, the switch uses that router as the gateway to forward
the packets to. If that router knows about a better route to the destination, and the next hop is in the
same subnet as the originating router, the second router sends an ICMP redirect message to the first
router. If ICMP useredirects is disabled, the switch disregards these messages and continues to send the
packets to the second router.
Example
The following example disables the changing of routing table information:
disable icmp useredirects
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable identity-management
disable identity-management
Description
Disables the identity management feature, which tracks users and devices that connect to the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Only admin-level users can execute this command.
Note
If the identity management feature is running and then disabled, all identity management
database entries are removed and cannot be retrieved. If identity management is enabled
later, the identity management feature starts collecting information about currently
connected users and devices.
Example
The following command disables the identity management feature:
disable identity-management
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the timer that disconnects idle sessions from the switch.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Timeout 20 minutes.
Usage Guidelines
When idle time-outs are disabled, console sessions remain open until the switch is rebooted or until you
logoff.
Telnet sessions remain open until you close the Telnet client.
If you have an SSH2 session and disable the idle timer, the SSH2 connection times out after 61 minutes
of inactivity.
To view the status of idle time-outs on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
idle time-outs.
Example
The following command disables the timer that disconnects all sessions to the switch:
disable cli idle-timeout
History
This command was first available in ExtremeXOS 10.1.
The cli keyword was added and the idletimeout keyword was changed to idle-timeout in
ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable igmp
disable igmp {vlan name}
Description
Disables IGMP on a router interface. If no VLAN is specified, IGMP is disabled on all router interfaces.
Syntax Description
name Specifies a VLAN name.
Default
Enabled.
Usage Guidelines
IGMP is a protocol used by an IP host to register its IP multicast group membership with a router.
Periodically, the router queries the multicast group to see if the group is still in use. If the group is still
active, hosts respond to the query, and group registration is maintained.
IGMP is enabled by default on the switch. However, the switch can be configured to disable the
generation and processing of IGMP packets. IGMP should be enabled when the switch is configured to
perform IP multicast routing.
Example
The following example disables IGMP on VLAN accounting:
disable igmp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the IGMP snooping fast leave feature on the specified VLAN.
Syntax Description
name Specifies a VLAN.
Default
Disabled.
Usage Guidelines
None.
Example
The following command disables the IGMP snooping fast leave feature on the default VLAN:
disable igmp snooping “Default” fast-leave
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables IGMP snooping.
Syntax Description
forward-mcrouter-only Specifies that the switch forwards all multicast traffic to the multicast
router only.
with-proxy Disables the IGMP snooping proxy.
name Specifies a VLAN.
Default
IGMP snooping and the with-proxy option are enabled by default, but forward-mcrouter-only option is
disabled by default.
Usage Guidelines
If a VLAN is specified, IGMP snooping is disabled only on that VLAN, otherwise IGMP snooping is
disabled on all VLANs.
If the switch is in the forward-mcrouter-only mode, then the command disable igmp snooping
forward-mcrouter-only changes the mode so that all multicast traffic is forwarded to any IP
router. If not in the forward-mcrouter-mode, the command disable igmp snooping forward-
mcrouter-only has no effect.
To change the snooping mode you must disable IP multicast forwarding. Use the command: disable
ipmcforwarding
The with-proxy option can be used for troubleshooting purpose. It should be enabled for normal
network operation.
Enabling the proxy allows the switch to suppress the duplicate join requests on a group to forward to
the connected Layer 3 switch. The proxy also suppresses unnecessary IGMP leave messages so that
they are forwarded only when the last member leaves the group.
Example
The following example disables IGMP snooping on the VLAN accounting:
disable igmp snooping accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables IGMP SSM mapping.
Syntax Description
vr-name Specifies a virtual router name. If the VR name is omitted, the switch
disables mapping on the VR specified by the current CLI VR context.
Default
Disabled on all interfaces.
Usage Guidelines
None.
Example
The following command disables IGMP-SSM mapping on the VR in the current CLI VR context:
disable igmp ssm-map
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the non-standard (or capacitance) power detection mechanism for the specified slot.
Syntax Description
slot Disables non-standard power detection for specified slot on a
SummitStack.
Default
Disable.
Usage Guidelines
This command disables the non-standard power-detection mechanism on the switch or specified slot.
Legacy PDs do not conform to the IEEE 802.3af standard but may be detected by the switch through a
capacitance measurement.
However, measuring the power through capacitance is used only if this parameter is enabled and after
an unsuccessful attempt to discover the PD using the standard resistance measurement method. The
default for legacy is disabled.
The reason legacy detection is configurable is that it is possible for a normal (non-PoE) device to have a
capacitance signature that causes the device to be detected as a legacy PoE device and have power
delivered to it, potentially causing damage to the device.
On a stack if you do not specify a slot number, the command operates on all active nodes. This
command operates only on nodes in the active topology.
Example
The following command disables capacitance detection of PDs on slot 3 of a SummitStack:
# disable inline-power legacy slot 3
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on SummitStack when the stack contains switches listed in Extreme
Networks PoE Devices.
Description
Disables the non-standard (or capacitance) power detection mechanism for the switch.
Syntax Description
This command has no arguments or variables.
Default
Disable.
Usage Guidelines
This command disables the non-standard power-detection mechanism on the switch. Legacy PDs do
not conform to the IEEE 802.3af standard but may be detected by the switch through a capacitance
measurement.
However, measuring the power through capacitance is used only if this parameter is enabled and after
an unsuccessful attempt to discover the PD using the standard resistance measurement method. The
default for legacy is disabled.
The reason legacy detection is configurable is that it is possible for a normal (non-PoE) device to have a
capacitance signature that causes the device to be detected as a legacy PoE device and have power
delivered to it, potentially causing damage to the device.
Example
The following command disables capacitance detection of PDs on the switch:
# disable inline-power legacy
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching series switches listed in Extreme Networks PoE
Devices.
Description
Shuts down PoE power currently provided to all ports or to specified ports.
Syntax Description
all Disables inline power to all ports on the switch.
port_list Disables inline power to the specified ports.
Default
Enable.
Usage Guidelines
Disabling inline power to ports immediately removes power to any connected PDs. By default, the
capability to provide inline power to all ports is enabled.
Note
Disabling inline power using the disable inline-power command does not affect the
data traffic traversing the port. And, disabling the port using the disable port command
does not affect the inline power supplied to the port.
Disabling inline power to a port providing power to a PD immediately removes power to the PD.
Example
The following command shuts down inline power currently provided to ports 4 and 5 on a switch:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the PoE devices listed in Extreme Networks PoE Devices.
Description
Shuts down PoE, and fast and perpetual PoE, power currently provided to the specified slot.
Syntax Description
slot Selects the slot to disable inline power, or fast/perpetual PoE power
on.
fast Disable delivery of PoE power to devices at the time of switch power
on without waiting for boot up based on last saved PoE state. The
default is disabled.
perpetual Disable preserving PoE power delivery to devices during reboot.
Perpetual PoE is a switch-wide setting. The default is disabled.
Default
By default:
• PoE is enabled.
• Fast PoE is disabled.
• Perpetual PoE is disabled.
Usage Guidelines
Disabling inline power to a slot immediately removes power to any connected PDs. By default, the
capability to provide inline power to a slot is enabled. Additionally, you can disable delivery of PoE
power to devices at the time of switch power on without waiting for boot up (fast PoE) based on last
saved PoE state. You can also elect to not preserve PoE power delivery to devices during reboot
(perpetual PoE). The default for both PoE options is disabled.
Note
You can set the reserved power budget to 0 for a slot if, and only if, you first issue this
command.
On a stack if you do not specify a slot number, the command operates on all active nodes. This
command operates only on nodes in the active topology.
Example
The following command removes power to all PDs on slot 3:
disable inline-power slot 3
History
This command was first available in ExtremeXOS 11.1.
The fast and perpetual PoE options were added in ExtremeXOS 30.3.
Platform Availability
This command is available on the PoE devices listed in Extreme Networks PoE Devices.
The fast and perpetual options are only available on the ExtremeSwitching X465 and X435 series
switches.
disable inline-power
disable inline-power [fast | perpetual]
Description
Shuts down PoE power, and fast and perpetual PoE power currently provided on all ports on all slots.
Syntax Description
fast Disable delivery of PoE power to devices at the time of switch power
on without waiting for boot up based on last saved PoE state. The
default is disabled.
perpetual Disable preserving PoE power delivery to devices during reboot.
Perpetual PoE is a switch-wide setting. The default is disabled.
Default
By default:
• PoE is enabled.
• Fast PoE is disabled.
• Perpetual PoE is disabled.
Usage Guidelines
You can control whether inline power is provided to the system by using the disable inline-
power command and the enable inline power command. Using the disable inline-power
command shuts down inline power currently provided on the entire switch or to specified ports and
slots. Disabling inline power to a switch, port, or slot immediately removes power to any connected PDs.
By default, inline power provided to all ports is enabled. Additionally, you can disable delivery of PoE
power to devices at the time of switch power on without waiting for boot up (fast PoE) based on last
saved PoE state. You can also elect to not preserve PoE power delivery to devices during reboot
(perpetual PoE). The default for both PoE options is disabled.
Note
Disabling inline power using the disable inline-power command does not affect the
data traffic traversing the port. And, disabling the port using the disable port command
does not affect the inline power supplied to the port.
Note
Inline power cannot be delivered to connected PDs unless the switch is powered on.
Example
The following command shuts down inline power currently provided to all ports and all slots:
disable inline-power
The following example turns off perpetual PoE for the switch:
# disable inline-power perpetual
History
This command was first available in ExtremeXOS 11.1.
The fast and perpetual PoE options were added in ExtremeXOS 30.3.
Platform Availability
This command is available on the PoE devices listed in Extreme Networks PoE Devices in the
ExtremeXOS 30.5 User Guide.
The fast and perpetual options are only available on the ExtremeSwitching X465 and X435 series
switches.
Description
Disable checking if the ARP request source IP address is within the range of the local interface or VLAN
domain.
Syntax Description
vr_name Specifies a VR or VRF.
Default
Enabled.
Usage Guidelines
If you do not specify a VR or VRF, the command applies to the current VR context.
Example
The following example disables IP ARP checking:
disable iparp checking
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables gratuitous ARP protection on the specified VLAN.
Syntax Description
vlan_name Specifies the VLAN.
vlan_list Specifies a VLAN list of IDs.
Default
Disabled.
Usage Guidelines
Hosts can launch man-in-the-middle attacks by sending out gratuitous ARP requests for the router's IP
address. This results in hosts sending their router traffic to the attacker, and the attacker forwarding that
data to the router. This allows passwords, keys, and other information to be intercepted.
To protect against this type of attack, the router will send out its own gratuitous ARP request to
override the attacker whenever a gratuitous ARP broadcast with the router's IP address as the source is
received on the network.
Example
The following example disables gratuitous ARP protection for VLAN corp:
disable iparp gratuitous protect vlan corp
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables IP ARP to refresh its IP ARP entries before timing out.
Syntax Description
vr_name Specifies a VR or VRF.
Default
Enabled.
Usage Guidelines
The purpose of disabling ARP refresh is to reduce ARP traffic in a high node count Layer 2 switching
only environment.
If you do not specify a VR or VRF, the command applies to the current VR context.
Example
The following example disables IP ARP refresh:
disable iparp refresh
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables IPFIX metering on the port.
Syntax Description
port_list Specifies the ports.
all Specifies all ports.
Default
The default is disabled.
Usage Guidelines
Use this command to turn off IPFIX metering on a port.
Example
The following command disables the IPFIX metering support on the port:
# disable ip-fix ports 2:1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available only on the ExtremeSwitching X460-G2 series switches.
Description
Disables routing (or routing of broadcasts) for one or all VLANs. If no argument is provided, disables
routing for all VLANs.
Syntax Description
broadcast Specifies broadcast IP forwarding.
vlan_name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
Disabling IP forwarding also disables broadcast forwarding. Broadcast forwarding can be disabled
without disabling IP forwarding. When new IP interfaces are added, IP forwarding (and IP broadcast
forwarding) is disabled by default.
Example
The following example disables forwarding of IP broadcast traffic for a VLAN "accounting":
disable ipforwarding broadcast vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
Description
Disables routing (or routing of broadcasts) for one or all VLANs. If no argument is provided, disables
routing for all VLANs.
Syntax Description
broadcast Specifies broadcast IP forwarding.
vlan_name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
Disabling IP forwarding also disables broadcast forwarding. Broadcast forwarding can be disabled
without disabling IP forwarding. When new IP interfaces are added, IP forwarding (and IP broadcast
forwarding) is disabled by default.
Example
The following example disables forwarding of IP broadcast traffic for a VLAN "accounting":
disable ipforwarding broadcast vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
Description
Disables routing for one or all interfaces. If no argument is provided, disables routing for all interfaces on
the current VR or VRF.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
vlan_list Specifies a VLAN list of IDs.
tunnel_name Specifies an IPv6 tunnel.
vr_name Specifies a VR or VRF.
Default
Disabled.
Usage Guidelines
When new IPv6 interfaces are added, IPv6 forwarding is disabled by default.
Example
The following example disables forwarding of IPv6 traffic for a VLAN "accounting":
disable ipforwarding ipv6 vlan accounting
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables IPv6 multicast forwarding on a router interface.
Syntax Description
name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
If no options are specified, all configured IPv6 interfaces are affected. When new IPv6 interfaces are
created, IPv6 multicast forwarding is disabled by default.
Disabling IPv6 multicast forwarding disables any Layer 3 IPv6 multicast routing for the streams coming
to the interface.
Example
The following example disables IPv6 multicast forwarding on VLAN accounting:
disable ipmcforwarding ipv6 vlan accounting
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv6 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
disable ipmcforwarding
disable ipmcforwarding {vlan name}
Description
Disables IP multicast forwarding on a router interface.
Syntax Description
name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
If no options are specified, all configured IP interfaces are affected. When new IP interfaces are added,
IP multicast forwarding is disabled by default.
Disabling IP multicast forwarding disables any Layer 3 multicast routing for the streams coming to the
interface.
Example
The following example disables IP multicast forwarding on the VLAN accounting:
disable ipmcforwarding vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables BFD client services for IPv4 static routes.
Syntax Description
ip_addr Specifies the IPv4 address of a neighbor for which BFD services are to
be stopped.
vrname Specifies the VR or VRF name for which BFD services are being
disabled.
Default
Disabled.
Usage Guidelines
When the BFD client is disabled, BFD services for all static IP routes terminates. This command does not
disable services for other BFD clients (such as the MPLS BFD client).
Example
The following example disables BFD client protection for communications with neighbor 10.10.10.1:
# disable iproute bfd 10.10.10.1
History
This command was first available in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Turns off "strict" Bidirectional Forwarding Detection (BFD) session control, which brings up the static
route during switch reboot if the static route nexthop BFD session is in the INIT state.
Syntax Description
protection Enables or disables route protection.
bfd BFD protect static routes to next hop gateway.
strict Disables considering that protected static routes are not up if the BFD
session is in INIT state. Default is disabled.
Default
By default, strict BFD session control is disabled.
Usage Guidelines
If the BFD session is down, but BFD protected static route is still in the routing table after reboot, the
BFD session is never established, because during reboot, the BFD session is in the INIT state, and the
static route is brought up without considering BFD session state. This can cause traffic loss because the
link to the gateway actually is down. This command turns off strict BFD session control, which means
that the static route is brought up during reboot even if the BFD session is in the INIT state. A reboot is
required to make the command take effect.
Example
The following example disables BFD strict session control:
# disable iproute bfd strict
WARNING: Please reboot the switch for the strict BFD to take effect.
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Disables IPv4 route compression.
Syntax Description
vrname VR or VRF name for which the IP route compression is being disabled.
If the VR or VRF name is not specified, route compression is disabled
for the VR context from which CLI command is issued.
Default
Enabled.
Usage Guidelines
Disables IPv4 route compression for a specified VR or VRF.
Example
The following example disables IP route compression:
disable iproute compression
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables IPv6 route compression.
Syntax Description
vr_name Specifies a VR or VRF. If not specified, the current CLI context is used.
Default
By default, IPv6 route compression is disabled for all address families and VRs.
Usage Guidelines
This command disables IPv6 route compression for the IPv6 address family and VR. This command
decompresses previously compressed prefixes in the IPv6 prefix database.
Example
The following example disables IPv6 route compression for the IPv6 address family and the VR of the
current CLI context:
disable iproute ipv6 compression
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command disables IPv6 route sharing.
Syntax Description
vr_name Specifies a VR or VRF. If not specified, the current CLI context is used
all Specifies all VR or VRF.
Default
By default, IPv6 route sharing is disabled.
Usage Guidelines
This command disables IPv6 route sharing for the IPv6 address family and VR.
Example
The following example disables IPv6 route sharing for the IPv6 address family and the VR of the current
CLI context:
disable iproute ipv6 sharing
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
The ability to enable and disable ECMP for IPv6 is supported for all platforms.
Description
Disables IP forwarding over MPLS LSPs for the default VR.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables IP forwarding over MPLS LSPs for the default VR. When disabled, any route
with an MPLS LSP as its next hop becomes inactive and is not used to tunnel IP traffic across the MPLS
network. By default, IP forwarding over MPLS LSPs is disabled.
Example
This command disables IP forwarding over MPLS LSPs.
disable iproute mpls-next-hop
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Globally disables ping protection for static routes added with ping protection for IPv4 and IPv6. Routes
are up in the routing table, and ping health check monitoring is not performed.
Syntax Description
ipv4 Specifies IPv4 (default).
ipv6 Specifies IPv6.
protection Disables route protection.
ping Globally disables ping protection for static routes added with ping
protection (default is enabled).
Default
Enabled is the default. If not specified, IPv4 is the default.
Example
The following example disables ping protection for static routes added with ping protection for IPv4:
disable iproute ipv4 protection ping
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
All platforms with an Edge license or greater.
Description
Disables IPv4 route sharing.
Syntax Description
vrname VR or VRF name for which IP route sharing is being disabled.
Default
Disabled.
Usage Guidelines
If a VR is not specified, this command disables IP route sharing in the current VR context.
Example
The following example disables load sharing for multiple routes:
disable iproute sharing
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables ICMP size and fragment checking.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command disables ICMP size and fragment checking. This checking takes effect for both IPv4 and
IPv6 TCP packets. When enabled, the switch drops ICMP packets if one of following condition is true:
• Fragmented ICMP packets for IPv4 packets.
• IPv4 ICMP pings packets with payload size greater than the maximum IPv4 ICMP-allowed size. (The
maximum allowed size is configurable.)
• IPv6 ICMP ping packets with payload size > the maximum IPv6 ICMP-allowed size. (The maximum
allowed size is configurable.)
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables source and destination IP address checking.
Syntax Description
slot Specifies the slot.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command disables source and destination IP addresses checking. This checking takes effect for
both IPv4 and IPv6 packets. When enabled, the switch drops IPv4/IPv6 packets if its source IP address
are the same as the destination IP address. In most cases, the condition of source IP address being the
same as the destination IP address indicates a Layer 3 protocol error. (These kind of errors are found in
LAND attacks.)
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables TCP and UDP ports checking.
Syntax Description
tcp Specifies that the TCP port be disabled for checking.
udp Specifies that the UDP port be disabled for checking.
both Specifies both the TCP and UDP ports be disabled for checking.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command disables TCP and UDP ports checking. This checking takes effect for both IPv4 and IPv6
TCP and UDP packets. When enabled, the switch drops TCP and UDP packets if its source port is the
same as its destination port. In most cases, when the condition of source port is the same as that of the
destination port, it indicates a Layer4 protocol error. (This type of error can be found in a BALT attack.)
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables protocol anomaly notification.
Syntax Description
log Specifies the switch to send the notification to a log file.
snmp Specifies the switch to send an SNMP trap when an event occurs.
cache Specifies the switch to send the notification to cache.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command disables anomaly notification. When enabled, any packet failed to pass enabled protocol
checking is sent to XOS Host CPU and notifies the user. There are three different types of notifications:
• log: log anomaly events in the switch log system; you can view and manage this log with the show
log and configure log commands.
• snmp: the anomaly events generate SNMP traps.
• cache: logs the most recent and unique anomaly events in memory; rebooting the switch will cause
all the logged events to be lost (the number of cached events is configured by command).
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables TCP flag checking.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command disables TCP flag checking. This checking takes effect for both IPv4 and IPv6 TCP
packets. When enabled, the switch drops TCP packets if one of following condition is true:
• TCP SYN flag==1 and the source port<1024
• TCP control flag==0 and the sequence number==0
• TCP FIN, URG, and PSH bits are set, and the sequence number==0
• TCP SYN and FIN both are set.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables TCP fragment checking.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command disables TCP fragment checking. This checking takes effect for IPv4/IPv6. When it is
enabled, the switch drops TCP packets if one of following condition is true:
• For the first IPv4 TCP fragment (its IP offset field==0), if its TCP header is less than the minimum
IPv4 TCP header allowed size.
• If its IP offset field==1 (for IPv4 only).
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables all anomaly checking options.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This commands disables all anomaly checking options, including IP address, UDP/TCP port, TCP flag
and fragment, and ICMP anomaly checking.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables gratuitous ARP protection on one or all VLANs on the switch.
Syntax Description
all Specifies all VLANs configured on the switch.
vlan-name Specifies the VLAN.
dynamic Configuration options for dynamically created VLANs.
Default
By default, gratuitous ARP protection is disabled.
Usage Guidelines
Beginning with ExtremeXOS 11.6, this command replaces the disable iparp gratuitous
protect vlan command.
Hosts can launch man-in-the-middle attacks by sending out gratuitous ARP requests for the router's IP
address. This results in hosts sending their router traffic to the attacker, and the attacker forwarding that
data to the router. This allows passwords, keys, and other information to be intercepted.
To protect against this type of attack, the router will send out its own gratuitous ARP request to
override the attacker whenever a gratuitous ARP broadcast with the router's IP address as the source is
received on the network.
Example
The following command disables gratuitous ARP protection for VLAN corp:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables ARP learning on the specified VLAN and member ports.
Syntax Description
vlan_name Specifies the name of the VLAN to which this rule applies.
dynamic Configuration options for dynamically created VLANs.
all Specifies all ingress ports.
ports Specifies one or more ingress ports.
Default
By default, ARP learning is enabled.
Usage Guidelines
You can disable ARP learning so that the only entries in the ARP table are either manually added or
those created by DHCP secured ARP; the switch does not add entries by tracking ARP requests and
replies. By disabling ARP learning and adding a permanent entry or configuring DHCP secured ARP, you
can centrally manage and allocate client IP addresses and prevent duplicate IP addresses from
interrupting network operation.
To manually add a permanent entry to the ARP table, use the following command:
configure iparp add ip_addr {vrvr_name} mac
To configure DHCP secure ARP as a method to add entries to the ARP table, use the following
command:
enable ip-security arp learning learn-from-dhcp vlan vlan_name ports
[all | ports] {poll-interval interval_in_seconds} {retries
number_of_retries}
To view the ARP table, including permanent and DHCP secured ARP entries, use the following
command:
show iparp {ip_address | mac | vlanvlan_name | permanent} {vrvr_name}
Note
DHCP secured ARP entries are stored as static entries in the ARP table.
Example
The following command disables ARP learning on port 1:1 of the VLAN learn:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables DHCP secured ARP learning for the specified VLAN and member ports.
Syntax Description
dynamic Configuration options for dynamically created VLANs.
vlan_name Specifies the name of the VLAN to which this rule applies.
all Specifies all ingress ports.
ports Specifies one or more ingress ports.
Default
By default, DHCP secured ARP learning is disabled.
Usage Guidelines
Use this command to disable DHCP secured ARP learning.
To view the ARP table, including permanent and DHCP secured ARP entries, use the following
command:
show iparp {ip_address | mac | vlanvlan_name | permanent} {vrvr_name}
Example
The following command disables DHCP secured ARP learning on port 1:1 of the VLAN learn:
disable ip-security arp learning learn-from-dhcp vlan learn ports 1:1
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables ARP validation for the specified VLAN and member ports.
Syntax Description
vlan_name Specifies the name of the VLAN to which this rule applies.
dynamic Configuration options for dynamically created VLANs.
all Specifies all ports.
ports Specifies one or more ports.
Default
By default, ARP validation is disabled.
Usage Guidelines
Use this command to disable ARP validation.
Example
The following command disables ARP validation on port 1:1 of the VLAN valid:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the download and upload of DHCP bindings.
Syntax
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
The command allows you to disable the download and upload of the DHCP bindings, essentially
disabling the DHCP binding functionality. The default is disabled.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables DHCP snooping on the switch.
Syntax Description
vlan_name Specifies the name of the DHCP-snooping VLAN.
dynamic Configuration options for dynamically created VLANs.
all Specifies all ports to stop receiving DHCP packets.
ports Specifies one or more ports to stop receiving DHCP packets.
Default
By default, DHCP snooping is disabled.
Usage Guidelines
Use this command to disable DHCP snooping on the switch.
Example
The following command disables DHCP snooping on the switch:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the source IP lockdown feature on one or more ports.
Syntax Description
all Specifies all ports for which source IP lockdown should be disabled.
ports Specifies one or more ports for which source IP lockdown should be
disabled.
Default
By default, source IP lockdown is disabled on the switch.
Usage Guidelines
To display the source IP lockdown configuration on the switch, use the following command:
show ip-security source-ip-lockdown
Example
The following command disables source IP lockdown on ports 1:1 and 1:4:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable irdp
disable irdp {vlan name}
Description
Disables the generation of ICMP router advertisement messages on one or all VLANs.
Syntax Description
name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
If no optional argument is specified, all the IP interfaces are affected.
Example
The following example disables IRDP on VLAN "accounting":
disable irdp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
disable isis
disable isis {area area_name}
Description
This command disables the specified IS-IS router process on the current virtual router.
Syntax Description
area_name Specifies the name of the IS-IS router process to be disabled.
Default
Disabled.
Usage Guidelines
IS-IS PDUs are no longer sent or processed on this IS-IS router process. The LSP and neighbor
databases are purged. IS-IS routes are purged from the routing table. This command should only be
used during planned network outages. This command has no effect on router processes that are already
disabled.
Example
The following command disables the IS-IS process named areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables the checking of the following TLVs when forming adjacencies: Protocols
Supported and IP Interface Address.
Syntax Description
area_name Specifies the name of the IS-IS router process that should no longer
perform the adjacency check.
ipv4 Specifies that the adjacency check should no longer be performed on
IPv4 interfaces.
ipv6 Specifies that the adjacency check should no longer be performed on
IPv6 interfaces.
Default
IPv4: Enabled.
IPv6: Enabled.
Usage Guidelines
When adjacency checking is disabled, adjacencies may be formed on interfaces that do not reside on
the same subnet or do not support IPv4 (if disabled for IPv4) or IPv6 (if disabled for IPv6). If neither
ipv4 nor ipv6 is specified, this command applies to IPv4.
Example
The following command directs the IS-IS process named areax to disable adjacency checks on IPv6
interfaces:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables the dynamic hostname feature.
Syntax Description
area_name Specifies the name of the IS-IS process for which the dynamic-
hostname feature is to be disabled.
Default
Disabled.
Usage Guidelines
The specified router process no longer includes code 137 TLVs in its LSPs and names are no longer
displayed in show commands.
Example
The following command disables the display of area names or SNMP names instead of system IDs:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables IPv6 route redistribution of the specified type into IS-IS.
Syntax Description
area_name Specifies the IS-IS router process for which route redistribution is
disabled.
route-type Selects the type of export route to disable. The valid route types are:
direct, ospfv3, ospfv3-extern1, ospfv3-extern2, ospfv3-inter, ospfv3-
intra, ripng, bgp, and static.
Default
All types are disabled.
Usage Guidelines
None.
Example
The following command disables RIPng route distribution into areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables IPv4 route redistribution of the specified type into IS-IS.
Syntax Description
area_name Specifies the IS-IS router process for which route redistribution is
disabled.
ipv4 Specifies that the configuration change is for IPv4 IS-IS routing.
route-type Selects the type of export route to disable. The valid route types are:
bgp, direct, e-bgp, i-bgp, ospf, ospf-extern1, ospf-extern2, ospf-inter,
ospf-intra, rip, and static.
Default
All types are disabled.
Usage Guidelines
None.
Example
The following command disables RIP route distribution into areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables the generation of one or all default routes in the LSPs for the specified router
process.
Syntax Description
area_name Specifies the name of the IS-IS router process that should no longer
generate the default route.
ipv4 Specifies that the router process should no longer generate the
default IPv4 route.
ipv6 Specifies that the router process should no longer generate the
default IPv6 route.
Default
IPv4: Disabled.
IPv6: Disabled.
Usage Guidelines
This applies to level 2 routing only. By default this command disables IPv4 default route origination. The
optional ipv6 keyword disables IPv6 default route origination. This command has no effect on router
processes that are already disabled for default route origination on level 1-only router processes.
Example
The following command directs the IS-IS process named areax to stop generating the default IPv4 route
in it’s LSPs:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables the overload-bit feature.
Syntax Description
area_name Specifies the area name of the IS-IS process for which this feature is to
be disabled.
Default
Disabled.
Usage Guidelines
Disabling the overload bit feature causes an SPF recalculation throughout the network. In addition,
external and interlevel router redistribution is no longer suppressed if those options were included when
the overload bit was enabled. If the overload bit is currently set as a result of the overload-bit on-startup
command, this command overrides the configuration and disables this feature.
Example
The following command disables the overload bit feature for areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables the padding of Hello PDUs for one or all IS-IS VLANs.
Syntax Description
vlan all Disables hello padding on all IS-IS VLANs.
vlan_name Specifies a single VLAN on which to disable hello padding.
Default
Enabled.
Usage Guidelines
Implicit adjacency MTU verification is not performed when hello padding is disabled.
Example
The following command disables hello padding on all IS-IS VLANs:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command disables the IS-IS restart helper.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
When this feature is disabled, the router does not act as a restart helper and may time out a restarting
router’s adjacency per normal operation.
Example
The following command disables the IS-IS restart helper:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
Disables jumbo frame support on a port.
Syntax Description
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
Use this command to disable jumbo frames on individual ports.
Example
The following command disables jumbo frame support on a switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable l2vpn
disable l2vpn [vpls [vpls_name | all] | vpws [vpws_name | all]]
Description
Disables the specified VPLS or VPWS.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
vpws_name Identifies the VPWS within the switch (character string).
all Specifies all VPLS or VPWS instances.
Default
All newly created VPLS instances are enabled.
Usage Guidelines
When a VPLS or VPWS instance is disabled, all sessions to its configured peers are terminated. Any
locally attached service VLAN/VMAN is immediately isolated from other devices residing in the VPN. If
this is an H-VPLS core node, then all spoke nodes connected to this peer are isolated unless redundant
core access is configured.
The l2vpn keyword is introduced in ExtremeXOS Release 12.4 and is required when disabling a VPWS.
For backward compatibility, the l2vpn keyword is optional when disabling a VPLS. However, this
keyword will be required in a future release, so we recommend that you use this keyword for new
configurations and scripts.
Example
The following command disables the VPLS named myvpls:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the VCCV health check feature on the specified VPLS or VPWS instances.
Syntax Description
vpls_name Identifies the VPLS for which health check is to be disabled.
vpws_name Identifies the VPWS for which health check is to be disabled.
all Specifies that health check is to be disabled on all VPLS instances on the local
node.
Default
Health check is disabled.
Usage Guidelines
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when disabling health
check for a VPWS instance. For backward compatibility, the l2vpn keyword is optional when disabling
health check for VPLS instance. However, this keyword will be required in a future release, so we
recommend that you use this keyword for new configurations and scripts.
Example
The following command disables the health check feature on the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 12.1.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the configured services for the specified VPLS or VPWS.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
vpws_name Identifies the VPWS within the switch (character string).
all Specifies all VPLS or VPWS instances.
Default
Enabled.
Usage Guidelines
When services are disabled, the VPLS or VPWS is removed from all peer sessions. The keyword all
disables services for all VPLS instances.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when disabling a
service for a VPWS peer. For backward compatibility, the l2vpn keyword is optional when disabling a
service for a VPLS peer. However, this keyword will be required in a future release, so we recommend
that you use this keyword for new configurations and scripts.
Example
The following command disables the configured services for VPLS myvpls:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables LSP sharing for Layer 2 VPN pseudo-wires.
Syntax Description
This command has no keywords or arguments.
Default
Disabled.
Usage Guidelines
This command disables LSP sharing for L2VPN PWs. When LSP sharing is disabled, only 1 named LSP is
used for a PW. When LSP sharing is enabled, up to 16 named LSPs are used for a PW.
If LSP Sharing is disabled, and more than 1 Transport LSP is programmed into HW, all but 1 Transport
LSP is removed from HW, and the configuration is preserved. If LSP Sharing is enabled, and more than 1
Transport LSP was previously configured, the remaining LSPs is programmed into HW as they become
available for use.
Example
The following command disables LSP sharing for L2VPN PWs:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available only on the platforms that support as described in the ExtremeXOS 30.5
Feature License Requirements document.
Description
Disables the MAC address withdrawal capability.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
When disabled, the switch does not send MAC address withdrawal messages. If a MAC address
withdrawal message is received from another VPLS peer, the local peer processes the message and
withdraws the specified MAC addresses from its FDB, regardless of the MAC address withdrawal
configuration.
Example
The following command disables MAC address withdrawal:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables MAC address learning from the payload of IP ARP packets.
Syntax Description
vr_name Specifies a virtual router.
Default
Disabled.
Usage Guidelines
To view the configuration for this feature, use the following command: show iparp
Example
The following example disables MAC address learning from the payload of IP ARP packets:
disable learning iparp sender-mac
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables MAC address learning on one or more ports for security purposes.
Syntax Description
drop-packets Specifies that packets with unknown source MAC addresses be
dropped. When disable learning is configured, this is the default
behavior.
forward-packets Specifies that packets with unknown source MAC addresses be
forwarded.
port Specifies the port.
port_list Specifies one or more ports or slots and ports.
all Specifies all ports and slots.
Default
Enabled.
Usage Guidelines
Use this command in a secure environment where access is granted via permanent forwarding
databases (FDBs) per port.
Example
The following command disables MAC address learning on port 4 on a switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables learning a remote endpoint.
Syntax Description
forward-packets Forward packets with unknown source MAC addresses.
drop-packets Drop packets with unknown source MAC addresses.
vr VR/VRF instance the IPv4 address is configured on.
vr_name An existing VR/VRF name.
Default
N/A.
Usage Guidelines
N/A.
Example
To disable learning on a remote endpoint:
disable learning vxlan ipaddress 1.2.3.4
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Disables the front panel LEDs from flashing on a switch.
Syntax Description
slot slot Slot number.
all All slots.
Default
N/A.
Usage Guidelines
None.
Example
The following example disables the front panel LEDs on all slots:
disable led locator all
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables LLDP transmit mode, receive mode, or transmit and receive mode on the specified port or
ports.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
receive-only Specifies that only the receive mode for LLDP is disabled.
transmit-only Specifies that only the transmit mode for LLDP is disabled.
Default
Enabled.
Usage Guidelines
If you do not specify an option, both LLDP modes (transmit and receive) are disabled.
Example
The following example disables the LLDP receive mode on ports 1:2 to 1:6.
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables debug mode. The switch stops generating debug events.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables debug mode. Debug mode must be enabled prior to configuring advanced
debugging capabilities. These include allowing debug messages, which can severely degrade
performance. For typical network device monitoring, debug mode should remain disabled, the default
setting. Debug mode should only be enabled when advised by technical support, or when advanced
diagnosis is required. The debug mode setting is saved to FLASH.
Example
The following command disables debug mode:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the sending of messages to the console display.
In a stack, this command is applicable only to Master and Backup nodes and not applicable to the
standby nodes.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
If the log display is disabled, log information is no longer written to the serial console.
This command setting is saved to FLASH and determines the initial setting of the console display at
boot up.
You can also use this following command to control logging to different targets:
Example
The following command disables the log display:
disable log display
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Stops sending log messages to the specified target.
In a stack, this command is applicable only to Master and Backup nodes and not applicable to the
standby nodes.
Syntax Description
console Specifies the console display.
memory-buffer Specifies the switch memory buffer.
nvram Specifies the switch NVRAM.
primary-node Specifies the primary node in a stack.
backup-node Specifies the backup node in a stack.
session Specifies the current session (including console display).
syslog Specifies a syslog target.
all Specifies all of the remote syslog servers.
ipaddress Specifies the syslog host name or IP address.
ipPort Specifies the UDP port number for the syslog target.
tls_port Specifies remote Syslog server Transport Layer Security (TLS) for
connection type.
tls_port TLS port number.
vr_name Specifies the virtual router that can reach the server IP address.
Default
Enabled, for memory buffer, NVRAM, primary node, and backup node; all other targets are disabled by
default.
Usage Guidelines
This command stops sending messages to the specified target. By default, the memory buffer, NVRAM,
primary node, and backup node targets are enabled. Other targets must be enabled before messages
are sent to those targets.
Configuration changes to the session target are in effect only for the duration of the console display or
Telnet session, and are not saved in FLASH. Changes to the other targets are saved to FLASH.
You can also use the following command to disable displaying the log on the console: disable log
display
The disable log display command is equivalent to disable log target console-display command.
Example
The following example disables log messages to the current session:
disable log target session
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the specified UPM log target.
Syntax Description
upm_profile_name Specifies the name of the UPM log target to be disabled.
Default
N/A.
Usage Guidelines
This command disables the log target and retains any configurations applied to that target. To delete a
target and any configuration applied to the target, use the following command:
delete log target upm {upm_profile_name}
Example
The following example disables the UPM log target "testprofile1":
disable log target upm testprofile1
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables a Web server target.
Syntax Description
xml_target_name Specifies the name of the xml-notification target.
Default
N/A.
Usage Guidelines
Use this command to disable a web server EMS target.
Example
The following command disables the Web server target target2:
disable log target xml-notification target2
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disallows a VLAN to be placed in the UP state without an external active port. This allows (disallows)
the VLANs routing interface to become active.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
Default
N/A.
Usage Guidelines
Use this command to specify a stable interface as a source interface for routing protocols. This
decreases the possibility of route flapping, which can disrupt connectivity.
Example
The following example disallows the VLAN accounting to be placed in the UP state without an external
active port:
disable loopback-mode vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the MAC address lock down timeout feature for the specified port or group of ports or for all
ports on the switch.
Syntax Description
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
Default
By default, the MAC address lock down feature is disabled.
Usage Guidelines
If you disable the MAC lock down timer on a port, existing MAC address entries for the port will time out
based on the FDB aging period.
Example
The following command disables the MAC address lock down timer set for ports 2:3 and 2:4:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables MAC locking on the specified port.
Syntax Description
port_list Specifies one or more ports or slots and ports.
all Specifies all ports.
Default
MAC locking is disabled by default.
Usage Guidelines
None.
Example
The following example disables MAC locking on port 14:
disable mac-locking ports 14
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable mac-locking
disable mac-locking
Description
Disables MAC locking globally on the switch.
Syntax Description
This command has no arguments or variables.
Default
MAC locking is disabled by default.
Usage Guidelines
If you disable MAC locking globally, you cannot enable MAC locking on a specific port.
Example
The following example disables MAC locking on the switch.
disable mac-locking
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable mirror
disable mirror mirror_name | all
Description
Disables a mirror instance.
Syntax Description
mirror_name Specifies the mirror name.
all Specifies all mirror instance are deleted.
Default
Disabled.
Usage Guidelines
Use this command to disable mirrors. Disabling an instance only changes the state, its configuration
remains as defined (a change from current operation, which loses some configuration parameters).
Example
The following example disable a mirror instance named "mirror1" :
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables a Mirror MIB instance or the assigned instance to an existing mirror.
Syntax Description
control_index Selects the Mirror MIB instance to disable. Range is 1 through 4.
mirror Designates specifying a mirror name associated within the specified
control index.
mirror_name Specifies the mirror name associated within the specified control
index.
Default
Disabled.
Usage Guidelines
Specifying a mirror name only disables that mirror within the Mirror MIB group (control index).
Example
The following example disables Mirror MIB specified by control index "1":
# disable mirror 1
The following example disables the mirror named "m1" within the Mirror MIB specified by control index
"1":
# disable 1 mirror m1
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Removes a local port or LAG from an MLAG.
Syntax Description
port Specifies a local member port of the MLAG group.
Default
N/A.
Usage Guidelines
Use this command to remove a local port or LAG from an MLAG.
Example
The following command unbinds the local member port 2:
# disable mlag port 2
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command disables reload-delay on Multi-switch Link Aggregation Group (MLAG) ports.
Syntax Description
This command has no arguments or variables.
Default
MLAG reload-delay is disabled by default.
Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. This command disables this timer feature.
Example
The following example disables the MLAG reload-delay timer:
# disable mlag port reload-delay
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
disable mld
disable mld {vlan name}
Description
Disables MLD on a router interface. If no VLAN is specified, MLD is disabled on all router interfaces.
Syntax Description
name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
MLD is a protocol used by an IPv6 host to register its IPv6 multicast group membership with a router.
Periodically, the router queries the multicast group to see if the group is still in use. If the group is still
active, hosts respond to the query, and group registration is maintained.
MLD is disabled by default on the switch. However, the switch can be configured to enable the
generation and processing of MLD packets. MLD should be enabled when the switch is configured to
perform IPv6 unicast or IPv6 multicast routing.
This command disables all MLD versions. When MLD is disabled, the MLDv2 compatibility mode setting
is lost. If compatibility mode is not specified in the command when MLD is enabled again, MLDv1
compatibility mode is set.
Example
The following example disables MLD on VLAN accounting:
disable mld vlan accounting
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables MLD snooping.
Syntax Description
with-proxy Disables the MLD snooping proxy.
name Specifies a VLAN.
Default
The with-proxy option is enabled by default.
Usage Guidelines
If a VLAN is specified, MLD snooping is disabled only on that VLAN, otherwise MLD snooping is
disabled on all VLANs.
The with-proxy option can be used for troubleshooting purpose. It should be enabled for normal
network operation.
Enabling the proxy allows the switch to suppress the duplicate join requests on a group to forward to
the connected Layer 3 switch. The proxy also suppresses unnecessary MLD done messages so that they
are forwarded only when the last member leaves the group.
Example
The following example disables MLD snooping on the VLAN accounting:
disable mld snooping accounting
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables MLD SSM mapping on a VR.
Syntax Description
vr vr_name Specifies a virtual router name.
Default
Disabled.
Usage Guidelines
Use this command to disable MLD SSM mapping on a VR.
Example
The following example disables SSM mapping on VR1:
disable mld-ssm map vr vr1
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
disable mpls
disable mpls
Description
Disables MPLS on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
When MPLS is disabled, no label traffic is received or transmitted, and all MPLS-related protocol peer
sessions are terminated.
Example
The following command globally disables MPLS on the switch:
disable mpls
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the Bidirectional Forwarding Detection (BFD) client for MPLS on the specified VLAN or on all
VLANs.
Syntax Description
vlan_name Specifies the VLAN on which to disable the MPLS BFD client.
delete-sessions Specifies to delete all MPLS BFD sessions.
Default
Keep existing MPLS BFD sessions.
Usage Guidelines
This command instructs MPLS to cease the establishment of new BFD sessions with neighbors as LSPs
are established with those neighbors. The default behavior retains the existing BFD sessions and
ignores status updates from those existing sessions. The delete-sessions option instructs MPLS to
request the deletion of existing sessions. Whether the sessions are deleted or not, the link state
presented to the upper MPLS layers reverts to the normal link operational status.
Note
Deleting existing sessions can result in a neighbor DOWN indication from BFD to MPLS on the
other end of the session (the peer switch) and a subsequent interface DOWN indication
presented to the upper layers of MPLS on that peer switch. These actions can cause MPLS to
reroute or fail the affected LSPs.
To disable the MPLS BFD client and delete all BFD sessions without disrupting the LSPs between two
switches, do the following:
• Log into switch A as an admin user and issue the command: disable mpls bfd vlanx.
• Log into switch B as an admin user and issue the command: disable mpls bfd vlanx
delete-sessions
Example
The following command disables the MPLS BFD client on VLAN vlan1:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables assigning an MPLS packet to a QoS profile based on the MPLS packet’s EXP value.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables assigning an MPLS packet to a QoS profile based on the MPLS packet's EXP
value.
When disabled, all received MPLS packets are assigned to QoS profile qp1.
Example
The following command disables the assignment of an MPLS packet to a QoS profile based on the
MPLS packet’s EXP value:
disable mpls exp examination
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables setting an MPLS packet's EXP value based on the packet's QoS profile.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables setting an MPLS packet's EXP value based on the packet's QoS profile. The QoS
profiles to EXP value mappings are configured using the configure mpls exp replacement
command.
When disabled, all MPLS packets are transmitted with an EXP value of zero.
Example
The following command disables the setting of an MPLS packet's EXP value based on the packet's QoS
profile:
disable mpls exp replacement
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables LDP’s use of IP prefixes learned from BGP when establishing LDP LSPs.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command disables LDP’s establishment of LSPs to routes learned via BGP, thus reducing the
internal resources used by LDP. Note that MPLS LSPs can still be used to transport packets to routes
learned via BGP through the use of the enable bgp mpls-next-hop command.
When enabled, LDP uses routes learned via BGP when establishing LDP LSPs. As each established LSP
consumes internal resources, it is recommended that this setting be used only in BGP environments
where the number of BGP routes is controlled.
Example
The following command disables the use of BGP routes by LDP:
disable mpls ldp bgp-routes
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables LDP loop detection on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Loop detection provides a mechanism for finding looping LSPs and for preventing Label Request
messages from looping in the presence of non-merge-capable LSRs. The mechanism makes use of Path
Vector and Hop Count TLVs carried by Label Request and Label Mapping messages.
When LDP loop detection is disabled, LDP does not attempt to detect routing loops.
Example
The following command globally disables LDP loop detection on the switch:
disable mpls ldp loop-detection
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables LDP for the specified MPLS-configured VLANs.
Syntax Description
vlan Disables LDP for one or more specific VLANs.
vlan_name Disables LDP on the specified VLAN.
vlan all Disables LDP for all VLANs that have been added to MPLS.
Default
Disabled.
Usage Guidelines
When LDP is disabled, all LDP-advertised labels are withdrawn and all LDP peer sessions are terminated
on the specified VLAN(s). By default, LDP is disabled for all VLANs. Specifying the optional all keyword
disables LDP for all VLANs that have been added to MPLS.
Example
The following command disables LDP for all VLANs:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables penultimate hop popping (PHP) on the specified VLAN. When enabled, PHP is requested on all
LSPs advertised over that VLAN for which the switch is the egress LSR.
Syntax Description
vlan Disables PHP for one or more specific VLANs.
vlan_name Disables PHP on the specified VLAN.
vlan all Disables PHP for all VLANs that have been added to MPLS.
Default
Disabled
Usage Guidelines
When PHP is disabled on a VLAN, penultimate hop popping is not requested on any LSPs advertised
over that VLAN for which the switch is the egress LSR. Therefore, the Implicit Null Label is not used for
any advertised mapping. Extreme's MPLS implementation always performs penultimate hop popping
when requested to do so by a peer LSR. When the all VLANs option is selected, PHP is disabled on all
existing MPLS interfaces.
Note
PHP is sometimes used to reduce the number of MPLS labels in use. If PHP is enabled on any
MPLS interface, a unique MPLS label is consumed for every label advertised over that
interface. Therefore, if PHP is being disabled to reduce label consumption, it should be done
on all interfaces for minimal label consumption.
Example
The following command disables penultimate hop popping (PHP) on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables LDP for the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
When LDP is disabled, all advertised LDP labels are withdrawn and LDP peer sessions are terminated.
Note that this includes any LDP peer sessions established for L2 VPNs. By default, LDP is globally
disabled. While LDP is transitioning to the enabled state, only the MPLS show commands are accepted.
Example
The following command globally disables LDP on the switch:
disable mpls protocol ldp
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables RSVP-TE for the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
When RSVP-TE is disabled, all TE LSPs are released and TE LSPs cannot be established or accepted.
While RSVP-TE is transitioning to the disabled state, only the MPLS show commands are accepted.
Example
The following command globally disables RSVP-TE on the switch:
disable mpls protocol rsvp-te
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the bundling of RSVP-TE messages for the specified VLAN interface.
Syntax Description
vlan Specifies that message-bundling is to be disabled on a specific VLAN.
vlan_name Identifies the VLAN interface on which message bundling is disabled.
vlan all Specifies that message bundling is disabled on all VLAN interfaces
that have been added to MPLS.
Default
Disabled.
Usage Guidelines
This command disables the bundling of RSVP-TE messages for the VLAN specified interface. By default,
message bundling is disabled. Specifying the all keyword disables message bundling on all VLANs
that have been added to MPLS.
Example
The following command disables message bundling on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the MPLS RSVP-TE fast reroute (FRR) protection feature.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
When FRR is disabled on the LSR, all established FRR LSPs on the local LSR are torn down, and only
standard LSPs can be signaled and processed. The configuration for any existing FRR LSPs is retained,
but it is not used until the FRR protection feature is enabled. This command can be used to test the
performance of an LSR without the FRR functionality or when the LSR doesn't behave as expected for
either standard or FRR LSPs.
Example
The following command disables FRR protection on the local switch:
disable mpls rsvp-te fast-reroute
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables an RSVP-TE LSP.
Syntax Description
lsp_name Specifies the LSP within the switch to be disabled.
all Disables all RSVP-TE configured LSPs.
Default
Enabled.
Usage Guidelines
This command disables an RSVP-TE LSP. When an RSVP-TE LSP is disabled, the switch terminates the
LSP by signaling the destination by sending a PATH_TEAR message. If there are other LSPs configured
to the same destination, traffic may continue to be transmitted to the destination over another LSP.
Disabling an LSP does not otherwise change its configuration.
Example
The following command disables the LSP named lsp598:
disable mpls rsvp-te lsp lsp598
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the sending of summary refresh messages, instead of path messages, to refresh RSVP-TE path
state for the specified VLAN interface.
Syntax Description
vlan Specifies that summary refresh messages cannot refresh the RSVP-TE
path state on one or more VLAN interfaces.
vlan_name Specifies the VLAN interface for which RSVP-TE summary refresh
messages are to be disabled.
vlan all Specifies that summary refresh messages are to be disabled on all
VLAN interfaces that have been added to MPLS.
Default
Disabled.
Usage Guidelines
This command disables the sending of summary refresh messages to refresh RSVP-TE path state for
the specified VLAN interface. By default, summary refresh is disabled. Specifying the all keyword
disables summary refresh on all VLANs that have been added to MPLS.
Example
The following command disables summary refresh on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables RSVP-TE for the specified MPLS-configured VLAN.
Syntax Description
vlan Specifies that RSVP-TE is to be disabled on a specific VLAN.
vlan_name Specifies the VLAN for which RSVP-TE is disabled.
vlan all Disables RSVP-TE on all VLANS that have been added to MPLS.
Default
Disabled.
Usage Guidelines
This command disables RSVP-TE for the specified MPLS configured VLANs. When RSVP-TE is disabled,
all TE LSPs are released and TE LSPs cannot be established or accepted. By default, RSVP-TE is
disabled for all MPLS configured VLANs. Specifying the optional all keyword disables RSVP-TE for all
VLANs that have been added to MPLS.
Example
The following command disables RSVP-TE on the named VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Administratively disables one or all static LSPs.
Syntax Description
lsp_name Identifies an LSP to be disabled.
all Specifies that all static LSPs on this LSR are to be disabled.
Default
N/A.
Usage Guidelines
On executing this command, the software de-activates the specified LSPs by setting the administrative
state of each LSP to down.
Example
The following command disables a static LSP:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the MPLS interface for the specified VLAN(s).
Syntax Description
vlan Disables an MPLS interface for one or more specific VLANs.
vlan_name Disables an MPLS interface on the specified VLAN.
vlan all Disables an MPLS interface for all VLANs that have been added to
MPLS.
Default
The MPLS interface is disabled for a VLAN.
Usage Guidelines
Disabling MPLS causes all LSPs to be released and all LDP and RSVP-TE peer sessions to be terminated
on the specified VLAN(s).
Example
The following command disables an MPLS interface for the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
disable msdp
disable msdp {vr vrname}
Description
Disables MSDP on a virtual router.
Syntax Description
vrname Specifies the name of the virtual router on which MSDP is being enabled or
disabled. If a name is not specified, it is extracted from the current CLI context.
Default
MSDP is disabled by default.
Usage Guidelines
Use this command to disable MSDP on a virtual router.
Example
The following command disables MSDP on a virtual router:
disable msdp
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.ature-link-22.1"/>
Description
Disables the encapsulation of locally originated SA messages with multicast data (if available).
Syntax Description
vrname Specifies the name of the virtual router to which this command applies. If a name is
not specified, it is extracted from the current CLI context.
Default
By default, multicast data packet encapsulation is enabled for locally originated SA messages.
Usage Guidelines
None.
Example
The following command disables multicast data packet encapsulation:
disable msdp data-encapsulation
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the advertisement of local sources to groups for which the router is an RP.
Syntax Description
vrname Specifies the name of the virtual router to which this command applies. If a name is
not specified, it is extracted from the current CLI context.
Default
By default, the export of local sources is enabled. All sources are advertised if the router is an RP for the
groups. Use this command to disable it.
Usage Guidelines
You can create a policy to filter out some of the local sources so that they are not advertised to MSDP
peers and exposed to the external multicast domain. To configure an export filter, you must first disable
the export of local sources (with the disable msdp export local-sa command), and then re-
enable it with an export filter (with the enable msdp export local-sa export-filter
command).
Example
The following example disables the advertisement of local sources:
disable msdp export local-sa
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the administrative state of an MSDP peer.
Syntax Description
remoteaddr Specifies the IP address of the MSDP peer to disable.
all Disables all MSDP peers.
vr_name Specifies the name of the virtual router to which this command applies. If a
name is not specified, it is extracted from the current CLI context.
Default
By default, MSDP peers are disabled.
Usage Guidelines
Use this command to administratively disable MSDP peers to stop exchanging SA messages.
Example
The following command disables an MSDP peer:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures a router to reject SA request messages from a specified peer or all peers.
Syntax Description
peer all Specifies all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer.
vrname Specifies the name of the virtual router to which this command applies. If a name
is not specified, it is extracted from the current CLI context.
Default
By default, all SA request messages are accepted from all peers.
Usage Guidelines
Use this command to configure the router to reject SA request messages from a specified peer or all
peers.
You cannot change an SA request filter while SA request processing is enabled for an MSDP peer. You
must first disable SA request processing for a peer and then re-enable it with an SA request filter.
You can use the following policy attributes in an SA request policy. All other attributes are ignored.
• Match:
◦ multicast-group
◦ multicast-source
◦ pim-rp
• Set:
◦ permit
◦ deny
Example
The following example disables processing of SA request messages received from a peer with the IP
address 192.168.45.43:
disable msdp peer 192.168.45.43 process-sa-request
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
disable msrp
disable msrp
Description
Disables MSRP on the switch.
Syntax Description
msrp Multiple Stream Registration Protocol.
Default
Disabled.
Usage Guidelines
Use this command to disable MSRP on a switch.
Example
The following command disables MSRP:
disable msrp
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms if the AVB feature pack license is installed on the switch.
disable mvr
disable mvr
Description
Disables MVR on the system.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following example disables MVR on the system:
disable mvr
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
disable mvrp
disable mvrp
Description
Disables MVRP globally on a switch.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
Default
Disabled.
Usage Guidelines
Use this command to disable MVRP globally on a switch. MVRP is run on the MVRP enabled ports only
if the global setting is enabled. By default, MVRP is disabled globally and on individual ports. When
MVRP is disabled globally, all MVRP packets are forwarded transparently.
Example
The following command disables MVRP:
disable mvrp
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disable MVRP on a given set of ports.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
port_list Port(s) on which MVRP is to be enabled.
all All ports.
Default
Disabled.
Usage Guidelines
Use this command to disable MVRP on given set of ports. MVRP is run on the MVRP enabled ports only
if the global setting is enabled. By default MVRP is disabled globally and on individual ports. When
MVRP is disabled globally, all MVRP packets will be forwarded transparently.
Example
The following command disables MVRP on ports 4 and 5:
disable mvrp ports 4-5
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Prevents the IPv6 neighbor cache from refreshing an entry before the timeout period expires.
Syntax Description
vr_name Specifies a VR or VRF.
Default
Enabled.
Usage Guidelines
None.
Example
The following example disables the refresh of neighbor discovery cache entries:
disable neighbor-discovery refresh
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the configured authentication failure VLAN on the specified ports.
Syntax Description
all Specifies all ports included in the authentication failure VLAN.
ports Specifies one or more ports or slots and ports on which the
authentication failure VLAN is enabled.
Default
All ports.
Usage Guidelines
Use this command to disable the configured authentication failure VLAN on either the specified ports,
or all ports.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disable the configured authentication service-unavailable VLAN on the specified ports.
Syntax Description
ports Specifies one or more ports or slots and ports on which the
authentication service-unavailable VLAN is enabled.
all Specifies all ports included in the authentication service-unavailable
VLAN.
Default
All ports.
Usage Guidelines
Use this command to disable the configured authentication service-unavailable VLAN on the specified
ports, or on all ports.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the guest VLAN on the specified 802.1X network login ports.
Syntax Description
all Specifies all ports included in the guest VLAN.
ports Specifies one or more ports included in the guest VLAN.
Default
Disabled.
Usage Guidelines
Use this command to disable the guest VLAN feature.
Example
The following command disables the guest VLAN on all ports:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables network login logout window pop-up.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command controls the logout window pop-up on the web-based network client. This command
applies only to the web-based authentication mode of network login. When disabled, the logout
window pop-up will no longer appear. However, if session refresh is enabled, the login session will be
terminated after the session refresh timeout.
Example
The following command disables network login logout-privilege:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables network login on a specified port for a particular method.
Syntax Description
ports Specifies the ports for which network login should be disabled.
dot1x Specifies 802.1X authentication.
mac Specifies MAC-based authentication.
web-based Specifies web-based authentication.
Default
Network login is disabled by default.
Usage Guidelines
Network login must be disabled on a port before you can delete a VLAN that contains that port.
This command applies to the MAC-based, web-based, and 802.1X mode of network login. To control
which authentication mode is used by network login, use the following commands:
enable netlogin [{dot1x} {mac} {web-based}] disable netlogin [{dot1x}
{mac} {web-based}]
Example
The following command disables dot1x and web-based network login on port 2:9:
disable netlogin ports 2:9 dot1x web-based
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables network login reauthentication on refresh.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
The web-based Netlogin client's session is periodically refreshed by sending an HTTP request which
acts as a keep-alive without actually re-authenticating the user's credentials with the back-end RADIUS
server or local database. If reauthenticate-on-refresh is enabled, re-authentication occurs with the
session refresh.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the network login redirect page function.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command disables the network login redirect page so that the client is sent to the originally
requested page.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables network login session refresh.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Network login sessions can refresh themselves after a configured timeout. After the user has been
logged in successfully, a logout window opens which can be used to close the connection by clicking on
the LogOut link. Any abnormal closing of this window is detected on the switch and the user is logged
out after a time interval as configured for session refresh. The session refresh is enabled and set to three
minutes by default.
This command applies only to the web-based authentication mode of network login.
Example
The following command disables network login session refresh:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable netlogin
disable netlogin [{dot1x} {mac} {web-based}]
Description
Disables network login modes.
Syntax Description
dot1x Specifies 802.1X authentication.
mac Specifies MAC-based authentication.
web-based Specifies web-based authentication.
Default
All types of authentication are disabled.
Usage Guidelines
Any combination of authentication types can be disabled on the same switch. To enable an
authentication mode, use the following command:
Example
The following command disables MAC-based network login:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables gPTP on one or more ports.
Syntax Description
port_list Specifies one or more the the switch's physical ports.
only Apply change only to specified port, even if port is master of a load
sharing group.
all Specifies all of the switch's physical ports.
Default
Disabled.
Usage Guidelines
Use this command to configure on which ports gPTP runs. gPTP runs on no ports if it is not enabled in
the switch by enable network-clock gptp.
Example
disable network-clock gptp ports 1-3
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms if the AVB feature pack license is installed on the switch.
Description
Disables gPTP on the switch.
Syntax Description
network-clock Network clock.
gptp IEEE 802.1AS Generalized Precision Time Protocol (gPTP).
Default
Disabled.
Usage Guidelines
Use this command to disable gPTP after having enabled it.
Example
disable network-clock gptp
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the AVB feature pack license and have it installed.
For complete information about software licensing, including how to obtain and upgrade your license,
and which platforms support the AVB feature, see the ExtremeXOS 30.5 Feature License Requirements
document.
Description
Disable PTP on a particular clock instance, or on a specified vlan port (clock port) of the clock instance.
Syntax Description
boundary Boundary clock instance.
ordinary Ordinary clock instance.
vlan_name Vlan name.
Default
PTP is disabled by default on a clock instance.
Usage Guidelines
Use this command to disable PTP on a clock instance.
Example
The following example disables the ordinary clock:
# disable network-clock ptp ordinary
The following example disables the clock port lpbk-transit on the boundary clock:
# disable network-clock ptp boundary vlan lpbk-transit
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on ExtremeSwitching X460-G2, X670-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Disables synchronous Ethernet (SyncE) on port(s).
Syntax Description
port_list Specifies a port or group of ports.
all Specifies all ports.
Default
Disabled.
Usage Guidelines
Use this command to disable SyncE on one or more ports.
Example
The following command disables SyncE on port 2:
# disable network-clock sync-e port 2
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is only available on the ExtremeSwitching X460-G2 series switches.
Description
This command disables the Node Alias feature on specified ports. Node Alias discovers information
about the end systems on a per-port basis. Information from packets from end systems, such as
VLANID, source MAC address, source IP address, protocol, etc. are captured in a database that can be
queried.
Syntax Description
nodealias Node Alias feature that maps source IP address, MAC address, host
name, and protocol on a per port basis.
ports Designates that Node Alias should be disabled on specified ports.
port_list Specifies on which ports to have Node Alias disabled. Designated as a
port list separated by comma (,) or dash (-).
all Specifies that all ports have Node Alias disabled.
Default
Node Alias is disabled by default on all ports.
Usage Guidelines
If the port is part of a LAG, Node Alias should be disabled separately on each LAG port.
Example
The following example disables Node Alias on all ports:
disable nodealias ports all
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command designates the specific protocols to remove from the list of detected protocols for the
Node Alias feature. Node Alias discovers information about the end systems on a per-port basis.
Information from packets from end systems, such as VLANID, source MAC address, source IP address,
protocol, etc. are captured in a database that can be queried.
Syntax Description
nodealias Node Alias feature that maps source IP address, MAC address, host
name, and protocol on a per port basis.
protocol Designates selection of protocols to detect.
protocol_name Specifies disabling a protocol to detect (one at a time). The following
protocols are enabled by default: IPv4, IPv6, OSPF, BGP, VRRP,
DHCPS, DHCPC, BOOTPS, BOOTPC, UDP, BPDU, LLMNR, SSDP, and
mDNS.
any Specifies disabling all protocols.
Default
The following protocols are enabled by default: IPv4, IPv6, OSPF, BGP, VRRP, DHCPS, DHCPC, BOOTPS,
BOOTPC, UDP, BPDU, LLMNR, SSDP, and mDNS.
Note
• ARP is categorized under IP.
• UDP entry is created when destination IP address is broadcast.
• BPDU means STP and GVRP frames.
Usage Guidelines
By default, the following protocols are enabled (IPv4, IPv6, OSPF, BGP, VRRP, DHCPS, DHCPC, BOOTPS,
BOOTPC, UDP, BPDU, LLMNR, SSDP, mDNS). You can optionally disable any of these protocols (and
then enable them back if desired).
Example
The following example disables BGP from being detected:
disable nodealias protocol bgp
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
disable ntp
disable ntp
Description
Disables NTP globally on the switch.
Syntax Description
N/A.
Default
NTP is disabled by default.
Usage Guidelines
N/A.
Example
The following command disables NTP globally on the switch:
disable ntp
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables NTP authentication globally on the switch.
Syntax Description
N/A.
Default
NTP authentication is disabled by default.
Usage Guidelines
If authentication is disabled, NTP will not use any authentication mechanism to a server or from clients.
To use authentication for a specific server, enable NTP authentication globally, and then configure an
RSA Data Security, Inc. MD5 Message-Digest Algorithm or SHA256 key index for the specific server.
Example
The following command disables NTP authentication globally on the switch:
# disable ntp authentication
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables an NTP broadcast client on the switch.
Syntax Description
broadcast-client Specifies enabling NTP broadcast client.
vr Specifies disabling NTP broadcast client for a VR.
vr_name Specifies the VR name. If a VR name is not specified, the VR of current
command context is used.
Default
An NTP broadcast client is enabled by default.
Usage Guidelines
If the broadcast client function is enabled, the system can receive broadcast-based NTP messages and
process them only if a VLAN is enabled for NTP and the VLAN is active.
Example
The following command disables an NTP broadcast client on the switch:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Prevents NTP from sending broadcast messages to a VLAN.
Syntax Description
vlan-name Specifies the name of a particular VLAN.
Default
NTP does not send broadcast messages to a VLAN by default.
Usage Guidelines
N/A.
Example
The following command prevents NTP from sending broadcast messages to a VLAN called “Northwest”:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables NTP on a VLAN.
Syntax Description
disable Disables NTP on a VLAN.
vlan-name Specifies the name of a particular VLAN on which to enable or disable
NTP.
all Enables or disables NTP on all VLANs.
vr Specifies disabling NTP on a VR.
vr_name Specifies the VR name to disable NTP on. If a VR name is not
specified, the VR of current command context is used.
Default
NTP is disabled on all VLANs by default.
Usage Guidelines
N/A.
Example
The following command disables NTP on all VLANs:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable ntp vr
disable ntp vr vr_name
Description
This command disables NTP from the specified VR.
Syntax Description
vr Specifies disabling NTP on a VR.
vr_name Specifies the VR name to disable NTP from. If a VR name is not
specified, the VR of current command context is used.
Default
If a VR name is not specified, the VR of current command context is used.
Example
The following example disables NTP from a VR named "vr1".
disable ntp vr vr1
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable ospf
disable ospf
Description
Disables the OSPF process for the router.
Syntax Description
This command has no keywords or arguments.
Default
N/A.
Usage Guidelines
Not applicable.
Example
The following command disables the OSPF process for the router:
disable ospf
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables opaque LSAs across the entire system.
Syntax Description
This command has no keywords or arguments.
Default
Enabled.
Usage Guidelines
Opaque LSAs are a generic OSPF mechanism used to carry auxiliary information in the OSPF database.
Opaque LSAs are most commonly used to support OSPF traffic engineering.
Normally, support for opaque LSAs is auto-negotiated between OSPF neighbors. In the event that you
experience interoperability problems, you can disable opaque LSAs.
If your network uses opaque LSAs, all routers on your OSPF network should support opaque LSAs.
Routers that do not support opaque LSAs do not store or flood them. At minimum a well-
interconnected subsection of your OSPF network needs to support opaque LSAs to maintain reliability
of their transmission.
On an OSPF broadcast network, the designated router (DR) must support opaque LSAs or none of the
other routers on that broadcast network will reliably receive them. You can use the OSPF priority
feature to give preference to an opaque-capable router, so that it becomes the elected DR.
For transmission to continue reliably across the network, the backup designated router (BDR) must also
support opaque LSAs.
Example
The following command disables opaque LSAs across the entire system:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables redistribution of routes to OSPF.
Syntax Description
bgp Specifies BGP routes.
direct Specifies direct routes.
host-mobility Specifies host mobility.
e-bgp Specifies E-BGP routes.
i-bgp Specifies I-BGP routes.
rip Specifies RIP routes.
static Specifies static routes.
isis Specifies IS-IS routes.
isis-level-1 Specifies ISIS Level 1 routes.
isis-level-1-external Specifies ISIS Level 1 External routes.
isis-level-2 Specifies ISIS Level 2 routes.
isis-level-2-external Specifies ISIS Level 2 External routes.
Default
The default setting is disabled.
Usage Guidelines
Use this command to stop OSPF from exporting routes derived from other protocols.
Example
The following command disables OSPF to export BGP-related routes to other OSPF routers:
disable ospf export bgp
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables IP forwarding over calculated MPLS LSPs to subnets learned via OSPF.
Syntax Description
vrf_name Specifies OSPF on a particular VRF.
Default
Disabled.
Usage Guidelines
This command disables IP forwarding over calculated MPLS LSPs to subnets learned via OSPF.
(Calculated refers to an LSP that only reaches part of the way to the destination). By default, IP
forwarding over MPLS LSPs to subnets learned via OSPF is disabled.
In order to disable OSPF on a particular VRF, you must supply the optional vr vr-name CLI parameter.
Example
The following command disables OSPF’s use of MPLS LSPs to reach OSPF routes:
disable ospf mpls-next-hop
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Syntax Description
There are no keywords or variables for this command.
Default
Not applicable.
Usage Guidelines
Not applicable.
Example
The following command disables generating a default external LSA:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the restart helper router from terminating graceful OSPF restart when received LSAs would
affect the restarting router.
Syntax Description
all Specifies all VLANs.
vlan-name Specifies a VLAN name.
router-identifier Specifies the router ID of the remote router of the virtual link.
area-identifier Specifies an OSPF area.
Default
The default is enabled.
Usage Guidelines
This command disables the restart helper router from terminating graceful OSPF restart when received
LSAs would affect the restarting router.
Example
The following command disables a router from terminating graceful OSPF restart for all routers in area
10.20.30.40 if it receives an LSA that would affect routing:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the router alert IP option in outgoing OSPF control packets.
Syntax Description
This command has no keywords or arguments.
Default
Disabled.
Usage Guidelines
Not applicable.
Example
The following command disables the OSPF router alert IP option:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command disables the OSPFv2 VXLAN extensions.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
N/A.
Example
# disable ospf vxlan-extensions
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
disable ospfv3
disable ospfv3
Description
Disables OSPFv3 for the router.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following command disables OSPFv3 for the router:
disable ospfv3
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures the restart helper router to terminate OSPFv3 graceful restart when received
LSAs would affect the restarting router. This occurs when the restart helper receives an LSA that is
flooded to the restarting router or when there is a changed LSA on the restarting router's
retransmission list when graceful restart is initiated.
Syntax Description
vlan VLAN.
all All VLANs.
vlan-name VLAN name.
area OSPFv3 area.
area-identifier Area identifier.
restart-helper-lsa-check Terminate graceful restart mode when there is a change to an LSA.
Default
LSA check is enabled by default.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables redistribution of routes to OSPFv3.
Syntax Description
direct Specifies direct routes.
ripng Specifies RIP routes.
static Specifies static routes.
isis Specifies IS-IS routes.
isis-level-1 Specifies IS-IS Level 1 routes.
isis-level-1-external Specifies IS-IS Level 1 External routes.
isis-level-2 Specifies IS-IS Level 2 routes.
isis-level-2-external Specifies IS-IS Level 2 External routes.
bgp Specifies BGP IPv6 routes.
e-bgp Specifies EBGP routes.
i-bgp Specifies EBGP routes.
Default
The default setting is disabled.
Usage Guidelines
Use this command to stop OSPFv3 from exporting routes derived from other protocols.
Example
The following command disables OSPFv3 to export RIPng routes to other OSPFv3 routers:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures the restart helper router to terminate OSPF graceful restart when received
LSAs would affect the restarting router. This occurs when the restart helper receives an LSA that will be
flooded to the restarting router or when there is a changed LSA on the restarting router's
retransmission list when graceful restart is initiated.
Syntax Description
virtual-link OSPFv3 virtual link.
routerid OSPFv3 router ID.
router-identifier Router ID of neighbor OSPFv3 router.
area OSPFv3 area.
area-identifier Transit area ID of virtual link.
restart-helper-lsa- Terminates graceful restart helper mode when there is a change to an
check LSA (default is enabled).
Default
Enabled.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable ovsdb
disable ovsdb
Description
Disables Open vSwitch Database Management Protocol (OVSDB) server on a switch.
Syntax Description
ovsdb Open vSwitch Database Management Protocol.
Default
OVSDB is disabled by default.
Example
The following example disables OVSDB:
# disable ovsdb
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Modifies the schema served by the OVSDB server.
Syntax Description
schema OVSDB schema.
hardware_vtep Specifies Hardware VXLAN Tunnel End-Point (VTEP) schema.
control-layer-only Disables schema, but leaves the forwarding layer intact.
Default
N/A
Usage Guidelines
By default all schemas supported by ExtremeXOS are served by the OVSDB server when it is initially
enabled. Currently, only the Hardware VTEP Schema is supported. Deleting a schema from the OVSDB
server removes the data stored in that schema and the OVSDB server stops supporting that data
schema. VLAN, VXLAN, or other objects that were dynamically created in ExtremeXOS as a result of
OVSDB commands received by the switch are removed from ExtremeXOS. Any schema-specific
configurations made by the administrator are not affected.
The optional keyword control-layer-only overrides the default behavior and leaves in place all
configurations pushed by the Network Virtualization Controller (NVC) to the ExtremeXOS switch. VLAN,
VXLAN, or other objects that are created as a result of NVC configurations are also not deleted. The
schema is no longer served by the OVSDB-SERVER.
Example
The following example removes the Hardware VTEP schema from OVSDB:
disable ovsdb schema hardware_vtep
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Disables the PIM ECMP feature.
Syntax Description
iproute IP Route
sharing Equal Cost Multipath Routing
Default
Disabled.
Usage Guidelines
None.
Example
The following command disables the PIM ECMP feature:
disable pim ipv4 iproute sharing
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables PIM snooping and clears all the snooping PIM neighbors, joins received on the VLAN, and the
forwarding entries belonging to one or all VLANs.
Syntax Description
name Specifies a VLAN.
Default
Disabled.
Usage Guidelines
None.
Example
The following command disables PIM snooping for all VLANs on the switch:
disable pim snooping
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables PIM SSM on a router interface.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
Default
Disabled on all interfaces.
Usage Guidelines
This command disables PIM-SSM on the specified Layer 3 VLAN.
IGMPv3 include messages for multicast addresses in the SSM range is only processed by PIM if PIM-SSM
is enabled on the interface. Any non-IGMPv3 messages in the SSM range are not processed by PIM on
any switch interface, whether SSM is enabled or not.
Example
The following example disables PIM-SSM multicast routing on VLAN accounting:
disable pim ssm vlan accounting
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
disable pim
disable pim {ipv4 | ipv6}
Description
Disables PIM on the system.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
Default
Disabled.
Usage Guidelines
None.
Example
The following example disables PIM on the system:
disable pim ipv4
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
disable policy
disable policy
Description
This command disables the ONEPolicy functionality.
Syntax Description
This command has no arguments or variables.
Default
None.
Usage Guidelines
None.
Example
The following example shows how to disable ONEPolicy:
X450G2-48t-10G4.4 # disable policy
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable port
disable port [port_list | all]
Description
Disables one or more ports on the switch.
Syntax Description
port_list Specifies one or more ports or slots and ports.
all Specifies all ports on the switch.
Default
Enabled.
Usage Guidelines
Use this command for security, administration, and troubleshooting purposes.
Example
The following command disables ports 3, 5, and 12 through 15 on a stand-alone switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the current ports associated with the given MLAG ID.
Syntax Description
mlag-id Port associated with MLAG.
mlag_id MLAG identifier value of the MLAG port. Range is 1–65,000.
Default
N/A.
Usage Guidelines
If any ports are added or deleted from the LAG, the port state for those ports is not changed.
In MLAG orchestration mode, this command is executed on the other MLAG peer before it is executed
on the MLAG peer on which the command is run. In orchestration mode, if the MLAG port numbers are
not same on both the peers, it is possible that a different set of port numbers are disabled on the
different MLAG peers. This command helps ensure that the correct set of ports associated with the
MLAG ID are disabled.
If the port associated with the given MLAG ID is a load shared port, all the member ports associated
with this load shared group are disabled.
If the port associated with the given MLAG ID is a virtual port, the command is ignored.
Example
The following example disables the ports associated with MLAG ID "123":
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
disable radius
disable radius {mgmt-access | netlogin}
Description
Disables the RADIUS client.
Syntax Description
mgmt-access Specifies the switch management RADIUS authentication server.
netlogin Specifies the network login RADIUS authentication server.
Default
RADIUS authentication is disabled for both switch management and network login by default.
Usage Guidelines
Use the mgmt-access keyword to disable RADIUS authentication for switch management functions.
Use the netlogin keyword to disable RADIUS authentication for network login.
If you do not specify a keyword, RADIUS authentication is disabled on the switch for both management
and network login.
Example
The following command disables RADIUS authentication on the switch for both management and
network login:
disable radius
The following command disables RADIUS authentication on the switch for network login:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable radius-accounting
disable radius-accounting {mgmt-access | netlogin}
Description
Disables RADIUS accounting.
Syntax Description
mgmt-access Specifies the switch management RADIUS accounting server.
netlogin Specifies the network login RADIUS accounting server.
Default
RADIUS accounting is disabled for both switch management and network login by default.
Usage Guidelines
Use the mgmt-access keyword to disable RADIUS accounting for switch management functions.
Use the netlogin keyword to disable RADIUS accounting for network login.
If you do not specify a keyword, RADIUS accounting is disabled on the switch for both management
and network login.
Example
The following command disables RADIUS accounting on the switch for both management and network
login:
disable radius-accounting
The following command disables RADIUS accounting on the switch for network login:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables dynamic authorization on RADIUS client.
Syntax Description
This command has no arguments or variables.
Default
RADIUS dynamic authorization is disabled by default.
Example
The following command disables dynamic authorization RADIUS authentication on the switch:
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable rip
disable rip
Description
Disables RIP for the whole router.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
RIP has a number of limitations that can cause problems in large networks, including:
• A limit of 15 hops between the source and destination networks.
• A large amount of bandwidth taken up by periodic broadcasts of the entire routing table.
• Slow convergence.
• Routing decisions based on hop count; no concept of link costs or delay.
• Flat networks; no concept of areas or boundaries.
Example
The following command disables RIP for the whole router:
disable rip
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables the RIP aggregation of subnet information on a RIP version 2 (RIPv2) router.
Syntax Description
This command has no arguments or variables.
Default
RIP aggregation is disabled by default.
Usage Guidelines
The disable RIP aggregation command disables the RIP aggregation of subnet information on a switch
configured to send RIPv2-compatible traffic. The switch summarizes subnet routes to the nearest class
network route. The following rules apply when using RIP aggregation:
• Within a class boundary, no routes are aggregated.
• If aggregation is disabled, subnet routes are never aggregated, even when crossing a class boundary.
Example
The following command disables RIP aggregation on the interface:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables RIP from redistributing routes from other routing protocols.
Syntax Description
bgp Specifies BGP routes.
direct Specifies interface routes (only interfaces that have IP forwarding
enabled are exported).
e-bgp Specifies external BGP routes.
i-bgp Specifies internal BGP routes.
ospf Specifies all OSPF routes.
ospf-extern1 Specifies OSPF external route type 1.
Default
Disabled.
Usage Guidelines
This command disables the exporting of BGP, static, direct, and OSPF-learned routes into the RIP
domain.
Example
The following command disables RIP from redistributing any routes learned from OSPF:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables the advertisement of a default route.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command unconfigures a default route to be advertised by RIP if no other default route is
advertised:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables poison reverse algorithm for RIP.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Like split horizon, poison reverse is a scheme for eliminating the possibility of loops in the routed
topology. In this case, a router advertises a route over the same interface that supplied the route, but
the route uses a hop count of 16, defining it as unreachable.
Example
The following command disables the split horizon with poison reverse algorithm for RIP:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables the split horizon algorithm for RIP.
Syntax Description
This command has no arguments or variable.
Default
Enabled.
Usage Guidelines
Split horizon is a scheme for avoiding problems caused by including routes in updates sent to the router
from which the route was learned. Split horizon omits routes learned from a neighbor in updates sent to
that neighbor.
Example
The following command disables the split horizon algorithm for RIP:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables the trigger update mechanism. Triggered updates are a mechanism for immediately notifying a
router’s neighbors when the router adds or deletes routes or changes their metric.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Triggered updates occur whenever a router changes the metric for a route and it is required to send an
update message immediately, even if it is not yet time for a regular update message to be sent. This will
generally result in faster convergence, but may also result in more RIP-related traffic.
Example
The following command disables the trigger update mechanism:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Disables router alert IP option in outgoing RIP control packets.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command disables the RIP router alert IP option:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
disable ripng
disable ripng
Description
Disables RIPng for the whole router.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command disables RIPng for the whole router:
disable ripng
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables RIPng from redistributing routes from other routing protocols.
Syntax Description
direct Specifies directly reachable subnets from the router (only interfaces
that have IP forwarding enabled are exported).
ospfv3 Specifies all OSPFv3 routes.
ospfv3-extern1 Specifies OSPFv3 external route type 1.
ospfv3-extern2 Specifies OSPFv3 external route type 2.
ospfv3-inter Specifies OSPFv3-inter area routes.
ospfv3-intra Specifies OSPFv3-intra area routes.
static Specifies user configured static routes.
isis Specifies IS-IS routes.
isis-level-1 Specifies IS-IS Level 1 routes.
isis-level-1-external Specifies IS-IS Level 1 External routes.
isis-level-2 Specifies IS-IS Level 2 routes.
isis-level-2-external Specifies IS-IS Level 2 External routes.
bgp Specifies BGP IPv6 routes
e-bgp Specifies EBGP routes.
i-bgp Specifies IBGP routes.
Default
Disabled.
Usage Guidelines
This command disables the exporting of static, direct, IS-IS, and OSPF-learned routes from the switch
routing table into the RIPng domain.
Example
The following command disables RIPng from redistributing any routes learned from OSPFv3:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the advertisement of a default route to the neighbors.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command unconfigures a default route to be advertised by RIPng if no other default route
is advertised:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables poison reverse algorithm for RIPng.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all interfaces.
Default
Enabled.
Usage Guidelines
Like split horizon, poison reverse is a scheme for eliminating the possibility of loops in the routed
topology. In this case, a router advertises a route over the same interface that supplied the route, but
the route uses a hop count of 16, defining it as unreachable.
Example
The following command disables the split horizon with poison reverse algorithm for RIPng:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the split horizon algorithm for RIPng.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all interfaces.
Default
Enabled.
Usage Guidelines
Split horizon is a scheme for avoiding problems caused by including routes in updates sent to the router
from which the route was learned. Split horizon omits routes learned from a neighbor in updates sent to
that neighbor.
Example
The following command disables the split horizon algorithm for RIPng:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Triggered updates are a mechanism for immediately notifying a router’s neighbors when the router
adds or deletes routes or changes their metric. This command disables the trigger update mechanism.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all interfaces.
Default
Enabled.
Usage Guidelines
Triggered updates occur whenever a router changes the metric for a route and it is required to send an
update message immediately, even if it is not yet time for a regular update message to be sent. This will
generally result in faster convergence, but may also result in more RIPng-related traffic.
When this feature is disabled, any metric change on the interface, or an interface going down will not be
communicated until the next periodic update. To configure how often periodic updates are sent, use the
following command:
configure ripng updatetime
Example
The following command disables the trigger update mechanism:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
disable rmon
disable rmon
Description
Disables the collection of RMON statistics on the switch.
Syntax Description
This command has no arguments or variables.
Default
By default, RMON is disabled. However, even in the disabled state, the switch responds to RMON queries
and sets for alarms and events.
Usage Guidelines
The switch supports four out of nine groups of Ethernet RMON statistics. In a disabled state, the switch
continues to respond queries of statistics. Collecting of history, alarms, and events is stopped; however,
the switch still queries old data.
To view the status of RMON polling on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
RMON polling.
To view the RMON memory usage statistics for a specific memory type (for example, statistics, events,
logs, history, or alarms) or for all memory types, use the following command:
show rmon memory {detail | memoryType}
Example
The following command disables the collection of RMON statistics on the switch:
disable rmon
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable router-discovery
disable router-discovery {ipv6} vlan vlan_name
Description
Disables router discovery advertisements on the VLAN and the processing of router discovery
messages.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
Default
N/A.
Usage Guidelines
None.
Example
The following example disables router discovery for the VLAN "top_floor":
disable router-discovery vlan top_floor
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables sFlow statistical packet sampling and statistics gathering on a particular list of ports.
Syntax Description
port_list Specifies a list of ports.
Default
Disabled.
Usage Guidelines
This command disables sFlow on a particular list of ports. Once sFlow is disabled on a port, sampling
and polling will stops. If sFlow is disabled globally, all sampling and polling stops
Example
The following command disables sFlow sampling on port 3:1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable sflow
disable sflow
Description
Globally disables sFlow statistical packet sampling.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables sFlow globally on the switch. When you disable sFlow globally, the individual
ports are also put into the disabled state. If you later enable the global sFlow state, individual ports
return to their previous state.
Example
The following command disables sFlow sampling globally:
disable sflow
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable sharing
disable sharing port
Description
Disables a load-sharing group of ports, also known as a LAG.
Syntax Description
port Specifies the logical port of a load-sharing group or link aggregation
group (LAG). Specifies a port or a combination of the slot and port
number.
Default
Disabled.
Usage Guidelines
When sharing is disabled, the logical port retains all configuration including VLAN membership. All
other member ports are removed from all VLANs to prevent loops and their configuration is reset to
default values.
Any attempt to disable sharing on ports that have MLAG configuration is denied with the following error
message:
Example
The following command disables sharing on master logical port 9, which contains ports 9 through 12, on
a switch:
disable sharing 9
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disable the Simple Loop Protection Protocol (SLPP) Guard feature.
Syntax Description
slpp Specifies disabling SLPP.
guard Specifies not using the SLPP Guard feature, which disables a port as
soon as an SLPP PDU is received.
ports Specifies selecting ports on which to disable SLPP guard.
port_list Selects which ports on which to disable SLPP guard.
all Specifies disabling SLPP guard on all ports.
Default
By default, SLPP Guard is disabled on all ports.
Usage Guidelines
SLPP is an application that detects loops in a Split Multi-link Trunking (SMLT) network. SLPP Guard is a
complementary feature that helps prevent loops in networks by administratively disabling an edge port
if a switch receive an SLPP PDU from an SMLT network.
Example
The following example disables SLPP Guard on port 5:
# disable slpp guard ports 5
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable smartredundancy
disable smartredundancy port_list
Description
Disables the Smart Redundancy feature.
Syntax Description
port_list Specifies one or more ports or slots and ports.
Default
Enabled.
Usage Guidelines
The Smart Redundancy feature works in concert with the software-controlled redundant feature. When
Smart Redundancy is disabled, the switch attempts only to reset the primary port to active if the
redundant port fails. That is, if you disable Smart Redundancy, the traffic does not automatically return
to the primary port once it becomes active again; the traffic continues to flow through the redundant
port even after the primary port comes up again.
Example
The following command disables the Smart Redundancy feature on ports 1 through 4 on a switch:
History
This command was available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Selectively disables SNMP access on virtual routers.
Syntax Description
vr_name Specifies the virtual router name.
all Specifies all virtual routers.
Default
Enabled on all virtual routers.
Usage Guidelines
Use this command to disable SNMP access on any or all virtual routers.
When SNMP access is disabled on a virtual router, the incoming SNMP request is dropped and an EMS
message is logged.
To enable SNMP access on virtual routers use the enable snmp access vr command.
To display the SNMP configuration and statistics on a specified virtual router, use the show snmp
vr_name command.
Example
The following command disables SNMP access on the virtual router vr-finance:
disable snmp access vr vr-finance
History
This command was first available in ExtremeXOS 12.4.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Selectively disables SNMP on the switch.
Syntax Description
snmp-v1v2c Specifies SNMPv1/v2c access only.
snmpv3 Specifies SNMPv3 access only.
Default
Disabled.
Usage Guidelines
Disabling SNMP access does not affect the SNMP configuration (for example, community strings).
However, if you disable SNMP access, you will be unable to access the switch using SNMP.
This command allows you to disable either all SNMP access, v1/v2c access only, or v3 access only.
Example
The following command disables all SNMP access on the switch:
History
This command was first available in ExtremeXOS 10.1.
SNMPv3 was added to ExtremeXOS 12.2. It was also included in ExtremeXOS 11.6.4 and 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables SNMP community strings on the switch.
Syntax Description
encrypted Community name is encrypted.
enc_community_name Encrypted community name.
community_name Community name in ASCII format.
hex Provide value in hexadecimal.
hex_community_name Community name in hexadecimal.
alphanumeric- Specifies the SNMP community string name.
community-string
Default
N/A.
Usage Guidelines
This command allows the administrator to disable an snmp community. It sets the row status of the
community to NotInService. When disabled, SNMP access to the switch using the designated
community is not allowed.
Example
The following command disables the community string named extreme:
History
This command was first available in ExtremeXOS 12.1.
The hex keyword and hex_community_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Controls the administrative state of a log.
Syntax Description
default The default log.
name Specifies the name of the log.
hex Provide value in hexadecimal.
hex_name Name of the log in hexadecimal.
all Specifies all logs.
Default
Disabled.
Usage Guidelines
Use this command to control the administrative state of a log.
Example
The following example disables nmslog1:
disable snmp notification-log hex 01:02
History
This command was first available in ExtremeXOS 15.5.
The default and hex keywords and hex_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables Layer 3 VPN MIB notification traps for the child VPN VRFs of the specified VR.
Syntax Description
vr-name Specifies the name of the parent VR where this RFC 4382 scalar is
applied. If vr-name is not provided, then this command is applied to
the VR in the current context.
Default
Disabled.
Usage Guidelines
None.
Example
The following example disables SNMP traps for Layer 3 VPNs on the default VR:
History
This command was first available in ExtremeXOS 12.6.0-BGP.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Prevents SNMP traps from being sent from the switch.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command does not clear the SNMP trap receivers that have been configured. The command
prevents SNMP traps from being sent from the switch even if trap receivers are configured.
To view if SNMP traps are being sent from the switch, use the show management command. The
show management command displays information about the switch including the enabled/disabled
state of SNMP traps being sent.
Example
The following command prevents SNMP traps from being sent from the switch to the trap receivers:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables session up/down trap reception for BFD.
Syntax Description
snmp Configure SNMP specific settings.
traps Configure SNMP Trap generation settings.
bfd BFD-specific traps.
session-down Generate trap when BFD session goes down.
session-up Generate trap when BFD session goes up.
Default
Both session-down and session-up.
Usage Guidelines
Use this command to disable trap reception for BFD session up/down.
Example
The following command will disable trap generation for BFD session down events.
# disable snmp traps bfd session-down
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Disables sending SNMP trap when saving or changing the switch configuration.
Syntax Description
configuration Sends SNMP trap for switch configuration.
save Disables SNMP trap when switch configuration is saved (default is
disabled).
change Disables SNMP trap when switch configuration is changed (default is
disabled).
Default
The default is that SNMP traps are disabled for switch configuration changes/saves.
Example
The following example disables SNMP traps for switch configuration saves:
disable snmp traps configuration save
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches..
Description
Disables SNMP trap generation when MAC-tracking events occur for a tracked MAC address.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following example disables SNMP traps for MAC-tracking events:
disable snmp traps fdb mac-tracking
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on all platforms.
Description
Disables the identity management feature to send SNMP traps for low memory conditions.
Syntax Description
This command has no arguments or variables.
Default
No traps are sent.
Usage Guidelines
None.
Example
The following command disables the identity management SNMP trap feature:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables SNMP traps associated with Layer 2 VPNs for all MPLS configured VLANs.
Syntax Description
This command has no arguments or variables.
Default
All Layer 2 VPN traps are disabled.
Example
The following command disables SNMP traps associated with Layer 2 VPNs:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Use this command to turn off SNMP trap support for L3 VPN.
Syntax Description
vr_name Specifies the name of the parent VR where this RFC 4382 scalar is
applied. If vr_name is not provided, then this command is applied to
the VR in the current context.
Default
Enabled.
Usage Guidelines
Use this command to disable L3VPN SNMP traps.
Example
The following example disables L3 VPN SNMP traps support on the switch:
disable snmp traps l3vpn vr vr-default
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the sending of LLDP-specific SNMP traps on the specified port or ports.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
If you do not specify any ports, the system stops sending LLDP traps from all ports on the switch.
Example
The following example disables sending LLDP SNMP traps on all switch ports:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the sending of LLDP MED-specific SNMP traps on the specified port or ports.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
If you do not specify any ports, the system stops sending LLDP MED traps from all ports on the switch.
Example
The following example disables sending LLDP MED SNMP traps on all switch ports:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables SNMP traps associated with MPLS for all MPLS configured VLANs.
Syntax Description
This command has no arguments or variables.
Default
All MPLS traps are disabled.
Example
The following command disables SNMP traps associated with MPLS:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Disables the OSPF module from sending traps on various OSPF events.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command disables the OSPF process:
disable snmp traps ospf
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables the transmission of OSPFv3 SNMP notifications.
Syntax Description
ospfv3 OSPFv3-related traps.
Default
The default is disabled.
Example
The following example disables the transmission of OSPFv3 SNMP notifications:
disable snmp traps ospfv3
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables port up/down trap reception for specified ports.
Syntax Description
port_list Specifies one or more ports or slots and ports.
all Specifies all ports on the switch.
Default
Enabled.
Usage Guidelines
Use this command to stop receiving SNMP trap messages when a port transitions between being up
and down.
Example
The following command stops ports 3, 5, and 12 through 15 on a stand-alone switch from receiving
SNMP trap messages when the port goes up/down:
History
This command was first available in ExtremeXOS 10.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable snmpv3
disable snmpv3 default-group
Description
Disables SNMPv3 default-group access on the switch.
Syntax Description
default-group Specifies SNMPv3 default-group.
Default
Enabled.
Usage Guidelines
This command is used to disable SNMPv3 default-group access.
Disabling SNMPv3 default-group access removes access to default-users and user-created users who
are part of the default-group. The user-created authenticated SNMPv3 users (who are part of a user-
created group) are able to access the switch.
Example
The following command disables the default group on the switch:
History
This command was available in ExtremeXOS 12.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables a community entry specified by the community index.
Syntax Description
community_index Community index in ASCII.
hex Provide value in hexadecimal.
hex_community_index Community index in hexadecimal.
Default
Enabled.
Usage Guidelines
This command is used to disable a community entry specified by the community index.
Example
History
This command was available in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable sntp-client
disable sntp-client
Description
Disables the SNTP client.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
SNTP can be used by the switch to update and synchronize its internal clock from a Network Time
Protocol (NTP) server. After the SNTP client has been enabled, the switch sends out a periodic query to
the indicated NTP server, or the switch listens to broadcast NTP updates. In addition, the switch
supports the configured setting for Greenwich Mean Time (GMT) offset and the use of Daylight Savings
Time (DST).
Example
The following command disables the SNTP client:
disable sntp-client
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable ssh2
disable ssh2
Description
Disables the SSH2 server for incoming SSH2 sessions to switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
SSH2 options (non-default port setting) are not saved when SSH2 is disabled.
To view the status of SSH2 on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
SSH2.
Example
The following command disables the SSH2 server:
disable ssh2
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable stacking
disable stacking {node-address node-address}
Description
This command disables the stacking on one or all nodes in the stack topology.
Syntax Description
node-address Specifies the MAC address of a node in the stack. To view the MAC
addresses for all nodes in a stack, enter the show stacking
command.
Default
Default value is stacking disabled.
Usage Guidelines
If you do not specify the node-address, stacking is disabled on all nodes in the stack topology.
If the node-address parameter is present, stacking is disabled on the node with the specified node-
address. This is the MAC address assigned to the stackable by the factory.
A node in the stack topology that is disabled for stacking does not forward the customer's data through
its stacking links and does not become a member of the active topology.
A disabled node becomes its own master and processes and executes its own configuration
independently.
Use show stacking configuration command to see the current configuration of the stack.
Verify the flags in show stacking configuration output to confirm that stacking is disabled on
the specified node(s).
Example
The following example disables stacking on an 8 node stack:
The following example disables stacking on the node with the factory assigned MAC address
00:04:96:26:6b:ed:
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
disable stacking-support
disable stacking-support
Description
This command disables the stacking-support option on a switch with dual-purpose hardware.
Syntax Description
This command does not have additional syntax.
Default
Disabled.
Usage Guidelines
The Stacking-Support Option Control column in Table 20 on page 1328 displays Yes in the rows for
switch configurations for which you can disable the stacking-support option.
After you disable the stacking-support option, you must reboot the switch to activate the configuration
change.
If you disable the stacking-support option on a switch and reboot, stacking communication stops and
the data ports listed in Table 20 on page 1328 use Ethernet protocols instead of stacking protocols.
Example
To disable the stacking ports, enter the following command:
# disable stacking-support
This setting will take effect at the next reboot of this switch.
History
This command was first available in ExtremeXOS 12.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable stpd
disable stpd {stpd_name}
Description
Disables the STP protocol on a particular STPD or for all STPDs.
Syntax Description
stpd_name Specifies an STPD name on the switch.
Default
Disabled.
Usage Guidelines
After you have created the STPD with a unique name, the keyword stpd is optional.
If you want to disable the STP protocol for all STPDs, do not specify an STPD name.
In an MSTP environment, you cannot delete or disable a CIST if any of the MSTIs are active in the
system.
Example
The following command disables an STPD named purple_st:
The following command disables the STP protocol for all STPDs on the switch:
disable stpd
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the ability to automatically add ports to an STPD when they are added to a member VLAN.
Syntax Description
stpd_name Specifies an STPD name on the switch.
vlan_name Specifies the name of a member VLAN with autobind enabled.
vlan_list Specifies a VLAN list of IDs.
Default
The autobind feature is disabled on user-created STPDs. The autobind feature is enabled on the default
VLAN that participates in the default STPD S0.
Usage Guidelines
Note
Ports already in the STPD remain in that domain (as if they were added manually).
If you create an STPD and a VLAN with unique names, the keywords stpd and vlan are optional.
Ports added to the STPD automatically when autobind is enabled are not removed when autobind is
disabled. The ports are present after a switch reboot.
To view STP configuration status of the ports in a VLAN, use the following command:
show {vlan} {vlan_name | vlan_list} stpd
Example
The following example disables autobind on an STPD named s8:
disable stpd s8 auto-bind v5
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Syntax Description
stpd_name Specifies an STPD name on the switch.
all Specifies all ports for a given STPD.
port_list Specifies one or more ports or slots and ports.
Default
Enabled.
Usage Guidelines
If you create the STPD with a unique name, the keyword stpd is optional.
Disabling STP on one or more ports puts those ports in the forwarding state; all BPDUs received on
those ports are disregarded and dropped.
Use the all keyword to specify that all ports of a given STPD are disabled.
Use the port_list parameter to specify a list of ports of a given STPD are disabled.
If you do not use the default STPD, you must create one or more STPDs and configure and enable the
STPD before you can use the disable stpd ports command.
Example
The following command disables slot 2, port 4 on an STPD named Backbone_st:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables rapid root failover for STP recovery times.
Syntax Description
stpd_name Specifies an STPD name on the switch.
Default
Disabled.
Usage Guidelines
This command is applicable for STPDs operating in 802.1D.
After you have created the STPD with a unique name, the keyword stpd is optional.
To view the status of rapid root failover on the switch, use the show stpd command. The show stpd
command displays information about the STPD configuration on the switch including the enable/
disable state for rapid root failover.
Example
The following command disables rapid root fail over on STPD Backbone_st:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables Bluetooth capability on a switch.
Syntax Description
switch Designates disabling switch capabilities.
bluetooth Designates disabling Bluetooth capabilities on a switch.
Default
By default, discovery and pairing modes are enabled.
Usage Guidelines
Using the command with no options dsiables Bluetooth capability on the switch. The discovery and
pairing options disable discoverable mode and pairing ability, respectively.
To view Bluetooth and discovery/pairing status, use the show switch bluetooth [statistics
| inventory] command.
Example
The following example disables Bluetooth capability on a switch:
# disable switch bluetooth
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X465 series switches.
Description
Disables the switch from generating locally administered per-port MAC addresses.
Syntax Description
This command has no arguments or variables.
Default
This feature is disabled by default.
Usage Guidelines
ExtremeXOS switches do not use a unique per-port MAC address when transmitting bridge protocol
data units (BPDUs). As a result, switch management can become inaccessible when switch MAC
addresses are learned on the wrong L2 path (corresponding to a blocking port). This command allows
you to disable the switch from generating locally administered MAC addresses.
Example
The following example disables the switch from generating locally administered MAC addresses:
disable switch locally-administered-address
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables use of the switch's USB port.
Syntax Description
usb Specifies USB port on switch.
Default
Enabled by default.
Usage Guidelines
This command requires a reboot to take effect.
Stack support is not available. You need to run this command individually on each node in a stack.
Running unconfigure switch all removes this USB setting and returns to the default of enabled.
Example
The following example disables use of the USB port:
disable switch usb
This setting will take effect at the next system reboot.
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable syslog
disable syslog
Description
Disables logging to all remote syslog server targets.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Disables logging to all remote syslog server targets, not to the switch targets. This setting is saved in
FLASH, and will be in effect upon boot up.
Example
The following command disables logging to all remote syslog server targets:
disable syslog
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the automatic entry of subVLAN information in the proxy ARP table.
Syntax Description
vlan-name Specifies a superVLAN name.
all Specifies all VLANs.
Default
Enabled.
Usage Guidelines
To facilitate communication between subVLANs, by default, an entry is made in the IP ARP table of the
superVLAN that performs a proxy ARP function. This allows clients on one subVLAN to communicate
with clients on another subVLAN. In certain circumstances, intra-subVLAN communication may not be
desired for isolation reasons.
Note
The isolation option works for normal, dynamic, ARP-based client communication.
Example
The following example disables the automatic entry of subVLAN information in the proxy ARP table of
the superVLAN "vsuper":
disable subvlan-proxy-arp vlan vsuper
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable tacacs
disable tacacs
Description
Disables TACACS+ authentication.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following command disables TACACS+ authentication for the switch:
disable tacacs
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable tacacs-accounting
disable tacacs-accounting
Description
Disables TACACS+ accounting.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following command disables TACACS+ accounting:
disable tacacs-accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable tacacs-authorization
disable tacacs-authorization
Description
Disables TACACS+ authorization.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This disables CLI command authorization but leaves user authentication enabled.
Example
The following command disables TACACS+ CLI command authorization:
disable tacacs-authorization
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the tech support feature.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables the tech-support feature. In the ExtremeXOS 15.4 release, the feature is disabled
by default. When the feature is disabled, the previous scheduled reports are canceled, and the bootup
event and critical severity events are ignored.
Example
The following command disables the tech-support feature:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable telnet
disable telnet
Description
Disables external Telnet services on the system.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
You must be logged in as an administrator to enable or disable Telnet.
Note
Telnet sessions between the nodes of a stack are not affected by this command.
Example
With administrator privilege, the following command disables external Telnet services on the switch:
disable telnet
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable tunnel
disable {tunnel} tunnel_name
Description
Allows GRE tunnels to be disabled.
Syntax Description
tunnel_name GRE tunnel name.
Default
Enabled.
Usage Guidelines
Use this command to disable GRE tunnels.
Example
This exanple disables the tunnel named "myGREtunnel":
disable myGREtunnel
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables the Session-Reflector.
Syntax Description
restrict Restricts only TWAMP control sessions to create test sessions and
reflector does not respond to TWAMP-test packets tgat do not match
a test session created by a control session.
Default
N/A.
Usage Guidelines
If the you disable the Session-Reflector, the application terminates all current TWAMP test sessions. If
you specify the restrict keyword, only TWAMP control sessions may create test sessions and the
reflector will not respond to TWAMP-test packets that do not match a test session created by a control
session.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command disables the TWAMP server.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
If you disable the TWAMP server, all current TWAMP control sessions are terminated and any test
sessions set up by the control sessions are deleted.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
The command is available on all platforms.
disable udp-echo-server
disable udp-echo-server {vr vrid}
Description
Disables UDP echo server support.
Syntax Description
vrid Specifies a VR or VRF.
Default
Disabled.
Usage Guidelines
UDP echo packets are used to measure the transit time for data between the transmitting and receiving
end.
Example
The following example disables UDP echo server support:
disable udp-echo-server
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the use of the specified Universal Port profile on the switch.
Syntax Description
profile-name Specifies the UPM profile to be disabled.
Default
A UPM profile is enabled by default.
Example
The following command disables a UPM profile called sample_1 on the switch:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables a VXLAN remote endpoint.
Syntax Description
virtual-network Virtual overlay network.
remote-endpoint Remote tunnel endpoint information.
vxlan VXLAN virtual networks remote endpoint.
ipaddress Specifies an IP address of a remote endpoint.
ipaddress Specifies the IP address of the desired remote endpoint.
vr Specifies a VR/VRF instance the remote endpoint is associated with.
vr_name Specifies the desired existing VR/VRF instance the remote endpoint is
associated with. Default is VR-Default.
all Specifies all remote tunnel endpoints.
Default
If a VR is not specified, VR-Default is the VR.
Usage Guidelines
Extreme Loop Recognition Protocol (ELRP) detects loops across VXLAN tunnels. If a loop is detected
across the tunnel, ELRP takes down the VXLAN remote endpoint. You can use this command to disable
a remote endpoint manually.
Example
The following example disables the remote endpoint at 100.1.1.1 on VR-Default (not specified, command
default):
# disable virtual-network remote-endpoint vxlan ipaddress 100.1.1.1
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
disable virtual-router
disable virtual-router vrf-name
Description
Disables a VRF.
Note
This command is only applicable for VRFs.
Syntax Description
vrf-name Specifies the name of the VRF.
Default
Enabled.
Usage Guidelines
When you disable a VRF, the software does the following:
• Disables Layer 3 protocols.
• Marks static routes as inactive and removes them from the hardware forwarding tables.
• Flushes the IP ARP and IPv6 neighbor-discovery caches.
Example
The following example disables VRF "vrf1":
disable virtual-router vrf1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable vlan
disable [ {vlan} vlan_name | vlan vlan_list]
Description
Use this command to disable the specified VLAN.
Syntax Description
vlan_name Specifies the VLAN you want to disable.
vlan_list Specifies the VLAN list of IDs to disable.
Default
Enabled.
Usage Guidelines
This command allows you to administratively disable specified VLANs. The following guidelines apply to
working with disabling VLANs:
• Disabling a VLAN stops all traffic on all ports associated with the specified VLAN.
• You cannot disable a VLAN that is running Layer 2 protocol control traffic for protocols such as
EAPS, STP, or ESRP.
When you attempt to disable a VLAN running Layer 2 protocol control traffic, the system returns a
message similar to the following:
VLAN accounting cannot be disabled because it is actively used by an L2 Protocol
• You can disable the default VLAN; ensure that this is necessary prior to disabling the default VLAN.
• You cannot disable the management VLAN.
• You cannot bind Layer 2 protocols to a disabled VLAN.
• You can add ports to or delete ports from a disabled VLAN.
Caution
Disabling the Mgmt VLAN disables access to the Ethernet Management port on a switch
(disable vlan Mgmt).
Example
The following example disables the VLAN named "accounting":
disable vlan accounting
History
This command was first available in ExtremeXOS 11.4.
The ability to add ports to a disabled VLAN was added in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable vm autostart
disable vm vm_name autostart
Description
Disables automatic start-up of guest virtual machines (VMs).
Syntax Description
vm Designates a virtual machine.
vm_name Specifies the VM name.
autostart Specifies disabling automatic start-up of the specified VM. Default is
disabled.
Default
By default, automatic start-up is disabled.
Usage Guidelines
This command disables automatically starting up a specific VM when ExtremeXOS starts.
You must reboot the switch for this command to take effect.
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
Example
The following example disables automatic start-up of VM "vm1":
# disable vm vm1 autostart
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
Description
This command disables VM-tracking dynamic VLAN on specific ports.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to disable VM-tracking dynamic VLAN on specific ports. The ALL option is not
supported because VM-tracking dynamic VLAN should not be enabled on a switch's uplink port.
Example
This example disables VM-tracking dynamic VLAN on port 2:1:
# disable vm-tracking dynamic-vlan ports 2:1
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
disable vm-tracking
disable vm-tracking
Description
Disables the Extreme Network Virtualization (XNV) feature on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command disables the XNV feature, which tracks virtual machines (VMs) that connect to the
switch.
Note
When the VM tracking feature is disabled, file synchronization with the FTP server stops.
Example
The following command disables the XNV feature:
# disable vm-tracking
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Disables the XNV feature on the specified ports.
Syntax Description
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
This command disables VM tracking on the specified ports.
Example
The following command disables VM tracking on port 2:1:
# disable vm-tracking ports 2:1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Disables the egress filtering of CVIDs that are not configured in the CVID map for a CEP.
Syntax Description
port_list Specifies a list of ports.
all Specifies all switch ports.
Default
Egress CVID filtering is disabled.
Usage Guidelines
To view the configuration setting for the egress CVID filtering feature, use the show ports
information command.
Note
When CVID egress filtering is enabled, it reduces the maximum number of CVIDs supported
on a port. The control of CVID egress filtering applies to fast-path forwarding. When frames
are forwarded through software, CVID egress filtering is always enabled.
Example
The following example disables egress CVID filtering on port 1:
disable vman cep egress filtering port 1
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
disable vpex
disable vpex
Description
Disables VPEX mode for using bridge port extenders (BPEs).
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
Default
N/A.
Usage Guidelines
Disabling VPEX mode removes all BPE slot number assignments made using configure vpex
ports port_list slot slot_num. A reboot of the switch is required for this command to take
effect.
Example
The following example disables VPEX mode:
# disable vpex
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X690, , X590 series switches.
Description
Disables automatic configuration of the Extended Edge Switching architecture (controlling bridge (CB)
and bridge port extenders (BPEs)).
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
auto-configuration Specifies disabling automatic configuration of the Extended Edge
Switching architecture.
Default
Disabled.
Usage Guidelines
Auto-configuration allows the controlling bridge switch to detect new BPEs connected to ports not
configured as cascade ports, and automatically configure cascade ports, LAG membership, MLAG ports,
and extended slots. This command disables this auto-configuring capability.
To disable auto-configuration, you must first enter VPEX mode (see enable vpex on page 2312).
Example
The following example disables auto-configuration mode:
# disable vpex auto-configuration
History
This command was first available in ExtremeXOS 22.6.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X690, X590 series switches.
Description
Disables automatic upgrading on Extended Edge Switching topologies.
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
auto-upgrade Specifies that the controlling bridge (CB) automatically upgrades
bridge port extender (BPE) slots in MLAG mode (default is enabled).
Default
Automatic upgrading is enabled by default.
Usage Guidelines
Automatic upgrading can occur only when both CBs in the MLAG have the same BPE xmod versions
installed, and only after all slots are synchronized between the CBs.
To disable automatic upgrading, you must first enter VPEX mode (see enable vpex on page 2312). To
view the status of automatic upgrading, use the command show vpex.
Example
The following example disables automatic upgrading:
# disable vpex auto-upgrade
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X690, X590 series switches.
disable vpls
disable vpls [vpls_name | all]
Note
This command has been replaced with the following command: disable l2vpn
[vpls [vpls_name | all] | vpws [vpws_name | all]].
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Disables the VPLS instance specified by vpls_name.
Syntax Description
vpls_nam Identifies the VPLS within the switch (character string)
e
all Specifies all VPLS.
Default
All newly created VPLS instances are enabled.
Usage Guidelines
This command disables the VPLS instance specified by vpls_name. When a VPLS instance is disabled,
all sessions to its configured peers are terminated. Any locally attached service VLAN/VMAN is
immediately isolated from other devices residing in the VPN. If this is an H-VPLS core node, then all
spoke nodes connected to this peer are isolated unless redundant core access is configured.
Example
The following example disables the VPLS named "myvpls":
disable vpls myvpls
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: disable l2vpn vpls
fdb mac-withdrawal .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Disables the VPLS MAC address withdrawal capability.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
When disabled, the switch does not send MAC address withdrawal messages. If a MAC address
withdrawal message is received from another VPLS peer, the local VPLS peer processes the message
and withdraws the specified MAC addresses from its FDB, regardless of the MAC address withdrawal
configuration.
Example
The following command disables MAC address withdrawal:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: disable l2vpn
[vpls [vpls_name | all] | vpws [vpws_name | all]] health-check
vccv .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Disables the VCCV health check feature on one or all VPLS instances on the local node.
Syntax Description
vpls_nam Identifies the VPLS for which health check is to be disabled.
e
all Specifies that health check is to be disabled on all VPLS instances on the local node.
Default
Health check is disabled.
Usage Guidelines
None.
Example
The following command disables the health check feature on the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: disable l2vpn
[vpls [vpls_name | all] | vpws [vpws_name | all]] service .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Disables the configured VPLS services for the specified vpls_name.
Syntax Description
vpls_nam Identifies the VPLS within the switch (character string).
e
all Specifies all VPLS.
Default
Enabled.
Usage Guidelines
When services are disabled, the VPLS is removed from all peer sessions. The keyword all disables
services for all VPLS instances.
Example
The following command disables the configured VPLS services for the specified VPLS:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command disables group mode on member VRs so that they can operate in individual VR mode.
Syntax Description
group Form a group of VRRP VRs to operate in high-scale mode.
group_name Specifies the VRRP group name.
configuration Removes group configuration on individual VRs (default).
members Disables all VRs that are members of the group.
Default
If you do not specify, group configuration is removed from individual VRs.
Example
The following example disables administratively all member VRs of the group. This may be useful for
debugging issues:
disable vrrp group ExtremeNet members
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Disables a specific VRRP instance or all VRRP instances.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vlan_list VLAN list (1–4,094).
vridval Specifies the VRID for the VRRP instance. To display the configured
VRRP router instances, enter the show vrrp command.
vrid_list List of virtual router IDs (1–255).
Default
N/A.
Usage Guidelines
This disables a specific VRRP instance on the switch. If no VRRP VLAN is specified, all VRRP instances
on the switch are disabled.
Example
The following command disables all VRRP instances on the switch:
disable vrrp
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
disable watchdog
disable watchdog
Description
Disables the system watchdog timer.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
The watchdog timer monitors the health of the switch hardware and software events. For example, the
watchdog timer reboots the switch if the system cannot reset the watchdog timer. This can be caused
by a long CPU processing loop, any unhandled exception, or a hardware problem with the
communication channel to the watchdog. In most cases, if the watchdog timer expires, the switch
captures the current CPU status and posts it to the console and the system log. In some cases, if the
problem is so severe that the switch is unable to perform any action, the switch reboots without logging
any system status information prior to reboot.
To display the watchdog state of your system, use the show switch command.
Example
The following command disables the watchdog timer:
disable watchdog
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the hypertext transfer protocol (HTTP) access to the switch on the default port (80).
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to disallow users from connecting with HTTP. Disabling HTTP access forces a user to
use a secured HTTPS connection if web HTTPS is enabled.
Example
The following command disables HTTP on the default port:
disable web http
History
This command was first available in the ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables the secure socket layer (SSL) access to the switch on the default port (443).
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to disable SSL before changing the certificate or private key.
Example
The following command disables SSL on the default port:
disable web https
History
This command was first available in the ExtremeXOS 11.2 and supported with the SSH module.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables XML configuration mode on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to disable the XML configuration mode on the switch. XML configuration mode is not
supported for end users.
Example
The following command disables XML configuration mode on the switch:
disable cli xml-mode
History
This command was first available in an ExtremeXOS 11.2.
The cli keyword was added for syntax consistency in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Disables MSRP on the ports listed in the command after the keyword ports.
Syntax Description
msrp Multiple Stream Registration Protocol.
port_list Port list separated by a comma or "-".
all All ports.
Default
Disabled.
Usage Guidelines
Use this command to disable MSRP in the ports listed or all ports.
Example
disable msrp ports all
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms if the AVB feature pack license is installed on the switch.
download bootrom
download bootrom [[ipaddress | hostname] filename {{vr} vrname} {block-
size block_size} | memorycard filename] {slot slotid}
Description
Downloads a BootROM image after the switch has booted.
The downloaded image replaces the BootROM in the onboard FLASH memory.
Syntax Description
ipaddress Specifies the IP address of the TFTP server.
hostname Specifies the hostname of the TFTP server.
vrname Specifies the name of the virtual router.
NOTE: User-created VRs are supported only on the platforms listed
for this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
block_size Specifies the data block size, excluding TFTP header. Data block size
ranges from 24-65000 bytes.
memorycard Specifies that the BootROM image should be obtained from a
removable storage device, which can be a USB 2.0 storage device.
filename Specifies the name of the file that contains the BootROM image.
slotid This parameter is available only on the SummitStack.
In a SummitStack, the slotid specifies the slot number of the node.
On a SummitStack, the slotid specifies the node to which the image
should be downloaded.
Default
The default block size is 1400 bytes.
Usage Guidelines
Upgrade the BootROM image only when asked to do so by an Extreme Networks technical
representative.
Prior to downloading the BootROM image on the switch, you must download the image you received
from Extreme Networks to a TFTP server on your network. If present on your switch, you can also
download the image to a compact flash card or USB 2.0 storage device.
Specify the ipaddress or hostname parameters to download a BootROM image from a TFTP server on
the network.
The BootROM image file is a .xtr file, and this file contains the executable code.
If this command does not complete successfully it could prevent the switch from booting. In the event
the switch does not boot properly, some boot option functions can be accessed through a special
Bootloader menu.
When specifying a host name or remote IP address, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - ) Permitted only for host names
• Underscore ( _ ) Permitted only for host names
• Colon ( : )
When naming or configuring an IP address for your network server, remember the requirements listed
above.
When specifying a local or remote filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - )
• Underscore ( _ )
• Slash ( / ) Permitted only for remote files
When naming a local or remote file, remember the requirements listed above.
SummitStack Only
You can issue this command only from the Master node. When provided, the file to be downloaded has
to be compatible with the type of switch in the specified slot if the user confirms that the image is to be
installed.
If no slot number is provided and the user confirms installation in the case of download, an attempt is
made to install the bootrom image on all active nodes. The bootrom image will not be installed on any
node if the bootrom image specified is not compatible with all active nodes.
Example
The following example downloads a bootROM image from the TFT[ server "tftphost" with the filename
"bootimage":
download bootrom tftphost bootimage
History
This command was first available in ExtremeXOS 11.0.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
download image
Using TFTP: download [url url {vr vrname} | image [active | inactive]
[[hostname | ipaddress] filename {{vr} vrname} {block-size
block_size} | memorycard filename] {partition}
To download an image to a stack: download image [[hostname | ipaddress] filename
{{vr} vrname} {block-size block_size} | memorycard filename]
{partition}
Description
Downloads a new version of the ExtremeXOS software image.
The image file can be downloaded using TFTP (which is not a secure method), or SFTP and SCP2
(which are secure methods). The procedure using TFTP begins above and using SFTP/SCP2.
Syntax Description
url Uniform Resource Locator (URL) of image, xmod or flat-text list of
files with suffix '.lst'.
url Image, xmod, or file list. e.g. http://ipaddress/path.xos or ftp://
ipaddress:port/ path.xmod or ftp://ipaddress/some_list.lst.
active Specifies automatic determination for active (primary) partition.
inactive Specifies automatic determination for inactive (secondary) partition.
hostname Specifies the hostname of the TFTP server from which the image
should be obtained.
ipaddress Specifies the IP address of TFTP server from which the image should
be obtained.
memorycard Specifies that the image should be obtained from a removable
storage device, which can be a compact flash card or a USB 2.0
storage device.
filename Specifies the filename of the new image.
vrname Specifies the name of the virtual router.
block_size Specifies the maximum block size, not including the TFTP header.
The range is 24–65000 bytes.
partition Specifies which partition the image should be saved to: primary or
secondary. Select primary to save the image to the primary partition
and secondary to save the image to the secondary partition.
Default
Stores the downloaded image in the alternate (inactive) partition.
SFTP and SCP2 provide secure methods of downloading the ExtremeXOS software image files, *.xos or
*.xmod. You can use one of three procedures:
• From the switch, running the command SCP2. connect to and “get” from a remote server. This is
similar to the download image command.
• From outside the switch, connect to the switch that is acting as the server and “put” from the
remote server. There is no TFTP equivalent for this method.
◦ Using SFTP
◦ Using SCP2
If you do not specify block size, the default value is 1400 bytes.
Usage Guidelines
Prior to downloading an image on the switch, you must download the image you received from
Extreme Networks to a TFTP server on your network. If your switch has a removable storage device, you
can also download the image to that device.
Note
The download image command causes the switch to use the newly downloaded software
image during the next switch reboot. To modify or reset the software image used during a
switch reboot, use the use image command. Use this command after downloading and
installing the image for it to be effective.
Specify the ipaddress or hostname parameters to download an image from a TFTP server on the
network. Use of the hostname parameter requires that DNS be enabled.
Specify memorycard to download a an image from a removable storage device. Use a PC with
appropriate hardware such as a compact flash reader/writer and follow the manufacturer’s instructions
to access the compact flash card and place the image onto the card. For more information about
installing a removable storage device, see the hardware documentation.
Image Filenames
The software image file can be an .xos file, which contains an ExtremeXOS core image, or an .xmod file,
which contains an ExtremeXOS modular software package.
As of ExtremeXOS 16.1, the download command now accepts a URL as the name of the file to
download. URL protocols can be tftp, http, ftp. The format of a URL is:
• http://10.10.10.1/filename.xos
• tftp://10.10.10.1/filename.xos
• ftp://10.10.10.1/filename.xmod
In addition to accepting a URL that ends in .xos or .xmod, the URL filename can end in .lst. A .lst file
contains filenames at the same location as the .lst file URL and will be downloaded/installed one after
the other. The .lst file method can enable us to define bundles of downloads for:
• aspen, summit480 –image file size issues
• ssh installs with ExtremeXOS
• Customer files ending in '.cfg', '.xsf', '.pol', '.xlic', '.py', '.ssh'
• Other bundling that makes it easier to download with a single command
You can identify the appropriate image or module for your platform based on the file name of the
image. The ExtremeSwitchingseries switches generally use the summitX- filename prefix. The
exceptions are the ExtremeSwitching X465, X690, X590, and X870 series switches, which use the
onie- prefix (for example: onie-22.2.1.2.xos).
For additonal installation requirements, see the sections Installing a Core Image and Installing a Modular
Software Package in the .ExtremeXOS 30.5 User Guide.
When specifying a host name or remote IP address, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - ) Permitted only for host names
• Underscore ( _ ) Permitted only for host names
• Colon ( : )
When naming or configuring an IP address for your network server, remember the requirements listed
above.
When specifying a local or remote filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - )
• Underscore ( _ )
• Slash ( / ) Permitted only for remote files
When naming a local or remote file, remember the requirements listed above.
The Image Integrity Check feature was added in ExtremeXOS 16.1. The CLI output of this command is
modified:
1. If the signature is verified and there is no error, therre is no change to the output.
2. If the downloaded image does not have a signature, the following messages are added. This is
considered as a warning, since it could be simply a downgrading. The user is given the choice to
continue or quit the installation.
Warning: Signature Validation - Image is not digitally signed. Do you want to continue?
(y/N)
If the user decides to continue, then it follows the normal installation path; if the user decides to stop
here, the following message is printed and then the installation is canceled.
Installation cancelled
3. If the certificate (keys) to verify the image is missing, the following messages are added. This is
considered as a non-fatal and rare error, digital signature verification is bypassed. The user is given
the choice to continue or quit the installation.
Warning: Signature Validation - Certificates missing; Image signature validation will
be bypassed. Do you want to continue? (y/N)
If the user decides to continue, then it follows the normal installation path; if the user decides to stop
here, the following message is printed and then the installation is canceled.
Installation cancelled
4. If the certificate (keys) itself cannot be verified, the following messages are added. This is STILL
considered as a non-fatal and rare error, digital signature verification is bypassed. The user is given
the choice to continue or quit the installation.
Warning: Signature Validation - Certificates verification failed; Image signature
validation will be bypassed. Do you want to continue? (y/N)
If the user decides to continue, then it follows normal installation path; if the user decides to stop
here, the following message is printed and then the installation is canceled.
Installation cancelled
5. If the image digital signature validation fails, the following message is added as a new reason why
download fails. This is considered a fatal error like a CRC check failure, installation is terminated
immediately.
Error: Failed to download image - Error: Image signature cannot be validated.
If this occurs, move or delete the core dump files from the internal memory. For example, if the switch
supports a compact flash card or USB 2.0 storage device and space is available, transfer the files to the
storage device. On switches without removable storage devices, transfer the files from the internal
memory card to a TFTP server. This frees up space on the internal memory card while keeping the core
dump files.
The switch displays a message similar to the following and prompts you to take action:
Core dumps are present in internal-memory and must be removed before this download can
continue.
(Please refer to documentation for the “configure debug core-dumps” command for
additional information)
Do you want to continue with download and remove existing core dumps? (y/n)
Enter y to remove the core dump files and download the new software image. Enter n to cancel this
action and transfer the files before downloading the image.
For information about configuring and sending core dump information, see the configure debug
core-dumps and save debug tracefiles memorycard commands.
SummitStack Only
You can issue this command only from the Master node.
If a slot is not specified, the image is downloaded to every node in the Active Topology. If a slot is
specified, the image is downloaded to that slot only.
If all nodes to be downloaded are not running the same partition, the command is not executed and
following message is displayed:
Error: all nodes do not have the same image partition selected.
If all nodes to be downloaded have the same partition selected but the ExtremeXOS is currently running
from the selected partition, the command is not executed and the following message is displayed:
Error: the image partition selected must not be the active partition.
Example
The following example shows how the .lst file can contain filenames ending in .lst to get a list of lists (of
lists etc…) from an HTTP server on 10.68.9.7 port 8080 for directory 16.1/cougar/cougar/release:
cat script.lst – script.lst contains a number of Python scripts the user wants to download to a switch:
• jsonrpc.py
• jsontest.py
• otst.py
• ping.py
• readvr.py
Downloading to Switch.............................................
Installing to primary partition!
Installing to Switch.............................................
Image installed successfully
This image will be used only after rebooting the switch!
Downloading to Switch.....
Installing to primary partition!
Installing to Switch..............................................
Image installed successfully
Downloading http://10.68.9.7/summitX-16.1.0.18-LegacyCLI.xmod
Downloading to Switch..
Installing to primary partition!
Installing to Switch........................
Legacy CLI framework was Successfully Installed !!!
Downloading http://10.68.9.7/summitX-16.1.0.18-reachnxt-1.8.1.8.xmod
Downloading to Switch...
Installing to primary partition!
Installing to Switch....
Image installed successfully
Downloading http://10.68.9.7/summitX-16.1.0.18-techSupport.xmod
Downloading to Switch..
Installing to primary partition!
Installing to Switch..
Image installed successfully
http://10.68.9.7/script.lst
http://10.68.9.7/jsonrpc.py
http://10.68.9.7/jsontest.py
http://10.68.9.7/otst.py
http://10.68.9.7/ping.py
http://10.68.9.7/readvr.py
(pacman debug) X460G2-24t-10G4.2 #
History
This command was first available in ExtremeXOS 10.1.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Permits downloading of certificate file(s) from files stored on a TFTP server.
Syntax Description
ipaddress Specifies the IP address of the TFTP server.
ssl-cert Specifies SSL/TLS certificate (default).
trusted-ca Specifies CA certificates.
ocsp-signature-ca Specifies signature CA files.
cert_file Specifies the name of the certificate file.
Default
If no option is selected, SSL/TLS certificate (ssl-cert) is the default.
Usage Guidelines
If the download operation is successful, any existing certificate is overwritten. For SSL/TLS certificates,
after a successful download, the software attempts to match the public key in the certificate against the
private key stored. If the private and public keys do not match, the switch displays a warning message
similar to the following: Warning: The Private Key does not match with the Public Key in the certificate.
This warning acts as a reminder to also download the private key.
Note
You can only download a certificate key in the VR-Mgmt virtual router.
Downloaded certificates and keys are not saved across switch reboots unless you save your current
switch configuration. Once you issue the save command, the downloaded certificate is stored in the
configuration file and the private key is stored in the EEPROM.
You can purchase and obtain SSL certificates from Internet security vendors.
When specifying a remote IP address, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Colon ( : ).
When configuring an IP address for your network server, remember the requirements listed above.
When specifying a remote filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Dash ( - ).
• Underscore ( _ ).
• Slash ( / ).
Example
The following command downloads a certificate from a TFTP server with the IP address of 123.45.6.78:
History
This command was first available in the ExtremeXOS 11.2 and supported with the SSH module.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Permits downloading of a private key from files stored in a TFTP server.
Syntax Description
ipaddress Specifies the IP address of the TFTP server.
key_file Specifies the name of the private key file.
Default
N/A.
Usage Guidelines
If the operation is successful, the existing private key is overwritten.
After a successful download, a check is performed to find out whether the private key downloaded
matches the public key stored in the certificate. If the private and public keys do not match, the switch
displays a warning similar to the following: Warning: The Private Key does not match with the Public
Key in the certificate. This warning acts as a reminder to also download the corresponding certificate.
The certificate and private key file should be in PEM format and generated using RSA as the
cryptography algorithm.
Downloaded certificates and keys are not saved across switch reboots unless you save your current
switch configuration. Once you issue the save command, the downloaded certificate is stored in the
configuration file and the private key is stored in the EEPROM.
When specifying a remote IP address, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Colon ( : ).
When configuring an IP address for your network server, remember the requirements listed above.
When specifying a remote filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Dash ( - ).
• Underscore ( _ ).
• Slash ( / ).
Example
The following command downloads a private key from a TFTP server with the IP address of 123.45.6.78:
History
This command was first available in the ExtremeXOS 11.2 and supported with the SSH module.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
edit policy
edit policy filename
Description
Edits a policy text file.
Syntax Description
filename Specifies the filename of the policy text file.
Default
N/A.
Usage Guidelines
This command edits policy text files that are on the switch. All policy files use “.pol” as the filename
extension, so to edit the text file for the policy boundary use boundary.pol as the filename. If you specify
the name of a file that does not exist, you will be informed and the file will be created.
This command spawns a VI-like editor to edit the named file. For information on using VI, if you are not
familiar with it, do a web search for “VI editor basic information”, and you should find many resources.
The following is only a short introduction to the editor.
Edit operates in one of two modes; command and input. When a file first opens, you are in the
command mode. To write in the file, use the keyboard arrow keys to position your cursor within the file,
then press one of the following keys to enter input mode:
• i - To insert text ahead of the initial cursor position.
• a- To append text after the initial cursor position.
To escape the input mode and return to the command mode, press the Escape key.
There are several commands that can be used from the command mode. The following are the most
commonly used:
• dd - To delete the current line.
• yy - To copy the current line.
• p - To paste the line copied.
• :w - To write (save) the file.
• :q - To quit the file if no changes were made.
• :q! - To forcefully quit the file without saving changes.
• :wq - To write and quit the file.
Refresh Policy
After you have edited the text file for a policy that is currently active, you will need to refresh the policy
if you want the changes to be reflected in the policy database. When you refresh the policy, the text file
is read, the syntax is checked, the policy information is added to the policy manager database, and the
policy then takes effect. Use the following command to refresh a policy:
refresh policy policy-name
If you just want to check to be sure the policy contains no syntax errors, use the following command:
check policypolicy-name{access-list}
Example
The following command allows you to begin editing the text file for the policy boundary:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to edit the specified profile.
Syntax Description
profile-name Specifies the UPM profile to be edited.
Default
N/A.
Usage Guidelines
Use the command to have VI-like editor features for editing the profile. Changes appear when you close
the file for editing, not when you save it.
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
eject memorycard
eject memorycard
Description
Ensures that the compact flash card or USB 2.0 storage device can be safely removed from the switch.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
After the switch writes to a compact flash card or USB 2.0 storage device, and before you can view the
contents on the device, you must ensure it is safe to remove the device from the switch. Use the eject
memorycard command to prepare the device for removal. After you issue the eject memorycard
command, you can manually remove the device.
If you have configured the configure debug core-dumps on page 377 command to write files to the
device that you are trying to eject, you are reminded to select another location to write the bebug files
to:
Note: The destination of debug core dump is still configured to memorycard.
If a memory card will not be present, it is recommended to use
"configure debug core-dumps" to change the core dump destination.
For more information about removing a compact flash card or USB 2.0 storage device, refer to the
hardware documentation.
To access and read the data on the card, use a PC with appropriate hardware such as a compact flash
reader/writer and follow the manufacturer’s instructions to access the compact flash card and read the
data.
Example
The following command prepares a compact flash card or USB 2.0 storage device to be removed from
the switch:
eject memorycard
History
This command was first available in ExtremeXOS 11.1.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
ELSE
ELSE
Note
This is a script statement and operates only in scripts when scripting is enabled with the
following command: enable cli scripting {permanent} .
Description
Command block to be executed if the condition specified in the associated IF statement is not met.
Syntax Description
statements Actions to be executed when the conditions specified in the
associated IF statement are not met.
Default
N/A.
Usage Guidelines
CLI scripting must be enabled before using this command.
This command must be preceded by IF _expression THEN statements and followed by ENDIF.
Example
The following example executes the show switch command if the value of the variable x is greater than
2, and execute the show vlan command otherwise:
show switch
ELSE
show vlan
ENDIF
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables control packets to reach CPU, even if an ACL would deny them.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command allows control packets to reach the CPU, even if the packets match ACLs that would
otherwise deny them. The control packets include STP and EAPS BPDUs, and ARP replies for the switch.
If this feature is disabled, these same packets will be denied if an ACL is applied that contains a
matching entry that denies the packets. Contrary to expectations, when this feature is disabled, the
packets will still be denied if there is a higher precedence entry that permits the packets.
Example
The following command enables STP BPDU packets to reach the switch CPU, despite any ACL:
enable access-list permit to-cpu
History
This command was first available in ExtremeXOS 11.3.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
When access control lists (ACLs) are refreshed, this command provides that any packets arriving during
the refresh will be blackholed. As the ACL is being refreshed, packets may arrive while the ACL is in an
indeterminate state, and packets may be permitted that otherwise are dropped. This feature protects
the switch during an ACL refresh.
Example
The following command enables dropping of packets during an ACL refresh:
enable access-list refresh blackhole
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable account
enable account [all {admin|user | name } ]
Description
Enables the specified account locally.
Syntax Description
all Specifies that all accounts, or all accounts of a certain type, will be
enabled locally.
admin Specifies that adminstrative privileged accounts will be enabled
locally.
user Specifies that user privileged accounts, including lawful intercept
accounts, will be enabled locally.
name Specifies the name of the account that will be enabled locally.
Default
Enabled.
Usage Guidelines
Enabling accounts affects the following northbound interfaces:
• Console
• TELNET
• SSH
• HTTP
• XML
Example
The following example enables all accounts locally:
enable account all
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable avb
enable avb
Description
This command is a macro command that can be used to enable all AVB protocols globally on the switch.
It is equivalent to issuing the following three commands:
enable mvrp
enable msrp
Syntax Description
avb Audio Video Bridging.
Default
Disabled.
Usage Guidelines
Use this command to enable all AVB protocols globally on the switch.
Example
enable avb
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms that support the AVB feature and that have an AVB feature
pack license installed. To see which platforms support AVB and for information about obtaining a
license, see the ExtremeXOS 30.5 Feature License Requirements.
Description
This command is a macro command that can be used to enable all AVB protocols on a given set of
ports. It is equivalent to issuing the following three commands:
Syntax Description
avb Audio Video Bridging.
port_list Port list separated by a comma or "-".
all All ports.
Default
Disabled.
Usage Guidelines
Use this command to enable all AVB protocols on the given ports.
Example
enable avb ports 1-5
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms that support the AVB feature and that have an AVB feature
pack license installed. To see which platforms support AVB and for information about obtaining a
license, see the ExtremeXOS 30.5 Feature License Requirements.
enable bgp
enable bgp
Description
Enables BGP.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables the Border Gateway Protocol (BGP) on the router. Before invoking this
command, the local AS number and BGP router ID must be configured.
Example
The following command enables BGP:
enable bgp
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables advertisement of BGP inactive routes, which are defined as those routes that are rated best by
BGP and not best in the IP routing table.
Syntax Description
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
Default
Disabled.
Usage Guidelines
This command can be successfully executed only when BGP is globally disabled. It is best to enable this
feature before you enable BGP (enable bgp). If BGP is enabled, you must disable BGP (disable bgp),
enable this feature, and then enable BGP.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Example
The following command enables inactive route advertisement for IPv4 unicast traffic:
enable bgp address-family ipv4-unicast advertise-inactive-route
History
This command was first available in ExtremeXOS 12.1.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables BGP route aggregation.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Route aggregation is the process of combining the characteristics of several routes so that they are
advertised as a single route. Aggregation reduces the amount of information that a BGP speaker must
store and exchange with other BGP speakers. Reducing the information that is stored and exchanged
also reduces the size of the routing table.
Example
The following command enables BGP route aggregation:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables BGP to use the Multi Exit Discriminator (MED) from neighbors in different autonomous systems
(ASs) in the route selection algorithm.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
MED is only used when comparing paths from the same AS, unless always-compare-med is enabled.
When this command is issued, MEDs from different AS are used in comparing paths. A MED value of
zero is treated as the lowest MED and therefore the most preferred route.
BGP must be disabled before you can change the configuration with this command.
Example
The following command enables BGP to use the Multi Exit Discriminator (MED) from neighbors in
different autonomous systems in the route selection algorithm:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the as-number:number format of display for the communities in the output of show
commands.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
If not enabled, the communities are displayed as a single decimal value.
Example
The following command enables the AS-number:number format of display for communities:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
For IPv4 and IPv6 routes, this command enables the export of routes learned from BGP peers to the
specified protocol.
For VPNv4 routes, this command enables the exchange of routes between a BGP PE router and a CE
router.
Syntax Description
bgp For Layer 3 VPNs, this specifies that BGP routes learned from CE
routers are to be exported to remote PE routers.
route_type Specifies the BGP export route type. Valid route_type values are:
blackhole; direct; isis; isis-level-1; isis-level-2; isis-level-1-external; isis-
level-2-external; ospf; ospf-extern1; ospf-extern2; ospf-inter; ospf-
intra; rip; static; ospfv3; ospfv3-extern1; ospfv3-extern2; ospfv3-inter;
ospfv3-intra; ripng;
address-family Valid address_family values are: ipv4-unicast; ipv4-multicast;
ipv6-unicast; ipv6-multicast
remote-vpn For Layer 3 VPNs, this specifies that BGP routes learned from remote
PE routers are to be exported to the local VRF.
policy-name Name of policy to be associated with network export. Policy can filter
and/or change the route parameters.
Default
Disabled.
If no address family is specified for an IPv6 protocol, the default IPv6 unicast family applies; otherwise if
no address family is specified, IPv4 unicast is the default.
Usage Guidelines
The exporting of routes between any two routing protocols is a discrete configuration function. For
example, you must configure the switch to export routes from OSPF to BGP and, if desired, you must
configure the switch to export routes from BGP to OSPF. You must first configure both protocols and
then verify the independent operation of each. Then, you can configure the routes to export from OSPF
to BGP, and the routes to export from BGP to OSPF.
You can use a policy to associate BGP attributes including Community, NextHop, MED, Origin, and Local
Preference with the routes. A policy can also be used to filter out exported routes.
Using the export command to redistribute routes complements the redistribution of routes using the
configure bgp add network command. The configure bgp add network command adds
the route to BGP only if the route is present in the routing table. The enable bgp export command
redistributes an individual route from the routing table to BGP. If you use both commands to
redistribute routes, the routes redistributed using the network command take precedence over routes
redistributed using the export command.
Note
For this command to execute, the specified protocol must support the specified address
family. For example, the command fails if you specify OSPF and the IPv6 unicast address
family. You can specify blackhole, direct, static, and IS-IS routes with IPv4 or IPv6 address
families.
To export Layer 3 VPN routes to the CE peer in a VPN VRF, the source must be remote-vpn and
destination address family must be ipv4-unicast.
Example
The following command enables BGP to export OSPF routes to other BGP routers:
The following command enables export of Layer 3 VPN Routes recevied from the PE Core in a VPN-VRF
to its CE peers:
enable bgp export remote-vpn address-family ipv4-unicast
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
For IPv4 and IPv6 routes, this command enables the PE router to export and redistribute local VRF
routes to remote PE routers through BGP.
Syntax Description
vr Specifies the source VPN VRF of the exported routes .
vr_name Specifies the name of the source VPN VRF.
route_type Specifies the source or origin of the route types to be exported
to remote PE routers. Valid Types: blackhole, direct, and bgp,
and static .
address-family Specifies the address family for the exported routes. Valid types
are vpnv4.
export-policy vpnv4 (Optional) The export policy can be specified when you enable
bgp export.
Specifies that routes from the VRF are exported as vpnv4 routes
over MPBGP.
policy_name Name of export policy to be associated with export of VRF
routes into BGP’s VPN-IPv4 domain for advertisement to other
PE routers.
Default
Disabled.
Usage Guidelines
This command enables a PE router to advertise learned routes from CE routers to remote PE routers in a
Service Provider's backbone. Executing this command allows the PE router to convert VRF native IPv4
routes into VPN-IPv4 route,s and advertise to all remote PE BGP neighbors as VPN-IPv4 routes.
• This export command is applicable in Parent VR context only. If you execute it in a VRF context, an
error message is returned.
• The source VPN VRF must be a child of the Parent VR.
• BGP need not be added to a VPN VRF to export routes from a VPN VRF.
• The direction of where the redistribution is targeted is implicit on the keywords used. Similarly bgp
only applies to EBGP routes from CE exported as VPN routes, hence we use it only with address
family vpnv4. Other sources such as “static” and “direct” are redistributed both ways.
• Use show vr parent_vr_name to check routes exported from various VPN VRFs into the
MBGP’s VPN-IPv4 domain.
• Use show vr vpn_vrf_name to check routes exported from a VPN VRF into the MBGP’s VPN-
IPv4 domain.
Example
The following command enables BGP to advertise a vpnv4 route named "corp1_vpn_vrf":
History
This command was first added in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature,see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables BGP fast external fallover functionality.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables the BGP fast external fallover on the router. This command applies to all directly-
connected external BGP neighbors.
When BGP fast external fallover is enabled, the directly-connected EBGP neighbor session is
immediately reset when the connecting link goes down.
If BGP fast external fallover is disabled, BGP waits until the default hold timer expires (3 keepalives) to
reset the neighboring session. In addition, BGP might teardown the session somewhat earlier than hold
timer expiry if BGP detects that the TCP session and it's directly connected link is broken (BGP detects
this while sending or receiving data from TCP socket).
Example
The following command enables BGP fast external fallover:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables IP forwarding over calculated MPLS LSPs to subnets learned via BGP.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables IP forwarding over calculated MPLS LSPs to subnets learned via BGP.
(Calculated refers to an LSP that only reaches part of the way to the destination). IP forwarding over
MPLS LSPs must be enabled to forward over calculated LSPs. By default, IP forwarding over MPLS LSPs
to subnets learned via BGP is disabled.
Example
The following command enables BGP’s use of MPLS LSPs to reach BGP routes:
enable bgp mpls-next-hop
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables BGP multipath-relax feature, which modifies the definition of an equal cost BGP route.
Syntax Description
multipath-relax Selects BGP multipath relax feature.
Default
This feature is disabled by default.
Usage Guidelines
This feature modifies the definition of equal cost BGP routes as specified in RFC-4271. In particular,
routes with the same AS-path length, but differing AS numbers in the path are not considered equal
cost by default. However, with multipath-relax enabled, routes with the same AS-path length can have
differing AS number values in the AS-path and still be considered equal cost.
Example
The following example enables BGP multipath-relax feature:
enable bgp multipath-relax
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Desription
Enables the BGP session. The neighbor must be created before the BGP neighbor session can be
enabled.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
Default
Disabled.
Usage Guidelines
To create a new neighbor and add it to a BGP peer group, use the following command:
create bgp neighbor remoteaddr peer-group peer-group-name {multi-hop}
Example
The following command enables the BGP neighbor session:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables overriding the BGP specification behavior with respect to the next-hop of routes advertised to
EBGP peers.
Syntax Description
bgp Specifies BGP.
neighbor Specifies BGP neighbor.
remoteaddr Specifies BGP neighbor IP address.
all Specifies all BGP neighbors.
address-family Specifies address family.
l2vpn-evpn Specifies L2VPN EVPN address-family type.
next-hop-unchanged Enables preserving the BGP next-hop when routes are advertised to
EBGP peers (default is disabled).
Default
Default is that next-hop-unchanged is disabled.
Usage Guidelines
This command enables overriding the specification behavior with respect to the next-hop of routes
advertised to EBGP peers. Specifically, it maintains the BGP next-hop for routes advertised to EBGP
peers instead of replacing the next-hop with either the outgoing interface IP address or the local
loopback address.
Example
The following example enables next-hop unchanged for BGP neighbor at 192.168.66.2:
# enable bgp neighbor 192.168.66.2 l2vpn-evpn next-hop-unchanged
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command enables multi protocol BGP (MBGP) and route-refresh capabilities for one or all BGP
neighbors.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors. If
an IPv6 address family is specified, the configuration applies to all
IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor. The switch uses
the IP address format to determine if the address is an IPv4 or IPv6
address.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies VPN ipv4 unicast address family for a BGP neighbor. This is a
required configuration for PE to PE BGP neighbor session. You must
configure it before you enable a neighbor.
route-refresh Specifies ROUTE-REFRESH message capabilities.
ipv4-vxlan Specifies IPv4 VXLAN capability.
l2vpn-evpn Specifies L2 VPN EVPN address family.
Default
The following capabilities are enabled by default for IPv4 peers: IPv4 unicast, IPv4 multicast, and route
refresh.
The following capabilities are enabled by default for IPv6 peers: route refresh.
Note
For IPv4 peers, the IPv4 unicast and IPv4 multicast capabilities are enabled by default to
support legacy peers that do not support MBGP. All other capabilities (except route-refresh)
are disabled by default.
Usage Guidelines
When you change the capability configuration, you must enable the BGP neighbor before the
configuration becomes active. If the BGP neighbor was enabled before the change, you must disable
and enable the BGP neighbor. After the capabilities have been enabled, the BGP neighbor announces its
capabilities to neighbors in an OPEN message.
When one or more address families are enabled, routes from the specified address families are updated,
accepted, and installed. If more than one address family capability is enabled,or if the VPNv4 address
family is enabled,the MBGP extension is automatically enabled. To disable MBGP, you must disable all
enabled address families.
To support Layer 3 VPNs, you must enable the VPNv4 address family for all MBGP peers that will
distribute VPNv4 routes across the service provider backbone. The VPNv4 address family must be
enabled on the MPLS-enabled VR; it is not supported for BGP neighbors on the CE (VRF) side of the PE
router.
Use the vpnv4 keyword for all PE to PE BGP neighbor sessions. This instructs BGP to negotiate the
vpnv4 address family in an open message with other PE routers. If this command is executed when a
BGP neighbor session is established, it will take effect only after BGP session is reset. We recommend
that you execute this command when a BGP neighbor is operationally down. Do not issue this
command for a neighbor that is part of a VRF (PE – CE), or a warning message will be displayed.
Note
To inter-operate with Cisco routers for BGP graceful restart, you must enable the IPv4 unicast
address capability.
Note
For an IPv6 peer, an IPv6 address family must be specified. From 21.1 ExtremeXOS allows IPV4
peering sessions to carry IPV6 routes and IPV6 peering sessions to carry IPV4 routes for the
Unicast and Multicast sub-address families.
Note
You must enable a VPN IPv4 unicast address family for a BGP neighbor for a PE to PE BGP
neighbor session before you enable the neighbor.
Example
The following command enables the route-refresh feature for all neighbors:
enable bgp neighbor all capability route-refresh
The following command enables the VPNv4 address family for a BGP neighbor:
virtual router corp1_vrf
enable bgp neighbor 192.168.96.235 capability vpnv4
The following command enables VXLAN capability for the BGP neighbor at 192.168.68.1:
enable bgp neighbor 192.168.68.1 capability ipv4-vxlan
History
This command was first available in ExtremeXOS 10.1.
Support for L2 VPN EVPN address family was added in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command enables Outbound Route Filtering (ORF) for one or all BGP neighbors on a Layer 3 VPN.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified or if an IPv4
address is specified, the configuration applies to all IPv4 neighbors.
remoteaddr Specifies the IPv4 address of a BGP neighbor.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
community Enables neighbor capability for communities.
ext-community Enables neighbor capability for extended communities.
send Enables neighbor capability filter list send capability.
Default
Disabled.
Usage Guidelines
Enter this command multiple times to configure the address family, type, and direction attributes.
By specifying the address-family, type and direction in multiple commands, you can better control the
actual ORF capabilities sent to a peer. In the case where a particular address-family is explicitly disabled
for a peering, the ORF capability configuration for that address-family is ignored and not sent.
ORF capabilities can only be enabled for IPv4 neighbors, and only for IPv4 address families. If
configured for IPv6 neighbors or address-families the command is rejected with the following error
message:
Example
The following examples enables the neighbor capability feature for a Layer 3 VPN neighbor:
enable bgp neighbor 1.1.1.1 capability address-family vpnv4
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the origination and advertisement of a default route to a single BGP neighbor or to all BGP
neighbors.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified, the
configuration applies to the IP Unicast family on all IPv4 peers. If an
IPv4 address family is specified, the configuration applies to all IPv4
neighbors. If an IPv6 address family is specified, the configuration
applies to all IPv6 neighbors.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
policy-name Specifies a policy to be applied to the default route origination.
Default
Disabled. BGP does not automatically originate and advertise default routes to BGP neighbors.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Note
You must specify an IPv6 address family for an IPv6 peer, because an IPv6 peer does not
support the default IPv4 unicast address family. Similarly, if you specify an IPv4 peer and an
address family in the command, an IPv4 address family must be specified.
Usage Guidelines
This command can be successfully executed at any time, irrespective of whether local BGP or the
remote BGP peer is enabled or disabled. The default route or routes are created regardless of whether
or not there are matching entries in the IP route table.
When a BGP neighbor is added to a peer group, it does not inherit the default route origination
configuration from the peer group. Also, default route origination for a neighbor and the associated
peer group can be different.
If a policy is configured and specified in the command, a default route can be originated only if there is a
route in the local BGP RIB that matches the policy's match rules. The default route's attribute can be
modified using the same policy file by including statements in the set block of the policy.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Example
The following command enables the origination and advertisement of default routes for IPv4 unicast
traffic for all BGP peer nodes:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the removal of private AS numbers from the AS path in route updates sent to EBGP peers.
Syntax Description
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
all Specifies all IPv4 and IPv6 neighbors.
Default
Disabled.
Usage Guidelines
Private AS numbers are AS numbers in the range 64512 through 65534. You can remove private AS
numbers from the AS path attribute in updates that are sent to external BGP (EBGP) neighbors.
Possible reasons for using private AS numbers include:
• The remote AS does not have officially allocated AS numbers.
• You want to conserve AS numbers if you are multi-homed to the local AS.
Private AS numbers should not be advertised on the Internet. Private AS numbers can only be used
locally within an administrative domain. Therefore, when routes are advertised out to the Internet, the
routes can be stripped out from the AS paths of the advertised routes using this feature.
Example
The following command enables the removal of private AS numbers from the AS path in route updates
sent to the EBGP peers:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the soft input reset feature.
Syntax Description
all Specifies that the configuration applies to all neighbors in the
specified address family. If no address family is specified, the
configuration applies to the IP Unicast family on all IPv4 peers. If an
IPv4 address family is specified, the configuration applies to all IPv4
neighbors. If an IPv6 address family is specified, the configuration
applies to all IPv6 neighbors.
remoteaddr Specifies the IPv4 or IPv6 address of a BGP neighbor.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
Disabled.
If no address family is specified and an IPv4 address is detected, IPv4 unicast is the default address
family.
Usage Guidelines
Before you can change the configuration with this command, you must disable BGP, and you must
disable the corresponding BGP neighbor session using the following command:
disable bgp neighbor [remoteaddr | all]
To enable this feature on Layer 3 VPNs, you must do so in the context of the MPLS-enabled VR; this
feature is not supported for BGP neighbors on the CE (VRF) side of the PE router.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and the command fails. Similarly an IPv4 peer only
supports IPv4 address families and the command fails if an IPv6 address family is specified.
Example
The following command enables the soft recognition feature:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables a peer group and all the neighbors of a peer group.
Syntax Description
peer-group-name Specifies a peer group.
Default
Disabled.
Usage Guidelines
You can use BGP peer groups to group together up to 200512 BGP neighbors. All neighbors within the
peer group inherit the parameters of the BGP peer group. The following mandatory parameters are
shared by all neighbors in a peer group:
• source-interface
• out-nlri-filter
• out-aspath-filter
• out-route-map
• send-community
• next-hop-self
Example
The following command enables the BGP peer group outer and all its neighbors:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command enables ORF capabilities for a particular peer, peer-group, or all peers for one or all
address-families and ORF types (for example, communities, extended communities and prefixes). The
command specifies whether ORF capabilities are sent to the peer, and if they are honoured if received
from the peer, or both.
Syntax Description
peer-group-name Specifies a peer group.
address-family Specifies outbound route filtering.
ipv4-unicast Specifies an IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
community Enables ORF for communities.
ext-community Enables ORF for extended communities.
prefix Enables ORF for prefixes.
send Enables ORF filter list send capability.
receive Enables ORF filter list receive capability.
both Enables ORF filter list send and receive capability.
Default
• ORF is disabled globally.
• ORF capabilities are assumed to be disabled by default for all neighbors.
• If address family is not specified, ipv4-unicast is assumed.
• If direction is not specified, both is assumed.
Note
prefix is not supported for vpnv4 address family.
The route refresh capability is enabled for IPv6 peer groups by default.
Usage Guidelines
By specifying the address-family, type and direction in multiple commands you can better
control the ORF capabilities sent to a peer. In cases where a particular address-family is explicitly
disabled for a peering, the ORF capability configuration for that address-family is ignored and not sent.
ORF capabilities can only be enabled for IPv4 neighbors and only for IPv4 address families. If
configured for IPv6 neighbors or address-families the command is rejected with the following error
message:
Example
The following command enables send only ORF capabilities for an ipv4 multicast peer group:
enable bgp peer-group capability orf address-family ipv4-multicast type community send
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command enables BGP Multiprotocol (MP) and route-refresh capabilities for a peer-group.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
route-refresh Specifies ROUTE-REFRESH message capabilities.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
All capabilities are enabled for IPv4 peer groups by default.
The route refresh capability is enabled for IPv6 peer groups by default.
Usage Guidelines
This command enables BGP Multiprotocol or route-refresh capabilities for a peer group. When you
change the capability configuration, you must enable the BGP peer group before the configuration
becomes active. If the BGP peer group was enabled before the change, you must disable and enable the
BGP peer group. After the capabilities have been enabled, the BGP peer announces its capabilities to
neighbors in an OPEN message.
When one or more address families are enabled, routes from the specified address families are updated,
accepted, and installed. If more than one address family capability is enabled,or if the VPNv4 address
family is enabled,the MBGP extension is automatically enabled. To disable MBGP, you must disable all
enabled address families.
A peer group can be configured for either IPv4 or IPv6 address families, but not both. Because a peer-
group cannot support both IPv4 and IPv6 peers, the switch prevents the enabling of address families
that are not compatible with peers that are already in the peer-group. Similarly if a particular address
family is enabled for the peer-group, a peer that is incompatible with the existing peer-group
configuration cannot be added to the group.
To support Layer 3 VPNs, you must enable the VPNv4 address family for all MBGP peers that will
distribute VPNv4 routes across the service provider backbone. The VPNv4 address family must be
enabled on the MPLS-enabled VR; it is not supported for BGP neighbors on the CE (VRF) side of the PE
router.
Note
To inter-operate with Cisco routers for BGP graceful restart, you must enable IPv4 unicast
address capability.
Example
The following command enables the route-refresh feature for the peer group outer:
enable bgp peer-group outer capability route-refresh
The following command enables the VPNv4 address family for a peer group:
enable bgp peer-group backbone capability vpnv4
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command disables peer-group capability for a peer group on a Layer 3 VPN.
Syntax Description
remoteaddr Specifies the IPv4 address of a BGP neighbor.
vpn4 Specifies the VPNv4 address family for Layer 3 VPN support.
community Disables peer-group capability for communities.
ext-community Disables peer-group capability for extended communities.
send Disables peer-group capability filter list send capability.
receive Disables peer-group capability filter list receive capability.
both Disables peer-group capability filter list send and receive capability.
Default
Disabled. If the direction is not specified, the both option applies.
Usage Guidelines
Enter this command multiple times to configure the address family, type, and direction attributes.
By specifying the address-family, type and direction in multiple commands, you can better control the
actual ORF capabilities sent to a peer. In the case where a particular address-family is explicitly disabled
for a peering, the ORF capability configuration for that address-family is ignored and not sent.
ORF capabilities can only be enabled for IPv4 neighbors, and only for IPv4 address families. If
configured for IPv6 neighbors or address-families the command is rejected with the following error
message:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the origination and advertisement of default routes to all BGP neighbors in the specified peer
group.
Syntax Description
peer-group peer-group- Specifies the BGP peer group for which the default routes are
name originated and advertised.
address-family Specifies an IPv4 or IPv6 unicast or multicast address family.
policy_name Specifies a policy to be applied to the default routes during
origination.
Default
Disabled. BGP does not automatically originate and advertise default routes to BGP neighbors.
Usage Guidelines
This command can be successfully executed at any time, irrespective of whether local BGP or the
remote BGP peers are enabled or disabled. The default routes are created regardless of whether or not
there are matching entries in the IGP route table.
When a BGP neighbor is added to a peer group, it does not inherit the default route origination
configuration from the peer group. Also, default route origination for a neighbor and the associated
peer group can be different.
If a policy is configured and specified in the command, a default route can be originated only if there is a
route in the local BGP RIB that matches the policy's match rules. The default route's attribute can be
modified using the same policy file by including statements in the set block of the policy.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
fails if no address family is specified or if an IPv4 address-family is specified. This command
also fails if an IPv6 address family is specified for an IPv4 peer-group.
Example
The following command enables the origination and advertisement of default routes for IPv4 unicast
traffic for all nodes in the test BGP peer group:
History
This command was first available in ExtremeXOS 12.2.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the removal of private autonomous system (AS) numbers from the AS_Path attribute of
outbound updates.
Syntax Description
peer-group-name Specifies a peer group.
Default
Disabled.
Usage Guidelines
This command applies to the current VR or VRF context.
Example
The following command enables the BGP peer group outer from removing private AS numbers:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the soft input reset feature.
Syntax Description
peer-group-name Specifies a peer group.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
Default
Disabled.
Usage Guidelines
Disabling the soft input reset feature can potentially limit the amount of system memory consumed by
the RIB-in.
After you enter this command, the switch automatically disables and enables all neighbors in the peer
group before the change takes effect.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
If the specified peer group contains IPv6 peers, it is an IPv6 peer group and you must specify
an IPv6 address-family. When the specified peer group is an IPv6 peer group, this command
defaults to IPv4 unicast if no address family is specified. This command fails if an IPv6 address
family is specified for an IPv4 peer-group.
Example
The following command enables the soft input reset feature:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the generation and processing of BOOTP packets on a VLAN to obtain an IP address for the
VLAN from a BOOTP server.
Syntax Description
bootp Enable BOOTP client.
ipv4 IPv4 client.
dhcp Enable DHCP client.
ipv6 IPv6 client.
vlan Specifies a VLAN name.
all Specifies all VLANs.
Default
Disabled.
Usage Guidelines
If IPv4/IPv6 keyword is not specified , ipv4 would be taken as default for the mentioned VLAN.
Example
The following example enables the generation and processing of BOOTP packets on a VLAN named
"accounting":
enable bootp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables BOOTP Relay v6. This can be done across the VR or on a per VLAN basis.
Syntax Description
bootprelay BOOTP Relay service.
ipv4 DHCPv4 BOOTP Relay service.
ipv6 DHCPv6 BOOTP Relay service.
vlan_name Specifies a VLAN name
vr Uses a specific virtual router name.
vr_name Specifies a virtual router name.
all Enables all VLANs.
Default
IPv4.
Usage Guidelines
Use this command to enable BOOTP Relay across the VR or on a per VLAN basis.
Example
The following example displays IPv6 bootprelay information:
* switch # show bootprelay ipv6
BOOTP Relay: DHCPv6 BOOTP Relay enabled on virtual router "VR-Default"
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:0db8:85a3:0000:0000:8a2e:0370:7335
2001:0db8:85a3:0000:0000:8a2e:0370:7336
2001:0db8:85a3:0000:0000:8a2e:0370:7337
VLAN "Default":
BOOTP Relay : Disabled
VLAN "v1":
BOOTP Relay : Enabled
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7338
Interface ID : v1-12
Remote ID :v1_remId
Prefix Snooping : Disabled
VLAN"v2":
BOOTP Relay : Enabled
BOOTP Relay Servers : 2001:0db8:85a3:0000:0000:8a2e:0370:7339
Interface ID : 100 (Default)
Remote ID : 00:04:96:52:A7:1B (Default)
Prefix Snooping : Disabled
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
enable bootprelay
enable bootprelay {{vlan} [vlan_name] | {{vr} vr_name} | all [{vr}
vr_name]}
Description
Enables the BOOTP Relay function on one or all VLANs for the specified VR or VRF.
Syntax Description
vlan_name Specifies a single VLAN on which to enable the BOOTP Relay feature.
vr_name Specifies a single VR or VRF on which to enable the BOOTP Relay
feature. If not specified, VR or VRF of current command context is
used.
all Specifies that BOOTP Relay is to be enabled for all VLANs on the
specified VR or VRF.
Default
The BOOTP Relay function is disabled on all VLANs and VRs.
Usage Guidelines
Because VLAN names are unique on the switch, you can specify only a VLAN name (and omit the VR
name) to enable BOOTP Relay on a particular VLAN. When you enable BOOTP Relay on a VR or VRF,
BOOTP Relay is enabled on all VLANs for that VR. If you enter the command without specifying a VLAN
or a VR, the functionality is enabled for all VLANs in the current VR context.
Note
If DHCP/BOOTP Relay is enabled on a per VLAN basis, make sure it is enabled on both the
client-side and server-side VLANs.
Example
The following example enables the forwarding of BOOTP requests for all VLANs in the current VR
context:
enable bootprelay
You can use either of the following commands to enable the forwarding of BOOTP requests for VLAN
client1:
enable bootprelay "client1"
enable bootprelay vlan "client1"
You can use any one of the following commands to enable the forwarding of BOOTP requests for all
VLANs on VR zone3:
enable bootprelay zone3
enable bootprelay vr zone3
enable bootprelay all zone3
enable bootprelay all vr zone3
History
This command was first available in ExtremeXOS 10.1.
The capability to enable BOOTP Relay on a VLAN was added in ExtremeXOS 12.4.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables Cisco Discovery Protocol (CDP) on a port.
Syntax Description
port_list Specifies the list of ports to enable CDP on.
all Specifies that you enable CDP on all ports.
Default
Enabled.
Usage Guidelines
Example
The following command enables CDP on all ports on the switch:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Triggers DMM frame transmission.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
mep Specifies the maintenance association End Point that helps trigger a
particular MEP level session on that segment.
mep_id Specifies the MEP-ID. The range is 1-8191. The default is all MEPs on the
segment.
continuous Specifies that frames are to be sent continuously until stopped.
count Specifies that a number of frames are to be sent.
value Specifies the number of frames to send. The range is 1 to 4294967295.
Default
N/A.
Usage Guidelines
Use this command to trigger DMM frames at the specified transmit interval configured using the
command configure cfm segment transmit-interval.
Continuous transmission continues until it is stopped with the command disable cfm segment
frame-delay measurement or delete cfm segment.
Note
If you try to trigger the DMM frames for a segment that is not completely configured, the
frames are not transmitted for that segment, and an error message is displayed on the
console.
Example
The following example triggers continuous frame transmission on the CFM segment segment-first:
enable cfm frame-delay measurement segment-first continuous
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to trigger LMM frames at the configured transmit-interval.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
continuous Specifies that frames are to be sent continuously until stopped.
count Specifies that a number of frames are to be sent.
frames Specifies the number of frames to send. The range is 1 to 4294967295.
Default
N/A.
Usage Guidelines
This command is used to trigger LMM frames at the configured transmit-interval. If the user specifies
the mode as continuous, the LMM transmission will continue till it is stopped by the user.
Note
If the user tries to trigger the LMM frames for a segment which is not completely configured,
the frames will not be transmitted for that segment, and an error message will be thrown.
Example
enable cfm segment cs2 frame-loss measurement mep 3 count 10
enable cfm segment cs2 frame-loss measurement mep 3 continuous
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable clear-flow
enable clear-flow
Description
Enable the CLEAR-Flow agent.
Syntax Description
This command has no arguments or variables.
Default
CLEAR-Flow is disabled by default.
Usage Guidelines
When the CLEAR-Flow agent is enabled, sampling begins and actions are taken based on the CLEAR-
Flow rules that are configured on the switch.
Example
The following example enables CLEAR-Flow on the switch:
# enable clear-flow
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Performs command line history expansion similar to the Linux shell.
Syntax Description
cli Command line interface settings.
history Command history settings.
expansion Substitute occurrences of '!n:w' with the corresponding line 'n' and
word 'w+1' from command history (default disabled).
session Configures history expansion for this CLI session only (default ).
permanent Configures history expansion for this CLI session, and all future
sessions.
Default
CLI history expansion is disabled by default. If not specified when enabling, CLI history expansion is
enabled for the current session only.
Usage Guidelines
The history expansion character ‘!’ can be used to specify command from the history that is substituted
into the command line. All occurrences of the form “!n:w” in the command are replaced with the w’th
word from the n'th line in the command history. Specification of the word is optional.
If you enable CLI history expansion, and then try to reference a history that does not exist, the following
error appears:
# show !58:1 Error: History event not found. If you were not attempting a history
expansion using the format '!n:w', and believe the command to be valid, please retry the
command after 'disable cli history expansion'.
To view the status of CLI history expansion on the switch, use the show management command.
Example
The following command enables CLI history expansion for this session and all future sessions:
enable cli history expansion permanent
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables CLI prompting for the session.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Use this command to enable CLI prompting from a disabled state.
To view the status of CLI prompting on the switch, use the show management command.
Example
The following command enables prompting:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command allows you to configure the default auto refresh behavior. The auto refresh behavior is
used for some show commands.
Syntax Description
session Use refresh setting for this CLI session only.
permanent Use refresh setting for this CLI session, and all future sessions
(default).
Default
Permanent.
Usage Guidelines
The auto refresh behavior is used for some ‘show’ commands. You must use the disable cli
refresh command to disable the show command auto refresh or add the no-refresh option to the
individual command. For example:
• show ports config – will display and refresh the first <n> ports of a switch until the [ESC] key
is pressed.
• disable cli refresh
• show ports config – will act as if show ports config no-refresh was entered and
page through all ports
Since the default for the session may be set to disable cli refresh the commands that take a
no-refresh option now allow for the alternate refresh case if the user wants to selectively enable
a refreshed display.
Example
The following sample output displays the CLI refresh information.
# show management
CLI idle timeout : Enabled (20 minutes)
CLI max number of login attempts : 3
CLI max number of sessions : 8
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the use of CLI scripting commands. When used without the permanent option, it enables the
CLI scripting commands for the current session and is a per session setting. The permanent option
enables the CLI scripting commands for new sessions only and is saved across switch reboots.
Syntax Description
permanent Enables the CLI scripting commands for new sessions only; this
setting is saved across switch reboots.
Default
The CLI scripting commands are disabled by default.
Usage Guidelines
You must enable the CLI scripting commands on the switch to use the scripting keywords in the script,
and before you can configure or execute a script.
Note
CLI scripting commands cannot be enabled when CLI space auto completion is enabled with
the enable cli space-completion command.
Example
The following command enables the CLI scripting commands for the current session:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the display of CLI commands and responses during script operation.
Default
During interactive script sessions: CLI scripting output enabled.
Usage Guidelines
When the CLI scripting output is enabled, all script commands and responses are displayed.
When the load script filename {arg1} {arg2} ... {arg9} command is entered, the
software disables CLI scripting output until the script is complete, and then CLI scripting output is
enabled. Use the enable cli scripting output and disable cli scripting output commands to control what
a script displays when you are troubleshooting.
Example
The following command enables CLI scripting output for the current session or until the disable cli
scripting output command is entered:
History
This command was first available in ExtremeXOS 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the ExtremeXOS feature that completes a command automatically with the spacebar. The [Tab]
key can also be used for auto-completion.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
CLI space auto completion cannot be enabled while CLI scripting is enabled with the enable cli
scripting command.
Example
The following command enables using the spacebar to automatically complete a command:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the logging of CLI configuration commands to the Syslog for auditing purposes.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
ExtremeXOS allows you to record all configuration changes and their sources that are made using the
CLI by way of Telnet or the local console. The changes are logged to the system log. Each log entry
includes the user account name that performed the changes and the source IP address of the client (if
Telnet was used). Configuration logging applies only to commands that result in a configuration change.
To view the status of configuration logging on the switch, use the show management command. This
command displays information about the switch including the enable/disable state for configuration
logging.
Example
The following command enables the logging of CLI configuration commands to the Syslog:
enable cli config-logging
History
This command was first available in ExtremeXOS 11.0.
The cli-config-logging keyword was split into cli config-logging in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
When CLI logging is enabled, enables showing fully expanded commands, rather than abbreviations, in
the log.
Syntax Description
expansion Enables command expansion in logs.
Default
Expansion is disabled by default.
Usage Guidelines
When CLI logging is enabled (see enable cli config-logging on page 2054), this command enables
showing fully expanded commands, rather than abbreviations, in the log.
For example, with command expansion enabled, a command entered in abbreviated format, such as
config por 33 auto of spee 10000 duplex ful
Whereas, if command expansion is turned off, the command appears in the log in the exact format as it
was typed into the command line.
To see the status of command expansion, use show management on page 2774.
Example
The following example turns on command expansion:
enable cli-config-logging expansion
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the pause mechanism and does not allow the display to print continuously to the screen.
Syntax Description
session Enables viewing output of commands one screenful at a time for the
current user session only (default).
permanent Enables viewing output of commands one screenful at a time
permanently (setting persists after rebooting).
Default
Enabled per session.
Usage Guidelines
The command line interface (CLI) is designed for use in a VT100 environment.
Most show command output pauses when the display reaches the end of a page.
To view the status of CLI paging on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
CLI paging.
If CLI paging is enabled and you use the show tech-support command to diagnose system
technical problems, the CLI paging feature is disabled.
Example
The following command enables cli paging permanently (setting persists across reboots) and does not
allow the display to print continuously to the screen:
enable cli paging permanent
History
This command was first available in ExtremeXOS 10.1.
The clipaging option was split into two keywords in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable cpu-monitoring
enable cpu-monitoring {interval seconds} {threshold percent}
Description
Enables CPU monitoring on the switch.
Syntax Description
seconds Specifies the monitoring interval, in seconds. The default is 5 seconds,
and the range is 5 to 60 seconds.
threshold Specifies the CPU threshold value. CPU usage is measured in
percentages. The default is 90%, and the range is 0% to 100%.
Default
CPU monitoring is enabled and occurs every 5 seconds. The default CPU threshold value is 90%.
Usage Guidelines
CPU monitoring allows you to monitor the CPU utilization and history for all of the processes running on
the switch. By viewing this history on a regular basis, you can see trends emerging and identify
processes with peak utilization. Monitoring the workload of the CPU allows you to troubleshoot and
identify suspect processes before they become a problem.
To specify the frequency of CPU monitoring, use the interval keyword. We recommend the default
setting for most network environments.
CPU usage is measured in percentages. By default, the CPU threshold value is 90%. When CPU
utilization of a process exceeds 90% of the regular operating basis, the switch logs an error message
specifying the process name and the current CPU utilization for the process. To modify the CPU
threshold level, use the threshold keyword. The range is 0% to 100%.
Example
The following command enables CPU monitoring every 30 seconds:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables DHCP on a specified port in a VLAN.
Syntax Description
port_list Specifies the ports for which DHCP should be enabled.
vlan_name Specifies the VLAN on whose ports DHCP should be enabled.
Default
Disabled.
Usage Guidelines
None.
Example
The following command enables DHCP for port 5:9 in VLAN corp:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the generation and processing of DHCP packets on a VLAN to obtain an IP address for the
VLAN from a DHCP server.
Syntax Description
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
Default
If the IPv4/IPv6 keyword is not specified, IPv4 is taken as default for the mentioned VLAN | all.
Usage Guidelines
None.
Example
The following command enables the generation and processing of DHCP packets on a VLAN named
accounting:
enable dhcp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
This command was modified in ExtremeXOS 15.6 to include the ipv4 and ipv6 keywords.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the DiffServ field of an IP packet to be examined in order to select a QoS profile.
Syntax Description
port_list Specifies a list of ports or slots and ports to which the parameters
apply.
all Specifies that DiffServ examination is enabled for all ports.
Default
Disabled.
Usage Guidelines
The Diffserv examination feature is disabled by default.
Example
The following command enables DiffServ examination on selected ports:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the DiffServ code point to be overwritten in IP packets transmitted by the switch.
Syntax Description
port_list Specifies a list of ingress ports or slots and ports on which to enable
Diffserv replacement.
all Specifies that DiffServ replacement should be enabled for all ports.
Note: DiffServ replacement will be enabled for all QoS profiles if this
option is not specified.
Default
N/A.
Usage Guidelines
The Diffserv replacement feature functions for IPv4 and IPv6 traffic and is disabled by default.
Note
The port in this command is the ingress port.
This command affects only that traffic in traffic groupings based on explicit packet class of
service information and physical/logical configuration.
Example
The following example enables DiffServ replacement on specified ports:
enable diffserv replacement ports 5:3,5:5,6:2
History
This command was first available in ExtremeXOS 11.0.
The qosprofile keyword and qosprofile variable were added in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables IPFIX globally.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to enable or disable IPFIX globally. When used, it overrides the individual port enable
command. It is provided to simplify debugging.
Example
The following command enables IPFIX globally on the switch:
# enable ip-fix
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available only on the ExtremeSwitching X460-G2 series switches.
Description
Enables the Domain Name System (DNS) cache on a virtual router (VR) or VLAN.
Syntax Description
dns Domain name system.
cache Specifies enabling the DNS cache.
vlan Specifies enabling DNS cache on a VLAN.
vlan_name Specifies the VLAN name.
vr Specifies enabling DNS cache on a VR.
vr_name Specifies the VR name. If not specified, VR of current command
context is used.
Default
If no VR name is specified, the VR of the current command context is used.
Usage Guidelines
To view the DNS cache configuration, use the command show dns cache configuration
{{vlan} vlan_name | {vr} vr_name}
Example
The following example enables DNS cache on VLAN "VLAN1":
# enable dns cache vlan VLAN1
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables Domain Name System (DNS) analytics.
Syntax Description
dns Domain Name System.
cache Specifies DNS cache.
analytics Specifies enabling DNS cache analytics. Analytics provides more
insight into DNS queries when DNS cache is enabled. Default is
disabled.
vr Specifies enabling DNS analytics on a VR.
vr_name Specifies the VR name. If not specified, the VR of the current
command context is used.
Default
DNS analytics is disabled by default.
Usage Guidelines
To disable DNS analytics, use the command disable dns cache analytics {{vr}
vr_name}.
Example
The following example enables DNS analytics on VR "vr1":
# enable dns cache analytics vr vr1
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables simulated denial of service protection.
Syntax Description
This command has no arguments or variables.
Default
The default is disabled.
Usage Guidelines
If simulated denial of service is enabled, no ACLs are created. This mode is useful to gather information
about normal traffic levels on the switch. This will assist in configuring denial of service protection so
that legitimate traffic is not blocked.
Example
The following command enables simulated denial of service protection:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable dos-protect
enable dos-protect
Description
Enables denial of service protection.
Syntax Description
This command has no arguments or variables.
Default
The default is disabled.
Usage Guidelines
None.
Example
The following command enables denial of service protection.
enable dos-protect
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Used with VMANs, and instructs the switch to examine the 802.1p value of the inner tag, or header of
the original packet, to determine the correct egress queue on the egress port.
Syntax Description
all Specifies all ports.
port_list Specifies a list of ports or slots and ports.
Default
Disabled.
Usage Guidelines
Use this command to instruct the system to refer to the 802.1p value contained in the inner, or original,
tag when assigning the packet to an egress queue at the egress port of the VMAN.
Note
For information about configuring and displaying the current 802.1p and DiffServ
configuration for the inner, or original header, 802.1p value, see the Quality of Service section
in the ExtremeXOS 30.5 User Guide.
Example
The following example puts the packets in the egress queue of the VMAN egress port according to the
802.1p value on the inner tag:
enable dot1p examination inner-tag port 3:2
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables egress QoS profile selection based on the 802.1p bits in the incoming frame.
Syntax Description
port_list Specifies a list of ports on which to enable the dot1p examination
feature.
all Specifies that dot1p examination should be enabled for all ports.
Default
Enabled.
Usage Guidelines
To increase available ACLs, you can disable the 802.1p examination feature if you are not running QoS or
are running QoS using DiffServ. See the ExtremeXOS 30.5 User Guide for information on ACL limitations
on these platforms.
As part of the COS global status enable action, COS will automatically enable dot1p examination on all
ports. An internal status will track this event. The disable dot1p examination command will print an
additional warning message in the event that COS was configured via SNMP. If the COS global status is
disabled via SNMP, the internal status will be cleared and the additional warning message will not be
displayed.
Example
The following command enables dot1p examination on ports 1 to 5:
enable dot1p examination ports 1-5
History
This command was available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows the 802.1p priority field to be overwritten on egress according to the QoS profile to 802.1p
priority mapping for a given set of ports.
Syntax Description
port_list Specifies a list of ports or slots and ports.
all Specifies that dot1p replacement should be enabled for all ports.
Default
N/A.
Usage Guidelines
The dot1p replacement feature is disabled by default.
By default, 802.1p priority information is not replaced or manipulated, and the information observed on
ingress is preserved when transmitting the packet.
Note
The port in this command is the ingress port.
If 802.1p replacement is enabled, the 802.1p priority information that is transmitted is determined by the
hardware queue that is used when transmitting the packet.
Note
This command affects only that traffic in traffic groupings based on explicit packet class of
service information and physical/logical configuration.
Beginning with ExtremeXOS version 11.4 on the 1 Gigabit Ethernet ports, 802.1p replacement always
happens when you configure the DiffServ traffic grouping.
Note
Enabling dot1p replacement on all ports may take some time to complete.
Example
The following example enables dot1p replacement on all ports:
enable dot1p replacement ports all
History
This command was available in ExtremeXOS 11.0.
The qosprofile keyword and qosprofile variable were added in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable eaps
enable eaps {name}
Description
Enables the EAPS function for a named domain or for an entire switch.
Syntax Description
name Specifies the name of an EAPS domain.
Default
Disabled.
Usage Guidelines
Note
If you use the same name across categories (for example, STPD and EAPS names), you must
specify the identifying keyword as well as the actual name.
Although you can enable EAPS prior to configuring these steps, the EAPS domain(s) does not run until
you configure these parameters.
* These steps can be configured at any time, even after the EAPS domains are running.
You must enable EAPS globally and specifically for each named EAPS domain.
Example
The following command enables the EAPS function for entire switch:
enable eaps
The following command enables the EAPS function for the domain eaps-1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the EDP on one or more ports.
Syntax Description
ports Specifies one or more ports or slots and ports, including management
port.
all Specifies all ports on the switch, including management port.
Default
Enabled.
Usage Guidelines
On a SummitStack, ports can be a list of slots and ports. On a stand-alone switch, ports can be one
or more port numbers. For a detailed explanation of port specification, see Port Numbering in
Command Reference Overview
The EDP is used to locate neighbor Extreme Networks switches and exchange information about switch
configuration. When running on a normal switch port, EDP is used to by the switches to exchange
topology information with each other. Information communicated using EDP includes the following:
• Switch MAC address (switch ID).
• Switch software version information.
• Switch IP address.
• Switch VLAN information.
• Switch port number.
• Switch port configuration data: duplex, and speed.
Example
The following command enables EDP on port 3 on a switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable elrp-client
enable elrp-client {software | hardware-assist}
Description
Enables the Extreme Loop Recovery Protocol (ELRP) client (standalone ELRP) globally.
Syntax Description
software Select software ELRP (Default).
hardware-assist Select hardware-assisted ELRP.
Default
By default, ELRP is disabled.
Usage Guidelines
Configure loopback port before enabling hardware-assisted ELRP.
The ELRP client must be enabled globally in order for it to work on any VLANs.
The ELRP client can be disabled globally so that none of the ELRP VLAN configurations take effect. Use
the disable elrp-client command to globally disable the ELRP client.
The ExtremeXOS does not support ELRP and Network Login on the same port.
Example
The following command globally enables the ELRP client:
# enable elrp-client
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the ELSM protocol for the specified ports.
Syntax Description
port_list Specifies the port or ports for which ELSM should be enabled.
Default
The default is disabled.
Usage Guidelines
The ELSM protocol allows you to detect CPU and remote link failures in the network. ELSM operates on
a point-to-point basis; you only configure ELSM on the ports that connect to other devices within the
network, but you must configure ELSM on both sides of the peer connections.
The Layer 2 connection between the ports determines the peer. You can have a direct connection
between the peers or hubs that separate peer ports. In the first instance, the peers are also considered
neighbors. In the second instance, the peer is not considered a neighbor.
An Extreme Networks device with ELSM enabled detects CPU and remote link failures by exchanging
hello messages between two ELSM peers. If ELSM detects a failure, the ELSM-enabled port responds by
blocking traffic on that port. For example, if a peer stops receiving messages from its peer, ELSM brings
down that connection by blocking all incoming and outgoing data traffic on the port and notifying
applications that the link is down.
When you enable ELSM on a port, ELSM immediately blocks the port and it enters the Down state.
When the port detects an ELSM-enabled peer, the peer ports exchange ELSM hello messages. At this
point, the ports enter the transitional Down-Wait state. If the port receives Hello+ messages from its
peer and does not detect a problem, the peers enter the Up state. If a peer detects a problem or there is
no peer port configured, the port enters the Down state.
For more information about the types of ELSM hello messages, see the configure elsm ports
hellotime command.
Note
ELSM and mirroring are mutually exclusive. You can enable either ELSM, or mirroring, but not
both.
If you try to enable ELSM on a port that is already configured as a mirrored port, the switch displays a
message similar to the following:Cannot enable ELSM on port 1. Port is configured
as mirror monitor port
Disabling ELSM
ELSM works between two connected ports, and each ELSM instance is based on a single port. When
you disable ELSM on the specified ports, the ports no longer send ELSM hello messages to their peers
and no longer maintain ELSM states. To disable ELSM, use the following command:
disable elsm ports port_list
Example
The following command enables ELSM for ports 1-2 on the switch:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables ELSM automatic restart for the specified ports.
Syntax Description
port_list Specifies the port or ports for which ELSM auto-restart is being
enabled.
Default
The default is enabled.
Usage Guidelines
You must explicitly configure this behavior on each ELSM-enabled port; this is not a global command.
By default, ELSM automatic restart is enabled. If an ELSM-enabled port goes down, ELSM bypasses the
Down-Stuck state and automatically transitions the down port to the Down state, regardless of the
number of times the port goes up and down.
If you disable ELSM automatic restart, the ELSM-enabled port can transition between the following
states multiple times: Up, Down, and Down-Wait. When the number of state transitions is greater than
or equal to the sticky threshold, the port enters the Down-Stuck state.
The ELSM sticky threshold specifies the number of times a port can transition between the Up and
Down states. The sticky threshold is not user-configurable and has a default value of 1. That means a
port can transition only one time from the Up state to the Down state. If the port attempts a subsequent
transition from the Up state to the Down state, the port enters the Down-Stuck state.
If the port enters the Down-Stuck state, you can clear the stuck state and enter the Down state by using
one of the following commands:
OR
If you use the enable elsm ports port_list auto-restart command, automatic restart is
always enabled; you do not have to use the clear elsm ports port_list auto-restart
command to clear the stuck state.
If you configure automatic restart on one port, Extreme Networks recommends that you use the same
configuration on its peer port.
Example
The following command enables ELSM automatic restart for slot 2, ports 1-2 on the switch:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable erps
enable erps
Description
Enable (ERPS/ITU-T G.8032 standard).
Syntax Description
N/A.
Default
N/A.
Usage Guidelines
Use this command to enable ERPS.
Example
enable erps
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Enable ability on ERPS rings to block virtual channel recovery to avoid temporary loops .
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
block-vc-recovery Block on Virtual channel recovery.
Default
N/A.
Usage Guidelines
Use this command to enable ability on ERPS rings to block on virtual channel recovery to avoid
temporary loops. This is done on interconnected nodes for sub-ring configurations.
Example
The following example enables a virtual channel recovery block on “ring1”:
History
This command was first available in ExtremeXOS 15.13.
Platform Availability
This command is available on all platforms that are running ExtremeXOS.
Description
Enable an existing ERPS ring/sub-ring.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS ring.
Default
N/A.
Usage Guidelines
Use this command to enable an existing ERPS ring/sub-ring.
Example
The following example enables an existing ERPS ring identified as “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
Description
Enable the ability of ERPS to set the topology-change bit to send out Flush events.
Syntax Description
ring-name Alphanumeric string that identifies the ERPS sub-ring.
topology-change Topology change propagation control.
Default
N/A.
Usage Guidelines
Use this command to enable the ability of ERPS to set the topology-change bit to send out Flush
events.
Example
The following example enables the ability to set the topology-change bit for an existing ERPS sub-ring
identified as “ring1”:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on all platforms supported in 12.6 and forward that are running ExtremeXOS.
enable esrp
enable esrp esrpDomain
Description
Enables ESRP for a named domain.
Syntax Description
esrpDomain Specifies the name of an ESRP domain.
Default
Disabled.
Usage Guidelines
Before you enable an ESRP domain, it must have a domain ID. The ESRP domain ID is determined from
one of the following user-configured parameters:
• ESRP domain number created with the configure esrp domain-id command
• 802.1Q tag (VLANid) of the tagged master VLAN
If you do not have a domain ID, you cannot enable ESRP on that domain. A message similar to the
following appears:
ERROR: Cannot enable ESRP Domain "esrp1" ; No domain id configured!
If you add an untagged master VLAN to the ESRP domain, make sure to create an ESRP domain ID with
the configure esrp domain-id command before you attempt to enable the domain.
Example
The following command enables ESRP for the domain esrp1:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
Description
Enables Ethernet OAM on ports.
Syntax Description
port_list Specifies the particular ports.
all Specifies all fiber ports.
Default
Ethernet OAM is disabled on all ports.
Usage Guidelines
Use this command to enable Ethernet OAM on one or more specified ports or on all fiber ports.
Unidirectional link fault management is supported only on fiber ports.
Before enabling Ethernet OAM, autonegotiation must be turned off. The link should be a full duplex link.
If some ports cannot be enabled because, for instance, autonegotiation is not turned off, the command
is executed for those ports that can be enabled and reasons for the failed ports are displayed.
To display the Ethernet OAM configuration, use the show ethernet oam command.
When operating as a stack master, the ExtremeSwitching X450e switch can process this command for
ports on supported platforms.
Example
The following command enables Ethernet OAM on all fiber ports:
# enable ethernet oam ports all link-fault-management
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables EMS and SNMP reporting of discovered MAC addresses that are duplicates of statically
configured MAC addresses.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables reporting only. All packets that arrive from a duplicate MAC address on another
port (other than the statically configured port) are dropped.
The switch reports the source MAC address, port, and VLAN for each duplicate MAC address.
Example
The following command enables this feature:
enable fdb static-mac-move
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables egress flooding on one or more ports. You can further identify the type of packets to flood on
the specified ports.
Syntax Description
all_cast Specifies enabling egress flooding for all packets on specified ports.
broadcast Specifies enabling egress flooding only for broadcast packets.
multicast Specifies enabling egress flooding only for multicast packets.
unicast Specifies enabling egress flooding only for unknown unicast packets.
port_list Specifies one or more ports or slots and ports.
all Specifies all ports on the switch.
Default
Enabled for all packet types.
Usage Guidelines
Use this command to re-enable egress flooding that you previously disabled using the disable
flooding ports command.
You can disable egress flooding for unicast, multicast, or broadcast MAC addresses, as well as for all
packets on the ports. The default behavior is enabled egress flooding for all packet types.
Example
The following command enables unicast flooding on ports 13-17 on a switch:
enable flooding unicast port 13-17
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables flow control or priority flow control (PFC) on the specified ports.
Syntax Description
tx-pause Specifies transmit pause frames.
priority Specifies all priorities or single priorities--dot1p priority for tagged
packets and internal priority for untagged packets. Used with priority
flow control only.
rx-pause Specifies received pause frames.
qosprofile Specifies a QoS profile (“qp1” “qp2” “qp3” “qp4” “qp5” “qp6” “qp7”
“qp8”) to pause for priority flow control packet reception. Used with
priority flow control only.
all Specifies all ports or slots.
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
With autonegotiation enabled, the switches advertise the ability to support pause frames. This includes
receiving, reacting to (stopping transmission), and transmitting pause frames. However, the switch does
not actually transmit pause frames unless it is configured to do so.
Use this command to configure the switch to transmit link-layer pause frames when congestion is
detected. This stops all traffic on the configured port when there is buffer congestion for any traffic
type. Use it also to configure the switch to return to the default behavior of processing received pause
frames.
To enable TX flow-control, RX flow-control must first be enabled. If you attempt to enable TX flow-
control with RX flow-control disabled, an error message is displayed.
When IEEE 802.1Qbb priority flow control is enabled on a port, IEEE 802.3x pause functionality is no
longer available on that port.
Priority is established for reception of PFC packets with a QoS profile value on the ExtremeXOS switch
and for transmission with a priority value added to the PFC packet.
• QoS profile—Ingress traffic is associated with a QoS profile for assignment to one of eight hardware
queues in the system that define how the traffic flows with respect to bandwidth, priority, and other
parameters. By default, there are two QoS profiles (QP1 and QP8) defined in these supported
platforms and PFC works with this default. To segregate the ingress traffic with more granularity, you
will want to define other QoS profiles.
• Priority—The traffic that is paused is based on the priority bits in the VLAN header for tagged
packets. You can specify this transmit priority independently from the QoS profile to associate it
with the reception of a PFC packets thus giving flexibility in the configuration of the network.
It is suggested that the priority in the VLAN header match the QoS profile priority when traffic ingresses
at the edge of the network so that the traffic can be more easily controlled as it traverses through the
network.
IEEE 802.3x
The following command enables the TX flow-control feature on ports 5 through 7 on a switch:
IEEE 802.1Qbb
The following command enables the priority flow control feature on a switch:
History
This command was first available in ExtremeXOS 12.1.3.
IEEE 802.1Qbb priority flow control (PFC) was added in ExtremeXOS 12.5.
Platform Availability
IEEE 802.3x
The basic TX-pause and RX-pause functions of this command are available on all switches.
IEEE 802.1Qbb
The priority function (PFC) is available only on 10G ports.
Description
When enabled, IPv6 packets forwarded by hardware (fast path) may trigger ICMP redirects.
Syntax Description
fast-path IPv6 packets forwarded by hardware may trigger ICMP redirects
Default
Disabled.
Usage Guidelines
Use this command to trigger ICMP redirects when IPv6 packets are forwarded by hardware (fast-path).
Example
The enabled or disabled setting is displayed when using the command:
# show ipconfig ipv6
Route Sharing : Disabled
ICMP Redirect for Fast Path : Enabled
Max Shared Gateways : Current: 4 Configured: 4
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the generation of ICMP redirect messages on one or all VLANs.
Syntax Description
name Specifies a VLAN name.
Default
Enabled.
Usage Guidelines
This option only applies to the switch when the switch is in routing mode.
ICMP redirects are used in the situation where there are multiple routers in the same subnet. If a host
sends a packet to one gateway, the gateway router looks at its route table to find the best route to the
destination. If it sees that the best route is through a router in the same subnet as the originating host,
the switch sends an ICMP redirect (type 5) message to the host that originated the packet, telling it to
use the other router with the better route. The switch also forwards the packet to the destination.
ICMP redirects are only generated for IPv4 unicast packets that are "slowpath" forwarded by the CPU.
That is, IPv4 packets that contain IP Options, or packets whose Destination IP is not in the Layer 3
forwarding hardware table.
Example
The following example enables the generation of ICMP redirect messages on all VLANs:
enable icmp redirects
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the modification of route table information when an ICMP redirect message is received.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
If the switch has a route to a destination network, the switch uses that router as the gateway to forward
the packets to. If that router knows about a better route to the destination, and the next hop is in the
same subnet as the originating router, the second router sends an ICMP redirect message to the
originating router. If ICMP useredirects is enabled, the switch adds a route to the destination network
using the third router as the next hop and starts sending the packets to the third router.
Example
The following example enables the modification of route table information:
enable icmp useredirects
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable identity-management
enable identity-management
Description
Enables the identity management feature, which tracks users and devices that connect to the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Only admin-level users can execute this command.
After identity management is enabled, the software creates two dynamic ACL rules named
idm_black_list and idm_white_list. These rules are removed if identity management is disabled.
Note
FDB entries are flushed on identity management enabled ports when this command is
executed.
Example
The following command enables the identity management feature:
enable identity-management
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables a timer that disconnects Telnet, SSH2, and console sessions after a period of inactivity (20
minutes is default).
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Timeout 20 minutes.
Usage Guidelines
You can use this command to ensure that a Telnet, Secure Shell (SSH2), or console session is
disconnected if it has been idle for the required length of time.
To change the period of inactivity that triggers the timeout for a Telnet, SSH2, or console session, use
the configure timezone command.
To view the status of idle timeouts on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
idle timeouts. You can configure the length of the timeout interval.
Example
The following command enables a timer that disconnects any Telnet, SSH2, and console sessions after
20 minutes of inactivity:
enable cli idle-timeout
History
This command was first available in ExtremeXOS 10.1.
The cli keyword was added and the idletimeout keyword was changed to idle-timeout in
ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable igmp
enable igmp {vlan vlan name } {IGMPv1 | IGMPv2 | IGMPv3}
Description
Enables IGMP on a router interface. If no VLAN is specified, IGMP is enabled on all router interfaces.
Syntax Description
vlan name Specifies a VLAN name.
IGMPv1 Specifies the compatibility mode as IGMPv1.
IGMPv2 Specifies the compatibility mode as IGMPv2.
IGMPv3 Specifies the compatibility mode as IGMPv3.
Default
Enabled, set to IGMPv2 compatibility mode.
Usage Guidelines
IGMP is a protocol used by an IP host to register its IP multicast group membership with a router.
Periodically, the router queries the multicast group to see if the group is still in use. If the group is still
active, IP hosts respond to the query, and group registration is maintained.
IGMPv2 is enabled by default on the switch. However, the switch can be configured to disable the
generation and processing of IGMP packets. IGMP should be enabled when the switch is configured to
perform IP multicast routing.
Example
The following example enables IGMPv2 on the VLAN accounting:
enable igmp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
The IGMPv1, IGMPv2, and IGMPv3 options were added in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables IGMP snooping on one or all VLANs.
Syntax Description
forward-mcrouter-only Specifies that the switch forward all multicast traffic to the
multicast router only.
name Specifies a VLAN or VMAN on which to enable IGMP
snooping.
with-proxy vr vrname Controls how join and leave messages are forwarded from
the specified virtual router. If this option is specified, one
join message per query is forwarded, and a leave message
is forwarded only if it is from the last receiver on the VLAN.
Default
Enabled.
Usage Guidelines
This command applies to both IGMPv2 and IGMPv3.
IGMP snooping is enabled by default on the switch. If you are using multicast routing, IGMP snooping
can be enabled or disabled. If IGMP snooping is disabled, all IGMP and IP multicast traffic floods within a
given VLAN or VMAN.
The forward-mcrouter-only, vlan, and with-proxy options control three separate and
independent features. You can manage one feature at a time with this command, and you can enter the
command multiple times as needed to control each feature. For example, you can enter the command
twice to enable both the forward-mcrouter-only and with-proxy options.
If a VLAN or VMAN name is specified with this command, IGMP snooping is enabled only on that VLAN
or VMAN. If no options are specified, IGMP snooping is enabled on all VLANs.
Note
IGMP snooping is not supported on SVLANs on any platform.
The with-proxy option enables the IGMP snooping proxy feature, which reduces the number of join and
leave messages forwarded on the virtual router as described in the table above. This feature is enabled
by default.
An optional optimization for IGMP snooping is the strict recognition of routers only if the remote
devices are running a multicast protocol. Two IGMP snooping modes are supported:
• The forward-mcrouter-only mode forwards all multicast traffic to the multicast router (that is,
the router running PIM, DVMRP or CBT).
• When not in the forward-mcrouter-only mode, the switch forwards all multicast traffic to any IP
router (multicast or not), and any active member port to the local network that has one or more
subscribers.
Note
The forward-mcrouter-only mode for IGMP snooping is enabled/disabled on a switch-
wide basis, not on a per-VLAN basis. In other words, all the interfaces enabled for IGMP
snooping are either in the forward-mcrouter-only mode or in the non-forward-mcrouter-
only mode, and not a mixture of the two modes.
To change the snooping mode you must disable IP multicast forwarding. To disable IP multicast
forwarding, use the command:
disable ipmcforwarding {vlan name}
To change the IGMP snooping mode from the non-forward-mcrouter-only mode to the forward-
mcrouter-only mode, use the commands:
disable ipmcforwarding
To change the IGMP snooping mode from the forward-mcrouter-only mode to the non-forward-
mcrouter-only mode, use the commands:
disable ipmcforwarding
Example
The following command enables IGMP snooping on the switch:
enable igmp snooping
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the IGMP snooping fast leave feature on the specified VLAN.
Syntax Description
name Specifies a VLAN.
Default
Disabled.
Usage Guidelines
The fast leave feature operates only with IGMPv2.
To view the fast leave feature configuration, use the show configuration msmgr command. This
show command displays the fast leave configuration only when the feature is enabled.
Example
The following example enables the IGMP snooping fast leave feature on the default VLAN:
enable igmp snooping "Default" fast-leave
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.topic/ph
"/>
Description
Enables the IGMP snooping proxy. The default setting is enabled.
Syntax Description
vr_name Specifies a VR.
Default
Enabled.
Usage Guidelines
Enabling the proxy allows the switch to suppress the duplicate join requests on a group to forward to
the connected Layer 3 switch. The proxy also suppresses unnecessary IGMP leave messages so that
they are forwarded only when the last member leaves the group.
This command can be used for troubleshooting purpose. It should be enabled for normal network
operation. The command does not alter the snooping setting.
This feature can be enabled when IGMPv3 is enabled; however, it is not effective for IGMPv3.
Example
The following command enables the IGMP snooping proxy:
enable igmp snooping with-proxy
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IGMP snooping feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables IGMP SSM mapping on a VR.
Syntax Description
vr-name Specifies a virtual router name. If the VR name is omitted, the switch
uses the VR specified by the current CLI VR context.
Default
Disabled on all interfaces.
Usage Guidelines
Configure the range of multicast addresses for PIM SSM before you enable IGMP SSM mapping. IGMP
SSM mapping operates only with IPv4.
Example
The following example enables IGMP-SSM mapping on the VR in the current CLI VR context:
enable igmp ssm-map
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
enable inline-power
enable inline-power [fast | perpetual]
Description
Enables PoE, fast PoE, and perpetual PoE to all ports.
Syntax Description
fast Deliver PoE power to devices at the time of switch power on without
waiting for boot up based on last saved PoE state. The default is
disabled.
perpetual Preserves PoE power delivery to devices during reboot. Perpetual PoE
is a switch-wide setting. The default is disabled.
Default
By default:
• PoE is enabled.
• Fast PoE is disabled.
• Perpetual PoE is disabled.
Usage Guidelines
You can control whether inline power is provided to the system by using the disable inline-
power command and the enable inline-power command. By default, inline power provided to all
ports is enabled. Additionally, you can opt to deliver PoE power to devices at the time of switch power
on without waiting for boot up (fast PoE) based on last saved PoE state. You can also elect to preserve
PoE power delivery to devices during reboot (perpetual PoE). The default for both PoE options is
disabled.
Enabling inline power starts the PoE detection process used to discover, classify, and power remote PDs.
Disabling inline power using the disable inline-power command does not affect the data traffic
traversing the port. And, disabling the port using the disable port command does not affect the
inline power supplied to the port.
Note
Inline power cannot be delivered to connected PDs unless the switch is powered on.
Example
The following command enables inline power currently provided to all ports:
# enable inline-power
History
This command was first available in ExtremeXOS 11.1.
The fast and perpetual PoE options were added in ExtremeXOS 30.3.
Platform Availability
This command is available on the PoE devices listed in Extreme Networks PoE Devices.
The fast and perpetual options are only available on the ExtremeSwitching X465 and X435 series
switches.
Description
Enables PoE power currently provided to all ports or to specified ports.
Syntax Description
all Enables inline power to all ports on the switch.
port_list Enables inline power to the specified ports.
Default
Enable.
Usage Guidelines
Disabling inline power to a port immediately removes power to any connected PD. By default, inline
power provided to all ports is enabled.
Disabling inline power using the disable inline-power command does not affect the data traffic
traversing the port. And, disabling the port using the disable port command does not affect the
inline power supplied to the port.
Example
The following command enables inline power to ports 4 and 5 on a switch:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the PoE devices listed in Extreme Networks PoE Devices.
Description
Enables PoE power, and fast and perpetual PoE power to the specified node (slot) on SummitStacks.
Syntax Description
slot Enables inline power to specified slot.
fast Deliver PoE power to devices at the time of switch power on without
waiting for boot up based on last saved PoE state. The default is
disabled.
perpetual Preserves PoE power delivery to devices during reboot. Perpetual PoE
is a switch-wide setting. The default is disabled.
Default
By default:
• PoE is enabled.
• Fast PoE is disabled.
• Perpetual PoE is disabled.
Usage Guidelines
Disabling inline power to a slot immediately removes power to any connected PDs. By default, inline
power provided to all slots is enabled. Additionally, you can opt to deliver PoE power to devices at the
time of switch power on without waiting for boot up (fast PoE) based on last saved PoE state. You can
also elect to preserve PoE power delivery to devices during reboot (perpetual PoE). The default for both
PoE options is disabled.
To deliver inline power to slots, you must reserve power for that slot using the configure inline-
power budget command. By default, each PoE module has 50 W of power reserved for inline power.
Disabling inline power using the disable inline-power command does not affect the data traffic
traversing the slot. And, disabling the slot using the disable slot command does not affect the
inline power supplied to the slot.
If you do not specify a slot number, the command operates on all active nodes in the stack. This
command operates only on nodes in the active topology.
Example
The following command makes inline power available to slot 3:
# enable inline-power slot 3
History
This command was first available in ExtremeXOS 11.1.
The fast and perpetual PoE options were added in ExtremeXOS 30.3.
Platform Availability
This command is available on SummitStack when the stack contains switches listed in Extreme
Networks PoE Devices.
The fast and perpetual options are only available on the ExtremeSwitching X465 and X435 series
switches.
Description
Enables checking if the ARP request source IP address is within the range of the local interface or VLAN
domain.
Syntax Description
vr_name Specifies a VR or VRF.
Default
Enabled.
Usage Guidelines
If you do not specify a VR or VRF, the command applies to the current VR context.
Example
The following example enables IP ARP checking:
enable iparp checking
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables gratuitous ARP protection on the specified VLAN.
Syntax Description
vlan_name Specifies the VLAN.
vlan_list Specifies a VLAN list of IDs.
Default
By default, gratuitous ARP is disabled.
Usage Guidelines
Beginning with ExtremeXOS 11.6, this command replaces this command for configuring gratuitous ARP.
Hosts can launch man-in-the-middle attacks by sending out gratuitous ARP requests for the router's IP
address. This results in hosts sending their router traffic to the attacker, and the attacker forwarding that
data to the router. This allows passwords, keys, and other information to be intercepted.
To protect against this type of attack, the router will send out its own gratuitous ARP request to
override the attacker whenever a gratuitous ARP broadcast with the router's IP address as the source is
received on the network.
Example
The following example enables gratuitous ARP protection for VLAN corp:
enable iparp gratuitous protect vlan corp
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables IP ARP to refresh its IP ARP entries before timing out.
Syntax Description
vr_name Specifies a VR or VRF.
Default
Enabled.
Usage Guidelines
If ARP refresh is enabled, the switch resends ARP requests for the host at 3/4 of the configured ARP
timer value.
For example: If the ARP timeout is set to 20 minutes, the switch attempts to resend an ARP request for
the host when the host entry is at 15 minutes. If the host replies, the ARP entry is reset back to 0, and
the timer starts again.
If you do not specify a VR or VRF, the command applies to the current VR context.
Example
The following example enables IP ARP refresh:
enable iparp refresh
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables IPFIX on the ports.
Syntax Description
port_list Specifies the ports.
all Specifies all ports.
ipv4 Meter IPv4 traffic.
ipv6 Meter IPv6 traffic.
non-ip Meter non-IP layer 2 traffic.
all_traffic Meter IPv4, IPv6, and non-IP traffic. This is the default.
Default
The default is disabled. When enabled, the default is all_traffic.
Example
The following command enables IPFIX metering of IPv6 traffic on port 2:1:
# enable ip-fix ipv6 ports 2:1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on ExtremeSwitching X460-G2 series switches.
Description
Enables IPv6 routing VLANs. If no argument is provided, enables IPv6 routing for all VLANs and tunnels
that have been configured with an IPv6 address on the current VR or VRF.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
vr_name Specifies a VR or VRF.
Default
Disabled.
Usage Guidelines
When new IPv6 interfaces are added, IPv6 forwarding is disabled by default.
Example
The following example enables forwarding of IPv6 traffic for all VLANs in the current VR context with
IPv6 addresses:
enable ipforwarding ipv6
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
enable ipforwarding
enable ipforwarding {ipv4 | broadcast} {vlan vlan_name}
Description
Enables IPv4 routing or IPv4 broadcast forwarding for one or all VLANs. If no argument is provided,
enables IPv4 routing for all VLANs that have been configured with an IP address on the current VR or
VRF.
Syntax Description
ipv4 Specifies IPv4 forwarding.
broadcast Specifies broadcast IP forwarding.
vlan_name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
IP forwarding must first be enabled before IP broadcast forwarding can be enabled. When new IP
interfaces are added, IP forwarding (and IP broadcast forwarding) is disabled by default.
The broadcast, ignore-broadcast, and fast-directbroadcast options each prompt with a warning
message when executed while the IP forwarding on the corresponding VLAN is disabled. The hardware
and software are NOT programmed until IP forwarding is enabled on the VLAN.
The fast-direct-broadcast and ignore-broadcast options cannot be enabled simultaneously. These are
mutually exclusive.
The broadcast option can be enabled in conjunction with fast-direct-broadcast and ignore-broadcast.
Example
The following command enables forwarding of IP traffic for all VLANs in the current VR context with IP
addresses:
enable ipforwarding
The following command enables forwarding of IP broadcast traffic for a VLAN named accounting:
History
This command was first available in ExtremeXOS 10.1.
The ignore-broadcast and the fast-direct-broadcast keywords were added in ExtremeXOS 12.0.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.
Description
Enables IPv6 multicast forwarding on a router interface.
Syntax Description
name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
If no options are specified, all configured IPv6 interfaces are affected. When new IPv6 interfaces are
created, IPv6 multicast forwarding is disabled by default.
Example
The following example enables IPv6 multicast forwarding on VLAN accounting:
enable ipmcforwarding ipv6 vlan accounting
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv6 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
enable ipmcforwarding
enable ipmcforwarding {vlan name}
Description
Enables IP multicast forwarding on an IP interface.
Syntax Description
name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
If no options are specified, all configured IP interfaces are affected. When new IP interfaces are added,
IPMC forwarding is disabled by default.
Example
The following example enables IPMC forwarding on the VLAN accounting:
enable ipmcforwarding vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the BFD client to provide services for IPv4 static routes.
Syntax Description
ip_addr Specifies the IPv4 address of a neighbor to which BFD services are to
be provided.
vrname Specifies the VR or VRF name for which BFD services are being
enabled.
Default
Disabled.
Usage Guidelines
To enable BFD services to an IPv4 neighbor, you must do the following:
• Execute this command on the switches at both ends of the link.
• Enable BFD for specific IPv4 static routes with the configure iproute add [destination
network] [gateway] bfd command.
Once a BFD session is established between two neighbors, BFD notifies the Route Manager process of
the BFD session status and any changes. If other BFD clients (such as the MPLS BFD client) are
configured between the same neighbors, the clients share a single session between the neighbors.
Example
The following example enables BFD client protection for communications with neighbor 10.10.10.1:
# enable iproute bfd 10.10.10.1
History
This command was first available in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Turns on "strict" Bidirectional Forwarding Detection (BFD) session control, which brings down the static
route during switch reboot if the static route nexthop BFD session is in the INIT state.
Syntax Description
protection Enables or disables route protection.
bfd BFD protect static routes to next hop gateway.
strict Enables considering that protected static routes are not up if the BFD
session is in INIT state. Default is disabled.
Default
By default, strict BFD session control is disabled.
Usage Guidelines
If the BFD session is down, but BFD protected static route is still in the routing table after reboot, the
BFD session is never established, because during reboot, the BFD session is in the INIT state, and the
static route is brought up without considering BFD session state. This can cause traffic loss since the link
to the gateway actually is down. This command turns down the static route during reboot if BFD
session is in the INIT state. This behavior is different from other BFD clients (such as OSPF) in the same
INIT situation. A reboot is required to make the command take effect.
Example
The following example enables BFD strict session control:
# enable iproute bfd strict
WARNING: Please reboot the switch for the strict BFD to take effect.
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Enables IPv4 route compression.
Syntax Description
vrname VR or VRF name for which the IP route compression is being enabled.
Default
Enabled.
Usage Guidelines
Enables IPv4 route compression for the specified VR or VRF. If the VR name is not specified, route
compression is enabled for the VR context from which the CLI command is issued.
The command applies a compression algorithm on each of the IP prefixes in the routing table.
Essentially, routes with longer network masks might not be necessary if they are a subset of other
routes with shorter network masks using the same gateway(s). When IP route compression is enabled,
these unnecessary routes are not provided to the Forwarding Information Base (FIB).
Example
The following example enables IP route compression:
enable iproute compression
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables IPv6 route compression.
Syntax Description
vrname Specifies a VR or VRF.
Default
If no VR name is specified, the current CLI context is used.
Usage Guidelines
This command enables IPv6 route compression for the VR. This command applies a compression
algorithm to each IPv6 prefix in the IPv6 prefix database.
Example
The following example enables IPv6 route compression in the current VR context.
enable iproute ipv6 compression
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables IP forwarding over MPLS LSPs for the default VR.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables IP forwarding over MPLS LSPs for the default VR. When enabled, LSP next hops
can be used to tunnel IP traffic across the MPLS network. By default, IP forwarding over MPLS LSPs is
disabled.
Example
The following command enables IP forwarding over MPLS LSPs:
enable iproute mpls-next-hop
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Globally enables ping protection for static routes added with ping protection for IPv4 and IPv6.
Syntax Description
ipv4 Specifies IPv4 (default).
ipv6 Specifies IPv6.
protection Enables route protection.
ping Globally enables ping protection for static routes added with ping
protection (default is enabled).
Default
Enabled is the default. If not specified, IPv4 is the default.
Example
The following example enables ping protection for static routes added with ping protection for IPv4:
enable iproute ipv4 protection ping
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
All platforms with an Edge license or greater.
Description
Enables load sharing if multiple routes to the same destination are available. When multiple routes to
the same destination are available, load sharing can be enabled to distribute the traffic to multiple
destination gateways. Only paths with the same lowest cost are shared.
Syntax Description
vrname VR or VRF name for which IP route sharing is being enabled.
Default
Disabled.
Usage Guidelines
IP route sharing allows multiple equal-cost routes to be used concurrently. IP route sharing can be used
with static routes or with OSPF, BGP, or IS-IS routes. In OSPF, BGP, and IS-IS, this capability is referred
to as ECMP routing.
Configure static routes and OSPF, BGP, or IS-IS as you would normally. The ExtremeXOS software
supports route sharing across up to 64 way ECMP for OSPFv2, BGP, and static routes, or up to 64-way
ECMP for OSPFv3 and 8 way for ISIS. However, on SummitStack, and ExtremeSwitching series switches,
by default, up to four routes are supported. To support 2, 4, 8, 16, 32, or 64 routes on these switches, use
the following command:
configure iproute sharing max-gateways max_gateways
If a VR is not specified, this command enables IP route sharing in the current VR context.
Example
The following example enables load sharing for multiple routes:
enable iproute sharing
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X450-G2, X460-G2, X670-G2X465, X590, X620,
X690, X870 series switches.
Description
Enables ICMP size and fragment checking.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command enables ICMP size and fragment checking. This checking takes effect for both IPv4 and
IPv6 TCP packets. When enabled, the switch drops ICMP packets if one of following condition is true:
• Fragmented ICMP packets.
• IPv4 ICMP pings packets with payload size greater than the maximum IPv4 ICMP-allowed size. (The
maximum allowed size is configurable.)
• IPv6 ICMP ping packets with payload size > the maximum IPv6 ICMP-allowed size. (The maximum
allowed size is configurable.)
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables source and destination IP address checking.
Syntax Description
slot Specifies the slot.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command enables source and destination IP addresses checking. This checking takes effect for
both IPv4 and IPv6 packets. When enabled, the switch drops IPv4/IPv6 packets if its source IP address
are the same as the destination IP address. In most cases, the condition of source IP address being the
same as the destination IP address indicates a Layer 3 protocol error. (These kind of errors are found in
LAND attacks.)
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables TCP and UDP ports checking.
Syntax Description
tcp Specifies that the TCP port be enabled for checking.
udp Specifies that the UDP port be enabled for checking.
both Specifies both the TCP and UDP ports be enabled for checking.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command enabled TCP and UDP ports checking. This checking takes effect for both IPv4 and IPv6
TCP and UDP packets. When enabled, the switch drops TCP and UDP packets if its source port is the
same as its destination port. In most cases, when the condition of source port is the same as that of the
destination port, it indicates a Layer4 protocol error. (This type of error can be found in a BALT attack.)
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables protocol anomaly notification.
Syntax Description
log Specifies the switch to send the notification to a log file.
snmp Specifies the switch to send an SNMP trap when an event occurs.
cache Specifies the switch to send the notification to cache.
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command enables anomaly notification. When enabled, any packet failed to pass enabled protocol
checking is sent to XOS Host CPU and notifies the user. There are three different types of notifications:
• log: The anomaly events are logged into EMS log.
• snmp: The anomaly events generate SNMP traps.
• cache: The most recent and unique anomaly events are stored in memory for review and
investigation.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables TCP flag checking.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command Enables TCP flag checking. This checking takes effect for both IPv4 and IPv6 TCP
packets. When enabled, the switch drops TCP packets if one of following condition is true:
• TCP SYN flag==1 and the source port<1024
• TCP control flag==0 and the sequence number==0
• TCP FIN, URG, and PSH bits are set, and the sequence number==0
• TCP SYN and FIN both are set.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables TCP fragment checking.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This command enables TCP fragment checking. This checking takes effect for IPv4/IPv6. When it is
enabled, the switch drops TCP packets if one of following condition is true:
• For the first IPv4 TCP fragment (its IP offset field==0), if its TCP header is less than the minimum
IPv4 TCP header allowed size.
• For the first IPv6 TCP fragment (its IP offset field==0), if its TCP header is less than the minimum
IPv6 TCP header allowed size.
• If its IP offset field==1 (for IPv4 only).
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables all anomaly checking options.
Syntax Description
slot Specifies the slot to be used.
all Specifies all IP addresses, or all IP addresses in a particular state.
Default
The default is disabled.
Usage Guidelines
This commands enables all anomaly checking options, including IP address, UDP/TCP port, TCP flag and
fragment, and ICMP anomaly checking.
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables gratuitous ARP protection on one or all VLANs on the switch.
Syntax Description
all Specifies all VLANs configured on the switch.
vlan_name Specifies the VLAN.
dynamic Configuration options for dynamically created VLANs.
Default
By default, gratuitous ARP protection is disabled.
Usage Guidelines
Beginning with ExtremeXOS 11.6, this command replaces the enable iparp gratuitous
protect command.
Hosts can launch man-in-the-middle attacks by sending out gratuitous ARP requests for the router's IP
address. This results in hosts sending their router traffic to the attacker, and the attacker forwarding that
data to the router. This allows passwords, keys, and other information to be intercepted.
To protect against this type of attack, the router will send out its own gratuitous ARP request to
override the attacker whenever a gratuitous ARP broadcast with the router's IP address as the source is
received on the network.
Beginning with ExtremeXOS 11.6, if you enable both DHCP secured ARP and gratuitous ARP protection,
the switch protects its own IP address and those of the hosts that appear as secure entries in the ARP
table.
To protect the IP addresses of the hosts that appear as secure entries in the ARP table, use the following
commands to enable DHCP snooping, DHCP secured ARP, and gratuitous ARP on the switch:
• enable ip-security dhcp-snooping {vlan} vlan_name ports [all | ports]
violation-action [drop-packet {[block-mac | block-port]
[durationduration_in_seconds | permanently] | none]}] {snmp-trap}
• enable ipsecurity arp learning learn-from-arp
• enable ip-security arp gratuitous-protection {vlan} [all | vlan_name]
Example
The following command enables gratuitous ARP protection for VLAN corp:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables ARP learning for the specified VLAN and member ports.
Syntax Description
vlan_name Specifies the name of the VLAN to which this rule applies.
dynamic Configuration options for dynamically created VLANs.
all Specifies all ingress ports.
ports Specifies one or more ingress ports.
Default
By default, ARP learning is enabled.
Usage Guidelines
ARP is part of the TCP/IP suite used to associate a device’s physical address (MAC address) with its
logical address (IP address). The switch broadcasts an ARP request that contains the IP address, and
the device with that IP address sends back its MAC address so that traffic can be transmitted across the
network. The switch maintains an ARP table (also known as an ARP cache) that displays each MAC
address and its corresponding IP address.
By default, the switch builds its ARP table by tracking ARP requests and replies, which is known as ARP
learning.
To view the ARP table, including permanent and DHCP secured ARP entries, use the following
command:
show iparp {ip_addre |mac | vlanvlan_name | permanent} {vrvr_name}
Example
The following command enables ARP learning on port 1:1 of the VLAN learn:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables DHCP secured ARP learning for the specified VLAN and member ports.
Syntax Description
dynamic Configuration options for dynamically created VLANs.
vlan_name Specifies the name of the VLAN to which this rule applies.
all Specifies all ingress ports.
ports Specifies one or more ingress ports.
Default
By default, DHCP secured ARP learning is disabled.
Usage Guidelines
Use this command to configure the switch to add the MAC address and its corresponding IP address to
the ARP table as a secure ARP entry. The switch does not update secure ARP entries, regardless of the
ARP requests and replies seen by the switch. DHCP secured ARP is linked to the “DHCP snooping”
feature. The same DHCP bindings database created when you enabled DHCP snooping is also used by
DHCP secured ARP to create secure ARP entries. The switch only removes secure ARP entries when the
corresponding DHCP entry is removed from the trusted DHCP bindings database.
Note
If you enable DHCP secured ARP on the switch, ARP learning continues, which allows insecure
entries to be added to the ARP table.
The default ARP timeout (configure iparp timeout) and ARP refresh (enable iparp refresh) settings do
not apply to DHCP secured ARP entries. The switch removes DHCP secured ARP entries upon any
DHCP release packet received from the DHCP client.
To view the ARP table, including permanent and DHCP secured ARP entries, use the following
command:
show iparp {ip_address |mac | vlanvlan_name | permanent} {vrvr_name}
Example
The following command enables DHCP secured ARP learning on port 1:1 of the VLAN learn and uses the
default polling and retry intervals:
enable ip-security arp learning learn-from-dhcp vlan learn ports 1:1
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables ARP validation for the specified VLAN and member ports.
Syntax Description
destination-mac Specifies that the switch checks the ARP payload for the MAC
destination address in the Ethernet header and the receiver’s host
address in the ARP response.
source-mac Specifies that the switch checks ARP requests and responses for the
MAC source address in the Ethernet header and the sender’s host
address in the ARP payload.
ip Specifies the switch checks the IP address in the ARP payload and
compares it to the DHCP bindings database. If the IP address does
exist in the DHCP bindings table, the switch verifies that the MAC
address is the same as the sender hardware address in the ARP
request. If not, the packet is dropped.
dynamic Configuration options for dynamically created VLANs.
vlan_id VLAN ID tag between 1 and 4,094.
vlan_name Specifies the name of the VLAN to which this rule applies.
all Specifies all ports to participate in ARP validation.
ports Specifies one or more ports to participate in ARP validation.
drop-packet Specifies that the switch drops the invalid ARP packet.
block-port Indicates that the switch blocks invalid ARP requests on the specified
port.
duration_in_seconds Specifies the switch to temporarily disable the specified port upon
receiving an invalid ARP request.
The range is seconds.
permanently Specifies the switch to permanently disable the port upon receiving
an invalid ARP request.
snmp-trap Specifies the switch to send an SNMP trap when an event occurs.
Default
By default, ARP validation is disabled.
Usage Guidelines
The violation action setting determines what action(s) the switch takes when an invalid ARP is received.
Depending on your configuration, the switch uses the following methods to check the validity of
incoming ARP packets:
• Drop packet—The switch confirms that the MAC address and its corresponding IP address are in the
DHCP binding database built by DHCP snooping. This is the default behavior when you enable ARP
validation. If the MAC address and its corresponding IP address are in the DHCP bindings database,
the entry is valid. If the MAC address and its corresponding IP address are not in the DHCP bindings
database, the entry is invalid, and the switch drops the ARP packet.
• IP address—The switch checks the IP address in the ARP payload. If the switch receives an IP
address in the ARP payload that is in the DHCP binding database, the entry is valid. If the switch
receives an IP address that is not in the DHCP binding database, for example 255.255.255.255 or an
IP multicast address, the entry is invalid or unexpected.
• Source MAC address—The switch checks ARP requests and responses for the source MAC address in
the Ethernet header and the sender’s host address in the ARP payload. If the source MAC address
and senders’s host address are the same, the entry is valid. If the source MAC source and the
sender’s host address are different, the entry is invalid.
• Destination MAC address—The switch checks the ARP payload for the destination MAC address in
the Ethernet header and the receiver’s host address. If the destination MAC address and the target’s
host address are the same, the entry is valid. If the destination MAC address and the target’s host
address are different, the entry is invalid.
Any violation that occurs causes the switch to generate an EMS log message. You can configure to
suppress the log messages by configuring EMS log filters.
Example
The following example enables ARP validation on port 1:1 of the VLAN valid:
enable ip-security arp validation vlan valid ports 1:1 drop-packet
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables download and upload of DHCP bindings.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
The command allows you to enable the download and upload of the DHCP bindings, essentially
enabling the DHCP binding functionality. The default is disabled.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables DHCP snooping for the specified VLAN and ports.
Syntax Description
vlan_name Specifies the name of the DHCP-snooping VLAN. Create and
configure the VLAN before enabling DHCP snooping.
dynamic Configuration options for dynamically created VLANs.
all Specifies all ports to receive DHCP packets.
ports Specifies one or more ports to receive DHCP packets.
drop-packet Indicates that the switch drop the rogue DHCP packet received on the
specified port.
block-mac Indicates that the switch blocks rogue DHCP packets from the
specified MAC address on the specified port. The MAC address is
added to the DHCP bindings database.
block-port Indicates that the switch blocks rogue DHCP packets on the specified
port. The port is added to the DHCP bindings database.
duration_in_seconds Specifies that the switch temporarily disable the specified port upon
receiving a rogue DHCP packet.
The range is seconds.
permanently Specifies that the switch to permanently disable the specified port
upon receiving a rogue DHCP packet.
none Specifies that the switch takes no action when receiving a rogue
DHCP packet; the switch does not drop the packet.
snmp-trap Specifies the switch to send an SNMP trap when an event occurs.
Default
By default, DHCP snooping is disabled.
Usage Guidelines
Use this command to enable DHCP snooping on the switch.
Note
Snooping IP fragmented DHCP packets is not supported.
The violation action setting determines what action(s) the switch takes when a rouge DHCP server
packet is seen on an untrusted port or the IP address of the originating server is not among those of the
configured trusted DHCP servers. The DHCP server packets are DHCP OFFER, ACK and NAK. The
following list describes the violation actions:
• block-mac—The switch automatically generates an ACL to block the MAC address on that port. The
switch does not blackhole that MAC address in the FDB. The switch can either temporarily or
permanently block the MAC address.
• block-port—The switch blocks all incoming rogue DHCP packets on that port. The switch disables
the port either temporarily or permanently to block the traffic on that port.
• none—The switch takes no action to drop the rogue DHCP packet or block the port, and so on. In
this case, DHCP snooping continues to build and manage the DHCP bindings database and DHCP
forwarding will continue in hardware as before.
Any violation that occurs causes the switch to generate an EMS log message. You can configure to
suppress the log messages by configuring EMS log filters.
Example
The following example enables DHCP snooping on the switch and has the switch block DHCP packets
from port 1:1:
enable ip-security dhcp-snooping vlan snoop ports 1:1 violation-action drop-packet block-
port
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the source IP lockdown feature on one or more ports.
Syntax Description
all Specifies all ports for which source IP lockdown should be enabled.
ports Specifies one or more ports for which source IP lockdown should be
enabled.
Default
By default, source IP lockdown is disabled on the switch.
Usage Guidelines
Note
Source-IP lockdown cannot be enabled on load sharing ports.
Source IP lockdown prevents IP address spoofing by automatically placing source IP address filters on
specified ports. If configured, source IP lockdown allows only traffic from a valid DHCP-assigned
address obtained by a DHCP snooping-enabled port or an authenticated static IP address to enter the
network.
To configure source IP lockdown, you must enable DHCP snooping on the ports connected to the DHCP
server and DHCP client before you enable source IP lockdown. You must enable source IP lockdown on
the ports connected to the DHCP client, not on the ports connected to the DHCP server. The same
DHCP bindings database created when you enable DHCP snooping is also used by the source IP
lockdown feature to create ACLs that permit traffic from DHCP clients. All other traffic is dropped. In
addition, the DHCP snooping violation action setting determines what action(s) the switch takes when a
rouge DHCP server packet is seen on an untrusted port.
Example
The following command enables source IP lockdown on ports 1:1 and 1:4:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable irdp
enable irdp {vlan name}
Description
Enables the generation of ICMP router advertisement messages on one or all VLANs.
Syntax Description
name Specifies a VLAN name.
Default
Disabled.
Usage Guidelines
ICMP Router Discovery Protocol (IRDP) allows client machines to determine what default gateway
address to use. The switch sends out IP packets at the specified intervals identifying itself as a default
router. IRDP enabled client machines use this information to determine which gateway address to use
for routing data packets to other networks.
Example
The following example enables IRDP on VLAN "accounting":
enable irdp vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms that use the Edge, Advanced Edge, or Core license. For
information on the licenses available for each platform, see the ExtremeXOS 30.5 Feature License
Requirements document.link-22.1"/>
enable isis
enable isis {area area_name}
Description
This command enables the specified IS-IS router process on the current virtual router.
Syntax Description
area_name Specifies the name of the IS-IS router process to be enabled.
Default
Disabled.
Usage Guidelines
If no area name is specified, all IS-IS router processes on the current virtual router are enabled. Once a
router process is enabled, IS-IS PDUs are sent and processed provided that the following conditions are
met:
• The router process has a system ID and area address configured.
• At least one associated VLAN interface has IPv4 or IPv6 forwarding enabled.
This command has no effect on router processes that are already enabled.
Example
The following command enables the IS-IS process named areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables the checking of the following TLVs when forming adjacencies: Protocols
Supported and IP Interface Address.
Syntax Description
area_name Specifies the name of the IS-IS router process that should perform the
adjacency check.
ipv4 Specifies that the adjacency check is to be performed in IPv4
interfaces.
ipv6 Specifies that the adjacency check is to be performed in IPv6
interfaces.
Default
ipv4/ipv6: Enabled.
Usage Guidelines
When enabled for IPv4, IPv4 adjacencies may only be formed with neighbors whose connected
interface supports IPv4 and is on the same subnet as the receiving interface. Similarly, when enabled for
IPv6, IPv6 adjacencies may only be formed with neighbors whose connected interface supports IPv6
and is on the same link local subnet as the receiving interface. For each enabled protocol, if both criteria
are not met, received Hello PDUs are discarded. By default, IPv4 routing is affected by this command.
The optional ipv6 keyword enables adjacency checking for IPv6 interfaces on the specified router
process. It may be necessary to disable adjacency checking in multi-topology environments where a
neighbor may only form an IPv4 or an IPv6 adjacency, but not both.
Example
The following command directs the IS-IS process named areax to perform adjacency checks on IPv6
interfaces:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables the dynamic hostname feature, which displays either the area name or the
SNMP name instead of a IS-IS router system ID in select show commands.
Syntax Description
area_name Specifies the name of the IS-IS process for which the dynamic-
hostname feature is to be enabled.
area-name Specifies that affected show commands display the area name instead
of the IS-IS system ID.
snmp-name Specifies that affected show commands display the SNMP name
instead of the IS-IS system ID.
Default
Disabled.
Usage Guidelines
This command enables support for the dynamic hostname exchange feature defined by RFC 2763.
Example
The following command enables the display of IS-IS area names:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables IPv4 route redistribution into IS-IS for direct, static, BGP, RIP, or OSPF routes.
Syntax Description
area_name Specifies the IS-IS router process that receives the exported routes.
ipv4 Specifies that the redistributed routes are for use in IPv4 IS-IS routing.
route-type Selects the type of route for export. The valid route types are: bgp,
direct, e-bgp, i-bgp, ospf, ospf-extern1, ospf-extern2, ospf-inter, ospf-
intra, rip, and static.
policy Specifies a policy that controls how routes are redistributed into IS-IS.
mvalue Specifies a metric to assign to the routes exported to IS-IS. The range
is 0 to 4261412864.
metric-type [internal Specifies a metric type, which is internal or external, to assign to the
| external] routes exported to IS-IS.
level [1 | 2 | Limits the use of redistributed routes to level 1, level 2, or both.
both-1-and-2]
Default
All types are disabled.
Usage Guidelines
If wide metrics are enabled, redistributed routes are included in the Extended IP Reachability TLV in
LSPs. If wide metrics are not enabled, redistributed routes are added to IP External Reachability TLV in
LSPs. For policies, the nlri match attribute is supported, and the cost, cost-type internal, permit, and
deny set attributes are supported.
Example
The following command exports RIP routes to IS-IS and assigns the internal metric type and metric
value 5 to the redistributed routes:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables IPv6 route redistribution into IS-IS for direct, static, RIPng, or OSPFv3 routes.
Syntax Description
area_name Specifies the IS-IS router process that receives the exported routes.
route-type Selects the type of route for export. The valid route types are: direct,
ospfv3, ospfv3-extern1, ospfv3-extern2, ospfv3-inter, ospfv3-intra,
ripng, bgp, and static.
policy Specifies a policy that controls how routes are redistributed into IS-IS.
mvalue Specifies a metric to assign to the routes exported to IS-IS. The range
is 0 to 4261412864.
level [1 | 2 | Limits the use of redistributed routes to level 1, level 2, or both.
both-1-and-2]
Default
All types are disabled.
Usage Guidelines
If a policy is specified, the policy is used to determine what specific routes are redistributed into IS-IS.
Otherwise, the specified metric and type are assigned to the redistributed routes. Redistributed routes
are added to the IPv6 External Reachability TLV in LSPs. For policies, the nlri match attribute is
supported, and the cost, cost-type internal, permit, and deny set attributes are supported.
Example
The following command exports RIPng routes to IS-IS and assigns the internal metric type and metric
value 5 to the redistributed routes:
enable isis area areax export ipv6 ripng metric 5 metric-type internal
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command causes the specified IS-IS router process to generate the default route in its LSPs.
Syntax Description
area_name Specifies the name of the IS-IS router process that should generate
the default route.
ipv4 Specifies that the router process should generate the default IPv4
route.
ipv6 Specifies that the router process should generate the default IPv6
route.
Default
IPv4: Disabled
IPv6: Disabled
Usage Guidelines
This applies to level 2 routing only. In contrast, level 1 routers compute the default route as the nearest
attached L1/L2 router. When enabled, the router process generates an IPv4 default route unless the ipv6
option is specified. Only one level 2 router in the IS-IS domain should be configured to originate a
default route. This command has no effect on router processes that are already enabled for default
route origination or on router processes that are level 1-only.
Example
The following command directs the IS-IS process named areax to generate the default IPv4 route in it’s
LSPs:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables the overload-bit feature, which signals other routers that they are no longer
permitted to use this router as a transit or forwarding node.
Syntax Description
area_name Specifies the area name of the IS-IS process for which this feature is to
be enabled.
suppress Specifies that one or all types of reachability information is to be
suppressed or excluded from LSPs.
external When included with the suppress option, this specifies that external
reachability information is to be excluded from LSPs.
interlevel When included with the suppress option, this specifies that interlevel
reachability information is to be excluded from LSPs.
all When included with the suppress option, this specifies that external
and interlevel reachability information is to be excluded from LSPs.
Default
Disabled.
Usage Guidelines
When the overload bit feature is enabled, the router process still receives and processes LSPs.
Example
The following command enables the overload bit feature for areax:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables the padding of hello PDUs on one or all VLANs.
Syntax Description
vlan all Enables hello padding on all IS-IS VLANs.
vlan_name Specifies a single VLAN on which hello padding is enabled.
Default
Enabled.
Usage Guidelines
When hello padding is enabled, IS-IS pads hello packets to the interface MTU. This is used among
neighbors to verify that adjacencies have the same MTU configured on either end. The disadvantage of
hello padding is the price of bandwidth consumed by larger packets.
Example
The following command enables hello padding on the SJvlan VLAN:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
This command enables the IS-IS router to act as a restart helper according to draft-ietf-isis-restart-02—
Restart signaling for IS-IS.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
None.
Example
The following command enables the IS-IS restart helper:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms with a Core license.
Description
Enables support on the physical ports that will carry jumbo frames.
Syntax Description
all Specifies ports.
port_list Specifies one or more slots and ports.
Default
Disabled.
Usage Guidelines
Increases performance to back-end servers or allows for VMAN 802.1Q encapsulations.
You can configure the maximum size of a jumbo frame if you want to use a different size than the
default value of 9216. Use the configure jumbo-frame-size command to configure the size.
Example
The following command enables jumbo frame support on a switch:
enable jumbo-frame ports all
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable l2vpn
enable l2vpn [vpls [vpls_name | all] | vpws [vpws_name | all]]
Description
Enables the specified VPLS or VPWS.
Syntax Description
vpls_nam Identifies the VPLS within the switch (character string).
e
vpws_nam Identifies the VPWS within the switch (character string).
e
all Specifies all VPLS or VPWS instances.
Default
All newly created VPLS or VPWS instances are enabled.
Usage Guidelines
When enabled, VPLS or VPWS attempts to establish sessions between all configured peers. Services
must be configured and enabled for sessions to be established successfully.
The l2vpn keyword is introduced in ExtremeXOS Release 12.4 and is required when enabling a VPWS.
For backward compatibility, the l2vpn keyword is optional when enabling a VPLS. However, this
keyword will be required in a future release, so we recommend that you use this keyword for new
configurations and scripts.
Example
The following command enables the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the VCCV health check feature on the specified VPLS or VPWS.
Syntax Description
vpls_name Identifies the VPLS for which health check is to be enabled.
vpws_name Identifies the VPWS for which health check is to be enabled.
Default
Health check is disabled.
Usage Guidelines
Health check must be enabled on both ends of a PW to verify connectivity between two VPLS or VPWS
peers. Both VCCV peers negotiate capabilities at PW setup. A single VCCV session monitors a single
PW. Therefore, a VPLS with multiple PWs will have multiple VCCV sessions to multiple peers.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when enabling health
check for a VPWS instance. For backward compatibility, the l2vpn keyword is optional when enabling
health check for a VPLS instance. However, this keyword will be required in a future release, so we
recommend that you use this keyword for new configurations and scripts.
Example
The following command enables the health check feature on the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 12.1.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the configured services for the specified VPLS or VPWS.
Syntax Description
vpls_nam Identifies the VPLS within the switch (character string).
e
vpws_nam Identifies the VPWS within the switch (character string).
e
all Specifies all VPLS or VPWS instances.
Default
Enabled.
Usage Guidelines
When services are disabled, the VPLS or VPWS is withdrawn from all peer sessions. The keyword all
enables services for all VPLS or VPWS instances.
The l2vpn keyword was introduced in ExtremeXOS Release 12.4 and is required when enabling
services for a VPWS instance. For backward compatibility, the l2vpn keyword is optional when
enabling services for a VPLS instance. However, this keyword will be required in a future release, so we
recommend that you use this keyword for new configurations and scripts.
Example
The following command enables the configured VPLS services for the specified VPLS instance:
History
This command was first available in ExtremeXOS 11.6.
The l2vpn and vpws keywords were first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables LSP sharing for Layer 2 VPN pseudowires .
Syntax Description
This command has no keywords or arguments.
Default
Disabled.
Usage Guidelines
This command enables LSP sharing for L2VPN PWs. When LSP sharing is enabled, up to 16 named LSPs
are used for a PW. When LSP sharing is disabled, only 1 named LSP is used for a PW.
If LSP Sharing is disabled, and more than 1 Transport LSP is programmed into HW, all but 1 Transport
LSP is removed from HW, and the configuration is preserved. If LSP Sharing is enabled, and more than 1
Transport LSP was previously configured, the remaining LSPs is programmed into HW as they become
available for use.
Example
The following command enables LSP sharing for L2VPN PWs:
enable l2vpn sharing
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the Layer 2 VPN MAC address withdrawal capability.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Use this command to enable FDB MAC withdrawal after it has been disabled.
Example
The following command enables MAC address withdrawal:
enable l2vpn vpls fdb mac-withdrawal
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables MAC address learning from the payload of IP ARP packets.
Syntax Description
request Enables learning only for IP ARP request packets.
reply Enables learning only for IP ARP reply packets.
both-request-and- Enables learning for both request and reply packets.
reply
vr_name Specifies a virtual router.
Default
Disabled.
Usage Guidelines
To view the configuration for this feature, use the following command: show iparp
Example
The following command enables MAC address learning from the payload of reply IP ARP packets:
enable learning iparp reply sender-mac
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables MAC address learning on one or more ports.
Syntax Description
drop-packets Forwards EDP packets, and drops all unicast, multicast, and broadcast
packets from a source address not in the FDB. No further processing
occurs for dropped packets.
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
Default
Enabled.
Usage Guidelines
Use this command to enable MAC address learning on one or more ports.
Example
The following example enables MAC address learning on ports 7 and 8 on a switch:
enable learning ports 7-8
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables learning a remote endpoint.
Syntax Description
forward-packets Forward packets with unknown source MAC addresses.
drop-packets Drop packets with unknown source MAC addresses.
vr VR/VRF instance the IPv4 address is configured on.
vr_name An existing VR/VRF name.
Default
VR-Default.
Usage Guidelines
The remote endpoint will receive unknown source frames and the address will be added to the FDB. The
configured value is shown in “show virtual-network vxlan remote-endpoint ipaddress <ip>” command.
Example
To enable learning on a remote endpoint:
enable learning vxlan ipaddress 1.2.3.4
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X590, X670-G2, X690, X870 slots only.
Description
Configures the front panel LEDs to flash so a switch can be easily located in a crowded lab/data center.
Syntax Description
timeout Limit the LED display time to seconds before returning to normal
operation.
seconds The length of time to display the flashing LEDs. The default is 300
seconds. The maximum value is 1 week (604800 seconds).
none Display LED pattern until disabled.
pattern Configures the LED display pattern.
alternating Groups of LEDs are lit in alternating patterns (Default).
flash-all All LEDs flash on and off.
high-to-low LED's are lit in descending port order.
scanner A group of 4 LED's is lit back and forth.
slot slot Slot number.
all All slots.
Default
The default timeout length is 300 seconds.
Usage Guidelines
Use this command to enable the front panel LEDs to flash so that a switch can be easily located in a
crowded lab, or data center.
Example
The following example enables the front panel LEDs to flash in an alternating pattern for one hour on all
slots:
enable led locator timeout 3600 pattern alternating all
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable license
enable license {software} [key ]
Description
Enables software license or feature pack that allows you to use advanced features.
Syntax Description
software Applies base license.
key Specifies your hexadecimal license key in format xxxx-xxxx-xxxx-
xxxx-xxxx (10 hex digits) or xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx (14
hex digits).
Default
N/A.
Usage Guidelines
The software license levels that apply to ExtremeXOS software are described in the ExtremeXOS 30.5
Feature License Requirements document.
You obtain the software license key (or feature pack key) either by ordering it from the factory or by
obtaining a license voucher from your Extreme Networks supplier. You can obtain a regular software
license or a trial software license, which allows you use of the license for either 30, 60 or 90 days; you
cannot downgrade software licenses.
The voucher contains all the necessary information on the software license, whether regular or trial, and
number of days for trial software license.
After you enable the software license or feature pack by entering the software key, the system returns a
message that you either successfully or unsuccessfully set the license.
Once you enable the software license (or if you do not use the correct key, attempt to downgrade the
license, or already installed the software license) you see one of the following messages:
Enabled license successfully. Error: Unable to set license using supplied key. Error:
Unable to set license - downgrade of licenses is not supported. Error: Unable to set
license - license is already enabled. Error: Unable to set license - trial license already
enabled.
If you enable a trial license, the system generates a daily message showing the number of days until
expiry.
If you attempt to execute a command and you do not either have the required software license or have
reached the limits defined by the current software license level, the system returns one of the following
messages:
Error: This command cannot be executed at the current license level. Error: You have
reached the maximum limit for this feature at this license level.
If you attempt to execute a command and you do not have the required feature pack, the system also
returns a message.
To protect against attacks to install maliciously created license keys, the system has an exponential
delay of each failed attempt to install a license.
To view the type of software license you are currently running on the switch, use the show licenses
command. The license key number is not displayed, but the type of software license is displayed in the
show licenses output. This command can be run on any node in a SummitStack, regardless of its
node role (master, standby, or backup).
Example
The following command enables a software license on the switch:
enable license 2d5e-0e84-e87d-c3fe-bfff
Warning: A reboot switch or disable and enable slot 3 is required before the new license
takes effect.
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the text file that applies software licenses and feature packs licenses to more than one switch at
a time.
Syntax Description
filename Specifies the file name that you download onto the switch using TFTP;
the file extension is .xlic.
Default
N/A.
Usage Guidelines
You download the license file to the switch using TFTP or SCP. The file name extension for this file is
xlic; for example, you may see a file named systemlic.xlic.
Using this file, you enable the software and feature pack licenses for more than one switch
simultaneously. The file can contain licenses for some or all of the Extreme Networks switches that the
customer owns. During upload, only those license keys destined for the specific switch are used to
attempt enabling the licenses. The license file is a text file that has the switch serial number, software
license type, and license key; it is removed from the switch after the licenses are enabled.
After you enable the license file, the system returns one or more of the following messages:
Enabled license successfully. Error: Unable to set license
<license_name> using supplied key. Error: Unable to set license
<license_name> - downgrade of licenses is not supported. Error: Unable
To protect against attacks to install maliciously created license keys, the system has an exponential
delay of each failed attempt to install a license.
Example
The following command enables a license file on the specified Extreme Networks switches:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables LLDP transmit mode, receive mode, or transmit and receive mode. If the transmit-only or
receive-only option is not specified, both transmit and receive modes are enabled.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
receive-only Specifies that the port only receives LLDP messages.
transmit-only Specifies that the port only transmits LLDP messages.
Default
Enabled.
Usage Guidelines
If you do not specify an option, the port is enabled to both transmit and receive LLDP messages.
Once the port is enabled for LLDP in one mode and you issue another enable lldp ports
command for another mode, that second mode replaces the original mode. For example, you might
originally enable several ports to only receive LLDP messages and then want those ports to both
receive and transmit LLDP messages. In that case, you issue the enable lldp ports command with
no variables (and the receive-and-transmit mode replaces the receive-only mode).
To verify the port setting for LLDP, use the show lldp {port [all |port_list]}
{detailed} command.
Example
The following example enables LLDP transmit and receive mode on port 1:4.
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables debug mode. The switch generates debug events.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables debug mode. Debug mode must be enabled prior to configuring advanced
debugging capabilities. These include allowing debug messages, which can severely degrade
performance. For typical network device monitoring, debug mode should remain disabled, the default
setting. Debug mode should only be enabled when advised by technical support, or when advanced
diagnosis is required. The debug mode setting is saved to FLASH.
Example
The following command enables debug mode:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables a running real-time display of log messages on the console display. In a stack, this command is
applicable only to Master and Backup nodes. You cannot run this command on standby nodes.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
If you enable the log display on a terminal connected to the console port, your settings will remain in
effect even after your console session is ended (unless you explicitly disable the log display).
You configure the messages displayed in the log using the configure log display, or configure
log target console-display commands.
You can also use this command to control logging to different targets. This command is equivalent to
enable log target console-display command.
To change the log filter association, severity threshold, or match expression for messages sent to the
console display, use the configure log target console-display command
Example
The following command enables a real-time display of log messages:
enable log display
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Starts sending log messages to the specified target.
Syntax Description
console Specifies the console display.
memory-buffer Specifies the switch memory buffer.
nvram Specifies the switch NVRAM.
primary-node Specifies the primary node of a stack.
backup-node Specifies the backup node of a stack.
session Specifies the current session (including console display).
syslog Specifies a syslog target.
all Specifies all of the remote syslog servers.
ipaddress Specifies the syslog IP address.
ipPort Specifies the UDP port number for the syslog target.
tls_port Specifies remote Syslog server Transport Layer Security (TLS) for
connection type.
tls_port TLS port number.
vr_name Specifies the virtual router that can reach the server IP address.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
Enabled, for memory buffer and NVRAM; all other targets are disabled by default.
Usage Guidelines
This command starts sending messages to the specified target. By default, the memory-buffer, NVRAM,
primary node, and backup node targets are enabled. Other targets must be enabled before messages
are sent to those targets.
Configuration changes to the session target are in effect only for the duration of the console display or
Telnet session, and are not saved in FLASH. Others are saved in FLASH.
You can also use the following command to enable displaying the log on the console: enable log
display
Example
The following example enables log messages on the current session:
enable log target session
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the specified UPM log target.
Syntax Description
upm_profile_name Specifies the name of the UPM log target to be enabled.
Default
N/A.
Usage Guidelines
UPM log targets are disabled when they are created.
Example
The following command enables the UPM log target testprofile1:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables a Web server target.
Syntax Description
xml_target_name Specifies the name of the xml-notification target.
Default
N/A.
Usage Guidelines
Use this command to enable a web server target for EMS.
Example
The following command enables the web server target target2:
enable log target xml-notification target2
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows a VLAN to be placed in the UP state without an external active port. This allows (disallows) the
VLANs routing interface to become active.
Syntax Description
vlan_name Specifies a VLAN name.
vlan_list Specifies a VLAN list of IDs.
Default
N/A.
Usage Guidelines
Use this command to specify a stable interface as a source interface for routing protocols. This
decreases the possibility of route flapping, which can disrupt connectivity.
Example
The following example allows the VLAN "accounting" to be placed in the UP state without an external
active port:
enable loopback-mode vlan accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the MAC address lock down timeout feature for the specified port or group of ports or for all
ports on the switch.
Syntax Description
all Specifies all ports.
port_list Specifies one or more ports or slots and ports.
Default
By default, the MAC address lock down timeout feature is disabled.
Usage Guidelines
You cannot enable the MAC lock down timer on a port that also has the lock learning feature enabled.
Example
The following command enables the MAC address lock down timeout feature for ports 2:3, 2:4, and 2:6:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables MAC locking on the specified port.
Syntax Description
port_list Specifies one or more ports or slots and ports.
all Specifies all ports.
Default
MAC locking is disabled by default.
Usage Guidelines
To enable MAC locking on a specific port, you must enable MAC locking on the switch and on the port.
Use the enable mac-locking command to enable MAC locking on the switch.
You cannot enable MAC locking on a port if limit-learning or lock-learning is configured on the port for
any VLAN.
Example
The following example enables MAC locking on port 14.
enable mac-locking ports 14
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable mac-locking
enable mac-locking
Description
Enables MAC locking globally on the switch.
Syntax Description
This command has no arguments or variables.
Default
MAC locking is disabled by default.
Usage Guidelines
To enable MAC locking on a specific port, you must enable MAC locking on the switch and on the port.
Use the enable mac-locking ports command to enable MAC locking on a port.
Example
The following example enables MAC locking on the switch.
enable mac-locking
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable mirror
enable mirror mirror_name
Description
Enables a mirror instance.
Syntax Description
mirror_name Specifies the mirror name.
Default
Disabled.
Usage Guidelines
Use this command to enable a mirror instance. An instance may be enabled without source filters
defined (per current function), but no traffic will be mirrored until source filters are added.
Example
The following example enables a mirror instance named "mirror1" :
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables a Mirror MIB instance or the assigned instance to an existing mirror.
Syntax Description
control_index Selects the Mirror MIB instance to enable. Range is 1 through 4.
mirror Designates specifying a mirror name associated within the specified
control index.
mirror_name Specifies the mirror name associated within the specified control
index.
Default
Disabled.
Usage Guidelines
Specifying a mirror name only enables that mirror within the Mirror MIB group (control index).
Example
The following example enables Mirror MIB specified by control index "1":
# enable mirror 1
The following example enables the mirror named "m1" within the Mirror MIB specified by control index
"1":
# enable 1 mirror m1
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Dedicates a port on the switch to be the mirror output port, or the monitor port.
Syntax Description
port Specifies the mirror output port.
port_list Specifies the list of ports where traffic is to be mirrored.
loopback-port Specifies an otherwise unused port required when mirroring to a
port_list. The loopback-port is not available for switching user
data traffic.
port Specifies a single loopback port that is used internally to provide this
feature.
remote-tag Specifies the value of the VLAN ID used by the mirrored packets when
egressing the monitor port.
Default
Disabled.
Usage Guidelines
Port mirroring configures the switch to copy all traffic associated with one or more ports, VLANS or
virtual ports. A virtual port is a combination of a VLAN and a port. The monitor port(s) can be
connected to a network analyzer or RMON probe for packet analysis. The switch uses a traffic filter that
copies a group of traffic to the monitor port.
Up to 16 mirroring filters and up to four monitor ports can be configured on the switch. After a port has
been specified as a monitor port, it cannot be used for any other function. Frames that contain errors
are not mirrored.
You cannot run ELSM and mirroring on the same port. If you attempt to enable mirroring on a port that
is already enabled for ELSM, the switch returns a message similar to the following:
Error: Port mirroring cannot be enabled on an ELSM enabled port.
(If you omit the optional parameters, all traffic is forwarded; the default for port-based mirroring
is ingress and egress).
• VLAN—All data to a particular VLAN, regardless of the physical port configuration, is copied to the
monitor port.
• Virtual port—All data specific to a VLAN on a specific port is copied to the monitor port.
• ExtremeSwitching series switches support a maximum of 128 mirroring filters with the restriction
that a maximum of 16 VLAN and/or virtual port (port + VLAN) filters may be configured.
• ExtremeXOS supports up to 16 monitor ports for one-to-many mirroring.
• Only traffic ingressing a VLAN can be monitored; you cannot specify ingressing or egressing traffic
when mirroring VLAN traffic.
• Ingress traffic is mirrored as it is received (on the wire).
• Packets which match both an ingress filter and an egress filter will result in two packets egressing
the monitor port or ports.
• In normal mirroring, a monitor port cannot be added to a load share group. In one-to-many
mirroring, a monitor port list can be added to a load share group, but a loopback port cannot be
used in a load share group.
• You can run mirroring and sFlow on the same device when you are running ExtremeSwitching series
switches.
• With a monitor port or ports on ExtremeSwitching series switches, all traffic ingressing the monitor
port or ports is tagged only if the ingress packet is tagged. If the packet arrived at the ingress port
as untagged, the packet egress the monitor port or ports as untagged.
• Two packets are mirrored when a packet encounters both an ingress and egress mirroring filter.
• The configuration of remote-tag does not require the creation of a VLAN with the same tag; on
these platforms the existence of a VLAN with the same tag as a configured remote-tag is prevented.
This combination is allowed so that an intermediate remote mirroring switch can configure remote
mirroring using the same remote mirroring tag as other source switches in the network. Make sure
that VLANs meant to carry normal user traffic are not configured with a tag used for remote
mirroring.
When a VLAN is created with remote-tag, that tag is locked and a normal VLAN cannot have that
tag. The tag is unique across the switch. Similarly if you try to create a remote-tag VLAN where
remote-tag already exists in a normal VLAN as a VLAN tag, you cannot use that tag and the VLAN
creation fails.
SummitStack Only
The traffic filter can be defined based on one of the following criteria:
• Physical port—All data that traverses the port, regardless of VLAN configuration, is copied to the
monitor port(s). You can specify which traffic the port mirrors:
◦ Ingress—Mirrors traffic received at the port.
◦ Egress—Mirrors traffic sent from the port.
◦ Ingress and egress—Mirrors traffic either received at the port or sent from the port.
(If you omit the optional parameters, all traffic is forwarded; the default for port-based mirroring
is ingress and egress).
• VLAN—All data to a particular VLAN, regardless of the physical port configuration, is copied to the
monitor port.
• Virtual port—All data specific to a VLAN on a specific port is copied to the monitor port.
• SummitStack supports a maximum of 128 mirroring filters with the restriction that a maximum of 16
VLAN and/or virtual port (port + VLAN) filters may be configured.
• ExtremeXOS supports up to 16 monitor ports for one-to-many mirroring.
• Only traffic ingressing a VLAN can be monitored; you cannot specify ingressing or egressing traffic
when mirroring VLAN traffic.
• Ingress traffic is mirrored as it is received (on the wire).
• Two packets are mirrored when a packet encounters both an ingress and egress mirroring filter.
• When traffic is modified by hardware on egress, egress mirrored packets may not be transmitted out
of the monitor port as they egressed the port containing the egress mirroring filter. For example, an
egress mirrored packet that undergoes VLAN translation is mirrored with the untranslated VLAN ID.
In addition, IP multicast packets which are egress mirrored contain the source MAC address and
VLAN ID of the unmodified packet.
• You cannot include the monitor port for a SummitStack in a load-sharing group.
• You can run mirroring and sFlow on the same device when you are running a SummitStack.
• With a monitor port or ports, the mirrored packet is tagged only if the ingress packet is tagged
(regardless of what module the ingressing port is on). If the packet arrived at the ingress port as
untagged, the packet egress the monitor port(s) as untagged.
• You may see a packet mirrored twice. This occurs only if both the ingress mirrored port and the
monitor port or ports are on the same one-half of the module and the egress mirrored port is either
on the other one-half of that module or on another module.
• When traffic is modified by hardware on egress, egress mirrored packets may not be transmitted out
of the monitor port as they egressed the port containing the egress mirroring filter. For example, an
egress mirrored packet that undergoes VLAN translation is mirrored with the untranslated VLAN ID.
In addition, IP multicast packets which are egress mirrored contain the source MAC address and
VLAN ID of the unmodified packet.
• The configuration of remote-tag does not require the creation of a VLAN with the same tag; on
these platforms the existence of a VLAN with the same tag as a configured remote-tag is prevented.
This combination is allowed so that an intermediate remote mirroring switch can configure remote
mirroring using the same remote mirroring tag as other source switches in the network. Make sure
that VLANs meant to carry normal user traffic are not configured with a tag used for remote
mirroring.
• When a VLAN is created with remote-tag, that tag is locked and a normal VLAN cannot have that
tag. The tag is unique across the switch. Similarly if you try to create a remote-tag VLAN where
remote-tag already exists in a normal VLAN as a VLAN tag, you cannot use that tag and the VLAN
creation fails.
Example
The following example selects port 4 as the mirror, or monitor, port:
# enable mirror to port 4
History
This command was added in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables traffic to be mirrored to the specified remote IPv4 destination address encapsulated in a GRE
tunneled packet.
Syntax Description
mirror_name Specifies the mirror instance name.
remote-ip Specifies to send mirrored packets to specified destination remote IP
address.
remote_ip_address Specifies the remote destination IP address for mirrored packets.
vr Specifies a virtual router of the remote IP address.
Default
If a VR is not specified, the VR of the current command context is used.
Ping health check of the remote IP address is enabled unless otherwise specified.
Usage Guidelines
This command enables hardware mirroring of Ethernet frames to a specified remote IPv4 address,
which can reside zero or more router hops away. This is useful for ExtremeAnalytics Application
Telemetry or other forms of remote network analysis or monitoring.
Port mirroring configures the switch to copy all traffic associated with one or more ports, VLANS or
virtual ports. A virtual port is a combination of a VLAN and a port. The monitor port(s) can be
connected to a network analyzer or RMON probe for packet analysis. The switch uses a traffic filter that
copies a group of traffic to the monitor port.
Up to 16 mirroring filters and up to four monitor ports can be configured on the switch. After a port has
been specified as a monitor port, it cannot be used for any other function. Frames that contain errors
are not mirrored.
You cannot run ELSM and mirroring on the same port. If you attempt to enable mirroring on a port that
is already enabled for ELSM, the switch returns a message similar to the following:
Error: Port mirroring cannot be enabled on an ELSM enabled port.
For high availability, you can add up to four redundant remote IP addresses. When creating a mirror
with this command, you can add one IP address. To add additional remote IP addresses, use the
configure mirror mirror_name {to [port port | port-list port_list |
loopback port port] | remote-ip {add} remote_ip_address {{vr} vr_name }
{from [source_ip_address | auto-source-ip]} {ping-check [on | off]}]
{remote-tag rtag | port none} {priority priority_value}command.
(If you omit the optional parameters, all traffic is forwarded; the default for port-based mirroring
is ingress and egress).
• VLAN—All data to a particular VLAN, regardless of the physical port configuration, is copied to the
monitor port.
• Virtual port—All data specific to a VLAN on a specific port is copied to the monitor port.
• ExtremeSwitching series switches support a maximum of 128 mirroring filters with the restriction
that a maximum of 16 VLAN and/or virtual port (port + VLAN) filters may be configured.
• ExtremeXOS supports up to 16 monitor ports for one-to-many mirroring.
• Only traffic ingressing a VLAN can be monitored; you cannot specify ingressing or egressing traffic
when mirroring VLAN traffic.
• Ingress traffic is mirrored as it is received (on the wire).
• Packets which match both an ingress filter and an egress filter will result in two packets egressing
the monitor port or ports.
• In normal mirroring, a monitor port cannot be added to a load share group. In one-to-many
mirroring, a monitor port list can be added to a load share group, but a loopback port cannot be
used in a load share group.
• You can run mirroring and sFlow on the same device when you are running ExtremeSwitching series
switches.
• With a monitor port or ports on ExtremeSwitching series switches, all traffic ingressing the monitor
port or ports is tagged only if the ingress packet is tagged. If the packet arrived at the ingress port
as untagged, the packet egress the monitor port or ports as untagged.
• Two packets are mirrored when a packet encounters both an ingress and egress mirroring filter.
SummitStack Only
The traffic filter can be defined based on one of the following criteria:
• Physical port—All data that traverses the port, regardless of VLAN configuration, is copied to the
monitor port(s). You can specify which traffic the port mirrors:
◦ Ingress—Mirrors traffic received at the port.
(If you omit the optional parameters, all traffic is forwarded; the default for port-based mirroring
is ingress and egress).
• VLAN—All data to a particular VLAN, regardless of the physical port configuration, is copied to the
monitor port.
• Virtual port—All data specific to a VLAN on a specific port is copied to the monitor port.
• SummitStack supports a maximum of 128 mirroring filters with the restriction that a maximum of 16
VLAN and/or virtual port (port + VLAN) filters may be configured.
• ExtremeXOS supports up to 16 monitor ports for one-to-many mirroring.
• Only traffic ingressing a VLAN can be monitored; you cannot specify ingressing or egressing traffic
when mirroring VLAN traffic.
• Ingress traffic is mirrored as it is received (on the wire).
• Two packets are mirrored when a packet encounters both an ingress and egress mirroring filter.
• When traffic is modified by hardware on egress, egress mirrored packets may not be transmitted out
of the monitor port as they egressed the port containing the egress mirroring filter. For example, an
egress mirrored packet that undergoes VLAN translation is mirrored with the untranslated VLAN ID.
In addition, IP multicast packets which are egress mirrored contain the source MAC address and
VLAN ID of the unmodified packet.
• You cannot include the monitor port for a SummitStack in a load-sharing group.
• You can run mirroring and sFlow on the same device when you are running a SummitStack.
• With a monitor port or ports, the mirrored packet is tagged only if the ingress packet is tagged
(regardless of what module the ingressing port is on). If the packet arrived at the ingress port as
untagged, the packet egress the monitor port(s) as untagged.
• You may see a packet mirrored twice. This occurs only if both the ingress mirrored port and the
monitor port or ports are on the same one-half of the module and the egress mirrored port is either
on the other one-half of that module or on another module.
• When traffic is modified by hardware on egress, egress mirrored packets may not be transmitted out
of the monitor port as they egressed the port containing the egress mirroring filter. For example, an
egress mirrored packet that undergoes VLAN translation is mirrored with the untranslated VLAN ID.
In addition, IP multicast packets which are egress mirrored contain the source MAC address and
VLAN ID of the unmodified packet.
• The configuration of remote-tag does not require the creation of a VLAN with the same tag; on
these platforms the existence of a VLAN with the same tag as a configured remote-tag is prevented.
This combination is allowed so that an intermediate remote mirroring switch can configure remote
mirroring using the same remote mirroring tag as other source switches in the network. Make sure
that VLANs meant to carry normal user traffic are not configured with a tag used for remote
mirroring.
• When a VLAN is created with remote-tag, that tag is locked and a normal VLAN cannot have that
tag. The tag is unique across the switch. Similarly if you try to create a remote-tag VLAN where
remote-tag already exists in a normal VLAN as a VLAN tag, you cannot use that tag and the VLAN
creation fails.
Example
The following example enables a mirroring instance named "analytics_chicago_1" to mirror packets to
the remote IP address 1.2.3.4 with ping health check (default behavior) being performed on the remote
IP address:
enable mirror analytics_chicago_1 to remote-ip 1.2.3.4
The following example enables a mirroring instance named "analytics_seattle_2" to mirror packets to
the remote IP address 5.6.7.8 from the source IP address 10.1.1.1 without ping health check being
performed on the remote IP address:
enable mirror analytics_seattle_2 to remote-ip 5.6.7.8 from 10.1.1.1 ping-check off
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Binds a local port or LAG to an MLAG.
Syntax Description
port Specifies a local member port of the MLAG group.
peer_name Specifies an alpha numeric string identifying the MLAG peer.
identifier Specifies a unique MLAG identifier value. The range is 1 to 65000.
Default
N/A.
Usage Guidelines
Use this command to bind a local port or LAG to an MLAG that is uniquely identified by the MLAG ID
value. The MLAG ID can be any number from 1 to 65000.
The specified port number may be a single port or the master port of a load sharing group but may not
be a load sharing member port. If it is, a message similar to the following is displayed:
ERROR: Port 2 is a member of a load share group. Use the load share
master port (10) instead.
A port can be part of only one MLAG, If you try to add it to another MLAG, a message similar to the
following is displayed:
ERROR: Port 2 is already part of an MLAG Id 101
Once the MLAG group binding is made, any change to load sharing on MLAG ports is disallowed.
Example
The following command binds the local member port 2 to the peer switch switch101with an identifier of
101:
# enable mlag port 2 peer switch101 id 101
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command enables reload-delay on Multi-switch Link Aggregation Group (MLAG) ports.
Syntax Description
This command has no arguments or variables.
Default
MLAG reload-delay is disabled by default.
Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. After using the configure mlag ports reload-delay on page 830 command to
configure a time delay for MLAG ports that provides enough time for ISC ports/neighborship of other
Layer 3 protocols to come up, you have to issue this command to enable the timer.
Example
The following example enables the MLAG reload-delay timer:
# enable mlag port reload-delay
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
enable mld
enable mld {vlan vlan_name {MLDv1 | MLDv2} }
Description
Enables MLD on a router interface. If no VLAN is specified, MLD is enabled on all router interfaces.
Syntax Description
vlan_name Specifies a VLAN name.
MLDv1 Sets the compatibility mode to MLDv1.
MLDv2 Sets the compatibility mode to MLDv2.
Default
Disabled.
Usage Guidelines
MLD is a protocol used by an IPv6 host to register its IPv6 multicast group membership with a router.
Periodically, the router queries the multicast group to see if the group is still in use. If the group is still
active, IPv6 hosts respond to the query, and group registration is maintained.
MLD is disabled by default on the switch. However, the switch can be configured to enable the
generation and processing of MLD packets. If compatibility mode is not specified in the command,
MLDv1 compatibility mode is set.
Example
The following example enables MLDv1 on the VLAN accounting:
enable mld vlan accounting
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables MLD snooping on the switch.
Syntax Description
vlan_name Specifies a VLAN.
Default
Disabled.
Usage Guidelines
If a VLAN is specified, MLD snooping is enabled only on that VLAN, otherwise MLD snooping is enabled
on all VLANs.
Example
The following command enables MLD snooping on the switch:
enable mld snooping
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the MLD snooping proxy.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Enabling the proxy allows the switch to suppress the duplicate join requests on a group to forward to
the connected Layer 3 switch. The proxy also suppresses unnecessary MLD leave messages so that they
are forwarded only when the last member leaves the group.
This command can be used for troubleshooting purpose. It should be enabled for normal network
operation. The command does not alter the snooping setting.
Example
The following command enables the MLD snooping proxy:
enable mld snooping with-proxy
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables MLD SSM mapping on a virtual router (VR).
Syntax Description
vr vr_name Specifies a virtual router name.
Default
Disabled.
Usage Guidelines
Use this command to enable MLD SSM mapping on a VR.
Configure the SSM address range using the configure pim ipv6 ssm range [default |
{policy} policy_name] command before you enable SSM Mapping.
Example
The following example enables SSM mapping on VR1:
enable mld ssm-map vr vr1
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
enable mpls
enable mpls
Description
Enables MPLS on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Enabling MPLS allows MPLS processing to begin for any enabled MPLS protocols (RSVP-TE and/or
LDP).
While MPLS is transitioning to the enabled state, only the MPLS show commands are accepted.
Before you can enable MPLS on a SummitStack, the stack must meet the following requirements:
• Each stack switch must meet the software and hardware requirements listed in the ExtremeXOS
30.5 Feature License Requirements document.
• You must configure the enhanced stacking protocol on each ExtremeSwitching series switch.
Note
When MPLS is enabled on a stack, you can only add MPLS-compatible switches to the
stack.
Example
The following command globally enables MPLS on the switch:
enable mpls
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the Bidirectional Forwarding Detection (BFD) client for MPLS on the specified VLAN or all
VLANs.
Syntax Description
vlan_name Specifies the VLAN on which to enable the MPLS BFD client.
vlan all Enables the MPLS BFD client on all VLANs.
Default
Disabled.
Usage Guidelines
This command causes MPLS to request a BFD session to each next-hop peer reachable through the
named interface. BFD sessions are triggered by the establishment of an LSP over the interface. If this
command is issued after LSPs are established, then the list of active LSPs is searched for next-hop peers
associated with the named interface, and a BFD session is requested for each neighbor which does not
already have a session. This command also instructs MPLS to begin to consider BFD neighbor session
state updates as part of the effective interface link state reported to the MPLS upper layer protocols.
Note
BFD must be enabled on the interface before sessions can be established. To enable BFD, use
the command: [enable | disable] bfd vlan vlan_name .
Example
The following command enables the MPLS BFD client on VLAN vlan1:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables assigning an MPLS packet to a QoS profile based on the MPLS packet’s EXP value.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables assigning an MPLS packet to a QoS profile based on the MPLS packet's EXP
value. The EXP values to QoS profile mappings are configured using the configure mpls exp
examination command.
When disabled, all received MPLS packets are assigned to QoS profile qp1.
Example
The following command enables assignment of an MPLS packet to a QoS profile based on the MPLS
packet’s EXP value:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables setting an MPLS packet's EXP value based on the packet's QoS profile.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables setting an MPLS packet's EXP value based on the packet's QoS profile. The QoS
profiles to EXP value mappings are configured using the configure mpls exp replacement
command.
When disabled, all MPLS packets are transmitted with an EXP value of zero.
Example
The following command enables the setting of an MPLS packet's EXP value based on the packet's QoS
profile:
enable mpls exp replacement
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables LDP to use IP prefixes learned from BGP when establishing LDP LSPs.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command allows LDP to use routes learned via BGP when establishing LDP LSPs. Because each
established LSP consumes internal resources, it is recommended that this setting be used only in BGP
environments where the number of BGP routes is controlled.
When disabled, LDP does not establish LSPs to routes learned via BGP, thus reducing the internal
resources used by LDP. Note that MPLS LSPs can still be used to transport packets to routes learned via
BGP through the use of the enable bgp mpls-next-hop command.
Example
The following command enables the use of BGP routes by LDP:
enable mpls ldp bgp-routes
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables LDP loop detection on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Loop detection provides a mechanism for finding looping LSPs and for preventing Label Request
messages from looping in the presence of non-merge capable LSRs. The mechanism makes use of Path
Vector and Hop Count TLVs carried by Label Request and Label Mapping messages.
Example
The following command globally enables LDP loop detection on the switch:
enable mpls ldp loop-detection
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables LDP for the specified MPLS configured VLANs.
Syntax Description
vlan Enables LDP for one or more specific VLANs.
vlan_name Enables LDP on the specified VLAN.
vlan all Enables LDP for all VLANs that have been added to MPLS.
Default
Disabled.
Usage Guidelines
When LDP is enabled, LDP attempts to establish peer sessions with neighboring routers on the enabled
VLAN. Once a peer session is established, LDP advertises labels for local IP interfaces and for routes
learned from other neighboring routers. By default, LDP is disabled for all VLANs that have been added
to MPLS. Specifying the optional all keyword enables LDP for all MPLS configured VLANs.
Example
The following command enables LDP for all VLANs that have been added to MPLS:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables penultimate hop popping (PHP) on the specified VLAN.
Syntax Description
vlan Enables PHP for one or more specific VLANs.
vlan_name Enables PHP on the specified VLAN.
vlan all Enables PHP for all VLANs that have been added to MPLS.
Default
Disabled.
Usage Guidelines
Penultimate hop popping is requested by assigning the Implicit Null Label in an advertised mapping.
Extreme's MPLS implementation always performs penultimate hop popping when requested to do so
by a peer LSR. When the all VLANs option is selected, PHP is enabled on all configured VLANs that
have been added to MPLS.
Example
The following command enables penultimate hop popping (PHP) on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables LDP for the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
When LDP is enabled, LDP attempts to establish peer sessions with neighboring routers on VLAN
interfaces where LDP has been enabled . Once a peer session is established, LDP can advertise labels for
local IP interfaces and for routes learned from other neighboring routers. While LDP is transitioning to
the enabled state, only the MPLS show commands are accepted.
Note that the LDP protocol must be enabled to establish VPLS pseudo-wires even if the transport LSPs
are being established using RSVP-TE.
Example
The following command globally enables LDP on the switch:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables RSVP-TE for the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
When RSVP-TE is enabled, configured LSPs begin the process of TE LSP establishment and VLAN
interfaces that have RSVP-TE enabled begin processing RSVP path/reserve messages. By default,
RSVP-TE is disabled. While RSVP-TE is transitioning to the enabled state, only the MPLS show
commands are accepted.
Example
The following command globally enables RSVP-TE on the switch:
enable mpls protocol rsvp-te
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the bundling of RSVP-TE messages for the specified VLAN interface.
Syntax Description
vlan Specifies that message-bundling is to be enabled on one or more
VLAN interfaces.
vlan_name Identifies a VLAN interface for which message bundling is to be
enabled.
vlan all Specifies that message bundling is to be enabled on all VLANs that
have been added to MPLS.
Default
Disabled.
Usage Guidelines
Enabling message bundling can improve control plane scalability by allowing the switch to bundle
multiple RSVP-TE messages into a single PDU. Not all devices support bundled messages. If the switch
determines that a peer LSR, connected to a specific interface, does not support message bundling, the
switch reverts to sending separate PDUs for each message on that interface. By default, message
bundling is disabled. Specifying the all keyword enables message bundling on all MPLS-configured
VLANs.
Example
The following command enables message bundling on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the MPLS RSVP-TE fast reroute (FRR) protection feature.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
You can configure FRR LSPs only when FRR is enabled on the LSR. Enabling FRR protection on the LSR
automatically enables the point-of-local-repair and merge-point capabilities on the LSR. FRR should be
enabled on all LSRs along each FRR LSP path.
Example
The following command enables FRR protection on the local switch:
enable mpls rsvp-te fast-reroute
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables one or more RSVP-TE LSPs.
Syntax Description
lsp_name Specifies the ingress LSP within the switch to be enabled.
all Enables all RSVP-TE configured ingress LSPs.
Default
Enabled.
Usage Guidelines
When an RSVP-TE LSP is enabled, the switch attempts to set up the LSP by signaling the destination by
sending a path message using the assigned path and profile. By default, all newly created LSPs are
enabled and can become active when the LSP has been configured. Note that an LSP must be
configured with at least one path before it can be signaled.
Example
The following command enables all RSVP-TE-configured LSPs:
enable mpls rsvp-te lsp all
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the sending of summary refresh messages, instead of path messages, to refresh RSVP-TE path
state for the specified VLAN interface.
Syntax Description
vlan Specifies that summary refresh messages are to refresh the RSVP-TE
path state on one or more VLAN interfaces.
vlan_name Identifies a VLAN interface on which RSVP-TE summary refresh
messages are to refresh the RSVP-TE path state.
vlan all Specifies that summary refresh messages are to refresh the RSVP-TE
path state on all VLANs that have been added to MPLS.
Default
Disabled.
Usage Guidelines
Enabling summary refresh can improve control plane scalability by refreshing multiple LSPs in a single
message. Not all devices support summary refresh. If the switch determines that a peer LSR, connected
to a specific interface, does not support summary refresh, the switch reverts to using path messages on
that interface. By default, summary refresh is disabled. Specifying the all keyword enables summary
refresh on all MPLS-configured VLANs.
Example
The following command enables summary refresh on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables RSVP-TE for the specified MPLS-configured VLAN.
Syntax Description
vlan Specifies that RSVP-TE is to be enabled on one or more VLANs.
vlan_name Identifies a specific VLAN on which RSVP-TE is to be enabled.
vlan all Enables RSVP-TE on all VLANS that have been added to MPLS.
Default
Disabled.
Usage Guidelines
When RSVP-TE is enabled, TE LSP establishment for configured LSPs begins and the processing of
RSVP path/reserve messages from peer LSRs is permitted. By default, RSVP-TE is disabled for all
MPLS-configured VLANs. Specifying the optional all keyword enables RSVP-TE for all VLANs that have
been added to MPLS.
Example
The following command enables RSVP-TE on the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Administratively enables one or all static LSPs.
Syntax Description
lsp_name Identifies the LSP to be enabled.
all Specifies that all static LSPs on this LSR are to be enabled.
Default
N/A.
Usage Guidelines
On executing this command, the software tries to activate the static LSP by programming the LSP in
hardware. Static LSPs are not enabled by default. You need to explicitly enable LSPs after the ingress
and egress segments have been configured.
Example
The following command enables a static LSP:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.ture-link-in-22.1"/>
Description
Enables the MPLS interface for the specified VLAN.
Syntax Description
vlan Enables an MPLS interface for one or more specific VLANs.
vlan_name Enables an MPLS interface on the specified VLAN.
vlan all Enables an MPLS interface for all VLANs that have been added to
MPLS.
Default
Disabled.
Example
The following command enables an MPLS interface for the specified VLAN:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the encapsulation of locally originated SA messages with multicast data (if available).
Syntax Description
vrname Specifies the name of the virtual router to which this command applies. If a name is
not specified, it is extracted from the current CLI context.
Default
By default, multicast data packet encapsulation is enabled for locally originated SA messages. Multicast
data packets with a packet size of up to 8 KB are encapsulated in SA messages.
Usage Guidelines
Enable data encapsulation to handle bursty sources.
Example
The following command enables multicast data packet encapsulation:
enable msdp data-encapsulation
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.opic/ph "/>
Description
Enables the advertisement of local sources to groups for which the router is an RP.
Syntax Description
filter-name Specifies the policy to associate with the export of local sources. No policy is
specified by default.
vrname Specifies the name of the virtual router to which this command applies. If a name
is not specified, it is extracted from the current CLI context.
Default
By default, the export of local sources is enabled. All sources are advertised if the router is an RP for the
groups.
Usage Guidelines
You can create a policy to filter out some of the local sources so that they are not advertised to MSDP
peers and exposed to the external multicast domain. To configure an export filter, you must first disable
the export of local sources (with the disable msdp export local-sa command), and then re-
enable it with an export filter (with the enable msdp export local-sa export-filter
command).
You can use the following policy attributes in an export policy. All other attributes are ignored.
• Match:
◦ multicast-group
◦ multicast-source
◦ pim-rp
• Set:
◦ permit
◦ deny
Please note that the syntax for “multicast-group”, “multicast-source,” and “pim-rp” are the same as for
the “nlri” policy attribute.
[multicast-group | multicast-source | pim-rp] [ipaddress | any]/mask-length> {exact}
[multicast-group | multicast-source | pim-rp] [ipaddress | any] mask mask {exact}
Example
The following command enables the advertisement of local sources:
nable msdp export local-sa
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures the administrative state of an MSDP peer.
Syntax Description
all Enables all MSDP peers.
remoteaddr Specifies the IP address of the MSDP peer to configure.
vr_name Specifies the name of the virtual router to which this command applies.
If a name is not specified, it is extracted from the current CLI context.
Default
By default, MSDP peers are disabled.
Usage Guidelines
You must use this command to administratively enable the MSDP peers before they can establish
peering sessions and start exchanging SA messages.
Example
The following example enables an MSDP peer:
enable msdp peer 192.168.45.43
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures MSDP to receive and process SA request messages from a specified peer or
all peers. If an SA request filter is specified, only SA request messages from those groups permitted are
accepted. All others are ignored.
Syntax Description
peer all Specifies all MSDP peers.
filter-name Specifies the name of the policy filter associated with SA request
processing.
remoteaddr Specifies the IP address of the MSDP peer.
vr_name Specifies the name of the virtual router to which this command applies.
If a name is not specified, it is extracted from the current CLI context.
Default
By default, all SA request messages are accepted from peers.
Usage Guidelines
Use this command to configure the router to accept all or just some SA request messages from peers. If
no policy is specified, all SA request messages are accepted. If a policy is specified, only SA request
messages from those groups permitted are accepted, and all others are ignored.
You cannot change an SA request filter while SA request processing is enabled for an MSDP peer. You
must first disable SA request processing for a peer and then re-enable it with an SA request filter.
You can use the following policy attributes in an SA request policy. All other attributes are ignored.
• Match:
◦ multicast-group
◦ multicast-source
◦ pim-rp
• Set:
◦ permit
◦ deny
Example
The following example enables processing of SA request messages received from a peer with the IP
address 192.168.45.43:
enable msdp peer 192.168.45.43 process-sa-request sa-request-filter intra_domain
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
enable msdp
enable msdp {vr vrname}
Description
Enables MSDP on a virtual router.
Syntax Description
vrname Specifies the name of the virtual router on which MSDP is being enabled or
disabled. If a name is not specified, it is extracted from the current CLI context.
Default
MSDP is disabled by default.
Usage Guidelines
None.
Example
The following command enables MSDP on a virtual router:
enable msdp
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MSDP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables MSRP in the ports listed in the command after the keyword ports.
Syntax Description
msrp Multiple Stream Registration Protocol.
port_list Port list separated by a comma or "-".
all All ports.
Default
Disabled.
Usage Guidelines
Use this command to enable MSRP in the ports listed or all ports.
Note
MSRP is not supported for Link Aggregated Ports.
Example
# enable msrp ports 1-3
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, and X670-G2 switches if the AVB
feature pack license is installed on the switch.
enable msrp
enable msrp
Description
Enables MSRP globally on the switch.
Syntax Description
msrp Multiple Stream Registration Protocol.
Default
Disabled.
Usage Guidelines
Use this command to enable MSRP globally on a switch.
Example
The following command enables MSRP:
enable msrp
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, and X670-G2 switches if the AVB
feature pack license is installed on the switch.
enable mvr
enable mvr
Description
Enables MVR on the system.
Syntax Descripton
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command enables MVR on the system:
enable mvr
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the MVR feature, see the ExtremeXOS 30.5 Feature License Requirements document.
enable mvrp
enable mvrp
Description
Enables MVRP globally on a switch.
Syntax Description
mvrp Multiple VLAN Registration Protocol.
Default
Disabled.
Usage Guidelines
Use this command to enable MVRP globally on a switch. MVRP is run on the MVRP enabled ports only if
the global setting is enabled. By default, MVRP is disabled globally and on individual ports. When MVRP
is disabled globally, all MVRP packets are forwarded transparently.
Example
The following command enables MVRP globally on the switch:
enable mvrp
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables MVRP on a given set of ports.
Syntax Description
mvrp Multiple VLAN Registration Protocol
port_list Port(s) on which MVRP is to be enabled.
all All ports.
Default
Disabled.
Usage Guidelines
Use this command to enable MVRP on given set of ports. MVRP is run on the MVRP enabled ports only
if the global setting is enabled. By default, MVRP is disabled globally and on individual ports. When
MVRP is disabled globally, all MVRP packets will be forwarded transparently. An error message is
displayed if the user tries to enable/disable MVRP on a lag member port which is not the master port.
No configuration changes are made.
Example
The following command enables MVRP on ports 4 and 5:
enable mvrp ports 4-5
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the IPv6 neighbor cache to refresh each entry before the timeout period expires.
Syntax Description
vr_name Specifies a VR or VRF.
Default
Enabled.
Usage Guidelines
None.
Example
The following example enables the refresh of neighbor discovery cache entries:
enable neighbor-discovery refresh
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
enable netlogin
enable netlogin [{dot1x} {mac} {web-based}]
Description
Enables network login authentication modes.
Syntax Description
dot1x Specifies 802.1X authentication.
mac Specifies MAC-based authentication.
web-based Specifies web-based authentication.
Default
All types of authentication are disabled.
Usage Guidelines
Any combination of types of authentication can be enabled on the same switch. At least one of the
authentication types must be specified on the command line.
Example
The following command enables web-based network login:
enable netlogin web-based
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the configured authentication failure VLAN on the specified ports.
Syntax Description
all Specifies all ports included in the authentication failure VLAN.
ports Specifies one or more ports or slots and ports on which the
authentication failure VLAN is enabled.
Default
All ports.
Usage Guidelines
Use this command to enable the configured authentication failure VLAN on either the specified ports,
or all ports.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the configured authentication service-unavailable VLAN on the specified ports.
Syntax Description
ports Specifies one or more ports or slots and ports on which the service-
unavailable VLAN is enabled.
all Specifies all ports included in the service-unavailable VLAN.
Default
All ports.
Usage Guidelines
Use this command to enable the configured authentication service-unavailable VLAN on the specified
ports, or on all ports.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the guest VLAN on the specified 802.1X network login ports.
Syntax Description
all Specifies all ports included in the guest VLAN.
ports Specifies one or more ports or slots and ports on which the guest
VLAN is enabled.
Default
Disabled.
Usage Guidelines
A guest VLAN provides limited or restricted network access if a supplicant connected to a port does not
respond to the 802.1X authentication requests from the switch. A port always moves untagged into the
guest VLAN.
To modify the supplicant response timer, use the following command and specify the supp-resp-
timeout parameter:
configure netlogin dot1x timers [{server-timeout server_timeout} {quiet-
periodquiet_period} {reauth-periodreauth_period {reauth-
maxmax_num_reauths}} {supp-resp-timeoutsupp_resp_timeout}]
Example
The following command enables the guest VLAN on all ports:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables network login logout pop-up window.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command controls the logout window pop-up on the web-based network client. This command
applies only to the web-based authentication mode of network login.
Example
The following command enables network login logout-privilege:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables NetLogin on a specified port for a particular authentication method.
Syntax Description
ports Specifies the ports for which NetLogin should be enabled.
dot1x Specifies 802.1X authentication.
mac Specifies MAC-based authentication.
web-based Specifies web-based authentication.
Default
All methods are disabled on all ports.
Usage Guidelines
For campus mode NetLogin with web-based clients, the following conditions must be met:
• A DHCP server must be available, and a DHCP range must be configured for the port or ports in the
VLAN on which you want to enable NetLogin.
• The switch must be configured as a RADIUS client, and the RADIUS server must be configured to
enable the NetLogin capability.
For ISP mode login, no special conditions are required. A RADIUS server must be used for
authentication.
NetLogin is used on a per-port basis. A port that is tagged can belong to more than one VLAN. In this
case, NetLogin can be enabled on one port for each VLAN.
To support NetLogin on all user virtual routers (VRs) in policy mode, remove any associated VRs from
the port before enabling NetLogin (see configure vr delete ports on page 1525). This is applicable for
uplink ports and ISC ports. This must be done prior to authentication so that once the client gets
authenticated the ports can move across different VLANs of various VRs.
Example
The following command configures NetLogin on port 2:9 using web-based authentication:
enable netlogin ports 2:9 web-based
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables network login reauthentication on refresh.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
The web-based Netlogin client's session is periodically refreshed by sending a HTTP request which acts
as a keep-alive without actually re-authenticating the user's credentials with the back-end RADIUS
server or local database. If reauthenticate-on-refresh is enabled, re-authentication occurs with the
session refresh.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the network login redirect page function.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
This command enables the network login redirect page so that the client is sent to the redirect page
rather than the original page.
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables network login session refresh.
Syntax Description
refresh_minutes Specifies the session refresh time for network login in minutes.
Default
Enabled, with a value of three minutes for session refresh.
Usage Guidelines
Network login sessions can refresh themselves after a configured timeout. After the user has been
logged in successfully, a logout window opens which can be used to close the connection by clicking on
the Logout link. Any abnormal closing of this window is detected on the switch and the user is logged
out after a time interval as configured for session refresh. The session refresh is enabled and set to three
minutes by default. The value can range from 1 to 255 minutes. When you configure the network login
session refresh for the logout window, ensure that the FDB aging timer is greater than the network login
session refresh timer.
This command applies only to the web-based authentication mode of network login.
To reset the session refresh value to the default behavior, use this command without the minutes
parameter.
Example
The following command enables network login session refresh and sets the refresh time to ten minutes:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables gPTP on the switch.
Syntax Description
network-clock Network clock.
gptp IEEE 802.1AS Generalized Precision Time Protocol (gPTP).
Default
Disabled.
Usage Guidelines
Use this command to enable gPTP.
Example
# enable network-clock gptp
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, and X670-G2 switches if the AVB
feature pack license is installed on the switch.
Description
Enables gPTP on one or more ports.
Syntax Description
port_list Specifies one or more of the switch’s physical ports.
only Apply change only to specified port, even if port is master of a load
sharing group.
all Specifies all of the switch’s physical ports.
Default
Disabled.
Usage Guidelines
Use this command to configure on which ports gPTP runs. gPTP does not run on any ports if it is not
first enabled in the switch by the enable network-clock gptp command.
Example
# enable network-clock gptp ports 4
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on ExtremeSwitching X450-G2, X460-G2, and X670-G2 switches if the AVB
feature pack license is installed on the switch..
Description
Use this command to enable PTP on the clock instance or on the specified VLAN (clock port).
Syntax Description
boundary Boundary clock.
ordinary Ordinary clock.
vlan VLAN.
vlan_name VLAN name.
Default
N/A.
Usage Guidelines
Use this command to enable PTP on the clock instance or on the specified VLAN (clock port).
Example
The following example enables the ordinary clock:
The following example enables the clock port lpbk-transit on the boundary clock:
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2, X670-G2 series switches.
Description
Enable PTP end-to-end-transparent clock functionality (1-step PHY timestamp) on the ports.
Syntax Description
port_list List of physical ports.
Default
N/A.
Usage Guidelines
See Description.
Example
The following example enables end-to-end transparent clock on the front panel ports 1-3:
enable network-clock ptp end-to-end-transparent ports 1-3
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2, X670-G2 series switches.
Description
Enable unicast negotiation property in the specified clock port. The unicast negotiation enabled clock
port responds to the unicast signaling requests from other clock slaves.
Syntax Description
boundary Boundary clock.
ordinary Ordinary clock.
vlan_name VLAN name.
Default
N/A.
Usage Guidelines
The unicast negotiation feature is currently not supported, and this command is retained to provide
configuration compatibility to previous releases.
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2, X670-G2 series switches.
Note
PTP commands can be used only with the Network Timing feature pack.
Description
Enables synchronous Ethernet (SyncE) on port(s).
Syntax Description
port_list Specifies a port or group of ports.
all Specifies all ports.
Default
Disabled.
Usage Guidelines
Use this command to enable SyncE on one or more ports.
If you attempt to enable SyncE on a port or ports that are not supported, one of the following messages
is displayed:
ERROR: Cannot enable Synchronous Ethernet on ports
ERROR: Cannot enable Synchronous Ethernet on some/all ports
To display SyncE settings, use the show network-clock sync-e ports command.
Example
The following command enables SyncE on port 2:
enable network-clock sync-e port 2
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X460-G2 series switches.
Description
This command enables the Node Alias feature on specified ports. Node Alias discovers information
about the end systems on a per-port basis. Information from packets from end systems, such as
VLANID, source MAC address, source IP address, protocol, etc. are captured in a database that can be
queried.
Syntax Description
nodealias Node Alias feature that maps source IP address, MAC address, host
name, and protocol on a per port basis.
ports Designates that Node Alias should be enabled on specified ports.
port_list Specifies on which ports to have Node Alias enabled. Designated as a
port list separated by comma (,) or dash (-).
all Specifies that all ports have Node Alias enabled.
Default
Node Alias is disabled by default on all ports.
Usage Guidelines
If the port is part of a LAG, Node Alias should be enabled separately on each LAG port.
Example
The following example enables Node Alias on all ports:
enable nodealias ports all
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command designates the specific protocols detected for the Node Alias feature. Node Alias
discovers information about the end systems on a per-port basis. Information from packets from end
systems, such as VLANID, source MAC address, source IP address, protocol, etc. are captured in a
database that can be queried.
Syntax Description
nodealias Node Alias feature that maps source IP address, MAC address, host
name, and protocol on a per port basis.
protocol Designates selection of protocols to detect.
protocol_name Specifies enabling a protocol to detect (one at a time). The following
protocols are enabled by default: IPv4, IPv6, OSPF, BGP, VRRP,
DHCPS, DHCPC, BOOTPS, BOOTPC, UDP, BPDU, LLMNR, SSDP, and
mDNS.
any Specifies enabling all Node Alias-supported protocols.
Default
The following protocols are enabled by default: IPv4, IPv6, OSPF, BGP, VRRP, DHCPS, DHCPC, BOOTPS,
BOOTPC, UDP, BPDU, LLMNR, SSDP, and mDNS.
Note
• ARP is categorized under IP.
• UDP entry is created when destination IP address is broadcast.
• BPDU means STP and GVRP frames.
Usage Guidelines
By default, the following protocols are enabled (IPv4, IPv6, OSPF, BGP, VRRP, DHCPS, DHCPC, BOOTPS,
BOOTPC, UDP, BPDU, LLMNR, SSDP, mDNS). You can optionally disable any of these protocols (and
then enable them back if desired).
Example
The following example specifically enables BGP to be detected:
enable nodealias protocol bgp
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
enable ntp
enable ntp
Description
Enables NTP globally on the switch.
Syntax Description
N/A.
Default
NTP is disabled by default.
Usage Guidelines
N/A.
Example
The following command enables NTP globally on the switch:
enable ntp
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables NTP authentication globally on the switch.
Syntax Description
N/A.
Default
NTP authentication is disabled by default.
Usage Guidelines
If authentication is disabled, NTP will not use any authentication mechanism to a server or from clients.
To use authentication for a specific server, enable NTP authentication globally, and then configure an
RSA Data Security, Inc. MD5 Message-Digest Algorithm or SHA256 key index for the specific server.
Example
The following command enables NTP authentication globally on the switch:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables an NTP broadcast client on the switch.
Syntax Description
broadcast-client Specifies enabling NTP broadcast client.
vr Specifies enabling NTP broadcast client for a VR.
vr_name Specifies the VR name. If a VR name is not specified, the VR of current
command context is used.
Default
An NTP broadcast client is enabled by default.
Usage Guidelines
If the broadcast client function is enabled, the system can receive broadcast-based NTP messages and
process them only if a VLAN is enabled for NTP and the VLAN is active.
Example
The following command enables an NTP broadcast client on the switch:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables NTP to send broadcast messages with or without a key to a VLAN.
Syntax Description
vlan-name Specifies the name of a particular VLAN on which to enable or disable
NTP.
keyid Specifies the key ID as a value from 1 to 65534.
Default
An NTP broadcast server is enabled by default.
Usage Guidelines
For the broadcast server function to work correctly, configure a VLAN to forward broadcast packets by
using the enable ipforwarding broadcast vlan-name command. All broadcast clients will
receive clock information from the broadcasted clock messages.
Example
The following command enables an NTP broadcast server on the switch:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables NTP on a VLAN.
Syntax Description
enable Enables NTP on a VLAN.
vlan-name Specifies the name of a particular VLAN on which to enable or disable
NTP.
all Enables or disables NTP on all VLANs.
vr Specifies setting up NTP on a VR.
vr_name Specifies the VR name to enable NTP on. If a VR name is not specified,
the VR of current command context is used.
Default
NTP is disabled on all VLANs by default.
Usage Guidelines
N/A.
Example
The following command enables NTP on a VLAN named “Southwest”:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable ntp vr
enable ntp vr vr_name
Description
This command enables and configures NTP for the specified VR.
Syntax Description
vr Specifies setting up NTP on a VR.
vr_name Specifies the VR name to enable NTP on. If a VR name is not specified,
the VR of current command context is used.
Default
If a VR name is not specified, the VR of current command context is used.
Example
The following example enables NTP on a VR named "vr1".
enable ntp vr vr1
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable ospf
enable ospf
Description
Enables the OSPF process for the router.
Syntax Description
This command has no keywords or arguments.
Default
N/A.
Usage Guidelines
Not applicable.
Example
The following command enables the OSPF process for the router:
enable ospf
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables opaque LSAs across the entire system.
Syntax Description
This command has no keywords or variables.
Default
Enabled.
Usage Guidelines
Opaque LSAs are a generic OSPF mechanism used to carry auxiliary information in the OSPF database.
Opaque LSAs are most commonly used to support OSPF traffic engineering.
Normally, support for opaque LSAs is auto-negotiated between OSPF neighbors. In the event that you
experience interoperability problems, you can disable opaque LSAs.
If your network uses opaque LSAs, all routers on your OSPF network should support opaque LSAs.
Routers that do not support opaque LSAs do not store or flood them. At minimum a well-
interconnected subsection of your OSPF network needs to support opaque LSAs to maintain reliability
of their transmission.
On an OSPF broadcast network, the designated router (DR) must support opaque LSAs or none of the
other routers on that broadcast network will reliably receive them. You can use the OSPF priority
feature to give preference to an opaque-capable router, so that it becomes the elected DR.
For transmission to continue reliably across the network, the backup designated router (BDR) must also
support opaque LSAs.
Example
The following command enables opaque LSAs across the entire system:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables redistribution of routes to OSPF.
Syntax Description
bgp Specifies BGP routes.
direct Specifies direct routes.
e-bgp Specifies E-BGP routes.
i-bgp Specifies I-BGP routes.
rip Specifies RIP routes.
static Specifies static routes.
isis Specifies IS-IS routes.
isis-level-1 Specifies ISIS Level 1 routes.
isis-level-1-external Specifies ISIS Level 1 External routes.
isis-level-2 Specifies ISIS Level 2 routes.
isis-level-2-external Specifies ISIS Level 2 External routes.
host-mobility Specifies host-mobility routes.
cost Specifies a cost metric.
Default
The default tag number is 0. The default setting is disabled.
Usage Guidelines
After OSPF export is enabled, the OSPF router is considered to be an ASBR. Interface routes that
correspond to the interface that has OSPF enabled are ignored.
The cost metric is inserted for all BGP, IS-IS, RIP-learned, static, and direct routes injected into OSPF. If
the cost metric is set to 0, the cost is inserted from the route. The tag value is used only by special
routing applications. Use 0 if you do not have specific requirements for using a tag. The tag value in this
instance has no relationship with 802.1Q VLAN tagging.
The same cost, type, and tag values can be inserted for all the export routes, or a policy can be used for
selective insertion. When a policy is associated with the export command, the policy is applied on every
exported route. The exported routes can also be filtered using a policy.
Example
The following command enables OSPF to export BGP-related routes using LSAs to other OSPF routers:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables IP forwarding over calculated MPLS LSPs to subnets learned through OSPF.
Syntax Description
vrf-name Specifies OSPF on a particular VRF.
Default
Disabled.
Usage Guidelines
This command enables IP forwarding over calculated MPLS LSPs to subnets learned through OSPF.
(Calculated refers to an LSP that only reaches part of the way to the destination). By default, IP
forwarding over MPLS LSPs to subnets learned via OSPF is disabled.
In order to configure OSPF on a particular VRF, you must supply the optional vr vr-name CLI
parameter.
Example
The following command enables OSPF’s use of MPLS LSPs to reach OSPF routes:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables a default external LSA to be generated by OSPF, if no other default route is originated by OSPF
by way of RIP and static route re-distribution.
Syntax Description
always Specifies for OSPF to always advertise the default route.
cost Specifies a cost metric.
Default
N/A.
Usage Guidelines
If always is specified, OSPF always advertises the default route. If always is not specified, OSPF adds the
default LSA if a reachable default route is in the route table.
Example
The following command generates a default external type-1 LSA:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the restart helper router to terminate graceful OSPF restart when received LSAs would affect
the restarting router.
Syntax Description
all Specifies all VLANs
vlan-name Specifies a VLAN name.
router-identifier Specifies the router ID of the remote router of the virtual link.
area-identifier Specifies an OSPF area.
Default
The default is enabled.
Usage Guidelines
This command configures the restart helper router to terminate graceful OSPF restart when received
LSAs would affect the restarting router. This will occur when the restart-helper receives an LSA that will
be flooded to the restarting router or when there is a changed LSA on the restarting router's
retransmission list when graceful restart is initiated.
Example
The following command configures a router to terminate graceful OSPF restart for all routers in area
10.20.30.40 if it receives an LSA that would affect routing:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the generation of the OSPF router alert IP option.
Syntax Description
This command has no keywords or arguments.
Default
Disabled.
Usage Guidelines
Not applicable.
Example
The following command enables the OSPF router alert IP option:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command enables the OSPFv2 VXLAN extensions.
Syntax Description
This command has no arguments or variables.
Default
Default is disabled.
Usage Guidelines
OSPFv2 advertises configured local VTEP/VNI pairs throughout the OSPFv2 domain using type 11
opaque link state advertisements. OSPFv2 must be disabled to enable this extension. After enabling
vxlan-extensions, you must enable OSPFv2.
Example
# enable ospf vxlan-extensions
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
enable ospfv3
enable ospfv3
Description
Enables OSPFv3 for the router.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
When OSPFv3 is enabled, it will start exchanging Hellos on all of it's active interfaces. It will also start
exporting routes into OSPFv3 routing domain from other protocols, if enabled.
When OSPFv3 is disabled, it will release all the run-time allocated resources like adjacencies, link state
advertisements, run-time memory, etc.
—OR—
• You explicitly configure the OSPFv3 router ID, a four-byte, dotted decimal number
Example
The following command enables OSPFv3 for the router:
enable ospfv3
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables redistribution of routes to OSPFv3.
Syntax Description
direct Specifies direct routes.
ripng Specifies RIPng routes.
static Specifies static routes.
isis Specifies IS-IS routes.
isis-level-1 Specifies IS-IS Level 1 routes.
isis-level-1-external Specifies IS-IS Level 1 External routes.
isis-level-2 Specifies IS-IS Level 2 routes.
isis-level-2-external Specifies IS-IS Level 2 External routes.
bgp Specifies BGP IPv6 routes.
i-bgp Specifies internal BGP IPv6 routes.
e-bgp Specifies external BGP IPv6 routes.
host-mobility Specifies host-mobility routes.
cost Specifies a cost metric.
ase-type-1 Specifies AS-external type 1 routes.
ase-type-2 Specifies AS-external type 2 routes.
number Specifies a tag value.
policy_map Specifies a policy.
Default
The default setting is disabled.
Usage Guidelines
The cost metric is inserted for all RIPng-learned, static, and direct routes injected into OSPFv3. If the
cost metric is set to 0, the cost is inserted from the route.
The same cost and type values can be inserted for all the export routes, or a policy can be used for
selective insertion. When a policy is associated with the export command, the policy is applied on every
exported route. The exported routes can also be filtered using a policy.
Policy files for this command will only recognize the following policy attributes:
• Match attributes
◦ nlri IPv6-address/mask-len
• Action (set) attributes
◦ cost <cost>
◦ cost-type [ase-type-1 | ase-type-2]
◦ permit
◦ deny
Any other policy attribute will not be recognized and will be ignored.
entry first {
if match any{
nlri 2001:db8:200:300:/64;
nlri 2001:db8:2146:23d1::/64;
nlri 2001:db8:af31:3d0::/64;
nlri 2001:db8:f6:2341::/64;
} then {
deny;
}
}
entry second {
if match any{
nlri 2001:db8:304::/48;
nlri 2001:db8:ca11::/48;
nlri 2001:db8:da36::/48;
nlri 2001:db8:f6a6::/48;
} then {
cost 220;
cost-type ase-type-2;
permit;
}
}
Example
The following command enables OSPFv3 to export RIPng-related routes and associates a policy redist:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
This command configures the restart helper router to terminate OSPF graceful restart when received
LSAs would affect the restarting router. This will occur when the restart helper receives an LSA that will
be flooded to the restarting router or when there is a changed LSA on the restarting router's
retransmission list when graceful restart is initiated.
Syntax Description
vlan VLAN.
all All VLANs.
vlan-name VLAN name.
area OSPFv3 area.
area-identifier Area identifier.
restart-helper-lsa-check Terminate graeful restart helper mode when there is a change to an
LSA.
Default
Enabled.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the restart helper router to terminate OSPFv3 graceful restart when received
LSAs would affect the restarting router. This occurs when the restart helper receives an LSA that will be
flooded to the restarting router or when there is a changed LSA on the restarting router's
retransmission list when graceful restart is initiated.
Syntax Description
virtual-link OSPFv3 virtual link.
routerid OSPFv3 router ID.
router-identifier Router ID of neighbor OSPFv3 router.
area OSPFv3 area.
area-identifier Transit area ID of virtual link.
restart-helper-lsa- Terminates graceful restart helper mode when there is a change to an
check LSA (default is enabled).
Default
Enabled.
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable ovsdb
enable ovsdb
Description
Enables Open vSwitch Database Management Protocol (OVSDB) server on a switch so that the switch
can be managed using the OVSDB Management Protocol.
Syntax Description
ovsdb Open vSwitch Database Management Protocol.
Default
OVSDB is disabled by default.
Example
The following example enables OVSDB:
enable ovsdb
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
Description
Enables the VXLAN feature on a switch to be managed using OVSDB.
Syntax Description
schema OVSDB schema.
hardware_vtep Hardware VXLAN Tunnel End-Point (VTEP)
Default
N/A
Example
The following example enables VXLAN managed by OVSDB with the Hardware VTEP schema:
# enable ovsdb schema hardware_vtep
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
enable pim
enable pim {ipv4 | ipv6}
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command enables PIM on the system:
enable pim
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the PIM ECMP feature.
Syntax Description
iproute IP Route.
sharing Equal Cost Multipath Routing.
Default
Disabled.
Usage Guidelines
Use this feature to allow downstream PIM router to choose multiple ECMP path to source via hash from
one of the following selections without affecting the existing unicast routing algorithm:
• Source
• Group
• Source-Group
• Source-Group-Next-Hop
This feature does load splitting, not load balancing, and operates on a per (S, G) and (*;G) basis,
splitting the load onto the available equal cost paths by hashing according to the selection criteria
defined by the user.
Make sure that IP route sharing is also enabled using enable iproute {ipv4| ipv6} sharing.
Example
The following command enables the PIM ECMP feature:
enable pim ipv4 iproute sharing
History
This command was first available in ExtremeXOS 15.3.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables PIM snooping globally or on one or all VLANs.
Syntax Description
name Specifies a VLAN.
Default
Disabled.
Usage Guidelines
PIM snooping does not require PIM to be enabled. However, IGMP snooping must be disabled on VLANs
that use PIM snooping. PIM snooping and MVR cannot be enabled simultaneously on a switch. PIM
snooping should not be enabled on a VLAN that supports PIM-DM neighbors.
Example
The following example enables PIM snooping on the default VLAN:
enable pim snooping default
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables PIM SSM on an IP interface.
Syntax Description
ipv4 Specifies the IPv4 address family.
ipv6 Specifies the IPv6 address family.
vlan_name Specifies a VLAN name.
all Specifies all VLANs.
Default
Disabled on all interfaces.
Usage Guidelines
This command enables PIM-SSM on the specified Layer 3 VLAN.
PIM-SM must also be configured on the interface for PIM to begin operating (which includes enabling IP
multicast forwarding).
IGMPv3 include messages for multicast addresses in the SSM range are only processed by PIM if PIM-
SSM is enabled on the interface. Any non-IGMPv3 include messages in the SSM range are not processed
by PIM on any switch interface, whether SSM is enabled or not.
Example
The following example enables PIM-SSM multicast routing on VLAN accounting:
enable pim ssm vlan accounting
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the PIM feature, see the ExtremeXOS 30.5 Feature License Requirements document.
enable policy
enable policy
Description
This command enables the ONEPolicy functionality.
Syntax Description
This command has no arguments or variables.
Default
None.
Usage Guidelines
None.
Example
The following example shows how to enable ONEPolicy:
X450G2-48t-10G4.4 # enable policy
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable port
enable port [port_list | all]
Description
Enables a port.
Syntax Description
port_list Specifies one or more ports or slots and ports.
all Specifies all ports on the switch.
Default
All ports are enabled.
Usage Guidelines
Use this command to enable the port(s) if you disabled the port(s) for security, administration, or
troubleshooting purposes.
Example
The following command enables ports 3, 5, and 12 through 15 on the stand-alone switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the current ports associated with the given MLAG ID.
Syntax Description
mlag-id Port associated with MLAG.
mlag_id MLAG identifier value of the MLAG port. Range is 1–65,000.
Default
N/A.
Usage Guidelines
If any ports are added or deleted from the LAG, the port state for those ports is not changed.
In MLAG orchestration mode, this command is executed on the other MLAG peer before it is executed
on the MLAG peer on which the command is run. In orchestration mode, if the MLAG port numbers are
not same on both the peers, it is possible that a different set of port numbers is enabled on the different
MLAG peers. This command helps ensure that the correct set of ports associated with the MLAG ID is
enabled.
If the port associated with the given MLAG ID is a load shared port, all the member ports associated
with this load shared group are enabled.
If the port associated with the given MLAG ID is a virtual port, the command is ignored.
Example
The following example enables the ports associated with MLAG ID "123":
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
enable radius
enable radius {mgmt-access | netlogin}
Description
Enables the RADIUS client on the switch.
Syntax Description
mgmt-access Specifies the switch management RADIUS authentication server.
netlogin Specifies the network login RADIUS authentication server.
Default
RADIUS authentication is disabled for both switch management and network login by default.
Usage Guidelines
Before you enable RADIUS on the switch, you must configure the servers used for authentication and
configure the authentication string (shared secret) used to communicate with the RADIUS
authentication server.
If you do not specify a keyword, RADIUS authentication is enabled on the switch for both management
and network login. When enabled, all web, Telnet, and SSH logins are sent to the RADIUS servers for
authentication. When used with a RADIUS server that supports ExtremeXOS CLI authorization, each CLI
command is sent to the RADIUS server for authorization before it is executed.
Use the mgmt-access keyword to enable RADIUS authentication for switch management functions.
Use the netlogin keyword to enable RADIUS authentication for network login.
Example
The following command enables RADIUS authentication on the switch for both management and
network login:
enable radius
The following command enables RADIUS authentication on the switch for network login:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable radius-accounting
enable radius-accounting {mgmt-access | netlogin}
Description
Enables RADIUS accounting.
Syntax Description
mgmt-access Specifies the switch management RADIUS accounting server.
netlogin Specifies the network login RADIUS accounting server.
Default
RADIUS accounting is disabled for both switch management and network login by default.
Usage Guidelines
The RADIUS client must also be enabled.
Before you enable RADIUS accounting on the switch, you must configure the servers used for
accounting and configure the authentication string (shared secret) used to communicate with the
RADIUS accounting server.
If you do not specify a keyword, RADIUS accounting is enabled on the switch for both management and
network login.
Use the mgmt-access keyword to enable RADIUS accounting for switch management functions.
Use the netlogin keyword to enable RADIUS accounting for network login.
Example
The following command enables RADIUS accounting on the switch for both management and network
login:
enable radius-accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables dynamic authorization RADIUS accounting.
Syntax Description
This command has no arguments or variables.
Default
Dynamic authorization RADIUS accounting is disabled by default.
Usage Guidelines
Before you enable RADIUS on the switch, you must configure the servers used for authentication and
configure the authentication string (shared secret) used to communicate with the RADIUS
authentication server.
To configure the RADIUS authentication servers and shared secret, use the following command:
configure radius dynamic-authorization index server [host_ipaddr |
host_ipV6addr | hostname] client-ip [client_ipaddr | client_ipV6addr]
{vr vr_name} {shared-secret {encrypted} secret}
Example
The following command enables dynamic authorization RADIUS authentication on the switch:
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable rip
enable rip
Description
Enables RIP for the whole router.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
RIP has a number of limitations that can cause problems in large networks, including:
• A limit of 15 hops between the source and destination networks.
• A large amount of bandwidth taken up by periodic broadcasts of the entire routing table.
• Slow convergence.
• Routing decisions based on hop count; no concept of link costs or delay.
• Flat networks; no concept of areas or boundaries.
Example
The following command enables RIP for the whole router:
enable rip
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Enables the RIP aggregation of subnet information on a RIP version 2 (RIPv2) interface.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
The enable (disable) rip aggregation command enables (disables) the RIP aggregation of subnet
information on an interface configured to send RIPv1 or RIPv2-compatible traffic. The switch
summarizes subnet routes to the nearest class network route. The following rules apply when using RIP
aggregation:
• Subnet routes are aggregated to the nearest class network route when crossing a class boundary.
• Within a class boundary, no routes are aggregated.
• If aggregation is enabled, the behavior is the same as in RIPv1.
• If aggregation is disabled, subnet routes are never aggregated, even when crossing a class boundary.
Example
The following command enables RIP aggregation on the interface:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Enables RIP to redistribute routes from other routing functions.
Syntax Description
bgp Specifies BGP routes.
direct Specifies interface routes (only interfaces that have IP forwarding
enabled are exported).
e-bgp Specifies E-BGP routes.
i-bgp Specifies I-BGP routes.
ospf Specifies all OSPF routes.
ospf-extern1 Specifies OSPF external route type 1.
ospf-extern2 Specifies OSPF external route type 2.
ospf-inter Specifies OSPF-inter area routes.
ospf-intra Specifies OSPF-intra area routes.
Default
Disabled.
Usage Guidelines
This command enables the exporting of BGP, static, direct, and OSPF-learned routes into the RIP
domain. You can choose which types of OSPF routes are injected, or you can simply choose ospf, which
will inject all learned OSPF routes regardless of type.
The cost metric is inserted for all RIP-learned, static, and direct routes injected into RIP. If the cost metric
is set to 0, the cost is inserted from the route. For example, with BGP, the cost could be the MED or the
length of the BGP path. The tag value is used only by special routing applications. Use 0 if you do not
have specific requirements for using a tag.
Each protocol can have a policy associated with it to control or modify the exported routes.
Example
The following command enables RIP to redistribute routes from all OSPF routes:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Configures a default route to be advertised by RIP.
Syntax Description
always Specifies to always advertise the default route.
cost number Specifies a cost metric. The range is 1 - 15.
tag number Specifies a tag number.
Default
Disabled.
Usage Guidelines
If always is specified, RIP always advertises the default route to its neighbors. If always is not specified,
RIP advertises a default route only if a reachable default route is in the system route table.
The cost metric is inserted for all RIP-learned, static, and direct routes injected into RIP. The tag value is
used only by special routing applications.
Example
The following command configures a default route to be advertised by RIP if there is a default route in
the system routing table:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Enables poison reverse algorithm for RIP.
Syntax Description
Enables poison reverse algorithm for RIP.
Default
Enabled.
Usage Guidelines
Like split horizon, poison reverse is a scheme for eliminating the possibility of loops in the routed
topology. In this case, a router advertises a route over the same interface that supplied the route, but
the route uses a hop count of 16, defining it as unreachable.
Example
The following command enables the split horizon with poison reverse algorithm for RIP:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Enables the split horizon algorithm for RIP.
Syntax Description
Enables the split horizon algorithm for RIP.
Default
Enabled.
Usage Guidelines
Split horizon is a scheme for avoiding problems caused by including routes in updates sent to the router
from which the route was learned. Split horizon omits routes learned from a neighbor in updates sent to
that neighbor.
Example
The following command enables the split horizon algorithm for RIP:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Enables the trigger update mechanism.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Triggered updates occur whenever a router changes the metric for a route and it is required to send an
update message immediately, even if it is not yet time for a regular update message to be sent. This will
generally result in faster convergence, but may also result in more RIP-related traffic.
Example
The following command enables the trigger update mechanism:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
Description
Enables the router alert IP option in the outgoing RIP control packets.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following command enables the RIP router alert IP option:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on all platforms with an Edge, Advanced Edge, or Core license.
enable ripng
enable ripng
Description
Enables RIPng for the whole router.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Although RIPng is useful in small networks, it has a number of limitations that can cause problems in
large networks, including:
• A limit of 15 hops between the source and destination networks.
• A large amount of bandwidth taken up by periodic broadcasts of the entire routing table.
• Slow convergence.
• Routing decisions based on hop count; no concept of link costs or delay.
• Flat networks; no concept of areas or boundaries.
Example
The following command enables RIPng for the whole router:
enable ripng
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables RIPng to redistribute routes from other routing functions.
Syntax Description
direct Specifies interface routes (only interfaces that have IP forwarding
enabled are exported).
ospfv3 Specifies all OSPFv3 routes.
ospfv3-extern1 Specifies OSPFv3 external route type 1.
ospfv3-extern2 Specifies OSPFv3 external route type 2.
ospfv3-inter Specifies OSPFv3-inter area routes.
ospfv3-intra Specifies OSPFv3-intra area routes.
static Specifies static routes.
isis Specifies IS-IS routes.
isis-level-1 Specifies IS-IS Level 1 routes.
isis-level-1-external Specifies IS-IS Level 1 External routes.
isis-level-2 Specifies IS-IS Level 2 routes.
isis-level-2-external Specifies IS-IS Level 2 External routes.
bgp Specifies BGP IPv6 routes
e-bgp Specifies EBGP routes.
i-bgp Specifies IBGP routes.
cost number Specifies the cost metric, from 0-15. If set to 0, RIPng uses the route
metric obtained from the route origin.
tag number Specifies a tag number.
policy-name Specifies a policy.
Default
Disabled. However, direct routes will always be advertised for all the interfaces where RIPng is enabled.
For those interfaces where RIPng is not enabled, the corresponding direct route could be redistributed
if direct route export is enabled through this command.
Default tag is 0.
Usage Guidelines
This command enables the exporting of static, direct, IS-IS, and OSPFv3-learned routes from the routing
table into the RIPng domain. You can choose which types of IS-IS or OSPFv3 routes are injected, or you
can simply choose isis or ospfv3, which will inject all learned routes (of all types) for the selected
protocol.
The cost metric is inserted for all RIPng-learned, static, and direct routes injected into RIPng. If the cost
metric is set to 0, the cost is inserted from the route table. The tag value is used only by special routing
applications. Use 0 if you do not have specific requirements for using a tag.
Each protocol can have a policy associated with it to control or modify the exported routes. The
following is sample policy file which modifies the cost of redistributed routes from OSPFv3 and
statically configured routes:
entry filter_rt {
If match any {
Route-origin ospfv3;
Route-origin static;
}
then {
cost 10;
}
}
Example
The following command enables RIPng to redistribute routes from all OSPFv3 routes:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Configures a default route to be advertised by RIPng.
Syntax Description
always Specifies to advertise the default route in addition to learned default
route.
cost metric Specifies a cost metric. The range is 1 - 15.
tag number Specifies a tag number.
Default
Disabled.
Usage Guidelines
If always is specified, RIPng always advertises the default route to its neighbors. If always is not
specified, RIPng advertises a default route only if a reachable default route is in the system route table
(the route is learned from other neighbors).
The default route advertisement is filtered using the out policy. Use the command, configure ripng
route-policy, to specify the out policy.
The cost metric is inserted for all RIPng-learned, static, and direct routes injected into RIPng. The tag
value is used only by special routing applications.
Example
The following command configures a default route to be advertised by RIPng if there is a default route
in the system routing table:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the split horizon with poison reverse algorithm for RIPng on specified interfaces.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all interfaces.
Default
Enabled.
Usage Guidelines
Used with split horizon, poison reverse is a scheme for eliminating the possibility of loops in the routed
topology. In this case, a router advertises a route over the same interface that supplied the route, but
the route uses a hop count of 16, defining it as unreachable.
If both split horizon and poison reverse are enabled, poison reverse takes precedence.
Example
The following command enables split horizon with poison reverse for RIPng on all IPv6 interfaces in the
virtual router:
The following command enables split horizon with poison reverse for all the IPv6 configured VLANs in
the virtual router:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the split horizon algorithm for RIPng.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all interfaces.
Default
Enabled.
Usage Guidelines
Split horizon is a scheme for avoiding problems caused by including routes in updates sent to the router
from which the route was learned. Split horizon omits routes learned from a neighbor in updates sent to
that neighbor.
Example
The following command enables the split horizon algorithm for RIPng on all IPv6 configured interfaces:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the trigger update mechanism. Triggered updates are a mechanism for immediately notifying a
router’s neighbors when the router adds or deletes routes or changes their metric.
Syntax Description
vlan-name Specifies an IPv6 configured VLAN.
tunnel_name Specifies an IPv6 tunnel.
all Specifies all interfaces.
Default
Enabled.
Usage Guidelines
Triggered updates occur whenever a router changes the metric for a route and it is required to send an
update message immediately, even if it is not yet time for a regular update message to be sent. This will
generally result in faster convergence, but may also result in more RIPng-related traffic.
Example
The following command enables the trigger update mechanism on all IPv6 configured interfaces:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on platforms with an Edge, Advanced Edge, or Core license. For licensing
information, see the ExtremeXOS 30.5 Feature License Requirements document.
enable rmon
enable rmon
Description
Enables the collection of RMON statistics on the switch.
Syntax Description
This command has no arguments or variables.
Default
By default, RMON is disabled. However, even in the disabled state, the switch responds to RMON queries
and sets for alarms and events. By enabling RMON, the switch begins the processes necessary for
collecting switch statistics.
Usage Guidelines
The switch supports four out of nine groups of Ethernet RMON statistics. In an enabled state, the switch
responds to the following four groups:
• Statistics—The RMON Ethernet Statistics group provides traffic and error statistics showing packets,
bytes, broadcasts, multicasts, and errors on a LAN segment or VLAN.
• History—The History group provides historical views of network performance by taking periodic
samples of the counters supplied by the Statistics group. The group features user-defined sample
intervals and bucket counters for complete customization of trend analysis.
• Alarms—The Alarms group provides a versatile, general mechanism for setting threshold and
sampling intervals to generate events on any RMON variable. Both rising and falling thresholds are
supported, and thresholds can be on the absolute value of a variable or its delta value. In addition,
alarm thresholds may be auto calibrated or set manually.
• Events—The Events group creates entries in an event log and/or sends SNMP traps to the
management workstation. An event is triggered by an RMON alarm. The action taken can be
configured to ignore it, to log the event, to send an SNMP trap to the receivers listed in the trap
receiver table, or to both log and send a trap. The RMON traps are defined in RFC 1757 for rising and
falling thresholds.
The switch also supports the following parameters for configuring the RMON agent, as defined in
RFC2021:
• probeCapabilities—If you configure the probeCapabilities object, you can view the RMON MIB
groups supported on at least one interface by the probe.
• probeSoftwareRev—If you configure the probeSoftwareRev object, you can view the current
software version of the monitored device.
• probeHardwareRev—If you configure the probeHardwareRev object, you can view the current
hardware version of the monitored device.
• probeDateTime—If you configure the probeDateTime object, you can view the current date and time
of the probe.
• probeResetControl—If you configure the probeResetControl object, you can restart a managed
device that is not running normally. Depending on your configuration, you can do one of the
following:
◦ Warm boot—A warm boot restarts the device using the current configuration saved in non-
volatile memory.
◦ Cold boot—A cold boot causes the device to reset the configuration parameters stored in non-
volatile memory to the factory defaults and then restarts the device using the restored factory
default configuration.
Note
You can only use the RMON features of the system if you have an RMON management
application and have enabled RMON on the switch.
RMON requires one probe per LAN segment, and stand-alone RMON probes have traditionally been
expensive. Therefore, the approach taken by Extreme Networks has been to build an inexpensive RMON
probe into the agent of each system. This allows RMON to be widely deployed around the network
without costing more than traditional network management. The switch accurately maintains RMON
statistics at the maximum line rate of all of its ports.
For example, statistics can be related to individual ports. Also, because a probe must be able to see all
traffic, a stand-alone probe must be attached to a nonsecure port. Implementing RMON in the switch
means that all ports can have security features enabled.
To view the status of RMON polling on the switch, use the show management command. The show
management command displays information about the switch including the enable/disable state for
RMON polling.
To view the RMON memory usage statistics for a specific memory type (for example, statistics, events,
logs, history, or alarms) or for all memory types, use the following command:
show rmon memory {detail | memoryType}
Example
The following command enables the collection of RMON statistics on the switch:
enable rmon
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable router-discovery
enable router-discovery {ipv6} vlan vlan_name
Description
Enables router discovery advertisements on the VLAN and the processing of router discovery messages.
Syntax Description
vlan_name Specifies an IPv6 configured VLAN.
Default
N/A.
Usage Guidelines
This command is only valid when the specified VLAN has an IPv6 address associated with it. After IPv6
Router Discovery is enabled on a VLAN, router advertisement messages are regularly sent on all ports
associated with the VLAN.
Example
The following example enables router discovery for the VLAN "top_floor":
enable router-discovery vlan top_floor
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
enable sflow
enable sflow
Description
Globally enables sFlow statistical packet sampling.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables sFlow globally on the switch.
Note
sFlow and mirroring are not mutually exclusive. You can enable sFlow and mirroring at the
same time.
Any traffic grouping using QP2 may encounter unexpected results when sFlow is enabled. For more
information about QoS, see the Quality of Service section in the ExtremeXOS 30.5 User Guide.
Example
The following command enables sFlow sampling globally:
enable sflow
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables sFlow statistical packet sampling on a particular list of ports.
Syntax Description
port_list Specifies a list of ports.
all All ports in the system.
ingress Enables ingress sFlow on a per-port basis.
egress Enables egress sFlow on a per-port basis.
both Enables both ingress and egress sFlow on a per-port basis.
Default
Ingress.
Usage Guidelines
This command enables sFlow on a particular list of ports. Ingress, egress, or a combination of both
types of sampling can be enabled on a port. You also need to enable sFlow globally in order to gather
statistics and send the data to the collector. Once sFlow is enabled globally, and on the ports of interest,
sampling and polling begins.
Note
sFlow and mirroring are not mutually exclusive. You can enable sFlow and mirroring at the
same time.
For more information about mirroring, see Configuring Slots and Ports on a Switch.
Example
The following command enables egress sFlow sampling on the port 3:1:
enable sflow ports 3:1 egress
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the switch to configure port link aggregation, or load sharing. By using link aggregation, you
use multiple ports as a single logical port. Link aggregation also provides redundancy because traffic is
redistributed to the remaining ports in the LAG if one port in the group goes down. LACP allows the
system to dynamically configure the LAGs.
The port-based keyword was added to the command to support the creation of port-based load
sharing groups.
Syntax Description
port Specifies the master logical port for a load-sharing group or link aggregation
group (LAG).
port_list Specifies one or more ports or slots and ports to be grouped to the logical port.
address- Specifies link aggregation by address-based algorithm.
based
L2 Specifies address-based link aggregation by Layer 2. This is the default value.
Note: The inclusion of Layer4 ports for distribution is not available on a per group
basis. The inclusion of Layer4 ports for distribution is controlled globally for all
LAGs in a switch via the configure forwarding sharing [L3 | L3_L4]
command.
custom Selects the custom link aggregation algorithm configured with the following
command: configure sharing address-based custom [ipv4 [L3-
and-L4 | source-only | destination-only | source-and-
destination] | hash-algorithm [xor | crc-16]].
The configuration of the custom option applies to all LAGs on the switch.
port-based Supports the creation of port-based load sharing groups.
all All active members of the group are eligible for distribution on all slots in the
switch.
local-slot If there are one or more active members of the group on the slot where traffic is
received, distribution wil be restricted to these local-slot members.
port-lists If there are one or more active members of the group in the configured distribution
port list for the slot on which traffic is received, distribution will be restricted to
these configured ports.
resilient-hashing Enables the resilient hashing hardware-based capability that minimizes the
remapping of flows to aggregator member ports during aggregator member
changes.
lacp Specifies dynamic link aggregation, or load sharing, using the LACP.
health-check Specifies a health check type of link aggregation group.
Default
Disabled.
Usage Guidelines
Link aggregation, or load sharing, allows you to increase bandwidth and availability between switches
by using a group of ports to carry traffic in parallel between switches. The aggregation algorithm allows
the switch to use multiple ports as a single logical port. For example, VLANs see the link aggregation
group (LAG) as a single logical port.
Note
All ports that are designated for the LAG must be removed from all VLANs prior to
configuring the LAG.
You can enable and configure dynamic link aggregation, using LACP or health-check link aggregation.
Static link aggregation is the default link aggregation method.
Note
Always verify the LACP configuration by issuing the show ports sharing command.
Look for the ports listed as being in the aggregator.
If a port in a LAG fails, traffic is redistributed to the remaining ports in the LAG. If the failed port
becomes active again, traffic is redistributed to include that port.
Link aggregation must be enabled on both ends of the link, or a network loop will result.
Any attempt to enable sharing on ports that have an MLAG configuration is denied with following error
message:
ERROR: Sharing configuration on MLAG ports cannot be modified. Use "disable mlag port
<port>" to remove port from MLAG group first.
Note
See the appropraite volume of the ExtremeXOS 30.5 User Guide for information on the
interaction of port-based ACLs and LAGs of ports.
Link aggregation, or load-sharing, algorithms allow you to select the distribution technique used by the
LAG to determine the output port selection. Algorithm selection is not intended for use in predictive
traffic engineering.
ExtremeXOS switches use address based algorithms to determine which physical port in the LAG to use
for forwarding traffic out of the switch. Refer to configure sharing address-based custom
for more information on using addressing information.
Note
If you attempt to create a port-based load sharing group with more than 16 possible
aggregator ports, the following message will be displayed:
Error: The system can have a maximum of 16 ports in a load sharing group withthe
configured algorithm.
This message indicates enforcement of the limit of 16 aggregator ports in a port-based LAG.
Existing error messages are also used to enforce the 16 aggregator port limit for port-based
load sharing groups modified by the configure sharing port add
portsport_list command.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the Simple Loop Protection Protocol (SLPP) Guard feature.
Syntax Description
slpp Specifies enabling SLPP.
guard Specifies disabling a port as soon as an SLPP PDU is received.
ports Specifies selecting ports on which to enable SLPP guard.
port_list Selects which ports to enable SLPP guard on.
all Specifies enabling SLPP guard on all ports.
Default
By default, SLPP Guard is disabled on all ports.
Usage Guidelines
SLPP is an application that detects loops in a Split Multi-link Trunking (SMLT) network. SLPP Guard is a
complementary feature that helps prevent loops in networks by administratively disabling an edge port
if a switch receives an SLPP PDU from an SMLT network.
Example
The following example enables SLPP Guard on port 5:
# enable slpp guard ports 5
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable smartredundancy
enable smartredundancy port_list
Description
Enables the Smart Redundancy feature on the primary port.
Syntax Description
port_list Specifies one or more ports or slots and ports.
Default
Enabled.
Usage Guidelines
You must configure the software-controlled redundant port using the configure ports
redundant command prior to enabling Smart Redundancy.
The Smart Redundancy feature works in concert with the software-controlled redundant port feature.
With Smart Redundancy enabled on the switch, when the primary port becomes active the switch
redirects all traffic to the primary port and blocks the redundant port again. If you disable Smart
Redundancy, the primary port is blocked because traffic is now flowing through the redundant port.
Example
The following command enables the Smart Redundancy feature on port 4 on a switch:
enable smartredundancy 4
History
This command was available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Selectively enables SNMP access on the switch.
Syntax Description
snmp-v1v2c Specifies SNMPv1/v2c access only.
snmpv3 Specifies SNMPv3 access only.
Default
Disabled.
Usage Guidelines
To have access to the SNMP agent residing in the switch, at least one VLAN must have an IP address
assigned to it.
Any network manager running SNMP can manage the switch for v1/v2c/v3, provided the MIB is
installed correctly on the management station. Each network manager provides its own user interface
to the management facilities.
For SNMPv3, additional security keys are used to control access, so an SNMPv3 manager is required for
this type of access.
This command allows you to enable either all SNMP access, no SNMP access, v1/v2c access only, or v3
access only.
To prevent any SNMP access, use the following command : disable snmp access {snmp-v1v2c
| snmpv3}
ExtremeXOS 11.2 introduced the concept of safe defaults mode. Safe defaults mode runs an interactive
script that allows you to enable or disable SNMP, Telnet, and switch ports. When you set up your switch
for the first time, you must connect to the console port to access the switch. After logging in to the
switch, you enter safe defaults mode. Although SNMP, Telnet, and switch ports are enabled by default,
the script prompts you to confirm those settings.
If you choose to keep the default setting for SNMP—the default setting is enabled—the switch returns
the following interactive script:
Since you have chosen less secure management methods, please remember to increase the
security of your network by taking the following actions: * change your admin password *
change your SNMP public and private strings * consider using SNMPv3 to secure network
management traffic
In addition, you can return to safe defaults mode by issuing the following command: configure
safe-default-script
If you return to safe defaults mode, you must answer the questions presented during the interactive
script.
For more detailed information about safe defaults mode, see the Using Safe Defaults Mode section in
the ExtremeXOS 30.5 User Guide.
Example
The following command enables all SNMP access for the switch:
enable snmp access
History
This command was first available in ExtremeXOS 10.1.
SNMPv3 was added to ExtremeXOS 12.2. It was also included in ExtremeXOS 11.6.4 and 12.1.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Selectively enables SNMP access on virtual routers.
Syntax Description
vr_name Specifies the virtual router name.
all Specifies all virtual routers.
Default
Enabled on all virtual routers.
Usage Guidelines
Use this command to enable SNMP access on any or all virtual routers.
To disable SNMP access on virtual routers, use the disable snmp access vr command.
To display the SNMP configuration and statistics on a specified virtual router, use the show snmp
vr_name command.
Example
The following command enables SNMP access on the virtual router vr-finance:
enable snmp access vr vr-finance
History
This command was first available in ExtremeXOS 12.4.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables SNMP community strings.
Syntax Description
encrypted Community name is encrypted.
enc_community_name Encrypted community name.
community_name Community name in ASCII format.
hex Provide value in hexadecimal.
hex_community_name Community name in hexadecimal.
alphanumeric- Specifies the SNMP community string name.
community-string
Default
N/A.
Usage Guidelines
This command allows the administrator to enable an snmp community that has been disabled. It sets
the row status of the community to Active.
Example
The following command enables the community string named extreme:
History
This command was first available in ExtremeXOS 12.1.
The hex keyword and hex_community_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Controls the administrative state of a log.
Syntax Description
default The default log.
name Specifies the name of the log.
hex Provide value in hexadecimal.
hex_name Name of the log in hexadecimal.
all Specifies all logs.
Default
Disabled.
Usage Guidelines
Use this command to control the administrative state of a log.
Example
The following example enables all logs:
enable snmp notification-log all
History
This command was first available in ExtremeXOS 15.5.
The default and hex keywords and hex_name variable were added in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables Layer 3 VPN MIB notification traps for the child VPN VRFs of the specified VR.
Syntax Description
vr_name Specifies the name of the parent VR where this RFC 4382 scalar is
applied. If vr_name is not provided, then this command is applied to
the VR in the current context.
Default
Disabled.
Usage Guidelines
This command enables generation of the following Layer 3 VPN SNMP traps:
• mplsL3VpnVrfUp—Sent when the first IP VLAN becomes active and the administrative state is
enabled.
• mplsL3VpnVrfDown—Sent when the last active IP VLAN becomes inactive, or the administrative
state is disabled.
Example
The following example enables SNMP traps for Layer 3 VPNs on the default VR:
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Turns on SNMP trap support.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
An authorized trap receiver can be one or more network management stations on your network. The
switch sends SNMP traps to all trap receivers.
To view if SNMP traps are being sent from the switch, use the show management command. The
show management command displays information about the switch including the enabled/disabled
state of SNMP traps being sent.
Example
The following command enables SNMP trap support on the switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables sending SNMP trap when saving or changing the switch configuration.
Syntax Description
configuration Sends SNMP trap for switch configuration.
save Generates SNMP trap when switch configuration is saved (default is
disabled).
change Generates SNMP trap when switch configuration is changed (default is
disabled).
Default
The default is that SNMP traps are disabled for switch configuration changes/saves.
Example
The following example enables SNMP traps for switch configuration changes:
enable snmp traps configuration change
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches..
Description
This command enables session up/down trap reception for BFD.
Syntax Description
snmp Configure SNMP specific settings.
traps Configure SNMP Trap generation settings.
bfd BFD-specific traps.
session-down Generate trap when BFD session goes down.
session-up Generate trap when BFD session goes up.
Default
Both session-down and session-up.
Usage Guidelines
Use this command to enable trap reception for BFD session up/down.
Example
The following command will enable trap generation for BFD session down events.
# enable snmp traps bfd session-down
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Enables SNMP trap generation when MAC-tracking events occur for a tracked MAC address.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
None.
Example
The following example enables SNMP traps for MAC-tracking events:
enable snmp traps fdb mac-tracking
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the identity management feature to send SNMP traps for low memory conditions.
Syntax Description
This command has no arguments or variables.
Default
No traps are sent.
Usage Guidelines
The low memory conditions are described in the description for the configure identity-
management stale-entry aging-time seconds command.
Example
The following command enables the identity management SNMP trap feature:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables SNMP traps associated with Layer 2 VPNs for all MPLS configured VLANs.
Syntax Description
This command has no arguments or variables.
Default
All Layer 2 VPN traps are disabled.
Example
The following command enables SNMP traps associated with Layer 2 VPNs:
enable snmp traps l2vpn
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Use this command to turn on SNMP trap support for L3 VPN.
Syntax Description
vr_name Specifies the name of the parent VR where this RFC 4382 scalar is
applied. If VR name is not provided, then this command is applied to
the VR in the current context.
Default
Enabled.
Usage Guidelines
Use this command to enable generation of L3VPN SNMP traps—mplsL3VpnVrfUp and
mplsL3VpnVrfDown. These trap notifications are sent under the following conditions:
• mplsL3VpnVrfUp—first IP VLAN becomes active and administrative state is enabled.
• mplsL3VpnVrfDown—last active IP VLAN becomes inactive OR administrative state is disabled.
Example
The following example enables L3 VPN SNMP traps support on the switch:
enable snmp traps l3vpn vr vr-default
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the transmission of LLDP SNMP trap notifications.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
Note
To enable SNMP traps for LLDP MED TLVs, you must issue a separate command; use the
enable snmp traps lldp-med {ports [all | port_list]} .
If you do not specify any ports, the system sends LLDP traps for all ports.
Note
The Avaya-Extreme proprietary TLVs do not send traps.
Example
The following command enables LLDP SNMP traps for all ports:
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the transmission of LLDP SNMP trap notifications related to LLDP MED extension TLVs.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
If you do not specify any ports, the system sends LLDP-MED traps for all ports.
Example
The following command enables LLDP-MED SNMP traps for all ports:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables SNMP traps associated with MPLS for all MPLS configured VLANs.
Syntax Description
This command has no arguments or variables.
Default
All MPLS traps are disabled.
Example
The following command enables SNMP traps associated with MPLS:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
Enables the OSPF module to send traps on various OSPF events.
Syntax Description
all Sets RFC1850 ospfSetTrap to 0x1ffff.
trap-map Specifies the ospfSetTrap as defined in RFC1850.
bit-map Specifies the ospfSetTrap value in HEX (for example, 0x1ffff for all
traps).
Default
The default is disabled.
Usage Guidelines
This command enables the OSPF module to send traps on various OSPF events.
Example
The following command sets ospfSetTrap for all traps:
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables the transmission of OSPFv3 SNMP notifications.
Syntax Description
ospfv3 OSPFv3-related traps.
Default
The default is disabled.
Example
The following example enables the transmission of OSPFv3 SNMP notifications:
enable snmp traps ospfv3
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on platforms with an Advanced Edge or Core license as described in the
ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables port up/down trap reception for specified ports.
Syntax Description
port_list Specifies one or more ports or slots and ports.
all Specifies all ports on the switch.
Default
Enabled.
Usage Guidelines
Use this command to begin receiving SNMP trap messages when a port transitions between being up
and down.
Example
The following command enables ports 3, 5, and 12 through 15 on a stand-alone switch to receive SNMP
trap messages when the port goes up/down:
History
This command was first available in ExtremeXOS 10.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable snmpv3
enable snmpv3 default-group
Description
Selectively enables SNMPv3 default-group access on the switch.
Syntax Description
default-group Specifies SNMPv3 default-group.
Default
Enabled.
Usage Guidelines
This command is used to enable SNMPv3 default-group access.
Enabling SNMPv3 default-group access activates the access to an SNMPv3 default-group and the user-
created SNMPv3-user part of default-group. This command produces an error if SNMPv3 access is
disabled on the switch.
Example
The following command enables the default group access on the switch:
History
This command was available in ExtremeXOS 12.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables a community entry specified by the community index.
Syntax Description
community_index Community index in ASCII.
hex Provide value in hexadecimal.
hex_community_index Community index in hexadecimal.
Default
Enabled.
Usage Guidelines
This command is used to enable a community entry specified by the community index.
Example
History
This command was available in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable sntp-client
enable sntp-client
Description
Enables the SNTP client.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
SNTP can be used by the switch to update and synchronize its internal clock from a Network Time
Protocol (NTP) server. After the SNTP client has been enabled, the switch sends out a periodic query to
the indicated NTP server, or the switch listens to broadcast NTP updates. In addition, the switch
supports the configured setting for Greenwich Mean Time (GMT) offset and the use of Daylight Savings
Time (DST).
Example
The following command enables the SNTP client:
enable sntp-client
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable ssh2
enable ssh2 {access-profile [access_profile | none]} {port
tcp_port_number} {vr [vr_name | all | default]}
Description
Enables SSH2 server to accept incoming sessions from SSH2 clients.
Syntax Description
access_profile Specifies an ACL policy.
none Cancels a previously configured ACL policy.
port Specifies a TCP port number. The default is port 22.
vr_name Specifies a virtual router name.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Default
The SSH2 feature is disabled by default.
Usage Guidelines
SSH2 enables the encryption of session data. You must be logged in as an administrator to enable SSH2.
Use the port option to specify a TCP port number other than the default port of 22. You can only specify
ports 22 and 1024 through 65535.
In the ACL policy file for SSH2, the source-address field is the only supported match condition. Any
other match conditions are ignored.
If you attempt to implement a policy that does not exist on the switch, an error message similar to the
following appears:
Error: Policy /config/MyAccessProfile_2.pol does not exist on file system
If this occurs, make sure the policy you want to implement exists on the switch. To confirm the policies
on the switch, use the ls command. If the policy does not exist, create the ACL policy file.
Example
The following command enables the SSH2 feature:
enable ssh2
The next example assumes you have already created an ACL to apply to SSH.
History
This command was first available in the ExtremeXOS 11.0
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable stacking
enable stacking {node-address node-address}
Description
This command enables stacking on one or all nodes.
Syntax Description
node-address Specifies the MAC address of a node in the stack. To view the MAC
addresses for all nodes in a stack, enter the show stacking
command.
Default
Default value is stacking disabled.
Usage Guidelines
This command enables stacking on one or all nodes. When a node is operating in stacking mode, QoS
profile QP7 cannot be created.
For information about stacking methods, and which switches can stack with other switches, see the
Available Stacking Methods topic in the ExtremeXOS 30.5 User Guide.
If a node-address is not specified, this command first performs an analysis of the current stacking
configuration on the entire stack. If the stack has not yet been configured for stacking operation, or if
the configuration is self-inconsistent, the user is offered the option of invoking the easy setup function.
The following message appears:
You have not yet configured all required stacking parameters. Would you
like to perform an easy setup for stacking operation? (y/N)
If you enter Yes, the easy setup procedure is invoked and you first see the following message:
Executing "configure stacking easy-setup" command...
The following describes the operation performed if easy setup is neither offered nor selected.
If you do not enter any node-address, stacking is enabled on all nodes in the stack topology.
If the node-address parameter is present, stacking is enabled on the node with the specified node-
address. This is the MAC address assigned to the stackable by the factory.
The show stacking configuration command shows the current configuration of this parameter
as well as the value currently in use.
A node that is enabled for stacking attempts to join the active topology. If successful, it then negotiates
a node role with the other nodes in the stack and becomes an operational node in the stack according
to its role. The master node's configuration is applied to the node.
Example
To enable stacking on a stack:
# enable stacking
This command will take effect at the next reboot of the specified node(s).
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available with all licenses and platforms that support the SummitStack feature. For
information about which licenses and platforms support the SummitStack feature, see the ExtremeXOS
30.5 Feature License Requirements document.
enable stacking-support
enable stacking-support
Description
This command enables a switch with dual-purpose hardware to participate in a stack.
Syntax Description
This command does not have additional syntax.
Default
Stacking support is enabled by default for all platforms, except the ExtremeSwitching X440-G2 and
X870.
Usage Guidelines
The Stacking-Support Option Control column in Table 20 on page 1328 displays Yes in the rows for
switch configurations for which you can enable the stacking-support option.
After you enable the stacking-support option, you must reboot the switch to activate the configuration
change.
If you enable the stacking-support option on a switch and reboot, data communications on the data
ports listed in Table 20 on page 1328 stops, and the ports use stacking protocols instead of Ethernet
protocols.
Example
To enable the stack ports, enter the following command:
# enable stacking-support
This setting will take effect at the next reboot of this switch.
History
This command was first available in ExtremeXOS 12.2.
Platform Availability
This command is available on the ExtremeSwitching X450-G2, X460-G2, X670-G2, X440- G2, X590,
X620, X690, X870 series switches.
enable stpd
enable stpd {stpd_name}
Description
Enables the STP protocol for one or all STPDs.
Syntax Description
stpd_name Specifies an STPD name on the switch.
Default
Enabled.
Usage Guidelines
If you want to enable the STP protocol for all STPDs, do not specify an STPD name.
Example
The following command enables an STPD named Backbone_st:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Automatically adds ports to an STPD when ports are added to a member VLAN.
Syntax Description
stpd_name Specifies an STPD name on the switch.
vlan_name Specifies the name of the VLAN to have autobind enabled.
vlan_list Specifies the VLAN list of IDs to have autobind enabled.
Default
The autobind feature is disabled on user-created STPDs. The autobind feature is enabled on the default
VLAN that participates in the default STPD S0.
If you enable autobind and add ports to a member VLAN, those ports are automatically added to the
STPD.
Usage Guidelines
If you create an STPD and a VLAN with unique names, the keywords stpd and vlan are optional.
In an EMISTP or PVST+ environment, when you issue this command, any port or list of ports that you
add to the carrier VLAN are automatically added to the STPD with autobind enabled. In addition, any
port or list of ports that you remove from a carrier VLAN are automatically removed from the STPD. This
allows the STPD to increase or decrease its span as you add ports to or remove ports from a carrier
VLAN.
For MSTP, when you issue this command, any port or list of ports that gets automatically added to an
MSTI are automatically inherited by the CIST. In addition, any port or list of ports that you remove from
an MSTI protected VLAN are automatically removed from the CIST. For more information see the
section. For more information, see Automatically Inheriting Ports--MSTP Only on page 2289.
Carrier VLAN
A carrier VLAN defines the scope of the STPD, which includes the physical and logical ports that belong
to the STPD and the 802.1Q tag used to transport STP BPDUs in the encapsulation mode is EMISTP or
PVST+. Only one carrier VLAN can exist in a given STPD, although some of its ports can be outside the
control of any STPD at the same time.
Note
The STPD ID must be identical to the VLAN ID of the carrier VLAN in that STPD.
If you configure MSTP, you do not need a carrier VLAN. With MSTP, you configure a CIST that controls
the connectivity of interconnecting MSTP regions and sends BPDUs across the regions to communicate
the status of MSTP regions. All VLANs participating in the MSTP region have the same privileges.
Protected VLAN
Protected VLANs are all other VLANs that are members of the STPD. These VLANs “piggyback” on the
carrier VLAN. Protected VLANs do not transmit or receive STP BPDUs, but they are affected by STP
state changes and inherit the state of the carrier VLAN. Protected VLANs can participate in multiple
STPDs, but any particular port in the VLAN can belong to only one STPD.
Enabling autobind on a protected VLAN does not expand the boundary of the STPD. However, the
VLAN and port combinations are added to or removed from the STPD subject to the boundaries of the
carrier VLAN.
If you configure MSTP, all member VLANs in an MSTP region are protected VLANs. These VLANs do not
transmit or receive STP BPDUs, but they are affected by STP state changes communicated by the CIST
to the MSTP regions. MSTIs cannot share the same protected VLAN; however, any port in a protected
VLAN can belong to multiple MSTIs.
Example
The examples in this section assume that you have already removed the ports from the Default VLAN.
To automatically add ports to an STPD running 802.1D, EMISTP, or PVST+ and to expand the boundary
of the STPD, you must complete the following tasks:
• Create the carrier VLAN.
• Assign a VLAN ID to the carrier VLAN.
• Add ports to the carrier VLAN.
• Create an STPD (or use the default, S0).
• Enable autobind on the STPDs carrier VLAN.
• Configure the STPD tag (the STPD ID must be identical to the VLAN ID of the carrier VLAN in the
STP domain).
• Enable STP.
The following example enables autobind on an STPD named s8 after creating a carrier VLAN named v5:
create vlan v5
configure vlan v5 tag 100
configure vlan v5 add ports 1:1-1:20 tagged
create stpd s8
enable stpd s8 auto-bind v5
configure stpd s8 tag 100
enable stpd s8
To automatically add ports to the CIST STPD and to expand the boundary of the STPD, you must
complete the following tasks:
• Create a VLAN or use the Default VLAN. (In this example, the Default VLAN is used.)
• Create the MSTP region.
• Create the STPD to be used as the CIST, and configure the mode of operation for the STPD.
The following example enables autobind on the VLAN Default for the CIST STPD named s1. (Starting
with ExtremeXOS 22.2, before configuring a user-created STP domain for MSTP, you must first disable
the STPD "s0" domain, which by default is in the MSTP CIST domain, and change its operational mode
to dot1d or dot1w, as only one MSTP CIST domain can be there on a switch.):
disable stpd s0
configure stpd s0 mode dot1d
configure mstp region 1
create stpd s1
configure stpd s1 mode mstp cist
configure stpd s1 priority 32768
enable stpd s1
The following example enables autobind on the VLAN math for the MSTI STPD named s2:
create vlan math
configure vlan math tag 2
configure vlan math add ports 2-3
configure mstp region 1
create stpd s2
configure stpd s2 mode mstp msti 1
configure stpd s2 priority 32768
enable stpd s2 auto-bind vlan math
configure stpd s2 ports link-type point-to-point 5-6
enable stpd s2
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the STP protocol on one or more ports.
Syntax Description
stpd_name Specifies an STPD on the switch.
all Specifies all ports for a given STPD.
port_list Specifies one or more ports or slots and ports.
Default
Enabled.
Usage Guidelines
If you create an STPD with a unique name, the keyword stpd is optional.
If STP is enabled for a port, BPDUs are generated and processed on that port if STP is enabled for the
associated STPD.
You must configure one or more STPDs before you can use the enable stpd ports command. To
create an STPD, use the create stpd stpd_name {descriptionstpd-description}
command. If you have considerable knowledge and experience with STP, you can configure the STPD
using the configure stpd commands. However, the default STP parameters are adequate for most
networks.
Example
The following command enables slot 2, port 4 on an STPD named Backbone_st:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables rapid root failover for faster STP recovery times.
Syntax Description
stpd_name Specifies an STPD name on the switch.
Default
Disabled.
Usage Guidelines
This command is applicable for STPDs operating in 802.1D.
If you create an STPD with a unique name, the keyword stpd is optional.
To view the status of rapid root failover on the switch, use the show stpd command. The show stpd
command displays information about the STPD configuration on the switch including the enable/
disable state for rapid root failover.
Example
The following command enables rapid root fail over on STPD Backbone_st:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the automatic entry of subVLAN information in the proxy ARP table.
Syntax Description
vlan-name Specifies a superVLAN name.
all Specifies all VLANs.
Default
Enabled.
Usage Guidelines
To facilitate communication between subVLANs, by default, an entry is made in the IP ARP table of the
superVLAN that performs a proxy ARP function. This allows clients on one subVLAN to communicate
with clients on another subVLAN. In certain circumstances, intra-subVLAN communication may not be
desired for isolation reasons.
Note
The isolation option works for normal, dynamic, ARP-based client communication.
Example
The following example enables the automatic entry of subVLAN information in the proxy ARP table of
the superVLAN "vsuper":
enable subvlan-proxy-arp vlan vsuper
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables Bluetooth capability on a switch.
Syntax Description
switch Designates enabling switch capabilities.
bluetooth Designates enabling Bluetooth capabilities on a switch.
discovery Sets discoverable mode of the switch. Default is enabled.
pairing Sets pairing ability with other Bluetooth-capable devices. Default is
enabled.
Default
By default, discovery and pairing modes are enabled.
Usage Guidelines
Using the command with no options enables Bluetooth capability on the switch. The discovery and
pairing options set discoverable mode and pairing ability, respectively.
To view Bluetooth and discovery/pairing status, use the show switch bluetooth [statistics
| inventory] command.
Example
The following example enables Bluetooth capability on a switch:
# enable switch bluetooth
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X465 series switches.
Description
Directs the switch to generate locally administered per-port MAC addresses.
Syntax Description
This command has no arguments or variables.
Default
This feature is disabled by default.
Usage Guidelines
ExtremeXOS switches do not use a unique per-port MAC address when transmitting bridge protocol
data units (BPDUs). As a result, switch management can become inaccessible when switch MAC
addresses are learned on the wrong L2 path (corresponding to a blocking port). This command allows
you to direct the switch to generate locally administered MAC addresses used by STP/RSTP/MSTP
BPDUs as source MAC address instead of the switch MAC address.
Example
The following example directs the switch to generate locally administered MAC addresses:
enable switch locally-administered-address
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables use of the switch's USB port.
Syntax Description
usb Specifies USB port on switch.
Default
Enabled by default.
Usage Guidelines
This command requires a reboot to take effect. This setting persists after reboots. To remove it, use the
command disable switch usb or use the command unconfigure switch {all | erase
[all | nvram]} with the all option.
Stack support is not available. You need to run this command individually on each node in a stack.
Example
The following example enables use of the USB port:
enable switch usb
This setting will take effect at the next system reboot.
History
This command was first available in ExtremeXOS 22.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable syslog
enable syslog
Description
Enables logging to all remote syslog host targets.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
To enable remote logging, you must do the following:
• Configure the syslog host to accept and log messages.
• Enable remote logging by using the enable syslog command.
• Configure remote logging by using the configure syslog command.
When you use the enable syslog command, the exporting process of the syslog begins. This
command also determines the initial state of an added remote syslog target.
Example
The following command enables logging to all remote syslog hosts:
enable syslog
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable tacacs
enable tacacs
Description
Enables TACACS+ authentication.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
After they have been enabled, all web and Telnet logins are sent to one of the two TACACS+ servers for
login name authentication.
Example
The following command enables TACACS+ user authentication:
enable tacacs
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable tacacs-accounting
enable tacacs-accounting
Description
Enables TACACS+ accounting.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
If accounting is used, the TACACS+ client must also be enabled.
Example
The following command enables TACACS+ accounting for the switch:
enable tacacs-accounting
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable tacacs-authorization
enable tacacs-authorization
Description
Enables CLI command authorization.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
When enabled, each command is transmitted to the remote TACACS+ server for authorization before
the command is executed. TACACS+ authentication must also be enabled to use TACACS+
authorization. Use the following command to enable authentication:
enable tacacs
Example
The following command enables TACACS+ command authorization for the switch:
enable tacacs-authorization
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables te tech support feature.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command turns on the tech-support feature. In the ExtremeXOS 15.4 release, the feature is disabled
by default. When the feature is disabled, the previous scheduled reports are canceled, and the bootup
event and critical severity events are ignored.
When the feature is enabled, if any configured collector has the report mode set to automatic, the
switch automatically attempts to send switch status reports to those collectors based on the
configuration setting for each individual collector.
You can always use the run tech-support report command to trigger a one-time report to a
particular collector, or all collectors, regardless if the feature is enabled or disabled or if the collector’s
report mode is set to automatic or manual.
Example
The following command enables the tech-support feature:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable telnet
enable telnet
Description
Enables external Telnet services on the system.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
You must be logged in as an administrator to enable or disable Telnet.
ExtremeXOS 11.2 introduces the concept of safe defaults mode. Safe defaults mode runs an interactive
script that allows you to enable or disable SNMP, Telnet, and switch ports. When you set up your switch
for the first time, you must connect to the console port to access the switch. After logging in to the
switch, you enter safe defaults mode. Although SNMP, Telnet, and switch ports are enabled by default,
the script prompts you to confirm those settings.
If you choose to keep the default setting for Telnet—the default setting is enabled—the switch returns
the following interactive script:
Since you have chosen less secure management methods, please remember to increase the
security of your network by taking the following actions: * change your admin password *
change your SNMP public and private strings * consider using SNMPv3 to secure network
management traffic
In addition, you can return to safe defaults mode by issuing the following command: configure
safe-default-script
If you return to safe defaults mode, you must answer the questions presented during the interactive
script.
For more detailed information about safe defaults mode, see the Using Safe Defaults Mode section in
the ExtremeXOS 30.5 User Guide.
Example
With administrator privilege, the following command enables Telnet services on the switch:
enable telnet
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable tunnel
enable {tunnel} tunnel_name
Description
Allows GRE tunnels to be enabled.
Syntax Description
tunnel_name GRE tunnel name
Default
Enabled.
Usage Guidelines
Use this command to enable GRE tunnels.
Example
enable myGREtunnel
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables the Session-Reflector.
Syntax Description
restrict Restricts only TWAMP control sessions to create test sessions and
reflector does not respond to TWAMP-test packets tgat do not match
a test session created by a control session.
Default
N/A.
Usage Guidelines
If the you disable the Session-Reflector, the application terminates all current TWAMP test sessions. If
you specify the restrict keyword, only TWAMP control sessions may create test sessions and the
reflector will not respond to TWAMP-test packets that do not match a test session created by a control
session.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command enables the TWAMP server.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
The command is available on all platforms.
enable udp-echo-server
enable udp-echo-server {vr vrid}{udp-port port}
Description
Enables UDP echo server support.
Syntax Description
vrid Specifies the VR or VRF.
port Specifies the UDP port.
Default
Disabled.
Usage Guidelines
UDP echo packets are used to measure the transit time for data between the transmitting and receiving
ends.
Example
The following example enables UDP echo server support:
enable udp-echo-server
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the use of the specified Universal Port profile on the switch.
Syntax Description
profile-name Specifies the UPM profile to be enabled.
Default
A UPM profile is enabled by default.
Example
The following command enables a UPM profile called example on the switch:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables a VXLAN remote endpoint.
Syntax Description
virtual-network Virtual overlay network.
remote-endpoint Remote tunnel endpoint information.
vxlan VXLAN virtual networks remote endpoint.
ipaddress Specifies an IP address of a remote endpoint.
ipaddress Specifies the IP address of the desired remote endpoint.
vr Specifies a VR/VRF instance the remote endpoint is associated with.
vr_name Specifies the desired existing VR/VRF instance the remote endpoint is
associated with. Default is VR-Default.
all Specifies all remote tunnel endpoints.
Default
If a VR is not specified, VR-Default is the VR.
Usage Guidelines
Extreme Loop Recognition Protocol (ELRP) detects loops across VXLAN tunnels. If a loop is detected
across the tunnel, ELRP takes down the VXLAN remote endpoint. You can use this command to re-
enable the remote endpoint.
Example
The following example enables the remote endpoint at 100.1.1.1 on VR-Default (not specified, command
default):
# enable virtual-network remote-endpoint vxlan ipaddress 100.1.1.1
History
This command was first available in ExtremeXOS 22.4.
Platform Availability
This command is supported on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series
switches, and stacks with X465, X590, X670-G2, X690, X870 slots only.
enable virtual-router
enable virtual-router vrf-name
Description
Enables a VRF.
Note
This command does not affect virtual routers.
Syntax Description
vrf-name Specifies the name of the VR or VRF instance.
Default
Enabled.
Usage Guidelines
This command is used to administratively enable or disable a VRF. The VRF specific commands are still
accepted and retained by the switch. This configuration has an operational impact on the VRF.
Example
The following example enables VRF "vrf1":
enable virtual-router vrf1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable vlan
enable [ {vlan} vlan_name | vlan vlan_list]
Description
Use this command to re-enable a VLAN that you previously disabled.
Syntax Description
vlan_name Specifies the VLAN you want to enable.
vlan_list Specifies the VLAN list of IDs you want to enable.
Default
Enabled.
Usage Guidelines
This command allows you to administratively enable specified VLANs that you previously disabled.
Example
The following example enables the VLAN named "accounting":
enable vlan accounting
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables the egress filtering of frames based on their CVIDs on ports configured as CEPs.
Syntax Description
port_list Specifies a list of ports.
all Specifies all switch ports.
Default
Egress CVID filtering is disabled.
Usage Guidelines
For a given VMAN and a port configured as a CEP for that VMAN, only frames with CVIDs that have
been mapped from the CEP to the VMAN are forwarded from the VMAN and out the CEP.
To view the configuration setting for the egress CVID filtering feature, use the show ports
information command.
Note
CVID egress filtering is available only on switches that support this feature, and when this
feature is enabled, it reduces the maximum number of CVIDs supported on a port. The control
of CVID egress filtering applies to fast-path forwarding. When frames are forwarded through
software, CVID egress filtering is always enabled.
Example
The following command enables egress CVID filtering on port 1:
enable vman cep egress filtering port 1
History
This command was first available in ExtremeXOS 12.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
enable vm autostart
enable vm vm_name autostart
Description
Enables automatic start-up of guest virtual machines (VMs).
Syntax Description
vm Designates a virtual machine.
vm_name Specifies the VM name.
autostart Specifies automatic start-up of the specified VM. Default is disabled.
Default
By default, automatic start-up is disabled.
Usage Guidelines
This command enables automatically starting up a specific VM when ExtremeXOS starts.
You must reboot the switch for this command to take effect.
Example
The following example enables automatic start-up of VM "vm1":
# enable vm vm1 autostart
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
enable vm-tracking
enable vm-tracking
Description
Enables the XNV feature on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables the XNV feature, which tracks VMs that connect to the switch.
This command does not enable XNV on any ports. To start tracking VMs, you must enable VM tracking
on one or more ports using the enable vm-tracking ports command.
Example
The following command enables the XNV feature:
# enable vm-tracking
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command enables VM-tracking dynamic VLAN on specific ports. The ALL option is not supported
because VM-tracking dynamic VLAN should never be enabled on a switch's uplink port.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to enable VM-tracking dynamic VLAN on specific ports. The ALL option is not
supported because VM-tracking dynamic VLAN should not be enabled on a switch's uplink port.
Example
The following command enables VM tracking dynamic VLAN on port 2:1:
# enable vm-tracking dynamic-vlan ports 2:1
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Enables the XNV feature on the specified ports.
Syntax Description
port_list Specifies one or more ports or slots and ports.
Default
Disabled.
Usage Guidelines
You must enable VM tracking on the switch with the enable vm-tracking command before you
can use this command. This command enables VM tracking on the specified ports. You should enable
VM tracking only on ports that connect directly to a server that hosts VMs that you want to track. You
should never enable VM tracking on a switch uplink port.
Example
The following command enables VM tracking on port 2:1:
# enable vm-tracking ports 2:1
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
enable vpex
enable vpex
Description
Enables VPEX mode for using bridge port extenders (BPEs).
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
Default
N/A.
Usage Guidelines
This command enables VPEX mode and allows you to refer to ports in the slot:port notation in
applicable commands. A reboot of the switch is required for the command to take effect. After
rebooting, the CLI prompt changes to show that the switch is now slot 1 (for example):
Slot-1 VPEX X670G2-48x-4q.14 #
After enabling VPEX mode, to use the BPE, you need to configure the slot assignment for the BPE,
using the command: enable vpex
VPEX mode is not compatible with stacking mode. Only one of these modes can be enabled at a time.
Example
The following example enables VPEX mode:
# enable vpex
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, , X690, X590 series switches.
Description
Enables automatic configuration of extended edge switching architecture (controlling bridge (CB) and
bridge port extenders (BPEs)).
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
auto-configuration Specifies enabling automatic configuration of extended edge
switching architecture.
Default
Disabled.
Usage Guidelines
When this command is run the controlling bridge switch detects new BPEs connected to ports not
configured as cascade ports, and automatically configures cascade ports, extended slots, and LAGs on
cascade ports.
If you want to use redundant CBs, you must create the peer relationship between redundant CBs and
ensure that both CBs are up. The rest of the MLAG setup for redundant CBs is handled automatically.
To enable auto-configuration, you must first enter VPEX mode (see enable vpex on page 2312).
When auto-configuration mode is enabled, you cannot manually configure Extended Edge Switching
ports using the command configure vpex ports port_list slot slot_num
Example
The following example enables auto-configuration mode:
enable vpex auto-configuration
History
This command was first available in ExtremeXOS 22.6.
Platform Availability
This command is available on the Summit X670-G2 and ExtremeSwitching X690, X590 series switches.
Description
Enables automatic upgrading on Extended Edge Switching topologies.
Syntax Description
vpex Specifies Virtual Port Extender (VPEX).
auto-upgrade Specifies that the controlling bridge (CB) automatically upgrades
bridge port extender (BPE) slots in MLAG mode (default is enabled).
Default
Automatic upgrading is enabled by default.
Usage Guidelines
Automatic upgrading can occur only when both CBs in the MLAG have the same BPE xmod versions
installed, and only after all slots are synchronized between the CBs.
To enable automatic upgrading, you must first enter VPEX mode (see enable vpex on page 2312). To
view the status of automatic upgrading, use the command show vpex.
Example
The following example enables automatic upgrading:
# enable vpex auto-upgrade
History
This command was first available in ExtremeXOS 30.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, , X465 , X690, X590 series switches.
enable vpls
enable vpls [vpls_name | all]
Note
This command has been replaced with the following command: enable l2vpn [vpls
[vpls_name | all] | vpws [vpws_name | all]] .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Enables the VPLS instance specified by vpls_name.
Syntax Description
vpls_name Identifies the VPLS within the switch (character string).
all Specifies all VPLS.
Default
All newly created VPLS instances are enabled.
Usage Guidelines
This command enables the VPLS instance specified by vpls_name. By default, all newly created VPLS
instances are enabled. When enabled, VPLS attempts to establish sessions between all configured
peers. Services must be configured and enabled for sessions to be established successfully.
Example
The following command enables the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: enable l2vpn vpls
fdb mac-withdrawal .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Enables the VPLS MAC address withdrawal capability.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
Use this command to enable FDB MAC withdrawal after it has been disabled.
Example
The following command enables MAC address withdrawal:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: enable l2vpn [vpls
vpls_name | vpws vpws_name] health-check vccv .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Enables the VCCV health check feature on the specified VPLS.
Syntax Description
vpls_name Identifies the VPLS for which health check is to be enabled.
Default
Health check is disabled.
Usage Guidelines
Health check must be enabled on both ends of a PW to verify connectivity between two VPLS peers.
Both VCCV peers negotiate capabilities at PW setup. A single VCCV session monitors a single PW.
Therefore, a VPLS with multiple PWs will have multiple VCCV sessions to multiple peers.
Example
The following command enables the health check feature on the VPLS instance myvpls:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Note
This command has been replaced with the following command: enable l2vpn [vpls
[vpls_name | all] | vpws [vpws_name | all]] service .
This command is still supported for backward compatibility, but it will be removed from a
future release, so we recommend that you start using the new command.
Description
Enables the configured VPLS services for the specified vpls_name.
Syntax Description
vpls_nam Identifies the VPLS within the switch (character string).
e
all Specifies all VPLS.
Default
Enabled.
Usage Guidelines
This command enables the configured VPLS services for the specified vpls_name. When services are
disabled, the VPLS is withdrawn from all peer sessions. The keyword all enables services for all VPLS
instances.
Example
The following command enables the configured VPLS services for the specified VPLS instance:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
Description
This command appliles group configuration on individual VRs and they then become member VRs.
Syntax Description
group Form a group of VRRP VRs to operate in high-scale mode.
group_name Specifies the VRRP group name.
configuration Applies group configuration on individual VRs (default).
members Enables all VRs that are members of the group.
Default
If you do not specify, group configuration is applied to individual VRs.
Usage Guidelines
When this command is issued the primary VR of the group sends VRRP advertisements at configured
intervals. Secondary VRs send at a much slower rate.
Example
The following example brings group configuration into effect on the member VRs of the group:
enable vrrp group ExtremeNet configuration
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Enables a specific VRRP instance or all VRRP instances on the switch.
Syntax Description
vlan_name Specifies the name of a VRRP VLAN.
vlan_list VLAN list (1–4,094).
vridval Specifies the VRID for the VRRP instance to be enabled. To display the
configured VRRP router instances, enter the show vrrp command.
vrid_list List of virtual router IDs (1–255).
Default
N/A.
Usage Guidelines
This enables a specific VRRP instance on the device. If you do not specify a VRRP instance, all VRRP
instances on this device are enabled.
Example
The following command enables all VRRP instances on the switch:
enable vrrp
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the VRRP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
enable watchdog
enable watchdog
Description
Enables the system watchdog timer.
Syntax Description
This command has no arguments or variables.
Default
Enabled.
Usage Guidelines
The watchdog timer monitors the health of the switch hardware and software events. For example, the
watchdog timer reboots the switch if the system cannot reset the watchdog timer. This is caused by a
long CPU processing loop, any unhandled exception, or a hardware problem with the communication
channel to the watchdog. In most cases, if the watchdog timer expires, the switch captures the current
CPU status and posts it to the console and the system log. In some cases, if the problem is so severe
that the switch is unable to perform any action, the switch reboots without logging any system status
information prior to reboot.
To display the watchdog state of your system, use the show switch command.
Example
The following command enables the watchdog timer:
enable watchdog
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables hypertext transfer protocol (HTTP) access to the switch on the default HTTP port (80).
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
If HTTP access has been disabled, use this command to enable HTTP access to the switch.
Example
The following command enables HTTP on the default port:
History
This command was first available in the ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables secure socket layer (SSL) access to the switch on the default port (443).
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
Use this command to allow users to connect using a more secure HTTPS connection.
To use secure HTTP access (HTTPS) for web-based login connections, you must specify HTTPS as the
protocol when configuring the redirect URL. For more information about configuring the redirect URL,
see the configure netlogin redirect-page command.
Example
The following command enables SSL on the default port:
enable web https
History
This command was first available in the ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables XML configuration mode on the switch.
Syntax Description
This command has no arguments or variables.
Default
Disabled.
Usage Guidelines
This command enables the XML configuration mode on the switch, however XML configuration mode is
not supported for end users, and Extreme Networks strongly cautions you not to enable this mode. Use
this command only under the direction of Extreme Networks.
If you inadvertently issue this command, the switch prompt will be changed by adding the text (xml) to
the front of the prompt. If you see this mode indicator, please disable XML configuration mode by using
the following command:
disable xml-mode
Example
The following command enables XML configuration mode on the switch:
enable cli xml-mode
History
This command was first available in an ExtremeXOS 11.2.
The cli keyword was added for syntax consistency in ExtremeXOS 30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Enables or disables BFD on a VLAN.
Syntax Description
vlan_name Specifies the VLAN name.
Default
N/A.
Usage Guidelines
Use this command to enable or disable BFD on a VLAN.
Example
The following command enables the bfd on the VLAN named finance:
# enable bfd vlan finance
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
enable/disable xml-notification
[enable|disable] xml-notification [all | target]
Description
Enables or disables Web server target(s).
Syntax Description
target wSpecifies the configured target.
Default
By default, the target Web server is not enabled for xml-notifications. You have to explicitly enable it,
and the display value is “no.”
Usage Guidelines
Use the enable option to enable Web server target(s) in order to receive events from ExtremeXOS
modules and to send out events to the targeted Web server(s).
Example
The following command enables all of the configured targets:
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
ENDIF
ENDIF
Note
This is a script command and operates only in scripts when scripting is enabled with the
following command: enable cli scripting {permanent}.
Description
Causes the IF construct to be terminated.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
The ENDIF command should be used after the IF _expression THEN statement(s) command.
You can insert comments by using a number sign (#). CLI scripting must be enabled to use this
command.
Example
The following example executes the show switch command if the value of the variable is greater than 2
and execute the show vlan command otherwise:
show switch
ELSE
show vlan
ENDIF
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
ENDWHILE
ENDWHILE
Note
This is a script command and operates only in scripts when scripting is enabled with the
following command: enable cli scripting {permanent}.
Description
Causes the WHILE construct to be terminated.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
The ENDWHILE command must be used after a corresponding WHILE _expression
DOstatement(s) command.
You can insert comments by using a number sign (#). CLI scripting must be enabled to use this
command.
Example
This example creates 10 VLANs, named x1 to x10:
set var x 1
ENDWHILE
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
exit
exit
Description
Logs out the session of a current user for CLI or Telnet.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to log out of a CLI or Telnet session.
When you issue this command, you are asked to save your configuration changes to the current, active
configuration. Enter y if you want to save your changes. Enter n if you do not want to save your
changes.
Example
The following command logs out the session of a current user for CLI or Telnet:
exit
Enter y if you want to save your changes. Enter n if you do not want to save your changes.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
history
history
Description
Displays a list of all the commands entered on the switch.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
ExtremeXOS software “remembers” all the commands you entered on the switch.
Example
The following command displays all the commands entered on the switch:
history
If you use a command more than once, consecutively, the history will only list the first instance.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
IF ... THEN
IF (_expression) THEN
Note
This is a script command and operates only in scripts when scripting is enabled with the
following command: enable cli scripting {permanent}.
Description
Optionally executes a code block based on the condition supplied.
Syntax Description
expression Specifies the condition for which the statements should be executed.
statements Actions to be executed when the specified conditions are met.
Default
N/A.
Usage Guidelines
This command is usually followed by statements that are executed if the condition evaluates to true.
It can also be followed by an ELSE block, which is executed if the condition evaluates to false.
The IF construct can be nested inside other IF and WHILE constructs. Nesting is supported up to five
levels. If there is incorrect nesting of IF conditions, an error message is displayed. If a user tries to
execute more than five nested IF conditions, an error message is displayed.
Example
The following example executes the show switch command if the value of the variable is greater than 2
and executes the show vlan command otherwise:
show switch
ELSE
show vlan
ENDIF
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
install bootrom
install bootrom fname {reboot}
On a SummitStack use:
install bootrom fname {reboot} {slot slotid}
Description
Installs a new version of the ExtremeXOS BootROM image.
Syntax Description
fname Specifies the BootROM image file.
reboot Reboots the switch after the image is installed.
slotid This parameter is available only on the SummitStack. On a
SummitStack, the slotid specifies the node on which the
BootROM image should be installed.
Default
N/A.
Usage Guidelines
When you download a BootROM image, the system asks if you want to install the image immediately
after the download is finished. If you choose to install the image at a later time, use this command to
install the software on the switch.
The BootROM image file is an .xbr file, and this file contains the executable code.
When specifying a local or remote filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - )
• Underscore ( _ )
SummitStack Only
You can issue this command only from the Master node.
Example
The following example installs the bootrom image file summitX-1.0.1.5-bootrom.xtr:
install bootrom summitX-1.0.1.5-bootrom.xtr
History
This command was first available in ExtremeXOS 11.0.
From ExtremeXOS 12.0, this command is supported on a stack. The slot parameter is added. The slot
parameter is applicable only when the switch is in a stack.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
and stacks.
install firmware
install firmware {force} {slot slot-number}
Description
This command upgrades the ExtremeSwitching X440-G2, X465, and X620 using images from the
installed ExtremeXOS package.
Syntax Description
force Specifies that a new image is installed without a version check.
slot Slot for firmware installation.
slot-number Slot number.
Default
N/A.
Usage Guidelines
On X440-G2, X465, and X620 switches, use the install firmware command to upgrade the
system FPGA and PLD images.
On X440-G2, X465, and X620 switches, the ExtremeXOS software automatically compares the existing
firmware image flashed into the hardware with the firmware image bundled with the ExtremeXOS
image. You can also use the install firmware command to compare the firmware images.
Before using the install firmware command in a stack, wait until the show slot command indicates
the slots are operational. When the slots are operational, use the install firmware command.
The switch checks internal devices for a possible firmware upgrade. If the bundled firmware image is
newer than the existing firmware image, the switch prompts you to confirm the upgrade.
• Enter y to upgrade the firmware.
• Enter n to cancel the firmware upgrade for the specified hardware and continue scanning for other
hardware that needs to be upgraded.
• Enter cr to cancel the upgrade. After a firmware image upgrade, messages are sent to the log.
The new FPGA and PLD firmware overwrites the older versions flashed into the hardware. The switch
always maintains a backup version in hardware in case the install is interrupted. Use the reboot
command to reboot the switch and activate the new firmware.
During the firmware upgrade, do not cycle down or disrupt the power to the switch. If a power
interruption occurs, the installed firmware may be corrupted. In this case, the switch uses a backup
version, and you can run the upgrade again to install the latest version.
The switch displays status messages after you use the install firmware command. The output varies
depending upon your platform and the software version running on your system.
During a firmware upgrade, the switch prompts you to save your configuration changes to the current,
active configuration. Enter y to save your configuration changes to the current, active configuration.
Enter n if you do not want to save your changes.
PoE firmware is always automatically upgraded or downgraded to match the operational code image.
This configuration is not applicable to PoE firmware.
Example
The following example installs the newer firmware image(s):
install firmware
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available only on the ExtremeSwitching X440-G2, X465, and X620 switches.
install image
install image fname {partition} [ active | inactive] {reboot}
On a SummitStack use:
install image fname {partition} {slot slot number} {reboot}
Description
Installs a new version of the ExtremeXOS software image.
Note
Beginning with ExtremeXOS 12.1, an ExtremeXOS core image must be installed on the
alternate (non-active) partition. If a user tries to install on an active partition, the following
error message is displayed:
Error: Image can only be installed to the non-active partition.
Syntax Description
fname Specifies the software image file.
partition Specifies which partition the image should be saved to: primary or
secondary. Select primary to save the image to the primary
partition and secondary to save the image to the secondary
partition.
active Specifies automatic determination for active (primary) partition.
Default
N/A.
Usage Guidelines
When you download a software image, you are asked if you want to install the image immediately after
the download is finished. If you choose to install the image at a later time, use this command to install
the software on the switch.
The software image file can be an .xos file, which contains an ExtremeXOS core image, or an .xmod file,
which contains additional functionality to supplement a core image.
SummitStack Only
You can issue this command only from a Master node. The slot parameter is available only on a stack.
When specifying a local filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - )
• Underscore ( _ )
To install a module to the alternate partition, use the install firmware command to install the
module. Remember, the core image on the alternate partition must be of the same version as the
module. When you make the alternate partition active, by issuing the use image command and
rebooting the switch, the module is also activated at boot time.
To install a module to the active partition, use the install firmware command to install the
module. Remember, the core image on the active partition must be of the same version as the module.
If you reboot the switch, the module will also be activated, but you can activate the module without
rebooting the switch by issuing the run update command. After issuing that command, all the
functionality, and CLI commands, of the module will be available.
For more detailed information about hitless upgrade, see the download image command.
Example
The following example installs the software image file summitX440-11.5.1.2.xos on a switch:
install image summitX440-11.5.1.2.xos
The following example shows a software image version that has been downloaded, but not installed:
install image ?
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Copies the image installed on the active partition to the inactive partition.
Syntax Description
inactive Copy image from active partition to inactive partition. This
includes the .xos image and all .xmod and .lst files.
slot Copy image only on the specified slot. Default is to copy to all
slots.
slot Specifies slot number to copy image to.
Default
By default, for stacks, if a slot is not specified, the image is copied to all slots.
Usage Guidelines
Copying from active partition to inactive partition includes the .xos image and all .xmod and .lst files.
This command can act on any or all slots only from the master. If not from the master, the command can
only act on its own slot.
Example
The following example copies the image on the active partition to the inactive partion:
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
load script
load script filename {arg1} {arg2} ... {arg9}
Description
Loads (plays back) an ASCII-formatted configuration file or a user-written script file on the switch.
Syntax Description
filename Specifies the user-defined name of the ASCII-formatted configuration
file or a user-written script file. The script file is known as the XOS
script file and uses the .xsf or .py file extension.
arg Specifies up to nine variable values that can be specified by the user.
The variables are created with the names CLI.ARGV1, CLI.ARGV2, ...
CLIARGV9.
Default
N/A.
Usage Guidelines
Use this command to load an ASCII-formatted configuration file or a user-written script file.
Configuration File: After downloading the configuration file from the TFTP server, this command loads
and restores the ASCII-formatted configuration file to the switch.
An ASCII-formatted configuration file uses the .xsf file extension, not the .cfg file extension. The .xsf file
extension (known as the XOS script file) saves the XML-based configuration in an ASCII format readable
by a text editor.
For more detailed information about the ASCII configuration file, including the steps involved to upload,
download, and save the configuration, see the upload configuration [hostname |
ipaddress] filename {vr vr-name} command.
User-Written Script File: After writing a script, this command executes the script and passes arguments
to it. As with the configuration files, these files use the .xsf or .py file extension that is automatically
added.
The command allows up to nine optional variable values to be passed to the script. These are created
with the names CLI.ARGV1, CLI.ARGV2, CLI.ARGV3, ... CLI.ARGV9.
In addition, two other variables are always created. CLI.ARGC gives the count of the number of
parameters passed, and CLI.ARGV0 contains the name of the script that is being executed.
Note
Only the .xsf and .py extensions are used. The load script command assumes a .py or .xsf
extension and retries opening the file if the file cannot be found with the original specified
name or no extension is provided.
Example
The following command loads the ASCII-formatted configuration named configbackup.xsf:
After issuing this command, the ASCII configuration quickly scrolls across the screen. The following is an
example of the type of information displayed when loading the ASCII configuration file:
ExtremeXOS 15.6 provided capability for Python scripting. Current Python scripting implementation
allows a script to interact directly with the CLI inteface for managing ExtremeXOS functionality. Python
script files end in .py. The .py suffix on the script file name tells the load script command to use
the Python interpreter to process the script file. Additionally, ExtremeXOS 15.6 introduced a synonym
command: run script. This command functions exactly as load script.
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Note
This is a script command and operates only in scripts or on the command line when
scripting is enabled with the following command: enable cli scripting
{permanent}.
Description
Imports the specified set of variables associated with a key into the current session.
Syntax Description
key Specifies the key associated with the variables to be imported.
var1 var2 Specifies the variables to be imported. The first variable is mandatory,
up to four more optional variables can be specified.
Default
N/A.
Usage Guidelines
The specified key should have created by the user. Also, the variables specified should have been saved
using that key.
Attempting to use this command with a non-existent key results in an error message being displayed.
Example
The following example imports the variables “username,” “ipaddr,” and “vlan” from the key “blue:”
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
logout
logout
Description
Logs out the session of a current user for CLI or Telnet.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to log out of a CLI or Telnet session.
When you issue this command, you are asked to save your configuration changes to the current, active
configuration. Enter y if you want to save your changes. Enter n if you do not want to save your
changes.
Example
The following command logs out the session of a current user for CLI or Telnet:
logout
Enter y if you want to save your changes. Enter n if you do not want to save your changes.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
ls
ls file_name
Description
Lists all configuration, policy, and if configured, core dump files in the system.
Syntax Description
file_name Lists all the files that match the wildcard.
Default
N/A.
Usage Guidelines
When you use issue this command without any options, the output displays all of the configuration and
policy files stored on the switch.
When you configure and enable the switch to send core dump (debug) information to the internal
memory card, specify the internal-memory option to display the core dump files stored on the internal
memory card. For more information about core dump files, see Core Dump Files on page 2343.
When you specify the memorycard option on a switch, the output displays all of the files stored on the
removable storage device, including core dump files if so configured. For more information about core
dump files, see Core Dump Files on page 2343.
When you specify the file-name option, the output displays all of the files that fit the wildcard
criteria.
When the switch has not saved any debug files, no files are displayed. For information about
configuring and sending core dump information to the internal memory card, compact flash card, or
USB 2.0 storage device, see the configure debug core-dumps and save debug tracefiles
memorycard commands.
For more detailed information about core dump files, see Troubleshooting section in the ExtremeXOS
30.5 User Guide.
Example
The following command displays a list of all current configuration and policy files in the system:
ls
The following command displays a list of all current configuration and policy files on a removable
storage device:
ls /usr/local/ext
The following command displays a list of all configuration and policy files with a filename beginning
with the letter “a:”
(debug) BD-12804.1 # ls a*
History
This command was first available in ExtremeXOS 10.1.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
mkdir
mkdir directory_name
Description
Creates a new directory on the specified file system to relative to the current working directory.
Syntax Description
mkdir Create a directory.
directory_name Pathname of a directory.
Default
N/A.
Usage Guidelines
Use this command to create a new directory on the specified file system to relative to the current
working directory.
History
This command was first available in ExtremeXOS 15.5
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
mrinfo
mrinfo {router_address} {from from_address} {timeout seconds} {multiple-
response-timeout multi_resp_timeout} {vr vrname}
Description
Requests information from a multicast router.
Syntax Description
router_address Specifies the unicast IP address of the router for which you want
information.
from_address Specifies the unicast IP address of the interface where the mrinfo request is
generated.
seconds Specifies a maximum time to wait for a response. The range is 1–30
seconds.
multi_resp_timeout Specifies a maximum time to wait for additional responses after the first
response is received. The range is 0 to 3 seconds.
vrname Specifies a VR name.
Default
router_address: One of the local interface addresses.
timeout: 3 seconds
multiple-response-timeout: 1 second
vr: DefaultVR
Usage Guidelines
The last column of the mrinfo command output displays information in the following format:
[Metric/threshold/type/flags]
Example
The following command requests information from multicast router 1.1.1.1:
Switch.1 # mrinfo 1.1.1.1
1.1.1.1 [Flags:PGM]
2.2.2.1 -> 2.2.2.2 [1/0/pim/querier]
1.1.1.1 -> 0.0.0.0 [1/0/pim/querier/leaf]
8.8.8.1 -> 8.8.8.4 [1/0/pim/querier]
3.3.3.1 -> 0.0.0.0 [1/0/pim/down]
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
mtrace
mtrace source src_address {destination dest_address} {group grp_address}
{from from_address} {gateway gw_address} {timeout seconds} {maximum-
hops number} {router-alert [include | exclude]} {vr vrname}
Description
Traces multicast traffic from the receiver back to the source.
Syntax Description
src_address Specifies the unicast IP address of the multicast source.
dest_address Specifies the unicast IP address of the multicast group receiver.
grp_address Specifies the multicast IP address of the group.
from_address Specifies the unicast IP address of the interface where the mtrace
request originates. This is used as the IP destination address of the
mtrace response packet.
gw_address Specifies the gateway router IP address of the multicast router to
which the unicast mtrace query is sent.
seconds Specifies a maximum time to wait for the mtrace response before
making the next attempt. The range is 1–30 seconds.
number Specifies the maximum number of hops for the trace. The range is 1 to
255.
router-alert Specifies whether the router-alert option is included or excluded in
mtrace packets.
vrname Specifies a VR name.
Default
destination: IP address of interface from which mtrace query is generated.
group: 0.0.0.0
gateway: 224.0.0.2 when the destination is in the same subnet as one of the IP interfaces. For a non-
local destination address, it is mandatory to provide a valid multicast router address.
timeout: 3 seconds
maximum-hops: 32
router-alert: include
vr: DefaultVR
Usage Guidelines
The multicast traceroute initiator node generates a multicast query and waits for timeout period to
expire. If there is no response for the timeout period, the initiator node makes two more attempts. If no
response is received after three attempts, the initiator node moves to a hop-by-hop trace by
manipulating the maximum hop fields to perform a linear search.
Extreme Networks switches set the packet count statistics field to 0xffffffff to indicate that this field is
not supported.
The last column of the mtrace command output displays forwarding codes, which are described in the
following table.
5 ExtremeXOS switches along the mtrace path do not provide this forwarding code.
Example
The following command initiates an mtrace for group 225.1.1.1 at IP address 1.1.1.100:
Switch.6 # mtrace source 1.1.1.100 group 225.1.1.1
Mtrace from 1.1.1.100 to Self via 225.1.1.1
0 34.2.2.4
-1 34.2.2.4 PIM thresh^ 0 1.1.1.100/32 RPF Interface
-2 34.2.2.3 PIM thresh^ 0 1.1.1.100/32
-3 23.1.1.2 PIM thresh^ 0 1.1.1.100/32
-4 2.2.2.1 PIM thresh^ 0 1.1.1.100/32
Round trip time 9 ms; total ttl of 4 required.
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the IPv4 multicast feature, see the ExtremeXOS 30.5 Feature License Requirements document.
mv
mv old_name new_name
Description
Moves a file from the specified file system or relative to the current working directory to another file on
the specified file system or relative to the current working directory.
Syntax Description
old_name Specifies the current name of the configuration or policy file on the
system.
new_name Specifies the new name of the configuration or policy file on the
system.
Default
N/A.
Usage Guidelines
Use this command to move a file from the specified file system or relative to the current working
directory to another file on the specified file system or relative to the current working directory. This
command provides the functionality to relocate an existing file by creating a new entry in the file
system, linking the content of the existing file to the new one and removing the old entry. If given a
different name, the new file can be created in the same directory as the existing file
• XML-formatted configuration files have the .cfg file extension. The switch only runs .cfg files.
• ASCII-formatted configuration files have the .xsf file extensions. For more information, see the
Software Upgrade and Boot Options section in the ExtremeXOS 30.5 User Guide.
• Policy files have the .pol file extension.
• Core dump files have the .gz file extension. For more information, see the Internal Memory and Core
Dump Files section in the ExtremeXOS 30.5 User Guide.
Make sure the renamed file uses the same file extension as the original file. If you change the file
extensions, the file may be unrecognized by the system. For example, if you have an existing
configuration file named test.cfg, the new filename must include the .cfg file extension.
You cannot rename an active configuration file (the configuration currently selected to boot the switch).
To verify the configuration that you are currently using, issue the show switch {detail} command. If you
attempt to rename the active configuration file, the switch displays a message similar to the following:
Error: Cannot rename current selected active configuration file.
When you rename a file, the switch displays a message similar to the following:
Rename config test.cfg to config megtest.cfg on switch? (y/n)
Enter y to rename the file on your system. Enter n to cancel this process and keep the existing filename.
The memorycard option moves files between a removable storage device and the switch. If you use
the memorycard option for both the old-name and the new-name, this command just renames a file on
the removable storage device.
Case-sensitive Filenames
Filenames are case-sensitive. In this example, you have a configuration file named Test.cfg. If you
attempt to rename the file with the incorrect case, for example test.cfg, the switch displays a message
similar to the following:
Error: mv: unable to rename `/config/test.cfg': No such file or directory
Since the switch is unable to locate test.cfg, the file is not renamed.
When specifying a local filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Dash ( - ).
• Underscore ( _ ).
When naming a local or remote file, remember the requirements listed above.
When you configure the switch to send core dump (debug) information to the internal memory card,
specify the internal-memory option to rename an existing core dump file. If you have a switch with a
removable storage device installed, you can move and rename the core dump file to that location.
For information about configuring and sending core dump information to the internal memory card, see
the configure debug core-dumps and save debug tracefiles memorycard commands.
Example
The following command renames the configuration file named Testb91.cfg to Activeb91.cfg:
mv Testb91.cfg Activeb91.cfg
On a switch with a removable storage device installed, the following command moves the configuration
file named test1.cfg from the switch to the removable storage device:
mv test1.cfg /usr/local/ext/test1.cfg
If you do not change the name of the configuration file, you can also use the following command to
move the configuration file test1.cfg from the switch to a removable storage device:
mv /usr/local/ext
On a switch with a removable storage device installed, the following command moves the policy file
named bgp.pol from the removable storage device to the switch:
mv /usr/local/ext/bgp.pol bgp.pol
History
This command was first available in ExtremeXOS 10.1.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
nslookup
nslookup {IPv4 | IPv6} hostname
Description
Displays the IP address of the requested host.
Syntax Description
IPv4 Lookup only IPv4 address(es).
IPV6 Lookup only IPv6 address(es).
hostname Specifies the hostname.
Default
Lookup both IPv4 and IPv6 addresses.
Usage Guidelines
For nslookup to work, you must configure the DNS client, and the switch must be able to reach the DNS
server.
By default, the command looks for both IPv4 and IPv6 addresses and reports an error only when
neither an IPv4 address nor an IPv6 address is found for the host.
If the IPv4 or IPv6 option is specified, DNS lookup happens only for that address type, and an error is
reported when no address of that type is found.
When specifying a host name or remote IP address, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Dash ( - ) Permitted only for host names.
• Underscore ( _ ) Permitted only for host names.
• Colon ( : ).
When naming or configuring an IP address for your network server, remember the requirements listed
above.
Example
The following command looks up the IP addresses of a computer with the name myhost.mydomain that
has 2 IPv4 addresses and 1 IPv6 address:
nslookup myhost.mydomain
History
This command was first available in ExtremeXOS 10.1.
Support for using an IP address to obtain the name of the host was added in ExtremeXOS 11.0. Support
for looking up IPv6 addresses was added in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
open vm console
open vm vm_name {console}
Description
Opens a session to the serial console of a virtual machine (VM).
Syntax Description
vm Designates a virtual machine.
vm_name Specifies the VM name to use with a serial console.
console Open VM serial console (default).
Default
By default, a serial console is opened.
Usage Guidelines
You can disconnect the console session by typing CTRL + Y, or, if using Telnet recursively with an
appropriate client, by typing CTRL + ] followed by “send escape”. A maximum of one session can be
active for a VM.
You cannot access the serial console before starting a VM. You must start the VM, and then reboot it to
gain serial console access.
The Extreme Insight feature requires the Solid State Storage Device SSD-120.
Example
The following example opens a serial console session with VM "vm1":
# open vm vm1 console
History
This command was first available in ExtremeXOS 30.3.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
ping
ping {count count {start-size start-size} | continuous {start-size
start-size} | {start-size start-size {end-size end-size}}} {udp}
{dont-fragment} {ttl ttl} {tos tos} {interval interval} {vr vrid}
{ipv4 host | ipv6 host} {from} {with record-route}
Description
Enables you to send User Datagram Protocol (UDP) or ICMP echo messages or to a remote IP device.
Syntax Description
count Specifies the number of ping requests to send.
start-size Specifies the size, in bytes, of the packet to be sent, or the starting
size if incremental packets are to be sent.
continuous Specifies that UDP or ICMP echo messages to be sent continuously.
This option can be interrupted by pressing [Ctrl] + C.
end-size Specifies an end size for packets to be sent.
udp Specifies that the ping request should use UDP instead of ICMP.
dont-fragment Sets the IP to not fragment the bit.
Note: User-created VRs are supported only on the platforms listed for
this feature in the ExtremeXOS 30.5 Feature License Requirements
document.
Note: If you are contacting an IPv6 link local address, you must specify
the VLAN you are sending the message from: ping ipv6 link-
local address %vlan_name host .
Default
N/A.
Usage Guidelines
The ping command is used to test for connectivity to a specific host.
You use the ipv6 variable to ping an IPv6 host by generating an ICMPv6 echo request message and
sending the message to the specified address. If you are contacting an IPv6 link local address, you must
specify the VLAN you are sending the message from, as shown in the following example (you must
include the % sign):
The ping command is available for both the user and administrator privilege level.
When the IPv6 host ping fails, the following error message appears:
Error: cannot determine outgoing interface. Link local address must be of form LLA%
vlan_name.
Due to upgrading ExtremeXOS 30.1 to 4.14 Linux kernel, ping success to local IP addresses does not
depend on link-layer status. Earlier releases of ExtremeXOS had customized Linux behavior that meant
that pinging a local VLAN interface would fail when the local interface was down. However, in
ExtremeXOS 30.1, pinging a local VLAN interface that is down will result in a successful ping.
If you have an asymmetric routing to a specific destination (where the traffic from the source to the
destination uses one path, and the return traffic uses another), use this command with option 7, with
record-route.
For example:
ping <destination address> with record-route
ping <destination address> from <source-address> with record-route
For more information about this option, see enable ip-option record-route.
Example
The following example enables continuous ICMP echo messages to be sent to a remote host:
ping continuous 123.45.67.8
History
This command was first available in ExtremeXOS 10.1.
Ping success to local IP addresses not depend on link-layer status added in ExtremeXOS 30.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Allows you to ping on the Layer 2 level throughout the specified domain and MA.
Syntax Description
mac Enter the unique system MAC address on the device you want to
reach. Enter this value in the format XX:XX:XX:XX:XX:XX.
port Enter the port number of the MEP from which you are issuing the
ping.
domain Enter this keyword.
domain_name Enter the name of the domain from which you are issuing the ping.
association Enter this keyword.
association_name Enter the name of the association from which you are issuing the ping.
Default
N/A.
Usage Guidelines
You must have CFM parameters configured prior to issuing a Layer 2 ping.
In order to send a Layer 2 ping, you must specify the port (MEP), the domain, and the MA from which
you are issuing the ping. An UP MEP sends the ping to all ports (except the sending port) on the VLAN
that is assigned to the specified MA, and a DOWN MEP sends the ping out from that port from that MA
toward the specified MAC address.
All MIPs along the way forward the LBM to the destination. The destination MP responds back to the
originator with a loopback reply (LBR).
This command sends out a ping from the MEP configured on the specified port toward the specified
MAC address. If you attempt to send a ping message from a port that is not configured as a MEP, the
system returns an error message. If the specified MAC address is not present in the Layer 2 forwarding
table (FDB), the system cannot send the ping (applies to UpMEP, not DownMEP).
Example
The following command sends a Layer 2 ping to the unique system MAC address 00:04:96:1F:A4:31
from the previously configured UP MEP (port 2:4) in the speed association in the atlanta domain:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sends an MPLS ping packet to a FEC over an LSP.
Syntax Description
lsp_name Specifies the LSP on which to send the MPLS echo request.
any Allows the echo request to be sent over any available LSP.
host Specifies the FEC using an ipaddress or hostname.
prefix Specifies a prefix.
ipNetmask Specifies the prefix address.
reply-mode Specifies the return path for the MPLS echo response.
ip Requests an IP UDP reply packet. This is the default mode.
ip-router-alert Requests an IP UDP reply packet with the IP Router Alert option. If the reply is
sent in an LSP, the router-alert label is inserted at the top of the label stack.
continuous Sends pings continuously until the user intervenes.
count Determines whether the size of the packet increments by one byte for each
new MPLS echo request sent.
interval Specifies the time interval (in seconds) between pings.
start-size The number of payload data bytes in the MPLS ping packet. The range is from
1 - 1518 (if jumbo frames are disabled) and from 1 - the configured jumbo
packet size (if jumbo frames are enabled). The default is 8 bytes.
end-size Specifies that the size of the packet increments by one byte for each new
MPLS echo request sent, up to the specified maximum size for the MPLS ping
packet.
ttl Sets the time-to-live value in the ping packet
from Specifies the source IP address of the packet.
hopaddress Specifies the next-hop address.
Default
Destination IP address for MPLS echo request - random, from the 127 and 128 IP address space IP TTL - 1
TTL value in MPLS echo request - 255 Destination UDP port - 3503 Payload data packet size - 8 bytes
Number of pings sent - 4
Usage Guidelines
This command sends an MPLS ping packet to a FEC over an LSP. The ping command, with mpls
keyword option, can be used to verify data plane connectivity across an LSP. This is useful because not
all failures can be detected using the MPLS control plane. The lsp keyword and lsp_name parameter
may be used to specify the LSP on which to send the MPLS echo request. The lsp keyword along with
the any keyword allows the echo request to be sent over any available LSP that terminates at host,
specified as an ipaddress or hostname. If no LSP exists to the specified host, the ping command fails
even though an IP routed path may exist. If the optional next-hop is specified, the MPLS echo request
is sent along the LSP that traverses the specified node. This option is useful for specifying an LSP when
multiple LSPs exist to the specified FEC. For RSVP-TE LSPs, the FEC is implied from the LSP
configuration. The TTL value in the MPLS Echo Request is set to 255.
By default, the destination IP address of the MPLS echo request is randomly chosen from the 127/8 IP
address space and the IP TTL is set to 1. The destination UDP port is 3503 and the sender chooses the
source UDP port.
The optional start-size keyword specifies the number of bytes to include as payload data in the
MPLS ping packet. If no start-size parameter is specified, the size of the payload data is eight
bytes. The minimum valid start-size value is one. The maximum start-size value is variable,
depending on the type of MPLS ping packet sent, but the total size of the MPLS ping packet cannot
exceed the configured jumbo packet size, if jumbo frames are enabled, or 1518 if jumbo frames are
disabled. If the end-size keyword is specified, the size of the packet increments by one byte for each
new MPLS echo request sent. The next MPLS echo request is not sent until the MPLS echo response for
the previous packet is received. This is useful for detecting interface MTU mismatch configurations
between LSRs. The switch ceases sending MPLS echo requests when the specified end-size value is
reached, the MPLS ping is user interrupted, or an MPLS echo response is not received after four
successive retries.
The optional reply-mode keyword is used to specify the reply mode for the MPLS echo response.
When the ip option is specified, the MPLS echo reply is routed back to the sender in a normal IPv4
packet. When the ip-router-alert option is specified, the MPLS echo reply is routed back to the
sender in an IPv4 packet with the Router Alert IP option set. Additionally, if the ip-router-alert
option is specified and the reply route is through an LSP, the Router Alert Label is pushed onto the top
of the label stack. If the reply-mode is not specified, the reply-mode ip option applies.
Example
The following example shows a ping command and the resulting display:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
pwd
pwd
Description
Prints the full pathname of the current working directory.
Syntax Description
pwd Print current working directory.
Default
N/A.
Usage Guidelines
Use this command to print the full pathname of the current working directory.
History
This command was first available in ExtremeXOS 15.5
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
quit
quit
Description
Logs out the session of a current user for CLI or Telnet.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to log out of a CLI or Telnet session.
When you issue this command, you are asked to save your configuration changes to the current, active
configuration. Enter y if you want to save your changes. Enter n if you do not want to save your
changes.
Example
The following command logs out the session of a current user for CLI or Telnet:
quit
Enter y if you want to save your changes. Enter n if you do not want to save your changes.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
reboot
reboot {[time mon day year hour min sec] | cancel} {slot slot-number}
{all}
Description
Reboots the switch, bridge port extenders (BPEs), or SummitStack in the specified slot at a specified
date and time.
Syntax Description
time Specifies a reboot date in mm dd yyyy format and reboot time in hh
mm ss format.
cancel Cancels a previously scheduled reboot.
slot slot-number Specifies the slot number currently being used by the active stack
node or BPE that is to be rebooted.
all Specifies rebooting all attached BPEs and the controlling bridge
switch. Using this option requires a Core License or above.
Default
N/A.
Usage Guidelines
If you do not specify a reboot time, the switch reboots immediately following the command, and any
previously scheduled reboots are cancelled.
SummitStack Only
The reboot command used without any parameters on the master node reboots all members of the
same active topology to which the master node belongs.
The reboot slot slot-number command can be used on any active node. The command will
reboot the active node that is currently using the specified slot number in the same active topology as
the issuing node. This variation cannot be used on a node that is not in stacking mode.
The reboot node-address node-address command can be used on any node whether or not
the node is in stacking mode. It will reboot the node whose MAC address is supplied.
The reboot stack-topology {as-standby} command reboots every node in the stack
topology. The command can be issued from any node whether or not the node is in stacking mode. If
the as-standby option is used, every node in the stack topology restarts with master-capability
disabled. This option is useful when manually resolving a dual master situation.
Example
The following example reboots the switch at 8:00 AM on April 15, 2005:
reboot time 04 15 2005 08 00 00
History
This command was first available in ExtremeXOS 10.1.
The all option for rebooting attached BPEs was added in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to refresh a specific network zone, or all the network zones.
Syntax Description
network-zone Specifies the logical group of remote devices.
zone_name Specifies the network_zone name.
all Refresh all the network-zones.
Default
N/A.
Usage Guidelines
Use this command to refresh a specific network zone, or all the network zones.
When you issue the command to refresh a network-zone, or all network-zones, it can take a long time to
clear the CLI because each individual policy must be converted before it is refreshed. The command
succeeds, or fails, only after it receives a response for all policy refresh results from the hardware.
If the refresh fails for a specific zone, the following error message will be printed on the console.
Example
The following example refreshes all policies in “zone1”:
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Refreshes the role evaluation for the specified user, for all users, or for all users currently under the
specified role.
Syntax Description
user_name Specifies a user name for which role evaluation will be refreshed.
domain_name Specifies a domain name for the specified user.
all Specifies a refresh for all users associated with the specified role.
role_name Specifies a a role name for which all users will be refreshed.
Default
N/A.
Usage Guidelines
It may be necessary to refresh the role of a user due to a new role which might be better suited for the
user or due to a change in LDAP attributes of the user which in turn might result in the user being
classified under a different role. This command can be used in all such cases.
Example
The following example refreshes the role for user Tony:
The following example refreshes the role for all users who are currently classified under the Marketing
role:
History
This command was first available in ExtremeXOS 12.7.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Refreshes an IGMP SSM mapping entry.
Syntax Description
dns group Refreshes DNS sources for a multicast group.
grpipaddress Specifies the multicast group IP address.
netmask Specifies th multicast group netmask.
ipNetmask Specifes the multicast gorup IP address and netmask.
vrname Specifies the name of the virtual router.
Default
N/A
Usage Guidelines
None.
Example
The following example refreshes an IGMP SSM mapping entry.
refresh igmp ssm-map 224.0.0.5/24 VR-Default
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Sends a DNS request for a particular group. On receiving the DNS response, the “DNS Age” in the SSM
mapping entry is refreshed.
Syntax Description
v6groupnetmask Refreshes the specific group information.
vr vr_name Specifies the virtual router name.
Default
Disabled.
Usage Guidelines
Use this command to send out DNS requests for a particular group. On receiving the DNS response, the
“DNS Age” in the SSM mapping entry is refreshed.
Example
The following command send out DNS requests:
refresh mld ssm-map
When v6groupnetmask is specified, the SSM Mapping status and the SSM Mapping entries specific to
the group range on the VR are displayed.
History
This command was first available in ExtremeXOS 15.5.
Platform Availability
This command is available on the platforms listed for the IPv6 multicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
refresh policy
refresh policy policy-name
Description
Refreshes the specified policy.
Syntax Description
policy-name Specifies the policy to refresh.
Default
N/A.
Usage Guidelines
Use this command when a new policy file for a currently active policy has been downloaded to the
switch, or when the policy file for an active policy has been edited. This command reprocesses the text
file and updates the policy database.
Before 12.6.1 there was no support to refresh the policies that are associated to the local VPP. For
network VPP, you can achieve policy refresh by changing the policy timestamp file. Beginning in release
11.4, the policy manager uses Smart Refresh to update the ACLs. When a change is detected, only the
ACL changes needed to modify the ACLs are sent to the hardware, and the unchanged entries remain.
This behavior avoids having to blackhole packets because the ACLs have been momentarily cleared.
Smart Refresh works well for minor changes, however, if the changes are too great, the refresh reverts
to the earlier behavior. To take advantage of Smart Refresh, disable access-list refresh blackholing by
using the command:
disable access-list refresh blackhole
If you attempt to refresh a policy that cannot take advantage of Smart Refresh while blackholing is
enabled, you will receive a message similar to the following:
If blackholing is not enabled, you will receive a message similiar to the following:
Incremental refresh is not possible given the configuration of policy
<name>. Note, the current setting for Access-list Refresh Blackhole is
Disabled. WARNING: If a full refresh is performed, it is possible
packets that should be denied may be forwarded through the switch during
the time the access list is being installed. Would you like to perform a
full refresh? (Yes/No) [No]:
If you attempt to refresh a policy that is not currently active, you will receive an error message.
For an ACL policy, the command is rejected if there is a configuration error or hardware resources are
not available.
Example
The following example refreshes the policy zone5:
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Power cycles the specified ports.
Syntax Description
port_list Specifies one or more ports or slots and ports for which power is to be
reset.
Default
N/A.
Usage Guidelines
This command power cycles the specified ports. Ports are immediately disabled and then re-enabled,
allowing remote PDs to be power-cycled.
This command affects only inline power; it does not affect network connectivity for the port(s).
Example
The following command resets power for port 4 on a switch:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the PoE devices listed in Extreme Networks PoE Devices.
restart ports
restart ports [all | port_list]
Description
Resets autonegotiation for one or more ports by resetting the physical link.
Syntax Description
all Specifies all ports on the switch.
port_list Specifies one or more ports or slots and ports.
Default
N/A.
Usage Guidelines
N/A.
Example
The following command resets autonegotiation on slot 1, port 4 on a modular switch:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
restart process
restart process [class cname | name {msm slot}]
Description
Terminates and restarts the specified process during a software upgrade on the switch.
Syntax Description
cname Specifies the name of the process to restart. With this parameter, you can terminate
and restart all instances of the process associated with a specific routing protocol on
all VRs.You can restart the OSPF routing protocol and associated processes.
name Specifies the name of the process to terminate and restart. You can use this
command with the following processes: bgp, eaps, exsshd, isis, lldp, netLogin,
netTools, ntp, ospf, ospfv3, snmp Subagent, snmpMaster, telnetd, thttpd, tftpd, vrrp,
and xmld.
slot On a SummitStack, specifies the node’s slot number. The number is a value from 1 to
8.
Default
N/A.
Usage Guidelines
Use this command to terminate and restart a process during a software upgrade on the switch. You
have the following options:
• cname—Specifies that the software terminates and restarts all instances of the process associated
with a specific routing protocol on all VRs.
• name—Specifies the name of the process.
Depending on the software version running on your switch and the type of switch you have, you can
terminate and restart different or additional processes. To see which processes you can restart during a
software upgrade, enter restart process followed by [Tab]. The switch displays a list of available
processes.
SummitStack Only
You can issue this command only from the master node. If you issue this command from any other
node, the following message appears:
Error: Processes created by user can only be restarted on the primary node slot.
To display the status of ExtremeXOS processes on the switch, including how many times a process has
been restarted, use the show process {name} {detail} {description} {slotslotid}
command. The following is a truncated sample of the show process command on a switch:
You can also use the restart process command when upgrading a software modular package. For
more information, see the section Upgrading a Modular Software Package in the ExtremeXOS 30.5 User
Guide.
Example
The following example stops and restarts the process tftpd during a software upgrade:
restart process tftpd
The following example stops and restarts all instances of the OSPF routing protocol for all VRs during a
software upgrade:
restart process class ospf
History
This command was first available in ExtremeXOS 11.3.
Support for restarting the Link Layer Discovery Protocol (lldp), Open Shortest Path First (ospf), and
network login (netLogin) processes was added in ExtremeXOS 11.3.
Support for Border Gateway Protocol (bgp) and Ethernet Automatic Protection Switching (eaps) was
added in ExtremeXOS 11.4.
Support for MultiProtocol Label Switching (mpls) and Virtual Router Redundancy Protocol (vrrp) was
added in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Restarts the MPLS process when it does not respond to the CLI commands.
Default
N/A.
Usage Guidelines
None.
Example
The following command restarts the MPLS process:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
restart vm
restart vm vm_name {forceful | graceful}
Description
Restarts (reboots) a virtual machine (VM).
Syntax Description
vm Virtual machine.
vm_name Specifies the VM to restart.
forceful Forcefully terminates the VM.
graceful Gracefully shuts down the VM if possible (default).
Default
By default, the VM is gracefully shut down before restarting, if possible.
Usage Guidelines
N/A.
Example
The following example restarts the VM "testvm" gracefully:
restart vm testvm gracefully
History
This command was first available in ExtremeXOS 30.4.
Platform Availability
This command is available on all platforms that support the Extreme Insight for Guest VMs feature and
have a Core license installed. For a list of platforms that support the Insight feature and for information
about licenses, see the ExtremeXOS 30.5 Feature License Requirements.
return
return statusCode
Note
This is a script command and operates only in scripts or on the command line when scripting
is enabled with the following command: enable cli scripting {permanent} .
Description
Exits the current script and sets the $STATUS variable.
Syntax Description
statusCode Specifies a integer value to which the $STATUS variable is set.
Default
N/A.
Usage Guidelines
When used in nested scripts, this command allows you to terminate the current script, set the $STATUS
variable, return to the parent script, and evaluate the $STATUS variable in the parent script. For more
information on the $STATUS variable, see “Using CLI Scripting” in the ExtremeXOS 30.5 User Guide.
Example
The following example exits the current script and sets the $STATUS variable to -200:
return -200
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
rm
rm file_name
Description
Removes/deletes an existing configuration, policy, or if configured, core dump file from the system.
Syntax Description
file_name Specifies the name of the configuration, policy file, or if configured,
the core dump file.
Default
N/A.
Usage Guidelines
After you remove a configuration or policy file from the system, that file is unavailable to the system. For
information about core dump files, see Case-sensitive Filenames on page 2375.
You cannot remove an active configuration file (the configuration currently selected to boot the switch).
To verify the configuration that you are currently using, issue the show switch {detail}
command. If you attempt to remove the active configuration file, the switch displays a message similar
to the following:
Error: Cannot remove current selected active configuration file.
When you delete a file from the switch, a message similar to the following appears:
Remove testpolicy.pol from /usr/local/cfg? (y/N)
Enter y to remove the file from your system. Enter n to cancel the process and keep the file on your
system.
Case-sensitive Filenames
Filenames are case-sensitive. In this example, you have a configuration file named Test.cfg. If you
attempt to remove a file with the incorrect case, for example test.cfg, the system is unable to remove
the file. The switch does not display an error message; however, the ls command continues to display
the file Test.cfg. To remove the file, make sure you use the appropriate case.
When specifying a local filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z).
• Numerals (0-9).
• Period ( . ).
• Dash ( - ).
• Underscore ( _ ).
When naming a local or remote file, remember the requirements listed above.
The memorycard option removes/deletes an existing file on the removable storage device, including
core dump files if configured. See the section Internal Memory Card and Core Dump Files for
information about core dump files.
When you configure the switch to send core dump (debug) information to the internal memory card,
specify the internal-memory option to remove/delete the specified core dump file.
For information about configuring and sending core dump information to the internal memory card, see
the configure debug core-dumps and save debug tracefiles memorycard commands.
You can use the * wildcard to delete core dump files from the internal memory card. You can also use
the * wildcard to delete all of a particular file type from a removable storage device. Currently running
and in-use files are not deleted.
If you configure the switch to write core dump files to the internal memory card and attempt to
download a new software image, you might have insufficient space to complete the image download.
When this occurs, you must decide whether to continue the software download or move or delete the
core dump files from the internal memory. For example, if you have a switch with a removable storage
device installed with space available, transfer the files to the storage device. Another option is to
transfer the files from the internal memory card to a TFTP server. This frees up space on the internal
memory card while keeping the core dump files.
Example
The following example removes the configuration file named Activeb91.cfg from the system:
rm Activeb91.cfg
The following example removes all of the core dump files stored on the internal memory card:
rm /usr/local/tmp/*
On a switch with a removable storage device installed, the following command removes the policy file
named test.pol from the removable storage device:
rm /usr/local/ext/test.pol
On a switch with a removable storage device installed, the following command removes all of the
configuration files from the removable storage device:
rm /usr/local/ext/*.cfg
History
This command was first available in ExtremeXOS 10.1.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
rmdir
rmdir directory_name
Description
Removes an existing directory from the specified file system or relative to the current working directory.
Syntax Description
rmdur Change current working directory.
directory_name Pathname of a directory.
Default
N/A.
Usage Guidelines
Use this command to remove an existing directory from the specified file system or relative to the
current working directory.
History
This command was first available in ExtremeXOS 15.5
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
rtlookup rpf
rtlookup [ipaddress | ipv6address] rpf {vr vr_name}
Description
Displays the RPF for a specified multicast source.
Syntax Description
ipaddress Specifies an IPv4 address.
ipv6address Specifies an IPv6 address.
rpf Selects the RPF for the specified multicast source.
vr_name Specifies the VR or VRF for which to display the route.
Default
vr_name is the VR of the current CLI context.
Usage Guidelines
None.
Example
The following example displays the RPF lookup for a multicast source through VR-Default:
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
rtlookup
rtlookup [ipaddress | ipv6address] { unicast | multicast | vr vr_name}
Description
Displays the available routes to the specified IPv6 address.
Syntax Description
ipaddress Specifies an IPv4 address.
ipv6address Specifies an IPv6 address.
unicast Displays the routes from the unicast routing table in the current router
context.
multicast Displays the routes from the multicast routing table in the current
router context.
vr_name Specifies the VR or VRF for which to display the route.
Default
N/A.
Usage Guidelines
None.
Example
The following command performs a look up in the route table to determine the best way to reach the
specified IPv6 address:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the platforms listed for the IPv6 unicast routing feature in the
ExtremeXOS 30.5 Feature License Requirements document.
run diagnostics
run diagnostics [extended | normal] }
Description
Runs normal or extended diagnostics on the switch or node, and stacking ports.
This command is not supported in stacking mode, but if you issue the show diagnostics command from
the master node, it will show the diagnostic results for all the nodes.
Syntax Description
extended Runs an extended diagnostic routine. Takes the ports offline, and
performs extensive ASIC and packet loopback tests on all of the ports.
normal Runs a normal diagnostic routine. Takes the ports offline, and
performs a simple ASIC and packet loopback test on all of the ports.
Default
N/A.
Usage Guidelines
Depending on your platform, use this command to run diagnostics on the switch or stack port.
If you run the diagnostic routine on the switch, it reboots and then performs the diagnostic test. During
the test, traffic to and from the ports on the switch is temporarily unavailable. When the diagnostic test
is complete, the switch reboots and becomes operational again.
To run the diagnostic routine on the stack ports, you need a dedicated stacking cable that connects
stack port 1 to stack port 2, which are located at the rear of the switch. The stacking cable is available
from Extreme Networks. The switch performs a hardware test to confirm that the stack ports are
operational; traffic to and from the ports on the switch is temporarily unavailable. This Bit Error Rate
Test (BERT) provides an analysis of the number of bits transmitted in error.
After the switch runs the diagnostic routine, test results are saved to the switch’s EEPROM and
messages are logged to the syslog.
To run diagnostics on a switch that is in a SummitStack, first disable stacking on that switch, then restart
the switch. Once restarted, log into the switch via its console port, and run diagnostics. The switch will
perform the diagnostic tests, and then restart. Once restarted, log into the switch via its console port
and enable stacking, then reboot the switch. Once restarted, the switch will rejoin the stack.
Viewing Diagnostics
To view results of the last diagnostics test run, use the following command:
show diagnostics {slot [slot_number]}
If the results indicate that the diagnostic failed on a node, replace the node with another switch of the
same type.
If the results indicate that the diagnostic failed on the switch, contact Extreme Networks Technical
Support.
The switch displays a warning similar to the following about the impact of this test. You also have the
opportunity to continue or cancel the test:
Running Diagnostics will disrupt network traffic.
Are you sure you want to continue? (y/n)
Enter y to continue and run the diagnostics. Enter n to cancel the operation.
The following command runs diagnostics on the stack ports on a ExtremeSwitching series switch:
run diagnostics stack-port
If you issue this command with a console connection, the switch displays the following information. You
also have the opportunity to continue or cancel the test:
Press [Enter] to continue and run the diagnostics. Enter s to cancel the operation.
If you continue with diagnostics, the switch displays messages similar to the following:
If you issue this command with a Telnet connection, the switch displays a warning similar to the
following about the impact of this test. You also have the opportunity to continue or cancel the test:
Running Diagnostics will disrupt network traffic.
Are you sure you want to continue? (y/n)
Enter y to continue and run the diagnostics. Enter n to cancel the operation.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
run elrp
run elrp {vlan}vlan_name {ports [ports |all | none]} {remote-endpoints
vxlan all} {interval interval {seconds | milliseconds} } {retry
count}
Description
Starts one-time, non-periodic ELRP packet transmission on the specified ports of the VLAN using the
specified count and interval.
Syntax Description
vlan vlan_name Specifies a VLAN name.
ports Specifies the set of VLAN ports for packet transmission.
Default
Second—The interval between consecutive packet transmissions is 1 second.
Usage Guidelines
This command starts one-time, non-periodic ELRP packet transmission on the specified ports of the
VLAN using the specified count and interval. If any of these transmitted packets is returned, indicating
loopback detection, the ELRP client prints a log message to the console. There is no need to send a trap
to the SNMP manager for non-periodic requests.
If you do not specify the optional interval or retry parameters, the default values are used.
The ELRP client must be enabled globally in order for it to work on any VLANs. Use the enable
elrp-client command to globally enable the ELRP client.
The ELRP client can be disabled globally so that none of the ELRP VLAN configurations take effect. Use
the disable elrp-client command to globally disable the ELRP client.
Example
The following command starts one-time, non-periodic ELRP packet transmission on the VLAN green
using the default interval and packet transmission:
run elrp green
History
This command was first available in ExtremeXOS 11.1.
The ability to specify the time interval in milliseconds was introduced in ExtremeXOS 22.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
run failover
run failover {force}
Description
Causes a user-specified node failover.
Syntax Description
force Force failover to occur.
Default
N/A.
Usage Guidelines
Use this command to cause the master node to failover to the backup node in SummitStack.
Before you initiate failover, use the show switch {detail} command to confirm that the nodes are
in sync and have identical software and switch configurations. If the output shows MASTER and
BACKUP (InSync), the two nodes are in sync.
If the master and backup SummitStack nodes' software and configuration are not in sync and are
running ExtremeXOS 12.0 or later, use the synchronize command to get the two nodes in sync. This
command ensures that the backup has the same software in flash as the master.
Note
Both the backup and the master nodes must be running ExtremeXOS 11.0 or later to use the
synchronize command.
Example
The following command causes a failover on a SummitStack:
run failover
History
This command was first available in ExtremeXOS 12.0.
Platform Availability
This command is available only on a SummitStack.
run script
run script filename {arg1} {arg2} ... {arg9}
Description
Run (plays back) an ASCII-formatted configuration file or a user-written script file on the switch. This
command is synonomous with the load script command.
Syntax Description
filename Specifies the user-defined name of the ASCII-formatted configuration
file or a user-written script file. The script file is known as the XOS
script file and uses the .xsf file extension.
arg Specifies up to nine variable values that can be specified by the user.
The variables are created with the names CLI.ARGV1, CLI.ARGV2, ...
CLIARGV9.
Default
N/A.
Usage Guidelines
Use this command to load an ASCII-formatted configuration file or a user-written script file.
Configuration File: After downloading the configuration file from the TFTP server, this command loads
and restores the ASCII-formatted configuration file to the switch.
An ASCII-formatted configuration file uses the .xsf file extension, not the .cfg file extension. The .xsf file
extension (known as the XOS script file) saves the XML-based configuration in an ASCII format readable
by a text editor.
For more detailed information about the ASCII configuration file, including the steps involved to upload,
download, and save the configuration, see the upload configuration [hostname |
ipaddress] filename {vr vr-name} command.
User-Written Script File: After writing a script, this command executes the script and passes arguments
to it. As with the configuration files, these files use the .xsf file extension that is automatically added.
The command allows up to nine optional variable values to be passed to the script. These are created
with the names CLI.ARGV1, CLI.ARGV2, CLI.ARGV3, ... CLI.ARGV9.
In addition, two other variables are always created. CLI.ARGC gives the count of the number of
parameters passed, and CLI.ARGV0 contains the name of the script that is being executed.
Note
Only the .xsf extension is used. The load script command assumes an .xsf extension and
retries opening the file if the file cannot be found with the original specified name or no
extension is provided.
Example
The following command loads the ASCII-formatted configuration named configbackup.xsf:
After issuing this command, the ASCII configuration quickly scrolls across the screen. The following is an
example of the type of information displayed when loading the ASCII configuration file:
ExtremeXOS 15.6 provided capability for Python scripting. Current Python scripting implementation
allows a script to interact directly with the CLI inteface for managing ExtremeXOS functionality. Python
script files end in .py. The .py suffix on the script file name tells the run script command to use
the Python interpreter to process the script file. This command is functions exactly as load script.
History
This command was first available in ExtremeXOS 15.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command instructs the switch to generate a report and upload it to a collector.
Syntax Description
now Specifies that you run a report immediately. This is the default setting.
in Specifies that you run report in a specified number of hours.
hours Specifies the hours from now to run report. The range is 1-168 hours (one week).
cancel Cancels the scheduled report.
collector Specifies the report collector. The default value is all collectors.
all Specifies all report collectors.
hostname Specifies the host name of the collector.
ip_address Specifies the IPv4 address of the collector.
Default
The default time for running reports is now.
Usage Guidelines
This command instructs the switch to generate a report and upload it to a collector. The default
operation is to perform this operation immediately for all existing collectors. Optionally, you can
configure a one-time trigger to perform the operation in "hours from now." The valid range is one to 168
hours (one week). If ou specify the hostname or IP address, the switch runs a report for that particular
collector.
Only a single one-time report per collector can be scheduled at any time. When run tech-support
report in hours is issued before the previous scheduled one-time report completes, the previous
report is cancelled, and a new one-time report is scheduled.
This command also provides a way to cancel a scheduled report for a particular collector.
Example
The following command example configures a specific collector to display a detailed output set:
Run tech-support report is scheduled on Thu Feb 21 05:06:32 2013 for the
collector 10.5.2.107:9998.
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
run update
run update
Description
Activates a newly installed modular software package.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
After you install a modular software package to the active partition, use this command to make the
update active. This command causes the ExtremeXOS system to start the newly installed processes
contained in the package, without rebooting the switch.
If you installed the package to the inactive partition, you need to reboot the switch to activate the
package.
Example
The following command activates any newly installed modular software packages installed on the active
partition:
run update
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Executes the specified Universal Port profile on the switch.
Syntax Description
profile-name Specifies the UPM profile to be run.
event-name Specifies an event type for the specified profile. Valid event types are
device-detect, device-undetect, user-authenticate, and user-
unauthenticated.
variable-string Specifies a string of variable names and the assigned variable values
to be used in the profile. The format is: var_name1=value_1;
var_name2=value_2; var_name3=value_3. Each variable name
is followed by the equal sign (=), the variable value, and a semicolon
(;).
Default
N/A.
Example
The following command runs a UPM profile called example on the switch:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the Universal Port feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Manually starts FTP file synchronization for NVPP and VMMAP files.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Before you can manually start FTP file synchronization, you must configure FTP servers using the
configure vm-tracking repository command.
Example
The following command starts file synchronization with the configured FTP server:
# run vm-tracking repository sync-now
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X440-G2,X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
save configuration
save configuration {primary | secondary | existing-config | new-config}
Description
Saves the current configuration from the switch's runtime memory to non-volatile memory.
Syntax Description
primary Specifies the primary saved configuration.
secondary Specifies the secondary saved configuration.
existing-config Specifies an existing user-defined configuration.
new-config Specifies a new user-defined configuration.
Default
Saves the current configuration to the location used on the last reboot.
Usage Guidelines
The configuration takes effect on the next reboot.
Each file name must be unique and can be up to 32 characters long but cannot include any spaces,
commas, or special characters.
Configuration files have a .cfg file extension. When you enter the name of the file in the CLI, the system
automatically adds the .cfg file extension. Do not use this command with ASCII-formatted configuration
files. Those configuration files have an .xsf file extension. For more information about using ASCII-
formatted configuration files see the upload configuration [hostname | ipaddress]
filename {vr vr-name} and the load script filename {arg1} {arg2} ... {arg9}
commands.
This command also displays in alphabetical order a list of available configurations. The following is
sample output that displays the primary, secondary, and user-created and defined configurations (“test”
and “XOS1” are the names of the user-created and defined configurations):
exsh.9 # save configuration
<cr> Execute the command
primary Primary configuration file
secondary Secondary configuration file
<existing-config> Existing configuration file name
"test" "XOS1"
<new-config> New configuration file name
The switch prompts you to save your configuration changes. Enter y to save the changes or n to cancel
the process.
If you enter y, the switch saves the configuration and displays a series of messages. The following
sections provide information about the messages displayed when you save a configuration on your
switch.
Note
Configuration files are forward-compatible only and not backward-compatible. That is,
configuration files created in a newer release, such as ExtremeXOS 12.4, might contain
commands that do not work properly in an older release, such as ExtremeXOS 12.1.
When specifying a local filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - )
• Underscore ( _ )
The switch then prompts you to select which configuration to use to bootup the system. The following
sample output is similar to the message displayed:
Enter y to use the new configuration as the default configuration. Enter n to cancel the operation and
keep using the current default, active configuration.
If you override an existing configuration that is not the current default, active configuration, the switch
prompts you to select which configuration to use to bootup the system. The following sample output is
similar to the message displayed:
Enter y to use the updated configuration as the default configuration. Enter n to cancel the operation
and keep using the current default, active configuration.
Example
The following command saves the current switch configuration to the configuration file named XOS1:
save configuration XOS1
The following command save the current switch configuration to the secondary configuration file:
save configuration secondary
History
This command was first available in ExtremeXOS 10.1.
The status messages displayed by the switch were updated in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Saves the running configuration as a script.
Syntax Description
script-name Specifies the name of the file to save the configuration to. The script
file is known as the XOS script file and uses the .xsf file extension.
Default
N/A.
Usage Guidelines
This command allows you to save the current configuration as a script and export it out of the box for
later use.
Example
The following example saves a running ASCII-formatted configuration named primary.xsf.
save configuration as-script primary.xsf
History
This command was first available in ExtremeXOS 12.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command configures the periodic auto-save of the currently running switch configuration.
Syntax Description
automatic Configures auto-save of system configuration.
every Sets the switch configuration to be saved at the designated recurrent
intervals.
minutes Designates the auto-save interval in minutes with a range of 2–1,440
minutes (default is two minutes).
primary Designates the primary configuration file for saving.
secondary Designates the secondary configuration file for saving.
Default
By default, auto-save is turned off.
If you do not select a time interval for saving, the default is two minutes.
By default, the configuration is saved to the file specified in the Config Automatic field of the show
switch on page 3158 command output. If no value appears in this field, the configuration is saved to
the file specified in the Config Selected field of the show switch on page 3158 command. If no
value appears in this field either, the configuration is saved to autosave.cfg.
Usage Guidelines
The auto-save features is turned off by default. To turn on the auto-save feature, use the command
save configuration automatic (to accept the default two-minute save interval) or save
configuration automatic every minutes (to specify the auto-save
interval). The message Do you want to auto-save configuration to primary.cfg
and overwrite it? (y/N) appears. Select "yes" to enable the auto-save to the primary.cfg
file. Selecting "no" cancels the command.
To turn off auto-save, use the command save configuration automatic never.
If you want to specify a different file to save the configuration to (than the default primary.cfg), use
the command save configuration automatic {every minutes {primary |
secondary | existing-config | new-config}}, specifying an auto-save
interval and configuration file name.
To see the current status of the auto-save feature, use the command show switch on page 3158.
Example
The following example turns on auto-save, accepting the default auto-save interval (two minutes) and
the default configuration file (primary.cfg):
save configuration automatic
The following example changes the auto-save interval to five minutes and makes autosave.cfg the
file that is saved to:
save configuration automatic every 5 autosave
History
This command was first available in ExtremeXOS 22.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Copies debug information to a compact flash card or USB 2.0 storage device.
Syntax Description
directory_path Directory path (memory card is /usr/local/ext; internal memory
is /usr/local/tmp; and home directory is /usr/local/cfg.
Default
N/A.
Usage Guidelines
Note
Use this command only under the guidance of Extreme Networks Technical Support to
troubleshoot the switch.
Use this command to copy debug information to an installed removable storage device. The debug
information includes log files and trace files.
Progress messages are displayed that indicate the file being copied and when the copying is finished.
Beginning with ExtremeXOS 11.6, you can use the upload debug [hostname |ipaddress]
{{vr}vrname} command to copy debug information to a network TFTP server.
Example
The following command copies debug information to a removable storage device:
save debug tracefiles /usr/local/ext
History
This command was first available in ExtremeXOS 11.0.
The syntax for this command was modified in ExtremeXOS 11.1 from upload debug-info memorycard to
save debug tracefiles memorycard.
Support for USB 2.0 storage devices was added in ExtremeXOS 12.5.3.
The option memorycard was removed and the variable directory_path was added in ExtremeXOS
30.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Note
This is a script command and operates only in scripts or on the command line when
scripting is enabled with the following command: enable cli scripting {permanent}.
Description
Saves the specified variables to the specified key.
Syntax Description
key Specifies the key to which the specified variables are saved.
var1 var2 Specifies the variables to save, The first variable is mandatory, up to
four more optional variables can be specified.
Default
N/A.
Usage Guidelines
The variables saved by the SAVE VAR command are represented by the specified key and can be
retrieved and restored in the context in which this profile was applied. They are available to rollback
events like user-unauthenticate and device-undetect. The key option allows the user to save data for a
unique key and retrieve the saved data based on this key. The user is responsible for generating unique
keys for each variable. The system has a limited amount of memory to store these variables.
Example
The following example saves the variables “username,” “ipaddr,” and “vlan” to the key “blue:”
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
save vm image
save vm vm_name image image_file
Description
Exports a disk image of an existing virtual machine (VM).
Syntax Description
vm Virtual machine.
vm_name Specifies the VM to export a disk from.
image Saves (exports) the disk image of a VM in current format (QCOW2 or
VMDK).
image_file Specifies the file name for the exported VM disk image. File extension
are appended if not specified.
Default
N/A.
Usage Guidelines
N/A.
Example
The following example exports the disk image from VM "testvm" to a file named "testvmimage":
save vm testvm image testvmimage
History
This command was first available in ExtremeXOS 30.4.
Platform Availability
This command is available on the ExtremeSwitching X465-24MU and X465-24MU-24W switches with a
Core license.
scp2
scp2 {cipher cipher} {mac mac} {compression [on | off]} {port portnum}
{vr vr_name} user [hostname | ipaddress]:remote_file local_file
or
scp2 {cipher cipher} {macmac} {compression [on | off]} {port portnum}
{vr vr_name} local_file user [hostname | ipaddress]:remote_file
Description
The first command initiates an SCP2 client session to a remote SCP2 server and copies a configuration
or policy file from the remote system to the switch.
The second command initiates an SCP2 client session to a remote SCP2 server and copies a
configuration or policy file from the switch to a remote system.
Syntax Description
vr_name Specifies the virtual router. The default virtual router is VR-Mgmt.
Note: User-created VRs are supported only on the platforms listed for this
feature in the ExtremeXOS 30.5 Feature License Requirements document.
remote_file Specifies the name of the remote file (configuration file, policy file, image file,
public key file) to be transferred.
local_file Specifies the name of the local file (configuration file, policy file, image file,
public key file) to be transferred.
Default
The default settings for SSH2 parameters are as follows:
• cipher—the full cipher list
• mac—the full Message Authentication Code list
• port—22
• compression—off
• vr_name—VR-Mgmt
Usage Guidelines
SSH2 does not need to be enabled on the switch in order to use this command.
This command logs into the remote host as user and accesses the file remote_file. You will be
prompted for a password from the remote host, if required.
When specifying a host name, user name, or remote IP address, the switch permits only the following
characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - ) Permitted for host and user names
• Underscore ( _ ) Permitted for host and user names
• Colon ( : )
• At symbol ( @ ). Permitted only for user names
• Slash ( / ). Permitted only for user names
When naming the host, creating a user name, or configuring the IP address, remember the
requirements listed above.
When specifying a remote filename, the switch permits only the following characters:
• Alphabetical letters, upper case and lower case (A-Z, a-z)
• Numerals (0-9)
• Period ( . )
• Dash ( - )
• Underscore ( _ )
• Slash ( / )
Example
The following command copies the configuration file test.cfg on host system1 to the switch:
scp2 admin@system1:test.cfg localtest.cfg
The following command copies the configuration file engineering.cfg from the switch to host system1:
scp2 engineering.cfg admin@system1:engineering.cfg
The following command copies the file Anna5.xsf from the default virtual router to 150.132.82.140:
scp2 vr vr-default Anna5.xsf [email protected]:Anna5.xsf
Upload /config/Anna5.xsf to
Connecting to 150.132.82.140...
History
This command was first available in ExtremeXOS 11.2.
Changes to cipher, as well as the addition of mac and compression, were first available in
ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
set var
set var varname _expression
Note
This is a script command and operates only in scripts or on the command line when
scripting is enabled with the following command: enable cli scripting {permanent}.
Description
Creates and sets the CLI scripting variable to the desired value.
Syntax Description
varname Specifies the name of the CLI scripting variable. Valid format is
$VARNAME (case insensitive, character string up to 32 characters).
_expression Specifies the _expression whose value should be evaluated and used
to set the variable.
Default
N/A.
Usage Guidelines
The format of a local variable (case insensitive) is: $VARNAME.
An error message is displayed if the user attempts to use a variable name with a length greater than 32
characters.
Example
The following examples show some ways you can manipulate variables:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show access-list
show access-list {any | ports port_list | vlan vlan_name} {ingress |
egress}
Description
Displays the ACLs configured on an interface.
Syntax Description
aclname Specifies the ACL name. The name can be from 1-32 characters long.
any Specifies the wildcard ACL.
port_list Specifies which ports’ ACLs to display.
vlan_name Specifies which VLAN’s ACL to display.
ingress Display ingress ACLs.
egress Display egress ACLs.
Default
The default is to display all interfaces, ingress.
Usage Guidelines
The ACL with the port and VLAN displayed as an asterisk (*) is the wildcard ACL.
If you do not specify an interface, the policy names for all the interfaces are displayed, except that
dynamic ACL rule names are not displayed. To display dynamic ACLs use the following commands:
If you specify an interface, all the policy entries, and dynamic policy entries are displayed.
Example
The following command displays all the interfaces configured with an ACL:
show access-list
The following command displays the ingress access list entries configured on the VLAN v1006:
# RuleNo 1
History
This command was first available in ExtremeXOS 10.1.
The ingress, egress, any, ports, and vlan options were added in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the ACL configuration.
Syntax Description
There are no arguments or variables for this command.
Default
N/A.
Usage Guidelines
This command displays the state of the ACL configuration, set by the following commands:
Example
The following command displays the state of the ACL configuration:
On a series switches, the output from this command is similar to the following:
The following displays how the output looks when "multiple matches" action resolution mode is chosen:
The following displays how the output looks when "highest priority only" action resolution mode is
chosen:
The command show configuration acl also shows the configure access-list action-
resolution highest-priority command if "highest priority only" action resolution mode is
chosen:
History
This command was first available in ExtremeXOS 11.0.
The Access-list Rule-compression Port Counters configuration was added in ExtremeXOS 12.3.
The Access-list Configured VLAN-ACL Precedence Mode configuration was added in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the specified access list counters.
Syntax Description
countername Specifies the ACL counter to display.
port_list Specifies to display the counters on these ports.
vlan_name Specifies to display the counters on the VLAN.
ingress Specifies to display ingress counters.
egress Specifies to display egress counters.
Default
The default direction is ingress.
Usage Guidelines
Use this command to display the ACL counters.
Example
The following example displays all the counters for all ACLs:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the access-list permit and deny statistics.
Syntax Description
snmp Specifies statistics for SNMP.
telnet Specifies statistics for Telnet.
ssh2 Specifies statistics for SSH2.
http Specifies statistics for HTTP.
Default
N/A.
Usage Guidelines
Use this command to display the access-list permit and deny statistics. The permit and deny counters
are updated automatically regardless of whether the ACL is configured to add counters.
Example
The following command displays permit and deny statistics for the SNMP application:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the syntax of a dynamic ACL.
Syntax Description
rule Specifies the rule to display.
rule_li Specifies the dynamic rule name for Lawful
Intercept account only. You must have lawful
intercept user privileges to specify this variable.
detail Specifies to display where the ACL has been
applied.
Default
N/A.
Usage Guidelines
None.
Example
The following command displays the syntax of the dynamic ACL udpacl:
show access-list dynamic rule udpacl
The following command displays where the dynamic ACL udpacl has been applied:
show access-list dynamic rule udpacl
The lawful intercept user can display the names of the existing dynamic ACLs and a count of how many
times each is used when the following command is issued:
* show access-list dynamic
Dynamic Rules: ((*)- Rule is non-permanent )
(*)hclag_arp_0_4_96_51_fe_b2 Bound to 0 interfaces for application HealthCheckLAG
(*)idmgmt_def_blacklist Bound to 0 interfaces for application IdentityManager
(*)idmgmt_def_whitelist Bound to 0 interfaces for application IdentityManager
(*)mirror-data Bound to 2 interfaces for application CLI
Use the following command to see the conditions and actions for a dynamic ACL:
* show access-list dynamic rule "mirror-data"
entry mirror-data {
if match all {
source-address 10.66.9.8/24 ;
protocol udp ;
} then {
permit ;
mirror law_mirror ;
} }
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the dynamic ACL counters.
Syntax Description
countername Display the counter.
any Specifies the wildcard ACL.
port_list Specifies which ports’ ACLs to display.
vlan_name Specifies which VLAN’s ACL to display.
ingress Display ingress ACLs.
egress Display egress ACLs.
Default
The default is to display all interfaces, ingress.
Usage Guidelines
None.
Example
The following command displays all the dynamic ACL counters:
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the names of existing dynamic ACLs and a count of how many times each is used.
Syntax Description
There are no arguments or variables for this command.
Default
N/A.
Usage Guidelines
This command displays the names of existing dynamic ACLs, and how many times the ACL is used
(bound to an interface).
To see the conditions and actions for a dynamic ACL, use the following command:
show access-list dynamic rule rule {detail}
Example
The following command displays names of all the dynamic ACLs:
Dynamic Rules:
Udpacl Bound to 1 interfaces
icmp-echo Bound to 1 interfaces
History
This command was first available in ExtremeXOS 11.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the specified ACL zones, including their priority, applications, and the application priorities.
Syntax Description
any Displays all zones on the specified interface.
port port Displays all ACLs associated with the specified ports.
vlan vlan_name Displays all ACLs associated with the specified VLAN.
Default
N/A.
Usage Guidelines
Use this command to display the ACL zones, applications, and priorities.
Specifying a zone will show all the ACLs installed in the particular zone. Specifying a priority within a
zone will show all the ACLs installed at a particular priority within a zone.
Use the detail keyword to display all ACLs installed on a given interface.
Example
The following example displays the detailed view of the ACLs on port 1:1:
} }
The following example displays the detailed view of the priority 5 ACLs in the zone myzone on port 1:1:
The following example displays the priority 5 ACLs in the zone myzone on port 1:1:
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the specified access list meter statistics and configurations.
Syntax Description
meter-name Specifies the ACL meter to display.
out-of-profile Show the meter out-of-profile status.
Default
N/A.
Usage Guidelines
Use this command to display the ACL meters.
Example
The following example displays access list meter information for port 7:1:
# show access-list meter ports 1-4
==========================================================================
Policy Name Vlan Name Port
Committed Max Burst Out-of-Profile Out-of-Profile
Meter Rate (Kbps) Size Action DSCP Packet Count
===============================================================================
(none) * 2
ingmeter3 3000000 Kbps 300000 Kb - - - Dr - 123456
ingmeter4 4000000 pps 400000 pkt - - - Dr - 0
(none) * 3
ingmeter12 Max 123456 Kb - - - Dr - 0
ingmeter3 3000000 Kbps 300000 Kb - - - Dr - 0
ingmeter4 4000000 pps 400000 pkt - T - Dr - 0
(none)
ingmeter12 Max 123456 Kb L T D DrP 64 871234
ingmeter3 3000000 Kbps 300000 Kb - - D Dr - 0
ingmeter4 4000000 pps 400000 pkt L - D Dr - 0
Action : (D) Disable Port, (Dr) Drop, (DrP) Set Drop Precedence,
(L) Log, (T) Trap
History
This command was available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the network-zones configured, the number of attributes configured, and the number of policy
files that have the specified zones in it.
Syntax Description
network-zone Specifies the logical group of remote devices.
zone_name Specifies the network-zone name.
Default
N/A.
Usage Guidelines
Use this command to display detailed information about a particular network-zone, the attibutes
configured in the zone, and the policies bound to the zone.
Example
The following example displays network-zone statistics for all configured zones:
This example displays statistics for the specified zones, “zone1”, and “zone2”:
00:00:00:00:00:24 / ff:ff:ff:ff:ff:00
No. of Policies : 0
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the number of ACL masks consumed by the ACLs on a particular port.
Syntax Description
port Displays the usage on the specified port.
Default
N/A.
Usage Guidelines
Use this command to display how many masks are currently consumed on a port.
Example
The following example displays the ACL mask usage on port 1:1:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the number of Layer 4 port ranges consumed by the ACLs on the slices that support a
particular port.
Syntax Description
port Specifies to display the usage for the slices that support this port.
Default
N/A.
Usage Guidelines
ExtremeSwitching series switches can support a total of 16 Layer4 port ranges among the slices that
support each group of 24 ports.
Use this command to display how many of these Layer4 ranges are currently consumed by the ACLs on
the slices that support a particular port. The output of this command also displays which ports share the
same slices as the specified port.
Example
The following example displays the Layer4 range usage on port 9:1:
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the number of ACL rules consumed by the ACLs on a particular port or on the slices that
support a particular port.
Syntax Description
port Specifies to display the usage on this port.
Default
N/A.
Usage Guidelines
Use this command to display the rules used per slice, and also display the rule usage of the specified
port.
Example
The following example displays the ACL rule usage on port 5:
The following example displays the ACL ingress and egress rule usage on port 5:1:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the number of ACL slices and rules consumed by the ACLs on the slices that support a
particular port.
Syntax Description
port Specifies to display the usage for the slices that support this port.
Default
N/A.
Usage Guidelines
Use this command to display how many slices and how many rules per each slice are currently
consumed by the ACLs on the slices that support a particular port. This command also displays which
ports share the same slices as the specified port.
Beginning with ExtremeXOS 12.5, you can reserve or allocate a slice for a specific feature such that rules
for the feature does not share a slice with other components. A text string has been added at the end of
the output for each slice that indicates which feature, if any, is reserving the slice. See the example
below.
In ExtremeXOS 15.5.1 and onwards, unless there is at least one rule in a given slice, the slice is not
allocated. Since the slice is not yet allocated, a physical slice is not assigned to a virtual slice. So "used"
displays what is used in that particular slice, and "available" shows the remaining rules in that particular
used slice.
Example
The following example displays the ACL slice usage on port 1 or an ExtremeSwitching X870 series
switch:
# show access-list usage acl-slice port 1
Ports 1-93, 95, 97, 101, 105, 109, 113, 117, 121, 125
Stage: INGRESS Pipe 0
Group 3 Priority 31 Rules: Used: 10 Available 1014 system Double Reserved=FALSE
Reservations:
Virtual Slice : (*) Physical slice not allocated to any virtual slice.
History
This command was first available in ExtremeXOS 11.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the wide ACL mode configured on the supported switch or slot.
Syntax Description
slotNo Specifies the slot to display.
all Specifies all slots.
Default
N/A.
Usage Guidelines
Use this feature to display the width of the ACL TCAM key configured on a switch as being double wide
or single wide.
Example
The following command displays the wide key mode on all slots:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show accounts
show accounts
Description
Displays user account information for all users on the switch.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
You need to create a user account using the create account command before you can display user
account information.
To view the accounts that have been created, you must have administrator privileges.
Note
This command does not show the failsafe account.
Example
The following command displays user account information on the switch:
show accounts pppuser
The following command displays the lawful intercept account distinguished by the "R/L" displayed in
the Access column:
* (Private) X440e-24t.9 # show accounts
User Name Access LoginOK Failed
-------------------------------- ------ ------- ------
admin R/W 6 0
user RO 0 0
myLIuser R/L N/A N/A
History
This command was first available in ExtremeXOS 11.0.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays password policy information for all users on the switch.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
To view the password management information, you must have administrator privileges.
The show accounts password-policy command displays the following information in a tabular
format:
• Global password management parameters applied to new accounts upon creation:
◦ Maximum age—The maximum number of days for the passwords to remain valid.
◦ History limit—The number of previous password that the switch scans prior to validating a new
password.
◦ Minimum length—The minimum number of characters in passwords.
◦ Character validation—The passwords must be in the specific format required by the configure
account password-policy char-validation command.
◦ Lockout on login failures—If enabled, the system locks out users after 3 failed login attempts.
◦ Accounts locked out—Number of accounts locked out.
• User Name—The name of the user. This list displays all of the users who have access to the switch.
• Password Expiry Date—Date the password for this account expires; may be blank.
• Password Max. age—The number of days originally allowed to passwords on this account; may show
None.
• Password Min. length—The minimum number of characters required for passwords on this account;
may show None.
• Password History Limit—The number of previous passwords the system scans to disallow duplication
on this account; may show None.
Example
The following command displays the password management parameters configured for each account
on the switch:
---------------------------------------------------------------------------
Accounts global configuration(applied to new accounts on creation)
---------------------------------------------------------------------------
Password Max. age : None
Password History limit : None
Password Min. length : None
Password Character Validation : Disabled
Accts. lockout on login failures: Disabled
Accounts locked out : No
Lockout time period : Until Cleared
---------------------------------------------------------------------------
User Name Password Password Password Password Flags
Expiry Max. age Min. len History
Date Limit
---------------------------------------------------------------------------
admin None None None ---
user None None None ---
test Apr-17-2005 12 32 9 C--
---------------------------------------------------------------------------
Lockout Time Config: (U) Account is locked until cleared via 'clear account <name>
lockout'.
Flags: (C) Password character validation enabled, (L) Account locked out
(l) Account lockout on login failures enabled
History
This command was first available in ExtremeXOS 11.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show auto-peering
show auto-peering
Description
This command displays the status of BGP auto-peering and the learned auto-peering interfaces and
corresponding remote peer information.
Syntax Description
This command has no arguments or variables.
Default
N/A
Usage Guidelines
All existing BGP show commands can be used to display the status of BGP peers and routes.
Example
The following example shows the status of auto-peering:
# show auto-peering bgp
Type : BGP
Password :
Id : 0
Router ID: 2.2.2.102
AS : 102
Peer Id Password
----------- ----------------------------------
2222 None
2223 #$75Zvb3YfCBE/4+eSQE5dA5T2lmhF5A==
History
This command was first available in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X670-G2, X465, X590, X690, X870 series switches.
This feature requires the Advanced Edge license. For more information about licenses, see the
ExtremeXOS 30.5 Feature License Requirements.
show auto-provision
show auto-provision {{vr} vr_name}
Description
Displays the current state of auto provision on the switch.
Syntax Description
vr_name Specifies the virtual router. This may be VR-Default or VR-Mgmt only
Default
N/A.
Usage Guidelines
Use this command to display the current state and the statistics of the auto provision feature on the
switch.
Example
The following command displays all information on the current state of auto provision:
show auto-provision
Following is sample output for the command when the auto provision is enabled. When “Enabled” the
feature can be “In progress”, “Done”, or “Failed.”
The following command displays information on the current state of auto provision on VR-Mgmt.
Following is sample output for the command when auto provision is disabled:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show avb
show avb
Description
Displays a summary of MSRP, MVRP, and gPTP configuration on the switch.
Syntax Description
avb Audio Video Bridging.
Default
N/A.
Usage Guidelines
Use this command to display a summary of MSRP, MVRP, and gPTP configuration and status on the
switch.
Example
#show avb
gPTP status : Enabled
gPTP enabled ports : *17d *19d
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on all platforms if the AVB feature pack license is installed on the switch.
Description
Displays the configured bandwidth pool settings for the specified VLAN.
Syntax Description
ingress Displays configured bandwidth pool settings for incoming traffic only.
egress Displays configured bandwidth pool settings for outgoing traffic only.
duplex Displays configured bandwidth pool settings for traffic in both
directions.
vlan_name Displays configured bandwidth pool settings only for the specified
VLAN.
Default
N/A.
Usage Guidelines
This command displays the configured bandwidth pool settings for a VLAN. Values displayed include
the VLAN, maximum reserveable bandwidth (both ingress and egress), and bandwidth reserved by
application and by priority level.
Example
The following command displays bandwidth pool settings and accepted bandwidth reservations for all
ports:
---------------------------------------------------------------
mpls Rx 300 300 300 290 290 290 290 290 290
Tx 500 500 500 491 491 491 491 491 491
(Rx)-Receive, (Tx)-Transmit (BE)-Best Effort
History
This command was first available in ExtremeXOS 11.6.
Platform Availability
This command is available only on the platforms that support MPLS as described in the ExtremeXOS
30.5 Feature License Requirements document.
show banner
show banner { after-login | before-login }
Description
Displays the user-configured banners.
Syntax Description
after-login Specifies the banner that is displayed after login.
before-login Specifies the banner that is displayed before login.
Default
N/A.
Usage Guidelines
Use this command to display specific configured CLI banners.
If no keywords are specified, all configured banners are displayed. To display a specific banner, use the
before-login or after-login keyword.
Example
The following command displays the configured CLI switch banners:
show banner
Output from this command varies depending on your configuration; the following is one example:
Before-login banner:
Extreme Networks Summit Switch
#########################################################
Unauthorized Access is strictly prohibited.
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the user-configured banner string for network login.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to view the banner that is displayed on the network login page.
Example
The following command displays the network login banner:
If a custom banner web page exists, show banner netlogin generates the following output:
*********** Testing NETLOGIN BANNER at <system name>*********** NOTE:
Banner is not in use. Overridden since custom login page
"netlogin_login_page.html" is present.
If a custom banner web page does not exist, show banner netlogin generates the following output:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show bfd
show bfd
Description
Displays information on existing BFD sessions.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to show the status of the current BFD sessions.
Example
The following command displays information on current BFD sessions:
# show bfd
Number of sessions : 2
Sessions in Init State : 0
Sessions in Down State : 0
Sessions in Admin Down State : 1
Sessions in Up State : 1
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays the readings of the global BFD counters.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
Use this command to display global BFD counters.
Example
The following command displays BFD global counters:
Note
The Rx session Not Found counter is incremented when the BFD session corresponding to the
received BFD packet is not found. The Rx Discarded Pkt counter is incremented when the
neighbor state indicated in the BFD packet is not one of the expected/allowed states.
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays the BFD session information for a specified client.
Syntax Description
bgp BGP
mpls Specifies an MPLS client.
ospf OSPF protocol.
ipv4 Displays sessions requested by IPv4 version client, e.g. OSPFv2
(Default).
ipv6 Displays sessions requested by IPv6 version client, e.g. OSPFv3.
Default
IPv4.
Usage Guidelines
Use this command to display session information for a specified client.
Example
The following command displays the BFD sessions for an MPLS client on all VRs:
# show bfd session client mpls vr all
History
This command was first available in ExtremeXOS 12.4.
Support for BFD protected static route was added in ExtremeXOS 12.5.3.
Support for border gateway protocol (BGP) was added in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command displays statistics of missed hello packets.
Syntax Description
session-id Display statistics for sessions having session ID within the given range.
first Only or first of range of session
last Last of range of session ID.
ipaddress Specify IPv4 or IPv6 Destination address.
vr Virtual router.
vrname Virtual router name.
all All virtual routers.
detail Detailed view of statistics.
no-refresh Page by page display without continuous refresh.
refresh Continuous refresh of output.
Default
Refresh.
Usage Guidelines
You can select the sessions by either neighbor IP address, by range of session IDs, by VR or display all
the available sessions. Display selection by session ID is useful if the neighbor IP is link-local and VLAN
name is long (i.e. close to 32 characters).
Example
The following example displays summary view with the refresh option.
# show bfd session counters missed-hellos
===============================================================================
Neighbor Session ID Number Of
Misses
1 2 2+
===============================================================================
fe80::204:96ff:fe7e:c2f%test 251 15 8 7
fe80::204:96ff:fe7e:c2f%verify 252 10 6 4
50.0.0.1 300 >9999 >9999 >9999
History
This command was first available in ExtremeXOS 21.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Syntax Description
ipv4 Displays all IPv4 sessions.
ipv6 Displays all IPv6 sessions.
ipaddress Displays sessions in specified VR.
Default
Displays all IPv4 sessions counters by default if IPv4 or IPv6 is not specified.
Usage Guidelines
Use this command to display BFD session counters.
Example
The following command displays the session counters:
# show bfd session counters vr all
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays detailed information about a BFD session.
Syntax Description
ipv4 Displays all IPv4 sessions.
ipv6 Displays all IPv6 sessions.
ipaddress Displays sessions in specified VR.
vrname Displays sessions in specified VR.
Default
Displays all IPv4 sessions by default if ipv4 or ipv6 is not specified.
Usage Guidelines
Use this command to display BFD session information in detail.
Example
The following command displays the BFD session information in detail:
show bfd session detail vr all
Neighbor : fe80::204:96ff:fe1f:a800
Local : fe80::204:96ff:fe27:2c6a
VR-Name : VR-Default Interface : v2
Session Type : Single Hop State : Up
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays general information about a BFD session.
Syntax Description
ipv4 Displays all IPv4 sessions.
ipv6 Displays all IPv6 sessions.
ipaddress Displays session that has specified address as destination address.
vrname Displays sessions in specified VR.
Default
Displays all IPv4 sessions by default if ipv4 or ipv6 keyword is not specified.
Usage Guidelines
Use this command to display general information about a BFD session.
Example
The following command displays general information about the BFD session:
# show bfd session vr all
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays BFD counters on a specified VLAN.
Syntax Description
vlan_name Specifies the VLAN name.
Default
N/A.
Usage Guidelines
Use this command to display counter readings for a specified VLAN.
Example
The following command displays the counter readings for the VLAN vlan10:
# show bfd vlan vlan10 counters
VLAN : vlan10
Valid Rx Pkt : 144
Total Tx Pkt : 144
Auth Type Fails : 0
Authentication Fails : 0
Discarded Pkt : 0
Rx session Not Found : 6
Note
The Discarded Pkt counter is incremented when the neighbor state indicated in the BFD
packet is not one of the expected/allowed states. The Rx session Not Found counter is
incremented when the BFD session corresponding to the received BFD packet is not found.
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays the BFD settings for the specified VLAN.
Syntax Description
vlan_name Specifies the VLAN name.
Default
N/A.
Usage Guidelines
Use this command to display the BFD settings on a specified VLAN.
Example
The following command displays the BFD settings for the VLAN vlan10:
# show bfd vlan vlan10
VLAN : vlan10
BFD : Enabled
Tx Interval : 1000
Rx Interval : 1000
Detection Multiplier : 3
Authentication : None
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
show bgp
show bgp
Description
Displays BGP configuration information.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following command examples display various BGP configurations:
Output for show bgp for a VRF (PE-CE Protocol, RD and RT configured):
Redistribute :
--------------------------------------------------------------------------------
Address Family
ipv6-multicast
ipv4-multicast : Disabled
ipv6-unicast : Disabled
ipv6-multicast : Disabled
ipv4-vxlan : Disabled
Output of show bgp for a VRF (PE-CE Protocol, RD and RT “not” configured):
# show bgp
Enabled : No OperStatus : Down
RouterId : 3.3.3.3 AS : 200
LocalPref : 100 MED : None
Always-Compare-MED : Disabled Aggregation : Disabled
Route Reflector : No RR ClusterId : 0
IGP Synchronization : Disabled New Community Format: Disabled
Fast Ext Fallover : Disabled MPLS LSP as Next-Hop: No
AS Disp Format : Asplain Maximum ECMP Paths : 1
ConfedId : 0 Outbound rt. filter : Enabled
Confed Peers :
Networks : 4
ipv4-unicast 10.0.0.0/16 network-policy nwk.pol
ipv4-multicast 11.0.0.0/16 network-policy nwk.pol
ipv6-unicast 2001::/64 network-pol nwk6.pol
ipv6-multicast 2001::/64 network-pol nwk6.pol
Aggregate Networks : 4
ipv4-unicast 21.0.0.0/8 as-match advertise-policy: agg.pol
ipv4-multicast 22.0.0.0/8 as-set summary-only advertise-policy: agg.pol
ipv6-unicast 2003::/64 as-match advertise-policy: agg6.pol
ipv6-multicast 2004::/64 as-set advertise-policy: agg6.pol
Route Statistics:
Address family EBGP IBGP Redist.
--------------------------------------------
ipv4-unicast 0 0 0
ipv4-multicast 0 0 0
ipv6-unicast 0 0 0
ipv6-multicast 0 0 0
Redistribute:
--------------------------------------------------------------------------------
Address Family
Route Type Flags Priority Policy
--------------------------------------------------------------------------------
ipv4-unicast
Direct EO 2048 None
ipv6-multicast
Direct EO 2048 None
--------------------------------------------------------------------------------
Flags: (E) Export Enabled, (L) Export Operationally Off due to Low Memory,
If BGP is added as a protocol inside a heavy-weight VR, normal BGP peering applies with the addition of
vpnv4 address family support:
# show bgp
Enabled : No OperStatus : Down
RouterId : 3.3.3.3 AS : 200
LocalPref : 100 MED : None
Always-Compare-MED : Disabled Aggregation : Disabled
Route Reflector : No RR ClusterId : 0
IGP Synchronization : Disabled New Community Format: Disabled
Fast Ext Fallover : Disabled MPLS LSP as Next-Hop: No
AS Disp Format : Asplain Maximum ECMP Paths : 1
ConfedId : 0 Outbound rt. filter : Enabled
Confed Peers :
Networks : 4
ipv4-unicast 10.0.0.0/16 network-policy nwk.pol
ipv4-multicast 11.0.0.0/16 network-policy nwk.pol
ipv6-unicast 2001::/64 network-pol nwk6.pol
ipv6-multicast 2001::/64 network-pol
nwk6.pol
Aggregate Networks : 4
ipv4-unicast 21.0.0.0/8 as-match advertise-policy: agg.pol
ipv4-multicast 22.0.0.0/8 as-set summary-only advertise-policy: agg.pol
ipv6-unicast 2003::/64 as-match advertise-policy: agg6.pol
ipv6-multicast 2004::/64 as-set advertise-policy: agg6.pol
Route Statistics:
Address family EBGP IBGP Redist.
--------------------------------------------
ipv4-unicast 0 0 0
ipv4-multicast 0 0 0
vpnv4 0 0 0
ipv6-unicast 0 0 0
ipv6-multicast 0 0 0
Redistribute:
ipv4 Admin Operational Shutdown Policy
unicast Status Status Priority
----------------------------------------------------
Direct Disabled Down 2048 None
Static Disabled Down 2048 None
RIP Disabled Down 2048 None
BlackHole Disabled Down 2048 None
OSPFIntra Disabled Down 2048 None
OSPFInter Disabled Down 2048 None
OSPFExt1 Disabled Down 2048 None
OSPFExt2 Disabled Down 2048 None
ISISL1 Disabled Down 2048 None
ISISL2 Disabled Down 2048 None
ISISL1Ext Disabled Down 2048 None
ISISL2Ext Disabled Down 2048 None
History
This command was first available in ExtremeXOS 10.1.
This command was modified in Extreme ExtremeXOS 15.3 to reflect its operation in VRs and VRFs.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Show information about the EVPN instance table.
Syntax Description
bgp Specifies BGP.
evpn Specifies Ethernet VPN (RFC 7432).
evi Shows the EVPN instance table.
evi-index Specifies the EVI index.
vni Specifies a particular virtual network identifier.
vni Selects the VNI. Range is 1 to 16,777,215.
Default
N/A.
Usage Guidelines
Each EVPN instance represents a VLAN in a virtual network. In this implementation, there must be a 1-
to-1 relationship between VLAN and VNI.
Example
The following example displays the currently active EVPN EVI instances:
# show bgp evpn evi
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Shows the IPv4 entries from the EVPN MAC/IP table.
Syntax Description
bgp Specifies BGP.
evpn Specifies Ethernet VPN (RFC 7432).
ipv4 Shows only the IPv4 entries from the EVPN MAC/IP table.
evi-index Specifies the EVI index.
evi_index Restricts the display to EVI index (should be equal to VLAN ID). Range
is 1 to 4,094.
ip-address Restricts the display to an IP address.
ip_address Selects the IP address.
Default
N/A.
Usage Guidelines
This command allows you to view the current set of IPv4 addresses configured in EVPN. If the ESI and
ESI-Port fields are non-zero, then the entry was learned over a shared interface. The remote LACP
partner’s 6-byte MAC address is part of the ESI. For a full decoding of the ESI, see RFC 7432. The source
(Src) column indicates whether the entry was learned (L)ocally or (R)emotely. The local entries are from
the IP ARP cache or a locally configured routable VLAN. The remote entries appear only if the “In Use”
flag is set to yes.
Example
The following example shows the current set of IPv4 addresses configured in EVPN.
# show bgp evpn ipv4
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Shows the IPv6 entries from the EVPN MAC/IP table.
Syntax Description
bgp Specifies BGP.
evpn Specifies Ethernet VPN (RFC 7432).
ipv6 Shows only the IPv6 entries from the EVPN MAC/IP table.
evi-index Specifies the EVI index.
evi_index Restricts the display to EVI index (should be equal to VLAN ID). Range
is 1 to 4,094.
ip-address Restricts the display to an IP address.
ip_address Selects the IP address.
Default
N/A.
Usage Guidelines
This command allows you to view the current set of IPv6 addresses configured in EVPN. If the ESI and
ESI-Port fields are non-zero, then the entry was learned over a shared interface. The remote LACP
partner’s 6-byte MAC address is part of the ESI. For a full decoding of the ESI, see RFC 7432. The source
(Src) column indicates whether the entry was learned (L)ocally or (R)emotely. The local entries are from
the neighbor-discovery cache or a locally configured routable VLAN. The remote entries are seen only if
the “In Use” flag is set to yes.
Example
The following example shows the current set of IPv6 addresses configured in EVPN.
# show bgp evpn ipv6
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Shows the current set of MAC addresses configured in EVPN.
Syntax Description
bgp Specifies BGP.
evpn Specifies Ethernet VPN (RFC 7432).
mac Shows only the MAC entries from the EVPN MAC/IP table.
mac-address Specifies restricting the display to a particular MAC address.
mac_address Selects the MAC address to show.
Default
N/A.
Usage Guidelines
If the ESI and ESI-Port fields are non-zero, then the entry was learned over a shared interface. The
remote LACP partner’s 6-byte MAC address is part of the ESI. For a full decoding of the ESI, see RFC
7432. The (S)source column indicates whether the entry was learned (L)ocally or (R)emotely. The local
entries are from the MAC forwarding database. The remote entries are in the MAC forwarding database
only if the “In Use” flag is set to yes.
Example
The following example shows the current set of MAC addresses configured in EVPN.
# show bgp evpn mac
101020 Yes
R 1020 00:04:96:9d:66:e8 3.3.3.103
101020 Yes
R 1020 01:01:01:01:01:01 3.3.3.103
101020 Yes
L 3500 00:04:96:9d:64:e2
111103 Yes
R 4089 00:04:96:9c:2c:a2 1.1.1.101
101021 Yes
L 4089 00:04:96:9d:64:e2
101021 Yes
R 4089 00:04:96:9d:66:e8 3.3.3.103
101021 Yes
R 4089 00:0f:20:98:87:5a 3.3.3.103
101021 Yes
History
This command was first available in ExtremeXOS 30.2.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Displays BGP specific memory usage.
Syntax Description
detail Displays detail information.
memoryType Specifies the memory type usage to display.
Default
N/A.
Usage Guidelines
To see the memory types that you can display, enter the show bgp memory command without any
attributes.
Example
The following command displays detailed BGP output for a specific memory types:
: HN - Number of High Water Marks for Allocation, HB - Total High Water Mark
Allocations in Bytes
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Displays flap statistics or suppressed-route information about a specified neighbor.
Syntax Description
remoteaddr Specifies an IPv4 or IPv6 address that identifies a BGP neighbor.
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
flap-statistics Specifies that only flap-statistics should be displayed (for route flap
dampening enabled routes).
suppressed- Specifies that only suppressed routes should be displayed (for route flap
routes dampening enabled routes).
detail Specifies to display the information in detailed format.
all Specifies all routes.
path-expression Display routes that match the specified AA path expression.
no-advertise Specifies the no-advertise community attribute.
no-export Specifies the no-export community attribute.
no-export- Specifies the no-export-subconfed community attribute.
subconfed
community_numbe Specifies a community number.
r
autonomous- Specifies an autonomous system ID (0-65535).
system-id
bgp-community Specifies the BGP community number.
rd Specifies the Route Distinquisher (RD) value for the Layer 3 VPN routes for
which you want to clear flap statistics.
any Specifies all routes with a given or larger mask length.
netMaskLen Specifies a IPv4 or IPv6 subnet mask length (number of bits).
networkPrefixFi Specifies an IPv4 or IPv6 address and netmask.
lter
exact Specifies an exact match with the IP address and subnet mask.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
This command applies to the current VR or VRF context.
Note
If this command displays Bad Source Address, the BGP neighbor IP address is unavailable.
Possible causes for this condition include a deleted or unconfigured VLAN or IP address.
The option network any / netMaskLen displays all BGP routes whose mask length is equal to or
greater than maskLength, irrespective of their network address.
The option network any / netMaskLen exact displays all BGP routes whose mask length is exactly
equal to maskLength, irrespective of their network address.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default,
the IPv4 unicast address family, applies and no address-family information appears. Similarly
an IPv4 peer only supports IPv4 address families and no address-family information appears
if an IPv6 address family is specified.
To display Layer 3 VPN information, you must enter this command in the context of on the MPLS-
enabled VR; it is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command displays flap statistics for the specified IPv4 neighbor:
* Switch.18 # show bgp neighbor 10.0.0.0 flap-statistics
BGP Routes Flap Statistics
Destination NextHop Penalty Flaps Duration Reuse AS-
Path
-----------------------------------------------------------------------------------------
The following command displays flap statistics for the specified IPv6 neighbor:
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
Origin: (?) Incomplete, (e) EGP, (i) IGP
Total Number of Flapped Routes: 1
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Displays on the remote speaker the ORF lists received and installed from the local speaker for
installation and outbound route filtering for IPv4 and IPv6 address families.
Syntax Description
remoteaddr Specifies an IPv4 address that identifies a BGP neighbor.
ipv4-unicast Specifies IPv4 unicast routes.
ipv4-multicast Specifies IPv4 multicast routes.
vpnv4 Specifies VPNv4 routes.
received-orf Displays on the remote speaker the ORF lists it received, and subsequently
installed from the local speaker for installation and outbound route filtering.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
ORF is only supported for IPv4 peers. If this command is executed for an IPv6 peer, the command is
rejected with the following error message:
Outbound-route-filtering not supported for IPv6 peer remoteaddr
Example
The following example shows the ORF filters received by the remote speaker:
show bgp neighbor 11.0.0.2 received-orf
Address family: IPv4 unicast
Prefix list:
nlri 21.0.0.0/8 exact permit
nlri 22.1.0.0/16 min 24 max 28 permit
nlri 23.0.0.0/8 min 16 deny
Community list:
Extended-community list:
rt:100:2 permit
rt:100:3 permit
rt:101:1 deny
History
This command was first available in ExtremeXOS 15.3.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the L3 VPN feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Displays information about routes to a specified neighbor.
Syntax Description
remoteaddr Specifies an IPv4 or IPv6 address that identifies a BGP neighbor.
ipv4-unicast Specifies IPv4 unicast routes.
ipv4-multicast Specifies IPv4 multicast routes.
ipv6-unicast Specifies IPv6 unicast routes.
ipv6-multicast Specifies IPv6 multicast routes.
ipv4-vxlan Specifies IPv4 VXLAN routes.
l2vpn-evpn Specifies an L2VPN EVPN address family.
inclusive- Displays EVPN inclusive-multicast (type 3) routes
multicast
mac-ip Displays EVPN MAC/IP (type 2) routes.
auto-discovery Displays EVPN auto-discovery (type 1) routes.
esi Displays EVPN Ethernet segment (type 4) routes.
vpnv4 Specifies VPNv4 routes.
accepted-routes Specifies that only accepted routes are displayed.
received-routes Specifies that only received routes are displayed.
rejected-routes Specifies that only rejected routes are displayed.
transmitted- Specifies that only transmitted routes are displayed.
routes
detail Specifies to display the information in detailed format.
all Specifies all routes.
path-expression Display routes that match the specified AA path expression.
no-advertise Specifies the no-advertise community attribute.
no-export Specifies the no-export community attribute.
no-export- Specifies the no-export-subconfed community attribute.
subconfed
community_number Specifies a community number.
autonomous- Specifies an autonomous system ID (0-65535).
system-id
bgp-community Specifies the BGP community number.
rd Specifies the Route Distinquisher (RD) value for the Layer 3 VPN routes for
which you want to clear flap statistics.
any Specifies all routes with a given or larger mask length.
netMaskLen Specifies a IPv4 or IPv6 subnet mask length (number of bits).
networkPrefixFil Specifies an IPv4 or IPv6 address and netmask.
ter
exact Specifies an exact match with the IP address and subnet mask.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
show bgp neighbor now supports v6 unicast and multicast and vpnv4 address families. This command
applies to the current VR or VRF context.
Note
If this command displays Bad Source Address, the BGP neighbor IP address is unavailable.
Possible causes for this condition include a deleted or unconfigured VLAN or IP address.
The option network any / netMaskLen displays all BGP routes whose mask length is equal to or
greater than maskLength, irrespective of their network address.
The option network any / netMaskLen exact displays all BGP routes whose mask length is exactly
equal to maskLength, irrespective of their network address.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Note
For an IPv6 peer, an IPv6 address family must be specified, because an IPv6 peer does not
support IPv4 address families. If no address family is specified for an IPv6 peer, the default
address-family, i.e. IPv4 unicast is assumed and hence no address-family information appears.
Similarly an IPv4 peer only supports IPv4 address families and no address-family information
appears if an IPv6 address family is specified.
To display Layer 3 VPN information, you must enter this command in the context of on the MPLS-
enabled VR; it is not supported for BGP neighbors on the CE (VRF) side of the PE router.
Example
The following command displays sample output for show bgp neighbor summary:
Flags: (d) disabled, (e) enabled, (E) external peer, (I) internal peer
(m) EBGP multihop, (r) route reflector client
EBGP Multihop : 0
Enabled : 2
Disabled : 0
Peer Description :
EBGP Peer : 192.168.66.2 AS : 38
Enabled : Yes OperStatus : Up
Weight : 1 Shutdown-Priority : 1024
ConnectRetry : 120 MinAsOrig : 30
HoldTimeCfg : 180 KeepaliveCfg : 60
Source Interface : Not configured RRClient : No
EBGP-Multihop : No Remove Private AS : No
BFD : Off BFD Status : Not Required
Capabilities Config : ipv4-unicast,ipv4-multicast,4-Byte-As,route-refresh (old &
new),l2vpn-evpn
Policy for NLRI Type ipv4-unicast
In Policy : None
Out Policy : None
NextHopSelf : Disabled Send Communities : No
Soft Input Recfg : Disabled Allow Looped AS-Path: No
NextHopUnchanged : Disabled
.
.
.
Policy for NLRI Type ipv4-vxlan
In Policy : None
Out Policy : None
NextHopSelf : Enabled Send Communities : No
Soft Input Recfg : Disabled Allow Looped AS-Path: No
NextHopUnchanged : Disabled
Policy for NLRI Type l2vpn-evpn
In Policy : None
Out Policy : None
NextHopSelf : Disabled Send Communities : No
Soft Input Recfg : Disabled Allow Looped AS-Path: No
NextHopUnchanged : Enabled
State : ESTABLISHED
FSM Up since : Sat May 5 04:05:30 2018
(Duration: 0:0:08:19)
Remote Addr : 192.168.66.2 Local Addr : 192.168.66.1
Remote Port : 179 Local Port : 51612
Remote RouterId : 1.0.0.38 Local RouterId : 1.0.0.25
HoldTimeNegotiated : 180 KeepAliveNegotiated : 60
FsmTransitions : 1
InUpdateElapsedTime : 00:00:08:25 InMsgElapsedTime : 0:0:08:25
InUpdates : 2 OutUpdates (in TxQ) : 3 (0)
InTotalMsgs : 14 OutTotalMsgs : 15
InRouteRefreshes : 0 OutRouteRefreshes : 0
Route Statistics for NLRI Type ipv4-unicast
Received : 1 Accepted : 1
Rejected : 0 Active : 1
Suppressed : 0
.
.
.
Route Statistics for NLRI Type l2vpn-evpn
Received : 0 Accepted : 0
Rejected : 0 Active : 0
Suppressed : 0
Capabilities Tx : ipv4-unicast,ipv4-multicast,4-Byte-As,route-refresh (old &
new),l2vpn-evpn
Capabilities Rx : ipv4-unicast,ipv4-multicast,4-Byte-As,route-refresh (old &
new),l2vpn-evpn
NLRI for the session: ipv4-unicast,ipv4-multicast,ipv4-vxlan,l2vpn-evpn
Last State : ESTABLISHED Last Event : RX_KEEP
LastError : 'Cease - Peer Connection Rejected' (RX) on: Sat May 5 04:05:15 2018
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
Origin: (?) Incomplete, (e) EGP, (i) IGP
BGP Route Statistics
Total Rxed Routes : 5
Rejected Routes : 1
Unfeasible Routes : 1
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
Origin: (?) Incomplete, (e) EGP, (i) IGP
BGP Route Statistics
Total Rxed Routes : 5
Feasible Routes : 4
Active Routes : 4
The following example shows BGP IPv4 VXLAN routes received from the BGP neighbor located at
192.168.68.1:
# show bgp neighbor 192.168.68.1 ipv4-vxlan received-routes all
Routes:
-----------------------------------------------------------------------------
The following example shows L2VPN EVPN accepted and rejected MAC/IP routes for neighbor
192.168.120.119:
# show bgp neighbor 192.168.120.119 l2vpn-evpn mac-ip received-routes all
------------------------------------------------------------------------------------------
-
*>? RD: 65535:4294967295 ESI: 00:01:02:03:04:05:06:07:08:09
00:04:96:98:87:62 192.168.110.109 16777215 192.168.120.119
192.168.120.119 50 40 30 20 10
History
This command was first available in ExtremeXOS 10.1.
Support for EVPN auto-discovery and EVPN Ethernet Segment routes was added in ExtremeXOS 30.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Displays the peer groups configured in the system.
Syntax Description
detail Specifies to display the information in detailed format.
peer-group-name Specifies a peer group.
Default
N/A.
Usage Guidelines
If the detail keyword is specified then the parameters of the neighbors in the peer group, which are
different from the ones that are configured in the peer group, are displayed.
If no peer group name is specified, all the peer group information is displayed.
Example
The following command displays information for the outer peer group:
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Displays a summary of the BGP route information base (RIB).
Syntax Description
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
ipv4-vxlan Specifies an IPv4 VXLAN address family.
vr Specifies viewing routes associated with a specified virtual router.
vr_name Specifes the VR name. If not specified, the VR of current command
context is used.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
To display Layer 3 VPN information, you must enter this command in the context of on the MPLS-
enabled VR; it is not supported for BGP neighbors on the CE (VRF) side of the PE router.
When the show bgp routes summary command is issued with address-family vpnv4, the
command will impact the behavior of PE to PE neighbor sessions and display/clear the VPN-IPv4 RIB of
BGP.
Example
The following command displays a summary of the BGP route information base (RIB) for IPv4 multicast:
show bgp routes address-family ipv4-multicast summary
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
Description
Displays the BGP route information base (RIB).
Syntax Description
ipv4-unicast Specifies the IPv4 unicast address family.
ipv4-multicast Specifies an IPv4 multicast address family.
ipv6-unicast Specifies the IPv6 unicast address family.
ipv6-multicast Specifies an IPv6 multicast address family.
ipv4-vxlan Specifies an IPv4 VXLAN address family.
l2vpn-evpn Specifies an L2VPN EVPN address family.
inclusive-multicast Displays EVPN inclusive-multicast (type 3) routes
mac-ip Displays EVPN MAC/IP (type 2) routes.
auto-discovery Displays EVPN auto-discovery (type 1) routes.
esi Displays EVPN Ethernet segment (type 4) routes.
vpnv4 Specifies the VPNv4 address family for Layer 3 VPN support.
all Specifies all routes.
path-expression Displays routes that match the specified AA path expression.
no-advertise Specifies the no-advertise community attribute.
no-export Specifies the no-export community attribute.
no-export-subconfed Specifies the no-export-subconfed community attribute.
community_number Specifies a community number.
autonomous-system-id Specifies an autonomous system ID (0-65535).
bgp-community Specifies the BGP community number.
rd Specifies the Route Distinquisher (RD) value for the Layer 3 VPN
routes for which you want to clear flap statistics.
any Specifies all routes with a given or larger mask length.
netMaskLen Specifies a IPv4 or IPv6 subnet mask length (number of bits).
networkPrefixFilter Specifies an IPv4 or IPv6 address and netmask.
exact Specifies an exact match with the IP address and subnet mask.
Default
If no address family is specified, IPv4 unicast is the default.
Usage Guidelines
The option network any / netMaskLen displays all BGP routes whose mask length is equal to or
greater than maskLength, irrespective of their network address.
The option network any / netMaskLen exact displays all BGP routes whose mask length is exactly
equal to maskLength, irrespective of their network address.
To display Layer 3 VPN information, you must enter this command in the context of on the MPLS-
enabled VR; it is not supported for BGP neighbors on the CE (VRF) side of the PE router.
You can only execute the show for vpnv4 address family in a VR context. If you execute this command
in a VRF context, the “Cannot execute command in VRF context” error is displayed.
If you do not specify an address family, this command applies to the IPv4 unicast address family. To
apply this command to an address family other than the IPv4 unicast address family, you must specify
the address family.
Example
The following command displays detailed information about all BGP routes:
* Switch.5 # show bgp routes all
Received Routes:
Destination LPref Weight MED Peer Next-Hop AS-Path
------------------------------------------------------------------------------------
*>? 1.1.1.1/32 100 0 11.0.0.1 11.0.0.1 100
* ? 11.0.0.0/24 100 0 11.0.0.1 11.0.0.1 100
*>? 101.0.0.0/24 100 0 11.0.0.1 11.0.0.1 100
u ? 103.0.0.0/24 100 0 11.0.0.1 11.0.0.1 100
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
The following command displays BGP information for the IPv6 address family:
Switch.21 # show bgp routes address-family ipv6-unicast all
Received Routes:
Destination LPref Weight MED
Peer Next-Hop AS-Path
------------------------------------------------------------------------------------
*>? 2001::/64 100 0 120
3000::1 3001::1 100, 200
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
Origin: (?)
Incomplete, (e) EGP, (i) IGP
The following example displays detailed show output for the IPv6 address family:
switch.21 # show bgp routes address-family ipv6-unicast all
Route: 2001::/64, Peer 3000::1,
Unfeasible, Origin Incomplete,
Next-Hop 3001::1,
LPref 100, MED 0,
Weight 0, RR Orig ID 0.0.0.0
AS-Path: 100
DampInfo: Penalty 0 Flapped 0 times in 00:10:47
The following examples display detailed show output for the IPv4 address family:
switch.21 # show bgp routes address-family vpnv4 all
Received Routes:
Destination LPref Weight MED
Peer Next-Hop AS-Path
------------------------------------------------------------------------------------
*>? 100:1:10.0.0.0/8 100 0 120
11.0.0.2 11.0.0.2
100, 200
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
The following example displays detailed show output for the IPv4 VXLAN address family:
# show bgp routes ipv4-vxlan all
Routes:
LTEP VNI Peer Next-Hop LPref Weight MED AS-
Path
---------------------------------------------------------------------------
* i 1.0.0.15/32 777 192.168.68.1 192.168.68.1 100 1 0
15
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
------------------------------------------------------------------------------------------
-
*>? RD: 65535:4294967295 Ethernet Tag: 0 Tunnel Type: 6 (Ingress Replication)
192.168.110.109 192.168.110.109 16777215
192.168.120.119 192.168.120.119 50 40 30 20 10
Flags: (*) Preferred BGP route, (>) Active, (d) Suppressed, (h) History
(s) Stale, (m) Multipath, (u) Unfeasible
History
This command was first available in ExtremeXOS 10.1.
Support for EVPN auto-discovery and EVPN Ethernet Segment routes was added in ExtremeXOS 30.4.
Platform Availability
This command is available on platforms that support the appropriate license. For complete information
about software licensing, including how to obtain and upgrade your license and which licenses support
the BGP feature, see the ExtremeXOS 30.5 Feature License Requirements document.
show bootprelay
show bootprelay
Description
Displays the DHCP/BOOTP Relay statistics and the configuration for the VRs.
Syntax Description
ipv4 Specifies unconfiguring the DHCPv4 BOOTP Relay service (default).
ipv6 Specifies unconfiguring the DHCPv6 BOOTP Relay service.
vlan Unconfigures BOOTP relay for a specified VLAN.
vlan_name Specifies the VLAN name.
include-secondary Removes the include-secondary configuration for the specified VLAN.
Default
None.
Usage Guidelines
The fields displayed in the DHCP Information Option 82 section depend on the configuration defined by
the configure bootprelay dhcp-agent information policy [drop | keep |
replace] command. If the policy configured is keep, the Requests unmodified counter appears. If the
policy configured is replace, the Requests replaced counter appears. And if the drop policy is
configured, the Requests dropped counter appears.
The Opt82 added to Requests counter indicates the number of DHCP requests to which the BOOTP
Relay agent (the switch) has added its own option 82 information.
Example
The following example displays the DHCP/BOOTP relay statistics for existing VRs:
Switch.1 # show bootprelay
Bootprelay : Enabled on virtual router "VR-Default"
DHCP Relay Agent Information Option : Enabled on virtual router "VR-Default"
DHCP Relay Agent Information Check : Enabled on virtual router "VR-Default"
DHCP Relay Agent Information Policy : Replace
DHCP Relay Agent Information Remote-ID : "default"
Bootprelay servers for virtual router "VR-Default":
Destination: 10.127.8.1
DHCP/BOOTP relay statistics for virtual router "VR-Default"
Received from client = 2 Received from server = 2
Requests relayed = 2 Responses relayed = 2
DHCP Discover = 1 DHCP Offer = 1
DHCP Request = 1 DHCP Ack = 1
DHCP Decline = 0 DHCP NAck = 0
DHCP Release = 0
DHCP Inform = 0
DHCP Information Option 82 packets statistics for virtual router "VR-Default"
Received from client = 0 Received from server = 2
Requests replaced = 0 Responses dropped = 0
Opt82 added to Requests = 2
Note: Default Remote-ID : System MAC Address
The following example shows DHCP/BOOTP relay that is disabled for the VR, but enabled on some
VLANs:
# show bootprelay
Bootprelay : Disabled on virtual router "VR-Default", but enabled on some VLANs.
Include Secondary : Disabled
DHCP Relay Agent Information Option : Disabled on virtual router "VR-Default"
History
This command was first available in ExtremeXOS 10.1.
Information about DHCP/BOOTP relay being disabled for the VR, but enabled on some VLANs was
added in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the enabled/disabled configuration of BOOTP relay on one or all VLANs for the specified VR.
Syntax Description
bootprelay BOOTP Relay Configuration
ipv4 DHCPv4 BOOTP Relay service.
ipv6 DHCPv6 BOOTP Relay service.
vlan VLAN
vlan_name Specifies a single VLAN for which to display BOOTP relay
configuration information.
vr Use a specific virtual router name.
vr_name Specifies a single VR for which to display BOOTP relay configuration
information.
Default
IPv4.
Usage Guidelines
If a VR is not specified, this command displays the specified VLANs for the current VR context.
Note
ExtremeXOS DHCPv6 supports three options: OPTION_RELAY_MSG (9),
OPTION_INTERFACE_ID (18), and OPTION_REMOTE_ID (37).
Note
It is mandatory to configure BOOTP Relay v6 Agents. The packets are not forwarded if the v6
agents are not configured.
Example
The following example displays the BOOTP relay configuration for all VLANs on the VR-Default virtual
router:
The following example displays the BOOTP relay configuration for all VLANs in the current VR context:
The following example displays the BOOTP relay configuration for VLAN client1:
The following example displays the BOOTP relay configuration for IPv6:
The following example displays the BOOTP relay configuration for IPv6 when vr is disabled:
The following example shows DHCP/BOOTP relay configuration that is disabled for the VR, but enabled
on some VLANs:
# show bootprelay configuration
DHCPv4 BOOTP Relay : Disabled on virtual router "VR-Default", but enabled on some VLANs.
Include Secondary : Disabled
BOOTP Relay Servers :
DHCP Relay Agent Information Option: Disabled
DHCP Relay Agent Information Check : Disabled
DHCP Relay Agent Information Policy: Replace
History
This command was first available in ExtremeXOS 12.4.2.
Information about DHCP/BOOTP relay being disabled for the VR, but enabled on some VLANs was
added in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays various BOOTP Relay configuration details.
Syntax Description
ipv4 Specifies unconfiguring the DHCPv4 BOOTP Relay service (default).
ipv6 Specifies unconfiguring the DHCPv6 BOOTP Relay service.
vlan Unconfigures BOOTP relay for a specified VLAN.
vlan_name Specifies the VLAN name.
include-secondary Removes the include-secondary configuration for the specified VLAN.
Default
Usage Guidelines
Use this command to display various bootprelay configuration details.
Example
The following command displays IPv4 bootprelay statistics:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays various BOOTP Relay configuration details.
Syntax Description
ipv4 Specifies unconfiguring the DHCPv4 BOOTP Relay service (default).
ipv6 Specifies unconfiguring the DHCPv6 BOOTP Relay service.
vlan Unconfigures BOOTP relay for a specified VLAN.
vlan_name Specifies the VLAN name.
include-secondary Removes the include-secondary configuration for the specified VLAN.
Default
N/A.
Usage Guidelines
Use this command to display BOOTP Relay details for IPv6.
Example
The following command :
# show bootprelay configuration ipv6
DHCPv6 BOOTP Relay : Enabled on virtual router "VR-Default"
Include Secondary : Enabled (parallel)
The following example shows DHCPv6/BOOT Relay configuration that is disabled on the VR, but
enabled on some VLANs:
# show bootprelay configuration ipv6
DHCPv6 BOOTP Relay : Disabled on virtual router "VR-Default", but enabled on some VLANs.
Include Secondary : Disabled
History
This command was first available in ExtremeXOS 15.4.
Information about DHCP/BOOTP relay being disabled for the VR, but enabled on some VLANs was
added in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the circuit ID sub-option that identifies the port for an incoming DHCP request.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following command displays the circuit ID port_info value for all ports:
Switch.12 # show bootprelay dhcp-agent information circuit-id port-information ports all
Port Circuit-ID Port information string
---- ----------------------------------
1 1001
2 1002
3 extreme1
4 1004
5 1005
6 1006
7 1007
8 1008
9 1009
10 1010
:
:
11 1011
12 1012
:
:
48 1048
49 1049
50 1050
Note: The full Circuit ID string has the form '<Vlan Info>-<Port Info>'
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the circuit ID sub-options that identify the VLANs on the switch.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following command displays the circuit ID vlan_info for all VLANs:
Summit # show bootprelay dhcp-agent information circuit-id vlan-information
Vlan Circuit-ID vlan information string
---- ----------------------------------
Default 1
Mgmt 4095
v1 4094
v2 extreme123
Note: The full Circuit ID string has the form '<Vlan Info>-<Port Info>'
History
This command was first available in ExtremeXOS 12.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays various BOOTP Relay configuration details.
Syntax Description
bootprelay Shows the BOOTP relay information.
ipv6 DHCPv6 BOOTP Relay Service.
Default
Not applicable.
Usage Guidelines
Use this command to display IPv6 bootp relay information.
Example
The following command displays IPv6 bootprelay information:
* switch # show bootprelay ipv6
BOOTP Relay: DHCPv6 BOOTP Relay enabled on virtual router "VR-Default"
Include Secondary : Disabled
BOOTP Relay Servers :2001::1
3001::1
4001::1
VLAN "Default" :
BOOTP Relay : Enabled
Interface ID : 3999 (Default)
Remote ID : 00:04:96:52:08:76 (Default)
Prefix Snooping : Disabled
VLAN "v1" :
BOOTP Relay : Enabled
Interface ID : Interface-Sring1
Remote ID :
* switch #
When vr is disabled:
* SWITCH # show bootprelay ipv6 configuration
BOOTP Relay: DHCPv6 BOOTP Relay disabled on virtual router “VR-Default”
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the information about snooped IPv6 prefixes delegated via DHCP.
Syntax Description
vlan_name Specifies the VLAN name.
Default
N/A.
Usage Guidelines
None.
Example
The following command displays snooped IPv6 prefixes delegated via DHCP for all VLANs.
show bootprelay ipv6 prefix-delegation snooping
3000::/48 v2
3000::1 992 secs
2800::/56 v3
2800::1 10 secs
The following command displays snooped IPv6 prefixes delegated via DHCP for VLAN v1:
show bootprelay ipv6 prefix-delegation snooping vlan v1
History
This command was first available in ExtremeXOS 15.7.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show cdp
show cdp
Description
Displays the interval between advertisements, the hold time and the version of the advertisement.
Syntax Description
There are no arguments ot keywords for this command.
Default
N/A.
Usage Guidelines
Use this command to display the interval between advertisements, the hold time and the version of the
advertisement.
Example
The following command displays specific information on the CDP feature:
# show cdp
12345678901234567890123456789012345678901234567890123456789012345678901234567890
CDP Transmit time : 60 seconds
CDP Hold time : 180 seconds
CDP Device ID : 00:04:96:8B:C2:CA
CDP Enabled ports : 1-2, 7
Power Available TLV Enabled ports : 1-2,23
CDP Local management address : VLAN Chicago (2001:db8:85a3::7334)
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays CDP port counter statistics.
Syntax Description
ports Displays CDP port statistics.
port_list Port list of CDP ports.
Default
N/A.
Usage Guidelines
Use this command to display CDP port counter statistics.
Example
The following command displays counter statistic for CPD ports:
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays information about neighbors.
Syntax Description
detail Displays detailed information.
Default
N/A.
Usage Guidelines
Use this command to display CDP neighbor information.
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays information about neighbors in ports.
Syntax Description
port_list Specifies the port list, separated by a comma.
configuration CDP local port configuration.
detail Detailed information.
Default
N/A.
Usage Guidelines
Use this command to display CDP port information.
Example
The following command displays neighbor port information on the CDP feature:
# show cdp ports
Neighbor Information--------------------
Port Device-Id Hold time Remote CDP Port
ID
Version
---- --------- --------- ---------- --------------------
Note
">" indicates that the value was truncated to the column size in the output.
The following example displays the COS extended neighbor port information on the CDP feature:
Local Port Information
----------------------
Port Trust Cos VoIP VLAN VoIP VLAN
Advertise
---- ---------- ---- ------------------------------- ------------
1 Trusted 0 Default Solicited
2 Trusted 0 Default Unsolicited
Neighbor Information
--------------------
Device ID : X670G2-48x-4q
Port ID (outgoing port) : Slot: 1, Port: 10
Advertisement Version : 2
Platform : X670G2-48x-4q
Interface : 10
Holdtime : 162
Version :
ExtremeXOS version 22.4.0.5 xos_22.4 by kosharma
on Fri Jul 14 12:28:36 IST 2017
Native VLAN : 1
Duplex : Full
Trust : Trusted
SysName : X670G2-48x-4q
History
This command was first available in ExtremeXOS 15.4.
The detailoption was added and the output of this command was updated in ExtremeXOS 22.5.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays the MEP CCM database.
Syntax Description
domain_name Enter the name of the domain for which you want to display the MEP
CCM databases.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
port_list Enter the ports in the domain/association for which you want to
display the CCM databases.
up Enter this to display the CCM database on the UP MEP for the
specified MA.
down Enter this to display the CCM database on the DOWN MEP for the
specified MA.
Default
N/A.
Usage Guidelines
If you do not specify any parameters or variables, the system displays information on all CCM databases
on the switch.
Note
The TTL for the CCM messages from the MP you are working on is 3.5 times the
transmission interval.
Example
The following command displays the CCM databases on the switch:
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command displays the details of specified or all groups. The information contains group name,
grop status, LMEP id, the physical port of the LMEP, RMEP ids, registered clients, domain and
association names.
Syntax Description
group_name Group name, maximum of 31 characters.
Default
N/A.
Usage Guidelines
Use this command to display the details of specified or all groups. The information contains group
name, grop status, LMEP id, the physical port of the LMEP, RMEP ids, registered clients, domain and
association names.
Example
The following output shows the typical output of this command:
# sh cfm groups
Group : eapsCfmGrp1 Status : UP
Local MEP : 11 port : 41
Remote MEPs : 10
Client(s) : eaps
Domain : MD1
Association : MD1v2
Group : eapsCfmGrp2 Status : UP
Local MEP : 12 port : 31
Remote MEPs : 13
Client(s) : eaps
Domain : MD1
Association : MD1v2
The following example shows the output for ERPS with Y.1731 CCMs:
======================================================================================
History
This command was first available in ExtremeXOS 15.2.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command displays frame-delay information for the given CFM segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
mep Maintenance association End Point.
mep_id MEP-ID. The range is 1-8191.
Default
N/A.
Usage Guidelines
Use this command to display the delay for the last received frame, the minimum, maximum and average
delay, and the delay variance during the current transmission. When the segment name is not specified,
only the segments which have valid statistics alone are displayed. When the segment name is specified,
that particular segment’s information, although not present, is displayed.
Example
The following command displays the frame delay statistics for the CFM segment:
--------------------------------------------------------------------------
Segment Name Mep Recent Min Max Mean Jitter Errored
ID Delay Delay Delay Delay Delay Frames*
(ms) (ms) (ms) (ms) (ms)
--------------------------------------------------------------------------
segment1 ---- 0.000 0.000 0.000 0.000 0.000 0
segment2 100 0.000 0.000 0.000 0.000 0.000 0
200 0.000 0.000 0.000 0.000 0.000 0
segment3 100 0.000 0.000 0.000 0.000 0.000 0
300 0.000 0.000 0.000 0.000 0.000 0
--------------------------------------------------------------------------
Flags: (*) % of frames beyond alarm threshold in the current measurement window
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command displays frame-delay information for the given CFM segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to display frame-delay information for the given CFM segment.
Example
Example output not yet available and will be provided in a future release.
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command is used to display the current status and configured values of a CFM segment.
Syntax Description
segment_name An alphanumeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to display the current status and configured values of a CFM segment.
Note
In this command, the row “pending frames” will be displayed only for on-demand mode of
transmission.
A segment is considered as active if any of the MEPs in the segment is enabled for Frame Loss
measurement. Active Segment count will be incremented by one only even if there are multiple MEPs
enabled for Frame Loss. For example, assume that there are 3 segments created - seg1, seg2 and seg3.
Segment "seg1" is enabled for Frame Delay measurement. Segment "seg3" has 10 MEPs added with 4
enabled for Frame Loss measurement, the following are the valid counts. Switch wide "Total Configured
Segments" will be 3 and "Total Active Segments" will be 2. For Segments "seg1" and "seg2", "Total
Configured MEPs" and "Total Active MEPs" will be 0. For segment "seg3", "Total Configured MEPs" will
be 10 and "Total Active MEPs" will be 4.
By default, both the Frame Delay and Frame Loss sections are displayed for all the CFM segments. The
user has option to filter out based on Segment Name or Frame Delay / Frame Loss.
• show cfm segment frame-loss segment_name: Displays frame-loss information for the
given CFM segment (and all the MEPs under the given segment).
• show cfm segment frame-loss segment_namemep mep_id: Displays frame-loss
information for the given CFM segment - MEP ID combination.
Example
MEP ID : 200
DMM Transmission : In Progress
Transmission mode : Continuous
Frames Transmitted : 24
Frames Received : 15
DMM Tx Interval : 2 secs
DMR Rx Timeout : 10 msec
Alarm Threshold : 10 %
Clear Threshold : 95 %
Measurement Window Size : 60
Class of Service : 0
Tx Start Time : Fri Apr 17 01:29:45 2009
Min Delay : Fri Apr 17 01:30:29 2009
Max Delay : Fri Apr 17 01:30:03 2009
Last Alarm Time : Fri Apr 17 01:29:59 2009
Alarm State : Set
Lost Frames in Current Window : 9
Frame Loss:
LMM Tx Interval : 2 secs
LMR Rx Timeout : 10 msec
SES Threshold : 30 %
Consecutive Available Count : 10
Measurement Window Size : 60
Class of Service : 0
Total Configured MEPs : 2
Total Active MEPs : 2
MEP ID : 100
LMM Transmission : In Progress
Transmission mode : Continuous
Frames Transmitted : 24
Frames Received : 15
Availability Status : Available/Unavailable
Unavailability Start Time : Fri Apr 17 01:10:45 2011
Unavailability End Time : Fri Apr 17 01:20:45 2011
Tx Start Time : Fri Apr 17 01:10:45 2011
Min Near-End Frame Loss : Fri Apr 17 01:29:45 2009
Max Near-End Frame Loss : Fri Apr 17 01:39:45 2009
Min Far-End Frame Loss : Fri Apr 17 01:49:45 2009
Max Far-End Frame Loss : Fri Apr 17 01:59:45 2009
MEP ID : 200
LMM Transmission : In Progress
Transmission mode : Continuous
Frames Transmitted : 24
Frames Received : 15
Availability Status : Available/Unavailable
Unavailability Start Time : Fri Apr 17 01:10:45 2011
Unavailability End Time : Fri Apr 17 01:20:45 2011
Tx Start Time : Fri Apr 17 01:10:45 2011
Min Near-End Frame Loss : Fri Apr 17 01:29:45 2009
Max Near-End Frame Loss : Fri Apr 17 01:39:45 2009
Min Far-End Frame Loss : Fri Apr 17 01:49:45 2009
Max Far-End Frame Loss : Fri Apr 17 01:59:45 2009
-------------------------------------------------------
Total Configured Segments : 1
Total Active Segments : 1
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays shows frame-loss statistics.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
The below output is an example for displaying the frame-loss stats for the cfm segments. This
command shows the recent, minimum, maximum and average near-end and far-end frame loss ratios
during the current transmission. The stats for a particular segment will be preserved till the user triggers
the next LMM transmission or until it does a clear counter.
Example
The following command displays the frame loss statistics for the CFM segment:
---------------------------------------------------------------
History
This command was first available in ExtremeXOS 15.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command displays frame-loss information for the given CFM segment.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to display frame-delay information for the given CFM segment.
Example
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command displays frame-delay information for the given CFM segment – MEP ID combination.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to display frame-delay information for the given CFM segment – MEP ID
combination.
Example
Switch#showcfm segment sc-rtp
CFM Segment Name : sc-rtp
Domain Name : pbt-d2
Association : pbt-d2-protectingMD
Level : 2
Destination MAC : 00:04:96:1e:14:70
Frame Delay:
MEP ID : 100
__________________________________________________________
DMM Transmission : In Progress
Transmission mode : Continuous
Frames Transmitted : 24
Frames Received : 15
DMM Tx Interval : 2 secs
DMR Rx Timeout : 10 msec
Alarm Threshold : 10 %
Clear Threshold : 95 %
Measurement Window Size : 60
Class of Service : 0
Tx Start Time : Fri Apr 17 01:29:45 2009
Min Delay : Fri Apr 17 01:30:29 2009
Max Delay : Fri Apr 17 01:30:03 2009
Last Alarm Time : Fri Apr 17 01:29:59 2009
Alarm State : Set
Lost Frames in Current Window : 9
MEP ID : 200
MEP ID : 100
LMM Transmission : In Progress
Transmission mode : Continuous
Frames Transmitted : 24
Frames Received : 15
Availability Status : Available/Unavailable
Unavailability Start Time : Fri Apr 17 01:10:45 2011
Unavailability End Time : Fri Apr 17 01:20:45 2011 Tx
Start Time : Fri Apr 17 01:10:45 2011 Min
Near-End Frame Loss : Fri Apr 17 01:29:45 2009 Max
Near-End Frame Loss : Fri Apr 17 01:39:45 2009 Min
Far-End Frame Loss : Fri Apr 17 01:49:45 2009 Max
Far-End Frame Loss : Fri Apr 17 01:59:45 2009
MEP ID : 200
LMM Transmission : In Progress
Transmission mode : Continuous
Frames Transmitted : 24
Frames Received : 15
Availability Status : Available/Unavailable
Unavailability Start Time : Fri Apr 17 01:10:45 2011
Unavailability End Time : Fri Apr 17 01:20:45 2011
Tx Start Time : Fri Apr 17 01:10:45 2011
Min Near-End Frame Loss : Fri Apr 17 01:29:45 2009
Max Near-End Frame Loss : Fri Apr 17 01:39:45 2009
Min Far-End Frame Loss : Fri Apr 17 01:49:45 2009
Max Far-End Frame Loss : Fri Apr 17 01:59:45 2009
-------------------------------------------------------
Total Configured Segments : 1
Total Active Segments : 1
History
This command was first available in ExtremeXOS 15.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
Displays information for CFM segments.
Syntax Description
segment_name An alpha numeric string identifying the segment name.
Default
N/A.
Usage Guidelines
Use this command to display information for the selected CFM segment.
If a segment name is not specified, the information for all of the segments that are currently configured
are displayed.
Example
The following command displays information for an active CFM segment that is configured to transmit
with a specific count:
History
This command was first available in ExtremeXOS 12.3.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
Description
This command displays current and historical CFM session missed-hellos statistics.
Syntax Description
domain_name IEEE 802.1ag domain name.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
ports Specifiy ports to show.
port_list List of ports to show.
end-point Show MEPs (Maintenance association End Point).
up End point is up.
down End point is down.
history Historical set of bins.
no-refresh Page by page display without continuous refresh.
refresh Continuous refresh of output.
Default
Refresh.
Usage Guidelines
None.
Example
The following example show the current statistics with no-refresh:
# show cfm session counters missed-hellos no-refresh
1 2 3 4 5 6 7 8
12345678901234567890123456789012345678901234567890123456789012345678901234567890
================================================================================
Session ID Port Remote End-Point Interval Missed Missed Down Flags
MAC Address (msec) Once Twice
================================================================================
3-4000-1111-6666 4 00:11:22:33:44:55 3.3 --- --- >9999 DHIs
3-4000-2222-6666 6 00:11:22:33:44:55 10000 >9999 >9999 >9999 DSIs
3-4001-3333-7777 5 00:66:77:88:99:aa 600000 >9999 >9999 >9999 USAs
================================================================================
Session ID: MD Level-VLAN ID-Local MEP ID-Remote MEP ID
Flags: Maintenance Point: (U) Up, End-Point, (D) Down End-Point
Session Type: (S) Software, (H) Hardware
Status: (A) Active, (I) Inactive
Remote End-Point MAC Address: (d) dynamic, (s) static
================================================================================
Session ID: MD Level-VLAN ID-Local MEP ID-Remote MEP ID
Flags: Maintenance Point: (U) Up End-Point, (D) Down End-Point
Session Type: (S) Software, (H) Hardware
Status: (A) Active, (I) Inactive
Remote End-Point MAC Address: (d) dynamic, (s) static
0->Clear Counters U->page up D->page down ESC->exit
#
History
This command was first available in ExtremeXOS 16.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show cfm
show cfm { domain_name { association_name {{ports port_list
{[intermediate-point | [end-point [up|down]]]}}}
Description
Displays the current CFM configuration on the switch.
Syntax Description
domain_name Enter the name of the domain you want to display.
association_name IEEE 802.1ag or ITU-T Y.1731 association name.
port_list Enter the ports in the domain and association you want to display.
up Enter this to display the UP MEP for the specified MA.
down Enter this to display the DOWN MEP for the specified MA.
intermediate-point Enter this to display the MIPs for the specified MA.
Default
N/A.
Usage Guidelines
This command displays the following information:
• Domain names
• MA levels
• Association names
• VLAN names
• Transmit Interval
• UP MEPs
• MEPIDs
• MEP transmit intervals
• MEP State
• DOWN MEPs
• Intermediate points (MIPs)
• Total number of CFM ports on the switch
• Destination MAC Type
• VPLS-based MPs
• Sender ID information
• ISID Intermediate Point
For the number of domains, ports, MEPs, MIPs, and associations supported on the switch, see the
Supported Instances for CFM section in the ExtremeXOS 30.5 User Guide.
Example
The show cfm command displays the current CFM configuration on the switch:
Disabled
Faulting State : Yes
Last Faulting State Change : Wed Jun 19 09:08:13 2013
MEP Error Defects : Remote
Port Status : Up
Association: "short_ma_name", Destination MAC Type: Multicast, VLAN "v1" with 2
cfm ports
Transmit Interval: 1000 ms, Type : IEEE 802.1ag Maintenance Association
port 1; Down End Point, mepid: 100, transmit-interval: 3.3 ms
(configured)
MEP State: Enabled, CCM Message: Enabled, Send SenderId TLV:
Disabled
Faulting State : Yes
Last Faulting State Change : Wed Jun 19 09:09:47 2013
MEP Error Defects : Remote
Port Status : Up
port 15; Down End Point, mepid: 200, transmit-interval: 1000 ms (from
association)
MEP State: Enabled, CCM Message: Enabled, Send SenderId TLV:
Disabled
Faulting State : Yes
Last Faulting State Change : Wed Jun 19 09:09:47 2013
MEP Error Defects : RDI, Remote
Port Status : Up
Domain: "dom2", MD Level: 6
Association: "VSNLMEG1", Destination MAC Type: Unicast, VLAN "v2" with 2 cfm
ports
Transmit Interval: 1000 ms, Type : ITU-T Y.1731 Maintenance Entity Group
port 1; Up End Point, mepid: 100, transmit-interval: 1000 ms (from
association)
MEP State: Enabled, CCM Message: Enabled, Send SenderId TLV:
Disabled
Faulting State : No
Last Faulting State Change : Wed Jun 19 09:39:14 2013
MEP Error Defects : None
Port Status : Up
port 15; Intermediate Point ( Dynamic )Domain: "00:11:22:33:44:55.6666", MD
Level: 7
Association: "VSNLMEG1", Destination MAC Type: Multicast, VLAN "v3" with 2 cfm
ports
Transmit Interval: 1000 ms, Type : ITU-T Y.1731 Maintenance Entity Group
port 1; Up End Point, mepid: 100, transmit-interval: 1000 ms (from
association)
MEP State: Enabled, CCM Message: Enabled, Send SenderId TLV:
Disabled
Faulting State : No
Last Faulting State Change : Wed Jun 19 09:10:10 2013
MEP Error Defects : None
Port Status : Up
port 15; Intermediate Point ( Dynamic )
Association: "short_ma_name", Destination MAC Type: Multicast, VLAN "v4" with 2
cfm ports
Transmit Interval: 1000 ms, Type : IEEE 802.1ag Maintenance Association
port 1; Up End Point, mepid: 100, transmit-interval: 1000 ms (from
association)
MEP State: Enabled, CCM Message: Enabled, Send SenderId TLV:
Enabled IPaddress:
10.10.10.1
Faulting State : No
Last Faulting State Change : Wed Jun 19 09:15:08 2013
MEP Error Defects : None
Port Status : Up
port 15; Intermediate Point ( Dynamic )
Total Number of Domain : 4
================================================================================
MEP Error Defect Types:
Remote : Not receiving CCMs from Remote MEP
Error : Erroneous CCM received
XCON : Cross-connect CCM received
RDI : Remote Defect Indication sent by some MEP
History
This command was first available in ExtremeXOS 11.4.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show checkpoint-data
show checkpoint-data {process}
Description
Displays the status of one or more processes being copied from the master node to the backup node.
Syntax Description
process Specifies the name of the processes being copied.
Default
N/A.
Usage Guidelines
This command displays, in percentages, the amount of internal state copying completed by each
process and the traffic statistics between the process on both the master and the backup nodes.
This command is also helpful in debugging synchronization problems that occur at run-time. To check
the status of synchronizing the nodes, use the show switch command.
Depending on the software version running on your switch and the type of switch you have, additional
or different checkpoint status information may be displayed.
Example
The following command displays the checkpointing status and the traffic statics of all of the processes
between the master and the backup nodes:
# show checkpoint-data
Process Tx Rx Errors Sent Total % Chkpt Debug-info
----------------------------------------------------------------------------
devmgr 3812 1731 0 3 3 100% ON OK 1 (00008853)
dirser 0 0 0 0 0 0% ON OK 1 (000008D3)
ems 5 0 0 0 0 100% ON OK 1 (000008D3)
nodemgr 0 0 0 0 0 0% ON OK 1 (000008D3)
snmpSubagent 0 0 0 0 0 0% ON OK 1 (000018D3)
snmpMaster 0 0 0 0 0 0% ON OK 1 (000008D3)
cli 0 0 0 0 0 0% ON OK 1 (000018D3)
edp 0 0 0 0 0 0% ON OK 1 (000008D3)
cfgmgr 82 82 0 1 1 100% ON OK 1 (000018D3)
elrp 0 0 0 0 0 0% ON OK 1 (000008D3)
vlan 1047 1 0 0 0 100% ON OK 1 (000008D3)
aaa 0 0 0 0 0 0% ON OK 1 (000008D3)
fdb 957 2 0 0 0 100% ON OK 1 (000008D3)
msgsrv 0 0 0 0 0 100% ON OK 1 (000008D3)
eaps 0 0 0 0 0 0% ON OK 1 (000008D3)
stp 1 0 0 0 0 0% ON OK 1 (000008D3)
esrp 1 0 0 0 0 100% ON OK 1 (000008D3)
polMgr 0 0 0 0 0 0% ON OK 1 (000008D3)
mcmgr 2 2 0 0 0 100% ON OK 1 (000008D3)
acl 0 0 0 0 0 100% ON OK 1 (000008D3)
netLogin 0 0 0 0 0 0% ON OK 1 (000008D3)
ospf 0 0 0 0 0 0% ON OK 1 (000008D3)
netTools 1 0 0 0 0 100% ON OK 1 (000008D3)
telnetd 0 0 0 0 0 0% ON OK 1 (000008D3)
rtmgr 4 4 0 0 0 100% ON OK 1 (000008D3)
vrrp 378 0 0 0 0 0% ON OK 1 (000008D3)
tftpd 0 0 0 0 0 0% ON OK 1 (000008D3)
thttpd 0 0 0 0 0 0% ON OK 1 (000008D3)
rip 0 0 0 0 0 0% ON OK 1 (000008D3)
dosprotect 0 0 0 0 0 0% ON OK 1 (000008D3)
epm 0 0 0 0 0 0% ON OK 1 (000008D3)
hal 0 0 0 0 0 0% ON OK 1 (000008D3)
bgp 0 0 0 0 0 0% ON OK 1 (000008D3)
pim 0 0 0 0 0 0% ON OK 1 (000008D3)
etmon 185 185 0 0 0 100% ON OK 1 (000008D3)
Flags : S - Server started, c - Client started, D - Checkpoint dependency satisfied
C - Checkpointing is ON, f - No config dependency, N - DMLIB not in sync
R - CM Backend not ready, l - Process is loading config, L - Process config is
loaded
I - IPML connection alive
To view the output for a specific process, use the process option. The following command displays
detailed information for the STP process:
# show checkpoint-data stp
Process Tx Rx Errors Sent Total % Chkpt Debug-info
----------------------------------------------------------------------------
stp 1 0 0 0 0 0% ON OK 1 (000008D3)
History
This command was first available in ExtremeXOS 10.1.
Platform Availability
This command is available only on SummitStack.
show clear-flow
show clear-flow
Description
Displays the status of the CLEAR-Flow agent, any CLEAR-Flow policies on each interface, and the
number of CLEAR-Flow rules.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following display shows output for the command show clear-flow:
clear-flow: Enabled
VLAN Port Policy Name No. of CF Rules
==============================================================
* 2:1 CFexample 6
* 2:26 CFexample 6
* 2:40 CFexample 6
Default * CFexample 6
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays the ACLs modified by CLEAR-Flow actions.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command displays the ACLs that have been modified by CLEAR-Flow rules that have been
triggered.
Example
The following display shows output for the command show clear-flow acl-modified:
Policy Name Vlan Name Port Rule Name Default ACL CF Added
Actions Actions
================================================================================
clearFlow * 2:26 acl-rule-4 D QP1
clearFlow * 2:26 acl-rule-3 D D
clearFlow * 2:26 acl-rule-2 D M
clearFlow * 2:26 acl-rule-1 P
clearFlow Default * acl-rule-4 D QP1
clearFlow Default * acl-rule-3 D D
clearFlow Default * acl-rule-2 D M
clearFlow Default * acl-rule-1 P
================================================================================
Total Entries: 8
Notation:
P - Permit, D- Deny, M - mirror enabled, m - mirror disabled
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays the CLEAR-Flow rules, values, and configuration.
Syntax Description
port Specifies the port.
vlanname Specifies the VLAN.
any Specifies the wildcard interface.
rulename Specifies the entry name of a CLEAR-Flow rule.
detail Display detailed information.
Default
N/A.
Usage Guidelines
If you issue the command without the rule keyword, all of the CLEAR-Flow rules for the policy on the
port, VLAN, and the wildcard are displayed. If you specify a rule name, only that rule will be displayed.
The detail keyword displays detailed information about the rule.
Example
The following display shows output for the command show clear-flow port 2:6:
The following display shows output for the command show clear-flow port 2:6 rule rule-delta detail:
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays all the CLEAR-Flow rules on the switch.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
None.
Example
The following display shows output for the command show clear-flow rule-all:
Policy Name Vlan Name Port Rule Name Last Value OP Threshold TCNT Sec
================================================================================
clearFlow * 2:1 rule-count 1 > 100 0 11
clearFlow * 2:1 rule-delta 1 > 1000 0 11
clearFlow * 2:1 rule-delta 0 > 1000 0 4
clearFlow * 2:1 rule-delta 0 > 20 0 11
clearFlow * 2:1 rule-ratio 0 > 10 0 11
clearFlow * 2:1 rule-ratio 0 > 10 0 4
clearFlow * 2:26 rule-count 9030635 > 100 1 10
clearFlow * 2:26 rule-delta 9030635 > 1000 1 10
clearFlow * 2:26 rule-delta 0 > 1000 0 4
clearFlow * 2:26 rule-delta 0 > 20 0 10
clearFlow * 2:26 rule-ratio 0 > 10 0 10
clearFlow * 2:26 rule-ratio 0 > 10 0 4
clearFlow Default * rule-count 36666439 > 100 1 10
clearFlow Default * rule-delta 36666439 > 1000 1 10
clearFlow Default * rule-delta 0 > 1000 0 4
clearFlow Default * rule-delta 0 > 20 0 10
clearFlow Default * rule-ratio 0 > 10 0 10
clearFlow Default * rule-ratio 0 > 10 0 4
================================================================================
Total Entries: 18
Notation:
TCNT - Number of times expression is continously evaluated to be true
Sec - Number of seconds elapsed from last sampled data
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
Displays the triggered CLEAR-Flow rules.
Syntax Description
This command has no arguments or variables.
Default
N/A.
Usage Guidelines
This command displays the rules that have been triggered; in other words, the rule threshold has been
reached.
Example
The following display shows output for the command show clear-flow rule-triggered:
Policy Name Vlan Name Port Rule Name Last Value OP Threshold TCNT Sec
================================================================================
clearFlow * 2:26 rule-count 9130377 > 100 2 25
clearFlow * 2:26 rule-delta 99742 > 1000 2 25
clearFlow Default * rule-count 37069465 > 100 2 25
clearFlow Default * rule-delta 403026 > 1000 2 25
================================================================================
Total Entries: 4
Notation:
TCNT - Number of times expression is continously evaluated to be true
Sec - Number of seconds elapsed from last sampled data
History
This command was first available in ExtremeXOS 11.1.
Platform Availability
This command is available on the ExtremeSwitching X440-G2, X450-G2, X460-G2, X465, X590, X620,
X670-G2, X690, and X870 series switches.
Description
This command shows the historical list (journal) of the most recently executed CLI commands.
Syntax Description
This command has no arguments or variables.
Default
By default, one hundred commands are preserved in the journal.
Usage Guidelines
The journal retains as many as 200 of the most recently executed commands along with the timestamp
and user name. Commands are saved even after logging off, rebooting, or switch crashes.
To set the size (number of commands) of the journal, use the configure cli journal size
size command.
Example
The following is sample output from the command:
Timestamp Session User Name Command
---------------------- ---------- --------------------------------
-------------------------------------------
03/31/2016 13:29:29.62 serial admin show tech
03/31/2016 13:29:30.21 serial unknown debug cfgmgr show next
maximum-rows 1 vlan.show_ports_info port=None portList=*
03/31/2016 13:29:30.28 serial unknown debug cfgmgr show next
poe.poe_extremePethPseSlotEntry
03/31/2016 13:29:30.40 serial unknown show switch
03/31/2016 13:29:30.50 serial unknown show version detail
03/31/2016 13:29:30.57 serial unknown show version images
03/31/2016 13:29:30.64 serial unknown show management
03/31/2016 13:29:30.78 serial unknown show session
03/31/2016 13:29:30.85 serial unknown show license
03/31/2016 13:29:30.92 serial unknown ls
03/31/2016 13:29:31.00 serial unknown ls internal-memory
03/31/2016 13:29:31.08 serial unknown debug hal show compact-
flash
03/31/2016 13:29:31.15 serial unknown show odometers
03/31/2016 13:29:31.23 serial unknown show fans detail
03/31/2016 13:29:31.29 serial unknown show temperature
03/31/2016 13:29:31.49 serial unknown show power
03/31/2016 13:29:31.56 serial unknown show power detail
03/31/2016 13:29:31.62 serial unknown show cpu-monitoring
03/31/2016 13:29:33.24 serial unknown show memory
03/31/2016 13:29:34.68 serial unknown run script mem-
stats.py
03/31/2016 13:29:35.08 serial unknown show edp ports all
History
This command was first available in ExtremeXOS 22.1.
Platform Availability
This command is available on the ExtremeSwitching X435, X440-G2, X450-G2, X460-G2, X465, X590,
X620, X670-G2, X690, and X870 series switches.
show configuration
show configuration {module-name} {detail}
Description
Displays the current configuration for the system or the specified module.
Syntax Description
module-name Specifies the name of configuration module. The term configuration
module refers to feature in ExtremeXOS. By displaying a module, you
can view the commands used to configure that feature. For example,
to display all of the configurations that you made for only STP, specify
the stp as the module-name.
detail Displays configuration data including default. If the detail option is not
specified, only the configuration changes you made to the factory
defaults are shown.
Default
N/A.
Usage Guidelines
If the output scrolls off the top of the screen, you can use the enable clipaging command to
pause the display when the output fills the screen. The default for clipaging is enabled.
These files have the .cfg file extension. Do not use a text editor to view or modify your XML-based
switch configuration files.
To save the configuration file as an ASCII-formatted file, and to view it with a text editor, see the
upload configuration [hostname | ipaddress] filename {vr vr-name} and the
load script filename {arg1} {arg2} ... {arg9} commands.
Beginning with ExtremeXOS 12.1, when you specify show configuration only, the switch displays
configuration information for each of the switch modules excluding the default data.
You can display only the configuration of a module of interest by using the module-name keyword. For
example, some of the modules are AAA, ACL, BGP, EDP, FDB, SNMP, and VLAN. Use [TAB]-completion
to see a list.
You must have administrator access to view the output of the show configuration command.
Depending on the software version running on your switch, the configurations on your switch, and the
type of switch you have, additional or different configuration information may appear.
Loading ARP and neighbor discovery (ND) configurations from versions earlier than ExtremeXOS 30.1
after upgrading to ExtremeXOS 30.1, abide by the following rules:
• The number of static ARP/ND entries configured in all VRs (default + Mgmt + user VRs) do not
exceed the new global max. entries.
• The number of static proxy entries configured in all VRs do not exceed the new global max. proxy
entries.
• The sum of (per VR configured limits of VR-default + default limit of VR-Mgmt) do not exceed the
respective new max. global limit.
• ExtremeXOS ignores pre-30.1 user VR configured limits in 30.1.
• ExtremeXOS logs any static entry restoration failures after they exceed new global limits.
The output of show configuration fdb after upgrading to ExtremeXOS 30.1 differs from 22.x
output because of the changes in per VR-based IPARP and ND configurations (see examples below).
Example
The following example shows the current configuration of the OSPF module on the switch:
# show configuration ospf
# Module ospf configuration.
#
configure ospf routerid automatic
configure ospf spf-hold-time 3
configure ospf metric-table 10M 10 100M 5 1G 4 10G 2
configure ospf lsa-batch-interval 30
configure ospf import-policy none
configure ospf ase-limit 0
disable ospf originate-default
disable ospf use-ip-router-alert
disable ospf
configure ospf restart none
configure ospf restart grace-period 120
disable ospf export direct
disable ospf export static
disable ospf export rip
disable ospf export e-bgp
disable ospf export i-bgp
configure ospf area 0.0.0.0 external-filter none
configure ospf area 0.0.0.0 interarea-filter none
The following example illustrates the difference between ExtremeXOS 30.1 versus 22.x output for FDB.
Example 1
22.x
# show configuration fdb detail
configure iparp vr VR-Default max_entries 8192
configure iparp vr VR-Mgmt max_entries 4096
configure neighbor-discovery vr VR-Default max_entries 4096
configure neighbor-discovery vr VR-Mgmt max_entries 4096
Example 1
22.x
# show configuration fdb
configure iparp vr VR-Default max_entries 10000
configure iparp vr VR-Default max_pending_entries 10
configure iparp vr VR-Default max_proxy_entries 10
configure iparp vr VR-Mgmt max_entries 2000
configure iparp vr VR-Mgmt max_pending_entries 20
configure iparp vr VR-Mgmt max_proxy_entries 20
configure iparp vr vr1 max_entries 3000
configure iparp vr vr1 max_pending_entries 30