GS2210-48 3
GS2210-48 3
This is a Reference Guide for a series of products intended for people who want to configure the Switch
via Command Line Interface (CLI).
Note: Some commands or command options in this guide may not be available in your
product. See your product's User’s Guide for a list of supported features. Every effort has
been made to ensure that the information in this guide is accurate.
1 Read Chapter 1 on page 10 for how to access and use the CLI (Command Line Interface).
2 Read Chapter 2 on page 13 to learn about the CLI user and privilege modes.
Related Documentation
• Quick Start Guide
The Quick Start Guide shows how to connect the Switch and access the Web Configurator.
• User’s Guide
The User’s Guide explains how to use the Web Configurator to configure the Switch.
Note: It is recommended you use the Web Configurator to configure the Switch.
About This CLI Reference Guide
Intended Audience
This manual is intended for people who want to configure Zyxel Switches via Command Line Interface
(CLI).
The version number on the cover page refers to the latest firmware version supported by the Zyxel
Switches. This guide applies to version 3.79, 3.80, 3.90, 4.00, 4.10, 4.20, 4.30, 4.40 and 4.50 at the time of
writing.
Note: This guide is intended as a command reference for a series of products. Therefore many
commands in this guide may not be available in your product. See your User’s Guide
for a list of supported features and details about feature implementation.
Please refer to www.zyxel.com for product specific User Guides and product certifications.
3
Document Conventions
Document Conventions
Warnings tell you about things that could harm you or your device. See
your User’s Guide for product specific warnings.
Note: Notes tell you other important information (for example, other things you may need to
configure or helpful tips) or recommendations.
Syntax Conventions
This manual follows these general conventions:
• Zyxel’s switches may be referred to as the “Switch”, the “device”, the “system” or the “product” in this
Reference Guide.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for
kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
vlan <1-4094> Enters config-vlan mode for the specified VLAN. Creates C 13
the VLAN, if necessary.
4
Document Conventions
The Table title identifies commands or the specific feature that the commands configure.
• If a command is not indented, you run it in the enable or config mode. See Chapter 2 on page 13 for
more information on command modes.
• If a command is indented, you run it in a sub-command mode.
The DESCRIPTION column explains what the command does. It also identifies legal input values, if
necessary.
The M column identifies the mode in which you run the command.
• E: The command is available in enable mode. It is also available in user mode if the privilege level (P)
is less than 13.
• C: The command is available in config (not indented) or one of the sub-command modes (indented).
The P column identifies the privilege level of the command. If you don’t have a high enough privilege
level you may not be able to view or execute some of the commands. See Chapter 2 on page 13 for
more information on privilege levels.
5
Contents Overview
Contents Overview
Introduction .........................................................................................................................................9
6
Contents Overview
7
Contents Overview
8
P ART I
Introduction
How to Access and Use the CLI (10)
9
CHAPTER 1
How to Access and Use the
CLI
This chapter introduces the command line interface (CLI).
1 Connect your computer to the console port on the Switch using the appropriate cable.
1.1.2 Telnet
2 Open a Telnet session to the Switch’s IP address. If this is your first login, use the default values.
10
Chapter 1 How to Access and Use the CLI
Make sure your computer IP address is in the same subnet, unless you are accessing the Switch through
one or more routers.
1.1.3 SSH
2 Use a SSH client program to access the Switch. If this is your first login, use the default values in Table 3 on
page 11 and Table 4 on page 11. Make sure your computer IP address is in the same subnet, unless you
are accessing the Switch through one or more routers.
1.2 Logging in
Use the administrator username and password. If this is your first login, use the default values.
Note: The Switch automatically logs you out of the management interface after five minutes
of inactivity. If this happens to you, simply log back in again.
(up/down arrow keys) Scrolls through the list of recently-used commands. You can edit any
command or press [ENTER] to run it again.
[CTRL]+U Clears the current command.
[TAB] Auto-completes the keyword you are typing if possible. For example, type
config, and press [TAB]. The Switch finishes the word configure.
? Displays the keywords and/or input values that are allowed in place of the ?.
help Displays the (full) commands that are allowed in place of help.
11
Chapter 1 How to Access and Use the CLI
Note: You should save your changes after each CLI session. All unsaved configuration
changes are lost once you restart the Switch.
12
CHAPTER 2
Privilege Level and
Command Mode
This chapter introduces the CLI privilege levels and command modes.
• The privilege level determines whether or not a user can run a particular command.
• If a user can run a particular command, the user has to run it in the correct mode.
At the time of writing, commands have a privilege level of 0, 3, 13, or 14. The following table summarizes
the types of commands at each of these privilege levels.
• Using commands. Login accounts can be configured by the admin account or any login account
with a privilege level of 14. See Chapter 46 on page 191.
13
Chapter 2 Privilege Level and Command Mode
• Using vendor-specific attributes in an external authentication server. See the User’s Guide for more
information.
The admin account has a privilege level of 14, so the administrator can run every command. You
cannot change the privilege level of the admin account.
In the following example, the login account user0 has a privilege level of 0 but knows that the enable
password is 123456. Afterwards, the session’s privilege level is 14, instead of 0, and the session changes to
enable mode.
sysname> enable
Password: 123456
sysname#
The default enable password is 1234. Use this command to set the enable password.
password <password>
<password> consists of 1-32 alphanumeric characters. For example, the following command sets the
enable password to 123456. See Chapter 101 on page 344 for more information about this command.
The password is sent in plain text and stored in the Switch’s buffers. Use this command to set the cipher
password for password encryption.
<password> consists of 32 alphanumeric characters. For example, the following command encrypts the
enable password with a 32-character cipher password. See Chapter 60 on page 230 for more
information about this command.
14
Chapter 2 Privilege Level and Command Mode
In the following example, the login account user0 has a privilege level of 0 but knows that the password
for privilege level 13 is pswd13. Afterwards, the session’s privilege level is 13, instead of 0, and the session
changes to enable mode.
sysname> enable 13
Password: pswd13
sysname#
Users cannot use this command until you create passwords for specific privilege levels. Use the following
command to create passwords for specific privilege levels.
<password> consists of 1-32 alphanumeric characters. For example, the following command sets the
password for privilege level 13 to pswd13. See Chapter 101 on page 344 for more information about this
command.
15
Chapter 2 Privilege Level and Command Mode
Table 7 Command Modes for Privilege Levels 13-14 and the Types of Commands in Each One
MODE PROMPT COMMAND FUNCTIONS IN THIS MODE
enable sysname# Display current configuration, diagnostics,
maintenance.
config sysname(config)# Configure features other than those below.
Each command is usually in one and only one mode. If a user wants to run a particular command, the
user has to change to the appropriate mode. The command modes are organized like a tree, and users
start in enable mode. The following table explains how to change from one mode to another.
16
Chapter 2 Privilege Level and Command Mode
1 Log into the CLI. This takes you to the enable mode.
2 Type help and press [ENTER]. A list comes up which shows all the commands available in enable mode.
The example shown next has been edited for brevity’s sake.
sysname# help
Commands available:
help
logout
exit
history
enable <0-14>
enable <cr>
.
.
traceroute <ip|host-name> [vlan <vlan-id>][..]
traceroute help
ssh <1|2> <[user@]dest-ip> <cr>
ssh <1|2> <[user@]dest-ip> [command </>]
sysname#
3 Copy and paste the results into a text editor of your choice. This creates a list of all the executable
commands in the user and enable modes.
4 Type configure and press [ENTER]. This takes you to the config mode.
5 Type help and press [ENTER]. A list is displayed which shows all the commands available in config mode
and all the sub-commands. The sub-commands are preceded by the command necessary to enter
that sub-command mode. For example, the command name <name-str> as shown next, is preceded
by the command used to enter the config-vlan sub-mode: vlan <1-4094>.
sysname# help
.
.
no arp inspection log-buffer logs
no arp inspection filter-aging-time
no arp inspection <cr>
vlan <1-4094>
vlan <1-4094> name <name-str>
vlan <1-4094> normal <port-list>
vlan <1-4094> fixed <port-list>
6 Copy and paste the results into a text editor of your choice. This creates a list of all the executable
commands in config and the other submodes, for example, the config-vlan mode.
17
CHAPTER 3
Initial Setup
This chapter identifies tasks you might want to do when you first configure the Switch.
sysname# configure
sysname(config)# admin-password t1g2y7i9 t1g2y7i9
password <password>
sysname# configure
sysname(config)# password k8s8s3dl0
18
Chapter 3 Initial Setup
no multi-login
Console port has higher priority than Telnet. See Chapter 57 on page 218 for more multi-login
commands.
sysname# configure
sysname(config)# no multi-login
This example shows you how to change the management IP address in VLAN 1 to 172.16.0.1 with subnet
mask 255.255.255.0.
sysname# configure
sysname(config)# vlan 1
sysname(config-vlan)# ip address default-management 172.16.0.1 255.255.255.0
Note: Afterwards, you have to use the new IP address to access the Switch.
This example shows you how to change the out-of-band management IP address to 10.10.10.1 with
subnet mask 255.255.255.0 and the default gateway 10.10.10.254.
sysname# configure
sysname(config)# ip address 10.10.10.1 255.255.255.0
sysname(config)# ip address default-gateway 10.10.10.254
19
Chapter 3 Initial Setup
Note: You need to set up configurations on a DHCP server and TFTP server first to use auto
configuration.
sysname# config
sysname(config)# auto-config
2 Use this command to enable the DHCP mode for auto configuration.
auto-config dhcp
sysname# config
sysname(config)# auto-config dhcp
sysname# config
sysname(config)# vlan 1
sysname(config-vlan)# ip address default-management dhcp-bootp
When you enable DHCP option 60, make sure you set up a Vendor Class Identifier. The Vendor Class
Identifier specifies the Zyxel switch that should receive the auto configuration file.
Skip this step if you are not enabling DHCP option 60.
sysname# config
sysname(config)# vlan 1
sysname(config-vlan)# ip address default-management dhcp-bootp option-60
5 Use this command to define a Vendor Class Identifier for DHCP option 60.
ip address default-management dhcp-bootp option-60 class-id <class-id>
sysname# config
sysname(config)# vlan 1
sysname(config-vlan)# ip address default-management dhcp-bootp option-60
class-id ZyxelCorp
20
Chapter 3 Initial Setup
Current configuration:
vlan 1
name 1
normal ""
fixed 1-50
forbidden ""
untagged 1-50
ip address default-management dhcp-bootp
ip address default-management dhcp-bootp option-60 class-id ZyxelCorp
exit
pwr mode consumption
auto-config
7 You need to save the current configuration in a configuration file, so the Switch will load the auto
configuration files from the TFTP server automatically when rebooting
Use this command to save the current configuration in a configuration file.
write memory [<index>]
For [<index>], you can enter a value to save the current configuration to a specified configuration file.
1 is for Config 1, and 2 is for Config 2.
21
Chapter 3 Initial Setup
9 Use this command to check whether the auto configuration file was loaded successfully.
Show auto-config
Mode: DHCP
State: Success
Filename: TFTP://10.90.90.11/TestConf2
sysname# config
sysname(config)# custom-default
22
Chapter 3 Initial Setup
2 Use this command to save the current configuration settings permanently to a customized default file on
the Switch.
copy running-config custom-default
3 Use this command to reboot the system and load a saved customized default file on the Switch.
reload custom-default
show system-information
23
Chapter 3 Initial Setup
See Chapter 101 on page 344 for more information about these attributes.
show running-config
Current configuration:
vlan 1
name 1
normal ""
fixed 1-52
forbidden ""
untagged 1-52
ip address 192.168.1.1 255.255.255.0
exit
interface route-domain 192.168.1.1/24
exit
pwr mode consumption
24
P ART II
Reference A-G
AAA Commands (27)
25
Display Commands (92)
26
CHAPTER 4
AAA Commands
Use these commands to configure authentication, authorization and accounting on the Switch.
show aaa authentication enable Displays the authentication method(s) for checking E 3
privilege level of administrators.
aaa authentication enable Specifies which method should be used first, second, and C 14
<method1> [<method2> ...] third for checking privileges.
show aaa accounting update Display the update period setting on the Switch for E 3
accounting sessions.
aaa accounting update periodic Sets the update period (in minutes) for accounting C 13
<1-2147483647> sessions. This is the time the Switch waits to send an update
to an accounting server after a session starts.
no aaa accounting update Resets the accounting update interval to the default C 13
value.
show aaa accounting commands Displays accounting settings for recording command E 3
events.
aaa accounting commands Enables accounting of command sessions and specifies C 13
<privilege> stop-only tacacs+ the minimum privilege level (0-14) for the command
[broadcast] sessions that should be recorded. Optionally, sends
accounting information for command sessions to all
configured accounting servers at the same time.
27
Chapter 4 AAA Commands
show aaa accounting dot1x Displays accounting settings for recording IEEE 802.1x E 3
session events.
aaa accounting dot1x <start- Enables accounting of IEEE 802.1x authentication sessions C 13
stop|stop-only> and specifies the mode and protocol method. Optionally,
<radius|tacacs+> [broadcast] sends accounting information for IEEE 802.1x
authentication sessions to all configured accounting
servers at the same time.
no aaa accounting dot1x Disables accounting of IEEE 802.1x authentication sessions C 13
on the Switch.
show aaa accounting exec Displays accounting settings for recording administrative E 3
sessions via SSH, Telnet or the console port.
aaa accounting exec <start- Enables accounting of administrative sessions via SSH, C 13
stop|stop-only> Telnet and console port and specifies the mode and
<radius|tacacs+> [broadcast] protocol method. Optionally, sends accounting
information for administrative sessions via SSH, Telnet and
console port to all configured accounting servers at the
same time.
no aaa accounting exec Disables accounting of administrative sessions via SSH, C 13
Telnet or console on the Switch.
show aaa accounting system Displays accounting settings for recording system events, E 3
for example system shut down, start up, accounting
enabled or accounting disabled.
aaa accounting system Enables accounting of system events and specifies the C 13
<radius|tacacs+> [broadcast] protocol method. Optionally, sends accounting
information for system events to all configured accounting
servers at the same time.
no aaa accounting system Disables accounting of system events on the Switch. C 13
show aaa authorization dot1x Displays the authorization method used to allow an IEEE E 3
802.1x client to have different bandwidth limit or VLAN ID
assigned via the external server.
show aaa authorization exec Displays the authorization method used to allow an E 3
administrator which logs in the Switch through Telnet or SSH
to have different access privilege level assigned via the
external server.
aaa authorization console Enables authorization of allowing an administrator which C 14
logs in the Switch through the console port to have
different access privilege level assigned via the external
server.
aaa authorization dot1x radius Enables authorization for IEEE 802.1x clients using RADIUS. C 14
28
Chapter 4 AAA Commands
29
CHAPTER 5
Anti-Arpscan
Use these commands to configure anti-Arpscan on the Switch.
Unusual ARP scan activity is determined by port and host thresholds that you set. A port threshold is
determined by the number of packets received per second on the port. If the received packet rate is
over the threshold, then the port is put into an Err-Disable state. You can recover the normal state of the
port manually if this happens and after you identify the cause of the problem.
A host threshold is determined by the number of ARP-request packets received per second. There is a
global threshold rate for all hosts. If the rate of a host is over the threshold, then that host is blocked by
using a MAC address filter. A blocked host is released automatically after the MAC aging time expires.
Note: A port-based threshold must be larger than the host-based threshold or the host-based
threshold will not work.
anti arpscan host threshold <2- Sets the maximum number of ARP-request packets C 13
100> allowed by a host before it is blocked. If the rate of a host is
over the threshold, then that host is blocked by using a
MAC address filter. A blocked host is released
automatically after the MAC aging time expires.
anti arpscan port threshold <2- Sets the maximum number of packets per second allowed C 13
255> on the port before it is blocked.
anti arpscan trust host <ip- Creates a trusted host identified by IP address and subnet C 13
address> <mask> [ name <name> ] mask.
30
Chapter 5 Anti-Arpscan
clear anti arpscan host Unblocks all hosts connected to the specified port(s). E 13
interface port-channel <port-
list>
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
anti arpscan trust Sets the port as a trusted port. This prevents the port from C 13
being shutdown due to receiving too many ARP
messages.
no anti arpscan Disables Anti-arpscan on the Switch. C 13
no anti arpscan host threshold Resets the host threshold to its default value. C 13
no anti arpscan port threshold Resets the port threshold to its default value. C 13
31
CHAPTER 6
ARP Commands
Use these commands to look at IP-to-MAC address mapping(s).
show ip arp count Displays the number of ARP entries in the ARP table. E 3
clear ip arp Removes all of the dynamic entries from the ARP table. E 13
clear ip arp interface port- Removes the dynamic entries learned on the specified E 13
channel <port-list> port.
clear ip arp ip <ip-address> Removes the dynamic entries learned with the specified IP E 13
address.
32
Chapter 6 ARP Commands
sysname# config
sysname(config)# arp name test ip 192.168.1.99 mac 00:c5:d8:01:23:45 vlan
1 interface port-channel 3
sysname(config)# exit
sysname# show ip arp
Index IP MAC VLAN Port Age(s) Type
1 192.168.1.1 00:19:cb:37:00:49 1 CPU 0 static
2 192.168.1.99 00:c5:d8:01:23:45 1 3 0 static
3 192.168.2.1 00:19:cb:37:00:49 465 CPU 0 static
sysname#
33
CHAPTER 7
ARP Inspection Commands
Use these commands to filter unauthorized ARP packets in your network.
clear arp inspection statistics Removes all ARP inspection statistics on the Switch. E 3
clear arp inspection statistics Removes ARP inspection statistics for the specified E 3
vlan <vlan-list> VLAN(s).
show arp inspection statistics Displays all ARP inspection statistics on the Switch. E 3
show arp inspection statistics Displays ARP inspection statistics for the specified VLAN(s). E 3
vlan <vlan-list>
arp inspection filter-aging-time Specifies how long (1-2147483647 seconds) MAC address C 13
<1-2147483647> filters remain in the Switch after the Switch identifies an
unauthorized ARP packet. The Switch automatically
deletes the MAC address filter afterwards.
arp inspection filter-aging-time Specifies the MAC address filter to be permanent. C 13
none
no arp inspection filter-aging- Resets how long (1-2147483647 seconds) the MAC address C 13
time filter remains in the Switch after the Switch identifies an
unauthorized ARP packet to the default value.
34
Chapter 7 ARP Inspection Commands
arp inspection log-buffer Specifies the maximum number (1-1024) of log messages C 13
entries <0-1024> that can be generated by ARP packets and not sent to
the syslog server.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
arp inspection trust Sets the port to be a trusted port for arp inspection. The C 13
Switch does not discard ARP packets on trusted ports for
any reason.
no arp inspection trust Disables this port from being a trusted port for ARP C 13
inspection.
no arp inspection vlan <vlan- Disables ARP inspection on the specified VLAN(s). C 13
list>
arp inspection vlan <vlan-list> Enables logging of ARP inspection events on the specified C 13
logging [all|none|permit|deny] VLAN(s). Optionally specifies which types of events to log.
35
Chapter 7 ARP Inspection Commands
MAC+VLAN: The MAC address and VLAN ID were not in the binding table.
IP: The MAC address and VLAN ID were in the binding table, but the IP address was not
valid.
Port: The MAC address, VLAN ID, and IP address were in the binding table, but the port
number was not valid.
This example looks at log messages that were generated by ARP packets and that have not been sent
to the syslog server yet.
36
Chapter 7 ARP Inspection Commands
If the number of log messages in the Switch exceeds this number, the Switch stops
recording log messages and simply starts counting the number of entries that were
dropped due to unavailable buffer.
Syslog rate This field displays the maximum number of syslog messages the Switch can send to
the syslog server in one batch. This number is expressed as a rate because the batch
frequency is determined by the Log Interval.
Port This field displays the source port of the ARP packet.
Vlan This field displays the source VLAN ID of the ARP packet.
Sender MAC This field displays the source MAC address of the ARP packet.
Sender IP This field displays the source IP address of the ARP packet.
Pkts This field displays the number of ARP packets that were consolidated into this log
message. The Switch consolidates identical log messages generated by ARP
packets in the log consolidation interval into one log message.
Reason This field displays the reason the log message was generated.
dhcp deny: An ARP packet was discarded because it violated a dynamic binding
with the same MAC address and VLAN ID.
static deny: An ARP packet was discarded because it violated a static binding with
the same MAC address and VLAN ID.
deny: An ARP packet was discarded because there were no bindings with the same
MAC address and VLAN ID.
static permit: An ARP packet was forwarded because it matched a static binding.
This example displays whether ports are trusted or untrusted ports for ARP inspection.
37
Chapter 7 ARP Inspection Commands
Trusted ports are connected to DHCP servers or other switches, and the Switch discards
DHCP packets from trusted ports only if the rate at which DHCP packets arrive is too
high.
Rate (pps) This field displays the maximum number for DHCP packets that the Switch receives from
each port each second. The Switch discards any additional DHCP packets.
Burst Interval This field displays the length of time over which the rate of ARP packets is monitored for
each port. For example, if the Rate is 15 pps and the burst interval is 1 second, then the
Switch accepts a maximum of 15 ARP packets in every one-second interval. If the burst
interval is 5 seconds, then the Switch accepts a maximum of 75 ARP packets in every
five-second interval.
38
CHAPTER 8
ARP Learning Commands
Use these commands to configure how the Switch updates the ARP table.
sysname# configure
sysname(config)# interface port-channel 8
sysname(config-interface)# arp-learning arp-request
39
CHAPTER 9
Auto Configuration
Commands
Use these commands to configure auto configuration on the Switch.
Note: You need to set up configurations on a DHCP server and TFTP server first to use auto
configuration.
auto-config dhcp Enables the DHCP mode for auto configuration. When C 14
auto configuration DHCP is enabled, the Switch can
receive an auto configuration file from a TFTP server. The
location of the TFTP server is provided by a DHCP server.
show auto-config The following information is displayed: E 3
See Chapter 93 on page 327 for the commands to enable and disable DHCP option 60.
40
Chapter 9 Auto Configuration Commands
41
Chapter 10 Bandwidth Commands
C H A P T E R 10
Bandwidth Commands
Use these commands to configure the maximum allowable bandwidth for incoming or outgoing traffic
flows on a port.
• Some models use a single command (bandwidth-limit ingress) to control the incoming rate of
traffic on a port.
• Other models use two separate commands (bandwidth-limit cir and bandwidth-limit pir) to
control the Committed Information Rate (CIR) and the Peak Information Rate (PIR) allowed on a port.
The CIR and PIR should be set for all ports that use the same uplink bandwidth. If the CIR is reached,
packets are sent at the rate up to the PIR. When network congestion occurs, packets through the
ingress port exceeding the CIR will be marked for drop.
See Section 10.2 on page 43 and Section 10.3 on page 44 for examples.
See also Chapter 91 on page 318 for information on how to use trTCM (Two Rate Three Color Marker) to
control traffic flow.
rate The rate represents a bandwidth limit. Different models support different rate limiting
incremental steps. See your User’s Guide for more information.
42
Table 26 Command Summary: bandwidth-control & bandwidth-limit (continued)
COMMAND DESCRIPTION M P
no bandwidth-control Disables bandwidth control on the Switch. C 13
interface port-channel <port- Enters subcommand mode for configuring the specified C 13
list> ports.
bandwidth-limit ingress Enables bandwidth limits for incoming traffic on the port(s). C 13
bandwidth-limit ingress Sets the maximum bandwidth allowed for incoming traffic C 13
<rate> on the port(s).
bandwidth-limit egress Enables bandwidth limits for outgoing traffic on the port(s). C 13
bandwidth-limit egress Sets the maximum bandwidth allowed for outgoing traffic C 13
<rate> on the port(s).
bandwidth-limit cir <rate> Sets the guaranteed bandwidth allowed for the incoming C 13
traffic flow on a port. The commit rate should be less than
the peak rate. The sum of commit rates cannot be greater
than or equal to the uplink bandwidth.
bandwidth-limit pir <rate> Sets the maximum bandwidth allowed for the incoming C 13
traffic flow on the specified port(s).
no bandwidth-limit cir Disables commit rate limits on the specified port(s). C 13
sysname# configure
sysname(config)# bandwidth-control
sysname(config)# interface port-channel 1
sysname(config-interface)# bandwidth-limit egress 5000
sysname(config-interface)# bandwidth-limit ingress 4000
sysname(config-interface)# exit
sysname(config)# exit
sysname# configure
sysname(config)# interface port-channel 1
sysname(config-interface)# no bandwidth-limit egress
sysname(config-interface)# exit
sysname(config)# exit
43
10.3 Command Examples: cir & pir
This example sets the guaranteed traffic bandwidth limit on port 1 to 4000 Kbps and the maximum traffic
bandwidth limit to 5000 Kbps for port 1.
sysname# configure
sysname(config)# bandwidth-control
sysname(config)# interface port-channel 1
sysname(config-interface)# bandwidth-limit cir
sysname(config-interface)# bandwidth-limit cir 4000
sysname(config-interface)# bandwidth-limit pir
sysname(config-interface)# bandwidth-limit pir 5000
sysname(config-interface)# exit
sysname(config)# exit
Current configuration:
interface port-channel 1
bandwidth-limit cir 4000
bandwidth-limit cir
bandwidth-limit pir 5000
bandwidth-limit pir
44
Chapter 11 BPDU Guard
C H A P T E R 11
BPDU Guard
Use these commands to configure BPDU guard on the Switch.
The BPDU guard feature allows you to prevent any new STP-aware switch from connecting to an existing
network and causing STP topology changes in the network. If there is any BPDU detected on the port(s)
on which BPDU guard is enabled, the Switch disables the port(s) automatically. You can then enable the
port(s) manually via the web configurator or the commands. With error-disable recovery, you can also
have the port(s) become active after a certain time interval.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
bpduguard Enabled BPDU guard on the port(s). C 13
show bpdupguard Displays whether BPDU guard is enabled on the Switch and E 3
the port status.
45
Chapter 12 Broadcast Storm Commands
C H A P T E R 12
Broadcast Storm Commands
Use these commands to limit the number of broadcast, multicast and destination lookup failure (DLF)
packets the Switch receives per second on the ports.
• Some models use a single command (bmstorm-limit) to control the combined rate of broadcast,
multicast and DLF packets accepted on Switch ports.
• Other models use three separate commands (broadcast-limit, multicast-limit, dlf-limit) to
control the number of individual types of packets accepted on Switch ports.
See Section 12.2 on page 47 and Section 12.3 on page 47 for examples.
interface port-channel <port- Enters subcommand mode for configuring the specified C 13
list> ports.
bmstorm-limit <rate> Specifies the maximum rate at which the Switch receives C 13
broadcast, multicast, and destination lookup failure (DLF)
packets on the specified port(s).
46
Table 29 Command Summary: storm-control, bmstorm-limit, and bstorm-control (continued)
COMMAND DESCRIPTION M P
broadcast-limit Enables the broadcast packet limit on the specified C 13
port(s).
broadcast-limit <pkt/s> Specifies the maximum number of broadcast packets the C 13
Switch accepts per second on the specified port(s).
dlf-limit <pkt/s> Specifies the maximum number of DLF packets the Switch C 13
accepts per second on the specified port(s).
no dlf-limit Disables DLF packet limits no the specified port(s). C 13
sysname# configure
sysname(config)# storm-control
sysname(config)# interface port-channel 1
sysname(config-interface)# bmstorm-limit
sysname(config-interface)# bmstorm-limit 128
sysname(config-interface)# exit
sysname(config)# exit
47
Chapter 12 Broadcast Storm Commands
48
Chapter 13 CFM Commands
C H A P T E R 13
CFM Commands
Use these commands to configure the Connectivity Fault Management (CFM) on the Switch.
The figure shown below is an example of a connection fault between switches in the service provider’s
network. CFM can be used to identify and management this kind of connection problem.
49
Chapter 13 CFM Commands
•MEP port - has the ability to send pro-active connectivity check (CC) packets and get other MEP
port information from neighbor switches’ CC packets within an MA.
•MIP port - only forwards the CC packets.
•Loopback test - similar to using “ping” in Microsoft DOS mode to check connectivity from your
computer to a host. In a loopback test, a MEP port sends a LBM (Loop Back Message) to a MIP port
and checks for an LBR (Loop Back Response). If no response is received, there might be a
connectivity fault between them.
•Link trace test - similar to using “tracert” in the Microsoft DOS mode to check connectivity from your
computer to a host. A link trace test provides additional connectivity fault analysis to get more
information on where the fault is. In a link trace test, a MEP port sends a LTM (Link Trace Message) to
a MIP port and checks for an LTR (Link Trace Response). If an MIP or MEP port does not respond to
the source MEP, this may indicate a fault. Administrators can take further action to check the fault
and resume services according to the line connectivity status report.
An example is shown next. A user cannot access the Internet. To check the problem, the administrator
starts the link trace test from A which is an MEP port to B which is also an MEP port. Each aggregation MIP
port between aggregated devices responds to the LTM packets and also forwards them to the next
port. A fault occurs at port C. A discovers the fault since it only gets the LTR packets from the ports
before port C.
50
Chapter 13 CFM Commands
mac-address This is the remote maintenance endpoint’s MAC address or a virtual MAC
address assigned to a port.
A Switch has one or two MAC addresses only. If you do not use virtual MAC
addresses with CFM, all CFM ports will use the Switch’s MAC address and
appear as one port. If you want unique CFM ports, you need to assign virtual
MAC addresses. If you use virtual MAC addresses, make sure that all virtual
MAC addresses are unique in both the Switch and the network to which it
belongs.
51
Chapter 13 CFM Commands
52
Chapter 13 CFM Commands
53
Chapter 13 CFM Commands
show ethernet cfm linktrace Displays the CFM link trace database information. E 13
show ethernet cfm local Displays the detailed settings of the configured MD(s) E 13
and MA(s).
show ethernet cfm local stack Displays a list of all maintenance points, such as MIP E 13
and MEP.
show ethernet cfm local stack mep Displays a list of the MEP(s). E 13
show ethernet cfm local stack mep Displays the specified MEP’s general, fault notification E 13
<mep-id> ma <ma-index> md <md- generator, continuity-check, loopback and link trace
index> information.
show ethernet cfm local stack mep Displays the specified MEP’s MEP-CCM database E 13
<mep-id> ma <ma-index> md <md- information. Each MEP maintains an MEP CCM
index> mep-ccmdb [remote-mep <mep- database which stores information about remote
id>] MEPs in the MA when receiving CCMs.
show ethernet cfm local stack mip Displays a list of the MIP(s). E 13
show ethernet cfm local stack mip Displays the MIP-CCM database. E 13
mip-ccmdb
54
Chapter 13 CFM Commands
show ethernet cfm virtual-mac port Displays the MAC address(es) of the specified port(s). E 13
<port-list>
sysname# config
sysname(config)# ethernet cfm md 1 format string name MD1 level 1
sysname(config)# ethernet cfm ma 2 format string name MA2 md 1 primary-
vlan 2
sysname(config-ma)# exit
sysname(config)# exit
sysname# write memory
Note: Remember to save new settings using the write memory command.
This example deletes MA2 (with MA index 2) from MD1 (with MD index 1).
sysname# config
sysname(config)# no ethernet cfm ma 2 md 1
sysname(config)# exit
sysname# write mem
This example creates MA3 (with MA index 3 and VLAN ID 123) under MD1, and associates port 1 as an
MEP port with MEP ID 301 in the specified CFM domain. This also sets MHF (MIP half function) to default to
have the Switch automatically create MIPs for this MA and on the ports belonging to this MA's VLAN
when there are no lower configured MD levels or there is a MEP at the next lower configured MD level
on the port. This also sets a remote MEP in MA3.
sysname# config
sysname(config)# ethernet cfm ma 3 format string name MA3 md 1 primary-vlan
123
sysname(config-ma)# mep 301 interface port-channel 1 direction up priority 2
sysname(config-ma)# mep 301 interface port-channel 1 direction up priority 2
cc-enable
sysname(config-ma)# mhf-creation default
sysname(config-ma)# remote-mep 117
sysname(config-ma)# exit
sysname(config)# exit
sysname# write mem
55
This example lists all CFM domains. In this example, only one MD (MD1) is configured. The MA3 with the
associated MEP port 1 is under this MD1.
This example starts a loopback test and displays the test result on the console.
This example displays all neighbors’ MEP port information in the MIP-CCM databases.
56
Chapter 13 CFM Commands
This example assigns a virtual MAC address to port 3 and displays the MAC addresses of the ports 2 ~ 4.
The assigned virtual MAC address should be unique in both the Switch and the network to which it
belongs.
sysname# config
sysname(config)# interface port-channel 3
sysname(config-interface)# ethernet cfm virtual-mac 00:19:cb:12:34:56
sysname(config-interface)# exit
sysname(config)# exit
sysname# show ethernet cfm virtual-mac port 2-4
Virtual MACPort MAC
---- -----------------
2 00:19:cb:00:00:02
3 00:19:cb:12:34:56
4 00:19:cb:00:00:02
sysname#
This example sets the Switch to carry its host name and management IP address 192.168.100.1 in CFM
packets.
sysname# config
sysname(config)# ethernet cfm management-address-domain ip 192.168.100.1
This example shows remote MEP database information. The remote MEP has been configured to carry its
host name and a specified IP address in CFM packets.
57
Chapter 14 Classifier Commands
C H A P T E R 14
Classifier Commands
Use these commands to classify packets into traffic flows. After classifying traffic, policy commands
(Chapter 62 on page 235) can be used to ensure that a traffic flow gets the requested treatment in the
network.
clear classifier match-count Removes the number of times all or the specified classifier rule is E 3
[<name>] applied.
58
Chapter 14 Classifier Commands
59
Table 34 Command Summary: classifier (continued)
COMMAND DESCRIPTION M P
classifier match-order Use manual to have classifier rules applied according to the C 13
<auto|manual> weight of each rule you configured. Use auto to have classifier
rules applied according to the layer of the item configured in
the rule.
classifier logging Creates a log when packets match a classifier rule during a C 13
defined time interval.
classifier logging interval Enter the length of the time period (in seconds) to count C 13
<0-65535> matched packets for a classifier rule. Enter an integer from 0-
65535. 0 means that no logging is done.
no classifier logging Disallows the Switch to create a log message when packets C 13
match a classifier rule during a defined time interval.
The following table shows some other common Ethernet types and the corresponding protocol number.
In an IPv4 packet header, the “Protocol” field identifies the next level protocol. The following table
shows some common IPv4 protocol types and the corresponding protocol number. Refer to http://
www.iana.org/assignments/protocol-numbers for a complete list.
60
Chapter 14 Classifier Commands
sysname# config
sysname(config)# classifier VLAN3 vlan 3
sysname(config)# exit
sysname# show classifier
Index Active Name Rule
1 Yes VLAN3 VLAN = 3;
This example creates a classifier (Class1) for packets which have a source MAC address of
11:22:33:45:67:89 and are received on port 1. You can then use the policy command and the name
Class1 to apply policy rules to this traffic flow. See the policy example in Chapter 62 on page 235.
sysname# config
sysname(config)# classifier Class1 source-mac 11:22:33:45:67:89 source-port
1
sysname(config)# exit
sysname# show classifier
Index Active Name Rule
1 Yes Class1 SrcMac = 11:22:33:45:67:89; S...
The default value of match-order is auto. Use the following command to make weight work by
changing the default value of match-order to manual and configuring a classifier weight value where
the higher the weight, the higher the priority.
sysname# config
sysname(config)#classifier match-order manual
sysname(config)#classifier 1 weight 12345 source-port 1/1
61
Chapter 15 Cluster Commands
C H A P T E R 15
Cluster Commands
Use these commands to configure cluster management.
cluster name <cluster name> Sets a descriptive name for the cluster. C 13
show cluster member Displays the cluster member(s) and their running status. E 3
show cluster member mac <mac> Displays the running status of the cluster member(s). E 3
cluster rcommand <mac> Logs into the CLI of the specified cluster member. C 13
62
15.2 Command Examples
This example creates the cluster CManage in VLAN 1. Then, it looks at the current list of candidates for
membership in this cluster and adds two switches to cluster.
sysname# configure
sysname(config)# cluster 1
sysname(config)# cluster name CManage
sysname(config)# exit
sysname# show cluster candidates
Clustering Candidates:
Index Candidates(MAC/HostName/Model)
0 00:13:49:00:00:01/ES-2108PWR/ES-2108PWR
1 00:13:49:00:00:02/GS-3012/GS-3012
2 00:19:cb:00:00:02/ES-3124/ES-3124
sysname# configure
sysname(config)# cluster member 00:13:49:00:00:01 password 1234
sysname(config)# cluster member 00:13:49:00:00:02 password 1234
sysname(config)# exit
sysname# show cluster member
Clustering member status:
Index MACAddr Name Status
1 00:13:49:00:00:01 ES-2108PWR Online
2 00:13:49:00:00:02 GS-3012 Online
Error: The member is connected but not accessible. For example, the member’s
password has changed, or the member was set as the manager and so left the
member list. This status also appears while the Switch finishes adding a new member to
the cluster.
Offline: The member is disconnected. It takes approximately 1.5 minutes after the link
goes down for this status to appear.
63
Chapter 15 Cluster Commands
This example logs in to the CLI of member 00:13:49:00:00:01, looks at the current firmware version on the
member Switch, logs out of the member’s CLI, and returns to the CLI of the manager.
sysname# configure
sysname(config)# cluster rcommand 00:13:49:00:00:01
Connected to 127.0.0.2
Escape character is '^]'.
Password: ****
Copyright (c) 1994 - 2007 ZyXEL Communications Corp.
Closed
sysname(config)#
Manager: This Switch is the device through which you manage the cluster member
switches.
64
Chapter 16 CLV Commands
C H A P T E R 16
CLV Commands
Use these commands to configure VLAN settings on the Switch in clv mode. In Zyxel configuration mode,
you need to use the VLAN commands to configure a VLAN first, then specify the port(s) which you want
to configure and tag all outgoing frames with the specified VLAN ID. In clv mode, you need to specify
the port(s) first, then configure frames which you want to tag with the specified VLAN ID.
Suppose port 1 is configured as a native VLAN with VLAN ID 100. Then all untagged incoming traffic that
goes out from port 1 will be tagged with VLAN ID 100.
Suppose port 2 is configured in Access mode. Then all outgoing traffic from port 2 will be untagged.
Suppose port 3 is configured in Trunk mode. Then all outgoing traffic from port 3 will be tagged with
VLAN ID 100.
65
Chapter 16 CLV Commands
66
Chapter 16 CLV Commands
switchport access <vlan-id> Untags all outgoing frames with the specified VLAN ID. C 13
no switchport access vlan Resets all outgoing frames to the default VLAN ID. The C 13
default VLAN ID is VLAN 1.
switchport trunk allowed Tags all outgoing frames with the specified VLAN ID. C 13
vlan <vlan-list>
no switchport trunk allowed Disables the specified VLAN trunk on the port(s). C 13
vlan <vlan-list>
switchport trunk allowed Tags all outgoing frames for all VLANs. C 13
vlan all
no switchport trunk allowed Disables all VLAN trunks on the port(s). C 13
vlan all
switchport trunk native vlan Tags all incoming untagged frames with the specified C 13
<vlan-id> VLAN ID. The default VLAN ID is VLAN 1 for all ports. Sets a
VLAN ID in the range 1 to 4094.
no switchport trunk native Resets all incoming untagged frames to the default VLAN C 13
vlan ID. The default VLAN ID is VLAN 1.
switchport hybrid allowed Tags all outgoing frames with the specified VLAN ID. C 13
vlan <vlan-list> tagged
switchport hybrid allowed Untags all outgoing frames with the specified VLAN ID. C 13
vlan <vlan-list> untagged
no switchport hybrid allowed Disables the specified VLAN ID on the port(s). C 13
vlan <vlan-list>
switchport hybrid pvid Tags all incoming untagged frames with the specified C 13
<vlan-id> VLAN ID.
no switchport hybrid pvid Resets all incoming untagged frames to the default VLAN C 13
<vlan-id> ID. The default VLAN ID is VLAN 1.
67
Chapter 16 CLV Commands
switchport forbidden vlan Prohibits the specified port(s) from joining all VLAN groups. C 13
add all
switchport forbidden vlan Sets forbidden port(s) in the specified VLAN to normal C 13
remove <vlan-list> port(s).
switchport forbidden vlan Sets all forbidden port(s) in the port list to normal port(s). C 13
remove all
sysname# config
sysname(config)# clv
sysname# config
sysname(config)# interface port-channel 1
sysname(config-interface)# switchport mode access
sysname(config-interface)# switchport access vlan 20
sysname(config-interface)# exit
This example activates clv for VLAN 100 and VLAN 20 on ports 1 to 3. This example prohibits ports 1 to 3
from joining VLAN 200.
sysname# config
sysname(config)# interface port-channel 1-3
sysname(config-interface)# switchport mode trunk
sysname(config-interface)# switchport trunk allowed vlan 100
sysname(config-interface)# switchport trunk native vlan 20
sysname(config-interface)# switchport forbidden vlan add 200
sysname(config-interface)# exit
68
This example configures port 4 as the tagged port in VLAN 20 and the untagged port in VLAN 100. This
example also configures 200 as the PVID on port 4.
sysname# config
sysname(config)# interface port-channel 4
sysname(config-interface)# switchport mode hybrid
sysname(config-interface)# switchport hybrid allowed vlan 20 tagged
sysname(config-interface)# switchport hybrid allowed vlan 100 untagged
sysname(config-interface)# switchport hybrid pvid 200
sysname(config-interface)# exit
Other: The VLAN was added in another way, such as Multicast VLAN Registration
(MVR).
Elap-Time This field displays how long it has been since a dynamic VLAN was registered or a static
VLAN was set up.
TagCtl This field displays untagged and tagged ports.
Access: These ports do not tag outgoing frames with the VLAN ID.
Trunk: These ports tag outgoing frames with the VLAN ID.
69
Chapter 16 CLV Commands
70
Chapter 17 Custom Default Commands
C H A P T E R 17
Custom Default Commands
Use these commands to use custom default on the Switch.
Note: For the GS2210 Series, when the custom default feature is enabled, Config 2 can’t be
used.
See Chapter 74 on page 274 for the commands to save the current configuration settings permanently
to a customized default file, and load it when rebooting the Switch.
71
C H A P T E R 18
Date and Time Commands
Use these commands to configure the date and time on the Switch.
month Possible values (daylight-saving-time commands only): January, February, March, ....
hour: 0-23
min: 0-59
sec: 0-59
month: 1-12
day: 1-31
year: 1970-2037
time timezone <-1200|...|1200> Selects the time difference between UTC (formerly known C 13
as GMT) and your time zone.
time daylight-saving-time Enables daylight saving time. The current time is updated if C 13
daylight saving time has started.
72
Chapter 18 Date and Time Commands
time daylight-saving-time help Provides more information about the specified command. C 13
timesync server <ip|domain name> Sets the IP address or domain name of the timeserver. The C 13
Switch attempts to connect to the timeserver for up to 60
seconds.
sysname# configure
sysname(config)# time date 06/04/2007
sysname(config)# time timezone -600
sysname(config)# time daylight-saving-time
sysname(config)# time daylight-saving-time start-date second Sunday
--> March 2
sysname(config)# time daylight-saving-time end-date first Sunday
--> November 2
sysname(config)# time 13:24:00
sysname(config)# exit
sysname# show time
Current Time 13:24:03 (UTC-05:00 DST)
Current Date 2007-06-04
73
Chapter 18 Date and Time Commands
Time Configuration
-----------------------------
Time Zone :UTC -600
Time Sync Mode :USE_DAYTIME
Time Server IP Address :172.16.37.10
CONNECTING: The Switch is trying to connect with the specified time server.
74
Chapter 19 Data Center Bridging Commands
C H A P T E R 19
Data Center Bridging
Commands
At the time of writing, data center bridging can only be configured using commands on the Switch.
19.1 Overview
A traditional Ethernet network is best-effort, that is, frames may be dropped due to network congestion.
FCoE (Fiber Channel over Ethernet) transparently encapsulates fiber channel traffic into Ethernet, so
that you don’t need separate fiber channel and Ethernet switches.
Data Center Bridging (DCB) enhances Ethernet technology to adapt to the FCoE. It supports lossless
Ethernet traffic (no frames discarded when there is network congestion) and can allocate bandwidth
for different traffic classes, based on IEEE802.1p priority with a guaranteed minimum bandwidth. LAN
traffic (large number of flows and not latency-sensitive), SAN traffic (Storage Area Network, large
packet sizes and requires lossless performance), and IPC traffic (Inter-Process Communication, latency-
sensitive messages) can share the same physical connection while still having their own priority and
guaranteed minimum bandwidth.
You should configure DCB on any port that has both Ethernet and fiber channel traffic.
• PFC (Priority-based Flow Control, IEEE 802.1Qbb -2011) is a flow control mechanism that uses a PAUSE
frame to suspend traffic of a certain priority rather than drop it when there is network congestion
(lossless). If an outgoing (egress) port buffer is almost full, the Switch transmits a PAUSE frame to the
sender who just transmitted traffic requesting it to stop sending traffic of a certain priority to that port.
For example, say outgoing port 8 is receiving too much traffic of priorities 3-6 from port 1. Then if port 1
is configured with PFC priorities 3-6, port 1 can request the sender to suspend traffic with priorities 3-6.
Similarly, if the outgoing (egress) port 8 receives a PAUSE frame with PFC priorities 0-1, then if port 8 is
configured with PFC, it can suspend sending traffic with PFC priorities 0-1.
• ETS (Enhanced Transmission Selection, IEEE 802.1Qaz -2011) is used to allocate bandwidth for different
traffic classes, based on IEEE802.1p priority (0 to 7, allowing for eight types of traffic) with a
guaranteed minimum bandwidth.
• Application priority is used to globally assign a priority to all FCoE traffic on the Switch.
75
Chapter 19 Data Center Bridging Commands
• DCBX (Data Center Bridging capability eXchange, IEEE 802.1Qaz -2011) uses LLDP (Link Layer
Discovery Protocol) to advertize PFC, ETS and application priority information between switches. PFC
information should be consistent between connected switches, so PFC can be configured
automatically using DCBX.
The following table describes user-input values available in multiple commands for this feature.
Possible values range from 1 to 100 for WFQ traffic class weight.
19.2.1 PFC
PFC should be configured the same on connected switch ports. If DCBX is used, then one switch port
must be configured to accept network configuration from the peer switch port (auto). If both switch
ports are configured to accept configuration (auto on both switch ports), then the configuration of the
switch port with the lowest MAC address hex value sum is used.
priority-flow-control auto Sets the port to accept PFC configuration from the C 13
connected Switch port.
priority-flow-control priority Sets the priority value(s) on the specified port(s). C 13
<priority-list>
no priority-flow-control Clears the priority value(s) on the specified port(s). C 13
priority
show priority-flow-control Displays PFC settings. E 3
76
Chapter 19 Data Center Bridging Commands
switchA# configure
switchA(config)# interface port-channel 1
switchA(config-interface)# priority-flow-control auto
switchA(config-interface)# priority-flow-control priority 2
switchB# configure
switchB(config)# interface port-channel 1
switchB(config-interface)# priority-flow-control
switchB(config-interface)# priority-flow-control priority 3-5
Use the show command to see the PFC configuration. Operation-Priority shows whether switch A is using
switch B’s configured priorities or not.
In the following example, Switch A is NOT using Switch B’s configured priorities.
77
Chapter 19 Data Center Bridging Commands
This is an example showing how many pause frames of certain priorities were temporarily stopped
(transmitted or received) on port 1.
sysname#
19.2.3 ETS
An IEEE 802.1p priority is assigned to a traffic class with guaranteed minimum bandwidth. A traffic class
can use SP (Strict Priority) or WFQ (Weighted Fair Queue) queuing method. Available link bandwidth is
reserved first for SP traffic. The guaranteed minimum bandwidth for non-SP traffic (WFQ) is its weight
value by remaining available bandwidth. If a non-strict-priority-traffic-class does not consume its
allocated bandwidth, other non-strict-priority-traffic-classes can share the unused bandwidth according
to the weight ratio.
78
Chapter 19 Data Center Bridging Commands
no traffic-class <id> Deletes the SP/WFQ traffic class with specified ID. C 13
The guaranteed minimum bandwidth for both SAN and LAN traffic is 2.5Gbps with a link bandwidth of
10Gbps.
Create and name traffic class IDs, with weights for the non-SP traffic type.
sysname# configure
sysname(config)# traffic-class 1 scheduler ets 50 name LAN
sysname(config)# traffic-class 2 scheduler ets 50 name SAN
79
This command shows traffic class.
Next, configure a port for traffic class(es) and bind priorities to traffic classes on a port. In the next
example, we configure port 1 and bind priorities 0, 1 and 2 to traffic class 2 (LAN), 3, 4, 5 and 6 to class 1
(SAN) and 7 to class 0, the default traffic class.
no lldp dcbx application <ether- Clears priority value for all FCoE traffic on the Switch. C 13
type > <fcoe>
switchA# configure
switchA(config)# lldp dcbx application ether-type fcoe priority 3
80
Chapter 19 Data Center Bridging Commands
Application priority can then be used in conjunction with ETS and PFC as shown in the following
examples.
sysname# configure
sysname(config)# traffic-class 3 scheduler ets 40 name ethernet
sysname (config)# traffic-class 4 scheduler ets 60 name fcoe
sysname (config)# interface port-channel 6
sysname (config-interface)# ets
sysname (config-interface)# ets traffic-class binding 0 0 0 4 3 3 0 0
sysname (config-interface)# unicast-nonunicast-weight 100 100
19.2.7 DCBX
DCBX uses LLDP (Link Layer Discovery Protocol) to exchange PFC, ETS and application priority
information between switches. PFC information should be consistent between switches, so this can be
configured automatically using DCBX.
In order for switches to exchange information, they must send their type-length values (TLVs) in order to
be able to read each other’s information.
81
Chapter 19 Data Center Bridging Commands
lldp org-specific-tlv dot1 Enables the sending of ETS TLVs on the specified C 13
dcbx-ets-configuration port(s).
lldp org-specific-tlv dot1 Enables the sending of PFC TLVs on the specified C 13
dcbx-pfc-configuration port(s).
lldp org-specific-tlv dot1 Enables the sending of application priority TLVs on the C 13
dcbx-application-priority specified port(s).
sysname# configure
sysname(config)# lldp
interface port-channel 2
sysname(config-interface)# lldp admin-status tx-rx
sysname(config-interface)# lldp org-specific-tlv dot1 dcbx-ets-
configuration
sysname(config-interface)# lldp org-specific-tlv dot1 dcbx-pfc-
configuration
sysname(config-interface)# lldp org-specific-tlv dot1 dcbx-application-
priority
sysname(config-interface)#exit
sysname(config)# exit
sysname#
82
Chapter 20 DHCP Commands
C H A P T E R 20
DHCP Commands
Use these commands to configure DHCP features on the Switch.
dhcp relay <vlan-id> helper- Enables DHCP relay on the specified VLAN and sets the IP C 13
address <remote-dhcp-server1> address of up to 3 DHCP servers. Optionally, sets the Switch
[<remote-dhcp-server2>] to add relay agent information and system name.
[<remote-dhcp-server3>]
[option] [information] Note: You have to configure the VLAN before you
configure a DHCP relay for the VLAN. You
have to disable dhcp smart-relay before
you can enable dhcp relay.
83
Chapter 20 DHCP Commands
no dhcp relay <vlan-id> Sets the Switch to not apply a DHCP option 82 profile to the C 13
interface port-channel <port- specified port(s) in this VLAN.
list> option
no dhcp relay <vlan-id> source- Removes the source IP address setting and sets this field set C 13
address to 0.0.0.0. The Switch automatically sets the source IP
address of the DHCP requests to the IP address of the
interface on which the packet is received.
no dhcp relay <vlan-id> option Disables the relay agent information option 82. C 13
dhcp smart-relay Enables DHCP relay for all broadcast domains on the C 13
Switch.
84
Table 65 dhcp smart-relay Command Summary (continued)
COMMAND DESCRIPTION M P
dhcp smart-relay helper-address Sets the IP addresses of up to 3 DHCP servers. C 13
<remote-dhcp-server1> [<remote-
dhcp-server2>] [<remote-dhcp-
server3>]
dhcp smart-relay information Allows the Switch to add system name to agent C 13
information.
no dhcp smart-relay information System name is not appended to option 82 information C 13
field for global dhcp settings.
dhcp smart-relay interface port- Specifies a pre-defined DHCP option 82 profile that the C 13
channel <port-list> option Switch applies to the specified port(s).
profile <name>
Note: The profile you specify here has priority over
the one you set using the dhcp smart-relay
option profile <name> command.
dhcp smart-relay option Allows the Switch to add DHCP relay agent information. C 13
dhcp smart-relay option profile Specifies a pre-defined DHCPv4 option 82 profile that the C 13
<name> Switch applies to all ports. The Switch adds the Circuit ID
sub-option and/or Remote ID sub-option specified in the
profile to DHCP requests that it relays to a DHCP server.
no dhcp smart-relay interface Sets the Switch to not apply a DHCP option 82 profile to C 13
port-channel <port-list> the specified port(s).
no dhcp smart-relay option Disables the relay agent information option 82 for global C 13
dhcp settings.
show dhcp server <vlan-id> Displays DHCP server settings in a specified VLAN. E 13
85
Chapter 20 DHCP Commands
DHCP Server:
192.168.1.100
VLAN1 VLAN2
This example shows how to configure the Switch for this configuration. DHCP relay agent information
option 82 is also enabled.
sysname# configure
sysname(config)# dhcp smart-relay
sysname(config)# dhcp smart-relay helper-address 192.168.1.100
sysname(config)# dhcp smart-relay option
sysname(config)# exit
sysname# show dhcp smart-relay
DHCP Relay Agent Configuration
Active: Yes
Remote DHCP Server 1:192.168.1.100
Remote DHCP Server 2: 0.0.0.0
Remote DHCP Server 3: 0.0.0.0
Option82: Enable Option82Inf: Disable
In this example, there are two VLANs (VIDs 1 and 2) in a campus network. Two DHCP servers are installed
to serve each VLAN. The Switch forwards DHCP requests from the dormitory rooms (VLAN 1) to the DHCP
server with IP address 192.168.1.100. DHCP requests from the academic buildings (VLAN 2) are sent to
the other DHCP server with IP address 172.16.10.100.
DHCP: 192.168.1.100
VLAN 1
86
Chapter 20 DHCP Commands
This example shows how to configure these DHCP servers. The VLANs are already configured.
sysname# configure
sysname(config)# dhcp relay 1 helper-address 192.168.1.100
sysname(config)# dhcp relay 2 helper-address 172.16.10.100
sysname(config)# exit
In this example, the Switch is a DHCP server for clients on VLAN 1 and VLAN 2. The DHCP clients in VLAN 1
are assigned IP addresses in the range 192.168.1.100 to 192.168.1.200 and clients on VLAN 2 are assigned
IP addresses in the range 172.16.1.30 to 172.16.1.130.
VLAN 1 VLAN 2
This example shows how to configure the DHCP server for VLAN 1 with the configuration shown in Figure
6 on page 87. It also provides the DHCP clients with the IP address of the default gateway and the DNS
server.
sysname# configure
sysname(config)# dhcp server 1 starting-address 192.168.1.100
255.255.255.0 size-of-client-ip-pool 100 default-gateway 192.168.1.1
primary-dns 192.168.5.1
87
Chapter 21 DHCP Snooping & DHCP VLAN Commands
C H A P T E R 21
DHCP Snooping & DHCP
VLAN Commands
Use the dhcp snooping commands to configure the DHCP snooping on the Switch and the dhcp vlan
commands to specify a DHCP VLAN on your network. DHCP snooping filters unauthorized DHCP packets
on the network and builds the binding table dynamically.
show dhcp snooping database Displays DHCP snooping database update statistics and E 3
settings.
show dhcp snooping database Displays DHCP snooping database update statistics in full E 3
detail detail form.
show dhcp snooping option [vlan Displays the DHCP option 82 profile that the Switch applies E 3
<vlan-list>] [interface <port- to ports in the specified VLAN or to the specified port(s).
list>]
dhcp snooping Enables DHCP Snooping on the Switch. C 13
dhcp snooping database <tftp:// Specifies the location of the DHCP snooping database. C 13
host/filename> The location should be expressed like this: tftp://{domain
name or IP address}/directory, if applicable/file name; for
example, tftp://192.168.10.1/database.txt.
no dhcp snooping database Removes the location of the DHCP snooping database. C 13
dhcp snooping database timeout Specifies how long (10-65535 seconds) the Switch tries to C 13
<seconds> complete a specific update in the DHCP snooping
database before it gives up.
no dhcp snooping database Resets how long (10-65535 seconds) the Switch tries to C 13
timeout complete a specific update in the DHCP snooping
database before it gives up to the default value (300).
dhcp snooping database write- Specifies how long (10-65535 seconds) the Switch waits to C 13
delay <seconds> update the DHCP snooping database the first time the
current bindings change after an update.
88
Table 67 dhcp snooping Command Summary (continued)
COMMAND DESCRIPTION M P
no dhcp snooping database write- Resets how long (10-65535 seconds) the Switch waits to C 13
delay update the DHCP snooping database the first time the
current bindings change after an update to the default
value (300).
dhcp snooping vlan <vlan-list> Specifies the VLAN IDs for VLANs you want to enable DHCP C 13
snooping on.
no dhcp snooping vlan <vlan- Specifies the VLAN IDs for VLANs you want to disable DHCP C 13
list> snooping on.
dhcp snooping vlan <vlan-list> Sets the Switch to add the system name to DHCP requests C 13
information that it broadcasts to the DHCP VLAN, if specified, or VLAN.
no dhcp snooping vlan <vlan- Sets the Switch to not add the system name to DHCP C 13
list> information requests that it broadcasts to the DHCP VLAN, if specified,
or VLAN.
dhcp snooping vlan <vlan-list> Specifies a pre-defined DHCP option 82 profile that the C 13
interface port-channel <port- Switch applies to the specified port(s) in the specified
list> option profile <name> VLAN.
no dhcp snooping vlan <vlan- Sets the Switch to not apply a DHCP option 82 profile to the C 13
list> interface port-channel specified port(s).
<port-list> option
dhcp snooping vlan <vlan-list> Sets the Switch to add the slot number, port number and C 13
option VLAN ID to DHCP requests that it broadcasts to the DHCP
VLAN, if specified, or VLAN.
no dhcp snooping vlan <vlan- Sets the Switch to not add the slot number, port number C 13
list> option and VLAN ID to DHCP requests that it broadcasts to the
DHCP VLAN, if specified, or VLAN.
dhcp snooping vlan <vlan-list> Specifies a pre-defined DHCP option 82 profile that the C 13
option profile <name> Switch applies to all ports in the specified VLAN.
no dhcp snooping vlan <vlan- Sets the Switch to not apply a DHCP option 82 profile to all C 13
list> option ports in the specified VLAN.
clear dhcp snooping database Delete all statistics records of DHCP requests going through E 13
statistics the Switch.
renew dhcp snooping database Loads dynamic bindings from the default DHCP snooping E 13
database.
renew dhcp snooping database Loads dynamic bindings from the specified DHCP E 13
<tftp://host/filename> snooping database.
89
The following table describes the dhcp-vlan commands.
90
Chapter 22 DiffServ Commands
C H A P T E R 22
DiffServ Commands
Use these commands to configure Differentiated Services (DiffServ) on the Switch.
91
C H A P T E R 23
Display Commands
Use these commands to display configuration information.
92
Chapter 24 DVMRP Commands
C H A P T E R 24
DVMRP Commands
This chapter explains how to use commands to activate the Distance Vector Multicast Routing Protocol
(DVMRP) on the Switch.
interface route-domain <ip-address>/ Enters the configuration mode for this routing C 13
<mask-bits> domain.
93
Chapter 24 DVMRP Commands
A B
172.16.1.254
10.10.10.254
C D E
94
Chapter 25 Error Disable and Recovery Commands
C H A P T E R 25
Error Disable and Recovery
Commands
Use these commands to configure the CPU protection and error disable recovery features on the
Switch.
The CPU protection feature allows you to limit the rate of ARP, BPDU and IGMP packets to be delivered
to the CPU on a port. This enhances the CPU efficiency and protects against potential DoS attacks or
errors from other network(s). You then can choose to drop control packets that exceed the specified
rate limit or disable a port on which the packets are received.
95
25.4 Command Summary
The following section lists the commands for this feature.
clear cpu-protection interface Resets the “Total Drop” counters for the specified port(s) to E 13
port-channel <port-list> cause zero (0). You can see the counter using the show cpu-
<ARP|BPDU|IGMP> protection command. The “Total Drops” means the
number of ARP, BPDU or IGMP packets that have been
dropped due to the Error Disable feature in rate-
limitation mode.
reset cpu-protection interface Sets the specified port(s) to handle all ARP, BPDU or IGMP E 13
port-channel <port-list> cause packets in stead of ignoring them, if the port(s) are in
<ARP|BPDU|IGMP> inactive-reason mode (set by using the errdisable
detet cause command).
show cpu-protection interface Shows the CPU Protection settings and the number of ARP, E 13
port-channel <port-list> BPDU and/or IGMP packets that has been dropped by the
Error Disable feature for the specified port(s).
errdisable recovery cause Enables the recovery timer for the specified feature that C 13
<loopguard|ARP|BPDU|IGMP> causes the Switch to shut down port(s).
errdisable recovery cause Sets how many seconds the Switch waits before enabling C 13
<loopguard|ARP|BPDU|IGMP> the port(s) which was shut down.
interval <30-2592000>
no errdisable detect cause Disables the rate limit for ARP, BPDU or IGMP packets on C 13
<ARP|BPDU|IGMP> port(s), set by using the cpu-protection cause
command.
no errdisable recovery Turns off the disabled port recovery function on the Switch. C 13
no errdisable recovery cause Disables the recovery timer for the specified feature that C 13
<loopguard|ARP|BPDU|IGMP> causes the Switch to shut down a port.
96
Chapter 25 Error Disable and Recovery Commands
• limit the number of ARP packets that port 7 can handle to 100 packets per second.
• set to shut down port 7 when the number ARP packets the port should handle exceeds the rate limit.
• display the CPU protection settings that you just set for port 7.
• display the Error Disable status and action mode for ARP packet handling.
systemname# config
systemname(config)# interface port-channel 7
systemname(config-interface)# cpu-protection cause ARP rate-limit 100
systemname(config-interface)# exit
systemname(config)# errdisable detect cause ARP
systemname(config)# errdisable detect cause ARP mode inactive-port
systemname(config)# exit
systemname# show cpu-protection interface port-channel 7
Port : 7
This example enables the disabled port recovery function and the recovery timer for the loopguard
feature on the Switch. If a port is shut down due to the specified reason, the Switch activates the port
97
Chapter 25 Error Disable and Recovery Commands
300 seconds (the default value) later. This example also shows the number of the disabled port(s) and
the time left before the port(s) becomes active.
sysname# configure
sysname(config)# errdisable recovery
sysname(config)# errdisable recovery cause loopguard
sysname(config)# exit
sysname# show errdisable recovery
Errdisable Recovery Status:Enable
98
Chapter 26 Ethernet OAM Commands
C H A P T E R 26
Ethernet OAM Commands
Use these commands to use the link monitoring protocol IEEE 802.3ah Link Layer Ethernet OAM
(Operations, Administration and Maintenance).
• Discovery - this identifies the devices on each end of the Ethernet link and their OAM configuration.
• Remote Loopback - this can initiate a loopback test between Ethernet devices.
show ethernet oam statistics Displays the number of OAM packets transferred for the E 3
<port-list> specified ports.
show ethernet oam summary Displays the configuration details of each OAM activated E 3
port.
ethernet oam Enables Ethernet OAM on the Switch. C 13
ethernet oam remote-loopback Initiates a remote-loopback test from the specified port by E 13
start <port> sending Enable Loopback Control PDUs to the remote
device.
99
Chapter 26 Ethernet OAM Commands
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
ethernet oam Enables Ethernet OAM on the port(s). C 13
ethernet oam remote-loopback Enables the remote loopback feature on the ports. C 13
supported
no ethernet oam remote- Sets the Switch to process loopback commands received C 13
loopback ignore-rx on the ports.
no ethernet oam remote- Disables the remote loopback feature on the ports. C 13
loopback supported
no ethernet oam mode Resets the OAM mode to the default value. C 13
sysname# configure
sysname(config)# ethernet oam
sysname(config)# interface port-channel 7
sysname(config-interface)# ethernet oam
sysname(config-interface)# ethernet oam mode active
sysname(config-interface)# exit
sysname(config)# exit
100
This example performs Ethernet OAM discovery from port 7.
Operational status:
Link status : Down
Info. revision : 3
Parser state : Forward
Discovery state : Active Send Local
Active: The Switch initiates OAM discovery; sends information PDUs; and may send
event notification PDUs, variable request/response PDUs, or loopback control PDUs.
Passive: The Switch waits for the remote device to initiate OAM discovery; sends
information PDUs; may send event notification PDUs; and may respond to variable
request PDUs or loopback control PDUs.
The Switch might not support some types of PDUs, as indicated in the fields below.
Unidirectional This field indicates whether or not the Switch can send information PDUs to transmit
fault information when the receive path is non-operational.
Remote loopback This field indicates whether or not the Switch can use loopback control PDUs to put the
remote device into loopback mode.
Link events This field indicates whether or not the Switch can interpret link events, such as link fault
and dying gasp. Link events are sent in event notification PDUs and indicate when the
number of errors in a given interval (time, number of frames, number of symbols, or
number of errored frame seconds) exceeds a specified threshold. Organizations may
create organization-specific link event TLVs as well.
Variable retrieval This field indicates whether or not the Switch can respond to requests for more
information, such as requests for Ethernet counters and statistics, about link events.
Max. OAMPDU size This field displays the maximum size of PDU for receipt and delivery.
Operational status
Link status This field indicates that the link is up or down.
Info. revision This field displays the current version of local state and configuration. This two-octet
value starts at zero and increments every time the local state or configuration
changes.
101
Chapter 26 Ethernet OAM Commands
Discard: The Switch is discarding non-OAMPDUs because it is trying to or has put the
remote device into loopback mode.
Discovery state This field indicates the state in the OAM discovery process. OAM-enabled devices use
this process to detect each other and to exchange information about their OAM
configuration and capabilities. OAM discovery is a handshake protocol.
Fault: One of the devices is transmitting OAM PDUs with link fault information, or the
interface is not operational.
Active Send Local: The Switch is in active mode and is trying to see if the remote
device supports OAM.
Passive Wait: The Switch is in passive mode and is waiting for the remote device to
begin OAM discovery.
• The Switch has discovered the remote device but has not accepted or rejected
the connection yet.
• The Switch has discovered the remote device and rejected the connection.
Send Local Remote OK: The Switch has discovered the remote device and has
accepted the connection. In addition, the remote device has not accepted or
rejected the connection yet, or the remote device has rejected the connected.
Send Any: The Switch and the remote device have accepted the connection. This is
the operating state for OAM links that are fully operational.
102
Table 77 show ethernet oam statistics (continued)
LABEL DESCRIPTION
Event Notification This field displays the number of unique or duplicate OAM event notification PDUs sent
OAMPDU Tx on the port.
Event Notification This field displays the number of unique or duplicate OAM event notification PDUs
OAMPDU Rx received on the port.
Loopback Control This field displays the number of loopback control OAM PDUs sent on the port.
OAMPDU Tx
Loopback Control This field displays the number of loopback control OAM PDUs received on the port.
OAMPDU Rx
Variable Request This field displays the number of OAM PDUs sent to request MIB objects on the remote
OAMPDU Tx device.
Variable Request This field displays the number of OAM PDUs received requesting MIB objects on the
OAMPDU Rx Switch.
Variable Response This field displays the number of OAM PDUs sent by the Switch in response to requests.
OAMPDU Tx
Variable Response This field displays the number of OAM PDUs sent by the remote device in response to
OAMPDU Rx requests.
Unsupported OAMPDU Tx This field displays the number of unsupported OAM PDUs sent on the port.
Unsupported OAMPDU Rx This field displays the number of unsupported OAM PDUs received on the port.
Local Remote
------------- -----------------------------------------
Port Mode MAC Addr OUI Mode Config
----- ------- ----------------- ------ ------- --------
1 Active
103
Chapter 27 External Alarm Commands
C H A P T E R 27
External Alarm Commands
Use these commands to configure the external alarm features on the Switch.
104
27.2 Command Examples
This example configures and shows the name and status of the external alarm(s).
sysname# configure
sysname(config)# external-alarm 1 name dooropen
sysname(config)# exit
sysname# show external-alarm
External Alarm 1
External Alarm 2
External Alarm 3
External Alarm 4
105
Chapter 28 GARP Commands
C H A P T E R 28
GARP Commands
Use these commands to configure GARP.
garp join <100-65535> leave Configures GARP time settings (in milliseconds), including C 13
<200-65535> leaveall <200-65535> the join, leave and leave all timers for each port. Leave
Time must be at least two times larger than Join Timer, and
Leave All Timer must be larger than Leave Timer.
106
Chapter 28 GARP Commands
GARP Timer
------------------------
Join Timer :200
Leave Timer :600
Leave All Timer :10000
sysname# configure
sysname(config)# garp join 300 leave 800 leaveall 11000
sysname(config)# exit
sysname# show garp
GARP Timer
------------------------
Join Timer :300
Leave Timer :800
Leave All Timer :11000
107
Chapter 29 Green Ethernet Commands
C H A P T E R 29
Green Ethernet Commands
Use these commands to configure green Ethernet.
Note: Not all Switches supports Green Ethernet completely. Some may only support EEE.
108
Table 81 green-ethernet Command Summary (continued)
COMMAND DESCRIPTION M P
green-ethernet short-reach Enables adjusting the transmission power of each port E 13
according to the length of cable attached to a port
on the Switch.
no green-ethernet short-reach Disables short-reach on the Switch. E 13
interface port-channel <port-list> Enters config-interface mode for the specified port(s). C 13
EEE
• Active displays when EEE is enabled and the EEE port is up
• Inactive displays when EEE is enabled but the EEE port is down or the device connected to this port
does not support EEE
• Unsupported means the Switch cannot display the status.
• - means EEE is not enabled
Short reach
• Normal means short reach has not reduced the power on this link
• Low power means short reach has reduced the power on this link
109
Chapter 29 Green Ethernet Commands
sysname#
The following example shows how to configure short reach if the Switch supports short reach per port
sysname# configure
sysname(config)# green-ethernet short-reach
sysname# configure
sysname(config)# interface port-channel 1-4
sysname(config-interface)# green-ethernet short-reach
110
Chapter 29 Green Ethernet Commands
The following example shows the display for short reach if the Switch supports short reach per port and
showing the status
111
Chapter 30 GVRP Commands
C H A P T E R 30
GVRP Commands
Use these commands to configure GVRP.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
gvrp Enables this function to permit VLAN groups beyond the C 13
local Switch.
no gvrp Disable GVRP on the port(s). C 13
GVRP Support
-----------------------
gvrpEnable = YES
gvrpPortEnable:
sysname# configure
sysname(config)# interface port-channel 1-5
sysname(config-interface)# no gvrp
sysname(config-interface)# exit
sysname(config)# exit
112
P ART III
Reference H-M
HTTPS Server Commands (115)
IP Commands (140)
113
MAC Authentication Commands (197)
114
C H A P T E R 31
HTTPS Server Commands
Use these commands to configure the HTTPS server on the Switch.
115
Chapter 31 HTTPS Server Commands
Statistics:
Total connects : 0
Current connects : 0
Connects that finished: 0
Renegotiate requested : 0
Session cache items : 0
Session cache hits : 0
Session cache misses : 0
Session cache timeouts: 0
Sessions:
Remote IP Port Local IP Port SSL bytes Sock bytes
116
Chapter 31 HTTPS Server Commands
117
C H A P T E R 32
IEEE 802.1x Authentication
Commands
Use these commands to configure IEEE 802.1x authentication.
118
Chapter 32 IEEE 802.1x Authentication Commands
port-access-authenticator Sets the number of seconds the Switch waits for client's C 13
<port-list> supp-timeout <30- response to the challenge request before sending a
65535> request again.
port-access-authenticator Sets the number of seconds the Switch waits before re- C 13
<port-list> tx-period <1-65535> sending an identity request to clients on the listed ports.
119
Chapter 32 IEEE 802.1x Authentication Commands
1 Specifies RADIUS server 1 with IP address 10.10.10.1, port 1890 and the string secretKey as the password.
2 Specifies the timeout period of 30 seconds that the Switch will wait for a response from the RADIUS
server.
6 Specifies 1800 seconds as the interval for client reauthentication on ports 4-8.
3 Sets host mode to multi-secure to have the Switch authenticate each client that connects to port 8.
sysname(config)# no port-access-authenticator
sysname(config)# no port-access-authenticator 1,3-5 reauthenticate
sysname(config)# no port-access-authenticator 1,6-7
120
C H A P T E R 33
IGMP and Multicasting
Commands
This chapter explains how to use commands to configure the Internet Group Membership Protocol
(IGMP) on the Switch. It also covers configuring the ports to remove the VLAN tag from outgoing
multicast packets on the Switch.
interface route-domain <ip-address>/ Enters the configuration mode for the specified C 13
<mask-bits> routing domain.
121
Chapter 33 IGMP and Multicasting Commands
122
C H A P T E R 34
IGMP Snooping Commands
Use these commands to configure IGMP snooping on the Switch.
igmp-snooping 8021p-priority <0-7> Sets the 802.1p priority for outgoing igmp snooping C 13
packets.
no igmp-snooping 8021p-priority Disables changing the priority of outgoing IGMP control C 13
packets.
igmp-snooping authentication- Sets how long the Switch waits before sending the C 13
timeout <0-3000> same access request again if the AAA server rejects the
host’s request to join a multicast group.
no igmp-snooping authentication- Resets the authentication timeout value to its default C 13
timeout setting.
igmp-snooping filtering Enables IGMP filtering on the Switch. Ports can only join C 13
multicast groups specified in their IGMP filtering profile.
igmp-snooping filtering profile Sets the range of multicast address(es) in a profile. C 13
<name> start-address <ip> end-
name: 1-32 alphanumeric characters
address <ip>
no igmp-snooping filtering Disables IGMP filtering on the Switch. C 13
no igmp-snooping filtering profile Removes the specified IGMP filtering profile. You C 13
<name> cannot delete an IGMP filtering profile that is assigned
to any ports.
123
Chapter 34 IGMP Snooping Commands
124
Chapter 34 IGMP Snooping Commands
show igmp-snooping group count Displays the total number of the multicast groups on the E 3
Switch.
show igmp-snooping group interface Displays the multicast group(s) to which the specified E 3
port-channel <port-list> port(s) belongs.
show igmp-snooping group interface Displays the number of the multicast group(s) to which E 3
port-channel <port-list> count the specified port(s) belongs.
show igmp-snooping group vlan Displays the multicast group(s) for the specified E 3
<vlan-list> multicast VLAN(s).
show igmp-snooping group vlan Displays the number of the multicast group(s) for the E 3
<vlan-list> count specified multicast VLAN(s).
show igmp-snooping querier Displays the IGMP query mode for the ports on the E 3
Switch.
show igmp-snooping statistics Displays the multicast statistics of the specified port(s). E 3
interface port-channel <port-list>
show igmp-snooping statistics Displays the multicast statistics of the Switch. E 3
system
show igmp-snooping statistics vlan Displays the multicast statistics of the specified multicast E 3
<vlan-list> VLAN(s).
show multicast [vlan] Displays multicast status, including the port number, E 3
VLAN ID and multicast group members on the Switch.
Optionally, displays the type of each multicast VLAN.
igmp-snooping vlan mode Specifies how the VLANs on which the Switch snoops IGMP C 13
<auto|fixed> packets are selected.
125
Chapter 34 IGMP Snooping Commands
show interfaces config <port- Displays whether the group limit is enabled and the E 3
list> igmp-snooping group- maximum number of the multicast groups the specified
limited port(s) is allowed to join.
show interfaces config <port- Displays the IGMP leave mode of the specified port(s). E 3
list> igmp-snooping leave-mode
show interfaces config <port- Displays the IGMP querier mode of the specified port(s). E 3
list> igmp-snooping query-mode
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
igmp-snooping Enables IGMP snooping authentication on the port(s). C 13
authentication
When a multicast host (connected to the specified ports)
sends a message to join a multicast group, the Switch
sends an access request (that conatins the host
identification information) to an AAA server before
forwarding the join message to the multicast router/switch.
The Switch learns the multicast group membership when
the AAA server returns an access-accept. If the AAA server
returns an access-reject, the Switch will not learn the
multicast group membership, nor process the packet
further. If the multicast group and port has already been
learned, the Switch will not do the authentication again.
igmp-snooping fast-leave- Set the IGMP snooping fast leave timeout (in miliseconds) C 13
timeout <200-6348800> the Switch uses to update the forwarding table for the
port(s).
126
Chapter 34 IGMP Snooping Commands
deny: The Switch drops any new IGMP join report received
on this port until an existing multicast forwarding table
entry is aged out.
auto: The Switch uses the port as an IGMP query port if the
port receives IGMP query packets.
edge: The Switch does not use the port as an IGMP query
port. The Switch does not keep any record of an IGMP
router being connected to this port. The Switch does not
forward IGMP join or leave packets to this port.
no igmp-snooping Disables IGMP snooping authentication on the port(s). The C 13
authentication Switch directly forwards the host’s join message to the
multicast router without sending an access request to the
AAA server for authentication.
no igmp-snooping filtering Prohibits the port(s) from joining any multicast groups if C 13
profile IGMP filtering is enabled on the Switch.
127
Chapter 34 IGMP Snooping Commands
auto: The Switch uses the port as an IGMP query port if the
port receives IGMP query packets.
edge: The Switch does not use the port as an IGMP query
port. The Switch does not keep any record of an IGMP
router being connected to this port. The Switch does not
forward IGMP join or leave packets to this port.
sysname(config)# igmp-snooping
sysname(config)# igmp-snooping host-timeout 30
sysname(config)# igmp-snooping unknown-multicast-frame drop
sysname# configure
sysname(config)# igmp-snooping
sysname(config)# interface port-channel 1
sysname(config-interface)# igmp-snooping group-limited
sysname(config-interface)# igmp-snooping group-limited number 5
sysname(config-interface)# exit
sysname(config)# exit
sysname# show interfaces config 1 igmp-snooping group-limited
Port Enable Max Multicast Group
1 YES 5
128
Chapter 34 IGMP Snooping Commands
This example restricts ports 1-4 to multicast IP addresses 224.255.255.0 through 225.255.255.255.
sysname# configure
sysname(config)# igmp-snooping filtering
sysname(config)# igmp-snooping filtering profile example1 start-address
--> 224.255.255.0 end-address 225.255.255.255
sysname(config)# interface port-channel 1-4
sysname(config-interface)# igmp-snooping filtering profile example1
sysname(config-interface)# exit
sysname(config)# exit
129
C H A P T E R 35
IGMP Filtering Commands
Use these commands to configure IGMP filters and IGMP filtering on the Switch.
igmp-filtering Enables IGMP filtering on the Switch. Ports can only join C 13
multicast groups specified in their IGMP filtering profile.
no igmp-filtering Disables IGMP filtering on the Switch. C 13
130
Chapter 35 IGMP Filtering Commands
sysname# configure
sysname(config)# igmp-filtering
sysname(config)# igmp-filtering profile example1 start-address
--> 224.255.255.0 end-address 225.255.255.255
sysname(config)# interface port-channel 1-4
sysname(config-interface)# igmp-filtering profile example1
sysname(config-interface)# exit
sysname(config)# exit
131
C H A P T E R 36
Interface Commands
Use these commands to configure basic port settings.
interface port-channel <port-list> Enters config-interface mode for the specified port(s). C 13
bpdu-control Sets how Bridge Protocol Data Units (BPDUs) are used C 13
<peer|tunnel|discard|network> in STP port states.
132
Chapter 36 Interface Commands
speed-duplex <auto|10-half|10- Sets the duplex mode (half or full) and speed C 13
full|100-half|100-full|1000- (10, 100, 1000, 10000 or 40000 Mbps) of the
full|1000-auto|10000- connection on the interface. Select auto (auto-
full|40000-full> negotiation) to let the specified port(s) negotiate with
a peer to obtain the connection speed and duplex
mode.
no interface <port-num> Resets the port counters for the specified port(s). E 13
show interfaces <port-list> Displays the current interface status for the specified E 3
port(s).
show interfaces config <port-list> Displays current interface configuration for the E 3
specified port(s).
show interfaces utilization Displays the percentage of actual transmitted and E 3
received frames on a port as a percentage of the link
speed.
133
Chapter 36 Interface Commands
134
Chapter 36 Interface Commands
135
Chapter 36 Interface Commands
The maximum frame size varies depending on your switch model. See Product
Specification chapter in your User’s Guide.
136
C H A P T E R 37
Interface Loopback Mode
In order to configure layer 3 routing features on the Switch, you must enter the interface loopback
mode in the CLI.
ip address <ip-address> <mask> Sets the IP address and subnet mask of the Switch in C 13
the specified loopback interface.
no ip address <ip-address> Deletes the IP address and subnet mask from this C 13
<mask> loopback interface.
137
Chapter 37 Interface Loopback Mode
• Create the loopback interface 0 with IP address 192.168.2.1, subnet mask 255.255.255.0, name
loopback0 and interface status.
sysname# config
sysname(config)# interface loopback 0
sysname(config-if)# inactive
sysname(config-if)# ip address 192.168.2.1 255.255.255.0
sysname(config-if)# name loopback0
sysname(config-if)# exit
sysname(config)# exit
sysname# show interface loopback 0
138
C H A P T E R 38
Interface Route-domain
Mode
In order to configure layer 3 routing features on the Switch, you must enter the interface routing domain
mode in the CLI.
139
C H A P T E R 39
IP Commands
Use these commands to configure the management port IP address, default domain name server and
to look at IP domains.
ip address <ip> <mask> Sets the IP address of the MGMT port (for out-of-band E 0
management) on the Switch.
ip address default-gateway <ip> Sets the default gateway for the out-of-band C 13
management interface on the Switch.
ip name-server <ip|ipv6> Sets the IPv4 and/or IPv6 address(es) of the domain C 13
name server(s).
no ip name-server <all|ip|ipv6> Removes all or the specified DNS server. C 13
show ip iptable all [IP|VID|PORT] Displays the IP address table. You can sort the table E 3
based on the IP address, VLAN ID or the port number.
show ip iptable count Displays the number of IP interfaces configured on the E 3
Switch.
show ip iptable static Displays the static IP address table. E 3
140
Chapter 39 IP Commands
sysname# configure
sysname(config)# ip name-server 10.1.2.3 2001::123
sysname# show ip name-server
Name Server Table:
Server Address Source
-------------- ------
10.1.2.3 Static
2001::123 Static
sysname#
This example shows the TCP statistics and listener ports. See RFC 1213 for more information.
141
Chapter 39 IP Commands
142
Chapter 39 IP Commands
If a management station sets this object to the value deleteTCB(12), then this has the
effect of deleting the TCB (as defined in RFC 793) of the corresponding connection on
the managed node, resulting in immediate termination of the connection.
This example shows the UDP statistics and listener ports. See RFC 1213 for more information.
143
Table 102 show ip udp (continued)
LABEL DESCRIPTION
udpHcOutDatagrams This field displays the total number of UDP datagrams in a 64-bit count sent by the
Switch.
&UCB This field displays the process ID.
Rcv-Q This field displays the queue number of pending datagrams in this connection.
Local socket This field displays the local IP address and port number for this UDP listener. In the case
of a UDP listener that is willing to accept datagrams for any IP interface associated
with the node, the value is 0.0.0.0.
144
Chapter 40 IP Source Binding Commands
C H A P T E R 40
IP Source Binding
Commands
Use these commands to manage the bindings table for IP source guard.
show ip source binding help Provides more information about the specified command. E 3
ip source binding arp-freeze Create static bindings from any previously learned ARP C 13
entries in the Switch's ARP table and add them in the IP
source guard static binding table.
ip source binding arp-freeze Create static bindings from previously learned ARP entries C 13
interface port-channel <port- containing the specified port number and add them in the
list> IP source guard static binding table.
ip source binding arp-freeze Create static bindings from previously learned ARP entries C 13
vlan <vlan-list> containing the specified VLAN ID and add them in the IP
source guard static binding table.
ip source binding <mac-addr> Creates a static binding for ARP inspection. C 13
vlan <vlan-id> <ip> [interface
port-channel <interface-id>]
no ip source binding <mac-addr> Removes the specified static binding. C 13
vlan <vlan-id>
145
40.2 Command Examples
This example shows the current binding table.
146
Chapter 41 IPv6 Commands
C H A P T E R 41
IPv6 Commands
• Static address assignment (see Section 41.1.1 on page 147) and stateless autoconfiguration (see
Stateless Autoconfiguration on page 150)
• Neighbor Discovery Protocol (see Neighbor Discovery Protocol (NDP) on page 151)
• Remote Management using SNMP, Telnet, HTTP and FTP services (see Chapter 71 on page 263)
• ICMPv6 (see ICMPv6 on page 151)
• IPv4/IPv6 dual stack; the Switch can run IPv4 and IPv6 at the same time.
• DHCPv6 client and relay (see DHCPv6 on page 150)
• Multicast Listener Discovery (MLD) snooping and proxy (see Multicast Listener Discovery on page 152)
For more information on IPv6 addresses, refer to RFC 2460 and RFC 4291.
2001:db8:1a2b:15::1a2f:0/32
147
Chapter 41 IPv6 Commands
Interface ID
In IPv6, an interface ID is a 64-bit identifier. It identifies a physical interface (for example, an Ethernet
port) or a virtual interface (for example, the management IP address for a VLAN). One interface should
have a unique interface ID.
Link-local Address
A link-local address uniquely identifies a device on the local network (the LAN). It is similar to a “private IP
address” in IPv4. You can have the same link-local address on multiple interfaces on a device. A link-
local unicast address has a predefined prefix of fe80::/10. The link-local unicast address format is as
follows.
Global Address
A global address uniquely identifies a device on the Internet. It is similar to a “public IP address” in IPv4.
The global address format as follows.
The global ID is the network identifier or prefix of the address and is used for routing. This may be
assigned by service providers.
Multicast Addresses
In IPv6, multicast addresses provide the same functionality as IPv4 broadcast addresses. Broadcasting is
not supported in IPv6. A multicast address allows a host to send packets to all hosts in a multicast group.
Multicast scope allows you to determine the size of the multicast group. A multicast address has a
predefined prefix of ff00::/8. The following table describes some of the predefined multicast addresses.
148
Chapter 41 IPv6 Commands
The following table describes the multicast addresses which are reserved and can not be assigned to a
multicast group.
MULTICAST ADDRESS
FF00:0:0:0:0:0:0:0
FF01:0:0:0:0:0:0:0
FF02:0:0:0:0:0:0:0
FF03:0:0:0:0:0:0:0
FF04:0:0:0:0:0:0:0
FF05:0:0:0:0:0:0:0
FF06:0:0:0:0:0:0:0
FF07:0:0:0:0:0:0:0
FF08:0:0:0:0:0:0:0
FF09:0:0:0:0:0:0:0
FF0A:0:0:0:0:0:0:0
FF0B:0:0:0:0:0:0:0
FF0C:0:0:0:0:0:0:0
FF0D:0:0:0:0:0:0:0
FF0E:0:0:0:0:0:0:0
FF0F:0:0:0:0:0:0:0
Loopback
A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1”
in IPv4.
Unspecified
An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have
its own address. It is similar to “0.0.0.0” in IPv4.
EUI-64
The EUI-64 (Extended Unique Identifier) defined by the IEEE (Institute of Electrical and Electronics
Engineers) is an interface ID format designed to adapt with IPv6. It is derived from the 48-bit (6-byte)
Ethernet MAC address as shown next. EUI-64 inserts the hex digits fffe between the third and fourth bytes
149
Chapter 41 IPv6 Commands
of the MAC address and complements the seventh bit of the first byte of the MAC address. See the
following example.
MAC 00 : 13 : 49 : 12 : 34 : 56
EUI-64 02 : 13 : 49 : FF : FE : 12 : 34 : 56
Stateless Autoconfiguration
With stateless autoconfiguration in IPv6, addresses can be uniquely and automatically generated.
Unlike DHCPv6 (Dynamic Host Configuration Protocol version six) which is used in IPv6 stateful
autoconfiguration, the owner and status of addresses don’t need to be maintained by a DHCP server.
Every IPv6 device is able to generate its own and unique IP address automatically when IPv6 is initiated
on its interface. It combines the prefix and the interface ID (generated from its own Ethernet MAC
address, see Interface ID and EUI-64) to form a complete IPv6 address.
When IPv6 is enabled on a device, its interface automatically generates a link-local address (beginning
with fe80).
When the interface is connected to a network with a router and the ipv6 address autoconfig
command is issued on the Switch, it generates 1another address which combines its interface ID and
global and subnet information advertised from the router. This is a routable global IP address.
DHCPv6
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6, RFC 3315) is a server-client protocol that
allows a DHCP server to assign and pass IPv6 network addresses, prefixes and other configuration
information to DHCP clients. DHCPv6 servers and clients exchange DHCP messages using UDP.
Each DHCP client and server has a unique DHCP Unique IDentifier (DUID), which is used for identification
when they are exchanging DHCPv6 messages. The DUID is generated from the MAC address, time,
vendor assigned ID and/or the vendor's private enterprise number registered with the IANA. It should not
change over time even after you reboot the device.
Identity Association
An Identity Association (IA) is a collection of addresses assigned to a DHCP client, through which the
server and client can manage a set of related IP addresses. Each IA must be associated with exactly
one interface. The DHCP client uses the IA assigned to an interface to obtain configuration from a DHCP
server for that interface. Each IA consists of a unique IAID and associated IP information.
The IA type is the type of address in the IA. Each IA holds one type of address. IA_NA means an identity
association for non-temporary addresses and IA_TA is an identity association for temporary addresses.
An IA_NA option contains the T1 and T2 fields, but an IA_TA option does not. The DHCPv6 server uses T1
and T2 to control the time at which the client contacts with the server to extend the lifetimes on any
addresses in the IA_NA before the lifetimes expire. After T1, the client sends the server (S1) (from which
the addresses in the IA_NA were obtained) a Renew message. If the time T2 is reached and the server
150
Chapter 41 IPv6 Commands
does not respond, the client sends a Rebind message to any available server (S2). For an IA_TA, the
client may send a Renew or Rebind message at the client's discretion.
T2
T1
The DHCP relay agent can add the remote identification (remote-ID) option and the interface-ID option
to the Relay-Forward DHCPv6 messages. The remote-ID option carries a user-defined string, such as the
system name. The interface-ID option provides slot number, port information and the VLAN ID to the
DHCPv6 server. The remote-ID option (if any) is stripped from the Relay-Reply messages before the relay
agent sends the packets to the clients. The DHCP server copies the interface-ID option from the Relay-
Forward message into the Relay-Reply message and sends it to the relay agent. The interface-ID should
not change even after the relay agent restarts.
ICMPv6
Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443. ICMPv6 has
a preceding Next Header value of 58, which is different from the value used to identify ICMP for IPv4.
ICMPv6 is an integral part of IPv6. IPv6 nodes use ICMPv6 to report errors encountered in packet
processing and perform other diagnostic functions, such as "ping".
• Neighbor solicitation: A request from a host to determine a neighbor’s link-layer address (MAC
address) and detect if the neighbor is still reachable. A neighbor being “reachable” means it
responds to a neighbor solicitation message (from the host) with a neighbor advertisement message.
• Neighbor advertisement: A response from a node to announce its link-layer address.
• Router solicitation: A request from a host to locate a router that can act as the default router and
forward packets.
• Router advertisement: A response to a router solicitation or a periodical multicast advertisement from
a router to advertise its presence and other parameters.
151
Chapter 41 IPv6 Commands
IPv6 Cache
An IPv6 host is required to have a neighbor cache, destination cache, prefix list and default router list.
The Switch maintains and updates its IPv6 caches constantly using the information from response
messages. In IPv6, the Switch configures a link-local address automatically, and then sends a neighbor
solicitation message to check if the address is unique. If there is an address to be resolved or verified, the
Switch also sends out a neighbor solicitation message. When the Switch receives a neighbor
advertisement in response, it stores the neighbor’s link-layer address in the neighbor cache. When the
Switch uses a router solicitation message to query for a router and receives a router advertisement
message, it adds the router’s information to the neighbor cache, prefix list and destination cache. The
Switch creates an entry in the default router list cache if the router can be used as a default router.
When the Switch needs to send a packet, it first consults the destination cache to determine the next
hop. If there is no matching entry in the destination cache, the Switch uses the prefix list to determine
whether the destination address is on-link and can be reached directly without passing through a router.
If the address is onlink, the address is considered as the next hop. Otherwise, the Switch determines the
next-hop from the default router list or routing table. Once the next hop IP address is known, the Switch
looks into the neighbor cache to get the link-layer address and sends the packet when the neighbor is
reachable. If the Switch cannot find an entry in the neighbor cache or the state for the neighbor is not
reachable, it starts the address resolution process. This helps reduce the number of IPv6 solicitation and
advertisement messages.
MLD allows an IPv6 switch or router to discover the presence of MLD listeners who wish to receive
multicast packets and the IP addresses of multicast groups the hosts want to join on its network.
MLD snooping and MLD proxy are analogous to IGMP snooping and IGMP proxy in IPv4.
MLD Messages
A multicast router or switch periodically sends general queries to MLD hosts to update the multicast
forwarding table. When an MLD host wants to join a multicast group, it sends an MLD Report message
for that address.
An MLD Done message is equivalent to an IGMP Leave message. When an MLD host wants to leave a
multicast group, it can send a Done message to the router or switch. If the leave mode is not set to
immediate, the router or switch sends a group-specific query to the port on which the Done message is
received to determine if other devices connected to this port should remain in the group.
152
Chapter 41 IPv6 Commands
router and works as a host to send Report or Done messages when receiving queries from a multicast
router.
Proxy
Snooping
USP
DSP
MLD Snooping-Proxy
MLD snooping-proxy is a Zyxel-proprietary feature. IPv6 MLD proxy allows only one upstream interface on
a switch, while MLD snooping-proxy supports more than one upstream port on a switch. The upstream
port in MLD snooping-proxy can report group changes to a connected multicast router and forward
MLD messages to other upstream ports. This helps especially when you want to have a network that uses
STP to provide backup links between switches and also performs MLD snooping and proxy functions.
MLD snooping-proxy, like MLD proxy, can minimize MLD control messages and allow better network
performance.
In MLD snooping-proxy, if one upstream port is learned via snooping, all other upstream ports on the
same device will be added to the same group. If one upstream port requests to leave a group, all other
upstream ports on the same device will also be removed from the group.
In the following MLD snooping-proxy example, all connected upstream ports (1 ~7) are treated as one
interface. The connection between ports 8 and 9 is blocked by STP to break the loop. If there is one
153
Chapter 41 IPv6 Commands
query from a router (X) or MLD Done or Report message from any upstream port, it will be broadcast to
all connected upstream ports.
X
Query
1
2
9
3 8
4 7
Report
5 6
Done
ipv6 address <ipv6-address>/ Manually configures a static IPv6 global address for the C 13
<prefix> eui-64 VLAN and have the interface ID be generated
automatically using the EUI-64 format.
ipv6 address <ipv6-address>/ Manually configures a static IPv6 link-local address for C 13
<prefix> link-local the VLAN.
154
Chapter 41 IPv6 Commands
ipv6 address dhcp client <ia- Sets the Switch to get a non-temporary IP address from C 13
na> [rapid-commit] the DHCP server for this VLAN. Optionally, sets the
Switch to send its DHCPv6 Solicit message with a Rapid
Commit option to obtain information from the DHCP
server by a rapid two-message exchange. The Switch
discards any Reply messages that do not include a
Rapid Commit option. The DHCPv6 server should also
support the Rapid Commit option to have it work well.
ipv6 address dhcp client Sets the time interval (in seconds) at which the Switch C 13
information refresh minimum exchanges other configuration information with a
<600-4294967295> DHCPv6 server again.
ipv6 address dhcp client Sets the Switch to obtain DNS server IPv6 addresses or a C 13
option <[dns][domain-list]> list of domain names from the DHCP server.
no ipv6 address default- Removes the default gateway address for this VLAN. C 13
gateway
no ipv6 address dhcp client Disables the DHCP client feature in this VLAN. C 13
no ipv6 address dhcp client sets the Switch to not include a Rapid Commit option C 13
[rapid-commit] in its DHCPv6 Solicit message for this VLAN.
no ipv6 address dhcp client Sets the Switch to not obtain the DNS server information C 13
option from the DHCP server.
no ipv6 address dhcp client Sets the Switch to not obtain DNS server IPv6 addresses C 13
option <[dns][domain-list]> or a list of domain names from the DHCP server.
restart ipv6 dhcp client vlan <1- Sets the Switch to send a Release message for the E 13
4094> assigned IPv6 address to the DHCP server and start
DHCP message exchange again.
show ipv6 Displays IPv6 settings in all VLANs on the Switch. E 3
155
Chapter 41 IPv6 Commands
no ipv6 dhcp relay vlan <1-4094> Sets the Switch to not add the interface-ID option in C 13
option interface-id the DHCPv6 requests from the clients in the specified
VLAN before the Switch forwards them to a DHCP
server.
no ipv6 dhcp relay vlan <1-4094> Sets the Switch to not add the remote-ID option in the C 13
option remote-id DHCPv6 requests from the clients in the specified VLAN
before the Switch forwards them to a DHCP server.
ipv6 dhcp trust Configures this port as a trusted port. Trusted ports are C 13
connected to DHCPv6 servers or other switches.
no ipv6 dhcp trust Configures this port as an untrusted port. Untrusted C 13
ports are connected to subscribers, and the Switch
discards DHCPv6 packets from untrusted ports in the
following situations:
156
Chapter 41 IPv6 Commands
clear ipv6 mld snooping-proxy Removes the MLD snooping-proxy statistics of the E 13
statistics port port(s).
clear ipv6 mld snooping-proxy Removes the MLD snooping-proxy statistics of the E 13
statistics system Switch.
157
Chapter 41 IPv6 Commands
interface port-channel <port-list> Enters config-interface mode for the specified port(s). C 13
ipv6 mld snooping-proxy Enables multicast group limits for MLD snooping-proxy. C 13
filtering group-limited
ipv6 mld snooping-proxy Sets the maximum number of the multicast groups the C 13
filtering group-limited number port(s) is allowed to join.
<number> number: 0 - 255
ipv6 mld snooping-proxy Assigns the specified MLD filtering profile to the port(s). C 13
filtering profile <name> If MLD filtering is enabled on the Switch, the port(s) can
only join the multicast groups in the specified profile.
no ipv6 mld snooping-proxy Disables multicast group limits for MLD snooping. C 13
filtering group-limited
no ipv6 mld snooping-proxy Disables MLD filtering on the port(s) and allows the C 13
filtering profile port(s) to join any group.
ipv6 mld snooping-proxy 8021p- Sets the default IEEE 802.1p priority in the MLD C 13
priority <0-7> messages.
ipv6 mld snooping-proxy filtering Adds an MLD filtering profile and sets the range of the C 13
profile <name> start-address <ip> multicast address(es).
end-address <ip>
ipv6 mld snooping-proxy vlan Enables MLD snooping-proxy on the specified VLAN. C 13
<vlan-id>
ipv6 mld snooping-proxy vlan Specifies the downstream port(s) on the Switch. The C 13
<vlan-id> downstream interface port(s) will work as a multicast router to send MLD
port-channel <port-list> queries and listen to the MLD host’s join and leave
messages.
ipv6 mld snooping-proxy vlan Sets the fast leave timeout (in milliseconds) for the C 13
<vlan-id> downstream interface specified downstream port(s).
port-channel <port-list> fast- This defines how many seconds the Switch waits for an
leave-timeout <2-16775168> MLD report before removing an MLD snooping
membership entry (learned on a downstream port)
when an MLD Done message is received on this port
from a host.
ipv6 mld snooping-proxy vlan Set the MLD snooping normal leave timeout (in C 13
<vlan-id> downstream interface milliseconds) the Switch uses to update the forwarding
port-channel <port-list> leave- table for the specified downstream port(s).
timeout <2-16775168> This defines how many seconds the Switch waits for an
MLD report before removing an MLD snooping
membership entry (learned on a downstream port)
when an MLD Done message is received on this port
from a host.
158
Chapter 41 IPv6 Commands
ipv6 mld snooping-proxy vlan Specifies the upstream (host) port(s) on the Switch. The C 13
<vlan-id> upstream interface port- port(s) will work as an MLD host to send join or leave
channel <port-list> messages when receiving queries from the multicast
router.
ipv6 mld snooping-proxy vlan Sets the amount of time (in milliseconds) between the C 13
<vlan-id> upstream last-listener- MLD group-specific queries sent by an upstream port
query-interval <1-8387584> when an MLD Done message is received. This value
should be exactly the same as what’s configured in the
connected multicast router.
159
Chapter 41 IPv6 Commands
160
Chapter 41 IPv6 Commands
show ipv6 mld snooping-proxy group Displays the multicast group addresses learned on the E 3
Switch’s ports.
show ipv6 mld snooping-proxy Displays the MLD snooping-proxy statistics of the E 3
statistics interface port-channel specified port(s).
<port-list>
show ipv6 mld snooping-proxy Displays the MLD snooping-proxy statistics of the E 3
statistics system Switch.
show ipv6 mld snooping-proxy Displays the MLD snooping-proxy statistics of the E 3
statistics vlan <vlan-list> specified multicast VLAN(s).
show ipv6 mld snooping-proxy vlan Displays MLD proxy settings for the specified VLAN. E 3
<vlan-id>
show ipv6 multicast Displays the multicast group addresses learned on the E 3
Switch’s ports and the timeout values.
To turn off the DAD for this VLAN, set the number of
DAD attempts to 0.
ipv6 nd managed-config-flag Configures the Switch to set the “managed address C 13
configuration” flag (the M flag) to 1 in IPv6 router
advertisements, which means hosts use DHCPv6 to
obtain IPv6 stateful addresses.
ipv6 nd ns-interval <1000- Specifies the time interval (in milliseconds) at which C 13
3600000> neighbor solicitations are re-sent for this VLAN.
161
Chapter 41 IPv6 Commands
ipv6 nd ra interval minimum <3- Specifies the minimum and maximum time intervals at C 13
1350> maximum <4-1800> which the Switch sends router advertisements for this
VLAN.
ipv6 nd ra lifetime <0-9000> Sets how long (in seconds) the router in router C 13
advertisements can be used as a default router for this
VLAN.
ipv6 nd ra suppress Sets the Switch to not send router advertisements and C 13
responses to router solicitations for this VLAN.
ipv6 nd reachable-time <1000- Specifies how long (in milliseconds) a neighbor is C 13
3600000> considered reachable for this VLAN.
no ipv6 nd dad-attempts Resets the number of the DAD attempts to the default C 13
settings (3).
no ipv6 nd managed-config-flag Configures the Switch to set the “managed address C 13
configuration” flag (the M flag) to 0 in IPv6 router
advertisements, which means hosts do not use DHCPv6
to obtain IPv6 stateful addresses.
no ipv6 nd ns-interval Resets the time interval between retransmissions of C 13
neighbor solicitations to the default setting (1000
milliseconds).
no ipv6 nd other-config-flag Configures the Switch to set the “Other stateful C 13
configuration” flag (the O flag) to 0 in IPv6 router
advertisements, which means hosts do not use DHCPv6
to obtain additional configuration settings, such as DNS
information.
no ipv6 nd prefix <ipv6- Sets the Switch to not include the specified IPv6 prefix C 13
prefix>/<prefix-length> and prefix length in router advertisements for this VLAN.
162
Chapter 41 IPv6 Commands
show ipv6 route static Displays static IPv6 routing information on the Switch. E 3
show ipv6 prefix Displays all IPv6 prefix information on the Switch. E 3
show ipv6 prefix <interface-type> Displays IPv6 prefix information for the specified E 3
<interface-number> interface (VLAN).
clear ipv6 neighbor <interface- Removes IPv6 neighbor information for a specified E 13
type> <interface-number> interface on the Switch.
ipv6 neighbor <interface-type> Creates a static IPv6 neighbor entry in the IPv6 cache C 13
<interface-number> <ipv6-address> for this VLAN.
<mac-address>
no ipv6 neighbor <interface-type> Removes a static IPv6 neighbor entry from the IPv6 C 13
<interface-number> <ipv6-address> cache.
show ipv6 neighbor Displays the IPv6 neighbor devices on the Switch E 3
show ipv6 neighbor <interface- Displays IPv6 neighbor devices for a specified interface E 3
type> <interface-number> on the Switch.
show ipv6 neighbor address Displays and arranges the data according to IPv6 E 3
address of the neighboring device.
show ipv6 neighbor count Displays the number of the neighboring device(s). E 3
163
Chapter 41 IPv6 Commands
prefix-glean Allows the Switch to learn the IPv6 prefix and length C 13
from DHCPv6 sniffed packets.
no prefix-glean Disables IPv6 prefix gleaning. C 13
no ipv6 snooping policy <name> Removes the specified IPv6 snooping policy. C 13
no ipv6 snooping attach-policy Disables the IPv6 snooping policy on the VLAN C 13
interface.
show ipv6 snooping policy [<name>] Displays all or the specified IPv6 snooping policy E 3
settings.
ipv6 source binding <ipv6-address Creates an IPv6 source binding table entry. C 13
|ipv6-address/prefix-length> [mac
<mac-addr>] [vlan <vlan-id>]
[interface port-channel <port-
list>]
no ipv6 source binding <ipv6- Removes a static IPv6 source binding entry with the C 13
address|ipv6-address/prefix- specified IPv6 address and/or prefix address.
length>
164
Chapter 41 IPv6 Commands
validate address Sets IPv6 source guard to forward valid IPv6 addresses C 13
that are stored in the binding table.
no validate address Sets IPv6 source guard to not forward valid IPv6 C 13
addresses that are stored in the binding table.
validate prefix Sets IPv6 source guard to forward valid IPv6 prefixes C 13
that are stored in the binding table.
no validate prefix Sets IPv6 source guard to not forward valid IPv6 prefixes C 13
that are stored in the binding table.
show ipv6 source-guard policy Displays information of all IPv6 source guard policies on E 3
[<name>] the Switch or the specified IPv6 source guard policy.
165
Chapter 41 IPv6 Commands
sysname# config
sysname(config)# interface vlan 1
sysname(config-vlan)# ipv6
sysname(config-vlan)# exit
sysname(config)# exit
sysname# show ipv6 vlan 1
VLAN : 1 (VLAN1)
IPv6 is enabled.
MTU is 1500 bytes.
ICMP error messages limited to 10 every 100 milliseconds.
Stateless Address Autoconfiguration is disabled.
Link-Local address is fe80::219:cbff:fe6f:9159 [preferred]
Global unicast address(es):
Joined group address(es):
ff02::2
ff01::1
ff02::1
ff02::1:ff6f:9159
ND DAD is enabled, number of DAD attempts: 1
ND NS-interval is 1000 milliseconds
ND reachable time is 30000 milliseconds
ND router advertised managed config flag is disable
ND router advertised other config flag is disable
ND router advertisements are sent every 200 to 600 seconds
ND router advertisements lifetime 1800 seconds
This example shows how to manually configure two IPv6 addresses (one uses the EUI-64 format, one
doesn’t) in VLAN 1, and then display the result. Before using ipv6 address commands, you have to
enable IPv6 in the VLAN and this has the Switch generate a link-local address for the interface.
166
Chapter 41 IPv6 Commands
There are three addresses created in total for VLAN 1. The address “2001:db8:c18:1:219:cbff:fe00:1/64” is
created with the interface ID “219:cbff:fe00:1“ generated using the EUI-64 format. The address
“2001:db8:c18:1::12b/64” is created exactly the same as what you entered in the command.
sysname# config
sysname(config)# interface vlan 1
sysname(config-vlan)# ipv6
sysname(config-vlan)# ipv6 address 2001:db8:c18:1::127/64 eui-64
sysname(config-vlan)# ipv6 address 2001:db8:c18:1::12b/64
sysname(config-vlan)# exit
sysname(config)# exit
sysname# show ipv6
VLAN : 1 (VLAN1)
IPv6 is enabled.
MTU is 1500 bytes.
ICMP error messages limited to 10 every 100 milliseconds.
Stateless Address Autoconfiguration is disabled.
Link-Local address is fe80::219:cbff:fe00:1 [preferred]
Global unicast address(es):
2001:db8:c18:1::12b/64 [preferred]
2001:db8:c18:1:219:cbff:fe00:1/64 [preferred]
Joined group address(es):
ff02::1:ff00:12b
ff02::2
ff01::1
ff02::1
ff02::1:ff6f:9159
ND DAD is enabled, number of DAD attempts: 1
ND NS-interval is 1000 milliseconds
ND reachable time is 30000 milliseconds
ND router advertised managed config flag is disable
ND router advertised other config flag is disable
ND router advertisements are sent every 200 to 600 seconds
ND router advertisements lifetime 1800 seconds
This example shows the Switch owns (L displays in the T field) two manually configured (permanent) IP
addresses, 2001::1234 and fe80::219:cbff:fe00:1. It also displays a neighbor fe80::2d0:59ff:feb8:103c in
VLAN 1 is reachable from the Switch.
S: reachable(R),stale(S),delay(D),probe(P),invalid(IV),incomplete(I),unknown(?)
T: local(L),dynamic(D),static(S),other(O)
167
Chapter 41 IPv6 Commands
This example sends ping requests to an Ethernet device with IPv6 address fe80::2d0:59ff:feb8:103c in
VLAN 1. The device also responds the pings.
168
Chapter 41 IPv6 Commands
This example configures a static IPv6 route to forward packets with IPv6 prefix 2100:: and prefix length 64
to the gateway with IPv6 address fe80::219:cbff:fe01:101 in VLAN 1.
sysname# config
sysname(config)# ipv6 route 2100::/64 fe80::219:cbff:fe01:101 vlan 1
sysname(config)# exit
sysname# show ipv6 route
Terminology:
C - Connected, S - Static
Destination/Prefix Length Type
Next Hop Interface
------------------------------------------------------------
2001:db8:c18:1::/64 C
:: VLAN1
2100::/64 S
fe80::219:cbff:fe01:101 VLAN1
sysname#
C:\>ipv6 install
Installing...
Succeeded.
C:\>ipconfig
Windows IP Configuration
169
Chapter 41 IPv6 Commands
IPv6 is installed and enabled by default in Windows Vista. Use the “ipconfig” command to check your
automatic configured IPv6 address as well. You should see at least one IPv6 address available for the
interface on your computer.
Note: It’s recommended to use Internet Explorer 7.0 or FireFox to access the Switch’s web GUI.
2. Append the Ethernet interface identifier you want to use to connect to the
Switch. But replace the percentage character “%” with “s”.
For example, the Switch uses an address fe80::1234:5678. The Ethernet interface
identifier you want to use on your computer to access the Switch is %4. You
have to type the following to access the Switch.
http://fe80--1234-5678-1s4.ipv6-literal.net.
A global address Use http://[address]
Windows A link-local address For example, http://[fe80--1234-5678-1]
Vista
A global address
This example shows you how to access the Switch using HTTP on Windows XP.
1 Make sure you have enabled IPv6 on your computer (see Section 41.4). Use the ipconfig command in
the command prompt to check the IPv6 address on your computer. The example uses an interface with
address “fe80::2d0:59ff:feb8:103c” to access the Switch. So its Ethernet interface identifier is %4 and will
be used later to make a ping.
C:\>ipconfig
Windows IP Configuration
170
2 Check the Switch IPv6 address(es) you want to ping. In this example, there are two IPv6 addresses in
VLAN 1. One is a link-local address (fe80::219:cbff:fe00:1/64) and the other one is a global address
(2001::1234/64).
VLAN ID : 1
IPv6 Status : Enable
3 In order to access the Switch through its link-local address, do the address conversion (See Table 121 on
page 170).
3a Use a dash “-” to replace each colon “:” in an IPv6 address. Then the address becomes:
fe80--219-cbff-fe00-1
3b In the step 1, the Ethernet interface identifier you want to use to connect to the Switch is “%4”.
Replace the percentage character “%” with “s” and then append it to the address. The address
becomes:
fe80--219-cbff-fe00-1s4
4 Alternatively, you can use the global address to access the Switch. Type http://[2001::1234] on
your browser and the login page appears.
171
Chapter 41 IPv6 Commands
172
Chapter 42 Layer 2 Protocol Tunnel (L2PT) Commands
C H A P T E R 42
Layer 2 Protocol Tunnel
(L2PT) Commands
173
Table 122 l2pt Command Summary (continued)
COMMAND DESCRIPTION M P
l2protocol-tunnel point-to- Enables point-to-point layer 2 protocol tunneling for C 13
point pagp PAgP packets on the specified port(s).
l2protocol-tunnel mac <mac-addr> Sets the destination MAC address used for C 13
encapsulating layer 2 protocol packets received on
an access port.
no l2protocol-tunnel Disables layer 2 protocol tunneling on the Switch. C 13
sysname# configure
sysname(config)# l2protocol-tunnel
sysname(config)# l2protocol-tunnel mac 00:10:23:45:67:8e
sysname(config)#
174
Chapter 42 Layer 2 Protocol Tunnel (L2PT) Commands
This example enables L2PT for STP, CDP and VTP packets on port 3. It also sets L2PT mode to access for
this port.
This example displays L2PT settings and status on port 3. You can also see how many CDP, STP, VTP,
LACP, PAgP and UDLD packets received on this port are encapsulated, decapsulated or dropped.
Status : Running
Layer 2 Protocol Tunneling: Enable
Destination MAC Address: 00:10:23:45:67:8e
175
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
C H A P T E R 43
Link Layer Discovery Protocol
(LLDP) Commands
The Switch also supports the IEEE 802.1 and IEEE 802.3 organizationally-specific TLVs.
Annex F of the LLDP specification defines the following set of IEEE 802.1 organizationally specific TLVs:
Annex G of the LLDP specification defines the following set of IEEE 802.3 Organizationally Specific TLVs:
The optional TLVs are inserted between the Time To Live TLV and the End of LLDPDU TLV.
176
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
LLDP-MED (Link Layer Discovery Protocol for Media Endpoint Devices) is an enhanced extension to LLDP
especially for voice applications. You can use LLDP-MED to advertise location-based information of
emergency calls and/or network policies for voice/video streaming.
lldp basic-tlv port-description Enables the sending of Port Description TLVs on the C 13
port(s).
lldp basic-tlv system- Enables the sending of System Capabilities TLVs on the C 13
capabilities port(s).
lldp basic-tlv system- Enables the sending of System Description TLVs on the C 13
description port(s).
lldp basic-tlv system-name Enables the sending of System Name TLVs on the C 13
port(s).
lldp med location civic [county Sets civic location information, such as street address C 13
<county>] [city <city>] and city name.
[division <division>]
[neighbor <neighbor>]
[street <street>]
[leading-street-direction
<value>] [trailing-street-
suffix <value>] [street-suffix
<value>] [house-number <num>]
[house-number-suffix <value>]
[landmark <landmark>]
[additional-location <value>]
[name <value>] [zip-code
<value>] [building <value>]
[unit <value>] [floor <value>]
[room-number <value>]
[place-type <value>]
[postal-community-name <value>]
[post-office-box <value>]
[additional-code <value>]
177
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
lldp org-specific-tlv dot1 Enables the sending of IEEE 802.1 Port and Protocol C 13
port-protocol-vlan-id VLAN ID TLVs, which contains the VLAN ID and
indicates whether the VLAN is enabled and
supported.
lldp org-specific-tlv dot1 Enables the sending of IEEE 802.1 Port VLAN ID TLVs, C 13
port-vlan-id which contains the port’s VLAN ID.
lldp org-specific-tlv dot3 Enables the sending of IEEE 802.3 Link Aggregation C 13
link-aggregation TLVs, which shows the link aggregation status of the
port(s).
lldp org-specific-tlv dot3 mac- Enables the sending of IEEE 802.3 MAC/PHY C 13
phy Configuration/Status TLV, which shows duplex and
rate settings and indicates whether auto negotiation
is supported on the port.
lldp org-specific-tlv dot3 max- Enables the sending of IEEE 802.3 Maximum Frame Size C 13
frame-size TLVs on the port(s).
lldp org-specific-tlv dot3 Enables the sending of IEEE 802.3 Power via MDI TLVs, C 13
power-via-mdi which indicates whether power can be supplied via a
media dependent interface (MDI) on the port(s).
lldp org-specific-tlv med Enables the sending of location TLVs on the port(s). C 13
location
lldp org-specific-tlv med Enables the sending of network policy TLVs on the C 13
network-policy port(s).
178
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
no lldp basic-tlv system- Disables the sending of System Description TLVs on the C 13
description port(s).
no lldp basic-tlv system-name Disables the sending of System Name TLVs on the C 13
port(s).
no lldp med location Deletes all location identification. C 13
no lldp org-specific-tlv dot1 Disables the sending of IEEE 802.1 Port and Protocol C 13
port-protocol-vlan-id VLAN ID TLVs on the port(s).
no lldp org-specific-tlv dot1 Disables the sending of IEEE 802.1 Port VLAN ID TLVs on C 13
port-vlan-id the port(s).
no lldp org-specific-tlv dot3 Disables the sending of IEEE 802.3 Link Aggregation C 13
link-aggregation TLVs on the port(s).
no lldp org-specific-tlv dot3 Disables the sending of IEEE 802.3 Maximum Frame C 13
max-frame-size Size TLVs on the port(s).
no lldp org-specific-tlv dot3 Disables the sending of IEEE 802.3 Power via MDI TLVs C 13
power-via-mdi on the port(s).
lldp reinitialize-delay <1-10> Sets a number of seconds for LLDP wait to initialize on C 13
a port.
lldp transmit-delay <1-8192> Sets the delay (in seconds) between the successive C 13
LLDPDU transmissions initiated by value or status
changes in the Switch MIB.
179
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
show lldp config Displays the global LLDP settings on the Switch. E 3
show lldp config interface port- Displays the LLDP settings on the specified port(s). E 3
channel <port-list>
show lldp info local Displays the Switch’s device information. E 3
show lldp info local interface Displays the LLDP information for the specified port(s). E 3
port-channel <port-list>
show lldp info remote Displays the device information from the neighboring E 3
devices.
show lldp info remote interface Displays the neighboring device information received E 3
port-channel <port-list> on the specified port(s).
show lldp statistic interface port- Displays LLDP statistics of the specified port(s). E 3
channel <port-list>
clear lldp statistic Resets the LLDP statistics counters to zero. E 13
clear lldp remote_info Deletes all device information from the neighboring E 13
devices.
clear lldp remote_info interface Deletes remote device information on the specified E 13
port-channel <port-list> port(s).
180
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
system-description TLVs) on port 2. This example also shows the LLDP settings on port 2 and global LLDP
settings on the Switch.
sysname# configure
sysname(config)# lldp
sysname(config)# interface port-channel 2
sysname(config-interface)# lldp admin-status tx-rx
sysname(config-interface)# lldp basic-tlv management-address
sysname(config-interface)# lldp basic-tlv port-description
sysname(config-interface)# lldp basic-tlv system-description
sysname(config-interface)# exit
sysname(config)# exit
sysname# show lldp config interface port-channel 2
LLDP Port Configuration:
Port AdminStatus Notification BasicTLV Dot1TLV Dot3TLV
2 tx-rx Disable P-D-M -- ----
Basic TLV Flags: (P)Port Description, (N)System Name, (D)System
Description
(C)System Capabilities, (M)Management Address
802.1 TLV Flags: (P)Port & Protocol VLAN ID, (V)Port VLAN ID
802.3 TLV Flags: (L)Link Aggregation, (M)MAC/PHY Configuration/Status
(F)Maximun Frame Size, (P)Power Via MDI
sysname# show lldp config
LLDP Global Configuration:
Active: Yes
Transmit Interval: 30 seconds
Transmit Hold: 4
Transmit Delay: 2 seconds
Reinitialize Delay: 2 seconds
sysname#
sysname#
181
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
182
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
sysname#
sysname#
183
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
This example shows local Switch (the Switch you’re accessing) LLDP information
sysname#
184
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
This example shows local Switch (the Switch you’re accessing) LLDP information on a port.
sysname#
185
This example shows remote Switch (the Switch connected to the port on the Switch you’re accessing)
LLDP information.
186
Chapter 43 Link Layer Discovery Protocol (LLDP) Commands
187
C H A P T E R 44
Load Sharing Commands
With ECMP, packets are routed through the paths of equal cost according to the hash algorithm output.
The maximum number of paths for one ECMP (Equal-Cost MultiPath) route varies by Switch. A smaller
number of maximum-paths means more ECMP routes are allowed and a larger number of maximum-
paths means fewer ECMP routes are allowed.
The number of paths for a static route for ECMP cannot be bigger than the maximum-paths value.
ip load-sharing <sip|sip-dip> Sets the criteria the Switch uses to determine the routing C 13
path for a packet.
188
Table 131 load-sharing Command Summary (continued)
COMMAND DESCRIPTION M P
ip load-sharing maximum-path Set the maximum number of paths for one ECMP (Equal- C 13
Cost MultiPath) route.
no ip load-sharing Disables load sharing on the Switch. C 13
sysname# configure
sysname(config)# ip load-sharing
sysname(config)# ip load-sharing sip-dip
sysname(config)#
189
C H A P T E R 45
Logging Commands
Use these commands to manage system logs.
190
Chapter 46 Login Account Commands
C H A P T E R 46
Login Account Commands
Use these commands to configure login accounts on the Switch.
logins username <name> password Creates account with the specified user name and sets C 14
[cipher] <password> privilege the password and privilege. The privilege level is applied
<0-14> the next time the user logs in.
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used for password
encryption. To encrypt the password, use the password
encryption command.
no logins username <name> Removes the specified account. C 14
191
46.3 Command Examples
This example creates a new user user2 with privilege 13.
sysname# config
sysname(config)# logins username user2 password 1234 privilege 13
sysname(config)# exit
sysname# show logins
Login Username Privilege
1 user2 13
2 0
3 0
4 0
192
Chapter 47 Loopguard Commands
C H A P T E R 47
Loopguard Commands
Use these commands to configure the Switch to guard against loops on the edge of your network. The
Switch shuts down a port if the Switch detects that packets sent out on the port loop back to the Switch.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
loopguard Enables the loopguard feature on the port(s). You have to C 13
enable loopguard on the Switch as well. The Switch shuts
down a port if the Switch detects that packets sent out on
the port loop back to the Switch.
193
47.2 Command Examples
This example enables loopguard on ports 1-3.
sysname# configure
sysname(config)# loopguard
sysname(config)# interface port-channel 1-3
sysname(config-interface)# loopguard
sysname(config-interface)# exit
sysname(config)# exit
sysname# show loopguard
LoopGuard Status: Enable
194
Chapter 48 MAC Address Commands
C H A P T E R 48
MAC Address Commands
Use these commands to look at the MAC address table and to configure MAC address learning. The
Switch uses the MAC address table to determine how to forward frames.
show mac address-table all Displays MAC address table. You can sort by MAC E 3
[<sort>] address, VID or port.
show mac address-table vlan Displays the MAC address table for the specified VLAN(s). E 3
<vlan-list> [<sort>] Optionally, sorted by MAC, Port or VID.
195
Table 136 mac, mac-aging-time, and mac-flush Command Summary (continued)
COMMAND DESCRIPTION M P
mac-transfer dynamic-to-forward Displays and changes a dynamically learned MAC C 13
mac <mac-addr> address entry into a MAC forwarding entry.
196
Chapter 49 MAC Authentication Commands
C H A P T E R 49
MAC Authentication
Commands
Use these commands to configure MAC authentication on the Switch.
Note: You also need to configure a RADIUS server (see Chapter 70 on page 261).
See also Chapter 32 on page 118 for IEEE 802.1x port authentication commands and Chapter 64 on
page 241 for port security commands.
mac-authentication nameprefix Sets the prefix appended to the MAC address before it is C 13
<name-string> sent to the RADIUS server for authentication. The prefix can
be up to 32 printable ASCII characters.
mac-authentication password Sets the password sent to the RADIUS server for clients using C 13
<name-string> MAC authentication. The password can be up to 32
printable ASCII characters.
mac-authentication timeout <1- Specifies the amount of time before the Switch allows a C 13
3000> client MAC address that fails authentication to try and
authenticate again.
197
Table 138 mac-authentication Command Summary (continued)
COMMAND DESCRIPTION M P
no mac-authentication Disables MAC authentication on the Switch. C 13
no mac-authentication timeout Sets the MAC address entries learned via MAC C 13
authentication to never age out.
interface port-channel <port- Enables a port or a list of ports for configuration. C 13
list>
mac-authentication Enables MAC authentication via a RADIUS server on the C 13
port(s).
no mac-authentication Disables MAC authentication via a RADIUS server on the C 13
port(s).
mac-authentication trusted- Sets the clients in the specified VLAN(s) to access the C 13
vlan <vlan-list> port(s) and the connected networks without MAC
authentication.
no mac-authentication Removes the trusted VLAN settings. C 13
trusted-vlan <vlan-list>
sysname(config)# mac-authentication
sysname(config)# mac-authentication nameprefix clientName
sysname(config)# mac-authentication password Lech89
sysname(config)# interface port-channel 1-5
sysname(config-interface)# mac-authentication
sysname(config-interface)# exit
sysname(config)# exit
sysname# show mac-authentication
NamePrefix: clientName
Password: Lech89
Update Time: None
Deny Number: 0
198
Chapter 50 MAC-based VLAN
C H A P T E R 50
MAC-based VLAN
Use these commands to bind a client source MAC address to a VLAN on the Switch.
If an entry is found, the corresponding VLAN ID is assigned to the packet. The assigned VLAN ID is verified
against the VLAN table. If the VLAN is valid, ingress processing on the packet continues; otherwise, the
packet is dropped.
This feature allows users to change ports without having to reconfigure the VLAN, which allows better
mobility. You can assign priority to the MAC-based VLAN and define a MAC to VLAN mapping table by
entering a specified source MAC address in the MAC-based VLAN using a command. You can also
delete a MAC-based VLAN entry using a command described below.
199
50.3 Command Example: add source MAC address
This example adds a binding source MAC address to a MAC-based VLAN with MAC address
00:11:22:33:44:55, VLAN ID number 3 and priority level 6..
200
C H A P T E R 51
MAC Filter Commands
Use these commands to filter traffic going through the Switch based on the MAC addresses and VLAN
group (ID).
Note: Use the running configuration commands to look at the current MAC filter settings. See
Chapter 74 on page 274.
• Some models allow you to specify a filter rule and discard all packets with the specified MAC address
(source or destination) and VID.
• Other models allow you to choose whether you want to discard traffic originating from the specified
MAC address and VID (src), sent to the specified MAC address (dst) or both.
See Section 51.2 on page 202 and Section 51.3 on page 202 for examples.
201
Chapter 51 MAC Filter Commands
202
C H A P T E R 52
MAC Forward Commands
Use these commands to configure static MAC address forwarding.
Note: Use the mac commands to look at the current mac-forward settings. See Chapter 48 on
page 195.
203
Chapter 53 MAC Pinning Commands
C H A P T E R 53
MAC Pinning Commands
Use these commands to configure MAC pinning to set a port or multiple ports to have priority over other
ports in MAC address learning. That means when a MAC address (and VLAN ID) is learned on a MAC-
pinning-enabled port, the MAC address will not be learned on any other port until the aging time for the
dynamically learned MAC address in the table expires.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
mac-pinning Enables MAC pinning on the specified port(s). C 13
204
Chapter 53 MAC Pinning Commands
Port Active
---- --------
1 No
2 No
3 Yes
4 No
5 No
6 No
7 No
8 No
9 No
10 No
11 No
12 No
13 No
14 No
15 No
16 No
17 No
18 No
19 No
20 No
21 No
22 No
23 No
24 No
25 No
26 No
27 No
28 No
sysname#
205
Chapter 54 Mirror Commands
C H A P T E R 54
Mirror Commands
Use these commands to copy a traffic flow for one or more ports to a monitor port (the port you copy
the traffic to) so that you can examine the traffic on the monitor port without interference.
In local port mirroring, the mirroring ports (through which traffic you copy passes) and the monitor port
are on the same device.
In remote port mirroring (RMirror), the mirroring ports and monitor port can be on different devices in a
network. You can use it to monitor multiple switches across your network. The traffic from the source
device’s mirroring port(s) is sent to a reflector port for VLAN tagging and copied to the connected
port(s). Traffic are then carried over the specified remote port mirroring (RMirror) VLAN and sent to the
destination device’s monitor port through the connected ports that connect to other switches.
Single-Destination RMirror
If the mirrored traffic is forwarded to one single destination switch, you can disable the reflector port. The
Switch adds RMirror VLAN tag and forwards mirrored traffic from the mirroring port to the connected
port directly.
Multi-Destination RMirror
If you configure more than one connected port on the source switch to forward the mirrored traffic to
multiple destination switches, you must enable a reflector port on the source switch.
Note: Use the running configuration commands to look at the current mirror settings. See
Chapter 74 on page 274.
mirror-port <port-num> Specifies the monitor port (the port to which traffic flow is C 13
copied) for port mirroring.
no mirror-port Disables port mirroring on the Switch. C 13
206
Table 145 mirror Command Summary (continued)
COMMAND DESCRIPTION M P
no mirror-port <port-num> Removes the specified monitor port. C 13
207
Chapter 54 Mirror Commands
destination monitor-port Sets the port to which you copy the traffic in order to examine it C 13
<port-num> in more detail without interfering with the traffic flow on the
<untagged|tagged> original port(s). You can also set whether to add the RMirror
VLAN tag to mirrored traffic on the monitor port.
no destination monitor-port Removes the destination monitor port from this RMirror VLAN. C 13
source 8021p-priority <0 - Sets the priority of the mirrored traffic in this VLAN. C 13
7>
source mirror-port <port- Sets the port(s) on which traffic is mirrored and the traffic flow C 13
list> dir to be copied to the monitor port when the Switch is the source
<ingress|egress|both> device in remote port mirroring.
no source mirror-port <port- Sets the Switch to not mirror any traffic on the specified port(s). C 13
list>
no source mirror-port <port- Sets the Switch to not mirror outgoing (egress) traffic on the C 13
list> dir egress specified port(s).
no source mirror-port <port- Sets the Switch to not mirror incoming (ingress) traffic on the C 13
list> dir ingress specified port(s).
source reflector-port <port- Sets the port that adds the RMirror VLAN tag to all mirrored C 13
num> traffic and forwards traffic to the connected port(s) in the same
RMirror VLAN.
no source reflector-port Removes the source reflector port. C 13
show rmirror vlan Displays all RMirror VLANs settings on the Switch. E 3
show rmirror vlan <vlan-id> Displays the specified RMirror VLAN settings. E 3
sysname(config)# mirror-port
sysname(config)# mirror-port 3
sysname(config)# interface port-channel 1,4-6
sysname(config-interface)# mirror
sysname(config-interface)# mirror dir egress
208
Chapter 54 Mirror Commands
This example displays the mirror settings of the Switch after you configured in the example above.
This example creates an RMirror VLAN with a VLAN ID of 200 on the Switch, sets port 6 as the reflector
port and sets the priority of mirrored traffic to 3 in this RMirror VLAN when the Switch is the source device.
This example also specifies the ports (4 and 5) on which traffic will be mirrored and shows the RMirror
VLAN settings.
sysname# configure
sysname(config)# rmirror vlan 200
sysname(config-rmirror)# source reflector-port 6
sysname(config-rmirror)# source reflector-port
sysname(config-rmirror)# source 8021p-priority 3
sysname(config-rmirror)# source mirror-port 4,5
sysname(config-rmirror)# exit
sysname(config)# exit
sysname# show rmirror vlan 200
RMirror VLAN:200 Active=Yes
----------------------------------------
Source
802.1p priority :3
Mirror-port :
Ingress :
Egress :
Both :4-5
Reflector-port
Active :Yes
Port :6
Destination
Monitor-port :
Connected-port :
sysname#
209
C H A P T E R 55
MRSTP Commands
Use these commands to configure MRSTP on the Switch.
See Chapter 79 on page 292 for information on RSTP commands and Chapter 56 on page 213 for
information on MSTP commands.
mrstp <tree-index> priority <0- Sets the bridge priority of the Switch for the specified C 13
61440> MRSTP configuration.
mrstp <tree-index> hello-time <1- Sets the Hello Time, Maximum Age and Forward Delay C 13
10> maximum-age <6-40> forward- values on the Switch for the specified MRSTP
delay <4-30> configuration.
210
Chapter 55 MRSTP Commands
no mrstp interface <port-list> Disables the MRSTP assignment from the specified C 13
port(s).
211
Chapter 55 MRSTP Commands
In this example, we enable MRSTP on ports 21-24. Port 24 is connected to the host while ports 21-23 are
connected to another switch.
sysname(config)# configure
sysname(config)# spanning-tree mode MRSTP
sysname(config)# mrstp 1
sysname(config)# mrstp interface 21-24
sysname(config)# no mrstp interface 21-23 edge-port
212
Chapter 56 MSTP Commands
C H A P T E R 56
MSTP Commands
Use these commands to configure Multiple Spanning Tree Protocol (MSTP) as defined in IEEE 802.1s.
spanning-tree mode Specifies the STP mode you want to implement on the C 13
<RSTP|MRSTP|MSTP> Switch.
213
Chapter 56 MSTP Commands
no mstp instance <number> Disables the specified MSTP instance on the Switch. C 13
mstp instance <number> priority <0- Specifies the bridge priority of the instance. C 13
61440>
priority: Must be a multiple of 4096.
mstp instance <number> vlan <vlan- Specifies the VLANs that belongs to the instance. C 13
list>
no mstp instance <number> vlan <1- Disables the assignment of specific VLANs from an C 13
4094> MST instance.
mstp instance <number> interface Specifies the ports you want to participate in this MST C 13
port-channel <port-list> instance.
no mstp instance <number> interface Disables the assignment of specific ports from an MST C 13
port-channel <port-list> instance.
mstp instance <number> interface Specifies the cost of transmitting a frame to a LAN C 13
port-channel <port-list> path-cost through the port(s). It is recommended you assign it
<1-65535> according to the speed of the bridge.
mstp instance <number> interface Sets the priority for the specified ports. Priority decides C 13
port-channel <port-list> priority which port should be disabled when more than one
<0-255> port forms a loop in a Switch. Ports with a higher
priority numeric value are disabled first.
214
56.2 Command Examples
This example shows the current MSTP configuration.
This field displays the 16-octet signature that is included in an MSTP BPDU. This field
displays the digest when MSTP is activated on the system.
msti This field displays the MSTI ID.
vlans mapped This field displays which VLANs are mapped to an MSTI.
215
This example shows the current CIST configuration (MSTP instance 0).
(p)CIST_RRootID: 8000-001349aefb7a
(q)CIST_RRootPathCost: 0
216
Chapter 56 MSTP Commands
This example adds the Switch to the MST region MSTRegionNorth. MSTRegionNorth is on revision number
1. In MSTRegionNorth, VLAN 2 is in MST instance 1, and VLAN 3 is in MST instance 2.
sysname# configure
sysname(config)# mstp
sysname(config)# mstp configuration-name MSTRegionNorth
sysname(config)# mstp revision 1
sysname(config)# mstp instance 1 vlan 2
sysname(config)# mstp instance 2 vlan 3
sysname(config)# exit
217
Chapter 57 Multiple Login Commands
C H A P T E R 57
Multiple Login Commands
Use these commands to configure multiple administrator logins on the Switch.
218
Chapter 58 MVR Commands
C H A P T E R 58
MVR Commands
Use these commands to configure Multicast VLAN Registration (MVR).
show mvr <vlan-id> Shows the detailed MVR status and MVR group E 3
configuration for a VLAN.
mvr <vlan-id> Enters config-mvr mode for the specified MVR (multicast C 13
VLAN registration). Creates the MVR, if necessary.
8021p-priority <0-7> Sets the IEEE 802.1p priority of outgoing MVR packets. C 13
group <name> start-address Sets the multicast group range for the MVR. C 13
<ip> end-address <ip>
name: 1-32 English keyboard characters
no group Disables all MVR group settings. C 13
219
Chapter 58 MVR Commands
1 Enters MVR mode. This creates a multicast VLAN with the name multivlan and the VLAN ID of 3.
5 Configures MVR multicast group addresses 224.0.0.1 through 224.0.0.255 by the name of ipgroup.
sysname(config)# mvr 3
sysname(config-mvr)# name multivlan
sysname(config-mvr)# source-port 2,3,5
sysname(config-mvr)# receiver-port 6-8
sysname(config-mvr)# mode dynamic
sysname(config-mvr)# group ipgroup start-address 224.0.0.1 end-address
--> 224.0.0.255
sysname(config-mvr)# exit
220
P ART IV
Reference N-S
OSPF Commands (223)
RMON (267)
sFlow (277)
221
Smart Isolation Commands (279)
222
C H A P T E R 59
OSPF Commands
This chapter explains how to use commands to configure the Open Shortest Path First (OSPF) routing
protocol on the Switch.
show router ospf network Displays OSPF network (or interface) settings. E 3
223
Chapter 59 OSPF Commands
no ip ospf cost <1-65535> Resets the OSPF cost in the routing domain C 13
to default.
ip ospf retransmit-interval <1-65535> Sets the OSPF retransmission interval in this C 13
routing domain.
ip ospf transmit-delay <1-65535> Sets the OSPF transmission delay in this C 13
routing domain.
ip ospf dead-interval <1-65535> Sets the OSPF dead interval in this routing C 13
domain.
ip ospf hello-interval <1-65535> Sets the OSPF hello interval in this routing C 13
domain.
ip ospf message-digest-key <key> Sets the OSPF authentication key in this C 13
routing domain.
no ip ospf message-digest-key <key> Disables the routing domain from using a C 13
security key in OSPF.
ip ospf priority <0-255> Sets the OSPF priority for the interface. C 13
Setting this value to 0 means that this router
will not participate in router elections.
no ip ospf priority <0-255> Resets the OSPF priority for the interface. C 13
area <area-id> authentication message- Enables MD5 authentication for the area. C 13
digest
no area <area-id> authentication Sets the area to use no authentication C 13
(None).
area <area-id> default-cost <0- Sets the cost to the area. C 13
16777215>
no area <area-id> default-cost Sets the area to use the default cost (15). C 13
area <area-id> name <name> Sets a descriptive name for the area for C 13
identification purposes.
area <area-id> stub Enables and sets the area as a stub area. C 13
area <area-id> stub no-summary Sets the stub area not to send any LSA (Link C 13
State Advertisement).
no area <area-id> stub no-summary Sets the stub area to send LSAs (Link State C 13
Advertisements).
area <area-id> nssa Enables and sets the area as a not-so-stubby C 13
area.
no area <area-id> nssa Disables not-so-stubby network settings in C 13
the area.
224
Chapter 59 OSPF Commands
no area <area-id> virtual-link Deletes the virtual link from the area. C 13
<router-id>
area <area-id> virtual-link <router- Enables simple authentication and sets the C 13
id> authentication-key <key> authentication key for the specified virtual
link in the area.
no area <area-id> virtual-link Resets the authentication settings on this C 13
<router-id> authentication-key virtual link.
area <area-id> virtual-link <router- Sets the virtual link to use the same C 13
Id> authentication-same-as-area authentication method as the area.
area <area-id> virtual-link <router- Sets a descriptive name for the virtual link for C 13
id> name <name> identification purposes.
area <area-id> virtual-link <router- Sets the retransmission interval for the virtual C 13
id> retransmit-interval <1-65535> link in the area.
area <area-id> virtual-link <router- Sets the transmission delay for the virtual link C 13
id> transmit-delay <1-65535> in the area.
area <area-id> virtual-link <router- Sets the dead interval for the virtual link in C 13
id> dead-interval <1-65535> the area.
area <area-id> virtual-link <router- Sets the hello interval for the virtual link in the C 13
id> hello-interval <1-65535> area.
225
Chapter 59 OSPF Commands
redistribute rip metric-type <1|2> Sets the Switch to learn RIP routing C 13
metric <0-16777215> information which will use the specified
metric information.
redistribute rip Sets the Switch to redistribute RIP routing C 13
information.
226
Chapter 59 OSPF Commands
Area 1
Area 0
Backbone
IP: 172.16.1.1
A
This example enables OSPF on the Switch, sets the router ID to 172.16.1.1, configures an OSPF area ID as
0.0.0.0 (backbone) and enables simple authentication.
227
Chapter 59 OSPF Commands
This example configures an OSPF interface for the 172.16.1.1/24 network and specifies to use simple
authentication with the key 1234abcd. The priority for the Switch is also set to 1, as this router should
participate in router elections.
In this example, the Switch (Z) is a redistributor between a RIP network and an OSPF network. It
summarizes 4 routing entries 192.168.8.0/24 ~ 192.168.11.0/24 (learned from RIP router A) into 192.168.8.0/
22 and then sends it to OSPF router B.
RIP OSPF
IP: 172.16.1.1
A Z B
Redistributor
192.168.8.0/24
192.168.9.0/24 192.168.8.0/22
192.168.10.0/24
192.168.11.0/24
228
Chapter 59 OSPF Commands
This example shows you how to enable the redistribution for RIP protocol and then show all redistribution
entries.
sysname# config
sysname(config)# router ospf 172.16.1.1
sysname(config-ospf)# redistribute rip metric-type 1 metric 123
sysname(config-ospf)# exit
sysname(config)# exit
sysname# show ip ospf database
From the example above, the third octet of all the four network IP addresses is 00001000, 00001001,
00001010, 000001011 respectively. The first 4 digits (000010) are the common part among these IP
addresses. So 192.168.8.0/22 can be used to represent all of the 4 networks. The following example
shows you how to configure the OSPF summary address and then show all redistribution entries.
sysname# config
sysname(config)# router ospf 172.16.1.1
sysname(config-ospf)# summary-address 192.168.8.0 255.255.252.0
sysname(config-ospf)# exit
sysname(config)# exit
sysname# show ip ospf database
229
C H A P T E R 60
Password Commands
Use these commands to configure passwords for specific privilege levels on the Switch.
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used in password
encryption. To encrypt the password, use the password
encryption command.
230
Chapter 60 Password Commands
231
C H A P T E R 61
PoE Commands
Use these commands to configure Power over Ethernet (PoE). These are applicable for PoE models only.
no pwr interface <port-list> max- Removes the maximum power settings for the C 13
power specified port(s). The PD(s) that is connected to the
port(s) then can use power up to the Switch’s total
power budget.
pwr interface <port-list> priority Sets the PD priority on a port to allow the Switch to C 13
<critical|high|low> allocate power to higher priority ports when the
remaining power is less than the consumed power.
232
Chapter 61 PoE Commands
sysname# configure
sysname(config)# pwr interface 1-4
sysname(config)# pwr usagethreshold 25
sysname(config)# pwr mibtrap
sysname(config)# exit
This example sets the maximum amount of power allowed for port 2 to 7500 mW.
sysname# configure
sysname(config)# pwr interface 2 max-power 7500
sysname(config)# exit
This example shows the current status and configuration of Power over Ethernet.
GS2200# sh pwr
PoE Mode : Classification mode
Total Power:220.0(W)
Consuming Power:0.0(W)
Allocated Power:0.0 (W)
Remaining Power:220.0(W)
Averaged Junction Temperature: 38 (c), 98 (f).
Port State PD Class Priority Consumption (mW) MaxPower(mW)
---- ------ --- ----- -------- ---------------- ------------
1 Enable off 0 Low 0 0
2 Enable off 0 Low 0 7500
3 Enable off 0 Low 0 0
4 Enable off 0 Low 0 0
5 Enable off 0 Low 0 0
6 Enable off 0 Low 0 0
7 Enable off 0 Low 0 0
8 Enable off 0 Low 0 0
9 Enable off 0 Low 0 0
10 Enable off 0 Low 0 0
11 Enable off 0 Low 0 0
12 Enable off 0 Low 0 0
13 Enable off 0 Low 0 0
14 Enable off 0 Low 0 0
15 Enable off 0 Low 0 0
16 Enable off 0 Low 0 0
17 Enable off 0 Low 0 0
18 Enable off 0 Low 0 0
19 Enable off 0 Low 0 0
20 Enable off 0 Low 0 0
21 Enable off 0 Low 0 0
22 Enable off 0 Low 0 0
23 Enable off 0 Low 0 0
24 Enable off 0 Low 0 0
233
Chapter 61 PoE Commands
0: 0.44~12.95 W
1: 0.44~3.84 W
2: 3.84~6.49 W
3: 6.49~12.95 W
Priority When the total power requested by the PDs exceeds the total PoE power budget on
the Switch, the Switch uses the PD priority to provide power to ports with higher priority.
Consumption (mW) This field displays the amount of power the Switch is currently supplying to the PoE-
enabled devices connected to this port.
MaxPower(mW) This field displays the maximum amount of power the Switch can supply to the PoE-
enabled devices connected to this port.
Total Power This field displays the total power the Switch can provide to PoE-enabled devices.
Consuming Power This field displays the amount of power the Switch is currently supplying to the PoE-
enabled devices.
Allocated Power This field displays the total amount of power the Switch has reserved for PoE after
negotiating with the PoE device(s).
Note: If the management mode is set to Consumption, this field shows NA.
Remaining Power This field displays the amount of power the Switch can still provide for PoE.
234
C H A P T E R 62
Policy Commands
Use these commands to configure policies based on the classification of traffic flows. A classifier
distinguishes traffic into flows based on the configured criteria. A policy rule defines the treatment of a
traffic flow.
Note: Configure classifiers before you configure policies. See Chapter 14 on page 58 for more
information on classifiers.
235
Chapter 62 Policy Commands
236
Chapter 62 Policy Commands
237
Chapter 62 Policy Commands
This example creates a policy (Policy1) for the traffic flow identified via classifier Class1 (see the classifier
example in Chapter 14 on page 58). This policy forwards Class1 packets to port 8.
238
C H A P T E R 63
Policy Route Commands
Use these commands to configure policy route to override the default routing behavior and alter the
packet forwarding. Policy-based routing is based on the classification of traffic flows and applied to
incoming packets prior to the normal routing. A classifier distinguishes traffic into flows based on the
configured criteria.
Note: Configure layer-3 classifiers before you configure policy routing. See Chapter 14 on
page 58 for more information on classifiers.
show ip policy-route <name> Displays the specified policy routing profile settings. E 3
ip policy-route <name> sequence Configures a policy routing rule in the specified profile. C 13
<number> <permit|deny>
permit|deny: turns on or off this policy routing rule.
classifier <classifier> next-hop
<ip-addr> classifier: sets the name of active layer 3 classifier to
which this rule applies.
239
Chapter 63 Policy Route Commands
sysname# configure
sysname(config)# classifier Class-1 source-ip 192.168.2.13 mask-bits 24
sysname(config)# ip policy-route Profile-1 sequence 5 permit classifier
Class-1 next-hop 10.1.1.99
sysname(config)# exit
sysname# show ip policy-route
ActiveProfile Name Sequence State Classifier
-----------------------------------------------------------------
Yes Profile-1 5 permit Class-1
240
C H A P T E R 64
Port Security Commands
Use these commands to allow only packets with dynamically learned MAC addresses and/or
configured static MAC addresses to pass through a port on the Switch. For maximum port security,
enable port security, disable MAC address learning and configure static MAC address(es) for a port.
Note: It is not recommended you disable both port security and MAC address learning
because this will result in many broadcasts.
show port-security <port-list> Displays port security settings on the specified port(s). E 3
port-security <port-list> learn Disables MAC address learning on the specified port(s). C 13
inactive
no port-security <port-list> Enables MAC address learning on the specified ports. C 13
learn inactive
port-security <port-list> Limits the number of (dynamic) MAC addresses that may C 13
address-limit <number> be learned on the specified port(s).
port-security <port-list> MAC- Stops MAC address learning and enables port security on C 13
freeze the port(s).
241
Chapter 64 Port Security Commands
sysname# configure
sysname(config)# port-security
sysname(config)# port-security 1
sysname(config)# no port-security 1 learn inactive
sysname(config)# port-security 1 address-limit 5
sysname(config)# exit
sysname# show port-security 1
Port Security Active : YES
Port Active Address Learning Limited Number of Learned MAC Address
01 Y Y 5
242
C H A P T E R 65
Port-based VLAN
Commands
Use these commands to configure port-based VLAN.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
egress set <port-list> Sets the outgoing traffic port list for a port-based VLAN. C 13
no egress set <port-list> Removes the specified ports from the outgoing traffic port C 13
list.
243
C H A P T E R 66
PPPoE IA Commands
Use these commands if you want the Switch to add a vendor-specific tag to PADI (PPPoE Active
Discovery Initiation) and PADR (PPPoE Active Discovery Request) packets from PPPoE clients. This tag
gives a PPPoE termination server additional information (such as the port number, VLAN ID, and MAC
address) that the server can use to identify and authenticate a PPPoE client.
• If a PADO (PPPoE Active Discovery Offer), PADS (PPPoE Active Discovery Session-confirmation), or
PADT (PPPoE Active Discovery Terminate) packet is sent from a PPPoE server and received on a
trusted port, the Switch forwards it to all other ports.
• If a PADI or PADR packet is sent from a PPPoE client but received on a trusted port, the Switch
forwards it to other trusted port(s).
Note: The Switch will drop all PPPoE discovery packets if you enable the PPPoE intermediate
agent and there are no trusted ports.
• If a PADI, PADR, or PADT packet is sent from a PPPoE client and received on an untrusted port, the
Switch adds a vendor-specific tag to the packet and then forwards it to the trusted port(s).
• The Switch discards PADO and PADS packets which are sent from a PPPoE server but received on an
untrusted port.
244
Chapter 66 PPPoE IA Commands
clear pppoe intermediate-agent Removes statistics records of PPPoE packets for the E 13
statistics vlan <vlan-list> specified VLAN(s).
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
pppoe intermediate-agent Sets the specified port(s) as PPPoE IA trusted port(s). C 13
trust
pppoe intermediate-agent Specifies a string the Switch adds into the Agent Circuit ID C 13
format-type circuit-id sub-option for PPPoE discovery packets received on this
string <string> port. Spaces are allowed.
no pppoe intermediate-agent Disables the PPPoE IA Remote ID settings for the specified C 13
format-type remote-id port(s).
no pppoe intermediate-agent Disables the PPPoE IA Circuit ID settings for the specified C 13
vlan <vlan-id> format-type port(s) on the specified VLAN(s).
circuit-id
no pppoe intermediate-agent Disables the PPPoE IA Remote ID settings for the specified C 13
vlan <vlan-id> format-type port(s) on the specified VLAN(s).
remote-id
no pppoe intermediate-agent Disables PPPoE IA globally. C 13
no pppoe intermediate-agent vlan Disables the PPPoE IA Remote ID settings for the specified C 13
<vlan-list> remote-id VLAN(s).
245
Chapter 66 PPPoE IA Commands
pppoe intermediate-agent format- Sets the Switch to add the Switch’s host name to the C 13
type identifier-string hostname identifier-string.
pppoe intermediate-agent format- Sets the access-node-identifier string. C 13
type access-node-identifier
string: Enter up to 20 alphanumeric characters to identify
string <string> the PPPoE intermediate agent. Hyphens (-) and spaces are
also allowed. The default is the Switch’s host name.
pppoe intermediate-agent format- This command sets the following: C 13
type identifier-string string
• a string that the Switch adds in the Agent Circuit ID
<string> option sub-option
<s|p|v|sp|sv|pv|spv> delimiter • the variables to generate and add in the Agent Circuit
<#|.|,|;|/| |> ID sub-option,
• a delimiter to separate the identifier-string, slot ID, port
number and/or VLAN ID from each other.
string: You can up to 63 printable characters. Spaces
are allowed.
pppoe intermediate-agent vlan Enables the PPPoE IA Remote ID settings for the specified C 13
<vlan-list> remote-id VLAN(s).
show pppoe intermediate-agent Shows the statistics of PPPoE packets handled (received, E 13
statistic forwarded and dropped) by PPPoE IA on the Switch.
show pppoe intermediate-agent Shows the statistics of PPPoE packets for the specified E 13
statistic vlan <vlan-list> VLAN(s).
246
Chapter 66 PPPoE IA Commands
sysname# configure
sysname(config)# pppoe intermediate-agent
sysname(config)# no pppoe intermediate-agent
sysname# configure
sysname(config)# pppoe intermediate-agent vlan 2
sysname(config)# pppoe intermediate-agent vlan 5,9,11
sysname(config)# pppoe intermediate-agent vlan 1 circuit-id
sysname(config)# pppoe intermediate-agent vlan 3,6 remote-id
sysname(config)# no pppoe intermediate-agent vlan 2-10
sysname(config)# no pppoe intermediate-agent vlan 1 circuit-id
sysname(config)# no pppoe intermediate-agent vlan 3,6 remote-id
sysname# configure
sysname(config)# interface port-channel 3
sysname(config-interface)# pppoe intermediate-agent trust
sysname(config-interface)# no pppoe intermediate-agent trust
This example is more advanced. It assumes a PPPoE IA client is connected to port 2 and a PPPoE IA
server is connected to port 5. If we want PPPoE IA to work, port 2 and port 5 must be belong to the some
VLAN and the PPPoE IA must be enabled globally and in this corresponding VLAN. We also need to set
port 5 as trust port. Then the last thing we need to do is to decide which sub-options the received PADI,
PADR, or PADT packet needs to carry. Here, assume both circuit-id and remote-id should be carried.
sysname# configure
sysname(config)# vlan 2
sysname(config-vlan)# fixed 2,5
sysname(config-vlan)# untagged 2,5
sysname(config-vlan)# exit
sysname(config)# pppoe intermediate-agent
sysname(config)# pppoe intermediate-agent vlan 2
sysname(config)# interface port-channel 2
sysname(config-interface)# pvid 2
sysname(config-interface)# exit
sysname(config)# interface port-channel 5
sysname(config-interface)# pvid 2
sysname(config-interface)# pppoe intermediate-agent trust
sysname(config-interface)# exit
sysname(config)# pppoe intermediate-agent vlan 2 circuit-id
sysname(config)# pppoe intermediate-agent vlan 2 remote-id
247
Chapter 66 PPPoE IA Commands
sysname# configure
sysname(config)# pppoe intermediate-agent
sysname(config)# pppoe intermediate-agent format-type access-node-
identifier string test
sysname(config)# pppoe intermediate-agent vlan 1
sysname(config)# pppoe intermediate-agent vlan 1 circuit-id
sysname(config)# pppoe intermediate-agent vlan 1 remote-id
sysname(config)# interface port-channel 5
sysname(config-interface)# pppoe intermediate-agent trust
sysname(config-interface)#exit
This is a variation of the previous one and uses the same initial setup (client on port 2, server on port 5).
sysname# configure
sysname(config)# pppoe intermediate-agent
sysname(config)# pppoe intermediate-agent format-type identifier-string
string PrivateTest option spv delimiter /
sysname(config)# pppoe intermediate-agent vlan 1
sysname(config)# pppoe intermediate-agent vlan 1 circuit-id
sysname(config)# pppoe intermediate-agent vlan 1 remote-id
sysname(config)# interface port-channel 5
sysname(config-interface)# pppoe intermediate-agent trust
sysname(config-interface)#exit
Because we didn't assign the appended string for remote-id in examples 1 and 2, the Switch appends a
string to carry the client's MAC address as default. If we want the remote-id to carry the
"ForPortVlanRemoteIdTest" information for a specific VLAN on a port, we can add the following
configuration:
sysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# pppoe intermediate-agent vlan 1 format-type
remote-id string ForPortVlanRemoteIdTest
sysname(config-interface)# exit
Similarly, we can let the circuit-id carry the information which we configure:
sysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# pppoe intermediate-agent vlan 1 format-type
circuit-id string ForPortVlanCircuitIdTest
sysname(config-interface)# exit
248
Chapter 66 PPPoE IA Commands
Additionally, we can let the circuit-id or remote-id carry the user-configured information from a specific
port whose priority is less than the specific VLAN on a port setting:
sysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# pppoe intermediate-agent format-type circuit-
id string ForPortCircuitIdTest
sysname(config-interface)# pppoe intermediate-agent format-type remote-
id string ForPortRemoteIdTest
sysname(config-interface)# exit
Since we didn't assign the appended string for remote-id in example 1 and 2, it will carry the client's
MAC address as default.
249
C H A P T E R 67
Private VLAN Commands
This chapter explains how to use commands to configure (legacy) Private VLANs (PVLAN) on the Switch.
2 6 10
VLAN 123
Isolated ports: 2 ~ 6
Promiscuous port: 10
Note: If you change the VLAN settings, make sure you keep at least one port in the
promiscuous port list for a VLAN with private VLAN enabled. Otherwise, this VLAN is
blocked from the whole network.
250
Chapter 67 Private VLAN Commands
sysname# configure
sysname(config)# private-vlan name pvlan-123 vlan 123 promiscuous-port 7-8
sysname(config)# exit
sysname# show private-vlan
Private VLAN: 123 Active: Yes
Name Promiscuous Port
------------ --------------------------
pvlan-123 7-8
sysname#
This example sets a private VLAN rule (pvlan-111) that applies to VLAN 111. Ports 1, 2 and 24 belong to
VLAN 111. Ports 1 and 2 are added to the isolated port list automatically and cannot communicate with
each other. Port 24 is the uplink port and also the promiscuous port in this VLAN. The isolated ports in
251
Chapter 67 Private VLAN Commands
VLAN 111 can send and receive traffic from the uplink port 24. This example also shows all private VLAN
rules configured on the Switch.
sysname# configure
sysname(config)# private-vlan name pvlan-111 vlan 111
sysname(config)# exit
sysname# show private-vlan
Private VLAN: 111 Active: Yes
Name Promiscuous Port
------------ --------------------------
pvlan-111 24
sysname#
• Primary: Ports in a Primary VLAN are promiscuous and they can communicate with all promiscuous
ports in the same primary VLAN, and all ports in associated community and isolated VLANs. They
cannot communicate with ports in different primary VLANs.
• Community: Ports in a Community VLAN can communicate with promiscuous ports in an associated
Primary VLAN and other community ports in the same Community VLAN. They cannot communicate
with ports in Isolated VLANs, non-associated Primary VLAN promiscuous ports nor community ports in
different Community VLANs.
• Isolated: Ports in an Isolated VLAN can communicate with promiscuous ports in an associated Primary
VLAN only. They cannot communicate with other isolated ports in the same Isolated VLAN, non-
associated Primary VLAN promiscuous ports nor any community ports.
Tagged private VLANs can span switches but trunking ports must be VLAN-trunking ports.
no private-vlan association Removes all association between the primary VLAN and C 13
secondary VLANs.
252
Chapter 67 Private VLAN Commands
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
private-vlan mode Configures PVLAN on a port. Set the associated PVLAN ID, C 13
<promiscuous | isolated | type of private VLAN and specify whether outgoing frames
community> association from this port are tagged or not.
<vlan-id> dot1q <tagged |
untagged>
no private-vlan mode Removes PVLAN mode configuration. C 13
show vlan private-vlan Displays the settings and status of all private VLAN rules on E 3
the Switch.
show vlan private-vlan <vlan-id> Displays the settings and status of the specified private E 3
VLAN rule on the Switch.
253
Chapter 67 Private VLAN Commands
Primary PVLAN 100 is then mapped to port 2 on the Switch and outgoing frames from port 2 will be
tagged.
sysname# configure
sysname(config)# vlan 100
sysname(config-vlan)# private-vlan primary
sysname(config-vlan)# exit
sysname(config)# vlan 101
sysname(config-vlan)# private-vlan community
sysname(config-vlan)# exit
sysname(config)# vlan 102
sysname(config-vlan)# private-vlan isolated
sysname(config-vlan)# exit
sysname(config)# vlan 100
sysname(config-vlan)# private-vlan association 101,102
sysname(config-vlan)# exit
sysname(config)# exit
sysname# show vlan private-vlan
Private Vlan:
Primary Secondary Type Ports
------- --------- ---------- --------------------
100 Primary
100 102 Isolated
100 101 Community
sysname#
sysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# private-vlan mode promiscuous association 100-->
dot1q tagged
sysname(config-interface)# exit
sysname(config)#
254
C H A P T E R 68
Protocol-based VLAN
Commands
Use these commands to configure protocol based VLANs on the Switch.
See also Chapter 83 on page 303 for subnet-based VLAN commands and Chapter 92 on page 321 for
VLAN commands.
interface port-channel <port- Enters subcommand mode for configuring the specified C 13
list> ports.
255
Chapter 68 Protocol-based VLAN Commands
256
C H A P T E R 69
Queuing Commands
Use queuing commands to help solve performance degradation when there is network congestion.
• Some models allow you to select a queuing method on a port-by-port basis. For example, port 1 can
use Strictly Priority Queuing and ports 2-8 can use Weighted Round Robin.
• Other models allow you to specify one queuing method for all the ports at once.
Note: Check your User’s Guide for queuing algorithms supported by your model.
• Strictly Priority Queuing (SPQ) - services queues based on priority only. As traffic comes into the Switch,
traffic on the highest priority queue, Q7 is transmitted first. When that queue empties, traffic on the
next highest-priority queue, Q6 is transmitted until Q6 empties, and then traffic is transmitted on Q5
and so on. If higher priority queues never empty, then traffic on lower priority queues never gets sent.
Note: Switch models which have only 4 queues, support a limited version of SPQ. The highest
level queue is serviced using SPQ and the remaining queues use WRR queuing.
• Weighted Fair Queuing (WFQ)- guarantees each queue's minimum bandwidth based on its
bandwidth weight (portion) when there is traffic congestion. WFQ is activated only when a port has
more traffic than it can handle. Queues with larger weights get more guaranteed bandwidth than
queues with smaller weights. This queuing mechanism is highly efficient in that it divides any available
bandwidth across the different traffic queues. By default, the weight for Q0 is 1, for Q1 is 2, for Q2 is 3,
and so on. Guaranteed bandwidth is calculated as follows:
For example, using the default setting, Q0 on Port 1 gets a guaranteed bandwidth of:
• Weighted Round Robin Scheduling (WRR) - services queues on a rotating basis and is activated only
when a port has more traffic than it can handle. A queue is a given an amount of bandwidth based
on the queue weight value. Queues with larger weights get more service than queues with smaller
weights. This queuing mechanism is highly efficient in that it divides any available bandwidth across
the different traffic queues and returns to queues that have not yet emptied.
257
Chapter 69 Queuing Commands
• Hybrid Mode: WRR & SPQ or WFQ & SPQ - some switch models allow you to configure higher priority
queues to use SPQ and use WRR or WFQ for the lower level queues.
spq Sets the switch to use Strictly Priority Queuing (SPQ) on the C 13
specified ports.
ge-spq <q0|q1| ... |q7> Enables SPQ starting with the specified queue and C 13
subsequent higher queues on the Gigabit ports.
hybrid-spq lowest-queue Enables SPQ starting with the specified queue and C 13
<q0|q1| ... |q7> subsequent higher queues on the ports.
hybrid-spq <q0|q1|...|q7> Enables SPQ starting with the specified queue and C 13
subsequent higher queues on the ports.
no hybrid-spq Disables SPQ starting with the specified queue and C 13
subsequent higher queues on the ports.
wrr Sets the switch to use Weighted Round Robin (WRR) on the C 13
specified ports.
wfq Sets the switch to use Weighted Fair Queuing (WFQ) on the C 13
specified ports.
weight <wt1> <wt2> ... <wt8> Assigns a weight value to each physical queue on the C 13
Switch. When the Switch is using WRR or WFQ, bandwidth is
divided across different traffic queues according to their
weights. Queues with larger weights get more service than
queues with smaller weights. Weight values range: 1-15.
wrr <wt1> <wt2> ... <wt8> Assigns a weight value to each physical queue on the C 13
Switch.
258
Chapter 69 Queuing Commands
fe-spq <q0|q1| ... |q7> Enables SPQ starting with the specified queue and C 13
subsequent higher queues on the 10/100 Mbps ports.
sysname(config)# wfq
sysname(config)# interface port-channel 1-5
sysname(config-interface)# weight 1 2 3 4 12 13 14 15
259
Chapter 69 Queuing Commands
This example configures the Switch to use WRR as a queuing method but configures the Gigabit ports 9-
12 to use SPQ for queues 5, 6 and 7.
sysname(config)# wrr
sysname(config)# interface port-channel 9-12
sysname(config-interface)# ge-spq 5
260
C H A P T E R 70
RADIUS Commands
Use these commands to configure external RADIUS (Remote Authentication Dial-In User Service) servers.
radius-server host <index> <ip> Specifies the IP address of the RADIUS authentication C 14
[auth-port <socket-number>] [key server. Optionally, sets the UDP port number and shared
[cipher] <key-string>] secret.
index: 1 or 2.
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used in password
encryption. To encrypt the password, use the password
encryption command.
radius-accounting timeout <1- Specifies the RADIUS accounting server timeout value. C 13
1000>
261
Chapter 70 RADIUS Commands
index: 1 or 2.
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used in password
encryption. To encrypt the password, use the password
encryption command.
sysname# configure
sysname(config)# radius-server mode index-priority
sysname(config)# radius-server host 1 172.16.10.10
sysname(config)# radius-server host 2 172.16.10.11
sysname(config)# radius-accounting host 1 172.16.10.11
sysname(config)# exit
262
C H A P T E R 71
Remote Management
Commands
Use these commands to specify a group of one or more “trusted computers” from which an
administrator may use one or more services to manage the Switch and to decide what services you
may use to access the Switch.
no remote-management <index> Disables the specified service(s) for the specified group of C 13
service <[telnet] [ftp] [http] trusted computes.
[icmp] [snmp] [ssh] [https]>
service-control console Defines the timeout period (in minutes) for a management C 13
<timeout> session via the console port.
service-control ftp <socket- Specifies the service port for the FTP service and defines C 13
number> <timeout> the timeout period (in minutes).
263
Chapter 71 Remote Management Commands
service-control http <socket- Specifies the service port for the HTTP service and defines C 13
number> <timeout> the timeout period (in minutes).
timeout: 1-255
no service-control http Disables HTTP access to the Switch. C 13
service-control https <socket- Specifies the service port for the HTTPS service. C 13
number>
no service-control https Disables HTTPS access to the Switch. C 13
service-control ssh <socket- Specifies the service port for the SSH service. C 13
number>
no service-control ssh Disables SSH access to the Switch. C 13
service-control telnet <socket- Specifies the service port for the Telnet service and defines C 13
number> <timeout> the timeout period (in minutes).
sysname# configure
sysname(config)# remote-management 1 start-addr 172.16.37.0 end-addr
--> 172.16.37.255 service telnet ftp http icmp ssh https
sysname(config)# remote-management 2 start-addr 192.168.10.1 end-addr
--> 192.168.10.1 service snmp
sysname(config)# exit
This example disables all SNMP and ICMP access to the Switch.
sysname# configure
sysname(config)# no service-control snmp
sysname(config)# no service-control icmp
sysname(config)# exit
264
C H A P T E R 72
RIP Commands
This chapter explains how to use commands to configure the Routing Information Protocol (RIP) on the
Switch.
show ip protocols Displays the routing protocol the Switch is using and E 3
its administrative distance value.
router rip Enables and enters the RIP configuration mode on C 13
the Switch.
distance <10-255> When two different routing protocols, such as RIP C 13
and OSPF provide multiple routes to the same
destination, the Switch can use the administrative
distance of the route source to determine which
routing protocol to use and add the route to the
routing table.
265
Chapter 72 RIP Commands
ip rip direction Sets the RIP direction and version in this routing C 13
<Outgoing|Incoming|Both|None> domain.
version <v1|v2b|v2m>
show ip rip database Displays the RIP configuration settings on the C 13
Switch.
• Enables RIP.
• Enters the IP routing domain 172.16.1.1 with subnet mask 255.255.255.0.
• Sets the RIP direction in this routing domain to Both and the version to 2 with subnet broadcasting
(v2b); the Switch will send and receive RIP packets in this routing domain.
sysname(config)# router rip
sysname(config-rip)# exit
sysname(config)# interface route-domain 172.16.1.1/24
sysname(config-if)# ip rip direction Both version v2b
266
C H A P T E R 73
RMON
Both SNMP and RMON use an agent, known as a probe, which are software processes running on
network devices to collect information about network traffic and store it in a local MIB (Management
Information Base). With SNMP, a network manager has to constantly poll the agent to obtain MIB
information. The probe on the Switch communicates with the network manager via SNMP.
RMON groups contain detailed information about specific activities. The following table describes the
four RMON groups that your Switch supports.
alarm-index This is an alarm’s index number in the alarm table, between 1 and 65535.
etherstats- This is an entry’s index number in the Ethernet statistics table, between 1 and 65535.
index
historycontrol This is an entry’s index number in the history control table, between 1 and 65535.
-index
owner This is a person’s name who will handle the event, alarm, historycontrol, or Ethernet statistics
entry.
interface-id This is a port that the Switch will poll for data.
267
Chapter 73 RMON
no rmon statistics etherstats <etherstats- Stops collecting network traffic for the C 13
index> specified event.
show rmon alarm alarmtable [alarm-index] Displays all or the specified alarm settings. E 3
show rmon event eventtable [event-index] Displays all or the specified event settings. E 3
show rmon history historycontrol [index Displays all historical network traffic statistics E 3
<historycontrol-index>] or only the specified entry’s.
show rmon history historycontrol port- Displays historical network traffic statistics for E 3
channel <interface-id> the specified port.
268
Chapter 73 RMON
show rmon statistics etherstats port- Displays current network traffic statistics for E 3
channel <interface-id> the specified port.
ras# config
ras(config)# rmon event eventtable 2 log trap public owner operator description test
ras(config)# exit
ras# show rmon event eventtable 2
Event 2 owned by operator is valid
eventType: logandtrap
eventCommunity: public
eventDescription: test
269
Chapter 73 RMON
where
• [ifType.<port>]
• [ifMtu.<port>]
• [ifSpeed.<port>]
• [ifAdminStatus.<port>]
• [ifOperStatus.<port>]
• [ifLastChange.<port>]
• [ifInOctets.<port>]
• [ifInUcastPkts.<port>]
• [ifInNUcastPkts.<port>]
• [ifInDiscards.<port>]
• [ifInErrors.<port>]
• [ifInUnknownProtos.<port>]
• [ifOutOctets.<port>]
• [ifOutUcastPkts.<port>]
• [ifOutNUcastPkts.<port>]
• [ifOutDiscards.<port>]
• [ifOutErrors.<port>]
• [ifOutQLen.<port>]
• [sysMgmtCPUUsage.<index>]
• [sysMemoryPoolUtil.<index>]
• [<OID>]
interval-integer This is the time interval (in seconds) between data samplings.
absolute|delta This is the method of obtaining the sample value and calculating the value to be
compared against the thresholds.
This example shows you how to configure an alarm using the following settings:
270
Chapter 73 RMON
ras# config
ras(config)# rmon alarm alarmtable 2 variable ifInErrors.1 interval 60 sample-type
delta startup-alarm rising rising-threshold 50 2 falling-threshold 0 2 owner operator
ras(config)# exit
ras# show rmon alarm alarmtable
Alarm 2 owned by operator is valid
alarmVariable: ifInErrors.1
alarmInterval: 60
alarmSampleType: delta
alarmStartupAlarm: rising
alarmRisingThreshold: 50
alarmRisingEventIndex: 2
alarmFallingThreshold: 0
alarmFallingEventIndex: 0
Last value monitored: 0
ras#
271
Chapter 73 RMON
This example also shows how to display the data collection results.
ras# config
ras(config)# rmon statistics etherstats 1 port-channel 12
ras(config)# exit
ras# show rmon statistics etherstats index 1
Statistics 1 owned by is valid
Monitor on interface port-channel 12
etherStatsDropEvents: 0
etherStatsOctets: 1576159
etherStatsPkts: 19861
etherStatsBroadcastPkts: 16721
etherStatsMulticastPkts: 1453
etherStatsCRCAlignErrors: 2
etherStatsUndersizePkts: 0
etherStatsOversizePkts: 0
etherStatsFragments: 0
etherStatsJabbers: 0
etherStatsCollisions: 0
Packet length distribution:
64: 17952
65-127: 666
128-255: 671
256-511: 509
512-1023: 26
1024-1518: 37
ras#
272
Chapter 73 RMON
This example also shows how to display the data collection results.
ras# config
ras(config)# rmon history historycontrol 1 buckets 10 interval 10 port-channel 12
ras(config)# exit
ras# show rmon history historycontrol index 1
History control 1 owned by is valid
Monitors interface port-channel 12 every 10 sec.
historyControlBucketsRequested: 10
historyControlBucketsGranted: 10
Monitored history 1:
Monitored at 0 days 00h:08m:59s
etherHistoryIntervalStart: 539
etherHistoryDropEvents: 0
etherHistoryOctets: 667217
etherHistoryPkts: 7697
etherHistoryBroadcastPkts: 5952
etherHistoryMulticastPkts: 505
etherHistoryCRCAlignErrors: 2
etherHistoryUndersizePkts: 0
etherHistoryOversizePkts: 0
etherHistoryFragments: 0
etherHistoryJabbers: 0
etherHistoryCollisions: 0
etherHistoryUtilization: 72
Monitored history 2:
Monitored at 0 days 00h:09m:08s
etherHistoryIntervalStart: 548
etherHistoryDropEvents: 0
etherHistoryOctets: 673408
etherHistoryPkts: 7759
etherHistoryBroadcastPkts: 5978
etherHistoryMulticastPkts: 519
etherHistoryCRCAlignErrors: 2
etherHistoryUndersizePkts: 0
etherHistoryOversizePkts: 0
etherHistoryFragments: 0
etherHistoryJabbers: 0
etherHistoryCollisions: 0
etherHistoryUtilization: 0
ras#
273
C H A P T E R 74
Running Configuration
Commands
Use these commands to back up and restore configuration and firmware.
• Back up Switch configuration once the Switch is set up to work in your network.
• Restore a previously-saved Switch configuration.
• Use the same configuration file to set all switches (of the same model) in your network to the same
settings.
You may also edit a configuration file using a text editor. Make sure you use valid commands.
Note: The Switch rejects configuration files with invalid or incomplete commands.
274
Chapter 74 Running Configuration Commands
show running-config page Displays the current configuration file page by page. E 3
copy running-config interface Clones (copies) the attributes from the specified port to C 13
port-channel <port> <port-list> other ports. Optionally, copies the specified attributes from
[<attribute> [<...>]] one port to other ports.
copy running-config help Provides more information about the specified command. C 13
copy running-config slot <slot> Clones (copies) the attributes from the specified slot to C 13
<slot-list> other slots.
copy running-config slot <slot> Copies the specified attributes from one slot to other slots. C 13
<slot-list> [bandwidth-limit
...]
erase running-config Resets the Switch to the factory default settings. E 13
erase running-config interface Resets to the factory default settings on a per-port basis E 13
port-channel <port-list> and optionally on a per-feature configuration basis.
[<attribute> [<...>]]
erase running-config help Provides more information about the specified command. E 13
reload custom-default Reboots the system and loads a saved customized default E 14
file on the Switch.
275
Chapter 74 Running Configuration Commands
This example copies all attributes of port 1 to port 2 and copies selected attributes (active, bandwidth
limit and STP settings) from port 1 to ports 5-8
sysname# configure
sysname(config)# copy running-config interface port-channel 1 2
sysname(config)# copy running-config interface port-channel 1 5-8 active
bandwidth-limit spanning-tree
276
C H A P T E R 75
sFlow
This chapter shows you how to configure sFlow to have the Switch monitor traffic in a network and send
information to an sFlow collector for analysis.
sFlow minimizes impact on CPU load of the Switch as it analyzes sample data only. sFlow can
continuously monitor network traffic and create reports for network performance analysis and
troubleshooting. For example, you can use it to know which IP address or which type of traffic caused
network congestion.
no sflow collector <ip- Removes the specified collector IP address from the C 13
address> port.
sflow Enables sFlow on this port. The Switch will monitor traffic C 13
on this port and generate and send sFlow datagram to
the specified collector.
sflow collector <ip-address> Specifies a collector for this port. You can set a time C 13
[poll-interval <20-120>] interval (from 20 to 120 in seconds) the Switch waits
[sample-rate <256-65535>] before sending the sFlow datagram and packet
counters for this port to the collector. You can also set
a sample rate (N) from 256 to 65535. The Switch
captures every one out of N packets for this port to
create sFlow datagram.
no sflow Disables the sFlow agent on the Switch. C 13
277
Chapter 75 sFlow
sysname(config)# sflow
sysname(config)# sflow collector 10.1.1.58 udp-port 6343
sysname(config)# interface port-channel 1,2,3,4
sysname(config-interface)# sflow
sysname(config-interface)# sflow collector 10.1.1.58 poll-interval 120
sample-rate 2500
sysname(config-interface)# exit
sysname(config)# exit
sysname# show sflow
sFlow version: 5
sFlow Global Information:
sFlow Status: Active
index Collector Address UDP port
----- ----------------- --------
1 10.1.1.58 6343
278
C H A P T E R 76
Smart Isolation Commands
This chapter explains how to use commands to configure smart isolation on the Switch.
B
Isolated ports: 2~6
Root port: 7
Designated port: 8
Smart isolation allows you to prevent isolated ports on different switches from transmitting traffic to each
other. After you enable RSTP/MRSTP and smart isolation on the Switch, the designated port(s) will be
added to the isolated port list. In the following example, switch A is the root bridge. Switch B’s root port 7
connects to switch A and switch B’s designated port 8 connects to switch C. Traffic from isolated ports
on switch B can only be sent through non-isolated port 1 or root port 7 to switch A. This prevents isolated
279
Chapter 76 Smart Isolation Commands
ports on switch B sending traffic through designated port 8 to switch C. Traffic received on designated
port 8 from switch C will not be forwarded to any other isolated ports on switch B.
B
Before Smart Isolation:
Isolated ports: 2~6
Root port: 7
Designated port: 8
After Smart Isolation:
Isolated ports: 2~6, 8
C
Root port: 7
Designated port: 8
You should enable RSTP or MRSTP before you can use smart isolation on the Switch. If the network
topology changes, the Switch automatically updates the isolated port list with the latest designated
port information.
Note: The uplink port connected to the Internet should be the root port. Otherwise, with smart
isolation enabled, the isolated ports cannot access the Internet.
280
Chapter 76 Smart Isolation Commands
private VLAN rule for VLAN 200 to put ports 3, 4 and 5 in the isolated port list. In this example, the
designated port 7 is added to the isolated port list after smart isolation is enabled.
sysname# configure
sysname(config)# spanning-tree mode rstp
sysname(config)# spanning-tree
sysname(config)# spanning-tree priority 32768
sysname(config)# spanning-tree 3-5, 7-8
sysname(config)# vlan 200
sysname(config-vlan)# fixed 3-5, 7-8
sysname(config-vlan)# untagged 3-5, 7-8
sysname(config-vlan)# exit
sysname(config)# private-vlan name pvlan-200 vlan 200 promiscuous-port 7-8
sysname(config)# smart-isolation
sysname(config)# exit
sysname# show smart-isolation
smart isolation enable
Private VLAN:
Original VLAN:
VLAN 200
isolated 3-5
promiscuous 7-8
sysname#
The following fields display the port isolation information before and after smart
isolation is enabled.
original isolated ports This field displays the isolated port list before smart isolation is enabled.
smart isolated ports This field displays the isolated port list after smart isolation is enabled.
Private VLAN This section is available only when you have configured private VLAN on the Switch.
The following fields display the private VLAN information before and after smart
isolation is enabled.
Original VLAN This section displays the VLAN ID and isolated and promiscuous port list before smart
isolation is enabled
Smart Isolated VLAN This section displays the VLAN ID and isolated and promiscuous port list after smart
isolation is enabled
281
C H A P T E R 77
SNMP Server Commands
Use these commands to configure SNMP on the Switch.
snmp-server <[contact <system- Sets the geographic location and the name of the person C 13
contact>] [location <system- in charge of this Switch.
location>]> system-contact: 1-32 English keyboard characters;
spaces are allowed.
snmp-server get-community Sets the get community. Only for SNMPv2c or lower. C 13
[cipher] <property>
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used in password
encryption. To encrypt the password, use the password
encryption command.
snmp-server set-community Sets the set community. Only for SNMPv2c or lower. C 13
[cipher] <property>
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used in password
encryption. To encrypt the password, use the password
encryption command.
282
Chapter 77 SNMP Server Commands
283
Chapter 77 SNMP Server Commands
show snmp-server [user] Displays the SNMP information on the Switch. The user E 3
flag displays SNMP user information.
snmp-server trap-destination Sends the specified AAA traps to the specified manager. C 13
<ip> enable traps aaa <options>
284
Chapter 77 SNMP Server Commands
snmp-server trap-destination Sends the specified switch traps to the specified manager. C 13
<ip> enable traps switch
<options>
no snmp-server trap-destination Prevents the Switch from sending the specified switch traps C 13
<ip> enable traps switch to the specified manager.
<options>
snmp-server trap-destination Sends all system traps to the specified manager. C 13
<ip> enable traps system
no snmp-server trap-destination Prevents the Switch from sending any system traps to the C 13
<ip> enable traps system specified manager.
snmp-server trap-destination Sends the specified system traps to the specified manager. C 13
<ip> enable traps system
<options>
no snmp-server trap-destination Prevents the Switch from sending the specified system C 13
<ip> enable traps system traps to the specified manager.
<options>
285
Chapter 77 SNMP Server Commands
sysname# configure
sysname(config)# interface port-channel 3
sysname(config-interface)# no snmp trap linkup linkdown
This example shows you how to display the SNMP information on the Switch.
[General Setting]
SNMP Version : v2c
Get Community : public
Set Community : public
Trap Community : public
[ Trap Destination ]
Index Version IP Port Username
----- ------- ------------ ---- --------
1 v2c 0.0.0.0 162
2 v2c 0.0.0.0 162
3 v2c 0.0.0.0 162
4 v2c 0.0.0.0 162
This example shows you how to display all SNMP user information on the Switch.
[ User Information ]
Index Name SecurityLevel GroupName
----- ------ ------------- --------------
1 admin noauth admin
286
C H A P T E R 78
Stacking Commands
78.1 Overview
Stacking is directly connecting Switches to form a larger system that behaves as a single Switch or a
virtual chassis with increased port density.
The last two SFP ports of your Switch are dedicated for Switch stacking. These are the Switches that
support stacking at the time of writing.
Note: Up to 8 Switches (XGS3700 Series) or 4 Switches (XGS4600 Series) per stack are allowed.
You can manage each Switch in the stack from a master Switch using its web configurator or console.
Each Switch supports up to two stacking channels. Use the master Switch to assign a ‘slot ID’ for each
‘linecard’ non-master Switch. ‘Slot’ refers to a Switch in the ‘virtual chassis’ stack.
You can build a Switch stack using a ring or chain topology. In a ring topology, the last Switch is
connected to the first.
Note: When you change modes, all configurations except user accounts, but including
running configuration, config01 and config02 will be erased and the Switch will reboot
with a new config01. Therefore, you should back up previous configurations if you want
to reload them later.
Stacking will automatically choose a master Switch in a stack but you can overwrite that by actively
forcing a Switch to become a master Switch using the Stacking force-master command. This master
Switch will have the highest priority over all other stacked Switches even when they have same priority
value.
If two or more Switches have Stacking force-master enabled, then the Switch will use Stacking
priority to determine which is master. If they have the same Stacking priority, then the Switch
with the longest up-time is selected. Uptime is measured in increments of 10 minutes. The Switch with the
higher number of increments is selected. If they have the same uptime, then the Switch with the lowest
MAC address will be the master.
287
Chapter 78 Stacking Commands
1 Stacking force-master
Note: Master election occurs when stacking / standalone mode changes or when a stacking
port is temporarily disconnected in stacking mode.
Stacking force-master Enables force master mode which makes this Switch the C 13
master in the stack.
no Stacking force-master Disables force master mode. C 13
288
Chapter 78 Stacking Commands
1 Select a Switch to be the master. Change its mode to stacking mode. You will see a message asking you
to confirm the change. Press [Y] to confirm and the Switch will reboot automatically using a new
config01.
3 Force the Switch to be master, configure stacking priority to a high value, such as 63 and set its slot ID to
1.
4 Change a second Switch to stacking mode and wait for it to finish rebooting automatically. This master
LED will also turn on.
289
Chapter 78 Stacking Commands
5 Connect the two Switches using the stacking ports for the Switch defined.
6 The second Switch master LED will then turn off, and its Sys LED will blink while it's initializing. Please wait
until it stops blinking, indicating that it has joined the stack.
Use these commands to then see the stacking status of the stack, see details of the slots in the stack and
see details of an individual slot.
Stacking Topology:Chain
sysname#
sysname# show stacking slot status
Slot Name Status Up Time Version(Running/Flash1/Flash2)
---- ------------ -------- ----------- ------------------------------
*1 XGS3700-48HP active 68:20:57 V4.20(AAGF.0)b4
V4.20(AAGF.0)b4
V4.10(AAGF.5)b1
2 inactive
3 inactive
4 inactive
5 inactive
6 inactive
7 inactive
8 inactive
sysname#
sysname# show stacking slot 1
Stacking Slot 1 Information
Stacking : active
Role : master
Force Master Mode : active
Priority : 63
Slot ID after reboot : 1
Stacking Status : active
Master Capable : auto
Stacking MAC Address : 00:19:cb:00:00:02
Stacking-channel 1 : down
Stacking-channel 2 : down
Stacking Up Time : 68:19:41
ZyNOS Version
Running : V4.20(AAGF.0)b4
Flash 1 : V4.20(AAGF.0)b4
Flash 2 : V4.10(AAGF.5)b1
sysname#
290
Chapter 78 Stacking Commands
Current configuration:
291
C H A P T E R 79
STP and RSTP Commands
Use these commands to configure Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol
(RSTP) as defined in the following standards.
See Chapter 55 on page 210 and Chapter 56 on page 213 for more information on MRSTP and MSTP
commands respectively. See also Chapter 47 on page 193 for information on loopguard commands.
spanning-tree mode Specifies the STP mode you want to implement on the C 13
<RSTP|MRSTP|MSTP> Switch.
spanning-tree hello-time <1-10> Sets Hello Time, Maximum Age and Forward Delay. C 13
maximum-age <6-40> forward-delay
hello-time: The time interval in seconds between BPDU
<4-30> (Bridge Protocol Data Units) configuration message
generations by the root switch.
292
Chapter 79 STP and RSTP Commands
3 Sets the Hello Time to 4, Maximum Age to 20 and Forward Delay to 15.
sysname(config)# spanning-tree
sysname(config)# spanning-tree priority 0
sysname(config)# spanning-tree hello-time 4 maximum-age 20 forward-delay
--> 15
sysname(config)# spanning-tree 5 path-cost 150
sysname(config)# spanning-tree 5 priority 20
293
Chapter 79 STP and RSTP Commands
294
Chapter 79 STP and RSTP Commands
In this example, we enable RSTP on ports 21-24. Port 24 is connected to the host while ports 21-23 are
connected to another switch
sysname(config)# configure
sysname(config)# spanning-tree
sysname(config)# spanning-tree 21-24
sysname(config)# no spanning-tree 21-23 edge-port
295
C H A P T E R 80
SSH Commands
Use these commands to configure SSH on the Switch.
ssh known-hosts <host-ip> Adds a remote host to which the Switch can access using C 13
<1024|ssh-rsa|ssh-dsa> <key> SSH service.
no ssh known-hosts <host-ip> Removes the specified remote hosts from the list of all C 13
known hosts.
no ssh known-hosts <host-ip> Removes the specified remote hosts with the specified C 13
<1024|ssh-rsa|ssh-dsa> public key (1024-bit RSA1, RSA or DSA).
show ssh key <rsa1|rsa|dsa> Displays internal SSH public and private key information. E 3
no ssh key <rsa1|rsa|dsa> Disables the secure shell server encryption key. Your Switch C 13
supports SSH versions 1 and 2 using RSA and DSA
authentication.
ssh <1|2> <[user@]dest-ip> Connects to an SSH server with the specified SSH version E 3
[command </>] and, optionally, adds commands to be executed on the
server.
296
Chapter 80 SSH Commands
Sessions:
Proto Serv Remote IP Port Local IP Port Bytes In
Bytes Out
297
C H A P T E R 81
Static Multicast Commands
Use these commands to tell the Switch how to forward specific multicast frames to specific port(s). You
can also configure which to do with unknown multicast frames using the router igmp unknown-
multicast-frame command (see Table 87 on page 121).
multicast-forward name <name> Creates a new static multicast forwarding rule. The rule C 13
mac <mac-addr> vlan <vlan-id> name can be up to 32 printable ASCII characters.
inactive mac-addr: Enter a multicast MAC address which identifies
the multicast group. The last binary bit of the first octet pair
in a multicast MAC address must be 1. For example, the
first octet pair 00000001 is 01 and 00000011 is 03 in
hexadecimal, so 01:00:5e:00:00:0A and 03:00:5e:00:00:27
are valid multicast MAC addresses.
298
Chapter 81 Static Multicast Commands
This example removes a static multicast forwarding rule with multicast MAC address (01:00:5e:06:01:46)
which belongs to VLAN 1.
This example creates a static multicast forwarding rule. The rule forwards frames with destination MAC
address 01:00:5e:00:00:06 to ports 10~12 in VLAN 1.
sysname# configure
sysname(config)# multicast-forward name AAA mac 01:00:5e:00:00:06 vlan 1
interface port-channel 10-12
299
C H A P T E R 82
Static Route Commands
Use these commands to tell the Switch how to forward IP traffic. IP static routes are used by layer-2
Switches to ensure they can respond to management stations not reachable via the default gateway
and to proactively send traffic, for example when sending SNMP traps or conducting IP connectivity
tests using ping.
Layer-3 Switches use static routes to forward traffic via gateways other than those defined as the default
gateway.
ip route <ip> <mask> <next-hop- Creates a static route. If the <ip> <mask> already exists, C 13
ip> [metric <metric>] [name the Switch deletes the existing route first. Optionally, also
<name>] [inactive] sets the metric, sets the name, and/or deactivates the
static route.
metric: 1-15
300
Chapter 82 Static Route Commands
In this routing table, you can create an active static route if the <next-hop-ip> is in 172.16.37.0/24 or
127.0.0.0/16. You cannot create an active static route to other IP addresses.
For example, you cannot create an active static route that routes traffic for 192.168.10.1/24 to
192.168.1.1.
sysname# configure
sysname(config)# ip route 192.168.10.1 255.255.255.0 192.168.1.1
Error : The Action is failed. Please re-configure setting.
sysname# configure
sysname(config)# ip route 192.168.10.1 255.255.255.0 192.168.1.1 inactive
301
Chapter 82 Static Route Commands
You can create an active static route that routes traffic for 192.168.10.1/24 to 172.16.37.254.
sysname# configure
sysname(config)# ip route 192.168.10.1 255.255.255.0 172.16.37.254
sysname(config)# exit
sysname# show ip route static
Idx Active Name Dest. Addr. Subnet Mask Gateway Addr.
Metric
01 Y static 192.168.10.1 255.255.255.0 172.16.37.254 1
302
C H A P T E R 83
Subnet-based VLAN
Commands
Use these commands to configure subnet-based VLANs on the Switch.
See also Chapter 68 on page 255 for protocol-based VLAN commands and Chapter 92 on page 321 for
VLAN commands.
subnet-based-vlan dhcp-vlan- Sets the Switch to force the DHCP clients to obtain their IP C 13
override addresses through the DHCP VLAN.
subnet-based-vlan name <name> Specifies the name, IP address, subnet mask, VLAN ID of C 13
source-ip <ip> mask-bits <mask- the subnet based VLAN you want to configure along with
bits> vlan <vlan-id> priority the priority you want to assign to the outgoing frames for
<0-7> this VLAN.
subnet-based-vlan name <name> Specifies the name, IP address, subnet mask, source-port C 13
source-ip <ip> mask-bits <mask- and VLAN ID of the subnet based VLAN you want to
bits> source-port <port> vlan configure along with the priority you want to assign to the
<vlan-id> priority <0-7> outgoing frames for this VLAN.
303
Chapter 83 Subnet-based VLAN Commands
no subnet-based-vlan dhcp-vlan- Disables the DHCP VLAN override setting for subnet-based C 13
override VLAN(s).
304
C H A P T E R 84
Syslog Commands
Use these commands to configure the device’s system logging settings and to configure the external
syslog servers.
level: 0-7
no syslog server <ip-address> Deletes the specified syslog server. C 13
syslog server <ip-address> Disables syslog logging to the specified syslog server. C 13
inactive
no syslog server <ip-address> Enables syslog logging to the specified syslog server. C 13
inactive
syslog type <type> facility <0- Sets the file location for the specified log type. C 13
7>
syslog type commands privilege Sets a command privilege level. The Switch will only C 13
<0-14> generate logs for commands that have a privilege level
greater than or equal to the specified privilege level.
no syslog type <type> Disables syslog logging for the specified log type. C 13
305
P ART V
Reference T-Z
TACACS+ Commands (307)
306
C H A P T E R 85
TACACS+ Commands
Use these commands to configure external TACACS+ (Terminal Access Controller Access-Control
System Plus) servers.
tacacs-server host <index> <ip> Specifies the IP address of the specified TACACS+ server. C 14
[auth-port <socket-number>] [key Optionally, sets the port number and key of the TACACS+
[cipher] <key-string>] server.
index: 1 or 2.
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used in password
encryption. To encrypt the password, use the password
encryption command.
tacacs-accounting timeout <1- Specifies the TACACS+ accounting server timeout value. C 13
1000>
tacacs-accounting host <index> Specifies the IP address of the specified TACACS+ C 13
<ip> [acct-port <socket-number>] accounting server. Optionally, sets the port number and
[key [cipher] <key-string>] key of the external TACACS+ accounting server.
index: 1 or 2.
cipher: inform the Switch that the string after the word
"cipher" is an encrypted secret. This is used in password
encryption. To encrypt the password, use the password
encryption command.
307
C H A P T E R 86
Tech Support Commands
show tech-support cpu Shows CPU history log. The log report holds 7 days of CPU E 13
log data and is stored in volatile memory (RAM). The data
is lost if the Switch is turned off or in event of power outage.
After 7 days, the logs wrap around and new ones and
replace the earliest ones.
show tech-support memory Shows the last memory session log before the Switch is E 13
turned off or in event of power outage.
show tech-support mbuf Shows the mbuf that is higher than the threshold. Default E 13
mbuf value is 50.
show tech-support crash Shows the last crash log before the Switch is turned off or in E 13
event of power outage.
tech-support cpu <threshold> Sets the CPU threshold and time value for CPU utilization C 13
keep <time> history report. Default CPU value is 80 and time 5.
308
Chapter 86 Tech Support Commands
309
Chapter 86 Tech Support Commands
This example sets the CPU threshold to 80 and time to 5. Then uses the command show logging to see
the log.
310
C H A P T E R 87
TFTP Commands
Use these commands to back up and restore configuration and firmware via TFTP.
index: 1 or 2
index: 1 or 2
311
C H A P T E R 88
Time Range Commands
time-range <name> [ absolute Creates an absolute time-range rule that has a set start E 13
start <hh:mm> <1-31> <jan-dec> and end time and date (absolute). name is the name of
<1970-2037> end <hh:mm> <1-31> the time-range rule.
<jan-dec> <1970-2037>
time-range <name> [ periodic <[ Creates a periodic time-range rule that recurs at the E 13
<monday|tuesday|wednesday|thurs specified time and day (periodic). name is the name of
day|friday|saturday|sunday><hh: the time-range rule.
mm> to
monday|tuesday|wednesday|thursd
ay|friday|saturday|sunday>
<hh:mm>][<[monday][tuesday][wed
nesday][thursday][friday][satur
day][sunday]|daily|weekdays|wee
kend> <hh:mm> to <hh:mm>]
no time-range <name> Removes the specified time-range rule. C 13
312
Chapter 88 Time Range Commands
sysname#
sysname# configure terminal
sysname(config)# time-range work absolute start 08:00 1 jan 2015 end
17:30 31 dec 2015
sysname(config)#exit
sysname# show time-range work
Time range work:
Absolute start 08:00 1 January 2015 end 17:30 31 December 2015
313
C H A P T E R 89
Traceroute Commands
traceroute6 <ipv6-addr|host- Displays the route a packet takes to the specified Ethernet E 0
name> <[ttl <1-255>] [wait <1- device with an IPv6 address.
60>] [queries <1-10> ]> vlan <vlan-id>: Specifies the VLAN ID to which the
Ethernet device belongs.
314
C H A P T E R 90
Trunk Commands
Use these commands to logically aggregate physical links to form one logical, higher-bandwidth link.
The Switch adheres to the IEEE 802.3ad standard for static and dynamic (Link Aggregate Control
Protocol, LACP) port trunking.
Note: Different models support different numbers of trunks (T1, T2, ...). This chapter uses a
model that supports six trunks (from T1 to T6).
trunk <T1|T2|T3|T4|T5|T6> Sets the traffic distribution type used for the specified trunk C 13
criteria <src-mac|dst-mac|src- group.
dst-mac|src-ip|dst-ip|src-dst-
ip>
no trunk <T1|T2|T3|T4|T5|T6> Returns the traffic distribution type used for the specified C 13
criteria trunk group to the default (src-dst-mac).
lacp-timeout: 1 or 30
315
Chapter 90 Trunk Commands
sysname(config)# trunk t1
sysname(config)# trunk t1 interface 5-8
This example disables trunk one (T1) and removes ports 1, 3, 4, and 5 from trunk two (T2).
sysname(config)# no trunk T1
sysname(config)# no trunk T2 interface 1,3-5
316
Chapter 90 Trunk Commands
ID: 2
[(0000,00-00-00-00-00-00,0000,00,0000)][(0000,00-00-00-00-00-00
-->,0000,00,0000)]
LINKS :
SYNCS :
ID: 3
[(0000,00-00-00-00-00-00,0000,00,0000)][(0000,00-00-00-00-00-00
--> ,0000,00,0000)]
LINKS :
SYNCS :
In other switches this displays the ports which belong to this trunk group.
SYNCS These are the ports that are currently transmitting data as one logical link in this trunk
group.
317
C H A P T E R 91
trTCM Commands
This chapter explains how to use commands to configure the Two Rate Three Color Marker (trTCM)
feature on the Switch.
The colors reflect the packet’s loss priority and the Switch changes the packet’s DiffServ Code Point
(DSCP) value based on the color.
trtcm mode <color-aware|color-blind> Sets the mode for trTCM on the Switch. C 13
trtcm dscp profile <name> dscp green <0- Configures a DSCP profile to specify the DSCP C 13
63> yellow <0-63> red <0-63> values that you want to assign to packets
based on the color they are marked via trTCM
show interfaces config <port-list> trtcm Displays DSCP profile settings on the specified E 3
dscp profile port(s).
show trtcm dscp profile Displays all DSCP profiles settings on the E 3
Switch.
interface port-channel <port-list> Enters subcommand mode for configuring the C 13
specified ports.
trtcm Enables trTCM on the specified port(s). C 13
318
Chapter 91 trTCM Commands
trtcm dscp green <0-63> Specifies the DSCP value to use for packets C 13
with low packet loss priority.
trtcm dscp yellow <0-63> Specifies the DSCP value to use for packets C 13
with medium packet loss priority.
trtcm dscp red <0-63> Specifies the DSCP value to use for packets C 13
with high packet loss priority.
trtcm dscp profile <name> Specifies the DSCP profile that you want to C 13
apply to packets on the port(s).
no trtcm dscp profile Sets the Switch to apply the default DSCP C 13
profile to packets on the port(s).
• Sets the Switch to inspect the DSCP value of packets (color-aware mode).
• Enables trTCM on ports 1-5.
• Sets the Committed Information Rate (CIR) to 4000 Kbps.
• Sets the Peak Information Rate (PIR) to 4500 Kbps.
• Specifies DSCP value 7 for green packets, 22 for yellow packets and 44 for red packets.
sysname(config)# trtcm
sysname(config)# trtcm mode color-aware
sysname(config)# interface port-channel 1-5
sysname(config-interface)# trtcm
sysname(config-interface)# trtcm cir 4000
sysname(config-interface)# trtcm pir 4500
sysname(config-interface)# trtcm dscp green 7
sysname(config-interface)# trtcm dscp yellow 22
sysname(config-interface)# trtcm dscp red 44
sysname(config-interface)# exit
sysname(config)# exit
sysname# show running-config interface port-channel 1 trtcm
Building configuration...
Current configuration:
interface port-channel 1
trtcm
trtcm cir 4000
trtcm pir 4500
trtcm dscp green 7
trtcm dscp yellow 22
trtcm dscp red 44
exit
319
Chapter 91 trTCM Commands
This examples activates trTCM on the Switch with the following settings:
Current configuration:
vlan 1
name 1
normal ""
fixed 1-28
forbidden ""
untagged 1-28
ip address default-management 192.168.1.1 255.255.255.0
exit
trtcm
trtcm mode color-aware
trtcm dscp profile abc dscp green 1 yellow 2 red 3
interface port-channel 1
diffserv
trtcm
trtcm cir 4000
trtcm pir 4500
trtcm dscp profile abc
exit
diffserv
sysname #
320
C H A P T E R 92
VLAN Commands
Use these commands to configure IEEE 802.1Q VLAN.
2 Use the interface port-channel <port-list> command to set the VLAN settings on a port. The
Switch automatically enters config-interface mode. Use the pvid <vlan-id> command to set the
VLAN ID you created for the port-list in the PVID table. Use the exit command when you are finished
configuring the ports.
321
Chapter 92 VLAN Commands
show vlan <vlan-id> counters Displays concurrent incoming packet statistics of the E 3
specified VLAN and refreshes every 10 seconds until you
press the [ESC] button.
show vlan <vlan-id> interface Displays concurrent incoming packet statistics of the E 3
port-channel <port-num> counters specified port in the specified VLAN and refreshes every 10
seconds until you press the [ESC] button.
vlan-type <802.1q|port-based> Specifies the VLAN type. C 13
vlan <vlan-id> Enters config-vlan mode for the specified VLAN. Creates C 13
the VLAN, if necessary.
fixed <port-list> Specifies the port(s) to be a permanent member of this C 13
VLAN group.
no fixed <port-list> Sets fixed port(s) to normal port(s). C 13
forbidden <port-list> Specifies the port(s) you want to prohibit from joining this C 13
VLAN group.
no forbidden <port-list> Sets forbidden port(s) to normal port(s). C 13
The following section lists the commands for the ingress checking feature.
• Some models enable or disable VLAN ingress checking on all the ports via the vlan1q ingress-
check command.
322
Chapter 92 VLAN Commands
• Other models enable or disable VLAN ingress checking on each port individually via the ingress-
check command in the config-interface mode.
Table 213 vlan1q ingress-check Command Summary
COMMAND DESCRIPTION M P
show vlan1q ingress-check Displays ingress check settings on the Switch. E 3
323
Chapter 92 VLAN Commands
Other: The VLAN was added in another way, such as Multicast VLAN Registration
(MVR).
Elap-Time This field displays how long it has been since a dynamic VLAN was registered or a static
VLAN was set up.
TagCtl This field displays untagged and tagged ports.
Untagged: These ports do not tag outgoing frames with the VLAN ID.
Tagged: These ports tag outgoing frames with the VLAN ID.
324
Chapter 92 VLAN Commands
325
Chapter 92 VLAN Commands
The maximum frame size varies depending on your switch model. See Product
Specification chapter in your User's Guide.
326
C H A P T E R 93
VLAN IP Commands
Use these commands to configure the default gateway device and add IP domains for VLAN.
vlan <1-4094> Enters config-vlan mode for the specified VLAN. Creates C 13
the VLAN, if necessary.
ip address default- Configures the Switch to get the in-band management IP C 13
management dhcp-bootp address from a DHCP server.
327
Chapter 93 VLAN IP Commands
ip address <ip-address> Sets the IP address and subnet mask of the Switch in the C 13
<mask> specified VLAN.
ip address <ip-address> Sets the IP address and subnet mask of the Switch in the C 13
<mask> manageable specified VLAN. Some switch models require that you
execute this command to ensure that remote
management via HTTP, Telnet or SNMP is activated.
no ip address <ip-address> Deletes the IP address and subnet mask from this VLAN. C 13
<mask>
ip address default-gateway Sets a default gateway IP address for this VLAN. C 13
<ip-address>
no ip address default- Deletes the default gateway from this VLAN. C 13
gateway
328
C H A P T E R 94
VLAN Mapping Commands
Use these commands to configure VLAN mapping on the Switch. With VLAN mapping enabled, the
Switch can map the VLAN ID and priority level of packets received from a private network to those used
in the service provider’s network. The Switch discards the tagged packets that do not match an entry in
the VLAN mapping table.
Note: You can not enable VLAN mapping and VLAN stacking at the same time.
329
Chapter 94 VLAN Mapping Commands
sysname# configure
sysname(config)# vlan-mapping
sysname(config)# vlan-mapping name test interface port-channel 4 vlan 123
translated-vlan 234 priority 3
sysname(config)#
sysname# configure
sysname(config)# interface port-channel 4
sysname(config-interface)# vlan-mapping
sysname(config-interface)# exit
sysname(config)#
330
C H A P T E R 95
VLAN Port Isolation
Commands
Use these commands to configure VLAN port isolation on the Switch. VLAN port isolation allows each
port to communicate only with the CPU management port and the uplink ports, but not to
communicate with each other.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
no vlan1q port-isolation Enables VLAN port isolation on the port(s). C 13
331
C H A P T E R 96
VLAN Stacking Commands
Use these commands to add an outer VLAN tag to the inner IEEE 802.1Q tagged frames that enter your
network.
332
Chapter 96 VLAN Stacking Commands
VLAN 24 VLAN 24
Customer A Customer A
SPN
x A: 37, 24 y
B: 48, 24
VLAN 24 VLAN 24
Customer B Customer B
333
Chapter 96 VLAN Stacking Commands
This example shows how to configure ports 1 and 2 on the Switch to tag incoming frames with the
service provider’s VID of 37 (ports are connected to customer A network). This example also shows how
to set the priority for ports 1 and 2 to 3.
sysname(config)# vlan-stacking
sysname(config)# interface port-channel 1-2
sysname(config-interface)# vlan-stacking role access
sysname(config-interface)# vlan-stacking spvid 37
sysname(config-interface)# vlan-stacking priority 3
sysname(config-interface)# exit
sysname(config)# exit
sysname# show vlan-stacking
Switch Vlan Stacking Configuration
Operation: active
STPID: 0x8100
334
C H A P T E R 97
VLAN Trunking Commands
Use these commands to decide what the Switch should do with frames that belong to unknown VLAN
groups.
335
C H A P T E R 98
Voice VLAN Commands
Use these commands to set up Voice VLAN on the Switch.
You can set priority level to the Voice VLAN and add MAC address of IP phones from specific
manufacturers by using its ID from the Organizationally Unique Identifiers (OUI).
voice-vlan oui <mac-addr> mask Sets the Voice VLAN device’s OUI address, mask address C 13
<mask-addr> description and device manufacturer description.
<description>
no voice-vlan Disables Voice VLAN configuration. C 13
no voice-vlan oui <mac-addr> Removes the OUI from the Voice VLAN. C 13
mask <mask-addr>
show voice-vlan Show Voice VLAN status. E 3
336
Chapter 98 Voice VLAN Commands
sysname# configure
sysname(config)# voice-vlan 5
sysname(config)# voice-vlan priority 6
sysname(config)# exit
sysname# show voice-vlan
Voice VLAN : enable
VLAN ID : 5
Priority : 6
Port Mode Tagging VLAN Membership
1 normal tagged no
2 normal tagged no
3 normal tagged no
4 normal tagged no
5 normal tagged no
6 normal tagged no
7 normal tagged no
8 normal tagged no
9 normal tagged no
10 normal tagged no
11 fixed tagged yes
12 fixed tagged yes
13 fixed tagged yes
14 fixed tagged yes
15 fixed tagged yes
16 fixed tagged yes
17 fixed tagged yes
18 fixed tagged yes
19 fixed tagged yes
20 fixed tagged yes
21 forbidden tagged no
22 forbidden tagged no
23 forbidden tagged no
24 forbidden tagged no
25 forbidden tagged no
26 forbidden tagged no
27 forbidden tagged no
28 forbidden tagged no
337
Chapter 98 Voice VLAN Commands
This example sets the VLAN ports for Voice VLAN as seen in the above example. Normal port is 5 to 10,
Fixed port is 11 to 20 and forbidden port is 21 to 28. Port numbers can be higher if the Switch model has
48 ports.
sysname# configure
sysname(config)# vlan 5
sysname(config-vlan)# normal 5-10
sysname(config-vlan)# fixed 11-20
sysname(config-vlan)# forbidden 21-28
sysname(config-vlan)# exit
sysname# show voice-vlan
Voice VLAN : enable
VLAN ID : 5
Priority : 6
Port Mode Tagging VLAN Membership
1 normal tagged no
2 normal tagged no
3 normal tagged no
4 normal tagged no
5 normal tagged no
6 normal tagged no
7 normal tagged no
8 normal tagged no
9 normal tagged no
10 normal tagged no
11 fixed tagged yes
12 fixed tagged yes
13 fixed tagged yes
14 fixed tagged yes
15 fixed tagged yes
16 fixed tagged yes
17 fixed tagged yes
18 fixed tagged yes
19 fixed tagged yes
20 fixed tagged yes
21 forbidden tagged no
22 forbidden tagged no
23 forbidden tagged no
24 forbidden tagged no
25 forbidden tagged no
26 forbidden tagged no
27 forbidden tagged no
28 forbidden tagged no
338
C H A P T E R 99
VRRP Commands
This chapter explains how to use commands to configure the Virtual Router Redundancy Protocol
(VRRP) on the Switch.
339
Chapter 99 VRRP Commands
X 172.16.1.1
PVID = 200
VRID = 1
Ethernet
B
PVID = 200
172.16.1.10
10.10.1.253
Priority = 100
PVID = 100
340
Chapter 99 VRRP Commands
This example shows how to create the IP routing domains and configure the Switch to act as router A in
the topology shown in Figure 12 on page 340.
sysname# config
sysname(config)# vlan 100
sysname(config-vlan)# fixed 1-4
sysname(config-vlan)# untagged 1-4
sysname(config-vlan)# ip address 10.10.1.252 255.255.255.0
sysname(config-vlan)# exit
sysname(config) interface port-channel 1-4
sysname(config-interface)# pvid 100
sysname(config-interface)# exit
sysname(config)# vlan 200
sysname(config-vlan)# fixed 24-28
sysname(config-vlan)# untagged 24-28
sysname(config-vlan)# ip address 172.16.1.1 255.255.255.0
sysname(config-vlan)# exit
sysname(config)# interface port-channel 24-28
sysname(config-interface)# pvid 200
sysname(config-interface)# exit
sysname(config)# router vrrp network 10.10.1.252/24 vr-id 1 uplink-gateway
172.16.1.200
sysname(config-vrrp)# name VRRP-networkA
sysname(config-vrrp)# priority 200
sysname(config-vrrp)# interval 2
sysname(config-vrrp)# primary-virtual-ip 10.10.1.254
sysname(config-vrrp)# exit
sysname(config)#
This example shows how to create the IP routing domains and configure the Switch to act as router B in
the topology shown in Figure 12 on page 340.
sysname# config
sysname(config)# vlan 100
sysname(config-vlan)# fixed 1-4
sysname(config-vlan)# untagged 1-4
sysname(config-vlan)# ip address 10.10.1.253 255.255.255.0
sysname(config-vlan)# exit
sysname(config) interface port-channel 1-4
sysname(config-interface)# pvid 100
sysname(config-interface)# exit
sysname(config)# vlan 200
sysname(config-vlan)# fixed 24-28
sysname(config-vlan)# untagged 24-28
sysname(config-vlan)# ip address 172.16.1.10 255.255.255.0
sysname(config-vlan)# exit
sysname(config)# interface port-channel 24-28
sysname(config-interface)# pvid 200
sysname(config-interface)# exit
sysname(config)# router vrrp network 10.10.1.253/24 vr-id 1 uplink-gateway
172.16.1.200
sysname(config-vrrp)# name VRRP-networkB
sysname(config-vrrp)# interval 2
sysname(config-vrrp)# primary-virtual-ip 10.10.1.254
sysname(config-vrrp)# exit
sysname(config)#
341
C H A P T E R 100
ZULD Commands
Use these commands to configure ZULD on the Switch.
ZULD must be enabled on the Switch and the port(s) in order to detect unidirectional links by monitoring
OAMPDUs.
Note: Ports advertise their unidirectional link detection capability using OAMPDUs, so all
connected devices must support OAM as well as ZULD.
Note: OAM must be enabled on other connected devices too. If OAM is not enabled initially,
ZULD will not work.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
zuld Enables ZULD on the specified port(s). C 13
342
Chapter 100 ZULD Commands
sysname# configure
sysname(config)# ethernet oam
sysname(config)# interface port-channel 1-3
sysname(config-interface)# ethernet oam
sysname(config-interface)# exit
sysname(config)# zuld
sysname(config)# interface port-channel 1-3
sysname(config-interface)# zuld
sysname(config-interface)# zuld mode aggressive
sysname(config-interface)# exit
sysname(config)# exit
sysname# show zuld 1-3
Port 1
Active : Yes
Mode : Aggressive
Probe Time : -
Link State : Linkdown
Port 2
Active : Yes
Mode : Aggressive
Probe Time : -
Link State : Linkdown
Port 3
Active : Yes
Mode : Aggressive
Probe Time : -
Link State : Linkdown
sysname#
343
C H A P T E R 101
Additional Commands
Use these commands to configure or perform additional features on the Switch.
interface port-channel <port- Enters config-interface mode for the specified port(s). C 13
list>
mvr <1-4094> Enters config-mvr mode for the specified MVR (multicast VLAN C 13
registration). Creates the MVR, if necessary.
vlan <1-4094> Enters config-vlan mode for the specified VLAN. Creates the C 13
VLAN, if necessary.
exit Returns to the previous mode. C 13
1: 38400 bps
2: 19200 bps
3: 9600 bps
4: 57600 bps
5: 115200 bps
boot config <index> Restarts the Switch (cold reboot) with the specified E 13
configuration file.
344
Chapter 101 Additional Commands
ping <ip|host-name> [vlan Sends Ping packets to the specified Ethernet device. E 0
<vlan-id>] [size <0-1472>] [-
vlan-id: Specifies the VLAN ID to which the Ethernet device
t] belongs.
reload config [1|2] Restarts the system (warm reboot) with the specified E 13
configuration file.
1: config-1
2: config-2
reset slot <slot-list> Restarts the card in the selected slot. The card restarts using the E 13
last-saved configuration. Any unsaved changes are lost.
show al1arm-status Displays alarm status. E 0
show cpu-utilization process Displays the CPU and memory usage of each process. E 0
show except-smac Displays whether the Switch is to drop the packets with an all- E 13
zero source MAC address (00:00:00:00:00:00).
show hardware-monitor <C|F> This command is not available in all models. E 0
show power-source-status Displays the status of each power module in the system. E 0
show sfp <port-list> Displays real-time SFP (Small Form Factor Pluggable) transceiver E 3
operating parameters on specified SFP port(s). The parameters
include, for example, module temperature, module voltage,
transmitting and receiving power.
show slot Displays general status information about each slot. E 13
show slot config Displays what type of card is installed in each slot and its E 13
current operational status.
show slot config <slot-list> Displays detailed information about the specified slots. E 13
345
Chapter 101 Additional Commands
test interface port-channel Performs an internal loopback test on the specified ports. The E 13
<port-list> test returns Passed! or Failed!.
install slot <slot-list> Changes what type of card is in the slot without restarting the C 13
type <card-type> system.
locator-led Turns on the LOCATOR LED on the Switch. By default, the LED C 13
blinks and automatically turns off after 30 minutes.
This helps to locate the Switch that you are managing when
multiple switches are installed in a rack or placed in the same
room.
locator-led <1-1440> Changes how long (in minutes) the LOCATOR LED blinks for. C 13
no except-smac zero-smac- Sets the Switch to allow and forward the packets with an all- C 13
drop zero source MAC address (00:00:00:00:00:00).
transceiver-ddm timer <1 - Sets the duration of the digital diagnostic monitoring (DDM) C 13
4294967> timer.
This defines how often (in milliseconds) the Switch sends the
digital diagnostic monitoring (DDM) information via the
installed transceiver(s).
346
Chapter 101 Additional Commands
sysname# cable-diagnostics 1
Port Channel Pair status Cable length (m) Distance to fault (m)
---- ------- ----------- ---------------- ---------------------
1 pairA Open N/A 0.00
pairB Open N/A 0.00
pairC Open N/A 0.00
pairD Open N/A 0.00
sysname# cable-diagnostics 4
Port Channel Pair status Cable length (m) Distance to fault (m)
---- ------- ----------- ---------------- ---------------------
4 pairA Ok 5.55 N/A
pairB Ok 5.55 N/A
pairC Ok 5.55 N/A
pairD Ok 5.55 N/A
Open: There is no physical connection (an open circuit detected) between the wire-
pair.
Unknown: The Switch failed to run cable diagnostics on the cable connected this port.
This shows N/A if the Pair status is Open or Short. Check the Distance to fault.
This shows Unsupported if the Switch chipset does not support to show the cable
length.
Distance to fault This displays the distance between the port and the location where the cable is open
or shorted.
This shows Unsupported if the Switch chipset does not support to show the distance.
347
Chapter 101 Additional Commands
This example sends Ping requests to an Ethernet device with IP address 172.16.37.254.
This example shows the current status of the various alarms in the Switch.
348
Chapter 101 Additional Commands
Interval 0 is the time starting one second ago to the current instant.
Interval 1 is the time starting two seconds ago to one second ago.
Interval 2 is the time starting three seconds ago to two seconds ago.
ticks This field displays the number of CPU clock cycles the CPU was not used during the
interval.
util This field displays the CPU utilization during the interval.
349
Chapter 101 Additional Commands
This example looks at the current sensor readings from various places in the hardware.The display for
your Switch may be different.
Customer Part
PSU Serial Number Number & Revision Manufacturing Fan Air Flow
---- ------------- ----------------- ------------ -------------
PSU1 DIYD11M00CN 20110124 front-to-back
PSU2 DIYD11M00DV 20110125 front-to-back
350
Chapter 101 Additional Commands
351
Chapter 101 Additional Commands
Static: This VLAN is configured via IGMP snooping VLAN in fixed mode.
See Chapter 34 on page 123 for more information about IGMP snooping VLAN and
IGMP modes.
Note: If the management mode is set to Consumption, this field shows NA.
Remaining Power This field displays the amount of power the Switch can still provide for PoE.
352
Chapter 101 Additional Commands
This example displays run-time SFP (Small Form Factor Pluggable) parameters on ports 9 (the first SFP port
0, with an SFP transceiver installed) and 10 (the second SFP port 1, no SFP transceiver installed) on the
Switch. You can also see the alarm and warning thresholds for temperature, voltage, transmission bias,
transmission and receiving power as shown.
SFP : 0
Part Number : SFP-SX-DDM
Series Number : S081113001132
Revision : V1.0
Transceiver : 1000BASE-SX
Temperature(C) Alarm(80.00 ~ 0.00), Warning(75.00 ~ 5.00), Current(38.00)
Voltage(V) Alarm(3.50 ~ 3.10), Warning(3.45 ~ 3.15), Current(3.37)
Tx Bias(mA) Alarm(100.05 ~ 1.00), Warning(90.04 ~ 2.00), Current(5.25)
Tx Power(dBm) Alarm(-2.99 ~ -8.98), Warning(-3.49 ~ -8.48), Current(-6.05)
Rx Power(dBm) Alarm(-2.99 ~ -18.01), Warning(-3.49 ~ -17.39), Current(-4.24)
SFP : 1
Not Available
353
Chapter 101 Additional Commands
This example displays run-time SFP (Small Form Factor Pluggable) parameters on port 21 on the Switch.
You can also see the alarm and warning thresholds for temperature, voltage, transmission bias,
transmission and receiving power as shown.
Port : 21 (SFP)
Vendor : ZyXEL
Part Number : SFP-LX-10-D
Series Number : S081133000074
Revision : V1.0
Date Code : 2008-08-11
Transceiver : 1000BASE-LX
This example displays the firmware version the Switch is currently using..
This example displays route information to an Ethernet device with IP address 192.168.1.100.
354
P ART VI
Appendices and
Index of
Commands
Default Values (356)
355
APPENDIX A
Default Values
Some commands, particularly no commands, reset settings to their default values. The following table
identifies the default values for these settings.
Method 2: none
Method 3: none
no aaa authentication login Method 1: local
Method 2: none
Method 3: none
no aaa accounting update 0 minutes
1 second
no radius-server <index> IP address: 0.0.0.0
Key: blank
no radius-accounting <index> IP address: 0.0.0.0
Key: blank
356
Index of Commands
Index of Commands
[ circuit-id [slot-port] [vlan] [hostname] [string <string>] ] [ remote-id [mac] [string <string>] ] ...............................83
8021p-priority <0-7> .................................................................................................................................................................219
aaa accounting commands <privilege> stop-only tacacs+ [broadcast] ....................................................................27
aaa accounting dot1x <start-stop|stop-only> <radius|tacacs+> [broadcast] ...............................................................28
aaa accounting exec <start-stop|stop-only> <radius|tacacs+> [broadcast] ................................................................28
aaa accounting system <radius|tacacs+> [broadcast] .....................................................................................................28
aaa accounting update periodic <1-2147483647> ..............................................................................................................27
aaa authentication enable <method1> [<method2> ...] .....................................................................................................27
aaa authentication login <method1> [<method2> ...] .........................................................................................................27
aaa authorization console .......................................................................................................................................................28
aaa authorization dot1x radius ................................................................................................................................................28
aaa authorization exec <radius|tacacs+> ...........................................................................................................................28
admin-password [cipher] <pw-string> ..............................................................................................................................230
admin-password <pw-string> <confirm-string> .........................................................................................................230
alarm-index ..............................................................................................................................................................................267
anti arpscan ...............................................................................................................................................................................30
anti arpscan host threshold <2-100> .......................................................................................................................................30
anti arpscan port threshold <2-255> .......................................................................................................................................30
anti arpscan trust .......................................................................................................................................................................31
anti arpscan trust host <ip-address> <mask> [ name <name> ] .......................................................................................30
area <area-id> ......................................................................................................................................................................224
area <area-id> authentication ...........................................................................................................................................224
area <area-id> authentication message-digest ..............................................................................................................224
area <area-id> default-cost <0-16777215> .......................................................................................................................224
area <area-id> name <name> ............................................................................................................................................224
area <area-id> nssa .............................................................................................................................................................224
area <area-id> nssa no-summary .......................................................................................................................................225
area <area-id> stub ..............................................................................................................................................................224
area <area-id> stub no-summary .......................................................................................................................................224
area <area-id> virtual-link <router-id> authentication-key <key> ............................................................................225
area <area-id> virtual-link <router-id> ...........................................................................................................................225
area <area-id> virtual-link <router-Id> authentication-same-as-area .........................................................................225
area <area-id> virtual-link <router-id> dead-interval <1-65535> ................................................................................225
area <area-id> virtual-link <router-id> hello-interval <1-65535> .................................................................................225
area <area-id> virtual-link <router-id> message-digest-key <keyid> md5 <key> ..................................................225
area <area-id> virtual-link <router-id> name <name> ..................................................................................................225
area <area-id> virtual-link <router-id> retransmit-interval <1-65535> ........................................................................225
area <area-id> virtual-link <router-id> transmit-delay <1-65535> ...............................................................................225
arp aging-time <60-1000000> ..................................................................................................................................................32
arp inspection ............................................................................................................................................................................34
arp inspection filter-aging-time <1-2147483647> ...................................................................................................................34
arp inspection filter-aging-time none .....................................................................................................................................34
arp inspection log-buffer entries <0-1024> .............................................................................................................................35
arp inspection log-buffer logs <0-1024> interval <0-86400> .................................................................................................35
arp inspection trust ....................................................................................................................................................................35
arp inspection vlan <vlan-list> ...........................................................................................................................................35
arp inspection vlan <vlan-list> logging [all|none|permit|deny] ................................................................................35
arp name <name> ip <ip-address> mac <mac-addr> vlan <vlan-id> interface port-channel <port-list> ........32
arp name <name> ip <ip-address> mac <mac-addr> vlan <vlan-id> interface port-channel <port-list> inactive
32
357
Index of Commands
358
Index of Commands
359
Index of Commands
360
Index of Commands
exit .............................................................................................................................................................................................121
exit .............................................................................................................................................................................................139
exit .............................................................................................................................................................................................226
exit .............................................................................................................................................................................................265
exit .............................................................................................................................................................................................340
exit .............................................................................................................................................................................................344
exit ...............................................................................................................................................................................................53
exit ...............................................................................................................................................................................................93
external-alarm <index> name <name_string> .................................................................................................................104
fe-spq <q0|q1| ... |q7> .........................................................................................................................................................259
fixed <port-list> ..................................................................................................................................................................322
flow-control ..............................................................................................................................................................................132
forbidden <port-list> .........................................................................................................................................................322
frame-type <all|tagged|untagged> ..................................................................................................................................132
garp join <100-65535> leave <200-65535> leaveall <200-65535> ......................................................................................106
ge-spq <q0|q1| ... |q7> .......................................................................................................................................................258
green-ethernet auto-power-down .......................................................................................................................................108
green-ethernet auto-power-down .......................................................................................................................................109
green-ethernet eee ................................................................................................................................................................108
green-ethernet eee ................................................................................................................................................................109
green-ethernet short-reach ...................................................................................................................................................109
green-ethernet short-reach ...................................................................................................................................................109
group <name> start-address <ip> end-address <ip> .........................................................................................................219
gvrp ...........................................................................................................................................................................................112
help .............................................................................................................................................................................................11
history ..........................................................................................................................................................................................11
historycontrol-index ......................................................................................................................................................267
hostname <name> ...................................................................................................................................................................346
https cert-regeneration <rsa|dsa> .......................................................................................................................................115
hybrid-spq <q0|q1|...|q7> ...................................................................................................................................................258
hybrid-spq lowest-queue <q0|q1| ... |q7> .........................................................................................................................258
id-permission < none | chassis | management | chassis-management> ........................................................................53
igmp-filtering ............................................................................................................................................................................130
igmp-filtering profile <name> ..................................................................................................................................................130
igmp-filtering profile <name> start-address <ip> end-address <ip> .................................................................................130
igmp-flush .................................................................................................................................................................................123
igmp-group-limited .................................................................................................................................................................127
igmp-group-limited number <number> ................................................................................................................................128
igmp-immediate-leave ..........................................................................................................................................................128
igmp-querier-mode <auto|fixed|edge> ............................................................................................................................128
igmp-snooping ........................................................................................................................................................................123
igmp-snooping 8021p-priority <0-7> ......................................................................................................................................123
igmp-snooping authentication ..............................................................................................................................................126
igmp-snooping authentication-timeout <0-3000> ..............................................................................................................123
igmp-snooping fast-leave-timeout <200-6348800> .............................................................................................................126
igmp-snooping filtering ...........................................................................................................................................................123
igmp-snooping filtering profile <name> .................................................................................................................................126
igmp-snooping filtering profile <name> start-address <ip> end-address <ip> ...............................................................123
igmp-snooping group-limited ................................................................................................................................................127
igmp-snooping group-limited action <deny|replace> .....................................................................................................127
igmp-snooping group-limited number <number> ...............................................................................................................127
igmp-snooping host-timeout <1-16711450> .........................................................................................................................124
igmp-snooping leave-mode <normal|immediate|fast> ..................................................................................................127
igmp-snooping leave-proxy ...................................................................................................................................................124
igmp-snooping leave-timeout <1-16711450> ......................................................................................................................124
igmp-snooping leave-timeout <200-6348800> ....................................................................................................................127
igmp-snooping querier ...........................................................................................................................................................124
igmp-snooping querier-mode <auto|fixed|edge> ...........................................................................................................127
igmp-snooping report-proxy ..................................................................................................................................................124
361
Index of Commands
362
Index of Commands
363
Index of Commands
ipv6 ............................................................................................................................................................................................154
ipv6 address <ipv6-address>/<prefix> ...........................................................................................................................154
ipv6 address <ipv6-address>/<prefix> eui-64 ...............................................................................................................154
ipv6 address <ipv6-address>/<prefix> link-local ..........................................................................................................154
ipv6 address autoconfig .........................................................................................................................................................155
ipv6 address default-gateway <gateway-ipv6-address> ..............................................................................................155
ipv6 address dhcp client <ia-na> ..........................................................................................................................................155
ipv6 address dhcp client <ia-na> [rapid-commit] ..............................................................................................................155
ipv6 address dhcp client information refresh minimum <600-4294967295> .....................................................................155
ipv6 address dhcp client option <[dns][domain-list]> ........................................................................................................155
ipv6 dhcp relay vlan <1-4094> helper-address <remote-dhcp-server> .......................................................................156
ipv6 dhcp relay vlan <1-4094> option interface-id .............................................................................................................156
ipv6 dhcp relay vlan <1-4094> option remote-id <remote-id> ......................................................................................156
ipv6 dhcp trust .........................................................................................................................................................................156
ipv6 dhcp trust .........................................................................................................................................................................156
ipv6 hop-limit <1-255> .............................................................................................................................................................163
ipv6 icmp error-interval <0-2147483647> [bucket-size <1-200>] .........................................................................................157
ipv6 mld snooping-proxy ........................................................................................................................................................158
ipv6 mld snooping-proxy 8021p-priority <0-7> .....................................................................................................................158
ipv6 mld snooping-proxy filtering ...........................................................................................................................................158
ipv6 mld snooping-proxy filtering group-limited ..................................................................................................................158
ipv6 mld snooping-proxy filtering group-limited number <number> .................................................................................158
ipv6 mld snooping-proxy filtering profile <name> .................................................................................................................158
ipv6 mld snooping-proxy filtering profile <name> start-address <ip> end-address <ip> ...............................................158
ipv6 mld snooping-proxy vlan <vlan-id> ...........................................................................................................................158
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list> ...................................158
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list> fast-leave-timeout <2-
16775168> ..................................................................................................................................................................158
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list> leave-timeout <2-
16775168> ..................................................................................................................................................................158
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list> mode <immediate | nor-
mal | fast> .................................................................................................................................................................159
ipv6 mld snooping-proxy vlan <vlan-id> downstream query-interval <1000-31744000> .............................................159
ipv6 mld snooping-proxy vlan <vlan-id> downstream query-max-response-time <1000-25000> ..............................159
ipv6 mld snooping-proxy vlan <vlan-id> upstream interface port-channel <port-list> ........................................159
ipv6 mld snooping-proxy vlan <vlan-id> upstream last-listener-query-interval <1-8387584> ......................................159
ipv6 mld snooping-proxy vlan <vlan-id> upstream query-interval <1000-31744000> ..................................................159
ipv6 mld snooping-proxy vlan <vlan-id> upstream query-max-response-time <1000-25000> ....................................160
ipv6 mld snooping-proxy vlan <vlan-id> upstream robustness-variable <1-25> ..........................................................160
ipv6 nd dad-attempts <0-600> ..............................................................................................................................................161
ipv6 nd managed-config-flag ...............................................................................................................................................161
ipv6 nd ns-interval <1000-3600000> .......................................................................................................................................161
ipv6 nd other-config-flag .......................................................................................................................................................161
ipv6 nd prefix <ipv6-prefix>/<prefix-length> ............................................................................................................162
ipv6 nd prefix <ipv6-prefix>/<prefix-length> <[valid-lifetime <0-4294967295>] [preferred-lifetime <0-
4294967295>] [no-autoconfig] [no-onlink] [no-advertise]> .................................................................................162
ipv6 nd ra interval minimum <3-1350> maximum <4-1800> ...............................................................................................162
ipv6 nd ra lifetime <0-9000> ...................................................................................................................................................162
ipv6 nd ra suppress ..................................................................................................................................................................162
ipv6 nd reachable-time <1000-3600000> .............................................................................................................................162
ipv6 neighbor <interface-type> <interface-number> <ipv6-address> <mac-address> ...................................163
ipv6 route <ipv6-prefix>/<prefix-length> <next-hop> ...........................................................................................163
ipv6 route <ipv6-prefix>/<prefix-length> <next-hop> <interface-type> <interface-number> ................163
ipv6 snooping attach-policy <name> ....................................................................................................................................164
ipv6 snooping policy <name> .................................................................................................................................................164
ipv6 source binding <ipv6-address |ipv6-address/prefix-length> [mac <mac-addr>] [vlan <vlan-id>] [inter-
face port-channel <port-list>] ..........................................................................................................................164
ipv6 source-guard policy <name> .........................................................................................................................................165
kick tcp <session id> ..........................................................................................................................................................140
364
Index of Commands
l2protocol-tunnel .....................................................................................................................................................................173
l2protocol-tunnel .....................................................................................................................................................................174
l2protocol-tunnel cdp .............................................................................................................................................................173
l2protocol-tunnel mac <mac-addr> .....................................................................................................................................174
l2protocol-tunnel mode <access|tunnel> ...........................................................................................................................173
l2protocol-tunnel point-to-point ............................................................................................................................................173
l2protocol-tunnel point-to-point lacp ...................................................................................................................................173
l2protocol-tunnel point-to-point pagp .................................................................................................................................174
l2protocol-tunnel point-to-point udld ...................................................................................................................................174
l2protocol-tunnel stp ...............................................................................................................................................................174
l2protocol-tunnel vtp ..............................................................................................................................................................174
lacp ...........................................................................................................................................................................................315
lacp system-priority <1-65535> ...............................................................................................................................................316
limit address-count <number> ...............................................................................................................................................164
lldp ............................................................................................................................................................................................179
lldp admin-status <disabled|tx-only|rx-only|tx-rx> ............................................................................................................177
lldp basic-tlv management-address .....................................................................................................................................177
lldp basic-tlv port-description ................................................................................................................................................177
lldp basic-tlv system-capabilities ...........................................................................................................................................177
lldp basic-tlv system-description ............................................................................................................................................177
lldp basic-tlv system-name .....................................................................................................................................................177
lldp dcbx application <ether-type><fcoe> priority <0-7> .................................................................................................80
lldp med location civic [county <county>] [city <city>] [division <division>] [neighbor <neighbor>]
[street <street>] [leading-street-direction <value>] [trailing-street-suffix <value>] [street-suffix <value>]
[house-number <num>] [house-number-suffix <value>] [landmark <landmark>] [additional-
location <value>] [name <value>] [zip-code <value>] [building <value>] [unit <value>] [floor
<value>] [room-number <value>] [place-type <value>] [postal-community-name <value>]
[post-office-box <value>] [additional-code <value>] ...............................................................................177
lldp med location coordinate [latitude <north|south> <value>][longitude <west|east > <value>][altitude <me-
ters|floor> <value>][datum <WGS84|NAD83-NAVD88|NAD83-MLLW>] ........................................................178
lldp med location elin <number> ......................................................................................................................................178
lldp med network-policy <voice|voice-signaling|guest-voice|guest-voice-signaling|softphone-voice|video-con-
ferencing|streaming-video|video-signaling> [tagged|untagged][vlan <vlan-id>][priority <priori-
ty>][dscp <dscp>] ...................................................................................................................................................178
lldp med topology-change-notification ..............................................................................................................................178
lldp notification ........................................................................................................................................................................178
lldp org-specific-tlv dot1 dcbx-application-priority ...............................................................................................................82
lldp org-specific-tlv dot1 dcbx-ets-configuration ..................................................................................................................82
lldp org-specific-tlv dot1 dcbx-pfc-configuration .................................................................................................................82
lldp org-specific-tlv dot1 port-protocol-vlan-id ...................................................................................................................178
lldp org-specific-tlv dot1 port-vlan-id ....................................................................................................................................178
lldp org-specific-tlv dot3 link-aggregation ...........................................................................................................................178
lldp org-specific-tlv dot3 mac-phy ........................................................................................................................................178
lldp org-specific-tlv dot3 max-frame-size .............................................................................................................................178
lldp org-specific-tlv dot3 power-via-mdi ..............................................................................................................................178
lldp org-specific-tlv med location .........................................................................................................................................178
lldp org-specific-tlv med network-policy ..............................................................................................................................178
lldp reinitialize-delay <1-10> ...................................................................................................................................................179
lldp transmit-delay <1-8192> ..................................................................................................................................................179
lldp transmit-hold <2-10> ........................................................................................................................................................180
lldp transmit-interval <5-32768> .............................................................................................................................................180
locator-led ................................................................................................................................................................................346
locator-led <1-1440> ...............................................................................................................................................................346
logins username <name> password [cipher] <password> privilege <0-14> ..................................................................191
logout ........................................................................................................................................................................................344
loopguard ................................................................................................................................................................................193
loopguard ................................................................................................................................................................................193
mac-address ............................................................................................................................................................................51
mac-aging-time <10-1000000> ..............................................................................................................................................195
365
Index of Commands
mac-authentication ................................................................................................................................................................197
mac-authentication ................................................................................................................................................................198
mac-authentication nameprefix <name-string> .............................................................................................................197
mac-authentication password <name-string> .................................................................................................................197
mac-authentication timeout <1-3000> ................................................................................................................................197
mac-authentication trusted-vlan <vlan-list> .................................................................................................................198
mac-based-vlan name <name> source-mac <mac-addr> vlan <vlan-id> priority <0-7> ..........................................199
mac-filter name <name> mac <mac-addr> vlan <vlan-id> ............................................................................................201
mac-filter name <name> mac <mac-addr> vlan <vlan-id> drop <src|dst|both> ......................................................201
mac-filter name <name> mac <mac-addr> vlan <vlan-id> inactive .............................................................................201
mac-flush [<port-num>] .........................................................................................................................................................195
mac-forward name <name> mac <mac-addr> vlan <vlan-id> interface <interface-id> .....................................203
mac-forward name <name> mac <mac-addr> vlan <vlan-id> interface <interface-id> inactive ......................203
mac-pinning ............................................................................................................................................................................204
mac-pinning ............................................................................................................................................................................204
mac-transfer dynamic-to-filter interface port-channel <port-list> .............................................................................195
mac-transfer dynamic-to-filter mac <mac-addr> ...............................................................................................................195
mac-transfer dynamic-to-filter vlan <vlan-list> .............................................................................................................195
mac-transfer dynamic-to-forward interface port-channel <port-list> .......................................................................196
mac-transfer dynamic-to-forward mac <mac-addr> ........................................................................................................196
mac-transfer dynamic-to-forward vlan <vlan-list> .......................................................................................................196
ma-index ....................................................................................................................................................................................51
md-index ..................................................................................................................................................................................51
media-type 10g <SFP+|DAC10G> ........................................................................................................................................133
mep <mep-id> interface port-channel <port> direction <up|down> priority <0-7> .....................................................53
mep <mep-id> interface port-channel <port> direction <up|down> priority <0-7> cc-enable ..................................53
mep <mep-id> interface port-channel <port> direction <up|down> priority <0-7> inactive ......................................53
mep-id .......................................................................................................................................................................................51
mhf-creation < none | default | explicit> .............................................................................................................................53
mirror .........................................................................................................................................................................................207
mirror dir <ingress|egress|both> ...........................................................................................................................................207
mirror-filter egress mac <mac-addr> .....................................................................................................................................207
mirror-filter egress type <all|dest|src> .................................................................................................................................207
mirror-filter ingress mac <mac-addr> ....................................................................................................................................207
mirror-filter ingress type <all|dest|src> .................................................................................................................................207
mirror-port .................................................................................................................................................................................206
mirror-port <port-num> ..........................................................................................................................................................206
mode <dynamic|compatible> ............................................................................................................................................219
mode zynos ..............................................................................................................................................................................346
mrstp <tree-index> ..............................................................................................................................................................210
mrstp <tree-index> hello-time <1-10> maximum-age <6-40> forward-delay <4-30> ..................................................210
mrstp <tree-index> priority <0-61440> ...............................................................................................................................210
mrstp interface <port-list> ................................................................................................................................................210
mrstp interface <port-list> edge-port .............................................................................................................................211
mrstp interface <port-list> path-cost <1-65535> ...........................................................................................................211
mrstp interface <port-list> priority <0-255> ....................................................................................................................211
mrstp interface <port-list> rootguard .............................................................................................................................211
mrstp interface <port-list> tree-index <tree-index> ..................................................................................................211
mstp ..........................................................................................................................................................................................213
mstp configuration-name <name> ........................................................................................................................................213
mstp hello-time <1-10> maximum-age <6-40> forward-delay <4-30> ..............................................................................213
mstp instance <number> interface port-channel <port-list> .......................................................................................214
mstp instance <number> interface port-channel <port-list> path-cost <1-65535> ..................................................214
mstp instance <number> interface port-channel <port-list> priority <0-255> ...........................................................214
mstp instance <number> priority <0-61440> .........................................................................................................................214
mstp instance <number> vlan <vlan-list> .......................................................................................................................214
mstp interface port-channel <port-list> edge-port ......................................................................................................213
mstp interface port-channel <port-list> rootguard ......................................................................................................214
mstp max-hop <1-255> ...........................................................................................................................................................213
366
Index of Commands
367
Index of Commands
368
Index of Commands
369
Index of Commands
370
Index of Commands
371
Index of Commands
no multi-login ...........................................................................................................................................................................218
no mvr <vlan-id> ..................................................................................................................................................................219
no network <ip-addr/bits> ................................................................................................................................................226
no non-querier .........................................................................................................................................................................121
no passive-iface <ip-addr/bits> .......................................................................................................................................226
no password encryption .........................................................................................................................................................230
no password privilege <0-14> ..............................................................................................................................................230
no permit link-local ..................................................................................................................................................................165
no policy <name> .....................................................................................................................................................................237
no policy <name> inactive ......................................................................................................................................................237
no port-access-authenticator ...............................................................................................................................................118
no port-access-authenticator <port-list> ......................................................................................................................118
no port-access-authenticator <port-list> guest-vlan ...................................................................................................118
no port-access-authenticator <port-list> guest-vlan Host-mode ...............................................................................118
no port-access-authenticator <port-list> reauthenticate ...........................................................................................118
no port-access-authenticator eapol-flood ..........................................................................................................................118
no port-security ........................................................................................................................................................................241
no port-security <port-list> ...............................................................................................................................................241
no port-security <port-list> learn inactive ......................................................................................................................241
no port-security <port-list> vlan <vlan-id> address-limit ...........................................................................................241
no port-security <port-list> vlan <vlan-id> address-limit inactive ............................................................................242
no pppoe intermediate-agent ..............................................................................................................................................245
no pppoe intermediate-agent format-type access-node-identifier ................................................................................246
no pppoe intermediate-agent format-type circuit-id ........................................................................................................245
no pppoe intermediate-agent format-type identifier-string ..............................................................................................246
no pppoe intermediate-agent format-type identifier-string hostname ...........................................................................246
no pppoe intermediate-agent format-type remote-id ......................................................................................................245
no pppoe intermediate-agent trust ......................................................................................................................................245
no pppoe intermediate-agent vlan <vlan-id> format-type circuit-id ...........................................................................245
no pppoe intermediate-agent vlan <vlan-id> format-type remote-id .........................................................................245
no pppoe intermediate-agent vlan <vlan-list> ............................................................................................................246
no pppoe intermediate-agent vlan <vlan-list> circuit-id ............................................................................................246
no pppoe intermediate-agent vlan <vlan-list> remote-id ..........................................................................................245
no preempt ..............................................................................................................................................................................339
no prefix-glean ........................................................................................................................................................................164
no primary-virtual-ip ................................................................................................................................................................339
no primary-virtual-ip <ip-address> .....................................................................................................................................339
no priority-flow-control ..............................................................................................................................................................76
no priority-flow-control priority .................................................................................................................................................76
no private-vlan <primary | isolated | community> ...........................................................................................................252
no private-vlan <vlan-id> ....................................................................................................................................................250
no private-vlan <vlan-id> inactive .....................................................................................................................................250
no private-vlan association ....................................................................................................................................................252
no private-vlan association <secondary-vlan-list> .....................................................................................................253
no private-vlan mode .............................................................................................................................................................253
no protocol dhcp ....................................................................................................................................................................164
no protocol-based-vlan ethernet-type <ether-num|ip|ipx|arp|rarp|appletalk|decnet> ......................................256
no pwr interface <port-list> .............................................................................................................................................232
no pwr interface <port-list> max-power ........................................................................................................................232
no pwr mibtrap ........................................................................................................................................................................232
no radius-accounting <index> .............................................................................................................................................262
no radius-accounting <index> .............................................................................................................................................356
no radius-server <index> .......................................................................................................................................................261
no radius-server <index> .......................................................................................................................................................356
no receiver-port <port-list> ..............................................................................................................................................219
no redistribute rip .....................................................................................................................................................................226
no redistribute static ................................................................................................................................................................226
no remote-management <index> .......................................................................................................................................263
no remote-management <index> service <[telnet] [ftp] [http] [icmp] [snmp] [ssh] [https]> ......................................263
372
Index of Commands
373
Index of Commands
374
Index of Commands
375
Index of Commands
376
Index of Commands
377
Index of Commands
show ethernet cfm local stack mep <mep-id> ma <ma-index> md <md-index> mep-ccmdb [remote-mep <mep-
id>] ...............................................................................................................................................................................54
show ethernet cfm local stack mip .........................................................................................................................................54
show ethernet cfm local stack mip mip-ccmdb ...................................................................................................................54
show ethernet cfm remote ......................................................................................................................................................55
show ethernet cfm virtual-mac ...............................................................................................................................................55
show ethernet cfm virtual-mac port <port-list> .....................................................................................................................55
show ethernet oam discovery <port-list> ........................................................................................................................99
show ethernet oam statistics <port-list> ...........................................................................................................................99
show ethernet oam summary ..................................................................................................................................................99
show except-smac ..................................................................................................................................................................345
show external-alarm ...............................................................................................................................................................104
show garp ................................................................................................................................................................................106
show green-ethernet auto-power-down .............................................................................................................................109
show green-ethernet eee ......................................................................................................................................................109
show green-ethernet short-reach .........................................................................................................................................109
show hardware-monitor <C|F> .............................................................................................................................................345
show https ................................................................................................................................................................................115
show https certificate .............................................................................................................................................................115
show https key <rsa|dsa> ......................................................................................................................................................115
show https session ...................................................................................................................................................................115
show igmp-filtering profile ......................................................................................................................................................130
show igmp-snooping ..............................................................................................................................................................124
show igmp-snooping filtering profile .....................................................................................................................................124
show igmp-snooping group all ..............................................................................................................................................124
show igmp-snooping group client < [vlan <vlan-list>] [interface port-channel <port-list>] [multicast-group
<group-address>] > ...............................................................................................................................................125
show igmp-snooping group client all ...................................................................................................................................125
show igmp-snooping group count ........................................................................................................................................125
show igmp-snooping group interface port-channel <port-list> .................................................................................125
show igmp-snooping group interface port-channel <port-list> count ......................................................................125
show igmp-snooping group vlan <vlan-list> ..................................................................................................................125
show igmp-snooping group vlan <vlan-list> count ......................................................................................................125
show igmp-snooping querier .................................................................................................................................................125
show igmp-snooping statistics interface port-channel <port-list> ..............................................................................125
show igmp-snooping statistics system ...................................................................................................................................125
show igmp-snooping statistics vlan <vlan-list> ..............................................................................................................125
show igmp-snooping vlan ......................................................................................................................................................125
show interface loopback .......................................................................................................................................................137
show interface loopback <0-7> ............................................................................................................................................137
show interfaces <port-list> ...............................................................................................................................................133
show interfaces config <port-list> ...................................................................................................................................133
show interfaces config <port-list> bandwidth-control ...................................................................................................42
show interfaces config <port-list> bstorm-control ..........................................................................................................46
show interfaces config <port-list> egress .......................................................................................................................243
show interfaces config <port-list> igmp-filtering ...........................................................................................................130
show interfaces config <port-list> igmp-group-limited ................................................................................................126
show interfaces config <port-list> igmp-immediate-leave .........................................................................................126
show interfaces config <port-list> igmp-query-mode ..................................................................................................126
show interfaces config <port-list> igmp-snooping filtering ..........................................................................................126
show interfaces config <port-list> igmp-snooping group-limited ...............................................................................126
show interfaces config <port-list> igmp-snooping leave-mode .................................................................................126
show interfaces config <port-list> igmp-snooping query-mode ................................................................................126
show interfaces config <port-list> protocol-based-vlan ..............................................................................................255
show interfaces config <port-list> trtcm dscp profile ...................................................................................................318
show interfaces status .............................................................................................................................................................345
show interfaces transceiver <port-list> ..........................................................................................................................345
show interfaces utilization ......................................................................................................................................................133
show ip ......................................................................................................................................................................................140
378
Index of Commands
379
Index of Commands
380
Index of Commands
381
Index of Commands
382
Index of Commands
Stacking ....................................................................................................................................................................................288
Stacking force-master ............................................................................................................................................................288
Stacking priority <1-63> ...........................................................................................................................................................288
Stacking slot-id <current slot-id> renumber <new slot-id> ..................................................................................................288
Stacking slot-id <current slot-id> renumber auto ................................................................................................................288
storm-control ..............................................................................................................................................................................46
subnet-based-vlan ..................................................................................................................................................................303
subnet-based-vlan dhcp-vlan-override ...............................................................................................................................303
subnet-based-vlan name <name> source-ip <ip> mask-bits <mask-bits> source-port <port> vlan <vlan-id> priority
<0-7> ...........................................................................................................................................................................303
subnet-based-vlan name <name> source-ip <ip> mask-bits <mask-bits> vlan <vlan-id> priority <0-7> ................303
subnet-based-vlan name <name> source-ip <ip> mask-bits <mask-bits> vlan <vlan-id> priority <0-7> inactive .303
summary-address <ip-address> <mask> ...........................................................................................................................227
switchport access <vlan-id> .................................................................................................................................................67
switchport forbidden vlan add <vlan-list> .......................................................................................................................68
switchport forbidden vlan add all ...........................................................................................................................................68
switchport forbidden vlan remove <vlan-list> .................................................................................................................68
switchport forbidden vlan remove all .....................................................................................................................................68
switchport hybrid allowed vlan <vlan-list> tagged ........................................................................................................67
switchport hybrid allowed vlan <vlan-list> untagged ....................................................................................................67
switchport hybrid pvid <vlan-id> ..........................................................................................................................................67
switchport mode <access|trunk|hybrid> .............................................................................................................................66
switchport mode access ..........................................................................................................................................................67
switchport mode hybrid ...........................................................................................................................................................67
switchport mode trunk ..............................................................................................................................................................67
switchport trunk allowed vlan <vlan-list> .........................................................................................................................67
switchport trunk allowed vlan all .............................................................................................................................................67
switchport trunk native vlan <vlan-id> ................................................................................................................................67
sync running-config .................................................................................................................................................................276
syslog .........................................................................................................................................................................................305
syslog server <ip-address> inactive ...................................................................................................................................305
syslog server <ip-address> level <level> [udp <socket-number>] ...............................................................................305
syslog type <type> ..................................................................................................................................................................305
syslog type <type> facility <0-7> ...........................................................................................................................................305
syslog type commands privilege <0-14> ..............................................................................................................................305
tacacs-accounting host <index> <ip> [acct-port <socket-number>] [key [cipher] <key-string>] ......................307
tacacs-accounting timeout <1-1000> ..................................................................................................................................307
tacacs-server host <index> <ip> [auth-port <socket-number>] [key [cipher] <key-string>] ................................307
tacacs-server mode <index-priority|round-robin> .............................................................................................................307
tacacs-server timeout <1-1000> ............................................................................................................................................307
tagged <port-list> .............................................................................................................................................................219
tech-support cpu <threshold> keep <time> ........................................................................................................................308
tech-support mbuf <threshold> .............................................................................................................................................308
telnet ipv4_address .............................................................................................................................................................346
test interface port-channel <port-list> ...........................................................................................................................346
threshold <ttl-value> ............................................................................................................................................................93
time <hour:min:sec> ................................................................................................................................................................72
time date <month/day/year> .................................................................................................................................................72
time daylight-saving-time .........................................................................................................................................................72
time daylight-saving-time end-date <week> <day> <month> <o’clock> ........................................................................73
time daylight-saving-time help ................................................................................................................................................73
time daylight-saving-time start-date <week> <day> <month> <o’clock> ........................................................................73
time timezone <-1200|...|1200> ..............................................................................................................................................72
time-range <name> [ absolute start <hh:mm> <1-31> <jan-dec> <1970-2037> end <hh:mm> <1-31> <jan-dec> <1970-
2037> ..........................................................................................................................................................................312
time-range <name> [ periodic <[ <monday|tuesday|wednesday|thursday|friday|saturday|sunday><hh:mm> to
monday|tuesday|wednesday|thursday|friday|saturday|sunday> <hh:mm>][<[monday][tues-
day][wednesday][thursday][friday][saturday][sunday]|daily|weekdays|weekend> <hh:mm> to <hh:mm>]
312
383
Index of Commands
384
Index of Commands
385