BCF 4.7 CLI Reference Guide 2018.05.24
BCF 4.7 CLI Reference Guide 2018.05.24
7
CLI Reference Guide
RELEASE DATE: May 24, 2018
Document Version 1.0, May 24, 2018
Big Switch Networks Confidential
Big Cloud Fabric CLI Reference Guide
Table of Contents
Chapter 1: Configuration Fundamentals ..................................................................................................................... 12
CLI Conventions ....................................................................................................................................................... 12
Logging In ................................................................................................................................................................. 12
Resetting the Administrator Password .................................................................................................................... 13
Using Modes ............................................................................................................................................................ 13
Using Submodes ...................................................................................................................................................... 13
Entering Text Descriptions ................................................................................................................................... 14
Navigation ............................................................................................................................................................ 14
Using CLI Help .......................................................................................................................................................... 15
Removing Configuration .......................................................................................................................................... 15
Redirecting and Saving Command Output............................................................................................................... 15
Entering Text Descriptions ....................................................................................................................................... 15
Managing the CLI Session ........................................................................................................................................ 15
CLI Session Timeout ................................................................................................................................................. 16
Changing the CLI Display Lines ................................................................................................................................. 16
Changing the Login Banner ...................................................................................................................................... 16
Managing Administrator Access .............................................................................................................................. 16
Traffic Rate History .................................................................................................................................................. 17
Copying Files to the Controller ................................................................................................................................ 17
Chapter 2: Login Mode Commands ............................................................................................................................. 19
debug Command ..................................................................................................................................................... 19
echo Command ........................................................................................................................................................ 20
enable Command ..................................................................................................................................................... 20
exit Command .......................................................................................................................................................... 20
help Command......................................................................................................................................................... 21
history Command .................................................................................................................................................... 22
jobs command ......................................................................................................................................................... 22
logout Command ..................................................................................................................................................... 22
no Command ........................................................................................................................................................... 23
ping Command ......................................................................................................................................................... 23
ping6 Command ....................................................................................................................................................... 24
reauth Command ..................................................................................................................................................... 25
set prompt Command .............................................................................................................................................. 25
show Command ....................................................................................................................................................... 26
support Command ................................................................................................................................................... 26
terminal Command .................................................................................................................................................. 26
traceroute Command .............................................................................................................................................. 27
watch Command ...................................................................................................................................................... 27
whoami Command ................................................................................................................................................... 28
Chapter 3: Enable Mode Commands ........................................................................................................................... 29
boot Command ........................................................................................................................................................ 29
clear bgp neighbors all ............................................................................................................................................. 30
clear debug counters Command .............................................................................................................................. 30
clear error-disabled Command ................................................................................................................................ 31
clear endpoint Command ........................................................................................................................................ 31
clear interface-group ............................................................................................................................................... 32
clear multicast-group ............................................................................................................................................... 32
clear nsx Command ................................................................................................................................................. 33
clear segment Command ......................................................................................................................................... 33
clear session Command ........................................................................................................................................... 33
clear sflow Command .............................................................................................................................................. 34
CLI Conventions
The following typographic and special character conventions are used in the CLI and in the documentation for conciseness
and precision:
• Regular Courier type indicates output displayed by the system in response to user commands or system events, and
variable keywords that must be replaced by user input. In the current version of the document, this typeface is also
used for commands and literal parameters entered by the user.
• Parentheses ( ) indicate the required arguments for a given command.
• The vertical bar (|) indicate alternative options that can be used with a given command. Note that this character is also
used as a literal command at the command line for piping content.
• Square brackets [ ] indicate optional arguments that are not required to complete the command.
• Angle brackets < > indicate that the user should substitute a literal value for the text description, enclosed in quotes,
within the angle brackets.
Note: The CLI is case sensitive and new objects are created without prompting for confirmation. For example, if you create
the object “finance” and later refer to it as “Red” the system creates a new object without prompting for confirmation.
Logging In
To access the CLI, use the console window of the virtual machine running the controller, or use an ssh terminal (port 22) to
connect to the IP address assigned to the controller. Log in as the user admin to access the CLI in login mode. The password
for the admin user is set during the initial setup of the BCF controller. The prompt for login mode is the system name
followed by a right angle bracket (>), as shown the following:
controller login: admin
Password: admin
Last login: …
…
controller-1>
After entering the password for the recovery user, enter the floodlight-reset-password command to set a new admin
account password, as shown in the following example:
recovery@controller:~$ floodlight-reset-password
Enter new admin password:
Re-enter new admin password:
Password updated
recovery@controller:~$ exit
After you exit from recovery mode, you can login to the controller with the admin account using the new
admin account password.
Using Modes
The CLI commands are divided into modes and submodes, which restrict commands to the appropriate context. The main
modes are as follows:
• login mode: Commands available immediately after logging in, with the broadest possible context.
• enable mode: Commands that are available only after entering the enable command.
• config mode: Commands that have a more significant effect on system configuration and that can only be entered after
entering the configure command.
When you login the CLI is in login mode, and the default prompt is the system name followed by a greater than sign:
controller-1>
To change the CLI to enable mode, enter the enable command. The default prompt for enable mode is the system name
followed by a pound sign (#), as shown the following:
controller-1> enable
controller-1#
To change to config mode, enter the configure command. The default prompt for config mode is the system name followed
by (config)#, as shown the following:
controller-1> config
controller-1(config)#
To exit configuration and return to enable mode, type end, as shown the following:
controller-1(config)# end
controller-1#
Using Submodes
Note: All configuration changes related to fabric switches must be made through the controller CLI, which provides
configuration options in the config-switch submode for each switch. Do not log in to the switch to make changes directly
using the switch CLI.
Enter commands in config mode to change to submodes. Each submode allows configuration of a specific type of object. To
change to a submode, enter the submode identifier, which is often followed by an object name.
The prompt for each submode is (config-<submode>)#, where <submode> is the submode identifier, as shown the
following:
controller-1# config
controller-1(config)# user bob
controller-1(config-local-user)#
Some submodes are available from config mode, and others are nested within other submodes. To return to the previous
mode, enter exit. To return directly to enable mode, enter end.
Use submodes to configure the different fabric components. To enter the submode,in general, enter the latter part of the
prompt in config mode, followed by an object name, if required.
Note: Always use quotes (") before and after description text.
You can use the backslash character (\) to indicate the character following should be taken as literal text input. The system
typically uses the backslash to allow the use of a following space in a string. However, a quoted backslash (“\”) may not be
interpreted by the fabric switch CLI and the controller displays an error message if this string is entered. This reservation
regarding quoted special characters may apply to other UTF-8 special characters that cannot be interpreted by the switch
CLI interpreter.
Navigation
The CLI supports navigation common to Linux shells. For example, the following keyboard shortcuts are supported:
To view the path to the current CLI prompt and the configuration under the current submode, enter the show this
command from a nested submode, as in the following example:
controller-1(config-tenant)# show this
! tenant
tenant Red
logical-router
controller-1(config-tenant)#
Interrupt/exit config
controller-1#
For more information about Linux shell keyboard shortcuts and utilities, refer to the following URL:
http://tiswww.case.edu/php/chet/readline/readline.html
To use command completion, press the forward Tab key. To complete the value when possible, press Tab once. To show all
possible entries, press Tab twice or type a question mark (?), as in the following example:
controller-1(config-group)#
controller-1(config-group)#
aaa debug history profile terminal
associate delete local reauth test
banner echo logging show top
boot enable logout snmp-server upgrade
clear end monitor support user
compare exit no switch version
configure fabric ntp system watch
controller group ping tacacs whoami
copy help interface-group tenant
The CLI interpreter accepts a shortened form of any command, but prompts for further input if more than one command
starts with the letters entered. For example, the sh run command is interpreted as show running-config because the
command is unambiguous. However, if you enter co, the system displays the following prompt:
Error: co is ambiguous: choices “compare”, “configure”, “copy”
To display Help text for a specific command, enter help <command> or <command>?.
The help workflow command describes many common operations performed using the CLI that might require using
multiple commands.
Removing Configuration
To reverse the effect of any command, enter the command preceded by the no keyword, as in the following example:
controller-1(config-switch)# no shutdown
Note: Be careful when using the no keyword because, in general, the specified object and any nested configuration is
removed without further warning.
Note: Always use quotes (") before and after description text.
If you don’t enter the password, the system prompts you for it. The following example shows reauthentication with the
user account admin and the password admin:
reauth controller-1> reauth admin admin
If the CLI is in enable mode or config mode, after 10 minutes of inactivity the prompt returns to login mode.
Replace <length> with the number of lines to display, or use term to display as many lines as permitted by the terminal
window. For example, the following command limits the display to 30 lines:
controller-1> terminal length 30
Enclose the banner message in double or single quotes. The following example displays the message “Welcome to the BCF
controller” before displaying the login prompt:
controller-1(config) banner “Welcome to the BCF controller”
To view the current banner message, enter the show banner command from any mode.
The account names and passwords are stored in the local system database. The default administrator user name is admin
and the password is set during First Boot from the factory default configuration.
To create an administrative account or change the password for an existing account, enter config-user submode from config
mode by entering the following command:
controller-1(config)# user <username>
Replace <username> with the name of the administrative account. The system changes to user submode, as indicated by
the following prompt:
controller-1(config-local-user)#
To change the password for the admin account, enter the following command from config mode:
controller-1(config)# user admin
controller-1(config-local-user)# password
Password:
Re-enter:
controller-1(config-local-user)#
The system prompts for the new password for the current account. To identify the account that is currently logged in, enter
the whoami command from any mode, as in the following example:
controller-1> whoami
Id : admin
Groups : admin
Login : 2014-05-18 18:35:44.234000 UTC
Auth ip: 192.168.17.1
controller-1#
The output displays the account ID, any groups to which the account belongs, the time when the user logged in, and the IP
address that was the source of the current session.
Procedure
Step 1. Establish an SCP session to the BCF controller, using the IP address assigned during first boot configuration.
Step 2. Use SCP to copy the file to the controller, as in the following example of copying a BCF controller upgrade
image:
mingtaoyang@Mingtaos-MacBook-Pro:~/Downloads$ scp controller-bcf-4.2.0.iso [email protected]:image
The authenticity of host '10.8.28.15 (10.8.28.15)' can't be established.
RSA key fingerprint is 37:30:a3:17:29:eb:54:86:fa:96:ee:cd:03:de:ec:88.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '10.8.28.15' (RSA) to the list of known hosts.
Big Cloud Fabric 4.2.0 (bcf-4.2.0 #49)
Log in as 'admin' to configure
[email protected]'s password:
Note: It is best to avoid using spaces in the filename to avoid copying identical files with different filenames created by the
presence or absence of a space, which can be easily missed.
Step 3. When prompted, enter the password for the admin user account on the BCF controller.
Big Switch upgrade image push
controller-bcf-4.2.0.iso
100% 2035MB 107.1MB/s 00:19
After accepting the password, the system performs a validation check on the image file, as in the following example:
Validating Image Contents: check for expected contents
Validating image contents: verifying checksums
Image added: version: 4.2.0 build: 52
Big Switch upgrade image accepted
When copying an image that already exists, the system responds with an error message, preventing the existing file from
being overwritten, as in the following example:
. . .<s n i p > . . .
Validating Image Contents: check for expected contents
Validating image contents: verifying checksums
Invalid Use: 52: image/build already exists
Step 4. To verify that an image file has been copied, enter the show image command at the controller CLI prompt, as in
the following example.
controller-1# show image
# Product Version Build
-|-------|-------|-----|
1 bcf 4.2.0 52
C15# show image
# Product Version Build
-|-------|-------|-----|
1 bcf 4.2.0 52
C15# show image
# Product Version Build
-|-------|-------|-----|
1 bcf 4.2.0 51
controller-1#
Step 5. You can also enter the show file command at the controller CLI prompt to verify that a file has been copied, as
in the following example.
C15# show file
# Name Size Created
-|---------------------|----|-----------------------|
1 upgrade-fabric-health 718 2017-06-22 16:32:11 UTC
controller-1#
debug Command
Command Syntax
[no] debug {bash | cli | cli-backtrace | cli-batch | description | rest [{details | brief} | record
<record>]}
Command Mode
Login mode
Command Description
Use the debug command to manage CLI debugging options. The debug command provides access to Big Cloud Fabric
information regarding configuration, system operations, and traffic forwarding that may be useful for troubleshooting or
performance management. The debug bash command provides access to the bash shell. The debug rest keyword causes
the system to display the REST directives required to implement each CLI command that is subsequently entered.
• record <record>: Replace <record> with the filename where the REST API activity is saved
Command Examples
The following example enables and then disables the REST debug mode:
controller-1> debug rest
***** Enabled display rest mode *****
REST-SIMPLE: GET http://127.0.0.1:8080/api/v1/data/controller/core/controller/role
REST-SIMPLE: http://127.0.0.1:8080/api/v1/data/controller/core/controller/role done, 0:00:00.005695
controller-1> no debug rest
REST-POST: POST http://127.0.0.1:8080/api/v1/data/controller/core/aaa/audit-event {"attribute":
[{"value": "no debug rest", "key": "cmd_args"}], "event-type": "cli.command", "session-cookie":
"x4lGCLio1BDi3vaFy8ghgxiV0nzFaKxx"}
REST-POST: http://127.0.0.1:8080/api/v1/data/controller/core/aaa/audit-event done 0:00:00.006402
***** Disabled display rest mode *****
echo Command
Command Syntax
echo <any command>
Command Mode
Login mode
Command Description
Use the echo command to display the subsequent command at the CLI prompt. The echo command causes the command
that follows to be repeated on the next line with no other effect. This command may be useful for creating automated
scripts.
Command Examples
controller-1(config)# echo tenant Red
tenant Red
controller-1(config)#
enable Command
Command Syntax
enable
Command Mode
Login mode
Command Description
Use the enable command to change the CLI prompt to enable mode and access the commands available from enable mode.
Command Examples
controller-1> enable
controller-1#
exit Command
Command Syntax
exit
Command Mode
Login mode
Command Description
The exit command returns the CLI prompt to the previous mode or submode. When entered at the login prompt, the exit
command ends the current session and returns the CLI to the login prompt. If you are using SSH, this command ends your
SSH session.
Command Examples
controller-1(config)# exit
controller-1# exit
controller-1>
help Command
Command Syntax
help [<any command> | workflow {cli | config | examples | files | high-availability | introduction |
link | management | policy | interface-group | segment | switch | switchlight | upgrade}]
Command Mode
Login mode
Command Description
Enter the help command without options to list the commands available in the current mode or submode. Enter help
followed by a specific command to display the syntax of the command, along with a description of the command and the
parameters (next keywords). Use the help command with the workflow keyword to display information about a specified
procedure that you may perform using various CLI commands. As an alternative to the help command, type a question
mark (?) after a command to display a brief description of the command, or press the tab key to display the next keywords
allowed.
history Command
Command Syntax
history [<count>]
Command Mode
Login mode
Command Description
The history command shows the commands that have been executed recently. You can optionally specify the number of
the most recent commands you want to display.
To search the contents of the history buffer, type Ctrl-R to search backwards in the history buffer. To exit reverse search
mode, press Ctrl-D.
Command Examples
The following command displays the last three commands in the history buffer:
controller-1> history 3
8: help echo
9: controller history 3
10: history 3
jobs command
Command Syntax
jobs
Command Mode
Login mode
Command Description
Use the jobs command to show suspended jobs.
logout Command
Command Syntax
logout
Command Mode
Login mode
Command Description
Use the logout command to return to the login prompt. If you are using SSH, this command ends the session.
Command Examples
controller-1> logout
Big Cloud Fabric Appliance 2.0.11-SNAPSHOT (bcf_master #2002)
Log in as admin to configure
controller login:
no Command
Command Syntax
no <command>
Command Mode
Login mode
Command Description
The no command removes the configuration that follows the command. Use this command with caution because no
prompt is provided when removing configuration. The no command removes configuration associated with the specified
object or container and any nested configuration without warning.
Command Examples
controller-1> no debug rest
This stops the rest debug mode after it has been previously enabled.
ping Command
Command Syntax
ping <ip4-target | ipv6-target> {controller-management | src-tenant <tenant> src-ip <ip>) [count <ping
count>]
Command Mode
Login mode
Command Description
Use the ping command to transmit 64-byte ICMP v4/v6 packets to the specified address or hostname using IPv4 or IPv6.
This command verifies connectivity between the controller management interface or other source address and the
destination IP address in the specified tenant. The system displays information regarding the response time in milliseconds.
Longer response times may indicate congestion on the target interface.
The controller looks for an endpoint with the specified IP address in the tenant and sends a ping request to the endpoint.
The IP address must belong to one of the segment interface IP subnets of the specified tenant If there is no known
endpoint with the IP address in the tenant, the controller floods one ARP or ICMPv6 NDP Neighbor Solicitation (NS) packet
for the IP address. If the endpoint is known, the controller sends a ping request directly to the endpoint and waits for a
response.
For a single command one packet is transmitted. If the endpoint is unknown, the controller sends a single ARP packet to
discover the endpoint. If the endpoint is known, a single ping request packet is sent to the endpoint.
Alternatively, a switch alias or dpid may be used if it is currently active. In the latter case, the ping command is directed to
the IP address associated with the switch.
controller-management: Use the current controller management IP address for the source of the ping command.
src-tenant <tenant> src-ip <ip>: Identify the tenant and IP address to use for the source of the ping command.
count <integer>: The number of ICMP v4/v6 packets to send.
Command Examples
The following command sends three ICMPv4 packets to 10.192.2.98 from the controller management IP address:
controller-1> ping 10.192.2.98 controller management count 3
PING 10.192.2.98 (10.192.2.98) 56(84) bytes of data.
64 bytes from 10.192.2.98: icmp_req=1 ttl=64 time=0.910 ms
64 bytes from 10.192.2.98: icmp_req=2 ttl=64 time=0.874 ms
64 bytes from 10.192.2.98: icmp_req=3 ttl=64 time=0.847 ms
controller-1>
ping6 Command
Command Syntax
ping6 { <ip6-address> controller-management [count <ping count>]
Command Mode
Login mode
Command Description
Use the ping6 command to transmit 64-byte ICMP packets to the specified IPv6 address. This command verifies connectivity
between the controller management interface and the destination IP address. The system displays information regarding
the response time in milliseconds. Longer response times may indicate congestion on the target interface.
For a single command one packet is transmitted. If the endpoint is unknown, the controller sends an ICMPv6 NDP Neighbor
Solicitation (NS) packet to discover the endpoint. If the endpoint is known, a single ping request packet is sent to the
endpoint.
Command Examples
The following command sends three ICMP packets to the specified IPv6 address from the controller management IP
address:
controller-1> ping 2601:647:c800:20:4af8:b3ff:feeb:e2a1 controller management count 3
PING 10.192.2.98 (10.192.2.98) 56(84) bytes of data.
64 bytes from 10.192.2.98: icmp_req=1 ttl=64 time=0.910 ms
64 bytes from 10.192.2.98: icmp_req=2 ttl=64 time=0.874 ms
64 bytes from 10.192.2.98: icmp_req=3 ttl=64 time=0.847 ms
controller-1>
reauth Command
Command Syntax
reauth [<user> [<password>]]
Command Mode
Login mode
Command Description
Use the reauth command when you are prompted to reauthenticate your session to the controller after the session has
timed out due to inactivity. If the password is omitted, the system prompts for the password.
Command Examples
Reauth> reauth admin admin
controller-1>
Command Syntax
[no] set prompt timestamp
Command Mode
Login mode
Command Description
Use the set prompt command to configure the CLI prompt to display a variety of different strings, including various dynamic
values. When the '%' character appears in the string, the next character identifies various choices, as in the following
examples:
• %@ host
• %# typical prompt characer, '>' for login, '#' for other nested m
• %+ line number
• %~ non-active role (typically standby)
• %$ current mode in parenthesis
• %D date M/D/Y H:M:S
• %T time H:M:S
• %M month
• %d day
• %y year
• %h hour
• %m min
• %s seconds
To include the percent sign, use “%%.” Other characters are displayed as literal values.
show Command
Command Syntax
show <show command>
Command Mode
Login mode
Command Description
Use the show command with one of the available options to display information about Big Cloud Fabric configuration,
operation, or traffic forwarding. Enter the help show command for a list of supported commands. Refer to Chapter 4, “show
Commands” for details about the show commands available.
support Command
Command Syntax
support
Command Mode
Login mode
Command Description
Use the support command to generate a diagnostic bundle of information about the controllers and switches in the Big
Cloud Fabric for technical support.
Command Examples
The following command generates a support bundle, which you can access by using the URL at the bottom of the output.
controller-1> support
Generating diagnostic data bundle for technical support. This may take several minutes...
Name : floodlight-support--controller--2014-09-29--02-36-45--UTC--t_tMmK.tar.gz
Size : 360KB
Fs path : /var/lib/floodlight/support/floodlight-support--controller--2014-09-29--02-36-45--UTC--
t_tMmK.tar.gz
Url : http://192.168.7.11:8443/api/v1/support/floodlight-support--controller--2014-09-29--02-36-45--
UTC--t_tMmK.tar.gz
controller-1>
terminal Command
Command Syntax
terminal {length {<length> | term} | clear}
Command Mode
Login mode
Command Description
Use the set command to specify the number of lines displayed for long system responses.
Command Examples
The following command sets the number of lines displayed to 5.
controller-1> terminal length 5
For help on specific commands: help <topic>
Commands:
debug Manage various cli debugging features
echo Display output of other commands
-- hit q to quit, any character to continue (4) –
When you enter a command with many lines of output, the system prompts you to continue, with the number
of lines already displayed in parenthesis).
traceroute Command
Command Syntax
traceroute <ip-address> src-tenant <tenant-name> [src-ip <ip-address>]
Command Mode
Login mode
Command Description
Use the traceroute command to identify the route from the controller to the specified destination.
watch Command
Command Syntax
watch <command>
Command Mode
Login mode
Command Description
Use the watch command to repeatedly execute the command that follows. To interrupt the display, type Ctrl-C. You can use
the watch command to monitor statistics or other dynamic information of interest.
Command Examples
The following command runs the show controller command repeatedly until it is interrupted by pressing Ctrl-C.
controller-1> watch show controller
Command: "show controller"
Cluster Name : techpubs
Cluster HA Status : paired
~~~~~~~~~~~~~~~~~~~ Nodes ~~~~~~~~~~~~~~~~~~~
# IP @ State Status Uptime
-|--------------|-|------|---------|---------|
1 192.168.17.220 * active connected 9 minutes
Command: "show controller"
Cluster Name : techpubs
Cluster HA Status : paired
~~~~~~~~~~~~~~~~~~~ Nodes ~~~~~~~~~~~~~~~~~~~
# IP @ State Status Uptime
-|--------------|-|------|---------|---------|
1 192.168.17.220 * active connected 9 minutes
^C
Interrupt.
controller-1>
whoami Command
Command Syntax
whoami
Command Mode
Login mode
Command Description
Use the whoami command to display information about the user account currently logged into the controller.
Command Examples
controller-1> whoami
Id : admin
Groups : admin
Login : 2014-06-06 10:37:51.428000 UTC
Auth ip : 192.168.17.1
controller-1>
boot Command
Command Syntax
boot {factory-default | partition {{1 | 2} | alternate | reset }}
Command Mode
Enable mode
Command Description
Use the boot command to reboot the controller from one of the two partitions or from the factory-default image. To view
the current contents of the partitions, use the show boot partition command. To restore the controller to its initial
configuration, use the boot factory-default command.
Command Examples
controller-1(config)# boot factory-default
boot factory default: alternate partition will be overwritten
proceed ("yes" or "y" to continue): yes
boot factory default: copying image into alternate partition
Command Syntax
clear bgp neighbors all
Command Mode
Enable mode
Command Description
Use the clear bgp neighbors all command to reset the current BGP sessions.
Command Syntax
clear debug counters [<modulename> [<events>]]
Command Mode
Enable mode
Command Description
Use the clear command to reset all the debug counters or specific counters based on the BCF controller software module
name.
<events>: Use one of the following optional parameters to clear the counters for a specific event:
• number-of-completed-events-de-queued
• number-of-completed-events-queued
• number-of-events-de-queued
• number-of-events-discarded
• number-of-events-processed
• number-of-events-processed-in-active-state
• number-of-events-processed-in-standby-state
• number-of-events-queued
• number-of-packetIn-ignore
• number-of-role-change-to-primary-processed
• number-of-role-change-to-standby-processed
• number-of-sync-updates-processed
• number-of-transactions-committed
Command Examples
The following example clears the debug counters for the ApplicationManager module.
controller-1# clear debug counters ApplicationManager
controller-1#
Command Syntax
clear error-disabled switch <switch> interface <interface>
Command Mode
Enable mode
Command Description
Use the clear error-disabled command to re-enable a switch interface that has been disabled by BPDU Guard after a BPDU
was received on an interface that should not be receiving BPDUs. This error can be caused by connecting a leaf switch
interface to a spanning tree interface.
A fabric interface will be error disabled if it receives a Spanning tree BPDU. When you clear the error disabled status for an
interface, the system also tries to bring the port back up. However, you must first correct the underlying misconfiguration.
Otherwise, after the interface is brought back up and another Spanning tree BPDU is received on the port, it will be error
disabled again.
Command Examples:
The following command clears the error disabled status for the given switch-interface if it is currently error disabled and
attempts to bring it back up.
controller-1# clear error-disabled switch leaf0 interface ethernet1
controller-1#
The following command clears the error disabled status for all interfaces on the given switch if they are currently error
disabled and attempts to bring them back up.
controller-1# clear error-disabled switch leaf0
controller-1#
Command Syntax
clear endpoint {all | tenant <tenant-name> {all | segment <segment-name> {all | mac <mac>}}}
Command Mode
Enable mode
Command Description
Use the clear endpoint command to clear learned endpoints for a specific tenant, for a specific segment within a tenant, or
for the endpoint associated with a specific MAC address. This command also clears any endpoint that was blocked by the
controller because it was flapping. Flapping means the interface where the endpoint is seen by the controller changes more
frequently than is allowed by the system threshold, which is 10 times in 30 seconds.
Command Examples
The following command clears all learned endpoints associated with the web segment in the Red tenant.
controller-1# clear endpoint tenant Red segment R-Web mac 00:11:22:33:44:55
controller-1#
clear interface-group
clear interface-group {<interface-group-name> | all} counters
Command Mode
Enable mode
Command Description
Use the clear interface-group command to clear the counters for the specified interface group or for all interface groups.
clear multicast-group
Command Syntax
clear multicast-group {all | tenant <tenant-name> {all | segment <Segment Name> {all | group <Group>}}}
Command Mode
Enable mode
Command Description
Use the clear multicast-group command to remove the specified multicast groups.
all | segment <Segment Name>: Clear the multicast groups for the specified tenant for all segments or for the specified
segment.
all | group <group>: Clear all the multicast groups for the specified tenant and segment or for the address of the specific
multicast address.
Command Syntax
clear nsx <nsx-instance> plugin-error
Command Mode
Enable mode
Command Description
Use the clear nsx command to clear the counters for a specific instance of NSX. .
Command Syntax
clear segment {<switch-name> | all} {interface <if-name> | all} counters
Command Mode
Enable mode
Command Description
Use the clear segment command to clear the counters for a specific segment or all segments.
Command Examples
The following command clears the counters for the R-Web segment:
controller-1# clear segment R-Web counters
Command Syntax
clear session {session-id <id> | user {admin | <user>)
Command Mode
Enable mode
Command Description
Use the clear session command to clear the specified sessions or all sessions associated with the specified user.
Command Syntax
clear sflow switch <switch-name> [{collectors | interfaces}]
Command Mode
Enable mode
Command Description
Use the clear sflow command to clear the sFlow collectors or interfaces on the specified switch.
Command Syntax
clear switch {<switch-name> | all} { agent-counters | cpu-queue | pimu-counters }
Command Mode
Enable mode
Command Description
Use the clear switch command to clear the counters for a specific switch or all switches, for a specific interface, or for all
interfaces.
queue: Clear the queue counters for the specified switch and interface.
Command Syntax
clear tenant {<tenant-name> | system | all } [segment {<segment-name> | all ]
{bgp neighbor {name <neighbor-name> | ip <neighbor-ip> | all } [soft [in | out] |
counters |
Command Mode
Enable mode
Command Description
Use the clear tenant counters command to clear the counters for the specified tenant or all tenants or for the specified
segment or all segments. Use the clear tenant bgp command to clear BGP session information for a specific neighbor or all
neighbors. Use the clear tenant logical-router to clear the counters or policy logs for the specified tenant or for all tenants.
Command Syntax
clear test path { <test-name> | all }
Command Mode
Enable mode
Command Description
Use the clear test path command to clear the statistics associated with a specified test path instance or all test path
instances. Use the test path command to define one or more instances of a test path. Use the show test path command to
view the currently defined instances.
Command Examples
The following example clears the statistics associated with the test1 instance.
controller-1# clear test path test1
controller-1#
Command Syntax
clear vcenter-network-config <vcenter-name>
Command Mode
Enable mode
Command Description
Use the clear command to clear the BCF network configuration for the specified vCenter.
Command Description
<vcenter-name>: Identify the vCenter for which you want to clear the BCF network configuration.
compare Command
Command Syntax
compare <source> <dest>
Command Mode
Enable mode
Command Description
Use the compare command to identify any differences between running-config files in different locations. For example, you
can compare the running-config on the current controller to the running-config on a remote server before replacing the
active running-config.
Command Examples
The following command compares the contents of the running-config in the controller repository with the active running-
config.
controller-1# compare running-config snapshot://june11
2,3c2,7
< ! Big Cloud Fabric Appliance 2.0.11-SNAPSHOT (bcf_master #2051)
< ! Current Time: 2014-06-11.05:42:50
> ! Saved-Config june11
> ! Create Time: Wed Jun 11 05:42:29 2014
> ! Saved-Config version: 1.0
> ! Version: 2.0.11-SNAPSHOT
> ! Appliance: bcf_master
> ! Build-Number 2051
9,11d12
< ! aaa
configure Command
Command Syntax
configure [terminal]
Command Mode
Enable mode
Command Description
Use the configure command to change to config mode and to access the commands available from config mode.
Command Examples
The following command enables config mode.
controller-1# config
controller-1(config)#
connect Command
Command Syntax
connect switch <switch-name>
Command Mode
Enable mode
Command Description
Use the connect command to open an SSH session to a fabric switch that is connected to the controller. This changes the
CLI prompt to the Switch Light OS CLI, which allows you to enter a subset of commands accepted by the switch. These
commands might be useful for troubleshooting or administering the switch.
Command Examples
The following command connects the CLI to switch leaf-1a.
controller-1# connect switch leaf-1a
copy Command
Command Syntax
copy <source> <dest>
Command Mode
Enable mode
Command Description
Use the copy command to copy a running-config, upgrade image, or other files. You can copy between locations on the
controller or use the scp:// option to copy between locations on the local controller and a remote server.
Note: Copying a configuration file to the running-config does not override the current node IP address.
Command Examples
The following command copies the active running-config of the local controller to the saved-config file in the local
controller running-config file repository.
controller-1# copy running-config snapshot://saved-config
The following command overwrites the active running-config with the contents of the saved-config file from the local
controller running-config file repository. This command replaces the contents of the active running-config with the contents
of the specified file.
controller-1# copy snapshot://saved-config running-config
The following command appends the commands in a file on an external server to the active running-config on the
controller. This command overwrites any duplicated commands in the current running-config file, but other commands are
not affected.
controller-1# copy scp://[email protected]:saved-config running-config
The following command copies the saved-config.txt file in the running-config repository to an external server.
controller-1# copy snapshot://saved-config scp://[email protected]:saved-config
The following command copies the CSR for a fabric switch with MAC address 70-72-cf-ae-b6-34 to a CA from the Active
controller. This example copies the CSR for a switch. A similar command is used for copying the Active and Standby
controller CSRs.
The following command copies a signed certificate from the CA to the Active controller. This example imports a signed
switch certificate to the Active controller. A similar command is used for importing the CA root certificate and the Active
and Standby controller certificates.
controller-1(config)# copy scp://[email protected]:/root/openssl-ca/70-72-cf-ae-b6-34.switch.cluster.pem
cert://70-72-cf-ae-b6-34.switch.cluster
delete Command
Command Syntax
delete {cert <cert> |dump {core-dump <dump-id> | heap-dump <dump-id>} | file <file-name> | image <image-
id> |snapshot <snapshot-name> | support {<bundle> | all-forced }}
Command Mode
Enable mode
Command Description
Use the delete command to remove the designated files from the local controller file repository.
Command Examples
controller-1# show file
# Name Size Created
-|-----|----|------------------------|
1 file1 839 Fri Jun 6 19:32:42 2014
controller-1# delete file file1
controller-1# show file
None.
Command Syntax
deploy vsphere gui-plugin <vCenter name> <vCenter user> [<contact email address>]
Command Mode
Enable mode
Command Description
Use the deploy command to implement the Big Cloud vSphere plugin, which allows the VMware administrator to configure
Big Cloud Fabric from the vCenter interface.
Command Examples
The following command enables the Big Cloud Fabric vSphere plugin instance vcenter-1, using access privileges provided by
the vCenter user account, vcenter-admin.
controller-1# deploy vsphere gui-plugin vcenter-1 vcenter-admin
controller-1#
Command Syntax
reset user-password
Command Mode
Config mode
Command Description
Use the reset user-password command to reset the password for the current user account. When you enter this command,
you are prompted for the existing password and then prompted for the new password.
Command Examples
controller-1(config)# reset user-password
Changing password for: admin
Current password:
New password:
Re-enter:
controller-1(config)#
show Command
Command Syntax
show <show-command>
Command Mode
Enable mode
Command Description
Use the show command to display information about the Big Cloud Fabric. The show commands available only from enable
mode are a subset of the commands described in Chapter 4, “show Commands.”
Command Syntax
support switch <switch-name> scp://<password>@<dest>:<core-file-name>
Command Mode
Enable mode
Command Description
Use the support switch command to SCP a core file from the switch to a remote location.
Command Examples
The following example copies the core from leaf1-a to the file named core-switch-leaf1-a on the remote server 10.8.67.3.
controller-1# support switch leaf1-a scp://[email protected]:core-switch-leaf1-a
Collecting core
Core collected: 13207 bytes
[email protected]'s password:
tmpMLPb_l 100% 13KB 12.9KB/s 00:00
sync Command
Command Syntax
sync ntp [<ntp-server>]
sync vcenter <vcenter> [network]
Command Mode
Enable mode
Command Description
Use the sync command to synchronize the BCF controller with an external system. Use the sync ntp command to
synchronize the system time using NTP immediately without waiting for an NTP time sync. Note that this should be
required only under specific circumstances, such as when establishing an initial time reference when NTP servers are
reconfigured.
Use the sync vcenter command to cause an immediate update from vCenter to the BCF controller. When integrated with
vCenter, this updates the Big Cloud Fabric with changes to VLANs or VMs made in vCenter since the previous update.
Command Syntax
system beacon switch {<switch-mac> | <switch-ip> | <switch-name>} [timeout <timeout>]
Command Mode
Enable mode
Command Description
Use the system beacon switch command to flash the LEDs on the specified switch for a period of 30 seconds.
Command Syntax
system {config-push {switch {<ip-address> | <mac-address> | <Switch Name>}} | ping {switch {<ip-address>
| <mac-address> | <Switch Name>}} [timeout <timeout>]
Command Mode
Enable mode
Command Description
Use the system config-push command to refresh the configuration of the specified switch.
Command Syntax
system failover [skip-initial-sync-check] [<node-id>]
Command Mode
Enable mode
Command Description
Use the system failover command to fail over the Active controller to the Standby controller. You can enter the failover
command on either the Active or Standby controller. With some earlier BCF versions, the failover command must be
entered on the Standby controller.
To fail over immediately without performing the normal synchronization check that occurs before failover, use the skip-
initial-sync-check keyword.
By default, the failover command changes the role of the available Standby controller with the highest node ID to Active. To
fail over to a specific controller, replace <node-id> with the node ID of the Standby controller. If you specify the node ID of
the Active controller or a Standby controller that is not reachable, the system displays an error message. In the current
release, a single Standby controller is supported.
Command Syntax
system install {switch {<switch-name> | <ip-address> | <mac-address> }
{onie loader | cpld loader | loader cpld} [reboot] [timeout <seconds>]
Command Mode
Enable mode
Command Description
Use the system install switch command to upgrade the CPLD or ONIE firmware images on the specified switch, using the
current firmware images. Use this command without the reboot option to configure the switch to upgrade its firmware the
next time it restarts. Use this command with the reboot option to reboot the switch and perform the firmware upgrade
immediately. You can also use the switch IPv6 address, which can be obtained using the show switch <switch-name>
zerotouch command.
Note: You cannot upgrade ONIE and CPLD at the same time. If both firmware images must be updated, enter the system
install command for each image, wait for the switch to reboot, and then upgrade the other image. Upgrading the ONIE
before the CPLD is recommended.
Command Examples
The following command configures switch leaf1-a to restart and install the ONIE firmware:
controller-1# system install switch leaf1-a onie reboot
system switch install: install may cause service interruption
system switch install ("y" or "yes" to continue): y
The following command configures switch leaf1-a to restart and install the CPLD firmware:
controller-1# system install switch leaf1-a cpld reboot
The following command configures switch leaf1-a to restart and upgrade the loader and CPLD firmware:
controller-1# system install switch leaf1-b loader cpld reboot
The following commands display the IPv6 address of switch leaf1-b and then uses the IPv6 address to perform the upgrade.
controller-1# show switch leaf1-b zerotouch
Device : 70:72:cf:bc:c5:0e (EdgeCore)
Zerotouch state : online
Name : leaf1-b
Reload pending : False
Platform : powerpc-accton-as5710-54x-r0
Serial number : 571054X1420006
Ip address : fe80::7272:cfff:febc:c50e%2
Dpid : leaf1-b
Last update : 2015-10-22 17:24:17.517000 UTC
Controller address : fe80::5e16:c7ff:fe00:2dba%ma1
controller-1# config
controller-1(config)# system install switch fe80::7272:cfff:febc:c50e%2 loader reboot
system switch install: install may cause service interruption
system switch install ("y" or "yes" to continue): yes
controller-1(config)#
Command Syntax
ping switch {<ip-address> | <switch-name> | <mac-address>} [timeout <timeout>]
Command Mode
Enable mode
Command Description
Use the system ping command to test connectivity from the controller to the specified switch, using the destination IPv4 or
v6 address, switch name, or MAC address.
Command Syntax
system reboot {controller | {switch {<switch-mac> | <switch-ip | <switch-name>}}
[timeout <timeout>] [delay <delay>]}}
Command Mode
Enable mode
Command Description
Use the system reboot command to restart the controller or the specified fabric switch.
Command Examples
The following command restarts the controller.
controller-1# system reboot controller
controller-1#
The following command restarts the switch with the IP address 192.168.17.1.
controller-1# system reboot switch 192.168.17.1
controller-1#
Command Syntax
system regenerate
Command Mode
Login mode
Command Description
Use the system regenerate command to create a new certificate signing request (CSR) for the current controller. This
operation is required if you need to change the trusted CA for the fabric.
Command Syntax
system reinstall switch {<switch-name> | <ip-address> | <mac-address> } [ reboot [ factory-default ] |
factory-default | timeout ]
Command Mode
Enable mode
Command Description
Use the system reinstall switch command to reinstall the Switch Light OS on the specified switch.
Command Examples
The following command reinstalls switch leaf1a and reboots the switch from the factory-default configuration.
controller-1# system reinstall switch leaf1a reboot factory-default
Command Syntax
system reload controller
Command Mode
Enable mode
Command Description
Use the system reload command to restart the controller VM. On the BCF controller hardware appliance, this command
only reboots the controller VM.
Command Examples
The following command restarts the controller VM on a BCF controller hardware appliance.
controller-1# system reload controller
Command Syntax
system remove-node {<node-id> | <node-ip-address>}
Command Mode
Enable mode
Command Description
Use the system remove-node command to remove a controller node from the cluster. Before removing the node, shut
down the controller using the system shutdown controller command. Otherwise, if it remains active, the removed node
automatically rejoins the cluster.
The following is the result of entering the system remove-node command:
• Standby node no longer appears in the output of the show controller command on the Active node.
• Switches remain connected to the remaining (Active) node.
• Standby node remains running in a separate cluster.
Note: Enter the boot factory-default command on the Standby node to restore the node to factory default settings.
Command Examples
The following command removes the node with the IP address 192.168.17.2 from the cluster.
controller-1# system remove-node 192.168.17.2
Command Syntax
system reset-connection switch {<switch-mac> | <switch-ip> | all}
Command Mode
Enable mode
Command Description
Use the system reset-connection command to reset the connection between the controller and the specified switch or all
switches.
Command Examples
The following command resets the connection between the controller and the switch with the IP address 192.168.17.1.
controller-1# system reset-connection switch 192.168.17.1
Command Syntax
system shutdown controller
Command Mode
Enable mode
Command Description
Use the system shutdown command to shut down the controller VM. On a hardware appliance, this command turns off the
power to the server hardware.
Command Examples
The following command turns off the power to the BCF hardware appliance server.
controller-1# system shutdown controller
Command Syntax
To define a Fabric View test path, save it, and run immediately, or run Controller View immediately without saving:
test path src-tenant <src-tenant-name> [src-segment <src-segment-name>] src-ip <src-endpoint-ip> dst-ip
<dst-ip> [{receiver-ip <host-ip> | receiver-segment <host-segment>}]
[ip-proto {{udp | tcp} src-l4-port <port> | any} dst-l4-port <port> | icmp}] {fabric-view [test-name
<name> | controller-view [detail]}
Command Mode
Enable mode
Command Description
Use the test path command to determine if the controller is correctly programmed to forward packets from a given source
endpoint to the specified destination. Use this command to verify that you have correctly programmed the default routes
and other forwarding configuration required to establish paths in the actual fabric. The command supports two main views:
Controller View , which tests the path from the controller viewpoint, and Fabric View, which tests the actual path between
known endpoints. IPv6 based-configurations and IPv6 endpoint learning are not permitted in ipv4-only mode.
Note: To see changes in topology that occur after entering the test path command, wait 10 seconds or more. To see any
changes that occurred less than 10 seconds before the test expiration, re-enter the command.
To run a previously configured test, use the test-path test-name command, specify the name of the test, and use the
controller-view or fabric-view keyword.
For virtual switches in an OpenStack environment, you can inject ICMP test packets from the controller. For virtual
switches, the controller can automatically generate the test traffic. For physical switches, generate traffic of the appropriate
type between the specified endpoints. If you start traffic generation after starting the test, set a timeout that is long enough
for you to generate traffic and inject it on the defined path.
Use one of the following required keywords to specify the destination of the path to be tested:
• dst-mac: Replace <dst-mac> with the MAC address of the source endpoint.
• dst-ip: Replace <dst-ip> with the IP address of the source endpoint.
• dst-name: Replace <dst-name> with the name of the source endpoint (as defined using the endpoint command).
Optionally, identify the protocol to use for the test by using the following keywords:
• ip-protocol: Follow this required keyword with the protocol to use for the test.
• icmp: Test the path with ICMP traffic.
• tcp src-l4-port <src-l4-port> dst-l4-port <dst-l4-port>: Test the path by replacing <src-l4-port> and <dst-l4-port> with
the TCP protocol port numbers for the application you want to test.
• udp src-l4-port <src-l4-port> dst-l4-port <dst-l4-port>: Test the path by replacing <src-l4-port> and <dst-l4-port> with
the UDP protocol port numbers for the application you want to test.
Identify the type of test with one of the following required parameters:
• controller-view: This provides the path from the standpoint of the controller. The display includes a logical view and a
physical view. The logical view uses the logical object names defined on the controller, such as tenant and logical
segment names. The physical view uses the IP addresses and MAC addresses of the source and destination endpoints
and of each hop on the path.
• fabric-view test-name <test-name>: Fabric View simulates the effect of injecting an entry for a given route into the
TCAM table on the controller. The TCAM table gives each switch in the path directions about how to handle the traffic.
Replace <test-name> with the name of the test instance.
The following are optional keywords that you can use with the fabric-view option:
• [timeout <timeout>]: Specify a timeout, in seconds, for the TCAM entry. If you are manually injecting the test traffic,
the timeout should give you sufficient time to generate the traffic.
• inject-from-controller: For virtual switches, inject ICMP packets from the controller into the specified path.
Command Examples
The following command tests the path from endpoint bm1. The destination is an unknown IP address on an unknown
destination network. The default routes for the intervening logical interfaces in the fabric are configured to send packets for
unknown destination networks to the external segment.
controller-1(config)# test path src-tenant tenant-a src-name bm1 dst-ip 50.0.0.1 ip-protocol icmp test-
name test1 controller-view
The fabric-view option simulates the injection of a route into the TCAM table of a switch. The command can include a
timeout after which the entry is aged out. After entering this command and before the timeout expires, inject the specified
type of traffic into the path being tested.
controller-1(config)# test path src-tenant tenant-a src-name bm1 dst-ip 50.0.0.1 ip-protocol icmp test-
name test2 fabric-view timeout 60
For virtual switches, to inject ICMP traffic from the controller for testing the specified path, append the inject-from-
controller keyword to the end of the command, as in the following example:
controller-1(config)# test path src-tenant tenant-a src-name bm1 dst-ip 50.0.0.1 ip-protocol icmp test-
name test3 fabric-view timeout 60 inject-from-controller
To re-run a previously defined test, use an existing test name either with the same view option or the other view, as in the
following example. This command displays the controller view, with details, for test3.
controller-1(config)# test path test3 controller-view details
To observe the test results, enter the show test path command, as in the following example. Use the all keyword to display
the results of all tests.
controller-1# show test path test1
upgrade Command
Command Syntax
upgrade {launch [controller-only] [switch-timeout <switch-timeout>] [cold-start ]
[pause <minutes>] | pre-launch-check | stage [<image-id>]}
Command Mode
Enable mode
Command Description
Use the upgrade command to manage the upgrade process. To start the first step in the process, use the upgrade stage
command. The controller can be left in the staged state until a maintenance window is available. If necessary, additional
upgrade stage requests can be issued if a newer upgrade image becomes available.
Note: Do not use the serial interface for performing a controller upgrade.
To complete the upgrade, use the upgrade launch command at a time when the network is not too busy with critical traffic.
Caution: Do not attempt to launch or stage another upgrade process until the current process is either completed or times
out.
The upgrade process includes rebooting of both controllers in the cluster, rebooting fabric switches, and upgrading the
switches. When the fabric is implemented according the recommended high-availability topology, the upgrade process
does not affect packet forwarding. The upgrade affects one half of the HA fabric into halves, and operations are then
shifted to the upgraded half. The second half is then upgraded and the fabric is reunified with Active and Standby
controllers. If the recommended HA topology is not available, the fabric cannot be divided without loss of operation, and
forwarding is suspended until the upgrade is completed.
Use the show upgrade status command to display the current upgrade status. Use the show boot partition command to list
the available partitions, along with information about the controller versions installed on each boot partition, which
identifies the partition to use for booting.
To copy the upgrade image to the controller, use the copy command with the image:// destination. Use scp:// to copy from
a remote server as the source. To view the current known upgrade images use the show upgrade image, or the show image
command.
Enter the upgrade launch pause <minutes> command on both the Active and Standby controllers to pause the upgrade
after the first phase is completed. This lets you verify the new version and roll back to an earlier version or continue and
complete the upgrade. The upgrade pauses after the original Active and the Phase 1 switches are upgraded for the specified
number of minutes. The new Active controller remains in Upgrade Pause state for the specified duration, where you can
enter the following commands:
• upgrade pause exit command to continue the upgrade
• upgrade pause revert to roll back to the previous version
• upgrade pause extend <minutes> to extend the Upgrade Pause state.
Note: The pause keyword is not supported for upgrading to Release 4.2.x from earlier versions.
• extend: After the upgrade entering the upgrade pause stage, enter the extend command on new active controller to
extend the pause for the period specified for the current time.
• exit: After the upgrade enters the upgrade pause stage, enter the exit command on the new Active controller to bring
the system out of pause and continue the upgrade process.
• revert: After the upgrade enters the upgrade pause stage, enter the revert command on the new Active controller to
abort the upgrade and revert to the previous version.
pre-launch-check: Identifies the status of the controller in regard to readiness for upgrade.
stage: Prepares the platform for the upgrade ahead of the actual upgrade process by copying the upgrade image to the
alternate partition on the controller.
Command Examples
The following command stages the image in the default partition for upgrading the controller.
controller-1# upgrade stage
The following command launches the controller upgrade process with the pause option.
controller-1# upgrade launch pause
To identy the system in upgrade pause, use the following command on the new Active controller.
UPGRADE controller-1# show upgrade progress
Upgrade new/active: state: Local: phase-1-migrate-traffic-and-services Remote: phase-1-migrate-
traffic-and-services Paused until: 2017-07-03 18:08:22 UTC (04:37 left)
UPGRADE controller-1#
The following command ends the pause and continues the upgrade:
UPGRADE controller-1# upgrade pause exit
The following command extends the current upgrade pause for five minutes.
UPGRADE controller-1# upgrade pause extend 5
Command Syntax
aaa accounting exec default start-stop {local | group {tacacs+ | radius} | local group {tacacs+ |
radius} | group {tacacs+ | radius} local }
Command Mode
Config mode
Command Description
Use the aaa accounting command to configure the controller to report accounting statistics to an AAA server, such as
TACACS+ or RADIUS. You can configuring accounting based on information from the local database on the controller, or
using a remote group on a TACACS+ or RADIUS server, or both. When using both, the first method listed in the command is
primary and the second method is used only when the first method fails.
Command Syntax
aaa authentication login default {local | group {tacacs+ | radius} | local group {tacacs+ | radius} |
group {tacacs+ | radius} local }
Command Mode
Config mode
Command Description
Use the aaa authentication command to configure the controller to authenticate using the local database or group
credentials on a remote AAA server.
Note: When using RADIUS as the AAA server protocol, be aware that authentication and authorization are not separated.
Be careful when authorizing a user account using a remote RADIUS server to use the correct password that is configured for
the account on the remote server. Otherwise, authentication will fail even if a local user account is configured for fallback
authentication.
Command Syntax
[no] aaa authorization exec default {local group { radius | tacacs+ } |
{group {radius | tacacs+} local} |
Command Mode
Config mode
Command Description
Use the aaa authorization exec default command to configure the permissions provided to the current user after
authentication is successful. The user inherits the permissions assigned to any group to which the account belongs. In the
current release of BCF, only two groups are supported: admin, which provides access to all commands, and read-only,
which provides access only to monitoring commands, such as show commands.
You can configure a primary method of authorization which is applied first and a fallback method, which is applied only if
the first method is not successful.
Note: Remote authorization falls back to local only if remote authorization fails as a result of the remote AAA server being
unreachable.
Use the aaa authorization role default command to assign a default role to the current account. The default group is used if
authentication is successful on a remote server but no role is specifically assigned. This command does not apply to local
authorization or authentication. If a local user is not associated with a group on the controller, login is not allowed.
Note: Use the authorization role default admin command carefully because the effect is to provide every user account that
authenticates successfully with admin-level privileges, unless the user account is specifically assigned to a different group.
Command Examples
The following command enables primary authorization from the local database on the controller and back up authorization
if the credentials entered during authentication do not match an entry in the local database.
controller-1(config)# aaa authorization exec default local group radius
The following command enables authorization on a remote RADIUS server with fallback to local authorization if the remote
server is unavailable.
controller-1(confg)# aaa authorization exec default group radius local
The following command enables authohrization on a remote TACACS+ server and then falls back to local authorization if the
remote server is unavailable.
controller-1(confg)# aaa authorization exec default group tacacs local
The following command provides read-only permission to any user who is authenticated by a remote server but does not
have a BSN-User-Role defined.
controller-1(confg)# aaa authorization role default read-only
This command does not apply to local authentication or authorization. If a local user is not associated with a group on the
controller, login is not allowed.
Note: When using RADIUS as the AAA server protocol, be aware that authentication and authorization are not separated.
Be careful when authorizing a user account using a remote RADIUS server to configure the correct password for the account
on the remote server. Otherwise, authentication will fail even if a local user account is configured for fallback
authentication.
Command Syntax
[no] aaa concurrent-limit <integer> | session-expiration <minutes>
Command Mode
Config mode
Command Description
Use the aaa concurrent-limit command to limite the number of concurrent sessions that can be active for each user
account.
This limit applies to sessions established through the GUI, CLI, or REST API, whether directed to the Active or Standby
controller or to the cluster virtual IP address..
Note: All users should make sure to log out when finished to avoid access being blocked. If the number of existing sessions
is equal to the limit configured, then no new sessions are allowed.
Command Examples
For example, the following command limits the number of concurrent sessions to 5.
controller-1(config)# aaa concurrent-limit 5
This causes the sixth session connection attempt to fail. If more than five sessions are already configured, the oldest excess
sessions are closed.
banner command
Command Syntax
[no] banner <login-banner>
Command Mode
Config mode
Command Description
Use the banner command to configure the banner to be displayed before login.
Command Examples
controller-1(config)# banner "BCF controller"
controller-1(config)#
controller command
Command Syntax
controller
Command Mode
Config mode
Command Description
Use the controller command to enter config-controller submode and to access the commands available from that submode.
Use the config-controller submode commands for managing the configuration of the local controller node.
Command Examples
controller-1(config)# controller
controller-1(config-controller)#
controller
access-control Command
Command Syntax
access-control
Command Mode
config-controller submode
Command Description
Use the access-control command to enter config-controller-access submode, where you can enable or disable firewall rules
for administrative access to the controller.
Command Examples
controller-1(config-controller)# access-control
controller-1(config-controller-access)#
controller/access-control
access-list Command
Command Syntax
access-list { api | gui | ns-api | ssh | snmp | vce-api }
Command Mode
config-controller-access submode
Command Description
Use the access-list command to identify the protocol for which to control access to the controller and to enter config-
controller-access-list submode, where you can identify one or more subnetworks from which access is permitted.
Command Examples
The following command enters config-access-list submode for configuring SNMP protocol access to the controller:
controller-1(config-controller-access)# access-list snmp
controller-1(config-controller-access-list)#
controller/access-control/access-list
<rule-number> Command
Command Syntax
<rule-number> permit from <source-ip-cidr>
Command Mode
config-controller-access-list submode
Command Description
Enter an access control rule number followed by the permit from keywords and the subnetwork from which access is
allowed for the current access list protocol.
Caution: Be careful when configuring firewall rules for the SSH protocol, which by default is permitted from all
subnetworks. After restricting the IP address to a specific subnetwork, access is then denied from all other subnetworks. If
connectivity from the specified subnetwork is interrupted, the only method of accessing the controller is through the local
console. This also applies to the recovery user account.
Command Examples
The following commands allow SNMP access to the controller from any host on the subnet 192.168.17.0.
controller-1(config-controller-access)# access-list snmp
controller-1(config-controller-access-list)# 10 permit from 192.168.17.0/24
controller-1(config-controller-access-list)#
controller
certificate Command
Command Syntaxaccfabric
[no] certificate <name>
Command Mode
config-controller submode
Command Description
Use the certificate command to identify the certificate for the controller.
controller
cluster-name Command
Command Syntaxaccfabric
[no] cluster-name <name>
Command Mode
config-controller submode
Command Description
Use the cluster-name command to identify the cluster.
Command Examples
The following command identifies the current cluster as mycluster.
controller-1(config-controller)# cluster-name mycluster
controller
description Command
Command Syntax
[no] description <description>
Command Mode
config-controller submode
Command Description
Provide a text description, enclosed in quotes, to describe the cluster.
Command Examples
controller-1(config-controller)# description “Techpubs test controller”
controller-1(config-controller)#
controller
private-key Command
Command Syntax
[no] private-key <private-key>
Command Mode
config-controller submode
Command Description
Use the private-key command to configure the private key for the cluster.
controller
virtual-ip Command
Command Syntax
virtual-ip <ipv4-address>
no virtual-ip [<ipv4-address>]
Command Mode
config-controller submode
Command Description
Use the virtual-ip command to define a virtual IP address for the management interface of each controller node in the
cluster. The virtual IP is used by management clients to access the controller. By default, no virtual IP address is configured.
The specified virtual IP address must be in the same subnetwork as the controller node IP address. If the virtual IP is
configured, it is used only for administrative (management plane) access to the controller, not for switch (control plane)
connectivity to the controller. Fabric switches connect using the actual IP address of each controller node.
Note: Use a unique IP address for the virtual IP address of the cluster.
If you use the IP address of the Standby controller by mistake, the controller nodes will disconnect from each other and
both will become active, creating a split-brain condition. If this happens, assign a unique virtual IP address to the cluster and
the cluster will recover.
Command Examples
controller-1(config-controller)# virtual-ip 192.168.17.100
controller-1(config-controller)#
crypto Command
Command Syntax
crypto
Command Mode
Config mode
Command Description
Use the crypto command to enter config-crypto submode where you can configure settings for HTTP and SSH.
crypto
http Command
Command Syntax
http
Command Mode
Config-crypto mode
Command Description
Use the http command to enter config-crypto-http submode where you can configure settings for HTTP.
config-crypto-http
cipher Command
Command Syntax
[no] cipher cipher <Index Number>
{DHE-RSA-AES256-SHA256 | ECDHE-ECDSA-AES128-SHA |
ECDH-ECDSA-AES128-SHA256 | ECDH-RSA-AES256-SHA |
ECDH-ECDSA-AES256-SHA | DHE-DSS-AES256-GCM-SHA384 |
SRP-DSS-AES-256-CBC-SHA |
SRP-DSS-3DES-EDE-CBC-SHA | SRP-AES-128-CBC-SHA |
ECDH-RSA-AES128-SHA256 | DHE-RSA-CAMELLIA256-SHA |
DH-DSS-DES-CBC3-SHA | ECDH-RSA-RC4-SHA |
DH-RSA-AES128-SHA256 | SRP-RSA-AES-256-CBC-SHA |
DHE-RSA-CAMELLIA128-SHA |
ECDHE-ECDSA-AES256-GCM-SHA384 |
ECDHE-ECDSA-RC4-SHA | DH-RSA-CAMELLIA128-SHA |
PSK-3DES-EDE-CBC-SHA | ECDHE-RSA-AES128-SHA |
DH-DSS-AES256-GCM-SHA384 | DH-RSA-AES256-SHA256 |
SRP-RSA-3DES-EDE-CBC-SHA | ECDHE-RSA-AES256-SHA |
AES256-SHA256 | SEED-SHA | CAMELLIA256-SHA |
DHE-DSS-AES256-SHA256 | ECDHE-RSA-DES-CBC3-SHA |
ECDHE-RSA-AES256-SHA384 |
ECDHE-ECDSA-AES128-SHA256 |
ECDH-ECDSA-AES128-GCM-SHA256 |
ECDHE-ECDSA-DES-CBC3-SHA | DH-RSA-AES128-SHA |
SRP-3DES-EDE-CBC-SHA | PSK-AES128-CBC-SHA |
DH-RSA-AES128-GCM-SHA256 |
ECDHE-ECDSA-AES256-SHA384 | DH-DSS-AES128-SHA |
DHE-RSA-AES256-GCM-SHA384 | DHE-RSA-AES128-SHA |
ECDH-RSA-AES128-SHA | DH-DSS-CAMELLIA256-SHA |
RC4-MD5 | DHE-DSS-AES128-GCM-SHA256 |
SRP-AES-256-CBC-SHA | DH-DSS-AES256-SHA256 |
DH-DSS-AES128-SHA256 | DHE-RSA-SEED-SHA |
ECDHE-RSA-AES128-GCM-SHA256 |
ECDH-ECDSA-AES256-SHA384 | DHE-RSA-AES128-SHA256 |
ECDH-ECDSA-AES256-GCM-SHA384 | DHE-RSA-AES256-SHA |
DHE-DSS-AES256-SHA | ECDH-RSA-AES256-GCM-SHA384 |
ECDH-RSA-DES-CBC3-SHA | ECDHE-ECDSA-AES256-SHA |
AES128-SHA | ECDHE-RSA-AES256-GCM-SHA384 |
DH-DSS-AES128-GCM-SHA256 | AES128-SHA256 |
ECDHE-ECDSA-AES128-GCM-SHA256 | DH-RSA-SEED-SHA |
DES-CBC3-SHA | DHE-DSS-CAMELLIA256-SHA |
ECDH-ECDSA-AES128-SHA | ECDH-ECDSA-RC4-SHA |
DHE-RSA-AES128-GCM-SHA256 | AES128-GCM-SHA256 |
DHE-DSS-AES128-SHA256 | DHE-DSS-AES128-SHA |
DH-RSA-CAMELLIA256-SHA | DHE-DSS-SEED-SHA |
EDH-DSS-DES-CBC3-SHA | CAMELLIA128-SHA |
DH-RSA-AES256-GCM-SHA384 | PSK-RC4-SHA |
SRP-RSA-AES-128-CBC-SHA | EDH-RSA-DES-CBC3-SHA |
RC4-SHA | SRP-DSS-AES-128-CBC-SHA |
DHE-DSS-CAMELLIA128-SHA | ECDHE-RSA-AES128-SHA256 |
ECDH-RSA-AES128-GCM-SHA256 |
ECDH-ECDSA-DES-CBC3-SHA | PSK-AES256-CBC-SHA |
DH-DSS-CAMELLIA128-SHA | DH-DSS-SEED-SHA |
AES256-SHA | ECDH-RSA-AES256-SHA384 |
DH-RSA-AES256-SHA | DH-RSA-DES-CBC3-SHA |
AES256-GCM-SHA384 | ECDHE-RSA-RC4-SHA |
DH-DSS-AES256-SHA}
Command Mode
Config-crypto-http mode
Command Description
Use the cipher command to configure a list of enabled HTTPS ciphers that are enabled by appending a new cipher to the
current ciphers list. If a previously specified cipher is specified, it is ignored. Use the no version of any command to remove
the specific cipher. Use the no cipher command to restore the list to the default value.
config-crypto-http
protocol Command
Command Syntax
[no] protocol <Index Number>
{TLSv1.1 | TLSv1 | TLSv1.2 | SSLv3 | SSLv2}
Command Mode
Config-crypto-http mode
Command Description
Use the protocol command to configure a list of enabled HTTPS SSL protocols. Configure the list of enabled SSL protocols for
HTTPS by appending a new protocol to the list. If a previously specified protocol is specified, it is ignored. Use the no version
of any command to remove the specific protocol. Use the no protocol command to restore the list to the default value.
crypto
ssh Command
Command Syntax
ssh
Command Mode
Config-crypto mode
Command Description
Use the ssh command to enter config-crypto-ssh submode where you can configure cipher and MAC settings for SSH.
config-crypto-ssh
cipher Command
[no] cipher <Index Number>
{arcfour | aes256-ctr | arcfour128 |
[email protected] | blowfish-cbc |
3des-cbc | [email protected] | aes256-cbc |
arcfour256 | cast128-cbc | aes128-ctr |
[email protected] | aes192-cbc |
aes128-cbc | [email protected] | aes192-ctr}
Command Mode
Configinterfa -crypto-ssh mode
Command Description
Use the cipher command to configure the list of ciphers that are enabled by appending a new cipher to the current ciphers
list. If a previously specified cipher is specified, it is ignored. Use the no version of any command to remove the specific
cipher. Use the no cipher command to restore the list to the default value.
config-crypto-ssh
mac Command
mac <Index Number>
{[email protected] |
[email protected] |
[email protected] | hmac-sha2-512 |
hmac-md5-96 | [email protected] |
[email protected] |
[email protected] |
[email protected] | hmac-sha2-256 |
hmac-ripemd160 | [email protected] | hmac-sha1-96 |
[email protected] | hmac-md5 |
[email protected] | hmac-sha1 |
[email protected] | [email protected]}
Command Mode
Config -crypto-ssh mode
Command Description
Use the mac command to configure the list of enabled data integrity (MAC) algorithms by appending a new algorithm to the
list. If a previously specified algorithm is specified, it is ignored. Use the no version of this command with any keyword to
remove the specific algorithm. Use the no mac command to restore the list to the default value.
end Command
Command Syntax
end
Command Mode
Config mode
Command Description
Use the end command to return directly to enable mode regardless of the mode or submode from where it is entered.
Command Examples
controller-1(config-controller)# end
controller-1#
fabric Command
Command Syntax
fabric
Command Mode
Config mode
Command Description
Use the fabric command to enable the config-fabric submode, which lets you configure fabric-wide settings, including
endpoint-flap-protection, GTP hashing, IPAM, QoS, and VLAN mapping
Command Examples
controller-1(config)# fabric
controller-1(config-fabric)#
fabric
endpoint-flap-protection Command
Command Syntax
[no] endpoint-flap-protection
Command Mode
config-fabric submode
Command Description
An endpoint is blocked by the controller when it is flapping. Flapping means the interface where the endpoint is seen by the
controller changes more frequently than is allowed by the system threshold, which is 10 times in 30 seconds. To enable or
disable endpoint blocking, use the endpoint flap protection command from config-fabric submode. Endpoint flap protection
is disabled by default.
Command Examples
The following commands enable blocking an endpoint if an endpoint interface changes more than 10 times in 30 seconds.
controller-1(config)# fabric
controller-1(config-fabric)# endpoint-flap-protection
fabric
forwarding-mode Command
Command Syntax
[no] forwarding-mode {default | high-bandwidth | high-bandwidth-spine | high-scale }
Command Mode
config-fabric submode
Command Description:
Use the forwarding-mode command to configure the type of switches (T2, T2+ or Tomahawk ASICs) used for spine and leaf
switches in the fabric. In BCF Release 4.2.0 and later, all forwarding modes and all switch types support both IPv4 and IPv6.
For a list of supported switches based on each of these ASICs, refer to the Big Cloud Fabric Hardware Compatibility List. For
details about how the forwarding mode affects fabric scale limits, refer to the Big Cloud Fabric Verified Scale document.
Command Examples:
The following command configures the forwarding mode to the default, which supports T2 and later switches as leaf or
spine switches.
controller-1(config-fabric)# forwarding-mode default
fabric
gtp hash Command
Command Syntax
[no] gtp-hash
Command Mode
config-fabric submode
Command Description
Use the gtp-hash command to enable hashing of GTP-U traffic based on the TEID field in the packet. UDP packets destined
to port 2152 are classified as GTP-U traffic.
Note: Usiing the gtp-hash command disables default symmetric load balancing.
Command Examples
The following command enables hashing of GTP-U packets based on TEID field.
controller-1(config-fabric)# gtp-hash
fabric
ipam switch Command
Command Syntax
ipam switch
Command Mode
config-fabric mode
Command Description
Use the ipam switch command to enter config-fabric-ipam-switch submode, where you can configure IP addresses for use
by fabric switches when communicating with external NTP, SNMP, and syslog servers.
Command Examples
controller-1(config-fabric)# ipam switch
controller-1(config-fabric-ipam-switch)#
fabric/ipam switch
allocate Command
Command Syntax
[no] allocate
Command Mode
config fabric-switch mode
Command Description
Use the allocate command in config-fabric-ipam-switch mode to enable IP v4 address allocation to switches for
communicating with external servers.
Command Examples
The following commands enable IP v4 address allocation to switches for communicating with external servers.
controller-1(config-fabric)# ipam switch
controller-1(config-fabric-ipam-switch)# allocate
fabric/ipam switch
dns-server Command
Command Syntax
[no] dns-server <dns-ip>
Command Mode
config-fabric-ipam-switch mode
Command Description
Use the dns-server command in config-fabric-ipam-switch mode to identify a DNS server for use by fabric switches when
communicating with external servers.
Command Examples
The following commands identify the DNS server for use by fabric switches when communicating with external servers.
controller-1(config-fabric)# ipam switch
controller-1(config-fabric-ipam-switch)# dns-server 192.168.17.100
fabric/ipam switch
gateway Command
Command Syntax
[no] gateway <gateway-ip>
Command Mode
config-fabric-ipam-switch mode
Command Description
Use the gateway command in config-fabric-ipam-switch mode to identify a default router for use by fabric switches when
communicating with external servers.
Command Examples
The following commands identify the default gateway for use by fabric switches when communicating with external
servers.
fabric/ipam switch
ip-range Command
Command Syntax
ip-range <start-ip> <end-ip> subnet-mask-length <nn>
Command Mode
config-fabric-ipam-switch mode
Command Description
Use the ip-range command in config-fabric-ipam-switch mode to identify a range of IPv4 addresses for use by fabric
switches when communicating with external servers.
Command Examples
The following command assigns the range of IP addresses from 192.168.1.100 through 192.168.1.200 to the pool used to
assign IPv4 addresses to the fabric switches:
controller-1(config-fabric-ipam-switch)# ip-range 192.168.1.100 192.168.1.200 subnet-mask-length 24
fabric
pod-role Command
Command Syntax
pod-role {spine | leaf}
Command Mode
config-fabric mode
Command Description
Use the pod-role command to configure the role of the BCF pod when connecting to other pods. If the pod role is set to
spine the switch can connect with up to eight other pods. Setting the pod role to leaf allows a single connection. A leaf pod
can connect to only one other leaf or spine pod.
Command Examples
To configure the pod role to spine, enter the following command:
controller-1(config-fabric)# pod-role spine
fabric
qos Command
Command Syntax
[no] qos
Command Mode
config-fabric mode
Command Description
Use the qos command to enter fabric-qos submode, where you can enable QoS and assign weights to the QoS traffic
classes. To determine if QoS is enabled, use the show fabric command.
Command Examples
controller-1(config-fabric)# qos
controller-1(config-fabric-qos)#
fabric/qos
active Command
Command Syntax
[no] active
Command Mode
config-fabric-qos mode
Command Description
Use the active command to enable quality of service (QoS) on a fabric-wide basis. To determine if QoS is enabled, use the
show fabric command.
Command Examples
The following commands enable QoS on a fabric-wide basis:
controller-1(config-fabric)# qos
controller-1(config-fabric-qos)# active
fabric/qos
apply Command
Command Syntax
[no] apply queuing-profile <profile-name>
Command Mode
config-fabric-qos mode
Command Description
Use the apply command to activate the specified queuing profile.
fabric/qos
classification-profile Command
Command Syntax
[no] classification-profile <profile-name>
Command Mode
config-fabric-qos classification submode
Command Description
Use the classification-profile command to identify the name of the profile and enter the config-fabric-qos-classification
submode.
fabric/qos/classification-profile
traffic-class Command
Command Syntax
[no] traffic-class {traffic-class-0 | traffic-class-1 | traffic-class-2 | traffic-class-3}
Command Mode
config-fabric-qos-classification mode
Command Description
Use the traffic-class command to enter the config-fabric-qos-classification-tc submode, where you can identify the DSCP
values in traffic to be allocated to the associated queue.
Fabric/qos/classification-profile/traffic-class
dscp Command
Command Syntax
[no] dscp {af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43 | be | cs1
| cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef}
Command Mode
config-fabric-qos-classification-tc submode
Command Description
Use the dscp command to identify the DSCP values in traffic to be allocated to the associated queue.
fabric qos
mode Command
Command Syntax
[no] mode segment | dscp {classification-profile <Classification profile name>}
Command Mode
config-fabric-qos mode
Command Description
Use the mode command to configure the QOS mode to be segment-based or DSCP-based. In segment-based mode, a traffic
class is assigned to a segment and all the traffic identified by the segment membership rule is directed to the associated
queue. In DSCP mode, one or more DSCP values is assigned to each traffic class and traffic with the specified value is
assigned to the queue associated with the traffic class.
fabric/qos
pfc Command
Command Syntax
pfc
Command Mode
config-fabric-qos mode
Command Description
Use the pfc command to enter the config-fabric-qos-pfc submode, where you can change fabric-wide PFC configuration.
fabric/qos/pfc
iscsi-tlv Command
Command Syntax
iscsi-tlv
Command Mode
config-fabric-qos-pfc mode
Command Description
Use the iscsi-tlv command to enable PFC pause on Queue 4, which provides a “lossless” queue for connecting to storage
devices. The TLV supported is Application = iSCSI. After PFC is enabled, when any BCF segment is connected to a storage
device that completes the PFC negotiation, all traffic from that segment with .1p value=4 is allocated to Queue 4 on the Big
Cloud Fabric.
Traffic assigned to Queue 4 is given the highest priority, but the queue is limited by the weight and percentage of the
available bandwidth configured on the BCF controller (by default 5%). If the switch cannot receive traffic at the rate it is
being transmitted, the switch will send a PFC pause request to the transmitting device, which causes traffic transmission to
be paused for the specified interval.
Command Examples
To enable the iscsi TLV on Queue 4 for the entire fabric, enter the following command:
controller-1(config-fabric-qos-pfc)# iscsi-tlv
fabric/qos
queuing-profile Command
Command Syntax
queuing-profile <profile-name>
Command Mode
config-fabric-qos mode
Command Description
Use the queuing-profile command to identify the profile and enter config-fabric-qos-queuing submode, where you can
allocate a weight to a traffic class.
Command Examples
To define a queuing-profile named my-profile, enter the following command:
controller-1(config-fabric-qos)# queuing-profile my-profile
controller-1(config-fabric-qos-queuing)#
fabric/qos/queuing-profile
traffic-class Command
Command Syntax
[no] traffic-class <class> weight <integer>
Command Mode
config-fabric-qos-queuing submode
Command Description
Use the traffic-class command to configure the weight for each QOS traffic-class.
<integer>: Assign a weight to the traffic class. The range is from 1 to 100. The percentage of traffic allocated to each queue
is determined by the relative weight assigned to each associated traffic class.
Command Examples
Assign a weight of 20 to traffic-class 1.
traffic-class traffic-class-1 weight 20
fabric
switch-bandwidth-mode Command
Command Syntax
switch-bandwidth-mode { 40g | 100g | switch-default }
Command Mode
config-fabric mode
Command Description
Use the switch-bandwidth-mode command to set the bandwidth mode, which affects the bandwidth supported on
switches, such as the S4148F/T, that support either 40G or 100G bandwidth speeds. Refer to the Big Cloud Fabric Hardware
Guide for a list of the interfaces affected and the bandwidth options provided for each interface in the different modes.
fabric
vlan-mapping Command
Command Syntax
vlan-mapping {global | default}
Command Mode
config-fabric mode
Command Description
Use the vlan-mapping command to change the VLAN mapping mode or to restore it to the default. In global VLAN mapping
mode, a single untagged segment applies to the entire fabric and all ports belong to all segments.
Note: This command applies only to the P –Fabric edition of the Big Cloud fabric and not to the P+V Fabric.
The default VLAN mapping lets you specify the VLAN mapping on a per interface level. The global VLAN mapping lets you
specify fabric-wide VLAN mapping. To change to a different VLAN mapping mode, you must first remove any VLAN
membership rules that have already been configured in the current mode (using the member command in config-tenant-
seg submode).
The vlan-mapping global command changes the syntax of the member command in config-tenant-seg submode, as follows:
member vlan <vlan-number>
Note: Restoring a configuration snapshot with a different vlan-mapping mode is not supported. The vlan-mapping mode in
the configuration snapshot that is being restored must be the same as the vlan-mapping mode in the existing configuration.
Command Examples
To enable global VLAN mapping, enter the following command in config-fabric mode:
controller-1(config-fabric)# vlan-mapping global
To restore the default VLAN mapping, enter the following command in config-fabric mode:
controller-1(config-fabric)# vlan-mapping default
group Command
Command Syntax
[no] group { admin | read-only }
Command Mode
Config mode
Command Description
Use the group command to access the config-group submode, where you can associate user accounts with the admin or
read-only group. Use this submode to associate previously configured user accounts with the group. User accounts assigned
to a group inherit the access privileges defined for the group. The current release supports full administrative privileges for
users associated with the preconfigured admin group and read-only privileges for users associated with the read-only
group.
Note: The admin group is spelled with a lower-case a, and the group name is case-sensitive.
read-only: The default read-only group, which provides read-only access, such as most show commands, to user accounts
associated with it.
tenant. <tenant>.<group>: Use this keyword to define a group for a specific tenant. Replace <tenant> with the name of the
BCF tenant and <group> with the name of the group you want to create for the tenant. A user account associated with this
group obtains admin-level or read-only privileges depending on whether the account is also associated with the read-only
or admin group.
Command Examples
The following command enters config-group submode for the default group admin.
controller-1(config)# group admin
controller-1(config-group)#
The following command enters config-group submode for the read-only group.
controller-1(config)# group read-only
controller-1(config-group)#
The following command enters config-group submode for the admin group for tenant test.
controller-1(config)# group tenant.test.admin
controller-1(config-group)#
group
associate Command
Command Syntax
[no] associate user <user-name>
Command Mode
config-group mode
Command Description
Use the associate command to assign users to the admin or read-only group. The admin group provides administrator-level
privileges, which lets associated users enter commands from all modes and submodes . User accounts associated with the
read-only group can monitor fabric configuration and operation, but they cannot make any changes.
Command Examples
The following command associates the user bob with the admin group.
controller-1(config)# group admin
controller-1(config-group)# associate user bob
The show group or show user commands display the current configuration for groups and users, as in the following
example:
controller-1> show group
# Group name User(s)
-|----------|---------|
1 admin admin
2 read-only bob, john
controller-1>
interface-group Command
Command Syntax
[no] interface-group <interface-roup>
Command Mode
Config mode
Command Description
Use the interface-group command to enter config-interface-group submode, from where you can configure the interface-
group members and mode. Interface groups can only be defined on edge interfaces on leaf switches connected to
endpoints (hosts or servers).
Command Examples
controller-1(config)# interface-group pg1
controller-1(config-interface-group)#
interface-group
backup-member Command
Command Syntax
[no] backup-member {switch <switch-name> interface <interface-name>}
Command Mode
config-interface-group submode
Command Description
Use the backup-member command to assign backup members to a primary-backup interface group, which is assigned to
standby state and becomes active only if all the primary members fail. Use the mode command to define an interface group
in primary-backup mode. Use the member command to assign the primary members to the primary-backup interface
group.
Command Examples
The following command assigns ethernet2 on switch leaf2a to interface group pg3 and defines the mode as primary-
backup:
controller-1(config)# interface-group pg3
controller-1(config-interface-group)# backup-member switch leaf2a interface ethernet2
interface-group
backup-mode Command
Command Syntax
[no] backup-mode {lacp | static | inter-pod}
Command Mode
config-interface-group submode
Command Description
Use the backup-mode command to specify how the link aggregation group is formed for the backup members in an
primary-backup interface group. A primary-backup interface group is composed of active members, which forward traffic,
and backup members, which remain in standby mode and do not forward traffic. The backup members become active only
when all the members in the active group become unavailable.
inter-pod: Use the inter-pod mode to create an interface group for interconnecting Big Cloud Fabric pods. When the pod-
mode is configured as leaf mode, which is the default, a single interface group in inter-pod mode can be configured in each
fabric. When the pode mode is changed to spine mode (using the pod-role command in config-fabric submode), up to eight
remote BCF pods (in leaf pod mode) can be connected to the local pod in spine pod mode.
lacp: Use this mode if the server connected to the interfaces within the interface group supports LACP. Interfaces are
dynamically aggregated into a LAG when traffic appears on the interfaces within the interface group.
static: Configure mode as static if a server has multiple network interfaces but does not support LACP. Interfaces are
statically aggregated into a link aggregation group (LAG).
Command Examples
The following command assigns the lacp mode to the backup mode:
controller-1(config-interface-group)# backup-mode lacp
interface-group
description Command
Command Syntax
[no] description <description>
Command Mode
config-interface-group submode
Command Description
Use the description command to associate a text description, enclosed in quotes, with the interface group.
Command Examples
The following command assigns ethernet1 on switch leaf1a and ethernet1 on leaf1b to interface group pg1:
controller-1(config)# interface-group pg1
controller-1(config-interface-group)# description “Interface group in rack 1 for use in Web tier”
interface-group
member Command
Command Syntax
[no] member {{switch <switch-name> interface <interface-name>} | {chassis-mac <chassis-mac>} | {host
interface <interface-name>}}
Command Mode
config-interface-group submode
Command Description
Use the member command to identify the interface and switch to include in an interface group. Enter the command once
for each interface to add to the interface group.
Interface groups can be defined only on the edge interfaces of leaf switches within the same leaf group and rack.
Command Examples
The following command assigns ethernet1 on switch leaf1a and ethernet1 on leaf1b to interface group pg1:
controller-1(config)# interface-group pg1
controller-1(config-interface-group)# member switch leaf1a interface ethernet1
controller-1(config-interface-group)# member switch leaf1b interface ethernet1
interface-group
mode Command
Command Syntax
[no] mode {cdp | inter-pod | lacp | lacp-fallback-individual | span-fabric | static } [origination]
Command Mode
Interface-group submode
Command Description
Use the mode command to specify the interface group as static or lacp. Use LACP mode for multiple interfaces connected
to a server that supports Link Access Control Protocol (LACP).
By default, an interface group is in static mode, which indicates that interfaces are not grouped by a protocol, such as LACP,
with the other end of the link. In lacp mode, the configured member interface is grouped at runtime after negotiating LACP
with the other end of the link. LACP is a link-level protocol that is run on each member of the interface group. Only if LACP
converges on an interface, it is added to the group at runtime. Otherwise, the interface remains in a logical down state and
forwarding of data packets is disabled on that interface.
Note: The non-configurable LACP default value for active/passive is active, and for the fast/slow rate (short/long rate), the
setting is fast. The fast setting means that the LACP PDU is sent every one second. Earlier versions of Big Cloud Fabric used
an LACP timer set to fast (every 30 seconds).
It is recommended to configure the corresponding LACP configuration on the host with an up-delay of 5 seconds.
On Ubuntu systems, configure /etc/network/interfaces. Under the bond interface configuration section, add the following
command:
bond-updelay 5000
On Centos systems, configure /etc/sysconfig/network-scripts. Add the following command for the bond interface:
BONDING_OPTS=updelay=5000
Note: Layer 2 connectivity between separate fabrics (pods) is supported only in a P-Fabric.
lacp: Use this mode if the server connected to the interfaces within the interface group supports LACP. Interfaces are
dynamically aggregated into a LAG when traffic appears on the interfaces within the interface group.
lacp-fallback-individual: Use this mode to allow an interface to be included in two different segments. One segment is
connected to a PXE server, allowing servers on the segment to PXE boot. The other is a normal segment providing
connectivity to the tenant. The members of the interface group defined using this mode operate in two modes:
• LACP: When LACP packets are seen from the peer, the normal LACP LAG behavior occurs. All the normal segment
membership rules corresponding to the interface group apply.
• Fallback-individual LAG mode: Each interface is included in an individual edge-port LAG, which is included in the
membership of a segment that is also used for PXE boot.
origination: Used by the system to identify interface groups created through vCenter integration.
span-fabric: Use this mode with an interface group to be used as the destination for a Fabric SPAN session, configured using
the span-fabric command.
static: Configure mode as static if a server has multiple network interfaces but does not support LACP. Interfaces are
statically aggregated into a link aggregation group (LAG).
Command Examples
The following command configures the mode used by interface group pg1 as LACP:
controller-1(config)# interface-group pg1
controller-1(config-interface-group)# mode lacp
The following example configures two interfaces as PXE-boot enabled within interface group pg2, which is configured using
lacp-fallback-individual mode..
controller-1(config)# interface-group pg2
controller-1(config-interface-group)# mode lacp-fallback-individual
controller-1(config-interface-group)# member switch leaf2a interface ethernet1
controller-1(config-interface-group)# member switch leaf2b interface ethernet1
interface-group
preempt Command
Command Syntax
[no] preempt
Command Mode
Interface-group submode
Command Description
Use the preempt command for a primary-backup interface group to cause the original active members to preempt
forwarding from the backup members after failover has occurred, as soon as any member of the active group becomes
available. A 10-second timer delays preemption to prevent repeated failover when the active links are unstable.
Command Examples
Enable preemption for the current interface group.
controller-1(config-interface-group)# preempt
interface-group
shutdown Command
Command Syntax
[no] shutdown
Command Mode
Interface-group submode
Command Description
Use the shutdown command to administratively shut down the current interface group. To enable an interface group that
was administratively shut down, enter the no form of the command.
Command Syntax
local node
Command Mode
Config mode
Command Description
Use the local node command to enter config-local submode, which lets you enter commands to configure the configuration
of the local controller node.
Command Examples
controller-1(config)# local node
controller-1(config-local)#
local-node
hostname Command
Command Syntax
hostname <hostname>
Command Mode
config-local submode
Command Description
Use the hostname command to change the hostname of the controller node.
Command Examples
controller-1(config)# local node
controller-1(config-local)# hostname controller-2
controller-2(config-local)#
local-node
interface Command
Command Syntax
interface {ethernet0 | <interface-name>}
Command Mode
config-local submode
Command Description
Use the interface command to enter local-node interface submode, from where you can configure settings that apply to the
controller node interface.
Command Examples
controller-1(config-local)# interface management
controller-1(config-local-if)#
local-node/interface
ipv4 Command
Command Syntax
ipv4
Command Mode
config-local-if submode
Command Description
Use the ipv4 command to enter config-local-if-ipv4 submode, where you can complete the IPv4 configuration for the
controller management interface.
Command Examples
controller-1(config-local-if)# ipv4
controller-1(config-local-if-ipv4)#
local-node/interface/ipv4
dns Command
Command Syntax
[no] dns search <dns-search-path>
[no] dns server <dns-server>
Command Mode
config-local-if-ipv4 submode
Command Description
Use the dns search command to set the default DNS search path used for name resolution. Use the dns server command to
set the IP address of the DNS server to be used for name resolution on the specified interface on the local controller node.
You can define multiple DNS servers and search paths for the controller as follows:
• Maximum number of DNS search paths: 6 (six)
• Maximum number of DNS servers: 3 (three)
Command Examples
controller-1(config-local-if-ipv4)# dns search myexample.com
controller-1(config-local-if-ipv4)# dns server 192.168.17.1
local-node/interface/ipv4
ip Command
Command Syntax
[no] ip <ip-address/<cidr> [gateway <gateway>]
Command Mode
config-local-if-ipv4 submode
Command Description
Use the IP command to identify the IP address and subnet mask and to identify the default gateway for the controller
management interface.
Note: You can configure only one unique default gateway, which must be in the same subnet as the controller IP address
for routing to work correctly. You should specify the same default gateway for each IP address you configure. If you change
the controller to a different subnet, make the change connected by the serial console to avoid loss of connectivity.
Alternatively, first change the IP address to the new subnet, establish a SSH session to the new IP address, and then change
the gateway to the new subnet.
Command Examples
The following command assigns the IP address 192.168.1.101 with a 24-bit subnet mask to the controller management
interface.
controller-1(config-local-if-ipv4)# 192.168.1.101/24
The following command assigns the IP address 192.168.1.1 for the default gateway in the controller management network.
controller-1(config-local-if-ipv4)# 192.168.1.1
local-node/interface
ipv6 Command
Command Syntax
ipv6
Command Mode
config-local-if submode
Command Description
Use the ipv6 command to enter config-local-if-ipv6 submode, where you can complete the IPv6 configuration for the
controller management interface.
Command Examples
controller-1(config-local-if)# ipv6
controller-1(config-local-if-ipv6)#
local-node/interface/ipv6
dns Command
Command Syntax
[no] dns search <dns-search-path>
[no] dns server <dns-server>
Command Mode
config-local-if-ipv6 submode
Command Description
Use the dns search command to manually set the default DNS search path used for name resolution. To configure IPv6
options manually, you must enter the method manual command. Use the dns server command to set the IP address of the
DNS server to be used for name resolution on the specified interface on the local controller node. You can define multiple
DNS servers and search paths for the controller as follows:
• Maximum number of DNS search paths: 6 (six)
• Maximum number of DNS servers: 3 (three)
Command Examples
controller-1 (config-local)# interface eth0
controller-1 (config-local-if)# ipv6
controller-1 (config-local-if-ipv6) method manual
controller-1 (config-local-if-ipv6) dns search mydomain.com
controller-1 (config-local-if-ipv6) dns server fd00::1002/64
local-node/interface/ipv6
ip Command
Command Syntax
[no] ip <ip-address/<cidr> [gateway <gateway>]
Command Mode
config-local-if-ipv6 submode
Command Description
Use the IP command to manually identify the IP address and subnet mask and to identify the default gateway for the
controller management interface. To configure IPv6 options manually, you must enter the method manual command.
Command Examples
controller-1 (config-local)# interface eth0
controller-1 (config-local-if)# ipv6
controller-1 (config-local-if-ipv6) method manual
controller-1 (config-local-if-ipv6)# ip fd00::1001/64 gateway fd00::1
Note: You can configure only one unique default gateway, which must be in the same subnet as the controller IP address
for routing to work correctly. You should specify the same default gateway for each IP address you configure. If you change
the controller to a different subnet, make the change connected by the serial console to avoid loss of connectivity.
Alternatively, first change the IP address to the new subnet, establish a SSH session to the new IP address, and then change
the gateway to the new subnet.
local-node/interface/ipv6
method Command
Command Syntax
method { auto | manual }
Command Mode
config-local-if-ipv6 submode
Command Description
Use the method command to specify how the controller gets its IPv6 configuration. The auto option causes the controller to
get the IPv6 configuration from a Stateless Autoconfiguration (SLAAC) server. The manual option lets you perform static
configuration. If you configure both auto and manual, the manual configuration is used if a SLAAC server is not available.
local-node
snmp-server Command
Command Syntax
snmp-server engine-id <string>
Command Mode
config-local submode
Command Description
Use the snmp-server command to configure an engine-id string for the BCF controller.
In SNMPv3, an agent (SNMP server) is identified by an engineID, which helps prevent unauthorized SNMPv3 messages, such
as traps, from being accepted or traps being intercepted by unauthorized receivers. The engineID of the SNMP agent is
required when configuring an SNMPv3 trap receiver to receive messages from an agent, including a BCF controller or fabric
switch.
In BCF, the engineID is autogenerated for the fabric switches. The engineID of the BCF controller is configured for the local
node and this configuration must be entered separately on the Active and Standby controllers. It is recommended to
configure a different engineID for each controller.
Note: The engine-id configuration is not included when applying a saved running-config to the controller. The engine-id
configuration must be reapplied using the snmp-server engine-id command.
Command Examples
The following commands configure the engine-id controller-1_EngineID.
controller-1(config)# local node
controller-1(config-local)# snmp-server engine-id controller-1_EngineID
Command Syntax
[no] logging {remote <server> [<port>] [info | notice | err | alert | crit | emerg | debug | warning]
Command Mode
Config mode
Command Description
Use the logging remote command to identify the IP address and port number of the syslog server, to which syslog messages
are sent. You must use the logging remote command to enable remote logging.
Command Examples
The following command identifies the syslog server at 192.168.17.1 using port 514.
controller-1(config)# logging remote 192.168.17.1 514
Command Syntax
[no] logging switch-remote
Command Mode
Config mode
Command Description
Use the logging switch-remote command to enable sending logs from fabric switches directly to the syslog server, bypassing
the controller.
Command Examples
The following command send logs from fabric switches directly to the syslog server, bypassing the controller.
controller-1(config-fabric)# logging switch-remote
controller-1(config-fabric)#
Note: when this option is enabled, switch logs will not be available for analysis on the controller or with BCF Analytics.
mac-classify-pool Command
Command Syntax
[no] mac-classify-pool
Command Mode
Config mode
Command Description
Use the mac-classify-pool command to enter config-mac-classify-pool submode, where you can define a pool of interfaces
or interface groups to be made available for dynamic assignment when a specified MAC address is seen on the interface or
interface group.
Command Examples
controller-1(config)# mac-classify-pool
controller-1(config-mac-classify-pool)#
mac-classify-pool
member Command
Command Syntax
[no] member {interface-group <group-name>} | {switch <switch-name> interface <interface-name>}
Command Mode
Config mode
Command Description
Use the member command to add interfaces or interface groups to the MAC classification pool. When the MAC address of
an endpoint is known, you can dynamically assign the interface where the MAC appears to a specific segment. This feature
can be used only with untagged VLAN traffic. After defining the members of the MAC classification pool, configure a MAC
membership rule to specify the MAC addresses.
When any of the specified MAC addresses are seen on a member of the MAC classification pool, the interface or interface
group is added to the segment where the MAC membership rule was defined. . When the endpoint with the specified MAC
address ages out from the endpoints table after 5 minutes of activity, the interface that was assigned to the segment is
returned to the classification pool.
If a MAC address appears on a member of the classification pool but is not defined by a MAC-based membership rule, the
MAC is added to Ignored Hosts list, which can be seen by entering the show mac-membership ignored-endpoint.
Command Examples
The following commands assign the interface groups pg1 and pg2 to the MAC classification pool
controller-1 (config-macpool)#
controller-1 (config-macpool)# member interface-group pg1 vlan untagged
controller-1 (config-macpool)# member interface-group pg2 vlan untagged
The following command adds adds the available switch interfaces to the MAC classify pool:
controller-1 (config-macpool)# member switch any interface any vlan untagged
nat-pool Command
Command Syntax
nat-pool
Command Mode
Config mode
Command Description
Use the nat-pool command from config mode to enter config-nat-pool submode, where you can allocate a vSwitch to the
fabric-wide pool of vSwitches. The nat-profile command is used in config-tenant-lrouter submode to configure the specific
settings for network address translation (NAT) and port address translation (PAT).
Command Examples
controller-1(config)# nat-pool
controller-1(config-nat-pool)#
nat-pool
nat-switch Command
Command Syntax
nat-switch <vswitch-name>
Command Mode
Config-nat-pool mode
Command Description
Use the nat-switch command to allocate a vSwitch to the fabric-wide pool of vSwitches.
Command Examples
controller-1(config)# nat-pool
controller-1(config-nat-pool)#nat-switch vswitch1
ntp Command
Command Syntax
[no} ntp {server <ntp-server> | time-zone <time-zone>}
Command Mode
Config mode
Command Description
Use the ntp command from config mode to identify the NTP server and set the current time zone. You can also use the NTP
command to request a one-time NTP sync from the specified NTP server or the default configured server.
Note: The hypervisor and the virtual machine running the controller should use the same time zone, whether UTC or the
local time zone. Using different time zones may cause issues, such as problems with log files.
Command Examples
The following command specifies 192.168.17.1 as the NTP server:
controller-1(config)# ntp server 192.168.17.1
Command Syntax
[no] ntp controller-source
Command Mode
Config mode
Command Description
Use the ntp controller-source command to configure the BCF controller as an NTP server for physical switches (pSwitches)
that are connected to the controller.
nsx Command
Command Syntax
[no] nsx <nsx-name> [type nsx]
Command Mode
Config mode
Command Description
Use the nsx command to enter the config-nsx submode, where you can integrate an an instance of vSphere NSX.
Command Examples
controller-1(config)# nsx mynsx1 type nsx
controller-1(config-nsx)#
config-nsx/hardware-vtep Command
Command Syntax
[no] hardware-vtep
Command Mode
Config-nsx mode
Command Description
Use the hardware-vtep command to enter config-nsx-nvtep submode.
Command Examples
controller-1(config)# nsx mynsx1 type nsx
controller-1(config-nsx)# hardware-vtep
controller-1(config-nsx-nvtep)#
config/nsx/hardware-vtep
active Command
Command Syntax
[no] active
Command Mode
Config-nsx-nvtep mode
Command Description
Use the active command to activate the current NSX integration instance. Use the no version of the command to deactivate
the instance.
Command Examples
The following command activates the current NSX integration instance.
controller-1(config-nsx-nvtep)#
controller-1(config-nsx-nvtep)# active
config/nsx/hardware-vtep
attachment-point Command
Command Syntax
attachment-point
Command Mode
config-nsx-nvtep mode
Command Description
Use the attachment-point command to enter the config-nsx-intf submode, where you can identify the interface group used
to integrate the current NSX instance.
Command Examples
controller-1(config)# nsx mynsx1 type nsx
controller-1(config-nsx)# attachment-point
controller-1(config-nsx-intf)#
config/nsx/hardware-vtep/attachment-point
attached-interface Command
Command Syntax
[no] attached-interface <if-group-name>
Command Mode
config-nsx-nvtep-intf mode
Command Description
Use the attached-interface command to identify the interface-group that connects the NSX instance to the Big Cloud Fabric.
Command Examples
controller-1(config-nsx-nvtep)# attachment-point
controller-1(config-nsx-nvtep-intf)# attached-interface myinterfacegroup1
controller-1(config-nsx-nvtep-intf)#
config/nsx/hardware-vtep
nsx-controller-ip Command
Command Syntax
[no] nsx-controller-ip <ip-address>
Command Mode
config-nsx-nvtep mode
Command Description
Use the nsx-controller-ip command to configure an IP address for the current NSX instance.
Command Examples
controller-1(config-nsx-nvtep)# nsx-controller-ip 10.10.6.1
controller-1(config-nsx-nvtep)#
config/nsx/hardware-vtep
nsx-hardware-vtep-tenant Command
Command Syntax
[no] nsx-hardware-vtep-tenant <tenant>
Command Mode
config-nsx-nvtep mode
Command Description
Use the nsx-hardware-vtep-tenant command to configure a tenant for the current nsx instance.
Command Examples
controller-1(config-nsx-nvtep)# nsx-hardware-vtep-tenant mytenant
controller-1(config-nsx-nvtep)#
config/nsx/hardware-vtep
port Command
Command Syntax
[no] port <port-num>
Command Mode
config-nsx-nvtep mode
Command Description
Use the port command to identify the TCP port number to use for communications between the current NSX instance and
the BCF controller.
Command Examples
controller-1(config-nsx-nvtep)# port 6650
controller-1(config-nsx-nvtep)#
config-nsx
nsx-manager-hashed-password Command
Command Syntax
[no] nsx-manager-hashed-password
Command Mode
Config-nsx mode
Command Description
Use the nsx-manager-hashed-password to set the vCenter NSX manager password to log into NSX.
config-nsx
nsx-manager-host-name Command
Command Syntax
[no] nsx-manager-host-name
Command Mode
Config-nsx mode
Command Description
Use the nsx-manager-host-name command to set the NSX manager host name.
Command Examples
controller-1(config)# nsx mynsx1 type nsx
controller-1(config-nsx)# nsx-manager-host-name myhost
config-nsx
nsx-manager-password Command
Command Syntax
[no] nsx-manager-password
Command Mode
Config-nsx mode
Command Description
Use the nsx-manager-password to set the vCenter NSX manager password to log into NSX manager.
Command Examples
controller-1(config)# nsx mynsx1 type nsx
controller-1(config-nsx)#
config-nsx
nsx-manager-user-name Command
Command Syntax
[no] nsx-manager-user-name
Command Mode
Config-nsx mode
Command Description
Use the nsx-manager-user-name to set the vCenter NSX manager user name to log into NSX manager.
Command Examples
controller-1(config)# nsx mynsx1 type nsx
controller-1(config-nsx)# nsx-manager-user-name user1
config-nsx
vcenter-name Command
Command Syntax
[no] vcenter-name
Command Mode
Config-nsx mode
Command Description
Use the vcenter-name command to set the vcenter name.
Command Examples
controller-1(config)# nsx mynsx1 type nsx
controller-1(config-nsx)# vcenter-name myvcenter1
nutanix-prism Command
Command Syntax
[no] nutanix-prism <name>
Command Mode
Config mode
Command Description
Use the Nutanix-prism command to identify an instance of Nutanix Prism for integration with BCF and enter the config-
nutanix-prism submode, which provides configuration options that apply to the specific instance.
Command Examples
controller-1(config)# nutanix-prism mynutanix
controller-1(config-nutanix-prism)#
config
nutanix-prism Submode Commands
The following commands are available in this submode.
• automation-level Configure BCF configuration automation
• exclude Specify Nutanix management network vlan
• hashed-password Set the Nutanix Prism password (to log into Prism)
• host-name Set the Nutanix prism server host name
• maintenance Disconnect Nutanix Prism server & maintain last synced configuration from Nutanix Prism
server
• manage-segment-for-vlan Specify tenant and segment for Nutanix vlan
• manage-segment-for-vlan-range Specify tenant for nutanix vlan range
• password Set the Nutanix Prism password (to log into Prism service)
• preserve-bcf-config Preserve network configuration for Nutanix Prism Server when it is removed using "no
nutanix-prism" command
• user-name Set the Nutanix Prism server user name (to log into Prism service)
config-nutanix-prism
automation-level Command
Command Syntax
[no] automation-level {full | none}
Command Mode
Config-nutanix-prism mode
Command Description
Use the automation-level command to set the automation level when importing configuration from the current Nutanix
Prism instance.
Command Examples
controller-1(config-nutanix-prism)# automation-level {full | none}
config-nutanix-prism
exclude Command
Command Syntax
[no] exclude
Command Mode
Config-nutanix-prism mode
Command Description
Use the exclude command to specify the Nutanix management network vlan.
Command Examples
controller-1(config-nutanix-prism)# exclude
config-nutanix-prism
hashed-password Command
Command Syntax
[no] hashed-password
Command Mode
Config-nutanix-prism mode
Command Description
Use the <<>> command to set the Nutanix Prism password to log into Prism.
Command Examples
controller-1(config-nutanix-prism)# hashed-password
config-nutanix-prism
host-name Command
Command Syntax
[no] host-name
Command Mode
Config-nutanix-prism mode
Command Description
Use the host-name command to set the Nutanix prism server host name.
Command Examples
controller-1(config-nutanix-prism)# host-name
config-nutanix-prism
maintenance Command
Command Syntax
[no] maintenance
Command Mode
Config-nutanix-prism mode
Command Description
Use the maintenance command to disconnect Nutanix Prism server & maintain last synced configuration from Nutanix
Prism server
Command Examples
controller-1(config-nutanix-prism)# maintenance
config-nutanix-prism
manage-segment-for-vlan Command
Command Syntax
[no] manage-segment-for-vlan
Command Mode
Config-nutanix-prism mode
Command Description
Use the manage-segment-for-vlan command to specify tenant and segment for Nutanix vlan.
Command Examples
controller-1(config-nutanix-prism)# manage-segment-for-vlan
config-nutanix-prism
manage-segment-for-vlan-rangeCommand
Command Syntax
[no] manage-segment-for-vlan-range password
Command Mode
Config-nutanix-prism mode
Command Description
Use the manage-segment-for-vlan-range password command to specify tenant for nutanix vlan range.
Command Examples
controller-1(config-nutanix-prism)# manage-segment-for-vlan-range
config-nutanix-prism
password Command
Command Syntax
[no] password
Command Mode
Config-nutanix-prism mode
Command Description
Use the password command to set the Nutanix Prism password to log into Prism service.
Command Examples
controller-1(config-nutanix-prism)# password
config-nutanix-prism
preserve-bcf-config Command
Command Syntax
[no] preserve-bcf-config
Command Mode
Config-nutanix-prism mode
Command Description
Use the preserve-bcf-config command to preserve network configuration for Nutanix Prism Server when it is removed using
"no nutanix-prism" command.
Command Examples
controller-1(config-nutanix-prism)# preserve-bcf-config
config-nutanix-prism
user-name Command
Command Syntax
[no] user-name
Command Mode
Config-nutanix-prism mode
Command Description
Use the user-name command to set the Nutanix Prism server user name to log into Prism service.
Command Examples
controller-1(config-nutanix-prism)# user-name
radius Command
Command Syntax
[no] radius acct-port [<acct-port>]
[no] radius auth-port [<auth-port>]
[no] radius auth-protocol [{pap | eap-ttls}]
[no] radius ca-cert [<ca-cert>]
Command Mode
Config mode
Command Description
Use the radius command to configure server and protocol parameters for RADIUS. Specify remote RADIUS servers, along
with protocol timeouts and security settings.
RADIUS specific configuration here is enabled by a corresponding aaa command to enable authentication, authorization, or
accounting using the RADIUS protocol.
Command Examples
The following command configures the global RADIUS protocol timeout to 20 seconds.
controller-1(config)# radius server timeout 20
The following command return the RADIUS protocol timeout to the default value.
controller-1(config)#no radius server timeout
The following command configures a RADIUS server with the specified IP address.
controller-1(config)# radius server host 192.168.1.1
Command Syntax
secure control plane { off | provision | lockdown } [force]
Command Mode
Config mode
Command Description
Use the secure control plane command to change the controller control plane mode. When in provisioning mode, a new
switch can connected to the controllers after a signed switch certificate for the switch has been imported to the controller
from a trusted CA. In lockdown mode, no physical or virtual switches can be added to the fabric.
A certificate signing request (CSR) is automatically generated by each physical switch connected to a controller in
provisioning mode. To copy the CSR to the CA and to import signed certificates to the controller, use the copy command. To
add virtual switches to the fabric, manually configure the certificate on each virtual switch.
To register a CA as a trusted CA, import the CA root certificate using the secure control plane ca command. To view the
current control plane status, including the names of CSRs and certificates, enter the show secure control plane command.
Command Examples
The following command moves the controller to provisioning mode, where new switches can connect to the controllers and
be added to the fabric.
controller-1(config)# secure control plane provision
controller-1(config)#
The following command moves the controller to lockdown mode, where no physical or virtual switches can connect to the
controllers:
controller-1(config)# secure control plane lockdown
controller-1(config)#
Command Syntax
secure control plane ca <cert>:
Command Mode
Config mode
Command Description
Use the secure control plane ca command on the Active controller to import the certificate authority (CA) root certificate,
which registers the CA as a trusted CA on the controller. This trust relationship is synchronized from the Active controller to
the Standby controller and the connected fabric switches.
Command Examples
controller-1(config)# secure control plane ca cacert-example
controller-1(config)#
sflow Command
Command Syntax
sflow
Command Mode
Config mode
Command Description
Use the sflow command to enter config-sflow submode, where you can configure sFlow settings for the BCF controller,
which acts as an agent reporting to an sFlow client, called a collector.
Command Examples
controller-1(config)# sflow
controller-1(config-sflow)#
sflow
active Command
Command Syntax
[no] active
Command Mode
config-sflow mode
Command Description
Use the active command to activate sFlow. Use the no active command to deactivate sflow.
Command Examples
The following command enables sFlow reporting from the fabric to any configured sFlow collectors:
controller-1(config-sflow)# active
sflow
collector Command
Command Syntax
[no] collector <ip-address> [port <port>] agent-ip tenant <tenant-name> interface segment <segment-name>
Command Mode
config-sflow mode
Command Description
Use the collector command to configure the sFlow collector IP address and port number.
Next Keyword Descriptions
<ip-addr>: The IP address of the sFlow collector. Enter multiple commands to configure up to four sFlow collectors. If the
sFlow collector is on a device external to the Big Cloud Fabric, a static route to the collector must be configured on the
external tenant logical router. The IP address can be an IPv4 or IPv6 address.
port <port>: Optionally, enter the UDP port number used by the controller to communicate with the sFlow collector. The
default value is 6343.
agent-ip: Identify the Big Cloud Fabric segment that is the source of the sFlow packets. The sFlow agent must be a known
segment in a known tenant, with a valid IP address assigned to the segment interface and with a known path to the sFlow
collector. The sFlow agent IP address can be an IPv4 or IPv6 address.
tenant <tenant-name>: Identify the tenant where the source agent endpoint is attached.
interface segment <segment-name>: Identify the segment where the source agent endpoint is attached.
Command Examples
The following command enables sFlow reporting from the fabric to the sFlow collector with IP address 192.168.1.201 at the
default port 6343:
controller-1(config-sflow)# collector 192.168.1.201
sflow
counter-interval Command
Command Syntax
[no] counter-interval <counter-interval>
Command Mode
Config-sflow mode
Command Description
Use the counter-interval command to configure the number of seconds between updates sent to the sFlow collector by the
controller.
Next Keyword Descriptions
<counter-interval>: The number of seconds in the interval between messages sent to the sFlow collector. The default value
is 20 seconds.
Command Examples
The following command sets the interval between messages sent to the sFlow collector to 30 seconds.
controller-1(config-sflow)# counter-interval 30
sflow
header-size Command
Command Syntax
[no] header-size <max-header-size>
Command Mode
Config-sflow mode
Command Description
Use the header-size command to configure the max header size that the controller can use to send messages to an sFlow
collector.
Next Keyword Descriptions
<max-header-size>: The maximum number of bytes in the sFlow header that the controller can use to send messages to an
sFlow collector. The default value is 128 bytes.
Command Examples
The following command sets the maximum sFlow header size to 256 bytes.
controller-1(config-sflow)# header-size 256
sflow
sample-rate Command
Command Syntax
[no] sample-rate <sample-rate>
Command Mode
Config-sflow mode
Command Description
Use the sample-rate command to configure the sampling rate for sending sFlow packets to the sFlow collector.
Next Keyword Descriptions
<sample-rate>: Send one sFlow packet to the collector out of the number of packets specified by <sample-rate>. The
default value is to sample 1 packet out of every 10,000 packets.
Note: The maximum number of packets per second due to rate limits in the switch architecture is 100.
Command Examples
The following command sets the sFlow sample rate to sample 1 packet out of every 1,000 packets.
controller-1(config-sflow)# sample-rate 1000
snmp-server Command
Command Syntax
snmp-server {community ro <community> | location <location> | contact <contact>}
[no] snmp-server {community ro [<community>] | location [<location>] | contact [<contact>]}
Command Mode
Config mode
Command Description
Use the snmp-server command to configure the SNMP community string, location, and contact.
Command Examples
The following command sets the community string to MY-SNMP:
controller-1(config)snmp-server community ro MY-SNMP
The following command sets the server location reported during SNMP queries.
controller-1(config) snmp-server location snmp.example.com
The following command sets the administrative contact reported during SNMP queries.
controller-1(config) snmp-server contact [email protected]
Command Syntax
[no] snmp-server enable traps
Command Mode
Config mode
Command Description
Use the snmp enable traps command to enable the controller to send SNMP traps. SNMP read-only access is supported.,
but write access is not supported.
Command Examples
controller-1(config)snmp-server enable traps
Command Syntax
[no] snmp-server host <ipaddr> [udp-port <udp-port>]
Command Mode
Config mode
Command Description
Use the snmp-server host command to specify the host and port information to which to send SNMP traps. If the UDP port
is not specified, the default UDP port for SNMP traps is used (port 162).
Command Examples
The following command identifies the SNMP trap receiver at the IP address 192.168.1.20 and UDP port 200.
controller-1(config)snmp-server host 192.168.2.40 udp-port 200
Command Syntax
[no] snmp-server switch trap {auth-fail | cpu-load <cpu-load> [ 5min <cpu-load5> | 15min <cpu-load15> ]
| percent-idle <percent-idle> | percent-utilization <percent-util> | mem-free <mem-free> | psu-status
<psu-status> | fan-status <fan-status> | link-status <link-status> }
Command Mode
Config mode
Command Description
Use the snmp-server switch trap command to identify the threshold setting for CPU and memory utilization. When the
thresholds are exceeded, the switch sends a trap to the controller. This configuration is pushed to the switches through
ZTN.
Command Examples
The following commands specify a threshold of 50% for CPU utilization and 50% for memory utilization.
controller-1(config)# snmp-server switch trap cpu-load 50
controller-1(config)# snmp-server switch trap mem-free 50
controller-1(config)#
Command Syntax
[no] snmp-server trap disk-percent <integer>
Command Mode
Config mode
Command Description
Use the snmp-server trap command to enable a trap to be sent when the disk usage of the Active controller exceeds the
specified percentage.
Command Syntax
[no] snmp-server user <name> {
auth [0] <cleartext passphrase> |
7 <auth-passphrase>}} [priv {aes | des} {[0] <cleartext passphrase> | 7 <priv-passphrase>}]
Command Mode
Config mode
Command Description
Use the snmp user command to create a user account for SNMP v3 access. When running snmpwalk (snmpget,
snmpgetnext, snmpbulkget) from a shell, passphrases should be enclosed in single quotes. Entering the passphrase with
double quotes (" "), may result in an error.
priv {aes | des}: Optional keyword to perform Advanced Encryption Standard (AES) or Data Encryption Standard (DES)
encryption of the following passphrase, which is used as an encryption key to encrypt the SNMP messages between the
SNMP agent and the manager.
user <username>: Up to 32 alphanumeric characters including dash (“-“) and underscore (“_”) but no spaces. After you
configure the username with a plaintext passphrase, the output from the show snmp-server command displays the
passphrase as a Type7 encoded strings.
Command Examples
In the following example the snmp_1 user is configured for authentication (authNoPriv) with the plaintext password
authauth1.
controller-1(config)# snmp-server user snmp_1 auth authauth1
In the following example, the snmp-2 user is configured for authentication (authNoPriv) with the plaintext password
authauth1.
controller-1(config)# snmp-server user snmp-2 auth 0 authauth2
In the following example, the snmp11 user is configured for authentication and DES encryption (authpriv) with the auth
password authauth11 and the encryption key privpriv11.
controller-1(config)# snmp-server user snmp11 auth 0 authauth11 priv des 0 privpriv11
In the following example, the snmp21 user is configured for authentication and AES encryption (authpriv) with the auth
password authauth21 and the encryption key privpriv21.
controller-1(config)# snmp-server user snmp21 auth 0 authauth21 priv aes 0 privpriv21
span-fabric Command
Command Syntax
[no] span-fabric <name>
Command Mode
Config mode
Command Description
Use the span-fabric command to create a new fabric SPAN session and enter config-span-fabric mode, where you can
define filters to select the traffic to copy and activate or deactivate the session.
Command Examples
controller-1(config)# span-fabric myfspan
controller-1(config-span-fabric)#
span-fabric
active Command
Command Syntax
[no] active
Command Mode
Config-span-fabric mode
Command Description
Use the active command to activate a fabric SPAN session. Use the no version of this command to deactivate a currently
active session. Up to three fabric SPAN sessions can be active concurrently. Up to four SPAN sessions, including both local
SPAN and fabric SPAN, can be active at the same time.
Command Examples
controller-1(config)# span-fabric myfspan
controller-1(config-span-fabric)# active
span-fabric
destination Command
Command Syntax
[no] destination interface-group <interface-group-name>
Command Mode
Config-span-fabric mode
Command Description
Use the destination command to associate a destination interface-group with this span-fabric session.
Command Examples
controller-1(config)# span-fabric myfspan
controller-1(config-span-fabric)# destination fspan-pg1>
span-fabric
filter Command
Command Syntax
[no] filter
Command Mode
Config-span-fabric mode
Command Description
Use the filter command to enter the filter submode, where you can define the criteria for selecting the traffic to copy for
this span-fabric session.
Command Examples
controller-1(config)# span-fabric myfspan
controller-1(config-span-fabric)# filter
controller-1(config-span-fabric-filter)#
span-fabric-filter
<rule-number> Command
Command Syntax
[no] <rule-number> { dst-ip-cidr | ether-type <ether> | ip-dscp | ip-ecn |
proto { icmp | tcp [dst-transport-port <port> | src-transport-port <port> | udp [dst-transport-port
<port> | src-transport-port <port> } |
interface-group { <group> | any } | src-ip-cidr | switch { <switch> | any-leaf} [ interface {<interface|
any-edge } | tenant <tenant> segment <segment>}
Command Mode
Config-span-fabric-filter mode
Command Description
Enter a rule number followed by the match criteria for selecting the traffic to copy to the Fabric SPAN destination defined
for the current Fabric SPAN session.
Note: The following filtering options are not compatible with IPv6, ether-type 34525 (0x86DD), and no validation errors are
reported: dst-ip-cidr, ip-dscp, ip-ecn, proto, icmp, tcp, and udp.
priority Command
Command Syntax
[no] priority
Command Mode
Config-span-fabric mode
Command Description
Use the priority command to set a priority for this fabric SPAN session between 1 and 100. When filters used by
concurrently active SPAN sessions select the same traffic, the overlapping traffic is copied only for the session with the
lower priority.
span-local Command
span-local
active Command
Command Syntax
[no] active
Command Mode
Config-span-local mode
Command Description
Use the active command to activate a local SPAN session. Use the no version of this command to deactivate a currently
active session. Up to four SPAN sessions, including both local SPAN and fabric SPAN, can be active at the same time.
Command Examples
controller-1(config)# span-local myspan
controller-1(config-span-local)# active
span-local
destination Command
Command Syntax
[no] destination switch {<switch-name> | any | any-leaf | any-spine } interface <interface-name>
Command Mode
Config-span-local mode
Command Description
Use the destination command to identify the interface to which to copy the traffic selected for the current local span
session. Multiple destinations are allowed for a single span-local session but only the first destination port defined receives
traffic. Multiple destination ports in one session act like a LAG. If the port receiving traffic becomes unavailable, traffic is
forwarded to the remaining destination port.
Note: The span-local feature copies only ingress traffic that matches the specified criteria on the selected switch.
Note: destination ports are shut down when incompatible with SPAN.
If you set a span-local session destination on incompatible ports, such as a link between a leaf switch and a spine switch or a
link connecting a leaf switch and a virtual-switch, unexpected LLDP messages are received and the ports are shut down. To
fix this problem, complete the following steps:
1. Fix the span-local session configuration to use valid destination ports.
2. Enter the shutdown command on the affected ports.
3. Re-enable the affected ports by entering the no shutdown command.
Command Examples
controller-1(config)# span-local myspan
controller-1(config-span-local)# destination switch leaf1a interface ethernet10
span-local
filter Command
Command Syntax
[no] filter
Command Mode
Config-span-local mode
Command Description
Use the filter command to enter the filter submode, where you can define the criteria for selecting the traffic to copy for
this span-local session.
Command Examples
controller-1(config)# span-local myspan
controller-1(config-span-local)# filter
controller-1(config-span-local-filter)#
span-local-filters
<rule-number> Command
Command Syntax
[no] <rule-number> { dst-ip-cidr | ether-type <ether> | ip-dscp | ip-ecn |
proto { icmp | tcp [dst-transport-port <port> | src-transport-port <port> | udp [dst-transport-port
<port> | src-transport-port <port> } |
interface-group { <group> | any } | src-ip-cidr | switch { <switch> | any-leaf} [ interface {<interface|
any-edge } | tenant <tenant> segment <segment>}
Command Mode
Config-span-local mode
Command Description
Enter a rule number followed by the match criteria for selecting the traffic to copy to the Local SPAN destination defined for
the current Local SPAN session. A filter specification must include the switch and interface name. Optionally, it can also
include a tenant, segment name and packet match criteria. These additional criteria can be specified only if the direction of
the source specification is ingress.
[<pkt-match-criteria>]: Optionally, replace <pkt-match-criteria> with any of the following optional keywords to identify the
interesting traffic. If the filter criteria are not used, all traffic is copied.
tenant <tenant>: Replace <tenant> with the name of the tenant where the interesting traffic originates.
segment <segment>: Replace <segment> with the name of the segment where the interesting traffic originates.
ether-type <ether>: Replace <ether> with the Ethernet type of the interesting traffic.
Note: The following filtering options are not compatible with IPv6, ether-type 34525 (0x86DD), and no validation errors are
reported: dst-ip-cidr, ip-dscp, ip-ecn, proto, icmp, tcp, and udp.
priority Command
Command Syntax
[no] priority
Command Mode
Config-span-local mode
Command Description
Use the priority command to set a priority for this local SPAN session between 1 and 100. When filters used by concurrently
active SPAN sessions select the same traffic, the overlapping traffic is copied only for the session with the lower priority.
storm-control-profile Command
Command Syntax
[no] storm-control-profile <profile>
Command Mode
config mode
Command Description
Use the storm-control-profile command to define a Storm Control profile and enter the config-storm-control-profile
submode, where you can define the limits for different types of traffic.
Command Examples
The following command defines the Storm Control profile strmcntrl:
controller-1(config)# storm-control-profile strmcntrl
controller-1(config-storm-control-profile)
broadcast-rate
Command Syntax
[no] broadcast-rate <max-util-percent>
Command Examples
controller-1(config)# storm-control-profile strmcntrl
controller-1(config-storm-control-profile) broadcast-rate 10
This command limits broadcast traffic to 10% of the available bandwidth on any interface or switch where the profile is
applied (using the storm-control command in config-switch or config-switch-if submode.
known-multicast-rate
Command Syntax
[no] known-multicast-rate<max-util-percent>
Command Mode
config-storm-control-profile submode
Command Examples
controller-1(config)# storm-control-profile strmcntrl
controller-1(config-storm-control-profile) known-multicast-rate 10
This command limits known multicast traffic to 10% of the available bandwidth on any interface or switch where the profile
is applied (using the storm-control command in config-switch or config-switch-if submode.
unknown-multicast-rate
Command Syntax
[no] unknown-multicast-rate<max-util-percent>
Command Mode
config-storm-control-profile submode
Command Examples
controller-1(config)# storm-control-profile strmcntrl
controller-1(config-storm-control-profile) unknown-multicast-rate 10
This command limits unknown multicast traffic to 10% of the available bandwidth on any interface or switch where the
profile is applied (using the storm-control command in config-switch or config-switch-if submode.
unknown-unicast-rate
Command Syntax
[no] unknown-unicast-rate<max-util-percent>
Command Mode
config-storm-control-profile submode
Command Examples
controller-1(config)# storm-control-profile strmcntrl
controller-1(config-storm-control-profile) unknown-unicast-rate 10
This command limits unknown unicast traffic to 10% of the available bandwidth on any interface or switch where the profile
is applied (using the storm-control command in config-switch or config-switch-if submode.
switch Command
Command Syntax
[no] switch <name>
Command Mode
Config mode
Command Description
Use the switch command to name a switch and enter config-switch submode, where you can associate a MAC address with
the switch name and configure the fabric role and the leaf group to which the switch belongs.
Command Examples
controller-1(config)# switch leaf1a
controller-1(config-switch)#
switch
description Command
Command Syntax
[no] description <text>
Command Mode
config-switch submode
Command Description
Use the description command to provide a text string to explain the function of each switch.
switch
fabric-role Command
Command Syntax
[no] fabric-role {spine | leaf}
Command Mode
config-switch submode
Command Description
Use the fabric-role command to assign a new switch before it is added to the fabric a role as leaf or spine.
Note: For connected switches, first shut down the switch before changing its fabric role.
Command Examples
The following command configures the fabric role of the current switch as a spine switch:
controller-1(config-switch)# fabric-role spine
The following command configures the fabric role of the current switch as a leaf switch:
controller-1(config-switch)# fabric-role leaf
switch
interface Command
Command Syntax
[no] interface <name>
Command Mode
config-switch submode
Command Description
Use the interface command to enter switch-if submode and administratively shutdown or enable the interface, which is
enabled by default.
Command Examples
The following command enables switch-if submode for ethernet1:
controller-1(config-switch)# interface ethernet1
controller-1(config-switch-if)#
switch-if
autoneg command
Command Syntax
[no] autoneg {default | disable | enable}
Command Mode
Config-switch-if submode
Command Description
Use the autoneg command to configure autonegotation for the current interface.
switch-if
bpdu-guard-disable command
Command Syntax
[no] bpdu-guard-disable
Command Mode
Config-switch-if submode
Command Description
To allow an interface to accept STP BPDUs, enter the bpdu-guard-disable command from config-switch-if-submode. The
option to disable BPDU Guard applies only to physical leaf edge ports. Virtual switches always have BPDU Guard enabled.
You can disable STP BPDU guard on physical leaf ports on a per port basis. When STP BPDU Guard is disabled, BPDU packets
received on an interface are forwarded within the same segment where the BPDUs were received.
Note: If BPDU Guard is disabled on fabric edge interfaces, then traffic loss may occur during fabric upgrade. During upgrade
or peer leaf reboot the interfaces on the leaf switch where BPDU Guard is disabled are shut down by the controller.
With STP, Rapid STP (RSTP), and Multiple STP (MSTP), BPDUs are received as untagged packets even if the interfaces are
trunk ports and included in one or more VLANs. When BPDU Guard is disabled on an interface so that STP BPDUs can be
forwarded, the interface should be included in a member rule for the segment with an untagged VLAN as well as for any
VLANs configured on the interface.
With Per VLAN STP (PVST/PVST+), BPDUs are transmitted as tagged packets. Therefore, the membership rule for the
affected segment only needs to include the required VLAN to allow the BPDUs to be forwarded (see Example 2).
To re-enable BPDU Guard on an interface where it has been disabled, enter the no version of the command.
Command Examples
bcf-controiller1(config)# switch leaf-1-a
bcf-controiller1(config-switch)# interface ethernet1
bcf-controiller1(config-switch-if)# bpdu-guard-disable
After entering this command, BPDU packets received on the port are flooded to any VLAN configured on the interface.
The following command re-enables BPDU Guard on the current interface:
bcf-controiller1(config-switch-if)# no bpdu-guard-disable
After entering this command, when an STP BPDU packet is received, it is directed to the CPU and forwarded to the
controller, which then shuts down the port.
switch-if
breakout Command
Command Syntax
[no] breakout
Command Mode
config-switch-if submode
Command Description
Breakout (splitter) cables are supported by Big Cloud Fabric to allow splitting a single 40-GbE port into four individual 10-
GbE interfaces. For information about the splitter cables supported in the current version of Big Cloud Fabric, refer to the
Big Cloud Fabric Hardware Compatibility List. With the supported splitter cables autodetection occurs when the cable is
inserted and no further configuration is required.
If using a breakout cable that cannot be autodetected, use the breakout command . When you enter this command from
the config-switch-if submode for a specific interface, that interface is configured to support a breakout or splitter cable
without autodetection. If the cable is already inserted, the interfaces become available and can be seen with the show
switch interface command. If the splitter cable is not inserted, the ports become available immediately after inserting the
cable.
Command Examples
The following command enables breakout support on the ethernet17 interface on leaf0a.
(config)# switch dell-leaf1-b
(config-switch)# interface ethernet17
(config-switch-interface)# breakout
The show running-config command displays the configuration, as in the following example:
! switch
switch dell-leaf1-b
interface ethernet17
breakout
The show switch interface command displays the interface configuration for the switch, as in the
following example:
Breakout ports are indicated by a slash and the sequence number after the interface name, such as ethernet17/1. This
example shows information about a specific breakout port. If you enter this command without specifying the interface,
information about all the interfaces on the switch is displayed.
The show switch interface all properties command, displays information about the breakout capabilities of each interface,
as in the following example:
controller-1(config)# show switch spine0 interface all properties
# Switch IF Name MAC Address Config State Adv. Features Curr Features Supported Features peer features
--|------|-----------|-----------------|------|-----|--------------|--------------|-----------------------------|-------------|
1 spine0 ethernet1 5c:16:c7:1f:b9:48 up down 40gb-fd 40gb-fd 40gb-fd, bsn-breakout-capable
2 spine0 ethernet2 5c:16:c7:1f:b9:49 up up 40gb-fd 40gb-fd 40gb-fd, bsn-breakout-capable
3 spine0 ethernet3 5c:16:c7:1f:b9:4a up down 40gb-fd 40gb-fd 40gb-fd, bsn-breakout-capable
switch-if
description command
Command Syntax
[no] description <text>
Command Mode
Config-switch-if submode
Command Description
Use the description command to associate a text description with the current interface.
switch-if
forward-error-correction command
Command Syntax
[no] forward-error-correction {default | disable | enable}
Command Mode
Config-switch-if submode
Command Description
Use the forward-error-correction command to configure forward error correction on the current interface.
switch-if
shutdown command
Command Syntax
[no] shutdown
Command Mode
Config-switch-if submode
Command Description
Use the shutdown command to place the interface in an administratively down state. Use the no shutdown command to
enable an administratively down interface.
switch-if
storm-control Command
Command Syntax
[no] storm-control <profile>
Command Mode
config-switch-if submode
Command Description
Use the storm-control command to apply a Storm Control profile to the current interface. Define a Storm Control profile by
using the storm-control-profile command in config-switch submode. The Storm Control profile lets you limit the following
types of traffic to a percentage of the available bandwidth:
• broadcast-rate
• known-multicast-rate
• unknown-multicast-rate
• unknown-unicast-rate
Command Examples
The following commands define a Storm Control profile and apply the profile to interface ethernet24:
Note: A Storm Control profile applied in config-switch-if submode takes precedence over a profile applied in config-switch
submode.
switch-if
shutdown Command
Command Syntax
[no] shutdown
Command Mode
config-switch-if submode
Command Description
Use the shutdown command to administratively shutdown the current switch interface. Use the no shutdown command to
enable an interface that was previously administratively shutdown.
Command Examples
The following command disables interface ethernet1:
controller-1(config-switch)# interface ethernet1
controller-1(config-switch-if)# shutdown
switch
leaf-group Command
Command Syntax
[no] leaf-group <leaf-group>
Command Mode
config-switch submode
Command Description
Use the leaf-group command to assign the current switch to a leaf group. Two switches in the same rack can be configured
as a leaf group for high availability and performance. Only interfaces on switches assigned to the same leaf group can be
included in a single interface group.
Command Examples
controller-1(config-switch)# leaf-group rack1
switch
mac Command
Command Syntax
[no] mac <mac>
Command Mode
config-switch submode
Command Description
Use the mac command to register the MAC address of a bare metal switch on the controller. After the MAC address is
configured on the controller, the controller will respond to requests from the switch and download its configuration and
operating system files.
Note: For connected switches, first shut down the switch before changing its MAC address.
Command Examples
controller-1(config)# switch leaf1a
controller-1(config-switch)# mac 70:72:CF:AE:B6:34
switch
shutdown Command
Command Syntax
[no] shutdown
Command Mode
config-switch submode
Command Description
Use the shutdown command to administratively shut down the switch. Use the [no] form of the command to enable a
switch that was previously shut down.
Command Examples
controller-1(config-switch)# shutdown
switch
storm-control Command
Command Syntax
[no] storm-control <profile>
Command Mode
config-switch submode
Command Description
Use the storm-control command to apply a Storm Control profile to the current switch. Define a Storm Control profile by
using the storm-control-profile command in config mode.
Command Examples
The following commands define a Storm Control profile and apply the profile to leaf2-a:
controller-1(config)# storm-control-profile strmcntrl
controller-1(config-storm-control-profile)# broadcast-rate 10
This profile limits broadcast traffic to 10% of the available bandwidth on any interface where the profile is applied.
To apply the profile to a specific switch, enter the storm-control command followed by the profile name, as in the
following example:
controller-1(config)# switch leaf2-a
controller-1(config-switch)# storm-control strmcntrl
Note: A storm control profile applied in config-switch-if submode takes precedence over a profile applied in config-switch
submode.
tacacs Command
Command Syntax
[no] tacacs server host <server-address> [key {[<plaintext>] | 0 {<plaintext>} | 7 {<secret>}}
Command Mode
Config mode
Command Description
Use the tacacs command to configure server and protocol parameters for TACACS+. Specify remote TACACS+ servers, along
with protocol timeouts and security settings.
TACACS+ specific configuration here is enabled by a corresponding aaa command to enable authentication, authorization,
or accounting via the TACACS+ protocol.
Command Examples
The following command configures the global TACACS+ protocol timeout to 20 seconds.
controller-1(config)# tacacs server timeout 20
The following command returns the TACACS+ protocol timeout to the default value.
controller-1(config)#no tacacs server timeout
The following command configures the (plaintext) key used to communicate with the TACACS+ server, if no key is specified
for a given server.
controller-1(config)#tacacs server key SECRET-KEY
The following command resets the global TACACS+ server key. If no key is specified, an empty key is assumed.
controller-1(config)#no tacacs server key
The following command configures a TACACS+ server with the specified IP address.
controller-1(config)# tacacs server host AA.BB.CC.DD
The following command specifies an encryption key for this TACACS+ server.
controller-1(config)# tacacs server host AA.BB.CC.DD key SECRET-KEY
The following command removes any key associated with this server, and use the global TACACS+ key instead.
controller-1(config)# no tacacs server host AA.BB.CC.DD key
tenant Command
Command Syntax
[no] tenant <tenant name>
Command Mode
Config mode
Command Description
Use the tenant command to define a tenant and to enter the config-tenant submode. The properties of the tenant are
configured by commands and additional submodes within config-tenant submode,
A tenant defines a logical Layer 2 and Layer 3 network connecting a group of devices or services. The tenant name "system"
is reserved for the system tenant that is used for routing between tenants. The system tenant does not contain any
segments. Other user-defined tenants contain multiple segments that can be interconnected by the tenant logical router.
Command Examples
The following command defines a new tenant instance named Red and enters the tenant sub-mode.
controller-1(config)# tenant Red
controller-1(config-tenant)#
no tenant Red
The following command enables tenant-lrouter mode for the system tenant:
controller-1(config)# tenant system
controller-1(config-tenant)#
Note: The CLI prompt is the same for system and user-defined tenants. You must re-enter the tenant command to change
the tenant or logical-router type.
tenant
description Command
Command Syntax
[no] description <description>
Command Mode
config-tenant mode
Command Description
Use the description command to associate an alphanumeric string with the current tenant. The text must be enclosed in
quotation marks (“”).
Command Examples
The following command enters a description for the Red tenant:
controller-1(config)# tenant Red
controller-1(config-tenant)# description “Red tenant containing Web, App, and Tier segments”
tenant
id Command
Command Syntax
[no] id <id>
Command Mode
config-tenant mode
Command Description
Use the id command to associate an identifier with the current tenant.
tenant
logical-router Command
Command Syntax
[no] logical-router
Command Mode
config-tenant mode
Command Description
Use the logical-router command to enter tenant-lrouter submode, from where you can enable and configure logical router
interfaces. A logical router in the Big Cloud Fabric is similar to a virtual routing and forwarding (VRF) instance, providing
routing and policy enforcement between segments within a tenant, between segments and external networks, and
between tenants.
A logical router is created when a tenant is defined. Generally speaking, each user-defined tenant has a logical router than
can route between segments within the tenant, between segments and external devices, and to the system tenant. The
system tenant is a special tenant that contains no logical segments but which can interconnect tenants.
When you define the system tenant, a special logical router is assigned that allows routing between tenants. The logical
router for the system tenant has only one type of logical interface, called a tenant interface. The system router can have
one tenant interface for each tenant. Other tenants can have a single tenant interface to the system tenant and a segment
interface for each segment within the tenant.
Command Examples
The following command enables tenant-lrouter mode for the system tenant:
controller-1(config)# tenant system
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)#
The following command enables tenant-lrouter mode for the Red tenant:
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)#
Note: Some keywords and the effect of some commands in the tenant-lrouter submode differ depending on whether you
are configuring the logical router for the system tenant or a user-defined tenant. The prompt is the same for both types of
tenants, but you must re-enter the tenant command to change the tenant or logical-router type.
tenant/logical-router
apply Command
Command Syntax
[no] apply policy-list <list-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the apply command to apply a policy list or a qos-classifier-list to the current logical router. To configure a policy list,
enter the policy-list command from tenant-lrouter submode. To configure a QoS classifier list, enter the qos-classifier-list
command from tenant-lrouter submode.
Policy and QoS classifier lists are composed of one or more entries and are applied to the logical router for a tenant. Each
entry applies to the ingress traffic received by one or more specified logical interfaces.
The default policy for every enabled logical interface is to route all traffic. However, when you apply a policy to the logical
router, all traffic is dropped on all interfaces unless specifically permitted by a policy list entry that is included in an applied
policy.
Note: When you apply a policy list to a logical router, all traffic is dropped on all interfaces unless specifically permitted by a
policy list entry that is included in an applied policy.
Command Examples
The following command applies the policy-list external to the logical router for the Red tenant.
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# apply policy-list external
controller-1(config-tenant-lrouter)#
The following command applies a QoS classifier list to the logical router for the Red tenant.
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# apply qos-classifier-list myqoslist
controller-1(config-tenant-lrouter)#
tenant/logical-router
as-path-list Command
Command Syntax
[no] as-path-list <list-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the as-path command to define an as-path list and enter the tenant-lrouter-aspath submode, where you define entries
for the as-path list. An as-path-list can then be applied in a route-map. The route-map itself can be applied on a BGP
neighbor for filtering incoming or outgoing routes.
Command Examples
The following command defines the as-path-list, my-list.
controller-1(config-tenant-lrouter)# as-path-list my-list
controller-1(config-tenant-lrouter-aspath)#
tenant/logical-router/as-path-list
<rulenumber> Command
Command Syntax
[no] <rule number> {exclude | include} <regex>}
Command Description:
Use the as-path rule command to add a new rule in the route-map. An as-path rule has a sequence number, an action
(include/exclude) and a regular expression.
. Single character
\ Character
Command Examples
(config-tenant-lrouter)# as-path-list a1
(config-tenant-lrouter-aspath)# 1 include 2,3
tenant/logical-router
bgp Command
Command Syntax
[no] bgp
Command Mode
Tenant-lrouter submode
Command Description
Use the bgp command to enable Border Gateway Protocol (BGP) and enter config-tenant-lrouter-bgp submode, where you
can configure various BGP options. Internal Border Gateway Protocol, (iBGP) provides information about the routers in the
same autonomous system (AS). BGP supports multiple equal-cost paths to reach the same destination prefix, with traffic to
the destination distributed across all the installed paths.
preference <integer>: Replace <integer> with a numeric value to set a preference for the current route. The lower
preference is the preferred route. If you do not specify a route preference, then the default preference value of 1 is used.
Command Examples
(config-tenant-lrouter)# bgp
(config-tenant-lrouter-bgp)#
tenant/logical-router/bgp
aggregate-address Command
Command Syntax
[no] aggregate-address <ip-subnet> [[as-set] [summary-only]]
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the aggregate-address command to summarize the routes advertised to a BGP neighbor. BGP route aggregation
continues advertising all the more-specific routes summarized by an aggregate. This is different from the static route or
network command because the static-command requires enabling the redistribute-static option.
Command Examples
The following command summarizes the routes matching the first two bytes in 1.1.0.0:
controller-1(config-tenant-lrouter)# bgp
controller-1(config-tenant-lrouter-bgp)# aggregate-address 1.1.0.0/16
tenant/logical-router/bgp
dampening Command
Command Syntax
[no] dampening
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the dampening command to configure dampening parameters for BGP routes.
<<add detail from user guide>>
tenant/logical-router/bgp
graceful-restart Command
Command Syntax
[no] graceful-restart
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the graceful-restart command to configure graceful restart for BGP.
The BGP graceful restart feature allows a BGP speaker to preserve forwarding state during BGP restart and to retain routing
information after a TCP session is reset. BGP graceful restart prevents the routing flap that can otherwise occur when BGP
on a router restarts and the BGP peers detect that the session has restarted. A routing flap causes BGP route re-
computation and updates to BGP routing and forwarding tables. A routing flap may create transient forwarding blackholes
or forwarding loops and consumes resources on the control affected by the flap.
tenant/logical-router/bgp
graceful-restart-stalepath-time Command
Command Syntax
graceful-restart-stalepath-time <stalepath-time>
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the graceful-restart-stalepath-time command to configure the graceful restart stalepath time for BGP.
tenant/logical-router/bgp
local-as Command
Command Syntax
[no] local-as <local-as>
Command Mode
tenant-lrouter-bgp submode
Command Description
Use the local-as command to set the local Autonomous System ID.
tenant/logical-router/bgp
log-neighbor changes Command
Command Syntax
[no] log-neighbor-changes
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the log-neighbor-changes command to configure BGP to log neighbor changes.
tenant/logical-router/bgp
maximum-paths Command
Command Syntax
[no] maximum-paths
Command Mode
Tenant-lrouter-bgp submode
Command Description
For equal-cost multipath load balancing (ECMP), use the maximum-paths command to configure the maximum number of
paths to which a route can point.
tenant/logical-router/bgp
neighbor Command
Command Syntax
[no] neighbor <bgp-neighbor-name>
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the neighbor command to identify a BGP neighbor for the current tenant logical router and enter lrouter-bgp-neigh
submode, where you can configure various options related to BGP neighbors, such as filtering based on prefix lists.
tenant/logical-router/bgp/neighbor
apply Command
Command Syntax
[no] apply prefix-list <prefix-lists-name> [in | out]
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the apply command to apply inbound prefix list to this neighbor.
tenant/logical-router/bgp/neighbor
connect-time Command
Command Syntax
[no] connect-time <connect-time>
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the connect-time command to configure the connect timer for this neighbor.
tenant/logical-router/bgp/neighbor
description Command
Command Syntax
[no] description <description>
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the description command to configure a text description of this neighbor.
tenant/logical-router/bgp/neighbor
ebgp-ttl Command
Command Syntax
[no] ebgp-ttl multihop <ebgp-multihop>
Command Mode
lrouter-bgp-neigh submode
Command Description
In most cases, eBGP peers are directly connected, and by default the time-to-live (TTL) value on an advertisement is set to
1. This TTL value assumes a single hop between eBGP peers. When eBGP peers are not directly connected, you can use the
ebgp-ttl command to change the TTL value to reflect the number of hops required for peers to reach each other through
the intermediary network.
In BCF, BGP messages originate from the controller and are forwarded through the tenant logical router. As a result, eBGP
multihop must be configured on each eBGP peer or the BGP packets will not reach the peer. The range of values allowed for
the TTL attribute in BCF is from 2 to 253.
Note: BCF cannot support eBGP packets coming in with TTL=1. You must configure multihop on all the eBGP peers
connecting to BCF, adding an additional hop to the actual number of hops between BCF and the BGP neighbor.
For eBGP peering, use the ebgp-ttl multihop command to indicate the number of hops between the BCF controller and
the eBGP neighbor. Note that the BCF tenant logical router is an intermediate hop, so you need to add 1 to the hop count
between BCF and the eBGP neighbor.
Command Examples
The following is an example for enabling a neighbor relationship with a directly connected eBGP peer.
controller-1# tenant Blue
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# bgp
(config-tenant-lrouter-bgp)# neighbor R2
(config-tenant-lrouter-bgp-neigh)# ebgp-ttl multihop 2
tenant/logical-router/bgp/neighbor
hold-time Command
Command Syntax
[no] hold-time <hold-time>
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the hold-time command to configure the hold timer for this neighbor. Hold-time is the time in seconds for which a
neighbor keeps the session active without receiving a BGP keep alive or update message. Both keep-alive and bgp update
messages reset this timer. Hold-time is exchanged in the BGP open message and the neighbors negotiate to the lower hold
time.
tenant/logical-router/bgp/neighbor
maximum-prefix Command
Command Syntax
[no] maximum-prefix <max-prefix-count>
[threshold <threshold>]
[restart <restart-interval> | warning-only]
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the maximum-prefix command to configure the maximum prefixes to accept from this neighbor. This command
configures the maximum number of prefixes to accept from the BGP neighbor <max-prefix-count>.
threshold <threshold>: When the Big Cloud Fabric BGP router receives the percentage of the maximum number set by the
threshold keyword, the session is terminated, unless the warning-only keyword is used, in which case only a warning is
generated.
restart <restart-interval>: Once the session is down, it will stay down until the session is cleared. The system tries to clear
and reconnect after the number of minutes specified by the restart keyword.
warning-only: When the threshold is exceeded the session is not shut down and only a warning is ussed.
tenant/logical-router/bgp/neighbor
neighbor-ip Command
Command Syntax
[no] neighbor-ip <bgp-neighbor-ip>
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the neighbor-ip command to assign an IP address for the BGP neighbor.
Command Examples
controller-1(config-tenant-lrouter-bgp-neigh)#
tenant/logical-router/bgp/neighbor
next-hop-self Command
Command Syntax
[no] next-hop-self
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the next-hop-self command for the BCF tenant BGP neighbor if the BGP router is propagating BGP routes received from
its neighbor.Alternatively, provide an additional static route in BCF to make sure the received BGP next-hop is reachable
and programmed in the fabric-forwarding table.
tenant/logical-router/bgp/neighbor
password Command
Command Syntax
[no] password <cleartext>
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the password command to configure a password for communication with the BGP neighbor. Use the no version of the
command to remove the password. The password is entered in cleartext but is stored and is displayed in the controller
running-config in MD5-hashed format. The hashed version of the password can be used to set the password in a different
controller or to restore the password to the original controller from a copy of the running config.
<<update>>
release-note:
password can be configured as clear text, it will take upto 80 chars. Once the password is configured, in show running
config, the password can only be show in hased format.
Hashed password can be configured as well,the usr can do:
password hashed 02272678
if special characters are needed, the password can be inserted in "" or ' ' or \ can be used to skip the special character.
For example:
To put ABC1234^!@#$%^&*()_+{}<>|~, usr can config:
password "ABC1234^!@#$%^&*()_+{}<>|~"
tenant/logical-router/bgp/neighbor
shutdown Command
Command Syntax
[no] shutdown
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the shutdown command to shut down the BGP neighbor.
tenant/logical-router/bgp/neighbor
soft-reconfiguration Command
Command Syntax
[no] soft-reconfiguration
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the soft-reconfiguration command to Initiate storage of inbound routing table updates from the neighbor.
tenant/logical-router/bgp/neighbor
update-source Command
Command Syntax
[no] update-source <ip-address>
Command Mode
lrouter-bgp-neigh submode
Command Description
Use the update-source command to configure the source IP address to use while communicating with the current neighbor.
tenant/logical-router/bgp
network Command
Command Syntax
[no] network <ip-subnet>
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the network command to specify an IP subnet to advertise via BGP.
tenant/logical-router/bgp
preference Command
Command Syntax
[no] preference external-bgp <integer> | internal-bgp <integer>
Command Mode
Tenant-lrouter-bgp submode
Command Description
You can configure the learned route preference for eBGP and iBGP. for iBGP, and. The lower route preference is preferred,
but eBGP is always preferred over iBGP regardless of the configured route preference.
Command Examples
The following commands configure 10 for the route preference for eBGP and 100 for the route preference for iBGP.
controller-1(config)# tenant red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# bgp
controller-1(config-tenant-lrouter-bgp)# preference external-bgp 10
controller-1(config-tenant-lrouter-bgp)# preference internal-bgp 100
This sets the preference of an external BGP route. Assigning a lower preference causes the route to be preferred.
tenant/logical-router/bgp
protocol-ip Command
Command Syntax
[no] protocol-ip <protocol-ip>
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the protocol-ip command to assign an IP address for the BGP speaker.
tenant/logical-router/bgp
redistribute-connected Command
Command Syntax
[no] redistribute-connected
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the redistribute-connected command to redistribute connected interface subnets to BGP neighbors. This command
redistributes routes exported from the BCF system logical router or imported by the BCF tenant logical router.
tenant/logical-router/bgp
redistribute-ospf Command
Command Syntax
[no] redistribute-ospf <route-map>
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the redistribute-ospf command to redistribute OSPF routes to BGP neighbors
tenant/logical-router/bgp
redistribute-static Command
Command Syntax
[no] redistribute-static
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the redistribute-static command to redistribute static routes to BGP neighbors.
tenant/logical-router/bgp
router-id Command
Command Syntax
[no] router-id <router-id>
Command Mode
Tenant-lrouter-bgp submode
Command Description
Use the router-id command to assign an IP address to use for Router ID of the BGP speaker. If this value is not specified
explicitly the IP address assigned to the Protocol IP is also used for the Router ID.
tenant/logical-router/bgp
shutdown Command
Command Syntax
[no] shutdown
Command Mode
tenant-lrouter-bgp submode
Command Description
Use the shutdown command to disable the BGP protocol.
tenant/logical-router
description Command
Command Syntax
[no] description <description>
Command Mode
Tenant-lrouter submode
Command Description
Use the description command to associate a text description, enclosed in quotes, with the logical router for the current
tenant.
Command Examples
controller-1(config-tenant-lrouter)# description “Red tenant logical router”
tenant/logical-router
interface Command
Command Syntax
[no] interface {tenant {<tenant>} | segment <segment>}
Note: the segment keyword is not used for the logical router on the system tenant. For other tenants, system is the only
valid value for <tenant>.
Command Mode
Tenant-lrouter-submode
Command Description
Use the interface command to define a logical interface on the logical router for the current tenant and to enter the
submode for the interface.
Command Examples
The following commands create the tenant interface on the system router to allow routing between the system tenant and
the Red tenant:
controller-1(config)# tenant system
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface tenant Red
controller-1(config-tenant-lrouter-tenant-iface)#
The following commands create the system interface on the logical router for the user-defined tenant, Red.
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface tenant system
controller-1(config-tenant-lrouter-tenant-iface)#
The following commands create a segment interface on the logical router for the user-defined tenant, Red.
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface segment web
controller-1(config-tenant-lrouter-seg-iface)#
Note: The lrouter-tenant-iface submode is similar to the seg-iface submode but the keywords and the effect of commands
differs depending on whether you are configuring the logical router for the system tenant or a user-defined tenant.
tenant/logical-router/interface/segment
description Command
Command Syntax
[no] description <description>
Command Mode
Lrouter-seg-iface submode
Command Description
Use the description command to associate a text description, enclosed in quotes, with the segment interface for the logical
router of a user-defined tenant. This command only applies to segment interfaces, and not to tenant interfaces.
Command Examples
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface segment web
controller-1(config-tenant-lrouter-seg-iface)# description “Segment interface for web segment in Red
tenant”
tenant/logical-router/interface/segment
dhcp-relay Command
Command Syntax
[no] dhcp-relay address <dhcp-server-ip> [circuit-id <dhcp-circuit-id>]
[no] dhcp-relay agent-ip <agent-ip>
Command Mode
Lrouter-seg-iface submode
Command Description
If the DHCP server is not local to the Layer 2 segment where the host is physically connected, the DHCP request from the
host can be forwarded to the server using DHCP relay. BCF can be configured to provide DHCP relay service on any
segment. To enable DHCP relay on a segment, configure one or more DHCP server destination IP addresses where the DHCP
requests can be forwarded by the relay agent.
Use the dhcp-relay command to configure up to four DHCP servers for DHCP relay on the segment interface for any logical
segment. Enable DHCP relay on the segment interface where the DHCP request is seen.
Use the dhcp-relay agent-ip command to identify the source IP address to identify the relay agent. This configuration may
be important when you have multiple IP addresses assigned to the same segment. BCF automatically chooses the primary
IP as the DHCP relay agent source IP address, and the relay agent source address affects the subnet of the IP address
assigned to the requesting host by the DHCP server in the DHCP reply.
Note: The DHCP server identified with this command must be reachable based on the configured routes and policies in the
fabric.
Command Examples
The following commands enable DHCP relay for the segment:
controller-1(config-tenant)# tenant dmz
controller-1(config-tenant-seg)# logical-router
controller-1(config-tenant-lrouter)# interface segment dmz-web
controller-1(config-tenant-lrouter-seg-iface)# dhcp-relay server-ip 10.2.3.4
The following uses the circuit-id keyword with the DHCP server.
controller-1(config-tenant-lrouter-seg-iface)# dhcp-relay server-ip 10.2.3.5 circuit-id abc
controller-1(config-tenant-lrouter-seg-iface)# dhcp-relay server-ip 10.2.3.6 circuit-id def
controller-1(config-tenant-lrouter-seg-iface)# dhcp-relay server-ip 10.2.3.7 circuit-id ghi
The following example specifies the source IP (agent-ip) address of the DHCP relay agent.
The following example specifies the source IP address of the DHCP relay agent.
controller-1(config-tenant-lrouter-seg-iface)# dhcp-relay agent-ip 10.1.1.1
If not specified, the controller uses an IP address that has been configured for the segment interface for the relay agent
source IP address.
The following example specifies the agent IP address to be used for relaying requests to a specific DHCP server.
tenant/logical-router/interface/segment
ip address Command
Command Syntax
[no] ip address <ip-cidr> [no-autoconfig] [withdraw]
Command Mode
lrouter-seg-iface submode
Command Description
Use the ip command to assign an IP address and subnet mask to the current segment interface. The IP subnet assigned to
the interface can either be private or public. Private IP subnets are only reachable from the logical router for the same
tenant. Public IP subnets are potentially reachable from anywhere in the fabric. Public IP subnets cannot overlap with each
other. This command is available only on segment interfaces, not on tenant interfaces. Either an IPv4 or IPv6 subnet
address can be specified.
Command Examples
The following command assigns IP address 192.168.110.1 to the web segment interface and to assign the subnet mask
255.255.255.0:
controller-1(config)# tenant Red
controller-1(config-tenant-seg)# logical-router
controller-1(config-tenant-lrouter)# interface segment R-Web
controller-1(config-tenant-lrouter-seg-iface)# ip address 192.168.110.1/24
The subnet ID for the segment is derived by applying the subnet mask to the interface address, so in this example, the
subnet ID 192.168.110.0 is assigned to the R-Web segment.
The following command assigns IP address 2001:1234::1 to the production segment interface with a prefix length of 64:
controller-1(config)# tenant Red
controller-1(config-tenant-seg)# logical-router
controller-1(config-tenant-lrouter)# interface segment R-Prod
controller-1(config-tenant-lrouter-seg-iface)# ip address 2001:1234::1/64
The subnet ID for the segment is derived by applying the subnet mask to the interface address, so in this example, the
subnet ID 2001:1234::1 is assigned to the R-Prod segment.
tenant/logical-router/interface/segment/ip
description Command
Command Syntax
[no] description <text>
Command Mode
Tenant-lrouter seg-iface-ip submode
Command Description
Use the description command to record information about the current segment interface.
tenant/logical-router/interface/segment/ip
directed-broadcast Command
Command Syntax
[no] directed-broadcast
Command Mode
Tenant-lrouter seg-iface-ip submode
Command Description
Use the directed-broadcast command to enable directed broadcast for the current segment interface. Directed broadcast
lets you send broadcast packets targeted to the hosts in a specific destination subnet. The goal is to send a packet that is
broadcast only in the target subnet and not the entire network. This feature helps perform remote administration and
application tasks, such as backups and wake-on-LAN (WOL).
Directed broadcast packets traverse the network in the same way as unicast IP packets until they reach the destination
subnet. When they reach the destination subnet and directed broadcast is enabled on the receiving logical router, the
directed broadcast packet is flooded (broadcast) on the target subnet. All hosts on the target subnet receive the directed
broadcast packet.
tenant/logical-router/interface/segment/ip
virtual-ip Command
Command Syntax
[no] virtual-ip <virtual-ip> [mac <mac-address>]
Command Mode
Tenant-lrouter seg-iface-ip submode
Command Description
When a segment is extended between BCF pods and a VM moves from one pod to another, the default gateway of the VM
must be updated or the VM will use the remote router as the default gateway and traffic that could have been routed
locally on the pod will hairpin across pods.
To avoid manually updating the default gateway when a VM moves between pods, use the virtual-ip command to define a
single virtual IP address for the segment on both pods. This virtual IP is used as the default gateway by endpoints on both
pods. When endpoints ARP for the virtual IP address, instead of replying with the fabric MAC of the regular segment
interface IP address, the switches reply with the MAC address associated with the virtual IP. The pods never learn this MAC
address as an endpoint.
This feature is supported for both IPv4 and IPv6. You can configure a virtual IP for each IP subnet under the segment
interface.
Command Examples
The following examples show the configuration required on two BCF pods with a common segment extended through
VXLAN.
On BCF POD1:
controller-1(config)# tenant A
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface segment 1
controller-1(config-tenant-lrouter-seg-iface)# ip
controller-1(config-tenant-lrouter-seg-iface-ip)# ip address 10.1.1.1/24
controller-1(config-tenant-lrouter-seg-iface-ip)# virtual-ip 10.1.1.254 mac 00:11:22:33:44:55
On BCF POD2:
controller-1(config)# tenant A
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface segment 1
controller-1(config-tenant-lrouter-seg-iface)# ip
controller-1(config-tenant-lrouter-seg-iface-ip)# ip address 10.1.1.2/24
controller-1(config-tenant-lrouter-seg-iface-ip)# virtual-ip 10.1.1.254 mac 00:11:22:33:44:55
The difference in the configuration on each pod is that the virtual IP address is assigned to segment interfaces with unique
IP addresses (10.1.1.1 and 10.1.1.2 in this example) on each pod.
tenant/logical-router/interface/segment
ipv6-dns-server
Command Syntax
[no] ipv6-dns-server <ip-address> [{withdraw}]
Command Mode
lrouter-seg-iface submode
Command Description
Use the ipv6-dns-server command to configure a DNS server IPv6 address for this interface. Use this command to add or
remove the DNS Server IPv6 address that is advertised through IPv6 router advertisements.
Command Examples
The following command adds the DNS Server IP that is advertised through IPv6 router advertisements for name resolution.
controller-1(config-tenant-lrouter-seg-iface)# ipv6-dns-server 2001:abc:def:1234::1
The following command removes the DNS Server IP from IPv6 router advertisements.
controller-1(config-tenant-lrouter-seg-iface)# no ipv6-dns-server 2001:abc:def:1234::1
tenant/logical-router/interface/segment
ipv6-domain-name
Command Syntax
[no] ipv6-domain-name <name> [{withdraw}]
Command Mode
lrouter-seg-iface submode
Command Description
Use the ipv6-domain-name command to add or remove the IPv6 domain name to be advertised on the interface.
Command Examples
The following command adds the domain name that is adveritsed through IPv6 router advertisements.
controller-1(config-tenant-lrouter-seg-iface)# ipv6-domain-name helloworld.com
The following command removes the domain name from IPv6 router advertisements.
controller-1(config-tenant-lrouter-seg-iface)# no ipv6-domain-name helloworld.com
tenant/logical-router/interface/segment
ipv6-link-local
Command Syntax
[no] ipv6-link-local <link-local>
Command Mode
lrouter-seg-iface submode
Command Description
Use the ipv6-link-local command to configure the IPv6 link local address of this interface.
tenant/logical-router/interface/segment
ipv6-nd-managed
Command Syntax
[no] ipv6-nd-managed
Command Mode
lrouter-seg-iface submode
Command Description
Use the ipv6-nd-managed command to enable managed mode address configuration on this interface. Use this command
to indicate whether the address autoconfiguration in a given segment interface of the logical router is managed or not. In
managed mode, endpoints may get IPv6 Addresses assigned through external DHCPv6 servers. In non-managed mode,
endpoints may auto-configure their IP addresses. This configuration helps setting the M flag in router advertisements.
tenant/logical-router/interface/segment
ipv6-suppress-ra
Command Syntax
[no] ipv6-suppress-ra
Command Mode
lrouter-seg-iface submode
Command Description
Use the ipv6-suppress-ra command to suppress RA on the interface segment. Use this command to suppress router
generated periodic IPv6 router advertisements.
tenant/logical-router/interface
origination Command
Command Syntax
[no] origination <description>
Command Mode
lrouter-seg-iface or lrouter-tenant-iface submode
Command Description
Use the origination command to identify the source of the logical router configuration.
tenant/logical-router/interface
private Command
Command Syntax
[no] private
Command Mode
lrouter-seg-iface or lrouter-tenant-iface submode
Command Description
Use the private command to prevent traffic from being routed to or from the current segment. Traffic on the segment
attached to this interface is not routed outside the tenant.
Note: In BCF Release 4.2.0, the private command applies only to IPv4 segments and is not applicable to IPv6 segments.
tenant/logical-router/interface
segment-group Command
Command Syntax
[no] segment-group <openstack-project>
Command Mode
lrouter-seg-iface
Command Description
The segment-group command is used only by the system when BCF is integrated with OpenStack to automatically identify
the group ID of a virtual-switch only segment. This group ID is part of the configuration required to support multiple
OpenStack project routers.
tenant/logical-router/interface
shutdown Command
Command Syntax
[no] shutdown
Command Mode
lrouter-seg-iface or lrouter-tenant-iface submode
Command Description
Use the shutdown command to disable a logical interface for the current logical router. Use the no shutdown command to
re-enable an interface that was previously shut down. This command is available for both segment interfaces and tenant
interfaces.
Command Examples
The following command shuts down the web segment interface on the logical router for the Red tenant.
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface segment web
controller-1(config-tenant-lrouter-seg-iface)# shutdown
The following command shuts down the Red tenant interface on the logical router for the system tenant.
controller-1(config)# tenant system
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# interface tenant Red
controller-1(config-tenant-lrouter-tenant-iface)# shutdown
tenant/logical-router/tenant/interface
export-route Command
Command Syntax
[no] export-route
Command Mode
lrouter-tenant-iface submode
Command Description
Use the export-route command to export routes from the system tenant to the tenant connected to the current interface. If
you enter this command when the current tenant is not the system tenant, the following error message is displayed: Error:
Validation failed: Configuring export-route is not supported on a user tenant router interface. Connected routes are
redistributed to system router by default.
tenant/logical-router/tenant/interface
import-route Command
Command Syntax
[no] import-route
Command Mode
lrouter-tenant-iface submode
Command Description
Use the import-route command to import routes from the system tenant to the current tenant. If you enter this command
when the current tenant is the system tenant, the following error message is displayed: Error: Validation failed: The system
router does not support import-route.
tenant/logical-router
nat-profile Command
Command Syntax
nat-profile <profile-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the nat-profile command to enter nat-profile submode, where you can configure network address translation (NAT)
and port address translation (PAT) configuration. The NAT profile represents a NAT container, or logical NAT device, which
runs on a virtual switch (vleaf) running Switch Light OS. The NAT profile is used as the next hop for traffic that requires
address translation.
Command Examples
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# nat-profile myprofile
controller-1(config-tenant-lrouter-nat)#
tenant-lrouter-nat
floating-ip Command
Command Syntax
[no] floating-ip <ip-address>
Command Mode
tenant-lrouter-nat submode
Command Description
Use the floating-ip command to configure a floating IP address for the current NAT profile. The floating IP is used for one-
to-one network address translation with a private IP address. Defining a floating IP enters config-tenant-lrouter-nat-flip
submode, where you can complete the configuration required for NAT.
Command Examples
controller-1(config-tenant-lrouter)# nat-profile myprofile
controller-1(config-tenant-lrouter-nat)# floating-ip 192.168.1.1
tenant-lrouter-nat-floating-ip
description Command
Command Syntax
[no] description <text>
Command Mode
tenant-lrouter-nat-flip submode
Command Description
Use the description command to enter a text description explaining the role of the current floating IP configuration.
tenant-lrouter-nat-floating-ip
origination Command
Command Syntax
[no] origination <text>
Command Mode
tenant-lrouter-nat-flip submode
Command Description
The origination command is used during integration with OpenStack to identify the source of the current floating IP. This
command is not used for manual floating IP configuration.
tenant-lrouter-nat-floating-ip
private-ip Command
Command Syntax
[no] private-ip <internal-ip>/<cidr>
Command Mode
tenant-lrouter-nat-flip submode
Command Description
Use the private-ip command to identify the private IP address to which NAT is applied for translating to the current floating
IP.
tenant-lrouter-nat-floating-ip
public-mac Command
Command Syntax
[no] public-mac <mac-address>
Command Mode
tenant-lrouter-nat-flip submode
Command Description
Use the public-mac command to assign an arbitrary, but unique MAC address to the current floating IP.
tenant-lrouter-nat
origination Command
Command Syntax
origination <text>
Command Mode
tenant-lrouter-nat submode
Command Description
The origination command is used by the system to automatically generate an identifier that specifies the source of the
system-generated configuration.
Command Examples
controller-1(config-tenant-lrouter-nat)# port-address-translation
controller-1(config-tenant-lrouter-nat-pat)#
tenant-lrouter-nat
port-address-translation Command
Command Syntax
[no] port-address-translation
Command Mode
Tenant-lrouter-nat submode
Command Description
Use the port-address-translation command to enter the config-tenant-lrouter-nat-pat submode, where a public IP address,
use for mapping to the endpoints in a tenant, can be defined.
Command Examples
controller-1(config-tenant-lrouter-nat)# port-address-translation
controller-1(config-tenant-lrouter-nat-pat)#
tenant-lrouter-nat-pat
public-ip Command
Command Syntax
[no] public-ip <ip-address>
Command Mode
tenant-lrouter-nat-pat submode
Command Description
Use the public-ip command to configure the public IP address mapped to this NAT profile. The public IP address is used for
mapping to the private IP addresses assigned to endpoints the current tenant.
Command Examples
controller-1(config-tenant-lrouter-nat)# port-address-translation
controller-1(config-tenant-lrouter-nat-pat)# public-ip 10.11.12.13
tenant-lrouter-nat
public-segment Command
Command Syntax
[no] public-segment tenant <tenant> segment <segment>
Command Mode
tenant-lrouter-nat submode
Command Description
Use the public-segment command to configure the segment used for the public network used with NAT or PAT. Define a
membership rule for this segment that includes the interface to the core router for connecting the Big Cloud Fabric to
external networks.
tenant/logical-router
next-hop-group Command
Command Syntax
[no] next-hop-group <group-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the next-hop-group command to identify one or more IP addresses to add to a group that can be used as the next hop
for a policy list entry or a static route. When multiple IP addresses are added to a group, the controller uses equal-cost
multi-path routing (ECMP) to load balance among the paths.
Use the next-hop-group command to define a next hop group and to enter the lrouter-nh-group submode, from where you
can add destination IP addresses to the group.
Command Examples
controller-1(config-tenant-lrouter)# next-hop-group external
controller-1(config-tenant-lrouter-nh-group)#
tenant/logical-router/next-hop-group
ip Command
Command Syntax
[no] ip <ip-address>
Command Mode
Lrouter-nh-group submode
Command Description
Use the ip command in lrouter-nh-group submode to add one or more destination IP addresses to the group for use as the
next-hop on a route or in a policy list applied to a logical router.
Command Examples
The following commands assign two IP addresses as members of the external ECMP group.
controller-1(config-tenant-lrouter)# next-hop-group external
controller-1(config-tenant-lrouter-nh-group)# ip 192.168.17.1
controller-1(config-tenant-lrouter-nh-group)# ip 192.168.18.1
The following commands assign two IPv6 addresses as members of the external2 ECMP group.
controller-1(config-tenant-lrouter)# next-hop-group external2
controller-1(config-tenant-lrouter-nh-group)# ip 2001:1234::1
controller-1(config-tenant-lrouter-nh-group)# ip 2001:1234::2
tenant/logical-router
origination Command
Command Syntax
[no] origination <text>
Command Mode
tenant-lrouter submode
Command Description
The origination command is used during integration with OpenStack to identify the source of the current logical router. This
command is not used for manual floating IP configuration.
tenant/logical-router
ospf Command
Command Syntax
ospf
Command Mode
Tenant-lrouter submode
Command Description
Use the ospf command to configure OSPF for the current logical router. OSPF is enabled by default.
tenant/logical-router/ospf
apply Command
Command Syntax
apply
Command Mode
Tenant-lrouter-ospf submode
Command Description
Use the apply to command to apply a route-map for inbound routes to this logical router.
tenant/logical-router/ospf
log-neighbor-changes Command
Command Syntax
log-neighbor-changes
Command Mode
Tenant-lrouter-ospf submode
Command Description
Use the log-neighbor-changes command to enable logging for neighbor changes.
tenant/logical-router/ospf
ospf-interface Command
Command Syntax
ospf-interface segment <segment>
Command Mode
Tenant-lrouter-ospf submode
Command Description
Use the ospf-interface segment command followed by the segment where OSPF is connected to enter the config-tenant-
lrouter-ospf-seg-iface submode.
Command Examples
controller-1(config-tenant-lrouter-ospf)# ospf-interface segment test
controller-1 (config-tenant-lrouter-ospf-seg-iface)#
tenant/logical-router/ospf/ospf-interface
area Command
Command Syntax
area
Command Mode
Tenant-lrouter-ospf-seg-iface submode
Command Description
Use the area command to configure OSPF Area ID for this interface segment.
tenant/logical-router/ospf/ospf-interface
cost Command
Command Syntax
cost <value>
Command Mode
Tenant-lrouter-ospf-seg-iface submode
Command Description
Use the cost command to specify the cost of the path. The lower cost path is the preferred path.
tenant/logical-router/ospf/ospf-interface
dead-interval Command
Command Syntax
dead-interval
Command Mode
Tenant-lrouter-ospf-seg-iface submode
Command Description
Use the dead-interval command to configure the dead interval for the OSPF neighbor.
tenant/logical-router/ospf/ospf-interface
hello-interval Command
Command Syntax
hello-interval
Command Mode
Tenant-lrouter-ospf-seg-iface submode
Command Description
Use the hello-interval command to configure the hello interval for the OSPF neighbor.
tenant/logical-router/ospf
redistribute-bgp Command
Command Syntax
redistribute-bgp
Command Mode
Tenant-lrouter-ospf submode
Command Description
Use the redistribute-bgp command to redistribute static routes to OSPF neighbors.
tenant/logical-router/ospf
redistribute-connected Command
Command Syntax
redistribute-connected
Command Mode
Tenant-lrouter-ospf submode
Command Description
Use the redistribute-connected command to redistribute connected interface subnets to OSPF neighbors.
tenant/logical-router/ospf
redistribute-static Command
Command Syntax
redistribute-static
Command Mode
Tenant-lrouter-ospf submode
Command Description
Use the redistribute-static command to redistribute static routes to OSPF neighbors.
tenant/logical-router/ospf
router-id Command
Command Syntax
router-id
Command Mode
Tenant-lrouter-ospf submode
Command Description
Use the router-id command to configure the OSPF router identifier.
tenant/logical-router
policy-list Command
Command Syntax
[no] policy-list <policy-list-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the policy-list command to define a policy list and to enter the policy-list submode, where you define each entry in the
policy list. A policy list is similar to an access control list (ACL) in a traditional network.
Command Examples
controller-1(config-tenant-lrouter)# policy-list external
controller-1(config-tenant-lrouter-policy-list)# policy-list external
tenant/logical-router/policy-list
<rule-number> Command
Command Syntax
system only:
auto-gen-segment-group-policy
Command Mode
Lrouter-policy-list submode
Command Description
To add a policy list entry, in lrouter-policy-list submode, type a number followed by the criteria to use for matching traffic
and specify the action to take (deny or permit). You can also optionally add a next-hop destination for permitted traffic.
Every policy list ends with an implicit deny; therefore, when you apply a policy list to the specified interface on a logical
router, all traffic on that interface is dropped unless entries specifically permit it. A policy rule can have IPv4 or IPv6 based
configuration for classifying traffic.
Command Examples
The following entry (20) is applied after entry 10, assuming that rule exists in the same policy list, and applies only to ingress
traffic on the web segment interface. The entry permits HTTP (port 80) traffic to the web segment from the Red tenant app
segment. Unless additional entries are applied to the web segment interface, other types of ingress traffic are dropped.
controller-1(config-tenant-lrouter-policy)# 20 permit proto tcp segment-interface R-web tenant Red
segment R-app port 80 to any
controller-1(config-tenant-lrouter-policy)# show this
! tenant
tenant Red
logical-router
policy-list Rweb-pol1
20 permit proto tcp segment-interface R-web tenant Red segment app port 80 to any
controller-1(config-tenant-lrouter-policy)#
tenant/logical-router
prefix-list Command
Command Syntax
prefix-list <list-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the prefix-list command to add a BGP prefix list entry, which can be used to control the routes advertised to BGP
neighbors by the Big Cloud Fabric BGP logical router. After you name the prefix list, the CLI enters lrouter-prefix submode,
where you can add rules to the prefix list or configure a text description of the prefix list.
Command Examples
controller-1(config-tenant-lrouter)# prefix-list mylist
controller-1(config-tenant-lrouter-prefix)#
tenant/logical-router/prefix-list
<rule number> Command
Command Syntax
[no] <rule-number> { deny | permit } <ip-subnet> [le <prefix-length>]
[ge <prefix-length>]
Command Description
To add a prefix list entry, in lrouter-prefix-list submode, type a number, specify the action to take (deny or permit), and
identify the subnetwork to which the action applies. This action determines whether the route matching the entry is
advertised (permit) or not (deny) to the BGP neighbors defined for the Big Cloud Fabric BGP logical router.
Command Mode
Tenant-lrouter-prefix submode
ge <prefix-length>: Exclude or include routes greater than or equal to the specified length.
tenant/logical-router/prefix-list
description Command
Command Syntax
[no] description <description>
Command Description
Use the description command to provide a meaningful text description of the current BGP prefix list.
Command Mode
Tenant-lrouter-prefix submode
tenant/logical-router
qos-classifier-list Command
Command Syntax
[no] qos-classifier-list <list-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the qos-classifier-list command to enter config-tenant-lrouter-qos-classifier submode where you can define a QoS
classifier list, which can be used to assign traffic classes to traffic matching specific criteria.
Command Examples
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# qos-classifier-list myqoslist
controller-1(config-tenant-lrouter-qos-classifier)#
Note: This submode is available only when the fabric forwarding mode is set to high-scale.
tenant/logical-router
qos-classifier-list <rule-number> Command
[no] <rule number> {[proto {{icmpv6 | udp | icmp | tcp | igmp} | <ip-protocol>}]
Command Description
Use the <rule-number> command to add a QoS classifier list entry in lrouter-qos-classifier-list submode. Type a sequence
number followed by the criteria to use for matching traffic and specify the traffic class. You can choose to keep the traffic
class unchanged, which will keep the default traffic class for flows matching this classifier rule.
Every rule in a QoS classifier list must have a unique sequence number. When a classifier list is applied to a logical router,
the rules are applied in ascending order of their rule numbers and the first matching rule is used. The rule numbers can be
within a range of 1 to 14,000. A rule with rule-number 1 is the highest priority rule.
Every classifier rule consists of a traffic class and a match criteria. The match criteria consists of an optional logical router
interface match, a source qualifier, a destination qualifier, an optional ether type and an optional IP protocol.
A qualifier can specify an IP cidr along with a L4 port number for TCP or UDP traffic. Use the any keyword in a qualifier to
match all traffic. When a tenant or a segment interface is specified, the classifier rule only matches traffic incoming from
that interface the the logical router where the QoS classifier list is applied.
When you apply a QoS classifier list to a logical router and the flow does not match any rule in the classifier list, the traffic
class of the flow remains unchanged from the original QoS classification.
To remove a classifier rule use the no form of the command.
Command Examples
The following commands create a rule to match all traffic and apply traffic class 1.
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# qos-classifier-list myqoslist
controller-1(config-tenant-lrouter-qos-classifier)# 10 any to any traffic-class traffic-class-1
The following command creates a rule that leaves the traffic class unchanged for matching traffic.
20 20.0.0.0/16 to any port 80 proto tcp traffic-class unchanged
The following command creates a rule that is applied on traffic coming in from a segment interface.
10 segment-interface A1 10.0.0.0/16 port 1234 to 20.0.0.0/16 traffic-class traffic-class-1
The following command deletes rule entry #10 from the current QoS classifier list.
no 10
tenant/logical-router
route Command
Command Syntax
[no] route <dest-net/cidr> [discard | {next-hop {nat-profile <profile-name> | tenant <tenant-name>
[<next-hop-group>] | <next-hop-group> }} [preference <integer>]
Command Mode
Tenant-lrouter submode
Command Description
Use the route command to define a static route, including the default route, for a logical router. Routing is allowed by
default between segments within a tenant. Static routes are required to allow routing between tenants. Also, define static
routes for devices and networks external to the Big Cloud Fabric.
Note: To remove a static route, use the no keyword with the entire static route configuration.
<dest-ip-cidr>: Replace <dest-ip-cidr> with the destination network ID and the number of bits in the subnet mask. Enter the
IP address of the destination network ID and the number of bits in the subnet mask in dotted decimal notation
(nnn.nnn.nnn.nnn/nn), or example, 192.168.17.0/24. Use a zero to represent the bits that are used by the host portion of
the address.
discard: Drop all traffic.
preference <integer>: Replace <integer> with a numeric value to set a preference for the current route. The lower
preference is the preferred route. If you do not specify a route preference, then the default preference value of 1 is used.
You can create multiple static routes with the same next hop and different preference values.
next-hop: Specify the next-hop destination for permitted traffic, using one of the following parameters:
• tenant: Direct traffic to the destination network to the specified tenant for the next hop. Typically, you specify the
system tenant to forward traffic to the system logical router, which then routes the traffic to the destination tenant.
• next-hop-group <next-hop-group>: Replace <next-hop-group> with the name of the next-hop group. Use the next-hop-
group command to define the next-hop group.
• nat-profile <nat-profile-name> Replace <nat-profile-name> with the NAT profile that defines a floating IP to use for the
next hop.
Note: If the next hop is not correctly configured or if the next hop interface is not available, all traffic directed on this route
is dropped.
Command Examples
The following command defines the default route for the logical interface that connects the Red tenant to the system
tenant. The system tenant is defined as the next hop.
The following command defines a route to the subnetwork 192.168.17.0 using the next-hop group external for the next
hop.
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# route 192.168.17.0/24 next-hop external 192.168.17.1
tenant/logical-router
route-map Command
Command Syntax
[no] route-map <route-map-name>
Command Mode
Tenant-lrouter submode
Command Description
Use the route-map command to define a route-map on the logical router and enter the tenant-lrouter-rmap submode,
where you define each entry in the route-map. A route-map can then be applied on a BGP neighbor for filtering incoming
or outgoing routes.
A route map is an ordered list of route map entries, which lets you apply a policy for filtering or changing the cost of routes
to be advertised by the BGP speaker. Each route map entry can contain match and set criteria. For any BGP neighbor, you
can configure one route map for inbound BGP advertisements and a second route map for outbound advertisements. Do
the following to complete the configuration:
• Define a list of BGP paths to which the route map applies using a prefix-list for BGP neighbors or an as-path-list.
• Apply the route-map on the neighbor, to filter inbound or outbound updates, using the apply command,
Command Examples
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# route-map my-map
controller-1(config-tenant-lrouter-rmap)#
tenant-lrouter-rmap Subcommands
The following commands are available in this submode.
• <rule number>: Add a rule to the route map
• description: Configure the description of this route map
tenant/logical-router/route-map
<entry number> Command
Command Syntax
[no] <entry number> {deny | permit}
Command Mode
Tenant-lrouter-rmap submode
Command Description
Enter an integer to add a new entry in the route-map. A route-map entry has a sequence number and a permit or deny
action. Upon creating a route map entry, you enter the tenant-lrouter-rmap-entry submode where you define each rule in
the route-map entry.
The default action of a deny entry in a route map is to deny all routes that are not specifically excluded in any prefix-list or
AS path list referenced by the route map. You should not configure a set action in a deny route-map entry because the deny
entry prohibits route redistribution.
The last entry in a route map is an implicit deny entry, which is applied to routes that did not match an earlier entry. To
change this behavior, add an empty permit entry as the last entry in the route-map to include any routes that did not meet
the match criteria in an earlier entry. The match criteria supported are prefix-list as-path-list.
Command Examples
The following example defines a route-map-entry with sequence number 1 and permit as the action.
controller-1(config-tenant-lrouter-rmap)# 1 permit
controller-1(config-tenant-lrouter-rmap-entry)#
tenant-lrouter-rmap-entry Subcommands
The following commands are available in this submode.
• match: Match for a route-map rule
• set: Manage CLI sessions settings
tenant/logical-router/route-map
match Command
Command Syntax
match {as-path-list | prefix-list }
Command Mode
Tenant-lrouter-rmap-entry submode
Command Description
Use the match command to define the match criteria for the current route map entry (as-path-list or prefix-list). You then
define a set condition, using the set command.
Command Examples
The following example defines a match-entry using the as-path-list mylist.
controller-1(config-tenant-lrouter-rmap-entry)# match as-path-list mylist
tenant/logical-router/route-map/<entry>
set Command
Command Syntax
set {as-path prepend {<as-number> | last-as <integer>} | { local-preference }
Command Mode
Tenant-lrouter-rmap-entry submode
Command Description
Use the set command to set local-preference or as-path prepend. These actions are applied to routes that match the as-
path-list or prefix-list specified by the match command. Use the set local-preference option only when applying the route
map to an iBGP neighbor. This attribute is ignored by eBGP neighbors.
Command Examples
The following commands prepends the AS number 75 three times before the advertised AS path:
controller-1(config-tenant-lrouter-rmap-entry)# set as-path prepend 75
controller-1(config-tenant-lrouter-rmap-entry)# set as-path prepend last-as 3
tenant/logical-router/route-map
description Command
Command Syntax
[no] description <description>
Command Mode
Tenant-lrouter-rmap submode
Command Description
Use the description command to provide descriptive text to explain the purpose of the current route map.
Command Examples
controller-1(config)# tenant Red
controller-1(config-tenant)# logical-router
controller-1(config-tenant-lrouter)# route-map my-map
controller-1(config-tenant-lrouter-rmap)# description “this map causes traffic to use the path through
AS 10”
tenant/logical-router
vtep Command
Command Syntax
[no] vtep <vtep-name>
Command Mode
config-tenant-lrouter
Command Description
Use the vtep command to enter config-tenant-lrouter-vtep submode, where you can define a VXLAN termination endpoint
(VTEP). In the current version of Big Cloud Fabric, a single VTEP is supported and an error message is displayed if you try to
configure a second VTEP.
Command Examples
controller-1(config-tenant-lrouter)# vtep myvtep
controller-1(config-tenant-lrouter-vtep)#
tenant/logical-router/vtep
description Command
Command Syntax
[no] description <description>
Command Mode
config-tenant-lrouter-vtep
Command Description
Use the description command to configure the description of this VTEP.
Command Examples
controller-1(config-tenant-lrouter-vtep)# description “test VTEP”
tenant/logical-router/vtep
dst-udp-port Command
Command Syntax
[no] dst-udp-port <udp-port>
Command Mode
config-tenant-lrouter-vtep
Command Description
Use the dst-udp-port command to configure the destination UDP port.
Command Examples
The following command assigns UDP port number 4790 to the current VTEP.
controller-1(config-tenant-lrouter-vtep)# dst-udp-port 4790
tenant/logical-router/vtep
flood-vtep Command
Command Syntax
[no] flood-vtep <remote-vtep>
Command Mode
config-tenant-lrouter-vtep
Command Description
Use the flood-vtep command to add a remote VTEP to the flood list to which broadcast packets are flooded from the
current local VTEP. Broadcast packets on segments extended by making use of this local VTEP are sent only to those
remote VTEPs added to the flood list on the local VTEP.
Command Examples
controller-1(config-tenant-lrouter-vtep)# flood-vtep rem-vtep1
tenant/logical-router/vtep
origination Command
Command Syntax
[no] origination <origination>
Command Mode
config-tenant-lrouter-vtep
Command Description
This command may be used by the system to identify the origin of the local VTEP configuration.
tenant/logical-router/vtep
source Command
Command Syntax
[no] source {ip <ip-address/CIDR> | segment-interface <segment-name>
Command Mode
config-tenant-lrouter-vtep
Command Description
Use the source command to configure the source interface of the VTEP.
Command Examples
controller-1(config-tenant-lrouter-vtep)#
Command Examples
The following command specifies the segment interface of the Green tenant as the VTEP source interface.
controller-1(config-tenant-lrouter-vtep)# source Green
tenant
multicast-enable Command
Command Syntax
[no] multicast-enable
Command Mode
config-tenant
Command Description
Use the multicast enable command to enable Layer 2 and Layer 3 multicast forwarding for the current tenant. Use the no
form of the command to disable multicast forwarding for the tenant. Multicast forwarding is disabled by default.
Note: When switch system resources are insufficient, multicast is enabled but remains inactive and a warning message is
displayed. For a summary of currently supported scaling limits for different features and hardware, refer to the Big Switch
Fabric Verified Scale document.
tenant
multicast-group Command
Command Syntax
[no] multicast-group <multicast-address>
Command Mode
config-tenant
Command Description
Use the multicast-group command to configure a static multicast group and enter config-tenant-mcast submode, where
you can identify a multicast listener for the group.
controller-1(config-tenant)# multicast-group <static-mcast>
Command Examples
The following command creates a static entry for Internet Group Management Protocol (IGMP):
controller-1(config-tenant)# multicast-group 224.2.0.22
controller-1(config-tenant-mcastgrp)#
tenant multicast-group
listener Command
Command Syntax
[no] listener {ip <ip-address | segment <segment-name> {attachment-point {switch <switch> interface
<interface> {interface-group <group> | switch <switch> interface <interface> | endpoint <name> | ip
<address>}
Command Mode
config-tenant-mcastgrp
Command Examples
The following commands statically configure the multicast group 224.2.0.22 and identify the listener as endpoint server1 on
segment-1.
controller-1(config-tenant)# multicast-group 224.2.0.22
controller-1(config-tenant-mcastgrp)# listener segment attachment-point endpoint server1
tenant
origination Command
Command Syntax
[no] origination <origination>
Command Mode
config-tenant submode
Command Description
The origination command is used by the system to automatically generate an identifier that specifies the source of the
system-generated configuration.
Command Examples
The following command adds an origination tag to the tenant:
controller-1(config-tenant)# origination openstack-instance-1
The following command removes the origination tag from the tenant:
controller-1(config-tenant)# no origination openstack-instance-1
tenant
segment Command
Command Syntax
[no] segment <segment-name>
Command Mode
config-tenant submode
Command Description
Use the segment command to define a segment within the current tenant and to enter the config-tenant-seg submode,
where you can add members to the segment.
A segment is a logical Layer 2 network, similar to a VLAN. Broadcast traffic within the segment remains local. All traffic
remains local within the segment unless a segment interface is enabled on the tenant logical router to route the traffic to
another segment within the tenant, to external networks or devices, or to the system tenant for routing to other tenants.
Command Examples
controller-1(config-tenant)# segment external
controller-1(config-tenant-seg)#
tenant/segment
description Command
Command Syntax
[no] description <description>
Command Mode
Config-tenant-seg submode
Command Description
Use the description command in config-tenant-seg submode to associate a text description, enclosed in quotes, with the
current segment.
Command Examples
controller-1(config-tenant)# segment external
controller-1(config-tenant-seg)# description “segment including switch interface connected to external
router”
tenant/segment
endpoint Command
Command Syntax
[no] endpoint <endpoint-name>
Command Mode
Config-tenant-seg submode
Command Description
Use the endpoint command to define an endpoint and enter seg-endpoint submode, from where you can define the MAC
address and other properties of the endpoint.
An endpoint is an object defined on the controller that you can associate with a MAC address or other attributes of a
physical or virtual machine. Defining an endpoint provides a friendly name for the server that helps in troubleshooting,
performance management, and identifying unauthorized access to the fabric. You can also identify an attachment point to
restrict where a specific MAC address connects to the fabric. By defining the attachment point, the endpoint does not have
to be learned and is not aged out of forwarding tables.
Command Examples
The following commands assign the endpoint r1h1 to the web segment.
controller-1(config-tenant)# segment web
controller-1(config-tenant-seg)# endpoint r1h1
controller-1(config-tenant-seg-endpoint)#
tenant/segment/endpoint
attachment-point Command
Command Syntax
[no] attachment-point {interface-group <interface-group-name> | switch <switch-name> interface
<interface-name>} {vlan {<vlan> | untagged}}
Command Mode
Config-tenant-seg-endpoint submode
Command Description
Use the attachment-point command to specify how the server, virtual machine, or other host is connected to the switched
fabric. You can define the attachment point by specifying the interface group and VLAN (or untagged), or by using the
switch, interface, and VLAN (or untagged).
Command Examples
The following command assigns the endpoint to interface group pg1 and VLAN 110:
controller-1(config-tenant-endpoint)# attachment-point interface-group pg1 vlan 110
The following command assigns an endpoint to an interface that is not assigned to an interface group and allows the
endpoint to have an untagged VLAN:
controller-1(config-tenant-endpoint)# attachment-point switch leaf1a interface leaf1a-ethernet2 vlan
untaggged
tenant/segment/endpoint
description Command
Command Syntax
[no] description <description>
Command Mode
Config-tenant-seg-endpoint submode
Command Description
Use the description command in config-tenant-seg-endpoint submode to associate a text description, enclosed in quotes,
with the current endpoint.
tenant/segment/endpoint
ip Command
Command Syntax
[no] ip <ip-address>
Command Mode
End-point submode
Command Description
Using the ip command to define an endpoint is optional. Use the ip command to assign one or more fixed IP addresses to
the current endpoint.
Command Examples
The following command assigns the IP addresses 192.168.120.2 and 2001:1234::1 to the current endpoint:
controller-1(config-tenant-seg-endpoint)# ip 192.168.120.2
controller-1(config-tenant-seg-endpoint)# ip 2001:1234::1
tenant/segment/endpoint
mac Command
Command Syntax
[no] mac <mac>
Command Mode
Seg-endpoint submode
Command Description
Use the mac command to associate the current endpoint with the known MAC address of a server or other host connected
to the switched fabric. The mac command is required to define an endpoint.
Command Examples
The following command defines the MAC address of the current endpoint:
controller-1(config-tenant-endpoint)# mac 00:00:00:00:00:01
tenant/segment/endpoint
origination Command
Command Syntax
[no] origination
Command Mode
Seg-endpoint submode
Command Description
The origination command may be used by the system to indicate the source of the configuration.
tenant/segment/endpoint
shutdown Command
Command Syntax
[no] shutdown
Command Mode
Seg-endpoint submode
Command Description
Use the shutdown command to administration disable the current endpoint.
tenant/segment
id Command
Command Syntax
[no] id <segment-id>
Command Mode
Config-tenant-seg submode
Command Description
Use the id command to specify an identifier for the current segment.
tenant/segment
member interface-group Command
Command Syntax
[no] member interface-group {<interface-group-name> | any} {vlan {<vlan> | untagged}}
Note: The number of membership rules pertaining to a specific switch cannot exceed 16K.
Command Mode
Config-tenant-seg submode
Command Description
Use the member command to identify the interface groups and VLANs to include in the current segment. In default VLAN
mapping mode, a limit of 200 wildcard rules applies. A wildcard rule is a rule using the any keyword to identify the switch or
interface. In global VLAN mapping mode, a single untagged segment applies to the entire fabric and all ports must belong to
all segments. The vlan-mapping global command, entered from the config-fabric submode, changes the syntax of the
member command, as follows:
member vlan <vlan_number>
Command Examples
The following command assigns all traffic within any interface group with the VLAN tag 110 to the web segment:
controller-1(config-tenant)# segment web
controller-1(config-tenant-seg)# member interface-group any vlan 110
tenant/segment
member switch Command
Command Syntax
[no] member switch {<switch-name> | any} interface {<interface-name> | any} {vlan {<vlan> | untagged}}
Command Mode
Config-tenant-seg submode
Command Description
Use the member switch command to identify the switch interfaces and VLANs to include in the current segment. In default
VLAN mapping mode, a limit of 200 wildcard rules applies. A wildcard rule is a rule using the any keyword to identify the
switch or interface.
The member virtual-switch command is used only by the system for automatically generating the BCF configuration
required for supporting multiple OpenStack project routers. It marks the segment as a virtual switch segment membership
rule.
In global VLAN mapping mode, a single untagged segment applies to the entire fabric and all ports must belong to all
segments. The vlan-mapping global command, entered from the config-fabric submode, changes the syntax of the member
command, as follows:
member vlan <vlan_number>
Command Examples
The following command assigns traffic with VLAN tag 110 on interface leaf1a-ethernet1 to the R-Web segment:
controller-1(config-tenant)# segment R-Web
controller-1(config-tenant-seg)# member switch leaf1a interface leaf1a-ethernet1 vlan 110
tenant/segment
member virtual-switch Command
Command Syntax
Command Mode
Config-tenant-seg submode
Command Description
The member virtual-switch command is used only by the system for automatically generating the BCF configuration
required for supporting multiple OpenStack project routers. It defines the segment as being connected to a virtual switch.
tenant/segment
origination Command
Command Syntax
[no] origination <origin>
Command Mode
Config-tenant-seg submode
Command Description
The origination command is used by the system to automatically generate an identifier that specifies the source of the
system-generated configuration.
tenant/segment
qos-traffic-class Command
Command Syntax
[no] qos-traffic-class {traffic_class_0 | traffic-class-1 | traffic-class-2 | traffic-class-3}
Command Mode
Config-tenant-seg submode
Command Description
Use the qos-traffic-class command to assign a traffic class to the current segment, which directs traffic on the segment to a
specific queue. To change the percentage of the total switch bandwidth allocated to a traffic class, use the queuing-profile
command from config-fabric-qos submode to change the default queuing profile or to define a new profile.
user Command
Command Syntax
[no] user <user-name>
Command Mode
Config mode
Command Description
Use the user command to enter config-user submode, from where you can create a new administrative user account or
modify the settings of an existing account. Use the group command to create a group and associate privileges with the
group. Also use the group command to associate a user with the group and to inherit the privileges associated with the
group.
Note: New users are created without a group. To add a new user to a group, use the group command. In the current
release, the admin group is preconfigured for providing users full administrative privileges. The read-only group can be
defined for assigning users read-only access.
Command Examples
The following command creates a new user account bob and enters config-user submode to allow you to configure the
account settings.
controller-1(config)# user bob
controller-1(config-local-user)#
user
access-token Command
Command Syntax
[no] access-token
Command Mode
config-user submode
Command Description
Use the access-token command to create a long-lived token which can be used for authentication. This can be useful for
external scripting. The token can be deleted (repudiated) at any time. Additionally, it preserved in the running-config, in a
way that does not expose the value used for authentication.
user
full-name Command
Command Syntax
[no] full-name <user-name>
Command Mode
config-user submode
Command Description
Use the full-name command to associate the full name or other description with a user account. This could be the name of
the owner of the account, or text to describe the purpose of the account.
Command Examples
controller-1(config-local-user)# user-name Robert Smith
controller-1(config-local-user)#
user
hashed-password Command
Command Syntax
[no] hashed password
Command Mode
config-user submode
Command Description
Use the hashed-password command to associate a hashed-password with the current user account.
user
password Command
Command Syntax
password [<password>]
Command Mode
config-user submode
Command Description
Use the password command to associate a password with the user account. If the password parameter is not included, the
CLI prompts for the password. This command uses the simple password to generate a hashed password, which will then be
saved in the configuration. The plain text password is not saved, and is impossible to regenerate once the password is
entered. The plain text password is not included in the running-config; instead, the hashed password appears.
Command Examples
The following command configures the password p@ssw0rd for the current user account.
controller-1(config-user)# password p@ssw0rd
controller-1(config-user)#
vcenter Command
Command Syntax
vcenter <vcenter-name>
Command Mode
Config mode
Command Description
Use the vcenter command to identify the vCenter instance and enter config-vcenter submode, where you can configure the
information required to connect the BCF controller with the vCenter.
Command Examples
controller-1(config)# vcenter vc1
controller-1(config-vcenter)#
config-vcenter
automation-level Command
Command Syntax
[no] automation-level {none | full | on-demand}
Command Mode
Config-vcenter submode
Command Description
Use the automation-level command to configure how vCenter configuration is integrated into BCF.
config-vcenter
description Command
Command Syntax
description <text>
Command Mode
Config-vcenter submode
Command Description
Use the description command to provide a description for the current vCenter instance.
Command Examples
controller-1(config-vcenter)# description “San Jose data center 1”
config-vcenter
exclude Command
Command Syntax
[no] exclude vlan <vlans>
Command Mode
Config-vcenter submode
Command Description
Use the exclude command to specifiy the vCenter management network VLAN.
Command Examples
The following example specifies VLAN 100 and 200 as vCenter management VLANs:
controller-1(config-vcenter)# exclude vlan 100,200
The following example specifies VLAN 100 to 150 as vCenter management VLANs:
controller-1(config-vcenter)# exclude vlan 100-150
config-vcenter
hashed-password Command
Command Syntax
[no] hashed-password [<password>]
Command Mode
Config-vcenter submode
Command Description
Use the hashed-password command to set the vcenter password used for the controller authenticating to the vCenter
server, using a hash of the text password.
config-vcenter
host-name Command
Command Syntax
[no] host-name <vcenter-server>
Command Mode
Config-vcenter submode
Command Description
Use the host-name command to identify the vCenter server to which the controller connects.
Command Examples
controller-1(config-vcenter)# host-name 192.168.100.1
config-vcenter
maintenance Command
Command Syntax
[no] maintenance
Command Mode
Config-vcenter submode
Command Description
Use the maintenance command to disconnect vCenter and maintain the last synced configuration from vCenter.
manage-segment-for-vlan Command
Command Syntax
[no] manage-segment-for-vlan <vlan-id> tenant <tenant> | untagged
Command Mode
Config-vcenter submode
Command Description
Use the manage-segment-for-vlan command to specify the tenant and segment for vCenter VLAN.
manage-segment-for-vlan-range Command
Command Syntax
[no] manage-segment-for-vlan-range
Command Mode
Config-vcenter submode
Command Description
Use the manage-segment-for-vlan-range command to specify the tenant to map to a range of vCenter VLANs.
config-vcenter
password Command
Command Syntax
password <plaintext>
Command Mode
Config-vcenter submode
Command Description
Use the password command to set the vCenter password used by the BCF controller to log into the vCenter server.
config-vcenter
preserve-bcf-config Command
Command Syntax
preserve-bcf-config
Command Description
Use the preserve-bcf-config command to disable the auto-cleanup function. Autocleanup automatically removes the
associated configuration when a vCenter instance is removed. The preserve-bcf-config command disables this function,
which causes the configuration associated with the vCenter instance on the BCF controller to persist even after the instance
is removed.
Command Examples
The following command disables autocleanup for the current vCenter instance:
controller-1(config-vcenter)# preserve-bcf-config
Command Mode
Config-vcenter submode
Command Description
Use the password command to set the vCenter password used by the BCF controller to log into the vCenter server.
config-vcenter
user-name Command
Command Syntax
[no] user-name <user-name>
Command Mode
Config-vcenter submode
Command Description
Use the user-name command to identify the vCenter administrative account name used by the BCF controller to connect to
the vCenter server.
config-vcenter
vsphere-gui-plugin access-right Command
vsphere-gui-plugin Configure access-rights for vSphere gui-plugin.
Command Syntax
vsphere access-right {read-only | read-write }
Command Mode
Config-vcenter submode
Command Description
Use the vsphere-gui-plugin-access-right command to configure access-rights for the vSphere plugin.
version command
Command Syntax
version {1.0 | 2.0}
Command Mode
Config mode
Command Description
Use the version command to move to a different version of the command syntax.
vxlan-termination Command
Command Syntax
[no] vxlan-termination
Command Mode
Config mode
Command Description
Use the vxlan-termination command to enter the config-vxlan-termination submode, where you can configure the
controller to terminate a Virtual Extensible LAN (VXLAN) tunnel.
Command Examples
controller-1(config)# vxlan-termination
controller-1(config-vxlan)#
config-vxlan
active Command
Command Syntax
[no] active
Command Mode
Config-vxlan mode
Command Description
Use the active command to activate VXLAN for the BCF pod.
Note: When switch system resources are insufficient, VXLAN is enabled but remains inactive and a warning message is
displayed. For a summary of currently supported scaling limits for different features and hardware, refer to the Big Switch
Fabric Verified Scale document.
Command Examples
The following command activates VXLAN.
controller-1(config-vxlan)# active
config-vxlan
incoming-udp-dst-port Command
Command Syntax
[no] incoming-udp-dst-port <incoming-udp-port>
Command Mode
Config-vxlan mode
Command Description
Use the incoming-udp-dst-port command to configure the expected incoming UDP port for VXLAN packets. The default
value is 4789.
Note: The outgoing UDP port must be left at the default value (4789) for the current version of Big Cloud Fabric.
Command Examples
The following command changes the expected incoming UDP port for the VXLAN packets to 5000
controller-1(config-vxlan)# incoming-udp-dst-port 5000
config-vxlan
outgoing-udp-dst-port Command
Command Syntax
[no] outgoing-udp-dst-port <outgoing-udp-port>
Command Mode
Config-vxlan mode
Command Description
Use the outgoing-udp-dst-port command to change the defaut UDP port used for destination traffic. The default is 4789.
config-vxlan
remote-vtep Command
Command Syntax
[no] remote-vtep <remote-vtep-name>
Command Mode
Config-vxlan mode
Command Description
Use the remote-vtep command to enter config-vxlan-remotevtep submode, where you can configure the IP address of the
remote VTEP.
Command Examples
The following command configures the remote VTEP for the VXLAN termination
controller-1(config-vxlan)# remote-vtep
config-vxlan/remote-vtep
id Command
Command Syntax
[no] id <identifier>
Command Mode
Config-vxlan mode
Command Description
Use the id command to configure a descriptive identifier for the remote VTEP.
config-vxlan/remote-vtep
ip Command
Command Syntax
[no] ip <ipaddress>
Command Mode
Config-vxlan mode
Command Description
Use the ip command from config-vxlan-remotevtep submode to configure the IP address of the remote VTEP.
Command Examples
The following command configures 192.168.1.1 as the IP address of the remote VTEP
controller-1(config-vxlan-remotevtep)# ip 192.168.1.1
config-vxlan/remote-vtep
origination Command
Command Syntax
[no] origination
Command Mode
Config-vxlan mode
Command Description
The origination command may be used by the system to identify the source of the configuration.
config-vxlan
termination Command
Command Syntax
[no] termination interface-group <group>
Command Mode
Config-vxlan mode
Command Description
Use the termination command to configure the interface-group for VXLAN termination.
Command Examples
The following command configures the vxlan1 interface-group for VXLAN termination.
controller-1(config-vxlan)# termination interface-group vxlan1
Command Syntax
show banner
Command Mode
Login mode
Command Description
Use the show banner command to display the pre-login banner message. Use the banner command from config mode to
change the banner message.
Command Examples
controller-1# show banner
Banner: BCF controller
Command Mode
Login mode
Command Description
Use the show bgp segment command to display information about Border Gateway Protocol segments..
Command Examples
controller-1# show bgp segment
# Tenant Name VLAN Attachment Point Endpoint MAC
--|------------|----------------|----|------------------------|------------------------------|
1 switch-33 switch-33_bgp 159 cliff-bcf-2-525400d2e549 5c:16:c7:09:51:03 (Big Switch)
2 switch-32 switch-32_bgp 158 cliff-bcf-2-525400d2e549 5c:16:c7:09:51:03 (Big Switch)
3 switch-31 switch-31_bgp 157 cliff-bcf-2-525400d2e549 5c:16:c7:09:51:03 (Big Switch)
Command Syntax
show boot partition [details]
Command Mode
Login mode
Command Description
Use the show boot command to display information associated with the boot configuration of the controller.
Command Examples
The following command displays basic information about the boot partitions:
controller-1# show boot partition
# State Upgrade Product Version Build
-|------------|--------|-------|---------------|-----|
1 Original bcf 2.0.11-SNAPSHOT 2002
2 Active, Boot Original bcf 2.0.11-SNAPSHOT 2002
controller-1>
Partition 1 contains the Original image, which is also contained in Partition 2. Partition 2, in this example, is the active
partition and the boot partition. The active partition is the one that is currently running, and the boot partition is the image
that will be used when the controller is rebooted.
The following command displays detailed information:
controller-1(config)# show boot partition details
# State Upgrade Product Version Build Device Size
-|------------|--------|-------|---------------|-----|---------|-------|
1 Original bcf 2.0.11-SNAPSHOT 2002 /dev/sda2 8040448
2 Active, Boot Original bcf 2.0.11-SNAPSHOT 2002 /dev/sda3 8040448
controller-1>
This output also displays the build device and the size of the image file.
Command Syntax
show bpdu-guard [switch <switch> [interface <interface>]
Command Mode
Login mode
Command Description
Use the show bpdu-guard command to display the active BPDU configuration for the fabric, or for a specific switch or
interface.
Command Examples
bcf-controiller1(config)# show bpdu-guard switch leaf1-a
# Switch Name IF Name BPDU-Guard State
-|-----------|----------|----------------|
1 leaf1-a ethernet24 disabled
Command Syntax
show clock
Command Mode
Login mode
Command Description
Use the show clock command to display the current system date and time.
Command Examples
controller-1> show clock
System time : 2014-06-08 13:38:38.489000 UTC
controller-1>
Command Syntax
show controller access-control
show controller [details]
show controller localhost stats
show controller virtual-ip
Command Mode
Login mode
Command Description
Use the show controller command to display information about the controller cluster, including resource statistics and
virtual IP configuration. The following is the meaning of Redundancy Status:
• standalone: The current controller is the only node that is configured in the cluster.
• redundant: All the configured nodes in this cluster are connected and reachable. One node is in Active role and it is the
domain leader.
• degraded: More than one node is configured and one of the nodes is disconnected. This is a valid state for the cluster.
• split_brain: The current controller is connected to a switch, but the switch is aware of another controller from the
configured cluster, that is connected to the switch but not to the current controller.
• inconsistent: Includes both invalid states and valid transient states. If this status is not transient, it indicates a problem.
• No cluster leader node found: There is no leader in the cluster. This should be a transient state that is seen for a short
while election is in progress.
• More than one actives <list of active nodes>: More than one controller node with active role in the cluster; this
indicates a problem.
• No active nodes found in cluster: No node is running with the active role. If this is not transient, it indicates a problem.
• Active node is not the leader. Active node and the domain leader are different. If this is not transient, it indicates a
problem.
• No nodes are known: No nodes configured; this indicates a problem.
• Cluster state cannot be determined: Unidentified condition (none of the above).
• Failover History: The history of cluster node failover along with the failover reason.
Command Examples
The following command shows the hostname and IP address of the controller, status, and uptime since rebooting or
failover.
controller-1# show controller
Cluster Name : techpubs
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Nodes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Hostname IP @ State Status Uptime
-|--------------|--------------|-|------|---------|--------------------|
1 192.168.17.210 192.168.17.210 * active connected 18 hours, 41 minutes
controller-1#
The following command shows details about the controller, including the history of cluster node failover along with the
failover reason.
controller-1# show controller details
Cluster Name : kay-vee-emm
Cluster Description : KVM cluster
Cluster Virtual IP : 1.2.3.4 *configuration-error
Cluster Virtual IP Error : The configured virtual IP address 1.2.3.4 must belong to the same subnet as
10.10.0.10/24 of the network interface ETHERNET 0
Redundancy Status : redundant
Redundancy Description : Cluster is Redundant
Last Role Change Time : 2015-03-09T15:18:30.429Z
Cluster Uptime : 4 days, 23 hours
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Nodes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# IP @ Node Id Domain Id State Status Uptime
-|----------|-|-------|---------|-------|---------|------------------|
1 10.10.0.10 * 22825 1 active connected 1 hour, 21 minutes
2 10.10.0.11 5431 1 standby connected 1 hour, 17 minutes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Failover-history
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Winner Time completed Node Reason Description
-|------|------------------------------|-----|---------------------|------------------------------------
-------------------|
1 22825 2015-03-09 15:18:30.468000 UTC 5431 node-connected Changed connection state: connected
to node 5431
2 5431 2015-03-09 15:14:17.457000 UTC - node-disconnected Changed connection state:
disconnected from node 32767
3 22825 cluster-config-change Changed connection state: cluster
configuration changed
4 22825 cluster-config-change Changed connection state: cluster
configuration changed
5 22825 cluster-config-change Changed connection state: cluster
configuration changed
The following command displays the configured ACLs on the controller firewall:
controller-1> show controller access-control
# Access-list Rule Action Source
--|-----------|----|------|---------|
1 api 1 permit ::/0
2 api 2 permit 0.0.0.0/0
3 gui 1 permit ::/0
4 gui 2 permit 0.0.0.0/0
5 ns-api 1 permit ::/0
6 ns-api 2 permit 0.0.0.0/0
7 snmp 1 permit ::/0
8 snmp 2 permit 0.0.0.0/0
9 ssh 1 permit ::/0
10 ssh 2 permit 0.0.0.0/0
controller-1>
Command Syntax
show debug attachment-points
Command Mode
Login mode
Command Description
Use the show attachment-points command to display attachment point details. An attachment point is an optional
attribute of an endpoint, which provides a friendly name for the host and indicates how the endpoint is connected to the
fabric. The attachment point can be defined by an interface group + VLAN ID, or by a switch name + interface name + VLAN
ID.
Command Examples
controller-1> show debug attachment-points
# Total endpoints Interface Interface Group Segment Switch VLAN
--|---------------|----------|-------------|---------------------|------------|--------|
1 1 ethernet3 commercial t5-com-leaf1 untagged
2 0 ethernet3 commercial t5-com-leaf2 untagged
3 1 ethernet40 service t5-svc-leaf1 untagged
4 0 ethernet46 t5-svc-leaf1 untagged
5 0 ethernet21 eng t5-eng-leaf2 untagged
. . . <snip>. . .
Command Syntax
show debug bgp [info | neighbor <neighbor-name>]
Command Mode
Login mode
Command Description
Use the show debug bgp command to display information about Border Gateway Protocol activity and configuration..
neighbor [<neighbor-ip>] Display information about BGP neighbors, or optionally, replace <n eighbor-ip> with the IP
address of a specific neighbor. Display BGP and TCP connection information for neighbor sessions. This includes detailed
neighbor attributes, capability, graceful restart and address family information. This also includes statistics related to BGP
neighbor session establishment and maintenance.
Command Examples
controller-1# show debug bgp info
# Tenant Name Internal Vlan Protocol IP State
--|------------|-------------|-----------|-------------|
1 switch-33 159 33.1.1.2 Instance Down
2 switch-32 158 32.1.1.2 Instance Down
3 switch-31 157 31.1.1.2 Instance Down
4 switch-30 156 30.1.1.2 Instance Down
5 switch-37 163 37.1.1.2 Instance Down
controller-1#
Command Syntax
show debug coordinator
Command Mode
Login mode
Command Description
Use the show coordinator command to display the internal state of the controller sync coordinator.
Command Examples
controller-1# show coordinator
Digest Timestamp
----------------------------------------|------------------------------|
11401376C75AD08A09A2B29CABE367E96B128E57 2014-06-08 07:53:08.915000 UTC
controller-1#
Command Syntax
show debug counters {{warn | drop | error} | all} [<module-name> [<hierarchy>]]
Command Mode
Login mode
Command Description
Set of counters (name and value). Counters are organized in a tree-like structure. Each counter can have a list of
subcategories, which contains a name together with a list of subcounter names. These subcounter names can be used to
further discover and query the subcounter values.
Command Examples
controller-1# show debug counters all
# Counter Hierarchy Metadata Module Name value
---|---------------------------------------------------------------|-----------|------------------------
-|-----|
1 number-of-completed-events-de-queued ApplicationManager 56
2 number-of-completed-events-queued ApplicationManager 28
3 number-of-events-de-queued ApplicationManager 0
. . . <snip> . . .
Command Syntax
show debug datapath switch all {arp-table-stats | bvs-pipeline-stats | igmp-general-query-expectation-
table-counter | igmp-general-query-packet-table-counter | igmp-report-expectation-table-counter | igmp-
report-packet-table-counter | lacp-table-stats | pim-expectation-table-stats}
Command Mode
Login mode
Command Description
Use the show debug datapath command to display debug information about the fabric datapath.
Command Syntax
show discovery-service [tenant {<tenant-name> | all}] tracked-endpoint
Command Mode
Login mode
Command Description
Use the show discovery-service command to show the endpoints tracked by the discovery service.
Command Syntax
show debug endpoint-manager incomplete [endpoint | segment |
member-rule | tenant | inband-port | tracked-endpoint | attachment-point]
Command Mode
Login mode
Command Description
Use the show debug endpoint-manager incomplete command to see the runtime state for tenants, segments or endpoints
that are incomplete or invalid. This command can be used to quickly identify problems in configration or runtime state. This
command shows the following:
• Endpoints that are configured but inactive
• Segments that have been configured without any member rules
• Membership rules that are inactive
• Tenants that are configured without any segments
• Members interfaces of the inband segment without any endpoint
• Endpoints that have been tracked by the discovery service which are unknown
Command Examples
controller-1# show debug endpoint-manager incomplete
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Configured But
Inactive Endpoints ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Tenant Segment Name MAC
IP Address IP State Attachment Point Attachment point state Vlan State
---|---------------------|------------------------|--------------------------------------|--------------
------------|------------|--------|----------------|----------------------|----|--------------------|
1 vc27-vl-untag-118-app vc27-vl-untag-118-app-0 vm-198-00-0c-29-1b-85-c8
00:0c:29:1b:85:c8 (VMware) Attach
Point Unknown
2 vc27-vl-untag-118-app vc27-vl-untag-118-app-0 vm-461-00-0c-29-76-2e-a5
00:0c:29:76:2e:a5 (VMware) Attach
Point Unknown
3 vc27-vl-untag-118-app vc27-vl-untag-118-app-0 esx-17.qa.bigswitch.com-vmk1
00:50:56:64:55:9a (VMware)
< snip >
Command Syntax
show debug event {module <module-name> [event-name <event-name>]| all} [last <num-of-events> events |
events]
Command Mode
Login mode
Command Description
Display a table of all the registered Debug Events in the system. The maximum number of instances recorded per event is
denoted by “BufferedCapacity”. Per Event instance data can be accessed by the keywords events or all.
Command Examples
controller-1> show debug event all events
. . . <snip> . . .
Timestamp : 2014-07-17 16:00:38.572000 UTC
Module Event Name : OFSwitchManager/switch-event
DataFields : [dpid:00:00:00:00:00:02:00:03, reason:connected]
Timestamp : 2014-07-17 16:00:38.569000 UTC
Module Event Name : OFSwitchManager/switch-event
DataFields : [dpid:00:00:00:00:00:02:00:02, reason:connected]
controller-1>
Command Syntax
show debug upgrade status
Command Mode
Login mode
Command Description
Use the show debug upgrade status command to display upgrade details.
Command Syntax
show debug vft [status | completed-jobs [switch-jobs] | current-job | queued-jobs]
Command Mode
Login mode
Command Description
Use the show debug vft command to display VFT details.
Command Syntax
show debug zerotouch {slrest | velocity}
Command Mode
Login mode
Command Description
Use the show debug zerotouch command to display debug information about zerotouch.
Command Syntax
show dump [core-dump <core-dump-name> | heap-dump <heap-dump-name>]
Command Mode
Login mode
Command Description
Use the show dump command to display the core dumps and heap dumps available for diagnosis. To direct the output to a
file for easier analysis, use the greater than sign (>) followed by a filename.
Command Examples
The following command shows two core dumps present:
standby controller> show dump
~~~~~~~~~~~~~~~~~~~~~~~~~ Heap-dumps ~~~~~~~~~~~~~~~~~~~~~~~~~
# Heap-dump size last modified
-|-----------------------------|------|-----------------------|
1 java_pid4377.94426f1.hprof.gz 4.34MB 2014-10-08 06:09:10 UTC
2 java_pid4706.23cc793.hprof.gz 4.52MB 2014-10-08 06:09:59 UTC
Command Syntax
show [tenant {<tenant-name> | all} [segment {<Segment Name> | all}]] [switch {<switch-name> | all}
[interface {<interface-name> | all}] | interface-group <interface-group-name>]
endpoint [ details | incomplete | [mac <MAC> | ip <endpoint-ip-address> | <endpoint-name>] [security-
group]}
Command Mode
Login mode
Command Description
Use the show endpoint command to display the endpoints statically configured and learned by the controller. An endpoint
is a server or other host attached to a fabric switch that has been registered on the controller using its MAC address.
Optionally, the IP address and attachment point of the endpoint can also be registered.
Note: Endpoints associated with Switch Light Virtual instances are not aged out over time. These endpoints are managed by
Openstack orchestration and Big Cloud Fabric plugins. In contrast, endpoints connected to physical switches that are
dynamically discovered are aged out when inactive.
Command Examples
The following command displays information about all endpoints on all segments in the Red tenant:
controller-1> show endpoint
# Tenant Segment Name MAC IP IP State Attach
Point AP State VLAN State
--|---------|--------------|--------------|-----------------|-------------|--------|--------------------
---|--------|--------|--------------------|
1 internal commercial don.en4 3c:07:54:4a:d6:77 10.192.19.109 learned t5-com-
leaf1|ethernet3 learned untagged Active
2 internal eng srini 40:6c:8f:4a:97:7d unknown Unknown
unknown untagged Attach Point Unknown
3 internal eng 68:5b:35:cd:8f:a4 10.192.18.163 learned t5-eng-leaf2|ethernet4 learned
untagged Active
4 internal eng kenc.en0 3c:07:54:33:ca:79 10.192.18.129 learned t5-eng-
leaf1|ethernet20 learned untagged Active
5 internal eng jt.en0 78:31:c1:c1:22:20 unknown Unknown
unknown untagged Attach Point Unknown
6 internal eng kranti.en4 68:5b:35:8a:a0:3b unknown Unknown
unknown untagged Attach Point Unknown
. . . <snip> . . .
Note: The show endpoint-manager incomplete command has been changed to show debug endpoint-manager incomplete.
Command Syntax
show environment
Command Mode
Login mode
Command Description
Use the show environment command to display the current values of the controller environmental variables, such as
temperature, and fan status.
Command Examples
The following command displays the current values of the controller environmental variables:
controller-1> Environment value
--|-------------------|----------|
1 Ambient Temperature 26 Celsius
2 CPU Temperature 48 Celsius
3 Fan 1A 2160 RPM
4 Fan 1B 2160 RPM
5 Fan 2A 1680 RPM
6 Fan 2B 1560 RPM
7 Fan 3A 1680 RPM
8 Fan 3B 1560 RPM
9 Fan 4A 1680 RPM
10 Fan 4B 1560 RPM
11 Fan 5A 1680 RPM
12 Fan 5B 1560 RPM
13 Platform Dell320
14 Serial Number 8V0QZ12
Command Syntax
show fabric connected-devices [switch <switch-name> [interface <interface-name>]] [protocol {cdp | lldp
}]
Command Mode
Login mode
Command Description
Use the show fabric connected-devices command to display information about the devices discovered to be connected to
the fabric using LLDP and CDP. The output displays the MAC address of each connected interface as a separate device.
Command Examples
controller-1> show fabric connected-devices
# Switch Interface Interface group Device Name Chassis ID Port ID
--|--------|----------|------------------------------------|----------------------------|-----------------|-----------------|
Command Syntax
show fabric [inventory | switch redundancy | summary]
Command Mode
Login mode
Command Description
Use the show fabric command to display information about the status of the switched fabric.
Command Examples
The following command displays information about the status of the switched fabric.
controller-1# show fabric
~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Fabric Status ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Overall Status : NOT OK
QoS Status : Enabled
GTP Hash Status : Disabled
# of errors : 13
# of warnings : 12
# of controller nodes : 2
# of spines configured : 2
# of spines connected : 2
# of leaves configured : 4
# of leaves connected : 4
# of vswitches connected : 2
# of leaf-groups configured : 2
# of interface-groups configured : 3
# of bidirectional spine to leaf links : 8
# of bidirectional links between switches in same leaf group : 3
# of bidirectional links between leaf and virtual switches : 4
# of edge interfaces : 8
# of tenants : 9
# of segments : 10
# of active endpoints : 0
# of inactive endpoints : 6
# of inactive member rules : 14
# of blocked endpoints : 0
# of active NAT profiles : 0
# of sflow collectors configured : 4
# of span-local sessions configured : 2
# of span-fabric sessions configured : 3
# of logical-router interface segments configured : 8
kranti-hw-c1(config)# show fabric error
~ Switches that are not connected to standby controller ~
# Switch Name Switch MAC Address
-|-----------|------------------|
1 rack2-ivs2 54:9f:35:1b:dd:64
2 rack2-ivs1 d4:ae:52:d0:0f:84
~ Switches that are disconnected but have not been removed from the fabric ~
None.
~ Suspended switches ~
None.
~ Runtime lags with member count greater than maximum supported count(128) ~
None.
~ Invalid links ~
None.
~ Interfaces whose breakout property was enabled by user but are breakout incapable ~
None.
~ Interfaces configured with bpdu-guard-disable but shut down because of no links to peer switch ~
# Switch name Interface name
--|-----------|--------------|
1 leaf1-a ethernet12
2 leaf1-a ethernet14
3 leaf1-a ethernet16
4 leaf1-a ethernet46
5 leaf1-b ethernet12
6 leaf1-b ethernet14
7 leaf1-b ethernet16
8 leaf1-b ethernet46
9 leaf1-b ethernet48
10 leaf2-a ethernet24
Command Syntax
show fabric error { bpdu-guard-disabled-shutdown-interfaces | breakout-failed-interfaces | invalid-links
| missing-links | pending-disconnect-switches | suspended-switches | switch-interface-shutdown |
switch-not-connected-to-standby | switch-with-mismatched-cpld | switch-with-mismatched-loader | switch-
without-management-address }
Command Mode
Login mode
Command Description
Use the show fabric error command to display detailed information about errors occurring in the switched fabric. All errors
related to the topology currently discovered by Fabric Manager are placed under this container node.
switch-with-mismatched-cpld: List switches where the CPLD running on the switch does not match the version packaged
with the Switch Light OS image.
switch-with-mismatched-loader: List switches where the Loader running on the switch does not match the version
packaged with the Switch Light OS image.
switch-without-management-address: List of switches that do not have IPv4 management address configured.
Command Examples
The following command lists all the errors in the switched fabric:
controller-1> show fabric error
~ Switches that are disconnected but have not been removed from the fabric ~
None.
~ Suspended switches ~
None.
~ Invalid links ~
None.
~~~~~~~~~~~~~~~~~~~ Missing links ~~~~~~~~~~~~~~~~~~~
# Switch Name Switch Name Description
-|-----------|------------|--------------------------|
1 t5-spine1 t5-com-leaf1 Spine to leaf link missing
2 t5-spine1 t5-eng-leaf2 Spine to leaf link missing
3 t5-spine1 t5-com-leaf2 Spine to leaf link missing
. . . <snip> . . .
If BPDU Guard is disabled and one or more ports are shut down because there is no link to a peer switch, the affected
interfaces are shown, as in the following example:
controller-1> show fabric error
~ Switches that are not connected to standby controller ~
# Switch Name Switch MAC Address
-|-----------|------------------|
1 rack2-ivs2 54:9f:35:1b:dd:64
. . .<snip> . . .
~ Interfaces configured with bpdu-guard-disable but shut down because of no links to peer switch ~
# Switch name Interface name
--|-----------|--------------|
1 leaf1-a ethernet12
2 leaf1-a ethernet14
3 leaf1-a ethernet16
4 leaf1-a ethernet46
5 leaf1-b ethernet12
6 leaf1-b ethernet14
7 leaf1-b ethernet16
8 leaf1-b ethernet46
9 leaf1-b ethernet48
10 leaf2-a ethernet24
controller-1>
error-threshold-member-count-exceeded-lag: List of LAGs whose member port count has exceeded the maximum number
of LAG members supported by the switches in the BCF Fabric.
incomplete-bpdu-guard-disabled-interface-group Interface-groups with only subset of member switch-interfaces
configured with BPDU-guard disable
leaf-interface-with-no-interface-group-config Display all leaf switch interfaces that are not configured to be in an interface
group
• If a leaf-switch-a disconnects from the controller and leaf-switch-b in the same leaf group is still connected to the
controller, then leaf-switch-a forwarding state is removed. Otherwise, the leaf-switch-a forwarding state is not
removed and is kept intact.
• If spine-switch-x disconnects from the controller and at least 50% of the configured spine switches are still connected,
then the spine-switch-x forwarding state is removed. Otherwise, the spine-switch-x forwarding state is not removed
and is kept intact.
single-inband-connected-controller: Display controllers that do not have redundant inband connections
spine-interface-with-no-link: Display all spine switch interfaces on which no links are discovered
Command Syntax
show fabric gtp-hash
Command Mode
Login mode
Command Description
Use the show fabric gtp-hash command to display information about the generic tunneling protocol (GTP) hash feature.
Command Examples
controller-1> show fabric gtp-hash
Gtp hash status
---------------|
Disabled
Command Syntax
show fabric ipam switch [<Switch name>] [details]
Command Mode
Login mode
Command Description
Use the show fabric ipam switch command to display information about the automatic assignment of IPv4 addresses to
fabric switches through the IP address management (IPAM) feature, which is used to assign IPv4 addresses to switches,
which are required for connecting to servers, such as syslog, that may not support IPv6.
Command Examples
controller-1> show fabric ipam switch
Start : 10.8.67.200
End : 10.8.67.245
Count : 46
Used : 5
~ Allocated IP Addresses ~
# Ip Switch
-|-----------|-------|
1 10.8.67.200 spine0
2 10.8.67.201 leaf0-a
3 10.8.67.202 spine1
4 10.8.67.203 leaf0-b
5 10.8.67.204 leaf1-a
controller-1>
Command Syntax
show fabric warning [ disabled-interface-group-interface | incomplete-applied-policy | incomplete-bpdu-
guard-disabled-interface-group [interface-group <interface-group-name>] | incomplete-dynamic-route-next-
hop-member | incomplete-endpoint | incomplete-floating-ip | incomplete-inband-port | incomplete-member-
rule | incomplete-nat-profile | incomplete-next-hop-group-member | incomplete-pat-profile | incomplete-
policy-list | incomplete-route | incomplete-segment-interface | leaf-interface-with-no-interface-group-
config | single-inband-connected-controller | spine-interface-with-no-link | switch-with-mismatched-onie
]
Command Mode
Login mode
Command Description
Use the show fabric warning command to display warnings about questionable conditions in the switched fabric, such as
interfaces on leaf switches that are not assigned to interface groups, or spine interfaces that are not connected to other
switches.
leaf-interface-with-no-interface-group-config: Interfaces that are not configured to be part of an interface group. The
recommended practice is for the leaf switch interfaces to be configured to be part of an interface group that provides for
load-balancing and failover capabilities for the end hosts connected to these interfaces.
single-inband-connected-controller: The list of controllers that are connected to only one of the switches in the fabric and
hence have no redundant switch connections.
spine-interface-with-no-link: Interfaces on spine switches that are not connected to other switches.
switch-with-mismatched-onie: List switches where the ONIE running on the switch does not match the version packaged
with the Switch Light OS image.
Command Examples
controller-1> show fabric warning
~ Switch interfaces that are not configured in an interface group ~
# Leaf Group Switch Name Interface Name
--|----------|-----------|--------------|
1 rack1 leaf1-a ethernet24
2 rack1 leaf1-a ethernet26
3 rack1 leaf1-a ethernet32
4 rack1 leaf1-a ethernet36
5 rack1 leaf1-a ethernet37
6 rack1 leaf1-a ethernet39
7 rack1 leaf1-a ethernet40
8 rack1 leaf1-b ethernet24
9 rack1 leaf1-b ethernet28
10 rack1 leaf1-b ethernet32
11 rack2 leaf2-a ethernet20
12 rack2 leaf2-a ethernet28
13 rack2 leaf2-b ethernet20
14 rack2 leaf2-b ethernet24
15 rack2 leaf2-b ethernet26
The following command displays information about any interface group with one or more member interfaces configured
with bpdu-guard-disable, while one or more member interfaces are not configured with bpdu-guard-disable:
controller-1> show fabric warning incomplete-bpdu-guard-disabled-interface-group
~ Interface-groups with only subset of member interfaces with bpdu-guard-disable ~
Command Syntax
show file [<file-name>
Command Mode
Login mode
Command Description
Use the show file command to list the contents of the user file repository on the controller. To save CLI outputs to a file, use
the greater than character (>) to direct the output of any show command to a file. You can then view the file information
about the saved files using the show file command.
Command Examples
controller-1(config)# show fabric > fabric-june9
controller-1(config)# show file
# Name Size Created
-|------------|----|------------------------|
1 fabric-june9 1302 Sun Jun 8 22:04:54 2014
controller-1(config)#
Command Syntax
show forwarding [sync-state | dhcp-table | dhcp-vrf-table | ecmp-table | ep-table | arp-table | icmpv6-
neighbor-table | icmpv6-external-router-table | icmpv6-ra-table | icmpv6-prefix-table | router-ip-table
| my-station-table | vxlan-table | vxlan-vfi-table | vxlan-replication-table | vxlan-local-vtep-table |
vxlan-vfi-membership-table | vxlan-access-vp-table | vxlan-network-vp-table | vxlan-vni-vlan-mapping-
table | gtp-hash-table | lag-member-auto-add-table | l3-host-table | l3-cidr-table | qos-queue-weight-
table | priority-queue-table | ecap-table | icap-table {spine | leaf} | icmp-agent-table | arp-cache-
table | arp-vlan-reply-table | arp-disable-src-check-table | mcast-timer-table | mcast-vlan-table |
priority-pcp-table | dscp-priority-table]
Command Mode
Login mode
Command Description
Use the show forwarding command to display fabric-wide information, including ARP, DHCP, endpoint, QoS, and policy
tables. Use the show forwarding internal command to display the Internal forwarding tables.
Note: The Port Num column heading refers to a logical port, not a physical interface.
Command Examples
The following command displays the DCHP table for the fabric:
controller-1> show forwarding dhcp-table
# VLAN Id Router IP Router MAC DHCP Server IP Circuit Id
-|-------|-----------|-----------------|--------------|----------|
1 11 10.192.18.1 5c:16:c7:01:00:02 10.192.3.1
2 15 10.192.20.1 5c:16:c7:01:00:04 10.192.3.1
3 10 10.192.19.1 5c:16:c7:01:00:02 10.192.3.1
The following command displays the endpoint table for the fabric:
controller-1> show forwarding ep-table
# VLAN Id MAC address rack id Rack LAG Id Interface Group LAG Id
--|-------|-----------------|--------|-----------|-----------------|
1 10 3c:07:54:4a:d6:77 com-rack 90 100
2 11 08:00:27:9d:7b:f4 eng-rack 102 116
3 11 10:dd:b1:b0:44:fa eng-rack 102 137
. . . <snip> . . .
The following command displays the ARP table for the fabric:
controller-1> show forwarding arp-table
# VLAN Id IP Address MAC Address Idle Timeout Broadcast Query Timeout Unicast Query Timeout
--|-------|-------------|-----------------|------------|-----------------------|---------------------|
1 2 10.192.16.1 00:1c:73:17:bf:dc 300000 255000 240000
2 3 10.192.16.5 00:1c:73:17:bf:dc 300000 255000 240000
3 4 10.192.16.9 00:1c:73:17:bf:dc 300000 255000 240000
. . . <snip> . . .
span-name-to-id-mapping
<. . . snip . . .>show
Command Syntax
show forwarding switch {<switch-name>} [l2-table | l2-flood-table | port-table | port-source-miss-
override-table | port-breakout-table | port-bpdu-guard-table | port-storm-control-table | port-mcast-
table | port-vxlan-table | vxlan-dcbx-vfp-table | lag-table | vlan-table | vlan-member-table | vlan-
xlate-table | vlan-xlate-gen-table | egr-vlan-xlate-table | l3-host-table | l3-cidr-table | vcap-table |
ecap-table | vrf-index-table | tenant-index-table | icap-table | debug-table | ecmp-table | span-table |
ingress-mirror-table | egress-mirror-table | lacp-table | nat-table | floating-ip-table | reverse-
floating-ip-table | arp-reply-table | arp-offload-table | sflow-sampler-table | sflow-collector-table |
lag-name-id-table | arp-table | icmpv6-neighbor-table | icmpv6-external-router-table | icmpv6-ra-table |
icmpv6-prefix-table | pim-expectation-table | igmp-general-query-packet-table | igmp-report-expectation-
table | igmp-report-packet-table | mcast-rx-port-table | mcast-tx-port-table | ip-mcast-table | mcast-
Command Mode
Login mode
Command Description
Use the show forwarding switch command to display information about the specified switch, including Link Access Group
(LAG), routing, and VLAN tables.
Note: In the command output, Port Num refers to logical a port number assigned by the controller, not an actual port on
the physical switch.
Command Examples
The following command displays forwarding information about switch dt-leaf1a:
controller-1> show forwarding switch dt-leaf1a
~~~~~~~~~~~~~~~~~~ Switches ~~~~~~~~~~~~~~~~~~
# Switch Name Leaf Group Switch Id Switch Type
-|-----------|----------|---------|-----------|
1 dt-leaf1a rack1 dt-leaf1a 1
-|---------|--------------|-----------------------------|
1 dt-leaf1a -1 82, 83, 89, 90, 182, 205, 223
<snip>
Command Syntax
show group [<name> [details]]
Command Mode
Login mode
Command Description
Use the show group command to display information about groups that can be used for associating permissions and user
accounts. Permissions can only be assigned to groups, not to individual accounts. Individual accounts inherit the
permissions of any group with which they are associated. Users assigned to the preconfigured admin group have full
administrative privileges. Read-only privileges are assigned to users associated with the read-only group.
Command Examples
controller-1> show group
# Group name User(s)
-|----------|-----------------|
1 admin admin, alice, bob
Command Syntax
show image [details]
Command Mode
Login mode
Command Description
Use the show image command to display information about the software images in the controller local image file
repository.
Command Syntax
show inband-port
Command Mode
Login mode
Command Description
Use the show inband-port command to display information about the in-band management ports connecting the BCF
controllers to the vSwitches.
Command Examples
controller-1# show inband-port
# Type Leaf Group Interface Group MAC
-|----------|----------|---------------------------------|------------------------------|
1 v-switch rack0 tmk aa:b0:35:8f:e4:45
2 controller rack0 bsnctrl-2MTRC42-44-a8-42-1b-12-14 5c:16:c7:00:12:16 (Big Switch)
3 controller rack0 bsnctrl-2MWSC42-44-a8-42-1b-11-5c 5c:16:c7:00:11:5e (Big Switch)
Command Syntax
show {[tenant {<tenant-name> | all} [segment {<Segment Name> | all}]] [switch {<switch-name> | all}
Command Mode
Login mode
Command Description
Use the show interface-group command to display information about all interface groups in the fabric or about a specific
interface group. You can use the show tenant command to display information about interface groups in a specific tenant.
counters: Display cumulative statistics regarding traffic forwarded on the interface group. Use the clear interface-group
<switch-name | all> counters command to reset the counters to zero.
members: Display information about member interfaces included in the interface group.
details: Display additional information about the specified objects. This option can be used with other keywords followed
immediately by a return.
<interface-group-name>: To display information about a specific interface group, replace <interface-group-name> with the
name of the interface group.
endpoint: When specifying the interface group name, use this keyword to display information about the associated
endpoints. To display information about a specific endpoint, follow this keyword with an identifier for the endpoint.
• mac <MAC>: When using the mac keyword, replace <MAC> with the MAC address of the endpoint.
• ip <endpoint-ip-address>: When using the ip keyword, replace <endpoint-ip-address> with the IP address of the
endpoint.
• <endpoint-name>: Replace <endpoint-name> with the name of the endpoint.
Command Examples
The following command displays summary information about all the interface groups in the fabric.
controller-1# show interface-group
# Name Mode Leaf Group State
-|------|--------------------------|----------|-----|
1 hv0 static-auto-vswitch-inband rack0 up
2 hv1 static-auto-vswitch-inband rack1 up
3 hv2 static-auto-vswitch-inband rack2 up
4 to-bm2 span-fabric rack1 up
The following command displays summary information about a specific interface group.
controller-1)# show interface-group esx-15.qa.bigswitch.com-BIGDVS1-lag1
# Name Mode Discovery Leaf Group State
-|------------------------------------|----|---------|----------|-----|
1 esx-15.qa.bigswitch.com-BIGDVS1-lag1 lacp lldp rack2 up
The following command displays detailed information about a specific interface group.
controller-1)# show interface-group esx-15.qa.bigswitch.com-BIGDVS1-lag1 details
# Name Mode Discovery Member Name Interface
Associated Switch Associated Interface Leaf Group Phy. State Op. State Member Down Reason Actor System
Priority Actor System Mac Actor Key Actor Port Number Actor Port Priority Actor State
Flags Partner System Priority Partner System Mac Partner Key Partner Port Number Partner Port
Priority Partner State Flags Member Type
---------------|-----------------------|-------------------------|-----------|-------------------|------
---------------|------------
1 esx-15.qa.bigswitch.com-BIGDVS1-lag1 lacp lldp host esx-15.qa.bigswitch.com vmnic3 leaf2-b
ethernet44 rack2 up up None 32768
The following command displays information about the members in a specific interface group.
controller-1)# show interface-group esx-15.qa.bigswitch.com-BIGDVS1-lag1 members
# Name Mode Discovery Member Name Interface
Associated Switch Associated Interface Member Type Phy. State Op. State Leaf Group Member Down Reason
-|------------------------------------|----|---------|------|-----------------------|---------|---------
--------|--------------------|-----------|----------|---------|----------|------------------|
1 esx-15.qa.bigswitch.com-BIGDVS1-lag1 lacp lldp host esx-15.qa.bigswitch.com vmnic3 leaf2-b
ethernet44 up up rack2 None
2 esx-15.qa.bigswitch.com-BIGDVS1-lag1 lacp lldp host esx-15.qa.bigswitch.com vmnic2 leaf2-a
ethernet44 up up rack2 None
controller-1)#
Command Syntax
show {[tenant {<tenant-name> | all} [segment {<Segment Name> | all}]]} ipv6-external-router
show ipv6-external-router
Command Mode
Login mode
Command Description
Use the show ipv6-external-router command to display information about the external IPv6 routers connected to the Big
Cloud Fabric.
Command Examples
controller-1# show ipv6-external-router
#show ipv6-external-router
# Tenant Segment Interface External Router IP
-|------|-----------------|-------------------------|
1 T1 T1S1 fe80::ca1f:66ff:fec1:5397
Command Syntax
show lag switch
Command Mode
Login mode
Command Description
Use the show lag switch command to display information about link access groups (LAGs) configured in the fabric. A LAG is
a group of ports that combine multiple interfaces into a single logical interface for improved throughput and stability. .
Command Examples
The following command displays information about the LAGs configured between fabric switches:
Command Syntax
show link
Command Mode
Login mode
Command Description
Use the show link command to display the operational state of links discovered by Fabric Manager. A link is discovered
when LLDP packets are sent from one switch interface on the link and are received on the other switch interface.
Command Examples
controller-1> show link
# Switch Name IF Name Switch Name IF Name Link Type
-|------------|----------|------------|----------|----------|
1 t5-com-leaf1 ethernet45 t5-com-leaf2 ethernet45 peer
2 t5-com-leaf1 ethernet46 t5-com-leaf2 ethernet46 peer
3 t5-eng-leaf1 ethernet47 t5-eng-leaf2 ethernet47 peer
. . . <snip> . . .
Command Syntax
show local node {dna | interfaces [<if-name> | all] [error | stats [error]] | route [ipv6]}
Command Mode
Login mode
Command Description
Use the show local node command to display information about the local controller node.
Command Examples
eno1 14 0 0 0 0 0 0 0
eno2 0 0 0 0 0 0 0 0
eno3 1 0 0 0 0 0 0 0
eno4 0 0 0 0 0 0 0 0
enp5s0f0 0 0 0 0 0 0 0 0
enp5s0f1 0 0 0 0 0 0 0 0
controller-1> show local node interfaces all stats
Interface Rx Bytes Rx Pkts Tx Bytes Tx Pkts
---------|-----------|--------|----------|--------|
bond0 4940231241 28398671 447673261 1917713
bond1 18658428330 47768531 2800330043 14167371
bond3 0 0 11053645 103306
eno1 4940231241 28398671 447673261 1917713
eno2 0 0 0 0
eno3 18658428330 47768531 2800330043 14167371
eno4 0 0 0 0
enp5s0f0 0 0 5520665 51595
enp5s0f1 0 0 5532980 51711
The following command displays statistics for the specified interface on the hardware controller appliance.
controller-1> show local node interfaces eno1 stats
Interface Rx Bytes Rx Pkts Tx Bytes Tx Pkts
---------|----------|-------|---------|-------|
eno1 3466795161 8338939 306352021 1316797
controller-1>
The following command displayd errors for the specified interface on the hardware controller appliance.
controller-1> show local node interfaces eno2 error
Interface Rx Drop Rx CRC Errors Rx Errors Rx Frame Errors Rx Overrun Errors Tx Errors Tx Drop Collisions
---------|-------|-------------|---------|---------------|-----------------|---------|-------|----------
|
eno2 0 0 0 0 0 0 0 0
controller-1>
Command Syntax
show logging { audit | controller | networkservice | remote | routing | switch <switch> | syslog | web-
access | web-error } [complete | last <duration>] [forever]}
Command Mode
Login mode
Command Description
Use the show logging command to display the different logs maintained on the local controller node, including the local
copy of the syslog or the switch logs maintained on the controller.
Command Examples
The following command shows the last lines displayed from the current syslog on the local controller node, interrupted
with Ctrl-C.
controller-1> show syslog
. . .
2014-06-08T00:55:01.339276+00:00 controller CRON[2440]: (root) CMD (/usr/share/floodlight/bin/ip-change-
detect 2>&1 | logger -t cron_ip-change-detect)
2014-06-08T01:00:01.380654+00:00 controller CRON[2450]: (root) CMD (/usr/share/floodlight/bin/ip-change-
detect 2>&1 | logger -t cron_ip-change-detect)
^C
Interrupt.
controller-1#
To direct the output of the show logging command to a local file, use the greater than (>) operator followed by a filename.
controller-1> show syslog > syslog-june9
To view the switch logs on the controller that have been received in the previous 5 minutes, enter the following command:
controller-1># show logging switch leaf0-a last 5min forever
2015-11-16T11:11:07.084720+00:00 leaf0-a bash: DEBUG 'ztn manifest'
2015-11-16T11:11:07.482744+00:00 leaf0-a bash: DEBUG exit 0
. . . < snip > . . .
2015-11-16T11:15:43.325305+00:00 leaf0-a bash: DEBUG 'ztn manifest'
2015-11-16T11:15:43.690871+00:00 leaf0-a bash: DEBUG exit 0
This command displays the previous 5 minutes of switch logs and repeats periodically.
Command Syntax
show logging audit [last {[<integer>] <interval>} | complete] [forever]
Command Mode
Login mode
Command Description
Use the show logging audit command to display a log of the CLI commands and the REST API requests issued to the BCF
controller. The log files maintained on the controller are for short-term reference and are rotated to compressed files on a
periodic basis. For long-term storage of log files, use the BMF Analytics server or an external syslog server.
Command Syntax
show logging remote
Command Mode
Login mode
Command Description
Use the show logging remote command to display the current configuration of the remote syslog server and the level of
messages logged.
Command Examples
controller-1> show logging remote
# Server port
-|---------|----|
1 10.8.67.2 514
controller-1>
Command Syntax
show [tenant {<tenant-name> | all}]
logical-router [
Command Mode
Login mode
Command Description
Use the show logical-router command to display information about logical routers in all tenants in the fabric or in the
specified tenant.
Command Examples
Display information about all segment interfaces on all logical routers in the fabric.
controller-1> show logical-router interface segment
<cr> Display logical router segment interface information
controller-1> show logical-router interface segment
# L Router Segment IP Subnet Visibility State DHCP Relay
----|---------|---------------------|---------------|----------|------|------------|
1 FLAP190 V2 1.3.60.1/24 PUBLIC Active Unconfigured
2 FLAP190 V3 1.3.61.1/24 PUBLIC Active Unconfigured
3 FLAP190 V1 1.3.59.1/24 PUBLIC Active Unconfigured
. . . <snip> . . .
Display basic information about the logical router of the specified tenant.
controller-1> show tenant-a logical router
Display information about configured policy lists of all logical routers in the fabric.
controller-1> show logical-router policy-list
Display information about all policy rules of applied policy lists on all logical routers in the fabric.
controller-1> show logical-router applied-policy
Display information about members of next hop groups configured on all logical routers in the fabric.
controller-1> show logical-router next-hop-group
Display information about members of next hop groups used for dynamic routes for all logical routers in the fabric.
controller-1> show logical-router dynamic-route-next-hop
Display information about NAT profiles configured on all logical routers in the fabric.
controller-1> show logical-router nat-profile
Display information aobut P-NAT profiles configured on all logical routers in the fabric.
controller-1> show logical-router pat-profile
Display information about floating IPs configured on all logical routers in the fabric.
controller-1> show logical-router floating-ip
Display information about all interfaces on all logical routers in the fabric.
controller-1> show logical-router interface
Display information about all tenant interfaces on all logical routers in the fabric.
controller-1> show logical-router interface tenant
Display information about all incomplete configuration on all logical routers in the fabric.
controller-1> show logical-router incomplete
Display information about incomplete configuration of logical router interfaces of all logical routers in the fabric.
Display information about incomplete policy list configuration within all logical routers in the fabric.
controller-1> show logical-router incomplete policy-list
Display information about incomplete or inactive members of all next hop groups within all logical routers in the fabric.
controller-1> show logical-router incomplete next-hop-group
Display information about inactive members of all dynamic route next hop groups within all logical routers in the fabric.
controller-1> show logical-router incomplete dynamic-route-next-hop
Display information about incomplete or inactive policy rules of applied policy lists in all logical routers in the fabric.
controller-1> show logical-router incomplete policy
Display information about incomplete or inactive static routes in all logical routers in the fabric.
controller-1> show logical-router incomplete route
Display information about incomplete or inactive NAT profiles in all logical routers in the fabric.
controller-1> show logical-router incomplete nat-profile
Display information about incomplete or inactive P-NAT profiles in all logical routers in the fabric.
controller-1> show logical-router incomplete pat-profile
Display information about incomplete or inactive floating IPs in all logical routers in the fabric.
controller-1> show logical-router incomplete floating-ip
Display information about configured DHCP relays on segment interfaces of all logical routers in the fabric.
controller-1> show logical-router dhcp
show [tenant {<tenant-name> | all} [segment {<Segment Name> | all}]] mac-membership ignored-endpoint
[mac <MAC>]
Command Syntax
show mac-membership
Command Mode
Login mode
Command Description
Use the show mac-membership command to display information about segment MAC-based membership rules.
ignored-endpoint: Display the ignored endpoints on segments defined by a MAC membership rule
rule: Use the show mac-member-rule command to display the MAC based membership rules configured on the controller.
You can filter the MAC member rules displayed by specifying the tenant name and the segment name.
Command Syntax
show member-rule {interface-group {<interface-group> | all} | switch {switch-name | all }} vlan {<vlan-
id> | untagged } }
Command Mode
Login mode
Command Description
Use the show member-rule command to display information about the segment membership rules configured in the fabric.
A segment membership rule defines the traffic that should be included in a logical segment within a specific tenant. These
rules can be defined using interface groups or the switch and interface for interfaces that are not included in interface
groups.
Command Examples
The following command displays information about the segment membership rules defined using interface groups:
controller-1> show member-rule interface-group all
# Tenant Segment Switch Interface Interface group VLAN State
---|-----------|-----------|---------|----------|-----------|--------|--------|
1 dt dt-seg4 dt-leaf2b ethernet38 untagged inactive
2 dt dt-seg4 dt-leaf1b ethernet39 untagged inactive
3 dt dt-seg4 dt-leaf1a ethernet39 untagged inactive
<snip>
The following command displays information about the segment membership rules defined using the switch name and
interface:
controller-1> show member rule switch all
# Tenant Segment Switch Interface Interface group VLAN State
---|-----------|-----------|---------|----------|-----------|--------|--------|
1 dt dt-seg4 dt-leaf2b ethernet38 untagged inactive
2 dt dt-seg4 dt-leaf1b ethernet39 untagged inactive
3 dt dt-seg4 dt-leaf1a ethernet39 untagged inactive
<snip>
Command Syntax
show multicast l2groups [tenant [all | <tenant-name>] [multicast-address {<address> | all} ] | [segment
{<segment> | all}]
show multicast l3groups [tenant [all | <tenant-name>] [multicast-address {<address> | all} ]
show multicast mrouter [tenant {<tenant-name> | all} [segment {<segment-name> | all}]
show multicast tenant [<tenant-name> | all]
show multicast summary
Command Mode
Login mode
Command Examples
The following command displays summary information about multicast configuration:
controller-1> show multicast summary
Total Multicast Entries : 0
IGMP Report Timeout (sec) : 260
IGMP Query Timeout (sec) : 260
IGMP Periodic Query Time (sec) : 120
IGMP Maximum Response Time (sec) : 10
IGMP Last Response Timeout (sec) : 10
controller-1>
Command Syntax
show [tenant {<tenant-name> | all} [segment {<segment-name> | all}]]
Command Mode
Login mode
Command Description
Use the show nat-endpoint command to display information about the NAT endpoints created by the BCF NAT feature.
logical-router {<tenant-name> | all}: Display endpoints attached to a specific logical router or use the all keyword for all
logical routers.
Command Syntax
show nat-pool [switch {<switch-name> | all}]
Command Mode
Login mode
Command Description
Use the show nat-pool command to display information about the switches that are configured as preferred for providing
NAT/PAT services in an OpenStack environment.
Command Syntax
show ntp {peers | status [details] }
Command Mode
Login mode
Command Description
Use the show ntp command to display the status of the NTP client keeping time with the NTP server configured for the
controller.
Command Examples
controller-1> show ntp peers
remote refid st t when poll reach delay offset jitter
==============================================================================
*ada.selinc.com .PPS. 1 u 127 1024 377 31.251 -0.723 1.121
-resolver1.skyfi 216.218.254.202 2 u 295 1024 377 32.907 1.107 2.362
+getkratom.com 216.218.254.202 2 u 109 1024 377 8.097 -0.360 1.811
+ntp1.wiktel.com .PPS. 1 u 753 1024 337 72.776 0.127 0.671
Command Syntax
show nsx <nsx instance name> hardware-vtep [ cert | local-endpoint | local-vtep | member-rule | plugin-
error | plugin-local-vtep | plugin-mcast-local | plugin-mcast-remote | plugin-port | plugin-state |
plugin-ucast-local | plugin-ucast-remote | plugin-vni | remote-endpoint | server-state | state | vtep-
pair | plugin-ucast-remote ]
Command Mode
Login mode
Command Description
Use the show nsx command to display information about the NSX integration.
Command Examples
controller-1> show nsx NSX-Instance1 hardware-vtep state
# NSX Name Type Server IP address Server TCP Port Tenant Local Vtep NSX hardware VTEP
State Plugin Connected
-|-------------|----|-----------------|---------------|----------------|----------|---------------------
--|----------------|
1 NSX-Instance1 10.8.23.7 6640 NSX-Orchestrator 61.61.61.2 Active
True
< S N I P >
V91NKKphJSsSODxYsti1J7x/F3lSct4DnvlyEYzUeQ57aUO6NHtEnsYtomRav4Sg
bqVCJiJ1JEjHFPsQaFBnmgyNDaaNNjmwluc6mL8l/AQhvqSDCEKR9tm78po=
-----END CERTIFICATE-----
Command Syntax
show ospf segment
Command Mode
Login mode
Command Description
Use the show ospf command to display information about the OSPF configuration of each segment.
Command Examples
controller-1> show ospf
show prism-server
Command Syntax
show prism-server
show prism-server {<name> | all} connected-device cluster {<Nutanix cluster name> | all} [virtual-switch
{<virtual-switch name> | all}]
show prism-server {<prism-name> | all} endpoints cluster {<Nutanix cluster name> | all} [vm-name <vm-
name>]
Command Mode
Login mode
Command Description
Use the show prism-server command to display information about the Nutanix Prism instances integrated with BCF. Use the
show prism-server connected device command to display information about devices connected through Nutanix Prism
servers integrated with BCF. Use the show prism-server endpoints command to display information about endpoints
connected through Nutanix Prism servers integrated with BCF.
Command Examples
controller-1> show prism-server
# Prism Name Nutanix Prism Server Host Name or IP Automation Level Preserve BCF Config State Last
Nutanix Prism Update Time Detail State Version Last BCF Config Sync Time
-|----------|------------------------------------|----------------|-------------------|------------|----
--------------------------|------------|-------|-------------------------|
1 test none False disconnected
2018-05-19 22:05:40.392000 PDT disconnected
controller-1>
Command Syntax
show pswitch [all | <switch-name>] [connections [details] | [ details ]
Command Mode
Login mode
Command Description
Use the show pswitch command to display information about the physical switches in the fabric.
The connection state shown is a combination of two conditions:
• Control channel connection state on the current controller node to the switch
• Controller application view of the Active controller node regarding the switch connection
The connection state indicates the conditions summarized in the following table:
Command Syntax
show radius
Command Mode
Login mode
Command Description
Use the show radius command to display information about RADIUS configuration and operational state.
Command Syntax
show running-config [<running-config-keyword>] [details]
Command Mode
Login mode
Command Description
Use the show running-config command to display the entire active running-config, or the specified section of the running-
config.
Command Examples
controller-1# show running-config
!
! Big Cloud Fabric Appliance 2.0.11-SNAPSHOT (bcf_master #2002)
! Current Time: 2014-06-08.13:44:42
version 1.0
! ntp
ntp server 0.bigswitch.pool.ntp.org
! tacacs
tacacs server host 192.168.17.1
! aaa
aaa accounting exec default start-stop local
. . . <snip> . . .
Command Syntax
show secure control plane
Command Mode
Login mode
Command Description
Use the show secure control plane command to display the control plane status of the controller and to display information
about the certificate signing requests (CSRs) and certificates in the controller local repository.
Command Examples
The following shows the output when the secure control plane is off.
controller-1> show secure control plane
State Configured mode : off
State Current mode : off
Provision Issue : TLS must be fully configured before entering provision or lock mode
Provision Issue : Every controller in the cluster must have a valid certificate imported before
entering provision or lock mode
Lockdown Issue : The following switches have not been provisioned with valid certificates:
[leaf0-a, leaf0-b, leaf1-a, spine0, spine1]
~~~~~~~ Switches ~~~~~~~
# Switch State
-|-------|-------------|
1 leaf0-a unprovisioned
2 leaf0-b unprovisioned
3 leaf1-a unprovisioned
4 spine0 unprovisioned
5 spine1 unprovisioned
~ Certs ~
# Name
-|------|
1 cacert-example <====Use this certificate ID to import the CA root certificate to the
Active controller
Before entering provisioning mode the first time, this command displays the certificate signing requests (CSRs) for the
Active and Standby controllers. After the signed certificates are imported to the Active controller from the CA, the CSRs are
automatically removed.
The following example shows the controller in provisioning mode:
controller-2> show secure control plane
State Configured mode : provision
State Current mode : provision
. . . <snip> . . .
~~~~~~~~~~~~~~ Csrs ~~~~~~~~~~~~~~
# Name
-|--------------------------------|
1 34-17-eb-f7-a0-c4.switch.cluster
2 70-72-cf-ae-b6-34.switch.cluster
3 70-72-cf-b5-f4-5c.switch.cluster
4 70-72-cf-bd-58-34.switch.cluster
5 70-72-cf-c7-c1-ed.switch.cluster
This example displays the CSRs that were generated for each connected fabric switch. The CSR names are generated by
appending switch.cluster to the MAC address of each switch.
The following command shows the controller in lockdown mode:
controller-1> show secure control plane
State Configured mode : lockdown
State Current mode : lockdown
~~~~ Switches ~~~~
# Switch State
-|-------|--------|
1 leaf0-a lockdown
2 leaf0-b lockdown
3 leaf1-a lockdown
4 spine0 lockdown
5 spine1 lockdown
~ Csr ~
None.
Once the controllers have entered lockdown mode, no additional switches can join the fabric until the controller control
plane is returned to provision mode.
Command Syntax
show [tenant {<tenant-name> | all}]
segment {<segment-name> | all [counters |
rates [time-range {week | hour | month | year | day | minute} [<range-multiple>]]
[top-n-talkers <limit>]
Command Mode
Login mode
Command Description
Use the show segment command to display information about the logical segments defined in the fabric.
time-range: Display rates for a period of time indicated by the following keyword (week | hour | month | year | day |
minute).
<range-multiple>: Replace <range-multiple with an integer to display information related to multiple time units.
top-n-talkers <integer>: Display rates for the most active senders.
Command Examples
The following command displays information the logical segments in the fabric:
controller-1> show segment
# Tenant Segment Internal VLAN Member VLAN Total endpoints Active endpoints Total ports
--|-----------|-----------|-------------|-----------|---------------|----------------|-----------|
1 dt dt-seg4 5 1 0 32
2 dt dt-seg3 4 2 1 39
3 dt dt-seg2 3 4 2 41
<snip>
Command Syntax
show session [<session-id>] [details]
Command Mode
Login mode
Command Description
Use the show session command to display information about the sessions established to the management interface of the
local controller node.
Command Examples
controller-1# show session
# @ ID User Groups Full Name Ip Address Last Used
-|-|-------|-----|------|-------------|------------|------------------------------|
1 * 7346bb0 admin admin Default admin 192.168.17.1 2014-06-08 13:44:59.563000 UTC
Command Syntax
show sflow {summary | switch <switch-name> [ collectors | interfaces ] }
Command Mode
Login mode
Command Description
Use the show sflow command to view a summary of sFlow activity, or sFlow activity for a specific switch, collector, or
interface, enter the show sflow command, which has the following syntax:
Command Examples
The following command displays summary information about sFlow collectorsl.
controller-1# show sflow summary
'~ List of suspended sFlow collectors ~
None.
This command also lists the invalid collectors when IP addresses are not configured or the segment not present on the
logical router.
Command Syntax
show snapshot [<snapshot-name> [details]]
Command Mode
Login mode
Command Description
Use the show snapshot command to list any snapshots taken of the running-config (using the copy snapshot command).
Entering this command without keywords displays a summary listing of all the snapshots.
Command Examples
controller-1(config)# copy running-config snapshot://sept21
controller-1(config)# show snapshot
# Name Create Size Appliance Version Build
-|------|------------------------|----|----------|-----------------------|-----|
1 sept21 Sun Sep 21 12:26:09 2014 1701 bcf_master 2.0.1-master01-SNAPSHOT 3370
controller-1(config)# show snapshot sept21
!
! Saved-Config sept21
! Create Time: Sun Sep 21 12:26:09 2014
! Saved-Config version: 1.0
! Version: 2.0.1-master01-SNAPSHOT
! Appliance: bcf_master
! Build-Number 3370
<snip>
! tenant
tenant Red
logical-router
next-hop-group external1
tenant system
Command Syntax
show span-fabric {<span-fabric-session-name>}}{switch {<switch-name> | all}
Command Mode
Login mode
Command Description
Use the show span-fabric command to display information about the specified span-fabric session.
Command Examples
controller-1# show span-fabric test1 switch all
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Span-Fabric Destination on Switch ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Session Name Switch Priority Destination Interface-group Name Destination interfaces on
Switch
------------|------------------|--------|---------------------------|--------------------------------|
test1 leaf0-b 1 yrdy23
test1 leaf0-a 1 yrdy23
test1 leaf1-a 1 yrdy23
test1 tmk-mininet-leaf-0 1 yrdy23
test1 tmk-mininet-leaf-2 1 yrdy23
Command Syntax
show span-local
Command Mode
Login mode
Command Description
Command Syntax
show storm-control [switch <switch> [interface <interface>]
Command Mode
Login mode
Command Description
Use the show storm-control command to display the active configuration of Storm Control on fabric switches. Enter this
command with the switch name to display the leaf switch edge ports where Storm Control can be applied.
Command Examples
controller-1> show storm-control switch leaf2-b
# Switch Name IF Name Profile Name Broadcast Rate Known Multicast Rate Unknown Multicast Rate
Unknown Unicast Rate State
--|-----------|----------|------------|--------------|--------------------|----------------------|------
--------------|------------------------|
1 leaf2-b ethernet12 stcntrl2 20% 25% 25% 25%
error-interface-not-edge
2 leaf2-b ethernet14 stcntrl2 20% 25% 25% 25%
error-interface-not-edge
3 leaf2-b ethernet16 stcntrl2 20% 25% 25% 25%
error-interface-not-edge
4 leaf2-b ethernet18 stcntrl2 20% 25% 25% 25%
enabled
5 leaf2-b ethernet24 stcntr1 10% 20% 20% 20%
enabled
6 leaf2-b ethernet44 stcntrl2 20% 25% 25% 25%
error-interface-not-edge
7 leaf2-b ethernet46 stcntrl2 20% 25% 25% 25%
error-interface-not-edge
8 leaf2-b ethernet48 stcntrl2 20% 25% 25% 25%
enabled
9 leaf2-b ethernet49 stcntrl2 20% 25% 25% 25%
error-interface-not-edge
10 leaf2-b ethernet50 stcntrl2 20% 25% 25% 25%
error-interface-not-edge
When a storm-control profile is applied, it is shown the state as “enabled”. If it is not applied due to peer link, fabric link or
internal link, the state column will show the error “error-interface-not-edge”.
Note: 100% indicates that no threshold has been set, and there is no limit on the percentage of traffic allowed by the
specific type of traffic.
Command Syntax
show support [switch] [<name>]
Command Mode
Login mode
Command Description
Use the show support command to display the list of available diagnostic bundles of information about the controllers and
switches previously generated for technical support.
Command Examples
controller-1> show support
# Bundle size
-|------------------------------------------------------------------------|-----|
1 floodlight-support--controller--2014-09-29--02-13-47--UTC--XIoXF0.tar.gz 361KB
controller-1>
The following command displays the switches that have core dumps for analysis by tech support.
controller-1> show support switch
Name Dpid Has core
-------|-----------------------|--------|
leaf0-b 00:00:70:72:cf:b5:f4:a6 False
spine0 00:00:70:72:cf:ae:b6:34 True
spine1 00:00:70:72:cf:bd:58:34 False
leaf0-a 00:00:70:72:cf:b5:f4:5c True
leaf1-a 00:00:70:72:cf:bc:c4:c4 False
Command Syntax
show switch <switch-name>
interface [<interface> | all ] [dom | pfc | queue | utilization | counters | endpoint | properties |
rates ] |
Command Mode
Login mode
Command Description
Use the show switch agent-counters command to display the agent counters for a specific switch or for all switches. Use the
show switch counters or rates command to display the statistics counters or rates for a specific interface on a specific
switch, for all interfaces on a specific switch, or for all interfaces on all switches.
Note: After a switch reboot or after removing or adding tenants and segments, counters may display high values.
Use the show switch switch-view command to show the controller status or connections from the point of view of the
specified switch. Use the show switch connections command to display connection information about all fabric switches or
a specific switch. The connection state shown is a combination of two conditions:
• Control channel connection state on the current controller node to the switch
• Controller application view of the Active controller node regarding the switch connection
The connection state indicates the conditions summarized in the following table:
Note: vSwitches use the Unicast queues for unknown traffic, while physical switches use the multicast queues.
rates [drops | errors | incoming | outgoing] | queues: view the average current rate for dropped packets, errors, incoming
packets, outgoing packets, and packets queued due to congestion.
agent-counters Display counters for various agents on the switch.
management-ip: Displays the IP address assigned to the management interface of all connected switches. The output does
not include switches that are either disconnected or inactive at the time the command is entered.
manifest: Display switch manifest.
pimu-counters: Display PIMU counters for the specified switch.
running-config Display switch startup-config.
secure-control-plane: Display the certificate and other secure control plane information about the specified switch.
switch-view: Display switch details from switch perspective.
version [details]: Display switch version of switches connected to the controller. Use the details keyword to show more
information about the versions.
zerotouch: Display Zerotouch state.
Command Examples
The following command shows all queue counters for interface ethernet17 on switch leaf1-a:
controller-1# show switch leaf1-a interface ethernet17 queue all counters
# Switch Name IF Name QoS Traffic Class Tx UCast Bytes Tx UCast Pkts Tx UCast Dropped Pkts Tx
MCast Bytes Tx MCast Pkts Tx MCast Dropped Pkts
-|-----------|----------|-------------------------|--------------|-------------|---------------------|--
------------|-------------|---------------------|
1 leaf1-a ethernet17 traffic-class-0 1440 20 0
2160 30 0
2 leaf1-a ethernet17 traffic-class-1 0 0 0 0
0 0
3 leaf1-a ethernet17 traffic-class-2 0 0 0 0
0 0
4 leaf1-a ethernet17 traffic-class-3 62773009830 13604913 0 0
0 0
5 leaf1-a ethernet17 traffic-class-pfc 0 0 0 0
0 0
6 leaf1-a ethernet17 traffic-class-span-fabric 0 0 0 0
0 0
7 leaf1-a ethernet17 traffic-class-inband 0 0 0 0
0 0
controller-1#
The following command shows the drop counters for all interfaces on all switches:
controller-1> show switch all interface all counters drops
# IF Name Rx Drop Tx Drop
---|----------|----------|-------|
1 ethernet1 0 0
2 ethernet2 0 0
3 ethernet3 4 0
4 ethernet4 0 0
. . .
The following command shows the environmental information for switch leaf1-a:
controller-1# show switch leaf1-a environment
Report : Fan 1
Description: Chassis Fan 1
State: Present
Status: Running.
RPM: 8100.
Speed: 48%.
Airflow: Back-to-Front.
<snip>
Thermal 1
Description: Chassis Thermal Sensor 1 (Sensor on CPU board)
Status: Sensor Functional
Temperature: 33.0 C.
<snip>
PSU 1
Description: PSU-1
State: Present
Status: Running.
Model: CPR-4011-4M21
Type: AC
Vin: 211.0
Vout: 12.0
Iin: 0.3
Iout: 5.5
Pin: 74.0
Pout: 66.0
Fan 6
<snip>
The following command shows information about all queues on switch leaf0-a:
controller-1# show switch leaf0-a cpu-queue all counters
Reg01-HW-C2# show switch leaf0-a cpu-queue all counters
# Switch Name IF Name Queue ID Tx Bytes Tx Pkts Tx Errors
-|-----------|-------|--------|--------|-------|---------|
1 leaf0-a CPUPort 0 4905 45 0
2 leaf0-a CPUPort 1 8419 65 0
. . . <snip>. . .
The following command shows information about the software images on switch leaf1-a:
controller-1# show switch leaf1-a images
The following command shows the point of view for switch leaf0-a regarding the controller:
controller-1# show switch leaf0-a switch-view controller
Report : IP:Port State Role #Aux 10.8.25.26:6653 CONNECTED
MASTER 3
The following command shows the PIMU counters for switch leaf0-a:
controller-1# show switch leaf0-a pimu-counters
# Switch Name PIMU Group Name Invoke Packets Drop Packets Forward Packets Forward Prio Packets Error
Packets
--|-----------|---------------|--------------|------------|---------------|--------------------|--------
-----|
1 leaf0-a L2_miss_move 0 0 0 0 0
2 leaf0-a L3_miss_ttl 0 0 0 0 0
. . . <snip> . . .
The following command shows the version for all switches connected to the controller:
controller-1> show switch all version
# Switch Hardware Implementation Version
--|-------------------|-----------------------------|---------------|-------------------|
1 hv0 Bochs Bochs Switch Light VX SWL-VX-BCF-3.1.0(0)
2 hv1 Bochs Bochs Switch Light VX SWL-VX-BCF-3.1.0(0)
3 hv2 Bochs Bochs Switch Light VX SWL-VX-BCF-3.1.0(0)
4 hv3 Bochs Bochs Switch Light VX SWL-VX-BCF-3.1.0(0)
5 hv4 Bochs Bochs Switch Light VX SWL-VX-BCF-3.1.0(0)
6 hv5 Bochs Bochs Switch Light VX SWL-VX-BCF-3.1.0(0)
7 leaf0-a powerpc-accton-as5710-54x-r0b Switch Light OS SWL-OS-BCF-3.1.0(0)
8 leaf0-b powerpc-accton-as5710-54x-r0b Switch Light OS SWL-OS-BCF-3.1.0(0)
9 leaf1-a powerpc-accton-as5710-54x-r0 Switch Light OS SWL-OS-BCF-3.1.0(0)
The following command shows more details about the version for all switches connected to the controller:
controller-1> show switch all version details
# Switch Hardware Implementation Build Version Loader version
Next loader version Onie Next onie Cpld Next cpld
--|---------------------------------------|-----------------------------|---------------|------------------------|-------------------|------------------
1 hv0 (00:00:00:03:00:01) Bochs Bochs Switch Light VX 2015-10-07.00:17-60a8572 SWL-VX-BCF-3.1.0(0)
2 hv1 (00:00:00:03:00:02) Bochs Bochs Switch Light VX 2015-10-07.00:17-60a8572 SWL-VX-BCF-3.1.0(0)
3 hv2 (00:00:00:03:00:03) Bochs Bochs Switch Light VX 2015-10-07.00:17-60a8572 SWL-VX-BCF-3.1.0(0)
4 hv3 (00:00:00:03:00:04) Bochs Bochs Switch Light VX 2015-10-07.00:17-60a8572 SWL-VX-BCF-3.1.0(0)
5 hv4 (00:00:00:03:00:05) Bochs Bochs Switch Light VX 2015-10-07.00:17-60a8572 SWL-VX-BCF-3.1.0(0)
6 hv5 (00:00:00:03:00:06) Bochs Bochs Switch Light VX 2015-10-07.00:17-60a8572 SWL-VX-BCF-3.1.0(0)
7 leaf0-a (70:72:cf:b5:f4:5c) powerpc-accton-as5710-54x-r0b Switch Light OS 2015-10-12.21:22-709a654 SWL-OS-BCF-3.1.0(0) SWL-OS-BCF-
3.1.0(0),2015-10-12.21:22-709a654 SWL-OS-BCF-3.1.0(0),2015-10-12.21:22-709a654 2015.05.00.01 2015.05.00.01 6.6.6 6.6.6
8 leaf0-b (70:72:cf:b5:f4:a6) powerpc-accton-as5710-54x-r0b Switch Light OS 2015-10-12.21:22-709a654 SWL-OS-BCF-3.1.0(0) SWL-OS-BCF-
3.1.0(0),2015-10-12.21:22-709a654 SWL-OS-BCF-3.1.0(0),2015-10-12.21:22-709a654 2015.05.00.01 2015.05.00.01 6.6.6 6.6.6
9 leaf1-a (70:72:cf:c7:c1:ed) powerpc-accton-as5710-54x-r0 Switch Light OS 2015-10-12.21:22-709a654 SWL-OS-BCF-3.1.0(0) SWL-OS-BCF-
3.1.0(0),2015-10-12.21:22-709a654 SWL-OS-BCF-3.1.0(0),2015-10-12.21:22-709a654 2015.02.00.05 2015.02.00.05 6.6.6 6.6.6
controller-1>
The show switch interface properties command displays the interface configuration for breakout-capable interfaces, as in
the following example:
controller-1(config)# show switch spine0 interface all properties
# Switch IF Name MAC Address Config State Adv. Features Curr Features Supported Features peer features
--|------|-----------|-----------------|------|-----|--------------|--------------|-----------------------------|-------------|
1 spine0 ethernet1 5c:16:c7:1f:b9:48 up down 40gb-fd 40gb-fd 40gb-fd, bsn-breakout-capable
Breakout ports are indicated by a slash and the sequence number after the interface name, such as ethernet17/1. The
following example shows information about a specific breakout port.
If you enter the show switch command without specifying the interface, information about all the interfaces on the switch
is displayed.
If BPDU Guard is disabled and one or more ports are shut down because there is no link to a peer switch, the error
condition is shown in the output from the show switch command when you identify an affected interface, as in the
following example:
bcf-controiller1> show switch leaf1-b interface ethernet14
# Switch IF Name IF Type IF State IF Down Reason LACP State BPDU-Guard State Curr Features
-|-------|----------|-------|--------|------------------------------------------------------|----------|------------------------------|---------------|
1 leaf1-b ethernet14 unknown down BPDU-Guard-Disabled Port Down caused by empty peer LAG inactive error-peer-link-empty-shutdown 10gb-fd, copper
The BPDU Guard State is shown as “error-peer-link-empty-shutdown” and the IF Down Reason is “Guard-Disabled Port
Down caused by empty peer.”
The following command displays statistics about hosts connected to fabric switches:
controller-1> show switch all host-stats
# Switch DPID Distribution description Mem total Mem free 1 min 5 min 15 min
-|-----------|------------------------------------|---------|--------|--------|--------|--------|
1 tmk CentOS Linux release 7.1.1503 (Core) 31.2GB 25.0GB 0.700000 0.530000 0.340000
The following command displays information about the versions of each virtual and physical switch connected to the
controller::
controller-1> show switch version details
Next loader version Onie Next onie Cpld Next cpld
-|--------------------------------------|-----------------------------|---------------|------------------------|-------------------
|--------------------------------------------|--------------------------------------------|-------------|-------------|-----|-------
--|
1 dt-leaf1a (70:72:cf:b7:6d:f0) powerpc-accton-as5710-54x-r0b 2015-10-07.01:00-5716978
SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 2015.05.00.01 2015.05.00.01 6.6.6 6.6.6
2 dt-leaf1b (70:72:cf:bc:cf:2c) powerpc-accton-as5710-54x-r0b 2015-10-07.01:00-5716978
SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 2015.05.00.01 2015.05.00.01 6.6.6 6.6.6
3 dt-leaf2a (70:72:cf:b7:6d:12) powerpc-accton-as5710-54x-r0b 2015-10-07.01:00-5716978
SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 2015.05.00.01 2015.05.00.01 6.6.6 6.6.6
4 dt-leaf2b (70:72:cf:b5:ff:ec) powerpc-accton-as5710-54x-r0b 2015-10-07.01:00-5716978
SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 2015.05.00.01 2015.05.00.01 6.6.6 6.6.6
5 dt-spine1 (70:72:cf:ae:a5:f4) powerpc-accton-as6700-32x-r0 2015-10-07.01:00-5716978
SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 2014.08.00.11 2014.08.00.11 0.3 0.5
6 dt-spine2 (70:72:cf:ae:a0:5e) powerpc-accton-as6700-32x-r0 2015-10-07.01:00-5716978
SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 SWL-OS-BCF-3.1.0(0),2015-10-07.01:00-5716978 2014.08.00.11 2014.08.00.11 0.3 0.5
controller-1>
The following command displays the certificate and other secure control plane information about the specified switch:
controller-1> show switch spine0 secure control plane
Next tls mode : off
Certificate issuer : /countryName=US/stateOrProvinceName=CA/organizationName=Big Switch
Networks/localityName=Santa Clara/commonName=Engineering/organizationalUnitName=Switch
Light/[email protected]
Certificate start : 2015-12-07 09:36:50 UTC
Tls mode : off
Openflow tls mode : off
Certificate validity : False
Certificate end : 2025-12-04 09:36:50 UTC
Certificate modulus :
F4AFDA90D24F1860A49566C1F1B159F76E04ADE7D9918EF658382DB6C15CA545F63A6B9643BC9C01BE564048C4A59346DFBACF8E
A227A1DDC7D90618B563789E18D3BF3C63D9D02973B0799F222076288373F70C4CAD184E89985459DA4E6618A4B2074E647A8138
E6C45714DBA1EA1940653E9BC8E67A70EAD4AE45FABB7C55904C9232FFEA7D36044230864C534B3839D246936B6A0DEF7ED19D01
0C35F03C2095BA49E07D669A0CB88A040FE4F6DF9CCF7CEEBFE0A134A8A3AF41C818470761367F3DAFD2AA4A20E8C65EA5E92FEE
1C12224B0B145B7A93BBAF9A3B1CFB7B22E31E4849FFC0603746726925ABE0CD31B7A1327A6D284EF111439F8FF1142B
Key modulus :
F4AFDA90D24F1860A49566C1F1B159F76E04ADE7D9918EF658382DB6C15CA545F63A6B9643BC9C01BE564048C4A59346DFBACF8E
A227A1DDC7D90618B563789E18D3BF3C63D9D02973B0799F222076288373F70C4CAD184E89985459DA4E6618A4B2074E647A8138
E6C45714DBA1EA1940653E9BC8E67A70EAD4AE45FABB7C55904C9232FFEA7D36044230864C534B3839D246936B6A0DEF7ED19D01
0C35F03C2095BA49E07D669A0CB88A040FE4F6DF9CCF7CEEBFE0A134A8A3AF41C818470761367F3DAFD2AA4A20E8C65EA5E92FEE
1C12224B0B145B7A93BBAF9A3B1CFB7B22E31E4849FFC0603746726925ABE0CD31B7A1327A6D284EF111439F8FF1142B
Certificate subject : /countryName=US/stateOrProvinceName=CA/organizationName=Big Switch
Networks/localityName=Santa Clara/commonName=Engineering/organizationalUnitName=Switch
Light/[email protected]
controller-1>
Command Syntax
show system {storage | process [<pid>] [details]}
Command Mode
Login mode
Command Description
Use the show system command to display information about the local controller node, including processes currently
running and the hard disk storage.
Command Examples
The following command displays information about system persistent (hard disk) storage:
controller-1> show system storage
# Device Path Blocks Avail In Use Percent
-|---------|--------|--------|--------|-------|-------|
1 tmpfs /run 204456 203744 712 0%
2 /dev/sda3 / 7913648 5246924 2666724 33%
3 /dev/sda5 /var/log 17732476 17553064 179412 1%
controller-1>
The following command displays information about processes running on the local controller node:
controller-1> show system process
# id Command
--|----|------------------------------------------------------------|
1 1 /sbin/init
2 383 upstart-udev-bridge--daemon
3 386 /sbin/udevd--daemon
4 539 /sbin/udevd--daemon
5 540 /sbin/udevd--daemon
. . . <snip> . . .
controller-1>
Command Syntax
show tacacs
Command Mode
Login mode
Command Description
Use the show tacacs command to display the aaa server operational state, global aaa sources and services, as well as any
configured TACACS+ servers and parameters.
Command Syntax
show tenant {<tenant-name> | all} [counters | rates [time-range | top-n-talkers] |
[segment {<segment-name> | all [counters | rates [time-range {week | hour | month | year | day | minute}
[<range-multiple>]] [top-n-talkers <limit>] |
Command Mode
Login mode
Command Description
Use the show tenant command to display information about the tenant and the objects configured with tenants in the
fabric or a specific tenant. The show segment, show debug bgp, show logical-router, show endpoint, and show nat-
endpoint commands can be used as separate commands but can also be used as options with the show tenant command to
limit the information to a specific tenant.
segment <segment-name> | all: Replace <segment-name> with the name of a specific segment or use the all keyword to
display information about all segments.
time-range: Display rates for a period of time indicated by the following keyword (week | hour | month | year | day |
minute).
<range-multiple>: Replace <range-multiple with an integer to display information for a longer duration, based on the
preceding time-range unit keyword. For example, time-range hour 3, provides information about the most recent 3-hour
period.
top-n-talkers <integer>: Display rates for the most active senders.
mac-membership ignored-endpoint [mac <mac>] | rule: Display information about MAC membership rules. Use the
ignored-endpoint keyword to display MAC addresses that have transmitted traffic on interfaces belonging to a MAC
classification pool, but for which no MAC membership rule exists. Use the optional mac keyword with a specific MAC
address to identify the interface where the ignored endpoint appeared. Use the rule keyword to display MAC membership
rules.
member-rule: Display the membership rules configured on the controller. To filter the member rules displayed, specify the
tenant name, switch and interface, interface group name, or VLAN.
interface-group<interface-group-name>: Specify the name of the interface group.
bgp: Displays information about BGP for the specified tenant. This option requires one of the following keywords:
• details Display details about BGP sessions.
• neighbor [<neighbor-ip>] Display information about BGP neighbors, or optionally, replace <n eighbor-ip> with the IP
address of a specific neighbor.
• route: Display information about BGP routes. This command displays inactive BGP routes that are less preferred
compared to other protocols, such as OSPF.
• segment: Display segment details for BGP segments.
• summary: Display summary for BGP sessions, including Soft Reconfig status and Prefix Recvd Count.
endpoint: Display information about a specific endpoint, identified by one of the following:
• mac <mac>: Display information about the endpoint with the specified MAC address.
• ip <ip-address>: Display information about the endpoint with the specified IP address.
• <endpoint-name>: Display information about the endpoint with the specified name.
• incomplete: Display information about incomplete endpoints.
• details: Display detailed information about incomplete endpoints.
logical-router: Display information about all logical routers in the fabric or in the specified tenant. This keyword provides
the following options:
• applied-policy: View the rules in the policy list that have been applied on logical routers in all tenants in the fabric or in
the specified tenant.
• dchp: View information about DHCP relay configuration on segment interfaces of logical routers in all tenants in the
fabric or in the specified tenant.
• detail: Display all the information about the logical routers in all tenants in the fabric or in the specified tenant.
• dhcp: Use the show logical-router dhcp command to view information about DHCP relay configuration on segment
interfaces of logical routers in all tenants in the fabric or in the specified tenant. dynamic-route-next-hop: Use the show
logical-router dynamic-route-next-hop command to view information about the members of the next hop groups that
are used for dynamic routes. This is for logical routers in all tenants in the fabric or in the specified tenant.
• dynamic-route-next-hop: Display information about the logical routers in all tenants in the fabric or in the specified
tenant.
• floating-ip: Display information about the floating IPs configured on logical routers in all tenants in the fabric or in the
specified tenant.
• incomplete: View information about incorrect, inactive or missing configuration on logical routers in all tenants in the
fabric or in the specified tenant.
• interface [segment | tenant]: View information about the tenant and segment logical router interfaces on logical
routers in all tenants in the fabric or in the specified tenant.
• nat-profile: Display information about the NAT profiles configured on logical routers in all tenants in the fabric or in the
specified tenant.
• next-hop-group: View information about the members of the next hop groups configured on logical routers in all
tenants in the fabric or in the specified tenant.
• pat-profile: View information about the P-NAT profiles configured within logical routers in all tenants in the fabric or in
the specified tenant.
• policy-list: View information about policy lists configured within logical routers in all tenants in the fabric or in the
specified tenant.
• prefix-list: View information about BGP prefix lists configured within logical routers in all tenants in the fabric or in the
specified tenant.
• route [imported]: View information about all configured static routes in logical routers in all tenants in the fabric or in
the specified tenant. Use the imported option to display information about routes imported to the specified tenant
from the system tenant logical router.
nat-endpoint: Display information about NAT endpoints associated with the specified tenant and segment or with all
segments or with all tenants.
• mac <mac>: Display information about the endpoint with the specified MAC address.
• ip <ip-address>: Display information about the endpoint with the specified IP address.
• switch <switch-name> | all: Display endpoints attached to a specific switch or use the all keyword for all switches.
• logical-router {<tenant-name> | all}: Display endpoints attached to a specific logical router or use the all keyword for all
logical routers.
remote-vtep {<remote-vtep> | ip <remote-vtep-ip>}: Display information about the remote VXLAN Termination Endpoint
(VTEP)
vxlan remote-endpoint [mac <MAC> | ip <endpoint-ip-address>]:
Command Examples
The following command displays the BGP neighbor name and Soft Reconfig information:
bcf-controlller1# show tenant test1 bgp sum
Tenant : test1
Protocol IP : 50.1.1.2
Router ID : 50.1.1.2
Local AS : 50
Peer Count : 3
Route resync in progress : False
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Peers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Peer Name Peer ID Remote AS Version Msg Rcvd Msg Sent Out Queue In Queue Flaps Uptime Soft
Reconfig Inbound Prefix Rcvd Count Prefix Accepted Count Prefix Applied Count State
-|--------------|------------|---------|-------|--------|--------|---------|--------|-----|--------|----
-----------------|-----------------|---------------------|--------------------|-----------|
1 test50b 172.16.150.1 50 4 2029 1961 0 0 0 03:15:38 False
N/A 1 0 Established
2 switch-50-vrrp 172.16.230.1 50 4 596 396 0 0 0 03:15:43 True
15610 15610 15609 Established
3 switch-50a 50.1.1.1 50 4 2202 1976 0 0 0 03:17:10
False
The Soft Reconfig column indicates "True" or "False" based on whether this option is configured for the BGP neighbor.
When "True", the column "Prefix Rcvd Count" is populated. Otherwise, it is "N/A."
The following command displays the 7 most active senders in all tenants:
controller-1# show tenant all rates top-n-talkers 7
# Tenant Name Interval sec Rx Byte/s Rx Pkt/s Tx Byte/s Tx Pkt/s Timestamp
-|-----------|------------|---------|--------|---------|--------|-----------------------|
1 ixia-test 60 2.42MBps 19.8K 2.42MBps 19.8K 2015-04-29 17:48:00 PDT
2 dt 60 40.3KBps 290 698KBps 572 2015-04-29 17:48:00 PDT
3 external 60 696KBps 561 40.1KBps 289 2015-04-29 17:48:00 PDT
controller-1#
The following command displays a summary of information about BGP for the specified tenant::
controller-1# show tenant BGP bgp summary
Tenant : BGP
Protocol IP : 200.200.250.14
Router ID : 200.200.250.14
Local AS : 100
Peer Count : 1
Route resync in progress : True
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Peers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Peer ID Remote AS Version Msg Rcvd Msg Sent Out Queue In Queue Flaps Uptime Prefix received
count Prefix Accepted Count Prefix Applied Count State
-|------------|---------|-------|--------|--------|---------|--------|-----|--------|-------------------
--|---------------------|--------------------|-----------|
1 100.14.201.1 100 4 4 5 0 0 0 00:00:04
7 6 Established
Note: When the route resync in progress field is True, a discrepancy may be observed between the show tenant all bgp
route and show logical-router route dynamic commands.
The following example shows the routes imported to tenantA from the system tenant:
controller-1# show tenant tenantA logical-router route imported
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Route Table ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Tenant Name Dest Cidr Type Next Hop Tenant Next Hop Next Hop IP Status
--|-----------|---------------|--------|---------------|--------|-----------|------|
1 tenantA 40.40.40.0/24 imported system Active
2 tenantA 172.16.1.0/30 imported system Active
3 tenantA 172.16.2.0/30 imported system Active
4 tenantA 172.16.101.0/30 imported system Active
5 tenantA 172.16.102.0/30 imported system Active
6 tenantA 172.16.201.0/24 imported system Active
7 tenantA 172.16.214.0/30 imported system Active
The following command displays BGP routes for a given tenant and neighbor:
controller-1> show tenant tenant48 logical-router route imported
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Route Table ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Tenant Name Dest Cidr Preference Type Next Hop Tenant Next Hop Next Hop IP Status
-------------------------------------------------------------------------------|
1 tenant48 172.16.1.0/30 0 imported system Active
2 tenant48 172.16.1.1/32 0 imported system Inactive
3 tenant48 172.16.2.0/30 0 imported system Active
4 tenant48 172.16.2.1/32 0 imported system Inactive
5 tenant48 172.16.101.0/30 0 imported system Active
6 tenant48 172.16.101.1/32 0 imported system Inactive
7 tenant48 172.16.102.0/30 0 imported system Active
8 tenant48 172.16.102.1/32 0 imported system Inactive
9 tenant48 172.16.201.0/24 0 imported system Active
10 tenant48 172.16.201.1/32 0 imported system BGP Export Only
11 tenant48 172.16.211.0/24 0 imported system Active
The BGP Export Only status indicates that the route originates from a BCF extended segment.
Command Syntax
show test path <test-name>
Command Mode
Enable or config mode
Command Description
Use the show test command to display the actual path taken by packet programmed by test path command with test path
command with the fabric-view option. See the test path command for details about how to use the fabric-view option. You
can use the show test command to display previously configured test path instances. Use the show test command with the
name of the instance after injecting traffic of the specified protocol on the path being tested.
Note: To see changes in topology that occur after entering the test path command, wait 10 seconds or more. To see any
changes that occurred less than 10 seconds before the test expiration, re-enter the command.
Command Examples
The following command displays the status of Fabric View test path instances:
controller-1# show test path
# Test Name Test Configuration Test Status Expires In (s)
-|---------|----------------------------------------------|-----------|--------------|
1 test1 src-name bm1 dst-ip 50.0.0.1 ip-protocol icmp timedout
The following command injects ICMP traffic on the path being tested by the test path instance test1 and displays the results
of the test:
controller-1# ping 50.0.0.1
controller-1# show test path test1
Command Syntax
show this
Command Mode
Nested submodes
Command Description
Use the show this command to display the path and current configuration for a nested object related to the current CLI
submode.
Command Examples
The following command shows the configuration of the segment web:
controller-1(config)# tenant Red
Command Syntax
show upgrade {fabric errors {pre-upgrade | since-upgrade} show images | staged | progress [continuous]}
[details]
Command Mode
Login mode
Command Description
Use the show upgrade command to display the status of the controller upgrade process.
Command Examples
The following command shows the status of the upgrade process:
controller-1-> show upgrade progress
Upgrade new/active: state: Local: phase-1-migrate-traffic-and-services Remote: phase-1-migrate-traffic-
and-services upgrading-active Paused until: 2017-06-20 15:32:03 UTC (20:46 left)
controller-1->
In this example, the upgrade has been paused using the pause option with the upgrade command.
Command Syntax
show user [<user-name> [details]]
Command Mode
Login mode
Command Description
Use the show user command to display information about all administrative user accounts or about the specified account.
Command Examples
controller-1# show user
# User name Full name Groups
-|---------|-------------|------|
1 admin Default admin admin
2 bob
Command Syntax
show vcenter [<vcenter-name>]
Command Mode
Login mode
Command Description
Use the show vcenter command to display information about all vCenter instances configured on the controller or a specific
instance.
Command Examples
controller-1# show vcenter
# vCenter Name Host name Tenant Preserve bcf config State Last update time Detail
Version Bcf sync time vSphere gui-plugin version Permission
-|------------|-----------|------|-------------------|------------|------------------------------|------
-------------------------------------------------------------|-------|------------------------------|---
-----------------------|----------|
1 VC1 10.8.20.100 VC1 False connected 2016-12-12 08:42:34.834000 PST
Connected and authenticated 6.0.0 2016-12-12 08:42:34.834000
PST read-write
2 wjt-test False disconnected 2016-12-12 08:42:53.765000 PST
Invalid vCenter Configuration: missing host, user, password, tenant
read-only
controller-1#
Command Syntax
show version [ details | switch-image ]
Command Mode
Login mode
Command Description
Use the show version command to display information about the software version currently running on the controller
Version information of various components
Command Examples
The following command displays the version of the controller:
controller-1> show version
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Appliance ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Name : Big Cloud Fabric
Build date : 2017-05-04 08:11:15 UTC
Build user : bsn
Ci build number : 9315
Ci job name : bcf-master
Community edition : False
Product type : BCF
Release string : Big Cloud Fabric 4.2.0-master-SNAPSHOT (bcf-master #9315)
Version : 4.2.0-master-SNAPSHOT
controller-1>
The following example displays information about the Switch Light OS software images:
controller-1> show version switch-image
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Files ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# File checksum manifest version operation
-|------------------------------------------------------------------|--------------------------------|----------------|-----------|
1 switchlight-SWL-BCF-2.5.0-amd64-release-2014.12.19.15.41.swi 468e3d8d7f219e9199f0e79705e67f4e 1 ztn-runtime
<snip>
Command Syntax
show vswitch [all | <switch-name> ] [connections [ details ] | details | host-stats | version [ details
]]
Command Mode
Login mode
Command Description
Use the show vswitch command to display information about the vLeaf switches (Switch Light Virtual instances) in the
fabric.
The connection state shown is a combination of two conditions:
• Control channel connection state on the current controller node to the switch
• Controller application view of the Active controller node regarding the switch connection
The connection state indicates the conditions summarized in the following table:
Command Syntax
show vxlan [ extended-segment | remote-endpoint | remote-vtep | vtep-pair ]
Command Mode
Login mode
Command Description
Use the show vxlan command to display information about Virtual Extensible LAN (VXLAN) configuration, extended
segments, endpoints on a remote VXLAN network, or the VXLAN Termination Endpoint (VTEP).
Command Syntax
show where [details]
Command Mode
Login mode
Command Description
Use the show where command to display details about the current CLI submode.
Command Examples
controller-1(config-tenant)# show where
Mode Related Object
-------------|-------------------|
08
config-tenant Tenant Name:Red
controller-1(config-tenant)# Fall
Command Syntax
show zerotouch request [mac-addr <MAC-address>
Command Mode
Login mode
Command Description
Use the show zerotouch command to display a Zero Touch request.
Command Examples
controller-1> show zerotouch request
# Request-history Ip address Action Timestamp
Result Message
-|----------------------------|--------------------------|--------------|------------------------------
|-----------------|-------------------------------------------------------------------------------------
----------|
1 00:01:e8:d8:55:0d (Force10) fe80::201:e8ff:fed8:550d%2 mdns-discovery 2018-02-20 01:27:39.003000 PST
unable-to-service No switch name configured for switch mac 00:01:e8:d8:55:0d
2 08:9e:01:f8:6b:8b (QUANTA) fe80::a9e:1ff:fef8:6b8b%2 mdns-discovery 2018-02-20 01:27:44.180000 PST
unable-to-service No switch name configured for switch mac 08:9e:01:f8:6b:8b
3 70:72:cf:e6:01:43 (EdgeCore) fe80::7272:cfff:fee6:143 onie-install 2018-02-20 01:27:48.416000 PST
unable-to-service ONIE is not allowed for this device: No switch name configured for switch mac
70:72:cf:e6:01:43
Documentation Feedback
We look forward to hearing from you. To provide technical feedback on this document, or to report an error or omission, please
send your comments to [email protected]. We appreciate your feedback.
Copyright 2018 Big Switch Networks, Inc. All rights reserved. Big Switch Networks, Big Cloud Fabric, Big Tap, Switch Light OS, and Switch Light vSwitch are trademarks or registered trademarks of Big
Switch Networks, Inc. All other trademarks, service marks, registered marks or registered service marks are the property of their respective owners. Big Switch Networks assumes no responsibility for any
inaccuracies in this document. Big Switch Networks reserves the right to change, modify, transfer or otherwise revise this publication without notice.