0% found this document useful (0 votes)
53 views22 pages

OcNOS System Management Quick Config

OcNOS System Management Quick Config

Uploaded by

gstar33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views22 pages

OcNOS System Management Quick Config

OcNOS System Management Quick Config

Uploaded by

gstar33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

OcNOS®

Open Compute
Network Operating System
for Service Providers
Version 4.0

System Management
Quick Configuration Guide
January 2021

IP Infusion Inc. Proprietary


© 2021 IP Infusion Inc. All Rights Reserved.

This documentation is subject to change without notice. The software described in this document and this documentation
are furnished under a license agreement or nondisclosure agreement. The software and documentation may be used or
copied only in accordance with the terms of the applicable agreement. No part of this publication may be reproduced, stored
in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and
recording for any purpose other than the purchaser's internal use without the written permission of IP Infusion Inc.

IP Infusion Inc.
3965 Freedom Circle, Suite 200
Santa Clara, CA 95054
+1 408-400-1900
http://www.ipinfusion.com/

For support, questions, or comments via E-mail, contact:


[email protected]

Trademarks:
IP Infusion, OcNOS, VirNOS, ZebM, ZebOS, and ZebOS-XP are trademarks or registered trademarks of IP Infusion. All
other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective
owners.

Use of certain software included in this equipment is subject to the IP Infusion, Inc. End User License Agreement at http://
www.ipinfusion.com/license. By using the equipment, you accept the terms of the End User License Agreement.

ii IP Infusion Inc. Proprietary


Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Chapter Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi

CHAPTER 1 Understanding User Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 7


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

CHAPTER 2 Understanding SSH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Enable and Disable SSH Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Configure SSH Server Login Attempts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Configure SSH Server Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

CHAPTER 3 Understanding Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Enable and Disable the Telnet Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Configure the Telnet Server Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

CHAPTER 4 Understanding Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Logging to the Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Logging to the Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Logging to a Local File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Logging to the Syslog Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

CHAPTER 5 Understanding DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

© 2021 IP Infusion Inc. Proprietary iii


Contents

Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

CHAPTER 6 Understanding DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
IPv4 DHCP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
IPv6 DHCP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

iv © 2021 IP Infusion Inc. Proprietary


Preface

This guide describes how to configure protocols for system management such as SSH, Telnet, Syslog, DNS, and
DHCP in OcNOS.

Audience
This guide is intended for network administrators and other engineering professionals who configure system
management protocols.

Conventions
Table P-1 shows the conventions used in this guide.

Table P-1: Conventions

Convention Description

Italics Emphasized terms; titles of books

Note: Special instructions, suggestions, or warnings

monospaced type Code elements such as commands, functions, parameters, files, and directories

Contents
This guide contains these chapters and appendices:
• Chapter 1, Understanding User Configuration
• Chapter 2, Understanding SSH
• Chapter 3, Understanding Telnet
• Chapter 4, Understanding Syslog
• Chapter 5, Understanding DNS
• Chapter 6, Understanding DHCP

Related Documents
Use this guide with the System Management Command Reference for details about the commands used in the
configurations.
Note: All OcNOS technical manuals are available to licensed customers at http://www.ipinfusion.com/support/
document_list.

© 2021 IP Infusion Inc. Proprietary v


Preface

Chapter Organization
The chapters in this guide are organized into these major sections:
• An overview that explains a configuration in words
• Topology with a diagram that shows the devices and connections used in the configuration
• Configuration steps in a table for each device where the left-hand side shows the commands you enter and the
right-hand side explains the actions that the commands perform
• Validation which shows commands and their output that verify the configuration

Support
For support-related questions, contact [email protected].

Comments
If you have comments, or need to report a problem with the content, contact [email protected].

vi © 2021 IP Infusion Inc. Proprietary


CHAPTER 1 Understanding User Configuration

Overview
User management is an authentication feature that provides administrators with the ability to identify and control the
users who log into the network.
User management feature provides the following:

1. Configure user account: Create a user by specifying a username and a password and also by assigning role to the
user.

2. Modify user account: Change the password and role of the user specified.

3. Delete user account: Remove a user account from the system.

4. Display user information:


• Show information about a specific or all the users.
• Show information about users currently logged into the system.

Topology

Figure 1-1: User configuration topology

Configuration

Switch1#configure terminal Enter configure mode.


Switch1(config)#username testuser password Create username 'testuser' with deafault role as network-user
testing123 and password 'testing123'.
Switch1(config)#username testuser password Change the password for existing user 'testuser'.
Device12345
Switch1(config)# username testuser role Change the role for existing user 'testuser' from default role
network-operator network-user to network-operator.
Switch1(config)# username testuser role Change the role for existing user 'testuser' from default role
network-admin network-user to network-admin
Switch1(config)#no username testuser Delete user 'testuser'.
Switch1(config)#exit Exit configure mode

© 2021 IP Infusion Inc. Proprietary 7


Understanding User Configuration

Validation
Switch1#show user-account
User:testuser
roles: network-user

Switch1#show user-account testuser


User:testuser
roles: network-user

Switch1#show role
Role Name Info
------------------------------------------------------------------------
network-admin Network Administrator - Have all permissions
network-operator Network Operator - Can not save configuration
network-user Network User - Can not change configuration

8 © 2021 IP Infusion Inc. Proprietary


CHAPTER 2 Understanding SSH

Overview
SSH is a network protocol that allows data to be exchanged using a secure channel between two networked
devices.SSH was designed as a replacement for Telnet and other insecure remote shells, which send information,
notably passwords in plain text rendering them susceptible to packet analysis.The encryption used by SSH is intended
to provide confidentiality and integrity of data over an unsecured network, such as the Internet. SSH uses public-key
cryptography to authenticate the remote computer and allow the remote computer to authenticate the user. SSH is
typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP
ports and X11 connections, and transferring files using the associated SFTP or SCP protocols. SSH uses the client-
server model.The standard TCP port 22 has been assigned for contacting SSH servers.

Topology

Figure 2-1: SSH topology

Configuration

Enable and Disable SSH Server

Switch1#configure terminal Enter configure mode.


Switch1(config)#no feature ssh Disable SSH feature.
Switch1(config)#feature ssh Enable SSH feature.
Switch1(config)#exit Exit configure mode

Configure SSH Server Login Attempts

Switch1(config)#no feature ssh Disable the feature ssh.


Switch1(config)#ssh login-attempts 3 Set Login-attempts 3.

© 2021 IP Infusion Inc. Proprietary 9


Understanding SSH

Switch1(config)#feature ssh Enable the feature ssh.


Switch1(config)#exit Exit configure mode

Configure SSH Server Keys

Switch1(config)#no feature ssh Disable the feature ssh.


Switch1(config)#ssh key rsa force The force option is used if the user wants to regenerate
the ssh rsa keys. The same thing applies for dsa also.
Switch1(config)#feature ssh Enable the feature ssh.
Switch1(config)#exit Exit configure mode

Validation
Switch1#show ssh server
ssh server enabled port: 22
authentication-retries 3

Switch1#show ssh key


*****************RSA KEY*********************
ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAABAQDFgi+4E8K3HBCXGbiUNpg/R1kL38P0D65r+lmhWh2AQ/
a+FVFFRgk+eYdylR8Lw7OIHcobWmo9XE5mEz+KakcwM+kUlYkSRCq3XirQXWgoJTknpxhVG2YjAnKR233T/
LsOi5C4sYvDEr5EerULBtsVyESrDSZp6xErf2ARX+00SYP

bitcount: 2048 fingerprint: a2:92:5b:74:d8:36:a9:a2:ec:28:71:1d:7d:04:55:4e


**************************************
*****************DSA KEY*********************
ssh-dsa
AAAAB3NzaC1kc3MAAACBAJlirnOYQwLO2rzwa/OE4Qg3dc/SvpCL7m6vM0U2Fr0TosTxwW/
LAQ27TzTmlQIYfFQ5sa6OU98hCYxbOiHrBcfKt6xBymiUDED1u47D6vtzqSpJGMb6Qaly3UIynFdMpXmGJqcV16
aeL5KajbHuWDbXcBGEPIP3Lzi/B9g5NJtVAAAAFQComLsVTVvJ71f2lW/4uSA/
wM7mrQAAAIA0xXDjjuI9xQaNo4tPEI9VPqnoFom7/Yn7N+BpvF+Ken9UYBhvJk+lll5lbtRKab+/QzZPjiDW2/
1GMDOsNUci9ESd8n0V3pj/4O5xk16x1aDdSOU7EXFGJx5Bfdg1PVWxycHrGXTj0/
6fJh7KZP1cIK+QpF7gyoBddFf3oKS+rwAAAIACjPKfBbu+oF75YSDift2sjqs1WG5CZAQpYdaObw5phTpjvpuPP
upK0AHHXrBjYrmZAjp0CHD85OesoAZJuBbMEbTXjf5nCa64TrRMgV9DfRL7qfYUpapqDg/
2cxQI4p3Tt+leIjOlGOWv/hA7ivZmPapwSOpBOHJBYLmLzED8mA==

bitcount: 1024 fingerprint: 11:fe:02:6b:79:e5:ce:06:24:42:73:63:33:eb:2a:39


**************************************

Switch1#show running-config ssh server


ssh login-attempts 3
ssh server port 58
feature ssh

10 © 2021 IP Infusion Inc. Proprietary


CHAPTER 3 Understanding Telnet

Overview
Telnet is a TCP/IP protocol used on the Internet and local area networks to provide a bidirectional interactive text-
oriented communications facility using a virtual terminal connection. The Telnet program runs connects it to a server on
the network. A user can then enter commands through the Telnet program and they will be executed as if the user were
entering them directly on the server console.Telnet enables users to control the server and communicate with other
servers on the network. The default port number for Telnet protocol is 23.Telnet offers users the capability of running
programs remotely and facilitates remote administration.

Topology

Figure 3-1: Telnet sample topology

Configuration

Enable and Disable the Telnet Server

Switch1#configure terminal Enter configure mode.


Switch1(config)#no feature telnet Disable telnet feature.
Switch1(config)#feature telnet Enable telnet feature.
Switch1(config)#exit Exit configure mode

Configure the Telnet Server Port

Switch1(config)#no feature telnet Disable telnet feature.


Switch1(config)#telnet server port 61112 Set telnet port to 61112 Default is 23.
Switch1(config)#feature telnet Enable telnet feature.
Switch1(config)#exit Exit configure mode

© 2021 IP Infusion Inc. Proprietary 11


Understanding Telnet

Validation
Switch1#show telnet server
telnet server disabled port: 786

Switch1#show running-config telnet server


no feature telnet
telnet server port 786

12 © 2021 IP Infusion Inc. Proprietary


CHAPTER 4 Understanding Syslog

Overview
Syslog is a standard for logging program messages. It allows separation of the software that generates messages from
the system that stores them and the software that reports and analyzes them. It also provides devices that would
otherwise be unable to communicate a means to notify administrators of problems or performance issues. OcNOS
supports logging messages to a syslog server in addition to logging to a file or the console (local or ssh/ telnet console).
OcNOS messages can be logged to a local syslog server (the machine on which OcNOS executes) as well as to one or
more remote syslog servers. Remote syslog servers can either be configured as IPv4 or IPv6 addresses or as host
names.

Topology

Figure 4-1: SSH sample topology

Configuration

Logging to the Console

Switch1#configure terminal Enter configure mode.


Switch1(config)#logging console 7 This enables the console logs.
Switch1(config)#logging level hostp 7 This enables debug messages for hostp module.
Switch1(config)#debug radius This enables the debugging on radius-client configurations.
Switch1(config)#radius-server login host This adds the radius server host.
10.10.10.1
Switch1(config)#exit Exit configure mode

Logging to the Monitor

Switch1#terminal monitor This will copy debug output to this terminal line.
Switch1#configure terminal Enter configure mode.

© 2021 IP Infusion Inc. Proprietary 13


Understanding Syslog

Switch1(config)#logging monitor 7 This enables the monitor logs.


Switch1(config)#debug radius This enables the debugging on radius-client configurations.
Switch1(config)#radius-server login host This adds the radius server host.
10.10.10.1
Switch1(config)#exit Exit configure mode

Logging to a Local File

Switch1#configure terminal Enter configure mode.


Switch1(config)#logging level hostp 7 This enable debug messages for hostp module.
Switch1(config)#logging logfile xyz 7 This creates the log file where the logs will be saved. The
path of the file will be in the directory /log/xyz.txt
Switch1(config)#debug radius This enables the debugging on radius-client configurations.
Switch1(config)#radius-server login host This adds the radius server host.
10.10.10.1
Switch1(config)#exit Exit configure mode

Logging to the Syslog Server

Switch1#configure terminal Enter configure mode.


Switch1(config)#logging level hostp 7 This enable debug messages for hostp module.
Switch1(config)#debug radius This enables the debugging on radius-client
configurations.
Switch1(config)#logging server 10.16.2.1 Redirects the log messages to the server configured.
Switch1(config)#radius-server login host This adds the radius server host.
10.10.10.1
Switch1(config)#exit Exit configure mode

Validation
Switch1#show logging console
Console logging : enabled Severity: (debugging)

VPC51#show logging monitor


Logging monitor : enabled Severity: (debugging)

Switch1#show logging level


Facility Default Severity Current Session Severity
nsm 6 6
ripd 6 6
ripngd 6 6
ospfd 6 6
ospf6d 6 6
isisd 6 6
hostpd 6 6

14 © 2021 IP Infusion Inc. Proprietary


Understanding Syslog

Switch1#show logging logfile


File logging : enabled File Name : /log/xyz Severity : (7)
2015 Jul 31 16:31:43 VPC51 HOSTP-3: RADIUS client: HOSTP error status = -37884

Switch1#show logging server


Remote Servers:
10.16.2.1
severity: (debugging)
facility: local7

© 2021 IP Infusion Inc. Proprietary 15


Understanding Syslog

16 © 2021 IP Infusion Inc. Proprietary


CHAPTER 5 Understanding DNS

Overview
The Domain Name System (DNS) is an Internet service that translates domain names into IP addresses. When a
domain name is used, DNS service translates the name into the corresponding IP address. If one DNS server does not
know how to translate a particular domain name, it gathers information from other Domain Name Systems to obtain the
correct IP address.

Topology

Figure 5-1: DNS sample topology

Configuration

Switch1#configure terminal Enter configure mode.


Switch1(config)#ip domain-lookup Turn on the Domain Name Service (DNS) feature.
Switch1(config)#no ip domain-lookup Turn off the Domain Name Service (DNS) feature.
Switch1(config)#ip name-server 128.10.0.22 This add a IPv4 Name Server to the DNS.
Switch1(config)#ipv6 name-server 2000::1 This add a IPv6 Name Server to the DNS.
Switch1(config)#ip host abc 10.12.17.12 This will add IPv4 host to the DNS
Switch1(config)#ip domain-name company.com This set the default domain name for the DNS.
Switch1(config)#ip domain-list company.com This add the domain company.com to the DNS list.
Switch1(config)#exit Exit configure mode

Validation
Switch1#show hosts
DNS lookup is enabled
Default domain : company.com
Additional Domain : company.com
Name Servers : 128.10.0.22 2000::1

© 2021 IP Infusion Inc. Proprietary 17


Understanding DNS

Host Address
---- -------
abc 10.12.17.12

* - Values assigned by DHCP Client.

Switch1#show running-config dns


ip domain-lookup
ip domain-name company.com
ip domain-list company.com
ip name-server 128.10.0.22
ip name-server 2000::1
ip host abc 10.12.17.12
!

18 © 2021 IP Infusion Inc. Proprietary


CHAPTER 6 Understanding DHCP

Overview
Dynamic Host Configuration Protocol (DHCP) protocol is used for assigning dynamic IP addresses to systems on a
network. Dynamic addressing allows a system to have an IP address each time it connects to the network. DHCP
makes network administration easier by removing the need to manually assign a unique IP address every time a new
system is added to the network. It is especially useful to manage mobile users. Once a system is configured to use
DHCP, it can be automatically configured on any network that has a DHCP server. DHCP uses a client-server model, in
which the DHCP server centrally manages the IP addresses used in the network. DHCP clients obtain an IP address
on lease from the DHCP server.

Topology

Figure 6-1: DHCP client sample topology

Configuration

IPv4 DHCP Client

Switch1#configure terminal Enter configure mode.


Switch1(config)#feature dhcp Enable the feature dhcp. This will be enabled by default.
Switch1(config)#interface eth1 Specify the interface(eth1) to be configured and enter the
interface mode.
Switch1(config-if)#ip address dhcp The client requests for the IP address from the server. Once it
receives an acknowledgement from the server, the client
assigns the IP address to the interface.
Switch1(config if)#exit Exit interface mode.
Switch1(config)#exit Exit configure mode

© 2021 IP Infusion Inc. Proprietary 19


Understanding DHCP

IPv6 DHCP Client

Switch1#configure terminal Enter configure mode.


Switch1(config)#feature dhcp Enable the feature dhcp. This will be enabled by default.
Switch1(config)#interface eth2 Specify the interface(eth2) to be configured and enter the
interface mode.
Switch1(config-if)#ipv6 address dhcp The client requests for the IP address from the server.
Once it receives an acknowledgement from the server,
the client assigns the IP address to the interface.
Switch1(config-if)#exit Exit interface mode.
Switch1(config)#exit Exit configure mode

Validation
Switch1#show running-config dhcp
interface eth1
ip address dhcp
!
interface eth2
ipv6 address dhcp
!

Switch1#sh ip interface brief


Interface IP-Address Admin-Status Link-Status
eth0 10.12.29.44 up up
lo 127.0.0.1 up up
eth1 *12.1.1.4 up up
*address is assigned by dhcp client

Switch1#show ipv6 interface brief


Interface IPv6-Address Admin-Status
eth0 fe80::eef4:bbff:fefc:6928 [up/down]
lo ::1 [up/up]
eth2 *2001:db8:0:1::254
fe80::eef4:bbff:febd:4129 [up/up]
*address is assigned by dhcp client

20 © 2021 IP Infusion Inc. Proprietary


Index

A
authentication 7

D
DHCP 19
DNS 17

I
IP 17

P
password 7

S
SCP 9
SFTP 9
SSH 9
Syslog 13

T
TCP 9
Telnet 9, 11

U
user management 7
username 7

© 2021 IP Infusion Inc. Proprietary 21


Index

22 © 2021 IP Infusion Inc. Proprietary

You might also like