Brocade Configuration Examples
Terminal Configurations
Windows Environment
In a UNIX environment, enter the following string at the prompt:
tip /dev/ttyb -9600
If ttyb is already in use, use ttya instead and enter the following string at the prompt:
tip /dev/ttya -9600
Brocade Configuration Examples
system
prompt.
User =
>
Privileged =
CONFIG =
(config)#
Brocade Configuration Examples
POE/POE+
PoE
Device will supply 15.4 watts of power at the RJ-45 jack
PoE+
Device will supply either 15.4 or 30 watts of power
Brocade Configuration Examples
POE/POE+ Configurations
Brocade#configure terminal
Brocade(config)# interface ethernet 1/1
Brocade(config-if-e1000-1/1)# inline power power-limit 14000
commands enable in-line power on interface ethernet 1 in slot 1 and set the PoE power level to
atts (14 watts).
Syntax: inline power power-limit <power level>
<power level> variable is the maximum power level in number of milliwatts. The following values
orted:
PoE: Enter a value from 1000 through 15,400. The default is 15,400.
PoE+: Enter a value from 1000 through 30,000. The default is 30,000.
Brocade Configuration Examples
LI Commands for use with the management port
To display the current configuration
show running-config interface management
Syntax: show running-config interface management <num>
Brocade(config-if-mgmt)#ip addr 10.44.9.64/24
Brocade(config)#show running-config interface management 1
interface management 1
ip address 10.44.9.64 255.255.255.0
Brocade Configuration Examples
management port Show Commands
show interfaces management <num> Syntax: show interfaces brief management <num>
rocade(config)#show interfaces management 1
GigEthernetmgmt1 is up, line protocol is up
Hardware is GigEthernet, address is 0000.9876.544a (bia 0000.9876.544a)
Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx
Configured mdi mode AUTO, actual none
BPRU guard is disabled, ROOT protect is disabled
Link Error Dampening is Disabled
STP configured to OFF, priority is level0, mac-learning is enabled Syntax: show statistics brief management <num>
Flow Control is config disabled, oper enabled
Mirror disabled, Monitor disabled
Not member of any active trunks
Brocade(config)#show statistics brief management
Not member of any configured trunks
PortIn PacketsOut PacketsTrunkIn ErrorsOut Errors
No port name
mgmt1399462200
IPG MII 0 bits-time, IPG GMII 0 bits-time
IP MTU 1500 bytes
Total399452200
300 second input rate: 83728 bits/sec, 130 packets/sec, 0.01% utilization
300 second output rate: 24 bits/sec, 0 packets/sec, 0.00% utilization
39926 packets input, 3210077 bytes, 0 no buffer
Received 4353 broadcasts, 32503 multicasts, 370 unicasts
0 input errors, 0 CRC, 0 frame, 0 ignored
0 runts, 0 giants
22 packets output, 1540 bytres, 0 underruns
Transmitted 0 broadcasts, 6 multicasts, 16 unicasts
0 output errors, 0 collisions
Brocade Configuration Examples
management port Show Commands Cont..
show statistics management <num>
Brocade Configuration Examples
Change Host Name
Syntax: hostname <string>
Brocade(config)# hostname zappa
zappa(config)#
Brocade Configuration Examples
CLI banner configuration
etting a message of the day banner
nn
a
b
For example, to display the message Welcome to FESX! when a Telnet CLI session
no
e
is establishedbanner motd $ (Press Return)
th
ocade(config)#
r
te
n
e
ter TEXT message, End with the character '$'.
r,
e
n
elcome to FESX! $
an
b
he
t
ve
o
em
r
To
etting a privileged EXEC CLI level banner
otd
m
r
You can configure the Brocade device to display a message when a user enters the Privileged
EXEC CLI level.
Example
Brocade(config)# banner exec_mode # (Press Return)
Enter TEXT message, End with the character '#'.
You are entering Privileged EXEC level
up to 4000
Do not foul anything up! #
characters
Brocade Configuration Examples
10
mm
o
c
Assigning a port name
To assign a name to a port.
Brocade(config)# interface ethernet 2
Brocade(config-if-e1000-2)# port-name Marsha
e
Th
am
Brocade Configuration Examples
n
ca
be
up
to
64
r
a
ch
rs
e
t
ac
n
lo
11
Port speed and duplex mode modification
designed to auto-sense and auto-negotiate the speed and duplex mode of
the connected device
If the attached device does not support you can manually enter the port
speed to operate at either 10, 100, or 1000 Mbps
default and recommended setting is 10/100/1000 auto-sense
Brocade Configuration Examples
12
ort speed and duplex mode configuration syntax
e following commands change the port speed of copper interface 8 on a FastIron from the
ault of 10/100/1000 auto-sense, to 100 Mbps operating in full-duplex mode.
Brocade(config)# interface ethernet 8
Brocade(config-if-e1000-8)# speed-duplex 100-full
NOTE
On FastIron devices, when setting the
speed and duplex-mode of an interface
to 1000-full, configure
one side of the link as master (1000full-master) and the other side as slave
(1000-full-slave).
Brocade Configuration Examples
13
Enabling auto-negotiation maximum port speed advertisement
and down-shift
ort speed down-shift enables Gbps copper ports on the Brocade device to establish a link at 1000
bps over a 4-pair wire when possible, or to down-shift to 100 Mbps if the medium is a 2-pair wire.
Maximum port speed application notes
t speed down-shift and maximum port speed advertisement work only when
o-negotiation is enabled (CLI command speed-duplex auto). If auto-negotiation is OFF, the
vice will reject the port speed down-shift and maximum port speed advertisement
nfiguration.
Combo Ports not support
Brocade Configuration Examples
14
Enabling port speed down-shift
following at the Global CONFIG level of the CLI
Brocade(config)# link-config gig copper autoneg-control down-shift ethernet 1 ethernet 2
Brocade Configuration Examples
15
Enabling port speed down-shift Cont
onfiguring port speed down-shift and auto-negotiation for a range of ports
t speed down-shift and auto-negotiation can be configured for an entire range of ports with a
gle command.
example, to configure down-shift on ports 0/1/1 to 0/1/10 and 0/1/15 to 0/1/20 on the
vice, enter the following.
Brocade(config)# link-config gig copper autoneg-control down-shift ethernet 0/1/1 to 0/1/10
ethernet 0/1/15 to 0/1/20
configure down-shift on ports 5 to 13 and 17 to 19 on a compact switch, enter the following.
Brocade(config)# link-config gig copper autoneg-control down-shift ethernet 5 to 13 ethernet 17
to 19
Brocade Configuration Examples
16
nabling port speed down-shift Cont
To disable selective auto-negotiation of 100m-auto on ports 0/1/21 to 0/1/25 and 0/1/30,
enter
the following.
Brocade(config)# no link-config gig copper autoneg-control 100m-auto Ethernet 0/1/21 to
0/1/25 ethernet 0/1/30
Brocade Configuration Examples
17
nfiguring maximum port speed advertisement
o configure a maximum port speed advertisement of 10 Mbps on a port that has auto-negotiation
nabled, enter a command such as the following at the Global CONFIG level of the CLI.
Brocade(config)# link-config gig copper autoneg-control 10m ethernet 1
o configure a maximum port speed advertisement of 100 Mbps on a port that has
uto-negotiation enabled, enter the following command at the Global CONFIG level of the CLI.
Brocade(config)# link-config gig copper autoneg-control 100m ethernet 2
Syntax: [no] link-config gig copper autoneg-control 10m | 100m ethernet <port>
[Ethernet [<port>]
Brocade Configuration Examples
18
Modifying port duplex mode
You can manually configure a 10/100 Mbps port to accept either full-duplex (bi-directional) or
half-duplex (uni-directional) traffic.
Port duplex mode configuration syntax
To change the port speed of interface 8 from the default of 10/100/1000 auto-sense to 10 Mbps
operating at full-duplex, enter the following.
Brocade(config)# interface ethernet 8
Brocade(config-if-e1000-8)# speed-duplex 10-full
Brocade Configuration Examples
19
Disabling or re-enabling a port
A port can be made inactive (disable) or active (enable) by selecting the appropriate status option.
The default value for a port is enabled.
disable port 8 of a Brocade device, enter the following.
Brocade(config)# interface ethernet 8
Brocade(config-if-e1000-8)# disable
You also can disable or re-enable a virtual
interface. To do so, enter commands such as the
following.
Brocade(config)#interfacevev1
Brocade(configvif1)#disable
Brocade Configuration Examples
20
Changing the Gbps fiber negotiation mode
e globally configured Gbps negotiation mode is the default mode for all Gbps fiber ports. You
n override the globally configured default and set individual ports to the following: NOTE
Gbps negotiation is
not supported on
egotiate-full-auto The port first tries to perform a handshake with the other portICX
to 6430 and ICX
6450 devices.
hange capability information. If the other port does not respond to the handshake attempt,
port uses the manually configured configuration information (or the defaults if an
ministrator has not set the information). This is the default.
uto-Gbps The port tries to perform a handshake with the other port to exchange capability
rmation.
egotiation-off The port does not try to perform a handshake. Instead, the port uses
figuration information manually configured by an administrator.
To change the mode for individual ports, enter commands such as the following.
Brocade(config)# interface ethernet 1 to 4
Brocade(config-mif-1-4)# gig-default auto-gig
Brocade Configuration Examples
21
ermining the flash image version running on the device
To determine the flash image version running on a device, enter the show version command at any
evel of the CLI. Some examples are shown below.
Brocade Configuration Examples
22
playing the boot image version running on the device
To determine the boot image running on a device, enter the show flash command at any level of the
CLI. The following shows an example output.
Brocade Configuration Examples
23
Flash image verification
The Flash Image Verification feature allows you to verify boot images based on hash codes, and to
generate hash codes where needed. This feature lets you select from three data integrity
verification algorithms:
MD5 - Message Digest algorithm (RFC 1321)
SHA1 - US Secure Hash Algorithm (RFC 3174)
CRC - Cyclic Redundancy Checksum algorithm
Brocade Configuration Examples
24
Flash image verification Cont
mage CLI commands
e following command syntax to verify the flash image:
x: verify md5 | sha1 | crc32 <ASCII string> | primary | secondary [<hash code>]
Generates a 16-byte hash code
Generates a 20-byte hash code
2 Generates a 4 byte checksum
string A valid image filename
ary The primary boot image (primary.img)
ndary The secondary boot image (secondary.img)
code The hash code to verify
Brocade Configuration Examples
25
Flash image verification Cont
o generate an MD5 hash value for the secondary image, enter the following command.
rocade#verify md5 secondary
rocade#.........................Done
ize = 2044830, MD5 01c410d6d153189a4a5d36c955653862
o generate a SHA-1 hash value for the secondary image, enter the following command.
rocade#verify sha secondary
rocade#.........................Done
ize = 2044830, SHA1 49d12d26552072337f7f5fcaef4cf4b742a9f525
o generate a CRC32 hash value for the secondary image, enter the following command.
rocade#verify crc32 secondary
rocade#.........................Done
ize = 2044830, CRC32 b31fcbc0
Brocade Configuration Examples
26
Flash image verification Cont
To verify the hash value of a secondary image with a known value, enter the following
commands.
Brocade#verify md5 secondary 01c410d6d153189a4a5d36c955653861
Brocade#.........................Done
Size = 2044830, MD5 01c410d6d153189a4a5d36c955653862
Verification FAILED.
In the previous example, the codes did not match, and verification failed. If verification
succeeds,
the output will look like this.
Brocade#verify md5 secondary 01c410d6d153189a4a5d36c955653861
Brocade#.........................Done
Size = 2044830, MD5 01c410d6d153189a4a5d36c955653861
Verification SUCEEDED.
The following examples show this process for SHA-1 and CRC32 algorithms.
Brocade#verify sha secondary 49d12d26552072337f7f5fcaef4cf4b742a9f525
Brocade#.........................Done
Size = 2044830, sha 49d12d26552072337f7f5fcaef4cf4b742a9f525
Brocade Configuration Examples
Verification SUCCEEDED.
27
Software upgrades
Brocade Configuration Examples
28
oading and saving configuration files
For easy configuration management, all Brocade devices support both the download and upload of
configuration files between the devices and a TFTP server on the network.
Brocade Configuration Examples
29
Replacing the startup configuration with the running
configuration
er you make configuration changes to the active system, you can save those changes by writing
m to flash memory. When you write configuration changes to flash memory, you replace the
rtup configuration with the running configuration.
eplace the startup configuration with the running configuration, enter the following command
any Enable or CONFIG command prompt.
Brocade#write memory
Brocade Configuration Examples
30
Replacing the running configuration with the
startup configuration
you want to back out of the changes you have made to the running configuration and return to
e startup configuration, enter the following command at the Privileged EXEC level of the CLI.
Brocade#reload
Brocade Configuration Examples
31
pying a configuration file to or from a TFTP server
The maximum size for the running-config and
the startup-config file is 512K each.
Brocade Configuration Examples
32
E
NOT Make sure you enter each command at the correct CLI level. Since some commands have
identical forms at both the global CONFIG level and individual configuration levels, if the CLI
response to the configuration file results in the CLI entering a configuration level you did not
intend, then you can get unexpected results.
r example, if a trunk group is active on the device, and the configuration file contains a
mmand to disable STP on one of the secondary ports in the trunk group, the CLI rejects the
mmands to enter the interface configuration level for the port and moves on to the next
mmand in the file you are loading. If the next command is a spanning-tree command whose
ntax is valid at the global CONFIG level as well as the interface configuration level, then the
ftware applies the command globally. Here is an example.
The configuration file contains these commands.
nterface ethernet 2
no spanning-tree
Brocade Configuration Examples
33
If the file contains commands that must be entered in a specific order, the commands mus
appear in the file in the required order. For example, if you want to use the file to replace a
E
NOT address on an interface, you must first remove the old address using no in front of the
address command, then add the new address. Otherwise, the CLI displays an error messag
and does not implement the command. Here is an example.
The configuration file contains these commands.
interface ethernet 11
ip address 10.10.10.69/24
The end command must appear
on the
last line of the file, by itself
Brocade Configuration Examples
34
Network connectivity testing
Brocade Configuration Examples
35
Defining the console
idle time
efault, a Brocade device does not time out serial console sessions. A serial session remains
n indefinitely until you close it. You can however define how many minutes a serial management
on can remain idle before it is timed out.
Brocade Configuration Examples
36
E
NOT
Brocade Configuration Examples
37
E
NOT
Brocade Configuration Examples
38
E
NOT
Brocade Configuration Examples
39
E
NOT
Brocade Configuration Examples
40
E
NOT
Brocade Configuration Examples
41
Local user accounts
You can define up to 16 local user accounts on a Brocade device. User accounts regulate who can
access the management functions in the CLI using the following methods:
Telnet access
Web management access
SNMP access
A management privilege level, which can be one of the following:
Super User level (default) Allows complete read-and-write access to the system. This is
generally for system administrators and is the only privilege level that allows you to
configure passwords.
Port Configuration level Allows read-and-write access for specific ports but not for global
parameters.
Read Only level Allows access to the Privileged EXEC mode and User EXEC mode with
read access only.
Brocade Configuration Examples
42
Local user accounts Cont.
Brocade Configuration Examples
43
abling enhanced user password combination requirements
en strict password enforcement is enabled on the Brocade device, you must enter a minimum of
ht characters containing the following combinations when you create an enable and a user
sword:
least
least
least
least
two
two
two
two
upper case characters
lower case characters
numeric characters
special characters
se the enable strict-password-enforcement command to enable the password security feature.
rocade(config)#enable strict-password-enforcement
Brocade Configuration Examples
44
Enabling user password masking
By default, when you use the CLI to create a user password, the password displays on the console
as you type it. For enhanced security, you can configure the Brocade device to mask the password
characters entered at the CLI. When password masking is enabled, the CLI displays asterisks (*) on
the console instead of the actual password characters entered.
The following shows the default CLI behavior when configuring a username and password.
Brocade(config)#username kelly password summertime
The following shows the CLI behavior when configuring a username and password when
password-masking is enabled.
Brocade(config)#username kelly password
Enter Password: ********
Brocade Configuration Examples
45
System reload scheduling
Brocade Configuration Examples
46
Brocade Configuration Examples
47
Brocade Configuration Examples
48
Setting a Telnet password
Brocade Configuration Examples
49
Setting a SSH password
Lets break this down into steps:
1) generate a key
#crypto key gen
2) create an ACL access group and bind it to the SSH login
#access-list 10 permit <ip_address/maskbits>
... repeat as necessary ...
#ssh access-group 10
3) set an idle timeout
#ip ssh idle-time 20 !time in minutes
4) set a login timeout
#ip ssh timeout 60 !time in seconds
5) consider disabling telnet (optional)
#no telnet server
6) Now create the local login accounts:
#user icxadmin privilege 0 pass <yourSuperSecurePassword>
7) Configure AAA to use the local user database as default
#aaa authentication login default local
8) Consider enabling user/pass requirement for console access too (optional)
#enable aaa console
Always keep your routers/switches secure and document your configuration, including access
Brocade Configuration Examples
settings, in your secure run book.
50
Changing the MAC age time and disabling MAC address
learning
Brocade Configuration Examples
51
Brocade Configuration Examples
52
LAB
Create VLAN
Assign IP to VLAN
MAP Ports to VLAN
VLAN Routing
Brocade Configuration Examples
53
Brocade Configuration Examples
54
THANK YOU!
Brocade Configuration Examples
55